Search results for: protection plan settings
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5371

Search results for: protection plan settings

2611 Risk-Based Institutional Evaluation of Trans Sumatera Toll Road Infrastructure Development to Improve Time Performance

Authors: Muhammad Ridho Fakhrin, Leni Sagita Riantini, Yusuf Latief

Abstract:

Based on the 2015-2019 RPJMN data, the realization of toll road infrastructure development in Indonesia experienced a delay of 49% or 904 km of the total plan. One of the major causes of delays in development is caused by institutional factors. The case study taken in this research is the construction of the Trans Sumatra Toll Road (JTTS). The purpose of this research is to identify the institutional forms, functions, roles, duties, and responsibilities of each stakeholder and the risks that occur in the Trans Sumatra Toll Road Infrastructure Development. Risk analysis is implemented on functions, roles, duties, responsibilities of each existing stakeholder and is carried out at the Funding Stage, Technical Planning Stage, and Construction Implementation Stage in JTTS. This research is conducted by collecting data through a questionnaire survey, then processed using statistical methods, such as homogeneity, data adequacy, validity, and reliability test, continued with risk assessment based on a risk matrix. The results of this study are the evaluation and development of institutional functions in risk-based JTTS development can improve time performance and minimize delays in the construction process.

Keywords: institutional, risk management, time performance, toll road

Procedia PDF Downloads 163
2610 Perceptions of Research Staff on the Implementation of Each-B Study: A Randomised Controlled Trial

Authors: Laila Khawaja

Abstract:

In recent years, an increasing emphasis has been placed on measuring program implementation, in part because of the great variability in how complex interventions are delivered in real-life settings. There is an increased awareness that while conducting process evaluations, one should aim to identify and understand the complexities of intervention if they are to be used for future intervention development or the strategies needed to implement the same intervention in a different setting. Complex interventions are public health interventions that are not drugs or surgical procedures but have many potential active aspects of intervention. In this paper, process evaluations are aligned with MRC guidelines to identify contextual factors related to outcomes to assess the quality of implementation. This paper briefly discusses the perceptions of research team on the implementation of the intervention of ‘Engaging Adolescents in Changing Behaviour’ (EACH-B), a school-based complex intervention study aiming to improve diet and physical activity among adolescents aged 12-13 years. Through qualitative interviews and focus groups with 10 staff members, we aimed to understand their experiences and reflections on implementing the EACH-B trial delivered in 49 Schools around Hampshire, England. Data were uploaded into NVivo, and analysis was conducted using thematic analysis. The investigation revealed two overarching themes: (a) how the communication patterns with teachers were impacted during the delivery of implementation and (b) what were the team’s strategies to keep logistics aligned with the research process that impacted the overall implementation of the trial. The paper informs adaptation strategies used by the research team to establish and maintain effective communication with the teachers as well as the thoughtfulness of the team’s logistic strategy for the successful delivery of the trial.

Keywords: complex interventions, process evaluation, adaptation strategies, randomised controlled trial

Procedia PDF Downloads 67
2609 ‘The Guilt Complex’: Assessing the Guilt of Youth Returning From Terrorist Groups in the Narratives of Justice Presentation on the Methodological Opportunities and Concerns in Operational Research

Authors: Arpita Mitra

Abstract:

The research explores the concept of ‘guilt’ as understood in relation to children and young individuals associated with terrorist groups who are exiting these groups and returning to civilian lives (‘young returnees’). The study explores young returnees’ guilt – in its psychological, legal, and sociological manifestations and how it contributes to experiences of reintegration and justice administration. Streamlining it further, the research question on assessing guilt engages with young adults – between 18 and 30 years – who were part of a terrorist organization during their formative years and have returned to civilian life. Overall, the findings of the said research are intended to contribute first-hand operational research to criminological literature as well as transitional justice mechanisms with regard to narratives on truth, justice, reparations and institutional reform/guarantees of non-recurrence. Particularly for this paper, the focus of the paper shall be on one aspect of this research, that is, on the added value of conducting operational research and the methodological challenges encountered during this process with regard to informed consent, data protection, mental health and security considerations for the respondents and researcher.

Keywords: terrorism, reintegration, young returnees, criminology

Procedia PDF Downloads 59
2608 Identifying Lead Poisoning Risk Factors among Non-Pregnant Adults in New York City through Motivational Interviewing Techniques

Authors: Nevila Bardhi, Joanna Magda, Kolapo Alex-Oni, Slavenka Sedlar, Paromita Hore

Abstract:

The New York City Department of Health and Mental Hygiene (NYC DOHMH) receives blood lead test results for NYC residents and conducts lead poisoning case investigations for individuals with elevated blood lead levels exposed to lead occupationally and non-occupationally. To (1) improve participant engagement, (2) aid the identification of potential lead sources, and (3) better tailor recommendations to reduce lead exposure, Motivational Interviewing (MI) techniques were incorporated during risk assessment interviews of non-pregnant adults by DOHMH’s Adult Lead Poisoning Prevention (ALP) Program. MI is an evidence-based counselling method used in clinical settings that have been effective in promoting behavior change by resolving ambivalence and enhancing motivation in treating both physiological and psychological health conditions. The incorporation of MI techniques in the ALP risk assessment interview was effective in improving the identification of lead sources for non-pregnant adult cases, thus, allowing for the opportunity to better tailor lead poisoning prevention recommendations. The embedding of MI cues in the ALP risk assessment interview also significantly increased engagement in the interview process, resulting in approximately 50 more interviews conducted per year and a decrease in interview refusals during case investigations. Additionally, the pre-MI interview completion rate was 57%, while the post-MI Interview completion rate was 68%. We recommend MI techniques to be used by other lead poisoning prevention programs during lead poisoning investigations in similar diverse populations.

Keywords: lead poisoning prevention, motivational interviewing, behavior change, lead poisoning risk factors, self-efficacy

Procedia PDF Downloads 89
2607 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography

Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou

Abstract:

Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.

Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol

Procedia PDF Downloads 271
2606 Legal Regulation and Critical Analysis for an Effectively Treatment of Pharmaceutical Waste

Authors: Merita Dauti, Edita Alili-Idrizi, Sihana Ahmeti –Lika, Ledjan Malaj

Abstract:

The extermination and proper disposal of pharmaceutical wastes from expired and unused medications remains a disputable issue due to their specific nature and characteristics. Even though the hazards from these wastes are already well known in terms of environment and human health, people still treat them as usual wastes. At a national level, in many countries the management of pharmaceutical and medical wastes has been one of the main objectives in order to protect people’s health and the environment. Even though many legal regulations exist in this respect, there has not been a single law that would clearly explain the procedures of returning medicines, ways of selection, treatment and extermination of pharmaceutical wastes. This paper aims at analyzing the practices of pharmaceutical waste management and treatment in some European countries as well as a review of the legislation and official guidelines in managing these kinds of wastes and protecting the environment and human health. A suitable treatment and management of expired medications and other similar wastes would be in the interest of public health in the first place, as well as in the interest of healthcare institutions and other bodies engaged in environment protection.

Keywords: pharmaceutical waste, legal regulation, proper disposal, environment pollution

Procedia PDF Downloads 333
2605 Chemicals to Remove and Prevent Biofilm

Authors: Cynthia K. Burzell

Abstract:

Aequor's Founder, a Marine and Medical Microbiologist, discovered novel, non-toxic chemicals in the ocean that uniquely remove biofilm in minutes and prevent its formation for days. These chemicals and over 70 synthesized analogs that Aequor developed can replace thousands of toxic biocides used in consumer and industrial products and, as new drug candidates, kill biofilm-forming bacteria and fungi Superbugs -the antimicrobial-resistant (AMR) pathogens for which there is no cure. Cynthia Burzell, PhD., is a Marine and Medical Microbiologist studying natural mechanisms that inhibit biofilm formation on surfaces in contact with water. In 2002, she discovered a new genus and several new species of marine microbes that produce small molecules that remove biofilm in minutes and prevent its formation for days. The molecules include new antimicrobials that can replace thousands of toxic biocides used in consumer and industrial products and can be developed into new drug candidates to kill the biofilm-forming bacteria and fungi -- including the antimicrobial-resistant (AMR) Superbugs for which there is no cure. Today, Aequor has over 70 chemicals that are divided into categories: (1) Novel natural chemicals. Lonza validated that the primary natural chemical removed biofilm in minutes and stated: "Nothing else known can do this at non-toxic doses." (2) Specialty chemicals. 25 of these structural analogs are already approved under the U.S. Environmental Protection Agency (EPA)'s Toxic Substances Control Act, certified as "green" and available for immediate sale. These have been validated for the following agro-industrial verticals: (a) Surface cleaners: The U.S. Department of Agriculture validated that low concentrations of Aequor's formulations provide deep cleaning of inert, nano and organic surfaces and materials; (b) Water treatments: NASA validated that one dose of Aequor's treatment in the International Space Station's water reuse/recycling system lasted 15 months without replenishment. DOE validated that our treatments lower energy consumption by over 10% in buildings and industrial processes. Future validations include pilot projects with the EPA to test efficacy in hospital plumbing systems. (c) Algae cultivation and yeast fermentation: The U.S. Department of Energy (DOE) validated that Aequor's treatment boosted biomass of renewable feedstocks by 40% in half the time -- increasing the profitability of biofuels and biobased co-products. DOE also validated increased yields and crop protection of algae under cultivation in open ponds. A private oil and gas company validated decontamination of oilfield water. (3) New structural analogs. These kill Gram-negative and Gram-positive bacteria and fungi alone, in combinations with each other, and in combination with low doses of existing, ineffective antibiotics (including Penicillin), "potentiating" them to kill AMR pathogens at doses too low to trigger resistance. Both the U.S. National Institutes for Health (NIH) and Department of Defense (DOD) has executed contracts with Aequor to provide the pre-clinical trials needed for these new drug candidates to enter the regulatory approval pipelines. Aequor seeks partners/licensees to commercialize its specialty chemicals and support to evaluate the optimal methods to scale-up of several new structural analogs via activity-guided fractionation and/or biosynthesis in order to initiate the NIH and DOD pre-clinical trials.

Keywords: biofilm, potentiation, prevention, removal

Procedia PDF Downloads 99
2604 Ranking of Performance Measures of GSCM towards Sustainability: Using Analytic Hierarchy Process

Authors: Dixit Garg, S. Luthra, A. Haleem

Abstract:

During recent years, the natural environment has become a challenging topic that business organizations must consider due to the economic and ecological impacts and increasing awareness of environment protection among society. Organizations are trying to achieve the goals of improvement in environment, low cost, high quality, flexibility and more customer satisfaction. Performance measurement frameworks are very useful to monitor the performance of any organization. The basic goal of this paper is to identify performance measures and ranking of these performance measures of GSCM performance measurement towards sustainability framework. Five perspectives (Environment, Economic, Social, Operational and Cost performances) and nineteen performance measures of GSCM performance towards sustainability have been have been identified from extensive literature review. Analytical Hierarchy Process (AHP) technique has been utilized for ranking of these performance perspectives and measures. All pair comparisons in AHP have been made on the basis on the experts’ opinions (selected from academia and industry). Ranking of these performance perspectives and measures will help to understand the importance of environmental, economic, social, operational performances, and cost performances in the supply chain.

Keywords: analytical hierarchy process, green supply chain management, performance measures, sustainability

Procedia PDF Downloads 519
2603 Unlocking the Power of Social Media for Tourism Marketing: How Travel Bloggers Shape Destination Trust, Travel Intention with the Moderating Role of Trustworthiness on Social Media Posts

Authors: Saad Saif

Abstract:

Tourism promotion in the digital age is significantly influenced by social media, particularly in developing travel markets such as Pakistan. This study examines how travel bloggers use social media to inspire people to plan journeys and increase trust in destinations. It examines how trustworthiness works as a moderator to enhance the legitimacy of social media posts. This study aims to comprehend the dynamics of social media's influence on the travel and tourism industry. This study investigates the influence of travel bloggers' content, with a focus on tone (positive/negative) and emotional intensity (strong/weak), on prospective Pakistani travelers' travel preferences and levels of trust toward a particular location. The study used an experimental design to validate its hypotheses. The results indicate that the emotive content and tone of bloggers influence travel intentions and that destination trust mediates this relationship. It is interesting to observe that variations in the emotional intensity of positive and negative ratings are not always accompanied by changes in destination trust and travel intent. In addition, the influence of a blogger's review tone on travel intention and destination trust is moderated by the credibility of online reviews, whereas the influence of emotional intensity on these outcomes is unaffected by review credibility.

Keywords: tourism marketing, destination trust, travel intention, trustworthiness

Procedia PDF Downloads 72
2602 Assessment of ASEI-PDSI Method on Students’ Attitude and Achievement in Junior Secondary Schools Mathematics in FCT-Abuja

Authors: Amenaghawon Clement Osemwinyen

Abstract:

The Activity, Student-centred, Experiment, Improvisation - Plan, Do, See, Improve (ASEI-PDSI) method championed by the Strengthening Mathematics And Science Education (SMASE) - Nigeria Project is an attempt to improve the quality of mathematics, which has consistently declined over the years in both public primary and secondary schools across the country. The study thus assessed the ASEI-PDSI method on students’ attitudes and achievement in junior secondary schools (JSS) mathematics in FCT-Abuja. A survey research design was adopted, and 100 mathematics teachers using a stratified random sampling method were used for the study. The data were collected using structured questionnaires and analyzed using descriptive statistics. The findings showed that the ASEI-PDSI method had significantly improved the attitudes of students toward mathematics. The study also revealed that the ASEI-PDSI method significantly influenced junior secondary school (JSS) students’ mathematics achievement. Amongst the recommendations were that teachers should be encouraged to adopt the ASEI-PDSI method in teaching and learning mathematics in order to create a mathematically stimulating classroom environment which could advertently influence junior secondary school (JSS) students’ attitude and academic performance in mathematics. Also, regular in-service training programs should be organized by stakeholders (government and other interest groups) so as to improve the teaching strategies of teachers, mostly as they affect the ASEI-PDSI method.

Keywords: achievement, ASEI-PDSI method, attitude, mathematics, SMASE

Procedia PDF Downloads 112
2601 Microbes in Aquaculture: New Trends and Application in Freshwater Fish Culture

Authors: Muhammad Younis Laghari

Abstract:

Microbial communities play the most important role in aquatic ecosystems. These microbes have a great role in fish growth and aquaculture production. Unfortunately, the farmers are unaware of these useful creatures. Nowadays, the trend of fish farming is developed to re-circulatory aquaculture system (RAS) to increase production and reduce the investment/management cost to increase the profit. However, sometimes, it has been observed that even the growth of fish is decreased in RAS without apparent changes in water quality. There is a great importance of microorganisms in aquaculture, where they occur naturally. However, they can be added artificially by applying different roles. Even these microbes play an important role in the degradation of organic matter and recycling nutrients, along with nutritional support to fish. Even some microorganisms may protect fish and larvae against diseases. But if not managed/utilized properly, they may cause to infect or kill the fish and their larvae. However, manipulating the microbes and monitoring them in aquaculture systems hold great potential to assess and improve the water quality as well as to control the development of microbial infections. While there is an utmost need for research to determine the microbiomes of healthy aquaculture systems, we also need to develop authentic methods for the successful manipulation of microbes as well as engineer these microbiomes. Hence, we should develop a plan to utilize and get full advantage from these microbial interactions for the successful management of aquaculture through advanced research and technology.

Keywords: aquaculture, ecology system, degradation, microbes, nutrient recycling, water quality

Procedia PDF Downloads 82
2600 Corporate Cautionary Statement: A Genre of Professional Communication

Authors: Chie Urawa

Abstract:

Cautionary statements or disclaimers in corporate annual reports need to be carefully designed because clear cautionary statements may protect a company in the case of legal disputes and may undermine positive impressions. This study compares the language of cautionary statements using two corpora, Sony’s cautionary statement corpus (S-corpus) and Panasonic’s cautionary statement corpus (P-corpus), illustrating the differences and similarities in relation to the use of meaningful cautionary statements and critically analyzing why practitioners use the way. The findings describe the distinct differences between the two companies in the presentation of the risk factors and the way how they make the statements. The word ability is used more for legal protection in S-corpus whereas the word possibility is used more to convey a better impression in P-corpus. The main similarities are identified in the use of lexical words and pronouns, and almost the same wordings for eight years. The findings show how they make the statements unique to the company in the presentation of risk factors, and the characteristics of specific genre of professional communication. Important implications of this study are that more comprehensive approach can be applied in other contexts, and be used by companies to reflect upon their cautionary statements.

Keywords: cautionary statements, corporate annual reports, corpus, risk factors

Procedia PDF Downloads 171
2599 Free Will and Compatibilism in Decision Theory: A Solution to Newcomb’s Paradox

Authors: Sally Heyeon Hwang

Abstract:

Within decision theory, there are normative principles that dictate how one should act in addition to empirical theories of actual behavior. As a normative guide to one’s actual behavior, evidential or causal decision-theoretic equations allow one to identify outcomes with maximal utility values. The choice that each person makes, however, will, of course, differ according to varying assignments of weight and probability values. Regarding these different choices, it remains a subject of considerable philosophical controversy whether individual subjects have the capacity to exercise free will with respect to the assignment of probabilities, or whether instead the assignment is in some way constrained. A version of this question is given a precise form in Richard Jeffrey’s assumption that free will is necessary for Newcomb’s paradox to count as a decision problem. This paper will argue, against Jeffrey, that decision theory does not require the assumption of libertarian freedom. One of the hallmarks of decision-making is its application across a wide variety of contexts; the implications of a background assumption of free will is similarly varied. One constant across the contexts of decision is that there are always at least two levels of choice for a given agent, depending on the degree of prior constraint. Within the context of Newcomb’s problem, when the predictor is attempting to guess the choice the agent will make, he or she is analyzing the determined aspects of the agent such as past characteristics, experiences, and knowledge. On the other hand, as David Lewis’ backtracking argument concerning the relationship between past and present events brings to light, there are similarly varied ways in which the past can actually be dependent on the present. One implication of this argument is that even in deterministic settings, an agent can have more free will than it may seem. This paper will thus argue against the view that a stable background assumption of free will or determinism in decision theory is necessary, arguing instead for a compatibilist decision theory yielding a novel treatment of Newcomb’s problem.

Keywords: decision theory, compatibilism, free will, Newcomb’s problem

Procedia PDF Downloads 321
2598 Public Interest Law for Gender Equality: An Exploratory Study of the 'Single Woman Reproductive Rights' Movement in China

Authors: Xiaofei Zhu

Abstract:

As a 'weapon of the weak', the Public Interest Law can provide a better perspective for the cause of gender justice. In recent years, the legal practice of single female reproductive rights in China has already possessed the elements of public interest law activities and the possibility of public interest law operation. Through the general operating procedures of public interest law practice, that is, from the choice of subject, the planning of the case, the operation of the strategy and the later development, the paper analyzes the gains and losses of the legal practice of single female reproductive rights in China, and puts forward some ideas on its possible operation path. On this basis, it is believed that the cause of women's rights should be carried out under the broad human rights perspective; it is necessary to realize the particularity of different types of women's rights protection practice; the practice of public interest law needs to accurately grasp the constituent elements of all aspects of the case, and strive to find the opportunities of institutional and social change; the practice of public welfare law of gender justice should be carried out from a long-term perspective.

Keywords: single women’s reproductive rights, public interest law, gender justice, legal strategies, legal change

Procedia PDF Downloads 139
2597 Evaluation of Geotechnical Parameters at Nubian Habitations in Kurkur Area, Aswan, Egypt

Authors: R. E. Fat-Helbary, A. A. Abdel-latief, M. S. Arfa, Alaa Mostafa

Abstract:

The Egyptian Government proposed a general plan, aiming at constructing new settlements for Nubian in south Aswan in different places around Nasser Lake, one of these settlements in Kurkur area. The Nubian habitations in Wadi Kurkur are located around 30 km southwest of Aswan City. This area are affecting by near distance earthquakes from Kalabsha faults system. The shallow seismic refraction technique was conducted at the study area, to evaluate the soil and rock material quality and geotechnical parameters, in addition to the detection of the subsurface ground model under the study area. The P and S-wave velocities were calculated. The surface layer has P-wave, velocity ranges from 900 m/sec to 1625 m/sec and S-wave velocity ranges from 650 m/sec to 1400 m/sec. On the other hand the bedrock has P-wave velocity ranges from 1300 m/sec to 1980 m/sec and S-wave velocity ranges from 1050 m/sec to1725 m/sec. Measuring Vp and Vs velocities together with bulk density are calculated and used to extract the mechanical properties and geotechnical parameters of the foundation material at the study area. Output of this study is very important for solving the problems, which associated with the construction of various civil engineering purposes, for land use planning and for earthquakes resistant structure design.

Keywords: shallow seismic refraction technique, Kurkur area, p and s-wave velocities, geotechnical parameters, bulk density, Kalabsha faults

Procedia PDF Downloads 427
2596 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques

Authors: John Onyima, Ikechukwu Ezepue

Abstract:

Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.

Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection

Procedia PDF Downloads 307
2595 Thermal Efficiency Analysis and Optimal of Feed Water Heater for Mae Moh Thermal Power Plant

Authors: Khomkrit Mongkhuntod, Chatchawal Chaichana, Atipoang Nuntaphan

Abstract:

Feed Water Heater is the important equipment for thermal power plant. The heating temperature from feed heating process is an impact to power plant efficiency or heat rate. Normally, the degradation of feed water heater that operated for a long time is effect to decrease plant efficiency or increase plant heat rate. For Mae Moh power plant, each unit operated more than 20 years. The degradation of the main equipment is effect of planting efficiency or heat rate. From the efficiency and heat rate analysis, Mae Moh power plant operated in high heat rate more than the commissioning period. Some of the equipment were replaced for improving plant efficiency and plant heat rates such as HP turbine and LP turbine that the result is increased plant efficiency by 5% and decrease plant heat rate by 1%. For the target of power generation plan that Mae Moh power plant must be operated more than 10 years. These work is focus on thermal efficiency analysis of feed water heater to compare with the commissioning data for find the way to improve the feed water heater efficiency that may effect to increase plant efficiency or decrease plant heat rate by use heat balance model simulation and economic value add (EVA) method to study the investment for replacing the new feed water heater and analyze how this project can stay above the break-even point to make the project decision.

Keywords: feed water heater, power plant efficiency, plant heat rate, thermal efficiency analysis

Procedia PDF Downloads 369
2594 Characterization of Vegetable Wastes and Its Potential Use for Hydrogen and Methane Production via Dark Anaerobic Fermentation

Authors: Ajay Dwivedi, M. Suresh Kumar, A. N. Vaidya

Abstract:

The problem of fruit and vegetable waste management is a grave one and with ever increasing need to feed the exponentially growing population, more and more solid waste in the form of fruit and vegetables waste are generated and its management has become one of the key issues in protection of environment. Energy generation from fruit and vegetables waste by dark anaerobic fermentation is a recent an interesting avenue effective management of solid waste as well as for generating free and cheap energy. In the present study 17 vegetables were characterized for their physical as well as chemical properties, these characteristics were used to determine the hydrogen and methane potentials of vegetable from various models, and also lab scale batch experiments were performed to determine their actual hydrogen and methane production capacity. Lab scale batch experiments proved that vegetable waste can be used as effective substrate for bio hydrogen and methane production, however the expected yield of bio hydrogen and methane was much lower than predicted by models, this was due to the fact that other vital experimental parameters such as pH, total solids content, food to microorganism ratio was not optimized.

Keywords: vegetable waste, physico-chemical characteristics, hydrogen, methane

Procedia PDF Downloads 428
2593 A Retrospective Review of HIV-Infected Pregnant Females with Respect to Gestational Age and Mode of Delivery: Trends over a Decade

Authors: Qurat-ul-Ain, Humaira Mehmood

Abstract:

Background: HIV infection (a global pandemic) in pregnant women has turn out to be an emerging aspect of public health because of its role in the spread of HIV infection, predominantly among children. Aim: The aim was to analyze the trends of diagnosis with respect to gestational age and an overview of the mode of delivery over ten years. Methods: A retrospective data collection from clinical records of diagnosed HIV infected pregnant females attended at HIV antenatal clinic (special clinic), at Pakistan Institute of Medical Sciences, Islamabad, for various complaints during the period of 10 years from February 2007 to December 2016 was done. Results: A total of 113 pregnancies were reported with HIV infection in 10 years. Cases diagnosed at the 1st trimester (1-12 weeks) of pregnancy were (50.4%, 57/113), at the 2nd trimester (13-26 weeks) were (24.8%, 28/113), at the 3rd trimester (27-40+ weeks) were (24.7%, 28/113). Most deliveries were by caesarean section (53.1%, 60/113), elective caesarean sections were (58.3%, 35/60) and emergency caesarean sections were (41.6%,25/60). Vaginal deliveries were (26.5%, 30/113). Reported miscarriages were (17.7%, 20/113). Conclusion: At 1st trimester, 50% of the females were diagnosed with HIV infection, and 50% remained undiagnosed at their 1st trimester. Routine antenatal HIV testing throughout the country is vastly needed for timely diagnoses and prompt treatment(antiretroviral therapy), to suppress the virus, to reduce the risk of spread of HIV infection, to plan elective caesarean section delivery and to prevent mother-to-child transmission.

Keywords: gestational age, HIV infection, mode of delivery, pregnancy

Procedia PDF Downloads 124
2592 Generalized Additive Model for Estimating Propensity Score

Authors: Tahmidul Islam

Abstract:

Propensity Score Matching (PSM) technique has been widely used for estimating causal effect of treatment in observational studies. One major step of implementing PSM is estimating the propensity score (PS). Logistic regression model with additive linear terms of covariates is most used technique in many studies. Logistics regression model is also used with cubic splines for retaining flexibility in the model. However, choosing the functional form of the logistic regression model has been a question since the effectiveness of PSM depends on how accurately the PS been estimated. In many situations, the linearity assumption of linear logistic regression may not hold and non-linear relation between the logit and the covariates may be appropriate. One can estimate PS using machine learning techniques such as random forest, neural network etc for more accuracy in non-linear situation. In this study, an attempt has been made to compare the efficacy of Generalized Additive Model (GAM) in various linear and non-linear settings and compare its performance with usual logistic regression. GAM is a non-parametric technique where functional form of the covariates can be unspecified and a flexible regression model can be fitted. In this study various simple and complex models have been considered for treatment under several situations (small/large sample, low/high number of treatment units) and examined which method leads to more covariate balance in the matched dataset. It is found that logistic regression model is impressively robust against inclusion quadratic and interaction terms and reduces mean difference in treatment and control set equally efficiently as GAM does. GAM provided no significantly better covariate balance than logistic regression in both simple and complex models. The analysis also suggests that larger proportion of controls than treatment units leads to better balance for both of the methods.

Keywords: accuracy, covariate balances, generalized additive model, logistic regression, non-linearity, propensity score matching

Procedia PDF Downloads 367
2591 Tectonics of Out-of-Sequence Thrusting in Higher Himalaya- Example from Jhakri-Chaura-Sarahan Region, Himachal Pradesh

Authors: Rajkumar Ghosh

Abstract:

The Out-of-Sequence Thrust (OOST) is a common phenomenon in collisional tectonic settings like the Himalayas. These OOSTs are activated in different locations at different time frames. These OOST are linked with the multiple Himalayan Thrusts. Apart from minimal documentation in geological mapping for OOST, there exists a lack of field data to establish OOST in the field. This work has considered three thrusts from NW Himalaya in Himachal Pradesh with published data from other sources, allowing a re-examination for correlation of OOST. For the Sutlej section, the approach has been to do fieldwork and microstructural studies. The information related to the cross-cut signature of S/C- and relative time relation could help to predict the nature of OOST. The activation timing, along with the basis of identification of OOST in Higher Himalayan, was documented in various literature. Compilation of the Grain Boundary Migration (GBM) associated temperature range (400–750 °C) was documented from microstructural studies along the Jhakri-Chaura section. No such significant temperature variation across thrusts was observed. Strain variation paths using S Ʌ C angle measurement were carried out along the Jeori-Wangtu transect to distinguish overprinting structures for OOSTs. Near the Chaura Thrust (CT), angular variation of S Ʌ C was documented, and it varies within a range of 15° - 28 °. Along the NH22 (National Highway, 22), all tectonic units of the orogen are exposed in NW Himalaya, INDIA. But there are inherent difficulties in finding field evidence of OOST, largely due to the lack of adequate surface morphology, including topography and drainage pattern.

Keywords: out-of-sequence thrust (OOST), main central thrust (MCT), south tibetan detachment system (STDS), jhakri thrust (JT), sarahan thrust (ST), chaura thrust (CT), higher himalaya (HH), greater himalayan crystalline (GHC)

Procedia PDF Downloads 84
2590 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity

Authors: Jean Rosemond Dora, Karol Nemoga

Abstract:

In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.

Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model

Procedia PDF Downloads 172
2589 Simulation Study of Multiple-Thick Gas Electron Multiplier-Based Microdosimeters for Fast Neutron Measurements

Authors: Amir Moslehi, Gholamreza Raisali

Abstract:

Microdosimetric detectors based on multiple-thick gas electron multiplier (multiple-THGEM) configurations are being used in various fields of radiation protection and dosimetry. In the present work, microdosimetric response of these detectors to fast neutrons has been investigated by Monte Carlo method. Three similar microdosimeters made of A-150 and rexolite as the wall materials are designed; the first based on single-THGEM, the second based on double-THGEM and the third is based on triple-THGEM. Sensitive volume of the three microdosimeters is a right cylinder of 5 mm height and diameter which is filled with the propane-based tissue-equivalent (TE) gas. The TE gas with 0.11 atm pressure at the room temperature simulates 1 µm of tissue. Lineal energy distributions for several neutron energies from 10 keV to 14 MeV including 241Am-Be neutrons are calculated by the Geant4 simulation toolkit. Also, mean quality factor and dose-equivalent value for any neutron energy has been determined by these distributions. Obtained data derived from the three microdosimeters are in agreement. Therefore, we conclude that the multiple-THGEM structures present similar microdosimetric responses to fast neutrons.

Keywords: fast neutrons, geant4, multiple-thick gas electron multiplier, microdosimeter

Procedia PDF Downloads 350
2588 The Effectiveness of the Counselling Module in Counseling Interventions for Low Performance Employees

Authors: Hazaila Hassan

Abstract:

This research aims and discusses about the effectiveness of the Psynnova i-Behaviour Modification Technique (iBMT) module towards the change in behaviour of low-performing employees. The purpose of the study is to examine the effectiveness of the Psynnova Module on changing behaviour through five factors among low-performing employees in the public sector. The five main factors/constructs were cognitive enhancement and rationality, emotional stability, attitude alignment and adjustment, social skills development and psycho-spirituality enhancement. In this research, 5 main constructs will be using to indicate behaviour changing performance of the employees after attending The Psynnova Program that using this Psynnova IBMT Module. The respondents are among those who have low scores in terms of annual performance through annual performance value reports and have gone through various stages before being required to attend Psynnova Program. Besides that, the research plan was also to critically examine and understand the change in behaviour among the low-performing employees through the five dimensions in the Psynnova Module. A total of 50 respondent will purposively sampled to be the respondents of this research. This study will use the Experimental Method to One Group Purposively Pre and Post Test using the Time Series Design. Experimental SPSS software version 22.0 will be used to analyse this data. Hopefully this research can see the changing of their behaviour in five factors as an indicator to the respondent after attending the Psynnova Programme. Findings from this study are also used to propose to assisting psychologist to see the changes that occurred to the respondents with the best framework of behaviour changing for them.

Keywords: five dimension of behaviour changing, among adult, low performance, modul effectiveness

Procedia PDF Downloads 171
2587 Values-based Physical Education in a Diverse South African Context

Authors: C. F. Jones Couto

Abstract:

The implementation of quality Physical Education (PE) inspires and instils lasting healthy behavioural patterns, hence have the potential as an educational tool to teach values in today’s society. The goal of PE should be to contribute to the acceptance of the infinite qualities of South Africa’s (RSA) diversity and to claim RSA’s diversity as a source of strength that forms a universal bond of a common set of values. There is a global change in the interaction of children with their environment; their lives are shaped by forces that do not necessarily assist them in learning and applying values. In most countries today, the responsibility for developing values is assigned to schools in formal teaching settings. Values-based education offers an investment in individual and societal improvement through attendance to a values framework. The aim of this qualitative research is to develop a PE programme aligned with the current South African curriculum, enriched with values of Olympism and Ubuntuism, and to present PE teacher training workshops (TTW). Participatory action research will be used as the basis of how data will be collected, analysed, and presented on an ongoing, cyclical basis. PE teachers from different schools in the Tshwane District of RSA will participate as they can best inform the research questions and enhance the understanding of the phenomenon under study. The outcomes of using PE as a tool to teach values can propose recommendations to the Department of Basic Education of RSA to improve and implement a quality PE curriculum that is applicable to practice and that will optimize the chances of meeting the South African National Curriculum Statement standards. A PE programme with the aim of holistic development, based on the values of Olympism and Ubuntuism, can strive to ensure that the values set out in RSA’s constitution are part of PE organization, planning, and teaching at each South African school.

Keywords: olympism, physical education, teacher training, ubuntuism, values-based education

Procedia PDF Downloads 105
2586 Disabling Barriers to Community Participation in Everyday Environments from the Perspective of People with Disabilities

Authors: Leah Samples

Abstract:

Barriers to participation persist for people with disabilities despite a long history of legislation designed to support equal opportunity for people with disabilities. Historically, the focus has been solely placed on structural barriers, but newer research highlights the importance of looking at social and informational barriers to participation. Collectively, these barriers prevent people with disabilities from fully engaging in community life and consequently from achieving full citizenship. Disability is crucial to understanding the meaning of citizenship. Drawing upon the influences of feminist, critical race and human rights theorists, citizenship can be defined as a set of rights and responsibilities that an individual has because they are a part of a community. However, when those rights are taken away or denied one’s citizenship is in question. Employing this definition of citizenship allows one to examine how barriers to citizenship present themselves in societies that are built on an ideal of a non-disabled person. To understand at a deeper level how this notion of citizenship manifests itself, this study seeks to unearth commonly experienced barriers to participation in the lives of visually-impaired adults in everyday environments. The purpose of this qualitative study is to explore commonly-experienced barriers to participation in the lives of visually impaired adults in leisure settings (e.g. restaurants, stores, etc.). Thirty adults with visual impairments participated in semi-structured interviews, as well as participant observations. The results suggest that barriers to participation are still pervasive in everyday environments and subsequently have an adverse effect on participation and belonging for people with visual impairments. This study highlights the importance of exploring and acknowledging the daily tensions that persons with disabilities face in their communities. A full exploration of these tensions is necessary in order to develop solutions and tools to create more just communities for everyone.

Keywords: barriers, citizenship, belonging, everyday environments

Procedia PDF Downloads 417
2585 An Analysis of Humanitarian Data Management of Polish Non-Governmental Organizations in Ukraine Since February 2022 and Its Relevance for Ukrainian Humanitarian Data Ecosystem

Authors: Renata Kurpiewska-Korbut

Abstract:

Making an assumption that the use and sharing of data generated in humanitarian action constitute a core function of humanitarian organizations, the paper analyzes the position of the largest Polish humanitarian non-governmental organizations in the humanitarian data ecosystem in Ukraine and their approach to non-personal and personal data management since February of 2022. Both expert interviews and document analysis of non-profit organizations providing a direct response in the Ukrainian crisis context, i.e., the Polish Humanitarian Action, Caritas, Polish Medical Mission, Polish Red Cross, and the Polish Center for International Aid and the applicability of theoretical perspective of contingency theory – with its central point that the context or specific set of conditions determining the way of behavior and the choice of methods of action – help to examine the significance of data complexity and adaptive approach to data management by relief organizations in the humanitarian supply chain network. The purpose of this study is to determine how the existence of well-established and accurate internal procedures and good practices of using and sharing data (including safeguards for sensitive data) by the surveyed organizations with comparable human and technological capabilities are implemented and adjusted to Ukrainian humanitarian settings and data infrastructure. The study also poses a fundamental question of whether this crisis experience will have a determining effect on their future performance. The obtained finding indicate that Polish humanitarian organizations in Ukraine, which have their own unique code of conduct and effective managerial data practices determined by contingencies, have limited influence on improving the situational awareness of other assistance providers in the data ecosystem despite their attempts to undertake interagency work in the area of data sharing.

Keywords: humanitarian data ecosystem, humanitarian data management, polish NGOs, Ukraine

Procedia PDF Downloads 92
2584 Analysis of Surface Hardness, Surface Roughness and near Surface Microstructure of AISI 4140 Steel Worked with Turn-Assisted Deep Cold Rolling Process

Authors: P. R. Prabhu, S. M. Kulkarni, S. S. Sharma, K. Jagannath, Achutha Kini U.

Abstract:

In the present study, response surface methodology has been used to optimize turn-assisted deep cold rolling process of AISI 4140 steel. A regression model is developed to predict surface hardness and surface roughness using response surface methodology and central composite design. In the development of predictive model, deep cold rolling force, ball diameter, initial roughness of the workpiece, and number of tool passes are considered as model variables. The rolling force and the ball diameter are the significant factors on the surface hardness and ball diameter and numbers of tool passes are found to be significant for surface roughness. The predicted surface hardness and surface roughness values and the subsequent verification experiments under the optimal operating conditions confirmed the validity of the predicted model. The absolute average error between the experimental and predicted values at the optimal combination of parameter settings for surface hardness and surface roughness is calculated as 0.16% and 1.58% respectively. Using the optimal processing parameters, the hardness is improved from 225 to 306 HV, which resulted in an increase in the near surface hardness by about 36% and the surface roughness is improved from 4.84µm to 0.252 µm, which resulted in decrease in the surface roughness by about 95%. The depth of compression is found to be more than 300µm from the microstructure analysis and this is in correlation with the results obtained from the microhardness measurements. Taylor Hobson Talysurf tester, micro Vickers hardness tester, optical microscopy and X-ray diffractometer are used to characterize the modified surface layer.

Keywords: hardness, response surface methodology, microstructure, central composite design, deep cold rolling, surface roughness

Procedia PDF Downloads 422
2583 Severity Index Level in Effectively Managing Medium Voltage Underground Power Cable

Authors: Mohd Azraei Pangah Pa'at, Mohd Ruzlin Mohd Mokhtar, Norhidayu Rameli, Tashia Marie Anthony, Huzainie Shafi Abd Halim

Abstract:

Partial Discharge (PD) diagnostic mapping testing is one of the main diagnostic testing techniques that are widely used in the field or onsite testing for underground power cable in medium voltage level. The existence of PD activities is an early indication of insulation weakness hence early detection of PD activities can be determined and provides an initial prediction on the condition of the cable. To effectively manage the results of PD Mapping test, it is important to have acceptable criteria to facilitate prioritization of mitigation action. Tenaga Nasional Berhad (TNB) through Distribution Network (DN) division have developed PD severity model name Severity Index (SI) for offline PD mapping test since 2007 based on onsite test experience. However, this severity index recommendation action had never been revised since its establishment. At presence, PD measurements data have been extensively increased, hence the severity level indication and the effectiveness of the recommendation actions can be analyzed and verified again. Based on the new revision, the recommended action to be taken will be able to reflect the actual defect condition. Hence, will be accurately prioritizing preventive action plan and minimizing maintenance expenditure.

Keywords: partial discharge, severity index, diagnostic testing, medium voltage, power cable

Procedia PDF Downloads 186
2582 Hyperspectral Mapping Methods for Differentiating Mangrove Species along Karachi Coast

Authors: Sher Muhammad, Mirza Muhammad Waqar

Abstract:

It is necessary to monitor and identify mangroves types and spatial extent near coastal areas because it plays an important role in coastal ecosystem and environmental protection. This research aims at identifying and mapping mangroves types along Karachi coast ranging from 24.79 to 24.85 degree in latitude and 66.91 to 66.97 degree in longitude using hyperspectral remote sensing data and techniques. Image acquired during February, 2012 through Hyperion sensor have been used for this research. Image preprocessing includes geometric and radiometric correction followed by Minimum Noise Fraction (MNF) and Pixel Purity Index (PPI). The output of MNF and PPI has been analyzed by visualizing it in n-dimensions for end-member extraction. Well-distributed clusters on the n-dimensional scatter plot have been selected with the region of interest (ROI) tool as end members. These end members have been used as an input for classification techniques applied to identify and map mangroves species including Spectral Angle Mapper (SAM), Spectral Feature Fitting (SFF), and Spectral Information Diversion (SID). Only two types of mangroves namely Avicennia Marina (white mangroves) and Avicennia Germinans (black mangroves) have been observed throughout the study area.

Keywords: mangrove, hyperspectral, hyperion, SAM, SFF, SID

Procedia PDF Downloads 362