Search results for: managing code blue
1382 Comparative Studies of Distributed and Aggregated Energy Storage Configurations in Direct Current Microgrids
Authors: Frimpong Kyeremeh, Albert Y. Appiah, Ben B. K. Ayawli
Abstract:
Energy storage system (ESS) is an essential part of a microgrid (MG) because of its immense benefits to the economics and the stability of MG. For a direct current (DC) MG (DCMG) in which the generating units are mostly variable renewable energy generators, DC bus voltage fluctuation is inevitable; hence ESS is vital in managing the mismatch between load demand and generation. Besides, to accrue the maximum benefits of ESS in the microgrid, there is the need for proper sizing and location of the ESSs. In this paper, a performance comparison is made between two configurations of ESS; distributed battery energy storage system (D-BESS) and an aggregated (centralized) battery energy storage system (A-BESS), on the basis of stability and operational cost for a DCMG. The configuration consists of four households with rooftop PV panels and a wind turbine. The objective is to evaluate and analyze the technical efficiencies, cost effectiveness as well as controllability of each configuration. The MG is first modelled with MATLAB Simulink then, a mathematical model is used to determine the optimal size of the BESS that minimizes the total operational cost of the MG. The performance of the two configurations would be tested with simulations. The two configurations are expected to reduce DC bus voltage fluctuations, but in the cases of voltage stability and optimal cost, the best configuration performance will be determined at the end of the research. The work is in progress, and the result would help MG designers and operators to make the best decision on the use of BESS for DCMG configurations.Keywords: aggregated energy storage system, DC bus voltage, DC microgrid, distributed battery energy storage, stability
Procedia PDF Downloads 1571381 Analysis of the Interventions Performed in Pediatric Cardiology Unit Based on Nursing Interventions Classification (NIC-6th): A Pilot Study
Authors: Ji Wen Sun, Nan Ping Shen, Yi Bei Wu
Abstract:
This study used Nursing Interventions Classification (NIC-6th) to identify the interventions performed in a pediatric cardiology unit, and then to analysis its frequency, time and difficulty, so as to give a brief review on what our nurses have done. The research team selected a 35 beds pediatric cardiology unit, and drawn all the nursing interventions in the nursing record from our hospital information system (HIS) from 1 October 2015 to 30 November 2015, using NIC-6th to do the matching and then counting their frequencies. Then giving each intervention its own time and difficulty code according to NIC-6th. The results showed that nurses in pediatric cardiology unit performed totally 43 interventions from 5394 statements, and most of them were in RN(basic) education level needed and less than 15 minutes time needed. There still had some interventions just needed by a nursing assistant but done by nurses, which should call for nurse managers to think about the suitable staffing. Thus, counting the summary of the product of frequency, time and difficulty for each intervention of each nurse can know one's performance. Acknowledgement Clinical Management Optimization Project of Shanghai Shen Kang Hospital Development Center (SHDC2014615); Hundred-Talent Program of Construction of Nursing Plateau Discipline (hlgy16073qnhb).Keywords: nursing interventions, nursing interventions classification, nursing record, pediatric cardiology
Procedia PDF Downloads 3641380 Shear Strengthening of RC T-Beams by Means of CFRP Sheets
Authors: Omar A. Farghal
Abstract:
This research aimed to experimentally and analytically investigate the contribution of bonded web carbon fiber reinforced polymer (CFRP) sheets to the shear strength of reinforced concrete (RC) T-beams. Two strengthening techniques using CFRP strips were applied along the shear-span zone: the first one is vertical U-jacket and the later is vertical strips bonded to the beam sides only. Fibers of both U-jacket and side sheets were vertically oriented (θ = 90°). Test results showed that the strengthening technique with U-jacket CFRP sheets improved the shear strength particularly. Three mechanisms of failure were recognized for the tested beams depending upon the end condition of the bonded CFRP sheet. Although the failure mode for the different beams was a brittle one, the strengthened beams provided with U-jacket CFRP sheets showed more or less a ductile behavior at a higher loading level up to a load level just before failure. As a consequence, these beams approved an acceptable enhancement in the structural ductility. Moreover, the obtained results concerning both the strains induced in the CFRP sheets and the maximum loads are used to study the applicability of the analytical models proposed in this study (ACI code) to predict: the nominal shear strength of the strengthened beams.Keywords: carbon fiber reinforced polymer, wrapping, ductility, shear strengthening
Procedia PDF Downloads 2551379 Segmentation of Arabic Handwritten Numeral Strings Based on Watershed Approach
Authors: Nidal F. Shilbayeh, Remah W. Al-Khatib, Sameer A. Nooh
Abstract:
Arabic offline handwriting recognition systems are considered as one of the most challenging topics. Arabic Handwritten Numeral Strings are used to automate systems that deal with numbers such as postal code, banking account numbers and numbers on car plates. Segmentation of connected numerals is the main bottleneck in the handwritten numeral recognition system. This is in turn can increase the speed and efficiency of the recognition system. In this paper, we proposed algorithms for automatic segmentation and feature extraction of Arabic handwritten numeral strings based on Watershed approach. The algorithms have been designed and implemented to achieve the main goal of segmenting and extracting the string of numeral digits written by hand especially in a courtesy amount of bank checks. The segmentation algorithm partitions the string into multiple regions that can be associated with the properties of one or more criteria. The numeral extraction algorithm extracts the numeral string digits into separated individual digit. Both algorithms for segmentation and feature extraction have been tested successfully and efficiently for all types of numerals.Keywords: handwritten numerals, segmentation, courtesy amount, feature extraction, numeral recognition
Procedia PDF Downloads 3821378 Media Coverage of the Turkish Armenian Journalist Hrant Dink Assassination: The Analysis of Media News in the Aftermath of the Assassination
Authors: Nusret Mesut Sahin
Abstract:
Hrant Dink, a prominent Turkish-Armenian journalist, and editor-in-chief of the bilingual Turkish-Armenian newspaper Agos, was assassinated in Istanbul on January 19th, 2007 by a nationalist extremist, Ogun Samast. Dink had been voicing the atrocities against the Armenians between 1915 and 1922 during the Ottoman rule, and his comments on the issue appeared in the Turkish media many times before his assassination. Despite intensive media coverage of his assassination, there is not enough research analyzing how national and international media presented Dink’s assassination. In this research, a content analysis of national and international news articles (N= 139) is conducted to identify whether there is a significant difference in national and international media’s coverage of the assassination. The content of the newspaper articles is categorized and coded according to the topics covered. The findings of this research suggested that Dink’s assassination wounded Turkey’s image as a democratic country. It has also been found that the Turkish media focused on security forces and their responsibility in Dink’s assassination, whereas international media focused more on the Article 301 of the Turkish penal code, freedom of expression, and atrocities against the Armenians during the Ottoman rule.Keywords: Hrant Dink, Armenian, journalist, assassination
Procedia PDF Downloads 1521377 Anticancer and Anti-Apoptotic Potential of Tridham and 1,2,3,4,6-Penta-O-Galloyl-β-D-Glucose in MCF-7 Breast Cancer Cell Line
Authors: R. Stalin, D. Karthick, H. Haseena Banu, T. P. Sachidanandam, P. Shanthi
Abstract:
Background: Breast cancer is emerging as one of the leading cause of cancer related deaths and hence there arises the need to look out for drugs which are more targets specific with minimal side effects. In recent times, there is a shift towards alternative medicine due to low cost and less side effects. Siddha system of medicine is one the oldest system of medicine practiced against various ailments. Tridham (TD) is a herbal formulation prepared in our laboratory consisting of Terminalia chebula, Elaeocarpus ganitrus and Prosopis cineraria in a definite ratio (TD) and its anticancer potential is evaluated in terms of induction of apoptosis. Objective: The present study was designed to investigate the anti proliferative effect of TD and 1,2,3,4,6-penta-O-galloyl-b-D-glucose (PGG), a pure compound isolated from TD on human mammary carcinoma cell line (MCF-7). Materials and Methods: Cell viability was studied using MTT analysis and trypan blue staining. Mitochondrial membrane potential was studied using DAPI staining. The protein and mRNA expressions of pro-apoptotic and anti- apoptotic markers namely Bax, Bad, Bcl-2 and caspases were also assessed by Western Blotting and RT PCR. Results: Viability studies of TD and PGG treated MCF-7 cells showed an inhibition in cell growth in time and dose dependent manner. The alteration in mitochondrial membrane potential was restored through treatment with TD and PGG which was confirmed by DAPI staining. The protein and mRNA expression of pro-apoptotic markers was found to be significantly increased in TD and PGG treated cells with a concomitant decrease in anti-apoptotic markers. Conclusion: The results of the study suggest that TD and PGG exhibit their anticancer effect through its membrane stabilizing property and activation of apoptotic cascade in MCF-7 cells.Keywords: apoptosis, mammary carcinoma, MCF-7, penta galloyl glucose, Tridham
Procedia PDF Downloads 3131376 A Real-World Roadmap and Exploration of Quantum Computers Capacity to Trivialise Internet Security
Authors: James Andrew Fitzjohn
Abstract:
This paper intends to discuss and explore the practical aspects of cracking encrypted messages with quantum computers. The theory of this process has been shown and well described both in academic papers and headline-grabbing news articles, but with all theory and hyperbole, we must be careful to assess the practicalities of these claims. Therefore, we will use real-world devices and proof of concept code to prove or disprove the notion that quantum computers will render the encryption technologies used by many websites unfit for purpose. It is time to discuss and implement the practical aspects of the process as many advances in quantum computing hardware/software have recently been made. This paper will set expectations regarding the useful lifespan of RSA and cipher lengths and propose alternative encryption technologies. We will set out comprehensive roadmaps describing when and how encryption schemes can be used, including when they can no longer be trusted. The cost will also be factored into our investigation; for example, it would make little financial sense to spend millions of dollars on a quantum computer to factor a private key in seconds when a commodity GPU could perform the same task in hours. It is hoped that the real-world results depicted in this paper will help influence the owners of websites who can take appropriate actions to improve the security of their provisions.Keywords: quantum computing, encryption, RSA, roadmap, real world
Procedia PDF Downloads 1311375 Cash Management in a Cashless Economy of a Developing Nation, Problems and Prospects: Nigeria a Case Study
Authors: Ossai Paulinus Edwin
Abstract:
Cash Management is a broad area having to do with the collection, concentration and disbursement of cash including measuring the level of liquidity and managing the cash balance and Short-Term Investments. Cash Management involves the efficient collection and disbursement of cash and cash equivalents. It also includes management of marketable securities because, in modern Terminology, money comprises marketable securities and actual cash in hand or in a bank. This cash management is concerned with management of cash inflow and cash outflow of a business especially as it concerns a developing nation like Nigeria. The paper throws light on the impact of cashless policy in Nigeria as it was introduced by the Central Bank of Nigeria (CBN) in December 2011 and was kick started in Lagos in January 2012. Survey research was adopted with the questionnaires as data collection instrument. Responses show that cashless policy if adopted generally shall increase employment opportunities, reduce cash related robbery thereby reducing risk of carrying cash; it shall also reduce cash related corruption and attract more foreign investors to the country. It is expected that the introduction of cashless policy in Nigeria is a step in the right direction as it shall bring about modernization of Nigeria payment system, reduction in the cost of banking services, reduction in high security and safety risk and also curb banking related corruptions.Keywords: cashless economy, cash management, cashless policy, e-banking, Nigeria
Procedia PDF Downloads 3871374 The Model Establishment and Analysis of TRACE/FRAPTRAN for Chinshan Nuclear Power Plant Spent Fuel Pool
Authors: J. R. Wang, H. T. Lin, Y. S. Tseng, W. Y. Li, H. C. Chen, S. W. Chen, C. Shih
Abstract:
TRACE is developed by U.S. NRC for the nuclear power plants (NPPs) safety analysis. We focus on the establishment and application of TRACE/FRAPTRAN/SNAP models for Chinshan NPP (BWR/4) spent fuel pool in this research. The geometry is 12.17 m × 7.87 m × 11.61 m for the spent fuel pool. In this study, there are three TRACE/SNAP models: one-channel, two-channel, and multi-channel TRACE/SNAP model. Additionally, the cooling system failure of the spent fuel pool was simulated and analyzed by using the above models. According to the analysis results, the peak cladding temperature response was more accurate in the multi-channel TRACE/SNAP model. The results depicted that the uncovered of the fuels occurred at 2.7 day after the cooling system failed. In order to estimate the detailed fuel rods performance, FRAPTRAN code was used in this research. According to the results of FRAPTRAN, the highest cladding temperature located on the node 21 of the fuel rod (the highest node at node 23) and the cladding burst roughly after 3.7 day.Keywords: TRACE, FRAPTRAN, BWR, spent fuel pool
Procedia PDF Downloads 3571373 A Study for the Effect of Fire Initiated Location on Evacuation Success Rate
Authors: Jin A Ryu, Hee Sun Kim
Abstract:
As the number of fire accidents is gradually raising, many studies have been reported on evacuation. Previous studies have mostly focused on evaluating the safety of evacuation and the risk of fire in particular buildings. However, studies on effects of various parameters on evacuation have not been nearly done. Therefore, this paper aims at observing evacuation time under the effect of fire initiated location. In this study, evacuation simulations are performed on a 5-floor building located in Seoul, South Korea using the commercial program, Fire Dynamics Simulator with Evacuation (FDS+EVAC). Only the fourth and fifth floors are modeled with an assumption that fire starts in a room located on the fourth floor. The parameter for evacuation simulations is location of fire initiation to observe the evacuation time and safety. Results show that the location of fire initiation is closer to exit, the more time is taken to evacuate. The case having the nearest location of fire initiation to exit has the lowest ratio of successful occupants to the total occupants. In addition, for safety evaluation, the evacuation time calculated from computer simulation model is compared with the tolerable evacuation time according to code in Japan. As a result, all cases are completed within the tolerable evacuation time. This study allows predicting evacuation time under various conditions of fire and can be used to evaluate evacuation appropriateness and fire safety of building.Keywords: fire simulation, evacuation simulation, temperature, evacuation safety
Procedia PDF Downloads 3491372 A Study of Adaptive Fault Detection Method for GNSS Applications
Authors: Je Young Lee, Hee Sung Kim, Kwang Ho Choi, Joonhoo Lim, Sebum Chun, Hyung Keun Lee
Abstract:
A purpose of this study is to develop efficient detection method for Global Navigation Satellite Systems (GNSS) applications based on adaptive estimation. Due to dependence of radio frequency signals, GNSS measurements are dominated by systematic errors in receiver’s operating environment. Thus, to utilize GNSS for aerospace or ground vehicles requiring high level of safety, unhealthy measurements should be considered seriously. For the reason, this paper proposes adaptive fault detection method to deal with unhealthy measurements in various harsh environments. By the proposed method, the test statistics for fault detection is generated by estimated measurement noise. Pseudorange and carrier-phase measurement noise are obtained at time propagations and measurement updates in process of Carrier-Smoothed Code (CSC) filtering, respectively. Performance of the proposed method was evaluated by field-collected GNSS measurements. To evaluate the fault detection capability, intentional faults were added to measurements. The experimental result shows that the proposed detection method is efficient in detecting unhealthy measurements and improves the accuracy of GNSS positioning under fault occurrence.Keywords: adaptive estimation, fault detection, GNSS, residual
Procedia PDF Downloads 5761371 Institutional Design for Managing Irrigation Problems: A Case Study of Farmers'- and Agency-Managed Irrigation Systems of Nepal
Authors: Tirtha Raj Dhakal, Brian Davidson, Bob Farquharson
Abstract:
Institutional design is an important aspect in efficient water resource management. In Nepal, the water supply in both farmers’- and agency-managed irrigation systems has become sub-standard because of the weak institutional framework. This study characterizes both forms of the schemes and links existing institution and governance of the schemes with its performance with reference to cost recovery, maintenance of the schemes and water distribution throughout the schemes. For this, two types of surveys were conducted. A management survey of ten farmers’-managed and five agency-managed schemes of Chitwan valley and its periphery was done. Also, a farm survey comprising 25 farmers from each of head, middle and tail regions of both schemes; Narayani Lift Irrigation Project (agency-managed) and Khageri Irrigation System (farmers’-managed) of Chitwan Valley as a case study was conducted. The results showed that cost recovery of agency-managed schemes in 2015 was less than two percent whereas service fee collection rate in farmers’-managed schemes was nearly 2/3rd that triggered poor maintenance of the schemes and unequal distribution of water throughout the schemes. Also, the institution on practice is unable to create any incentives for farmers for economical use of water as well as willingness to pay for its use. This, thus, compels the need of refined institutional framework which has been suggested in this paper aiming to improve the cost recovery and better water distribution throughout the irrigation schemes.Keywords: cost recovery, governance, institution, schemes' performance
Procedia PDF Downloads 2601370 Privacy Preserving in Association Rule Mining on Horizontally Partitioned Database
Authors: Manvar Sagar, Nikul Virpariya
Abstract:
The advancement in data mining techniques plays an important role in many applications. In context of privacy and security issues, the problems caused by association rule mining technique are investigated by many research scholars. It is proved that the misuse of this technique may reveal the database owner’s sensitive and private information to others. Many researchers have put their effort to preserve privacy in Association Rule Mining. Amongst the two basic approaches for privacy preserving data mining, viz. Randomization based and Cryptography based, the later provides high level of privacy but incurs higher computational as well as communication overhead. Hence, it is necessary to explore alternative techniques that improve the over-heads. In this work, we propose an efficient, collusion-resistant cryptography based approach for distributed Association Rule mining using Shamir’s secret sharing scheme. As we show from theoretical and practical analysis, our approach is provably secure and require only one time a trusted third party. We use secret sharing for privately sharing the information and code based identification scheme to add support against malicious adversaries.Keywords: Privacy, Privacy Preservation in Data Mining (PPDM), horizontally partitioned database, EMHS, MFI, shamir secret sharing
Procedia PDF Downloads 4081369 Machine Learning Approach for Mutation Testing
Authors: Michael Stewart
Abstract:
Mutation testing is a type of software testing proposed in the 1970s where program statements are deliberately changed to introduce simple errors so that test cases can be validated to determine if they can detect the errors. Test cases are executed against the mutant code to determine if one fails, detects the error and ensures the program is correct. One major issue with this type of testing was it became intensive computationally to generate and test all possible mutations for complex programs. This paper used reinforcement learning and parallel processing within the context of mutation testing for the selection of mutation operators and test cases that reduced the computational cost of testing and improved test suite effectiveness. Experiments were conducted using sample programs to determine how well the reinforcement learning-based algorithm performed with one live mutation, multiple live mutations and no live mutations. The experiments, measured by mutation score, were used to update the algorithm and improved accuracy for predictions. The performance was then evaluated on multiple processor computers. With reinforcement learning, the mutation operators utilized were reduced by 50 – 100%.Keywords: automated-testing, machine learning, mutation testing, parallel processing, reinforcement learning, software engineering, software testing
Procedia PDF Downloads 1981368 Safety Study of Intravenously Administered Human Cord Blood Stem Cells in the Treatment of Symptoms Related to Chronic Inflammation
Authors: Brian M. Mehling, Louis Quartararo, Marine Manvelyan, Paul Wang, Dong-Cheng Wu
Abstract:
Numerous investigations suggest that Mesenchymal Stem Cells (MSCs) in general represent a valuable tool for therapy of symptoms related to chronic inflammatory diseases. Blue Horizon Stem Cell Therapy Program is a leading provider of adult and children’s stem cell therapies. Uniquely we have safely and efficiently treated more than 600 patients with documenting each procedure. The purpose of our study is primarily to monitor the immune response in order to validate the safety of intravenous infusion of human umbilical cord blood derived MSCs (UC-MSCs), and secondly, to evaluate effects on biomarkers associated with chronic inflammation. Nine patients were treated for conditions associated with chronic inflammation and for the purpose of anti-aging. They have been given one intravenous infusion of UC-MSCs. Our study of blood test markers of 9 patients with chronic inflammation before and within three months after MSCs treatment demonstrates that there is no significant changes and MSCs treatment was safe for the patients. Analysis of different indicators of chronic inflammation and aging included in initial, 24-hours, two weeks and three months protocols showed that stem cell treatment was safe for the patients; there were no adverse reactions. Moreover data from follow up protocols demonstrates significant improvement in energy level, hair, nails growth and skin conditions. Intravenously administered UC-MSCs were safe and effective in the improvement of symptoms related to chronic inflammation. Further close monitoring and inclusion of more patients are necessary to fully characterize the advantages of UC-MSCs application in treatment of symptoms related to chronic inflammation.Keywords: chronic inflammatory diseases, intravenous infusion, stem cell therapy, umbilical cord blood derived mesenchymal stem cells (UC-MSCs)
Procedia PDF Downloads 4341367 Geotechnical Investigation of Soil Foundation for Ramps of Dawar El-Tawheed Bridge in Jizan City, Kingdom of Saudi Arabia
Authors: Ali H. Mahfouz, Hossam E. M. Sallam, Abdulwali Wazir, Hamod H. Kharezi
Abstract:
The soil profile at site of the bridge project includes soft fine grained soil layer located between 5.0 m to 11.0 m in depth, it has high water content, low SPT no., and low bearing capacity. The clay layer induces high settlement due to surcharge application of earth embankment at ramp T1, ramp T2, and ramp T3 especially at heights from 9m right 3m. Calculated settlement for embankment heights less than 3m may be accepted regarding Saudi Code for soil and foundation. The soil and groundwater at the project site comprise high contents of sulfates and chlorides of high aggressively on concrete and steel bars, respectively. Regarding results of the study, it has been recommended to use stone column piles or new technology named PCC piles as soil improvement to improve the bearing capacity of the weak layer. The new technology is cast in-situ thin wall concrete pipe piles (PCC piles), it has economically advantageous and high workability. The technology can save time of implementation and cost of application is almost 30% of other types of piles.Keywords: soft foundation soil, bearing capacity, bridge ramps, soil improvement, geogrid, PCC piles
Procedia PDF Downloads 3991366 Outsourcing the Front End of Innovation
Abstract:
The paper presents a new method for efficient innovation process management. Even though the innovation management methods, tools and knowledge are well established and documented in literature, most of the companies still do not manage it efficiently. Especially in SMEs the front end of innovation - problem identification, idea creation and selection - is often not optimally performed. Our eMIPS methodology represents a sort of "umbrella methodology"- a well-defined set of procedures, which can be dynamically adapted to the concrete case in a company. In daily practice, various methods (e.g. for problem identification and idea creation) can be applied, depending on the company's needs. It is based on the proactive involvement of the company's employees supported by the appropriate methodology and external experts. The presented phases are performed via a mixture of face-to-face activities (workshops) and online (eLearning) activities taking place in eLearning Moodle environment and using other e-communication channels. One part of the outcomes is an identified set of opportunities and concrete solutions ready for implementation. The other also very important result is connected to innovation competences for the participating employees related with concrete tools and methods for idea management. In addition, the employees get a strong experience for dynamic, efficient and solution oriented managing of the invention process. The eMIPS also represents a way of establishing or improving the innovation culture in the organization. The first results in a pilot company showed excellent results regarding the motivation of participants and also as to the results achieved.Keywords: creativity, distance learning, front end, innovation, problem
Procedia PDF Downloads 3281365 CSRFDtool: Automated Detection and Prevention of a Reflected Cross-Site Request Forgery
Authors: Alaa A. Almarzuki, Nora A. Farraj, Aisha M. Alshiky, Omar A. Batarfi
Abstract:
The number of internet users is dramatically increased every year. Most of these users are exposed to the dangers of attackers in one way or another. The reason for this lies in the presence of many weaknesses that are not known for native users. In addition, the lack of user awareness is considered as the main reason for falling into the attackers’ snares. Cross Site Request Forgery (CSRF) has placed in the list of the most dangerous threats to security in OWASP Top Ten for 2013. CSRF is an attack that forces the user’s browser to send or perform unwanted request or action without user awareness by exploiting a valid session between the browser and the server. When CSRF attack successes, it leads to many bad consequences. An attacker may reach private and personal information and modify it. This paper aims to detect and prevent a specific type of CSRF, called reflected CSRF. In a reflected CSRF, a malicious code could be injected by the attackers. This paper explores how CSRF Detection Extension prevents the reflected CSRF by checking browser specific information. Our evaluation shows that the proposed solution succeeds in preventing this type of attack.Keywords: CSRF, CSRF detection extension, attackers, attacks
Procedia PDF Downloads 4141364 Fake News During COVID-19 Pandemic: An Overview from A Legal Perspective
Authors: Ida Shafinaz Mohamed Kamil, Mohd Dahlan Abdul Malek
Abstract:
Today, the whole world is facing a catastrophe called the novel coronavirus disease known as COVID-19. As of October 2021, it has been reported that more than 248 million cases and 5 million deaths have been recorded worldwide. In Malaysia, 2,466,663 cases were reported, with 28,876 deaths recorded on 30 October 2021. Unfortunately, the world is not only facing the COVID-19 pandemic but the COVID-19 infodemic as well, where fake news about COVID-19 disease is spreading faster and more widely than from the virus itself. The spread of fake news is amplified through various social media platforms, which is causing concern among the community. The uncertainty in understanding what fake news really is has caused difficulties and challenges in providing a solution to the hazards that it creates. This article discusses what constitutes fake news and examines the current legal framework put in place to combat fake news in Malaysia. Employing a doctrinal research methodology, this article thoroughly analyzes the relevant legal provisions under the Communications and Multimedia Act 1998, the Penal Code and the Emergency (Essential Powers) Ordinance (No.2) 2021, which came into force on 12 March 2021 as well as related case laws, for offenses and punishments with regards to fake news. The findings from the analysis indicate that there is still room for improvement in regulating fake news, in particular concerning COVID-19.Keywords: fake news, legal pespective, covid 19, pendemic
Procedia PDF Downloads 851363 Upgrades for Hydric Supply in Water System Distribution: Use of the Bayesian Network and Technical Expedients
Authors: Elena Carcano, James Ball
Abstract:
This work details the strategies adopted by the Italian Water Utilities during the distribution of water in emergency conditions which glide from earthquakes and droughts to floods and fires. Several water bureaus located over the national territory have been interviewed, and the collected information has been used in a database of potential interventions to be taken. The work discusses the actions adopted by water utilities. These are generally prioritized in order to minimize the social, temporal, and economic burden that the damaged and nearby areas need to support. Actions are defined relying on the Bayesian Network Approach, which constitutes the hard core of any decision support system. The Bayesian Networks give answers to interventions to real and most likely risky cases. The added value of this research consists in supplying the National Bureau, namely Protezione Civile, in charge of managing havoc and catastrophic situations with a univocal plot outline so as to be able to handle actions uniformly at the expense of different local laws or contradictory customs which squander any recovery conditions, proper technical service, and economic aids. The paper is organized as follows: in section 1, the introduction is stated; section 2 provides a brief discussion of BNNs (Bayesian Networks), section 3 introduces the adopted methodology; and in the last sections, results are presented, and conclusions are drawn.Keywords: hierarchical process, strategic plan, water emergency conditions, water supply
Procedia PDF Downloads 1601362 Numerical Study of Steel Structures Responses to External Explosions
Authors: Mohammad Abdallah
Abstract:
Due to the constant increase in terrorist attacks, the research and engineering communities have given significant attention to building performance under explosions. This paper presents a methodology for studying and simulating the dynamic responses of steel structures during external detonations, particularly for accurately investigating the impact of incrementing charge weight on the members total behavior, resistance and failure. Prediction damage method was introduced to evaluate the damage level of the steel members based on five scenarios of explosions. Johnson–Cook strength and failure model have been used as well as ABAQUS finite element code to simulate the explicit dynamic analysis, and antecedent field tests were used to verify the acceptance and accuracy of the proposed material strength and failure model. Based on the structural response, evaluation criteria such as deflection, vertical displacement, drift index, and damage level; the obtained results show the vulnerability of steel columns and un-braced steel frames which are designed and optimized to carry dead and live load to resist and endure blast loading.Keywords: steel structure, blast load, terrorist attacks, charge weight, damage level
Procedia PDF Downloads 3641361 The Impact of Institutional and Organizational Change on Social Housing Organizations and Their Stakeholders
Authors: Farnoosh Faal
Abstract:
Institutional and organizational change in social housing organizations can have a significant impact on both the organizations themselves and their stakeholders. This paper provides an overview of the impact of institutional and organizational change on social housing organizations and their stakeholders, including tenants, employees, and other community members. The paper examines the different types of institutional and organizational change that can occur in social housing organizations, such as changes in management structure, funding models, and service delivery methods. It also explores the potential benefits and drawbacks of these changes, including changes in efficiency, service quality, and tenant satisfaction. The paper further discusses the impact of institutional and organizational change on social housing organization stakeholders, including the effects on employee morale, tenant engagement, and community relationships. The paper highlights the importance of effective stakeholder engagement and communication in ensuring a smooth transition to new organizational models and systems. Finally, the paper discusses the challenges and opportunities presented by institutional and organizational change in social housing organizations and provides recommendations for organizations looking to navigate these changes successfully. These recommendations include prioritizing stakeholder engagement, investing in staff training and development, and maintaining a focus on the needs and priorities of tenants and communities. Overall, this paper emphasizes the importance of considering the impact of institutional and organizational change on social housing organizations and their stakeholders and highlights strategies for managing these changes in a way that maximizes benefits and minimizes negative impacts.Keywords: social housing organizations, stakeholder engagement, institutional change, challenges, opportunities
Procedia PDF Downloads 861360 Assessment of Causes of Building Collapse in Nigeria
Authors: Olufemi Oyedele
Abstract:
Building collapse (BC) in Nigeria is becoming a regular occurrence, each recording great casualties in the number of lives and materials lost. Building collapse is a situation where building which has been completed and occupied, completed but not occupied or under construction, collapses on its own due to action or inaction of man or due to natural event like earthquake, storm, flooding, tsunami or wildfire. It is different from building demolition. There are various causes of building collapse and each case requires expert judgment to decide the cause of its collapse. Rate of building collapse is a reflection of the level of organization and control of building activities and degree of sophistication of the construction professionals in a country. This study explored the use of case study by examining the causes of six (6) collapsed buildings (CB) across Nigeria. Samples of materials from the sites of the collapsed buildings were taken for testing and analysis, while critical observations were made at the sites to note the conditions of the ground (building base). The study found out that majority of the building collapses in Nigeria were due to poor workmanship, sub-standard building materials, followed by bad building base and poor design. The National Building Code 2006 is not effective due to lack of enforcement and the Physical Development Departments of states and Federal Capital Territory are just mere agents of corruption allowing all types of construction without building approvals.Keywords: building collapse, concrete tests, differential settlement, integrity test, quality control
Procedia PDF Downloads 5351359 Return to Work after a Mental Health Problem: Analysis of Two Different Management Models
Authors: Lucie Cote, Sonia McFadden
Abstract:
Mental health problems in the workplace are currently one of the main causes of absences. Research work has highlighted the importance of a collaborative process involving the stakeholders in the return-to-work process and has established the best management practices to ensure a successful return-to-work. However, very few studies have specifically explored the combination of various management models and determined whether they could satisfy the needs of the stakeholders. The objective of this study is to analyze two models for managing the return to work: the ‘medical-administrative’ and the ‘support of the worker’ in order to understand the actions and actors involved in these models. The study also aims to explore whether these models meet the needs of the actors involved in the management of the return to work. A qualitative case study was conducted in a Canadian federal organization. An abundant internal documentation and semi-directed interviews with six managers, six workers and four human resources professionals involved in the management of records of employees returning to work after a mental health problem resulted in a complete picture of the return to work management practices used in this organization. The triangulation of this data facilitated the examination of the benefits and limitations of each approach. The results suggest that the actions of management for employee return to work from both models of management ‘support of the worker’ and ‘medical-administrative’ are compatible and can meet the needs of the actors involved in the return to work. More research is needed to develop a structured model integrating best practices of the two approaches to ensure the success of the return to work.Keywords: return to work, mental health, management models, organizations
Procedia PDF Downloads 2121358 Microfluidic Based High Throughput Screening System for Photodynamic Therapy against Cancer Cells
Authors: Rina Lee, Chung-Hun Oh, Eunjin Lee, Jeongyun Kim
Abstract:
The Photodynamic therapy (PDT) is a treatment that uses a photosensitizer as a drug to damage and kill cancer cells. After injecting the photosensitizer into the bloodstream, the drug is absorbed by cancer cells selectively. Then the area to be treated is exposed to specific wavelengths of light and the photosensitizer produces a form of oxygen that kills nearby cancer cells. PDT is has an advantage to destroy the tumor with minimized side-effects on normal cells. But, PDT is not a completed method for cancer therapy. Because the mechanism of PDT is quite clear yet and the parameters such as intensity of light and dose of photosensitizer are not optimized for different types of cancers. To optimize these parameters, we suggest a novel microfluidic system to automatically control intensity of light exposure with a personal computer (PC). A polydimethylsiloxane (PDMS) microfluidic chip is composed with (1) a cell culture channels layer where cancer cells were trapped to be tested with various dosed photofrin (1μg/ml used for the test) as the photosensitizer and (2) a color dye layer as a neutral density (ND) filter to reduce intensity of light which exposes the cell culture channels filled with cancer cells. Eight different intensity of light (10%, 20%, …, 100%) are generated through various concentrations of blue dye filling the ND filter. As a light source, a light emitting diode (LED) with 635nm wavelength was placed above the developed PDMS microfluidic chip. The total time for light exposure was 30 minutes and HeLa and PC3 cell lines of cancer cells were tested. The cell viability of cells was evaluated with a Live/Dead assay kit (L-3224, Invitrogen, USA). The stronger intensity of light exposed, the lower viability of the cell was observed, and vice versa. Therefore, this system was demonstrated through investigating the PDT against cancer cell to optimize the parameters as critical light intensity and dose of photosensitizer. Our results suggest that the system can be used for optimizing the combinational parameters of light intensity and photosensitizer dose against diverse cancer cell types.Keywords: photodynamic therapy, photofrin, high throughput screening, hela
Procedia PDF Downloads 3831357 One-Dimensional Performance Improvement of a Single-Stage Transonic Compressor
Authors: A. Shahsavari, M. Nili-Ahmadabadi
Abstract:
This paper presents an innovative one-dimensional optimization of a transonic compressor based on the radial equilibrium theory by means of increasing blade loading. Firstly, the rotor blade of the transonic compressor is redesigned based on the constant span-wise deHaller number and diffusion. The code is applied to extract compressor meridional plane and blade to blade geometry containing rotor and stator in order to design blade three-dimensional view. A structured grid is generated for the numerical domain of fluid. Finer grids are used for regions near walls to capture boundary layer effects and behavior. RANS equations are solved by finite volume method for rotating zones (rotor) and stationary zones (stator). The experimental data, available for the performance map of NASA Rotor67, is used to validate the results of simulations. Then, the capability of the design method is validated by CFD that is capable of predicting the performance map. The numerical results of new geometry show about 19% increase in pressure ratio and 11% improvement in overall efficiency of the transonic stage; however, the design point mass flow rate of the new compressor is 5.7% less than that of the original compressor.Keywords: deHaller number, one dimensional design, radial equilibrium, transonic compressor
Procedia PDF Downloads 3411356 Effects of Main Contractors’ Service Quality on Subcontractors’ Behaviours and Project Outcomes
Authors: Zhuoyuan Wang, Benson T. H. Lim, Imriyas Kamardeen
Abstract:
Effective service quality management has long been touted as a means of improving project and organisational performance. Particularly, in construction projects, main contractors are often seen as a broker between clients and subcontractors, and their service quality is thus associated with the overall project affinity and outcomes. While a considerable amount of research has focused on the aspect of clients-main contractors, very little research has been done to explore the effect of contractors’ service quality on subcontractors’ behaviours and so project outcomes. In addressing this gap, this study surveyed 97 subcontractors in the Chinese Construction industry and data was analysed using the Partial Least Square (PLS) Structural Equation Modelling (SEM) technique. The overall findings reveal that subcontractors categorised main contractors’ service quality into three dimensions: assurance; responsiveness; reliability and empathy. Of these, it is found that main contractors’ ‘assurance’ and ‘responsiveness’ positively influence subcontractors’ intention to engage in contractual behaviours. The results further show that the subcontractors’ intention to engage in organizational citizenship behaviours is associated with how flexible and committed the main contractors are in reliability and empathy. Collectively, both subcontractors’ contractual and organizational citizenship behaviours positively influence the overall project outcomes. In conclusion, the findings inform contractors different strategies towards managing and gaining subcontractors’ behaviour commitment in a socially connected, yet complex and uncertain, business environment.Keywords: construction firms, organisational citizenship behaviour, service quality, social exchange theory
Procedia PDF Downloads 2141355 Using Sandplay Therapy to Assess Psychological Resilience
Authors: Dan Wang
Abstract:
Sandplay therapy is a Jungian psychological therapy developed by Dora Kalff in 1956. In sandplay therapy, the client first makes a sandtray with various miniatures and then has a communication with the therapist based on the sandtray. The special method makes sandplay therapy has great assessment potential. With regarding that the core treatment hypothesis of sandplay therapy - the self-healing power, is very similar to resilience. This study tries to use sandplay to evaluate psychological resilience. Participants are 107 undergraduates recruited from three public universities in China who were required to make an initial sandtray and to complete the Ego-Resiliency Scale (ER89) respectively. First, a 28- category General Sandtray Coding Manual (GSCM) was developed based on literature on sandplay therapy. Next, using GSCM to code the 107 initial sandtrays and conducted correlation analysis and regression analysis between all GSCM categories and ER89. Results show three categories (i.e., vitality, water types, and relationships) of sandplay account for 36.6% of the variance of ego-resilience and form the four-point Likert-type Sandtray Projective Test of Resilience (SPTR). Finally, it is found that SPTR dimensions and total score all have good inter-rater reliability, ranging from 0.89 to 0.93. This study provides an alternative approach to measure psychological resilience and can help to guide clinical social work.Keywords: sandplay therapy, psychological resilience, measurement, college students
Procedia PDF Downloads 2561354 Exergetic Analysis of Steam Turbine Power Plant Operated in Chemical Industry
Authors: F. Hafdhi, T. Khir, A. Ben Yahia, A. Ben Brahim
Abstract:
An Energetic and exergetic analysis is conducted on a Steam Turbine Power Plant of an existing Phosphoric Acid Factory. The heat recovery systems used in different parts of the plant are also considered in the analysis. Mass, thermal and exergy balances are established on the main compounds of the factory. A numerical code is established using EES software to perform the calculations required for the thermal and exergy plant analysis. The effects of the key operating parameters such as steam pressure and temperature, mass flow rate as well as seawater temperature, on the cycle performances are investigated. A maximum Exergy Loss Rate of about 72% is obtained for the melters, followed by the condensers, heat exchangers and the pumps. The heat exchangers used in the phosphoric acid unit present exergetic efficiencies around 33% while 60% to 72% are obtained for steam turbines and blower. For the explored ranges of HP steam temperature and pressure, the exergy efficiencies of steam turbine generators STGI and STGII increase of about 2.5% and 5.4% respectively. In the same way, optimum HP steam flow rate values, leading to the maximum exergy efficiencies are defined.Keywords: steam turbine generator, energy efficiency, exergy efficiency, phosphoric acid plant
Procedia PDF Downloads 3101353 Stabilization of Metastable Skyrmion Phase in Polycrystalline Chiral β-Mn Type Co₇Zn₇Mn₆ Alloy
Authors: Pardeep, Yugandhar Bitla, A. K. Patra, G. A. Basheed
Abstract:
The topological protected nanosized particle-like swirling spin textures, “skyrmion,” has been observed in various ferromagnets with chiral crystal structures like MnSi, FeGe, Cu₂OSeO₃ alloys, however the magnetic ordering in these systems takes place at very low temperatures. For skyrmion-based spintronics devices, the skyrmion phase is required to stabilize in a wide temperature – field (T - H) region. The equilibrium skyrmion phase (SkX) in Co₇Zn₇Mn₆ alloy exists in a narrow T – H region just below transition temperature (TC ~ 215 K) and can be quenched by field cooling as a metastable skyrmion phase (MSkX) below SkX region. To realize robust MSkX at 110 K, field sweep ac susceptibility χ(H) measurements were performed after the zero field cooling (ZFC) and field cooling (FC) process. In ZFC process, the sample was cooled from 320 K to 110 K in zero applied magnetic field and then field sweep measurement was performed (up to 2 T) in positive direction (black curve). The real part of ac susceptibility (χ′(H)) at 110 K in positive field direction after ZFC confirms helical to conical phase transition at low field HC₁ (= 42 mT) and conical to ferromagnetic (FM) transition at higher field HC₂ (= 300 mT). After ZFC, FC measurements were performed i.e., sample was initially cooled in zero fields from 320 to 206 K and then a sample was field cooled in the presence of 15 mT field down to the temperature 110 K. After FC process, isothermal χ(H) was measured in positive (+H, red curve) and negative (-H, blue curve) field direction with increasing and decreasing field upto 2 T. Hysteresis behavior in χ′(H), measured after ZFC and FC process, indicates the stabilization of MSkX at 110 K which is in close agreement with literature. Also, the asymmetry between field-increasing curves measured after FC process in both sides confirm the stabilization of MSkX. In the returning process from the high field polarized FM state, helical state below HC₁ is destroyed and only the conical state is observed. Thus, the robust MSkX state is stabilized below its SkX phase over a much wider T - H region by FC in polycrystalline Co₇Zn₇Mn₆ alloy.Keywords: skyrmions, magnetic susceptibility, metastable phases, topological phases
Procedia PDF Downloads 104