Search results for: UN Security Council
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3224

Search results for: UN Security Council

974 An Effective and Efficient Web Platform for Monitoring, Control, and Management of Drones Supported by a Microservices Approach

Authors: Jorge R. Santos, Pedro Sebastiao

Abstract:

In recent years there has been a great growth in the use of drones, being used in several areas such as security, agriculture, or research. The existence of some systems that allow the remote control of drones is a reality; however, these systems are quite simple and directed to specific functionality. This paper proposes the development of a web platform made in Vue.js and Node.js to control, manage, and monitor drones in real time. Using a microservice architecture, the proposed project will be able to integrate algorithms that allow the optimization of processes. Communication with remote devices is suggested via HTTP through 3G, 4G, and 5G networks and can be done in real time or by scheduling routes. This paper addresses the case of forest fires as one of the services that could be included in a system similar to the one presented. The results obtained with the elaboration of this project were a success. The communication between the web platform and drones allowed its remote control and monitoring. The incorporation of the fire detection algorithm in the platform proved possible a real time analysis of the images captured by the drone without human intervention. The proposed system has proved to be an asset to the use of drones in fire detection. The architecture of the application developed allows other algorithms to be implemented, obtaining a more complex application with clear expansion.

Keywords: drone control, microservices, node.js, unmanned aerial vehicles, vue.js

Procedia PDF Downloads 151
973 Bhumastra “Unmanned Ground Vehicle”

Authors: Vivek Krishna, Nikhil Jain, A. Mary Posonia A., Albert Mayan J

Abstract:

Terrorism and insurgency are significant global issues that require constant attention and effort from governments and scientists worldwide. To combat these threats, nations invest billions of dollars in developing new defensive technologies to protect civilians. Breakthroughs in vehicle automation have led to the use of sophisticated machines for many dangerous and critical anti-terrorist activities. Our concept of an "Unmanned Ground Vehicle" can carry out tasks such as border security, surveillance, mine detection, and active combat independently or in tandem with human control. The robot's movement can be wirelessly controlled by a person in a distant location or can travel to a pre-programmed destination autonomously in situations where personal control is not feasible. Our defence system comprises two units: the control unit that regulates mobility and the motion tracking unit. The remote operator robot uses the camera's live visual feed to manually operate both units, and the rover can automatically detect movement. The rover is operated by manpower who controls it using a joystick or mouse, and a wireless modem enables a soldier in a combat zone to control the rover via an additional controller feature.

Keywords: robotics, computer vision, Machine learning, Artificial intelligence, future of AI

Procedia PDF Downloads 126
972 Leveraging NFT Secure and Decentralized Lending: A Defi Solution

Authors: Chandan M. S., Darshan G. A., Vyshnavi, Abhishek T.

Abstract:

In the evolving world of technology and digital assets, non-fungible tokens (NFTs) have emerged as the latest advancement. These digital assets represent ownership of intangible items and hold significant value. Unlike cryptocurrencies, like Ethereum or Bitcoin, NFTs cannot be exchanged due to their nature. Each NFT has an indivisible value. NFTs not only pave the way for financial services but also open up fresh opportunities for creators, buyers and artists. To revolutionize financing in the DeFi space, this proposed approach utilizes NFTs generated from digital arts. By eliminating intermediaries, this innovative method ensures trust and security in transactions. The idea entails automating borrower-lender interactions through contracts while securely storing data using blockchain technology. Borrowers can obtain funding by leveraging assets such as estate, artwork and collectibles that are often illiquid. The key component of this system is contracts that independently execute lending agreements and collateral transfers within predefined parameters. By leveraging the Ethereum blockchain, this project aims to provide consumers with access to a platform offering a wide range of financial services. The demonstration illustrates how NFT lending and borrowing is managed through contracts, providing a secure and trustworthy transaction environment.

Keywords: blockchain, defi, NFT, ethereum, marketplace

Procedia PDF Downloads 55
971 An Application for Risk of Crime Prediction Using Machine Learning

Authors: Luis Fonseca, Filipe Cabral Pinto, Susana Sargento

Abstract:

The increase of the world population, especially in large urban centers, has resulted in new challenges particularly with the control and optimization of public safety. Thus, in the present work, a solution is proposed for the prediction of criminal occurrences in a city based on historical data of incidents and demographic information. The entire research and implementation will be presented start with the data collection from its original source, the treatment and transformations applied to them, choice and the evaluation and implementation of the Machine Learning model up to the application layer. Classification models will be implemented to predict criminal risk for a given time interval and location. Machine Learning algorithms such as Random Forest, Neural Networks, K-Nearest Neighbors and Logistic Regression will be used to predict occurrences, and their performance will be compared according to the data processing and transformation used. The results show that the use of Machine Learning techniques helps to anticipate criminal occurrences, which contributed to the reinforcement of public security. Finally, the models were implemented on a platform that will provide an API to enable other entities to make requests for predictions in real-time. An application will also be presented where it is possible to show criminal predictions visually.

Keywords: crime prediction, machine learning, public safety, smart city

Procedia PDF Downloads 113
970 Educational Knowledge Transfer in Indigenous Mexican Areas Using Cloud Computing

Authors: L. R. Valencia Pérez, J. M. Peña Aguilar, A. Lamadrid Álvarez, A. Pastrana Palma, H. F. Valencia Pérez, M. Vivanco Vargas

Abstract:

This work proposes a Cooperation-Competitive (Coopetitive) approach that allows coordinated work among the Secretary of Public Education (SEP), the Autonomous University of Querétaro (UAQ) and government funds from National Council for Science and Technology (CONACYT) or some other international organizations. To work on an overall knowledge transfer strategy with e-learning over the Cloud, where experts in junior high and high school education, working in multidisciplinary teams, perform analysis, evaluation, design, production, validation and knowledge transfer at large scale using a Cloud Computing platform. Allowing teachers and students to have all the information required to ensure a homologated nationally knowledge of topics such as mathematics, statistics, chemistry, history, ethics, civism, etc. This work will start with a pilot test in Spanish and initially in two regional dialects Otomí and Náhuatl. Otomí has more than 285,000 speaking indigenes in Queretaro and Mexico´s central region. Náhuatl is number one indigenous dialect spoken in Mexico with more than 1,550,000 indigenes. The phase one of the project takes into account negotiations with indigenous tribes from different regions, and the Information and Communication technologies to deliver the knowledge to the indigenous schools in their native dialect. The methodology includes the following main milestones: Identification of the indigenous areas where Otomí and Náhuatl are the spoken dialects, research with the SEP the location of actual indigenous schools, analysis and inventory or current schools conditions, negotiation with tribe chiefs, analysis of the technological communication requirements to reach the indigenous communities, identification and inventory of local teachers technology knowledge, selection of a pilot topic, analysis of actual student competence with traditional education system, identification of local translators, design of the e-learning platform, design of the multimedia resources and storage strategy for “Cloud Computing”, translation of the topic to both dialects, Indigenous teachers training, pilot test, course release, project follow up, analysis of student requirements for the new technological platform, definition of a new and improved proposal with greater reach in topics and regions. Importance of phase one of the project is multiple, it includes the proposal of a working technological scheme, focusing in the cultural impact in Mexico so that indigenous tribes can improve their knowledge about new forms of crop improvement, home storage technologies, proven home remedies for common diseases, ways of preparing foods containing major nutrients, disclose strengths and weaknesses of each region, communicating through cloud computing platforms offering regional products and opening communication spaces for inter-indigenous cultural exchange.

Keywords: Mexicans indigenous tribes, education, knowledge transfer, cloud computing, otomi, Náhuatl, language

Procedia PDF Downloads 407
969 Disaster Risk Reduction (DRR) through Harvesting Encosternum delegorguei Insect (Harurwa) in Nerumedzo, Bikita District, Zimbabwe

Authors: Mkhokheli Sithole, Brenda N. Muchapondwa

Abstract:

Food security is becoming a critical issue for people residing mainly in the rural areas where frequent droughts interrupt food production, reduce income, compromise the ability to save and erode livelihoods. This tends to increase the vulnerability of poor households to food and income insecurity, hence, malnutrition. There is an emerging need for DRR strategies to complement the existing rain fed crop production based livelihoods. One of such strategies employed by the community of Nerumedzo in Bikita district is the harvesting of Encosternum delegorguei insect. This article analyses the livelihood impacts of Encosternum delegorguei insect as a DRR strategy. The research used a combination of qualitative and quantitative approaches. The insect samples were tested in the laboratory for their nutritional composition while surveys were done on a sample of 40 community members. Participatory observations and 5 focus group discussions were also done. The results revealed that harvesting the Encosternum delegorguei insects provides a livelihood for the locals by complementing crop production thereby mitigating potential negative effects of frequent droughts. The insects are now a significant source of income to poor households in the community.

Keywords: disaster risk reduction, livelihoods, human, social sciences

Procedia PDF Downloads 195
968 Medical Workforce Knowledge of Adrenaline (Epinephrine) Administration in Anaphylaxis in Adults Considerably Improved with Training in an UK Hospital from 2010 to 2017

Authors: Jan C. Droste, Justine Burns, Nithin Narayan

Abstract:

Introduction: Life-threatening detrimental effects of inappropriate adrenaline (epinephrine) administration, e.g., by giving the wrong dose, in the context of anaphylaxis management is well documented in the medical literature. Half of the fatal anaphylactic reactions in the UK are iatrogenic, and the median time to a cardio-respiratory arrest can be as short as 5 minutes. It is therefore imperative that hospital doctors of all grades have active and accurate knowledge of the correct route, site, and dosage of administration of adrenaline. Given this time constraint and the potential fatal outcome with inappropriate management of anaphylaxis, it is alarming that surveys over the last 15 years have repeatedly shown only a minority of doctors to have accurate knowledge of adrenaline administration as recommended by the UK Resuscitation Council guidelines (2008 updated 2012). This comparison of survey results of the medical workforce over several years in a small NHS District General Hospital was conducted in order to establish the effect of the employment of multiple educational methods regarding adrenaline administration in anaphylaxis in adults. Methods: Between 2010 and 2017, several education methods and tools were used to repeatedly inform the medical workforce (doctors and advanced clinical practitioners) in a single district general hospital regarding the treatment of anaphylaxis in adults. Whilst the senior staff remained largely the same cohort, junior staff had changed fully in every survey. Examples included: (i) Formal teaching -in Grand Rounds; during the junior doctors’ induction process; advanced life support courses (ii) In-situ simulation training performed by the clinical skills simulation team –several ad hoc sessions and one 3-day event in 2017 visiting 16 separate clinical areas performing an acute anaphylaxis scenario using actors- around 100 individuals from multi-disciplinary teams were involved (iii) Hospital-wide distribution of the simulation event via the Trust’s Simulation Newsletter (iv) Laminated algorithms were attached to the 'crash trolleys' (v) A short email 'alert' was sent to all medical staff 3 weeks prior to the survey detailing the emergency treatment of anaphylaxis (vi) In addition, the performance of the surveys themselves represented a teaching opportunity when gaps in knowledge could be addressed. Face to face surveys were carried out in 2010 ('pre-intervention), 2015, and 2017, in the latter two occasions including advanced clinical practitioners (ACP). All surveys consisted of convenience samples. If verbal consent to conduct the survey was obtained, the medical practitioners' answers were recorded immediately on a data collection sheet. Results: There was a sustained improvement in the knowledge of the medical workforce from 2010 to 2017: Answers improved regarding correct drug by 11% (84%, 95%, and 95%); the correct route by 20% (76%, 90%, and 96%); correct site by 40% (43%, 83%, and 83%) and the correct dose by 45% (27%, 54%, and 72%). Overall, knowledge of all components -correct drug, route, site, and dose-improved from 13% in 2010 to 62% in 2017. Conclusion: This survey comparison shows knowledge of the medical workforce regarding adrenaline administration for treatment of anaphylaxis in adults can be considerably improved by employing a variety of educational methods.

Keywords: adrenaline, anaphylaxis, epinephrine, medical education, patient safety

Procedia PDF Downloads 129
967 South Asia as an Emerging Region of the World in the 21st Century

Authors: Shazia Shinwari

Abstract:

In the 21st century, South Asia is becoming one of the rising sub-regions of the world. In the whole of Asia, South Asia is going to be the center part of opportunities, development, and challenges. The increasing economy and its geopolitical importance are changing the landscape of South Asia. Despite intensifying the opportunities and development, the region is also facing the challenges of security, poverty, and conflicts. It is one of the most populated sub-regions and has many internal conflicts because of which the region remains for a long time a least developed region in the world. But now South Asia is transforming into the developing process and trying to utilize its potentials and to remove the hurdles in the way of development. South Asia is one of the distinctive regions of the world and could play an important role at the global level if the potentials of the region are properly utilized. South Asia is one of the most important regions of the world and assumed more importance after the British withdrawal from the region. Now South Asia is playing an important role in world politics due to its strategic and geographical location. That is why the importance of this region in the international political systems cannot be ignored. Day by day, changes have been taking place in the structure of the global economy, and South Asia could take advantage of these changes to advance as an economic region. For this, South Asia will need to look at its history, and that changes, particularly in the India and Pakistan relations, are necessary for the development of the South Asian region. Despite having challenges in the region, South Asia is also rising as the land of opportunities and development if the potentials of the region are properly utilized and smoothen the way for regional integration.

Keywords: challenges, development, opportunities, South Asia

Procedia PDF Downloads 189
966 Progress, Challenges, and Prospects of Non-Conventional Feed Resources for Livestock Production in Sub-Saharan Africa: A Review

Authors: Clyde Haruzivi, Olusegun Oyebade Ikusika, Thando Conference Mpendulo

Abstract:

Feed scarcity, increasing demand for animal products due to the growing human population, competition for conventional feed resources for humans and animal production, and ever-increasing prices of these feed resources are major constraints to the livestock industry in Sub-Saharan Africa. As a result, the industry is suffering immensely as the cost of production is high, hence the reduced returns. Most affected are the communal and resource-limited farmers who cannot afford the cost of conventional feed resources to supplement feeds, especially in arid and semi-arid areas where the available feed resources are not adequate for maintenance and production. This has tasked researchers and animal scientists to focus on the potential of non-conventional feed resources (NCFRs). Non-conventional feed resources could fill the gap through reduced competition, cost of feed, increased supply, increased profits, and independency as farmers will be utilizing locally available feed resources. Identifying available non-conventional feed resources is vital as it creates possibilities for novel feed industries and markets and implements methods of using these feedstuffs to improve livestock production and livelihoods in Sub-Saharan Africa. Hence, this research work analyses the progress, challenges, and prospects of some non-conventional feed resources in Sub-Saharan Africa.

Keywords: non-conventional, feed resources, livestock production, food security, Sub-Saharan

Procedia PDF Downloads 115
965 Divergent Preferences for Rice Variety Attributes among Farmers and Breeders in Nepal

Authors: Bibek Sapkota, Michael Burton, Krishna Prasad Timsina

Abstract:

This paper presents a discrete choice experiment (DCE)-based analysis of farmers' preferences for rice variety attributes involving 540 farmers from the Terai region of Nepal clustered into East, Mid, and Western Terai regions. Findings reveal that farmers prioritize grain yield, finer grain types, drought tolerance, and shorter crop duration when selecting rice varieties, with subtle gender-based differences observed. However, breeding programs have predominantly emphasized grain yield and crop duration, possibly neglecting other vital traits. Furthermore, the research reveals a concerning decline in the yield trends of both released and registered rice varieties. Notably, the limited availability of recommended rainfed varieties, despite strong farmer preferences for drought tolerance, underscores the imperative of bridging this gap to ensure food security. This study provides insights into the multifaceted nature of farmer preferences and calls for a more holistic approach to varietal development that aligns with farmers' needs and the evolving challenges of rice farming in the Terai region of Nepal.

Keywords: breeders’ preferences, discrete choice experiment, farmers’ preferences, rice variety attributes

Procedia PDF Downloads 137
964 Vision of Justice in the Future of Humanity

Authors: Morteza Khorrami

Abstract:

The idea of final triumph of peace and justice on evil force, conflict and global spread of the religious faith, the full deployment of human values, constitute a utopia and the ideal society is discussed by many of religions. Thus, mankind has always been waiting for a savior and has received good tidings for coming of Great Savior at the end of Time. Of course, various persons were introduced as the Promised Saviors by different religions, but all of the religions share in this fact that the future of humanity is very bright and promising and the future will belong to the righteous and justice. In this article which is written with a descriptive and analytic method, the author tries to show the vision of global justice at the end of time. The opinion of various religions such as Judaism, Christianity, Zoroastrianism, Islam and even idolatry about the great savior as well as the justice status in his era in the world will be discussed. Also the viewpoint of Muslims and specially Shiites, which is explained clearly in their scripts, will be depicted. Current human responsibility towards this golden era will be discussed, too. Based on paper findings, religious doctrine promises that a heaven person and sacred character will come as a reformer of the world. In his era, humanity will be saved from tyranny, oppression and inequality, and the earth will be filled with peace, security, justice, and equity. Moreover promoting justice, truth and spreading religion in the world, economic, scientific, political and moral development will be happened.

Keywords: future of humanity, global justice, islam, religions

Procedia PDF Downloads 374
963 Providing a Secure, Reliable and Decentralized Document Management Solution Using Blockchain by a Virtual Identity Card

Authors: Meet Shah, Ankita Aditya, Dhruv Bindra, V. S. Omkar, Aashruti Seervi

Abstract:

In today's world, we need documents everywhere for a smooth workflow in the identification process or any other security aspects. The current system and techniques which are used for identification need one thing, that is ‘proof of existence’, which involves valid documents, for example, educational, financial, etc. The main issue with the current identity access management system and digital identification process is that the system is centralized in their network, which makes it inefficient. The paper presents the system which resolves all these cited issues. It is based on ‘blockchain’ technology, which is a 'decentralized system'. It allows transactions in a decentralized and immutable manner. The primary notion of the model is to ‘have everything with nothing’. It involves inter-linking required documents of a person with a single identity card so that a person can go anywhere without having the required documents with him/her. The person just needs to be physically present at a place wherein documents are necessary, and using a fingerprint impression and an iris scan print, the rest of the verification will progress. Furthermore, some technical overheads and advancements are listed. This paper also aims to layout its far-vision scenario of blockchain and its impact on future trends.

Keywords: blockchain, decentralized system, fingerprint impression, identity management, iris scan

Procedia PDF Downloads 129
962 When Helping Hurts: Addressing Violence in Healthcare Settings

Authors: Jason Maffia, Maria D’urso, Robert Crupi, Margaret Cartmell

Abstract:

The emotional aspects of traumatic events such as workplace violence are often ignored, causing low productivity, disillusionment, and resentment within an organization. As a result, if workplace violence, particularly in healthcare settings, is not adequately addressed, it will become a phenomenon, undermining the peace and stability among the active communities while also posing a risk to the population's health and well-being. This review intends to identify the risk factors and the implications of workplace violence in healthcare settings and highlight the collaborative efforts needed in sustaining control and prevention measures against workplace violence. It is essential that health care organizations are prepared physically and emotionally for traumatic situations. This study explores the theoretical nature of addressing work-related violence in healthcare settings as well as traumatic stress reactivity and the context within which reactions occur and recovery takes place. Cognitive, social, and organizational influences on response are identified and used to tentatively offer explanations for identifying security risks, development, and implementation of de-escalation teams, CISM programs and training staff in violence prevention are among strategies hospitals are employing to keep workers and patients safe. General conclusion regarding the implications for intervention effectiveness and design are discussed.

Keywords: healthcare settings, stress reactions, traumatic events, workplace violence

Procedia PDF Downloads 76
961 Solar Photovoltaic System (PV) Usages on Residential Houses in the Absheron Peninsula Region of the Republic of Azerbaijan: Obstacles and Opportunities

Authors: Elnur Abbasov

Abstract:

Energy security and climate change comprise some of the most important concerns facing humankind today and probably in the future if they are not addressed appropriately. In order to stabilize the global climate, there is the need for the world to lessen its use of fossil energy, which requires enhancement of current energy efficiency as well as the development of novel energy sources, such as energy obtained from renewable sources. There is no doubt that the steady transition towards a solar-based economy is likely to result in the development of completely new sectors, behaviours, and jobs that are pro-environmental. Azerbaijan Republic as the largest nation state in the South Caucasus Region has the potential for using and developing the renewable sources of energy in order to support the environmental challenge resolution associated with the climate change, improving the environmental situation in the country. Solar PV comprises one of the direct usages of solar energy. In this paper, sustainable PV usage scenario in residential houses was introduced to reduce negative environmental effects of land use, water consumption, air pollution etc. It was recommended by an author that, PV systems can be part of function and design of residential building components: such as roofs, walls, windows.

Keywords: energy efficiency, environmentally friendly, photovoltaic engineering, sustainable energy usage scenario

Procedia PDF Downloads 242
960 Study of the Influence of Eccentricity Due to Configuration and Materials on Seismic Response of a Typical Building

Authors: A. Latif Karimi, M. K. Shrimali

Abstract:

Seismic design is a critical stage in the process of design and construction of a building. It includes strategies for designing earthquake-resistant buildings to ensure health, safety, and security of the building occupants and assets. Hence, it becomes very important to understand the behavior of structural members precisely, for construction of buildings that can yield a better response to seismic forces. This paper investigates the behavior of a typical structure when subjected to ground motion. The corresponding mode shapes and modal frequencies are studied to interpret the response of an actual structure using different fabricated models and 3D visual models. In this study, three different structural configurations are subjected to horizontal ground motion, and the effect of “stiffness eccentricity” and placement of infill walls are checked to determine how each parameter contributes in a building’s response to dynamic forces. The deformation data from lab experiments and the analysis on SAP2000 software are reviewed to obtain the results. This study revealed that seismic response in a building can be improved by introducing higher deformation capacity in the building. Also, proper design of infill walls and maintaining a symmetrical configuration in a building are the key factors in building stability during the earthquake.

Keywords: eccentricity, seismic response, mode shape, building configuration, building dynamics

Procedia PDF Downloads 200
959 Loan Repayment Prediction Using Machine Learning: Model Development, Django Web Integration and Cloud Deployment

Authors: Seun Mayowa Sunday

Abstract:

Loan prediction is one of the most significant and recognised fields of research in the banking, insurance, and the financial security industries. Some prediction systems on the market include the construction of static software. However, due to the fact that static software only operates with strictly regulated rules, they cannot aid customers beyond these limitations. Application of many machine learning (ML) techniques are required for loan prediction. Four separate machine learning models, random forest (RF), decision tree (DT), k-nearest neighbour (KNN), and logistic regression, are used to create the loan prediction model. Using the anaconda navigator and the required machine learning (ML) libraries, models are created and evaluated using the appropriate measuring metrics. From the finding, the random forest performs with the highest accuracy of 80.17% which was later implemented into the Django framework. For real-time testing, the web application is deployed on the Alibabacloud which is among the top 4 biggest cloud computing provider. Hence, to the best of our knowledge, this research will serve as the first academic paper which combines the model development and the Django framework, with the deployment into the Alibaba cloud computing application.

Keywords: k-nearest neighbor, random forest, logistic regression, decision tree, django, cloud computing, alibaba cloud

Procedia PDF Downloads 137
958 Microbial Diversity Assessment in Household Point-of-Use Water Sources Using Spectroscopic Approach

Authors: Syahidah N. Zulkifli, Herlina A. Rahim, Nurul A. M. Subha

Abstract:

Sustaining water quality is critical in order to avoid any harmful health consequences for end-user consumers. The detection of microbial impurities at the household level is the foundation of water security. Water quality is now monitored only at water utilities or infrastructure, such as water treatment facilities or reservoirs. This research provides a first-hand scientific understanding of microbial composition presence in Malaysia’s household point-of-use (POUs) water supply influenced by seasonal fluctuations, standstill periods, and flow dynamics by using the NIR-Raman spectroscopic technique. According to the findings, 20% of water samples were contaminated by pathogenic bacteria, which are Legionella and Salmonella cells. A comparison of the spectra reveals significant signature peaks (420 cm⁻¹ to 1800 cm⁻¹), including species-specific bands. This demonstrates the importance of regularly monitoring POUs water quality to provide a safe and clean water supply to homeowners. Conventional Raman spectroscopy, up-to-date, is no longer suited for real-time monitoring. Therefore, this study introduced an alternative micro-spectrometer to give a rapid and sustainable way of monitoring POUs water quality. Assessing microbiological threats in water supply becomes more reliable and efficient by leveraging IoT protocol.

Keywords: microbial contaminants, water quality, water monitoring, Raman spectroscopy

Procedia PDF Downloads 110
957 Energy Efficiency Retrofitting of Residential Buildings Case Study: Multi-Family Apartment Building in Tripoli, Lebanon

Authors: Yathreb Sabsaby

Abstract:

Energy efficiency retrofitting of existing buildings was long ignored by public authorities who favored energy efficiency policies in new buildings, which are easier to implement. Indeed, retrofitting is more complex and difficult to organize because of the extreme diversity in existing buildings, administrative situations and occupation. Energy efficiency retrofitting of existing buildings has now become indispensable in all economies—even emerging countries—given the constraints imposed by energy security and climate change, and because it represents considerable potential energy savings. Addressing energy efficiency in the existing building stock has been acknowledged as one of the most critical yet challenging aspects of reducing our environmental footprint on the ecosystem. Tripoli, Lebanon chosen as case study area is a typical Mediterranean metropolis in the North Lebanon, where multifamily residential buildings are all around the city. This generally implies that the density of energy demand is extremely high, even the renewable energy facilities are involved, they can just play as a minor energy provider at the current technology level in the single family house. It seems only the low energy design for buildings can be made possible, not the zero energy certainly in developing country. This study reviews the latest research and experience and provides recommendations for deep energy retrofits that aim to save more than 50% of the energy used in a typical Tripoli apartment building.

Keywords: energy-efficiency, existing building, multifamily residential building, retrofit

Procedia PDF Downloads 457
956 Artificial Intelligence Impact on the Australian Government Public Sector

Authors: Jessica Ho

Abstract:

AI has helped government, businesses and industries transform the way they do things. AI is used in automating tasks to improve decision-making and efficiency. AI is embedded in sensors and used in automation to help save time and eliminate human errors in repetitive tasks. Today, we saw the growth in AI using the collection of vast amounts of data to forecast with greater accuracy, inform decision-making, adapt to changing market conditions and offer more personalised service based on consumer habits and preferences. Government around the world share the opportunity to leverage these disruptive technologies to improve productivity while reducing costs. In addition, these intelligent solutions can also help streamline government processes to deliver more seamless and intuitive user experiences for employees and citizens. This is a critical challenge for NSW Government as we are unable to determine the risk that is brought by the unprecedented pace of adoption of AI solutions in government. Government agencies must ensure that their use of AI complies with relevant laws and regulatory requirements, including those related to data privacy and security. Furthermore, there will always be ethical concerns surrounding the use of AI, such as the potential for bias, intellectual property rights and its impact on job security. Within NSW’s public sector, agencies are already testing AI for crowd control, infrastructure management, fraud compliance, public safety, transport, and police surveillance. Citizens are also attracted to the ease of use and accessibility of AI solutions without requiring specialised technical skills. This increased accessibility also comes with balancing a higher risk and exposure to the health and safety of citizens. On the other side, public agencies struggle with keeping up with this pace while minimising risks, but the low entry cost and open-source nature of generative AI led to a rapid increase in the development of AI powered apps organically – “There is an AI for That” in Government. Other challenges include the fact that there appeared to be no legislative provisions that expressly authorise the NSW Government to use an AI to make decision. On the global stage, there were too many actors in the regulatory space, and a sovereign response is needed to minimise multiplicity and regulatory burden. Therefore, traditional corporate risk and governance framework and regulation and legislation frameworks will need to be evaluated for AI unique challenges due to their rapidly evolving nature, ethical considerations, and heightened regulatory scrutiny impacting the safety of consumers and increased risks for Government. Creating an effective, efficient NSW Government’s governance regime, adapted to the range of different approaches to the applications of AI, is not a mere matter of overcoming technical challenges. Technologies have a wide range of social effects on our surroundings and behaviours. There is compelling evidence to show that Australia's sustained social and economic advancement depends on AI's ability to spur economic growth, boost productivity, and address a wide range of societal and political issues. AI may also inflict significant damage. If such harm is not addressed, the public's confidence in this kind of innovation will be weakened. This paper suggests several AI regulatory approaches for consideration that is forward-looking and agile while simultaneously fostering innovation and human rights. The anticipated outcome is to ensure that NSW Government matches the rising levels of innovation in AI technologies with the appropriate and balanced innovation in AI governance.

Keywords: artificial inteligence, machine learning, rules, governance, government

Procedia PDF Downloads 71
955 Smart Demand Response: A South African Pragmatic, Non-Destructive and Alternative Advanced Metering Infrastructure-Based Maximum Demand Reduction Methodology

Authors: Christo Nicholls

Abstract:

The National Electricity Grid (NEG) in South Africa has been under strain for the last five years. This overburden of the NEG led Eskom (the State-Owned Entity responsible for the NEG) to implement a blunt methodology to assist them in reducing the maximum demand (MD) on the NEG, when required, called Loadshedding. The challenge of this methodology is that not only does it lead to immense technical issues with the distribution network equipment, e.g., transformers, due to the frequent abrupt off and on switching, it also has a broader negative fiscal impact on the distributors, as their key consumers (commercial & industrial) are now grid defecting due to the lack of Electricity Security Provision (ESP). This paper provides a pragmatic alternative methodology utilizing specific functionalities embedded within direct-connect single and three-phase Advanced Meter Infrastructure (AMI) Solutions deployed within the distribution network, in conjunction with a Multi-Agent Systems Based AI implementation focused on Automated Negotiation Peer-2-Peer trading. The results of this research clearly illustrate, not only does methodology provide a factual percentage contribution towards the NEG MD at the point of consideration, it also allows the distributor to leverage the real-time MD data from key consumers to activate complex, yet impact-measurable Demand Response (DR) programs.

Keywords: AI, AMI, demand response, multi-agent

Procedia PDF Downloads 113
954 Examining the Challenges Faced by Passengers Using Arik Air for International and Domestic Travel

Authors: Mahmud Hafsat Hussaini, Eldah Ephraim Eldah, Bata Zoakah Amina

Abstract:

This research work was aimed at examining the challenges faced by passengers using Arik air for domestic and international travels. Passengers do complain of delay flights, theft and rude behavior by Arik staff while on transit or in the process of travelling using the aircraft. Being the national carrier in Nigeria these behaviors have tarnished the image of the airline and makes travel experience to be challenging. Hundred survey questionnaires were administered to travellers who have used the airline for domestic and international flights. Findings show that the staff of the airline do lack customer care skills and are sometimes rude to customers. The airline does have different agents that book for international flights who delays confirming bookings even after payment. The website of the airline is mostly down and makes bookings difficult. Other findings related to the study are a delay of domestic flights within Nigeria. Passengers are sometimes kept for 8 hours in the airport due to delay of flights. The study, therefore, recommends that flight schedule should be adhered to and staff should be trained to meet of with passengers demand. The security of guest luggage at the airport should be put in place to avoid theft. An effective booking platform should be accessible to passengers for easy booking.

Keywords: examining, challenges, domestic, international, travels

Procedia PDF Downloads 217
953 Degradation of Chlorpyrifos Pesticide in Aqueous Solution and Chemical Oxygen Demand from Real Effluent with Hydrodynamic Cavitation Approach

Authors: Shrikant Randhavane, Anjali Khambete

Abstract:

Use of Pesticides is vital in attaining food security and protection from harmful pests and insects in living environment. Chlorpyrifos, an organophosphate pesticide is widely used worldwide for various purposes. Due to its wide use and applications, its residues are found in environmental matrices and persist in nature for long duration of time. This has an adverse effect on human, aquatic and living bodies. Use of different methodologies is need of an hour to treat such type of recalcitrant compound. The paper focuses on Hydrodynamic Cavitation (HC), a hybrid Advanced Oxidation Potential (AOP) method to degrade Chlorpyrifos in aqueous water. Obtained results show that optimum inlet pressure of 5 bars gave maximum degradation of 99.25% for lower concentration and 87.14% for higher concentration Chlorpyrifos solution in 1 hour treatment time. Also, with known initial concentrations, comparing treatment time with optimum pressure of 5 bars, degradation efficiency increases with Hydrodynamic Cavitation. The potential application of HC in removal of Chemical Oxygen Demand (COD) from real effluent with venturi as cavitating device reveals around 40% COD removal with 1 hour of treatment time.

Keywords: advanced oxidation potential, cavitation, chlorpyrifos, COD

Procedia PDF Downloads 219
952 Information Technology and the Challenges Facing the Legal Profession in Nigeria

Authors: Odoh Ben Uruchi

Abstract:

Information Technology is an outcome of the nexus between the computer technology and the communication technology which has grown as silver fiber in Nigeria. Information Technology represents the fourth generation of human communication after sight, oral and written communications. The internet, as with all path-breaking technological developments gives us all the ample privileges to act as a global community; advertise and operate across all frontiers; over boarders and beyond the control of any government. The security concerns, computer abuse and the side effects of this technology have moved to the forefront of the consciousness of law enforcement agencies. Unfortunately, Nigeria is one of the very few countries in the world to have not legislated Cyber Laws, although several unsuccessful attempts have been made in recent times at providing the legal framework for regulating the activities in Nigerian cyberspace. Traditional legal systems have led to great difficulty in keeping pace with the rapid growth of the internet and its impact throughout Nigeria. The only existing legal frameworks are constantly being challenged by technological advancement. This has created a need to constantly update and adapt the way in which we organize ourselves as Legal Practitioners in order to maintain overall control of its domestic and national interests. This paper seeks to appraise the challenges facing the legal profession in Nigeria because of want of Cyber Laws. In doing this, the paper shall highlight the loopholes in the existing laws and recommends the way forward.

Keywords: information technology, challenges, legal profession, Nigeria

Procedia PDF Downloads 517
951 Islam, Forced Marriages and Pakistani Culture: An Analytical Overview

Authors: Naseem Akhter, Rozina Khattak, Arshad Munir

Abstract:

The Islamic social and family system is very clear concerning will, choice, consent and negation of compulsion and force in human life. Marriage is not only a civil contract but also a religious and spiritual contract between spouse (man and woman), which allows them for each other to live gladly, joyfully and legally in the society. It is an immortal and perpetual association between man and woman, which is filled with sympathetic affection, kindness, compassion and security. Islam gives specific rights to parents and guardians to set up the marriage ceremony and get done it as a respectful family occasion, confer their blessing and advice for a life partner of their children. The rights of parents and guardians are summed up in the term of "Willayah”. Islam does not permit parents, guardians and other relatives to compel their children regarding the marriage of their choice, because the groom and the bride are the real parties of the contract. Therefore, their willingness is of prime importance in order to spend whole life with each other. The Holy Prophet (peace and blessings of Allah be upon him) prohibits forcing a virgin to marriage without her permission, whether this is her father or someone else. The right of free consent to choose a life partner is the basic right for the human which is God (Allah) gifted. Unfortunately, forced marriage is a common practice in Pakistani society that has no link with Islam. This article is being written in the same context.

Keywords: choice, consent, forced marriage, Islam, parents, spouse

Procedia PDF Downloads 318
950 Vocational and Technical Education: A Practical Approach to Reducing Insecurity in Nigeria

Authors: S. S. Amoor

Abstract:

Insecurity is becoming a major tool in the hand of Nigeria’s enemies to increase poverty and hatred among the citizens and split the county into several political segments. It is based on this background that this paper critically examines Vocational and Technical Education as a practical and realistic approach to reducing insecurity in Nigeria so as to save the country from total disintegration. The paper discusses the concept of insecurity, types, causes and effects of insecurity, and how vocational and technical education and its variables are fundamental and practical measures to reducing insecurity in Nigeria. The paper concludes that the large army of unemployed and unskilled youths in Nigeria requires immediate attention in the area of provision of marketable vocational and technical skills, creativity and competences that will prepare them for employment or self-reliance. It is hoped that government jobs or self-employment will keep the teeming youths busy and therefore take their minds away from odd jobs that threaten the security of the country. In line with these, the paper recommends, among others, that since the teeming unemployed and unskilled youths are mostly from the rural areas, the state governments in collaboration with the local governments should take appropriate steps to provide the youths with vocational skills in carpentry, fashion designing, hair-dressing, driving, welding, mechanical works, among others. Once the youths are involved in one skilled trade or the other, insecurity would be reduced.

Keywords: vocational and technical education, insecurity, practical approach to reducing insecurity, unemployment

Procedia PDF Downloads 134
949 Towards the Management of Cybersecurity Threats in Organisations

Authors: O. A. Ajigini, E. N. Mwim

Abstract:

Cybersecurity is the protection of computers, programs, networks, and data from attack, damage, unauthorised, unintended access, change, or destruction. Organisations collect, process and store their confidential and sensitive information on computers and transmit this data across networks to other computers. Moreover, the advent of internet technologies has led to various cyberattacks resulting in dangerous consequences for organisations. Therefore, with the increase in the volume and sophistication of cyberattacks, there is a need to develop models and make recommendations for the management of cybersecurity threats in organisations. This paper reports on various threats that cause malicious damage to organisations in cyberspace and provides measures on how these threats can be eliminated or reduced. The paper explores various aspects of protection measures against cybersecurity threats such as handling of sensitive data, network security, protection of information assets and cybersecurity awareness. The paper posits a model and recommendations on how to manage cybersecurity threats in organisations effectively. The model and the recommendations can then be utilised by organisations to manage the threats affecting their cyberspace. The paper provides valuable information to assist organisations in managing their cybersecurity threats and hence protect their computers, programs, networks and data in cyberspace. The paper aims to assist organisations to protect their information assets and data from cyberthreats as part of the contributions toward community engagement.

Keywords: confidential information, cyberattacks, cybersecurity, cyberspace, sensitive information

Procedia PDF Downloads 260
948 An Informetrics Analysis of Research on Phishing in Scopus and Web of Science Databases from 2012 to 2021

Authors: Nkosingiphile Mbusozayo Zungu

Abstract:

The purpose of the current study is to adopt informetrics methods to analyse the research on phishing from 2012 to 2021 in three selected databases in order to contribute to global cybersecurity through impactful research. The study follows a quantitative research methodology. We opted for the positivist epistemology and objectivist ontology. The analysis focuses on: (i) the productivity of individual authors, institutions, and countries; (ii) the research contributions, using co-authorship as a measure of collaboration; (iii) the altmetrics of selected research contributions; (iv) the citation patterns and research impact of research on phishing; and (v) research contributions by keywords, to discover the concepts that are related to phishing. The preliminary findings favour developed countries in terms of quantity and quality of research in the domain. There are unique research trends and patterns in the developing countries, including those in Africa, that provide opportunities for research development in the domain in the region. This study explores an important research domain by using unexplored method in the region. The study supports the SDG Agenda 2030, such as ending abuse, exploitation, trafficking, and all other forms of violence and torture of children through the use of cyberspace (SDG 16). Further, the results from this study can inform research, teaching, and learning largely in Africa. Invariably, the study contributes to cybersecurity awareness that will mitigate cybersecurity threats against vulnerable communities.

Keywords: phishing, cybersecurity, informetrics, information security

Procedia PDF Downloads 115
947 Outbound Tourism in Developed Countries: Analysis of the Trends, Behavior and the Transformation of the Moroccan Demand for International Travels

Authors: M. Boukhrouk, R. Ed-Dali

Abstract:

Outbound tourism in Morocco, as in the majority of developing countries, reveals some of the aspects of inequality between the north and the south. Considered by some researchers as one of the facets of the development crisis, access to tourism and especially international tourism is a chance for a small minority with financial means, while the vast portions of the population dream rather of immigrating to a developed country for the sake of improving their standard of living. The right to travel is also limited by visa requirements, procedures in host countries, security and technical measures and creates discrimination in the practice of tourism. These conditions do not seem to be favorable to the democratization of the practice of international tourism for the populations of the southern countries. This paper is a contribution to the reading of the trends of outbound tourism in developing countries through the example of Morocco. It highlights the different aspects of Moroccan outbound tourism, destinations and the behavior of tourists through an analysis of the offer of a sample of 50 travel agencies. In the same vein, it offers a reading grid of the possibilities offered for the development of outbound tourism and the various existing obstacles to the democratization of international outbound tourism in the southern countries. This reading reveals the transformation in the behavior of Moroccan international tourists as well as the profound changes in Moroccan society, through a model of statistical analysis.

Keywords: demand, Hajj, Morocco, outbound tourism, tendency, Umrah

Procedia PDF Downloads 176
946 Development of Lodging Business Management Standards of Bang Khonthi Community in Samut Songkram Province

Authors: Poramet Saeng-On

Abstract:

This research aims to develop ways of lodging business management of Bang Khonthi community in Samut Songkram province that are appropriate with the cultural context of the Bang Khonthi community. Eight lodging business owners were interviewed. It was found that lodging business that are family business must be done with passion, correct understanding of self, culture, nature, Thai way of life, thorough, professional development, environmentally concerned, building partnerships with various networks both community level, and public sector and business cohorts. Public relations should be done through media both traditional and modern outlets, such as websites and social networks to provide customers convenience, security, happiness, knowledge, love and value when travel to Bang Khonthi. This will also help them achieve sustainability in business, in line with the 10 Home Stay Standard Thailand. Suggestions for operators are as follows: Operators need to improve their public relations work. They need to use technology in public relations such as the internet. Management standards must be improved. Souvenir and local products shops should be arranged in the compound. Product pricing must be set accordingly. They need to join hands to help each other. Quality of the business operation should be raised to meet the standards. Educational measures to reduce the impact caused by tourism on the community such as efforts to reduce energy consumption.

Keywords: homestay, lodging business, management, standard

Procedia PDF Downloads 450
945 RSU Aggregated Message Delivery for VANET

Authors: Auxeeliya Jesudoss, Ashraph Sulaiman, Ratnakar Kotnana

Abstract:

V2V communication brings up several questions of scalability issues although message sharing in vehicular ad-hoc networks comprises of both Vehicle-to-Vehicle communications (V2V) and Vehicle to Infrastructure communication (V2I). It is not an easy task for a vehicle to verify all signatures of the messages sent by its neighboring vehicles in a timely manner, without resulting in message loss. Moreover, the communication overhead of a vehicle to authenticate another vehicle would increase together with the security of the system. Another issue to be addressed is the continuous mobility of vehicles which requires at least some information on the node’s own position to be revealed to the neighboring vehicles. This may facilitate the attacker to congregate information on a node’s position or its mobility patterns. In order to tackle these issues, this paper introduces a RSU aggregated message deliverance scheme called RAMeD. With RAMeD, roadside units (RSUs) are responsible for verifying the identity of the vehicles entering in its range, collect messages from genuine vehicles and to aggregate similar messages into groups before sending them to all the vehicles in its communication range. This aggregation will tremendously improve the rate of message delivery and reduce the message lose ratio by avoiding similar messages being sent to the vehicles redundantly. The proposed protocol is analyzed extensively to evaluate its merits and efficiency for vehicular communication.

Keywords: vehicular ad-hoc networks, V2V, V2I, VANET communication, scalability, message aggregation

Procedia PDF Downloads 409