Search results for: safety motivation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4447

Search results for: safety motivation

2497 Secure Transfer of Medical Images Using Hybrid Encryption Authentication, Confidentiality, Integrity

Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad

Abstract:

In this paper, we propose a new encryption system for security issues medical images. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity, and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every new session of encryption, that will be used to encrypt each frame of the medical image basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, medical images, encryption, decryption, key, correlation

Procedia PDF Downloads 525
2496 Detecting of Crime Hot Spots for Crime Mapping

Authors: Somayeh Nezami

Abstract:

The management of financial and human resources of police in metropolitans requires many information and exact plans to reduce a rate of crime and increase the safety of the society. Geographical Information Systems have an important role in providing crime maps and their analysis. By using them and identification of crime hot spots along with spatial presentation of the results, it is possible to allocate optimum resources while presenting effective methods for decision making and preventive solutions. In this paper, we try to explain and compare between some of the methods of hot spots analysis such as Mode, Fuzzy Mode and Nearest Neighbour Hierarchical spatial clustering (NNH). Then the spots with the highest crime rates of drug smuggling for one province in Iran with borderline with Afghanistan are obtained. We will show that among these three methods NNH leads to the best result.

Keywords: GIS, Hot spots, nearest neighbor hierarchical spatial clustering, NNH, spatial analysis of crime

Procedia PDF Downloads 306
2495 Outsourcing the Front End of Innovation

Authors: B. Likar, K. Širok

Abstract:

The paper presents a new method for efficient innovation process management. Even though the innovation management methods, tools and knowledge are well established and documented in literature, most of the companies still do not manage it efficiently. Especially in SMEs the front end of innovation - problem identification, idea creation and selection - is often not optimally performed. Our eMIPS methodology represents a sort of "umbrella methodology"- a well-defined set of procedures, which can be dynamically adapted to the concrete case in a company. In daily practice, various methods (e.g. for problem identification and idea creation) can be applied, depending on the company's needs. It is based on the proactive involvement of the company's employees supported by the appropriate methodology and external experts. The presented phases are performed via a mixture of face-to-face activities (workshops) and online (eLearning) activities taking place in eLearning Moodle environment and using other e-communication channels. One part of the outcomes is an identified set of opportunities and concrete solutions ready for implementation. The other also very important result is connected to innovation competences for the participating employees related with concrete tools and methods for idea management. In addition, the employees get a strong experience for dynamic, efficient and solution oriented managing of the invention process. The eMIPS also represents a way of establishing or improving the innovation culture in the organization. The first results in a pilot company showed excellent results regarding the motivation of participants and also as to the results achieved.

Keywords: creativity, distance learning, front end, innovation, problem

Procedia PDF Downloads 313
2494 Risks in Forestry Operations, Analysis of Fatal Accidents

Authors: Rino Gubiani, Gianfranco Pergher

Abstract:

The work focused on the statistical analysis of accidents in the forestry sector (2000-2020) in Friuli-Venezia Giulia region, located in the North-East of Italy. The aim of the work was to analyse the evolution of the casualties throughout time and to evaluate possible improvements in the sector. It was shown that even nowadays the rate of accidents in forestry work is higher compared with all the other sectors, including agriculture; moreover, it was highlighted that some accidents remained present throughout the whole analysed range, such as slipping on the soil, being hit by trees and falling down from the plants. The results showed that an increase in forestry exploitation could even increase the total number of accidents, if advanced technological machines, such as cable cranes, would not implemented, given the fact that there is also a significant number of old people (above 50 years old) working in the sector.

Keywords: safety, forestry work, accidents, risk analysis, casualties, statistical analysis

Procedia PDF Downloads 113
2493 Forecasting Unusual Infection of Patient Used by Irregular Weighted Point Set

Authors: Seema Vaidya

Abstract:

Mining association rule is a key issue in data mining. In any case, the standard models ignore the distinction among the exchanges, and the weighted association rule mining does not transform on databases with just binary attributes. This paper proposes a novel continuous example and executes a tree (FP-tree) structure, which is an increased prefix-tree structure for securing compacted, discriminating data about examples, and makes a fit FP-tree-based mining system, FP enhanced capacity algorithm is used, for mining the complete game plan of examples by illustration incessant development. Here, this paper handles the motivation behind making remarkable and weighted item sets, i.e. rare weighted item set mining issue. The two novel brightness measures are proposed for figuring the infrequent weighted item set mining issue. Also, the algorithm are handled which perform IWI which is more insignificant IWI mining. Moreover we utilized the rare item set for choice based structure. The general issue of the start of reliable definite rules is troublesome for the grounds that hypothetically no inciting technique with no other person can promise the rightness of influenced theories. In this way, this framework expects the disorder with the uncommon signs. Usage study demonstrates that proposed algorithm upgrades the structure which is successful and versatile for mining both long and short diagnostics rules. Structure upgrades aftereffects of foreseeing rare diseases of patient.

Keywords: association rule, data mining, IWI mining, infrequent item set, frequent pattern growth

Procedia PDF Downloads 383
2492 A Study of Variables Affecting on a Quality Assessment of Mathematics Subject in Thailand by Using Value Added Analysis on TIMSS 2011

Authors: Ruangdech Sirikit

Abstract:

The purposes of this research were to study the variables affecting the quality assessment of mathematics subject in Thailand by using value-added analysis on TIMSS 2011. The data used in this research is the secondary data from the 2011 Trends in International Mathematics and Science Study (TIMSS), collected from 6,124 students in 172 schools from Thailand, studying only mathematics subjects. The data were based on 14 assessment tests of knowledge in mathematics. There were 3 steps of data analysis: 1) To analyze descriptive statistics 2) To estimate competency of students from the assessment of their mathematics proficiency by using MULTILOG program; 3) analyze value added in the model of quality assessment using Value-Added Model with Hierarchical Linear Modeling (HLM) and 2 levels of analysis. The research results were as follows: 1. Student level variables that had significant effects on the competency of students at .01 levels were Parental care, Resources at home, Enjoyment of learning mathematics and Extrinsic motivation in learning mathematics. Variable that had significant effects on the competency of students at .05 levels were Education of parents and self-confident in learning mathematics. 2. School level variable that had significant effects on competency of students at .01 levels was Extra large school. Variable that had significant effects on competency of students at .05 levels was medium school.

Keywords: quality assessment, value-added model, TIMSS, mathematics, Thailand

Procedia PDF Downloads 264
2491 The Effect of Language and Literature Integration on the Teaching of English Vocabulary and Grammar in Secondary Schools in Zamfara State, Nigeria

Authors: Umar Bello

Abstract:

Literature has become an invaluable subject which has added a great value and contribution to the teaching of English language and the discovery of many other developed ideas. Literature produces an exhilarating impulse that imprints a lasting picture on the mind of a learner. Many researchers have devised various means and approaches to language Teaching methods which remain unconvinging and which yield little result, but it has remained unconvincing because it has only produced little results. Devicing a method that eliminates monotony and boredome to learners is a good factor that enhances students’ motivation to learning. In this sense, literature and language become unavoidable components that aid intellectual development. This study examines the indispensability of literature as a means of English Language teaching to secondary school classes. The researcher has developed many instructive activities which are believed will help students to improve their study in grammar and vocabulary. The researcher has used quasi-experimental approach using experimental group and control group to find out how literature enhances the students grammar as well as their vocabulary. The findings revealed a positive performance in the experimental group doing better than the control group using simple percentage. The results make it clear that literature allows learners to pay more attention and develop more interest to their studies. In giving a perspicacious linguistic development, literature therefore remains an essential tool for language teaching classrooms, thereby enhancing their grammatical and vocabulary usage.

Keywords: teaching vocabulary, integration, poetry, classroom

Procedia PDF Downloads 85
2490 Observational Study of Ionising Radiation Exposure in Orthopaedic Theatre

Authors: Adam Aboalkaz, Rana Shamoon, Duncan Meikle, James Lewis

Abstract:

Background and aims: In orthopaedic theatres, radiological screening during operations is a commonly used and useful technique to visualise and guide the operating surgeon. Within any theatre using ionising radiation, it is imperative that the use of protective equipment and the wearing of a dosimeter at all times. 1. To assess compliance with use of protective equipment during orthopaedic procedures involving ionising radiation. 2. To assess the radiation risk knowledge of staff members regularly present in an orthopaedic theatre of a national major trauma centre, in accordance to the ionising radiation regulation (2000) guidelines. Method: We conducted an Observational study of 21 operations at the University Hospital of Wales, which is a major trauma centre, recording the compliance with use of protective equipment (lead aprons and thyroid shields) and dosimeters. The observations were performed sporadically over a two week period to ensure that all staff in monitored operating theatres were not aware of the ongoing study, as to avoid bias. A questionnaire testing the knowledge of trainees and staff within the orthopaedic department was given following completion of the initial phase of the study, with 19 responses. The questions were based on knowledge of ionising radiation exposure and monitoring. The questions also tested the general staff knowledge of what equipment should be worn and where to locate such equipment. Results: This study found that only 25% of staff members were wearing thyroid protectors when less than 1 meter from the radiation source and only 50% were wearing appropriate lead aprons whilst in this same vicinity. The study also showed that 0% of all staff members used a dosimeter whilst in an area of radiation exposure. From the distributed questionnaires, only 40% of staff understood where to stand whilst radiation was being used, and only 25% of staff knew where to find protective equipment. Conclusion: Overall our audit showed poor compliance with regards to the National and local policies, due to lack of awareness of the policy and lack of basic ionising radiation exposure knowledge. It was evident from the observational study and questionnaire that staff were not fully aware of what equipment should be worn, where to find such equipment and did not appreciate that the distance from the ionising radiation source altered its exposure effect. This lack of knowledge may affect the staff health and safety after long term exposure. Changes to clinical practice: From the outcome of this study, we managed to drastically increase awareness of ionising radiation within the orthopaedic department. A mandatory teaching session on the safety of ionising radiation has been incorporated into the orthopaedic induction week for all staff. The dosimeters have been moved to a visible location within the trauma operating theatre and all staff made aware of where to find protective equipment.

Keywords: audit, ionising radiation, observational study, protection

Procedia PDF Downloads 243
2489 Antecedents of Sport Commitment: A Comparison Based on Demographic Factors

Authors: Navodita Mishra, T. J. Kamalanabhan

Abstract:

Purpose: The primary purpose of this study was to identify the antecedents of sports commitment among cricket players and to understand demographic variables that may impact these factors. Commitment towards one’s sports plays a crucial role in determining discipline and efforts of the player. Moreover, demographic variables would seem to play an important role in determining which factors or predictors have the greatest impact on commitment level. Design /methodology/approach: This study hypothesized the effect of demographic factors on sports commitment among cricket players. It attempts to examine the extent to which demographic factors can differentially motivate players to exhibit commitment towards their respective sport. Questionnaire survey method was adopted using purposive sampling technique. Using Multiple Regression, ANOVA, and t-test, the hypotheses were tested based on a sample of 350 players from Cricket Academy. Findings: Our main results from the multivariate analysis indicated that enjoyment and leadership of coach and peer affect the level of commitment to a greater extent whereas personal investment is a significant predictor of commitment among rural background players Moreover, level of sport commitment among players is positively related to household income, the rural background players participate in sports to a greater extent than the urban players, there is no evidence of regional differentials in commitment but age differences (i.e. U-19 vs. U-25) play an important role in the decision to continue the participation in sports.

Keywords: Individual Sports Commitment, demographic indicators, cricket, player motivation

Procedia PDF Downloads 461
2488 Current Perspectives of Bemitil Use in Sport

Authors: S. Ivanova, K. Ivanov

Abstract:

Bemitil (2-ethylthiobenzimidazole hydrobromide) is a synthetic adaptogen and actoprotector, with wide-ranging pharmacological activities such as nootropic, antihypoxic, antioxidant, immunostimulant. The intake of Bemitil increases mental and physical performance and could be applied under either normal or extreme conditions. Until 2017 Bemitil was not considered as doping and was used by professional athletes more than 30 years because of its high efficiency and safety. The drug was included in WADA monitoring programme for 2018, and most likely it would be included in WADA Prohibited List for 2019. Usually, a substance/method is included in WADA Prohibited List if it meets any two of the following three criteria: the potential to enhance or enhances sports performance/ potential health risk to the athlete/ violates the spirit of sport. Bemitil has high performance-enhancing potential, but it is also safe- it is controversial whether it should be considered as doping.

Keywords: doping, bemitil, sport, actoprotector

Procedia PDF Downloads 430
2487 Software Vulnerability Markets: Discoverers and Buyers

Authors: Abdullah M. Algarni, Yashwant K. Malaiya

Abstract:

Some of the key aspects of vulnerability-discovery, dissemination, and disclosure-have received some attention recently. However, the role of interaction among the vulnerability discoverers and vulnerability acquirers has not yet been adequately addressed. Our study suggests that a major percentage of discoverers, a majority in some cases, are unaffiliated with the software developers and thus are free to disseminate the vulnerabilities they discover in any way they like. As a result, multiple vulnerability markets have emerged. In some of these markets, the exchange is regulated, but in others, there is little or no regulation. In recent vulnerability discovery literature, the vulnerability discoverers have remained anonymous individuals. Although there has been an attempt to model the level of their efforts, information regarding their identities, modes of operation, and what they are doing with the discovered vulnerabilities has not been explored. Reports of buying and selling of the vulnerabilities are now appearing in the press; however, the existence of such markets requires validation, and the natures of the markets need to be analysed. To address this need, we have attempted to collect detailed information. We have identified the most prolific vulnerability discoverers throughout the past decade and examined their motivation and methods. A large percentage of these discoverers are located in Eastern and Western Europe and in the Far East. We have contacted several of them in order to collect first-hand information regarding their techniques, motivations, and involvement in the vulnerability markets. We examine why many of the discoverers appear to retire after a highly successful vulnerability-finding career. The paper identifies the actual vulnerability markets, rather than the hypothetical ideal markets that are often examined. The emergence of worldwide government agencies as vulnerability buyers has significant implications. We discuss potential factors that can impact the risk to society and the need for detailed exploration.

Keywords: risk management, software security, vulnerability discoverers, vulnerability markets

Procedia PDF Downloads 236
2486 Holistic Simulation-Based Impact Analysis Framework for Sustainable Manufacturing

Authors: Mijoh A. Gbededo, Kapila Liyanage, Sabuj Mallik

Abstract:

The emerging approaches to sustainable manufacturing are considered to be solution-oriented with the aim of addressing the environmental, economic and social issues holistically. However, the analysis of the interdependencies amongst the three sustainability dimensions has not been fully captured in the literature. In a recent review of approaches to sustainable manufacturing, two categories of techniques are identified: 1) Sustainable Product Development (SPD), and 2) Sustainability Performance Assessment (SPA) techniques. The challenges of the approaches are not only related to the arguments and misconceptions of the relationships between the techniques and sustainable development but also to the inability to capture and integrate the three sustainability dimensions. This requires a clear definition of some of the approaches and a road-map to the development of a holistic approach that supports sustainability decision-making. In this context, eco-innovation, social impact assessment, and life cycle sustainability analysis play an important role. This paper deployed an integrative approach that enabled amalgamation of sustainable manufacturing approaches and the theories of reciprocity and motivation into a holistic simulation-based impact analysis framework. The findings in this research have the potential to guide sustainability analysts to capture the aspects of the three sustainability dimensions into an analytical model. Additionally, the research findings presented can aid the construction of a holistic simulation model of a sustainable manufacturing and support effective decision-making.

Keywords: life cycle sustainability analysis, sustainable manufacturing, sustainability performance assessment, sustainable product development

Procedia PDF Downloads 158
2485 Antmicrobial Packaging, a Step Towards Safe Food: A Review

Authors: Hafiz A. Sakandar, M. Afzaal, U. Khan, M. N. Akhtar

Abstract:

Food is the primary concern of living organisms, provision of diet for maintenance of good physical and mental health is a basic right of an individual and the outcome of factors related to diet on health has been matter of apprehension since ancient times. Healthy and fresh food always demanded by the consumers. Modern research has find out many alternatives of traditional packaging. Now the consumer knows that good packaging system is that which protects the food from the contaminants and increases shelf life of food product. While in Pakistan about 40% of fruits and vegetables lost due to spoilage caused by poor handling, transportation, and poor packaging interaction with other environmental conditions. So it is crucial for developing countries like Pakistan to pay attention to these exacerbating situations for economy losses by considering food packaging an ultimate solution to the problem.

Keywords: packaging, food safety, antimicrobial, food losses

Procedia PDF Downloads 530
2484 Estimation of the Dynamic Fragility of Padre Jacinto Zamora Bridge Due to Traffic Loads

Authors: Kimuel Suyat, Francis Aldrine Uy, John Paul Carreon

Abstract:

The Philippines, composed of many islands, is connected with approximately 8030 bridges. Continuous evaluation of the structural condition of these bridges is needed to safeguard the safety of the general public. With most bridges reaching its design life, retrofitting and replacement may be needed. Concerned government agencies allocate huge costs for periodic monitoring and maintenance of these structures. The rising volume of traffic and aging of these infrastructures is challenging structural engineers to give rise for structural health monitoring techniques. Numerous techniques are already proposed and some are now being employed in other countries. Vibration Analysis is one way. The natural frequency and vibration of a bridge are design criteria in ensuring the stability, safety and economy of the structure. Its natural frequency must not be so high so as not to cause discomfort and not so low that the structure is so stiff causing it to be both costly and heavy. It is well known that the stiffer the member is, the more load it attracts. The frequency must not also match the vibration caused by the traffic loads. If this happens, a resonance occurs. Vibration that matches a systems frequency will generate excitation and when this exceeds the member’s limit, a structural failure will happen. This study presents a method for calculating dynamic fragility through the use of vibration-based monitoring system. Dynamic fragility is the probability that a structural system exceeds a limit state when subjected to dynamic loads. The bridge is modeled in SAP2000 based from the available construction drawings provided by the Department of Public Works and Highways. It was verified and adjusted based from the actual condition of the bridge. The bridge design specifications are also checked using nondestructive tests. The approach used in this method properly accounts the uncertainty of observed values and code-based structural assumptions. The vibration response of the structure due to actual loads is monitored using installed sensors on the bridge. From the determinacy of these dynamic characteristic of a system, threshold criteria can be established and fragility curves can be estimated. This study conducted in relation with the research project between Department of Science and Technology, Mapúa Institute of Technology, and the Department of Public Works and Highways also known as Mapúa-DOST Smart Bridge Project deploys Structural Health Monitoring Sensors at Zamora Bridge. The bridge is selected in coordination with the Department of Public Works and Highways. The structural plans for the bridge are also readily available.

Keywords: structural health monitoring, dynamic characteristic, threshold criteria, traffic loads

Procedia PDF Downloads 249
2483 Optimization Based Obstacle Avoidance

Authors: R. Dariani, S. Schmidt, R. Kasper

Abstract:

Based on a non-linear single track model which describes the dynamics of vehicle, an optimal path planning strategy is developed. Real time optimization is used to generate reference control values to allow leading the vehicle alongside a calculated lane which is optimal for different objectives such as energy consumption, run time, safety or comfort characteristics. Strict mathematic formulation of the autonomous driving allows taking decision on undefined situation such as lane change or obstacle avoidance. Based on position of the vehicle, lane situation and obstacle position, the optimization problem is reformulated in real-time to avoid the obstacle and any car crash.

Keywords: autonomous driving, obstacle avoidance, optimal control, path planning

Procedia PDF Downloads 352
2482 Information and Communication Technology in Architectural Education: The Challenges

Authors: Oluropo Stephen Ilesanmi, Oluwole Ayodele Alejo

Abstract:

Architectural education, beyond training the students to become architects, impacts in them the appreciation of the responsibilities relating to public health, safety, and welfare. Architecture is no longer a personal philosophical or aesthetic pursuit by individuals, rather, it has to consider everyday needs of the people and use technology to give a liveable environment. In the present age, architectural education must have to grapple with the recent integration of technology, in particular, facilities offered by information and communication technology. Electronic technologies have moved architecture from the drawing board to cyberspace. The world is now a global village in which new information and methods are easily and quickly available to people at different poles of the globe. It is the position of this paper that in order to remain relevant in the ever-competing forces within the building industry, architectural education must show the impetus to continue to draw from technological advancements associated with the use of computers.

Keywords: architecture, education, communication, information, technology

Procedia PDF Downloads 185
2481 An Examination of the Role of Perceived Leadership Styles on Job Satisfaction among Selected Bank Employees

Authors: Solomon Ojo

Abstract:

The study set out to investigate the role of perceived leadership style on achievement motivation of selected bank employees. The study was a cross-sectional survey. A total of 585 bank workers took part in the study; 283 (48.4%) were males while 302% (51.6%) were females. Mean age of 31.8 yrs (SD = 7.8 yrs) was reported for the participants for the study. Questionnaires were used for data collection. Data was analyzed using both descriptive and inferential statistic. The t- test for independent measures was used to test all the hypotheses, using the statistical package for social sciences version 21.0. The results in the study revealed that bank employees who perceived their leaders as high on consideration style of leadership reported more job satisfaction than bank employees who perceived their leaders as low on consideration style of leadership [t(583) = 16.43, p<.001]; bank employees who perceived their leaders as high in initiating structure style reported more job satisfaction than bank employees who perceived their leaders as low in initiating structure style [t(583)=12.06, p<.01]. The results showed further the influence of perceived leadership styles on all measures of job satisfaction. First, the result showed that bank employees who perceived their leaders as high on consideration style reported more satisfaction with hours worked each day than bank employees who perceived their leaders as low on consideration style [t(583) = 9.23, p<.01]. Second, the results revealed that bank employees who perceived their leaders as high on consideration style reported more satisfaction with flexibility in scheduling than bank employees who perceived their leaders as low on consideration style [t(583) = 8.80, p<.01]. Third, it was shown that bank employees who perceived their leaders as high on consideration style reported more satisfaction with location of work than bank employees who perceived their leaders as low on consideration style [t(583) = 14.17, p<.01] e.t.c. The results were extensively discussed in relation to relevant body of literature.

Keywords: leadership styles, job satisfaction, bank employees, perceived

Procedia PDF Downloads 200
2480 Road Accidents to School Children’s in Dar Es Salaam, Tanzania

Authors: Kabuga Daniel

Abstract:

Road accidents resulting to deaths and injuries have become a new public health challenge especially in developing countries including Tanzania. Reports from Tanzania Traffic Police Force shows that last year 2016 accidents increased compare to previous year 2015, accident happened from 3710 up to 5219, accidents and safety data indicate that children are the most vulnerable to road crashes where 78 pupils died and 182 others were seriously injured in separate roads accident last year. A survey done by Amend indicates that Pupil mode of transport in Dar es salaam schools are by walk 87%, bus 9.21%, car 1.32%, motorcycle 0.88%, 3-wheeler 0.24%, train 0.14%, bicycle 0.10%, ferry 0.07%, and combined mode 0.44%. According to this study, majority of school children’s uses walking mode, most of school children’s agreed to continue using walking mode and request to have signs for traffic control during crossing road like STOP sign and CHILD CROSSING sign for safe crossing. Because children not only sit inside this buses (Daladala) but also they walk in a group to/from school, and few (33.2%) parents or adults are willing to supervise their children’s during working to school while 50% of parents agree to let their children walking alone to school if the public transport started from nearby street. The study used both qualitative and quantitative methods of research by conducting physical surveying on sample districts. The main objectives of this research are to carries out all factors affecting school children’s when they use public road, to promote and encourage the safe use of public road by all classes especially pupil or student through the circulation of advice, information and knowledge gain from research and to recommends future direction for the developments for road design or plan to vulnerable users. The research also critically analyze the problems causing death and injuries to school children’s in Dar es Salaam Region. This study determines the relationship between road traffic accidents and factors, such as socio-economic, status, and distance from school, number of sibling, behavioral problems, knowledge and attitudes of public and their parents towards road safety and parent educational study traffic. The study comes up with some of recommendations including Infrastructure Improvements like, safe footpaths, Safe crossings, Speed humps, Speed limits, Road signs. However, Planners and policymakers wishing to increase walking and cycling among children need to consider options that address distance constraints, the land use planners and transport professionals use better understanding of the various factors that affect children’s choices of school travel mode, results suggest that all school travel attributes should be considered during school location.

Keywords: accidents, childrens, school, Tanzania

Procedia PDF Downloads 219
2479 Safety Validation of Black-Box Autonomous Systems: A Multi-Fidelity Reinforcement Learning Approach

Authors: Jared Beard, Ali Baheri

Abstract:

As autonomous systems become more prominent in society, ensuring their safe application becomes increasingly important. This is clearly demonstrated with autonomous cars traveling through a crowded city or robots traversing a warehouse with heavy equipment. Human environments can be complex, having high dimensional state and action spaces. This gives rise to two problems. One being that analytic solutions may not be possible. The other is that in simulation based approaches, searching the entirety of the problem space could be computationally intractable, ruling out formal methods. To overcome this, approximate solutions may seek to find failures or estimate their likelihood of occurrence. One such approach is adaptive stress testing (AST) which uses reinforcement learning to induce failures in the system. The premise of which is that a learned model can be used to help find new failure scenarios, making better use of simulations. In spite of these failures AST fails to find particularly sparse failures and can be inclined to find similar solutions to those found previously. To help overcome this, multi-fidelity learning can be used to alleviate this overuse of information. That is, information in lower fidelity can simulations can be used to build up samples less expensively, and more effectively cover the solution space to find a broader set of failures. Recent work in multi-fidelity learning has passed information bidirectionally using “knows what it knows” (KWIK) reinforcement learners to minimize the number of samples in high fidelity simulators (thereby reducing computation time and load). The contribution of this work, then, is development of the bidirectional multi-fidelity AST framework. Such an algorithm, uses multi-fidelity KWIK learners in an adversarial context to find failure modes. Thus far, a KWIK learner has been used to train an adversary in a grid world to prevent an agent from reaching its goal; thus demonstrating the utility of KWIK learners in an AST framework. The next step is implementation of the bidirectional multi-fidelity AST framework described. Testing will be conducted in a grid world containing an agent attempting to reach a goal position and adversary tasked with intercepting the agent as demonstrated previously. Fidelities will be modified by adjusting the size of a time-step, with higher-fidelity effectively allowing for more responsive closed loop feedback. Results will compare the single KWIK AST learner with the multi-fidelity algorithm with respect to number of samples, distinct failure modes found, and relative effect of learning after a number of trials.

Keywords: multi-fidelity reinforcement learning, multi-fidelity simulation, safety validation, falsification

Procedia PDF Downloads 135
2478 Optimizing Coal Yard Management Using Discrete Event Simulation

Authors: Iqbal Felani

Abstract:

A Coal-Fired Power Plant has some integrated facilities to handle coal from three separated coal yards to eight units power plant’s bunker. But nowadays the facilities are not reliable enough for supporting the system. Management planned to invest some facilities to increase the reliability. They also had a plan to make single spesification of coal used all of the units, called Single Quality Coal (SQC). This simulation would compare before and after improvement with two scenarios i.e First In First Out (FIFO) and Last In First Out (LIFO). Some parameters like stay time, reorder point and safety stock is determined by the simulation. Discrete event simulation based software, Flexsim 5.0, is used to help the simulation. Based on the simulation, Single Quality Coal with FIFO scenario has the shortest staytime with 8.38 days.

Keywords: Coal Yard Management, Discrete event simulation First In First Out, Last In First Out.

Procedia PDF Downloads 651
2477 Preliminary Evaluation of Passive UHF-Band RFID for Identifying Floating Objects on the Sea

Authors: Yasuhiro Sato, Kodai Noma, Kenta Sawada, Kazumasa Adachi, Yoshinori Matsuura, Saori Iwanaga

Abstract:

RFID system is used to identify objects such as passenger identification in public transportation, instead of linear or 2-dimensional barcodes. Key advantages of RFID system are to identify objects without physical contact, and to write arbitrary information into RFID tag. These advantages may help to improve maritime safety and efficiency of activity on the sea. However, utilization of RFID system for maritime scenes has not been considered. In this paper, we evaluate the availability of a generic RFID system operating on the sea. We measure RSSI between RFID tag floating on the sea and RFID antenna, and check whether a RFID reader can access a tag or not, while the distance between a floating buoy and the ship, and the angle are changed. Finally, we discuss the feasibility and the applicability of RFID system on the sea through the results of our preliminary experiment.

Keywords: RFID, experimental evaluation, RSSI, maritime use

Procedia PDF Downloads 559
2476 The Financial Impact of Covid 19 on the Hospitality Industry in New Zealand

Authors: Kay Fielden, Eelin Tan, Lan Nguyen

Abstract:

In this research project, data was gathered at a Covid 19 Conference held in June 2021 from industry leaders who discussed the impact of the global pandemic on the status of the New Zealand hospitality industry. Panel discussions on financials, human resources, health and safety, and recovery were conducted. The themes explored for the finance panel were customer demographics, hospitality sectors, financial practices, government impact, and cost of compliance. The aim was to see how the hospitality industry has responded to the global pandemic and the steps that have been taken for the industry to recover or sustain their business. The main research question for this qualitative study is: What are the factors that have impacted on finance for the hospitality industry in New Zealand due to Covid 19? For financials, literature has been gathered to study global effects, and this is being compared with the data gathered from the discussion panel through the lens of resilience theory. Resilience theory applied to the hospitality industry suggests that the challenges imposed by Covid 19 have been the catalyst for government initiatives, technical innovation, engaging local communities, and boosting confidence. Transformation arising from these ground shifts have been a move towards sustainability, wellbeing, more awareness of climate change, and community engagement. Initial findings suggest that there has been a shift in customer base that has prompted regional accommodation providers to realign offers and to become more flexible to attract and maintain this realigned customer base. Dynamic pricing structures have been required to meet changing customer demographics. Flexible staffing arrangements include sharing staff between different accommodation providers, owners with multiple properties adopting different staffing arrangements, maintaining a good working relationship with the bank, and conserving cash. Uncertain times necessitate changing revenue strategies to cope with external factors. Financial support offered by the government has cushioned the financial downturn for many in the hospitality industry, and managed isolation and quarantine (MIQ) arrangements have offered immediate financial relief for those hotels involved. However, there is concern over the long-term effects. Compliance with mandated health and safety requirements has meant that the hospitality industry has streamlined its approach to meeting those requirements and has invested in customer relations to keep paying customers informed of the health measures in place. Initial findings from this study lie within the resilience theory framework and are consistent with findings from the literature.

Keywords: global pandemic, hospitality industry, new Zealand, resilience

Procedia PDF Downloads 83
2475 Revolutionizing Higher Education: AI-Powered Gamification for Enhanced Learning

Authors: Gina L. Solano

Abstract:

This project endeavors to enhance learning experiences for undergraduate pre-service teachers and graduate K-12 educators by leveraging artificial intelligence (AI). Firstly, the initiative delves into integrating AI within undergraduate education courses, fostering traditional literacy skills essential for academic success and extending their applicability beyond the classroom. Education students will explore AI tools to design literacy-focused activities aligned with their curriculum. Secondly, the project investigates the utilization of AI to craft instructional materials employing gamification strategies (e.g., digital and classic games, badges, quests) to amplify student engagement and motivation in mastering course content. Lastly, it aims to create a professional repertoire that can be applied by pre-service and current teachers in P-12 classrooms, promoting seamless integration for those already in teaching positions. The project's impact extends to benefiting college students, including pre-service and graduate teachers, as they enhance literacy and digital skills through AI. It also benefits current P-12 educators who can integrate AI into their classrooms, fostering innovative teaching practices. Moreover, the project contributes to faculty development, allowing them to cultivate low-risk and engaging classroom environments, ultimately enriching the learning journey. The insights gained from this project can be shared within and beyond the discipline to advance the broader field of study.

Keywords: artificial intelligence, gamification, learning experiences, literacy skills, engagement

Procedia PDF Downloads 33
2474 Design and Implementation of a Memory Safety Isolation Method Based on the Xen Cloud Environment

Authors: Dengpan Wu, Dan Liu

Abstract:

In view of the present cloud security problem has increasingly become one of the major obstacles hindering the development of the cloud computing, put forward a kind of memory based on Xen cloud environment security isolation technology implementation. And based on Xen virtual machine monitor system, analysis of the model of memory virtualization is implemented, using Xen memory virtualization system mechanism of super calls and grant table, based on the virtual machine manager internal implementation of access control module (ACM) to design the security isolation system memory. Experiments show that, the system can effectively isolate different customer domain OS between illegal access to memory data.

Keywords: cloud security, memory isolation, xen, virtual machine

Procedia PDF Downloads 383
2473 Analytical Study of the Structural Response to Near-Field Earthquakes

Authors: Isidro Perez, Maryam Nazari

Abstract:

Numerous earthquakes, which have taken place across the world, led to catastrophic damage and collapse of structures (e.g., 1971 San Fernando; 1995 Kobe-Japan; and 2010 Chile earthquakes). Engineers are constantly studying methods to moderate the effect this phenomenon has on structures to further reduce damage, costs, and ultimately to provide life safety to occupants. However, there are regions where structures, cities, or water reservoirs are built near fault lines. When an earthquake occurs near the fault lines, they can be categorized as near-field earthquakes. In contrary, a far-field earthquake occurs when the region is further away from the seismic source. A near-field earthquake generally has a higher initial peak resulting in a larger seismic response, when compared to a far-field earthquake ground motion. These larger responses may result in serious consequences in terms of structural damage which can result in a high risk for the public’s safety. Unfortunately, the response of structures subjected to near-field records are not properly reflected in the current building design specifications. For example, in ASCE 7-10, the design response spectrum is mostly based on the far-field design-level earthquakes. This may result in the catastrophic damage of structures that are not properly designed for near-field earthquakes. This research investigates the knowledge that the effect of near-field earthquakes has on the response of structures. To fully examine this topic, a structure was designed following the current seismic building design specifications, e.g. ASCE 7-10 and ACI 318-14, being analytically modeled, utilizing the SAP2000 software. Next, utilizing the FEMA P695 report, several near-field and far-field earthquakes were selected, and the near-field earthquake records were scaled to represent the design-level ground motions. Upon doing this, the prototype structural model, created using SAP2000, was subjected to the scaled ground motions. A Linear Time History Analysis and Pushover analysis were conducted on SAP2000 for evaluation of the structural seismic responses. On average, the structure experienced an 8% and 1% increase in story drift and absolute acceleration, respectively, when subjected to the near-field earthquake ground motions. The pushover analysis was ran to find and aid in properly defining the hinge formation in the structure when conducting the nonlinear time history analysis. A near-field ground motion is characterized by a high-energy pulse, making it unique to other earthquake ground motions. Therefore, pulse extraction methods were used in this research to estimate the maximum response of structures subjected to near-field motions. The results will be utilized in the generation of a design spectrum for the estimation of design forces for buildings subjected to NF ground motions.

Keywords: near-field, pulse, pushover, time-history

Procedia PDF Downloads 124
2472 Risk Based Inspection and Proactive Maintenance for Civil and Structural Assets in Oil and Gas Plants

Authors: Mohammad Nazri Mustafa, Sh Norliza Sy Salim, Pedram Hatami Abdullah

Abstract:

Civil and structural assets normally have an average of more than 30 years of design life. Adding to this advantage, the assets are normally subjected to slow degradation process. Due to the fact that repair and strengthening work for these assets are normally not dependent on plant shut down, the maintenance and integrity restoration of these assets are mostly done based on “as required” and “run to failure” basis. However unlike other industries, the exposure in oil and gas environment is harsher as the result of corrosive soil and groundwater, chemical spill, frequent wetting and drying, icing and de-icing, steam and heat, etc. Due to this type of exposure and the increasing level of structural defects and rectification in line with the increasing age of plants, assets integrity assessment requires a more defined scope and procedures that needs to be based on risk and assets criticality. This leads to the establishment of risk based inspection and proactive maintenance procedure for civil and structural assets. To date there is hardly any procedure and guideline as far as integrity assessment and systematic inspection and maintenance of civil and structural assets (onshore) are concerned. Group Technical Solutions has developed a procedure and guideline that takes into consideration credible failure scenario, assets risk and criticality from process safety and structural engineering perspective, structural importance, modeling and analysis among others. Detailed inspection that includes destructive and non-destructive tests (DT & NDT) and structural monitoring is also being performed to quantify defects, assess severity and impact on integrity as well as identify the timeline for integrity restoration. Each defect and its credible failure scenario is assessed against the risk on people, environment, reputation and production loss. This technical paper is intended to share on the established procedure and guideline and their execution in oil & gas plants. In line with the overall roadmap, the procedure and guideline will form part of specialized solutions to increase production and to meet the “Operational Excellence” target while extending service life of civil and structural assets. As the result of implementation, the management of civil and structural assets is now more systematically done and the “fire-fighting” mode of maintenance is being gradually phased out and replaced by a proactive and preventive approach. This technical paper will also set the criteria and pose the challenge to the industry for innovative repair and strengthening methods for civil & structural assets in oil & gas environment, in line with safety, constructability and continuous modification and revamp of plant facilities to meet production demand.

Keywords: assets criticality, credible failure scenario, proactive and preventive maintenance, risk based inspection

Procedia PDF Downloads 378
2471 Integration of FMEA and Human Factor in the Food Chain Risk Assessment

Authors: Mohsen Shirani, Micaela Demichela

Abstract:

During the last decades, a number of food crises such as Bovine Spongiform Encephalopathy (BSE), Mad-Cow disease, Dioxin in chicken food, Food-and-Mouth Disease (FMD), have certainly inflicted the reliability of the food industry. Consequently, the trend in applying different scientific methods of risk assessment in food safety has obtained more attentions in the academic and practice. However, lack of practical approach considering entire food supply chain is tangible in the academic literature. In this regard, this paper aims to apply risk assessment tool (FMEA) with integration of Human Factor along the entire supply chain of food production and test the method in a case study of Diary production, and analyze its results.

Keywords: FMEA, food supply chain, risk assessment, human factor

Procedia PDF Downloads 417
2470 TACTICAL: Ram Image Retrieval in Linux Using Protected Mode Architecture’s Paging Technique

Authors: Sedat Aktas, Egemen Ulusoy, Remzi Yildirim

Abstract:

This article explains how to get a ram image from a computer with a Linux operating system and what steps should be followed while getting it. What we mean by taking a ram image is the process of dumping the physical memory instantly and writing it to a file. This process can be likened to taking a picture of everything in the computer’s memory at that moment. This process is very important for tools that analyze ram images. Volatility can be given as an example because before these tools can analyze ram, images must be taken. These tools are used extensively in the forensic world. Forensic, on the other hand, is a set of processes for digitally examining the information on any computer or server on behalf of official authorities. In this article, the protected mode architecture in the Linux operating system is examined, and the way to save the image sample of the kernel driver and system memory to disk is followed. Tables and access methods to be used in the operating system are examined based on the basic architecture of the operating system, and the most appropriate methods and application methods are transferred to the article. Since there is no article directly related to this study on Linux in the literature, it is aimed to contribute to the literature with this study on obtaining ram images. LIME can be mentioned as a similar tool, but there is no explanation about the memory dumping method of this tool. Considering the frequency of use of these tools, the contribution of the study in the field of forensic medicine has been the main motivation of the study due to the intense studies on ram image in the field of forensics.

Keywords: linux, paging, addressing, ram-image, memory dumping, kernel modules, forensic

Procedia PDF Downloads 86
2469 Geotechnical Engineering Solutions for Adaptation

Authors: Johnstone Walubengo Wangusi

Abstract:

Geotechnical engineering is a multidisciplinary field that encompasses the study of soil, rock, and groundwater properties and their interactions with civil engineering structures. This research paper provides an in-depth overview of geotechnical engineering, covering its fundamental principles, applications in civil infrastructure projects, and the challenges faced by practitioners in the field. Through a comprehensive examination of soil mechanics, foundation design, slope stability analysis, and geotechnical site investigation techniques, this paper aims to highlight the importance of geotechnical engineering in ensuring the safety, stability, and sustainability of infrastructure development. Additionally, it discusses emerging trends, innovative technologies, and future directions in geotechnical engineering research and practice.

Keywords: sustainable geotechnical engineering solutions, education and training for future generations geotechnical engineers, integration of geotechnical engineering and structural engineering, use of AI in geotechnical engineering modelling

Procedia PDF Downloads 28
2468 Wind Turbine Control Performance Evaluation Based on Minimum-Variance Principles

Authors: Zheming Cao

Abstract:

Control loops are the most important components in the wind turbine system. Product quality, operation safety, and the economic performance are directly or indirectly connected to the performance of control systems. This paper proposed a performance evaluation method based on minimum-variance for wind turbine control system. This method can be applied on PID controller for pitch control system in the wind turbine. The good performance result demonstrated in the paper was achieved by retuning and optimizing the controller settings based on the evaluation result. The concepts presented in this paper are illustrated with the actual data of the industrial wind farm.

Keywords: control performance, evaluation, minimum-variance, wind turbine

Procedia PDF Downloads 346