Search results for: strategic alignment
318 Enhancing the Implementation Strategy of Simultaneous Operations (SIMOPS) for the Major Turnaround at Pertamina Plaju Refinery
Authors: Fahrur Rozi, Daniswara Krisna Prabatha, Latief Zulfikar Chusaini
Abstract:
Amidst the backdrop of Pertamina Plaju Refinery, which stands as the oldest and historically less technologically advanced among Pertamina's refineries, lies a unique challenge. Originally integrating facilities established by Shell in 1904 and Stanvac (originally Standard Oil) in 1926, the primary challenge at Plaju Refinery does not solely revolve around complexity; instead, it lies in ensuring reliability, considering its operational history of over a century. After centuries of existence, Plaju Refinery has never undergone a comprehensive major turnaround encompassing all its units. The usual practice involves partial turnarounds that are sequentially conducted across its primary, secondary, and tertiary units (utilities and offsite). However, a significant shift is on the horizon. In the Q-IV of 2023, the refinery embarks on its first-ever major turnaround since its establishment. This decision was driven by the alignment of maintenance timelines across various units. Plaju Refinery's major turnaround was scheduled for October-November 2023, spanning 45 calendar days, with the objective of enhancing the operational reliability of all refinery units. The extensive job list for this turnaround encompasses 1583 tasks across 18 units/areas, involving approximately 9000 contracted workers. In this context, the Strategy of Simultaneous Operations (SIMOPS) execution emerges as a pivotal tool to optimize time efficiency and ensure safety. A Hazard Effect Management Process (HEMP) has been employed to assess the risk ratings of each task within the turnaround. Out of the tasks assessed, 22 are deemed high-risk and necessitate mitigation. The SIMOPS approach serves as a preventive measure against potential incidents. It is noteworthy that every turnaround period at Pertamina Plaju Refinery involves SIMOPS-related tasks. In this context, enhancing the implementation strategy of "Simultaneous Operations (SIMOPS)" becomes imperative to minimize the occurrence of incidents. At least four improvements have been introduced in the enhancement process for the major turnaround at Refinery Plaju. The first improvement involves conducting systematic risk assessment and potential hazard mitigation studies for SIMOPS tasks before task execution, as opposed to the previous on-site approach. The second improvement includes the completion of SIMOPS Job Mitigation and Work Matrices Sheets, which was often neglected in the past. The third improvement emphasizes comprehensive awareness to workers/contractors regarding potential hazards and mitigation strategies for SIMOPS tasks before and during the major turnaround. The final improvement is the introduction of a daily program for inspecting and observing work in progress for SIMOPS tasks. Prior to these improvements, there was no established program for monitoring ongoing activities related to SIMOPS tasks during the turnaround. This study elucidates the steps taken to enhance SIMOPS within Pertamina, drawing from the experiences of Plaju Refinery as a guide. A real actual case study will be provided from our experience in the operational unit. In conclusion, these efforts are essential for the success of the first-ever major turnaround at Plaju Refinery, with the SIMOPS strategy serving as a central component. Based on these experiences, enhancements have been made to Pertamina's official Internal Guidelines for Executing SIMOPS Risk Mitigation, benefiting all Pertamina units.Keywords: process safety management, turn around, oil refinery, risk assessment
Procedia PDF Downloads 74317 China Global Policy through the Shanghai Cooperation Organization
Authors: Enayatollah Yazdani
Abstract:
In the post-Cold War era, the world is facing a new emerging global order with the rise of multiple actors in the international arena. China, as a rising global power, has great leverage in internal relations. In particular, during the last two decades, China has rapidly transformed its economy into a global leader in advanced technologies. As a rising power and as one of the two major founding members of the Shanghai Cooperation Organization (SCO), China has tried to use this regional organization, which has the potential to become an important political and security organization of the major states located in the vast Eurasian landmass, for its “go global” strategy. In fact, for Beijing, the SCO represents a new and unique cooperation model, reflecting its vision of a multipolar world order. China has used the SCO umbrella as a multilateral platform to address external threats posed by non-state actors on its vulnerable western border; to gain a strong economic and political foothold in Central Asia without putting the Sino-Russian strategic partnership at risk; and to enhance its energy security through large-scale infrastructure investment in, and trade with, the Central Asian member states. In other words, the SCO is one of the successful outcomes of Chines foreign policy in the post-Cold War era. The expansion of multilateral ties all over the world by dint of pursuing institutional strategies as SCO identifies China as a more constructive power. SCO became a new model of cooperation that was formed on the remains of collapsed Soviet system and predetermined China's geopolitical role in the region. As the fast developing effective regional mechanism, SCO now has more of an external impact on the international system and forms a new type of interaction for promoting China's grand strategy of 'peaceful rise.' This paper aims to answer this major question: How the Chinese government has manipulated the SCO for its foreign policy and global and regional influence? To answer this question, the main discussion is that with regard to the SCO capabilities and politico-economic potential, this organization has been used by China as a platform to expand influence beyond its borders.Keywords: China, the Shanghai Cooperation Organization (SCO), Central Asia, global policy, foreign policy
Procedia PDF Downloads 65316 Modelling the Physicochemical Properties of Papaya Based-Cookies Using Response Surface Methodology
Authors: Mayowa Saheed Sanusi A, Musiliu Olushola Sunmonua, Abdulquadri Alakab Owolabi Raheema, Adeyemi Ikimot Adejokea
Abstract:
The development of healthy cookies for health-conscious consumers cannot be overemphasized in the present global health crisis. This study was aimed to evaluate and model the influence of ripeness levels of papaya puree (unripe, ripe and overripe), oven temperature (130°C, 150°C and 170°C) and oven rack speed (stationary, 10 and 20 rpm) on physicochemical properties of papaya-based cookies using Response Surface Methodology (RSM). The physicochemical properties (baking time, cookies mass, cookies thickness, spread ratio, proximate composition, Calcium, Vitamin C and Total Phenolic Content) were determined using standard procedures. The data obtained were statistically analysed at p≤0.05 using ANOVA. The polynomial regression model of response surface methodology was used to model the physicochemical properties. The adequacy of the models was determined using the coefficient of determination (R²) and the response optimizer of RSM was used to determine the optimum physicochemical properties for the papaya-based cookies. Cookies produced from overripe papaya puree were observed to have the shortest baking time; ripe papaya puree favors cookies spread ratio, while the unripe papaya puree gives cookies with the highest mass and thickness. The highest crude protein content, fiber content, calcium content, Vitamin C and Total Phenolic Content (TPC) were observed in papaya based-cookies produced from overripe puree. The models for baking time, cookies mass, cookies thickness, spread ratio, moisture content, crude protein and TPC were significant, with R2 ranging from 0.73 – 0.95. The optimum condition for producing papaya based-cookies with desirable physicochemical properties was obtained at 149°C oven temperature, 17 rpm oven rack speed and with the use of overripe papaya puree. The Information on the use of puree from unripe, ripe and overripe papaya can help to increase the use of underutilized unripe or overripe papaya and also serve as a strategic means of obtaining a fat substitute to produce new products with lower production cost and health benefit.Keywords: papaya based-cookies, modeling, response surface methodology, physicochemical properties
Procedia PDF Downloads 167315 Women’s Colours in Digital Innovation
Authors: Daniel J. Patricio Jiménez
Abstract:
Digital reality demands new ways of thinking, flexibility in learning, acquisition of new competencies, visualizing reality under new approaches, generating open spaces, understanding dimensions in continuous change, etc. We need inclusive growth, where colors are not lacking, where lights do not give a distorted reality, where science is not half-truth. In carrying out this study, the documentary or bibliographic collection has been taken into account, providing a reflective and analytical analysis of current reality. In this context, deductive and inductive methods have been used on different multidisciplinary information sources. Women today and tomorrow are a strategic element in science and arts, which, under the umbrella of sustainability, implies ‘meeting current needs without detriment to future generations’. We must build new scenarios, which qualify ‘the feminine and the masculine’ as an inseparable whole, encouraging cooperative behavior; nothing is exclusive or excluding, and that is where true respect for diversity must be based. We are all part of an ecosystem, which we will make better as long as there is a real balance in terms of gender. It is the time of ‘the lifting of the veil’, in other words, it is the time to discover the pseudonyms, the women who painted, wrote, investigated, recorded advances, etc. However, the current reality demands much more; we must remove doors where they are not needed. Mass processing of data, big data, needs to incorporate algorithms under the perspective of ‘the feminine’. However, most STEM students (science, technology, engineering, and math) are men. Our way of doing science is biased, focused on honors and short-term results to the detriment of sustainability. Historically, the canons of beauty, the way of looking, of perceiving, of feeling, depended on the circumstances and interests of each moment, and women had no voice in this. Parallel to science, there is an under-representation of women in the arts, but not so much in the universities, but when we look at galleries, museums, art dealers, etc., colours impoverish the gaze and once again highlight the gender gap and the silence of the feminine. Art registers sensations by divining the future, science will turn them into reality. The uniqueness of the so-called new normality requires women to be protagonists both in new forms of emotion and thought, and in the experimentation and development of new models. This will result in women playing a decisive role in the so-called "5.0 society" or, in other words, in a more sustainable, more humane world.Keywords: art, digitalization, gender, science
Procedia PDF Downloads 165314 Organizational Culture of a Public and a Private Hospital in Brazil
Authors: Fernanda Ludmilla Rossi Rocha, Thamiris Cavazzani Vegro, Silvia Helena Henriques Camelo, Carmen Silvia Gabriel, Andrea Bernardes
Abstract:
Introduction: Organizations are cultural, symbolic and imaginary systems composed by values and norms. These values and norms represent the organizational culture, which determines the behavior of the workers, guides the work practices and impacts the quality of care and the safety culture of health services worldwide. Objective: To analyze the organizational culture of a public and a private hospital in Brazil. Method: Descriptive study with quantitative approach developed in a public and in a private hospital of Brazil. Sample was composed by 281 nursing workers, of which 73 nurses and 208 nursing auxiliaries and technicians. The data collection instrument comprised the Brazilian Instrument for Assessing Organizational Culture. Data were collected from March to December 2013. Results: At the public hospital, the results showed an average score of 2.85 for the values concerning cooperative professionalism (CP); 3.02 for values related to hierarchical rigidity and the centralization of power (HR); 2.23 for individualistic professionalism and competition at work (IP); 2.22 for values related to satisfaction, well-being and motivation of workers (SW); 3.47 for external integration (EI); 2.03 for rewarding and training practices (RT); 2.75 for practices related to the promotion of interpersonal relationships (IR) About the private hospital, the results showed an average score of 3.24 for the CP; 2.83 for HR; 2.69 for IP; 2.71 for SW; 3.73 for EI; 2.56 for RT; 2.83 for IR at the hospital. Discussion: The analysis of organizational values of the studied hospitals shows that workers find the existence of hierarchical rigidity and the centralization of power in the institutions; believed there was cooperation at workplace, though they perceived individualism and competition; believed that values associated with the workers’ well-being, satisfaction and motivation were seldom acknowledged by the hospital; believed in the adoption of strategic planning actions within the institution, but considered interpersonal relationship promotion, continuous education and the rewarding of workers to be little valued by the institution. Conclusion: This work context can lead to professional dissatisfaction, compromising the quality of care and contributing to the occurrence of occupational diseases.Keywords: nursing management, organizational culture, quality of care, interpersonal relationships
Procedia PDF Downloads 440313 The Study on How Outward Direct Investment of Chinese MNEs to European Union Area Affect the Domestic Industrial Structure
Authors: Nana Weng
Abstract:
From 2008, Chinese Foreign Direct Investment flows to the European Union continued its rapid rise. Currently, the industrial structure adjustment in developing countries has also been placed on the international movement of factors of production. Now China economy is in an important period of transformation on industrial structure adjustment. Under the international transfer of industry background, the adjustment of industrial structure upgrading and sophistication are the key elements of a successful economic transformation. In order to achieve a virtuous cycle of foreign investment patterns and optimize the industrial structure of foreign direct investment as well, the research on the positive the role of the EU direct investment and how it impact China’s industrial structure optimization and upgrading is of great significance. In this paper, the author explained how the EU as an investment destination is different with the United States and ASEAN. Then, based on the theory of FDI and industrial structure and combining the four kinds of motives of China’s ODI in EU, this paper explained the impact mechanism which has influenced China domestic industrial structure primarily through the Transfer effect, Correlation effect and Competitive effect. On the premise that FDI activities do affect the home country’s domestic industrial structure, this paper made empirical analysis with industrial panel data. With the help of Gray Correlation Method and Limited Distributed Lags, this paper found that China/s ODI in the EU impacted the tertiary industry strongly and had a significant positive impact, particularly the manufacturing industry and the financial industry. This paper also pointed out that Chinese MNEs should realize several issues, such as pay more attention to high-tech industries so that they can make the best use of reverse technology spillover. When Chinese enterprises ‘go out,' they ought to keep in mind that domestic research and development capital contribution can make greater economic growth. Finally, based on theoretical and empirical analysis results, this paper presents the industry choice recommendations in the future of the EU direct investment, particularly through the development of the proper rational industrial policy and industrial development strategic to guide the industrial restructuring and upgrading.Keywords: china ODI in european union, industrial structure optimization, impact mechanism, empirical analysis
Procedia PDF Downloads 319312 Application of DSSAT-CSM Model for Estimating Rain-Water Productivity of Maize (Zea Mays L.) Under Changing Climate of Central Rift Valley, Ethiopia
Authors: Fitih Ademe, Kibebew Kibret, Sheleme Beyene, Mezgebu Getnet, Gashaw Meteke
Abstract:
Pressing demands for agricultural products and its associated pressure on water availability in the semi-arid areas demanded information for strategic decision-making in the changing climate conditions of Ethiopia. Availing such information through traditional agronomic research methods is not sufficient unless supported through the application of decision-support tools. The CERES (Crop Environmental Resource Synthesis) model in DSSAT-CSM was evaluated for estimating yield and water productivity of maize under two soil types (Andosol and Luvisol) of the Central Rift Valley of Ethiopia. A six-year data (2010 – 2017) obtained from national fertilizer determination experiments were used for model evaluation. Pertinent statistical indices were employed to evaluate model performance. Following model evaluation, yield and rain-water productivity of maize was assessed for the baseline (1981-2010) and future climate (2050’s and 2080’s) scenario. The model performed well in predicting phenology, growth, and yield of maize for the different seasons and phosphorous rates. A good agreement between simulated and observed grain yield was indicated by low values of the RMSE (0.15 - 0.37 Mg/ha) and other indices for the two soil types. The evaluated model predicted a decline in the potential (23.8 to 26.7% at Melkassa and from 21.7 to 26.1% at Ziway under RCP4.5 and RCP8.5 climate change scenarios, respectively) and water-limited yield (15 to 18.3% at Melkassa and by 6.5 to 10.5% at Ziway) in the mid-century due to climate change. Consequently, a decline in water productivity was projected in the future periods that necessitate availing options to improve water productivity in the region. In conclusion, the DSSAT-CERES-maize model can be used to simulate maize (Melkassa-2) phenology, growth and grain yield, as well as simulate water productivity under different management scenarios that can help to identify options to improve water productivity in the changing climate of the semi-arid central Rift valley of Ethiopia.Keywords: andosol, CERES-maize, luvisol, model evaluation, water productivity
Procedia PDF Downloads 75311 Factors Affecting Ethical Leadership and Employee Affective Organizational Commitment: An Empirical Study
Authors: Sharmin Shahid, Zaher Zain
Abstract:
The purpose of this study is to explore and examines the theoretical frameworks of ethical leadership style and affective organizational commitment. Additionally, to investigate the extent to which employee orientation and ethical guidance either strengthen or weaken on the relationship between ethical leadership style and affective commitment. The study will also measure the mediating effects of leader’s integrity either influence to inspire and revival employee’s affective commitment or not. The methodology of the study comprised sample of 237 managers, departmental heads, top-level executives, and professors of several financial institutions, banks, and universities in Bangladesh who are directly related with decision making process of respective organization. A cross sectional research design will be used to examine the direct, moderating, and mediating analysis among the research key variables. Data were gathered based on personal administered questionnaire. The findings of the study will be significance because it will provide the real scenario of leadership style which leads to financial and strategic success of any organizations. In addition, the results will be interesting enough to find out either ethical leadership style have positive relationship with affective commitment or not. Employee-orientation and ethical guidance is a moderator to improve leadership style and affective commitment, whereas, leader’s integrity mediates the relationships between leadership style and affective organizational commitment to do the right thing in the right way for the betterment of entire organizational success. Research limitations of the study are the data collected by self administered questionnaire, a method with well-known shortcomings. Second, the study concentrated on financial institutions, banks top executives, and universities professors in Bangladesh. An important implication of the research is that the interesting findings will give some insight to the leadership style and helps management to focus on their management and leadership efficacy, as that could improve their affective organizational commitment. The findings will be original and unique value adding with the existing literature on leadership studies. The study is based on a comprehensive literature review. The results will be based on a sample of financial institutions, banks, and universities in Bangladesh. The research findings are useful to academics and corporate leaders of financial institutions, banks, and universities all over the world.Keywords: affective organizational commitment, Bangladesh, ethical guidance, ethical leadership style
Procedia PDF Downloads 321310 Political Coercion from Within: Theoretical Convergence in the Strategies of Terrorist Groups, Insurgencies, and Social Movements
Authors: John Hardy
Abstract:
The early twenty-first century national security environment has been characterized by political coercion. Despite an abundance of political commentary on the various forms of non-state coercion leveraged against the state, there is a lack of literature which distinguishes between the mechanisms and the mediums of coercion. Frequently non-state movements seeking to coerce the state are labelled by their tactics, not their strategies. Terrorists, insurgencies and social movements are largely defined by the ways in which they seek to influence the state, rather than by their political aims. This study examines the strategies of coercion used by non-state actors against states. This approach includes terrorist groups, insurgencies, and social movements who seek to coerce state politics. Not all non-state actors seek political coercion, so not all examples of different group types are considered. This approach also excludes political coercion by states, focusing on the non-state actor as the primary unit of analysis. The study applies a general theory of political coercion, which is defined as attempts to change the policies or action of a polity against its will, to the strategies employed by terrorist groups, insurgencies, and social movements. This distinguishes non-state actors’ strategic objectives from their actions and motives, which are variables that are often used to differentiate between types of non-state actors and the labels commonly used to describe them. It also allows for a comparative analysis of theoretical perspectives from the disciplines of terrorism, insurgency and counterinsurgency, and social movements. The study finds that there is a significant degree of overlap in the way that different disciplines conceptualize the mechanism of political coercion by non-state actors. Studies of terrorism and counterterrorism focus more on the notions of cost tolerance and collective punishment, while studies of insurgency focus on a contest of legitimacy between actors, and social movement theory tend to link political objectives, social capital, and a mechanism of influence to leverage against the state. Each discipline has a particular vernacular for the mechanism of coercion, which is often linked to the means of coercion, but they converge on three core theoretical components of compelling a polity to change its policies or actions: exceeding resistance to change, using political or violent punishments, and withholding legitimacy or consent from a government.Keywords: counter terrorism, homeland security, insurgency, political coercion, social movement theory, terrorism
Procedia PDF Downloads 174309 Impacts of Urban Morphologies on Air Pollutants Dispersion in Porto's Urban Area
Authors: Sandra Rafael, Bruno Vicente, Vera Rodrigues, Carlos Borrego, Myriam Lopes
Abstract:
Air pollution is an environmental and social issue at different spatial scales, especially in a climate change context, with an expected decrease of air quality. Air pollution is a combination of high emissions and unfavourable weather conditions, where wind speed and wind direction play a key role. The urban design (location and structure of buildings and trees) can both promote the air pollutants dispersion as well as promote their retention within the urban area. Today, most of the urban areas are applying measures to adapt to future extreme climatic events. Most of these measures are grounded on nature-based solutions, namely green roofs and green areas. In this sense, studies are required to evaluate how the implementation of these actions will influence the wind flow within the urban area and, consequently, how this will influence air pollutants' dispersion. The main goal of this study was to evaluate the influence of a set of urban morphologies in the wind conditions and in the dispersion of air pollutants, in a built-up area in Portugal. For that, two pollutants were analysed (NOx and PM10) and four scenarios were developed: i) a baseline scenario, which characterizes the current status of the study area, ii) an urban green scenario, which implies the implementation of a green area inside the domain, iii) a green roof scenario, which consists in the implementation of green roofs in a specific area of the domain; iv) a 'grey' scenario, which consists in a scenario with absence of vegetation. For that, two models were used, namely the Weather Research and Forecasting model (WRF) and the CFD model VADIS (pollutant dispersion in the atmosphere under variable wind conditions). The WRF model was used to initialize the CFD model, while the last was used to perform the set of numerical simulations, on an hourly basis. The implementation of the green urban area promoted a reduction of air pollutants' concentrations, 16% on average, related to the increase in the wind flow, which promotes air pollutants dispersion; while the application of green roofs showed an increase of concentrations (reaching 60% during specific time periods). Overall the results showed that a strategic placement of vegetation in cities has the potential to make an important contribution to increase air pollutants dispersion and so promote the improvement of air quality and sustainability of urban environments.Keywords: air pollutants dispersion, wind conditions, urban morphologies, road traffic emissions
Procedia PDF Downloads 346308 Navigating through Organizational Change: TAM-Based Manual for Digital Skills and Safety Transitions
Authors: Margarida Porfírio Tomás, Paula Pereira, José Palma Oliveira
Abstract:
Robotic grasping is advancing rapidly, but transferring techniques from rigid to deformable objects remains a challenge. Deformable and flexible items, such as food containers, demand nuanced handling due to their changing shapes. Bridging this gap is crucial for applications in food processing, surgical robotics, and household assistance. AGILEHAND, a Horizon project, focuses on developing advanced technologies for sorting, handling, and packaging soft and deformable products autonomously. These technologies serve as strategic tools to enhance flexibility, agility, and reconfigurability within the production and logistics systems of European manufacturing companies. Key components include intelligent detection, self-adaptive handling, efficient sorting, and agile, rapid reconfiguration. The overarching goal is to optimize work environments and equipment, ensuring both efficiency and safety. As new technologies emerge in the food industry, there will be some implications, such as labour force, safety problems and acceptance of the new technologies. To overcome these implications, AGILEHAND emphasizes the integration of social sciences and humanities, for example, the application of the Technology Acceptance Model (TAM). The project aims to create a change management manual, that will outline strategies for developing digital skills and managing health and safety transitions. It will also provide best practices and models for organizational change. Additionally, AGILEHAND will design effective training programs to enhance employee skills and knowledge. This information will be obtained through a combination of case studies, structured interviews, questionnaires, and a comprehensive literature review. The project will explore how organizations adapt during periods of change and identify factors influencing employee motivation and job satisfaction. This project received funding from European Union’s Horizon 2020/Horizon Europe research and innovation program under grant agreement No101092043 (AGILEHAND).Keywords: change management, technology acceptance model, organizational change, health and safety
Procedia PDF Downloads 45307 The Role of Accounting and Auditing in Anti-Corruption Strategies: The Case of ECOWAS
Authors: Edna Gnomblerou
Abstract:
Given the current scale of corruption epidemic in West African economies, governments are seeking for immediate and effective measures to reduce the likelihood of the plague within the region. Generally, accountants and auditors are expected to help organizations in detecting illegal practices. However, their role in the fight against corruption is sometimes limited due to the collusive nature of corruption. The Denmark anti-corruption model shows that the implementation of additional controls over public accounts and independent efficient audits improve transparency and increase the probability of detection. This study is aimed at reviewing the existing anti-corruption policies of the Economic Commission of West African States (ECOWAS) as to observe the role attributed to accounting, auditing and other managerial practices in their anti-corruption drive. It further discusses the usefulness of accounting and auditing in helping anti-corruption commissions in controlling misconduct and increasing the perception to detect irregularities within public administration. The purpose of this initiative is to identify and assess the relevance of accounting and auditing in curbing corruption. To meet this purpose, the study was designed to answer the questions of whether accounting and auditing processes were included in the reviewed anti-corruption strategies, and if yes, whether they were effective in the detection process. A descriptive research method was adopted in examining the role of accounting and auditing in West African anti-corruption strategies. The analysis reveals that proper recognition of accounting standards and implementation of financial audits are viewed as strategic mechanisms in tackling corruption. Additionally, codes of conduct, whistle-blowing and information disclosure to the public are among the most common managerial practices used throughout anti-corruption policies to effectively and efficiently address the problem. These observations imply that sound anti-corruption strategies cannot ignore the values of including accounting and auditing processes. On one hand, this suggests that governments should employ all resources possible to improve accounting and auditing practices in the management of public sector organizations. On the other hand, governments must ensure that accounting and auditing practices are not limited to the private sector, but when properly implemented constitute crucial mechanisms to control and reduce corrupt incentives in public sector.Keywords: accounting, anti-corruption strategy, auditing, ECOWAS
Procedia PDF Downloads 255306 Cyber Warfare and Cyber Terrorism: An Analysis of Global Cooperation and Cyber Security Counter Measures
Authors: Mastoor Qubra
Abstract:
Cyber-attacks have frequently disrupted the critical infrastructures of the major global states and now, cyber threat has become one of the dire security risks for the states across the globe. Recently, ransomware cyber-attacks, wannacry and petya, have affected hundreds of thousands of computer servers and individuals’ private machines in more than hundred countries across Europe, Middle East, Asia, United States and Australia. Although, states are rapidly becoming aware of the destructive nature of this new security threat and counter measures are being taken but states’ isolated efforts would be inadequate to deal with this heinous security challenge, rather a global coordination and cooperation is inevitable in order to develop a credible cyber deterrence policy. Hence, the paper focuses that coordinated global approach is required to deter posed cyber threat. This paper intends to analyze the cyber security counter measures in four dimensions i.e. evaluation of prevalent strategies at bilateral level, initiatives and limitations for cooperation at global level, obstacles to combat cyber terrorism and finally, recommendations to deter the threat by applying tools of deterrence theory. Firstly, it focuses on states’ efforts to combat the cyber threat and in this regard, US-Australia Cyber Security Dialogue is comprehensively illustrated and investigated. Secondly, global partnerships and strategic and analytic role of multinational organizations, particularly United Nations (UN), to deal with the heinous threat, is critically analyzed and flaws are highlighted, for instance; less significance of cyber laws within international law as compared to other conflict prone issues. In addition to this, there are certain obstacles and limitations at national, regional and global level to implement the cyber terrorism counter strategies which are presented in the third section. Lastly, by underlining the gaps and grey areas in the current cyber security counter measures, it aims to apply tools of deterrence theory, i.e. defense, attribution and retaliation, in the cyber realm to contribute towards formulating a credible cyber deterrence strategy at global level. Thus, this study is significant in understanding and determining the inevitable necessity of counter cyber terrorism strategies.Keywords: attribution, critical infrastructure, cyber terrorism, global cooperation
Procedia PDF Downloads 269305 Making a Difference in a Crisis: How the 24-Hour Surgical Ambulatory Assessment Unit Transformed Emergency Care during COVID-19
Authors: Bindhiya Thomas, Rehana Hafeez
Abstract:
Background: The Surgical Ambulatory Unit (SAU) also known as the Same Day Emergency Care (SDEC) is an established part of many hospitals providing same day emergency care service to surgical patients who would have otherwise required admission through the A&E. Prior to Covid, the SAU was functioning as a 12-hour service, but during the Covid crisis this service was transformed to a 24 hour functioning Surgical Ambulatory Assessment unit (SAAU). We studied the effects that this change brought about in-patient care in our hospital. Objective: The objective of the study was to assess the impact of a 24-hour Surgical Ambulatory Assessment unit on patient care during the time of Covid, in particular its role in freeing A&E capacity and delivering effective patient care. Methods: We collected two sets of data retrospectively. The first set was collected over a 6-week period when the SAU was functioning at the Princess Royal University Hospital. On March 23rd, 2020, the SAU was transformed into a 24-hour SAAU. Following this transformation, a second set of patient data was collected over a period of 6 weeks. A comparison was made between data collected from when the hospital had a 12-hour Surgical Ambulatory unit and later when it was transformed into a 24-hour facility. Its effects on the change in the number of patients breaching the four hour waiting period and the number of emergency surgical admissions. Results: The 24-hour Surgical Ambulatory Assessment unit brought significant reductions in the number of patients breaching the waiting period of 4 hours in A&E from 44% during the period of the 12-hour Surgical Ambulatory care facility to 0% from when the 24-hour Surgical Ambulatory Assessment Unit was established. A 28% reduction was also seen in the number of surgical patients' admissions from A&E. Conclusions: The 24-hour SAAU was found to have a profound positive impact on emergency care of surgical patients. Especially during the Covid crisis, it played a crucial role in providing not only effective and accessible patient care but also in reducing the A&E workload and admissions. It thus proved to be a strategic tool that helped to deal with the immense workload in emergency care during the Covid crisis and helped free much needed headspace at a time of uncertainty for the A&E to better configure their services. If sustained, the 24-hour SAAU could be relied on to augment the NHS emergency services in the future, especially in the event of another crisis.Keywords: Princess Royal University Hospital, surgical ambulatory assessment unit, surgical ambulatory unit, same day emergency care
Procedia PDF Downloads 164304 The Boy Who Cried Wolf-North Korea Nuclear Test and Its Implication to the Regional Stability
Authors: Mark Wenyi Lai
Abstract:
The very lethal weapon of nuclear warhead had threatened the survival of the world for half of the 20th century. When most of the countries have already denounced and stopped the development, one country is eager to produce and use them. Since 2006, Pyongyang has launched six times of nuclear tests. The most recent one in September 2017 signaled North Korea’s military capability to project the mass destruction through ICBM (Intercontinental Ballistic Missile) over Seoul, Tokyo, Guam, Hawaii, Alaska or probably the West Coast of the United States with the explosive energy ten times of the atom bombing of Hiroshima in 1945. This research paper adopted time-series content analysis focusing on the related countries responses to North Korea’s tests in 2006, 2009, 2013, and 2016. The preliminary hypotheses are first, North Korea determined to protect the regime by having triad nuclear capability. Negotiations are mere means to this end. Second, South Korea is paralyzed by its ineffective domestic politics and unable to develop its independent strategy toward the North. Third, Japan was using the external threat to campaign for its rearmament plan and brought instability in foreign relations. Fourth, China found herself in the strange position of defending the loyal buffer state meanwhile witnessing the fourth and dangerous neighboring country gaining the card into nuclear club. Fifth, the United States had admitted that North Korea’s going nuclear is unstoppable. Therefore, to keep the regional stability in the East Asia, the US relied on the new balance of power formed by everyone versus Pyongyang. But, countries in East Asia actually have problems getting along with each other. Sixth, Russia distanced herself from the North Kore row but benefitted by advancing its strategic importance in the Far East. Tracing back the history of nuclear states, this research paper concluded that North Korea will head on becoming a more confident country. The regional stability will restore once related countries deal with the new fact and treat Pyongyang regime with a new strategy. The gradual opening and economic reform are on the way for the North Korea in the near future.Keywords: nuclear test, North Korea, six party talk, US foreign policy
Procedia PDF Downloads 280303 [Keynote Speech]: Risk Management during the Rendition Process: Use of Screen-Voice Recordings in Translator Training
Authors: Maggie Hui
Abstract:
Risk management is not a new concept; however, it is an uncharted area as applied to the translation process and translator training. Serving as one of the self-discovery activities in their practicum course, a two-cycle experiment was carried out with a class of 13 MA translation students with an attempt to explore their risk management while translating in a simulated setting that involves translator-client relations. To test the effects of the main variable of translators’ interaction with the simulated clients, the researcher employed control-group translators and two experiment groups (with Group A being the translator in Cycle 1 and the client in Cycle 2, and Group B on the client position in Cycle 1 and the translator position in Cycle 2). Experiment cycle 1 aims to explore if there would be any behavioral difference in risk management between translators with interaction with the simulated clients, i.e. experiment group A, and their counterparts without such interaction, i.e. control group. Design of Cycle 2 concerns the order of playing different roles of the translator and client in the experiment, and provides information to compare behavior of translators of the two experiment groups. Since this is process-oriented research, it is necessary to hypothesize what was happening in the translators’ minds. The researcher made use of a user-friendly screen-voice recording freeware to record subjects’ screen activities, including every word the translator typed and every change they made to the rendition, the websites they browsed and the reference tools they used, in addition to the verbalization of their thoughts throughout the process. The research observes the translation procedures subjects considered and finally adopted, and looks into the justifications for their procedures, in order to interpret their risk management. The qualitative and quantitative results of this study have some implications for translator training: (a) the experience of being a client seems to reinforce the translator’s risk aversion; (b) the use of role-playing simulation can empower students’ learning by enhancing their attitudinal or psycho-physiological competence, interpersonal competence and strategic competence; and (c) the screen-voice recordings serve as a helpful tool for learners to reflect on their rendition processes, i.e. what they performed satisfactorily and unsatisfactorily while translating and what they could do for improvement in future translation tasks.Keywords: risk management, screen-voice recordings, simulated translator-client relations, translation pedagogy, translation process-oriented research
Procedia PDF Downloads 263302 Gender Perspective in Peace Operations: An Analysis of 14 UN Peace Operations
Authors: Maressa Aires de Proenca
Abstract:
The inclusion of a gender perspective in peace operations is based on a series of conventions, treaties, and resolutions designed to protect and include women addressing gender mainstreaming. The UN Security Council recognizes that women's participation and gender equality within peace operations are indispensable for achieving sustainable development and peace. However, the participation of women in the field of peace and security is still embryonic. There are gaps when we think about female participation in conflict resolution and peace promotion spaces, and it does not seem clear how women are present in these spaces. This absence may correspond to silence about representation and the guarantee of the female perspective within the context of peace promotion. Thus, the present research aimed to describe the panorama of the participation of women who are currently active in the 14 active UN peace operations, which are: 1) MINUJUSTH, Haiti, 2) MINURSO, Western Sahara, 3) MINUSCA, Central African Republic, 4) MINUSMA, Mali, 5) MONUSCO, the Democratic Republic of the Congo, 6) UNAMID, Darfur, 7) UNDOF, Golan, 8) UNFICYP, Cyprus, 9) UNIFIL, Lebanon, 10) UNISFA, Abyei, 11) UNMIK, Kosovo, 12) UNMISS, South Sudan, 13) UNMOGIP, India, and Pakistan, and 14) UNTSO, Middle East. A database was constructed that reported: (1) position held by the woman in the peace operation, (2) her profession, (3) educational level, (4) marital status, (5) religion, (6) nationality, (8) number of years working with peace operations, (9) whether the operation in which it operates has provided training on gender issues. For the construction of this database, official reports and statistics accessed through the UN Peacekeeping Resource Hub were used; The United Nations Statistical Commission, Peacekeeping Master Open Datasets, The Armed Conflict Database (ACD), The International Institute for Strategic Studies (IISS) database; Armed Conflict Location & Event Data Project (ACLED) database; from the Evidence and Data for Gender Equality (EDGE) database. In addition to access to databases, peacekeeping operations will be contacted directly, and data requested individually. The database showed that the presence of women in these peace operations is still incipient, but growing. There are few women in command positions, and most of them occupy administrative or human-care positions.Keywords: women, peace and security, peacekeeping operations, peace studies
Procedia PDF Downloads 136301 Implementation of Efficiency and Energy Conservation Concept in Office Building as an Effort to Achieve Green Office Building Case Studies Office Building in Jakarta
Authors: Jarwa Prasetya Sih Handoko
Abstract:
The issue of energy crisis for big cities in Indonesia are issues raised in line with the development of the city is rapidly increasing. Various attempts were made by the government in overcoming problems of energy needs in Indonesia. In addition to the efforts of the government required the efforts made by the public to solve this problem. The concept of green building in the design of the building with efforts to use energy efficiently can be one of the efforts that can be applied to solve this problem. Jakarta is capital and the one of the major cities in Indonesia with high economic growth. This leads to increased demand for office space for the people. So that the construction of office buildings in big cities like Jakarta very numerous. Office building is one of the buildings that require large energy consumption. As a building that could potentially require huge amounts of energy, the design should consider the use of energy to help provide solutions to problems of energy crisis in Indonesia. The concept of energy efficient is one of the concepts addressed in an effort to use energy in buildings to save energy needs of the building operations. Therefore, it is necessary to have a study that explores the application of the concept of energy efficiency and conservation in office buildings in Jakarta. In this study using two (2) buildings case study that Sequis Center Building and Sampoerna Strategic Square. Both are office buildings in Jakarta have earned the Green Building Certificate of Green Building Council Indonesia (GBCI). The study used literature review methods to address issues raised earlier. Whether it's related to a literature review on the study of office buildings and green building. With this paper is expected to be obtained on the application of the concept of energy efficiency and conservation in office buildings that have earned recognition as a green building by GBCI. The result could be a reference to the architect in designing the next office buildings, especially related to the concept of energy use in buildings. From this study, it can be concluded that the concept of energy efficiency and conservation in the design of office buildings can be applied to its orientation, the openings, the use shade in buildings, vegetation and building material selection and efficient use of water. So that it can reduce energy requirements needed to meet the needs of the building user activity. So the concept of energy efficiency and conservation in office buildings can be one of the efforts to realize the Green Office Building. Recommendations from this study is that the design of office buildings should be able to apply the concept of energy utilization in the design office. This is to meet the energy needs of the office buildings in an effort to realize the Green Building.Keywords: energy crisis, energy efficiency, energy conservation, green building, office building
Procedia PDF Downloads 305300 Crime Victim Support Services in Bangladesh: An Analysis
Authors: Mohammad Shahjahan, Md. Monoarul Haque
Abstract:
In the research work information and data were collected from both types of sources, direct and indirect. Numerological, qualitative and participatory analysis methods have been followed. There were two principal sources of collecting information and data. Firstly, the data provided by the service recipients (300 nos. of women and children victims) in the Victim Support Centre and service providing policemen, executives and staffs (60 nos.). Secondly, data collected from Specialists, Criminologists and Sociologists involved in victim support services through Consultative Interview, KII, Case Study and FGD etc. The initial data collection has been completed with the help of questionnaires as per strategic variations and with the help of guidelines. It is to be noted that the main objective of this research was to determine whether services provided to the victims for their facilities, treatment/medication and rehabilitation by different government/non-government organizations was veritable at all. At the same time socio-economic background and demographic characteristics of the victims have also been revealed through this research. The results of the study show that although the number of victims has increased gradually due to socio-economic, political and cultural realities in Bangladesh, the number of victim support centers has not increased as expected. Awareness among the victims about the effectiveness of the 8 centers working in this regard is also not up to the mark. Two thirds of the victims coming to get service were not cognizant regarding the victim support services at all before getting the service. Most of those who have finally been able to come under the services of the Victim Support Center through various means, have received sheltering (15.5%), medical services (13.32%), counseling services (13.10%) and legal aid (12.66%). The opportunity to stay in security custody and psycho-physical services were also notable. Usually, women and children from relatively poor and marginalized families of the society come to victim support center for getting services. Among the women, young unmarried women are the biggest victims of crime. Again, women and children employed as domestic workers are more affected. A number of serious negative impacts fall on the lives of the victims. Being deprived of employment opportunities (26.62%), suffering from psycho-somatic disorder (20.27%), carrying sexually transmitted diseases (13.92%) are among them. It seems apparent to urgently enact distinct legislation, increase the number of Victim Support Centers, expand the area and purview of services and take initiative to increase public awareness and to create mass movement.Keywords: crime, victim, support, Bangladesh
Procedia PDF Downloads 89299 Adaptive Approach Towards Comprehensive Urban Development Simulation in Coastal Regions: Case Study of New Alamein City, Egypt
Authors: Nada Mohamed, Abdel Aziz Mohamed
Abstract:
Climate change in coastal areas is a global issue that can be felt on local scale and will be around for decades and centuries to come to an end; it also has critical risks on the city’s economy, communities, and the natural environment. One of these changes that cause a huge risk on coastal cities is the sea level rise (SLR). SLR is a result of scarcity and reduction in global environmental system. The main cause of climate change and global warming is the countries with high development index (HDI) as Japan and Germany while the medium and low HDI countries as Egypt does not have enough awareness and advanced tactics to adapt with this changes that destroy urban areas and cause loss in land and economy. This is why Climate Resilience is one of the UN sustainable development goals 2030, which is calling for actions to strengthen climate change resilience through mitigation and adaptation. For many reasons, adaptation has received less attention than mitigation and it is only recently that adaptation has become a focal global point of attention. This adaption can be achieved through some actions such as upgrading the use and the design of the land, adjusting business and activities of people, and increasing community understanding of climate risks. To reach the adaption goals, and we have to apply a strategic pathway to Climate Resilience, which is the Urban Bioregionalism Paradigm. Resiliency has been framed as persistence, adaptation, and transformation. Climate Resilience decision support system includes a visualization platform where ecological, social, and economic information can be viewed alongside with specific geographies that's why Urban Bioregionalism is a socio-ecological system which is defined as a paradigm that has potential to help move social attitudes toward environmental understanding and deepen human-environment connections within ecological development. The research aim is to achieve an adaptive integrated urban development model throughout the analyses of tactics and strategies that can be used to adapt urban areas and coastal communities to the challenges of climate changes especially SLR and also simulation model using advanced technological software for a coastal city corridor to elaborates the suitable strategy to apply.Keywords: climate resilience, sea level rise, SLR, coastal resilience, adaptive development simulation
Procedia PDF Downloads 139298 The Flood Disaster Management of Communities in Ubon Ratchathani Province, Thailand
Authors: Eakarat Boonreang, Anothai Harasarn
Abstract:
The objectives of this study are to investigate the flood disaster management capacity of communities in Ubon Ratchathani province, Thailand, and to recommend the sustainable flood management approaches of communities in Ubon Ratchathani province, Thailand. The selected population consisted of the community leaders and committees, the executives of local administrative organizations, and the head of Ubon Ratchathani provincial office of disaster prevention and mitigation. The data was collected by in-depth interview, focus group, and observation. The data was analyzed and classified in order to determine the communities’ capacity in flood disaster management. The results revealed that communities’ capacity were as follows, before flood disaster, the community leaders held a meeting with the community committees in order to plan disaster response and determined evacuation routes, and the villagers moved their belongings to higher places and prepared vehicles for evacuation. During flood disaster, the communities arranged motorboats for transportation and villagers evacuated to a temporary evacuation center. Moreover, the communities asked for survival bags, motorboats, emergency toilets, and drinking water from the local administrative organizations and the 22nd Military Circle. After flood disaster, the villagers cleaned and fixed their houses and also collaborated in cleaning the temple, school, and other places in the community. The recommendation approaches for sustainable flood disaster management consisted of structural measures, such as the establishment of reservoirs and building higher houses, and non-structural measures such as raising awareness and fostering self-reliance, establishing disaster management plans, rehearsal of disaster response procedures every year, and transferring disaster knowledge among younger generations. Moreover, local administrative organizations should formulate strategic plans that focus on disaster management capacity building at the community level, particularly regarding non-structural measures. Ubon Ratchathani provincial offices of disaster prevention and mitigation should continually monitor and evaluate the outcomes of community based disaster risk management program, including allocating more flood disaster management-related resources among local administrative organizations and communities.Keywords: capacity building, community based disaster risk management, flood disaster management, Thailand
Procedia PDF Downloads 167297 Application of Electrical Resistivity Surveys on Constraining Causes of Highway Pavement Failure along Ajaokuta-Anyigba Road, North Central Nigeria
Authors: Moroof, O. Oloruntola, Sunday Oladele, Daniel, O. Obasaju, Victor, O Ojekunle, Olateju, O. Bayewu, Ganiyu, O. Mosuro
Abstract:
Integrated geophysical methods involving Vertical Electrical Sounding (VES) and 2D resistivity survey were deployed to gain an insight into the influence of the two varying rock types (mica-schist and granite gneiss) underlying the road alignment to the incessant highway failure along Ajaokuta-Anyigba, North-central Nigeria. The highway serves as a link-road for the single largest cement factory in Africa (Dangote Cement Factory) and two major ceramic industries to the capital (Abuja) via Lokoja. 2D Electrical Resistivity survey (Dipole-Dipole Array) and Vertical Electrical Sounding (VES) (Schlumberger array) were employed. Twenty-two (22) 2D profiles were occupied, twenty (20) conducted about 1 m away from the unstable section underlain by mica-schist with profile length each of approximately 100 m. Two (2) profiles were conducted about 1 m away from the stable section with a profile length of 100 m each due to barriers caused by the drainage system and outcropping granite gneiss at the flanks of the road. A spacing of 2 m was used for good image resolution of the near-surface. On each 2D profile, a range of 1-3 VES was conducted; thus, forty-eight (48) soundings were acquired. Partial curve matching and WinResist software were used to obtain the apparent and true resistivity values of the 1D survey, while DiprofWin software was used for processing the 2-D survey. Two exposed lithologic sections caused by abandoned river channels adjacent to two profiles as well as the knowledge of the geology of the area helped to constrain the VES and 2D processing and interpretation. Generally, the resistivity values obtained reflect the parent rock type, degree of weathering, moisture content and competency of the tested area. Resistivity values < 100; 100 – 950; 1000 – 2000 and > 2500 ohms-m were interpreted as clay, weathered layer, partly weathered layer and fresh basement respectively. The VES results and 2-D resistivity structures along the unstable segment showed similar lithologic characteristics and sequences dominated by clayey substratum for depths range of 0 – 42.2 m. The clayey substratum is a product of intensive weathering of the parent rock (mica-schist) and constitutes weak foundation soils, causing highway failure. This failure is further exacerbated by several heavy-duty trucks which ply the section round the clock due to proximity to two major ceramic industries in the state and lack of drainage system. The two profiles on the stable section show 2D structures that are remarkably different from those of the unstable section with very thin topsoils, higher resistivity weathered substratum (indicating the presence of coarse fragments from the parent rock) and shallow depth to the basement (1.0 – 7. 1 m). Also, the presence of drainage and lower volume of heavy-duty trucks are contributors to the pavement stability of this section of the highway. The resistivity surveys effectively delineated two contrasting soil profiles of the subbase/subgrade that reflect variation in the mineralogy of underlying parent rocks.Keywords: clay, geophysical methods, pavement, resistivity
Procedia PDF Downloads 167296 The Road Ahead: Merging Human Cyber Security Expertise with Generative AI
Authors: Brennan Lodge
Abstract:
Amidst a complex regulatory landscape, Retrieval Augmented Generation (RAG) emerges as a transformative tool for Governance Risk and Compliance (GRC) officers. This paper details the application of RAG in synthesizing Large Language Models (LLMs) with external knowledge bases, offering GRC professionals an advanced means to adapt to rapid changes in compliance requirements. While the development for standalone LLM’s (Large Language Models) is exciting, such models do have their downsides. LLM’s cannot easily expand or revise their memory, and they can’t straightforwardly provide insight into their predictions, and may produce “hallucinations.” Leveraging a pre-trained seq2seq transformer and a dense vector index of domain-specific data, this approach integrates real-time data retrieval into the generative process, enabling gap analysis and the dynamic generation of compliance and risk management content. We delve into the mechanics of RAG, focusing on its dual structure that pairs parametric knowledge contained within the transformer model with non-parametric data extracted from an updatable corpus. This hybrid model enhances decision-making through context-rich insights, drawing from the most current and relevant information, thereby enabling GRC officers to maintain a proactive compliance stance. Our methodology aligns with the latest advances in neural network fine-tuning, providing a granular, token-level application of retrieved information to inform and generate compliance narratives. By employing RAG, we exhibit a scalable solution that can adapt to novel regulatory challenges and cybersecurity threats, offering GRC officers a robust, predictive tool that augments their expertise. The granular application of RAG’s dual structure not only improves compliance and risk management protocols but also informs the development of compliance narratives with pinpoint accuracy. It underscores AI’s emerging role in strategic risk mitigation and proactive policy formation, positioning GRC officers to anticipate and navigate the complexities of regulatory evolution confidently.Keywords: cybersecurity, gen AI, retrieval augmented generation, cybersecurity defense strategies
Procedia PDF Downloads 95295 Simulated Translator-Client Relations in Translator Training: Translator Behavior around Risk Management
Authors: Maggie Hui
Abstract:
Risk management is not a new concept; however, it is an uncharted area as applied to the translation process and translator training. Risk managers are responsible for managing risk, i.e. adopting strategies with the intention to minimize loss and maximize gains in spite of uncertainty. Which risk strategy to use often depends on the frequency of an event (i.e. probability) and the severity of its outcomes (i.e. impact). This is basically the way translation/localization project managers handle risk management. Although risk management could involve both positive and negative impacts, impact seems to be always negative in professional translators’ management models, e.g. how many days of project time are lost or how many clients are lost. However, for analysis of translation performance, the impact should be possibly positive (e.g. increased readability of the translation) or negative (e.g. loss of source-text information). In other words, the straight business model of risk management is not directly applicable to the study of risk management in the rendition process. This research aims to explore trainee translators’ risk managing while translating in a simulated setting that involves translator-client relations. A two-cycle experiment involving two roles, the translator and the simulated client, was carried out with a class of translation students to test the effects of the main variable of peer-group interaction. The researcher made use of a user-friendly screen-voice recording freeware to record subjects’ screen activities, including every word the translator typed and every change they made to the rendition, the websites they browsed and the reference tools they used, in addition to the verbalization of their thoughts throughout the process. The research observes the translation procedures subjects considered and finally adopted, and looks into the justifications for their procedures, in order to interpret their risk management. The qualitative and quantitative results of this study have some implications for translator training: (a) the experience of being a client seems to reinforce the translator’s risk aversion; (b) there is a wide gap between the translator’s internal risk management and their external presentation of risk; and (c) the use of role-playing simulation can empower students’ learning by enhancing their attitudinal or psycho-physiological competence, interpersonal competence and strategic competence.Keywords: risk management, role-playing simulation, translation pedagogy, translator-client relations
Procedia PDF Downloads 261294 Understanding Complexity at Pre-Construction Stage in Project Planning of Construction Projects
Authors: Mehran Barani Shikhrobat, Roger Flanagan
Abstract:
The construction planning and scheduling based on using the current tools and techniques is resulted deterministic in nature (Gantt chart, CPM) or applying a very little probability of completion (PERT) for each task. However, every project embodies assumptions and influences and should start with a complete set of clearly defined goals and constraints that remain constant throughout the duration of the project. Construction planners continue to apply the traditional methods and tools of “hard” project management that were developed for “ideal projects,” neglecting the potential influence of complexity on the design and construction process. The aim of this research is to investigate the emergence and growth of complexity in project planning and to provide a model to consider the influence of complexity on the total project duration at the post-contract award pre-construction stage of a project. The literature review showed that complexity originates from different sources of environment, technical, and workflow interactions. They can be divided into two categories of complexity factors, first, project tasks, and second, project organisation management. Project tasks may originate from performance, lack of resources, or environmental changes for a specific task. Complexity factors that relate to organisation and management refer to workflow and interdependence of different parts. The literature review highlighted the ineffectiveness of traditional tools and techniques in planning for complexity. However, this research focus on understanding the fundamental causes of the complexity of construction projects were investigated through a questionnaire with industry experts. The results were used to develop a model that considers the core complexity factors and their interactions. System dynamics were used to investigate the model to consider the influence of complexity on project planning. Feedback from experts revealed 20 major complexity factors that impact project planning. The factors are divided into five categories known as core complexity factors. To understand the weight of each factor in comparison, the Analytical Hierarchy Process (AHP) analysis method is used. The comparison showed that externalities are ranked as the biggest influence across the complexity factors. The research underlines that there are many internal and external factors that impact project activities and the project overall. This research shows the importance of considering the influence of complexity on the project master plan undertaken at the post-contract award pre-construction phase of a project.Keywords: project planning, project complexity measurement, planning uncertainty management, project risk management, strategic project scheduling
Procedia PDF Downloads 138293 Molecular Farming: Plants Producing Vaccine and Diagnostic Reagent
Authors: Katerina H. Takova, Ivan N. Minkov, Gergana G. Zahmanova
Abstract:
Molecular farming is the production of recombinant proteins in plants with the aim to use the protein as a purified product, crude extract or directly in the planta. Plants gain more attention as expression systems compared to other ones due to the cost effective production of pharmaceutically important proteins, appropriate post-translational modifications, assembly of complex proteins, absence of human pathogens to name a few. In addition, transient expression in plant leaves enables production of recombinant proteins within few weeks. Hepatitis E virus (HEV) is a causative agent of acute hepatitis. HEV causes epidemics in developing countries and is primarily transmitted through the fecal-oral route. Presently, all efforts for development of Hepatitis E vaccine are focused on the Open Read Frame 2 (ORF2) capsid protein as it contains epitopes that can induce neutralizing antibodies. For our purpose, we used the CMPV-based vector-pEAQ-HT for transient expression of HEV ORF2 in Nicotiana benthamina. Different molecular analysis (Western blot and ELISA) showed that HEV ORF2 capsid protein was expressed in plant tissue in high-yield up to 1g/kg of fresh leaf tissue. Electron microscopy showed that the capsid protein spontaneously assembled in low abundance virus-like particles (VLPs), which are highly immunogenic structures and suitable for vaccine development. The expressed protein was recognized by both human and swine HEV positive sera and can be used as a diagnostic reagent for the detection of HEV infection. Production of HEV capsid protein in plants is a promising technology for further HEV vaccine investigations. Here, we reported for a rapid high-yield transient expression of a recombinant protein in plants suitable for vaccine production as well as a diagnostic reagent. Acknowledgments -The authors’ research on HEV is supported with grants from the Project PlantaSYST under the Widening Program, H2020 as well as under the UK Biotechnological and Biological Sciences Research Council (BBSRC) Institute Strategic Programme Grant ‘Understanding and Exploiting Plant and Microbial Secondary Metabolism’ (BB/J004596/1). The authors want to thank Prof. George Lomonossoff (JIC, Norwich, UK) for his contribution.Keywords: hepatitis E virus, plant molecular farming, transient expression, vaccines
Procedia PDF Downloads 151292 Implementation of Chlorine Monitoring and Supply System for Drinking Water Tanks
Authors: Ugur Fidan, Naim Karasekreter
Abstract:
Healthy and clean water should not contain disease-causing micro-organisms and toxic chemicals and must contain the necessary minerals in a balanced manner. Today, water resources have a limited and strategic importance, necessitating the management of water reserves. Water tanks meet the water needs of people and should be regularly chlorinated to prevent waterborne diseases. For this purpose, automatic chlorination systems placed in water tanks for killing bacteria. However, the regular operation of automatic chlorination systems depends on refilling the chlorine tank when it is empty. For this reason, there is a need for a stock control system, in which chlorine levels are regularly monitored and supplied. It has become imperative to take urgent measures against epidemics caused by the fact that most of our country is not aware of the end of chlorine. The aim of this work is to rehabilitate existing water tanks and to provide a method for a modern water storage system in which chlorination is digitally monitored by turning the newly established water tanks into a closed system. A sensor network structure using GSM/GPRS communication infrastructure has been developed in the study. The system consists of two basic units: hardware and software. The hardware includes a chlorine level sensor, an RFID interlock system for authorized personnel entry into water tank, a motion sensor for animals and other elements, and a camera system to ensure process safety. It transmits the data from the hardware sensors to the host server software via the TCP/IP protocol. The main server software processes the incoming data through the security algorithm and informs the relevant unit responsible (Security forces, Chlorine supply unit, Public health, Local Administrator) by e-mail and SMS. Since the software is developed base on the web, authorized personnel are also able to monitor drinking water tank and report data on the internet. When the findings and user feedback obtained as a result of the study are evaluated, it is shown that closed drinking water tanks are built with GRP type material, and continuous monitoring in digital environment is vital for sustainable health water supply for people.Keywords: wireless sensor networks (WSN), monitoring, chlorine, water tank, security
Procedia PDF Downloads 160291 Reverse Logistics Network Optimization for E-Commerce
Authors: Albert W. K. Tan
Abstract:
This research consolidates a comprehensive array of publications from peer-reviewed journals, case studies, and seminar reports focused on reverse logistics and network design. By synthesizing this secondary knowledge, our objective is to identify and articulate key decision factors crucial to reverse logistics network design for e-commerce. Through this exploration, we aim to present a refined mathematical model that offers valuable insights for companies seeking to optimize their reverse logistics operations. The primary goal of this research endeavor is to develop a comprehensive framework tailored to advising organizations and companies on crafting effective networks for their reverse logistics operations, thereby facilitating the achievement of their organizational goals. This involves a thorough examination of various network configurations, weighing their advantages and disadvantages to ensure alignment with specific business objectives. The key objectives of this research include: (i) Identifying pivotal factors pertinent to network design decisions within the realm of reverse logistics across diverse supply chains. (ii) Formulating a structured framework designed to offer informed recommendations for sound network design decisions applicable to relevant industries and scenarios. (iii) Propose a mathematical model to optimize its reverse logistics network. A conceptual framework for designing a reverse logistics network has been developed through a combination of insights from the literature review and information gathered from company websites. This framework encompasses four key stages in the selection of reverse logistics operations modes: (1) Collection, (2) Sorting and testing, (3) Processing, and (4) Storage. Key factors to consider in reverse logistics network design: I) Centralized vs. decentralized processing: Centralized processing, a long-standing practice in reverse logistics, has recently gained greater attention from manufacturing companies. In this system, all products within the reverse logistics pipeline are brought to a central facility for sorting, processing, and subsequent shipment to their next destinations. Centralization offers the advantage of efficiently managing the reverse logistics flow, potentially leading to increased revenues from returned items. Moreover, it aids in determining the most appropriate reverse channel for handling returns. On the contrary, a decentralized system is more suitable when products are returned directly from consumers to retailers. In this scenario, individual sales outlets serve as gatekeepers for processing returns. Considerations encompass the product lifecycle, product value and cost, return volume, and the geographic distribution of returns. II) In-house vs. third-party logistics providers: The decision between insourcing and outsourcing in reverse logistics network design is pivotal. In insourcing, a company handles the entire reverse logistics process, including material reuse. In contrast, outsourcing involves third-party providers taking on various aspects of reverse logistics. Companies may choose outsourcing due to resource constraints or lack of expertise, with the extent of outsourcing varying based on factors such as personnel skills and cost considerations. Based on the conceptual framework, the authors have constructed a mathematical model that optimizes reverse logistics network design decisions. The model will consider key factors identified in the framework, such as transportation costs, facility capacities, and lead times. The authors have employed mixed LP to find the optimal solutions that minimize costs while meeting organizational objectives.Keywords: reverse logistics, supply chain management, optimization, e-commerce
Procedia PDF Downloads 38290 Ethics and Military Defections in Nonviolent Resistance Campaigns
Authors: Adi Levy
Abstract:
Military and security personnel defections during nonviolent resistance (NVR) campaigns are recognized as an effective way of undermining the regime’s power, but they also may generate moral dilemmas that contradict the moral standing of NVR tactics. NVR campaigns have been primarily praised for their adherence to moral and legal norms, yet some of NVR tactics raise serious ethical concerns. This paper focuses on NVR tactics that seek to promote defections and disobedience within military and security personnel to sustain their campaign. Academic literature regarding NVR tactics indicates that compared to violent forms of resistance, defections are more likely to occur when security forces confront nonviolent activists. Indeed, defections play a strategically fundamental role in nonviolent campaigns, particularly against authoritarian regimes, as it enables activists to undermine the regime’s central pillars of support. This study examines the events of the Arab Spring and discusses the ethical problems that arise in nonviolent activists’ promotion of defections and disobedience. The cases of Syria and Egypt suggest that the strategic promotion of defections and disobedience was significantly effective in sustaining the campaign. Yet, while such defections enhance nonviolent activists’ resilience, how they are promoted can be morally contentious and the consequences can be dire. Defections are encouraged by social, moral and emotional appeals that use the power disparities between unarmed civilians and powerful regimes to affect soldiers and security personnel’s process of decision-making. In what is commonly referred to as dilemma action, nonviolent activists deliberately entangle security forces in a moral dilemma that compels them to follow a moral code to protect unarmed civilians. In this way, activists sustain their struggle and even gain protection. Nonviolent activists are likely to be completely defeated when confronted with armed forces. Therefore they rely on the military and security personnel’s moral conscious of convincing them to refrain from using force against them. While this is effective, it also leaves soldiers and security forces exposed to the implications and punishments that might follow their disobedience or defection. As long as they remain nonviolent, activists enjoy civilian immunity despite using morally contentious tactics. But the severe implications brought upon defectors. As a result, demand a deep examination of this tactic’s moral permissibility and a discussion that assesses culpability for the moral implications of its application.Keywords: culpability, defections, nonviolence, permissibility
Procedia PDF Downloads 117289 Screening and Improved Production of an Extracellular β-Fructofuranosidase from Bacillus Sp
Authors: Lynette Lincoln, Sunil S. More
Abstract:
With the rising demand of sugar used today, it is proposed that world sugar is expected to escalate up to 203 million tonnes by 2021. Hydrolysis of sucrose (table sugar) into glucose and fructose equimolar mixture is catalyzed by β-D-fructofuranoside fructohydrolase (EC 3.2.1.26), commonly called as invertase. For fluid filled center in chocolates, preparation of artificial honey, as a sweetener and especially to ensure that food stuffs remain fresh, moist and soft for longer spans invertase is applied widely and is extensively being used. From an industrial perspective, properties such as increased solubility, osmotic pressure and prevention of crystallization of sugar in food products are highly desired. Screening for invertase does not involve plate assay/qualitative test to determine the enzyme production. In this study, we use a three-step screening strategy for identification of a novel bacterial isolate from soil which is positive for invertase production. The primary step was serial dilution of soil collected from sugarcane fields (black soil, Maddur region of Mandya district, Karnataka, India) was grown on a Czapek-Dox medium (pH 5.0) containing sucrose as the sole C-source. Only colonies with the capability to utilize/breakdown sucrose exhibited growth. Bacterial isolates released invertase in order to take up sucrose, splitting the disaccharide into simple sugars. Secondly, invertase activity was determined from cell free extract by measuring the glucose released in the medium at 540 nm. Morphological observation of the most potent bacteria was examined by several identification tests using Bergey’s manual, which enabled us to know the genus of the isolate to be Bacillus. Furthermore, this potent bacterial colony was subjected to 16S rDNA PCR amplification and a single discrete PCR amplicon band of 1500 bp was observed. The 16S rDNA sequence was used to carry out BLAST alignment search tool of NCBI Genbank database to obtain maximum identity score of sequence. Molecular sequencing and identification was performed by Xcelris Labs Ltd. (Ahmedabad, India). The colony was identified as Bacillus sp. BAB-3434, indicating to be the first novel strain for extracellular invertase production. Molasses, a by-product of the sugarcane industry is a dark viscous liquid obtained upon crystallization of sugar. An enhanced invertase production and optimization studies were carried out by one-factor-at-a-time approach. Crucial parameters such as time course (24 h), pH (6.0), temperature (45 °C), inoculum size (2% v/v), N-source (yeast extract, 0.2% w/v) and C-source (molasses, 4% v/v) were found to be optimum demonstrating an increased yield. The findings of this study reveal a simple screening method of an extracellular invertase from a rapidly growing Bacillus sp., and selection of best factors that elevate enzyme activity especially utilization of molasses which served as an ideal substrate and also as C-source, results in a cost-effective production under submerged conditions. The invert mixture could be a replacement for table sugar which is an economic advantage and reduce the tedious work of sugar growers. On-going studies involve purification of extracellular invertase and determination of transfructosylating activity as at high concentration of sucrose, invertase produces fructooligosaccharides (FOS) which possesses probiotic properties.Keywords: Bacillus sp., invertase, molasses, screening, submerged fermentation
Procedia PDF Downloads 231