Search results for: maintenance of peace and security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4379

Search results for: maintenance of peace and security

4169 The U.S.-Taliban Peace Deal: Two-level Game Logic and Actors’ Payoffs

Authors: Zafar Iqbal

Abstract:

This article aims at analyzing the U.S.-Taliban peace deal considering the cross- pressures that both parties (U.S. and Taliban) faced and eventually paved the way for a negotiated settlement to the two-decade-long war. The paper first discusses the peace process initiated by President Obama in 2009 and then explores the factors that compelled both the parties to sign this deal. The study is based on secondary data and interviews done with the leading experts on Afghanistan along with the Taliban Qatar office spokesperson’s interview. The theoretical framework is based on the interplay of diplomacy and domestic politics: two-level games logic proposed by Robert D. Putnam. The two-level games suggest that actors involved in negotiations face cross-pressures and are constrained both by the expectations of the domestic audience and their counterpart’s zone of possible agreement. This paper will take the cross pressures for both sides as the permissive factors for the entire process of negotiations. However, there will be a slight aberration in the application of Putnam’s two-level games. In this case, it is not inter-state negotiations but between an all-powerful state and the unyielding non-state actors. The study concludes that both the parties faced domestic as well as international pressure which compelled them to sign a deal that could lead to an end of the two-decade-long war. Furthermore, it looks at the potential prospects and challenges of the deal following the U.S. withdrawal.

Keywords: neo-Taliban insurgency, negotiations, two-level game, U.S.-Taliban peace deal, U.S. withdrawal

Procedia PDF Downloads 189
4168 The Law of Treaties and National Security of Islamic Republic of Iran

Authors: S. M. Tavakoli Sani, M. Sabbet Moghadam, Y. Khorram Farhadi, Iraj Rezayi Nejad

Abstract:

The concept of national security in Iran is a permanently effective factor in acceptance or rejection of many international obligations. These obligations had been defined according to the type of legislation of Iran in many aspects. Therefore, there are several treaties at international level which requires Iran’s security to come in contact with obligations in these treaties in a way that an obstacle to join to them and their passage in parliament. This issue is a typical category which every country pays attention to be accepted in treaties or to include their national security in that treaties and also they can see the related treaties from this perspective, but this issue that 'what is the concept of Iran’s national security', and 'To what extent it is changed in recent years, especially after Islamic Revolution' are important issues that can be criticized. Thus, this study is trying to assess singed treaties from the perspective of Iran’s national security according of the true meaning of treaty and to investigate how the international treaties may be in conflict with Iran’s national security.

Keywords: treaties, national security, Iran, Islamic Revolution

Procedia PDF Downloads 448
4167 The Implementation of Information Security Audits in Public Sector: Perspective from Indonesia

Authors: Nur Imroatun Sholihat, Gresika Bunga Sylvana

Abstract:

Currently, cyber attack became an incredibly serious problem due to its increasing trend all over the world. Therefore, information security becomes prominent for every organization including public sector organization. In Indonesia, unfortunately, Ministry of Finance (MoF) is the only public sector organization that has already formally established procedure to assess its information security adequacy by performing information security audits (November 2017). We assess the implementation of information security audits in the MoF using qualitative data obtained by interviewing IT auditors and by analysis of related documents. For this reason, information security audit practice in the MoF could become the acceptable benchmark for all other public sector organizations in Indonesia. This study is important because, to the best of the author’s knowledge, our research into information security audits practice in Indonesia’s public sector have not been found yet. Results showed that information security audits performed mostly by doing pentest (penetration testing) to MoF’s critical applications.

Keywords: information security audit, information technology, Ministry of Finance of Indonesia, public sector organization

Procedia PDF Downloads 206
4166 Software Quality Assurance in Network Security using Cryptographic Techniques

Authors: Sidra Shabbir, Ayesha Manzoor, Mehreen Sirshar

Abstract:

The use of the network communication has imposed serious threats to the security of assets over the network. Network security is getting more prone to active and passive attacks which may result in serious consequences to data integrity, confidentiality and availability. Various cryptographic techniques have been proposed in the past few years to combat with the concerned problem by ensuring quality but in order to have a fully secured network; a framework of new cryptosystem was needed. This paper discusses certain cryptographic techniques which have shown far better improvement in the network security with enhanced quality assurance. The scope of this research paper is to cover the security pitfalls in the current systems and their possible solutions based on the new cryptosystems. The development of new cryptosystem framework has paved a new way to the widespread network communications with enhanced quality in network security.

Keywords: cryptography, network security, encryption, decryption, integrity, confidentiality, security algorithms, elliptic curve cryptography

Procedia PDF Downloads 712
4165 Security Features for Remote Healthcare System: A Feasibility Study

Authors: Tamil Chelvi Vadivelu, Nurazean Maarop, Rasimah Che Yusoff, Farhana Aini Saludin

Abstract:

Implementing a remote healthcare system needs to consider many security features. Therefore, before any deployment of the remote healthcare system, a feasibility study from the security perspective is crucial. Remote healthcare system using WBAN technology has been used in other countries for medical purposes but in Malaysia, such projects are still not yet implemented. This study was conducted qualitatively. The interview results involving five healthcare practitioners are further elaborated. The study has addressed four important security features in order to incorporate remote healthcare system using WBAN in Malaysian government hospitals.

Keywords: remote healthcare, IT security, security features, wireless sensor application

Procedia PDF Downloads 281
4164 Geopolitical Architecture: The Strategic Complex in Indo Pacific Region

Authors: Muzammil Dar

Abstract:

The confluence of trans-national interests and divergent approaches followed by multiple actors has surrounded the Indo-Pacific region with myriad of strategic complexes- Geo-Political, Geo-economic, and security. This paper has thus made a humble attempt to understand the Indo-Pacific strategic predicament from Asia-Pacific perspective. The portmanteau of Indo-Pacific strategic gamble has multiple actors from global powers to regional actors. On the indo-pacific waters, not only flow trade relations, but the tides of conflicts and controversies are striking these actors against each other. The alliance formation and infrastructure building has built-in threat perceptions from rivals vice-versa. The assertiveness of China as a reality and India’s ideological doctrine of peace and friendship, as well as American rebalancing against China, could be seen as clear and bright on the Indo-Pacific strategic portmanteau. ASEAN and Japan, too, have oscillating posturing in the strategic dilemma. The aim and objective of the paper are to sketch out the prospectus and prejudices of Indo-pacific strategic complex.

Keywords: Indo Pacific, Asia Pacific, security and growth for all in the region, SAGAR, ASEAN China

Procedia PDF Downloads 120
4163 Power Transformer Risk-Based Maintenance by Optimization of Transformer Condition and Transformer Importance

Authors: Kitti Leangkrua

Abstract:

This paper presents a risk-based maintenance strategy of a power transformer in order to optimize operating and maintenance costs. The methodology involves the study and preparation of a database for the collection the technical data and test data of a power transformer. An evaluation of the overall condition of each transformer is performed by a program developed as a result of the measured results; in addition, the calculation of the main equipment separation to the overall condition of the transformer (% HI) and the criteria for evaluating the importance (% ImI) of each location where the transformer is installed. The condition assessment is performed by analysis test data such as electrical test, insulating oil test and visual inspection. The condition of the power transformer will be classified from very poor to very good condition. The importance is evaluated from load criticality, importance of load and failure consequence. The risk matrix is developed for evaluating the risk of each power transformer. The high risk power transformer will be focused firstly. The computerized program is developed for practical use, and the maintenance strategy of a power transformer can be effectively managed.

Keywords: asset management, risk-based maintenance, power transformer, health index

Procedia PDF Downloads 284
4162 A Survey of Attacks and Security Requirements in Wireless Sensor Networks

Authors: Vishnu Pratap Singh Kirar

Abstract:

Wireless sensor network (WSN) is a network of many interconnected networked systems, they equipped with energy resources and they are used to detect other physical characteristics. On WSN, there are many researches are performed in past decades. WSN applicable in many security systems govern by military and in many civilian related applications. Thus, the security of WSN gets attention of researchers and gives an opportunity for many future aspects. Still, there are many other issues are related to deployment and overall coverage, scalability, size, energy efficiency, quality of service (QoS), computational power and many more. In this paper we discus about various applications and security related issue and requirements of WSN.

Keywords: wireless sensor network (WSN), wireless network attacks, wireless network security, security requirements

Procedia PDF Downloads 462
4161 Design and Realization of Computer Network Security Perception Control System

Authors: El Miloudi Djelloul

Abstract:

Based on analysis on applications by perception control technology in computer network security status and security protection measures, from the angles of network physical environment and network software system environmental security, this paper provides network security system perception control solution using Internet of Things (IOT), telecom and other perception technologies. Security Perception Control System is in the computer network environment, utilizing Radio Frequency Identification (RFID) of IOT and telecom integration technology to carry out integration design for systems. In the network physical security environment, RFID temperature, humidity, gas and perception technologies are used to do surveillance on environmental data, dynamic perception technology is used for network system security environment, user-defined security parameters, security log are used for quick data analysis, extends control on I/O interface, by development of API and AT command, Computer Network Security Perception Control based on Internet and GSM/GPRS is achieved, which enables users to carry out interactive perception and control for network security environment by WEB, E-MAIL as well as PDA, mobile phone short message and Internet. In the system testing, through middle ware server, security information data perception in real time with deviation of 3-5% was achieved; it proves the feasibility of Computer Network Security Perception Control System.

Keywords: computer network, perception control system security strategy, Radio Frequency Identification (RFID)

Procedia PDF Downloads 417
4160 Human Security Providers in Fragile State under Asymmetric War Conditions

Authors: Luna Shamieh

Abstract:

Various players are part of the game in an asymmetric war, all making efforts to provide human security to their own adherents. Although a fragile state is not able to provide sufficient and comprehensive services, it still provides special services and security to the elite; the insurgents as well provide services and security to their associates. The humanitarian organisations, on the other hand, provide some fundamental elements of human security, but only in the regions, they are able to access when possible (if possible). The counterinsurgents (security forces of the state and intervention forces) operate within a narrow band defined by the vision of the responsibility to protect and the perspective of the resolution of the conflict through combat; hence, the possibility to provide human security is shaken at this end. This article examines how each player provides human security from the perspective of freedom from want in order to secure basic and strategic needs, freedom from fear through providing protection against all kinds of violence, and the freedom to live in dignity. It identifies a vicious cycle caused by the intervention of the different players causing a centrifugal force that may lead to disintegration of the nation under war.

Keywords: asymmetric war, counterinsurgency, fragile state, human security, insurgency

Procedia PDF Downloads 312
4159 Roadway Maintenance Management System

Authors: Chika Catherine Ayogu

Abstract:

Rehabilitation plays an important and integral part in the life of roadway rehabilitation management system. It is a systematic method for inspection and rating the roadway condition in a given area. The system performs a cost effective analysis of various maintenance and rehabilitation strategies. Finally the system prioritize and recommend roadway rehabilitation and maintenance to maximize results within a given budget amount. During execution of maintenance activity, the system also tracks labour, materials, equipment and cost for activities performed. The system implements physical assessment field inspection and rating of each street segment which is then entered into a database. The information is analyzed using a software, and provide recommendations and project future conditions. The roadway management system provides a deterioration curve for each segment based on input then assigns the most cost-effective maintenance strategy based on conditions, surface type and functional classification, and available budget. This paper investigates the roadway management system and its capabilities to assist in applying the right treatment to the right roadway at the right time so that expected service life of the roadway is extended as long as possible with acceptable cost.

Keywords: effectiveness, rehabilitation, roadway, software system

Procedia PDF Downloads 125
4158 Youth Participation in Peace Building and Development in Northern Uganda

Authors: Eric Awich Ochen

Abstract:

The end of the conflict in Northern Uganda in 2006 brought about an opportunity for the youth to return to their original home and contribute to the peace building and development process of their communities. Post-conflict is used here to refer to the post-armed conflict situation and activities of rebels of Joseph Kony in northern Uganda. While the rebels remain very much active in the Sudan and Central African Republic, in Uganda the last confrontations occurred around 2006 or earlier, and communities have returned to their homes and began the process of rebuilding their lives. It is argued that socio-economic reconstruction is at the heart of peacebuilding and sustenance of positive peace in the aftermath of conflict, as it has a bearing on post-conflict stability and good governance. We recognize that several post-conflict interventions within Northern Uganda have targeted women and children with a strong emphasis on family socio-economic empowerment and capacity building, including access to micro finance. The aim of this study was to examine the participation of the youth in post-conflict peace building and development in Northern Uganda by assessing the breadth and width of their engagement and the stages of programming cycle that they are involved in, interrogating the space for participation and how they are facilitating or constraining participation. It was further aimed at examining the various dimensions of participation at play in Northern Uganda and where this fits within the conceptual debates on peace building and development in the region. Supporting young people emerging out of protracted conflict to re-establish meaningful socio-economic engagements and livelihoods is fundamental to their participation in the affairs of the community. The study suggests that in the post-conflict development context of Northern Uganda, participation has rarely been disaggregated or differentiated by sectors or groups. Where some disaggregation occurs, then the main emphasis has always been on either women or children. It appears therefore that little meaningful space has thus been created for young people to engage and participate in peace building initiatives within the region. In other cases where some space is created for youth participation, this has been in pre-conceived programs or interventions conceived by the development organizations with the youth or young people only invited to participate at particular stages of the project implementation cycle. Still within the implementation of the intervention, the extent to which young people participate is bounded, with little power to influence the course of the interventions or make major decisions. It is thus visible that even here young people mainly validate and legitimize what are predetermined processes only act as pawns in the major chess games played by development actors (dominant peace building partners). This paper, therefore, concludes that the engagement of the youth in post-conflict peace building has been quite problematic and tokenistic and has not given the adequate youth space within which they could ably participate and express themselves in the ensuing interventions.

Keywords: youth, conflict, peace building, participation

Procedia PDF Downloads 376
4157 Simultaneous Optimization of Design and Maintenance through a Hybrid Process Using Genetic Algorithms

Authors: O. Adjoul, A. Feugier, K. Benfriha, A. Aoussat

Abstract:

In general, issues related to design and maintenance are considered in an independent manner. However, the decisions made in these two sets influence each other. The design for maintenance is considered an opportunity to optimize the life cycle cost of a product, particularly in the nuclear or aeronautical field, where maintenance expenses represent more than 60% of life cycle costs. The design of large-scale systems starts with product architecture, a choice of components in terms of cost, reliability, weight and other attributes, corresponding to the specifications. On the other hand, the design must take into account maintenance by improving, in particular, real-time monitoring of equipment through the integration of new technologies such as connected sensors and intelligent actuators. We noticed that different approaches used in the Design For Maintenance (DFM) methods are limited to the simultaneous characterization of the reliability and maintainability of a multi-component system. This article proposes a method of DFM that assists designers to propose dynamic maintenance for multi-component industrial systems. The term "dynamic" refers to the ability to integrate available monitoring data to adapt the maintenance decision in real time. The goal is to maximize the availability of the system at a given life cycle cost. This paper presents an approach for simultaneous optimization of the design and maintenance of multi-component systems. Here the design is characterized by four decision variables for each component (reliability level, maintainability level, redundancy level, and level of monitoring data). The maintenance is characterized by two decision variables (the dates of the maintenance stops and the maintenance operations to be performed on the system during these stops). The DFM model helps the designers choose technical solutions for the large-scale industrial products. Large-scale refers to the complex multi-component industrial systems and long life-cycle, such as trains, aircraft, etc. The method is based on a two-level hybrid algorithm for simultaneous optimization of design and maintenance, using genetic algorithms. The first level is to select a design solution for a given system that considers the life cycle cost and the reliability. The second level consists of determining a dynamic and optimal maintenance plan to be deployed for a design solution. This level is based on the Maintenance Free Operating Period (MFOP) concept, which takes into account the decision criteria such as, total reliability, maintenance cost and maintenance time. Depending on the life cycle duration, the desired availability, and the desired business model (sales or rental), this tool provides visibility of overall costs and optimal product architecture.

Keywords: availability, design for maintenance (DFM), dynamic maintenance, life cycle cost (LCC), maintenance free operating period (MFOP), simultaneous optimization

Procedia PDF Downloads 94
4156 Review of Cyber Security in Oil and Gas Industry with Cloud Computing Perspective: Taxonomy, Issues and Future Direction

Authors: Irfan Mohiuddin, Ahmad Al Mogren

Abstract:

In recent years, cloud computing has earned substantial attention in the Oil and Gas Industry and provides services in all the phases of the industry lifecycle. Oil and gas supply infrastructure, in particular, is more vulnerable to accidental, natural and intentional threats because of its widespread distribution. Numerous surveys have been conducted on cloud security and privacy. However, to the best of our knowledge, hardly any survey is carried out that reviews cyber security in all phases with a cloud computing perspective. Moreover, a distinctive classification is performed for all the cloud-based cyber security measures based on the cloud component in use. The classification approach will enable researchers to identify the required technique used to enhance the security in specific cloud components. Also, the limitation of each component will allow the researchers to design optimal algorithms. Lastly, future directions are given to point out the imminent challenges that can pave the way for researchers to further enhance the resilience to cyber security threats in the oil and gas industry.

Keywords: cyber security, cloud computing, safety and security, oil and gas industry, security threats, oil and gas pipelines

Procedia PDF Downloads 121
4155 Blockchain Security in MANETs

Authors: Nada Mouchfiq, Ahmed Habbani, Chaimae Benjbara

Abstract:

The security aspect of the IoT occupies a place of great importance especially after the evolution that has known this field lastly because it must take into account the transformations and the new applications .Blockchain is a new technology dedicated to the data sharing. However, this does not work the same way in the different systems with different operating principles. This article will discuss network security using the Blockchain to facilitate the sending of messages and information, enabling the use of new processes and enabling autonomous coordination of devices. To do this, we will discuss proposed solutions to ensure a high level of security in these networks in the work of other researchers. Finally, our article will propose a method of security more adapted to our needs as a team working in the ad hoc networks, this method is based on the principle of the Blockchain and that we named ”MPR Blockchain”.

Keywords: Ad hocs networks, blockchain, MPR, security

Procedia PDF Downloads 154
4154 Implementation of Enterprise Asset Management (E-AM) System at Oman Electricity Transmission Company

Authors: Omran Al Balushi, Haitham Al Rawahi

Abstract:

Enterprise Asset Management (eAM) has been implemented across different Generation, Transmission and Distribution subsidiaries in Nama Group companies. As part of Nama group, Oman Electricity Transmission Company (OETC) was the first company to implement this system. It was very important for OETC to implement and maintain such a system to achieve its business objectives and for effective operations, which will also support the delivery of the asset management strategy. Enterprise Asset Management (eAM) addresses the comprehensive asset maintenance requirements of Oman Electricity Transmission Company (OETC). OETC needs to optimize capacity and increase utilization, while lowering unit production. E-AM will enable OETC to adopt this strategy. Implementation of e-AM has improved operation performance with preventive and scheduled maintenance as well as it increased safety. Implementation of e-AM will also enable OETC to create optimal asset management strategy which will increase revenue and decrease cost by effectively monitoring operational data such as maintenance history and operation conditions. CMMS (Computerised Maintenance Management System) is the main software and the back-bone of e-AM system. It is used to provide an improved working practice to properly establish information and data flow related to maintenance activities. Implementation of e-AM system was one of the factors that supported OETC to achieve ISO55001 Certificate on fourth quarter of 2016. Also, full implementation of e-AM system will result in strong integration between CMMS and Geographical Information Systems (GIS) application and it will improve OETC to build a reliable maintenance strategy for all asset classes in its Transmission network. In this paper we will share our experience and knowledge of implementing such a system and how it supported OETC’s management to make decisions. Also we would highlight the challenges and difficulties that we encountered during the implementation of e-AM. Also, we will list some features and advantages of e-AM in asset management, preventive maintenance and maintenance cost management.

Keywords: CMMS, Maintenance Management, Asset Management, Maintenance Strategy

Procedia PDF Downloads 119
4153 Implementing a Strategy of Reliability Centred Maintenance (RCM) in the Libyan Cement Industry

Authors: Khalid M. Albarkoly, Kenneth S. Park

Abstract:

The substantial development of the construction industry has forced the cement industry, its major support, to focus on achieving maximum productivity to meet the growing demand for this material. Statistics indicate that the demand for cement rose from 1.6 billion metric tons (bmt) in 2000 to 4bmt in 2013. This means that the reliability of a production system needs to be at the highest level that can be achieved by good maintenance. This paper studies the extent to which the implementation of RCM is needed as a strategy for increasing the reliability of the production systems component can be increased, thus ensuring continuous productivity. In a case study of four Libyan cement factories, 80 employees were surveyed and 12 top and middle managers interviewed. It is evident that these factories usually breakdown more often than once per month which has led to a decline in productivity, they cannot produce more than 50% of their designed capacity. This has resulted from the poor reliability of their production systems as a result of poor or insufficient maintenance. It has been found that most of the factories’ employees misunderstand maintenance and its importance. The main cause of this problem is the lack of qualified and trained staff, but in addition, it has been found that most employees are not found to be motivated as a result of a lack of management support and interest. In response to these findings, it has been suggested that the RCM strategy should be implemented in the four factories. The paper shows the importance of considering the development of maintenance strategies through the implementation of RCM in these factories. The purpose of it would be to overcome the problems that could reduce the level of reliability of the production systems. This study could be a useful source of information for academic researchers and the industrial organisations which are still experiencing problems in maintenance practices.

Keywords: Libyan cement industry, reliability centred maintenance, maintenance, production, reliability

Procedia PDF Downloads 370
4152 Mitigation of High Voltage Equipment Design Deficiencies for Improved Operation and Maintenance

Authors: Riyad Awad, Abdulmohsen Alghadeer, Meshari Otaibi

Abstract:

Proper operation and maintenance (O&M) activities of high voltage equipment can lead to an increased asset lifecycle and maintain its integrity and reliability. Such a vital process is important to be proactively considered during equipment design and manufacturing phases by removing and eliminating any obstacles in the equipment which adversely affect the (O&M) activities. This paper presents a gap analysis pertaining to difficulties in performing operations and maintenance (O&M) high voltage electrical equipment, includes power transformers, switch gears, motor control center, disconnect switches and circuit breakers. The difficulties are gathered from field personnel, equipment design review comments, quality management system, and lessons learned database. The purpose of the gap analysis is to mitigate and prevent the (O&M) difficulties as early as possible in the design stage of the equipment lifecycle. The paper concludes with several recommendations and corrective actions for all identified gaps in order to reduce the cost (O&M) difficulties and improve the equipment lifecycle.

Keywords: operation and maintenance, high voltage equipment, equipment lifecycle, reduce the cost of maintenance

Procedia PDF Downloads 139
4151 Contents for the Maintenance and Troubleshooting of Anti-lock Braking System for Automobile Craftsmen in Nigeria

Authors: Arah Abubakar Saidu, Audu Rufai, Abdulkadir Mohammed, Ibrahim Yakubu Umar, Idris Abubakar Mohammed

Abstract:

The study determined the contents for the maintenance and troubleshooting of an anti-lock braking system for automobile craftsmen in Nigeria. Two research questions were raised and answered and two null hypotheses were formulated and tested at a .05 level of significance. The study adopted a descriptive survey research design. The study was conducted in Federal Capital Territory (FCT), Abuja, Kaduna, Kano, Lagos and Plateau States, Nigeria. The targeted population for the study was 99 consisting of all 43 non-teaching Subject Matter Experts (SMEs). The study utilized the whole population of the study. The instruments used for data collection were Anti-lock Braking System Maintenance and Troubleshooting Contents Questionnaire (ABSMTQ). Mean was used to analyze data that answered research questions and Z-test was used in testing the null hypotheses. Findings revealed, among others, that 81 items as content for the maintenance of ABS and 61 items as content for troubleshooting ABS for automobile craftsmen in Nigeria. Based on the findings of the study, the recommended, among others, that the National Board for Technical Education should include the contents for the maintenance and troubleshooting ABS in Motor Vehicle Mechanic Works curriculum used for training automobile craftsmen through the process of curriculum review in order to equip them with the competencies in troubleshooting and maintenance of ABS.

Keywords: anti-lock braking system, maintenance, troubleshooting, automobile craftsmen

Procedia PDF Downloads 66
4150 Productivity Improvement of Faffa Food Share Company Using a Computerized Maintenance Management System

Authors: Gadisa Alemayehu, Muralidhar Avvari, Atkilt Mulu G.

Abstract:

Since 1962 EC, the Faffa Food Share Company has been producing and supplying flour (famix) and value-added flour (baby food) in Ethiopia. It meets nearly all of the country's total flour demand, both for relief and commercial markets. However, it is incompetent in the international market due to a poor maintenance management system. The results of recorded documents and stopwatches revealed that frequent failure machines, as well as a poor maintenance management system, cause increased production downtimes, resulting in a 29.19 percent decrease in production from the planned production. As a result, the current study's goal is to recommend newly developed software for use in and as a Computerized Maintenance Management System (CMMS). As a result, the system increases machine reliability and decreases the frequency of equipment failure, reducing breakdown time and maintenance costs. The company's overall manufacturing performance improved by 4.45 percent, particularly after the implementation of the CMMS.

Keywords: CMMS, manufacturing performance, delivery, availability, flexibility, Faffa Food Share Company

Procedia PDF Downloads 107
4149 Right Livelihood (Samma Arjiva) for Lay Disciple

Authors: Kyaw Myint

Abstract:

Each and everyone seeking happiness. People are trying various kinds of ways to earn happiness. Noble eight fold path is the way to attain the highest peace and happiness which includes three parts Morality ( Sila ) Concentration ( smadi ), and Wisdom ( Pyanna ). According to the Buddha’s teaching to attain higher level of peace and happiness, one must walk on this path . In the Buddha’s teaching morality is basic for all of these three parts. The right Livelihood consider as morality to reach peace or earn happiness in this life and here after next life. It is a way of earn a living without breaking the precepts. The essence of the teaching is to practice metal purity through the material gaining. In this article attempts to study right way of livelihood laid down by the Buddha for lay disciple special reference to Vinijja suttha, Ardiya Sutta, Dighajanu Sutta and singalovoda sutta. This paper approach qualitative research based mainly on documentary analysis. The result of the study shows that right livelihood in Buddha's teaching involves both abstaining from wrong livelihood and taking right livelihood with right view and right effort. Buddha guidance on right livelihood can consist both materially and spiritually for lay disciple.

Keywords: right livelihood, eight fold path, lay disciple, wrong livelihood

Procedia PDF Downloads 61
4148 Reliability-Based Life-Cycle Cost Model for Engineering Systems

Authors: Reza Lotfalian, Sudarshan Martins, Peter Radziszewski

Abstract:

The effect of reliability on life-cycle cost, including initial and maintenance cost of a system is studied. The failure probability of a component is used to calculate the average maintenance cost during the operation cycle of the component. The standard deviation of the life-cycle cost is also calculated as an error measure for the average life-cycle cost. As a numerical example, the model is used to study the average life cycle cost of an electric motor.

Keywords: initial cost, life-cycle cost, maintenance cost, reliability

Procedia PDF Downloads 572
4147 Design a Network for Implementation a Hospital Information System

Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇

Abstract:

A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.

Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network

Procedia PDF Downloads 410
4146 Towards a Simulation Model to Ensure the Availability of Machines in Maintenance Activities

Authors: Maryam Gallab, Hafida Bouloiz, Youness Chater, Mohamed Tkiouat

Abstract:

The aim of this paper is to present a model based on multi-agent systems in order to manage the maintenance activities and to ensure the reliability and availability of machines just with the required resources (operators, tools). The interest of the simulation is to solve the complexity of the system and to find results without cost or wasting time. An implementation of the model is carried out on the AnyLogic platform to display the defined performance indicators.

Keywords: maintenance, complexity, simulation, multi-agent systems, AnyLogic platform

Procedia PDF Downloads 284
4145 Some Tips for Increasing Online Services Safety

Authors: Mohsen Rezaee

Abstract:

Although robust security softwares, including anti-viruses, anti-spywares, anti-spam and firewalls are amalgamated with new technologies such as safe zone, hybrid cloud, sand box and etc., and although it can be said that they have managed to prepare highest level of security against viruses, spywares and other malwares in 2012, in fact, hacker attacks to websites are increasingly becoming more and more complicated. Because of security matters developments it can be said it was expected to happen so. Here in this work we try to point out some functional and vital notes to enhance security on the web, enabling the user to browse safely in unlimited web world and to use virtual space securely.

Keywords: firewalls, security, web services, computer science

Procedia PDF Downloads 375
4144 Administrative and Legal Instruments of Disciplining Maintenance Debtors in Poland - A Critical Analysis of Their Effectiveness

Authors: Tomasz Kosicki

Abstract:

The subject of the presentation will be the administrative and legal instruments of disciplining maintenance debtors adopted by the Polish legislator, the substantive legal bases of which were adopted in the Act of 7 September 2007 on assistance to persons entitled to maintenance (Journal of Laws of 2022, item 1205). These provisions are complemented by procedural regulations resulting from the Act of 14 June 1960 - Code of Administrative Procedure (Journal of Laws of 2021, item 735, as amended). The first part of the paper will focus on the administrative proceedings regarding the recognition of the debtor as evading maintenance obligations. The initiation of this procedure ex officio is preceded by a number of actions by public administration bodies, including Conducting a maintenance interview with the debtor, during which his health and professional situation and the reasons for non-payment of maintenance are determined, Professional activation in a situation where the lack of payment of maintenance results from the lack of employment. The reasons for initiating the above-mentioned administrative proceedings ex officio will be indicated, taking into account the current views of the judicial decisions. The second part of the paper will focus on the instrument of retaining the driving license of the debtor, who was previously found to be evading maintenance. The author points out that the detention of the driving license is one of the types of administrative sanctions of a very severe nature. Doubts of a constitutional nature will also be highlighted, as well as those concerning the effectiveness of this legal instrument and the protection of the debtor's rights. The thesis will be presented that the administrative procedure for the retention of a driving license does not fulfill its role and especially does not affect the collection of maintenance obligations from debtors. All the considerations will be based on the current and most representative views of the literature on the subject and the jurisprudence of Polish administrative courts.

Keywords: maintenance debtor, administrative proceedings, detention of driving license, administrative sanction, polish administrative law, public administration

Procedia PDF Downloads 61
4143 An Architectural Model for APT Detection

Authors: Nam-Uk Kim, Sung-Hwan Kim, Tai-Myoung Chung

Abstract:

Typical security management systems are not suitable for detecting APT attack, because they cannot draw the big picture from trivial events of security solutions. Although SIEM solutions have security analysis engine for that, their security analysis mechanisms need to be verified in academic field. Although this paper proposes merely an architectural model for APT detection, we will keep studying on correlation analysis mechanism in the future.

Keywords: advanced persistent threat, anomaly detection, data mining

Procedia PDF Downloads 502
4142 Intelligent Electric Vehicle Charging System (IEVCS)

Authors: Prateek Saxena, Sanjeev Singh, Julius Roy

Abstract:

The security of the power distribution grid remains a paramount to the utility professionals while enhancing and making it more efficient. The most serious threat to the system can be maintaining the transformers, as the load is ever increasing with the addition of elements like electric vehicles. In this paper, intelligent transformer monitoring and grid management has been proposed. The engineering is done to use the evolving data from the smart meter for grid analytics and diagnostics for preventive maintenance. The two-tier architecture for hardware and software integration is coupled to form a robust system for the smart grid. The proposal also presents interoperable meter standards for easy integration. Distribution transformer analytics based on real-time data benefits utilities preventing outages, protects the revenue loss, improves the return on asset and reduces overall maintenance cost by predictive monitoring.

Keywords: electric vehicle charging, transformer monitoring, data analytics, intelligent grid

Procedia PDF Downloads 768
4141 Optimal Tamping for Railway Tracks, Reducing Railway Maintenance Expenditures by the Use of Integer Programming

Authors: Rui Li, Min Wen, Kim Bang Salling

Abstract:

For the modern railways, maintenance is critical for ensuring safety, train punctuality and overall capacity utilization. The cost of railway maintenance in Europe is high, on average between 30,000 – 100,000 Euros per kilometer per year. In order to reduce such maintenance expenditures, this paper presents a mixed 0-1 linear mathematical model designed to optimize the predictive railway tamping activities for ballast track in the planning horizon of three to four years. The objective function is to minimize the tamping machine actual costs. The approach of the research is using the simple dynamic model for modelling condition-based tamping process and the solution method for finding optimal condition-based tamping schedule. Seven technical and practical aspects are taken into account to schedule tamping: (1) track degradation of the standard deviation of the longitudinal level over time; (2) track geometrical alignment; (3) track quality thresholds based on the train speed limits; (4) the dependency of the track quality recovery on the track quality after tamping operation; (5) Tamping machine operation practices (6) tamping budgets and (7) differentiating the open track from the station sections. A Danish railway track between Odense and Fredericia with 42.6 km of length is applied for a time period of three and four years in the proposed maintenance model. The generated tamping schedule is reasonable and robust. Based on the result from the Danish railway corridor, the total costs can be reduced significantly (50%) than the previous model which is based on optimizing the number of tamping. The different maintenance strategies have been discussed in the paper. The analysis from the results obtained from the model also shows a longer period of predictive tamping planning has more optimal scheduling of maintenance actions than continuous short term preventive maintenance, namely yearly condition-based planning.

Keywords: integer programming, railway tamping, predictive maintenance model, preventive condition-based maintenance

Procedia PDF Downloads 419
4140 Administrative and Legal Instruments of Disciplining Maintenance (alimony) Debtors in Poland - A Critical Analysis of their Effectiveness

Authors: Tomasz Kosicki

Abstract:

The subject of the presentation will be the administrative and legal instruments of disciplining maintenance debtors adopted by the Polish legislator, the substantive legal bases of which were adopted in the Act of 7 September 2007 on assistance to persons entitled to maintenance (Journal of Laws of 2022, item 1205). These provisions are complemented by procedural regulations resulting from the Act of 14 June 1960 - Code of Administrative Procedure (Journal of Laws of 2021, item 735, as amended). The first part of the paper will focus on the administrative proceedings regarding the recognition of the debtor as evading maintenance obligations. The initiation of this procedure ex officio is preceded by a number of actions by public administration bodies, including Conducting a maintenance interview with the debtor, during which his health and professional situation and the reasons for non-payment of maintenance are determined, Professional activation in a situation where the lack of payment of maintenance results from the lack of employment. The reasons for initiating the above-mentioned administrative proceedings ex officio will be indicated, taking into account the current views of the judicial decisions. The second part of the paper will focus on the instrument of retaining the driving license of the debtor, who was previously found to be evading maintenance. The author points out that the detention of the driving license is one of the types of administrative sanctions of a very severe nature. Doubts of a constitutional nature will also be highlighted, as well as those concerning the effectiveness of this legal instrument and the protection of the debtor's rights. The thesis will be presented that the administrative procedure for the retention of a driving license does not fulfill its role and especially does not affect the collection of maintenance obligations from debtors. All the considerations will be based on the current and most representative views of the literature on the subject and the jurisprudence of Polish administrative courts.

Keywords: maintenance debtor, administrative proceedings, detention of driving license, administrative sanction, polish administrative law, public administration

Procedia PDF Downloads 62