Search results for: global location-domination number
14453 Analysis of Slip Flow Heat Transfer between Asymmetrically Heated Parallel Plates
Authors: Hari Mohan Kushwaha, Santosh Kumar Sahu
Abstract:
In the present study, analysis of heat transfer is carried out in the slip flow region for the fluid flowing between two parallel plates by employing the asymmetric heat fluxes at surface of the plates. The flow is assumed to be hydrodynamically and thermally fully developed for the analysis. The second order velocity slip and viscous dissipation effects are considered for the analysis. Closed form expressions are obtained for the Nusselt number as a function of Knudsen number and modified Brinkman number. The limiting condition of the present prediction for Kn = 0, Kn2 = 0, and Brq1 = 0 is considered and found to agree well with other analytical results.Keywords: Knudsen number, modified Brinkman number, slip flow, velocity slip
Procedia PDF Downloads 38714452 Modeling and Optimal Control of Pneumonia Disease with Cost Effective Strategies
Authors: Getachew Tilahun, Oluwole Makinde, David Malonza
Abstract:
We propose and analyze a non-linear mathematical model for the transmission dynamics of pneumonia disease in a population of varying size. The deterministic compartmental model is studied using stability theory of differential equations. The effective reproduction number is obtained and also the local and global asymptotically stability conditions for the disease free and as well as for the endemic equilibria are established. The model exhibit a backward bifurcation and the sensitivity indices of the basic reproduction number to the key parameters are determined. Using Pontryagin’s maximum principle, the optimal control problem is formulated with three control strategies; namely disease prevention through education, treatment and screening. The cost effectiveness analysis of the adopted control strategies revealed that the combination of prevention and treatment is the most cost effective intervention strategies to combat the pneumonia pandemic. Numerical simulation is performed and pertinent results are displayed graphically.Keywords: cost effectiveness analysis, optimal control, pneumonia dynamics, stability analysis, numerical simulation
Procedia PDF Downloads 32714451 Risk Management and Resiliency: Evaluating Walmart’s Global Supply Chain Leadership Using the Supply Chain Resilience Assessment and Management Framework
Authors: Meghan Biallas, Amanda Hoffman, Tamara Miller, Kimmy Schnibben, Janaina Siegler
Abstract:
This paper assesses Walmart’s supply chain resiliency amidst continuous supply chain disruptions. It aims to evaluate how Walmart can use supply chain resiliency theory to retain its status as a global supply chain leader. The Bloomberg terminal was used to organize Walmart’s 754 Tier-1 suppliers by the size of their relationship to Walmart. Additional data from IBISWorld and Statista was also used in the analysis. This research focused on the top ten Tier-1 suppliers, with the greatest percentage of their revenue attributed to Walmart. This paper also applied the firm’s information to the Supply Chain Resilience Assessment and Management (SCRAM) framework for supply chain resiliency to evaluate the firm’s capabilities, vulnerabilities, and gaps. A rubric was created to quantify Walmart’s risks using four pillars: flexibility, velocity, visibility, and collaboration. Information and examples were reported from Walmart’s 10k filing. For each example, a rating of 1 indicated “high” resiliency, 0 indicated “medium” resiliency, and -1 indicated “low” resiliency. Findings from this study include the following: (1) Walmart has maintained its leadership through its ability to remain resilient with regard to visibility, efficiency, capacity, and collaboration. (2) Walmart is experiencing increases in supply chain costs due to internal factors affecting the company and external factors affecting its suppliers. (3) There are a number of emerging supply chain risks with Walmart’s suppliers, which could cause issues for Walmart to remain a supply chain leader in the future. Using the SCRAM framework, this paper assesses how Walmart measures up to the Supply Chain Resiliency Theory, identifying areas of strength as well as areas where Walmart can improve in order to remain a global supply chain leader.Keywords: supply chain resiliency, zone of balanced resilience, supply chain resilience assessment and management, supply chain theory.
Procedia PDF Downloads 12714450 Heterogeneous Reactions to Digital Opportunities: A Field Study
Authors: Bangaly Kaba
Abstract:
In the global information society, the importance of the Internet cannot be overemphasized. Africa needs access to the powerful information and communication tools of the Internet in order to obtain the resources and efficiency essential for sustainable development. Unfortunately, in 2013, the data from Internetworldstats showed only 15% of African populations have access to Internet. This relative low Internet penetration rate signals a problem that may threaten the economic development, governmental efficiency, and ultimately the global competitiveness of African countries. Many initiatives were undertaken to bring the benefits of the global information revolution to the people of Africa, through connection to the Internet and other Global Information Infrastructure technologies. The purpose is to understand differences between socio-economically advantaged and disadvantaged internet users. From that, we will determine what prevents disadvantaged groups from benefiting from Internet usage. Data were collected through a survey from Internet users in Ivory Coast. The results reveal that Personal network exposure, Self-efficacy and Availability are the key drivers of continued use intention for the socio-economically disadvantaged group. The theoretical and practical implications are also described.Keywords: digital inequality, internet, integrative model, socio-economically advantaged and disadvantaged, use continuance, Africa
Procedia PDF Downloads 46914449 The State in Africa and the twenty-First Century Global Economic Relations
Authors: Sunday Ofum Ogon
Abstract:
The 1648 Westphalia Conference in Europe ushered in the state as the only legal entity with powers to engage in interstate relations on matters that bothers on the development need of her citizens. This epochal entry of the state reshaped global relations with the curtailment of the powers of individual and groups in external relations as the state became the only entity that acted on behalf of any individual or non-state actors like NGOs residing within the parameters of such a country. Thus, the paper interrogated the extent at which the state determines her Politico-Economic relations with regards to development and growth within the state. To achieve these objectives, the paper relied on documentary evidences wherein the qualitative descriptive method was used for data collection and analysis. The paper exploited the facilities of the Rentier State theory as a guide to the study. It was revealed at the end of the study that the 21st century global economic relations is largely determine by international organizations as exemplified by the World Bank and the International Monitory Fund (IMF) where their activities in the continent has undermined state sovereignty. Hence the paper recommended amongst others that states should look inward for development strategies rather than relying on handout from supra-national organizations which has infringe on their sovereignty.Keywords: State , Global , Rentier state, Twenty-First Century
Procedia PDF Downloads 27314448 Application All Digits Number Benford Law in Financial Statement
Authors: Teguh Sugiarto
Abstract:
Background: The research aims to explore if there is fraud in a financial statement, use the Act stated that Benford's distribution all digits must compare the number will follow the trend of lower number. Research methods: This research uses all the analysis number being in Benford's law. After receiving the results of the analysis of all the digits, the author makes a distinction between implementation using the scale above and below 5%, the rate of occurrence of difference. With the number which have differences in the range of 5%, then can do the follow-up and the detection of the onset of fraud against the financial statements. The findings: From the research that has been done can be drawn the conclusion that the average of all numbers appear in the financial statements, and compare the rates of occurrence of numbers according to the characteristics of Benford's law. About the existence of errors and fraud in the financial statements of PT medco Energy Tbk did not occur. Conclusions: The study concludes that Benford's law can serve as indicator tool in detecting the possibility of in financial statements to case studies of PT Medco Energy Tbk for the fiscal year 2000-2010.Keywords: Benford law, first digits, all digits number Benford law, financial statement
Procedia PDF Downloads 23914447 Determining the Number of Single Models in a Combined Forecast
Authors: Serkan Aras, Emrah Gulay
Abstract:
Combining various forecasting models is an important tool for researchers to attain more accurate forecasts. A great number of papers have shown that selecting single models as dissimilar models, or methods based on different information as possible leads to better forecasting performances. However, there is not a certain rule regarding the number of single models to be used in any combining methods. This study focuses on determining the optimal or near optimal number for single models with the help of statistical tests. An extensive experiment is carried out by utilizing some well-known time series data sets from diverse fields. Furthermore, many rival forecasting methods and some of the commonly used combining methods are employed. The obtained results indicate that some statistically significant performance differences can be found regarding the number of the single models in the combining methods under investigation.Keywords: combined forecast, forecasting, M-competition, time series
Procedia PDF Downloads 35514446 Arithmetic Operations Based on Double Base Number Systems
Authors: K. Sanjayani, C. Saraswathy, S. Sreenivasan, S. Sudhahar, D. Suganya, K. S. Neelukumari, N. Vijayarangan
Abstract:
Double Base Number System (DBNS) is an imminent system of representing a number using two bases namely 2 and 3, which has its application in Elliptic Curve Cryptography (ECC) and Digital Signature Algorithm (DSA).The previous binary method representation included only base 2. DBNS uses an approximation algorithm namely, Greedy Algorithm. By using this algorithm, the number of digits required to represent a larger number is less when compared to the standard binary method that uses base 2 algorithms. Hence, the computational speed is increased and time being reduced. The standard binary method uses binary digits 0 and 1 to represent a number whereas the DBNS method uses binary digit 1 alone to represent any number (canonical form). The greedy algorithm uses two ways to represent the number, one is by using only the positive summands and the other is by using both positive and negative summands. In this paper, arithmetic operations are used for elliptic curve cryptography. Elliptic curve discrete logarithm problem is the foundation for most of the day to day elliptic curve cryptography. This appears to be a momentous hard slog compared to digital logarithm problem. In elliptic curve digital signature algorithm, the key generation requires 160 bit of data by usage of standard binary representation. Whereas, the number of bits required generating the key can be reduced with the help of double base number representation. In this paper, a new technique is proposed to generate key during encryption and extraction of key in decryption.Keywords: cryptography, double base number system, elliptic curve cryptography, elliptic curve digital signature algorithm
Procedia PDF Downloads 39614445 Non-Autonomous Seasonal Variation Model for Vector-Borne Disease Transferral in Kampala of Uganda
Authors: Benjamin Aina Peter, Amos Wale Ogunsola
Abstract:
In this paper, a mathematical model of malaria transmission was presented with the effect of seasonal shift, due to global fluctuation in temperature, on the increase of conveyor of the infectious disease, which probably alters the region transmission potential of malaria. A deterministic compartmental model was proposed and analyzed qualitatively. Both qualitative and quantitative approaches of the model were considered. The next-generation matrix is employed to determine the basic reproduction number of the model. Equilibrium points of the model were determined and analyzed. The numerical simulation is carried out using Excel Micro Software to validate and support the qualitative results. From the analysis of the result, the optimal temperature for the transmission of malaria is between and . The result also shows that an increase in temperature due to seasonal shift gives rise to the development of parasites which consequently leads to an increase in the widespread of malaria transmission in Kampala. It is also seen from the results that an increase in temperature leads to an increase in the number of infectious human hosts and mosquitoes.Keywords: seasonal variation, indoor residual spray, efficacy of spray, temperature-dependent model
Procedia PDF Downloads 16914444 High Resolution Satellite Imagery and Lidar Data for Object-Based Tree Species Classification in Quebec, Canada
Authors: Bilel Chalghaf, Mathieu Varin
Abstract:
Forest characterization in Quebec, Canada, is usually assessed based on photo-interpretation at the stand level. For species identification, this often results in a lack of precision. Very high spatial resolution imagery, such as DigitalGlobe, and Light Detection and Ranging (LiDAR), have the potential to overcome the limitations of aerial imagery. To date, few studies have used that data to map a large number of species at the tree level using machine learning techniques. The main objective of this study is to map 11 individual high tree species ( > 17m) at the tree level using an object-based approach in the broadleaf forest of Kenauk Nature, Quebec. For the individual tree crown segmentation, three canopy-height models (CHMs) from LiDAR data were assessed: 1) the original, 2) a filtered, and 3) a corrected model. The corrected CHM gave the best accuracy and was then coupled with imagery to refine tree species crown identification. When compared with photo-interpretation, 90% of the objects represented a single species. For modeling, 313 variables were derived from 16-band WorldView-3 imagery and LiDAR data, using radiance, reflectance, pixel, and object-based calculation techniques. Variable selection procedures were employed to reduce their number from 313 to 16, using only 11 bands to aid reproducibility. For classification, a global approach using all 11 species was compared to a semi-hierarchical hybrid classification approach at two levels: (1) tree type (broadleaf/conifer) and (2) individual broadleaf (five) and conifer (six) species. Five different model techniques were used: (1) support vector machine (SVM), (2) classification and regression tree (CART), (3) random forest (RF), (4) k-nearest neighbors (k-NN), and (5) linear discriminant analysis (LDA). Each model was tuned separately for all approaches and levels. For the global approach, the best model was the SVM using eight variables (overall accuracy (OA): 80%, Kappa: 0.77). With the semi-hierarchical hybrid approach, at the tree type level, the best model was the k-NN using six variables (OA: 100% and Kappa: 1.00). At the level of identifying broadleaf and conifer species, the best model was the SVM, with OA of 80% and 97% and Kappa values of 0.74 and 0.97, respectively, using seven variables for both models. This paper demonstrates that a hybrid classification approach gives better results and that using 16-band WorldView-3 with LiDAR data leads to more precise predictions for tree segmentation and classification, especially when the number of tree species is large.Keywords: tree species, object-based, classification, multispectral, machine learning, WorldView-3, LiDAR
Procedia PDF Downloads 13414443 Re-Imagining and De-Constructing the Global Security Architecture
Authors: Smita Singh
Abstract:
The paper develops a critical framework to the hegemonic discourses resorted to by the dominant powers in the global security architecture. Within this framework, security is viewed as a discourse through which identities and threats are represented and produced to legitimize the security concerns of few at the cost of others. International security have long been driven and dominated by power relations. Since the end of the Cold War, the global transformations have triggered contestations to the idea of security at both theoretical and practical level. These widening and deepening of the concept of security have challenged the existing power hierarchies at the theoretical level but not altered the substance and actors defining it. When discourses are introduced into security studies, several critical questions erupt: how has power shaped security policies of the globe through language? How does one understand the meanings and impact of those discourses? Who decides the agenda, rules, players and outliers of the security? Language as a symbolic system and form of power is fluid and not fixed. Over the years the dominant Western powers, led by the United States of America have employed various discursive practices such as humanitarian intervention, responsibility to protect, non proliferation, human rights, war on terror and so on to reorient the constitution of identities and interests and hence the policies that need to be adopted for its actualization. These power relations are illustrated in this paper through the narratives used in the nonproliferation regime. The hierarchical security dynamics is a manifestation of the global power relations driven by many factors including discourses.Keywords: hegemonic discourse, global security, non-proliferation regime, power politics
Procedia PDF Downloads 31814442 The Effects of Physiological Stress on Global and Regional Repolarisation in the Human Heart in Vivo
Authors: May Khei Hu, Kevin Leong, Fu Siong Ng, Nicholas Peter
Abstract:
Introduction: Sympathetic stimulation has been recognised as a potent stimulus of arrhythmogenesis in various cardiac pathologies, possibly by augmenting dispersion of repolarisation. The effects of sympathetic stimulation in healthy subjects however remain unclear. It is, therefore, crucial to first establish the effects of physiological stress on dispersion of repolarisation in healthy subjects before understanding these effects in pathological cardiac conditions. We hypothesised that activation-recovery interval (ARI; which is a surrogate of action potential duration) and dispersion of repolarisation decrease on sympathetic stimulation. Methods: Eight patients aged 18-55 years with structurally normal hearts underwent head-up tilt test (HUTT) and exercise tolerance test (ETT) while wearing the electrocardiographic imaging (ECGi) vest. Patients later underwent CT scan and the epicardial potentials are reconstructed using the ECGi software. Activation and recovery times were determined from the acquired electrograms. ARI was calculated and later corrected using Bazett’s formula. Global and regional dispersion of repolarisation were determined from standard deviation of the corrected ARI (ARIc). One-way analysis of variance (ANOVA) and Wilcoxon test were used to evaluate statistical significance. Results: Global ARIc increased significantly [p<0.01] when patients were tilted upwards but decreased significantly after five minutes [p<0.01]. A subsequent post- hoc analysis revealed that the decrease in R-R was more substantial compared to the change in ARI, resulting in the observed increase in ARIc. Global ARIc decreased on peak exercise [p<0.01] but increased on recovery [p<0.01]. Global dispersion increased significantly on peak exercise [p<0.05] although there were no significant changes in regional dispersion. There were no significant changes in both global and regional dispersion during tilt. Conclusion: ARIc decreases upon sympathetic stimulation in healthy subjects. Global dispersion of repolarisation increases upon exercise although there were no changes in global or regional dispersion during orthostatic stress.Keywords: dispersion of repolarisation, sympathetic stimulation, Head-up tilt test (HUTT), Exercise tolerance test (ETT), Electrocardiographic imaging (ECGi)
Procedia PDF Downloads 19714441 The Viability of Islamic Finance and Its Impact on Global Financial Stability: Evidence from Practical Implications
Authors: Malik Shahzad Shabbir, Muhammad Saarim Ghazi, Amir Khalil ur Rehman
Abstract:
This study examines the factors which influence and contribute towards the financial viability of Islamic finance and its impact on global financial stability. However, the purpose of this paper is to differentiate the practical implications of both Islamic and conventional finance on global financial stability. The Islamic finance is asset backed financing which creates wealth through trade, commerce and believes in risk and return sharing. Islamic banking is asset driven as against to conventional banking which is liability driven. In order to introduce new financial products for market, financial innovation in Islamic finance must be within the Shari’ah parameters that are tested against the ‘Maqasid al-Shari’ah’. Interest-based system leads to income and wealth inequalities and mis-allocation of resources. Moreover, this system has absence of just and equitable aspect of distribution that may exploit either the debt holder or the financier. Such implications are reached to a tipping point that leaves only one choice: change or face continued decline and misery.Keywords: viability, global financial stability, practical implications, asset driven, tipping point
Procedia PDF Downloads 30314440 Studying the Effect of Froude Number and Densimetric Froude Number on Local Scours around Circular Bridge Piers
Authors: Md Abdullah Al Faruque
Abstract:
A very large percentage of bridge failures are attributed to scouring around bridge piers and this directly influences public safety. Experiments are carried out in a 12-m long rectangular open channel flume made of transparent tempered glass. A 300 mm thick bed made up of sand particles is leveled horizontally to create the test bed and a 50 mm hollow plastic cylinder is used as a model bridge pier. Tests are carried out with varying flow depths and velocities. Data points of various scour parameters such as scour depth, width, and length are collected based on different flow conditions and visual observations of changes in the stream bed downstream the bridge pier are also made as the scour progresses. Result shows that all three major flow characteristics (flow depth, Froude number and densimetric Froude number) have one way or other affect the scour profile.Keywords: bridge pier scour, densimetric Froude number, flow depth, Froude number, sand
Procedia PDF Downloads 17014439 Hybrid Intelligent Optimization Methods for Optimal Design of Horizontal-Axis Wind Turbine Blades
Authors: E. Tandis, E. Assareh
Abstract:
Designing the optimal shape of MW wind turbine blades is provided in a number of cases through evolutionary algorithms associated with mathematical modeling (Blade Element Momentum Theory). Evolutionary algorithms, among the optimization methods, enjoy many advantages, particularly in stability. However, they usually need a large number of function evaluations. Since there are a large number of local extremes, the optimization method has to find the global extreme accurately. The present paper introduces a new population-based hybrid algorithm called Genetic-Based Bees Algorithm (GBBA). This algorithm is meant to design the optimal shape for MW wind turbine blades. The current method employs crossover and neighborhood searching operators taken from the respective Genetic Algorithm (GA) and Bees Algorithm (BA) to provide a method with good performance in accuracy and speed convergence. Different blade designs, twenty-one to be exact, were considered based on the chord length, twist angle and tip speed ratio using GA results. They were compared with BA and GBBA optimum design results targeting the power coefficient and solidity. The results suggest that the final shape, obtained by the proposed hybrid algorithm, performs better compared to either BA or GA. Furthermore, the accuracy and speed convergence increases when the GBBA is employedKeywords: Blade Design, Optimization, Genetic Algorithm, Bees Algorithm, Genetic-Based Bees Algorithm, Large Wind Turbine
Procedia PDF Downloads 31614438 Design and Construction of Vehicle Tracking System with Global Positioning System/Global System for Mobile Communication Technology
Authors: Bala Adamu Malami
Abstract:
The necessity of low-cost electronic vehicle/car security designed in coordination with other security measures is always there in our society to reduce the risk of vehicle intrusion. Keeping this problem in mind, we are designing an automatic GPS system which is technology to build an integrated and fully customized vehicle to detect the movement of the vehicle and also serve as a security system at a reasonable cost. Users can locate the vehicle's position via GPS by using the Google Maps application to show vehicle coordinates on a smartphone. The tracking system uses a Global System for Mobile Communication (GSM) modem for communication between the mobile station and the microcontroller to send and receive commands. Further design can be improved to capture the vehicle movement range and alert the vehicle owner when the vehicle is out of range.Keywords: electronic, GPS, GSM modem, communication, vehicle
Procedia PDF Downloads 9914437 Free Shape Optimisation of Cold Formed Steel Sections
Authors: Mina Mortazavi, Pezhman Sharafi
Abstract:
Cold-formed steel sections are popular construction materials as structural or non-structural elements. The objective of this paper is to propose an optimisation method for open cross sections targeting the maximum nominal axial strength. The cross sections considered in the optimisation process should all meet a determined critical global buckling load to be considered as a candidate for optimisation process. The maximum dimensions of the cross section are fixed and limited into a predefined rectangular area. The optimisation process is repeated for different available coil thicknesses of 1 mm, 2.5 mm and 3 mm to determine the optimum thickness according to the cross section buckling behaviour. A simple-simple boundary is assumed as end conditions. The number of folds is limited to 20 folds to prevent extra complicated sections. The global buckling load is considered as Euler load and is determined according to the moment of inertia of the cross-section with a constant length. The critical buckling loads are obtained using Finite Strip Method. The results of the optimisation analysis are provided, and the optimum cross-section within the considered range is determined.Keywords: shape optimisation, buckling, cold formed steel, finite strip method
Procedia PDF Downloads 39914436 Estimation of Global and Diffuse Solar Radiation Over Two Cities of Sindh, Pakistan
Authors: M. A. Ahmed, Sidra A. Shaikh, M. W. Akhtar
Abstract:
Global and Diffuse Solar radiation on horizontal surface over two cities of Sindh, namely Jacobabad and Rohri were carried out using sunshine hour data of the area to assess the feasibility of solar energy utilization in Sindh province. The result obtained shows a high variation in direct and diffuse component of solar radiation in summer and winter months (80% direct and 20% diffuse). The contribution of diffuse solar radiation is low even in monsoon months i.e. July and August. The appearance of cloud is rare even in monsoon months. The estimated value indicates that this part of Sindh has higher solar potential and solar panels can be used for power generation. The solar energy can be utilized throughout the year in this part of Sindh, Pakistan.Keywords: solar potential over Sindh, global and diffuse solar radiation, radiation over two cities of Sindh, environmental engineering
Procedia PDF Downloads 44714435 Effect of Three Sand Types on Potato Vegetative Growth and Yield
Authors: Shatha A. Yousif, Qasim M. Zamil, Hasan Y. Al Muhi, Jamal A. Al Shammari
Abstract:
Potato (Solanum tuberosum L.) is one of the major vegetable crops that are grown world wide because of its economic importance. This experiment investigated the effect of local sands (River Base, Al-Ekader and Karbala) on number and total weight of mini tubers. Statistical analysis revealed that there were no significant differences among sand cultures in number of stem/plant, chlorophyll index and tubers dry weight. River Base sand had the highest plant height (74.9 cm), leaf number/plant number (39.3), leaf area (84.4 dcm2⁄plant), dry weight/plant (26.31), tubers number/plant (8.5), tubers weight/plant (635.53 gm) and potato tuber yields/trove (28.60 kg), whereas the Karbala sand had lower performance. All the characters had positive and significant correlation with yields except the traits number of stem and tuber dry weight.Keywords: correlation, potato, sand culture, yield
Procedia PDF Downloads 47614434 Numerical Investigation of Heat Transfer in a Channel with Delta Winglet Vortex Generators at Different Reynolds Numbers
Authors: N. K. Singh
Abstract:
In this study the augmentation of heat transfer in a rectangular channel with triangular vortex generators is evaluated. The span wise averaged Nusselt number, mean temperature and total heat flux are compared with and without vortex generators in the channel at a blade angle of 30° for Reynolds numbers 800, 1200, 1600, and 2000. The use of vortex generators increases the span wise averaged Nusselt number compared to the case without vortex generators considerably. At a particular blade angle, increasing the Reynolds number results in an enhancement in the overall performance and span wise averaged Nusselt number was found to be greater at particular location for larger Reynolds number. The total heat flux from the bottom wall with vortex generators was found to be greater than that without vortex generators and the difference increases with increase in Reynolds number.Keywords: heat transfer, channel with vortex generators, numerical simulation, effect of Reynolds number on heat transfer
Procedia PDF Downloads 33114433 Consumers Rights during COVID-19 Pandemic Time: Evidence from Libya
Authors: Sabri Gabran Mohammed Elkrghli, Salah A. Mohamed Abdulgader
Abstract:
Given the emergence and the spreading of the Covid-19 pandemic that swept the globe, it was necessary to address the issue of consumer rights in such unprecedented circumstances. Libyan consumers have been targeted in this study with the aim to measure their attitudes towards the extent to which their rights, as consumers of foodstuff, have been secured during the Covid-19 pandemic. The recommended sample size was randomly selected (384) local participants. Out of this number, only a validated number of (267) responses were deemed valid for the analysis phase. The instrument of this research was developed based on the extant published literature on consumer rights. The study concluded with a set of key results; the most important result is that consumer rights of foodstuffs were below the satisfactory level. Theoretical and practical implications have emerged from the study. The most important implication is that customers of foodstuffs need more protection in Libya. This issue should be given greater importance, especially in the light of contemporary environmental challenges such as the outbreak of Covid-19. Designing and conducting global and local awareness campaigns is another significant advice suggested by this study. Finally, the research concluded with limitations and put forward some future avenues.Keywords: consumers rights, foodstuffs, COVID-19, Libya
Procedia PDF Downloads 15514432 Cyber Warfare and Cyber Terrorism: An Analysis of Global Cooperation and Cyber Security Counter Measures
Authors: Mastoor Qubra
Abstract:
Cyber-attacks have frequently disrupted the critical infrastructures of the major global states and now, cyber threat has become one of the dire security risks for the states across the globe. Recently, ransomware cyber-attacks, wannacry and petya, have affected hundreds of thousands of computer servers and individuals’ private machines in more than hundred countries across Europe, Middle East, Asia, United States and Australia. Although, states are rapidly becoming aware of the destructive nature of this new security threat and counter measures are being taken but states’ isolated efforts would be inadequate to deal with this heinous security challenge, rather a global coordination and cooperation is inevitable in order to develop a credible cyber deterrence policy. Hence, the paper focuses that coordinated global approach is required to deter posed cyber threat. This paper intends to analyze the cyber security counter measures in four dimensions i.e. evaluation of prevalent strategies at bilateral level, initiatives and limitations for cooperation at global level, obstacles to combat cyber terrorism and finally, recommendations to deter the threat by applying tools of deterrence theory. Firstly, it focuses on states’ efforts to combat the cyber threat and in this regard, US-Australia Cyber Security Dialogue is comprehensively illustrated and investigated. Secondly, global partnerships and strategic and analytic role of multinational organizations, particularly United Nations (UN), to deal with the heinous threat, is critically analyzed and flaws are highlighted, for instance; less significance of cyber laws within international law as compared to other conflict prone issues. In addition to this, there are certain obstacles and limitations at national, regional and global level to implement the cyber terrorism counter strategies which are presented in the third section. Lastly, by underlining the gaps and grey areas in the current cyber security counter measures, it aims to apply tools of deterrence theory, i.e. defense, attribution and retaliation, in the cyber realm to contribute towards formulating a credible cyber deterrence strategy at global level. Thus, this study is significant in understanding and determining the inevitable necessity of counter cyber terrorism strategies.Keywords: attribution, critical infrastructure, cyber terrorism, global cooperation
Procedia PDF Downloads 26914431 Drivers of Global Great Power Assertiveness: Russia and Its Involvement in the Global South
Authors: Elina Vroblevska, Toms Ratfelders
Abstract:
This paper examines the impact of international status-seeking aspirations on great power behavior within the international system. In particular, we seek to test the assumption advanced by the proponents of the Social Identity Theory (SIT) that the inability to achieve social mobilization through joining perceived higher-status social groups (of states) leads great powers to adopt the approach of social competition in which they aim to equal or outdo the dominant group in the area on which its claim to superior status rests. Since the dissolution of the Soviet Union, Russia has struggled to be accepted as a great power by the group of Western states that had created the dominant international system order, while the Soviet states were isolated. While the 1990s and the beginning of the 21st century can be characterized by striving to integrate into the existing order, the second decade has seen a rather sharp turn towards creating a new power center for Russia through the realization of ideas of multipolarity rivalry and uniqueness of the state itself. Increasingly, we have seen the Kremlin striving to collaborate and mobilize groups of states that fall outside of the categories of democracy, multiculturalism, and international order, the way that is perceived by the dominant group, which can be described as the West. Instead, Russia builds its own narrative where it creates an alternative understanding of these values, differentiating from the higher-status social group. The Global South, from a Russian perspective, is the group of states that can still be swayed to create an alternative power center in the international system - one where Russia can assert its status as a great power. This is based on a number of reasons, the most important being that the global north is already highly institutionalized in terms of economy (the EU) and defense (NATO), leaving no room for Russia but to integrate within the existing framework. Second, the difference in values and their interpretation - Russia has been adamant, for the last twenty years, on basing its moral code on traditional values like religion, the heterosexual family model, and moral superiority, which contradict the overall secularism of the Global North. And last, the striking difference in understanding of state governance models - with Russia becoming more autocratic over the course of the last 20 years, it has deliberately created distance between itself and democratic states, entering a “gray area” of alternative understanding of democracy which is more relatable to the global South countries. Using computational text analysis of the excerpts of Vladimir Putin’s speeches delivered from 2000-2022 regarding the areas that fall outside the immediate area of interest of Russia (the Global South), we identify 80 topics that relate to the particular component of the great power status - interest to use force globally. These topics are compared across four temporal frames that capture the periods of more and less permissible Western social boundaries. We find that there exists a negative association between such permissiveness and Putin’s emphasis on the “use of force” topics. This lends further support to the Social Identity Theory and contributes to broadening its applicability to explaining the questions related to great power assertiveness in areas outside of their primary focus regions.Keywords: Russia, Global South, great power, identity
Procedia PDF Downloads 5414430 Nuclear Power Plant Radioactive Effluent Discharge Management in China
Authors: Jie Yang, Qifu Cheng, Yafang Liu, Zhijie Gu
Abstract:
Controlled emissions of effluent from nuclear power plants are an important means of ensuring environmental safety. In order to fully grasp the actual discharge level of nuclear power plant in China's nuclear power plant in the pressurized water reactor and heavy water reactor, it will use the global average nuclear power plant effluent discharge as a reference to the standard analysis of China's nuclear power plant environmental discharge status. The results show that the average normalized emission of liquid tritium in PWR nuclear power plants in China is slightly higher than the global average value, and the other nuclides emissions are lower than the global average values.Keywords: radioactive effluent, HWR, PWR, nuclear power plant
Procedia PDF Downloads 24314429 Empirical Analysis of the Global Impact of Cybercrime Laws on Cyber Attacks and Malware Types
Authors: Essang Anwana Onuntuei, Chinyere Blessing Azunwoke
Abstract:
The study focused on probing the effectiveness of online consumer privacy and protection laws, electronic transaction laws, privacy and data protection laws, and cybercrime legislation amid frequent cyber-attacks and malware types worldwide. An empirical analysis was engaged to uncover ties and causations between the stringency and implementation of these legal structures and the prevalence of cyber threats. A deliberate sample of seventy-eight countries (thirteen countries each from six continents) was chosen as sample size to study the challenges linked with trending regulations and possible panoramas for improving cybersecurity through refined legal approaches. Findings establish if the frequency of cyber-attacks and malware types vary significantly. Also, the result proved that various cybercrime laws differ statistically, and electronic transactions law does not statistically impact the frequency of cyber-attacks. The result also statistically revealed that the online Consumer Privacy and Protection law does not influence the total number of cyber-attacks. In addition, the results implied that Privacy and Data Protection laws do not statistically impact the total number of cyber-attacks worldwide. The calculated value also proved that cybercrime law does not statistically impact the total number of cyber-attacks. Finally, the computed value concludes that combined multiple cyber laws do not significantly impact the total number of cyber-attacks worldwide. Suggestions were produced based on findings from the study, contributing to the ongoing debate on the validity of legal approaches in battling cybercrime and shielding consumers in the digital age.Keywords: cybercrime legislation, cyber attacks, consumer privacy and protection law, detection, electronic transaction law, prevention, privacy and data protection law, prohibition, prosecution
Procedia PDF Downloads 4214428 Signs, Signals and Syndromes: Algorithmic Surveillance and Global Health Security in the 21st Century
Authors: Stephen L. Roberts
Abstract:
This article offers a critical analysis of the rise of syndromic surveillance systems for the advanced detection of pandemic threats within contemporary global health security frameworks. The article traces the iterative evolution and ascendancy of three such novel syndromic surveillance systems for the strengthening of health security initiatives over the past two decades: 1) The Program for Monitoring Emerging Diseases (ProMED-mail); 2) The Global Public Health Intelligence Network (GPHIN); and 3) HealthMap. This article demonstrates how each newly introduced syndromic surveillance system has become increasingly oriented towards the integration of digital algorithms into core surveillance capacities to continually harness and forecast upon infinitely generating sets of digital, open-source data, potentially indicative of forthcoming pandemic threats. This article argues that the increased centrality of the algorithm within these next-generation syndromic surveillance systems produces a new and distinct form of infectious disease surveillance for the governing of emergent pathogenic contingencies. Conceptually, the article also shows how the rise of this algorithmic mode of infectious disease surveillance produces divergences in the governmental rationalities of global health security, leading to the rise of an algorithmic governmentality within contemporary contexts of Big Data and these surveillance systems. Empirically, this article demonstrates how this new form of algorithmic infectious disease surveillance has been rapidly integrated into diplomatic, legal, and political frameworks to strengthen the practice of global health security – producing subtle, yet distinct shifts in the outbreak notification and reporting transparency of states, increasingly scrutinized by the algorithmic gaze of syndromic surveillance.Keywords: algorithms, global health, pandemic, surveillance
Procedia PDF Downloads 18514427 Design of Electric Ship Charging Station Considering Renewable Energy and Storage Systems
Authors: Jun Yuan
Abstract:
Shipping is a major transportation mode all over the world, and it has a significant contribution to global carbon emissions. Electrification of ships is one of the main strategies to reduce shipping carbon emissions. The number of electric ships has continued to grow in recent years. However, charging infrastructure is still scarce, which severely restricts the development of electric ships. Therefore, it is very important to design ship charging stations reasonably by comprehensively considering charging demand and investment costs. This study aims to minimize the full life cycle cost of charging stations, considering the uncertainty of charging demand. A mixed integer programming model is developed for this optimization problem. Based on the characteristics of the mathematical model, a simulation based optimization method is proposed to find the optimal number and rated power of chargers. In addition, the impact of renewable energy and storage systems is analyzed. The results can provide decision support and a reference basis for the design of ship charging stations.Keywords: shipping emission, electricity ship, charging station, optimal design
Procedia PDF Downloads 6214426 Suggestion of Two-Step Traction Therapy for Safer and More Effective Conservative Treatment for Low Back Pain
Authors: Won Man Park, Dae Kyung Choi, Kyungsoo Kim, Yoon Hyuk Kim
Abstract:
Traction therapy has been used in the treatment of spinal pain for decades. However, a case study reported the occurrence of large disc protrusion during motorized traction therapy. In this study, we hypothesized that additional local decompression with a global axial traction could be helpful for risk reduction of intervertebral disc damage. A validated three dimensional finite element model of the lumbar spine was used. Two-step traction therapy using the axial global traction (the first step) with 1/3 body weight and the additional local decompression (the second step) with 7 mm translation of L4 spinal bone was determined for the traction therapy. During two-step traction therapy, the sacrum was constrained in all translational directions. Reduced lordosis angle by the global axial traction recovered with the additional local decompression. Stress on fibers of the annulus fibrosus by the axial global traction decreased with the local decompression by 17%~96% in the posterior region of intervertebral disc. Stresses on ligaments except anterior longitudinal ligaments in all motion segments decreased till 4.9 mm~5.6 mm translation of L4 spinal bone. The results of this study showed that the additional local decompression is very useful for reducing risk of damage in the intervertebral disc and ligaments caused by the global axial traction force. Moreover, the local decompression could be used to enhance reduction of intradiscal pressure.Keywords: lumbar spine, traction-therapy, biomechanics, finite element analysis
Procedia PDF Downloads 48614425 First Digit Lucas, Fibonacci and Benford Number in Financial Statement
Authors: Teguh Sugiarto, Amir Mohamadian Amiri
Abstract:
Background: This study aims to explore if there is fraud in the company's financial report distribution using the number first digit Lucas, Fibonacci and Benford. Research methods: In this study, the author uses a number model contained in the first digit of the model Lucas, Fibonacci and Benford, to make a distinction between implementation by using the scale above and below 5%, the rate of occurrence of a difference against the digit number contained on Lucas, Fibonacci and Benford. If there is a significant difference above and below 5%, then the process of follow-up and detection of occurrence of fraud against the financial statements can be made. Findings: From research that has been done can be concluded that the number of frequency levels contained in the financial statements of PT Bank BRI Tbk in a year in the same conscientious results for model Lucas, Fibonacci and Benford.Keywords: Lucas, Fibonacci, Benford, first digit
Procedia PDF Downloads 27414424 Art Beyond Borders: Virtual School Field Trips
Authors: Audrey Hudson
Abstract:
In 2020, educational field trips went virtual for all students. At the Art Gallery of Ontario (AGO) in Canada, our solution was to create a virtual school program that addressed three pillars of access—economic, geographic and cultural—with art at the center. Now, at the close of three years, we have reached 1.6 million students! Exponentially more than we have ever welcomed for onsite school visits. In 2022, we partnered with the Museum of Modern Art (MoMA), the Hong Kong University Museum and the National Gallery of Singapore, which has pushed the boundaries of art education into the expanse of the global community. Looking forward to our fourth year of the program, we are using the platform of technology to expand our program of art, access and learning to a global platform. In 2023/24, we intend to connect across more borders to expand the pedagogical benefits of art education for a global community. We invite you to listen to how you can join this journey.Keywords: technology, museums, art education, pedagogy
Procedia PDF Downloads 65