Search results for: Exploitation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 536

Search results for: Exploitation

446 Event Monitoring Based On Web Services for Heterogeneous Event Sources

Authors: Arne Koschel

Abstract:

This article discusses event monitoring options for heterogeneous event sources as they are given in nowadays heterogeneous distributed information systems. It follows the central assumption, that a fully generic event monitoring solution cannot provide complete support for event monitoring; instead, event source specific semantics such as certain event types or support for certain event monitoring techniques have to be taken into account. Following from this, the core result of the work presented here is the extension of a configurable event monitoring (Web) service for a variety of event sources. A service approach allows us to trade genericity for the exploitation of source specific characteristics. It thus delivers results for the areas of SOA, Web services, CEP and EDA.

Keywords: event monitoring, ECA, CEP, SOA, web services

Procedia PDF Downloads 711
445 GPU-Based Back-Projection of Synthetic Aperture Radar (SAR) Data onto 3D Reference Voxels

Authors: Joshua Buli, David Pietrowski, Samuel Britton

Abstract:

Processing SAR data usually requires constraints in extent in the Fourier domain as well as approximations and interpolations onto a planar surface to form an exploitable image. This results in a potential loss of data requires several interpolative techniques, and restricts visualization to two-dimensional plane imagery. The data can be interpolated into a ground plane projection, with or without terrain as a component, all to better view SAR data in an image domain comparable to what a human would view, to ease interpretation. An alternate but computationally heavy method to make use of more of the data is the basis of this research. Pre-processing of the SAR data is completed first (matched-filtering, motion compensation, etc.), the data is then range compressed, and lastly, the contribution from each pulse is determined for each specific point in space by searching the time history data for the reflectivity values for each pulse summed over the entire collection. This results in a per-3D-point reflectivity using the entire collection domain. New advances in GPU processing have finally allowed this rapid projection of acquired SAR data onto any desired reference surface (called backprojection). Mathematically, the computations are fast and easy to implement, despite limitations in SAR phase history data size and 3D-point cloud size. Backprojection processing algorithms are embarrassingly parallel since each 3D point in the scene has the same reflectivity calculation applied for all pulses, independent of all other 3D points and pulse data under consideration. Therefore, given the simplicity of the single backprojection calculation, the work can be spread across thousands of GPU threads allowing for accurate reflectivity representation of a scene. Furthermore, because reflectivity values are associated with individual three-dimensional points, a plane is no longer the sole permissible mapping base; a digital elevation model or even a cloud of points (collected from any sensor capable of measuring ground topography) can be used as a basis for the backprojection technique. This technique minimizes any interpolations and modifications of the raw data, maintaining maximum data integrity. This innovative processing will allow for SAR data to be rapidly brought into a common reference frame for immediate exploitation and data fusion with other three-dimensional data and representations.

Keywords: backprojection, data fusion, exploitation, three-dimensional, visualization

Procedia PDF Downloads 43
444 Combined Power Supply at Well Drilling in Extreme Climate Conditions

Authors: V. Morenov, E. Leusheva

Abstract:

Power supplying of well drilling on oil and gas fields at ambient air low temperatures is characterized by increased requirements of electric and heat energy. Power costs for heating of production facilities, technological and living objects may several times exceed drilling equipment electric power consumption. Power supplying of prospecting and exploitation drilling objects is usually done by means of local electric power structures based on diesel power stations. In the meantime, exploitation of oil fields is accompanied by vast quantities of extracted associated petroleum gas, and while developing gas fields there are considerable amounts of natural gas and gas condensate. In this regard implementation of gas-powered self-sufficient power units functioning on produced crude products for power supplying is seen as most potential. For these purposes gas turbines (GT) or gas reciprocating engines (GRE) may be used. In addition gas-powered units are most efficiently used in cogeneration mode - combined heat and power production. Conducted research revealed that GT generate more heat than GRE while producing electricity. One of the latest GT design are microturbines (MT) - devices that may be efficiently exploited in combined heat and power mode. In conditions of ambient air low temperatures and high velocity wind sufficient heat supplying is required for both technological process, specifically for drilling mud heating, and for maintaining comfortable working conditions at the rig. One of the main heat regime parameters are the heat losses. Due to structural peculiarities of the rig most of the heat losses occur at cold air infiltration through the technological apertures and hatchways and heat transition of isolation constructions. Also significant amount of heat is required for working temperature sustaining of the drilling mud. Violation of circulation thermal regime may lead to ice build-up on well surfaces and ice blockages in armature elements. That is why it is important to ensure heating of the drilling mud chamber according to ambient air temperature. Needed heat power will be defined by heat losses of the chamber. Noting heat power required for drilling structure functioning, it is possible to create combined heat and power complex based on MT for satisfying consumer power needs and at the same time lowering power generation costs. As a result, combined power supplying scheme for multiple well drilling utilizing heat of MT flue gases was developed.

Keywords: combined heat, combined power, drilling, electric supply, gas-powered units, heat supply

Procedia PDF Downloads 557
443 The Integrated Water Management of the Northern Saharan Aquifer System in a Climatic Changes Context

Authors: Mohamed Redha Menani

Abstract:

The Northern Saharan aquifer system “SASS” shared by Algeria, Libya, and Tunisia, covers a surface of about 1 100 000 km². It is composed of superposed aquifers; the upper one is the “Continental terminal – CT” (Eocene calcareous formation) situated at 400 m depth in average, while the” Continental Intercalaire – CI”(clay sands from Albian to Lower Cretaceous) is generally at 1500 m depth. This aquifer system is situated in a dry zone with a very weak current recharge but with a non-renewable big volume stored, estimated between 20 000 and 31 000 km³. From 1970 to nowadays, the exploitation of the SASS has increased from 0.6 to more than 2.5 km³/year. This situation provoked risks of water salinisation, reduction of the artesianisme, an increase of drawdowns, etc. which seriously threaten the sustainable socioeconomic development engaged in the SASS zone. Face the water shortage induced by the alarming dryness noted these last years, particularly in the MENA region, the joint management of this system by the three concerned countries, engaged for many years, needs a long-term strategy of integrated water resources management to meet the expected socio-economic goals projected not only in the SASS zone but also in other places, by water transfers. The sustainable management of this extensive aquifer system, aiming to satisfy various needs not only in the areas covered by the SASS but also in other areas through hydraulic transfers, can only be considered if this management is genuinely coordinated, incorporating schemes that primarily address the major constraint of climate change, which has been observed worldwide over the past two decades and is intensifying. In this particular climate context, management schemes must necessarily target several aspects, including (i) Updating the state of water resource exploitation in the SASS. (ii) Guiding agricultural usage as the primary consumer to ensure significant water savings. (iii) Constant monitoring through a network of piezometers to control the physicochemical parameters of the exploited aquifers. (iv) Other aspects related to governance within the framework of integrated management must also be taken into consideration, particularly environmental aspects and conflict resolution. However, problems, especially political ones as currently seen in Libya, may limit or at least disrupt the prospects of coordinated and sustainable management of this aquifer system, which is vital for the three countries.

Keywords: transboundary water resources, SASS, governance, climatic changes

Procedia PDF Downloads 59
442 Post 2014 Afghanistan and Its Implications on Pakistan

Authors: Naad-E-Ali Sulehria

Abstract:

This paper unfolds the facts and findings of Afghan scenario particularly its implications on Pakistan. At present, the Post 2014 withdrawal of US and ISAF combat forces from Afghan land is one of the up-to-the-minute issues among analysts of international relations. Deliberating from the current situation of Afghanistan towards its future prospects and the elements vibrating Afghanistan's internal dynamics, as well as exploitation of its resources by other states and non-state actors, are discussed accordingly. Moreover, the reasons behind such a paradigm shift in US foreign policy are tried to be contemplated with first hand knowledge. It is investigated that 'what is the current image of Afghanistan in today's world?', 'what will be its future aspects?', and 'what sort of Afghanistan does Pakistan foresees' as the concerned area of discussion.

Keywords: Afghanistan, Pakistan, new great game, taliban

Procedia PDF Downloads 273
441 Liberation as a Method for Monument Valorisation: The Case of the Defence Heritage Restoration

Authors: Donatella R. Fiorino, Marzia Loddo

Abstract:

The practice of freeing monuments from subsequent additions crosses the entire history of conservation and it is traditionally connected to the aim of valorisation, both for cultural and educational purpose and recently even for touristic exploitation. Defence heritage has been widely interested by these cultural and technical moods from philological restoration to critic innovations. A renovated critical analysis of Italian episodes and in particular the Sardinian case of the area of San Pancrazio in Cagliari, constitute an important lesson about the limits of this practice and the uncertainty in terms of results, towards the definition of a sustainable good practice in the restoration of military architectures.

Keywords: defensive architecture, liberation, Valorisation for tourism, historical restoration

Procedia PDF Downloads 305
440 Technological Exploitation and User Experience in Product Innovation: The Case Study of the High-Tech Mask

Authors: Venere Ferraro, Silvia Ferraris

Abstract:

We live in a world pervaded by new advanced technologies that have been changing the way we live and experience the surrounded. Besides, new technologies enable product innovation at different levels. Nevertheless, innovation does not lie just in the technological development and in its hard aspects but also in the meaningful use of it for the final user. In order to generate innovative products, a new perspective is needed: The shift from an instrument-oriented view of the technology towards a broader view that includes aspects like aesthetics, acceptance, comfort, and sociability. In many businesses, the user experience of the product is considered the key battlefield to achieve product innovation. (Holland 2011) The use of new technologies is indeed useless without paying attention to the user experience. This paper presents a workshop activity conducted at Design School of Politecnico di Milano in collaboration with Chiba University and aimed at generating innovative design concepts of high-tech mask. The students were asked to design the user experience of a new mask by exploiting emerging technologies such as wearable sensors and information communication technology (ICT) for a chosen field of application: safety or sport. When it comes to the user experience, the mask is a very challenging design product, because it covers aspects of product interaction and, most important, psychological and cultural aspects related to the impact on the facial expression. Furthermore, since the mask affects the face expression quite a lot, it could be a barrier to hide with, or it could be a mean to enhance user’s communication to others. The main request for the students was to take on a user-centered approach: To go beyond the instrumental aspects of product use and usability and focus on the user experience by shaping the technology in a desirable and meaningful way for the user reasoning on the metaphorical and cultural level of the product. During the one-week workshop students were asked to face the design process through (i) the research phase: an in-deep analysis of the user and field of application (safety or sport) to set design spaces (brief) and user scenario; (ii) the idea generation, (iii) the idea development. This text will shortly go through the meaning of the product innovation, the use and application of wearable technologies and will then focus on the user experience design in contrast with the technology-driven approach in the field of product innovation. Finally authors will describe the workshop activity and the concepts developed by the students stressing the important role of the user experience design in new product development.

Keywords: product innovation, user experience, technological exploitation, wearable technologies

Procedia PDF Downloads 322
439 Book Recommendation Using Query Expansion and Information Retrieval Methods

Authors: Ritesh Kumar, Rajendra Pamula

Abstract:

In this paper, we present our contribution for book recommendation. In our experiment, we combine the results of Sequential Dependence Model (SDM) and exploitation of book information such as reviews, tags and ratings. This social information is assigned by users. For this, we used CLEF-2016 Social Book Search Track Suggestion task. Finally, our proposed method extensively evaluated on CLEF -2015 Social Book Search datasets, and has better performance (nDCG@10) compared to other state-of-the-art systems. Recently we got the good performance in CLEF-2016.

Keywords: sequential dependence model, social information, social book search, query expansion

Procedia PDF Downloads 264
438 Root Causes of Child Labour in Hargeisa, Somaliland

Authors: Abdikarim Yusuf

Abstract:

This study uses data from Somalia to analyse child labour using a descriptive and qualitative method. The study set out to identify root causes of child labour in Hargeisa and its implications for children. The study shows that poverty, droughts, family separation, and loss of properties are primary drivers of child labour in Hargeisa. The study found that children work in very difficult jobs such as car wash, casual work, and shoe shining for boys while girls work as housemaids, selling tea, Khat and sometimes are at risk of exploitation such as sexual abuse, rape and harassment. The majority of the parents responded that they don’t know any policy, act or law that protects children. Men showed greater awareness than the women respondents in recognizing child labour as a child rights violation.

Keywords: abuse, child, violence, protection

Procedia PDF Downloads 122
437 Cultural Heritage Resources for Tourism, Two Countries – Two Approaches: A Comparative Analysis of Cultural Tourism Products in Turkey and Austria

Authors: Irfan Arikan, George Christian Steckenbauer

Abstract:

Turkey and Austria are examples for highly developed tourism destinations, where tourism providers use cultural heritage and regional natural resources to develop modern tourism products in order to be successful on increasingly competitive international tourism markets. The use and exploitation of these resources follow on the one hand international standards of tourism marketing (as ‘sustainability’). Therefore, we find highly comparable internationalized products in these destinations (like hotel products, museums, spas etc.). On the other hand, development standards and processes strongly depend on local, regional and national cultures, which influence the way how people work, cooperate, think and create. Thus, cultural factors also influence the attitude towards cultural heritage and natural resources and the way, how these resources are used for the creation of tourism products. This leads to differences in the development of tourism products on several levels: 1. In the selection of cultural heritage and natural resources for the product development process 2. In the processes, how tourism products are created 3. In the way, how providers and marketing organisations work with tourism products based on cultural heritage or natural resources. Aim of this paper is to discover differences in these dimensions by analysing and comparing examples of tourism products in Turkey and Austria, both countries with a highly developed, high professional tourism industry and rich experience of stakeholders in tourism industry in the field of product development and marketing. The cases are selected from the following fields: + Cultural tourism / heritage tourism + City tourism + Industrial heritage tourism + Nature and outdoor tourism + Health tourism The cases are analysed based on available secondary data (as several cases are scientifically described) and expert interviews with local and regional stakeholders of tourism industry and tourism experts. The available primary and secondary data will be analysed and displayed in a comparative structure that allows to derive answers to the above stated research question. The result of the project therefore will be a more precise picture about the influence of cultural differences on the use and exploitation of resources in the field of tourism that allows developing recommendations for tourism industry, which must be taken into consideration to assure cultural and natural resources are treated in a sustainable and responsible way. The authors will edit these culture-cross recommendations in form of a ‘check-list’ that can be used as a ‘guideline’ for tourism professionals in the field of product development and marketing and therefore connects theoretical research to the field of practical application and closes the gap between academic research and the field of tourism practice.

Keywords: cultural heritage, natural resources, Austria, Turkey

Procedia PDF Downloads 455
436 Scope of Heavy Oil as a Fuel of the Future

Authors: Kiran P. Chadayamuri, Saransh Bagdi

Abstract:

Increasing imbalance between energy supply and demand has made nations and companies involved in the energy sector to boost up their research and find suitable solutions. With the high rates at which conventional oil and gas resources are depleting, efficient exploration and exploitation of heavy oil could just be the answer. Heavy oil may be defined as crude oil having API gravity value of less than 20⁰. They are highly viscous, have low hydrogen to carbon ratios and are known to produce high carbon residues. They have high contents of asphaltenes, heavy metals, sulphur and nitrogen in them. Due to these properties extraction, transportation and refining of crude oil have its share of challenges. Lack of suitable technology has hindered its production in the past, but now things are going in a more positive direction. The aim of this paper is to study the various advantages of heavy oil, associated limitations and its feasibility as a fuel of the future.

Keywords: energy, heavy oil, fuel, future

Procedia PDF Downloads 264
435 The Effect of the Parameters of the Grinding on the Characteristics of the Deposit Phosphate Ore of Kef Es Sennoun, Djebel Onk-Tebessa, Algeria

Authors: N. Benabdeslam, N. Bouzidi, F. Atmani, R. Boucif, A. Sakhri

Abstract:

The objective of this study was to provide answers for a better understanding of the mechanisms involved during grinding. To obtain a phosphate powder, we carry out sieving - grinding circuits for each parameter influencing the process. The analysis of the average particle size of the different tests carried out served in the first place as a basis for the determination of the granulometric curve area, the characteristics and the granular coefficients, then the exploitation of the different results for the calculation of the energies consumed for the fragmentation of different ore types, the energy coefficients as well as the ability to grind. Indeed, a time of 5 to 10 minutes can be chosen as the optimal grinding time in a disc mill for a % in weight of the highest pass. However, grinding time can influence the granular characteristics of ore.

Keywords: characteristic granular, grinding, mineralogical composition, phosphate ore, parameters

Procedia PDF Downloads 178
434 Cybercrime Stage Based Intervention: Through the Eyes of a Cyber Threat Actor

Authors: Jonathan W. Z. Lim, Vrizlynn L. L. Thing

Abstract:

Cybercrimes are on the rise, in part due to technological advancements, as well as increased avenues of exploitation. Sophisticated threat actors are leveraging on such advancements to execute their malicious intentions. The increase in cybercrimes is prevalent, and it seems unlikely that they can be easily eradicated. A more serious concern is that the community may come to accept the notion that this will become the trend. As such, the key question revolves around how we can reduce cybercrime in this evolving landscape. In our paper, we propose to build a systematic framework through the lens of a cyber threat actor. We explore the motivation factors behind the crimes and the crime stages of the threat actors. We then formulate intervention plans so as to discourage the act of committing malicious cyber activities and also aim to integrate ex-cyber offenders back into society.

Keywords: crime motivations, crime prevention, cybercrime, ex-cyber criminals

Procedia PDF Downloads 112
433 Women-Hating Masculinities: How the Demand for Prostitution Fuels Sex Trafficking

Authors: Rosa M. Senent

Abstract:

Over the centuries, prostitution has been problematized from many sides, with women always at the center of the debate. However, prostitution is a gendered, demand-driven phenomenon. Thus, a focus must be put on the men who demand it, as an increasing number of studies have been done in the last few decades. The purpose of this paper is to expose how men's discourse online reveals the link between their demand for paid sex in prostitution and sex trafficking. The methodological tool employed was Critical Discourse Analysis (CDA). A critical analysis of sex buyers' discourse online showed that online communities of sex buyers are a useful tool in researching their behavior towards women, that their knowledge of sex trafficking and exploitation do not work as a deterrent for them to buy sex, and that the type of masculinity that sex buyers endorse is characterized by attitudes linked to the perpetuation of violence against women.

Keywords: masculinities, prostitution, sex trafficking, violence

Procedia PDF Downloads 114
432 Teaching Contemporary Power Distribution and Industrial Networks in Higher Education Vocational Studies

Authors: Rade M. Ciric

Abstract:

The paper shows the development and implementation of the syllabus of the subject 'Distribution and Industrial Networks', attended by the vocational specialist Year 4 students of the Electric Power Engineering study programme at the Higher Education Technical School of Vocational Studies in Novi Sad. The aim of the subject is to equip students with the knowledge necessary for planning, exploitation and management of distributive and industrial electric power networks in an open electricity market environment. The results of the evaluation of educational outcomes on the subject are presented and discussed.

Keywords: engineering education, power distribution network, syllabus implementation, outcome evaluation

Procedia PDF Downloads 375
431 Podemos Party Origin: From Social Protest to Spanish Parliament

Authors: Víctor Manuel Muñoz-Sánchez, Antonio Manuel Pérez-Flores

Abstract:

This paper analyzes the institutionalization of social protest in Spain. In the current crisis Podemos party seems to represent the political positions of the most affected citizens by the economic situation. It studies using quantitative techniques (statistical bivariate analysis), focusing on the exploitation of several bases of statistics data from the Center for Sociological and Research of Spanish Government, 15M movement characterization to its institutionalization in the Podemos party. Making a comparison between the participant's profile by the 15M and the social bases of Podemos votes. Data on the transformation of the socio-demographic profile of the fans, connoisseurs and 15M participants and voters are given.

Keywords: collective action, emerging parties, political parties, social protest

Procedia PDF Downloads 354
430 Anthropomorphism and Its Impact on the Implementation and Perception of AI

Authors: Marie Oldfield

Abstract:

Anthropomorphism is a technique used by humans to make sense of their surroundings. Anthropomorphism is a widely used technique used to influence consumers to purchase goods or services. These techniques can entice consumers into buying something to fulfill a gap or desire in their life, ranging from loneliness to the desire to be exclusive. By manipulating belief systems, consumer behaviour can be exploited. This paper examines a series of studies to show how anthropomorphism can be used as a basis for exploitation. The first set of studies in this paper examines how anthropomorphism is used in marketing and the effects on humans engaging with this technique. The second set of studies examines how humans can be potentially exploited by artificial agents. We then discuss the consequences of this type of activity within the context of dehumanisation. This research has found potential serious consequences for society and humanity, which indicate an urgent need for further research in this area.

Keywords: anthropomorphism, ethics, human-computer interaction, AI

Procedia PDF Downloads 63
429 Environmental Monitoring by Using Unmanned Aerial Vehicle (UAV) Images and Spatial Data: A Case Study of Mineral Exploitation in Brazilian Federal District, Brazil

Authors: Maria De Albuquerque Bercot, Caio Gustavo Mesquita Angelo, Daniela Maria Moreira Siqueira, Augusto Assucena De Vasconcellos, Rodrigo Studart Correa

Abstract:

Mining is an important socioeconomic activity in Brazil although it negatively impacts the environment. Mineral operations cause irreversible changes in topography, removal of vegetation and topsoil, habitat destruction, displacement of fauna, loss of biodiversity, soil erosion, siltation of watercourses and have potential to enhance climate change. Due to the impacts and its pollution potential, mining activity in Brazil is legally subjected to environmental licensing. Unlicensed mining operations or operations that not abide to the terms of an obtained license are taken as environmental crimes in the country. This work reports a case analyzed in the Forensic Institute of the Brazilian Federal District Civil Police. The case consisted of detecting illegal aspects of sand exploitation from a licensed mine in Federal District, nearby Brasilia city. The fieldwork covered an area of roughly 6 ha, which was surveyed with an unmanned aerial vehicle (UAV) (PHANTOM 3 ADVANCED). The overflight with UAV took about 20 min, with maximum flight height of 100 m. 592 UAV georeferenced images were obtained and processed in a photogrammetric software (AGISOFT PHOTOSCAN 1.1.4), which generated a mosaic of geo-referenced images and a 3D model in less than six working hours. The 3D model was analyzed in a forensic software for accurate modeling and volumetric analysis. (MAPTEK I-SITE FORENSIC 2.2). To ensure the 3D model was a true representation of the mine site, coordinates of ten control points and reference measures were taken during fieldwork and compared to respective spatial data in the model. Finally, these spatial data were used for measuring mining area, excavation depth and volume of exploited sand. Results showed that mine holder had not complied with some terms and conditions stated in the granted license, such as sand exploration beyond authorized extension, depth and volume. Easiness, the accuracy and expedition of procedures used in this case highlight the employment of UAV imagery and computational photogrammetry as efficient tools for outdoor forensic exams, especially on environmental issues.

Keywords: computational photogrammetry, environmental monitoring, mining, UAV

Procedia PDF Downloads 287
428 The Ideal for Building Reservior Under the Ground in Mekong Delta in Vietnam

Authors: Huu Hue Van

Abstract:

The Mekong Delta is the region in southwestern Vietnam where the Mekong River approaches and flow into the sea through a network of distributaries. The Climate Change Research Institute at University of Can Tho, in studying the possible consequences of climate change, has predicted that, many provinces in the Mekong Delta will be flooded by the year 2030. The Mekong Delta lacks fresh water in the dry season. Being served for daily life, industry and agriculture in the dry season, the water is mainly taken from layers of soil contained water under the ground (aquifers) depleted water; the water level in aquifers have decreased. Previously, the Mekong Delta can withstand two bad scenarios in the future: 1) The Mekong Delta will be submerged into the sea again: Due to subsidence of the ground (over-exploitation of groundwater), subsidence of constructions because of the low groundwater level (10 years ago, some of constructions were built on the foundation of Melaleuca poles planted in Mekong Delta, Melaleuca poles have to stay in saturated soil layer fully, if not, they decay easyly; due to the top of Melaleuca poles are higher than the groundwater level, the top of Melaleuca poles will decay and cause subsidence); erosion the river banks (because of the hydroelectric dams in the upstream of the Mekong River is blocking the flow, reducing the concentration of suspended substances in the flow caused erosion the river banks) and the delta will be flooded because of sea level rise (climate change). 2) The Mekong Delta will be deserted: People will migrate to other places to make a living because of no planting due to alum capillary (In Mekong Delta, there is a layer of alum soil under the ground, the elevation of groundwater level is lower than the the elevation of layer of alum soil, alum will be capillary to the arable soil layer); there is no fresh water for cultivation and daily life (because of saline intrusion and groundwater depletion in the aquifers below). Mekong Delta currently has about seven aquifers below with a total depth about 500 m. The water mainly has exploited in the middle - upper Pleistocene aquifer (qp2-3). The major cause of two bad scenarios in the future is over-exploitation of water in aquifers. Therefore, studying and building water reservoirs in seven aquifers will solve many pressing problems such as preventing subsidence, providing water for the whole delta, especially in coastal provinces, favorable to nature, saving land ( if we build the water lake on the surface of the delta, we will need a lot of land), pollution limitation (because when building some hydraulic structures for preventing the salt instrutions and for storing water in the lake on the surface, we cause polluted in the lake)..., It is necessary to build a reservoir under the ground in aquifers in the Mekong Delta. The super-sized reservoir will contribute to the existence and development of the Mekong Delta.

Keywords: aquifers, aquifers storage, groundwater, land subsidence, underground reservoir

Procedia PDF Downloads 58
427 Nineteenth Century Colonial Discourse and Marxist Theory

Authors: Nikolaos Mavropoulos

Abstract:

Imperialism and colonialism had and still have a predominantly negative nuisance. In many ways the two terms are synonyms of racist behavior, exploitation, and oppression, imposed by the supposedly civilized West at Africa’s and Asia’s expense. Paradoxically enough, imperialism was not thoroughly negative for some Marxist scholars. For them, in reality, it served a historical necessity as the only mean to liberate the backward societies from their millennial stagnation and to introduce them to industrialization and progress. To Marx as immoral and cruel the imposition of imperial rule and the eradication of traditional structures may have been, the process is still a progressive step towards the formation of class consciousness, global revolution and socialism in a world scale. Overlooking the fact that imperialism could actually delay and put an end to capitalist development, some Marxists proponents considered it as a positive development for the colonized peoples.

Keywords: Colonialism, , Marxist theory, Modern history, , 19th century Imperialism,

Procedia PDF Downloads 97
426 A Review Paper for Detecting Zero-Day Vulnerabilities

Authors: Tshegofatso Rambau, Tonderai Muchenje

Abstract:

Zero-day attacks (ZDA) are increasing day by day; there are many vulnerabilities in systems and software that date back decades. Companies keep discovering vulnerabilities in their systems and software and work to release patches and updates. A zero-day vulnerability is a software fault that is not widely known and is unknown to the vendor; attackers work very quickly to exploit these vulnerabilities. These are major security threats with a high success rate because businesses lack the essential safeguards to detect and prevent them. This study focuses on the factors and techniques that can help us detect zero-day attacks. There are various methods and techniques for detecting vulnerabilities. Various companies like edges can offer penetration testing and smart vulnerability management solutions. We will undertake literature studies on zero-day attacks and detection methods, as well as modeling approaches and simulations, as part of the study process.

Keywords: zero-day attacks, exploitation, vulnerabilities

Procedia PDF Downloads 71
425 Novel GPU Approach in Predicting the Directional Trend of the S&P500

Authors: A. J. Regan, F. J. Lidgey, M. Betteridge, P. Georgiou, C. Toumazou, K. Hayatleh, J. R. Dibble

Abstract:

Our goal is development of an algorithm capable of predicting the directional trend of the Standard and Poor’s 500 index (S&P 500). Extensive research has been published attempting to predict different financial markets using historical data testing on an in-sample and trend basis, with many authors employing excessively complex mathematical techniques. In reviewing and evaluating these in-sample methodologies, it became evident that this approach was unable to achieve sufficiently reliable prediction performance for commercial exploitation. For these reasons, we moved to an out-of-sample strategy based on linear regression analysis of an extensive set of financial data correlated with historical closing prices of the S&P 500. We are pleased to report a directional trend accuracy of greater than 55% for tomorrow (t+1) in predicting the S&P 500.

Keywords: financial algorithm, GPU, S&P 500, stock market prediction

Procedia PDF Downloads 324
424 The Exploitation of Balancing an Inverted Pendulum System Using Sliding Mode Control

Authors: Sheren H. Salah, Ahmed Y. Ben Sasi

Abstract:

The inverted pendulum system is a classic control problem that is used in universities around the world. It is a suitable process to test prototype controllers due to its high non-linearities and lack of stability. The inverted pendulum represents a challenging control problem, which continually moves toward an uncontrolled state. This paper presents the possibility of balancing an inverted pendulum system using sliding mode control (SMC). The goal is to determine which control strategy delivers better performance with respect to pendulum’s angle and cart's position. Therefore, proportional-integral-derivative (PID) is used for comparison. Results have proven SMC control produced better response compared to PID control in both normal and noisy systems.

Keywords: inverted pendulum (IP), proportional-integral derivative (PID), sliding mode control (SMC), systems and control engineering

Procedia PDF Downloads 556
423 Risks in Forestry Operations, Analysis of Fatal Accidents

Authors: Rino Gubiani, Gianfranco Pergher

Abstract:

The work focused on the statistical analysis of accidents in the forestry sector (2000-2020) in Friuli-Venezia Giulia region, located in the North-East of Italy. The aim of the work was to analyse the evolution of the casualties throughout time and to evaluate possible improvements in the sector. It was shown that even nowadays the rate of accidents in forestry work is higher compared with all the other sectors, including agriculture; moreover, it was highlighted that some accidents remained present throughout the whole analysed range, such as slipping on the soil, being hit by trees and falling down from the plants. The results showed that an increase in forestry exploitation could even increase the total number of accidents, if advanced technological machines, such as cable cranes, would not implemented, given the fact that there is also a significant number of old people (above 50 years old) working in the sector.

Keywords: safety, forestry work, accidents, risk analysis, casualties, statistical analysis

Procedia PDF Downloads 107
422 Entrepreneurship and the Discovery and Exploitation of Business Opportunities: Empirical Evidence from the Malawian Tourism Sector

Authors: Aravind Mohan Krishnan

Abstract:

This paper identifies a research gap in the literature on tourism entrepreneurship in Malawi, Africa, and investigates how entrepreneurs from the Malawian tourism sector discover and exploit business opportunities. In particular, the importance of prior experience and business networks in the opportunity development process is debated. Another area of empirical research examined here is the opportunity recognition-venture creation sequence. While Malawi presents fruitful business opportunities, exploiting these opportunities into fully realized business ideas is a real challenge due to the country’s difficult business environment and poor promotional and marketing efforts. The study concludes by calling for further research in Sub-Saharan Africa in order to develop our understanding of entrepreneurship in this (African) context.

Keywords: entrepreneurship, Malawi, opportunities, tourism

Procedia PDF Downloads 306
421 Experimental Assessment of Alkaline Leaching of Lepidolite

Authors: António Fiúza, Aurora Futuro, Joana Monteiro, Joaquim Góis

Abstract:

Lepidolite is an important lithium mineral that, to the author’s best knowledge, has not been used to produce lithium hydroxide, which is necessary for energy conversion to electric vehicles. Alkaline leaching of lithium concentrates allows the establishment of a production diagram avoiding most of the environmental drawbacks that are associated with the usage of acid reagents. The tested processes involve a pretreatment by digestion at high temperatures with additives, followed by leaching at hot atmospheric pressure. The solutions obtained must be compatible with solutions from the leaching of spodumene concentrates, allowing the development of a common treatment diagram, an important accomplishment for the feasible exploitation of Portuguese resources. Statistical programming and interpretation techniques minimize the laboratory effort required by conventional approaches and allow phenomenological comprehension.

Keywords: alkaline leaching, lithium, research design, statistical interpretation

Procedia PDF Downloads 57
420 Movie and Theater Marketing Using the Potentials of Social Networks

Authors: Seyed Reza Naghibulsadat

Abstract:

The nature of communication includes various forms of media productions, which include film and theater. In the current situation, since social networks have emerged, they have brought their own communication capabilities and have features that show speed, public access, lack of media organization and the production of extensive content, and the development of critical thinking; Also, they contain capabilities to develop access to all kinds of media productions, including movies and theater shows; Of course, this works differently in different conditions and communities. In terms of the scale of exploitation, the film has a more general audience, and the theater has a special audience. The film industry is more developed based on more modern technologies, but the theater, based on the older ways of communication, contains more intimate and emotional aspects. ; But in general, the main focus is the development of access to movies and theater shows, which is emphasized by those involved in this field due to the capabilities of social networks. In this research, we will look at these 2 areas and the relevant components for both areas through social networks and also the common points of both types of media production. The main goal of this research is to know the strengths and weaknesses of using social networks for the marketing of movies and theater shows and, at the same time are, also considered the opportunities and threats of this field. The attractions of these two types of media production, with the emergence of social networks, and the ability to change positions, can provide the opportunity to become a media with greater exploitation and higher profitability; But the main consideration is the opinions about these capabilities and the ability to use them for film and theater marketing. The main question of the research is, what are the marketing components for movies and theaters using social media capabilities? What are its strengths and weaknesses? And what opportunities and threats are facing this market? This research has been done with two methods SWOT and meta-analysis. Non-probability sampling has been used with purposeful technique. The results show that a recent approach is an approach based on eliminating threats and weaknesses and emphasizing strengths, and exploiting opportunities in the direction of developing film and theater marketing based on the capabilities of social networks within the framework of local cultural values and presenting achievements on an international scale or It is universal. This introduction leads to the introduction of authentic Iranian culture and foreign enthusiasts in the framework of movies and theater art. Therefore, for this issue, the model for using the capabilities of social networks for movie or theater marketing, according to the results obtained from Respondents, is a model based on SO strategies and, in other words, offensive strategies so that it can take advantage of the internal strengths and made maximum use of foreign situations and opportunities to develop the use of movies and theater performances.

Keywords: marketing, movies, theatrical show, social network potentials

Procedia PDF Downloads 48
419 Development of a Catalogs System for Augmented Reality Applications

Authors: J. Ierache, N. A. Mangiarua, S. A. Bevacqua, N. N. Verdicchio, M. E. Becerra, D. R. Sanz, M. E. Sena, F. M. Ortiz, N. D. Duarte, S. Igarza

Abstract:

Augmented Reality is a technology that involves the overlay of virtual content, which is context or environment sensitive, on images of the physical world in real time. This paper presents the development of a catalog system that facilitates and allows the creation, publishing, management and exploitation of augmented multimedia contents and Augmented Reality applications, creating an own space for anyone that wants to provide information to real objects in order to edit and share it then online with others. These spaces would be built for different domains without the initial need of expert users. Its operation focuses on the context of Web 2.0 or Social Web, with its various applications, developing contents to enrich the real context in which human beings act permitting the evolution of catalog’s contents in an emerging way.

Keywords: augmented reality, catalog system, computer graphics, mobile application

Procedia PDF Downloads 328
418 Innovations in the Lithium Chain Value

Authors: Fiúza A., Góis J. Leite M., Braga H., Lima A., Jorge P., Moutela P., Martins L., Futuro A.

Abstract:

Lepidolite is an important lithium mineral that, to the author’s best knowledge, has not been used to produce lithium hydroxide, necessary for energy conversion to electric vehicles. Alkaline leaching of lithium concentrates allows the establishment of a production diagram avoiding most of the environmental drawbacks that are associated with the usage of acid reagents. The tested processes involve a pretreatment by digestion at high temperatures with additives, followed by leaching at hot atmospheric pressure. The solutions obtained must be compatible with solutions from the leaching of spodumene concentrates, allowing the development of a common treatment diagram, an important accomplishment for the feasible exploitation of Portuguese resources. Statistical programming and interpretation techniques are used to minimize the laboratory effort required by conventional approaches and also allow phenomenological comprehension.

Keywords: artificial intelligence, tailings free process, ferroelectric electrolyte battery, life cycle assessment

Procedia PDF Downloads 94
417 Legal Considerations in Fashion Modeling: Protecting Models' Rights and Ensuring Ethical Practices

Authors: Fatemeh Noori

Abstract:

The fashion industry is a dynamic and ever-evolving realm that continuously shapes societal perceptions of beauty and style. Within this industry, fashion modeling plays a crucial role, acting as the visual representation of brands and designers. However, behind the glamorous façade lies a complex web of legal considerations that govern the rights, responsibilities, and ethical practices within the field. This paper aims to explore the legal landscape surrounding fashion modeling, shedding light on key issues such as contract law, intellectual property, labor rights, and the increasing importance of ethical considerations in the industry. Fashion modeling involves the collaboration of various stakeholders, including models, designers, agencies, and photographers. To ensure a fair and transparent working environment, it is imperative to establish a comprehensive legal framework that addresses the rights and obligations of each party involved. One of the primary legal considerations in fashion modeling is the contractual relationship between models and agencies. Contracts define the terms of engagement, including payment, working conditions, and the scope of services. This section will delve into the essential elements of modeling contracts, the negotiation process, and the importance of clarity to avoid disputes. Models are not just individuals showcasing clothing; they are integral to the creation and dissemination of artistic and commercial content. Intellectual property rights, including image rights and the use of a model's likeness, are critical aspects of the legal landscape. This section will explore the protection of models' image rights, the use of their likeness in advertising, and the potential for unauthorized use. Models, like any other professionals, are entitled to fair and ethical treatment. This section will address issues such as working conditions, hours, and the responsibility of agencies and designers to prioritize the well-being of models. Additionally, it will explore the global movement toward inclusivity, diversity, and the promotion of positive body image within the industry. The fashion industry has faced scrutiny for perpetuating harmful standards of beauty and fostering a culture of exploitation. This section will discuss the ethical responsibilities of all stakeholders, including the promotion of diversity, the prevention of exploitation, and the role of models as influencers for positive change. In conclusion, the legal considerations in fashion modeling are multifaceted, requiring a comprehensive approach to protect the rights of models and ensure ethical practices within the industry. By understanding and addressing these legal aspects, the fashion industry can create a more transparent, fair, and inclusive environment for all stakeholders involved in the art of modeling.

Keywords: fashion modeling contracts, image rights in modeling, labor rights for models, ethical practices in fashion, diversity and inclusivity in modeling

Procedia PDF Downloads 38