Search results for: monitoring tool
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7616

Search results for: monitoring tool

4736 Study on Status of Child Labour in Metal Fabrication Industries of Kathmandu Valley

Authors: Bikas Chandra Bhattarai

Abstract:

Child labour is the serious issue all over the world. In Nepal, many children are working in different structured and unstructured sector. Metal fabrication is one of the sectors where many children are involved. The present study is carried out to focus on the overall socio-economic condition, psychological aspect, working environment condition and welfare of the child labour. Metal fabrication factories from Kirtipur, Chovar Area, Gongabu, Sitapaila and Sankhamul area of Kathmandu municipality were selected for the study. The structured questionnaire was prepared, and overall 55 children under age 16 were interviewed. Working in metal fabrication factory is risky job for children. The main reason behind child labour is poverty. The working environment in the metal fabrication factory was not found satisfactory. Children are exposed to various types of physical and chemical hazards. Factories are not paying proper attention to safety condition at the workplace. Large number of children is attracted towards smoking and drinking alcohol leading to unnecessary expense of their income. There should be the provision of regular health check up and insurance to the working children. Monitoring from the government level should be implemented for the betterment of working children.

Keywords: child labour, Kathmandu, Nepal, metal fabrication

Procedia PDF Downloads 312
4735 Assessment of Naturally Occurring Radionuclides of the Surface Water in Vaal River, South Africa

Authors: Kgantsi B. T., Ochwelwang A. R., Mathuthu M., Jegede O. A.

Abstract:

Anthropogenic activities near water bodies contribute to poor water quality, which degrades the condition of the biota and elevates the risk to human health. The Vaal River is essential in supplying Gauteng and neighboring regions of South Africa with portable water for a variety of consumers and industries. Consequently, it is necessary to monitor and assess the radioactive risk in relation to the river's water quality. This study used an inductive coupled plasma mass spectrometer (ICPMS) to analyze the radionuclide activity concentration in the Vaal River, South Africa. Along with thorium and potassium, the total uranium concentration was calculated using the isotopic content of uranium. The elemental concentration of ²³⁸U, ²³⁵U, ²³⁴U, ²³²Th, and 40K were translated into activity concentrations. To assess the water safety for all users and consumers, all values were compared to world average activity concentrations 35, 30, and 400 Bqkg⁻¹ for ²³⁸U, ²³⁴Th, and ⁴⁰K, respectively, according to the UNSCEAR report. The results will serve as a database for further monitoring and evaluation of the radionuclide from the river, taking cognisance of potential health hazards.

Keywords: Val Rivers, ICPMS, uranium, risks

Procedia PDF Downloads 150
4734 Kiddo: Design and Prototype of a Useable Mobile Application for Kids to Learn under Parental Control

Authors: Albandary Alamer, Noura Alaskar, Sana Bukhamseen, Jawaher Alkhamis, Enas Alghamdi, Almaha Almulhim, Hina Gull, Rachid Zagrouba, Madeeha Saqib

Abstract:

A good and healthy seed will always produce a nice fruit, whereas an infected seed will produce an infected fruit. The same concept applies to the children, and the healthier the environment in which the kids grow, the more likely they become valuable members of society. Kiddo project introduces us to a mobile application that focuses on enhancing the sense of responsibility from a young age and makes raising kids fun and easy. The application aims to enhance the communication between parents and their children and to enrich the good habits of the kid. Kiddo Application enables kids to share their accomplishments with their peers in an interactive environment full of enjoyment, followed by parental monitoring to handle what their kids are posting and friends following. Kiddo provides the kids' and parents’ society with a safe platform free of cyberbullying and inappropriate content with parents' fun engagement.

Keywords: kids social media, educational app, child-raising, parental control, cyberbullying, parent-child relationship, good habits

Procedia PDF Downloads 138
4733 The Roles of Local Administration Management to Promote the Culture Based On Philosophy of Sufficiency Economy

Authors: Sukanya Sripho

Abstract:

The purpose of this research was to study the role of local administration management to promote culture based on philosophy of sufficiency economy to many communities in Thailand. The philosophy was given to the Thai people by their King and become one of the important policies from the Thai government. A total of 375 local people in main district, Amnadcharoen province were selected by random sampling. A questionnaire was used as the tool for collecting data. Descriptive statistics in this research included percentage, mean, and multiple regression analysis. The findings revealed that the role of facilitator was utilized the most from the management in order to promote culture based on philosophy of sufficiency economy to many communities in Thailand.

Keywords: administration, management, philosophy of sufficiency economy, facilitator

Procedia PDF Downloads 378
4732 Multi-Agent Railway Control System: Requirements Definitions of Multi-Agent System Using the Behavioral Patterns Analysis (BPA) Approach

Authors: Assem I. El-Ansary

Abstract:

This paper illustrates the event-oriented Behavioral Pattern Analysis (BPA) modeling approach in developing an Multi-Agent Railway Control System (MARCS). The Event defined in BPA is a real-life conceptual entity that is unrelated to any implementation. The major contributions of this research are the Behavioral Pattern Analysis (BPA) modeling methodology, and the development of an interactive software tool (DECISION), which is based on a combination of the Analytic Hierarchy Process (AHP) and the ELECTRE Multi-Criteria Decision Making (MCDM) methods.

Keywords: analysis, multi-agent, railway control, modeling methodology, software modeling, event-oriented, behavioral pattern, use cases

Procedia PDF Downloads 530
4731 Critical Review of Oceanic and Geological Storage of Carbon Sequestration

Authors: Milad Nooshadi, Alessandro Manzardo

Abstract:

CO₂ emissions in the atmosphere continue to rise, mostly as a result of the combustion of fossil fuels. CO₂ injection into the oceans and geological formation as a process of physical carbon capture are two of the most promising emerging strategies for mitigating climate change and global warming. The purpose of this research is to evaluate the two mentioned methods of CO₂ sequestration and to assess information on previous and current advancements, limitations, and uncertainties associated with carbon sequestration in order to identify possible prospects for ensuring the timely implementation of the technology, such as determining how governments and companies can gain a better understanding of CO₂ storage in terms of which media have the most applicable capacity, which type of injection has the fewer environmental impact, and how much carbon sequestration and storage will cost. The behavior of several forms is characterized as a near field, a far field, and a see-floor in ocean storage, and three medias in geological formations as an oil and gas reservoir, a saline aquifer, and a coal bed. To determine the capacity of various forms of media, an analysis of some models and practical experiments are necessary. Additionally, as a major component of sequestration, the various injection methods into diverse media and their monitoring are associated with a variety of environmental impacts and financial consequences.

Keywords: carbon sequestration, ocean storage, geologic storage, carbon transportation

Procedia PDF Downloads 88
4730 The Effectiveness of National Fiscal Rules in the Asia-Pacific Countries

Authors: Chiung-Ju Huang, Yuan-Hong Ho

Abstract:

This study utilizes the International Monetary Fund (IMF) Fiscal Rules Dataset focusing on four specific fiscal rules such as expenditure rule, revenue rule, budget balance rule, and debt rule and five main characteristics of each fiscal rule those are monitoring, enforcement, coverage, legal basis, and escape clause to construct the Fiscal Rule Index for nine countries in the Asia-Pacific region from 1996 to 2015. After constructing the fiscal rule index for each country, we utilize the Panel Generalized Method of Moments (Panel GMM) by using the constructed fiscal rule index to examine the effectiveness of fiscal rules in reducing procyclicality. Empirical results show that national fiscal rules have a significantly negative impact on procyclicality of government expenditure. Additionally, stricter fiscal rules combined with high government effectiveness are effective in reducing procyclicality of government expenditure. Results of this study indicate that for nine Asia-Pacific countries, policymakers’ use of fiscal rules and government effectiveness to reducing procyclicality of fiscal policy are effective.

Keywords: counter-cyclical policy, fiscal rules, government efficiency, procyclical policy

Procedia PDF Downloads 253
4729 Internet of Things, Edge and Cloud Computing in Rock Mechanical Investigation for Underground Surveys

Authors: Esmael Makarian, Ayub Elyasi, Fatemeh Saberi, Olusegun Stanley Tomomewo

Abstract:

Rock mechanical investigation is one of the most crucial activities in underground operations, especially in surveys related to hydrocarbon exploration and production, geothermal reservoirs, energy storage, mining, and geotechnics. There is a wide range of traditional methods for driving, collecting, and analyzing rock mechanics data. However, these approaches may not be suitable or work perfectly in some situations, such as fractured zones. Cutting-edge technologies have been provided to solve and optimize the mentioned issues. Internet of Things (IoT), Edge, and Cloud Computing technologies (ECt & CCt, respectively) are among the most widely used and new artificial intelligence methods employed for geomechanical studies. IoT devices act as sensors and cameras for real-time monitoring and mechanical-geological data collection of rocks, such as temperature, movement, pressure, or stress levels. Structural integrity, especially for cap rocks within hydrocarbon systems, and rock mass behavior assessment, to further activities such as enhanced oil recovery (EOR) and underground gas storage (UGS), or to improve safety risk management (SRM) and potential hazards identification (P.H.I), are other benefits from IoT technologies. EC techniques can process, aggregate, and analyze data immediately collected by IoT on a real-time scale, providing detailed insights into the behavior of rocks in various situations (e.g., stress, temperature, and pressure), establishing patterns quickly, and detecting trends. Therefore, this state-of-the-art and useful technology can adopt autonomous systems in rock mechanical surveys, such as drilling and production (in hydrocarbon wells) or excavation (in mining and geotechnics industries). Besides, ECt allows all rock-related operations to be controlled remotely and enables operators to apply changes or make adjustments. It must be mentioned that this feature is very important in environmental goals. More often than not, rock mechanical studies consist of different data, such as laboratory tests, field operations, and indirect information like seismic or well-logging data. CCt provides a useful platform for storing and managing a great deal of volume and different information, which can be very useful in fractured zones. Additionally, CCt supplies powerful tools for predicting, modeling, and simulating rock mechanical information, especially in fractured zones within vast areas. Also, it is a suitable source for sharing extensive information on rock mechanics, such as the direction and size of fractures in a large oil field or mine. The comprehensive review findings demonstrate that digital transformation through integrated IoT, Edge, and Cloud solutions is revolutionizing traditional rock mechanical investigation. These advanced technologies have empowered real-time monitoring, predictive analysis, and data-driven decision-making, culminating in noteworthy enhancements in safety, efficiency, and sustainability. Therefore, by employing IoT, CCt, and ECt, underground operations have experienced a significant boost, allowing for timely and informed actions using real-time data insights. The successful implementation of IoT, CCt, and ECt has led to optimized and safer operations, optimized processes, and environmentally conscious approaches in underground geological endeavors.

Keywords: rock mechanical studies, internet of things, edge computing, cloud computing, underground surveys, geological operations

Procedia PDF Downloads 40
4728 The Harada Method: A Method for Employee Development during Production Ramp Up

Authors: M. Goerke, J. Gehrmann

Abstract:

Caused by shorter product life cycles and higher product variety the importance of production ramp ups is increasing. Even though companies are aware of that fact, up to 40% of the ramp up projects still miss technical and economical requirements. The success of a ramp up depends on the planning of human factors, organizational aspects and technological solutions. Since only partly considered in scientific literature, this paper lays its focus on the human factor during production ramp up. There are only incoherent methods which address the problems in this area. A systematic and holistic method to improve the capabilities of the employees during ramp up is missing. The Harada Method is a relatively young approach for developing highly-skilled workers. It consists of different worksheets which help employees to set guidelines and reach overall objectives. This approach is going to be transferred into a tool for ramp up management.

Keywords: employee development, Harada, production ramp up, organizational aspects

Procedia PDF Downloads 441
4727 The New Propensity Score Method and Assessment of Propensity Score: A Simulation Study

Authors: Azam Najafkouchak, David Todem, Dorothy Pathak, Pramod Pathak, Joseph Gardiner

Abstract:

Propensity score (PS) methods have recently become the standard analysis tool for causal inference in observational studies where exposure is not randomly assigned. Thus, confounding can impact the estimation of treatment effect on the outcome. Due to the dangers of discretizing continuous variables, the focus of this paper will be on how the variation in cut-points or boundaries will affect the average treatment effect utilizing the stratification of the PS method. In this study, we will develop a new methodology to improve the efficiency of the PS analysis through stratification and simulation study. We will also explore the property of empirical distribution of average treatment effect theoretically, including asymptotic distribution, variance estimation and 95% confident Intervals.

Keywords: propensity score, stratification, emprical distribution, average treatment effect

Procedia PDF Downloads 83
4726 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography

Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou

Abstract:

Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.

Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol

Procedia PDF Downloads 245
4725 Impacts of Filmmaking on Destinations: Perceptions of the Residents of Arcos de Valdevez

Authors: André Rafael Ferreira, Laurentina Vareiro, Raquel Mendes

Abstract:

This study’s main objective is to explore residents’ perceptions of film-induced tourism and the impacts of filmmaking on the development of a destination. Specifically, the research examines resident´s perceptions of the social, economic, and environmental impacts on a Portuguese municipality (Arcos de Valdevez) given its feature in a popular Portuguese television series. Data is collected by means of an Internet survey, in which resident´s perceptions of the impacts of filmmaking are solicited. Residents generally agree that the recording and exhibition of the television series is important to the municipality, and contributes to the increased number of tourists. Given that residents consider that the positive impacts are more significant than the negative impacts, they supported the recording of another television series in the same municipality. Considering that destination managers and tourism development authorities aim to plan for optimal tourism development, and at the same time wish to minimize the negative impacts of this development on the local communities, monitoring residents’ opinions of perceived impacts is a good way of incorporating their reaction into tourism planning and development. The results of this research may provide useful information in this sense.

Keywords: film-induced tourism, residents’ perceptions, tourism development, tourism impacts

Procedia PDF Downloads 438
4724 Virtua-Gifted and Non-Gifted Students’ Motivation toward Virtual Flipped Learning from L2 Motivational Self-System Lense

Authors: Kamal Heidari

Abstract:

Covid-19 has borne drastic effects on different areas of society, including the education area, in that it brought virtual education to the center of attention, as an alternative to in-person education. In virtual education, the importance of flipped learning doubles, as students are supposed to take the main responsibility of teaching/learning process; and teachers play merely a facilitative/monitoring role. Given the students’ responsibility in virtual flipped learning, students’ motivation plays a pivotal role in the effectiveness of this learning method. The L2 Motivational Self-System (L2MSS) model is a currently proposed model elaborating on students’ motivation based on three sub-components: ideal L2 self, ought-to L2 self, and L2 learning experience. Drawing on an exploratory sequential mixed-methods research design, this study probed the effect of virtual flipped learning (via SHAD platform) on 112 gifted and non-gifted students’ motivation based on the L2 MSS. This study uncovered that notwithstanding the point that virtual flipped learning improved both gifted and non-gifted students’ motivation, it differentially affected their motivation. In other words, gifted students mostly referred to ideal L2 self, while non-gifted ones referred to ought-to L2 self and L2 learning experience aspects of motivation.

Keywords: virtual flipped learning, giftedness, motivation, L2MSS

Procedia PDF Downloads 70
4723 The Impact of Information and Communication Technology on the Performance of Office Technology Managers

Authors: Sunusi Tijjani

Abstract:

Information and communication technology is an indispensable tool in the performance of office technology managers. Today's offices are automated and equipped with modern office machines that enhances and improve the work of office managers. However, today's office technology managers can process, evaluate, manage and communicate all forms of information using technological devices. Information and Communication Technology is viewed as the process of processing, storing ad dissemination information while office technology managers are trained professional who can effectively operate modern office machines, perform administrative duties and attend meetings to take dawn minute of meetings. This paper examines the importance of information and communication technology toward enhancing the work of office managers. It also stresses the importance of information and communication technology toward proper and accurate record management.

Keywords: communication, information, technology, managers

Procedia PDF Downloads 461
4722 Asymptotic Expansion of the Korteweg-de Vries-Burgers Equation

Authors: Jian-Jun Shu

Abstract:

It is common knowledge that many physical problems (such as non-linear shallow-water waves and wave motion in plasmas) can be described by the Korteweg-de Vries (KdV) equation, which possesses certain special solutions, known as solitary waves or solitons. As a marriage of the KdV equation and the classical Burgers (KdVB) equation, the Korteweg-de Vries-Burgers (KdVB) equation is a mathematical model of waves on shallow water surfaces in the presence of viscous dissipation. Asymptotic analysis is a method of describing limiting behavior and is a key tool for exploring the differential equations which arise in the mathematical modeling of real-world phenomena. By using variable transformations, the asymptotic expansion of the KdVB equation is presented in this paper. The asymptotic expansion may provide a good gauge on the validation of the corresponding numerical scheme.

Keywords: asymptotic expansion, differential equation, Korteweg-de Vries-Burgers (KdVB) equation, soliton

Procedia PDF Downloads 235
4721 Sea Level Rise and Sediment Supply Explain Large-Scale Patterns of Saltmarsh Expansion and Erosion

Authors: Cai J. T. Ladd, Mollie F. Duggan-Edwards, Tjeerd J. Bouma, Jordi F. Pages, Martin W. Skov

Abstract:

Salt marshes are valued for their role in coastal flood protection, carbon storage, and for supporting biodiverse ecosystems. As a biogeomorphic landscape, marshes evolve through the complex interactions between sea level rise, sediment supply and wave/current forcing, as well as and socio-economic factors. Climate change and direct human modification could lead to a global decline marsh extent if left unchecked. Whilst the processes of saltmarsh erosion and expansion are well understood, empirical evidence on the key drivers of long-term lateral marsh dynamics is lacking. In a GIS, saltmarsh areal extent in 25 estuaries across Great Britain was calculated from historical maps and aerial photographs, at intervals of approximately 30 years between 1846 and 2016. Data on the key perceived drivers of lateral marsh change (namely sea level rise rates, suspended sediment concentration, bedload sediment flux rates, and frequency of both river flood and storm events) were collated from national monitoring centres. Continuous datasets did not extend beyond 1970, therefore predictor variables that best explained rate change of marsh extent between 1970 and 2016 was calculated using a Partial Least Squares Regression model. Information about the spread of Spartina anglica (an invasive marsh plant responsible for marsh expansion around the globe) and coastal engineering works that may have impacted on marsh extent, were also recorded from historical documents and their impacts assessed on long-term, large-scale marsh extent change. Results showed that salt marshes in the northern regions of Great Britain expanded an average of 2.0 ha/yr, whilst marshes in the south eroded an average of -5.3 ha/yr. Spartina invasion and coastal engineering works could not explain these trends since a trend of either expansion or erosion preceded these events. Results from the Partial Least Squares Regression model indicated that the rate of relative sea level rise (RSLR) and availability of suspended sediment concentration (SSC) best explained the patterns of marsh change. RSLR increased from 1.6 to 2.8 mm/yr, as SSC decreased from 404.2 to 78.56 mg/l along the north-to-south gradient of Great Britain, resulting in the shift from marsh expansion to erosion. Regional differences in RSLR and SSC are due to isostatic rebound since deglaciation, and tidal amplitudes respectively. Marshes exposed to low RSLR and high SSC likely leads to sediment accumulation at the coast suitable for colonisation by marsh plants and thus lateral expansion. In contrast, high RSLR with are likely not offset deposition under low SSC, thus average water depth at the marsh edge increases, allowing larger wind-waves to trigger marsh erosion. Current global declines in sediment flux to the coast are likely to diminish the resilience of salt marshes to RSLR. Monitoring and managing suspended sediment supply is not common-place, but may be critical to mitigating coastal impacts from climate change.

Keywords: lateral saltmarsh dynamics, sea level rise, sediment supply, wave forcing

Procedia PDF Downloads 122
4720 Phthalate Exposure among Roma Population in Slovakia

Authors: Miroslava Šidlovská, Ida Petrovičová, Tomáš Pilka, Branislav Kolena

Abstract:

Phthalates are ubiquitous environmental pollutants well-known because of their endocrine disrupting activity in human organism. The aim of our study was, by biological monitoring, investigate exposure to phthalates of Roma ethnicity group i.e. children and adults from 5 families (n=29, average age 11.8 ± 7.6 years) living in western Slovakia. Additionally, we analysed some associations between anthropometric measures, questionnaire data i.e. socio-economic status, eating and drinking habits, practise of personal care products and household conditions in comparison with concentrations of phthalate metabolites. We used for analysis of urine samples high performance liquid chromatography and tandem mass spectrometry (HPLC-MS/MS) to determine concentrations of phthalate metabolites monoethyl phthalate (MEP), mono-n-butyl phthalate (MnBP), mono-iso-butyl phthalate (MiBP), mono(2-ethyl-5-hydroxyhexyl) phthalate (5OH-MEHP), mono(2-ethyl-5-oxohexyl) phthalate (5oxo-MEHP) and mono(2-etylhexyl) phthalate (MEHP). Our results indicate that ethnicity, lower socioeconomic status and different housing conditions in Roma population can affect urinary concentration of phthalate metabolites.

Keywords: biomonitoring, ethnicity, human exposure, phthalate metabolites

Procedia PDF Downloads 288
4719 Investigating the Performance of Power Industry in a Developing Nation for Industrialization and Environmental Security

Authors: Abel Edeowede Abhulimen

Abstract:

Due to supply irregularity and frequent outages, the need for reliability in power supply has grown unsatisfactorily over time in developing nations, impeding industrialization and fueling insecurity. This article attempts to break down the Nigerian power issue into its numerous sub-sectors in order to pinpoint the industry's ailment and suggest a viable fix. Monthly average performance data were obtained for the various sub-sectors across the industry for eight consecutive quarters. Whereas the amount of energy generated was found to be insufficient to engender industrialization in a nation like Nigeria, the transmission infrastructure was inadequate for the amount of power needed to be wheeled. Additionally, the distribution sub-sector was plagued with problems such as revenue collection inefficiency, severe enough to impede the growth of the entire industry. The country's goal of attaining energy sufficiency and industrialization would significantly be closer to reality with a conscious effort to increase the base of power generation through aggressive investment in Combined Cycle Gas Turbines (CCGT), decentralization of the transmission infrastructure, and strict monitoring of the distribution sub-sector for improved accountability and system reliability.

Keywords: performance, power industry, industrialization, security, energy

Procedia PDF Downloads 50
4718 Phenol Removal from Water in the Presence of Nano-TiO₂ and a Natural Activated Carbon: Intensive and Extensive Processes

Authors: Hanane Belayachi, Fadila Nemchi, Amel Belayachi, Sarra Bourahla, Mostefa Belhakem

Abstract:

In this work, two photocatalytic processes for the degradation of phenol in water are presented. The first one is extensive (EP), which is carried out in a treatment chain of two steps, allowing the adsorption of the pollutant by a naturally activated carbon from the grapes. This operation is followed by a photocatalytic degradation of the residual phenol in the presence of TiO₂. The second process is intensive (IP) and is realized in one step in the presence of a hybrid photocatalytic nanomaterial prepared from naturally activated carbon and TiO₂. The evaluation of the two processes, EP and IP, is based on the analytical monitoring of the initial and final parameters of the water to be treated, i.e., the phenol concentration by liquid phase chromatography (HPLC) and total organic carbon (TOC). For both processes, the sampling was carried out every 10 min for 120 min of treatment time to measure the phenol concentrations. The elimination and degradation rates in the case of the intensive process are better than the extensive process. In both processes, the catechol molecule was detected as an under product of degradation. In the IP case, this intermediate phenol was totally eliminated, and only traces of catechol persisted in the water.

Keywords: photocatalysis, hybrid, activated carbon, phenol

Procedia PDF Downloads 27
4717 Criminal Liability for Criminal Tax

Authors: Theresia Simatupang dan Rahmayanti

Abstract:

Tax Law is a legal product and therefore should be subject to the legal norms, both about this actions, implementation, and about the material. Law has always aimed at providing justice, and besides that the law as a tool used to organize the order or rule of law. tax classification of a crime in this is very necessary, because the crime of taxation is very detrimental to the country and is still very high in society and socialization associated with punishment in sentencing that would have to provide a deterrent for the perpetrators, so refer to the this, these criminal offenses can endanger the stability of the nation's economy and the country that require special snacks. The application of legal sanctions against the perpetrators of the crime of taxation already has a strong legal basis, namely UU KUP. UU KUP have loaded threat (sanctions) severe punishment for tax payers who commit offenses and crimes in the field of taxation, which is contained in Article 38, and Article 39, Article 41, Article 41 A, and 41 B as well as Article 43 of Law and Law No. 12 KUP about 1985 Land Tax and Building. Criminal sanctions against violators of the tax provision are important because tax payers sanctions for violating tax laws.

Keywords: accountability, tax crime, criminal liability, taxation

Procedia PDF Downloads 333
4716 Colorimetric Detection of Ceftazdime through Azo Dye Formation on Polyethylenimine-Melamine Foam

Authors: Pajaree Donkhampa, Fuangfa Unob

Abstract:

Ceftazidime is an antibiotic drug commonly used to treat several human and veterinary infections. However, the presence of ceftazidime residues in the environment may induce microbial resistance and cause side effects to humans. Therefore, monitoring the level of ceftazidime in environmental resources is important. In this work, a melamine foam platform was proposed for simultaneous extraction and colorimetric detection of ceftazidime based on the azo dye formation on the surface. The melamine foam was chemically modified with polyethyleneimine (PEI) and characterized by scanning electron microscopy (SEM) and Fourier transform infrared spectroscopy (FTIR). Ceftazidime is a sample that was extracted on the PEI-modified melamine foam and further reacted with nitrite in an acidic medium to form an intermediate diazonium ion. The diazotized molecule underwent an azo coupling reaction with chromotropic acid to generate a red-colored compound. The material color changed from pale yellow to pink depending on the ceftazidime concentration. The photo of the obtained material was taken by a smartphone camera and the color intensity was determined by Image J software. The material fabrication and ceftazidime extraction and detection procedures were optimized. The detection of a sub-ppm level of ceftazidime was achieved without using a complex analytical instrument.

Keywords: colorimetric detection, ceftazidime, melamine foam, extraction, azo dye

Procedia PDF Downloads 156
4715 The Use of Online Courses as a Tool for Teaching in Education for Youth and Adults

Authors: Elineuda Do Socorro Santos Picanço Sousa, Ana Kerlly Souza da Costa

Abstract:

This paper presents the analysis of the information society as a plural, inclusive and participatory society, where it is necessary to give all citizens, especially young people, the right skills in order to develop skills so that they can understand and use information through of contemporary technologies; well as carry out a critical analysis, using and producing information and all sorts of messages and / or informational language codes. This conviction inspired this article, whose aim is to present current trends in the use of technology in distance education applied as an alternative and / or supplement to classroom teaching for Youth and Adults, concepts and actions, seeking to contribute to its development in the state of Amapá and specifically, the Center for Professional of Amapá Teaching Professor Josinete Oliveira Barroso - CEPAJOB.

Keywords: youth and adults education, Ead. Professional Education, online courses, CEPAJOB

Procedia PDF Downloads 626
4714 Efficient Passenger Counting in Public Transport Based on Machine Learning

Authors: Chonlakorn Wiboonsiriruk, Ekachai Phaisangittisagul, Chadchai Srisurangkul, Itsuo Kumazawa

Abstract:

Public transportation is a crucial aspect of passenger transportation, with buses playing a vital role in the transportation service. Passenger counting is an essential tool for organizing and managing transportation services. However, manual counting is a tedious and time-consuming task, which is why computer vision algorithms are being utilized to make the process more efficient. In this study, different object detection algorithms combined with passenger tracking are investigated to compare passenger counting performance. The system employs the EfficientDet algorithm, which has demonstrated superior performance in terms of speed and accuracy. Our results show that the proposed system can accurately count passengers in varying conditions with an accuracy of 94%.

Keywords: computer vision, object detection, passenger counting, public transportation

Procedia PDF Downloads 132
4713 Diversity and Ecology of the Aquatic Avifauna of the Wetland of Sebkhet Bazer Sakhra, South of Setif, Algeria

Authors: Gouga Hadjer, Djerdali Sofia, Benssaci Ettayeb

Abstract:

In order to estimate the evolution of the numbers of the aquatic avifauna and their seasonal variations in Sebkhet of Bazer-Sakhra (Site of the eco-complex wetlands of Setif) a monitoring realized during the period from September 2012 to August 2013 allowed to inventory 54 species are spread over 08 orders, 15 families, 34 genres. To follow the global dynamics and the seasonal distribution of species inventoried at Sebkhet Bazer, an analysis of the variation of the total workforce has been established by ecological indices. The autumn season includes the largest number of birds, it totals 3639 individuals. Accidental species are well represented at the autumn and spring seasons denote the interest of the site with respect to migration passages of aquatic birds. During the fall and spring, the Flamingo and the Belon Shelduck are the most abundant with respectively (500, 883) and (560, 1296) individuals. The ecological analysis of this stand showed us that the highest species richness is recorded in spring, (45 species) and the lowest value is obtained in summer it is 20 species.

Keywords: Sebkhet of BazerSakra, ecology, aquatic avifauna, biodiversity, seasonal evolution, wetland

Procedia PDF Downloads 305
4712 Modelling of Relocation and Battery Autonomy Problem on Electric Cars Sharing Dynamic by Using Discrete Event Simulation and Petri Net

Authors: Taha Benarbia, Kay W. Axhausen, Anugrah Ilahi

Abstract:

Electric car sharing system as ecologic transportation increasing in the world. The complexity of managing electric car sharing systems, especially one-way trips and battery autonomy have direct influence to on supply and demand of system. One must be able to precisely model the demand and supply of these systems to better operate electric car sharing and estimate its effect on mobility management and the accessibility that it provides in urban areas. In this context, our work focus to develop performances optimization model of the system based on discrete event simulation and stochastic Petri net. The objective is to search optimal decisions and management parameters of the system in order to fulfil at best demand while minimizing undesirable situations. In this paper, we present new model of electric cars sharing with relocation based on monitoring system. The proposed approach also help to precise the influence of battery charging level on the behaviour of system as important decision parameter of this complex and dynamical system.

Keywords: electric car-sharing systems, smart mobility, Petri nets modelling, discrete event simulation

Procedia PDF Downloads 164
4711 Curbing Cybercrime by Application of Internet Users’ Identification System (IUIS) in Nigeria

Authors: K. Alese Boniface, K. Adu Michael

Abstract:

Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.

Keywords: cybercrime, sign-up portal, internet service provider (ISP), internet protocol address (IP address)

Procedia PDF Downloads 261
4710 Lean Philosophy towards the Enhancement of Maintenance Programs Efficiency with Particular Attention to Libyan Oil and Gas Scenario

Authors: Sulayman Adrees Mohammed, Ahmed Faraj Abd Alsameea

Abstract:

The ongoing hindrance for Libyan oil and gas companies is the persistent challenge of eradicating maintenance program failures that result in exorbitant costs and production setbacks. Accordingly, this research is prompted to introduce the concept of lean philosophy in maintenance, which aims to eliminate waste and enhance productivity in maintenance procedures through the identification and differentiation of value-adding (VA) and non-value-adding (NVA) activities. The purpose of this paper was to explore and describe the benefits that can be gained by adopting the Lean philosophy towards the enhancement of maintenance programs' efficiency from theoretical perspectives. The oil industry maintenance community in Libya now has an introduced tool by which they can effectively evaluate their maintenance program functionality and reduce the areas of non-value added activities within maintenance, thereby enhancing the availability of the equipment and the capacity of the oil and gas facilities.

Keywords: efficiency, lean philosophy, Libyan oil and gas scenario, maintenance programs

Procedia PDF Downloads 72
4709 Developing Emission Factors of Fugitive Particulate Matter Emissions for Construction Sites in the Middle East Area

Authors: Hala A. Hassan, Vasiliki K. Tsiouri, Konstantinos E. Konstantinos

Abstract:

Fugitive particulate matter (PM) is a major source of airborne pollution in the Middle East countries. The meteorological conditions and topography of the area make it highly susceptible to wind-blown particles which raise many air quality concerns. Air quality tools such as field monitoring, emission factors, and dispersion modeling have been used in previous research studies to analyze the release and impacts of fugitive PM in the region. However, these tools have been originally developed based on experiments made for European and North American regions. In this work, an experimental campaign was conducted on April-May 2014 in a construction site in Doha city, Qatar. The ultimate goal is to evaluate the applicability of the existing emission factors for construction sites in dry and arid areas like the Middle East. This publication was made possible by a NPRP award [NPRP 7-649-2-241] from the Qatar National Research Fund (a member of The Qatar Foundation). The statements made herein are solely the responsibility of the authors.

Keywords: particulate matter, emissions, fugitive, construction, air pollution

Procedia PDF Downloads 338
4708 Bypassing Docker Transport Layer Security Using Remote Code Execution

Authors: Michael J. Hahn

Abstract:

Docker is a powerful tool used by many companies such as PayPal, MetLife, Expedia, Visa, and many others. Docker works by bundling multiple applications, binaries, and libraries together on top of an operating system image called a container. The container runs on a Docker engine that in turn runs on top of a standard operating system. This centralization saves a lot of system resources. In this paper, we will be demonstrating how to bypass Transport Layer Security and execute remote code within Docker containers built on a base image of Alpine Linux version 3.7.0 through the use of .apk files due to flaws in the Alpine Linux package management program. This exploit renders any applications built using Docker with a base image of Alpine Linux vulnerable to unwanted outside forces.

Keywords: cloud, cryptography, Docker, Linux, security

Procedia PDF Downloads 179
4707 Reflections on Lyotard's Reading of the Kantian Sublime and Its Political Import

Authors: Tugba Ayas Onol

Abstract:

The paper revisits Jean-François Lyotard’s interpretation of the Kantian Sublime as a tool for understanding politics after modernity. In 1985 Lyotard announces the end of rational politics based on consensus and claims that new strategies are urged to recognize the political imperatives of marginalized groups. The charm of the sublime as a reflective judgment is grounded on the fact that the judgment of sublime is free from any notion of consensus or common sense in particular. Lyotard interprets this feature of the sublime as a respect for heterogeneity and for him aesthetic judgments can be a model for understanding justice in postmodern times, in which it seems hard to follow a single universal law among different phrase regimes. More importantly, the Kantian sublime speaks to what Lyotard addresses as the incommensurability of phase genres. The present paper shall try to evaluate Lyotard’s employment of the Kantian notion of the sublime in relation to its possible political import.

Keywords: Kant, Lyotard, sublime, politics

Procedia PDF Downloads 361