Search results for: cyber operation capabilities
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4234

Search results for: cyber operation capabilities

1294 Statistical Design of Synthetic VP X-bar Control Chat Using Markov Chain Approach

Authors: Ali Akbar Heydari

Abstract:

Control charts are an important tool of statistical quality control. Thesecharts are used to detect and eliminate unwanted special causes of variation that occurred during aperiod of time. The design and operation of control charts require the determination of three design parameters: the sample size (n), the sampling interval (h), and the width coefficient of control limits (k). Thevariable parameters (VP) x-bar controlchart is the x-barchart in which all the design parameters vary between twovalues. These values are a function of the most recent process information. In fact, in the VP x-bar chart, the position of each sample point on the chart establishes the size of the next sample and the timeof its sampling. The synthetic x-barcontrol chartwhich integrates the x-bar chart and the conforming run length (CRL) chart, provides significant improvement in terms of detection power over the basic x-bar chart for all levels of mean shifts. In this paper, we introduce the syntheticVP x-bar control chart for monitoring changes in the process mean. To determine the design parameters, we used a statistical design based on the minimum out of control average run length (ARL) criteria. The optimal chart parameters of the proposed chart are obtained using the Markov chain approach. A numerical example is also done to show the performance of the proposed chart and comparing it with the other control charts. The results show that our proposed syntheticVP x-bar controlchart perform better than the synthetic x-bar controlchart for all shift parameter values. Also, the syntheticVP x-bar controlchart perform better than the VP x-bar control chart for the moderate or large shift parameter values.

Keywords: control chart, markov chain approach, statistical design, synthetic, variable parameter

Procedia PDF Downloads 154
1293 Gas Transmission Pipeline Integrity Management System Through Corrosion Mitigation and Inspection Strategy: A Case Study of Natural Gas Transmission Pipeline from Wafa Field to Mellitah Gas Plant in Libya

Authors: Osama Sassi, Manal Eltorki, Iftikhar Ahmad

Abstract:

Poor integrity is one of the major causes of leaks and accidents in gas transmission pipelines. To ensure safe operation, it is must to have efficient and effective pipeline integrity management (PIM) system. The corrosion management is one of the important aspects of successful pipeline integrity management program together design, material selection, operations, risk evaluation and communication aspects to maintain pipelines in a fit-for-service condition. The objective of a corrosion management plan is to design corrosion mitigation, monitoring, and inspection strategy, and for maintenance in a timely manner. This paper presents the experience of corrosion management of a gas transmission pipeline from Wafa field to Mellitah gas plant in Libya. The pipeline is 525.5 km long and having 32 inches diameter. It is a buried pipeline. External corrosion on pipeline is controlled with a combination of coatings and cathodic protection while internal corrosion is controlled with a combination of chemical inhibitors, periodic cleaning and process control. The monitoring and inspection techniques provide a way to measure the effectiveness of corrosion control systems and provide an early warning when changing conditions may be causing a corrosion problem. This paper describes corrosion management system used in Mellitah Oil & Gas BV for its gas transmission pipeline based on standard practices of corrosion mitigation and inspection.

Keywords: corrosion mitigation on gas transmission pipelines, pipeline integrity management, corrosion management of gas pipelines, prevention and inspection of corrosion

Procedia PDF Downloads 77
1292 The Study and the Use of the Bifunctional Catalyst Pt/Re for Obtaining High Octane Number of the Gasoline

Authors: Menouar Hanafi

Abstract:

The original function of the process of platforming is to develop heavy naphtha (HSRN), coming from the atmospheric unit of distillation with a weak octane number (NO=44), to obtain a mixture of fuels â number octane raised by catalytically supporting specific groups of chemical reactions. The installation is divided into two sections: Section hydrobon. Section platforming. The rafinat coming from the bottom of column 12C2 to feed the section platforming, is divided into two parts whose flows are controlled and mixed with gas rich in hydrogen. Bottom of the column, we obtain stabilized reformat which is aspired by there pump to ensure the heating of the column whereas a part is sent towards storage after being cooled by the air cooler and the condenser. In catalytic catalyst of reforming, there is voluntarily associated a hydrogenating function-dehydrogenating, brought by platinum deposited, with an acid function brought by the alumina support (Al 2 0 3). The mechanism of action of this bifunctional catalyst depends on the severity of the operation, of the quality of the load and the type of catalyst. The catalyst used in the catalytic process of reforming is a very elaborate bifunctional catalyst whose performances are constantly improved thanks to the experimental research supported on an increasingly large comprehension of the phenomena. The American company Universel 0i1 petroleum (UOP) marketed several series of bimetallic catalysts such as R16, R20, R30, and R62 consisted Platinum/Rhenium on an acid support consisted the alumina added with a halogenous compound (chlorine).

Keywords: platforming, amelioration, octane number, catalyst

Procedia PDF Downloads 386
1291 Flora of Seaweeds and the Preliminary Screening of the Fungal Endophytes

Authors: Nur Farah Ain Zainee, Ahmad Ismail, Nazlina Ibrahim, Asmida Ismail

Abstract:

Seaweeds are economically important as they have the potential of being utilized, the capabilities and opportunities for further expansion as well as the availability of other species for future development. Hence, research on the diversity and distribution of seaweeds have to be expanded whilst the seaweeds are one of the Malaysian marine valuable heritage. The study on the distribution of seaweeds at Pengerang, Johor was carried out between February and November 2015 at Kampung Jawa Darat and Kampung Sungai Buntu. The study sites are located at the south-southeast of Peninsular Malaysia where the Petronas Refinery and Petrochemicals Integrated Project Development (RAPID) are in progress. In future, the richness of seaweeds in Pengerang will vanish soon due to the loss of habitat prior to RAPID project. The research was completed to study the diversity of seaweed and to determine the present of fungal endophyte isolated from the seaweed. The sample was calculated by using quadrat with 25-meter line transect by 3 replication for each site. The specimen were preserved, identified, processed in the laboratory and kept as herbarium specimen in Algae Herbarium, Universiti Kebangsaan Malaysia. The complete thallus specimens for fungal endophyte screening were chosen meticulously, transferred into sterile zip-lock plastic bag and kept in the freezer for further process. A total of 29 species has been identified including 12 species of Chlorophyta, 2 species of Phaeophyta and 14 species of Rhodophyta. From February to November 2015, the number of species highly varied and there was a significant change in community structure of seaweeds. Kampung Sungai Buntu shows the highest diversity throughout the study compared to Kampung Jawa Darat. This evidence can be related to the high habitat preference such as types of shores which is rocky, sandy and having lagoon and bay. These can enhance the existence of the seaweeds community due to variations of the habitat. Eighteen seaweed species were selected and screened for the capability presence of fungal endophyte; Sargassum polycystum marked having the highest number of fungal endophyte compared to the other species. These evidence has proved the seaweed have capable of accommodating a lot of species of fungal endophytes. Thus, these evidence leads to positive consequences where further research should be employed.

Keywords: diversity, fungal endophyte, macroalgae, screening, seaweed

Procedia PDF Downloads 229
1290 The Effect of Tool Path Strategy on Surface and Dimension in High Speed Milling

Authors: A. Razavykia, A. Esmaeilzadeh, S. Iranmanesh

Abstract:

Many orthopedic implants like proximal humerus cases require lower surface roughness and almost immediate/short lead time surgery. Thus, rapid response from the manufacturer is very crucial. Tool path strategy of milling process has a direct influence on the surface roughness and lead time of medical implant. High-speed milling as promised process would improve the machined surface quality, but conventional or super-abrasive grinding still required which imposes some drawbacks such as additional costs and time. Currently, many CAD/CAM software offers some different tool path strategies to milling free form surfaces. Nevertheless, the users must identify how to choose the strategies according to cutting tool geometry, geometry complexity, and their effects on the machined surface. This study investigates the effect of different tool path strategies for milling a proximal humerus head during finishing operation on stainless steel 316L. Experiments have been performed using MAHO MH700 S vertical milling machine and four machining strategies, namely, spiral outward, spiral inward, and radial as well as zig-zag. In all cases, the obtained surfaces were analyzed in terms of roughness and dimension accuracy compared with those obtained by simulation. The findings provide evidence that surface roughness, dimensional accuracy, and machining time have been affected by the considered tool path strategy.

Keywords: CAD/CAM software, milling, orthopedic implants, tool path strategy

Procedia PDF Downloads 213
1289 Accurate Mass Segmentation Using U-Net Deep Learning Architecture for Improved Cancer Detection

Authors: Ali Hamza

Abstract:

Accurate segmentation of breast ultrasound images is of paramount importance in enhancing the diagnostic capabilities of breast cancer detection. This study presents an approach utilizing the U-Net architecture for segmenting breast ultrasound images aimed at improving the accuracy and reliability of mass identification within the breast tissue. The proposed method encompasses a multi-stage process. Initially, preprocessing techniques are employed to refine image quality and diminish noise interference. Subsequently, the U-Net architecture, a deep learning convolutional neural network (CNN), is employed for pixel-wise segmentation of regions of interest corresponding to potential breast masses. The U-Net's distinctive architecture, characterized by a contracting and expansive pathway, enables accurate boundary delineation and detailed feature extraction. To evaluate the effectiveness of the proposed approach, an extensive dataset of breast ultrasound images is employed, encompassing diverse cases. Quantitative performance metrics such as the Dice coefficient, Jaccard index, sensitivity, specificity, and Hausdorff distance are employed to comprehensively assess the segmentation accuracy. Comparative analyses against traditional segmentation methods showcase the superiority of the U-Net architecture in capturing intricate details and accurately segmenting breast masses. The outcomes of this study emphasize the potential of the U-Net-based segmentation approach in bolstering breast ultrasound image analysis. The method's ability to reliably pinpoint mass boundaries holds promise for aiding radiologists in precise diagnosis and treatment planning. However, further validation and integration within clinical workflows are necessary to ascertain their practical clinical utility and facilitate seamless adoption by healthcare professionals. In conclusion, leveraging the U-Net architecture for breast ultrasound image segmentation showcases a robust framework that can significantly enhance diagnostic accuracy and advance the field of breast cancer detection. This approach represents a pivotal step towards empowering medical professionals with a more potent tool for early and accurate breast cancer diagnosis.

Keywords: mage segmentation, U-Net, deep learning, breast cancer detection, diagnostic accuracy, mass identification, convolutional neural network

Procedia PDF Downloads 84
1288 A Review of Digital Twins to Reduce Emission in the Construction Industry

Authors: Zichao Zhang, Yifan Zhao, Samuel Court

Abstract:

The carbon emission problem of the traditional construction industry has long been a pressing issue. With the growing emphasis on environmental protection and advancement of science and technology, the organic integration of digital technology and emission reduction has gradually become a mainstream solution. Among various sophisticated digital technologies, digital twins, which involve creating virtual replicas of physical systems or objects, have gained enormous attention in recent years as tools to improve productivity, optimize management and reduce carbon emissions. However, the relatively high implementation costs including finances, time, and manpower associated with digital twins have limited their widespread adoption. As a result, most of the current applications are primarily concentrated within a few industries. In addition, the creation of digital twins relies on a large amount of data and requires designers to possess exceptional skills in information collection, organization, and analysis. Unfortunately, these capabilities are often lacking in the traditional construction industry. Furthermore, as a relatively new concept, digital twins have different expressions and usage methods across different industries. This lack of standardized practices poses a challenge in creating a high-quality digital twin framework for construction. This paper firstly reviews the current academic studies and industrial practices focused on reducing greenhouse gas emissions in the construction industry using digital twins. Additionally, it identifies the challenges that may be encountered during the design and implementation of a digital twin framework specific to this industry and proposes potential directions for future research. This study shows that digital twins possess substantial potential and significance in enhancing the working environment within the traditional construction industry, particularly in their ability to support decision-making processes. It proves that digital twins can improve the work efficiency and energy utilization of related machinery while helping this industry save energy and reduce emissions. This work will help scholars in this field to better understand the relationship between digital twins and energy conservation and emission reduction, and it also serves as a conceptual reference for practitioners to implement related technologies.

Keywords: digital twins, emission reduction, construction industry, energy saving, life cycle, sustainability

Procedia PDF Downloads 101
1287 Supply Chain Technology Adoption in Textile and Apparel Industry

Authors: Zulkifli Mohamed Udin, Lee Khai-Loon, Mohamad Ghozali Hassan

Abstract:

In today’s dynamic business environment, the competition is no longer between firms, but between supply chains to gain competitive advantages. The global manufacturing sector, especially the textile and apparel industry are essentially known for its supply chain dependency. The delicate nature of its business leads to emphasis on the smooth movement of upstream and downstream supply chain. The nature of this industry, however, result in huge dynamic flow of physical, information, and financial. The dynamic management of these flows requires adoption of supply chain technologies. Even though technology is widely implemented and studied in many industries by researchers, adoption of supply chain technologies in Malaysian textile and apparel industry is limited. There is relatively a handful academic study conducted on recent developments in Malaysian textile and apparel industry and supply chain technology adoption indicate a major gap in supply chain performance studies. Considering the importance given to Third Industrial Master Plan by the government Malaysia, it is necessary to understand the power of supply chain technology adoptions. This study aims to investigate supply chain technology adoption by textile and apparel companies in Malaysia. The result highlighted the benefits perceived by textile and apparel companies from supply chain technologies. The indifference of small and medium enterprises to operation management acts as a major inhibitor to the adoption of supply chain technologies, since they have resource limitations. This study could be used as a precursor for further detailed studies on this issue.

Keywords: supply chain technology adoption, supply chain performance, textile, apparel industry

Procedia PDF Downloads 492
1286 The Impact of Artificial Intelligence on Agricultural Machines and Plant Nutrition

Authors: Kirolos Gerges Yakoub Gerges

Abstract:

Self-sustaining agricultural machines act in stochastic surroundings and therefore, should be capable of perceive the surroundings in real time. This notion can be done using image sensors blended with superior device learning, mainly Deep mastering. Deep convolutional neural networks excel in labeling and perceiving colour pix and since the fee of RGB-cameras is low, the hardware cost of accurate notion relies upon heavily on memory and computation power. This paper investigates the opportunity of designing lightweight convolutional neural networks for semantic segmentation (pixel clever class) with reduced hardware requirements, to allow for embedded usage in self-reliant agricultural machines. The usage of compression techniques, a lightweight convolutional neural community is designed to carry out actual-time semantic segmentation on an embedded platform. The community is skilled on two big datasets, ImageNet and Pascal Context, to apprehend as much as four hundred man or woman instructions. The 400 training are remapped into agricultural superclasses (e.g. human, animal, sky, road, area, shelterbelt and impediment) and the capacity to provide correct actual-time perception of agricultural environment is studied. The network is carried out to the case of self-sufficient grass mowing the usage of the NVIDIA Tegra X1 embedded platform. Feeding case-unique pics to the community consequences in a fully segmented map of the superclasses within the picture. As the network remains being designed and optimized, handiest a qualitative analysis of the technique is entire on the abstract submission deadline. intending this cut-off date, the finalized layout is quantitatively evaluated on 20 annotated grass mowing pictures. Light-weight convolutional neural networks for semantic segmentation can be implemented on an embedded platform and show aggressive performance on the subject of accuracy and speed. It’s miles viable to offer value-efficient perceptive capabilities related to semantic segmentation for autonomous agricultural machines.

Keywords: centrifuge pump, hydraulic energy, agricultural applications, irrigationaxial flux machines, axial flux applications, coreless machines, PM machinesautonomous agricultural machines, deep learning, safety, visual perception

Procedia PDF Downloads 26
1285 UV Functionalised Short Implants as an Alternative to Avoid Crestal Sinus Lift Procedure: Controlled Case Series

Authors: Naira Ghambaryan, Gagik Hakobyan

Abstract:

Purpose:The study was to evaluate the survival rate of short implants (5-6 mm) functionalized with UV radiation placed in the posterior segments of the atrophied maxilla. Materials and Methods:The study included 47 patients with unilateral/bilateral missing teeth and vertical atrophy of the posterior maxillary area. A total of 64 short UV-functionalized implants and 62 standard implants over 10 mm in length were placed in patients. The clinical indices included the following parameters: ISQБ MBL, OHIP-G scale. Results: For short implants, the median ISQ at placement was 62.2 for primary stability, and the median ISQ at 5 months was 69.6 ISQ. For standart implant, the mean ISQ at placement was 64.3 ISQ, and ISQ after 5 months was 71.6 ISQ. Аfter 6 months mean MBL short implants 0.87 mm, after 1 year, 1.13 mm, after 5 year was 1.48 mm. Аfter 6 months, mean MBL standard implants 0.84 mm, after 1 year, 1.24 mm, after 5 year was 1.58 mm. Mean OHIP-G scores -patients satisfaction with the implant at 4.8 ± 0.3, satisfaction with the operation 4.6 ± 0.4; satisfaction with prosthetics 4.7 ± 0.5. Cumulative 5-year short implants rates was 96.7%, standard implants was 97.4%, and prosthesis cumulative survival rate was 97.2%. Conclusions: Short implants with ultraviolet functionalization for prosthetic rehabilitation of the posterior resorbed maxilla region is a reliable, reasonable alternative to sinus lift, demonstrating fewer complications, satisfactory survival of a 5-year follow-up period, and reducing the number of additional surgical interventions and postoperative complications.

Keywords: short implant, ultraviolet functionalization, atrophic posterior maxilla, prosthodontic rehabilitation

Procedia PDF Downloads 86
1284 Unsupervised Feature Learning by Pre-Route Simulation of Auto-Encoder Behavior Model

Authors: Youngjae Jin, Daeshik Kim

Abstract:

This paper describes a cycle accurate simulation results of weight values learned by an auto-encoder behavior model in terms of pre-route simulation. Given the results we visualized the first layer representations with natural images. Many common deep learning threads have focused on learning high-level abstraction of unlabeled raw data by unsupervised feature learning. However, in the process of handling such a huge amount of data, the learning method’s computation complexity and time limited advanced research. These limitations came from the fact these algorithms were computed by using only single core CPUs. For this reason, parallel-based hardware, FPGAs, was seen as a possible solution to overcome these limitations. We adopted and simulated the ready-made auto-encoder to design a behavior model in Verilog HDL before designing hardware. With the auto-encoder behavior model pre-route simulation, we obtained the cycle accurate results of the parameter of each hidden layer by using MODELSIM. The cycle accurate results are very important factor in designing a parallel-based digital hardware. Finally this paper shows an appropriate operation of behavior model based pre-route simulation. Moreover, we visualized learning latent representations of the first hidden layer with Kyoto natural image dataset.

Keywords: auto-encoder, behavior model simulation, digital hardware design, pre-route simulation, Unsupervised feature learning

Procedia PDF Downloads 446
1283 Combustion Chamber Sizing for Energy Recovery from Furnace Process Gas: Waste to Energy

Authors: Balram Panjwani, Bernd Wittgens, Jan Erik Olsen, Stein Tore Johansen

Abstract:

The Norwegian ferroalloy industry is a world leader in sustainable production of ferrosilicon, silicon and manganese alloys with the lowest global specific energy consumption. One of the byproducts during the metal reduction process is energy rich off-gas and usually this energy is not harnessed. A novel concept for sustainable energy recovery from ferroalloy off-gas is discussed. The concept is founded on the idea of introducing a combustion chamber in the off-gas section in which energy rich off-gas mainly consisting of CO will be combusted. This will provide an additional degree of freedom for optimizing energy recovery. A well-controlled and high off-gas temperature will assure a significant increase in energy recovery and reduction of emissions to the atmosphere. Design and operation of the combustion chamber depend on many parameters, including the total power capacity of the combustion chamber, sufficient residence time for combusting the complex Poly Aromatic Hydrocarbon (PAH), NOx, as well as converting other potential pollutants. The design criteria for the combustion chamber have been identified and discussed and sizing of the combustion chamber has been carried out considering these design criteria. Computational Fluid Dynamics (CFD) has been utilized extensively for sizing the combustion chamber. The results from our CFD simulations of the flow in the combustion chamber and exploring different off-gas fuel composition are presented. In brief, the paper covers all aspect which impacts the sizing of the combustion chamber, including insulation thickness, choice of insulating material, heat transfer through extended surfaces, multi-staging and secondary air injection.

Keywords: CFD, combustion chamber, arc furnace, energy recovery

Procedia PDF Downloads 319
1282 Gender Specific Nature of the Fiction Conflict in Modern Feminine Prose

Authors: Baglan Bazylova

Abstract:

The purpose of our article is to consider the social and psychological conflicts in Lyudmila Petrushevskaya’s stories as an artistic presentation of gender structure of modern society; to reveal originality of the characters’ inner world, the models of their behavior expressing the gender specific nature of modern feminine prose. Gender conflicts have taken the leading place in the modern prose. L. Petrushevskaya represents different types of conflicts including those which are shown in the images of real contradictions in the stories "Narratrix", "Thanks to Life”, "Virgin's Case", "Father and Mother". In the prose of Petrushevskaya the gender conflicts come out in two dimensions: The first one is love relations between a man and a woman. Because of the financial indigence, neediness a woman can’t afford herself even to fall in love and arrange her family happiness. The second dimension is the family conflict because of the male adultery. Petrushevskaya fixed on the unmanifistated conflict in detail. In the real life such gender conflict can appear in different forms but for the writer is important to show it as a life basis, hidden behind the externally safe facade of “the family happiness”. In the stories of L. Petrushevskaya the conflicts reflect the common character of the social and historical situations in which her heroines find themselves, in situations where a woman feels her opposition to the customary mode of life. The types of gender conflicts of these stories differ in character of verbal images. They are presented by the verbal and event ranks creating the conflicts just in operation.

Keywords: gender behavior of heroes, gender conflict, gender picture of the world, gender structure

Procedia PDF Downloads 510
1281 The Time-Frequency Domain Reflection Method for Aircraft Cable Defects Localization

Authors: Reza Rezaeipour Honarmandzad

Abstract:

This paper introduces an aircraft cable fault detection and location method in light of TFDR keeping in mind the end goal to recognize the intermittent faults adequately and to adapt to the serial and after-connector issues being hard to be distinguished in time domain reflection. In this strategy, the correlation function of reflected and reference signal is used to recognize and find the airplane fault as per the qualities of reflected and reference signal in time-frequency domain, so the hit rate of distinguishing and finding intermittent faults can be enhanced adequately. In the work process, the reflected signal is interfered by the noise and false caution happens frequently, so the threshold de-noising technique in light of wavelet decomposition is used to diminish the noise interference and lessen the shortcoming alert rate. At that point the time-frequency cross connection capacity of the reference signal and the reflected signal based on Wigner-Ville appropriation is figured so as to find the issue position. Finally, LabVIEW is connected to execute operation and control interface, the primary capacity of which is to connect and control MATLAB and LABSQL. Using the solid computing capacity and the bottomless capacity library of MATLAB, the signal processing turn to be effortlessly acknowledged, in addition LabVIEW help the framework to be more dependable and upgraded effectively.

Keywords: aircraft cable, fault location, TFDR, LabVIEW

Procedia PDF Downloads 476
1280 An Application of Vector Error Correction Model to Assess Financial Innovation Impact on Economic Growth of Bangladesh

Authors: Md. Qamruzzaman, Wei Jianguo

Abstract:

Over the decade, it is observed that financial development, through financial innovation, not only accelerated development of efficient and effective financial system but also act as a catalyst in the economic development process. In this study, we try to explore insight about how financial innovation causes economic growth in Bangladesh by using Vector Error Correction Model (VECM) for the period of 1990-2014. Test of Cointegration confirms the existence of a long-run association between financial innovation and economic growth. For investigating directional causality, we apply Granger causality test and estimation explore that long-run growth will be affected by capital flow from non-bank financial institutions and inflation in the economy but changes of growth rate do not have any impact on Capital flow in the economy and level of inflation in long-run. Whereas, growth and Market capitalization, as well as market capitalization and capital flow, confirm feedback hypothesis. Variance decomposition suggests that any innovation in the financial sector can cause GDP variation fluctuation in both long run and short run. Financial innovation promotes efficiency and cost in financial transactions in the financial system, can boost economic development process. The study proposed two policy recommendations for further development. First, innovation friendly financial policy should formulate to encourage adaption and diffusion of financial innovation in the financial system. Second, operation of financial market and capital market should be regulated with implementation of rules and regulation to create conducive environment.

Keywords: financial innovation, economic growth, GDP, financial institution, VECM

Procedia PDF Downloads 272
1279 Lidocaine-Bupivacaine Block Improve Analgesia in Cats Undergoing Orchiectomy

Authors: T. C. Ng, R. Radzi, T. K. Ng, H. C. Chen

Abstract:

The analgesic effects of lidocaine-bupivacaine block in cats undergoing routine orchiectomy were determined in this controlled, randomized, and blinded study. Twelve cats were randomly assigned to two groups. Cats in local block group received subcutaneous infiltration of 1 mg/kg of 2% lidocaine and 1 mg/kg of 0.5% bupivacaine into the scrotal sac. Cats in control group received equivolume of saline. Both groups were induced with mixture of ketamine (15 mg/kg) and acepromazine (0.1 mg/kg) intramuscularly and maintained on sevoflurane via facemask. Non-invasive blood pressures (BP), heart (HR), and respiratory rate (RR) were measured intra-operatively at specific events. Post-operatively, all cats received meloxicam, 0.2 mg/kg subcutaneously. Pain scores were determined at 4, 8, and 24 hours postoperatively. Mechanical pressure thresholds (MPT) at the perineum and metatarsus were determined at 2, 4, 8, and 24 hours postoperatively. Intra-operatively, the BP and HR tended to be higher in the control group. The increment in HR peaked during traction and autoligation of the spermatic cord in the control group. There was no treatment difference in RR. Post-operatively, pain scores in the group given local blocks were lower than the control group at 4 hour post-operation. There was no treatment difference in the post-operative HR, RR, BP and MPT values. In conclusion, subcutaneous infiltration of lidocaine-bupivacaine into the scrotal sac before orchiectomy improved intra-operative hemodynamic stability and provided better analgesia up to 4 hours post-surgery.

Keywords: analgesia, bupivacaine, cat, lidocaine, local block, orchiectomy

Procedia PDF Downloads 138
1278 Transparency Obligations under the AI Act Proposal: A Critical Legal Analysis

Authors: Michael Lognoul

Abstract:

In April 2021, the European Commission released its AI Act Proposal, which is the first policy proposal at the European Union level to target AI systems comprehensively, in a horizontal manner. This Proposal notably aims to achieve an ecosystem of trust in the European Union, based on the respect of fundamental rights, regarding AI. Among many other requirements, the AI Act Proposal aims to impose several generic transparency obligationson all AI systems to the benefit of natural persons facing those systems (e.g. information on the AI nature of systems, in case of an interaction with a human). The Proposal also provides for more stringent transparency obligations, specific to AI systems that qualify as high-risk, to the benefit of their users, notably on the characteristics, capabilities, and limitations of the AI systems they use. Against that background, this research firstly presents all such transparency requirements in turn, as well as related obligations, such asthe proposed obligations on record keeping. Secondly, it focuses on a legal analysis of their scope of application, of the content of the obligations, and on their practical implications. On the scope of transparency obligations tailored for high-risk AI systems, the research notably notes that it seems relatively narrow, given the proposed legal definition of the notion of users of AI systems. Hence, where end-users do not qualify as users, they may only receive very limited information. This element might potentially raise concern regarding the objective of the Proposal. On the content of the transparency obligations, the research highlights that the information that should benefit users of high-risk AI systems is both very broad and specific, from a technical perspective. Therefore, the information required under those obligations seems to create, prima facie, an adequate framework to ensure trust for users of high-risk AI systems. However, on the practical implications of these transparency obligations, the research notes that concern arises due to potential illiteracy of high-risk AI systems users. They might not benefit from sufficient technical expertise to fully understand the information provided to them, despite the wording of the Proposal, which requires that information should be comprehensible to its recipients (i.e. users).On this matter, the research points that there could be, more broadly, an important divergence between the level of detail of the information required by the Proposal and the level of expertise of users of high-risk AI systems. As a conclusion, the research provides policy recommendations to tackle (part of) the issues highlighted. It notably recommends to broaden the scope of transparency requirements for high-risk AI systems to encompass end-users. It also suggests that principles of explanation, as they were put forward in the Guidelines for Trustworthy AI of the High Level Expert Group, should be included in the Proposal in addition to transparency obligations.

Keywords: aI act proposal, explainability of aI, high-risk aI systems, transparency requirements

Procedia PDF Downloads 317
1277 Land Cover Mapping Using Sentinel-2, Landsat-8 Satellite Images, and Google Earth Engine: A Study Case of the Beterou Catchment

Authors: Ella Sèdé Maforikan

Abstract:

Accurate land cover mapping is essential for effective environmental monitoring and natural resources management. This study focuses on assessing the classification performance of two satellite datasets and evaluating the impact of different input feature combinations on classification accuracy in the Beterou catchment, situated in the northern part of Benin. Landsat-8 and Sentinel-2 images from June 1, 2020, to March 31, 2021, were utilized. Employing the Random Forest (RF) algorithm on Google Earth Engine (GEE), a supervised classification categorized the land into five classes: forest, savannas, cropland, settlement, and water bodies. GEE was chosen due to its high-performance computing capabilities, mitigating computational burdens associated with traditional land cover classification methods. By eliminating the need for individual satellite image downloads and providing access to an extensive archive of remote sensing data, GEE facilitated efficient model training on remote sensing data. The study achieved commendable overall accuracy (OA), ranging from 84% to 85%, even without incorporating spectral indices and terrain metrics into the model. Notably, the inclusion of additional input sources, specifically terrain features like slope and elevation, enhanced classification accuracy. The highest accuracy was achieved with Sentinel-2 (OA = 91%, Kappa = 0.88), slightly surpassing Landsat-8 (OA = 90%, Kappa = 0.87). This underscores the significance of combining diverse input sources for optimal accuracy in land cover mapping. The methodology presented herein not only enables the creation of precise, expeditious land cover maps but also demonstrates the prowess of cloud computing through GEE for large-scale land cover mapping with remarkable accuracy. The study emphasizes the synergy of different input sources to achieve superior accuracy. As a future recommendation, the application of Light Detection and Ranging (LiDAR) technology is proposed to enhance vegetation type differentiation in the Beterou catchment. Additionally, a cross-comparison between Sentinel-2 and Landsat-8 for assessing long-term land cover changes is suggested.

Keywords: land cover mapping, Google Earth Engine, random forest, Beterou catchment

Procedia PDF Downloads 63
1276 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks

Authors: Walid Abdallah, Noureddine Boudriga

Abstract:

Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.

Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based

Procedia PDF Downloads 660
1275 A Hybrid Genetic Algorithm and Neural Network for Wind Profile Estimation

Authors: M. Saiful Islam, M. Mohandes, S. Rehman, S. Badran

Abstract:

Increasing necessity of wind power is directing us to have precise knowledge on wind resources. Methodical investigation of potential locations is required for wind power deployment. High penetration of wind energy to the grid is leading multi megawatt installations with huge investment cost. This fact appeals to determine appropriate places for wind farm operation. For accurate assessment, detailed examination of wind speed profile, relative humidity, temperature and other geological or atmospheric parameters are required. Among all of these uncertainty factors influencing wind power estimation, vertical extrapolation of wind speed is perhaps the most difficult and critical one. Different approaches have been used for the extrapolation of wind speed to hub height which are mainly based on Log law, Power law and various modifications of the two. This paper proposes a Artificial Neural Network (ANN) and Genetic Algorithm (GA) based hybrid model, namely GA-NN for vertical extrapolation of wind speed. This model is very simple in a sense that it does not require any parametric estimations like wind shear coefficient, roughness length or atmospheric stability and also reliable compared to other methods. This model uses available measured wind speeds at 10m, 20m and 30m heights to estimate wind speeds up to 100m. A good comparison is found between measured and estimated wind speeds at 30m and 40m with approximately 3% mean absolute percentage error. Comparisons with ANN and power law, further prove the feasibility of the proposed method.

Keywords: wind profile, vertical extrapolation of wind, genetic algorithm, artificial neural network, hybrid machine learning

Procedia PDF Downloads 490
1274 An Alternative Credit Scoring System in China’s Consumer Lendingmarket: A System Based on Digital Footprint Data

Authors: Minjuan Sun

Abstract:

Ever since the late 1990s, China has experienced explosive growth in consumer lending, especially in short-term consumer loans, among which, the growth rate of non-bank lending has surpassed bank lending due to the development in financial technology. On the other hand, China does not have a universal credit scoring and registration system that can guide lenders during the processes of credit evaluation and risk control, for example, an individual’s bank credit records are not available for online lenders to see and vice versa. Given this context, the purpose of this paper is three-fold. First, we explore if and how alternative digital footprint data can be utilized to assess borrower’s creditworthiness. Then, we perform a comparative analysis of machine learning methods for the canonical problem of credit default prediction. Finally, we analyze, from an institutional point of view, the necessity of establishing a viable and nationally universal credit registration and scoring system utilizing online digital footprints, so that more people in China can have better access to the consumption loan market. Two different types of digital footprint data are utilized to match with bank’s loan default records. Each separately captures distinct dimensions of a person’s characteristics, such as his shopping patterns and certain aspects of his personality or inferred demographics revealed by social media features like profile image and nickname. We find both datasets can generate either acceptable or excellent prediction results, and different types of data tend to complement each other to get better performances. Typically, the traditional types of data banks normally use like income, occupation, and credit history, update over longer cycles, hence they can’t reflect more immediate changes, like the financial status changes caused by the business crisis; whereas digital footprints can update daily, weekly, or monthly, thus capable of providing a more comprehensive profile of the borrower’s credit capabilities and risks. From the empirical and quantitative examination, we believe digital footprints can become an alternative information source for creditworthiness assessment, because of their near-universal data coverage, and because they can by and large resolve the "thin-file" issue, due to the fact that digital footprints come in much larger volume and higher frequency.

Keywords: credit score, digital footprint, Fintech, machine learning

Procedia PDF Downloads 161
1273 The Underground Ecosystem of Credit Card Frauds

Authors: Abhinav Singh

Abstract:

Point Of Sale (POS) malwares have been stealing the limelight this year. They have been the elemental factor in some of the biggest breaches uncovered in past couple of years. Some of them include • Target: A Retail Giant reported close to 40 million credit card data being stolen • Home Depot : A home product Retailer reported breach of close to 50 million credit records • Kmart: A US retailer recently announced breach of 800 thousand credit card details. Alone in 2014, there have been reports of over 15 major breaches of payment systems around the globe. Memory scrapping malwares infecting the point of sale devices have been the lethal weapon used in these attacks. These malwares are capable of reading the payment information from the payment device memory before they are being encrypted. Later on these malwares send the stolen details to its parent server. These malwares are capable of recording all the critical payment information like the card number, security number, owner etc. All these information are delivered in raw format. This Talk will cover the aspects of what happens after these details have been sent to the malware authors. The entire ecosystem of credit card frauds can be broadly classified into these three steps: • Purchase of raw details and dumps • Converting them to plastic cash/cards • Shop! Shop! Shop! The focus of this talk will be on the above mentioned points and how they form an organized network of cyber-crime. The first step involves buying and selling of the stolen details. The key point to emphasize are : • How is this raw information been sold in the underground market • The buyer and seller anatomy • Building your shopping cart and preferences • The importance of reputation and vouches • Customer support and replace/refunds These are some of the key points that will be discussed. But the story doesn’t end here. As of now the buyer only has the raw card information. How will this raw information be converted to plastic cash? Now comes in picture the second part of this underground economy where-in these raw details are converted into actual cards. There are well organized services running underground that can help you in converting these details into plastic cards. We will discuss about this technique in detail. At last, the final step involves shopping with the stolen cards. The cards generated with the stolen details can be easily used to swipe-and-pay for purchased goods at different retail shops. Usually these purchases are of expensive items that have good resale value. Apart from using the cards at stores, there are underground services that lets you deliver online orders to their dummy addresses. Once the package is received it will be delivered to the original buyer. These services charge based on the value of item that is being delivered. The overall underground ecosystem of credit card fraud works in a bulletproof way and it involves people working in close groups and making heavy profits. This is a brief summary of what I plan to present at the talk. I have done an extensive research and have collected good deal of material to present as samples. Some of them include: • List of underground forums • Credit card dumps • IRC chats among these groups • Personal chat with big card sellers • Inside view of these forum owners. The talk will be concluded by throwing light on how these breaches are being tracked during investigation. How are credit card breaches tracked down and what steps can financial institutions can build an incidence response over it.

Keywords: POS mawalre, credit card frauds, enterprise security, underground ecosystem

Procedia PDF Downloads 439
1272 Modelling Biological Treatment of Dye Wastewater in SBR Systems Inoculated with Bacteria by Artificial Neural Network

Authors: Yasaman Sanayei, Alireza Bahiraie

Abstract:

This paper presents a systematic methodology based on the application of artificial neural networks for sequencing batch reactor (SBR). The SBR is a fill-and-draw biological wastewater technology, which is specially suited for nutrient removal. Employing reactive dye by Sphingomonas paucimobilis bacteria at sequence batch reactor is a novel approach of dye removal. The influent COD, MLVSS, and reaction time were selected as the process inputs and the effluent COD and BOD as the process outputs. The best possible result for the discrete pole parameter was a= 0.44. In orderto adjust the parameters of ANN, the Levenberg-Marquardt (LM) algorithm was employed. The results predicted by the model were compared to the experimental data and showed a high correlation with R2> 0.99 and a low mean absolute error (MAE). The results from this study reveal that the developed model is accurate and efficacious in predicting COD and BOD parameters of the dye-containing wastewater treated by SBR. The proposed modeling approach can be applied to other industrial wastewater treatment systems to predict effluent characteristics. Note that SBR are normally operated with constant predefined duration of the stages, thus, resulting in low efficient operation. Data obtained from the on-line electronic sensors installed in the SBR and from the control quality laboratory analysis have been used to develop the optimal architecture of two different ANN. The results have shown that the developed models can be used as efficient and cost-effective predictive tools for the system analysed.

Keywords: artificial neural network, COD removal, SBR, Sphingomonas paucimobilis

Procedia PDF Downloads 413
1271 An Assessment of Bathymetric Changes in the Lower Usuma Reservoir, Abuja, Nigera

Authors: Rayleigh Dada Abu, Halilu Ahmad Shaba

Abstract:

Siltation is a serious problem that affects public water supply infrastructures such as dams and reservoirs. It is a major problem which threatens the performance and sustainability of dams and reservoirs. It reduces the dam capacity for flood control, potable water supply, changes water stage, reduces water quality and recreational benefits. The focus of this study is the Lower Usuma reservoir. At completion the reservoir had a gross storage capacity of 100 × 106 m3 (100 million cubic metres), a maximum operational level of 587.440 m a.s.l., with a maximum depth of 49 m and a catchment area of 241 km2 at dam site with a daily designed production capacity of 10,000 cubic metres per hour. The reservoir is 1,300 m long and feeds the treatment plant mainly by gravity. The reservoir became operational in 1986 and no survey has been conducted to determine its current storage capacity and rate of siltation. Hydrographic survey of the reservoir by integrated acoustic echo-sounding technique was conducted in November 2012 to determine the level and rate of siltation. The result obtained shows that the reservoir has lost 12.0 meters depth to siltation in 26 years of its operation; indicating 24.5% loss in installed storage capacity. The present bathymetric survey provides baseline information for future work on siltation depth and annual rates of storage capacity loss for the Lower Usuma reservoir.

Keywords: sedimentation, lower Usuma reservoir, acoustic echo sounder, bathymetric survey

Procedia PDF Downloads 515
1270 Accessibility Centres in Higher Education Institutions: Inclusiveness and Peer Tutoring Programmes

Authors: Vassilis Argyropoulos, Magda Nikolaraizi, Maria Papazafiri

Abstract:

A growing number of students with disabilities attend institutions of higher education, and according to evidenced-based data, it seems that they face many obstacles regarding their academic access and inclusion. The fact that more and more students decide to actively participate in higher education, on the one hand, empowers and strengthens inclusiveness in tertiary education, but on the other hand, it brings new challenges to their access to scientific content as well as to their interactions with other students and faculty members. For this, accessibility centres have come to the fore in many higher education institutions, in order to respond to the needs of students with disabilities. In this paper, we present a study regarding the peer tutoring program, which is a service delivered by the Accessibility Centre at the University of Thessaly in Greece. Specifically, the current paper aims to describe the experiences of tutees and tutors regarding their relationships developed throughout the peer tutoring program. Twelve tutors and eight tutees with disabilities participated in the study, whose experiences were explored through interviews and were analyzed in a qualitative way. In our study, all tutees and most of the tutors described their relationship as friendly, while a few tutors preferred a more formal relationship. Also, both tutors and tutees described some of the challenges, such as setting limits or arranging an appointment. Finally, peer tutoring programs seem very promising, but in order to be effective, there is a need for training and supporting students regarding their role as well as monitoring the progress of the peer tutoring program, ensuring its smooth operation and success for both tutors and tutees.

Keywords: disability, higher education institutions, interviews, peer tutoring, inclusiveness

Procedia PDF Downloads 53
1269 Effects of Fermentation Techniques on the Quality of Cocoa Beans

Authors: Monday O. Ale, Adebukola A. Akintade, Olasunbo O. Orungbemi

Abstract:

Fermentation as an important operation in the processing of cocoa beans is now affected by the recent climate change across the globe. The major requirement for effective fermentation is the ability of the material used to retain sufficient heat for the required microbial activities. Apart from the effects of climate on the rate of heat retention, the materials used for fermentation plays an important role. Most Farmers still restrict fermentation activities to the use of traditional methods. Improving on cocoa fermentation in this era of climate change makes it necessary to work on other materials that can be suitable for cocoa fermentation. Therefore, the objective of this study was to determine the effects of fermentation techniques on the quality of cocoa beans. The materials used in this fermentation research were heap-leaves (traditional), stainless steel, plastic tin, plastic basket and wooden box. The period of fermentation varies from zero days to 10 days. Physical and chemical tests were carried out for variables in quality determination in the samples. The weight per bean varied from 1.0-1.2 g after drying across the samples and the major color of the dry beans observed was brown except with the samples from stainless steel. The moisture content varied from 5.5-7%. The mineral content and the heavy metals decreased with increase in the fermentation period. A wooden box can conclusively be used as an alternative to heap-leaves as there was no significant difference in the physical features of the samples fermented with the two methods. The use of a wooden box as an alternative for cocoa fermentation is therefore recommended for cocoa farmers.

Keywords: fermentation, effects, fermentation materials, period, quality

Procedia PDF Downloads 207
1268 Interdisciplinarity as a Regular Pedagogical Practice in the Classrooms

Authors: Catarina Maria Neto Da Cruz, Ana Maria Reis D’Azevedo Breda

Abstract:

The world is changing and, consequently, the young people need more sophisticated tools and skills to lead with the world’s complexity. The Organisation for Economic Co-operation and Development Learning Framework 2030 suggests an interdisciplinary knowledge as a principle for the future of education systems. In the curricular document Portuguese about the profile of students leaving compulsory education, the critical thinking and creative thinking are pointed out as skills to be developed, which imply the interconnection of different knowledge, applying it in different contexts and learning areas. Unlike primary school teachers, teachers specialized in a specific area lead to more difficulties in the implementation of interdisciplinary approaches in the classrooms and, despite the effort, the interdisciplinarity is not a common practice in schools. Statement like "Mathematics is everywhere" is unquestionable, however, many math teachers show difficulties in presenting such evidence in their classes. Mathematical modelling and problems in real contexts are promising in the development of interdisciplinary pedagogical practices and in Portugal there is a continuous training offer to contribute to the development of teachers in terms of their pedagogical approaches. But when teachers find themselves in the classroom, without a support, do they feel able to implement interdisciplinary practices? In this communication we will try to approach this issue through a case study involving a group of Mathematics teachers, who attended a training aimed at stimulating interdisciplinary practices in real contexts, namely related to the COVID-19 pandemic.

Keywords: education, mathematics, teacher training, interdisciplinarity

Procedia PDF Downloads 93
1267 Bridge Health Monitoring: A Review

Authors: Mohammad Bakhshandeh

Abstract:

Structural Health Monitoring (SHM) is a crucial and necessary practice that plays a vital role in ensuring the safety and integrity of critical structures, and in particular, bridges. The continuous monitoring of bridges for signs of damage or degradation through Bridge Health Monitoring (BHM) enables early detection of potential problems, allowing for prompt corrective action to be taken before significant damage occurs. Although all monitoring techniques aim to provide accurate and decisive information regarding the remaining useful life, safety, integrity, and serviceability of bridges, understanding the development and propagation of damage is vital for maintaining uninterrupted bridge operation. Over the years, extensive research has been conducted on BHM methods, and experts in the field have increasingly adopted new methodologies. In this article, we provide a comprehensive exploration of the various BHM approaches, including sensor-based, non-destructive testing (NDT), model-based, and artificial intelligence (AI)-based methods. We also discuss the challenges associated with BHM, including sensor placement and data acquisition, data analysis and interpretation, cost and complexity, and environmental effects, through an extensive review of relevant literature and research studies. Additionally, we examine potential solutions to these challenges and propose future research ideas to address critical gaps in BHM.

Keywords: structural health monitoring (SHM), bridge health monitoring (BHM), sensor-based methods, machine-learning algorithms, and model-based techniques, sensor placement, data acquisition, data analysis

Procedia PDF Downloads 90
1266 Preliminary Study on the Factors Affecting Safety Parameters of (Th, U)O₂ Fuel Cycle: The Basis for Choosing Three Fissile Enrichment Zones

Authors: E. H. Uguru, S. F. A. Sani, M. U. Khandaker, M. H. Rabir

Abstract:

The beginning of cycle transient safety parameters is paramount for smooth reactor operation. The enhanced operational safety of UO₂ fuelled AP1000 reactor being the first using three fissile enrichment zones motivated this research for (Th, U)O₂ fuel. This study evaluated the impact of fissile enrichment, soluble boron, and gadolinia on the transient safety parameters to determine the basis for choosing the three fissile enrichment zones. Fuel assembly and core model of Westinghouse small modular reactor were investigated using different fuel and reactivity control arrangements. The Monte Carlo N-Particle eXtended (MCNPX) integrated with CINDER90 burn-up code was used for the calculations. The results show that the moderator temperature coefficient of reactivity (MTC) and the fuel temperature coefficient of reactivity (FTC) were respectively negative and decreased with increasing fissile enrichment. Soluble boron significantly decreased the MTC but slightly increased FTC while gadolinia followed the same trend with a minor impact. However, the MTC and FTC respectively decreased significantly with increasing change in temperature. These results provide a guide on the considerable factors in choosing the three fissile enrichment zones for (Th, U)O₂ fuel in anticipation of their impact on safety parameters. Therefore, this study provides foundational results on the factors that must be considered in choosing three fissile arrangement zones for (Th, U)O₂ fuel.

Keywords: reactivity, safety parameters, small modular reactor, soluble boron, thorium fuel cycle

Procedia PDF Downloads 131
1265 Partial Privatization, Control Rights of Large Shareholders and Privatized Shares Transfer: Evidence from Chinese State-Owned Listed Companies

Authors: Tingting Zhou

Abstract:

The partial privatization of state-owned enterprises (SOEs) is a dynamic process. The main features of this process lie in not only gradual and sequential privatizations, but also privatized shares transfer. For partially privatized SOEs, the introduction of private sector ownership is not the end of the story because the previously introduced private owners may choose to leave the SOEs by transferring the privatized shares after privatization, a process that is called “privatized shares transfer”. This paper investigates the determinants of privatized shares transfer from the perspective of large shareholders’ control rights. The results captures the fact that the higher control rights of large shareholders lead to more privatized shares transfer. After exploring the impacts of excessive control rights, the results provide evidence supporting the idea that firms with excessive numbers of directors, senior managers or supervisors who also have positions in the largest controlling shareholder’s entity are more likely to transfer privatized shares owned by private owners. In addition, the largest shareholders’ ownership also plays a role in privatized shares transfer. This evidence suggests that the large shareholders’ control rights should be limited to an appropriate range during the process of privatization, thereby giving private shareholders more opportunity to participate in the operation of firms, strengthen the state and enhance the competitiveness of state capital.

Keywords: control rights of large shareholders, partial privatization, privatized shares transfer, state-owned listed companies

Procedia PDF Downloads 284