Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4644

Search results for: computer operating principle

4644 Parental Separation and 'the Best Interests of the Child' at International Law: Guidance for Nation States in the 21st Century

Authors: Cassandra Seery


During the twentieth century, the notion of child rights at the international level began with the League of Nations’ Geneva Declaration of the Rights of the Child 1924, culminating in the development and adoption of the UN Convention on the Rights of the Child (‘the Convention’) in 1989. A key foundation of child rights lies in the development of the ‘best interests of the child’ principle and its subsequent incorporation into domestic legislation across the globe. This principle has become a key concept in child rights protection and has become a widely recognized principle in the protection of child rights. However, despite its status as the primary operating standard in child and family law and its ‘deepening hold in domestic and international instruments’, the meaning of the ‘best interests of the child’ principle has been criticised as open-ended and vague. This paper explores the evolution and development of the principle in the context of parental separation at international law throughout the 21st century and identifies opportunities for the Nation States to further improve legislative responses in associated child protection cases. An extensive review of relevant United Nations documentation (including instruments, resolutions and comments, jurisprudence, reports, guidelines and policies, training materials and so forth) explores: (i) what progress has been made to further develop the principle at the international level with regard to parental separation; and (ii) what developments participating the Nation States should consider as part of future legal and social policy reforms in this space. It will highlight opportunities for improvement and explore the benefit and relevance of international approaches for the Nation States moving forward.

Keywords: international human rights, best interests of the child, legal and social policy, child rights

Procedia PDF Downloads 186
4643 Developing Rice Disease Analysis System on Mobile via iOS Operating System

Authors: Rujijan Vichivanives, Kittiya Poonsilp, Canasanan Wanavijit


This research aims to create mobile tools to analyze rice disease quickly and easily. The principle of object-oriented software engineering and objective-C language were used for software development methodology and the principle of decision tree technique was used for analysis method. Application users can select the features of rice disease or the color appears on the rice leaves for recognition analysis results on iOS mobile screen. After completing the software development, unit testing and integrating testing method were used to check for program validity. In addition, three plant experts and forty farmers have been assessed for usability and benefit of this system. The overall of users’ satisfaction was found in a good level, 57%. The plant experts give a comment on the addition of various disease symptoms in the database for more precise results of the analysis. For further research, it is suggested that image processing system should be developed as a tool that allows users search and analyze for rice diseases more convenient with great accuracy.

Keywords: rice disease, data analysis system, mobile application, iOS operating system

Procedia PDF Downloads 222
4642 Experimental Investigation on the Optimal Operating Frequency of a Thermoacoustic Refrigerator

Authors: Kriengkrai Assawamartbunlue, Channarong Wantha


This paper presents the effects of the mean operating pressure on the optimal operating frequency based on temperature differences across stack ends in a thermoacoustic refrigerator. In addition to the length of the resonance tube, components of the thermoacoustic refrigerator have an influence on the operating frequency due to their acoustic properties, i.e. absorptivity, reflectivity and transmissivity. The interference of waves incurs and distorts the original frequency generated by the driver so that the optimal operating frequency differs from the designs. These acoustic properties are not parameters in the designs and it is very complicated to infer their responses. A prototype thermoacoustic refrigerator is constructed and used to investigate its optimal operating frequency compared to the design at various operating pressures. Helium and air are used as working fluids during the experiments. The results indicate that the optimal operating frequency of the prototype thermoacoustic refrigerator using helium is at 6 bar and 490Hz or approximately 20% away from the design frequency. The optimal operating frequency at other mean pressures differs from the design in an unpredictable manner, however, the optimal operating frequency and pressure can be identified by testing.

Keywords: acoustic properties, Carnot’s efficiency, interference of waves, operating pressure, optimal operating frequency, stack performance, standing wave, thermoacoustic refrigerator

Procedia PDF Downloads 407
4641 Linux Security Management: Research and Discussion on Problems Caused by Different Aspects

Authors: Ma Yuzhe, Burra Venkata Durga Kumar


The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues.

Keywords: Linux, operating system, system management, security

Procedia PDF Downloads 7
4640 Sustainable Development: The Human Rights Approach to Environmental Protection in South Africa

Authors: CM van der Bank, Marjoné van der Bank


International and domestic environmental law has evolved quite rapidly in the last few decades. At the international level the Stockholm and Rio Declarations paved the way for a broad based consensus of the international community on environmental issues and principles. At the Domestic level also many states have incorporated environmental protection in their constitutions and even more states are doing the same at least in their domestic legislations. In this process of evolution environmental law has unleashed a number of novel principles such as; the participatory principle, the polluter pays principle, the precautionary principle, the inter-generational and intra-generational principles, the prevention principle, the sustainable development principle and so on.

Keywords: environment, human rights, international law, protection

Procedia PDF Downloads 393
4639 The Standard of Best Interest of the Child in Custody Adjudication under the Malaysian Laws

Authors: Roslina Che Soh


Best interest of the child has been the prevailing principle of the custody legislations of most nations in the world. The tremendous shift from parental rights to parental responsibilities throughout the centuries had made the principle of best interests of the child as the utmost matter which parents must uphold in child upbringing. Despite the commitment to this principle is significantly enshrined in the United Nation Convention on Rights of the Child, the content and application of the principle differs across borders. Differences persist notwithstanding many countries have experienced a substantial shift over the last several decades in the types of custodial arrangements that are thought to best serve children’s interests. The laws in Malaysia similarly uphold this principle but do not provide further deliberation on the principle itself. The principle is entirely developed by the courts through decided cases. Thus, this paper seeks to discuss the extent of the application of best interest of the child principle in custody disputes. In doing so, it attempts to provide an overview of the current laws and the approach of the Civil and the Shariah courts in Malaysia in applying the principle in determining custody disputes. For purposes of comparison, it briefly examines the legislations and the courts practices in Australia and England on this matter. The purpose is to determine the best standard to be adopted by Malaysia and to propose improvement to the laws whenever appropriate.

Keywords: child custody, best interest, Malaysian law, bioinformatics, biomedicine

Procedia PDF Downloads 203
4638 Introducing the Accounting Reform of Public Finance in the Czech Republic

Authors: M. Otrusinova, E. Pastuszkova


The article is addressing the currently ongoing reform processes of transforming the public finance accounting based on cash flow principle to accrual principle. The presented analysis concerns the issues associated with the introduction of the state accounting from the perspective of municipal employees in compiling the opinions of financial experts in conditions of the Czech Republic. The aim of this paper is to present outcomes of analysis focused on currently discussed topics which are related to introducing the accrual principle into accounting of selected entities, especially municipalities and municipality-funded institutions. The output of the paper consists of comparing the application of the accrual principle in the financial reporting of municipalities in the Czech Republic and Slovakia. In conclusion and based on the survey, respondents from Slovak municipalities that have already adopted the accrual accounting principle show better opinion than Czech municipalities.

Keywords: accrual principle, accounting, accounting reform, Czech Republic, municipalities, public finance

Procedia PDF Downloads 191
4637 A Development of Personalized Edutainment Contents through Storytelling

Authors: Min Kyeong Cha, Ju Yeon Mun, Seong Baeg Kim


Recently, ‘play of learning’ became important and is emphasized as a useful learning tool. Therefore, interest in edutainment contents is growing. Storytelling is considered first as a method that improves the transmission of information and learner's interest when planning edutainment contents. In this study, we designed edutainment contents in the form of an adventure game that applies the storytelling method. This content provides questions and items constituted dynamically and reorganized learning contents through analysis of test results. It allows learners to solve various questions through effective iterative learning. As a result, the learners can reach mastery learning.

Keywords: storytelling, edutainment, mastery learning, computer operating principle

Procedia PDF Downloads 242
4636 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology

Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar


The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.

Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology

Procedia PDF Downloads 7
4635 Expert System: Debugging Using MD5 Process Firewall

Authors: C. U. Om Kumar, S. Kishore, A. Geetha


An Operating system (OS) is software that manages computer hardware and software resources by providing services to computer programs. One of the important user expectations of the operating system is to provide the practice of defending information from unauthorized access, disclosure, modification, inspection, recording or destruction. Operating system is always vulnerable to the attacks of malwares such as computer virus, worm, Trojan horse, backdoors, ransomware, spyware, adware, scareware and more. And so the anti-virus software were created for ensuring security against the prominent computer viruses by applying a dictionary based approach. The anti-virus programs are not always guaranteed to provide security against the new viruses proliferating every day. To clarify this issue and to secure the computer system, our proposed expert system concentrates on authorizing the processes as wanted and unwanted by the administrator for execution. The Expert system maintains a database which consists of hash code of the processes which are to be allowed. These hash codes are generated using MD5 message-digest algorithm which is a widely used cryptographic hash function. The administrator approves the wanted processes that are to be executed in the client in a Local Area Network by implementing Client-Server architecture and only the processes that match with the processes in the database table will be executed by which many malicious processes are restricted from infecting the operating system. The add-on advantage of this proposed Expert system is that it limits CPU usage and minimizes resource utilization. Thus data and information security is ensured by our system along with increased performance of the operating system.

Keywords: virus, worm, Trojan horse, back doors, Ransomware, Spyware, Adware, Scareware, sticky software, process table, MD5, CPU usage and resource utilization

Procedia PDF Downloads 332
4634 Water Distribution Uniformity of Solid-Set Sprinkler Irrigation under Low Operating Pressure

Authors: Manal Osman


Sprinkler irrigation system became more popular to reduce water consumption and increase irrigation efficiency. The water distribution uniformity plays an important role in the performance of the sprinkler irrigation system. The use of low operating pressure instead of high operating pressure can be achieved many benefits including energy and water saving. An experimental study was performed to investigate the water distribution uniformity of the solid-set sprinkler irrigation system under low operating pressure. Different low operating pressures (62, 82, 102 and 122 kPa) were selected. The range of operating pressure was lower than the recommended in the previous studies to investigate the effect of low pressure on the water distribution uniformity. Different nozzle diameters (4, 5, 6 and 7 mm) were used. The outdoor single sprinkler test was performed. The water distribution of single sprinkler, the coefficients of uniformity such as coefficient of uniformity (CU), distribution uniformity of low quarter (DUlq), distribution uniformity of low half (DUlh), coefficient of variation (CV) and the distribution characteristics like rotation speed, throw radius and overlapping distance are presented in this paper.

Keywords: low operating pressure, sprinkler irrigation system, water distribution uniformity

Procedia PDF Downloads 485
4633 The Size Effects of Keyboards (Keycaps) on Computer Typing Tasks

Authors: Chih-Chun Lai, Jun-Yu Wang


The keyboard is the most important equipment for computer tasks. However, improper design of keyboard would cause some symptoms like ulnar and/or radial deviations. The research goal of this study was to investigate the optimal size(s) of keycaps to increase efficiency. As shown in the questionnaire pre-study with 49 participants aged from 20 to 44, the most commonly used keyboards were 101-key standard keyboards. Most of the keycap sizes (W × L) were 1.3 × 1.5 cm and 1.5 × 1.5 cm. The fingertip breadths of most participants were 1.2 cm. Therefore, in the main study with 18 participants, a standard keyboard with each set of the 3-sized (1.2 × 1.4 cm, 1.3 × 1.5 cm, and 1.5 × 1.5 cm) keycaps was used to investigate their typing efficiency, respectively. The results revealed that the differences between the operating times for using 1.3 × 1.5 cm and 1.2 × 1.4 cm keycaps were insignificant while operating times for using 1.5 × 1.5 cm keycaps were significantly longer than for using 1.2 × 1.4 cm or 1.3 × 1.5 cm, respectively. As for the typing error rate, there was no significant difference.

Keywords: keyboard, keycap size, typing efficiency, computer tasks

Procedia PDF Downloads 321
4632 Operating Speed Models on Tangent Sections of Two-Lane Rural Roads

Authors: Dražen Cvitanić, Biljana Maljković


This paper presents models for predicting operating speeds on tangent sections of two-lane rural roads developed on continuous speed data. The data corresponds to 20 drivers of different ages and driving experiences, driving their own cars along an 18 km long section of a state road. The data were first used for determination of maximum operating speeds on tangents and their comparison with speeds in the middle of tangents i.e. speed data used in most of operating speed studies. Analysis of continuous speed data indicated that the spot speed data are not reliable indicators of relevant speeds. After that, operating speed models for tangent sections were developed. There was no significant difference between models developed using speed data in the middle of tangent sections and models developed using maximum operating speeds on tangent sections. All developed models have higher coefficient of determination then models developed on spot speed data. Thus, it can be concluded that the method of measuring has more significant impact on the quality of operating speed model than the location of measurement.

Keywords: operating speed, continuous speed data, tangent sections, spot speed, consistency

Procedia PDF Downloads 369
4631 TACTICAL: Ram Image Retrieval in Linux Using Protected Mode Architecture’s Paging Technique

Authors: Sedat Aktas, Egemen Ulusoy, Remzi Yildirim


This article explains how to get a ram image from a computer with a Linux operating system and what steps should be followed while getting it. What we mean by taking a ram image is the process of dumping the physical memory instantly and writing it to a file. This process can be likened to taking a picture of everything in the computer’s memory at that moment. This process is very important for tools that analyze ram images. Volatility can be given as an example because before these tools can analyze ram, images must be taken. These tools are used extensively in the forensic world. Forensic, on the other hand, is a set of processes for digitally examining the information on any computer or server on behalf of official authorities. In this article, the protected mode architecture in the Linux operating system is examined, and the way to save the image sample of the kernel driver and system memory to disk is followed. Tables and access methods to be used in the operating system are examined based on the basic architecture of the operating system, and the most appropriate methods and application methods are transferred to the article. Since there is no article directly related to this study on Linux in the literature, it is aimed to contribute to the literature with this study on obtaining ram images. LIME can be mentioned as a similar tool, but there is no explanation about the memory dumping method of this tool. Considering the frequency of use of these tools, the contribution of the study in the field of forensic medicine has been the main motivation of the study due to the intense studies on ram image in the field of forensics.

Keywords: linux, paging, addressing, ram-image, memory dumping, kernel modules, forensic

Procedia PDF Downloads 0
4630 Max-Entropy Feed-Forward Clustering Neural Network

Authors: Xiaohan Bookman, Xiaoyan Zhu


The outputs of non-linear feed-forward neural network are positive, which could be treated as probability when they are normalized to one. If we take Entropy-Based Principle into consideration, the outputs for each sample could be represented as the distribution of this sample for different clusters. Entropy-Based Principle is the principle with which we could estimate the unknown distribution under some limited conditions. As this paper defines two processes in Feed-Forward Neural Network, our limited condition is the abstracted features of samples which are worked out in the abstraction process. And the final outputs are the probability distribution for different clusters in the clustering process. As Entropy-Based Principle is considered into the feed-forward neural network, a clustering method is born. We have conducted some experiments on six open UCI data sets, comparing with a few baselines and applied purity as the measurement. The results illustrate that our method outperforms all the other baselines that are most popular clustering methods.

Keywords: feed-forward neural network, clustering, max-entropy principle, probabilistic models

Procedia PDF Downloads 314
4629 Donoho-Stark’s and Hardy’s Uncertainty Principles for the Short-Time Quaternion Offset Linear Canonical Transform

Authors: Mohammad Younus Bhat


The quaternion offset linear canonical transform (QOLCT), which isa time-shifted and frequency-modulated version of the quaternion linear canonical transform (QLCT), provides a more general framework of most existing signal processing tools. For the generalized QOLCT, the classical Heisenberg’s and Lieb’s uncertainty principles have been studied recently. In this paper, we first define the short-time quaternion offset linear canonical transform (ST-QOLCT) and drive its relationship with the quaternion Fourier transform (QFT). The crux of the paper lies in the generalization of several well-known uncertainty principles for the ST-QOLCT, including Donoho-Stark’s uncertainty principle, Hardy’s uncertainty principle, Beurling’s uncertainty principle, and the logarithmic uncertainty principle.

Keywords: Quaternion Fourier transform, Quaternion offset linear canonical transform, short-time quaternion offset linear canonical transform, uncertainty principle

Procedia PDF Downloads 94
4628 The Effect of Applying Surgical Safety Checklist on Surgical Team’s Knowledge and Performance in Operating Room

Authors: Soheir Weheida, Amal E. Shehata, Samira E. Aboalizm


The aim of this study was to examine the effect of surgical safety checklist on surgical team’s knowledge and performance in operating room. Subjects: A convenience sample 151 (48 head nurse, 45 nurse, 37 surgeon and 21 anesthesiologist) which available in operating room at two different hospitals was included in the study. Setting: The study was carried out at operating room in Menoufia University and Shebin Elkom Teaching Hospitals, Egypt. Tools: I: Surgical safety: Surgical team knowledge assessment structure interview schedule. II: WHO surgical safety observational Checklist. III: Post Surgery Culture Survey scale. Results: There was statistical significant improvement of knowledge mean score and performance about surgical safety especially in post and follow up than pre intervention, before patients entering the operating, before induction of anesthesia, skin incision and post skin closure and before patient leaves operating room, P values (P < 0.001). Improvement of communication post intervention than pre intervention between surgical team’s (4.74 ± 0.540). About two thirds (73.5 %) of studied sample strongly agreed on surgical safety in operating room. Conclusions: Implementation of surgical safety checklist has a positive effect on improving knowledge, performance and communication between surgical teams and these seems to have a positive effect on improve patient safety in the operating room.

Keywords: knowledge, operating room, performance, surgical safety checklist

Procedia PDF Downloads 258
4627 Margin-Based Feed-Forward Neural Network Classifiers

Authors: Xiaohan Bookman, Xiaoyan Zhu


Margin-Based Principle has been proposed for a long time, it has been proved that this principle could reduce the structural risk and improve the performance in both theoretical and practical aspects. Meanwhile, feed-forward neural network is a traditional classifier, which is very hot at present with a deeper architecture. However, the training algorithm of feed-forward neural network is developed and generated from Widrow-Hoff Principle that means to minimize the squared error. In this paper, we propose a new training algorithm for feed-forward neural networks based on Margin-Based Principle, which could effectively promote the accuracy and generalization ability of neural network classifiers with less labeled samples and flexible network. We have conducted experiments on four UCI open data sets and achieved good results as expected. In conclusion, our model could handle more sparse labeled and more high-dimension data set in a high accuracy while modification from old ANN method to our method is easy and almost free of work.

Keywords: Max-Margin Principle, Feed-Forward Neural Network, classifier, structural risk

Procedia PDF Downloads 256
4626 Operating Model of Obstructive Sleep Apnea Patients in North Karelia Central Hospital

Authors: L. Korpinen, T. Kava, I. Salmi


This study aimed to describe the operating model of obstructive sleep apnea. Due to the large number of patients, the role of nurses in the diagnosis and treatment of sleep apnea was important. Pulmonary physicians met only a minority of the patients. The sleep apnea study in 2018 included about 800 patients, of which about 28% were normal and 180 patients were classified as severe (apnea-hypopnea index [AHI] over 30). The operating model has proven to be workable and appropriate. The patients understand well that they may not be referred to a pulmonary doctor. However, specialized medical follow-up on professional drivers continues every year.

Keywords: sleep, apnea patient, operating model, hospital

Procedia PDF Downloads 57
4625 3 Phase Induction Motor Control Using Single Phase Input and GSM

Authors: Pooja S. Billade, Sanjay S. Chopade


This paper focuses on the design of three phase induction motor control using single phase input and GSM.The controller used in this work is a wireless speed control using a GSM technique that proves to be very efficient and reliable in applications.The most common principle is the constant V/Hz principle which requires that the magnitude and frequency of the voltage applied to the stator of a motor maintain a constant ratio. By doing this, the magnitude of the magnetic field in the stator is kept at an approximately constant level throughout the operating range. Thus, maximum constant torque producing capability is maintained. The energy that a switching power converter delivers to a motor is controlled by Pulse Width Modulated signals applied to the gates of the power transistors in H-bridge configuration. PWM signals are pulse trains with fixed frequency and magnitude and variable pulse width. When a PWM signal is applied to the gate of a power transistor, it causes the turn on and turns off intervals of the transistor to change from one PWM period.

Keywords: index terms— PIC, GSM (global system for mobile), LCD (Liquid Crystal Display), IM (Induction Motor)

Procedia PDF Downloads 380
4624 An Analytical Approach to Assess and Compare the Vulnerability Risk of Operating Systems

Authors: Pubudu K. Hitigala Kaluarachchilage, Champike Attanayake, Sasith Rajasooriya, Chris P. Tsokos


Operating system (OS) security is a key component of computer security. Assessing and improving OSs strength to resist against vulnerabilities and attacks is a mandatory requirement given the rate of new vulnerabilities discovered and attacks occurring. Frequency and the number of different kinds of vulnerabilities found in an OS can be considered an index of its information security level. In the present study five mostly used OSs, Microsoft Windows (windows 7, windows 8 and windows 10), Apple’s Mac and Linux are assessed for their discovered vulnerabilities and the risk associated with each. Each discovered and reported vulnerability has an exploitability score assigned in CVSS score of the national vulnerability database. In this study the risk from vulnerabilities in each of the five Operating Systems is compared. Risk Indexes used are developed based on the Markov model to evaluate the risk of each vulnerability. Statistical methodology and underlying mathematical approach is described. Initially, parametric procedures are conducted and measured. There were, however, violations of some statistical assumptions observed. Therefore the need for non-parametric approaches was recognized. 6838 vulnerabilities recorded were considered in the analysis. According to the risk associated with all the vulnerabilities considered, it was found that there is a statistically significant difference among average risk levels for some operating systems, indicating that according to our method some operating systems have been more risk vulnerable than others given the assumptions and limitations. Relevant test results revealing a statistically significant difference in the Risk levels of different OSs are presented.

Keywords: cybersecurity, Markov chain, non-parametric analysis, vulnerability, operating system

Procedia PDF Downloads 104
4623 The Implementation of Sovereignty over Natural Resources Principle: Case Study Indonesian Forest

Authors: Sri Wartini


Based on the sovereignty over natural resources principle, the Indonesian government has an authority to exploit the natural resources within a national jurisdiction of Indonesia. The forest is one of the natural resources which is very valuable for Indonesia. It becomes the source of raw material for many industrial activities, such as pharmaceutical industry, pulp industry, and household furniture industry. Hence, it contributes to the economic development of Indonesia. However, the exploitation of the forest may cause negative impacts, such as environmental pollution and environmental degradation. The implementation of the sovereignty over natural resources principle in Indonesia may jeopardize the forest and affect the sustainability of the forest if there is no appropriate policy of the government to exploit the forest in a sustainable manner. The exploitation of the forest in Indonesia, in some extent, has caused serious impact to environment and biodiversity. Hence, in order to sustain and to maintain the forest as the valuable resources to the future generation, the government of Indonesia has already adopted many programmes and action plans. The aim of the research is to undertake a critical examination of the issues relating to the the implementation of sovereignty over natural resources to the exploitation of the forest in Indonesia. It is a normative research and the methodology employed in this research is library research. While the approaches employed in the research are conceptual approach., statutory approach, and comparative approach. The research finds that the implementation of sovereignty over natural resources principle in the exploitation of the forest in Indonesia is limited by other principles of international environmental law, such as sustainable development principle, intergenerational principle and common concern principle which have been adopted in the government policy and various regulations regarding the exploitation of the forest in Indonesia.

Keywords: Environmental damage, negative impacts, pollution, the sovereignty over natural resources

Procedia PDF Downloads 274
4622 Social Collaborative Learning Model Based on Proactive Involvement to Promote the Global Merit Principle in Cultivating Youths' Morality

Authors: Wera Supa, Panita Wannapiroon


This paper is a report on the designing of the social collaborative learning model based on proactive involvement to Promote the global merit principle in cultivating youths’ morality. The research procedures into two phases, the first phase is to design the social collaborative learning model based on proactive involvement to promote the global merit principle in cultivating youths’ morality, and the second is to evaluate the social collaborative learning model based on proactive involvement. The sample group in this study consists of 15 experts who are dominant in proactive participation, moral merit principle and youths’ morality cultivation from executive level, lecturers and the professionals in information and communication technology expertise selected using the purposive sampling method. Data analyzed by arithmetic mean and standard deviation. This study has explored that there are four significant factors in promoting the hands-on collaboration of global merit scheme in order to implant virtues to adolescences which are: 1) information and communication Technology Usage; 2) proactive involvement; 3) morality cultivation policy, and 4) global merit principle. The experts agree that the social collaborative learning model based on proactive involvement is highly appropriate.

Keywords: social collaborative learning, proactive involvement, global merit principle, morality

Procedia PDF Downloads 322
4621 Identifying Principle Components Affecting Competitiveness of Thai Automotive Parts Industry

Authors: Thanatip Lerttanaporn, Tuanjai Somboonwiwat, Charoenchai Khompatraporn


The automotive parts industry is one of the vital sectors in Thai economy and now is facing a greater competition from ASEAN Economic Community (AEC). This article identifies important factors that impact the competitiveness of Thai automotive parts industry. There are eight groups of factors with a total of 58 factors. Due to a variety of factors, the Exploratory Factor Analysis and Principle Component Analysis have been applied to classify factors into groups or principle components. The results show that there are 15 groups and four of them are critical, covering 80% of important value. These four critical groups are then used to formulate strategies to improve the competitiveness of the Thai automotive parts industry.

Keywords: factor analysis, Thai automotive parts, principle components, exploratory factor, ASEAN economic community

Procedia PDF Downloads 181
4620 Federal Character Principle and the Challenges of National Integration in Nigeria: A Comparative Analysis of Some Federal Appointments under Jonathan and Buhari Administrations

Authors: Simon O. Obadahun, Samuel Otohinoyi


The Nigerian state is heterogeneous both in character and content. Efforts to manage this diversity has so far not yielded the desired result. This paper examines the Federal Character Principle as one of the instruments intended to manage our obvious diversity such that no part of the country is marginalized or feels marginalized or sidelined. The paper observed that the Federal Character Principle have not achieved its set objectives, which is national unity and loyalty. It draws from secondary sources and discovered that there are factors that make an equitable distribution of public appointments difficult which is beyond the powers of the federal character commission. The major argument of this paper is that if the Federal Character Commission as an organization expected to enforce this principle is not restructured and given more power to sanction individuals and organizations that are found of circumventing the relevant guidelines in this regards, the hope of national unity and loyalty will continue to be a mirage.

Keywords: appointments, federalism, federal character, national integration

Procedia PDF Downloads 228
4619 Experimental Study of Boost Converter Based PV Energy System

Authors: T. Abdelkrim, K. Ben Seddik, B. Bezza, K. Benamrane, Aeh. Benkhelifa


This paper proposes an implementation of boost converter for a resistive load using photovoltaic energy as a source. The model of photovoltaic cell and operating principle of boost converter are presented. A PIC micro controller is used in the close loop control to generate pulses for controlling the converter circuit. To performance evaluation of boost converter, a variation of output voltage of PV panel is done by shading one and two cells.

Keywords: boost converter, microcontroller, photovoltaic power generation, shading cells

Procedia PDF Downloads 313
4618 Virtualization and Visualization Based Driver Configuration in Operating System

Authors: Pavan Shah


In an Embedded system, Virtualization and visualization technology can provide us an effective response and measurable work in a software development environment. In addition to work of virtualization and virtualization can be easily deserved to provide the best resource sharing between real-time hardware applications and a healthy environment. However, the virtualization is noticeable work to minimize the I/O work and utilize virtualization & virtualization technology for either a software development environment (SDE) or a runtime environment of real-time embedded systems (RTMES) or real-time operating system (RTOS) eras. In this Paper, we particularly focus on virtualization and visualization overheads data of network which generates the I/O and implementation of standardized I/O (i.e., Virto), which can work as front-end network driver in a real-time operating system (RTOS) hardware module. Even there have been several work studies are available based on the virtualization operating system environment, but for the Virto on a general-purpose OS, my implementation is on the open-source Virto for a real-time operating system (RTOS). In this paper, the measurement results show that implementation which can improve the bandwidth and latency of memory management of the real-time operating system environment (RTMES) for getting more accuracy of the trained model.

Keywords: virtualization, visualization, network driver, operating system

Procedia PDF Downloads 56
4617 Cascaded Multi-Level Single-Phase Switched Boost Inverter

Authors: Van-Thuan Tran, Minh-Khai Nguyen, Geum-Bae Cho


Recently, multilevel inverters have become more attractive for researchers due to low total harmonic distortion (THD) in the output voltage and low electromagnetic interference (EMI). This paper proposes a single-phase cascaded H-bridge quasi switched boost inverter (CHB-qSBI) for renewable energy sources applications. The proposed inverter has the advantage over the cascaded H-bridge quasi-Z-source inverter (CHB-qZSI) in reducing two capacitors and two inductors. As a result, cost, weight, and size are reduced. Furthermore, the dc-link voltage of each module is controlled by individual shoot-through duty cycle to get the same values. Therefore, the proposed inverter solves the imbalance problem of dc-link voltage in traditional CHB inverter. This paper shows the operating principles and analysis of the single-phase cascaded H-bridge quasi switched boost inverter. Also, a control strategy for the proposed inverter is shown. Experimental and simulation results are shown to verify the operating principle of the proposed inverter.

Keywords: renewable energy sources, cascaded h-bridge inverter, quasi switched boost inverter, quasi z-source inverter, multilevel inverter

Procedia PDF Downloads 257
4616 A Study on the Performance of 2-PC-D Classification Model

Authors: Nurul Aini Abdul Wahab, Nor Syamim Halidin, Sayidatina Aisah Masnan, Nur Izzati Romli


There are many applications of principle component method for reducing the large set of variables in various fields. Fisher’s Discriminant function is also a popular tool for classification. In this research, the researcher focuses on studying the performance of Principle Component-Fisher’s Discriminant function in helping to classify rice kernels to their defined classes. The data were collected on the smells or odour of the rice kernel using odour-detection sensor, Cyranose. 32 variables were captured by this electronic nose (e-nose). The objective of this research is to measure how well a combination model, between principle component and linear discriminant, to be as a classification model. Principle component method was used to reduce all 32 variables to a smaller and manageable set of components. Then, the reduced components were used to develop the Fisher’s Discriminant function. In this research, there are 4 defined classes of rice kernel which are Aromatic, Brown, Ordinary and Others. Based on the output from principle component method, the 32 variables were reduced to only 2 components. Based on the output of classification table from the discriminant analysis, 40.76% from the total observations were correctly classified into their classes by the PC-Discriminant function. Indirectly, it gives an idea that the classification model developed has committed to more than 50% of misclassifying the observations. As a conclusion, the Fisher’s Discriminant function that was built on a 2-component from PCA (2-PC-D) is not satisfying to classify the rice kernels into its defined classes.

Keywords: classification model, discriminant function, principle component analysis, variable reduction

Procedia PDF Downloads 264
4615 Characterization of the Viscoelastic Behavior of Polymeric Composites

Authors: Abir Abdessalem, Sahbi Tamboura, J. Fitoussi, Hachmi Ben Daly, Abbas Tcharkhtchi


Dynamic mechanical analysis (DMA) is one of the most used experimental techniques to investigate the temperature and frequency dependence of the mechanical behavior of viscoelastic materials. The measured data are generally shifted by the application of the principle of the time– temperature superposition (TTS) to obtain the viscoelastic system’s master curve. The aim of this work is to show the methodology to define the horizontal shift factor to be applied to the storage modulus measured in order to indicate the validity of (TTS) principle for this material system. This principle was successfully used to determine the long-term properties of the Sheet Moulding Compound (SMC) composites.

Keywords: composite material, dynamic mechanical analysis, SMC composites, viscoelastic behavior, modeling

Procedia PDF Downloads 143