Search results

1 – 10 of 117
Open Access
Book part
Publication date: 29 November 2023

Abstract

Details

The Emerald Handbook of Research Management and Administration Around the World
Type: Book
ISBN: 978-1-80382-701-8

Open Access
Book part
Publication date: 4 May 2018

Salahuddin, Bakhtiar, Yusman and Fadhli

Purpose – This study aims to design and build a wireless supervisory control and data acquisition (SCADA) system based on Protocol AX.25 with the aim of monitoring the performance…

Abstract

Purpose – This study aims to design and build a wireless supervisory control and data acquisition (SCADA) system based on Protocol AX.25 with the aim of monitoring the performance of several parameters in Microhydro Power Plant (MHPP). This system can monitor several MHPP parameters such as voltage, current, frequency, and turbine rotation so that it can be accessed directly at one central location.

Design/Methodology/Approach – The design is done by taking into account the real parameters that exist in the MHPP. Some parameters that become the main object to see the performance of MHPP are voltage, current, frequency, and turbine rotation. The voltage generated by the MHPP must be adjusted to the voltage supplied by State Electricity Company to the consumer, including the phase used. The resulting stream should also be monitored for power to be adjusted to the turbine spin. The generator frequency is kept stable according to the standard frequency of the State Electricity Company generator.

Findings – The remote terminal unit (RTU) system has been simulated using 2 ACS712 current sensors, voltage sensor, zero crossing point, frequency sensor, and rotation sensor functionalized to monitor MHPP parameters. The AX.25 protocol has been applicable in the wireless SCADA network for monitoring the performance of MHPP by embedding in KYL-1020UA transceiver radio using the 433 MHz frequency and the audio frequency shift keying modulation system. Radio transmitter KYL-1020UA has been successfully simulated to send data from sensors to display on the computer through SCADA built applications. The data changes in the RTU section can be displayed properly on the graphic user interface in accordance with the existing display at the MHPP location.

Research Limitations/Implications – There are only two RTUs that will be connected to communicate, in this case MHPP-1 with callsign “RTU-001” and MHPP-2 with callsign “RTU-002.” While the existing devices in the data access section parameters MHPP as master station with callsign “MSSCADA” monitoring the performance of parameters sent from the RTU. There is no collision or error in data transmission. Baudrate is varied at 1,200 bps, 2,400 bps, 4,800 bps, and 9,600 bps for effective throughput calculation and AX.25 protocol efficiency. The transmission distance is varied at 100 m, 200 m, 300 m, and 500 m to see the bit error rate with baudrate 1,200 bps and 9,600 bps.

Practical Implications – This product is expected to be applied to several MHPP locations in Aceh Province so that its monitoring system is more centralized and efficient.

Originality/Value – This research if for the efficient monitoring of several MHPP located far apart and can be monitored in one central location so that operators do not have to be located at the plant site.

Open Access
Book part
Publication date: 6 May 2019

Michael Rigby, Grit Kühne and Shalmali Deshpande

Information and communication technologies can transform how services can be and are delivered as has already happened in other arenas, such as civil aviation, financial services…

Abstract

Information and communication technologies can transform how services can be and are delivered as has already happened in other arenas, such as civil aviation, financial services and retailing. Most modern health care is heavily dependent on e-health, including record keeping, targeted information sharing and digital diagnostic and imaging techniques. However, there remains little scientific knowledge base for optimal system content and function in primary health care, particularly for children. Models of Child Health Appraised (MOCHA) aimed to establish the current e-health situation in children’s primary care services. Electronic health records (EHRs) are in regular use in much of northern and western Europe and in some newer European Union Member States, but other countries lag behind. MOCHA investigated the use of unique identifiers, the use of case-based public health EHRs and the capability of record linkage, linkage of information with school health data and monitoring of social media influences, such as health websites and health apps. A widespread lack of standards underlined a lack of research enquiry into this issue in terms of children’s health data and health knowledge. Health websites and apps are a growing area of healthcare delivery, but there is a worrying lack of safeguards in place. The challenge for policy-makers and practitioners is to be aware and to lead on the innovative harnessing of new technologies, while protecting child users against new harms.

Details

Issues and Opportunities in Primary Health Care for Children in Europe
Type: Book
ISBN: 978-1-78973-354-9

Keywords

Abstract

Details

Video Games Crime and Next-Gen Deviance
Type: Book
ISBN: 978-1-83867-450-2

Open Access
Book part
Publication date: 29 November 2023

Maryke Hunter-Hüsselmann, Dalene Pieterse and Changu Batisani

This chapter discusses the growing importance of research-related information in the face of increased complexities and competitiveness within higher education environments…

Abstract

This chapter discusses the growing importance of research-related information in the face of increased complexities and competitiveness within higher education environments globally. It provides some reflections on the importance of institutional research cultures to effectively address these challenges, focussing on the African context, and the role of effective research support through institutional structures such as a dedicated research office. The increasingly strategic role of research management has led to the need for a more active and visionary role in the positioning of institutions by supporting decision-making and contributing to the development and visibility of institutional research portfolios. The authors provide their insights into the scope of research-related information, the need for research offices to perform this strategic function, how these information sets can be applied in reports, evidence-based decisions, institutional showcasing, and enhanced research support. The chapter includes aspects to consider when establishing a research-related information management function within institutions.

Abstract

Details

Video Games Crime and Next-Gen Deviance
Type: Book
ISBN: 978-1-83867-450-2

Open Access
Book part
Publication date: 4 June 2021

Bridget Harris and Delanie Woodlock

Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical…

Abstract

Technology increasingly features in intimate relationships and is used by domestic violence perpetrators to enact harm. In this chapter, we propose a theoretical and practical framework for technology-facilitated harms in heterosexual relationships which we characterize as digital coercive control. Here, we include behaviors which can be classified as abuse and stalking and also individualized tactics which are less easy to categorize, but evoke fear and restrict the freedoms of a particular woman. Drawing on their knowledge of a victim/survivor's experiences and, in the context of patterns and dynamics of abuse, digital coercive control strategies are personalized by perpetrators and extend and exacerbate “real-world” violence.

Digital coercive control is unique because of its spacelessness and the ease, speed, and identity-shielding which technology affords. Victim/survivors describe how perpetrator use of technology creates a sense of omnipresence and omnipotence which can deter women from exiting violent relationships and weakens the (already tenuous) notion that abuse can be “escaped.” We contend that the ways that digital coercive control shifts temporal and geographic boundaries warrant attention. However, spatiality more broadly cannot be overlooked. The place and shape in which victim/survivors and perpetrators reside will shape both experiences of and response to violence. In this chapter, we explore these ideas, reporting on findings from a study on digital coercive control in regional, rural, and remote Australia. We adopt a feminist research methodology in regard to our ethos, research processes, analysis, and the outputs and outcomes of our project. Women's voices are foreground in this approach and the emphasis is on how research can be used to inform, guide, and develop responses to domestic violence.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 16 October 2020

Abstract

Details

Gender and the Violence(s) of War and Armed Conflict: More Dangerous to Be a Woman?
Type: Book
ISBN: 978-1-78769-115-5

Open Access
Book part
Publication date: 4 June 2021

Briony Anderson and Mark A. Wood

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious…

Abstract

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious intent. Undertaking a scoping review of research into doxxing, we develop a typology of this form of technology-facilitated violence (TFV) that expands understandings of doxxing, its forms and its harms, beyond a taciturn discussion of privacy and harassment online. Building on David M. Douglas's typology of doxxing, our typology considers two key dimensions of doxxing: the form of loss experienced by the victim and the perpetrator's motivation(s) for undertaking this form of TFV. Through examining the extant literature on doxxing, we identify seven mutually non-exclusive motivations for this form of TFV: extortion, silencing, retribution, controlling, reputation-building, unintentional, and doxxing in the public interest. We conclude by identifying future areas for interdisciplinary research into doxxing that brings criminology into conversation with the insights of media-focused disciplines.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Seonaid Stevenson-McCabe and Sarai Chisala-Tempelhoff

Technology-facilitated violence and abuse including image-based sexual abuse (IBSA) is a phenomenon affecting women and girls around the world. Abusers misuse technology to attack…

Abstract

Technology-facilitated violence and abuse including image-based sexual abuse (IBSA) is a phenomenon affecting women and girls around the world. Abusers misuse technology to attack victims and threaten their safety, privacy, and dignity. This abuse is gendered and a form of domestic and sexual violence. In this article, the authors compare criminal law approaches to tackling IBSA in Scotland and Malawi. We critically analyze the legislative landscape in both countries, with a view to assessing the potential for victims to seek and obtain redress for IBSA. We assess the role criminal law has to play in each jurisdiction while acknowledging the limits of criminal law alone in terms of providing redress.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

1 – 10 of 117