La Unión Europea ha acordado un embargo petrolero contra Rusia en respuesta a la invasión de Ucrania. El embargo forma parte de un sexto paquete de sanciones y prohibirá la mayoría de las importaciones de petróleo ruso en la UE a finales de este año. Algunos estados miembros aún dependen en gran medida del petróleo ruso y se les ha concedido una exención, pero se espera que todo el petróleo ruso quede prohibido para fines de 2023.
The document discusses various challenges that can occur in project management and their causes and solutions. Some challenges discussed include scope creep where additional work is added without being planned for, poor communication where team members lack necessary information, insufficient resources where required skills and resources are not allocated to the project, and unrealistic timelines where not enough time is spent planning and unrealistic schedules are agreed to. The document emphasizes the importance of thorough planning, clear requirements, change management processes, and risk management to help address these challenges and improve project outcomes.
EDI Recursos Digitales, Vazquez, Mercau, Bustamantekari92
Este documento describe las Aulas Digitales Móviles (ADM), que son aulas equipadas con tecnología digital como 30 netbooks, un servidor, router, impresora, proyector y cámara, todo transportado en un carro. Las ADM permiten a docentes y estudiantes investigar, exponer trabajos, grabar y compartir archivos de forma flexible y en red, facilitando el aprendizaje colaborativo dentro y fuera del aula.
The document discusses different hat colors and how they relate to personality traits and team interactions. It describes the blue hat as the most comfortable and the red hat as the least comfortable. It encourages trying on different hats in team interactions and briefly describing the experience.
El documento describe un Aula Digital Móvil (ADM), un dispositivo tecnológico modular que integra recursos digitales en las escuelas primarias. Un ADM típico contiene 30 netbooks, un servidor, router inalámbrico, impresora, proyector y otros elementos. Las ADM permiten trabajar en grupos, aseguran acceso permanente a la información y fortalecen el sistema de información de la escuela. Los alumnos pueden trabajar individualmente en las netbooks o en red a través del servidor pedagógico
The mission accomplished its goal of providing toilets for the Kiwoko Nakaseke school in Uganda as part of its "Five loaves and two fishes mission" in October 2015. The mission helped the school by building toilets for its students and staff.
Exercțiu practic recomandat formatorilor în domeniul Educației Interculturale. Elaborat în cadrul proiectului „Educație Interculturală în Moldova”.
Centrul Naţional al Tineretului din Moldova (CNTM), începând cu anul 2010, implementează, cu susţinerea Fundaţiei Elveţiene pentru Copii „Pestalozzi” (PCF), proiectul „Dialog Intercultural în Moldova”.
El horario escolar muestra las horas de clase de lunes a viernes, con cinco períodos de 45 minutos cada uno separados por un recreo de 30 minutos entre la tercera y cuarta clase.
La Unión Europea ha acordado un embargo petrolero contra Rusia en respuesta a la invasión de Ucrania. El embargo forma parte de un sexto paquete de sanciones y prohibirá la mayoría de las importaciones de petróleo ruso en la UE a finales de este año. Algunos estados miembros aún dependen en gran medida del petróleo ruso y se les ha concedido una exención, pero se espera que todo el petróleo ruso quede prohibido para fines de 2023.
The document discusses various challenges that can occur in project management and their causes and solutions. Some challenges discussed include scope creep where additional work is added without being planned for, poor communication where team members lack necessary information, insufficient resources where required skills and resources are not allocated to the project, and unrealistic timelines where not enough time is spent planning and unrealistic schedules are agreed to. The document emphasizes the importance of thorough planning, clear requirements, change management processes, and risk management to help address these challenges and improve project outcomes.
EDI Recursos Digitales, Vazquez, Mercau, Bustamantekari92
Este documento describe las Aulas Digitales Móviles (ADM), que son aulas equipadas con tecnología digital como 30 netbooks, un servidor, router, impresora, proyector y cámara, todo transportado en un carro. Las ADM permiten a docentes y estudiantes investigar, exponer trabajos, grabar y compartir archivos de forma flexible y en red, facilitando el aprendizaje colaborativo dentro y fuera del aula.
The document discusses different hat colors and how they relate to personality traits and team interactions. It describes the blue hat as the most comfortable and the red hat as the least comfortable. It encourages trying on different hats in team interactions and briefly describing the experience.
El documento describe un Aula Digital Móvil (ADM), un dispositivo tecnológico modular que integra recursos digitales en las escuelas primarias. Un ADM típico contiene 30 netbooks, un servidor, router inalámbrico, impresora, proyector y otros elementos. Las ADM permiten trabajar en grupos, aseguran acceso permanente a la información y fortalecen el sistema de información de la escuela. Los alumnos pueden trabajar individualmente en las netbooks o en red a través del servidor pedagógico
The mission accomplished its goal of providing toilets for the Kiwoko Nakaseke school in Uganda as part of its "Five loaves and two fishes mission" in October 2015. The mission helped the school by building toilets for its students and staff.
Exercțiu practic recomandat formatorilor în domeniul Educației Interculturale. Elaborat în cadrul proiectului „Educație Interculturală în Moldova”.
Centrul Naţional al Tineretului din Moldova (CNTM), începând cu anul 2010, implementează, cu susţinerea Fundaţiei Elveţiene pentru Copii „Pestalozzi” (PCF), proiectul „Dialog Intercultural în Moldova”.
El horario escolar muestra las horas de clase de lunes a viernes, con cinco períodos de 45 minutos cada uno separados por un recreo de 30 minutos entre la tercera y cuarta clase.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024