Search results for: security service
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6007

Search results for: security service

3877 Introduce a New Model of Anomaly Detection in Computer Networks Using Artificial Immune Systems

Authors: Mehrshad Khosraviani, Faramarz Abbaspour Leyl Abadi

Abstract:

The fundamental component of the computer network of modern information society will be considered. These networks are connected to the network of the internet generally. Due to the fact that the primary purpose of the Internet is not designed for, in recent decades, none of these networks in many of the attacks has been very important. Today, for the provision of security, different security tools and systems, including intrusion detection systems are used in the network. A common diagnosis system based on artificial immunity, the designer, the Adhasaz Foundation has been evaluated. The idea of using artificial safety methods in the diagnosis of abnormalities in computer networks it has been stimulated in the direction of their specificity, there are safety systems are similar to the common needs of m, that is non-diagnostic. For example, such methods can be used to detect any abnormalities, a variety of attacks, being memory, learning ability, and Khodtnzimi method of artificial immune algorithm pointed out. Diagnosis of the common system of education offered in this paper using only the normal samples is required for network and any additional data about the type of attacks is not. In the proposed system of positive selection and negative selection processes, selection of samples to create a distinction between the colony of normal attack is used. Copa real data collection on the evaluation of ij indicates the proposed system in the false alarm rate is often low compared to other ir methods and the detection rate is in the variations.

Keywords: artificial immune system, abnormality detection, intrusion detection, computer networks

Procedia PDF Downloads 337
3876 The Influence of Production Hygiene Training on Farming Practices Employed by Rural Small-Scale Organic Farmers - South Africa

Authors: Mdluli Fezile, Schmidt Stefan, Thamaga-Chitja Joyce

Abstract:

In view of the frequently reported foodborne disease outbreaks caused by contaminated fresh produce, consumers have a preference for foods that meet requisite hygiene standards to reduce the risk of foodborne illnesses. Producing good quality fresh produce then becomes critical in improving market access and food security, especially for small-scale farmers. Questions of hygiene and subsequent microbiological quality in the rural small-scale farming sector of South Africa are even more crucial, given the policy drive to develop small-scale farming as a measure for reinforcement of household food security and reduction of poverty. Farming practices and methods, throughout the fresh produce value chain, influence the quality of the final product, which in turn determines its success in the market. This study’s aim was to therefore determine the extent to which training on organic farming methods, including modules such as Importance of Production Hygiene, influenced the hygienic farming practices employed by eTholeni small-scale organic farmers in uMbumbulu, KwaZulu-Natal- South Africa. Questionnaires were administered to 73 uncertified organic farmers and analysis showed that a total of 33 farmers were trained and supplied the local Agri-Hub while 40 had not received training. The questionnaire probed respondents’ attitudes, knowledge of hygiene and composting practices. Data analysis included descriptive statistics such as the Chi-square test and a logistic regression model. Descriptive analysis indicated that a majority of the farmers (60%) were female, most of which (73%) were above the age of 40. The logistic regression indicated that factors such as farmer training and prior experience in the farming sector had a significant influence on hygiene practices both at 5% significance levels. These results emphasize the importance of training, education and farming experience in implementing good hygiene practices in small-scale farming. It is therefore recommended that South African policies should advocate for small-scale farmer training, not only for subsistence purposes, but also with an aim of supplying produce markets with high fresh produce.

Keywords: small-scale farmers, leafy salad vegetables, organic produce, food safety, hygienic practices, food security

Procedia PDF Downloads 404
3875 Management of Myofascial Temporomandibular Disorder in Secondary Care: A Quality Improvement Project

Authors: Rishana Bilimoria, Selina Tang, Sajni Shah, Marianne Henien, Christopher Sproat

Abstract:

Temporomandibular disorders (TMD) may affect up to a third of the general population, and there is evidence demonstrating the majority of Myofascial TMD cases improve after education and conservative measures. In 2015 our department implemented a modified care pathway for myofascial TMD patients in an attempt to improve the patient journey. This involved the use of an interactive group therapy approach to deliver education, reinforce conservative measures and promote self-management. Patient reported experience measures from the new group clinic revealed 71% patient satisfaction. This service is efficient in improving aspects of health status while reducing health-care costs and redistributing clinical time. Since its’ establishment, 52 hours of clinical time, resources and funding have been redirected effectively. This Quality Improvement Project was initiated because it was felt that this new service was being underutilised by our surgical teams. The ‘Plan-Do-Study-Act cycle’ (PDSA) framework was employed to analyse utilisation of the service: The ‘plan’ stage involved outlining our aims: to raise awareness amongst clinicians of the unified care pathway and to increase referral to this clinic. The ‘do’ stage involved collecting data from a sample of 96 patients over 4 month period to ascertain the proportion of Myofascial TMD patients who were correctly referred to the designated clinic. ‘Suitable’ patients who weren’t referred were identified. The ‘Study’ phase involved analysis of results, which revealed that 77% of suitable patients weren’t referred to the designated clinic. They were reviewed on other clinics, which are often overbooked, or managed by junior staff members. This correlated with our original prediction. Barriers to referral included: lack of awareness of the clinic, individual consultant treatment preferences and patient, reluctance to be referred to a ‘group’ clinic. The ‘Act’ stage involved presenting our findings to the team at a clinical governance meeting. This included demonstration of the clinical effectiveness of the care-pathway and explaining the referral route and criteria. In light of the evaluation results, it was decided to keep the group clinic and maximize utilisation. The second cycle of data collection following these changes revealed that of 66 Myofascial TMD patients over a 4 month period, only 9% of suitable patients were not seen via the designated pathway; therefore this QIP was successful in meeting the set objectives. Overall, employing the PDSA cycle in this QIP resulted in appropriate utilisation of the modified care pathway for patients with myofascial TMD in Guy’s Oral Surgery Department. In turn, this leads to high patient satisfaction with the service and effectively redirected 52 hours of clinical time. It permitted adoption of a collaborative working style with oral surgery colleagues to investigate problems, identify solutions, and collectively raise standards of clinical care to ensure we adopt a unified care pathway in secondary care management of Myofascial TMD patients.

Keywords: myofascial, quality Improvement, PDSA, TMD

Procedia PDF Downloads 124
3874 Teachers’ Language Insecurity in English as a Second Language Instruction: Developing Effective In-Service Training

Authors: Mamiko Orii

Abstract:

This study reports on primary school second language teachers’ sources of language insecurity. Furthermore, it aims to develop an in-service training course to reduce anxiety and build sufficient English communication skills. Language/Linguistic insecurity refers to a lack of confidence experienced by language speakers. In particular, second language/non-native learners often experience insecurity, influencing their learning efficacy. While language learner insecurity has been well-documented, research on the insecurity of language teaching professionals is limited. Teachers’ language insecurity or anxiety in target language use may adversely affect language instruction. For example, they may avoid classroom activities requiring intensive language use. Therefore, understanding teachers’ language insecurity and providing continuing education to help teachers to improve their proficiency is vital to improve teaching quality. This study investigated Japanese primary school teachers’ language insecurity. In Japan, teachers are responsible for teaching most subjects, including English, which was recently added as compulsory. Most teachers have never been professionally trained in second language instruction during college teacher certificate preparation, leading to low confidence in English teaching. Primary source of language insecurity is a lack of confidence regarding English communication skills. Their actual use of English in classrooms remains unclear. Teachers’ classroom speech remains a neglected area requiring improvement. A more refined programme for second language teachers could be constructed if we can identify areas of need. Two questionnaires were administered to primary school teachers in Tokyo: (1) Questionnaire A: 396 teachers answered questions (using a 5-point scale) concerning classroom teaching anxiety and general English use and needs for in-service training (Summer 2021); (2) Questionnaire B: 20 teachers answered detailed questions concerning their English use (Autumn 2022). Questionnaire A’s responses showed that over 80% of teachers have significant language insecurity and anxiety, mainly when speaking English in class or teaching independently. Most teachers relied on a team-teaching partner (e.g., ALT) and avoided speaking English. Over 70% of the teachers said they would like to participate in training courses in classroom English. Questionnaire B’s results showed that teachers could use simple classroom English, such as greetings and basic instructions (e.g., stand up, repeat after me), and initiate conversation (e.g., asking questions). In contrast, teachers reported that conversations were mainly carried on in a simple question-answer style. They had difficulty continuing conversations. Responding to learners’ ‘on-the-spot’ utterances was particularly difficult. Instruction in turn-taking patterns suitable in the classroom communication context is needed. Most teachers received grammar-based instruction during their entire English education. They were predominantly exposed to displayed questions and form-focused corrective feedback. Therefore, strategies such as encouraging teachers to ask genuine questions (i.e., referential questions) and responding to students with content feedback are crucial. When learners’ utterances are incorrect or unsatisfactory, teachers should rephrase or extend (recast) them instead of offering explicit corrections. These strategies support a continuous conversational flow. These results offer benefits beyond Japan’s English as a second Language context. They will be valuable in any context where primary school teachers are underprepared but must provide English-language instruction.

Keywords: english as a second/non-native language, in-service training, primary school, teachers’ language insecurity

Procedia PDF Downloads 54
3873 A Discrete Event Simulation Model to Manage Bed Usage for Non-Elective Admissions in a Geriatric Medicine Speciality

Authors: Muhammed Ordu, Eren Demir, Chris Tofallis

Abstract:

Over the past decade, the non-elective admissions in the UK have increased significantly. Taking into account limited resources (i.e. beds), the related service managers are obliged to manage their resources effectively due to the non-elective admissions which are mostly admitted to inpatient specialities via A&E departments. Geriatric medicine is one of specialities that have long length of stay for the non-elective admissions. This study aims to develop a discrete event simulation model to understand how possible increases on non-elective demand over the next 12 months affect the bed occupancy rate and to determine required number of beds in a geriatric medicine speciality in a UK hospital. In our validated simulation model, we take into account observed frequency distributions which are derived from a big data covering the period April, 2009 to January, 2013, for the non-elective admission and the length of stay. An experimental analysis, which consists of 16 experiments, is carried out to better understand possible effects of case studies and scenarios related to increase on demand and number of bed. As a result, the speciality does not achieve the target level in the base model although the bed occupancy rate decreases from 125.94% to 96.41% by increasing the number of beds by 30%. In addition, the number of required beds is more than the number of beds considered in the scenario analysis in order to meet the bed requirement. This paper sheds light on bed management for service managers in geriatric medicine specialities.

Keywords: bed management, bed occupancy rate, discrete event simulation, geriatric medicine, non-elective admission

Procedia PDF Downloads 207
3872 Challenges Faced by Teachers during Teaching with Developmental Disable Students at Primary Level in Lahore

Authors: Zikra Faiz, Nisar Abid, Muhammad Waqas

Abstract:

This study aim to examine the challenges faced by teachers during teaching to those students who are intellectually disable, suffering from autism spectrum disorder, learning disability, and ADHD at the primary level. The descriptive research design of quantitative approach was adopted to conduct this study; a cross-sectional survey method was used to collect data. The sample was comprised of 258 (43 male and 215 female) teachers who teach at special education institutes of Lahore district selected through proportionate stratified random sampling technique. Self-developed questionnaire was used which was comprised of 22 closed-ended items. Collected data were analyzed through descriptive and inferential statistical techniques by using Statistical Package for Social Sciences (SPSS) version 21. Results show that teachers faced problems during group activities, to handle bad behavior and different disabilities of students. It is concluded that there was a significant difference between male and female teachers perceptions about challenges faced during teaching with developmental disable students. Furthermore, there was a significant difference exist in the perceptions of teachers regarding challenges faced during teaching to students with developmental disabilities in term of teachers’ age and area of specialization. It is recommended that developmentally disable student require extra attention so that, teacher should trained through pre-service and in-service training to teach developmentally disabled students.

Keywords: intellectual disability, autism spectrum disorder, ADHD, learning disability

Procedia PDF Downloads 113
3871 Using Customer Satisfaction to Help Achieve Sustainable Development Goals in the Islamic Economy: A Quantitative Case Study from Amman, Jordan

Authors: Sarah A. Tobin

Abstract:

Social justice outcomes, derived from customer satisfaction, serve as a main pathway and conduit for achieving Sustainable Development Goals (SDGs) because they prompt democratizing and socially-inclusive effects that are consistent with Islamic economic values. This paper argues that achieving higher levels of social justice and the SGDs is possible only through the realization of Islamic banking and finance customer satisfaction that aligns with Islamic values in the tradition of the Shari`a (or Islamic law). Through this key manifestation of Shari`a in the banks, social justice aims of achieving SDGs become possible. This paper utilizes a case study of a large-scale survey (N=127) comparing customer satisfaction between a conventional and an Islamic bank in Amman, Jordan. Based on a series of linear regressions, the statistically-significant findings suggest that when overall customer satisfaction is high, customers are more likely to become empowered citizens demanding inclusive, quality services and corruption-free management, as well as attribute their experiences to the Islamic nature of the financial endeavors. Social justice interests and expectations increase (and SDGs are more likely met) when a customer has high levels of satisfaction. The paper concludes with policy recommendations for Islamic financial institutions that enhance customer service experiences for better achieving the social justice aims of the Islamic economy and SDGs, including transparency in transactions, exemplary customer service and follow up, and attending to Islamic values in the aesthetics of bank.

Keywords: customer satisfaction, Islamic economy, social justice, sustainable development goals

Procedia PDF Downloads 322
3870 Customer Satisfaction with Artificial Intelligence-Based Service in Catering Industry: Empirical Study on Smart Kiosks

Authors: Mai Anh Tuan, Wenlong Liu, Meng Li

Abstract:

Despite warnings and concerns about the use of fast food that has health effects, the fast-food industry is actually a source of profit for the global food industry. Obviously, in the face of such huge economic benefits, investors will not hesitate to continuously add recipes, processing methods, menu diversity, etc., to improve and apply information technology in enhancing the diners' experience; the ultimate goal is still to attract diners to find their brand and give them the fastest, most convenient and enjoyable service. In China, as the achievements of the industrial revolution 4.0, big data and artificial intelligence are reaching new heights day by day, now fast-food diners can instantly pay the bills only by identifying the biometric signature available on the self-ordering kiosk, using their own face without any additional form of confirmation. In this study, the author will evaluate the acceptance level of customers with this new form of payment through a survey of customers who have used and witnessed the use of smart kiosks and biometric payments within the city of Nanjing, China. A total of 200 valid volunteers were collected in order to test the customers' intentions and feelings when choosing and experiencing payment through AI services. 55% think that it bothers them because of the need for personal information, but more than 70% think that smart kiosk brings out many benefits and convenience. According to the data analysis findings, perceived innovativeness has a positive influence on satisfaction which in turn affects behavioral intentions, including reuse and word-of-mouth intentions.

Keywords: artificial intelligence, catering industry, smart kiosks, technology acceptance

Procedia PDF Downloads 79
3869 Protecting Labor Rights in the Platform Economy: Legal Challenges and Innovative Explorations

Authors: Ruwen Pei

Abstract:

In the rapidly evolving landscape of the digital economy, platform employment has emerged as a transformative labor force, fundamentally altering the traditional paradigms of the employer-employee relationship. This paper provides a comprehensive analysis of the unique dynamics and intricate legal challenges associated with platform work, where workers often navigate precarious labor conditions without the robust safety nets typically afforded in traditional industries. It underscores the limitations of current labor regulations, particularly in addressing pressing concerns such as income volatility and disparate benefits. By drawing insights from diverse global case studies, this study emphasizes the compelling need for platform companies to shoulder their social welfare responsibilities, ensuring fair treatment and security for their workers. Moreover, it critically examines the profound influence of socio-cultural factors and educational awareness on the platform economy, shedding light on the complexities of this emerging labor landscape. Advocating for a harmonious equilibrium between flexibility and security, this paper calls for substantial legal reforms and innovative policy initiatives that can adapt to the evolving nature of work in the digital age. Finally, it anticipates forthcoming trends in the digital economy and platform labor relations, underscoring the significance of proactive adaptation to foster equitable and inclusive employment practices.

Keywords: platform employment, labor protections, social welfare, legal reforms, digital economy

Procedia PDF Downloads 44
3868 21st Century Gunboat Diplomacy and Strategic Sea Areas

Authors: Mustafa Avsever

Abstract:

Throughout history, states have attached great importance to seas in terms of economic and security. Advanced civilizations have always founded in coastal regions. Over time, human being has tended to trade and naturally always aimed get more and more. Seas by covering 71% of the earth, provide the greatest economic opportunities for access to raw material resources and the world market. As a result, seas have become the most important areas of conflict over the course of time. Coastal states, use seas as a tool for defense zone, trade, marine transportation and power transfer, they have acquired colonies overseas and increased their capital, raw materials and labor. Societies, have increased their economic prosperity, though their navies in order to retain their welfare and achieve their foreign policy objectives. Sometimes they have imposed their demands through the use or threat of limited naval force in accordance with their interests that is gunboat diplomacy. Today we can see samples of gunboat diplomacy used in the Eastern Mediterranean, during Ukraine crisis, in dispute between North Korea and South Korea and the ongoing power struggle in Asia-Pacific. Gunboat diplomacy has been and continues to be applied consistently in solving problems by the stronger side of the problem. The purpose of this article is to examine using navy under the gunboat diplomacy as an active instrument of foreign policy and security policy and reveal the strategic sea areas in which gunboat diplomacy is used effectively in the matrix of international politics in the 21st century.

Keywords: gunboat diplomacy, maritime strategy, sea power, strategic sea lands

Procedia PDF Downloads 419
3867 Revival of Old Silk Route and New Maritime Route: An Opportunity for India or Hidden Geopolitics of China

Authors: Geetanjali Sharma

Abstract:

There are always provincial variations which deserve more detailed treatment. Before the arrival of modern era, geography and cultural homogeneity were determining factors of human habitat and migration. Boundaries as if we see them, did not exist earlier. The connectivity of the world was also different as of now. The reinforcement of the old silk route will improve economic cooperation and connectivity between Asian, European and African countries, but obviously, it is designed to improve China’s geopolitical and geostrategic position in the world. The paper is based on the secondary sources of data. Analytical and historical approach has been used to clarify the ties between the old silk routes and new One-Belt-One-Road initiative China. The paper begins with an explanation of the historical background of the old Silk Route, its origin and development, trailed by an analysis of latest declarations by the Chinese leaders to revive it. It also discusses the impacts of this initiative on India’s economy and cultural exchange between associated regions. Lastly, the paper sums up the findings and suggestions for keeping a balance between the security and economic relationship between the countries. It concludes that the silk route is an effort in commencing a ‘grand strategy’ for global trade and cooperation with hidden objectives of China to increase the investment of China in other continents as well. The revival of silk route may prove to be a very helpful in reinforcing cooperation and raising it to a new level of economic establishments. However, China has yet to promote the much-needed political and strategic trust.

Keywords: OBOR (One-Belt-One-Road), geopolitics, economic relation, security concerns

Procedia PDF Downloads 264
3866 Real-Time Pedestrian Detection Method Based on Improved YOLOv3

Authors: Jingting Luo, Yong Wang, Ying Wang

Abstract:

Pedestrian detection in image or video data is a very important and challenging task in security surveillance. The difficulty of this task is to locate and detect pedestrians of different scales in complex scenes accurately. To solve these problems, a deep neural network (RT-YOLOv3) is proposed to realize real-time pedestrian detection at different scales in security monitoring. RT-YOLOv3 improves the traditional YOLOv3 algorithm. Firstly, the deep residual network is added to extract vehicle features. Then six convolutional neural networks with different scales are designed and fused with the corresponding scale feature maps in the residual network to form the final feature pyramid to perform pedestrian detection tasks. This method can better characterize pedestrians. In order to further improve the accuracy and generalization ability of the model, a hybrid pedestrian data set training method is used to extract pedestrian data from the VOC data set and train with the INRIA pedestrian data set. Experiments show that the proposed RT-YOLOv3 method achieves 93.57% accuracy of mAP (mean average precision) and 46.52f/s (number of frames per second). In terms of accuracy, RT-YOLOv3 performs better than Fast R-CNN, Faster R-CNN, YOLO, SSD, YOLOv2, and YOLOv3. This method reduces the missed detection rate and false detection rate, improves the positioning accuracy, and meets the requirements of real-time detection of pedestrian objects.

Keywords: pedestrian detection, feature detection, convolutional neural network, real-time detection, YOLOv3

Procedia PDF Downloads 121
3865 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks

Authors: Walid Abdallah, Noureddine Boudriga

Abstract:

Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.

Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based

Procedia PDF Downloads 640
3864 Performance Optimization on Waiting Time Using Queuing Theory in an Advanced Manufacturing Environment: Robotics to Enhance Productivity

Authors: Ganiyat Soliu, Glen Bright, Chiemela Onunka

Abstract:

Performance optimization plays a key role in controlling the waiting time during manufacturing in an advanced manufacturing environment to improve productivity. Queuing mathematical modeling theory was used to examine the performance of the multi-stage production line. Robotics as a disruptive technology was implemented into a virtual manufacturing scenario during the packaging process to study the effect of waiting time on productivity. The queuing mathematical model was used to determine the optimum service rate required by robots during the packaging stage of manufacturing to yield an optimum production cost. Different rates of production were assumed in a virtual manufacturing environment, cost of packaging was estimated with optimum production cost. An equation was generated using queuing mathematical modeling theory and the theorem adopted for analysis of the scenario is the Newton Raphson theorem. Queuing theory presented here provides an adequate analysis of the number of robots required to regulate waiting time in order to increase the number of output. Arrival rate of the product was fast which shows that queuing mathematical model was effective in minimizing service cost and the waiting time during manufacturing. At a reduced waiting time, there was an improvement in the number of products obtained per hour. The overall productivity was improved based on the assumptions used in the queuing modeling theory implemented in the virtual manufacturing scenario.

Keywords: performance optimization, productivity, queuing theory, robotics

Procedia PDF Downloads 126
3863 A Methodology for the Synthesis of Multi-Processors

Authors: Hamid Yasinian

Abstract:

Random epistemologies and hash tables have garnered minimal interest from both security experts and experts in the last several years. In fact, few information theorists would disagree with the evaluation of expert systems. In our research, we discover how flip-flop gates can be applied to the study of superpages. Though such a hypothesis at first glance seems perverse, it is derived from known results.

Keywords: synthesis, multi-processors, interactive model, moor’s law

Procedia PDF Downloads 414
3862 Border Between the Violation of Dental Ethics and the Occurrence of Dental Malpractice

Authors: Saimir Heta, Rialda Xhizdari, Kers Kapaj, Ilma Robo

Abstract:

Background: The interests of both individuals involved, both the dentist with his professionalism, and the patient who claims and expects the proper professional dental service, are determined in cases of dental malpractice. The latter is a phenomenon that is also wearing the "cloak" of bilateral manipulations, which in themselves require strong legal control to regulate the relations between the involved parties. The two individuals are involved both individually and even professionally and emotionally, with support in the "ultimate" interests of the two people, which in the case of conflicts or grievances, which as a result are transported to the family or society of the affected individual. Main text: The reason for malpractice is the most difficult part to find and then to interpret. It can be professional in the view of "so much I know how to do, so much done", or in the view of the impossibility of individual health conditions to achieve high professional expectations. But, the reason can also be individual with the intention of doing bad without reason or with the source of an unhealthy mind and the source of malicious thinking. The professional himself is a human being and as such may be under the effect of individual treatments or vices, therefore causing misuse, a case that must be distinguished from intentional misuse and which must be judged for the results or damages caused by the professional based on criminal law. Conclusions: Malpractice in some cases may be unavoidable, beyond the good intention of the dental intervention, which should be well understood by both parties involved in this relationship. Malpractice is not necessarily related only to difficult clinical cases, but sometimes also appears as a random deviation of a dental treatment with a welldefined professional protocol. The legal support in the interpretation of malpractice cases should be much more specific according to previous cases, this practice specifically, perhaps also according to different religious states.

Keywords: dental ethics, malpractice, professional dental service, legal support

Procedia PDF Downloads 81
3861 Denoising Convolutional Neural Network Assisted Electrocardiogram Signal Watermarking for Secure Transmission in E-Healthcare Applications

Authors: Jyoti Rani, Ashima Anand, Shivendra Shivani

Abstract:

In recent years, physiological signals obtained in telemedicine have been stored independently from patient information. In addition, people have increasingly turned to mobile devices for information on health-related topics. Major authentication and security issues may arise from this storing, degrading the reliability of diagnostics. This study introduces an approach to reversible watermarking, which ensures security by utilizing the electrocardiogram (ECG) signal as a carrier for embedding patient information. In the proposed work, Pan-Tompkins++ is employed to convert the 1D ECG signal into a 2D signal. The frequency subbands of a signal are extracted using RDWT(Redundant discrete wavelet transform), and then one of the subbands is subjected to MSVD (Multiresolution singular valued decomposition for masking. Finally, the encrypted watermark is embedded within the signal. The experimental results show that the watermarked signal obtained is indistinguishable from the original signals, ensuring the preservation of all diagnostic information. In addition, the DnCNN (Denoising convolutional neural network) concept is used to denoise the retrieved watermark for improved accuracy. The proposed ECG signal-based watermarking method is supported by experimental results and evaluations of its effectiveness. The results of the robustness tests demonstrate that the watermark is susceptible to the most prevalent watermarking attacks.

Keywords: ECG, VMD, watermarking, PanTompkins++, RDWT, DnCNN, MSVD, chaotic encryption, attacks

Procedia PDF Downloads 74
3860 The Impact of Hospital Strikes on Patient Care: Evidence from 135 Strikes in the Portuguese National Health System

Authors: Eduardo Costa

Abstract:

Hospital strikes in the Portuguese National Health Service (NHS) are becoming increasingly frequent, raising concerns in what respects patient safety. In fact, data shows that mortality rates for patients admitted during strikes are up to 30% higher than for patients admitted in other days. This paper analyses the effects of hospital strikes on patients’ outcomes. Specifically, it analyzes the impact of different strikes (physicians, nurses and other health professionals), on in-hospital mortality rates, readmission rates and length of stay. The paper uses patient-level data containing all NHS hospital admissions in mainland Portugal from 2012 to 2017, together with a comprehensive strike dataset comprising over 250 strike days (19 physicians-strike days, 150 nurses-strike days and 50 other health professionals-strike days) from 135 different strikes. The paper uses a linear probability model and controls for hospital and regional characteristics, time trends, and changes in patients’ composition and diagnoses. Preliminary results suggest a 6-7% increase in in-hospital mortality rates for patients exposed to physicians’ strikes. The effect is smaller for patients exposed to nurses’ strikes (2-5%). Patients exposed to nurses strikes during their stay have, on average, higher 30-days urgent readmission rates (4%). Length of stay also seems to increase for patients exposed to any strike. Results – conditional on further testing, namely on non-linear models - suggest that hospital operations and service levels are partially disrupted during strikes.

Keywords: health sector strikes, in-hospital mortality rate, length of stay, readmission rate

Procedia PDF Downloads 122
3859 Resolving Urban Mobility Issues through Network Restructuring of Urban Mass Transport

Authors: Aditya Purohit, Neha Bansal

Abstract:

Unplanned urbanization and multidirectional sprawl of the cities have resulted in increased motorization and deteriorating transport conditions like traffic congestion, longer commuting, pollution, increased carbon footprint, and above all increased fatalities. In order to overcome these problems, various practices have been adopted including– promoting and implementing mass transport; traffic junction channelization; smart transport etc. However, these methods are found to be primarily focusing on vehicular mobility rather than people accessibility. With this research gap, this paper tries to resolve the mobility issues for Ahmedabad city in India, which being the economic capital Gujarat state has a huge commuter and visitor inflow. This research aims to resolve the traffic congestion and urban mobility issues focusing on Gujarat State Regional Transport Corporation (GSRTC) for the city of Ahmadabad by analyzing the existing operations and network structure of GSRTC followed by finding possibilities of integrating it with other modes of urban transport. The network restructuring (NR) methodology is used with appropriate variations, based on commuter demand and growth pattern of the city. To do these ‘scenarios’ based on priority issues (using 12 parameters) and their best possible solution, are established after route network analysis for 2700 population sample of 20 traffic junctions/nodes across the city. Approximately 5% sample (of passenger inflow) at each node is considered using random stratified sampling technique two scenarios are – Scenario 1: Resolving mobility issues by use of Special Purpose Vehicle (SPV) in joint venture to GSRTC and Private Operators for establishing feeder service, which shall provide a transfer service for passenger for movement from inner city area to identified peripheral terminals; and Scenario 2: Augmenting existing mass transport services such as BRTS and AMTS for using them as feeder service to the identified peripheral terminals. Each of these has now been analyzed for the best suitability/feasibility in network restructuring. A desire-line diagram is constructed using this analysis which indicated that on an average 62% of designated GSRTC routes are overlapping with mass transportation service routes of BRTS and AMTS in the city. This has resulted in duplication of bus services causing traffic congestion especially in the Central Bus Station (CBS). Terminating GSRTC services on the periphery of the city is found to be the best restructuring network proposal. This limits the GSRTC buses at city fringe area and prevents them from entering into the city core areas. These end-terminals of GSRTC are integrated with BRTS and AMTS services which help in segregating intra-state and inter-state bus services. The research concludes that absence of integrated multimodal transport network resulted in complexity of transport access to the commuters. As a further scope of research comparing and understanding of value of access time in total travel time and its implication on generalized cost on trip and how it varies city wise may be taken up.

Keywords: mass transportation, multi-modal integration, network restructuring, travel behavior, urban transport

Procedia PDF Downloads 183
3858 Emotions Evoked by Robots - Comparison of Older Adults and Students

Authors: Stephanie Lehmann, Esther Ruf, Sabina Misoch

Abstract:

Background: Due to demographic change and shortage of skilled nursing staff, assistive robots are built to support older adults at home and nursing staff in care institutions. When assistive robots facilitate tasks that are usually performed by humans, user acceptance is essential. Even though they are an important aspect of acceptance, emotions towards different assistive robots and different situations of robot-use have so far not been examined in detail. The appearance of assistive robots can trigger emotions that affect their acceptance. Acceptance of robots is assumed to be greater when they look more human-like; however, too much human similarity can be counterproductive. Regarding different groups, it is assumed that older adults have a more negative attitude towards robots than younger adults. Within the framework of a simulated robot study, the aim was to investigate emotions of older adults compared to students towards robots with different appearances and in different situations and so contribute to a deeper view of the emotions influencing acceptance. Methods: In a questionnaire study, vignettes were used to assess emotions toward robots in different situations and of different appearance. The vignettes were composed of two situations (service and care) shown by video and four pictures of robots varying in human similarity (machine-like to android). The combination of the vignettes was randomly distributed to the participants. One hundred forty-two older adults and 35 bachelor students of nursing participated. They filled out a questionnaire that surveyed 30 positive and 30 negative emotions. For each group, older adults and students, a sum score of “positive emotions” and a sum score of “negative emotions” was calculated. Mean value, standard deviation, or n for sample size and % for frequencies, according to the scale level, were calculated. For differences in the scores of positive and negative emotions for different situations, t-tests were calculated. Results: Overall, older adults reported significantly more positive emotions than students towards robots in general. Students reported significantly more negative emotions than older adults. Regarding the two different situations, the results were similar for the care situation, with older adults reporting more positive emotions than students and less negative emotions than students. In the service situation, older adults reported significantly more positive emotions; negative emotions did not differ significantly from the students. Regarding the appearance of the robot, there were no significant differences in emotions reported towards the machine-like, the mechanical-human-like and the human-like appearance. Regarding the android robot, students reported significantly more negative emotions than older adults. Conclusion: There were differences in the emotions reported by older adults compared to students. Older adults reported more positive emotions, and students reported more negative emotions towards robots in different situations and with different appearances. It can be assumed that older adults have a different attitude towards the use of robots than younger people, especially young adults in the health sector. Therefore, the use of robots in the service or care sector should not be rejected rashly based on the attitudes of younger persons, without considering the attitudes of older adults equally.

Keywords: emotions, robots, seniors, young adults

Procedia PDF Downloads 432
3857 The Agroclimatic Atlas of Croatia for the Periods 1981-2010 and 1991-2020

Authors: Višnjica Vučetić, Mislav Anić, Jelena Bašić, Petra Sviličić, Ivana Tomašević

Abstract:

The Agroclimatic Atlas of Croatia (Atlas) for the periods 1981–2010 and 1991–2020 is monograph of six chapters in digital form. Detailed descriptions of particular agroclimatological data are given in separate chapters as follows: agroclimatic indices based on air temperature (degree days, Huglin heliothermal index), soil temperature, water balance components (precipitation, potential evapotranspiration, actual evapotranspiration, soil moisture content, runoff, recharge and soil moisture loss) and fire weather indices. The last chapter is a description of the digital methods for the spatial interpolations (R and GIS). The Atlas comprises textual description of the relevant climate characteristic, maps of the spatial distribution of climatological elements at 109 stations (26 stations for soil temperature) and tables of the 30-year mean monthly, seasonal and annual values of climatological parameters at 24 stations. The Atlas was published in 2021, on the seventieth anniversary of the agrometeorology development at the Meteorological and Hydrological Service of Croatia. It is intended to support improvement of sustainable system of agricultural production and forest protection from fire and as a rich source of information for agronomic and forestry experts, but also for the decision-making bodies to use it for the development of strategic plans.

Keywords: agrometeorology, agroclimatic indices, soil temperature, water balance components, fire weather index, meteorological and hydrological service of Croatia

Procedia PDF Downloads 109
3856 Load Balancing Technique for Energy - Efficiency in Cloud Computing

Authors: Rani Danavath, V. B. Narsimha

Abstract:

Cloud computing is emerging as a new paradigm of large scale distributed computing. Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., three service models, and four deployment networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics models. Load balancing is one of the main challenges in cloud computing, which is required to distribute the dynamic workload across multiple nodes, to ensure that no single node is overloaded. It helps in optimal utilization of resources, enhancing the performance of the system. The goal of the load balancing is to minimize the resource consumption and carbon emission rate, that is the direct need of cloud computing. This determined the need of new metrics energy consumption and carbon emission for energy-efficiency load balancing techniques in cloud computing. Existing load balancing techniques mainly focuses on reducing overhead, services, response time and improving performance etc. In this paper we introduced a Technique for energy-efficiency, but none of the techniques have considered the energy consumption and carbon emission. Therefore, our proposed work will go towards energy – efficiency. So this energy-efficiency load balancing technique can be used to improve the performance of cloud computing by balancing the workload across all the nodes in the cloud with the minimum resource utilization, in turn, reducing energy consumption, and carbon emission to an extent, which will help to achieve green computing.

Keywords: cloud computing, distributed computing, energy efficiency, green computing, load balancing, energy consumption, carbon emission

Procedia PDF Downloads 428
3855 The Experiences of Claiming Welfare Benefits for People with Disabilities in the UK

Authors: Jennifer McNeill

Abstract:

Over the years UK Governments have extended the use of welfare conditionality to more marginalised groups. Whereas in the past, disabled people’s rights to unconditional welfare were defended, significant numbers of disabled people have in recent years been re-classified as ‘fit for work’ as a result of this policy shift towards increased conditionality targeting more welfare service user groups. This paper discusses findings from a five-year project exploring the ethics and efficacy of welfare conditionality. Drawing on repeat interviews over three years with 58 disabled welfare service users across England and Scotland, the paper explores the experience of, and impact of conditionality upon, disabled participants. In particular, participants described the process of claiming disability-related benefits as stigmatising, with some describing the medical assessments as demeaning, traumatic and even painful. The medical assessments are conducted by private contractors and participants felt they were treated unfairly, under suspicion and under surveillance. This finding is important in line with a recent UN report concerned with the practice of such assessments. The findings reveal that notions of ‘deservedness’ are embedded in this system as disabled recipients argue for their entitlement to welfare claims relative to what are deemed to be less deserving groups of benefit claimants. This indicates an increasing competition ethic within different sections of the most marginalised social groups that facilitate further forms of social fragmentation, particularly in relation to opposition to benefit cuts and other changes requiring concerted and organised forms of resistance. The impact of media and political scapegoating of the most marginal has generated divisions within even those who position themselves as legitimate recipients.

Keywords: disability, medical assessments, stigma, welfare conditionality

Procedia PDF Downloads 176
3854 Supply Side Readiness for Universal Health Coverage: Assessing the Availability and Depth of Essential Health Package in Rural, Remote and Conflict Prone District

Authors: Veenapani Rajeev Verma

Abstract:

Context: Assessing facility readiness is paramount as it can indicate capacity of facilities to provide essential care for resilience to health challenges. In the context of decentralization, estimation of supply side readiness indices at sub national level is imperative for effective evidence based policy but remains a colossal challenge due to lack of dependable and representative data sources. Setting: District Poonch of Jammu and Kashmir was selected for this study. It is remote, rural district with unprecedented topographical barriers and is identified as high priority by government. It is also a fragile area as is bounded by Line of Control with Pakistan bearing the brunt of cease fire violations, military skirmishes and sporadic militant attacks. Hilly geographical terrain, rudimentary/absence of road network and impoverishment are quintessential to this area. Objectives: Objective of the study is to a) Evaluate the service readiness of health facilities and create a concise index subsuming plethora of discrete indicators and b) Ascertain supply side barriers in service provisioning via stakeholder’s analysis. Study also strives to expand analytical domain unravelling context and area specific intricacies associated with service delivery. Methodology: Mixed method approach was employed to triangulate quantitative analysis with qualitative nuances. Facility survey encompassing 90 Subcentres, 44 Primary health centres, 3 Community health centres and 1 District hospital was conducted to gauge general service availability and service specific availability (depth of coverage). Compendium of checklist was designed using Indian Public Health Standards (IPHS) in form of standard core questionnaire and scorecard generated for each facility. Information was collected across dimensions of amenities, equipment, medicines, laboratory and infection control protocols as proposed in WHO’s Service Availability and Readiness Assesment (SARA). Two stage polychoric principal component analysis employed to generate a parsimonious index by coalescing an array of tracer indicators. OLS regression method used to determine factors explaining composite index generated from PCA. Stakeholder analysis was conducted to discern qualitative information. Myriad of techniques like observations, key informant interviews and focus group discussions using semi structured questionnaires on both leaders and laggards were administered for critical stakeholder’s analysis. Results: General readiness score of health facilities was found to be 0.48. Results indicated poorest readiness for subcentres and PHC’s (first point of contact) with composite score of 0.47 and 0.41 respectively. For primary care facilities; principal component was characterized by basic newborn care as well as preparedness for delivery. Results revealed availability of equipment and surgical preparedness having lowest score (0.46 and 0.47) for facilities providing secondary care. Presence of contractual staff, more than 1 hr walk to facility, facilities in zone A (most vulnerable) to cross border shelling and facilities inaccessible due to snowfall and thick jungles was negatively associated with readiness index. Nonchalant staff attitude, unavailability of staff quarters, leakages and constraint in supply chain of drugs and consumables were other impediments identified. Conclusions/Policy Implications: It is pertinent to first strengthen primary care facilities in this setting. Complex dimensions such as geographic barriers, user and provider behavior is not under precinct of this methodology.

Keywords: effective coverage, principal component analysis, readiness index, universal health coverage

Procedia PDF Downloads 97
3853 Development of an Intelligent Decision Support System for Smart Viticulture

Authors: C. M. Balaceanu, G. Suciu, C. S. Bosoc, O. Orza, C. Fernandez, Z. Viniczay

Abstract:

The Internet of Things (IoT) represents the best option for smart vineyard applications, even if it is necessary to integrate the technologies required for the development. This article is based on the research and the results obtained in the DISAVIT project. For Smart Agriculture, the project aims to provide a trustworthy, intelligent, integrated vineyard management solution that is based on the IoT. To have interoperability through the use of a multiprotocol technology (being the future connected wireless IoT) it is necessary to adopt an agnostic approach, providing a reliable environment to address cyber security, IoT-based threats and traceability through blockchain-based design, but also creating a concept for long-term implementations (modular, scalable). The ones described above represent the main innovative technical aspects of this project. The DISAVIT project studies and promotes the incorporation of better management tools based on objective data-based decisions, which are necessary for agriculture adapted and more resistant to climate change. It also exploits the opportunities generated by the digital services market for smart agriculture management stakeholders. The project's final result aims to improve decision-making, performance, and viticulturally infrastructure and increase real-time data accuracy and interoperability. Innovative aspects such as end-to-end solutions, adaptability, scalability, security and traceability, place our product in a favorable situation over competitors. None of the solutions in the market meet every one of these requirements by a unique product being innovative.

Keywords: blockchain, IoT, smart agriculture, vineyard

Procedia PDF Downloads 180
3852 Winery Owners’ Perceptions of Social Media in Promoting Wine Tourism: Case Study of Langhe, Italy

Authors: Magali Canovi, Francesca Pucciarelli

Abstract:

Over the past decade Langhe has developed as a wine tourism destination and has become increasingly popular on an international basis. Wine tourism has been recognized as an important business driver for wineries in Langhe and wine owners have taken advantage of this opportunity through developing a variety of tourism-related activities at their wineries, notably winery visits, wine tastings, cellar-door sales, B&Bs and/or restaurants. In order to promote these tourism-related activities and attract an increasing number of wine tourists, wineries have started to engage in social media. While tourism scholars are now well aware of the benefits social media provides to both travellers and service providers, the existing literature on social media from supplier’s perspective remains limited. Accordingly, this paper aims to fill this gap through providing new insights into how service providers, that is winery owners, exploit social media to promote tourism online. The paper explores the importance and the role of social media as part of wineries’ marketing strategies to promote wine tourism online. The focus lies on understanding, which motives drive winery owners to activate and implement social media activities in promoting wine tourism. A case study approach is adopted, using the North Italian wine region of Langhe in Piedmont. Empirical evidence is provided by a sample of 28 winery owners. An interpretivist approach to research is adopted in order to extend current understandings of social media within the context of wine tourism. In line with the interpretivist perspective, this paper uses discourse analysis (DA) as a methodological approach for analyzing and interpreting winery owners’ accounts. Three key findings emerge from this research. First, there is a general understanding among winery owners what social media represents an opportunity in promoting wine tourism – if not even a must have. Second, the majority of interviewed winery owners are currently applying to some extent social media to promote wine tourism online as well as to interact and engage with tourists directly. Lastly, a varying degree of usage of social media amongst wineries is identified, with some wineries not recognizing social media as a crucial tool in marketing communication strategies. On the other extent, some commonalities in strategies and platforms chosen can be detected by these wineries that actively participate in social media. In conclusion, the main contribution of this paper is that it extends current understandings of social media in the wine tourism context by offering valuable insights into how service providers perceive and engage in social media.

Keywords: langhe, promotion, social media, wine tourism

Procedia PDF Downloads 169
3851 Impact of America's Anti-Ballistic Missile System (ABMS) on Power Dynamics of the World

Authors: Fehmeen Anwar, Ujala Liaqat

Abstract:

For over half a century, U.S. and the Soviet Union have been at daggers drawn with each other. Both leading powers of the world have been struggling hard to surpass each other in military and other technological fields. This neck-to-neck competition turned in favour of U.S. in the early 1990s when USSR had to face economic stagnation and later dismemberment of several of its states. The predominance of U.S. is still evident to date, rather it continues to grow. With this proposed defence program i.e. Anti-Ballistic Missile System, the U.S. will have a considerable chance of intercepting any nuclear strike by Russia, which re-asserts U.S. dominance in the region and creating a security dilemma for Russia and other states. The question is whether America’s recent nuclear deterrence project is merely to counter nuclear threats from Iran and North Korea or is it purely directed towards Russia, thus ensuring complete military supremacy in the world. Although U.S professes to direct its Anti-Ballistic Missile System (ABMS) against the axis of evil (Iran and North Korea), yet the deployment of this system in the East European territory undermines the Russian nuclear strategic capability, as this enables U.S. to initiate an attack and guard itself from retaliatory strike, thus disturbing the security equilibrium in Europe. The implications of this program can lead to power imbalance which can lead to the emergence of fundamentally different paradigm of international politics.

Keywords: Anti-Ballistic Missile System (ABMS), cold-war, axis of evil, power dynamics

Procedia PDF Downloads 278
3850 Microstructure and Hardness Changes on T91 Weld Joint after Heating at 560°C

Authors: Suraya Mohamad Nadzir, Badrol Ahmad, Norlia Berahim

Abstract:

T91 steel has been used as construction material for superheater tubes in sub-critical and super critical boiler. This steel was developed with higher creep strength property as compared to conventional low alloy steel. However, this steel is also susceptible to materials degradation due to its sensitivity to heat treatment especially Post Weld Heat Treatment (PWHT) after weld repair process. Review of PWHT process shows that the holding temperature may different from one batch to other batch of samples depending on the material composition. This issue was reviewed by many researchers and one of the potential solutions is the development of weld repair process without PWHT. This process is possible with the use of temper bead welding technique. However, study has shown the hardness value across the weld joint with exception of PWHT is much higher compare to recommended hardness value. Based on the above findings, a study to evaluate the microstructure and hardness changes of T91 weld joint after heating at 560°C at varying duration was carried out. This study was carried out to evaluate the possibility of self-tempering process during in-service period. In this study, the T91 weld joint was heat-up in air furnace at 560°C for duration of 50 and 150 hours. The heating process was controlled with heating rate of 200°C/hours, and cooling rate about 100°C/hours. Following this process, samples were prepared for the microstructure examination and hardness evaluation. Results have shown full tempered martensite structure and acceptance hardness value was achieved after 50 hours heating. This result shows that the thin component such as T91 superheater tubes is able to self-tempering during service hour.

Keywords: T91, weld-joint, tempered martensite, self-tempering

Procedia PDF Downloads 357
3849 Improving the Budget Distribution Procedure to Ensure Smooth and Efficient Public Service Delivery

Authors: Rizwana Tabassum

Abstract:

Introductive Statement: Delay in budget releases is often cited as one of the biggest bottlenecks to smooth and efficient service delivery. While budget release from the ministry of finance to the line ministries has been expedited by simplifying the procedure, budget distribution within the line ministries remains one of the major causes of slow budget utilization. While the budget preparation is a bottom-up process where all DDOs submit their proposals to their controlling officers (such as Upazila Civil Surgeon sends it to Director General Health), who consolidate the budget proposals in iBAS++ budget preparation module, the approved budget is not disaggregated by all DDOs. Instead, it is left to the discretion of the controlling officers to distribute the approved budget to their sub-ordinate offices over the course of the year. Though there are some need-based criteria/formulae to distribute the approved budget among DDOs in some sectors, there is little evidence that these criteria are actually used. This means that majority of the DDOs don’t know their yearly allocations upfront to enable yearly planning of activities and expenditures. This delays the implementation of critical activities and the payment to the suppliers of goods and services and sometimes leads to undocumented arrears to suppliers for essential goods/services. In addition, social sector budgets are fragmented because of the vertical programs and externally financed interventions that pose several management challenges at the level of the budget holders and frontline service providers. Slow procurement processes further delay the provision of necessary goods and services. For example, it takes an average of 15–18 months for drugs to reach the Upazila Health Complex and below, while it should not take more than 9 months in procuring and distributing these. Aim of the Study: This paper aims to investigate the budget distribution practices of an emerging economy, Bangladesh. The paper identifies challenges of timely distribution and ways to deal with problems as well. Methodology: The study draws conclusions on the basis of document analysis which is a branch of the qualitative research method. Major Findings: Upon approval of the National Budget, the Ministry of Finance is required to distribute the budget to budget holders at the department level; however, budget is distributed to drawing and disbursing officers much later. Conclusions: Timely and predictable budget releases assist completion of development schemes on time and on budget, with sufficient recurrent resources for effective operation. ADP implementation is usually very low at the beginning of the fiscal year and expedited dramatically during the last few months, leading to inefficient use of resources. The timely budget release will resolve this issue and deliver economic benefits faster, better, and more reliably. This will also give the project directors/DDOs the freedom to think and plan the budget execution in a predictable manner, thereby ensuring value for money by reducing time overrun and expediting the completion of capital investments, and improving infrastructure utilization through timely payment of recurrent costs.

Keywords: budget distribution, challenges, digitization, emerging economy, service delivery

Procedia PDF Downloads 60
3848 Feasibilty and Penetration of Electric Vehicles in Indian Power Grid

Authors: Kashyap L. Mokariya, Varsha A. Shah, Makarand M. Lokhande

Abstract:

As the current status and growth of Indian automobile industry is remarkable, transportation sectors are the main concern in terms of Energy security and climate change. Rising demand of fuel and its dependency on other countries affects the GDP of nation. So in this context if the 10 percent of vehicle got operated in Electrical mode how much saving in terms of Rs and in terms of liters is achieved has been analyzed which is also a part of Nations Electric mobility mission plan. Analysis is also done for converting unit consumption of Electricity of Electric vehicle into equivalent fuel consumption in liters which shows that at present tariff rate Electrical operated vehicles are far more beneficial. It also gives benchmark to the authorities to set the tariff rate for Electrical vehicles. Current situation of Indian grid is shown and how the Gap between Generation and Demand can be reduced is analyzed in terms of increasing generation capacity and Energy Conservation measures. As the certain regions of country is facing serious deficit than how to take energy conservation measures in Industry and especially in rural areas where generally Energy Auditing is not carried out that is analyzed in context of Electric vehicle penetration in near future. Author was a part of Vishvakarma yojna where in 255 villages of Gujarat Energy losses were measured and solutions were given to mitigate them and corresponding report to the authorities of villages was delivered.

Keywords: vehiclepenetration, feasibility, Energyconservation, future grid, Energy security, pf controller

Procedia PDF Downloads 339