Search results

1 – 10 of 292
Open Access
Book part
Publication date: 25 July 2022

Angela Wroblewski and Andrea Leitner

The TARGET approach aims at establishing a reflexive gender equality policy in research performing and research funding organisations. Monitoring has enormous potential to support…

Abstract

The TARGET approach aims at establishing a reflexive gender equality policy in research performing and research funding organisations. Monitoring has enormous potential to support reflexivity at both the institutional and the individual levels in the gender equality plan (GEP) development and implementation context. To exploit this potential, the monitoring system has to consist of meaningful indicators, which adequately represent the complex construct of gender equality and refer to the concrete objectives and policies of the GEP. To achieve this, we propose an approach to indicator development that refers to a theory of change for the GEP and its policies. Indicator development thus becomes a reflexive endeavour and monitoring a living tool. This requires constant reflection on data gaps, validity of indicators and the further development of indicators. Furthermore, we recommend the creation of space for reflexivity to discuss monitoring results with the community of practice.

Details

Overcoming the Challenge of Structural Change in Research Organisations – A Reflexive Approach to Gender Equality
Type: Book
ISBN: 978-1-80262-122-8

Keywords

Open Access
Book part
Publication date: 4 May 2018

Salahuddin, Bakhtiar, Yusman and Fadhli

Purpose – This study aims to design and build a wireless supervisory control and data acquisition (SCADA) system based on Protocol AX.25 with the aim of monitoring the performance…

Abstract

Purpose – This study aims to design and build a wireless supervisory control and data acquisition (SCADA) system based on Protocol AX.25 with the aim of monitoring the performance of several parameters in Microhydro Power Plant (MHPP). This system can monitor several MHPP parameters such as voltage, current, frequency, and turbine rotation so that it can be accessed directly at one central location.

Design/Methodology/Approach – The design is done by taking into account the real parameters that exist in the MHPP. Some parameters that become the main object to see the performance of MHPP are voltage, current, frequency, and turbine rotation. The voltage generated by the MHPP must be adjusted to the voltage supplied by State Electricity Company to the consumer, including the phase used. The resulting stream should also be monitored for power to be adjusted to the turbine spin. The generator frequency is kept stable according to the standard frequency of the State Electricity Company generator.

Findings – The remote terminal unit (RTU) system has been simulated using 2 ACS712 current sensors, voltage sensor, zero crossing point, frequency sensor, and rotation sensor functionalized to monitor MHPP parameters. The AX.25 protocol has been applicable in the wireless SCADA network for monitoring the performance of MHPP by embedding in KYL-1020UA transceiver radio using the 433 MHz frequency and the audio frequency shift keying modulation system. Radio transmitter KYL-1020UA has been successfully simulated to send data from sensors to display on the computer through SCADA built applications. The data changes in the RTU section can be displayed properly on the graphic user interface in accordance with the existing display at the MHPP location.

Research Limitations/Implications – There are only two RTUs that will be connected to communicate, in this case MHPP-1 with callsign “RTU-001” and MHPP-2 with callsign “RTU-002.” While the existing devices in the data access section parameters MHPP as master station with callsign “MSSCADA” monitoring the performance of parameters sent from the RTU. There is no collision or error in data transmission. Baudrate is varied at 1,200 bps, 2,400 bps, 4,800 bps, and 9,600 bps for effective throughput calculation and AX.25 protocol efficiency. The transmission distance is varied at 100 m, 200 m, 300 m, and 500 m to see the bit error rate with baudrate 1,200 bps and 9,600 bps.

Practical Implications – This product is expected to be applied to several MHPP locations in Aceh Province so that its monitoring system is more centralized and efficient.

Originality/Value – This research if for the efficient monitoring of several MHPP located far apart and can be monitored in one central location so that operators do not have to be located at the plant site.

Open Access
Book part
Publication date: 4 May 2018

Dedi Satria, Syaifuddin Yana, Rizal Munadi and Saumi Syahreza

Purpose – The purpose of this paper is to develop prototype of the information system of the flood monitoring based internet of things (IoT). This prototype serves to assist users…

Abstract

Purpose – The purpose of this paper is to develop prototype of the information system of the flood monitoring based internet of things (IoT). This prototype serves to assist users in accessing flood levels through water levels and rainy weather conditions.

Design/Methodology/Approach – This paper presents the design of information system of flood monitoring based internet of things (IoT). This prototype study acquires water level and rainfall data using ultrasonic sensors HC-SR04 and rain sensor. Data of flood height and rain levels detected by sensors are processed using Arduino Uno Microcontroller to produce output data in HTML format. Flood altitude information system and rainy weather from the microcontroller are distributed using ethernet module as web server integrated with Wireless N Router TL-MR3020 as a gateway path to the user.

Findings – This research produces a prototype of web-based flood monitoring information system that has been able to distribute data of flood height and rainy weather in real time.

Research Limitations/Implications – In the implementation of measurement, the information system only accesses one flood detector or one flooded location.

Practical Implications – This research produces a prototype of web-based flood monitoring information system that has been able to distribute data of flood height and rainy weather in real time.

Originality/Value – System prototype is the first development that uses internet of things (IoTs) method in real time web-based flood measurement with information in the form of flood hazard information in the form of water level and rainy weather conditions.

Open Access
Book part
Publication date: 1 October 2018

Harald Hornmoen and Per Helge Måseide

The chapter addresses the question of how crisis and emergency communicators in the justice (police) and health sector in Norway reflect on their use – or lack of use – of social…

Abstract

The chapter addresses the question of how crisis and emergency communicators in the justice (police) and health sector in Norway reflect on their use – or lack of use – of social media during the terror crisis on 22 July 2011. We examine how these communicators in the years following the crisis have developed their use of social media to optimise their and the public’s awareness of similar crises. Our semi-structured interviews with key emergency managers and responders display how the terrorist-induced crisis in 2011 was a wake-up call for communicators in the police and the health sector. They reflect on the significance, strengths and weaknesses of social media in the management of crises such as this one.

Details

Social Media Use in Crisis and Risk Communication
Type: Book
ISBN: 978-1-78756-269-1

Keywords

Open Access
Book part
Publication date: 4 May 2018

Yusman, Aidi Finawan and Rusli

Purpose – The purpose of this research is to design and build a wild animal pest repellent device with combination of passive infrared (PIR) sensor and ultrasonic signal based on…

Abstract

Purpose – The purpose of this research is to design and build a wild animal pest repellent device with combination of passive infrared (PIR) sensor and ultrasonic signal based on microcontroller as system controller. The PIR sensor is used to detect the presence of wild animal objects and ultrasonic signals to interfere with the hearing.

Design/Methodology/Approach – The design of the system is built based on microcontroller as the system controller. The system as a whole includes hardware and software. The design of hardware consists of the system design on the transmitter side and the system design on the receiver side, while the software in the of system are algorithms using C language programming.

Findings – The resulting repellent device can detect animals approaching up to a distance of 5 m and may interfere with its hearing with a 40 kHz ultrasonic frequency up to a distance of 20 m. The system also uses remote monitoring devices using 433 MHz radio frequency up to a distance of 60 m.

Research Limitations/Implications – Each animal has different hearing frequencies, as well as some wild animals, but the hearing frequencies of wild animals are generally at ultrasonic frequencies. The frequency of animal hearing may vary from audio frequency to ultrasonic frequency, so ultrasonic wave emission testing with varying frequencies is required.

Practical Implications – This research combines systems on transmitters and receivers, with real-time monitoring of wild animal positions, and it can be possible to monitor the position of more detailed animals by installing more types of sensors as well as increasing the number of sensors.

Originality/Value – This paper may provide additional insight into the hearing frequencies of animals and may also serve as comparable papers for similar studies.

Open Access
Book part
Publication date: 25 July 2022

Rachel Palmén and Angela Wroblewski

This chapter provides some concluding reflections on the different experiences of structural change encountered by the TARGET partners. The various TARGET partners had different…

Abstract

This chapter provides some concluding reflections on the different experiences of structural change encountered by the TARGET partners. The various TARGET partners had different roles in the structural change processes: seven organisations designed, implemented and monitored gender equality plans (GEPs) for the first time, two organisations provided tailored support to implementing institutions and one organisation evaluated GEP implementation. This edited volume provides an account of these diverse experiences of engaging with and catalysing structural change in very different research organisations operating in extremely different contexts both within the EU and beyond. The volume thus contributes to the growing body of literature generated from structural change projects by offering a specific focus on the TARGET approach. The TARGET process of structural change – undertaken through the development and implementation of tailored, evidence-based GEPs – was found to be strengthened through formal top management commitment and by taking a reflexive approach that was powered by communities of practice and supported by financial resources, gender expertise as well as gender and organisational change competences. Engaged institutions thus managed to overcome unfavourable conditions and implement tailor-made, context-specific interventions, some of them in areas at the cutting edge of topics and issues linked to gender equality in research and innovation such as tackling sexual harassment, sustainability and integrating the gender dimension into research content and curricula.

Details

Overcoming the Challenge of Structural Change in Research Organisations – A Reflexive Approach to Gender Equality
Type: Book
ISBN: 978-1-80262-122-8

Keywords

Open Access
Book part
Publication date: 6 May 2019

Michael Rigby, Shalmali Deshpande, Daniela Luzi, Fabrizio Pecoraro, Oscar Tamburis, Ilaria Rocco, Barbara Corso, Nadia Minicuci, Harshana Liyanage, Uy Hoang, Filipa Ferreira, Simon de Lusignan, Ekelechi MacPepple and Heather Gage

In order to assess the state of health of Europe’s children, or to appraise the systems and models of healthcare delivery, data about children are essential, with as much…

Abstract

In order to assess the state of health of Europe’s children, or to appraise the systems and models of healthcare delivery, data about children are essential, with as much precision and accuracy as possible by small group characteristic. Unfortunately, the experience of the Models of Child Health Appraised (MOCHA) project and its scientists shows that this ideal is seldom met, and thus the accuracy of appraisal or planning work is compromised. In the project, we explored the data collected on children by a number of databases used in Europe and globally, to find that although the four quinquennial age bands are common, it is impossible to represent children aged 0–17 years as a legally defined group in statistical analysis. Adolescents, in particular, are the most invisible age group despite this being a time of life when they are rapidly changing and facing increasing challenges. In terms of measurement and monitoring, there is little progress from work of nearly two decades ago that recommended an information system, and no focus on the creation of a policy and ethical framework to allow collaborative analysis of the rich anonymised databases that hold real-world people-based data. In respect of data systems and surveillance, nearly all systems in European society pay lip service to the importance of children, but do not accommodate them in a practical and statistical sense.

Details

Issues and Opportunities in Primary Health Care for Children in Europe
Type: Book
ISBN: 978-1-78973-354-9

Keywords

Open Access
Book part
Publication date: 18 July 2022

Devrim Murat Yazan, Guido van Capelleveen and Luca Fraccascia

The sustainable transition towards the circular economy requires the effective use of artificial intelligence (AI) and information technology (IT) techniques. As the…

Abstract

The sustainable transition towards the circular economy requires the effective use of artificial intelligence (AI) and information technology (IT) techniques. As the sustainability targets for 2030–2050 increasingly become a tougher challenge, society, company managers and policymakers require more support from AI and IT in general. How can the AI-based and IT-based smart decision-support tools help implementation of circular economy principles from micro to macro scales?

This chapter provides a conceptual framework about the current status and future development of smart decision-support tools for facilitating the circular transition of smart industry, focussing on the implementation of the industrial symbiosis (IS) practice. IS, which is aimed at replacing production inputs of one company with wastes generated by a different company, is considered as a promising strategy towards closing the material, energy and waste loops. Based on the principles of a circular economy, the utility of such practices to close resource loops is analyzed from a functional and operational perspective. For each life cycle phase of IS businesses – e.g., opportunity identification for symbiotic business, assessment of the symbiotic business and sustainable operations of the business – the role played by decision-support tools is described and embedding smartness in these tools is discussed.

Based on the review of available tools and theoretical contributions in the field of IS, the characteristics, functionalities and utilities of smart decision-support tools are discussed within a circular economy transition framework. Tools based on recommender algorithms, machine learning techniques, multi-agent systems and life cycle analysis are critically assessed. Potential improvements are suggested for the resilience and sustainability of a smart circular transition.

Details

Smart Industry – Better Management
Type: Book
ISBN: 978-1-80117-715-3

Keywords

Open Access
Book part
Publication date: 4 June 2021

Kristen Thomasen and Suzie Dunn

Perpetrators of technology-facilitated gender-based violence are taking advantage of increasingly automated and sophisticated privacy-invasive tools to carry out their abuse…

Abstract

Perpetrators of technology-facilitated gender-based violence are taking advantage of increasingly automated and sophisticated privacy-invasive tools to carry out their abuse. Whether this be monitoring movements through stalkerware, using drones to nonconsensually film or harass, or manipulating and distributing intimate images online such as deepfakes and creepshots, invasions of privacy have become a significant form of gender-based violence. Accordingly, our normative and legal concepts of privacy must evolve to counter the harms arising from this misuse of new technology. Canada's Supreme Court recently addressed technology-facilitated violations of privacy in the context of voyeurism in R v Jarvis (2019) . The discussion of privacy in this decision appears to be a good first step toward a more equitable conceptualization of privacy protection. Building on existing privacy theories, this chapter examines what the reasoning in Jarvis might mean for “reasonable expectations of privacy” in other areas of law, and how this concept might be interpreted in response to gender-based technology-facilitated violence. The authors argue the courts in Canada and elsewhere must take the analysis in Jarvis further to fully realize a notion of privacy that protects the autonomy, dignity, and liberty of all.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Yee Man Louie

The rapid advancement of technology poses many social challenges including the emerging issue of technology-facilitated abuse (TFA) and violence. In Australia, women from…

Abstract

The rapid advancement of technology poses many social challenges including the emerging issue of technology-facilitated abuse (TFA) and violence. In Australia, women from culturally and linguistically diverse (CALD) backgrounds are found to be more vulnerable to domestic violence (DV) and abuse, including TFA. This chapter presents a snapshot of CALD women's technology-facilitated domestic abuse (TFDA) experiences in Melbourne through the eyes of a small group of DV practitioners. Findings show CALD women experience TFA similar to that of the mainstream, with tracking and monitoring through the use of smartphone and social media most common. Their migration and financial status, and language and digital literacy can increase their vulnerability to TFDA, making their experience more complicated. Appropriate digital services and resources together with face-to-face support services can be a way forward. Further research should focus on better understanding CALD women's perceptions of and responses to TFDA and explore ways to improve engagement with and use of community media channels/platforms.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

1 – 10 of 292