Search results for: order picking problem
16793 Ecological Crisis: A Buddhist Approach
Authors: Jaharlal Debbarma
Abstract:
The ecological crisis has become a threat to earth’s well-being. Man’s ambitious desire of wealth, pleasure, fame, longevity and happiness has extracted natural resources so vastly that it is unable to sustain a healthy life. Man’s greed for wealth and power has caused the setting up of vast factories which further created the problem of air, water and noise pollution, which have adversely affected both fauna and flora.It is no secret that man uses his inherent powers of reason, intelligence and creativity to change his environment for his advantage. But man is not aware that the moral force he himself creates brings about corresponding changes in his environment to his weal or woe whether he likes it or not. As we are facing the global warming and the nature’s gift such as air and water has been so drastically polluted with disastrous consequences that man seek for a ways and means to overcome all this pollution problem as his health and life sustainability has been threaten and that is where man try to question about the moral ethics and value.It is where Buddhist philosophy has been emphasized deeply which gives us hope for overcoming this entire problem as Buddha himself emphasized in eradicating human suffering and Buddhism is the strongest form of humanism we have. It helps us to learn to live with responsibility, compassion, and loving kindness.It teaches us to be mindful in our action and thought as the environment unites every human being. If we fail to save it we will perish. If we can rise to meet the need to all which ecology binds us - humans, other species, other everything will survive together.My paper will look into the theory of Dependent Origination (Pratītyasamutpāda), Buddhist understanding of suffering (collective suffering), and Non-violence (Ahimsa) and an effort will be made to provide a new vision to Buddhist ecological perspective. The above Buddhist philosophy will be applied to ethical values and belief systems of modern society. The challenge will be substantially to transform the modern individualistic and consumeristic values. The stress will be made on the interconnectedness of the nature and the relation between human and planetary sustainability. In a way environmental crisis will be referred to “spiritual crisis” as A. Gore (1992) has pointed out. The paper will also give important to global consciousness, as well as to self-actualization and self-fulfillment. In the words of Melvin McLeod “Only when we combine environmentalism with spiritual practice, will we find the tools to make the profound personal transformations needed to address the planetary crisis?”Keywords: dependent arising, collective ecological suffering, remediation, Buddhist approach
Procedia PDF Downloads 26616792 Microstructural Origin of Morphotropic Phase Boundary and Magnetic Ordering in the Multiferroic BiFeO3-PbTiO3
Authors: Bastola Narayan, Rajeev Ranjan
Abstract:
The morphotropic phase boundary (MPB) in the magnetoelectric (1-x)BiFeO3-(x)PbTiO3 has remained a matter of controversy ever since its discovery in 1964. The nature of the phase stabilized (single phase tetragonal or coexistence of tetragonal and rhombohedral phases) is very sensitive to the slight changes in the synthesis conditions. It thus remained an enigma as to what is the essential physical factor which is controlled by the slight difference in the synthesis conditions that finally determines, whether the phase formed will be single phase or coexistence of phases. In this paper, we demonstrate that the nature of the phase stabilized in this system is uniquely dependent on the crystallite size. The system is shown to exhibit features of abnormal grain growth (AGG) during sintering with abrupt increase in the grain size from ~ 1 micron to ~ 10 microns. The 10 micron grains exhibit pure tetragonal phase while the 1 micron grains exhibit coexistence of rhombohedral and tetragonal ferroelectric phases. The Rietveld analysis of powder neutron diffraction shows a paramagnetic to antiferromagnetic order transition inducing with crystalline size reduction from 10 micron to 1 micron. Since tetragonal phase is known to have paramagnetic order and rhombohedral phase has antiferromagnetic order in room temperature, this further strengthens our argument of size induced structure transition.Keywords: size driven MPB, size driven magnetic ordering, abnormal grain growth, phase formation in BF-PT system
Procedia PDF Downloads 33516791 Detecting the Blood of Femoral and Carotid Artery of Swine Using Photoacoustic Tomography in-vivo
Authors: M. Y. Lee, S. H. Park, S. M. Yu, H. S. Jo, C. G. Song
Abstract:
Photoacoustic imaging is the imaging technology that combines the optical imaging with ultrasound. It also provides the high contrast and resolution due to optical and ultrasound imaging, respectively. For these reasons, many studies take experiment in order to apply this method for many diagnoses. We developed the real-time photoacoustic tomography (PAT) system using linear-ultrasound transducer. In this study, we conduct the experiment using swine and detect the blood of carotid artery and femoral artery. We measured the blood of femoral and carotid artery of swine and reconstructed the image using 950nm due to the HbO₂ absorption coefficient. The photoacoustic image is overlaid with ultrasound image in order to match the position. In blood of artery, major composition of blood is HbO₂. In this result, we can measure the blood of artery.Keywords: photoacoustic tomography, swine artery, carotid artery, femoral artery
Procedia PDF Downloads 25216790 Systems Approach on Thermal Analysis of an Automatic Transmission
Authors: Sinsze Koo, Benjin Luo, Matthew Henry
Abstract:
In order to increase the performance of an automatic transmission, the automatic transmission fluid is required to be warm up to an optimal operating temperature. In a conventional vehicle, cold starts result in friction loss occurring in the gear box and engine. The stop and go nature of city driving dramatically affect the warm-up of engine oil and automatic transmission fluid and delay the time frame needed to reach an optimal operating temperature. This temperature phenomenon impacts both engine and transmission performance but also increases fuel consumption and CO2 emission. The aim of this study is to develop know-how of the thermal behavior in order to identify thermal impacts and functional principles in automatic transmissions. Thermal behavior was studied using models and simulations, developed using GT-Suit, on a one-dimensional thermal and flow transport. A power train of a conventional vehicle was modeled in order to emphasis the thermal phenomena occurring in the various components and how they impact the automatic transmission performance. The simulation demonstrates the thermal model of a transmission fluid cooling system and its component parts in warm-up after a cold start. The result of these analyses will support the future designs of transmission systems and components in an attempt to obtain better fuel efficiency and transmission performance. Therefore, these thermal analyses could possibly identify ways that improve existing thermal management techniques with prioritization on fuel efficiency.Keywords: thermal management, automatic transmission, hybrid, and systematic approach
Procedia PDF Downloads 37716789 Comparing Performance Indicators among Mechanistic, Organic, and Bureaucratic Organizations
Authors: Benchamat Laksaniyanon, Padcharee Phasuk, Rungtawan Boonphanakan
Abstract:
With globalization, organizations had to adjust to an unstable environment in order to survive in a competitive arena. Typically within the field of management, different types of organizations include mechanistic, bureaucratic and organic ones. In fact, bureaucratic and mechanistic organizations have some characteristics in common. Bureaucracy is one type of Thailand organization which adapted from mechanistic concept to develop an organization that is suitable for the characteristic and culture of Thailand. The objective of this study is to compare the adjustment strategies of both organizations in order to find key performance indicators (KPI) suitable for improving organization in Thailand. The methodology employed is binary logistic regression. The results of this study will be valuable for developing future management strategies for both bureaucratic and mechanistic organizations.Keywords: mechanistic, bureaucratic and organic organization, binary logistic regression, key performance indicators (KPI)
Procedia PDF Downloads 35916788 Study on the Factors that Causes the Malaysian Oil and Gas Equipment (OGSE) Companies being under-Developing
Authors: Low Khee Wai
Abstract:
Lossing of opportunity by Malaysian Oil and Gas Services Equipment (OGSE) companies can be a major issue in developing and sustain Malaysia’s own Oil & Gas Industry. Despite the rapid growth of Oil & Gas industry in Malaysia for the past 40 years, Malaysia still not developing sufficient OGSE companies in order to support its own Oil & Gas Industry. In examining the scenario, this study aims to identify the factors causing the under-developing of OGSE companies in Malaysia. Conceptual Review method were used to analyse the factors that cause the under-development of Malaysia OGSE. The 4 factors identified were Time, Cost, Human Resource and Stakeholder Management. This survey explained the phenomena and the challenge of the industry and translated into the factors that cause the under-developing of OGSE companies in Malaysia. Finally, it should bring awareness to the government, authorities, and stakeholder in order to improve the ecology of Oil & Gas Industry in Malaysia.Keywords: oil & gas in Malaysia, Malaysia local oil & gas services equipment (OGSE), oil & gas project management, project performance
Procedia PDF Downloads 13216787 A Refined Nonlocal Strain Gradient Theory for Assessing Scaling-Dependent Vibration Behavior of Microbeams
Authors: Xiaobai Li, Li Li, Yujin Hu, Weiming Deng, Zhe Ding
Abstract:
A size-dependent Euler–Bernoulli beam model, which accounts for nonlocal stress field, strain gradient field and higher order inertia force field, is derived based on the nonlocal strain gradient theory considering velocity gradient effect. The governing equations and boundary conditions are derived both in dimensional and dimensionless form by employed the Hamilton principle. The analytical solutions based on different continuum theories are compared. The effect of higher order inertia terms is extremely significant in high frequency range. It is found that there exists an asymptotic frequency for the proposed beam model, while for the nonlocal strain gradient theory the solutions diverge. The effect of strain gradient field in thickness direction is significant in low frequencies domain and it cannot be neglected when the material strain length scale parameter is considerable with beam thickness. The influence of each of three size effect parameters on the natural frequencies are investigated. The natural frequencies increase with the increasing material strain gradient length scale parameter or decreasing velocity gradient length scale parameter and nonlocal parameter.Keywords: Euler-Bernoulli Beams, free vibration, higher order inertia, Nonlocal Strain Gradient Theory, velocity gradient
Procedia PDF Downloads 26716786 Caped Intervention: A Single Country Comparative Study of the Role of Russia in Its Involvement in the Crimean Crisis 2014
Authors: Katrina Angeline Santos, Francis Mark Fernandez, Francheska Esmao
Abstract:
Intervention is defined as a forcible interference by a state or states with power in the affairs of another state using force or the threat of force. On the other hand, a military intervention is an intervention, specifically used to define an intervention which uses force. With these, the authors realized a lack in the concept of intervention wherein it is an invited one.The authors wrote this paper to introduce a concept of intervention wherein the intervening state is offering assistance to the state in crisis which asked for one. The authors decided to make a contextual description of this phenomenon because of the lack of concepts regarding intervention between the idea of a single state performing a ‘heroic’ role of intervening in the crisis of another state. The problem that the authors would like to address is regarding the lack of availability in the concept of intervention wherein the state in crisis is seeking the assistance of another state. The authors utilized a contextual description approach to the study through the descriptive presentation of the series of events, by utilizing the news articles and news reports published, which happened in Ukraine and Crimea. This concept is further demonstrated through the utilization of a conceptual framework which shows the mutual relationship between the states. From the analysis of the behavior of Russia and its role in the Crimean Crisis 2014, the authors are able to coin the term, 'Caped Intervention' to describe an intervention of a state as a response to the invitation of assistance of a state in crisis in order for them to achieve their goals. This concept entails a mutual relationship between an intervening state and a sate in crisis. The concept of Caped Intervention describes the role of Russia as a Caped State or an intervening state observed through its action towards Crimea. This concept will help in the observation of the behavior of actors or states in events such as this. It will further help in analyzing the actors’ role in intervention by making it possible to classify the intervening acts into another concept.Keywords: assistance, caped intervention, crisis, heroic
Procedia PDF Downloads 31216785 The Impact of Human Rights Legislations and Evolution
Authors: Emad Eid Nemr Danyal
Abstract:
the problem of respect for human rights in Southeast Asia has come to be a prime problem and is attracting the attention of the worldwide community. basically, the affiliation of Southeast Asian international locations (ASEAN) made human rights one in every of its fundamental problems and in the ASEAN constitution in 2008. in the end, the Intergovernmental fee on Human Rights ASEAN Human Rights (AICHR) changed into mounted. AICHR is the Southeast Asia Human Rights Enforcement fee charged with the responsibilities, capabilities and powers to sell and defend human rights. but, at the quit of 2016, the protective function assigned to the AICHR turned into no longer but fulfilled. that is shown through numerous cases of human rights violations which are still ongoing and have now not but been solved. One case that has lately come to mild is human rights violations in opposition to the Rohingya human beings in Myanmar. the use of a prison-normative technique, the take a look at examines the urgency of setting up a human rights tribunal in Southeast Asia able to making a decision binding on ASEAN members or responsible events. facts suggests ASEAN desires regional courts to cope with human rights abuses inside the ASEAN area. in addition, the observe additionally highlights 3 essential elements that ASEAN must recall when setting up a human rights tribunal, specifically: quantity. a full-size distinction in terms of democracy and human rights development most of the individuals, a regular implementation of the precept of non-interference and the economic difficulty of the continuation of the court.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security
Procedia PDF Downloads 1216784 A Multicriteria Framework for Assessing Energy Audit Software for Low-Income Households
Authors: Charles Amoo, Joshua New, Bill Eckman
Abstract:
Buildings in the United States account for a significant proportion of energy consumption and greenhouse gas (GHG) emissions, and this trend is expected to continue as well as rise in the near future. Low-income households, in particular, bear a disproportionate burden of high building energy consumption and spending due to high energy costs. Energy efficiency improvements need to reach an average of 4% per year in this decade in order to meet global net zero emissions target by 2050, but less than 1 % of U.S. buildings are improved each year. The government has recognized the importance of technology in addressing this issue, and energy efficiency programs have been developed to tackle the problem. The Weatherization Assistance Program (WAP), the largest residential whole-house energy efficiency program in the U.S., is specifically designed to reduce energy costs for low-income households. Under the WAP, energy auditors must follow specific audit procedures and use Department of Energy (DOE) approved energy audit tools or software. This article proposes an expanded framework of factors that should be considered in energy audit software that is approved for use in energy efficiency programs, particularly for low-income households. The framework includes more than 50 factors organized under 14 assessment criteria and can be used to qualitatively and quantitatively score different energy audit software to determine their suitability for specific energy efficiency programs. While the tool can be useful for developers to build new tools and improve existing software, as well as for energy efficiency program administrators to approve or certify tools for use, there are limitations to the model, such as the lack of flexibility that allows continuous scoring to accommodate variability and subjectivity. These limitations can be addressed by using aggregate scores of each criterion as weights that could be combined with value function and direct rating scores in a multicriteria decision analysis for a more flexible scoring.Keywords: buildings, energy efficiency, energy audit, software
Procedia PDF Downloads 7716783 Optimal Design of Multi-Machine Power System Stabilizers Using Interactive Honey Bee Mating Optimization
Authors: Hossein Ghadimi, Alireza Alizadeh, Oveis Abedinia, Noradin Ghadimi
Abstract:
This paper presents an enhanced Honey Bee Mating Optimization (HBMO) to solve the optimal design of multi machine power system stabilizer (PSSs) parameters, which is called the Interactive Honey Bee Mating Optimization (IHBMO). Power System Stabilizers (PSSs) are now routinely used in the industry to damp out power system oscillations. The design problem of the proposed controller is formulated as an optimization problem and IHBMO algorithm is employed to search for optimal controller parameters. The proposed method is applied to multi-machine power system (MPS). The method suggested in this paper can be used for designing robust power system stabilizers for guaranteeing the required closed loop performance over a prespecified range of operating and system conditions. The simplicity in design and implementation of the proposed stabilizers makes them better suited for practical applications in real plants. The non-linear simulation results are presented under wide range of operating conditions in comparison with the PSO and CPSS base tuned stabilizer one through FD and ITAE performance indices. The results evaluation shows that the proposed control strategy achieves good robust performance for a wide range of system parameters and load changes in the presence of system nonlinearities and is superior to the other controllers.Keywords: power system stabilizer, IHBMO, multimachine, nonlinearities
Procedia PDF Downloads 50716782 Sexual Harassment at University: Male Students' Perspectives
Authors: Shakila Singh
Abstract:
Sexual harassment continues to be a problem both in educational institutions and workplaces with the main victims being women and the main perpetrators being men. The achievement of quality education demands to create safe learning spaces for all students and requires extensive and integrated interventions. This article draws on the data from a broader study that aims to create safer learning environments at university by addressing gender violence. It attempts to understand male students’ perspectives about their role in sexual harassment on the campus. It is a move away from interventions that place the responsibility of prevention of sexual harassment, on women. The study adopts an interpretive paradigm within a qualitative approach. The sample comprises twenty male university students who were purposively selected because they live in the campus residences. The main data generation methods included focus group discussions and individual interviews. Findings show that while many male students agree that victims of sexual harassment are mainly women, they also suggest that men are victims of sexual harassment by women. Male students have varying understandings of what constitutes sexual harassment. They position themselves as victims who feel harassed by women’s dress and behaviour. Male students also felt under pressure by sexual advances made by women that forced them to comply in order to protect their masculinity. This article argues that social norms of masculinity are powerful drivers of behaviour that play a key role in the perpetuation of sexual harassment. Male students who feel strongly against sexual harassment of female students are constrained by their masculinities in their ability to act against it. Effective interventions need to actively engage students in reflecting on and challenging social and cultural norms that contribute to violent expressions and to develop alternatives with them.Keywords: gender violence, male students, sexual harassment, university students
Procedia PDF Downloads 21116781 Cognitive and Environmental Factors Affecting Graduate Student Perception of Mathematics
Authors: Juanita Morris
Abstract:
The purpose of this study will examine the mediating relationships between the theories of intelligence, mathematics anxiety, gender stereotype threat, meta-cognition and math performance through the use of eye tracking technology, affecting student perception and problem-solving abilities. The participants will consist of (N=80) female graduate students. Test administered were the Abbreviated Math Anxiety Scale, Tobii Eye Tracking software, gender stereotype threat through Google images, and they will be asked to describe their problem-solving approach allowed to measure metacognition. Participants will be administered mathematics problems while having gender stereotype threat shown to them through online images while being directed to look at the eye tracking software Tobii. We will explore this by asking ‘Is mathematics anxiety associated with the theories of intelligence and gender stereotype threat and how does metacognition and math performance place a role in mediating those perspectives?’. It is hypothesized that math-anxious students are more likely affected by the gender stereotype threat and that may play a role in their performance? Furthermore, we also want to explore whether math anxious students are more likely to be an entity theorist than incremental theorist and whether those who are math anxious will be more likely to be fixated on variables associated with coefficients? Path analysis and independent samples t-test will be used to generate results for this study. We hope to conclude that both the theories of intelligence and metacognition mediate the relationship between mathematics anxiety and gender stereotype threat.Keywords: math anxiety, emotions, affective domains fo learning, cognitive underlinings
Procedia PDF Downloads 26916780 Neural Graph Matching for Modification Similarity Applied to Electronic Document Comparison
Authors: Po-Fang Hsu, Chiching Wei
Abstract:
In this paper, we present a novel neural graph matching approach applied to document comparison. Document comparison is a common task in the legal and financial industries. In some cases, the most important differences may be the addition or omission of words, sentences, clauses, or paragraphs. However, it is a challenging task without recording or tracing the whole edited process. Under many temporal uncertainties, we explore the potentiality of our approach to proximate the accurate comparison to make sure which element blocks have a relation of edition with others. In the beginning, we apply a document layout analysis that combines traditional and modern technics to segment layouts in blocks of various types appropriately. Then we transform this issue into a problem of layout graph matching with textual awareness. Regarding graph matching, it is a long-studied problem with a broad range of applications. However, different from previous works focusing on visual images or structural layout, we also bring textual features into our model for adapting this domain. Specifically, based on the electronic document, we introduce an encoder to deal with the visual presentation decoding from PDF. Additionally, because the modifications can cause the inconsistency of document layout analysis between modified documents and the blocks can be merged and split, Sinkhorn divergence is adopted in our neural graph approach, which tries to overcome both these issues with many-to-many block matching. We demonstrate this on two categories of layouts, as follows., legal agreement and scientific articles, collected from our real-case datasets.Keywords: document comparison, graph matching, graph neural network, modification similarity, multi-modal
Procedia PDF Downloads 17916779 Pattern and Trend of Open Burning Occurrence in Greater Mekong Sub-Region Countries: Case Study Thailand, Laos, and Myanmar
Authors: Nion Sirimongkonlertkun, Vivard Phonekeo
Abstract:
This research focused on open burning occurrence in Greater Mekong Sub-Region countries that influences the increase of PM10concentrations. Thailand, Myanmar, and Laos were chosen as a case study, and 2009, 2010, and 2012 were chosen as the year for case study. Hotspot detected by MODIS (Moderate Resolution Imaging Specto radiometer) sensor on board of Terra/Aqua satellites and provided by Rapid Response System was used to represent open burning location in the region. Hotspot was selected through fire confidence with confidence levels of 80-100%. The spatial analysis by GIS was used as the main tool for analyzing and defining the location of open burning at study sites as hotspot with the pixel size of 1 km by 1 km. The total hotspot counts in the study period of four years (2007, 2009, 2010, and January-April 2012) at the regional level, including Thailand, Laos, and Myanmar were 255,177 hotspots or a very high yearly average of 63,795 hotspots. The highest amount was seen in Myanmar (50%), followed by Laos (36%), and Thailand (14%). For Thailand, the majority of burning or 64% occurred in the northern region with the density of 5 hotspots per 100 km2. According to statistics of the 4 years, the increasing rate of hotspot from January to February was 10 times and from February to March was 4 times. After that period, the hotspot started to decline by 2 times from March to April. Therefore, in order to develop a policy which aims to lessen open burning conduction, the government should seriously focus on this problem during the peak period—February to March in every year when hotspot and open burning area is significantly increased.Keywords: PM10, hotspot, greater mekong sub-region, open burning
Procedia PDF Downloads 36016778 Industrial Wastewater Sludge Treatment in Chongqing, China
Authors: Victor Emery David Jr., Jiang Wenchao, Yasinta John, Md. Sahadat Hossain
Abstract:
Sludge originates from the process of treatment of wastewater. It is the byproduct of wastewater treatment containing concentrated heavy metals and poorly biodegradable trace organic compounds, as well as potentially pathogenic organisms (viruses, bacteria, etc.) which are usually difficult to treat or dispose of. China, like other countries, is no stranger to the challenges posed by an increase of wastewater. Treatment and disposal of sludge have been a problem for most cities in China. However, this problem has been exacerbated by other issues such as lack of technology, funding, and other factors. Suitable methods for such climatic conditions are still unavailable for modern cities in China. Against this background, this paper seeks to describe the methods used for treatment and disposal of sludge from industries and suggest a suitable method for treatment and disposal in Chongqing/China. From the research conducted, it was discovered that the highest treatment rate of sludge in Chongqing was 10.08%. The industrial waste piping system is not separated from the domestic system. Considering the proliferation of industry and urbanization, there is a likelihood that the production of sludge in Chongqing will increase. If the sludge produced is not properly managed, this may lead to adverse health and environmental effects. Disposal costs and methods for Chongqing were also included in this paper’s analysis. Research showed that incineration is the most expensive method of sludge disposal in China/Chongqing. Subsequent research, therefore, considered optional alternatives such as composting. Composting represents a relatively cheap waste disposal method considering the vast population, current technology and economic conditions of Chongqing, as well as China at large.Keywords: Chongqing/China, disposal, industrial, sludge, treatment
Procedia PDF Downloads 32116777 The Business of American Football: The Kicker Position and Performance to Salary Correlation
Authors: James R. Ogden, Denise T. Ogden
Abstract:
The National Football League (USA) is the largest sporting business in the United States. In order to generate revenue, it is important that NFL teams win. Coaches, owners and general managers of the NFL teams want to create powerful teams with reliable players and they are willing to spend large amounts of money in order to do so. This research looks at one of the National Football League’s key players, the kicker. It would be intuitively obvious to suggest that those kickers who perform the best get paid the most. In this paper the researchers performed a correlation and regression analysis to determine if there is a correlation between an NFL kicker’s field goal percentage and salary. The research proposition was that higher performing kickers receive higher salaries. The data suggest that there is no correlation between salary and on-field performance.Keywords: business management, sports marketing, tourism, American football
Procedia PDF Downloads 30516776 Importance of Human Factors on Cybersecurity within Organizations: A Study of Attitudes and Behaviours
Authors: Elham Rajabian
Abstract:
The ascent of cybersecurity incidents is a rising threat to most organisations in general, while the impact of the incidents is unique to each of the organizations. It is a need for behavioural sciences to concentrate on employees’ behaviour in order to prepare key security mitigation opinions versus cybersecurity incidents. There are noticeable differences among users of a computer system in terms of complying with security behaviours. We can discuss the people's differences under several subjects such as delaying tactics on something that must be done, the tendency to act without thinking, future thinking about unexpected implications of present-day issues, and risk-taking behaviours in security policies compliance. In this article, we introduce high-profile cyber-attacks and their impacts on weakening cyber resiliency in organizations. We also give attention to human errors that influence network security. Human errors are discussed as a part of psychological matters to enhance compliance with the security policies. The organizational challenges are studied in order to shape a sustainable cyber risks management approach in the related work section. Insiders’ behaviours are viewed as a cyber security gap to draw proper cyber resiliency in section 3. We carry out the best cybersecurity practices by discussing four CIS challenges in section 4. In this regard, we provide a guideline and metrics to measure cyber resilience in organizations in section 5. In the end, we give some recommendations in order to build a cybersecurity culture based on individual behaviours.Keywords: cyber resilience, human factors, cybersecurity behavior, attitude, usability, security culture
Procedia PDF Downloads 9716775 Arithmetic Operations Based on Double Base Number Systems
Authors: K. Sanjayani, C. Saraswathy, S. Sreenivasan, S. Sudhahar, D. Suganya, K. S. Neelukumari, N. Vijayarangan
Abstract:
Double Base Number System (DBNS) is an imminent system of representing a number using two bases namely 2 and 3, which has its application in Elliptic Curve Cryptography (ECC) and Digital Signature Algorithm (DSA).The previous binary method representation included only base 2. DBNS uses an approximation algorithm namely, Greedy Algorithm. By using this algorithm, the number of digits required to represent a larger number is less when compared to the standard binary method that uses base 2 algorithms. Hence, the computational speed is increased and time being reduced. The standard binary method uses binary digits 0 and 1 to represent a number whereas the DBNS method uses binary digit 1 alone to represent any number (canonical form). The greedy algorithm uses two ways to represent the number, one is by using only the positive summands and the other is by using both positive and negative summands. In this paper, arithmetic operations are used for elliptic curve cryptography. Elliptic curve discrete logarithm problem is the foundation for most of the day to day elliptic curve cryptography. This appears to be a momentous hard slog compared to digital logarithm problem. In elliptic curve digital signature algorithm, the key generation requires 160 bit of data by usage of standard binary representation. Whereas, the number of bits required generating the key can be reduced with the help of double base number representation. In this paper, a new technique is proposed to generate key during encryption and extraction of key in decryption.Keywords: cryptography, double base number system, elliptic curve cryptography, elliptic curve digital signature algorithm
Procedia PDF Downloads 39616774 Temporal and Spacial Adaptation Strategies in Aerodynamic Simulation of Bluff Bodies Using Vortex Particle Methods
Authors: Dario Milani, Guido Morgenthal
Abstract:
Fluid dynamic computation of wind caused forces on bluff bodies e.g light flexible civil structures or high incidence of ground approaching airplane wings, is one of the major criteria governing their design. For such structures a significant dynamic response may result, requiring the usage of small scale devices as guide-vanes in bridge design to control these effects. The focus of this paper is on the numerical simulation of the bluff body problem involving multiscale phenomena induced by small scale devices. One of the solution methods for the CFD simulation that is relatively successful in this class of applications is the Vortex Particle Method (VPM). The method is based on a grid free Lagrangian formulation of the Navier-Stokes equations, where the velocity field is modeled by particles representing local vorticity. These vortices are being convected due to the free stream velocity as well as diffused. This representation yields the main advantages of low numerical diffusion, compact discretization as the vorticity is strongly localized, implicitly accounting for the free-space boundary conditions typical for this class of FSI problems, and a natural representation of the vortex creation process inherent in bluff body flows. When the particle resolution reaches the Kolmogorov dissipation length, the method becomes a Direct Numerical Simulation (DNS). However, it is crucial to note that any solution method aims at balancing the computational cost against the accuracy achievable. In the classical VPM method, if the fluid domain is discretized by Np particles, the computational cost is O(Np2). For the coupled FSI problem of interest, for example large structures such as long-span bridges, the aerodynamic behavior may be influenced or even dominated by small structural details such as barriers, handrails or fairings. For such geometrically complex and dimensionally large structures, resolving the complete domain with the conventional VPM particle discretization might become prohibitively expensive to compute even for moderate numbers of particles. It is possible to reduce this cost either by reducing the number of particles or by controlling its local distribution. It is also possible to increase the accuracy of the solution without increasing substantially the global computational cost by computing a correction of the particle-particle interaction in some regions of interest. In this paper different strategies are presented in order to extend the conventional VPM method to reduce the computational cost whilst resolving the required details of the flow. The methods include temporal sub stepping to increase the accuracy of the particles convection in certain regions as well as dynamically re-discretizing the particle map to locally control the global and the local amount of particles. Finally, these methods will be applied on a test case and the improvements in the efficiency as well as the accuracy of the proposed extension to the method are presented. The important benefits in terms of accuracy and computational cost of the combination of these methods will be thus presented as long as their relevant applications.Keywords: adaptation, fluid dynamic, remeshing, substepping, vortex particle method
Procedia PDF Downloads 26216773 Intellectual Capital as Resource Based Business Strategy
Authors: Vidya Nimkar Tayade
Abstract:
Introduction: Intellectual capital of an organization is a key factor to success. Many companies invest a huge amount in their Research and development activities. Any innovation is helpful not only to that particular company but also to many other companies, industry and mankind as a whole. Companies undertake innovative changes for increasing their capital profitability and indirectly increase in pay packages of their employees. The quality of human capital can also improve due to such positive changes. Employees become more skilled and experienced due to such innovations and inventions. For increasing intangible capital, the author has referred to a couple of books and referred case studies to come to a conclusion. Different charts and tables are also referred to by the author. Case studies are more important because they are proven and established techniques. They enable students to apply theoretical concepts in real-world situations. It gives solutions to an open-ended problem with multiple potential solutions. There are three different strategies for undertaking intellectual capital increase. They are: Research push strategy/ Technology pushed approach, Market pull strategy/ approach and Open innovation strategy/approach. Research push strategy, In this strategy, research is undertaken and innovation is achieved on its own. After invention inventor company protects such invention and finds buyers for such invention. In this way, the invention is pushed into the market. In this method, research and development are undertaken first and the outcome of this research is commercialized. Market pull strategy, In this strategy, commercial opportunities are identified first and our research is concentrated in that particular area. For solving a particular problem, research is undertaken. It becomes easier to commercialize this type of invention. Because what is the problem is identified first and in that direction, research and development activities are carried on. Open invention strategy, In this type of research, more than one company enters into an agreement of research. The benefits of the outcome of this research will be shared by both companies. Internal and external ideas and technologies are involved. These ideas are coordinated and then they are commercialized. Due to globalization, people from the outside company are also invited to undertake research and development activities. Remuneration of employees of both the companies can increase and the benefit of commercialization of such invention is also shared by both the companies. Conclusion: In modern days, not only can tangible assets be commercialized, but also intangible assets can also be commercialized. The benefits of such an invention can be shared by more than one company. Competition can become more meaningful. Pay packages of employees can improve. It Is a need for time to adopt such strategies to benefit employees, competitors, stakeholders.Keywords: innovation, protection, management, commercialization
Procedia PDF Downloads 16816772 Bestination: A Sustainable Approach to Conflict Management for Buddhist Entrepreneurs
Authors: Navarat Sachayansrisakul, Nattawat Ponnara
Abstract:
Human beings are driving forces for any unit of societies, whether it would be in a family, communities, industries or even organizations. However, as our humanity progresses, the reliance has shifted from human to machineries and technologies. One main challenge when dealing with more than one person is conflict often resulted. If the conflict is properly managed, then economic development also follows. In order to achieve positive outcome of conflict, it is believed that the management comes from within individual entrepreneurs. As such, this is a unique study as it looks into the spiritual side of humans as business people and applies to the business environment with the focus on moral and ethical framework in order for sustainable development. This study aims to provide a model of how to positively manage conflict without compromising the ethical and moral standards of the businesses. Sustainability in this study is achieved through the Buddhists’ aim for liberation in which it works on the balanced approach to solving conflict. Buddhists’ livelihood is established on simplicity and non-violence while contributing not to only one’s self but those around them such as the stake holders of the businesses and the communities. According to Buddhist principles and some findings, a model called ‘The Bestination Conflict Management’ was developed. Bestination model offers an alternative approach for entrepreneurs to achieve sustainability along with intrinsic and extrinsic rewards that benefit the well-beings of the owners, the stakeholders and the communities involved. This research study identifies ‘Conflict Management’ model as having goodwill and wisdom as a base, then moral motivation as the next level up to have a disciplines in order to keep a unit well cooperated.Keywords: sustainable, entrepreneurs, Buddhist, moral, ethics, conflict
Procedia PDF Downloads 16916771 Transform to Succeed: An Empirical Analysis of Digital Transformation in Firms
Authors: Sarah E. Stief, Anne Theresa Eidhoff, Markus Voeth
Abstract:
Despite all progress firms are facing the increasing need to adapt and assimilate digital technologies to transform their business activities in order to pursue business development. By using new digital technologies, firms can implement major business improvements in order to stay competitive and foster new growth potentials. The corresponding phenomenon of digital transformation has received some attention in previous literature in respect to industries such as media and publishing. Nevertheless, there is a lack of understanding of the concept and its organization within firms. With the help of twenty-three in-depth field interviews with German experts responsible for their company’s digital transformation, we examined what digital transformation encompasses, how it is organized and which opportunities and challenges arise within firms. Our results indicate that digital transformation is an inevitable task for all firms, as it bears the potential to comprehensively optimize and reshape established business activities and can thus be seen as a strategy of business development.Keywords: business development, digitalization, digital strategies, digital transformation
Procedia PDF Downloads 42716770 Facial Recognition Technology in Institutions of Higher Learning: Exploring the Use in Kenya
Authors: Samuel Mwangi, Josephine K. Mule
Abstract:
Access control as a security technique regulates who or what can access resources. It is a fundamental concept in security that minimizes risks to the institutions that use access control. Regulating access to institutions of higher learning is key to ensure only authorized personnel and students are allowed into the institutions. The use of biometrics has been criticized due to the setup and maintenance costs, hygiene concerns, and trepidations regarding data privacy, among other apprehensions. Facial recognition is arguably a fast and accurate way of validating identity in order to guard protected areas. It guarantees that only authorized individuals gain access to secure locations while requiring far less personal information whilst providing an additional layer of security beyond keys, fobs, or identity cards. This exploratory study sought to investigate the use of facial recognition in controlling access in institutions of higher learning in Kenya. The sample population was drawn from both private and public higher learning institutions. The data is based on responses from staff and students. Questionnaires were used for data collection and follow up interviews conducted to understand responses from the questionnaires. 80% of the sampled population indicated that there were many security breaches by unauthorized people, with some resulting in terror attacks. These security breaches were attributed to stolen identity cases, where staff or student identity cards were stolen and used by criminals to access the institutions. These unauthorized accesses have resulted in losses to the institutions, including reputational damages. The findings indicate that security breaches are a major problem in institutions of higher learning in Kenya. Consequently, access control would be beneficial if employed to curb security breaches. We suggest the use of facial recognition technology, given its uniqueness in identifying users and its non-repudiation capabilities.Keywords: facial recognition, access control, technology, learning
Procedia PDF Downloads 12516769 Matching on Bipartite Graphs with Applications to School Course Registration Systems
Authors: Zhihan Li
Abstract:
Nowadays, most universities use the course enrollment system considering students’ registration orders. However, the students’ preference level to certain courses is also one important factor to consider. In this research, the possibility of applying a preference-first system has been discussed and analyzed compared to the order-first system. A bipartite graph is applied to resemble the relationship between students and courses they tend to register. With the graph set up, we apply Ford-Fulkerson (F.F.) Algorithm to maximize parings between two sets of nodes, in our case, students and courses. Two models are proposed in this paper: the one considered students’ order first, and the one considered students’ preference first. By comparing and contrasting the two models, we highlight the usability of models which potentially leads to better designs for school course registration systems.Keywords: bipartite graph, Ford-Fulkerson (F.F.) algorithm, graph theory, maximum matching
Procedia PDF Downloads 11116768 The Use of Ontology Framework for Automation Digital Forensics Investigation
Authors: Ahmad Luthfi
Abstract:
One of the main goals of a computer forensic analyst is to determine the cause and effect of the acquisition of a digital evidence in order to obtain relevant information on the case is being handled. In order to get fast and accurate results, this paper will discuss the approach known as ontology framework. This model uses a structured hierarchy of layers that create connectivity between the variant and searching investigation of activity that a computer forensic analysis activities can be carried out automatically. There are two main layers are used, namely analysis tools and operating system. By using the concept of ontology, the second layer is automatically designed to help investigator to perform the acquisition of digital evidence. The methodology of automation approach of this research is by utilizing forward chaining where the system will perform a search against investigative steps and atomically structured in accordance with the rules of the ontology.Keywords: ontology, framework, automation, forensics
Procedia PDF Downloads 34216767 The Role of Muslim Scholars in Promoting Islamic Education in Katsina State, Nigeria
Authors: Abdulbasit Musa Ahmad Karkarku
Abstract:
Knowledge is the best asset you can leave for your child, especially the knowledge of Islam because it facilitates success in this life and the next. This made it necessary for every Muslim male and female to acquire Islamic education. The objective of this research is to highlight the role played by Muslim scholars in promoting Islamic education in Katsina State, Nigeria. There are so many problems facing Muslim scholars in the area of study; some of these problems include a lack of government support for Muslim scholars, a lack of community support, and a lack of financial support from wealthy individuals and philanthropists. In this research, two methods were used concurrently, i.e., library and interview methods. In the library method, the researcher consulted books and other academic works. In the course of this research, parents and religious leaders were interviewed in order to collect needed data information from them. The major findings of this research have shown that the Muslim scholars in area of study have contributed tremendously toward the development of Islamic education. Also, Muslim scholars played a vital role in the promotion of Islamic education in the area of study and beyond. In view of the above, some suggestions were highlighted with the view toward solving the associated problems; the government at every level should come to the aid of these Muslim scholars in order to provide them with basic amenities. The Philanthropists and wealthy individuals should help the Muslim scholars by giving them financial assistance. Also, communities have a vital role to play in order to improve the condition of Muslim scholars by giving them more donations.Keywords: education, Islamic, Muslim, scholars
Procedia PDF Downloads 12816766 The Problem of Suffering: Job, The Servant and Prophet of God
Authors: Barbara Pemberton
Abstract:
Now that people of all faiths are experiencing suffering due to many global issues, shared narratives may provide common ground in which true understanding of each other may take root. This paper will consider the all too common problem of suffering and address how adherents of the three great monotheistic religions seek understanding and the appropriate believer’s response from the same story found within their respective sacred texts. Most scholars from each of these three traditions—Judaism, Christianity, and Islam— consider the writings of the Tanakh/Old Testament to at least contain divine revelation. While they may not agree on the extent of the revelation or the method of its delivery, they do share stories as well as a common desire to glean God’s message for God’s people from the pages of the text. One such shared story is that of Job, the servant of Yahweh--called Ayyub, the prophet of Allah, in the Qur’an. Job is described as a pious, righteous man who loses everything—family, possessions, and health—when his faith is tested. Three friends come to console him. Through it, all Job remains faithful to his God who rewards him by restoring all that was lost. All three hermeneutic communities consider Job to be an archetype of human response to suffering, regarding Job’s response to his situation as exemplary. The story of Job addresses more than the distribution of the evil problem. At stake in the story is Job’s very relationship to his God. Some exegetes believe that Job was adapted into the Jewish milieu by a gifted redactor who used the original ancient tale as the “frame” for the biblical account (chapters 1, 2, and 4:7-17) and then enlarged the story with the complex center section of poetic dialogues creating a complex work with numerous possible interpretations. Within the poetic center, Job goes so far as to question God, a response to which Jews relate, finding strength in dialogue—even in wrestling with God. Muslims only embrace the Job of the biblical narrative frame, as further identified through the Qur’an and the prophetic traditions, considering the center section an errant human addition not representative of a true prophet of Islam. The Qur’anic injunction against questioning God also renders the center theologically suspect. Christians also draw various responses from the story of Job. While many believers may agree with the Islamic perspective of God’s ultimate sovereignty, others would join their Jewish neighbors in questioning God, not anticipating answers but rather an awareness of his presence—peace and hope becoming a reality experienced through the indwelling presence of God’s Holy Spirit. Related questions are as endless as the possible responses. This paper will consider a few of the many Jewish, Christian, and Islamic insights from the ancient story, in hopes adherents within each tradition will use it to better understand the other faiths’ approach to suffering.Keywords: suffering, Job, Qur'an, tanakh
Procedia PDF Downloads 18616765 Impact of an Onboard Fire for the Evacuation of a Rolling Stock
Authors: Guillaume Craveur
Abstract:
This study highlights the impact of an onboard fire for the evacuation of a rolling stock. Two fires models are achieved. The first one is a zone model realized with the CFAST software. Then, this fire is imported in a building EXODUS model in order to determine the evacuation time with effects of fire effluents (temperature, smoke opacity, smoke toxicity) on passengers. The second fire is achieved with Fire Dynamics Simulator software. The fire defined is directly imported in the FDS+Evac model which will permit to determine the evacuation time and effects of fire effluents on passengers. These effects will be compared with tenability criteria defined in some standards in order to see if the situation is acceptable. Different power of fire will be underlined to see from what power source the hazard become unacceptable.Keywords: fire safety engineering, numerical tools, rolling stock, evacuation
Procedia PDF Downloads 20116764 Apatite-Forming Ability of Doped-Ceria Coatings for Orthopedic Implants
Authors: Ayda Khosravanihaghighi, Pramod Koshy, Bill Walsh, Vedran Lovric, Charles Christopher Sorrell
Abstract:
There is an increasing demand for orthopedic implants owing to the increasing numbers of the aging population. Titanium alloy (Ti6Al4V) is a common material used for orthopedic implants owing to its advantageous properties in terms of good corrosion resistance, minimal elastic modulus mismatch with bone, bio-inertness, and high mechanical strength. However, it is important to improve the bioactivity and osseointegration of the titanium alloy and this can be achieved by coating the implant surface with suitable ceramic materials. In the present work, pure and doped-ceria (CeO₂) coatings were deposited by spin coating on the titanium alloy surface in order to enhance the biological interactions between the surface of the implant and the surrounding tissue. In order to examine the bone-binding ability of an implant, simulated body fluid (SBF) tests were conducted in order to assess the capability of apatite layer formation on the surface and thus predict in vivo bone bioactivity. Characterization was done using scanning electron microscopy (SEM) and X-ray diffraction (XRD) analyses to determine the extent of apatite formation. Preliminary tests showed that the CeO₂ coatings were biocompatible and that the extent of apatite formation and its characteristics can be enhanced by doping with suitable metal ions.Keywords: apatite layer, biocompatibility, ceria, orthopaedic implant, SBF, spin coater, Ti-implant
Procedia PDF Downloads 161