Search results for: financial risks
2568 The Virtuos Taxation: A Theory of the Fair Tax System
Authors: Dario Rajmilovich
Abstract:
The tax system represents a multidisciplinary cosmos whose main purpose is to provide financial resources to the government of a given political jurisdiction in order to apply them to the public purposes outlined by that government. Not withstanding this basic external configuration of a finalistic order, its internal structure essentially responds to a series of principles or axes whose roots can be traced in the Old Testament (written Torah) and in oral sources (especially the KaBaLáh or Cábala compiled in the second century of the Common era in the book called "the Zóhar" (Book of Splendor) attributed to Rabi Shimón bar Iojái). The purpose of this work is to outline a general theory of taxation based on the biblical principles inherent to taxation and to project its effects in the configuration of a just tax system designated as "Virtuous Taxation".Keywords: principles of taxation, kabaláh and taxation, old testament taxation, virtuous taxation
Procedia PDF Downloads 862567 Contagion and Stock Interdependence in the BRIC+M Block
Authors: Christian Bucio Pacheco, Miriam Magnolia Sosa Castro, María Alejandra Cabello Rosales
Abstract:
This paper aims to analyze the contagion effect among the stock markets of the BRIC+M block (Brazil, Russia, India, China plus Mexico). The contagion effect is proved through increasing on dependence parameters during crisis periods. The dependence parameters are estimated through copula approach in a period of time from July 1997 to December 2015. During this period there are instability and calm episodes, allowing to analyze changes in the relations of dependence. Empirical results show strong evidence of time-varying dependence among the BRIC+M markets and an increasing dependence relation during global financial crisis period.Keywords: BRIC+M Block, Contagion effect, Copula, dependence
Procedia PDF Downloads 3512566 Evaluating the Destination Image of Iran and Its Influence on Revisit Intention: After Iran’s 2022 Crisis
Authors: Hamideh S. Shahidi
Abstract:
This research examines destination image and its impact on tourist revisit intention. Destination images can evolve over time, depending on a number of factors. Due to the multidimensional nature of destination image, the full extent of what might influence that change is not yet fully understood. As a result, the destination image should be measured with a heavy consideration of the variables used. Depending on the time and circumstances, these variables should be adjusted based on the research’s objectives. The aim of this research is to evaluate the image of destinations that may be perceived as risky, such as Iran, from the perspective of European cultural travellers. Further to the goal of understanding the effects of an image on tourists’ decision-making, the research will assess the impact of destination image on the revisit intention using push and pull factors and perceived risks with the potential moderating effect of cultural contact (the direct interaction between the host and the tourists with different culture). In addition, the moderating effect of uncertainty avoidance on revisit intention after Iran’s crisis in 2022 will be measured. Furthermore, the level of uncertainty avoidance between gender and age will be compared.Keywords: destination image, Iran’s 2022 crisis, revisit intention, uncertainty avoidance
Procedia PDF Downloads 1032565 Proposed Terminal Device for End-to-End Secure SMS in Cellular Networks
Authors: Neetesh Saxena, Narendra S. Chaudhari
Abstract:
Nowadays, SMS is a very popular mobile service and even the poor, illiterate people and those living in rural areas use SMS service very efficiently. Although many mobile operators have already started 3G and 4G services, 2G services are still being used by the people in many countries. In 2G (GSM), only encryption provided is between the MS and the BTS, there is no end-to-end encryption available. Sometimes we all need to send some confidential message to other person containing bank account number, some password, financial details, etc. Normally, a message is sent in plain text only to the recipient and it is not an acceptable standard for transmitting such important and confidential information. Authors propose an end-to-end encryption approach by proposing a terminal for sending/receiving a secure message. An asymmetric key exchange algorithm is used in order to transmit secret shared key securely to the recipient. The proposed approach with terminal device provides authentication, confidentiality, integrity and non-repudiation.Keywords: AES, DES, Diffie-Hellman, ECDH, A5, SMS
Procedia PDF Downloads 4212564 Knowledge Transfer through Entrepreneurship: From Research at the University to the Consolidation of a Spin-off Company
Authors: Milica Lilic, Marina Rosales Martínez
Abstract:
Academic research cannot be oblivious to social problems and needs, so projects that have the capacity for transformation and impact should have the opportunity to go beyond the University circles and bring benefit to society. Apart from patents and R&D research contracts, this opportunity can be achieved through entrepreneurship as one of the most direct tools to turn knowledge into a tangible product. Thus, as an example of good practices, it is intended to analyze the case of an institutional entrepreneurship program carried out at the University of Seville, aimed at researchers interested in assessing the business opportunity of their research and expanding their knowledge on procedures for the commercialization of technologies used at academic projects. The program is based on three pillars: training, teamwork sessions and networking. The training includes aspects such as product-client fit, technical-scientific and economic-financial feasibility of a spin-off, institutional organization and decision making, public and private fundraising, and making the spin-off visible in the business world (social networks, key contacts, corporate image and ethical principles). On the other hand, the teamwork sessions are guided by a mentor and aimed at identifying research results with potential, clarifying financial needs and procedures to obtain the necessary resources for the consolidation of the spin-off. This part of the program is considered to be crucial in order for the participants to convert their academic findings into a business model. Finally, the networking part is oriented to workshops about the digital transformation of a project, the accurate communication of the product or service a spin-off offers to society and the development of transferable skills necessary for managing a business. This blended program results in the final stage where each team, through an elevator pitch format, presents their research turned into a business model to an experienced jury. The awarded teams get a starting capital for their enterprise and enjoy the opportunity of formally consolidating their spin-off company at the University. Studying the results of the program, it has been shown that many researchers have basic or no knowledge of entrepreneurship skills and different ways to turn their research results into a business model with a direct impact on society. Therefore, the described program has been used as an example to highlight the importance of knowledge transfer at the University and the role that this institution should have in providing the tools to promote entrepreneurship within it. Keeping in mind that the University is defined by three main activities (teaching, research and knowledge transfer), it is safe to conclude that the latter, and the entrepreneurship as an expression of it, is crucial in order for the other two to comply with their purpose.Keywords: good practice, knowledge transfer, a spin-off company, university
Procedia PDF Downloads 1512563 An Ensemble Deep Learning Architecture for Imbalanced Classification of Thoracic Surgery Patients
Authors: Saba Ebrahimi, Saeed Ahmadian, Hedie Ashrafi
Abstract:
Selecting appropriate patients for surgery is one of the main issues in thoracic surgery (TS). Both short-term and long-term risks and benefits of surgery must be considered in the patient selection criteria. There are some limitations in the existing datasets of TS patients because of missing values of attributes and imbalanced distribution of survival classes. In this study, a novel ensemble architecture of deep learning networks is proposed based on stacking different linear and non-linear layers to deal with imbalance datasets. The categorical and numerical features are split using different layers with ability to shrink the unnecessary features. Then, after extracting the insight from the raw features, a novel biased-kernel layer is applied to reinforce the gradient of the minority class and cause the network to be trained better comparing the current methods. Finally, the performance and advantages of our proposed model over the existing models are examined for predicting patient survival after thoracic surgery using a real-life clinical data for lung cancer patients.Keywords: deep learning, ensemble models, imbalanced classification, lung cancer, TS patient selection
Procedia PDF Downloads 1492562 The Antecedent Factor Affecting the Entrepreneurs’ Decision Making for Using Accounting Office Service in Chiang Mai Province
Authors: Nawaporn Thongnut
Abstract:
The objective was to study the process and how to prepare the accounting of the Thai temples and to study the performance and quality in the accounting preparation of the temples in accordance with the regulation. The population was the accountants and individuals involved in the accounting preparation of 17 temples in the suburban Bangkok. The measurement used in this study was questionnaire. The statistics used in the analysis are the descriptive statistic. The data was presented in the form of percentage tables to describe the data on the demographic characteristics. The study found that temple wardens were responsible for the accounting and reporting of the temples. Abbots were to check the accuracy of the accounts in the monasteries. Mostly, there was no account auditing of the monasteries from the outside. The practice when receiving income for most of the monasteries had been keeping financial document in an orderly manner.Keywords: corporate social responsibility, creating shared value, management accountant’s roles, stock exchange of Thailand
Procedia PDF Downloads 2342561 Controller Design and Experimental Evaluation of a Motorized Assistance for a Patient Transfer Floor Lift
Authors: Donatien Callon, Ian Lalonde, Mathieu Nadeau, Alexandre Girard
Abstract:
Patient transfer is a challenging, critical task because it exposes caregivers to injury risks. Available transfer devices, like floor lifts, lead to improvements but are far from perfect. They do not eliminate the caregivers’ risk of musculoskeletal disorders, and they can be burdensome to use due to their poor maneuverability. This paper presents a new motorized floor lift with a single central motorized wheel connected to an instrumented handle. Admittance controllers are designed to 1) improve the device maneuverability, 2) reduce the required caregiver effort, and 3) ensure the security and comfort of patients. Two controller designs, one with a linear admittance law and a non-linear admittance law with variable damping, were developed and implemented on a prototype. Tests were performed on seven participants to evaluate the performance of the assistance system and the controllers. The experimental results show that 1) the motorized assistance with the variable damping controller improves maneuverability by 28%, 2) reduces the amount of effort required to push the lift by 66%, and 3) provides the same level of patient comfort compared to a standard unassisted floor lift.Keywords: floor lift, human robot interaction, admittance controller, variable admittance
Procedia PDF Downloads 1202560 Detecting of Crime Hot Spots for Crime Mapping
Authors: Somayeh Nezami
Abstract:
The management of financial and human resources of police in metropolitans requires many information and exact plans to reduce a rate of crime and increase the safety of the society. Geographical Information Systems have an important role in providing crime maps and their analysis. By using them and identification of crime hot spots along with spatial presentation of the results, it is possible to allocate optimum resources while presenting effective methods for decision making and preventive solutions. In this paper, we try to explain and compare between some of the methods of hot spots analysis such as Mode, Fuzzy Mode and Nearest Neighbour Hierarchical spatial clustering (NNH). Then the spots with the highest crime rates of drug smuggling for one province in Iran with borderline with Afghanistan are obtained. We will show that among these three methods NNH leads to the best result.Keywords: GIS, Hot spots, nearest neighbor hierarchical spatial clustering, NNH, spatial analysis of crime
Procedia PDF Downloads 3372559 An Appraisal of the Attitude and Motivation of Almajiri (Teenage-Beggars) to Tsangaya Education System in Katsina and Zamfara States, Nigeria
Authors: Rasaq Ayodeji Iliyas
Abstract:
Almajiris are teenage beggars who under the guise of been enlisted in religious study beg perpetually on the streets and homes. A poorly attended bridge gap juvenile education system called Tsangaya was instituted for them. This study appraised the attitude and motivation of the over 9 million Almajiris largely domiciled in the Northern Nigeria to the Government’s efforts at getting them educated. The study, a survey research design, employed validated structured interview instrument that showed a high reliability index (Alpha Cronbach- 0.86) to gather data. 950 Almajiris sampled across the 50 Local Government Areas of Katsina (36) and Zamfara (14) States, Nigeria participated in the study. Outcomes of the study revealed a chronic attitudinal problem from the Almajiris; and a peculiarly low motivation to the Tsangaya School. It was, however, recommended that traditional rulers should be mandated by government to sensitize parents on the many risks involved in the inhuman cultural practice, and the grave consequences of unskilled adult life of the children; and state governments should legislate against the demeaning Almajiri practice, which already misrepresents Islam.Keywords: Almajiri, apraissal, Tsangaya education, motivation, attitude, motivation
Procedia PDF Downloads 2842558 Adolescent Health Risk Behaviors and the Mediating Effects of Family Dynamics and Socio-Demographic Factors
Authors: Rufina C. Abul, Dylan Kyle D. Apostol, Darius Rex G. Binuya, Alyanah Mae F. Cauilan, Darren A. Diaz, Angelica Jones A. Gallang, Charisse G. Kiwang, Alyanna Nicole G. Mactal, Nadine Beatrize V. Nerona, Janella Nicole R. Posadas, Charisse Purie C. Toledo
Abstract:
Background: Dramatic physical development, socioemotional adjustment, and cognitive changes highlight adolescent development. Adolescent brains are susceptible to emotional reactivity, making them likely to engage in risk-taking and impulsive behaviors. The family is crucial in laying the foundations of good health. Aims: This study determined the degree of family cohesion, quality of father-child and mother-child relationships, and degree of academic pressure across cultures, age groups, and sexual orientations. Further, it sought the prevalence of adolescent health concerns, including suicide risks, risk-taking behaviors, social media engagement, and self-care deviations. Finally, the correlations between health risk behaviors and the elements of family dynamics were unraveled. Methods: The descriptive-correlational design served as the blueprint for this study. Data were collected from 1095 adolescents aged 12-21 in two high schools and two universities in Baguio City using self-report questionnaires. Data was analyzed using Microsoft Excel Toolpak and IBM SPSS Statistics to identify significant differences and relationships among variables through descriptive statistics (frequency, %, means and figures) and inferential statistics (ANOVA and logistic regression). Results and Discussion: Adolescents generally have strong family cohesion (FC), high-quality father-child relationships (F-CR), very high-quality mother-child relationships(M-CR), and experience high academic pressure (AP). Cultural affiliation does not influence the 4 elements of family dynamics; the higher the age, the stronger the family cohesion; males score significantly higher on family cohesion and mother-child relationship while significantly lower in perceived academic pressure compared to their female and LGBT counterparts. Suicide risk is prevalent among 29-63% of the population, safety issues have the lowest prevalence for having an abusive relationship (8.22%) and the highest for encountering major family changes (53.52%). Substance use was highest for vaping (22.74%), sexual engagement occurs in 14.61% of the population, while 63% are engaged in social media for >5 hours/day. The self-care deviation is highest for weight concerns (63.39%), lack of visits to health care professionals (64.65%) and lack of exercise (49.94%). All 4 elements of family dynamic (FC, F-CR, M-CR and AP) are significantly associated with safety concerns, suicide risks and social media engagement, while M-CR significantly influences cigarette smoking, alcohol drinking, rugby use and engagement in sex. Conclusion and Recommendations: Strong family cohesion and quality parent-child interactions improve emotional and behavioral outcomes. Sexual orientation has a significant impact on academic pressure and social media use, demanding targeted treatments. The link between family dynamics and health-risk behaviors emphasizes the importance of promoting positive family relationships and encouraging safer behaviors, which are critical for increasing adolescents' well-being.Keywords: adolescent health, family cohesion, health risk behaviors, suicide risk
Procedia PDF Downloads 212557 Beyond the Economics of Food: Household Food Strategies in Clusters of the Umkhanyakude District Municipality
Authors: Mduduzi Nhlozi
Abstract:
Food insecurity continues to persist in rural areas of South Africa today. A number of factors can be attributed to this including declining rural economies, rising unemployment, natural disasters such as drought as well as shifting cultural norms, values, traditions and beliefs. This paper explores mechanisms used by rural households to achieve food security in the midst of various threats and risks to their livelihoods. The study used semi-structured questionnaire to collect information on lived experiences of households in their quest to access and ensure availability of food. The paper finds that households use a number of food strategies namely economy-related, culture-related and rite-of-passage related strategies to achieve food security. The thrust of argument in the paper is that there is a need for food security studies to move beyond the orthodox, economic analytic framework, towards new institutional economics, focusing on local governance and socio-cultural systems supporting households to achieve food security. It advocates for localised food security plans to be developed by local municipalities to improve food security status for rural households.Keywords: household, food insecurity, food strategies, new institutional economics, umkhanyakude
Procedia PDF Downloads 1272556 Advanced Machine Learning Algorithm for Credit Card Fraud Detection
Authors: Manpreet Kaur
Abstract:
When legitimate credit card users are mistakenly labelled as fraudulent in numerous financial delated applications, there are numerous ethical problems. The innovative machine learning approach we have suggested in this research outperforms the current models and shows how to model a data set for credit card fraud detection while minimizing false positives. As a result, we advise using random forests as the best machine learning method for predicting and identifying credit card transaction fraud. The majority of victims of these fraudulent transactions were discovered to be credit card users over the age of 60, with a higher percentage of fraudulent transactions taking place between the specific hours.Keywords: automated fraud detection, isolation forest method, local outlier factor, ML algorithm, credit card
Procedia PDF Downloads 1192555 Application of Ontologies to Contract for Difference Documents
Authors: Renato Figueira Franco
Abstract:
This paper aims to create a representational information system applied to the securities market, particularly the development of an ontology applied to the analysis of the Key Information Documents of Contracts for Difference. The process of obtaining knowledge and its proper formal representation has raised the attention both from the scientific literature and the capital markets supervisory authorities. The formal knowledge representation is embodied in the construction of ontologies, which are responsible for defining a knowledge base structure of a given scientific domain, facilitating its understanding, and allowing its sharing among the scientific community. The scope of this study is restricted to the analysis of capital markets ontologies in order to capture its structure, semantics and knowledge sharing between people and systems.Keywords: ontology, financial markets, CFD, PRIIPs, key information documents
Procedia PDF Downloads 702554 An Effective Route to Control of the Safety of Accessing and Storing Data in the Cloud-Based Data Base
Authors: Omid Khodabakhshi, Amir Rozdel
Abstract:
The subject of cloud computing security research has allocated a number of challenges and competitions because the data center is comprised of complex private information and are always faced various risks of information disclosure by hacker attacks or internal enemies. Accordingly, the security of virtual machines in the cloud computing infrastructure layer is very important. So far, there are many software solutions to develop security in virtual machines. But using software alone is not enough to solve security problems. The purpose of this article is to examine the challenges and security requirements for accessing and storing data in an insecure cloud environment. In other words, in this article, a structure is proposed for the implementation of highly isolated security-sensitive codes using secure computing hardware in virtual environments. It also allows remote code validation with inputs and outputs. We provide these security features even in situations where the BIOS, the operating system, and even the super-supervisor are infected. To achieve these goals, we will use the hardware support provided by the new Intel and AMD processors, as well as the TPM security chip. In conclusion, the use of these technologies ultimately creates a root of dynamic trust and reduces TCB to security-sensitive codes.Keywords: code, cloud computing, security, virtual machines
Procedia PDF Downloads 1942553 Intelligent System of the Grinding Robot for Spiral Welded Pipe
Authors: Getachew Demeissie Ayalew, Yongtao Sun, Yang Yang
Abstract:
The spiral welded pipe manufacturing industry requires strict production standards for automated grinders for welding seams. However, traditional grinding machines in this sector are insufficient due to a lack of quality control protocols and inconsistent performance. This research aims to improve the quality of spiral welded pipes by developing intelligent automated abrasive belt grinding equipment. The system has equipped with six degrees of freedom (6 DOF) KUKA KR360 industrial robots, enabling concurrent grinding operations on both internal and external welds. The grinding robot control system is designed with a PLC, and a human-machine interface (HMI) system is employed for operations. The system includes an electric speed controller, data connection card, DC driver, analog amplifier, and HMI for input data. This control system enables the grinding of spiral welded pipe. It ensures consistent production quality and cost-effectiveness by reducing the product life cycle and minimizing risks in the working environment.Keywords: Intelligent Systems, Spiral Welded Pipe, Grinding, Industrial Robot, End-Effector, PLC Controller System, 3D Laser Sensor, HMI.
Procedia PDF Downloads 3042552 Food Security Indicators in Deltaic and Coastal Research: A Scoping Review
Authors: Sylvia Szabo, Thilini Navaratne, Indrajit Pal, Seree Park
Abstract:
Deltaic and coastal regions are often strategically important both from local and regional perspectives. While deltas are known to be bread baskets of the world, delta inhabitants often face the risk of food and nutritional insecurity. These risks are highly exacerbated by the impacts of climate and environmental change. While numerous regional studies examined the prevalence and the determinants of food security in specific delta and coastal regions, there is still a lack of a systematic analysis of the most widely used scientific food security indicators. In order to fill this gap, a systematic review was carried out using Covidence, a Cochrane-adopted systematic review processing software. Papers included in the review were selected from the SCOPUS, Thomson Reuters Web of Science, Science Direct, ProQuest, and Google Scholar databases. Both scientific papers and grey literature (e.g., reports by international organizations) were considered. The results were analyzed by food security components (access, availability, quality, and strategy) and by world regions. Suggestions for further food security, nutrition, and health research, as well as policy-related implications, are also discussed.Keywords: delta regions, coastal, food security, indicators, systematic review
Procedia PDF Downloads 2462551 Implementation of Tissue Engineering Technique to Nursing of Unhealed Diabetic Foot Lesion
Authors: Basuki Supartono
Abstract:
Introduction: Diabetic wound risks limb amputation, and the healing remains challenging. Chronic Hyperglycemia caused the insufficient inflammatory response and impaired ability of the cells to regenerate. Tissue Engineering Technique is mandatory. Methods: Tissue engineering (TE)-based therapy Utilizing mononuclear cells, plasma rich platelets, and collagen applied on the damaged tissue Results: TE technique resulting in acceptable outcomes. The wound healed completely in 2 months. No adverse effects. No allergic reaction. No morbidity and mortality Discussion: TE-based therapy utilizing mononuclear cells, plasma rich platelets, and collagen are safe and comfortable to fix damaged tissues. These components stop the chronic inflammatory process and increase cells' ability for regeneration and restoration of damaged tissues. Both of these allow the wound to regenerate and heal. Conclusion: TE-based therapy is safe and effectively treats unhealed diabetic lesion.Keywords: diabetic foot lesion, tissue engineering technique, wound healing, stemcells
Procedia PDF Downloads 842550 Effect of Lime and Leaf Ash on Engineering Properties of Red Mud
Authors: Pawandeep Kaur, Prashant Garg
Abstract:
Red mud is a byproduct of aluminum extraction from Bauxite industry. It is dumped in a pond which not only uses thousands of acres of land but having very high pH, it pollutes the ground water and the soil also. Leaves are yet another big waste especially during autumn when they contribute immensely to the blockage of drains and can easily catch fire, among other risks hence also needs to be utilized effectively. The use of leaf ash and red mud in highway construction as a filling material may be an efficient way to dispose of leaf ash and red mud. In this study, leaf ash and lime were used as admixtures to improve the geotechnical engineering properties of red mud. The red mud was taken from National Aluminum Company Limited, Odisha, and leaf ash was locally collected. The aim of present study is to investigate the effect of lime and leaf ash on compaction characteristics and strength characteristics of red mud. California Bearing Ratio and Unconfined Compression Strength tests were performed on red mud by varying different percentages of lime and leaf ash. Leaf ash was added in proportion 2%,4%,6%,8% and 10% whereas lime was added in proportions of 5% to 15%. Optimized value of lime was decided with respect to maximum CBR (California Bearing Ratio) of red mud mixed with different proportions of lime. An increase of 300% in California Bearing ratio of red mud and an increase of 125% in Unconfined Compression Strength values were observed. It may, therefore, be concluded that red mud may be effectively utilized in the highway industry as a filler material.Keywords: stabilization, lime, red mud, leaf ash
Procedia PDF Downloads 2462549 Cryptocurrency Crime: Behaviors of Malicious Smart Contracts in Blockchain
Authors: Malaw Ndiaye, Karim Konate
Abstract:
Blockchain and smart contracts can be used to facilitate almost any financial transaction. Thanks to these smart contracts, the settlement of dividends and coupons could be automated. The blockchain would allow all these transactions to be saved in a single ledger rather than in many databases through many organizations as is currently the case. Smart contracts have become lucrative and profitable targets for attackers because they can hold a large amount of money. This paper takes stock of cryptocurrency crime by assessing attacks due to smart contracts and the cost of losses. These losses are often the result of two types of malicious contracts: vulnerable contracts and criminal smart contracts. Studying the behavior of malicious contracts allows us to understand the root causes and consequences of attacks and the defense capabilities that exist although they do not definitively solve the crime problem. It makes it possible to approach new defense perspectives which will be concretized in future work.Keywords: blockchain, malicious smart contracts, crypto-currency, crimes, attacks
Procedia PDF Downloads 2812548 Limits and Barriers of Value Creation and Projects Development: The Case of Tunisian SMEs
Authors: Samira Boussema, Ben Hamed Salah
Abstract:
Entrepreneurship was always considered to be the most appropriate remedy for various economies’ symptoms. It is presented as a complex process that faces several barriers thereby inhibiting a project’s implementation phase. In fact, after a careful review of the literature, we noticed that empirical researches on reasons behind non-developing entrepreneurial projects are very rare, suggesting a lack in modeling the process in general and the pre-start phase in particular. Therefore, in this study we try to identify the main environmental barriers to developing business projects in Tunisia through the study of a representative sample of undeveloped projects. To this end, we used a quantitative approach which allowed us to examine the various barriers encountered by young entrepreneurs during their projects’ implementation. Indeed, by modeling the phenomenon we found that these managers face barriers of legal, financial, educational and government support dimensions.Keywords: entrepreneurship, environmental barriers, non-implementation of projects, structural modeling
Procedia PDF Downloads 3872547 Strategies for Arctic Greenhouse Farming: An Energy and Technology Survey of Greenhouse Farming in the North of Sweden
Authors: William Sigvardsson, Christoffer Alenius, Jenny Lindblom, Andreas Johansson, Marcus Sandberg
Abstract:
This article covers a study focusing on a subarctic greenhouse located in Nikkala, Sweden. Through a visit and the creation of a CFD model, the study investigates the differences in energy demand with high pressure sodium (HPS) lights and light emitting diode (LED) lights in combination with an air-carried and water-carried heating system accordingly. Through an IDA ICE model, the impact of insulating the parts of the greenhouse without active cultivation was also investigated. This, with the purpose of comparing the current system in the greenhouse to state-of-the-art alternatives and evaluating if an investment in either a water-carried heating system in combination with LED lights and insulating the non-cultivating parts of the greenhouse could be considered profitable. Operating a greenhouse in the harsh subarctic climate found in the northern parts of Sweden is not an easy task and especially if the operation is year-round. With an average temperature of under -5 °C from November through January, efficient growing techniques are a must to ensure a profitable business. Today the most crucial parts of a greenhouse are the heating system, lighting system, dehumidifying measures, as well as thermal screen, and the impact of a poorly designed system in a sub-arctic could be devastating as the margins are slim. The greenhouse studied uses a pellet burner to power their air- carried heating system which is used. The simulations found the resulting savings amounted to just under 14 800 SEK monthly or 18 % of the total cost of energy by implementing the water-carrying heating system in combination with the LED lamps. Given this, a payback period of 3-9 years could be expected given different scenarios, including specific time periods, financial aids, and the resale price of the current system. The insulation of the non-cultivating parts of the greenhouse was found to have possible savings of 25 300 SEK annually or 46 % of the current heat demand resulting in a payback period of just over 1-2 years. Given the possible energy savings, a reduction in emitted CO2 equivalents of almost 1,9 tonnes could be achieved annually. It was concluded that relatively inexpensive investments in modern greenhouse equipment could make a significant contribution to reducing the energy consumption of the greenhouse resulting in a more competitive business environment for sub-arctic greenhouse owners. New parts of the greenhouse should be built with the water-carried heating system in combination with state-of-the-art LED lights, and all parts which are not housing active cultivation should be insulated. If the greenhouse in Nikkala is eligible for financial aid or finds a resale value in the current system, an investment should be made in a new water-carried heating system in combination with LED lights.Keywords: energy efficiency, sub-arctic greenhouses, energy measures, greenhouse climate control, greenhouse technology, CFD
Procedia PDF Downloads 782546 Rural to Urban Migration and Mental Health Consequences in Urbanizing China
Authors: Jie Li, Nick Manning
Abstract:
The mass rural-urban migrants in China associated with the urbanization processes bear significant implications on public health, which is an important yet under-researched area. Urban social and built environment, such as noise, air pollution, high population density, and social segregation, has the potential to contribute to mental illness. In China, rural-urban migrants are also faced with institutional discrimination tied to the hukou (household registration) system, through which they are denied of full citizenship to basic social welfare and services, which may elevate the stress of urban living and exacerbate the risks to mental illness. This paper aims to link the sociospatial exclusion, everyday life experiences and its mental health consequences on rural to urban migrants living in the mega-city of Shanghai. More specifically, it asks what the daily experience of being a migrant in Shanghai is actually like, particularly regarding sources of stress from housing, displacement, service accessibility, and cultural conflict, and whether these stresses affect mental health? Secondary data from literature review on migration, urban studies, and epidemiology research, as well as primary data from preliminary field trip observations and interviews are used in the analysis.Keywords: migration, urbanisation, mental health, China
Procedia PDF Downloads 3772545 A Partially Accelerated Life Test Planning with Competing Risks and Linear Degradation Path under Tampered Failure Rate Model
Authors: Fariba Azizi, Firoozeh Haghighi, Viliam Makis
Abstract:
In this paper, we propose a method to model the relationship between failure time and degradation for a simple step stress test where underlying degradation path is linear and different causes of failure are possible. It is assumed that the intensity function depends only on the degradation value. No assumptions are made about the distribution of the failure times. A simple step-stress test is used to shorten failure time of products and a tampered failure rate (TFR) model is proposed to describe the effect of the changing stress on the intensities. We assume that some of the products that fail during the test have a cause of failure that is only known to belong to a certain subset of all possible failures. This case is known as masking. In the presence of masking, the maximum likelihood estimates (MLEs) of the model parameters are obtained through an expectation-maximization (EM) algorithm by treating the causes of failure as missing values. The effect of incomplete information on the estimation of parameters is studied through a Monte-Carlo simulation. Finally, a real example is analyzed to illustrate the application of the proposed methods.Keywords: cause of failure, linear degradation path, reliability function, expectation-maximization algorithm, intensity, masked data
Procedia PDF Downloads 3392544 X-Ray Shielding Properties of Bismuth-Borate Glass Doped with Rare-Earth Ions
Authors: Vincent Kheswa
Abstract:
X-rays are ionizing electromagnetic radiation that is used in various industries such as computed tomography scans, dental X-rays, and screening freight trains. However, they pose health risks to humans if they are not shielded properly. In recent years, many researchers around the globe have been searching for nontoxic best possible glass materials for shielding X-rays. In this work, the x-ray shielding properties of 45Na₂O + 10 Bi₂O₃ + (5 - x)TiO₂+ (x) Nb₂O₅ + 40 P₂O₅, were x = 0, 1, 3, 5 mol%, glass materials were studied. The results revealed that the glass sample with the highest TiO2 content has the highest mass and linear attenuation coefficients and lowest half-value thickness, tenth-value thickness and mean-free path in the 20 to 80 keV energy region. The sample with 3 mol% of Nb₂O₅ has the highest mass and linear attenuation coefficients and the lowest half-value thickness, tenth-value thickness, and mean-free path at 15 keV and photon energies between 80 to 300 keV. It was, therefore, concluded that 45Na₂O + 10 Bi₂O₃ + 5 TiO₂ + 40 P₂O₅ glass is best for shielding x-rays of energies between 20 and 80 keV, while 45Na₂O + 10 Bi₂O₃ + 2 TiO₂ + 3 Nb₂O₅ + 40 P₂O₅ is best for shielding 15 keV x-rays and x-rays of energies between 80 keV and 300 keV.Keywords: bismuth-titanium-phosphate glass, x-ray shielding, LAC, MAC, radiation shielding
Procedia PDF Downloads 632543 Corporate Performance and Balance Sheet Indicators: Evidence from Indian Manufacturing Companies
Authors: Hussain Bohra, Pradyuman Sharma
Abstract:
This study highlights the significance of Balance Sheet Indicators on the corporate performance in the case of Indian manufacturing companies. Balance sheet indicators show the actual financial health of the company and it helps to the external investors to choose the right company for their investment and it also help to external financing agency to give easy finance to the manufacturing companies. The period of study is 2000 to 2014 for 813 manufacturing companies for which the continuous data is available throughout the study period. The data is collected from PROWESS data base maintained by Centre for Monitoring Indian Economy Pvt. Ltd. Panel data methods like fixed effect and random effect methods are used for the analysis. The Likelihood Ratio test, Lagrange Multiplier test and Hausman test results proof the suitability of the fixed effect model for the estimation. Return on assets (ROA) is used as the proxy to measure corporate performance. ROA is the best proxy to measure corporate performance as it already used by the most of the authors who worked on the corporate performance. ROA shows return on long term investment projects of firms. Different ratios like Current Ratio, Debt-equity ratio, Receivable turnover ratio, solvency ratio have been used as the proxies for the Balance Sheet Indicators. Other firm specific variable like firm size, and sales as the control variables in the model. From the empirical analysis, it was found that all selected financial ratios have significant and positive impact on the corporate performance. Firm sales and firm size also found significant and positive impact on the corporate performance. To check the robustness of results, the sample was divided on the basis of different ratio like firm having high debt equity ratio and low debt equity ratio, firms having high current ratio and low current ratio, firms having high receivable turnover and low receivable ratio and solvency ratio in the form of firms having high solving ratio and low solvency ratio. We find that the results are robust to all types of companies having different form of selected balance sheet indicators ratio. The results for other variables are also in the same line as for the whole sample. These findings confirm that Balance sheet indicators play as significant role on the corporate performance in India. The findings of this study have the implications for the corporate managers to focus different ratio to maintain the minimum expected level of performance. Apart from that, they should also maintain adequate sales and total assets to improve corporate performance.Keywords: balance sheet, corporate performance, current ratio, panel data method
Procedia PDF Downloads 2722542 Battle on Historical Water: An Analysis Roots of conflict between India and Sri Lanka and Victimization of Arrested Indian Fishermen
Authors: Xavier Louis, Madhava Soma Sundaram
Abstract:
The Palk Bay, a narrow strip of water, separates the state of Tamil Nadu in India from north Sri Lanka. The bay, which is 137 km in length and varies from 64 to 137 kilometers in width and is home to more than 580 fish species and chunks of shrimp’s resources, is divided by the International Maritime Boundary Line (IMBL). The bay, bordering it are five Tamil Nadu districts of India and three Sri Lankan districts and assumes importance as it is one of the areas presenting permanent and serious challenges to both India and Sri Lanka with respect to the fishing rights in the Bay. Fishermen from both sides were enjoying fishing with hormones for centuries. Katchchadeevu is a tiny Island located in the Bay, which was a part of India. After the Katchchadeevu agreement 1974 it became a part of Sri Lanka and a fishing conflict arose between the two countries' fishermen. Fuelling the dispute over Katchatheevu is the overfishing of Indian mechanized trawlers in Palk Bay and the damaging environmental and economic effects of trawling. Since 2008, more than 300 Indian fishermen have been killed by firing by Sri Lankan Navy, nearly 100 fishermen have gone missing and more than 3000 fishermen were arrested and later released after the trials for trespassing into Sri Lankan waters. Currently, more than 120 fishing boats and 29 fishermen are in Sri Lankan custody. This paper attempts to find out the causes of fishing conflict and who has the fishing rights in the mentioned waters, how the international treaties are complied with at the time of arrest and trials, how the arrested fishermen are treated by them and how they suffer from fishermen families without a breadwinner. A Semi-structured interview schedule tool was prepared by the researcher, which is suitable for measuring quantitative and qualitative aspects of the above-mentioned theme. One hundred arrested fishermen were interviewed and recorded their prison experiences in Sri Lanka. The research found that the majority of the fishermen believe that they have the right to fish in the historical water and that the Sri Lankan Naval personnel have brutally attacked the Indian fishermen at the time of the arrest. The majority of the fishermen accepted that they had limited fishing grounds. As a result, they entered Sri Lankan waters for their livelihood. The majority of the fishermen expected that they would also get their belongings back at the time of release, primarily the boats. Most of the arrested fishermen's families face financial crises in the absence of their breadwinners and this situation has created conditions for child labor among the affected families and some fishers migrate to different places for different occupations. The majority of the fishers have trauma about their victimization and face uncertainty in the future of their occupation. We can discuss more the causes and nature of the fishing conflict and the financial and psychological victimization of Indian fishermen in relation to the conflict.Keywords: palk bay, historical water, fishing conflict, arrested fishermen, victimization
Procedia PDF Downloads 832541 Bringing Together Student Collaboration and Research Opportunities to Promote Scientific Understanding and Outreach Through a Seismological Community
Authors: Michael Ray Brunt
Abstract:
China has been the site of some of the most significant earthquakes in history; however, earthquake monitoring has long been the provenance of universities and research institutions. The China Digital Seismographic Network was initiated in 1983 and improved significantly during 1992-1993. Data from the CDSN is widely used by government and research institutions, and, generally, this data is not readily accessible to middle and high school students. An educational seismic network in China is needed to provide collaboration and research opportunities for students and engaging students around the country in scientific understanding of earthquake hazards and risks while promoting community awareness. In 2022, the Tsinghua International School (THIS) Seismology Team, made up of enthusiastic students and facilitated by two experienced teachers, was established. As a group, the team’s objective is to install seismographs in schools throughout China, thus creating an educational seismic network that shares data from the THIS Educational Seismic Network (THIS-ESN) and facilitates collaboration. The THIS-ESN initiative will enhance education and outreach in China about earthquake risks and hazards, introduce seismology to a wider audience, stimulate interest in research among students, and develop students’ programming, data collection and analysis skills. It will also encourage and inspire young minds to pursue science, technology, engineering, the arts, and math (STEAM) career fields. The THIS-ESN utilizes small, low-cost RaspberryShake seismographs as a powerful tool linked into a global network, giving schools and the public access to real-time seismic data from across China, increasing earthquake monitoring capabilities in the perspective areas and adding to the available data sets regionally and worldwide helping create a denser seismic network. The RaspberryShake seismograph is compatible with free seismic data viewing platforms such as SWARM, RaspberryShake web programs and mobile apps are designed specifically towards teaching seismology and seismic data interpretation, providing opportunities to enhance understanding. The RaspberryShake is powered by an operating system embedded in the Raspberry Pi, which makes it an easy platform to teach students basic computer communication concepts by utilizing processing tools to investigate, plot, and manipulate data. THIS Seismology Team believes strongly in creating opportunities for committed students to become part of the seismological community by engaging in analysis of real-time scientific data with tangible outcomes. Students will feel proud of the important work they are doing to understand the world around them and become advocates spreading their knowledge back into their homes and communities, helping to improve overall community resilience. We trust that, in studying the results seismograph stations yield, students will not only grasp how subjects like physics and computer science apply in real life, and by spreading information, we hope students across the country can appreciate how and why earthquakes bear on their lives, develop practical skills in STEAM, and engage in the global seismic monitoring effort. By providing such an opportunity to schools across the country, we are confident that we will be an agent of change for society.Keywords: collaboration, outreach, education, seismology, earthquakes, public awareness, research opportunities
Procedia PDF Downloads 752540 Using Tilted Façade to Reduce Thermal Discomfort in a UK Passivhaus Dwelling for a Warming Climate
Authors: Yahya Lavafpour, Steve Sharples
Abstract:
This study investigated the potential negative impacts of future UK climate change on dwellings. In particular, the risk of overheating was considered for a Passivhaus dwelling in London. The study used dynamic simulation modelling software to investigate the potential use of building geometry to control current and future overheating risks in the dwelling for London climate. Specifically, the focus was on the optimum inclination of a south façade to make use of the building’s shape to self-protect itself. A range of different inclined façades were examined to test their effectiveness in reducing the overheating risk. The research found that implementing a 115° tilted façade could completely eliminate the risk of overheating in current climate, but with some consequence for natural ventilation and daylighting. Future overheating was significantly reduced by the tilted façade. However, geometric considerations could not eradicate completely the risk of overheating particularly by the 2080s. The study also used CFD modelling and sensitivity analysis to investigate the effect of the façade geometry on the wind pressure distributions on and around the building surface. This was done to assess natural ventilation flows for alternative façade inclinations.Keywords: climate change, tilt façade, thermal comfort, passivhaus, overheating
Procedia PDF Downloads 7672539 Survey of Access Controls in Cloud Computing
Authors: Monirah Alkathiry, Hanan Aljarwan
Abstract:
Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements.Keywords: access controls, cloud computing, confidentiality, identity and access management
Procedia PDF Downloads 133