Search results for: cyber threat intelligence
1448 Zooplankton Health Status Monitoring in Bir Mcherga Dam (Tunisia)
Authors: Sabria Barka, Imen Gdara, Zouhour Ouanès, Samia Mouelhi, Monia El Bour, Amel Hamza-Chaffai
Abstract:
Because dams are large semi-closed reservoirs of pollutants originating from numerous anthropogenic activities, they represent a threat to aquatic life and they should be monitored. The present work aims to use freshwater zooplankton (Copepods and Cladocerans) in order to evaluate the environmental health status of Bir M'cherga dam in Tunisia. Animals were collected in situ monthly between October and August. Genotoxicity (micronucleus test), neurotoxicity (acetylcholinesterase, AChE) and oxidative stress (catalase, CAT and malondialdehyde, MDA) biomarkers were analyzed in zooplankton. High frequencies of micronucleus were observed in zooplankton cells during summer. AChE activities were inhibited during early winter and summer. CAT and MDA biomarker levels showed high seasonal variability, suggesting that animals are permanently exposed to multiple oxidative stress. The results of this study suggest that the Bir Mcherga dam is subject to continuous multi-origin stress, probably amplified by abiotic parameters. It is then recommended to urgently monitor freshwater environments in Tunisia, especially those used for irrigation and consumption.Keywords: Biomonitoring, Bir Mcherga Dam, cladocerans, copepods, freshwater zooplankton, genotoxicity, neurotoxicity, oxidative stress, Tunisia
Procedia PDF Downloads 781447 Combating Supplier-Copycatting With Intellectual Property Agreements
Authors: Hubert Pun
Abstract:
When a manufacturer outsources the production of a product, it distributes its intellectual property (IP) into a supply chain that it may not be able to fully control. An IP agreement between a manufacturer and its suppliers is a popular solution to address the challenge of supplier-copycatting. The goal of this paper is to examine the impact of copycatting, from both the supplier and third-party firms, and the effectiveness of an IP agreement. Specifically, we use a game-theoretic approach to examine a system where a manufacturer outsources to a supplier. The supplier and a third-party firm decide whether or not to enter the market with copycat products while the manufacturer selects the level of marketing investment. The manufacturer can reduce the threat of supplier-copycatting by signing an IP agreement. We find that the manufacturer can be worse off from signing an IP agreement with its supplier, even if the IP agreement is costless and perfectly enforceable. We show that a manufacturer can deter copycat products through vertical integration and IP agreements and we outline the instances where each method is preferred. Furthermore, we find that the manufacturer may choose not to invest in quality improvements as a copycat deterrence strategy. We show that the supplier can benefit from the manufacturer’s decision to sign an IP agreement and that the supplier and the consumers can benefit from government regulations against copycat products. Our paper demonstrates the strengths and limitations of various copycat deterrence strategies when a supplier and third-party may produce copycat products.Keywords: coopetitive supply chain, copycat, government regulation, intellectual property
Procedia PDF Downloads 1801446 Trajectory Planning Algorithms for Autonomous Agricultural Vehicles
Authors: Caner Koc, Dilara Gerdan Koc, Mustafa Vatandas
Abstract:
The fundamental components of autonomous agricultural robot design, such as having a working understanding of coordinates, correctly constructing the desired route, and sensing environmental elements, are the most important. A variety of sensors, hardware, and software are employed by agricultural robots to find these systems.These enable the fully automated driving system of an autonomous vehicle to simulate how a human-driven vehicle would respond to changing environmental conditions. To calculate the vehicle's motion trajectory using data from the sensors, this automation system typically consists of a sophisticated software architecture based on object detection and driving decisions. In this study, the software architecture of an autonomous agricultural vehicle is compared to the trajectory planning techniques.Keywords: agriculture 5.0, computational intelligence, motion planning, trajectory planning
Procedia PDF Downloads 751445 Probabilistic-Based Design of Bridges under Multiple Hazards: Floods and Earthquakes
Authors: Kuo-Wei Liao, Jessica Gitomarsono
Abstract:
Bridge reliability against natural hazards such as floods or earthquakes is an interdisciplinary problem that involves a wide range of knowledge. Moreover, due to the global climate change, engineers have to design a structure against the multi-hazard threats. Currently, few of the practical design guideline has included such concept. The bridge foundation in Taiwan often does not have a uniform width. However, few of the researches have focused on safety evaluation of a bridge with a complex pier. Investigation of the scouring depth under such situation is very important. Thus, this study first focuses on investigating and improving the scour prediction formula for a bridge with complicated foundation via experiments and artificial intelligence. Secondly, a probabilistic design procedure is proposed using the established prediction formula for practical engineers under the multi-hazard attacks.Keywords: bridge, reliability, multi-hazards, scour
Procedia PDF Downloads 3711444 The Role of Financial Literacy and Personal Non-Cognitive Attributes in Household Financial Fragility
Authors: Ivana Bulog, Ana Rimac Smiljanić, Sandra Pepur
Abstract:
The financial fragility of households has received increased attention following the recent health crisis, which has created uncertainty and caused increased levels of stress and consequently impaired individual and family well-being. Job losses and/or reduced wages and insecurity increased the number of people that were unable to meet unexpected expenses, which, in many cases, led to increased household debt levels. This presents a threat to the stability of the financial system and the whole economy; therefore, reducing financial fragility and improving financial literacy present challenges for academicians, practitioners, and policymakers. Concerning financial fragility, significant research attention has been devoted to financial knowledge and financial literacy. However, apart from specific knowledge, personal characteristics are of great importance in making financial decisions in the household. Self-efficacy is one of the personal non-cognitive attributes that is a valuable framework for understanding how household financial decisions are made. Thus, this research proposes that individual levels of financial literacy and self-efficacy are related to the indebtedness and financial instability of the household. The primary data were collected using a structured, self-administered online questionnaire, and a snowball sampling method was applied to reach the participants. Preliminary results confirm our assumptions on the influence of financial literacy and self-efficacy on household financial stability.Keywords: financial literacy, self-efficacy, household financial fragility, well-being
Procedia PDF Downloads 861443 Fuzzy Inference System for Determining Collision Risk of Ship in Madura Strait Using Automatic Identification System
Authors: Emmy Pratiwi, Ketut B. Artana, A. A. B. Dinariyana
Abstract:
Madura Strait is considered as one of the busiest shipping channels in Indonesia. High vessel traffic density in Madura Strait gives serious threat due to navigational safety in this area, i.e. ship collision. This study is necessary as an attempt to enhance the safety of marine traffic. Fuzzy inference system (FIS) is proposed to calculate risk collision of ships. Collision risk is evaluated based on ship domain, Distance to Closest Point of Approach (DCPA), and Time to Closest Point of Approach (TCPA). Data were collected by utilizing Automatic Identification System (AIS). This study considers several ships’ domain models to give the characteristic of marine traffic in the waterways. Each encounter in the ship domain is analyzed to obtain the level of collision risk. Risk level of ships, as the result in this study, can be used as guidance to avoid the accident, providing brief description about safety traffic in Madura Strait and improving the navigational safety in the area.Keywords: automatic identification system, collision risk, DCPA, fuzzy inference system, TCPA
Procedia PDF Downloads 5491442 A Real-time Classification of Lying Bodies for Care Application of Elderly Patients
Authors: E. Vazquez-Santacruz, M. Gamboa-Zuniga
Abstract:
In this paper, we show a methodology for bodies classification in lying state using HOG descriptors and pressures sensors positioned in a matrix form (14 x 32 sensors) on the surface where bodies lie down. it will be done in real time. Our system is embedded in a care robot that can assist the elderly patient and medical staff around to get a better quality of life in and out of hospitals. Due to current technology a limited number of sensors is used, wich results in low-resolution data array, that will be used as image of 14 x 32 pixels. Our work considers the problem of human posture classification with few information (sensors), applying digital process to expand the original data of the sensors and so get more significant data for the classification, however, this is done with low-cost algorithms to ensure the real-time execution.Keywords: real-time classification, sensors, robots, health care, elderly patients, artificial intelligence
Procedia PDF Downloads 8641441 The Effect of Media Effect, Conformity, and Personality on Customers’ Purchase Intention under the Influence of COVID-19 Pandemic
Authors: Tsai-Yun Liao, Fang-Yi Hsu
Abstract:
Consumer behavior and consumption patterns have changed in reacting to the threat of COVID-19 pandemic situations. In order to explore the factors affecting customers’ purchase intention under the influence of the COVID-19 pandemic, this research uses structural equation modeling to explore the effect of media effect, conformity, and personality on customers’ purchase intention. Four essential objectives are investigated: how does media affect the conformity and perceived value of customers; the effect of media effect, conformity, and personality on customers’ purchase intention; the moderating effect of personality; and the mediating effect of perceived value toward purchase intention. By convenience sampling method, 428 questionnaires were collected, and the total number of valid samples was 406. Data analysis and results indicate that: (1) The media effect positively affects conformity. (2) The media effect positively affects perceived value. (3) Both conformity and perceived value positively affect purchase intention. (4) Consumer’s personality of openness to experience moderates the relationship between conformity and purchase intention. (5) Media effect affects purchase intention through the mediating effect of perceived value. This study contributes to the research by providing the factors affecting customers’ purchase intention and to the enterprises by maintaining incumbent customers and attracting potential customers.Keywords: COVID-19, media effect, conformity, personality, purchase intention
Procedia PDF Downloads 1451440 Political Islam: From Coinage to Hot Debate
Authors: Sajid Iqbal Sheikh
Abstract:
From almost last 100 years 'political islam' has diversity in its usage as terminology in the speculative works of both muslim and non-muslims theorists. 'Political islam' as a term was coined consciously as equal to the 'militant islam' and “Terrorist Islam” vs “Plain Islam” and “Modern Islam” etc. Many paradigm shifts tamed the term into one of the hottest debate of the day. This research paper aims to categorize historical linkage of its coinage, development phases and present status. Based on content analysis, Narrative approach has been utilized for the sake of dexterous conclusion. The paper treasures out that Western dominance on civilizational and political spheres of the holistic world considers 'political islam' a gigantic threat and plans to resist it in theoretic and practical fields simultaneously. Despite minor strategic variances, the ideological followers of Syed Qutab, Mulana Mudoodi and Hasan Al-Bana, are struggling hard for the achievement of their ultimate goal of Political change, specifically in the Muslim World in the prior phase. The paper concludes that Resistance to Islamic resurgence and its Political goals is being observed in most of the Muslim world, especially in the Turkey, Algeria, Egypt, Tsunia and Yeman etc, which is a basic cause of contrary reaction in the Muslim World.Keywords: electoral process, islamic resurgence, islamic political theory, muslim response, resistance, western hegemony
Procedia PDF Downloads 4491439 Between Leader-Member Exchange and Toxic Leadership: A Theoretical Review
Authors: Aldila Dyas Nurfitri
Abstract:
Nowadays, leadership has became the one of main issues in forming organization groups even countries. The concept of a social contract between the leaders and subordinates become one of the explanations for the leadership process. The interests of the two parties are not always the same, but they must work together to achieve both goals. Based on the concept at the previous it comes “The Leader Member Exchange Theory”—well known as LMX Theory, which assumes that leadership is a process of social interaction interplay between the leaders and their subordinates. High-quality LMX relationships characterized by a high carrying capacity, informal supervision, confidence, and power negotiation enabled, whereas low-quality LMX relationships are described by low support, large formal supervision, less or no participation of subordinates in decision-making, and less confidence as well as the attention of the leader Application of formal supervision system in a low LMX behavior was in line with strict controls on toxic leadership model. Leaders must be able to feel toxic control all aspects of the organization every time. Leaders with this leadership model does not give autonomy to the staff. This behavior causes stagnation and make a resistant organizational culture in an organization. In Indonesia, the pattern of toxic leadership later evolved into a dysfunctional system that is growing rapidly. One consequence is the emergence of corrupt behavior. According to Kellerman, corruption is defined as a pattern and some subordinates behave lie, cheat or steal to a degree that goes beyond the norm, they put self-interest than the common good.According to the corruption data in Indonesia based on the results of ICW research on 2012 showed that the local government sector ranked first with 177 cases. Followed by state or local enterprises as much as 41 cases. LMX is defined as the quality of the relationship between superiors and subordinates are implications for the effectiveness and progress of the organization. The assumption of this theory that leadership as a process of social interaction interplay between the leaders and his followers are characterized by a number of dimensions, such as affection, loyalty, contribution, and professional respect. Meanwhile, the toxic leadership is dysfunctional leadership in organization that is led by someone with the traits are not able to adjust, do not have integrity, malevolent, evil, and full of discontent marked by a number of characteristics, such as self-centeredness, exploiting others, controlling behavior, disrespecting others, suppress innovation and creativity of employees, and inadequate emotional intelligence. The leaders with some characteristics, such as high self-centeredness, exploiting others, controlling behavior, and disrespecting others, tends to describe a low LMX relationships directly with subordinates compared with low self-centeredness, exploiting others, controlling behavior, and disrespecting others. While suppress innovation and creativity of employees aspect and inadequate emotional intelligence, tend not to give direct effect to the low quality of LMX.Keywords: leader-member exchange, toxic leadership, leadership
Procedia PDF Downloads 4871438 An Artificially Intelligent Teaching-Agent to Enhance Learning Interactions in Virtual Settings
Authors: Abdulwakeel B. Raji
Abstract:
This paper introduces a concept of an intelligent virtual learning environment that involves communication between learners and an artificially intelligent teaching agent in an attempt to replicate classroom learning interactions. The benefits of this technology over current e-learning practices is that it creates a virtual classroom where real time adaptive learning interactions are made possible. This is a move away from the static learning practices currently being adopted by e-learning systems. Over the years, artificial intelligence has been applied to various fields, including and not limited to medicine, military applications, psychology, marketing etc. The purpose of e-learning applications is to ensure users are able to learn outside of the classroom, but a major limitation has been the inability to fully replicate classroom interactions between teacher and students. This study used comparative surveys to gain information and understanding of the current learning practices in Nigerian universities and how they compare to these practices compare to the use of a developed e-learning system. The study was conducted by attending several lectures and noting the interactions between lecturers and tutors and as an aftermath, a software has been developed that deploys the use of an artificial intelligent teaching-agent alongside an e-learning system to enhance user learning experience and attempt to create the similar learning interactions to those found in classroom and lecture hall settings. Dialogflow has been used to implement a teaching-agent, which has been developed using JSON, which serves as a virtual teacher. Course content has been created using HTML, CSS, PHP and JAVASCRIPT as a web-based application. This technology can run on handheld devices and Google based home technologies to give learners an access to the teaching agent at any time. This technology also implements the use of definite clause grammars and natural language processing to match user inputs and requests with defined rules to replicate learning interactions. This technology developed covers familiar classroom scenarios such as answering users’ questions, asking ‘do you understand’ at regular intervals and answering subsequent requests, taking advanced user queries to give feedbacks at other periods. This software technology uses deep learning techniques to learn user interactions and patterns to subsequently enhance user learning experience. A system testing has been undergone by undergraduate students in the UK and Nigeria on the course ‘Introduction to Database Development’. Test results and feedback from users shows that this study and developed software is a significant improvement on existing e-learning systems. Further experiments are to be run using the software with different students and more course contents.Keywords: virtual learning, natural language processing, definite clause grammars, deep learning, artificial intelligence
Procedia PDF Downloads 1341437 Development of the Family Capacity of Management of Patients with Autism Spectrum Disorder Diagnosis
Authors: Marcio Emilio Dos Santos, Kelly C. F. Dos Santos
Abstract:
Caregivers of patients diagnosed with ASD are subjected to high stress situations due to the complexity and multiple levels of daily activities that require the organization of events, behaviors and socioemotional situations, such as immediate decision making and in public spaces. The cognitive and emotional requirement needed to fulfill this caregiving role exceeds the regular cultural process that adults receive in their process of preparation for conjugal and parental life. Therefore, in many cases, caregivers present a high level of overload, poor capacity to organize and mediate the development process of the child or patient about their care. Aims: Improvement in the cognitive and emotional capacities related to the caregiver function, allowing the reduction of the overload, the feeling of incompetence and the characteristic level of stress, developing a more organized conduct and decision making more oriented towards the objectives and procedural gains necessary for the integral development of the patient with diagnosis of ASD. Method: The study was performed with 20 relatives, randomly selected from a total of 140 patients attended. The family members were submitted to the Wechsler Adult Intelligence Scale III intelligence test and the Family assessment Management Measure (FaMM) questionnaire as a previous evaluation. Therapeutic activity in a small group of family members or caregivers, with weekly frequency, with a minimum workload of two hours, using the Feuerstein Instrumental Enrichment Cognitive Development Program - Feuerstein Instrumental Enrichment for ten months. Reapplication of the previous tests to verify the gains obtained. Results and Discussion: There is a change in the level of caregiver overload, improvement in the results of the Family assessment Management Measure and highlight to the increase of performance in the cognitive aspects related to problem solving, planned behavior and management of behavioral crises. These results lead to the discussion of the need to invest in the integrated care of patients and their caregivers, mainly by enabling cognitively to deal with the complexity of Autism. This goes beyond the simple therapeutic orientation about adjustments in family and school routines. The study showed that when the caregiver improves his/her capacity of management, the results of the treatment are potentiated and there is a reduction of the level of the caregiver's overload. Importantly, the study was performed for only ten months and the number of family members attended in the study (n = 20) needs to be expanded to have statistical strength.Keywords: caregiver overload, cognitive development program ASD caregivers, feuerstein instrumental enrichment, family assessment management measure
Procedia PDF Downloads 1261436 Generative AI in Higher Education: Pedagogical and Ethical Guidelines for Implementation
Authors: Judit Vilarmau
Abstract:
Generative AI is emerging rapidly and transforming higher education in many ways, occasioning new challenges and disrupting traditional models and methods. The studies and authors explored remark on the impact on the ethics, curriculum, and pedagogical methods. Students are increasingly using generative AI for study, as a virtual tutor, and as a resource for generating works and doing assignments. This point is crucial for educators to make sure that students are using generative AI with ethical considerations. Generative AI also has relevant benefits for educators and can help them personalize learning experiences and promote self-regulation. Educators must seek and explore tools like ChatGPT to innovate without forgetting an ethical and pedagogical perspective. Eighteen studies were systematically reviewed, and the findings provide implementation guidelines with pedagogical and ethical considerations.Keywords: ethics, generative artificial intelligence, guidelines, higher education, pedagogy
Procedia PDF Downloads 861435 Geospatial and Statistical Evidences of Non-Engineered Landfill Leachate Effects on Groundwater Quality in a Highly Urbanised Area of Nigeria
Authors: David A. Olasehinde, Peter I. Olasehinde, Segun M. A. Adelana, Dapo O. Olasehinde
Abstract:
An investigation was carried out on underground water system dynamics within Ilorin metropolis to monitor the subsurface flow and its corresponding pollution. Africa population growth rate is the highest among the regions of the world, especially in urban areas. A corresponding increase in waste generation and a change in waste composition from predominantly organic to non-organic waste has also been observed. Percolation of leachate from non-engineered landfills, the chief means of waste disposal in many of its cities, constitutes a threat to the underground water bodies. Ilorin city, a transboundary town in southwestern Nigeria, is a ready microcosm of Africa’s unique challenge. In spite of the fact that groundwater is naturally protected from common contaminants such as bacteria as the subsurface provides natural attenuation process, groundwater samples have been noted to however possesses relatively higher dissolved chemical contaminants such as bicarbonate, sodium, and chloride which poses a great threat to environmental receptors and human consumption. The Geographic Information System (GIS) was used as a tool to illustrate, subsurface dynamics and the corresponding pollutant indicators. Forty-four sampling points were selected around known groundwater pollutant, major old dumpsites without landfill liners. The results of the groundwater flow directions and the corresponding contaminant transport were presented using expert geospatial software. The experimental results were subjected to four descriptive statistical analyses, namely: principal component analysis, Pearson correlation analysis, scree plot analysis, and Ward cluster analysis. Regression model was also developed aimed at finding functional relationships that can adequately relate or describe the behaviour of water qualities and the hypothetical factors landfill characteristics that may influence them namely; distance of source of water body from dumpsites, static water level of groundwater, subsurface permeability (inferred from hydraulic gradient), and soil infiltration. The regression equations developed were validated using the graphical approach. Underground water seems to flow from the northern portion of Ilorin metropolis down southwards transporting contaminants. Pollution pattern in the study area generally assumed a bimodal pattern with the major concentration of the chemical pollutants in the underground watershed and the recharge. The correlation between contaminant concentrations and the spread of pollution indicates that areas of lower subsurface permeability display a higher concentration of dissolved chemical content. The principal component analysis showed that conductivity, suspended solids, calcium hardness, total dissolved solids, total coliforms, and coliforms were the chief contaminant indicators in the underground water system in the study area. Pearson correlation revealed a high correlation of electrical conductivity for many parameters analyzed. In the same vein, the regression models suggest that the heavier the molecular weight of a chemical contaminant of a pollutant from a point source, the greater the pollution of the underground water system at a short distance. The study concludes that the associative properties of landfill have a significant effect on groundwater quality in the study area.Keywords: dumpsite, leachate, groundwater pollution, linear regression, principal component
Procedia PDF Downloads 1151434 The Impact of Artificial Intelligence on Human Developments Obligations and Theories
Authors: Seham Elia Moussa Shenouda
Abstract:
The relationship between development and human rights has long been the subject of academic debate. To understand the dynamics between these two concepts, various principles are adopted, from the right to development to development-based human rights. Despite the initiatives taken, the relationship between development and human rights remains unclear. However, the overlap between these two views and the idea that efforts should be made in the field of human rights have increased in recent years. It is then evaluated whether the right to sustainable development is acceptable or not. The article concludes that the principles of sustainable development are directly or indirectly recognized in various human rights instruments, which is a good answer to the question posed above. This book therefore cites regional and international human rights agreements such as , as well as the jurisprudence and interpretative guidelines of human rights institutions, to prove this hypothesis.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security
Procedia PDF Downloads 341433 Rethinking Nigeria's Foreign Policy in the Age of Global Terrorism
Authors: Shuaibu Umar Abdul
Abstract:
This paper examines Nigeria’s foreign policy in the age of global terrorism. It worth saying that the threat of ‘terrorism’ is not peculiar to Western and Middle Eastern countries alone, its tentacles are now spreading all over, Africa inclusive. The issue of domestic terrorism in Nigeria has become pervasive since the return of democratic rule in 1999. This development has never been a witness in any form throughout the year of statehood in Nigeria, the issues of banditry, armed robbery, ritual killing, and criminal activities like kidnapping and pipeline vandalization, the breakdown of law and order, poorly managed infrastructural facilities and corruption remain synonymous to Nigeria. These acts of terrorism no doubt have constituted a challenge that necessitates the paradigm shift in Nigeria’s foreign policy. The study employed the conceptual framework of analysis to lead interrogation; secondary sources were used to generate data while descriptive and content analysis were considered for data presentation and interpretation. In view of the interrogation and discussion on the subject matter, the paper revealed that Nigerian government underrated and underestimated the strength of terrorism within and outside her policy hence, it becomes difficult to address. As a response to the findings and conclusion of the study, the paper recommends among others that Nigeria’s foreign policy has to be rethought, reshaped and remodeled in cognizance to the rising global terrorism for peace, growth and development in the country.Keywords: foreign policy, globe, Nigeria, rethinking, terrorism
Procedia PDF Downloads 3571432 The Impact of India’s Centre-State Relations on its Maritime Counter-Terrorism Strategy
Authors: Riddhi Shah
Abstract:
Centre-state relations in India are a fascinating area of studies. The structure of the relationship has an effect on every single aspect of life as we know it in India. This paper is an attempt to study centre-state relations in the context of India’s maritime counter-terrorism strategy. Although the Government of India has not publicly stated its counter-terrorism strategy on the sea; intelligence, information sharing, crisis response, finances for internal security and the nation’s legislation for battling terrorism together comprise of India’s maritime-terrorism strategy. Through study of these areas, the paper argues that the centre-state divide has had systemic implications on India’s maritime security and has largely done more harm than good to collective initiatives that aspire to prevent future risk of terrorism from the sea or on the sea.Keywords: counter-terrorism, maritime terrorism, India, federalism, centre-state relations
Procedia PDF Downloads 5991431 Elimination of Low Order Harmonics in Multilevel Inverter Using Nature-Inspired Metaheuristic Algorithm
Authors: N. Ould Cherchali, A. Tlemçani, M. S. Boucherit, A. Morsli
Abstract:
Nature-inspired metaheuristic algorithms, particularly those founded on swarm intelligence, have attracted much attention over the past decade. Firefly algorithm has appeared in approximately seven years ago, its literature has enlarged considerably with different applications. It is inspired by the behavior of fireflies. The aim of this paper is the application of firefly algorithm for solving a nonlinear algebraic system. This resolution is needed to study the Selective Harmonic Eliminated Pulse Width Modulation strategy (SHEPWM) to eliminate the low order harmonics; results have been applied on multilevel inverters. The final results from simulations indicate the elimination of the low order harmonics as desired. Finally, experimental results are presented to confirm the simulation results and validate the efficaciousness of the proposed approach.Keywords: firefly algorithm, metaheuristic algorithm, multilevel inverter, SHEPWM
Procedia PDF Downloads 1451430 Knowledge Management in Agro-Alimentary Companies in Algeria
Authors: Radia Bernaoui, Mohamed Hassoun
Abstract:
Our survey deals a theme of the measurement of the management knowledge of actors in Algerian agricultural sector, through a study carried out with professionals affiliated to agro-alimentary 'agribusinesses'. Taking into account the creation of a national device of information on the agronomic research in Algeria, the aim is to analyze their informational practices and to assess how they rate the sharing of knowledge and the process of collective intelligence. The results of our study reveal a more crucial need: The creation a suitable framework to the division of the knowledge, to produce 'knowledge shared social' where the scientific community could interact with firms. It is a question of promoting processes for the adaptation and the spreading of knowledge, through a partnership between the R&D sector and the production one, to increase the competitiveness of the firms, even the sustainable development of the country.Keywords: knowledge management, pole of competitiveness, knowledge management, economy of knowledge, agro-alimentary, agribusiness, information system, Algeria
Procedia PDF Downloads 3281429 Child Soldier in Africa: A Big Challenge to Human Right
Authors: Adegboyega Adeolapo Ola, Gerelene Jagganath
Abstract:
One of the greatest challenges of human right in the world, especially African states is the use of child soldiers in armed conflict, constituting a major source of destruction of lives and properties. Mostly, they are in developing countries with the situation in Sub-Saharan Africa, the abduction and employment of children as soldiers is a form of exploitative labour that is tantamount to slavery. Since the end of cold war, Child soldier has increased in Africa countries like Angola, Liberia, Sierra Leone and Uganda. This study examines the main cause of the recruitment and use of child soldiers and its challenges to human right. It further assesses the role of international regional bodies and various governments in curbing child soldiers with a view to proffer suggestions on how to address some of the resultant threat of human right. The study posits that the control of small arms and light weapons is essential in curtailing the spread of child soldier and abuse of human right. This hopefully should result in the sustainability of human/child right in African continent. It is a recommendation of this study that, in order to sustain human right in the region, all Africa leaders, government and regional bodies; such as African Union, Economic Community of West African States, South African Development Community among others, should cooperate and work together to address the issue of illicit small arms, which could eventually lead to child soldier.Keywords: arms control, child soldier, human right, small arms
Procedia PDF Downloads 2071428 Victim and Active Subject of the Crime of Violence in Family Reflected in the Criminal Code of the Republic of Moldova
Authors: Nastas Andrei
Abstract:
Ensuring accessible and functional justice is one of the priority objectives of judicial reform, and protecting the family against any acts that may harm its existence is one of the first priorities that have determined the need to defend the social order. In this context, the correlative approach of the victim and the aggressor becomes relevant as a subject of the crime of domestic violence. Domestic violence is a threat of physical, moral, or material harm, externalized now or in the past, or its provocation, which is characterized by a constant tendency to escalate and a high probability of repetitiveness in the relationship between the social partners, regardless of their legal status or domicile.Studying the legal support to identify the particularities of the victim and the subject of the crime of domestic violence facilitates the identification of the determinants of this crime, therefore, the development of means to prevent domestic violence. The scientific research has been effectuated on the base of the proper and authentic empirical data obtained from the analysis of the judicial practice in the matter of domestic violence, as well as being based on the most recent scientific issues in the field of the Substantive Criminal Law and other branches of science (criminology, psychology, sociology, pedagogy). As a result of the study performed, there have been formulated conclusions and interpretations able to be used in the science of the Substantive Criminal law, as well as in the practice of application of the legal norm in the matter of domestic violence.Keywords: family violence, victim, crime, violence
Procedia PDF Downloads 1061427 The Effectiveness of Cathodic Protection on Microbiologically Influenced Corrosion Control
Authors: S. Taghavi Kalajahi, A. Koerdt, T. Lund Skovhus
Abstract:
Cathodic protection (CP) is an electrochemical method to control and manage corrosion in different industries and environments. CP which is widely used, especially in buried and sub-merged environments, which both environments are susceptible to microbiologically influenced corrosion (MIC). Most of the standards recommend performing CP using -800 mV, however, if MIC threats are high or sulfate reducing bacteria (SRB) is present, the recommendation is to use more negative potentials for adequate protection of the metal. Due to the lack of knowledge and research on the effectiveness of CP on MIC, to the author’s best knowledge, there is no information about what MIC threat is and how much more negative potentials should be used enabling adequate protection and not overprotection (due to hydrogen embrittlement risk). Recently, the development and cheaper price of molecular microbial methods (MMMs) open the door for more effective investigations on the corrosion in the presence of microorganisms, along with other electrochemical methods and surface analysis. In this work, using MMMs, the gene expression of SRB biofilm under different potentials of CP will be investigated. The specific genes, such as pH buffering, metal oxidizing, etc., will be compared at different potentials, enabling to determine the precise potential that protect the metal effectively from SRB. This work is the initial step to be able to standardize the recommended potential under MIC condition, resulting better protection for the infrastructures.Keywords: cathodic protection, microbiologically influenced corrosion, molecular microbial methods, sulfate reducing bacteria
Procedia PDF Downloads 901426 Real-Time Hybrid Simulation for a Tuned Liquid Column Damper Implementation
Authors: Carlos Riascos, Peter Thomson
Abstract:
Real-time hybrid simulation (RTHS) is a modern cyber-physical technique used for the experimental evaluation of complex systems, that treats the system components with predictable behavior as a numerical substructure and the components that are difficult to model as an experimental substructure. Therefore it is an attractive method for evaluation of the response of civil structures under earthquake, wind and anthropic loads. Another practical application of RTHS is the evaluation of control systems, as these devices are often nonlinear and their characterization is an important step in the design of controllers with the desired performance. In this paper, the response of three-story shear frame controlled by a tuned liquid column damper (TLCD) and subject to base excitation is considered. Both passive and semi-active control strategies were implemented and are compared. While the passive TLCD achieved a reduction of 50% in the acceleration response of the main structure in comparison with the structure without control, the semi-active TLCD achieved a reduction of 70%, and was robust to variations in the dynamic properties of the main structure. In addition, a RTHS was implemented with the main structure modeled as a linear, time-invariant (LTI) system through a state space representation and the TLCD, with both control strategies, was evaluated on a shake table that reproduced the displacement of the virtual structure. Current assessment measures for RTHS were used to quantify the performance with parameters such as generalized amplitude, equivalent time delay between the target and measured displacement of the shake table, and energy error using the measured force, and prove that the RTHS described in this paper is an accurate method for the experimental evaluation of structural control systems.Keywords: structural control, hybrid simulation, tuned liquid column damper, semi-active sontrol strategy
Procedia PDF Downloads 2961425 Risk Management Strategy for Protecting Cultural Heritage: Case Study of the Institute of Egypt
Authors: Amany A. Ragheb, Ghada Ragheb, Abd ElRahman A.
Abstract:
Egypt has a countless heritage of mansions, castles, cities, towns, villages, industrial and manufacturing sites. This richness of heritage provides endless and matchless prospects for culture. Despite being famous worldwide, Egypt’s heritage still is in constant need of protection. Political conflicts and religious revolutions form a direct threat to buildings in various areas, historic, archaeological sites, and religious monuments. Egypt has witnessed two revolutions in less than 60 years; both had an impact on its architectural heritage. In this paper, the authors aim to review legal and policy framework to protect the cultural heritage and present the risk management strategy for cultural heritage in conflict. Through a review of selected international models of devastated architectural heritage in conflict zones and highlighting some of their changes, we can learn from the experiences of other countries to assist towards the development of a methodology to halt the plundering of architectural heritage. Finally, the paper makes an effort to enhance the formulation of a risk management strategy for protection and conservation of cultural heritage, through which to end the plundering of Egypt’s architectural legacy in the Egyptian community (revolutions, 1952 and 2011); and by presenting to its surrounding community the benefits derived from maintaining it.Keywords: cultural heritage, legal regulation, risk management, preservation
Procedia PDF Downloads 3981424 Effect of Information and Communication Technology (ICT) Usage by Cassava Farmers in Otukpo Local Government Area of Benue State, Nigeria
Authors: O. J. Ajayi, J. H. Tsado, F. Olah
Abstract:
The study analyzed the effect of information and communication technology (ICT) usage on cassava farmers in Otukpo local government area of Benue state, Nigeria. Primary data was collected from 120 randomly selected cassava farmers using multi-stage sampling technique. A structured questionnaire and interview schedule was employed to generate data. Data were analyzed using descriptive (frequency, mean and percentage) and inferential statistics (OLS (ordinary least square) and Chi-square). The result revealed that majority (78.3%) were within the age range of 21-50 years implying that the respondents were within the active age for maximum production. 96.8% of the respondents had one form of formal education or the other. The sources of ICT facilities readily available in area were radio(84.2%), television(64.2%) and mobile phone(90.8%) with the latter being the most relied upon for cassava farming. Most of the farmers were aware (98.3%) and had access (95.8%) to these ICT facilities. The dependence on mobile phone and radio were highly relevant in cassava stem selection, land selection, land preparation, cassava planting technique, fertilizer application and pest and disease management. The value of coefficient of determination (R2) indicated an 89.1% variation in the output of cassava farmers explained by the inputs indicated in the regression model implying that, there is a positive and significant relationship between the inputs and output. The results also indicated that labour, fertilizer and farm size were significant at 1% level of probability while ICT use was significant at 10%. Further findings showed that finance (78.3%) was the major constraint associated with ICT use. Recommendations were made on strengthening the use of ICT especially contemporary ones like the computer and internet among farmers for easy information sourcing which can boost agricultural production, improve livelihood and subsequently food security. This may be achieved by providing credit or subsidies and information centres like telecentres and cyber cafes through government assistance or partnership.Keywords: ICT, cassava farmers, inputs, output
Procedia PDF Downloads 3091423 Functionalized Mesoporous Silica: Absorbents for Water Purification
Authors: Saima Nasreen, Uzaira Rafique, Shery Ehrman, Muhammad Aqeel Ashraf
Abstract:
The release of heavy metals into the environment is a potential threat to water and soil quality as well as to plant, animal and human health. In current research work, organically functionalized mesoporous silicates (MSU-H) were prepared by the co-condensation between sodium silicate and oregano alkoxysilanes in the presence of the nonionic surfactant triblock copolymer P104. The surfactant was used as a template for improving the porosity of the hybrid gels. Synthesized materials were characterized by TEM, FT-IR, SEM/EDX, TG, surface area analysis. The surface morphology and textural properties of such materials varied with various kinds of groups in the channels. In this study, removal of some heavy metals ions from aqueous solution by adsorption process was investigated. Batch adsorption studies show that the adsorption capacity of metal ions on the functionalized silicates is more than that on pure MSU-H. Data shows adsorption on synthesized materials is a time efficient process, suggesting adsorption on external surface as well as the mesoporous process. Adsorption models of Langmuir, Freundlich, and Temkin depicted equal goodness for all adsorbents, whereas pseudo 2nd order kinetics is in best agreement with experimental data.Keywords: heavy metals, mesoporous silica, hybrid, adsorption, freundlich, langmuir, temkin
Procedia PDF Downloads 2631422 Climate Change and Human Migration
Authors: Sungwoo Park
Abstract:
The paper attempts to investigate the correlation between climate change and migration that has caused violent disputes in some regions of the world. Recently, NGOs and educational institutions have proposed claims that migratory patterns and violent uprisings are intertwined with climate change. Thus, the paper is primarily concerned with collecting evidences provided from scholars, validating this significant connection between climate change and migration, and evaluating and suggesting current and future research approaches respectively to enhance the acknowledgment and protection of environmental refugees. In order to examine the linkage of environmental migration, primary sources, such as political speeches, and secondary sources like theses from environmental policy analysts, books, and reports are used. More specifically, the investigation focuses on an civil war in Syria to draw a connection between environmental migration and violent dispute that threatens the global security. The examination undertaken specifically analyzes examples where forced migration occurred due to climate change. In Bangladesh, Pakistan, and Kiribati, residents have been at risk of fleeing their countries because of abnormal climate patterns, such as the rise of sea level or an excessive heat stress. As the brutal uprising in Syria has proven that climate change can pose a significant threat to global security, correlation between climate change and migration is surely worth delving into.Keywords: climate change, climate migration, global security, refugee crisis
Procedia PDF Downloads 3461421 Characterization of Filled HNBR Elastomers for Sealing Application in Cold Climate Areas
Authors: Anton G. Akulichev, Avinash Tiwari, Ben Alcock, Andreas Echtermeyer
Abstract:
Low temperatures are known to pose a major threat for polymers; many are prone to excessive stiffness or even brittleness. There is a technology gap between the properties of existing elastomeric sealing materials and the properties needed for service in extremely cold regions. Moreover, some aspects of low temperature behaviour of rubber are not thoroughly studied and understood. The paper presents results of laboratory testing of a conventional oilfield HNBR (hydrogenated nitrile butadiene rubber) elastomer at low climatic temperatures above and below its glass transition point, as well as the performance of some filled HNBR formulations. Particular emphasis in the experiments is put on rubber viscoelastic characteristics studied by Dynamic Mechanical Analysis (DMA) and quasi-static mechanical testing results at low temperatures. As demonstrated by the stress relaxation and DMA experiments the transition region near Tg of the studied compound has the most striking features, like rapid stress relaxation, as compared to the glassy and rubbery plateau. In addition the quasi-static experiments show that molecular movement below Tg is not completely frozen, but rather evident and manifested in a certain stress decay as well. The effect of temperature and filler additions on typical mechanical and other properties of the materials is also discussed.Keywords: characterization, filled elastomers, HNBR, low temperature
Procedia PDF Downloads 3121420 The Role of Trust in International Relations– Examining India’s Gujaral Doctrine and South Asian Politics
Authors: Bhavana Mahajan
Abstract:
International Relations is a discipline of paradoxes. The State is the dominant political institution, yet little attention has been accorded to why individual countries behave the way they do with the theoretical analysis dismissing the State as a reactionary monolith – thus States either play to “quest for power” or to “systemic” forces. However, States do behave as and are influenced by agents when interacting with international structures as well as with other states. While questions on “competitive power politics” and “trust” have been examined and developed to a fair extent by International Relations theorists in the post 1990s period, their application to the domain of South Asian politics is limited and little research, if any, examines the conduct of foreign policy beyond rational choice. This paper is an initial attempt to marry these theoretical insights with the foreign policy exercised by India especially the case of the “Gujral Doctrine, as one of “non-reciprocal accommodation”. Ignoring the view that such a policy move can be viewed as political “feinting” or deception, it is noteworthy that India even made the first move in terms of defining its role as one who “trusts” rather than one who “seeks” to trust, given the country’s geo-strategic context and threat perceptions.Keywords: India’s foreign policy, South Asia, social constructivism, English school, trusting relationships, Gujral Doctrine, rationality
Procedia PDF Downloads 3401419 Multi-Tooled Robotic Hand for Tele-Operation of Explosive Devices
Authors: Faik Derya Ince, Ugur Topgul, Alp Gunay, Can Bayoglu, Dante J. Dorantes-Gonzalez
Abstract:
Explosive attacks are arguably the most lethal threat that may occur in terrorist attacks. In order to counteract this issue, explosive ordnance disposal operators put their lives on the line to dispose of a possible improvised explosive device. Robots can make the disposal process more accurately and saving human lives. For this purpose, there is a demand for more accurate and dexterous manipulating robotic hands that can be teleoperated from a distance. The aim of this project is to design a robotic hand that contains two active and two passive DOF for each finger, as well as a minimum set of tools for mechanical cutting and screw driving within the same robotic hand. Both hand and toolset, are teleoperated from a distance from a haptic robotic glove in order to manipulate dangerous objects such as improvised explosive devices. SolidWorks® Computer-Aided Design, computerized dynamic simulation, and MATLAB® kinematic and static analysis were used for the robotic hand and toolset design. Novel, dexterous and robust solutions for the fingers were obtained, and six servo motors are used in total to remotely control the multi-tooled robotic hand. This project is still undergoing and presents currents results. Future research steps are also presented.Keywords: Explosive Manipulation, Robotic Hand, Tele-Operation, Tool Integration
Procedia PDF Downloads 138