Search results for: infrastructure monitoring
2055 Low Impact Development Strategies Applied in the Water System Planning in the Coastal Eco-Green Campus
Authors: Ying Li, Zaisheng Hong, Weihong Wang
Abstract:
With the rapid enlargement of the size of Chinese universities, newly built campuses are springing up everywhere in recent years. It is urged to build eco-green campus because the role of higher education institutions in the transition to a more sustainable society has been highlighted for almost three decades. On condition that a new campus is usually built on an undeveloped site, where the basic infrastructure is not completed, finding proper strategies in planning and design of the campus becomes a primary concern. Low Impact Development (LID) options have been proposed as an alternative approach to make better use of rainwater in planning and design of an undeveloped site. On the basis of analyzing the natural circumstance, geographic condition, and other relative information, four main LID approaches are coordinated in this study of Hebei Union University, which are ‘Storage’, ‘Retaining’, ‘Infiltration’ and ‘Purification’. ‘Storage’ refers to a big central lake in the campus for rainwater harvesting. ‘Retaining’ means rainwater gardens scattered in the campus, also being known as bioretention areas which mimic the naturally created pools of water, to decrease surface flow runoff. ‘Infiltration’ is designed of grassed swales, which also play a part of floodway channel. ‘Purification’ is known as either natural or artificial wetland to reduce pollutants such as nitrogen and phosphorous in the waterbody. With above mentioned measures dealing with the synthetic use of rainwater in the acid & alkali area in the coastal district, an eco-green campus construction and an ecological sustainability will be realized, which will give us more enlightenment and reference.Keywords: newly built campus, low impact development, planning design, rainwater reuse
Procedia PDF Downloads 2482054 Differentiation between Different Rangeland Sites Using Principal Component Analysis in Semi-Arid Areas of Sudan
Authors: Nancy Ibrahim Abdalla, Abdelaziz Karamalla Gaiballa
Abstract:
Rangelands in semi-arid areas provide a good source for feeding huge numbers of animals and serving environmental, economic and social importance; therefore, these areas are considered economically very important for the pastoral sector in Sudan. This paper investigates the means of differentiating between different rangelands sites according to soil types using principal component analysis to assist in monitoring and assessment purposes. Three rangeland sites were identified in the study area as flat sandy sites, sand dune site, and hard clay site. Principal component analysis (PCA) was used to reduce the number of factors needed to distinguish between rangeland sites and produce a new set of data including the most useful spectral information to run satellite image processing. It was performed using selected types of data (two vegetation indices, topographic data and vegetation surface reflectance within the three bands of MODIS data). Analysis with PCA indicated that there is a relatively high correspondence between vegetation and soil of the total variance in the data set. The results showed that the use of the principal component analysis (PCA) with the selected variables showed a high difference, reflected in the variance and eigenvalues and it can be used for differentiation between different range sites.Keywords: principal component analysis, PCA, rangeland sites, semi-arid areas, soil types
Procedia PDF Downloads 1862053 Wildfires Assessed By Remote Sensed Images And Burned Land Monitoring
Authors: Maria da Conceição Proença
Abstract:
This case study implements the evaluation of burned areas that suffered successive wildfires in Portugal mainland during the summer of 2017, killing more than 60 people. It’s intended to show that this evaluation can be done with remote sensing data free of charges in a simple laptop, with open-source software, describing the not-so-simple methodology step by step, to make it available for county workers in city halls of the areas attained, where the availability of information is essential for the immediate planning of mitigation measures, such as restoring road access, allocate funds for the recovery of human dwellings and assess further restoration of the ecological system. Wildfires also devastate forest ecosystems having a direct impact on vegetation cover and killing or driving away from the animal population. The economic interest is also attained, as the pinewood burned becomes useless for the noblest applications, so its value decreases, and resin extraction ends for several years. The tools described in this paper enable the location of the areas where took place the annihilation of natural habitats and establish a baseline for major changes in forest ecosystems recovery. Moreover, the result allows the follow up of the surface fuel loading, enabling the targeting and evaluation of restoration measures in a time basis planning.Keywords: image processing, remote sensing, wildfires, burned areas evaluation, sentinel-2
Procedia PDF Downloads 2112052 Women's Sexual Experience in Pakistan: Associations of Patriarchy and Psychological Distress
Authors: Sana Tahir, Haya Fatimah
Abstract:
Sexuality is a social construct which is considered as the most confidential affair among individuals where women tend to refrain themselves more from sexually explicit behavior than men. Patriarchy has an elevated influence on the expression of female sexuality. While women’s sexual experiences are suppressed men are entitled to pleasure themselves according to their desire. The purpose of this study is to explore how the internalization of patriarchy affects women’s sexuality. Similarly, it was investigated how women sexuality is associated with psychological distress. The sample consisted of 100(age 20-40) married women. Participants were selected through a combination of convenient and snowball sampling. Women were asked to provide data regarding patriarchal beliefs, sexual awareness and DAS (depression, anxiety, and stress). Pearson Product Moment Correlation Analyze was conducted to examine the nature of the relationship between patriarchal beliefs, sexual awareness and psychological distress in married women. There is a significant negative relation between sexual awareness and patriarchal beliefs (r=-.391, p<.001). There also lies a significant negative relation between sexual awareness and depression, anxiety, stress (r=-.359, p<.001) (r=.301, p=.002) (r=-.221, p=.027). The results reveal that women with strong patriarchal beliefs have less sexual awareness in terms of sexual consciousness, sexual monitoring, sexual assertiveness and sexual appeal consciousness. Similarly, women with strong patriarchal beliefs and less sexual awareness have high levels of depression, anxiety, and stress.Keywords: female sexuality, patriarchy, psychological distress, sexual awareness
Procedia PDF Downloads 3012051 Ethical Implications of Gaps in the Implementation Process of the Circular Economy: Special Focus on Underdeveloped Countries
Authors: Sujith Gunawardhana
Abstract:
The circular economy is a system in which resources and energy are derived from renewable sources, utilized efficiently, recycled, and reused to reduce waste, reduce nonrenewable resource consumption, and mitigate negative environmental impacts. However, it poses moral questions about sustainability, the environment, and societal issues. Many societies face challenges when implementing the circular economy, as the concept is still young. The equitable distribution of the advantages and costs of circularity should be ensured during implementation, as some communities, particularly disadvantaged or marginalized ones, may suffer unfairly disproportionately from the harmful effects of production and recycling facilities. Prioritizing the health and safety of workers, communities, and the environment is essential, and strict rules must be implemented to guard against harm. However, most underdeveloped countries need a legal safeguard for this situation. The ultimate objective of the circular economy is to improve social, environmental, and economic performance, but its implementation also requires consideration of the ethics of care and non-epistemic values. Those are often hindered in underdeveloped countries, as the availability of infrastructure and technology, affordability, and legislative framework are poor. To achieve long-term success in the circular economy, evaluating implementation steps and considering health, safety, environmental, and social risks is crucial. To implement the circular economy, respect ethics of care and non-epistemic values. Adopt Kantian Ethics and control technology design to ensure equal benefits for all involved. Ethical gaps may lead underdeveloped countries to generate social pressure against the circular economy.Keywords: circular economy, ethics, values, sustainability
Procedia PDF Downloads 1092050 Study on the Non-Contact Sheet Resistance Measuring of Silver Nanowire Coated Film Using Terahertz Wave
Authors: Dong-Hyun Kim, Wan-Ho Chung, Hak-Sung Kim
Abstract:
In this work, non-destructive evaluation was conducted to measure the sheet resistance of silver nanowire coated film and find a damage of that film using terahertz (THz) wave. Pulse type THz instrument was used, and the measurement was performed under transmission and pitch-catch reflection modes with 30 degree of incidence angle. In the transmission mode, the intensity of the THz wave was gradually increased as the conductivity decreased. Meanwhile, the intensity of THz wave was decreased as the conductivity decreased in the pitch-catch reflection mode. To confirm the conductivity of the film, sheet resistance was measured by 4-point probe station. Interaction formula was drawn from a relation between the intensity and the sheet resistance. Through substituting sheet resistance to the formula and comparing the resultant value with measured maximum THz wave intensity, measurement of sheet resistance using THz wave was more suitable than that using 4-point probe station. In addition, the damage on the silver nanowire coated film was detected by applying the THz image system. Therefore, the reliability of the entire film can be also be ensured. In conclusion, real-time monitoring using the THz wave can be applied in the transparent electrodes with detecting the damaged area as well as measuring the sheet resistance.Keywords: terahertz wave, sheet resistance, non-destructive evaluation, silver nanowire
Procedia PDF Downloads 4902049 Cybersecurity Assessment of Decentralized Autonomous Organizations in Smart Cities
Authors: Claire Biasco, Thaier Hayajneh
Abstract:
A smart city is the integration of digital technologies in urban environments to enhance the quality of life. Smart cities capture real-time information from devices, sensors, and network data to analyze and improve city functions such as traffic analysis, public safety, and environmental impacts. Current smart cities face controversy due to their reliance on real-time data tracking and surveillance. Internet of Things (IoT) devices and blockchain technology are converging to reshape smart city infrastructure away from its centralized model. Connecting IoT data to blockchain applications would create a peer-to-peer, decentralized model. Furthermore, blockchain technology powers the ability for IoT device data to shift from the ownership and control of centralized entities to individuals or communities with Decentralized Autonomous Organizations (DAOs). In the context of smart cities, DAOs can govern cyber-physical systems to have a greater influence over how urban services are being provided. This paper will explore how the core components of a smart city now apply to DAOs. We will also analyze different definitions of DAOs to determine their most important aspects in relation to smart cities. Both categorizations will provide a solid foundation to conduct a cybersecurity assessment of DAOs in smart cities. It will identify the benefits and risks of adopting DAOs as they currently operate. The paper will then provide several mitigation methods to combat cybersecurity risks of DAO integrations. Finally, we will give several insights into what challenges will be faced by DAO and blockchain spaces in the coming years before achieving a higher level of maturity.Keywords: blockchain, IoT, smart city, DAO
Procedia PDF Downloads 1212048 Developing an Exhaustive and Objective Definition of Social Enterprise through Computer Aided Text Analysis
Authors: Deepika Verma, Runa Sarkar
Abstract:
One of the prominent debates in the social entrepreneurship literature has been to establish whether entrepreneurial work for social well-being by for-profit organizations can be classified as social entrepreneurship or not. Of late, the scholarship has reached a consensus. It concludes that there seems little sense in confining social entrepreneurship to just non-profit organizations. Boosted by this research, increasingly a lot of businesses engaged in filling the social infrastructure gaps in developing countries are calling themselves social enterprise. These organizations are diverse in their ownership, size, objectives, operations and business models. The lack of a comprehensive definition of social enterprise leads to three issues. Firstly, researchers may face difficulty in creating a database for social enterprises because the choice of an entity as a social enterprise becomes subjective or based on some pre-defined parameters by the researcher which is not replicable. Secondly, practitioners who use ‘social enterprise’ in their vision/mission statement(s) may find it difficult to adjust their business models accordingly especially during the times when they face the dilemma of choosing social well-being over business viability. Thirdly, social enterprise and social entrepreneurship attract a lot of donor funding and venture capital. In the paucity of a comprehensive definitional guide, the donors or investors may find assigning grants and investments difficult. It becomes necessary to develop an exhaustive and objective definition of social enterprise and examine whether the understanding of the academicians and practitioners about social enterprise match. This paper develops a dictionary of words often associated with social enterprise or (and) social entrepreneurship. It further compares two lexicographic definitions of social enterprise imputed from the abstracts of academic journal papers and trade publications extracted from the EBSCO database using the ‘tm’ package in R software.Keywords: EBSCO database, lexicographic definition, social enterprise, text mining
Procedia PDF Downloads 3972047 The Reality of E-Commerce in Egypt and Its Role in Enhancing Companies' Competitiveness
Authors: Esam El Gohary
Abstract:
— The companies’ ability to survive and compete in the fierce competition is determined by its competitiveness level. With the spread of information technology use and appearance of online shopping, it became crucial for companies to adopt e-commerce system to increase its competitiveness. This paper was conducted with the purpose of determine how increasing the service value through e-commerce factors (competitive strategy, ICT infrastructures, logistics, security, human resources and innovation) can enhance companies' competitiveness. The problem of this paper is summarized in the absence of the thorough awareness of e-commerce benefits for business owners and customers, as well as how to reduce the intangibility attributes of e-commerce. For this purpose this paper describes the e-commerce in Egypt and its success factors (infrastructures, legal and regulatory environment, human resources and innovation), as well as displays the barriers of such factor, to investigate the significant of these factors on increasing service value and enhance companies' competitiveness. This paper revealed that e-commerce companies have many opportunities to enhance its competitiveness in Egypt, which is enhanced by several factors. The most important factors are “strong ICT infrastructure, qualified and skilled human resources, in addition to the distinctive logistics that distinguish Egypt due to its location, strong legal and regulatory environment and Innovation, as well as the competitive strategy. As well as, companies encounter several threats such as; the lack of infrastructures and logistics in rural areas, the absence of the inclusive understanding and awareness of e-commerce, fear from e-payment transactions and fraud, the ambiguity and burdensome of customs. Through the research findings several recommendations were introduced to both government and companies to overcome threats and exploit opportunities to improve performance and enhance companies' competitiveness.Keywords: e-commerce competitiveness, e-commerce factors, e-commerce in Egypt, information technology
Procedia PDF Downloads 1032046 Using IoT on Single Input Multiple Outputs (SIMO) DC–DC Converter to Control Smart-home
Authors: Auwal Mustapha Imam
Abstract:
The aim of the energy management system is to monitor and control utilization, access, optimize and manage energy availability. This can be realized through real-time analyses and energy sources and loads data control in a predictive way. Smart-home monitoring and control provide convenience and cost savings by controlling appliances, lights, thermostats and other loads. There may be different categories of loads in the various homes, and the homeowner may wish to control access to solar-generated energy to protect the storage from draining completely. Controlling the power system operation by managing the converter output power and controlling how it feeds the appliances will satisfy the residential load demand. The Internet of Things (IoT) provides an attractive technological platform to connect the two and make home automation and domestic energy utilization easier and more attractive. This paper presents the use of IoT-based control topology to monitor and control power distribution and consumption by DC loads connected to single-input multiple outputs (SIMO) DC-DC converter, thereby reducing leakages, enhancing performance and reducing human efforts. A SIMO converter was first developed and integrated with the IoT/Raspberry Pi control topology, which enables the user to monitor and control power scheduling and load forecasting via an Android app.Keywords: flyback, converter, DC-DC, photovoltaic, SIMO
Procedia PDF Downloads 492045 Vibration Energy Harvesting from Aircraft Structure Using Piezoelectric Transduction
Authors: M. Saifudin Ahmed Atique, Santosh Paudyal, Caixia Yang
Abstract:
In an aircraft, a great portion of energy is wasted due to its inflight structural vibration. Structural components vibrate due to aeroelastic instabilities, gust perturbations and engine rotation at very high rpm. Energy losses due to mechanical vibration can be utilized by harvesting energy from aircraft structure as electrical energy. This harvested energy can be stored in battery panels built into aircraft fuselage and can be used to power inflight auxiliary accessories i.e., lighting and entertainment systems. Moreover, this power can be used for wireless Structural Health Monitoring System (SHM) for aircraft and as an excellent replacement of aircraft Ground Power Unit (GPU)/Auxiliary Power Unit (APU) during passenger onboard time to power aircraft cabin accessories to reduce aircraft ground operation cost significantly. In this paper, we propose the design of a noble aircraft wing in which Piezoelectric panels placed under the composite skin of aircraft wing will generate electrical charges from any inflight aerodynamics or mechanical vibration and store it into battery to power auxiliary inflight systems/accessories as per requirement. Experimental results show that a well-engineered piezoelectric energy harvester based aircraft wing can produce adequate energy to support in-flight lighting and auxiliary cabin accessories.Keywords: vibration energy, aircraft wing, piezoelectric material, inflight accessories
Procedia PDF Downloads 1592044 Low Students' Access to University Education in Nigeria: Causes and Remedy
Authors: Robert Ogbanje Okwori
Abstract:
The paper explained the causes low students’ access to university education in Nigeria and how it can be remedied. It is discovered that low students’ access to university education in Nigeria is evident despite these number of universities in the country. In 2006/2007 academic session, 806,089 sat for Joint Unified Matriculation Board Examination (JAMB) into Nigerian universities and only 123,626 (15.3%) were admitted while 2011/2012 academic session, a total of 1,493,604 candidates sat for Joint Unified Matriculation Board Examination (JAMB) into Nigerian universities and only 65,073 (43.57%) were admitted. This necessitates for the research. Therefore, the study posed the following research questions. What are causes of low students’ access to university education in Nigeria? What are the challenges of students’ access to university education in Nigeria? How can students’ access to university education in Nigeria be improved? Sample survey research design was adopted for the study. A structured questionnaire was used to gather data for the study. Six hundred and eighty (680) respondents which comprised of 100 level university students; JAMB Officers and University administrators (Vice Chancellors, Registrars and Admission Officers) were used for the study. Stratified random sampling was applied for adequate representation of respondents from universities in the six geopolitical zones of Nigeria. Mean was used to answer research questions while Kuder-Richardson formula 20 was used to check the internal consistency of the instrument. The correlation coefficient of the instrument was 0.87. The major findings include the carrying capacity of each university contributes to low students’ access to university education and academic staff were inadequate. From the analysis of the study, it is concluded that the rate of access to university education is low, therefore, every university should establish distance learning programme to reduce university admission crisis. The training infrastructure in the universities should be improved upon by the owners to increase the carrying capacity of each university.Keywords: access, causes, low, university
Procedia PDF Downloads 4682043 Intrusion Detection in Cloud Computing Using Machine Learning
Authors: Faiza Babur Khan, Sohail Asghar
Abstract:
With an emergence of distributed environment, cloud computing is proving to be the most stimulating computing paradigm shift in computer technology, resulting in spectacular expansion in IT industry. Many companies have augmented their technical infrastructure by adopting cloud resource sharing architecture. Cloud computing has opened doors to unlimited opportunities from application to platform availability, expandable storage and provision of computing environment. However, from a security viewpoint, an added risk level is introduced from clouds, weakening the protection mechanisms, and hardening the availability of privacy, data security and on demand service. Issues of trust, confidentiality, and integrity are elevated due to multitenant resource sharing architecture of cloud. Trust or reliability of cloud refers to its capability of providing the needed services precisely and unfailingly. Confidentiality is the ability of the architecture to ensure authorization of the relevant party to access its private data. It also guarantees integrity to protect the data from being fabricated by an unauthorized user. So in order to assure provision of secured cloud, a roadmap or model is obligatory to analyze a security problem, design mitigation strategies, and evaluate solutions. The aim of the paper is twofold; first to enlighten the factors which make cloud security critical along with alleviation strategies and secondly to propose an intrusion detection model that identifies the attackers in a preventive way using machine learning Random Forest classifier with an accuracy of 99.8%. This model uses less number of features. A comparison with other classifiers is also presented.Keywords: cloud security, threats, machine learning, random forest, classification
Procedia PDF Downloads 3202042 Non-Destructive Evaluation for Physical State Monitoring of an Angle Section Thin-Walled Curved Beam
Authors: Palash Dey, Sudip Talukdar
Abstract:
In this work, a cross-breed approach is presented for obtaining both the amount of the damage intensity and location of damage existing in thin-walled members. This cross-breed approach is developed based on response surface methodology (RSM) and genetic algorithm (GA). Theoretical finite element (FE) model of cracked angle section thin walled curved beam has been linked to the developed approach to carry out trial experiments to generate response surface functions (RSFs) of free, forced and heterogeneous dynamic response data. Subsequently, the error between the computed response surface functions and measured dynamic response data has been minimized using GA to find out the optimum damage parameters (amount of the damage intensity and location). A single crack of varying location and depth has been considered in this study. The presented approach has been found to reveal good accuracy in prediction of crack parameters and possess great potential in crack detection as it requires only the current response of a cracked beam.Keywords: damage parameters, finite element, genetic algorithm, response surface methodology, thin walled curved beam
Procedia PDF Downloads 2482041 Understanding the Complexity of Corruption and Anti-Corruption in Indonesia's Mining Industry: Challenges and Opportunities
Authors: Ahmad Khoirul Umam, Iin Mayasari
Abstract:
Indonesia is blessed with rich natural resources and frequently dubbed as the 6th richest country in the world in terms of mining resources, including minerals and coal. Mining can contribute to the socio-economic development by generating state revenue for development, elevating poverty through employment, opening and developing remote areas, putting in basic infrastructure and creating new centres of developments. However, favouritism and rent-seeking behaviour committed by government officials, politicians, and business players in licensing and permit giving in mining and forestry sectors have resisted reforms. Even though Indonesia’s Corruption Eradication Commission (KPK) successfully targeted untouchable actors, public criticism continues to focus on questions of why corruption apparently remains systemic in mining industry in the country? This paper revealed that structural anomalies, as well as legacies of the Soeharto era’s power inequities, have severely inhibited Indonesia’s bureaucratic arrangements that continue to influence adversely the elements of transparency and accountability in mining industry governance. In the more liberalized and decentralized political system, the deficiencies have gradually assisted vested interest groups to band together, thus creating a coalition that can challenge, resist, and contain anti-graft actions. Therefore, Indonesia needs much more serious anti-corruption actions that would require eliminating the monopoly over power, enhancing competition, limiting discretion, and clarifying the rules of business and political competition in the mining sector in the country.Keywords: anti-corruption, public integrity, private integrity, mining industry, democratization
Procedia PDF Downloads 1112040 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification
Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang
Abstract:
One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.Keywords: malware detection, network security, targeted attack, computational intelligence
Procedia PDF Downloads 2632039 Accurate Position Electromagnetic Sensor Using Data Acquisition System
Authors: Z. Ezzouine, A. Nakheli
Abstract:
This paper presents a high position electromagnetic sensor system (HPESS) that is applicable for moving object detection. The authors have developed a high-performance position sensor prototype dedicated to students’ laboratory. The challenge was to obtain a highly accurate and real-time sensor that is able to calculate position, length or displacement. An electromagnetic solution based on a two coil induction principal was adopted. The HPESS converts mechanical motion to electric energy with direct contact. The output signal can then be fed to an electronic circuit. The voltage output change from the sensor is captured by data acquisition system using LabVIEW software. The displacement of the moving object is determined. The measured data are transmitted to a PC in real-time via a DAQ (NI USB -6281). This paper also describes the data acquisition analysis and the conditioning card developed specially for sensor signal monitoring. The data is then recorded and viewed using a user interface written using National Instrument LabVIEW software. On-line displays of time and voltage of the sensor signal provide a user-friendly data acquisition interface. The sensor provides an uncomplicated, accurate, reliable, inexpensive transducer for highly sophisticated control systems.Keywords: electromagnetic sensor, accurately, data acquisition, position measurement
Procedia PDF Downloads 2852038 Assessing Walkability in New Cities around Cairo
Authors: Lobna Ahmed Galal
Abstract:
Modal integration has given minimal consideration in cities of developing countries, as well as the declining dominance of public transport, and predominance of informal transport, the modal share of informal taxis in greater Cairo has increased from 6% in 1987 to 37% in 2001 and this has since risen even higher, informal and non-motorized modes of transport acting as a gap filler by feeding other modes of transport, not by design or choice, but often by lack of accessible and affordable public transport. Yet non-motorized transport is peripheral, with minimal priority in urban planning and investments, lacking of strong polices to support non-motorized transport, for authorities development is associated with technology and motorized transport, and promotion of non-motorized transport may be considered corresponding to development, as well as social stigma against non-motorized transport, as it is seen a travel mode for the poor. Cairo as a city of a developing country, has poor quality infrastructure for non-motorized transport, suffering from absence of dedicated corridors, and when existing they are often encroached for commercial purposes, widening traffic lanes at the expense of sidewalks, absence of footpaths, or being overcrowded, poor lighting, making walking unsafe and yet, lack of financial supply to such facilities as it is often considered beyond city capabilities. This paper will deal with the objective measuring of the built environment relating to walking, in some neighborhoods of new cities around Cairo, In addition to comparing the results of the objective measures of the built environment with the level of self-reported survey. The first paper's objective is to show how the index ‘walkability of community neighborhoods’ works in the contexts in neighborhoods of new cities around Cairo. The procedure of objective measuring is of a high potential to be carried out by using GIS.Keywords: assessing, built environment, Cairo, walkability
Procedia PDF Downloads 3832037 Assessment and Prediction of Vehicular Emissions in Commonwealth Avenue, Quezon City at Various Policy and Technology Scenarios Using Simple Interactive Model (SIM-Air)
Authors: Ria M. Caramoan, Analiza P. Rollon, Karl N. Vergel
Abstract:
The Simple Interactive Models for Better Air Quality (SIM-air) is an integrated approach model that allows the available information to support the integrated urban air quality management. This study utilized the vehicular air pollution information system module of SIM-air for the assessment of vehicular emissions in Commonwealth Avenue, Quezon City, Philippines. The main objective of the study is to assess and predict the contribution of different types of vehicles to the vehicular emissions in terms of PM₁₀, SOₓ, and NOₓ at different policy and technology scenarios. For the base year 2017, the results show vehicular emissions of 735.46 tons of PM₁₀, 108.90 tons of SOₓ, and 2,101.11 tons of NOₓ. Motorcycle is the major source of particulates contributing about 52% of the PM₁₀ emissions. Meanwhile, Public Utility Jeepneys contribute 27% of SOₓ emissions and private cars using gasoline contribute 39% of NOₓ emissions. Ambient air quality monitoring was also conducted in the study area for the standard parameters of PM₁₀, S0₂, and NO₂. Results show an average of 88.11 µg/Ncm, 47.41 µg/Ncm and 22.54 µg/Ncm for PM₁₀, N0₂, and SO₂, respectively, all were within the DENR National Ambient Air Quality Guideline Values. Future emissions of PM₁₀, NOₓ, and SOₓ are estimated at different scenarios. Results show that in the year 2030, PM₁₀ emissions will be increased by 186.2%. NOₓ emissions and SOₓ emissions will also be increased by 38.9% and 5.5%, without the implementation of the scenarios.Keywords: ambient air quality, emissions inventory, mobile air pollution, vehicular emissions
Procedia PDF Downloads 1372036 Mobility and Speciation of Iron in the Alluvial Sheet of Nil River (North-Eastern Algerian)
Authors: S. Benessam, T. H. Debieche, S. Amiour, A. Chine, S. Khelili
Abstract:
Iron is naturally present in groundwater, it comes from the dissolution of the geological formations (clay, schist, mica-schist, gneiss…). Its chemical form and mobility in water are controlled mainly by two physicochemical parameters (Eh and pH). In order to determine its spatiotemporal evolution in groundwater, a two-monthly monitoring of the physicochemical parameters and major elements in the water of the alluvial sheet of Nil river (North-eastern Algerian) was carried out during the period from November 2013 to January 2015. The results show that iron is present in weak concentrations in the upstream part of the alluvial sheet and with raised concentrations, which can exceed the standard of potable drinking water (0.2 mg/L), in the central and downstream parts of the alluvial sheet. This variation of the concentrations is related to the important variation of Eh between the upstream part (200 mV) where the aquiver is unconfined (oxidizing medium) and the central and downstream parts (-100 mV) where the aquifer is confined (reducing medium). Iron in the oxidizing part is presented with the complexes form, where it precipitates or/and adsorbed by the geological formations. On the other hand in the reducing parts, it is released in water. In this study, one will discuss also the mobility and the chemical forms of iron according to the rains and pumping.Keywords: groundwater, iron, mobility, speciation
Procedia PDF Downloads 3342035 Mobility-Aware Relay Selection in Two Hop Unmanned Aerial Vehicles Network
Authors: Tayyaba Hussain, Sobia Jangsher, Saqib Ali, Saqib Ejaz
Abstract:
Unmanned Aerial vehicles (UAV’s) have gained great popularity due to their remoteness, ease of deployment and high maneuverability in different applications like real-time surveillance, image capturing, weather atmospheric studies, disaster site monitoring and mapping. These applications can involve a real-time communication with the ground station. However, altitude and mobility possess a few challenges for the communication. UAV’s at high altitude usually require more transmit power. One possible solution can be with the use of multi hops (UAV’s acting as relays) and exploiting the mobility pattern of the UAV’s. In this paper, we studied a relay (UAV’s acting as relays) selection for a reliable transmission to a destination UAV. We exploit the mobility information of the UAV’s to propose a Mobility-Aware Relay Selection (MARS) algorithm with the objective of giving improved data rates. The results are compared with Non Mobility-Aware relay selection scheme and optimal values. Numerical results show that our proposed MARS algorithm gives 6% better achievable data rates for the mobile UAV’s as compared with Non MobilityAware relay selection scheme. On average a decrease of 20.2% in data rate is achieved with MARS as compared with SDP solver in Yalmip.Keywords: mobility aware, relay selection, time division multiple acess, unmanned aerial vehicle
Procedia PDF Downloads 2382034 Contractors Perspective on Causes of Delays in Power Transmission Projects
Authors: Goutom K. Pall
Abstract:
At the very heart of the power system, power transmission (PT) acts as an essential link between power generation and distribution. Timely completion of PT infrastructures is therefore crucial to support the development of power system as a whole. Yet despite the importance, studies on PT infrastructure development projects are embryonic and, hence, PT projects undergoing widespread delays worldwide. These delay factors are idiosyncratic and identifying the critical delay factors is essential if the PT industry professionals are to complete their projects efficiently and within the expected timeframes. This study identifies and categorizes 46 causes of PT project delay under ten major groups using six sector expert’s recommendations studied by a preliminary questionnaire survey. Based on the experts’ strong recommendations, two new groups are introduced in the final questionnaire survey: sector specific factors (SSF) and general factors (GF). SSF pertain to delay factors applicable only to the PT projects, while GF represents less biased samples with shared responsibilities of all project parties involved in a project. The study then uses 112 data samples from the contractors to rank the delay factors using relative importance index (RII). The results reveal that SSF, GF and external factors are the most critical groups, while the highest ranked delay factors include the right of way (RoW) problems of transmission lines (TL), delay in payments, frequent changes in TL routes, poor communication and coordination among the project parties and accessibility to TL tower locations. Finally, recommendations are made to minimize the identified delay. The findings are expected to be of substantial benefit to professionals in minimizing time overrun in PT projects implementation, as well as power generation, power distribution, and non-power linear construction projects worldwide.Keywords: delay, project delay, power transmission projects, time-overruns
Procedia PDF Downloads 1782033 Research on Container Housing: A New Form of Informal Housing on Urban Temporary Land
Authors: Lufei Mao, Hongwei Chen, Zijiao Chai
Abstract:
Informal housing is a widespread phenomenon in developing countries. In many newly-emerging cities in China, rapid urbanization leads to an influx of population as well as a shortage of housing. Under this background, container housing, a new form of informal housing, gradually appears on a small scale on urban temporary land in recent years. Container housing, just as its name implies, transforms containers into small houses that allow migrant workers group to live in it. Scholars in other countries have established sound theoretical frameworks for informal housing study, but the research fruits seem rather limited on this small scale housing form. Unlike the cases in developed countries, these houses, which are outside urban planning, bring about various environmental, economic, social and governance issues. Aiming to figure out this new-born housing form, a survey mainly on two container housing settlements in Hangzhou, China was carried out to gather the information of them. Based on this thorough survey, the paper concludes the features and problems of infrastructure, environment and social communication of container housing settlements. The result shows that these containers were lacking of basic facilities and were restricted in a small mess temporary land. Moreover, because of the deficiency in management, the rental rights of these containers might not be guaranteed. Then the paper analyzes the factors affecting the formation and evolution of container housing settlements. It turns out that institutional and policy factors, market factors and social factors were the main three factors that affect the formation. At last, the paper proposes some suggestions for the governance of container housing and the utility pattern of urban temporary land.Keywords: container housing, informal housing, urban temporary land, urban governance
Procedia PDF Downloads 2572032 Factors Affecting the Adoption of Cloud Business Intelligence among Healthcare Sector: A Case Study of Saudi Arabia
Authors: Raed Alsufyani, Hissam Tawfik, Victor Chang, Muthu Ramachandran
Abstract:
This study investigates the factors that influence the decision by players in the healthcare sector to embrace Cloud Business Intelligence Technology with a focus on healthcare organizations in Saudi Arabia. To bring this matter into perspective, this study primarily considers the Technology-Organization-Environment (TOE) framework and the Human Organization-Technology (HOT) fit model. A survey was hypothetically designed based on literature review and was carried out online. Quantitative data obtained was processed from descriptive and one-way frequency statistics to inferential and regression analysis. Data were analysed to establish factors that influence the decision to adopt Cloud Business intelligence technology in the healthcare sector. The implication of the identified factors was measured, and all assumptions were tested. 66.70% of participants in healthcare organization backed the intention to adopt cloud business intelligence system. 99.4% of these participants considered security concerns and privacy risk have been the most significant factors in the adoption of cloud Business Intelligence (CBI) system. Through regression analysis hypothesis testing point that usefulness, service quality, relative advantage, IT infrastructure preparedness, organization structure; vendor support, perceived technical competence, government support, and top management support positively and significantly influence the adoption of (CBI) system. The paper presents quantitative phase that is a part of an on-going project. The project will be based on the consequences learned from this study.Keywords: cloud computing, business intelligence, HOT-fit model, TOE, healthcare and innovation adoption
Procedia PDF Downloads 1692031 Radiation Protection Study for the Assessment of Mixed Fields Ionizing Radiation
Authors: Avram Irina, Coiciu Eugenia-Mihaela, Popovici Mara-Georgiana, Mitu Iani Octavian
Abstract:
ELI-NP stands as a cutting-edge facility globally, hosting unique radiological setups. It conducts experiments leveraging high-power lasers capable of producing extremely brief 10 PW pulses on two fronts. Moreover, it houses an exceptional gamma beam system with distinctive spectral characteristics. The facility hosts various experiments across designated experimental areas, encompassing ultra-short high-power laser tests, high-intensity gamma beam trials, and combined experiments utilizing both setups. The facility hosts a dosimetry laboratory, which recently obtained accreditation, where the radiation safety group employs a host of different types of detectors for monitoring the personnel, environment, and public exposure to ionizing radiation generated in experiments performed. ELI-NP's design was shaped by radiological protection assessments conducted through Monte Carlo simulations. The poster exemplifies an assessment conducted using the FLUKA code in an experimental area where a high-power laser system is implemented, and the future diagnostic system for variable energy gamma beams will soon be operational.Keywords: radiation protection, Monte Carlo simulation, FLUKA, dosimetry
Procedia PDF Downloads 742030 Penalization of Transnational Crimes in the Domestic Legal Order: The Case of Poland
Authors: Magda Olesiuk-Okomska
Abstract:
The degree of international interdependence has grown significantly. Poland is a party to nearly 1000 binding multilateral treaties, including international legal instruments devoted to criminal matters and obliging the state to penalize certain crimes. The paper presents results of a theoretical research conducted as a part of doctoral research. The main hypothesis assumed that there was a separate category of crimes to penalization of which Poland was obliged under international legal instruments; that a catalogue of such crimes and a catalogue of international legal instruments providing for Poland’s international obligations had never been compiled in the domestic doctrine, thus there was no mechanism for monitoring implementation of such obligations. In the course of the research, a definition of transnational crimes was discussed and confronted with notions of international crimes, treaty crimes, as well as cross-border crimes. A list of transnational crimes penalized in the Polish Penal Code as well as in non-code criminal law regulations was compiled; international legal instruments, obliging Poland to criminalize and penalize specific conduct, were enumerated and catalogued. It enabled the determination whether Poland’s international obligations were implemented in domestic legislation, as well as the formulation of de lege lata and de lege ferenda postulates. Implemented research methods included inter alia a dogmatic and legal method, an analytical method and desk research.Keywords: international criminal law, transnational crimes, transnational criminal law, treaty crimes
Procedia PDF Downloads 2232029 Settlement Analysis of Axially Loaded Bored Piles: A Case History
Authors: M. Mert, M. T. Ozkan
Abstract:
Pile load tests should be applied to check the bearing capacity calculations and to determine the settlement of the pile corresponding to test load. Strain gauges can be installed into pile in order to determine the shaft resistance of the piles for every soil layer respectively. Detailed results can be obtained by means of strain gauges placed at certain levels into test piles. In the scope of this study, pile load test data obtained from two different projects are examined. Instrumented static pile load tests were applied on totally 7 test bored piles of different diameters (80 cm, 150 cm, and 200 cm) and different lengths (between 30-76 m) in two different project site. Settlement analysis of test piles is done by using some of load transfer methods and finite element method. Plaxis 3D which is a three-dimensional finite element program is also used for settlement analysis of the test piles. In this study, firstly bearing capacity of test piles are determined and compared with strain gauge data which is required for settlement analysis. Then, settlement values of the test piles are estimated by using load transfer methods developed in recent years and finite element method. The aim of this study is to show similarities and differences between the results obtained from settlement analysis methods and instrumented pile load tests.Keywords: failure, finite element method, monitoring and instrumentation, pile, settlement
Procedia PDF Downloads 1672028 Use of Alternative Water Sources Based on a Rainwater in the Multi-Dwelling Urban Building 2030
Authors: Monika Lipska
Abstract:
Drinking water is water with a very high quality, and as such represents only 2.5% of the total quantity of all water in the world. For many years we have observed continuous increase in its consumption as a result of many factors such as: Growing world population (7 billion in 2011r.), increase of human lives comfort and – above all – the economic growth. Due to the rocketing consumption and growing costs of production of water with such high-quality parameters, we experience accelerating interest in alternative sources of obtaining potable water. One of the ways of saving this valuable material is using rainwater in the Urban Building. With an exponentially growing demand, the acquisition of additional sources of water is necessary to maintain the proper balance of all ecosystems. The first part of the paper describes what rainwater is and what are its potential sources and means of use, while the main part of the article focuses on the description of the methods of obtaining water from rain on the example of new urban building in Poland. It describes the method and installations of rainwater in the new urban building (“MBJ2030”). The paper addresses also the issue of monitoring of the whole recycling systems as well as the particular quality indicators important because of identification of the potential risks to human health. The third part describes the legal arrangements concerning the recycling of rainwater existing in different European Union countries with particular reference to Poland on example the new urban building in Warsaw.Keywords: rainwater, potable water, non-potable water, Poland
Procedia PDF Downloads 4142027 Noninvasive Disease Diagnosis through Breath Analysis Using DNA-functionalized SWNT Sensor Array
Authors: W. J. Zhang, Y. Q. Du, M. L. Wang
Abstract:
Noninvasive diagnostics of diseases via breath analysis has attracted considerable scientific and clinical interest for many years and become more and more promising with the rapid advancement in nanotechnology and biotechnology. The volatile organic compounds (VOCs) in exhaled breath, which are mainly blood borne, particularly provide highly valuable information about individuals’ physiological and pathophysiological conditions. Additionally, breath analysis is noninvasive, real-time, painless and agreeable to patients. We have developed a wireless sensor array based on single-stranded DNA (ssDNA)-decorated single-walled carbon nanotubes (SWNT) for the detection of a number of physiological indicators in breath. Eight DNA sequences were used to functionalize SWNT sensors to detect trace amount of methanol, benzene, dimethyl sulfide, hydrogen sulfide, acetone and ethanol, which are indicators of heavy smoking, excessive drinking, and diseases such as lung cancer, breast cancer, cirrhosis and diabetes. Our tests indicated that DNA functionalized SWNT sensors exhibit great selectivity, sensitivity, reproducibility, and repeatability. Furthermore, different molecules can be distinguished through pattern recognition enabled by this sensor array. Thus, the DNA-SWNT sensor array has great potential to be applied in chemical or bimolecular detection for the noninvasive diagnostics of diseases and health monitoring.Keywords: breath analysis, diagnosis, DNA-SWNT sensor array, noninvasive
Procedia PDF Downloads 3482026 The 6Rs of Radiobiology in Photodynamic Therapy: Review
Authors: Kave Moloudi, Heidi Abrahamse, Blassan P. George
Abstract:
Radiotherapy (RT) and photodynamic therapy (PDT) are both forms of cancer treatment that aim to kill cancer cells while minimizing damage to healthy tissue. The similarity between RT and PDT lies in their mechanism of action. Both treatments use energy to damage cancer cells. RT uses high-energy radiation to damage the DNA of cancer cells, while PDT uses light energy to activate a photosensitizing agent, which produces reactive oxygen species (ROS) that damage the cancer cells. Both treatments require careful planning and monitoring to ensure the correct dose is delivered to the tumor while minimizing damage to surrounding healthy tissue. They are also often used in combination with other treatments, such as surgery or chemotherapy, to improve overall outcomes. However, there are also significant differences between RT and PDT. For example, RT is a non-invasive treatment that can be delivered externally or internally, while PDT requires the injection of a photosensitizing agent and the use of a specialized light source to activate it. Additionally, the side effects and risks associated with each treatment can vary. In this review, we focus on generalizing the 6Rs of radiobiology in PDT, which can open a window for the clinical application of Radio-photodynamic therapy with minimum side effects. Furthermore, this review can open new insight to work on and design new radio-photosensitizer agents in Radio-photodynamic therapy.Keywords: radiobiology, photodynamic therapy, radiotherapy, 6Rs in radiobiology, ROS, DNA damages, cellular and molecular mechanism, clinical application.
Procedia PDF Downloads 102