Search results for: proof obligation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 482

Search results for: proof obligation

272 Gas Separation by Water-Swollen Membrane

Authors: Lenka Morávková, Zuzana Sedláková, Jiří Vejražka, Věra Jandová, Pavel Izák

Abstract:

The need to minimize the costs of biogas upgrading leads to a continuous search for new and more effective membrane materials. The improvement of biogas combustion efficiency is connected with polar gases removal from a feed stream. One of the possibilities is the use of water–swollen polyamide layer of thin film composite reverse osmosis membrane for simultaneous carbon dioxide and hydrogen sulphide removal. Transport properties and basic characteristics of a thin film composite membrane were compared in the term of appropriate water-swollen membrane choice for biogas upgrading. SEM analysis showed that the surface of the best performing composites changed significantly upon swelling by water. The surface changes were found to be a proof that the selective skin polyamide layer was swollen well. Further, the presence of a sufficient number of associative centers, namely amido groups, inside the upper layer of the hydrophilic thin composite membrane can play an important role in the polar gas separation from a non-polar gas. The next key factor is a high porosity of the membrane support.

Keywords: biogas upgrading, carbon dioxide separation, hydrogen sulphide separation, water-swollen membrane

Procedia PDF Downloads 321
271 Self-Government Health Policy Programs as a Form of Implementation of Public Health Tasks in Poland

Authors: T. Holecki, J. Wozniak-Holecka, K. Sobczyk

Abstract:

Development, implementation, and evaluation of the effects of health policy programs, resulting from the identified health needs and health status of residents, is the own task of all local government units in Poland. This is due to the obligation to provide access to healthcare services to all residents and the implementation of tasks in the field of health promotion based on specific legal acts. Until the end of 2016 local governments financed health policy programs only with their own funds. Currently, there are additional resources available from the public health insurance subsidising up to 80% of health policy programs costs in cities with a population under 5 thousand people and up to 40% in bigger cities. Changes in legal provisions do not translate automatically to increased involvement of local government units in the implementation of public health tasks. The main objective of the study was to assess the actual impact of the new legal regulation on financing local health policy programs on the engagement of local administration in this area of public health activity. To achieve this aim, we analyzed difference in the number of local governments developing and implementing health policy programs before and after the new law came into force. The aim of the study was also to estimate the level of expenditures incurred by self-government units and the National Health Fund to cover the costs of health policy programs. In the first stage of the project, legal acts concerning the subject of research and financial data published by the National Health Fund were analyzed. The material for the second, main stage of the study was the detailed financial data obtained from the National Health Fund and data obtained from local government units. The results present the situation in Poland in territorial terms, divided into 16 voivodships.

Keywords: health care system, health policy programs, local self-governments, public health

Procedia PDF Downloads 131
270 CMT4G: Rare Form of Charcot-Marie-Tooth Disease in Slovak Roma Patient

Authors: Dana Gabriková, Martin Mistrík, Jarmila Bernasovská, Iveta Tóthová, Jana Kisková

Abstract:

The Roma (Gypsies) is a transnational minority with a high degree of consanguineous marriages. Similar to other genetically isolated founder populations, the Roma harbor a number of unique or rare genetic disorders. This paper discusses about a rare form of Charcot-Marie-Tooth disease – type 4G (CMT4G), also called Hereditary Motor and Sensory Neuropathy type Russe, an autosomal recessive disease caused by mutation private to Roma characterized by abnormally increased density of non-myelinated axons. CMT4G was originally found in Bulgarian Roma and in 2009 two putative causative mutations in the HK1 gene were identified. Since then, several cases were reported in Roma families mainly from Bulgaria and Spain. Here we present a Slovak Roma family in which CMT4G was diagnosed on the basis of clinical examination and genetic testing. This case is a further proof of the role of the HK1 gene in pathogenesis of the disease. It confirms that mutation in the HK1 gene is a common cause of autosomal recessive CMT disease in Roma and should be considered as a common part of a diagnostic procedure.

Keywords: gypsies, HK1, HSMN-Russe, rare disease

Procedia PDF Downloads 362
269 A Survey on Fixed Point Iterations in Modular Function Spaces and an Application to Ode

Authors: Hudson Akewe

Abstract:

This research presents complementary results with wider applications on convergence and rate of convergence of classical fixed point theory in Banach spaces to the world of the theory of fixed points of mappings defined in classes of spaces of measurable functions, known in the literature as modular function spaces. The study gives a comprehensive survey of various iterative fixed point results for the classes of multivalued ρ-contractive-like, ρ-quasi-contractive-like, ρ-quasi-contractive, ρ-Zamfirescu and ρ-contraction mappings in the framework of modular function spaces. An example is presented to demonstrate the applicability of the implicit-type iterative schemes to the system of ordinary differential equations. Furthermore, numerical examples are given to show the rate of convergence of the various explicit Kirk-type and implicit Kirk-type iterative schemes under consideration. Our results complement the results obtained on normed and metric spaces in the literature. Also, our methods of proof serve as a guide to obtain several similar improved results for nonexpansive, pseudo-contractive, and accretive type mappings.

Keywords: implicit Kirk-type iterative schemes, multivalued mappings, convergence results, fixed point

Procedia PDF Downloads 100
268 Component Interface Formalization in Robotic Systems

Authors: Anton Hristozov, Eric Matson, Eric Dietz, Marcus Rogers

Abstract:

Components are heavily used in many software systems, including robotics systems. The growth of sophistication and diversity of new capabilities for robotic systems presents new challenges to their architectures. Their complexity is growing exponentially with the advent of AI, smart sensors, and the complex tasks they have to accomplish. Such complexity requires a more rigorous approach to the creation, use, and interoperability of software components. The issue is exacerbated because robotic systems are becoming more and more reliant on third-party components for certain functions. In order to achieve this kind of interoperability, including dynamic component replacement, we need a way to standardize their interfaces. A formal approach is desperately needed to specify what an interface of a robotic software component should contain. This study performs an analysis of the issue and presents a universal and generic approach to standardizing component interfaces for robotic systems. Our approach is inspired by well-established robotic architectures such as ROS, PX4, and Ardupilot. The study is also applicable to other software systems that share similar characteristics with robotic systems. We consider the use of JSON or Domain Specific Languages (DSL) development with tools such as Antlr and automatic code and configuration file generation for frameworks such as ROS and PX4. A case study with ROS2 is presented as a proof of concept for the proposed methodology.

Keywords: CPS, robots, software architecture, interface, ROS, autopilot

Procedia PDF Downloads 62
267 The Politics of Disruption: Disrupting Polity to Influence Policy in Nigeria

Authors: Okechukwu B. C. Nwankwo

Abstract:

The surge of social protests sweeping through the globe is a contemporary phenomenon. Yet the phenomenon in itself is not new. Thus, various scholars have over the years developed conceptual frameworks for evaluating it. Adopting and adapting some of these frameworks this paper begins from a purely theoretical perspective exploring the concept and content of social protest within the specific context of Nigeria. It proceeds to build a typology of the phenomenon in terms of form, actors, origin, character, organisation, goal, dynamics, outcome and a whole lot of other variables that are context relevant for evaluating it in an operationally useful manner. The centrality of the context in which protest evolves is demonstrated. Adopting Easton’s systems theory, the paper builds on the assumption that protests emerge whenever and wherever political institutions and structures prove unable or unwilling to transform inputs in form of basic demands into outputs in form of responsive policies. It argues that protests in Nigeria are simply the crystallisation of opposition in the streets. Protests are thus extra-institutional politics. This is usually the case, as elsewhere, where there is no functional institutionalised opposition. Noting that protest, disruptive or otherwise, is an influence strategy, it argues that every single protest is a new opportunity for reform, for reorganisation of state capacities, for modifying rights and obligation of citizens and government to each other. Each reform outcome is, however, only a temporal antecedent. Its extensity gives signal for the next similar protest event. Through providing evidence on how protests in Nigeria create opportunity for reform, for more accountable, more effective governance, the paper shows the positive impact of protests and its importance even in the consolidation effort for the nation’s nascent democracy. Data on protest events will be based on media reports, especially print media.

Keywords: democracy, dialectics, social protest, reform

Procedia PDF Downloads 111
266 Agro-Insurance and Farming Development Opportunities in Georgia

Authors: Tamar Lazariashvili

Abstract:

Introduction: The agro-insurance has great importance for agricultural development in the country. In the article, the insurance market of the Georgian agricultural sector has been studied, the level of interest of farmers with insurance products and the trend of demand for those products are revealed; also, the importance of insurance is substantiated. Methodology: The following research methods are applied in the presented paper: statistical (selection, grouping, observation, trend) and qualitative research (in-depth interview with farmers). They claim that the main reason for aggravation is the low level of trust, less awareness about the conditions of the insurance contract. In order to eradicate distrust towards agro-insurance, it is recommended to increase awareness of insured farmers in terms of an insurance agreement. In the case of disputable issues between insurance companies and the customers (farmers), it is advisable to enact the Mediation Service, which will be able to protect the rights of insured farmers. Main Findings: Insurance companies prefer to deal with large farmers, the number of them is very small in Georgia as the credit market. The government interference in this sector is also a very cautious topic. However, the government can strengthen the awareness of farmers about the characteristics and advantages of the insurance system in order to increase the number of insured and reduce insurance premiums for farmers. Conclusion: Enactment of agro-insurance will increase the interest and confidence of financial institutions in the farming sector, financial resources will be accessible to the farmers that will facilitate the stable development of the sector in the country. The size of the agro-insurance market in the country should be increased, and the new territories should be covered. The State must have an obligation to ensure the risk of farmers and subsidize insurance companies. Based on the analysis of the insurance market, the conclusions on agro-insurance issues and the relevant recommendations are proposed.

Keywords: Agro-insurance, agricultural product, Agro-market, farming

Procedia PDF Downloads 94
265 A Real-World Roadmap and Exploration of Quantum Computers Capacity to Trivialise Internet Security

Authors: James Andrew Fitzjohn

Abstract:

This paper intends to discuss and explore the practical aspects of cracking encrypted messages with quantum computers. The theory of this process has been shown and well described both in academic papers and headline-grabbing news articles, but with all theory and hyperbole, we must be careful to assess the practicalities of these claims. Therefore, we will use real-world devices and proof of concept code to prove or disprove the notion that quantum computers will render the encryption technologies used by many websites unfit for purpose. It is time to discuss and implement the practical aspects of the process as many advances in quantum computing hardware/software have recently been made. This paper will set expectations regarding the useful lifespan of RSA and cipher lengths and propose alternative encryption technologies. We will set out comprehensive roadmaps describing when and how encryption schemes can be used, including when they can no longer be trusted. The cost will also be factored into our investigation; for example, it would make little financial sense to spend millions of dollars on a quantum computer to factor a private key in seconds when a commodity GPU could perform the same task in hours. It is hoped that the real-world results depicted in this paper will help influence the owners of websites who can take appropriate actions to improve the security of their provisions.

Keywords: quantum computing, encryption, RSA, roadmap, real world

Procedia PDF Downloads 102
264 Supervised/Unsupervised Mahalanobis Algorithm for Improving Performance for Cyberattack Detection over Communications Networks

Authors: Radhika Ranjan Roy

Abstract:

Deployment of machine learning (ML)/deep learning (DL) algorithms for cyberattack detection in operational communications networks (wireless and/or wire-line) is being delayed because of low-performance parameters (e.g., recall, precision, and f₁-score). If datasets become imbalanced, which is the usual case for communications networks, the performance tends to become worse. Complexities in handling reducing dimensions of the feature sets for increasing performance are also a huge problem. Mahalanobis algorithms have been widely applied in scientific research because Mahalanobis distance metric learning is a successful framework. In this paper, we have investigated the Mahalanobis binary classifier algorithm for increasing cyberattack detection performance over communications networks as a proof of concept. We have also found that high-dimensional information in intermediate features that are not utilized as much for classification tasks in ML/DL algorithms are the main contributor to the state-of-the-art of improved performance of the Mahalanobis method, even for imbalanced and sparse datasets. With no feature reduction, MD offers uniform results for precision, recall, and f₁-score for unbalanced and sparse NSL-KDD datasets.

Keywords: Mahalanobis distance, machine learning, deep learning, NS-KDD, local intrinsic dimensionality, chi-square, positive semi-definite, area under the curve

Procedia PDF Downloads 52
263 Evaluation the Effects of Air Pollution on Elderly People of the City of Tehran

Authors: Farideh Gheitasi, Amir Hossain Jaberansari, Payam Abedini

Abstract:

The World Health Organization (WHO) Manifesto for Safe Communities states that "All human beings have an equal right to health and safety". The purpose of a safe Community is to minimize the damages threatening people. It seems that not sufficient attention has been given to relate environment and objectives of the safe Community. The reason for that can be assigned to the lack of enough information about environmental parameters and their relation with indices of the safe community like type and effect time of damages resulting from air pollution. Air pollution can be characterized as one of main environmental problems of Tehran. This problem is mostly due to the special geographic and climate situation, high population density and irregular growth in the number of vehicles. This paper is aimed at investigating the necessity of considering environmental factors to obtain a safe community through determining the effects of environmental pollution, particularly air pollution, on 490000 elders (+65) of Tehran. The methodology used in this study was on the basis of Random sampling and social surveying. The number of questionnaires was determined to be 321 through using Cochran method and the questionnaires were filled out by elders during personal interviews. The analysis of obtained results indicated that elders believe the major effects of air pollution include heart and respiratory diseases, obligation to stay at home on polluted days and its associated mental problems. Moreover, it was found that there is direct link between the number of polluted days and mortality frequency of elders. Having an environmental view may have an appreciable influence on the qualitative and quantitative development of activities and also facilitate obtaining the goals of the Safe Communities. In addition to reduce damages caused by pollutions, this view will encourage friends of the environment to cooperate with authorities of the safe community.

Keywords: air pollution, elderly people, environment, waste management

Procedia PDF Downloads 446
262 Electrostatic Cleaning System Integrated with Thunderon Brush for Lunar Dust Mitigation

Authors: Voss Harrigan, Korey Carter, Mohammad Reza Shaeri

Abstract:

Detrimental effects of lunar dust on space hardware, spacesuits, and astronauts’ health have been already identified during Apollo missions. Developing effective dust mitigation technologies is critically important for successful space exploration and related missions in NASA applications. In this study, an electrostatic cleaning system (ECS) integrated with a negatively ionized Thunderon brush was developed to mitigate small-sized lunar dust particles with diameters ranging from 0.04 µm to 35 µm, and the mean and median size of 7 µm and 5 µm, respectively. It was found that the frequency pulses of the negative ion generator caused particles to stick to the Thunderon bristles and repel between the pulses. The brush was used manually to ensure that particles were removed from areas where the ECS failed to mitigate the lunar simulant. The acquired data demonstrated that the developed system removed over 91-96% of the lunar dust particles. The present study was performed as a proof-of-concept to enhance the cleaning performance of ECSs by integrating a brushing process. Suggestions were made to further improve the performance of the developed technology through future research.

Keywords: lunar dust mitigation, electrostatic cleaning system, Brushing, Thunderon brush, cleaning rate

Procedia PDF Downloads 219
261 Interpreting Privacy Harms from a Non-Economic Perspective

Authors: Christopher Muhawe, Masooda Bashir

Abstract:

With increased Internet Communication Technology(ICT), the virtual world has become the new normal. At the same time, there is an unprecedented collection of massive amounts of data by both private and public entities. Unfortunately, this increase in data collection has been in tandem with an increase in data misuse and data breach. Regrettably, the majority of data breach and data misuse claims have been unsuccessful in the United States courts for the failure of proof of direct injury to physical or economic interests. The requirement to express data privacy harms from an economic or physical stance negates the fact that not all data harms are physical or economic in nature. The challenge is compounded by the fact that data breach harms and risks do not attach immediately. This research will use a descriptive and normative approach to show that not all data harms can be expressed in economic or physical terms. Expressing privacy harms purely from an economic or physical harm perspective negates the fact that data insecurity may result into harms which run counter the functions of privacy in our lives. The promotion of liberty, selfhood, autonomy, promotion of human social relations and the furtherance of the existence of a free society. There is no economic value that can be placed on these functions of privacy. The proposed approach addresses data harms from a psychological and social perspective.

Keywords: data breach and misuse, economic harms, privacy harms, psychological harms

Procedia PDF Downloads 168
260 Risk Management Approach for Lean, Agile, Resilient and Green Supply Chain

Authors: Benmoussa Rachid, Deguio Roland, Dubois Sebastien, Rasovska Ivana

Abstract:

Implementation of LARG (Lean, Agile, Resilient, Green) practices in the supply chain management is a complex task mainly because ecological, economical and operational goals are usually in conflict. To implement these LARG practices successfully, companies’ need relevant decision making tools allowing processes performance control and improvement strategies visibility. To contribute to this issue, this work tries to answer the following research question: How to master performance and anticipate problems in supply chain LARG practices implementation? To answer this question, a risk management approach (RMA) is adopted. Indeed, the proposed RMA aims basically to assess the ability of a supply chain, guided by “Lean, Green and Achievement” performance goals, to face “agility and resilience risk” factors. To proof its relevance, a logistics academic case study based on simulation is used to illustrate all its stages. It shows particularly how to build the “LARG risk map” which is the main output of this approach.

Keywords: agile supply chain, lean supply chain, green supply chain, resilient supply chain, risk approach

Procedia PDF Downloads 284
259 An Evaluation of Rational Approach to Management by Objectives in Construction Contracting Organisation

Authors: Zakir H. Shaik, Punam L. Vartak

Abstract:

Management By Objectives (MBO) is a management technique in which objectives of an organisation are conveyed to the employees to establish the individual goals. These objectives and goals are then monitored and assessed jointly by management and the employee time to time. This tool can be used for planning, monitoring as well as for performance appraisal. The success of an organisation is largely dependent on its’s Vision. Thus, it is of paramount importance to achieve the realm of vision through a mission which is well crafted within the organisation to address the objectives. The success of the mission depends upon how realistic and action oriented philosophical approach, an organisation caters to; and how the individual goals are set to track and meet the objectives. Thus, focused and passionate efforts of the team, assigned for the mission, are an absolute obligation for achieving the vision of any organisation. Any construction site is generally a controlled disorder having huge investments, resources and logistics involved. The Construction progression is time-consuming with many isolated as well as interconnected activities. Traditional MBO approach can be unsuccessful if planning and control is non-realistic and inflexible. Moreover, the Construction Industry is far behind understanding these concepts. It is important to address the employee engagement in defining and creating awareness to achieve the targets. Besides, current economic environment and competitive world demands refined management tools to achieve profit, growth and survival of the business. Therefore, the necessity of rational MBO becomes vital part towards the success of an organisation. This paper details about the philosophical assumptions to develop the grounded theory in lieu of achieving objectives through RATIONAL MBO approach in Construction Contracting Organisations. The goals and objectives of the Construction Contracting Organisations can be achieved efficiently by adopting this RATIONAL MBO approach, as those are based on realistic, logical and balanced assumptions.

Keywords: growth, leadership, management by objectives, Management By Objectives (MBO), profit, rational

Procedia PDF Downloads 130
258 Contractual Risk Transfer in Islamic Home Financing: Analysis in Bank Malaysia

Authors: Ahmad Dahlan Salleh, Nik Abdul Rahim Nik Abdul Ghani, Muhamad Firdaus M. Hatta

Abstract:

Risk management has implications on pricing, governance arrangements, business practices and strategy. Nowadays, home financing contract offers more in the risk transfer form to increase bank profit. This is parallel with Islamic jurisprudence method al-Kharaj bi al-thaman (gain accompanies liability for loss) and al-ghurm bil ghunm (gain is justified with risk) that determine the matching between risk transfer and returns. Malaysian financing trend is to buy house. Besides, exists transparency lacking risk transfer issues to the clients because of not been informed clearly. Terms and conditions of each financing also do not reflect clearly that the risk has been transferred to the client, justifying a determination price been made. The assumption on risk occurrence is also inaccurate as each risk is different with the type of financing contract. This makes the Islamic Financial Services Act 2013 in providing standards that transparent and consistent can be used by Islamic financial institution less effective. This study examines how far the level of the risk and obligation incurred by bank and client under various Islamic home financing contract. This research is qualitative by using two methods, document analysis, and semi-structured interviews. Document analysis from literature review to identify profile, themes and risk transfer element in home financing from Islamic jurisprudence perspective. This study finds that need to create a risk transfer parameter by banks which are consistent with risk transfer theory according to Islamic jurisprudence. This study has potential to assist the authority in Islamic finance such as The Central Bank of Malaysia (Bank Negara Malaysia) in regulating Islamic banking industry so that the risk transfer valuation in home financing contract based on home financing good practice and determined risk limits.

Keywords: risk transfer, home financing contract, Sharia compliant, Malaysia

Procedia PDF Downloads 393
257 Modular, Responsive, and Interactive Green Walls - A Case Study

Authors: Flaviu Mihai Frigura-Lliasa, Andreea Anamaria Anghel, Attila Simo

Abstract:

Due to the beauty, usefulness, science, constantly changing, constantly evolving features, and most of the time, mystery it involves, nature-based art is seen as a both modern and timeless direction that has been extensively used in design. The goal of the team's activities was to experiment with ways of fusing the two most common contemporary ways of referring to green installations, that is, either in a pure artistic or in an ecological manner, and creating a living, dynamic, interactive installation capable of both receiving and interpreting external factors, such as natural and human stimuli, that would not only determine some of the mechanism's presets. By consequent, a complex experiment made up of various research and project stages was elaborated in order to transform an idea into an actual interactive green installation within months thanks to the interaction, teamwork, and design processes undertaken throughout the academic years by both university lecturers and some of our students. The outcomes would lead to the development of a dynamic artwork called "Modgrew" as well as the introduction of experiment-based learning at the Timisoara Faculty of Architecture and Urban Planning, as well as at the Faculty of Electrical and Power Engineering, for the green wall automation issues.

Keywords: green design, living walls, modular structure, interactive proof of concept

Procedia PDF Downloads 46
256 Circumstantial Loneliness and Existential Isolation in the Works of Flutura Açka

Authors: Elvira Lumi, Hans Jazxhi

Abstract:

In the works of the writer Flutura Açka, the play with these questions is acute, and in almost each of them, the act of loneliness and isolation builds in a completely involuntary way unique and frequent conceptual spaces. Because the object of study is too broad to grasp all the works, this study lays out a rapid paradox of our access to three of the novels in the line of numerous authorial works. The novel "Woman Loneliness" (2001), also marked as the first work in prose by the author, declares in the title the paradigm of what she has decided to confess. The gender segregation proclaimed in the title will be revealed step by step in the work as conventional human segregation without gender. In this novel, the analysis of the state of "loneliness" will require a contemplation beyond man, when the role of the environment and the distance from the center of the narrative base will be extremely visible in the work. The novel "Cross of Oblivion" (2004) has another form of perception of loneliness, which, unlike the one built by the characters themselves in the novel "Woman Loneliness," is imposed and obligatory to live by the circumstances. Its characters are trapped in loneliness, as loneliness that comes from impossibility, from the past, from dependence on fate, from fear of change, and from the obligation to accept it. At the heart of the novel, the plot of the novel game is dictated by the Kanun and its rules and the loneliness of the basis of life in unbroken waves towards the periphery of the event, a periphery that has very large geography and is played in today's Europe. The novel "Where are you?" (2009) has a completely different form of constructing the concept of loneliness and isolation that comes under conditions of repression and political pressure. The loneliness in this novel takes the form of the protective element from the circumstances that actually require a social inclusion; it is personal loneliness that ensures relative mental health of the characters, up to a new trap created by the circumstances, thus building life fragmentary “healthy” in the order of a mentally ill and socially ill society.

Keywords: loneliness, existential, isolation, woman, prose

Procedia PDF Downloads 124
255 Service Interactions Coordination Using a Declarative Approach: Focuses on Deontic Rule from Semantics of Business Vocabulary and Rules Models

Authors: Nurulhuda A. Manaf, Nor Najihah Zainal Abidin, Nur Amalina Jamaludin

Abstract:

Coordinating service interactions are a vital part of developing distributed applications that are built up as networks of autonomous participants, e.g., software components, web services, online resources, involve a collaboration between a diverse number of participant services on different providers. The complexity in coordinating service interactions reflects how important the techniques and approaches require for designing and coordinating the interaction between participant services to ensure the overall goal of a collaboration between participant services is achieved. The objective of this research is to develop capability of steering a complex service interaction towards a desired outcome. Therefore, an efficient technique for modelling, generating, and verifying the coordination of service interactions is developed. The developed model describes service interactions using service choreographies approach and focusing on a declarative approach, advocating an Object Management Group (OMG) standard, Semantics of Business Vocabulary and Rules (SBVR). This model, namely, SBVR model for service choreographies focuses on a declarative deontic rule expressing both obligation and prohibition, which can be more useful in working with coordinating service interactions. The generated SBVR model is then be formulated and be transformed into Alloy model using Alloy Analyzer for verifying the generated SBVR model. The transformation of SBVR into Alloy allows to automatically generate the corresponding coordination of service interactions (service choreography), hence producing an immediate instance of execution that satisfies the constraints of the specification and verifies whether a specific request can be realised in the given choreography in the generated choreography.

Keywords: service choreography, service coordination, behavioural modelling, complex interactions, declarative specification, verification, model transformation, semantics of business vocabulary and rules, SBVR

Procedia PDF Downloads 121
254 Impact of Legs Geometry on the Efficiency of Thermoelectric Devices

Authors: Angel Fabian Mijangos, Jaime Alvarez Quintana

Abstract:

Key concepts like waste heat recycling or waste heat recovery are the basic ideas in thermoelectricity so as to the design the newest solid state sources of energy for a stable supply of electricity and environmental protection. According to several theoretical predictions; at device level, the geometry and configuration of the thermoelectric legs are crucial in the thermoelectric performance of the thermoelectric modules. Thus, in this work, it has studied the geometry effect of legs on the thermoelectric figure of merit ZT of the device. First, asymmetrical legs are proposed in order to reduce the overall thermal conductance of the device so as to increase the temperature gradient in the legs, as well as by harnessing the Thomson effect, which is generally neglected in conventional symmetrical thermoelectric legs. It has been developed a novel design of a thermoelectric module having asymmetrical legs, and by first time it has been validated experimentally its thermoelectric performance by realizing a proof-of-concept device which shows to have almost twofold the thermoelectric figure of merit as compared to conventional one. Moreover, it has been also varied the length of thermoelectric legs in order to analyze its effect on the thermoelectric performance of the device. Along with this, it has studied the impact of contact resistance in these systems. Experimental results show that device architecture can improve up to twofold the thermoelectric performance of the device.

Keywords: asymmetrical legs, heat recovery, heat recycling, thermoelectric module, Thompson effect

Procedia PDF Downloads 209
253 Kluyveromyces marxianus ABB S8 as Yeast-Based Technology to Manufacture Low FODMAP Baking Good

Authors: Jordi Cuñé, Carlos de Lecea, Laia Marti

Abstract:

Small molecules known as fermentable oligo-, di-, and monosaccharides and polyols (FODMAPs) are quickly fermented in the large intestine after being poorly absorbed in the small intestine. There is proof that individuals suffering from functional gastrointestinal disorders, like irritable bowel syndrome (IBS), observe an improvement while following a diet low in FODMAPs. Because wheat has a relatively high fructan content, it is a key source of FODMAPs in our diet. A yeast-based method was created in this study to lower the amounts of FODMAP in (whole wheat) bread. In contrast to fermentation by regular baker yeast, the combination of Kluyveromyces marxianus ABB S7 with Saccharomyces cerevisiae allowed a reduction of fructan content by 60% without implying the appearance of other substrates categorized as FODMAP (excess fructose or polyols). The final FODMAP content in the developed whole wheat bread would allow its classification as a safe product for sensitive people, according to international consensus. Cocultures of S. cerevisiae and K. marxianus were established in order to ensure sufficient CO₂ generation; larger quantities of gas were produced due to the strains' synergistic relationship. Thus, this method works well for lowering the levels of FODMAPs in bread.

Keywords: Kluyveromyces marxianus, bakery, bread, FODMAP, IBS, functional gastro intestinal disorders

Procedia PDF Downloads 26
252 System of Quality Automation for Documents (SQAD)

Authors: R. Babi Saraswathi, K. Divya, A. Habeebur Rahman, D. B. Hari Prakash, S. Jayanth, T. Kumar, N. Vijayarangan

Abstract:

Document automation is the design of systems and workflows, assembling repetitive documents to meet the specific business needs. In any organization or institution, documenting employee’s information is very important for both employees as well as management. It shows an individual’s progress to the management. Many documents of the employee are in the form of papers, so it is very difficult to arrange and for future reference we need to spend more time in getting the exact document. Also, it is very tedious to generate reports according to our needs. The process gets even more difficult on getting approvals and hence lacks its security aspects. This project overcomes the above-stated issues. By storing the details in the database and maintaining the e-documents, the automation system reduces the manual work to a large extent. Then the approval process of some important documents can be done in a much-secured manner by using Digital Signature and encryption techniques. Details are maintained in the database and e-documents are stored in specific folders and generation of various kinds of reports is possible. Moreover, an efficient search method is implemented is used in the database. Automation supporting document maintenance in many aspects is useful for minimize data entry, reduce the time spent on proof-reading, avoids duplication, and reduce the risks associated with the manual error, etc.

Keywords: e-documents, automation, digital signature, encryption

Procedia PDF Downloads 362
251 Human-Computer Interaction Pluriversal Framework for Ancestral Medicine App in Bogota: Asset-Based Design Case Study

Authors: Laura Niño Cáceres, Daisy Yoo, Caroline Hummels

Abstract:

COVID-19 accelerated digital healthcare technology usage in many countries, such as Colombia, whose digital healthcare vision and projects are proof of this. However, with a significant cultural indigenous and Afro-Colombian heritage, only some parts of the country are willing to follow the proposed digital Western approach to health. Our paper presents the national healthcare system’s digital narrative, which we contrast with the micro-narrative of an Afro-Colombian ethnomedicine unit in Bogota called Kilombo Yumma. This ethnomedical unit is building its mobile app to safeguard and represent its ancestral medicine practices in local and national healthcare information systems. Kilombo Yumma is keen on promoting their beliefs and practices, which have been passed on through oral traditions and currently exist in the hands of a few older women. We unraveled their ambition, core beliefs, and practices through asset-based design. These assets outlined pluriversal and decolonizing forms of digital healthcare to increase social justice and connect Western and ancestral medicine digital opportunities through HCI.

Keywords: asset-based design, mobile app, decolonizing HCI, Afro-Colombian ancestral medicine

Procedia PDF Downloads 47
250 Diplomatic Assurances in International Law

Authors: William Thomas Worster

Abstract:

Diplomatic assurances issued by states declaring that they will not mistreat individuals returned to them occupy a strange middle ground between being legal and non-legal obligations. States assert that they are non-binding, yet at other times that they are binding. However, this assertion may not be the end of the discussion. The International Court of Justice and other tribunals have concluded that similar instruments were binding, states have disagreed that certain similar instruments were binding, and the Vienna Convention on the Law of Treaties and its travaux prépératoires do not appear to contemplate non-binding instruments. This paper is a case study of diplomatic assurances but, by necessity, touches on the delicate question of whether certain texts are treaties, promises, or non-binding political statements. International law, and law in general, requires a binary approach to obligation. All communications must be binding or not, even if the fit is not precise. Through this study, we will find that some of the obligations in certain assurances can be understood as legal and some not. We will attempt to state the current methodology for determining which obligations are legal under the law of treaties and law on binding unilateral promises. The paper begins with some background of the legal environment of diplomatic assurances and their use in cases of expulsion. The paper then turns to discuss the legal nature of diplomatic assurances, proceeding to address various possibilities for legal value as treaties and as binding unilateral statements. This paper will not examine the legal value of diplomatic assurances solely under customary international law other than the way in which customary international law might further refine the treaty definition. In order to identify whether any assurances are contained in legal acts, this study identifies a pool of relevant assurances and qualitatively analyzes whether any of those are contained in treaties or binding unilateral statements. To the author’s best knowledge, this study is the first large-scale, qualitative qualitative analysis of assurances as a group of instruments that accounts for their heterogenous nature. It is also the first study to identify the indicators of whether an instrument is a treaty or promise.

Keywords: diplomatic assurances, deportation, extradition, expulsion, non-refoulement, torture, persecution, death penalty, human rights, memorandum of understanding, promises, secret, monitoring, compliance, enforcement

Procedia PDF Downloads 60
249 The Disposable Identities; Enabling Trust-by-Design to Build Sustainable Data-Driven Value

Authors: Lorna Goulden, Kai M. Hermsen, Jari Isohanni, Mirko Ross, Jef Vanbockryck

Abstract:

This article introduces disposable identities, with reference use cases and explores possible technical approaches. The proposed approach, when fully developed as an open-source toolkit, enables developers of mobile or web apps to employ a self-sovereign identity and data privacy framework, in order to rebuild trust in digital services by providing greater transparency, decentralized control, and GDPR compliance. With a user interface for the management of self-sovereign identity, digital authorizations, and associated data-driven transactions, the advantage of Disposable Identities is that they may also contain verifiable data such as the owner’s photograph, official or even biometric identifiers for more proactive prevention of identity abuse. These Disposable Identities designed for decentralized privacy management can also be time, purpose and context-bound through a secure digital contract; with verification functionalities based on tamper-proof technology.

Keywords: dentity, trust, self-sovereign, disposable identity, privacy toolkit, decentralised identity, verifiable credential, cybersecurity, data driven business, PETs, GDPRdentity, trust, self-sovereign, disposable identity, privacy toolkit, decentralised identity, verifiable credential, cybersecurity, data driven business, PETs, GDPRI

Procedia PDF Downloads 195
248 Constitutional Identity: The Connection between National Constitutions and EU Law

Authors: Norbert Tribl

Abstract:

European contemporary scientific public opinion considers the concept of constitutional identity as a highlighted issue. Some scholars interpret the matter as the manifestation of a conflict of Europe. Nevertheless, constitutional identity is a bridge between the Member States and the EU rather than a river that will wash away the achievements of the integration. In accordance with the opinion of the author, the main problem of constitutional identity in Europe is the undetermined nature: the exact concept of constitutional identity has not been defined until now. However, this should be the first step to understand and use identity as a legal institution. Having regard to this undetermined nature, the legal-theoretical examination of constitutional identity is the main purpose of this study. The concept of constitutional identity appears in the Anglo-Saxon legal systems by a different approach than in the supranational system of European Integration. While the interpretation of legal institutions in conformity with the constitution is understood under it, the European concept is applied when possible conflicts arise between the legal system of the European supranational space and certain provisions of the national constitutions of the member states. The European concept of constitutional identity intends to offer input in determining the nature of the relationship between the constitutional provisions of the member states and the legal acts of the EU integration. In the EU system of multilevel constitutionalism, a long-standing central debate on integration surrounds the conflict between EU legal acts and the constitutional provisions of the member states. In spite of the fact that the Court of Justice of the European Union stated in Costa v. E.N.E.L. that the member states cannot refer to the provisions of their respective national constitutions against the integration. Based on the experience of more than 50 years since the above decision, and also in light of the Treaty of Lisbon, we now can clearly see that EU law has itself identified an obligation for the EU to protect the fundamental constitutional features of the Member States under Article 4 (2) of Treaty on European Union, by respecting the national identities of member states. In other words, the European concept intends to offer input for the determination of the nature of the relationship between the constitutional provisions of the member states and the legal acts of the EU integration.

Keywords: constitutional identity, EU law, European Integration, supranationalism

Procedia PDF Downloads 120
247 Providing a Secure, Reliable and Decentralized Document Management Solution Using Blockchain by a Virtual Identity Card

Authors: Meet Shah, Ankita Aditya, Dhruv Bindra, V. S. Omkar, Aashruti Seervi

Abstract:

In today's world, we need documents everywhere for a smooth workflow in the identification process or any other security aspects. The current system and techniques which are used for identification need one thing, that is ‘proof of existence’, which involves valid documents, for example, educational, financial, etc. The main issue with the current identity access management system and digital identification process is that the system is centralized in their network, which makes it inefficient. The paper presents the system which resolves all these cited issues. It is based on ‘blockchain’ technology, which is a 'decentralized system'. It allows transactions in a decentralized and immutable manner. The primary notion of the model is to ‘have everything with nothing’. It involves inter-linking required documents of a person with a single identity card so that a person can go anywhere without having the required documents with him/her. The person just needs to be physically present at a place wherein documents are necessary, and using a fingerprint impression and an iris scan print, the rest of the verification will progress. Furthermore, some technical overheads and advancements are listed. This paper also aims to layout its far-vision scenario of blockchain and its impact on future trends.

Keywords: blockchain, decentralized system, fingerprint impression, identity management, iris scan

Procedia PDF Downloads 104
246 User-Driven Product Line Engineering for Assembling Large Families of Software

Authors: Zhaopeng Xuan, Yuan Bian, C. Cailleaux, Jing Qin, S. Traore

Abstract:

Traditional software engineering allows engineers to propose to their clients multiple specialized software distributions assembled from a shared set of software assets. The management of these assets however requires a trade-off between client satisfaction and software engineering process. Clients have more and more difficult to find a distribution or components based on their needs from all of distributed repositories. This paper proposes a software engineering for a user-driven software product line in which engineers define a feature model but users drive the actual software distribution on demand. This approach makes the user become final actor as a release manager in software engineering process, increasing user product satisfaction and simplifying user operations to find required components. In addition, it provides a way for engineers to manage and assembly large software families. As a proof of concept, a user-driven software product line is implemented for eclipse, an integrated development environment. An eclipse feature model is defined, which is exposed to users on a cloud-based built platform from which clients can download individualized Eclipse distributions.

Keywords: software product line, model-driven development, reverse engineering and refactoring, agile method

Procedia PDF Downloads 409
245 Development of Al Foam by a Low-Cost Salt Replication Method for Industrial Applications

Authors: B. Soni, S. Biswas

Abstract:

Metal foams of Al find diverse applications in several industrial sectors such as in automotive and sports equipment industry as impact, acoustic and vibration absorbers, the aerospace industry as structural components in turbines and spatial cones, in the naval industry as low frequency vibration absorbers, and in construction industry as sound barriers inside tunnels, as fire proof materials and structure protection systems against explosions and even in heat exchangers, orthopedic components, and decorative items. Here, we report on the development of Al foams by a low cost and convenient technique of salt replication method with efficient control over size, geometry and distribution of the pores. Sodium bicarbonate was used as the foaming agent to form the porous refractory salt pattern. The mixed refractory salt slurry was microwave dried followed by sintering for selected time periods. Molten Al was infiltrated into the salt pattern in an inert atmosphere at a pressure of 2 bars. The final products were obtained by leaching out the refractory salt pattern. Mechanical properties of the derived samples were studied with a universal testing machine. The results were analyzed in correlation with their microstructural features evaluated with a scanning electron microscope (SEM).

Keywords: metal foam, Al, salt replication method, mechanical properties, SEM

Procedia PDF Downloads 334
244 Differential Infection of Primary Human B-Cells and EBV Positive B-Lymphoma Cell Lines by Recombinant AAV Serotypes

Authors: Elham Ahmadi, Mehrdad Ravanshad, Joyce Fingeroth, Mazyar Ziyaeyan, Rajesh Panigrahi, Jun Xie, Gao Guangping

Abstract:

B-cell proliferative disorders often occur among persons that are T-cell compromised. These disorders are primarily EBV+ and can first present with a focal lesion. Direct introduction of oncolytic viruses into localized tumors provides theoretical advantages over chemotherapy and immunotherapy by reducing systemic toxicity, to which the immunocompromised host is most vulnerable. Widely studied as a vehicle for gene therapy, AAV has only rarely been applied to treat cancer. As a prelude to development of a therapeutic vehicle, we assessed the ability of 15 distinct recombinant AAV serotypes (rAAV1, rAAV2, rAAV3b, rAAV4, rAAV5, rAAV6, rAAV6.2, rAAV6TM, rAAV7, rAAV8, rAAVrh8, rAAV9, rAAVrh10, rAAV39, rAAV43) bearing eGFP to infect human B-cell tumor lines compared with primary B-cells in vitro. Enhanced infection of tumor lines by AAV 6.2 was demonstrated by flow cytometry. EBV superinfection of EBV negative B-cell tumor lines increased susceptibility to AAV6.2 infection. As proof of concept, AAV6.2 bearing HSV-1 thymidine kinase in place of eGFP eliminated tumor cells upon exposure to ganciclovir.

Keywords: AAV, gene therapy, lymphoma, malignancy, tropism

Procedia PDF Downloads 92
243 A Randomised, Single-Dose, Two-Period, Cross-Over Phase I Pharmacokinetic Study to Compare TDS®-Diazepam with Rectal Diazepam in Healthy Adult Subjects

Authors: Faisal O. Al-Otaibi, Arthur T. Tucker, Richard M. Langford, Stuart Ratcliffe, Atholl Johnston, Terry D. Lee, Kenneth B. Kirby, Chandan A. Alam

Abstract:

The Transdermal Delivery System (TDS®) is a proprietary liquid formulation that can be applied to intact skin via a metered pump spray to facilitate drug delivery to the circulation. The aim of this study was to assess the ability of the TDS preparation to deliver diazepam systemically, and to characterize the pharmacokinetic profile of the drug in healthy adult subjects. We conducted a randomized, single-dose, two-period, crossover phase I (pharmacokinetic) comparative study in twelve healthy volunteers. All volunteers received both 10 mg TDS-diazepam topically to the upper chest and 10 mg of the rectal diazepam preparation (Diastat®, 10 mg diazepam gel), with a minimum washout of 14 days between dosing episodes. Both formulations were well tolerated in all volunteers. Following topical application of TDS-diazepam, the mean AUC0-72h was 1241 ng/mL.h and the Cmax 34 ng/mL. The values for rectal Diastat were 4109 ng/mL.h and 300 ng/mL respectively. This proof of concept study demonstrates that the TDS preparation successfully delivered diazepam systemically to adults. As expected, the concentration of diazepam following the TDS application was lower and not bioequivalent to rectal gel. Future development of this unique system is required.

Keywords: transdermal delivery system, diazepam, seizure, bioequivalence, pharmacokinetic

Procedia PDF Downloads 401