Search results for: data protection officer
26786 Protection of Human Rights in Polish Centres for Foreigners – in the Context of the European Human Rights System
Authors: Oktawia Braniewicz
Abstract:
The phenomenon of emigration and migration increasingly affects Poland's borders as well. For this reason, it is necessary to examine the level of protection of Human Rights in Polish Centres for Foreigners. The field study covered 11 centers for Foreigners in the provinces Kujawsko-Pomorskie Region, Lubelskie Region, Lodzkie Region, Mazowieckie Region and Podlaskie Region. Photographic documentation of living and social conditions, conversations with center employees and refugees allow to show a comprehensive picture of the situation prevailing in Centres for Foreigners. The object of reflection will be, in particular, the standards resulting from art. 8 and 13 of the Convention for the Protection of Human Rights and Fundamental Freedoms and article 2 of Protocol No. 1 to the Convention for the Protection of Human Rights and Fundamental Freedoms. The degree of realization of the right to education and the right to respect for family and private life will be shown. Issues related to learning the Polish language, access to a professional translator and psychological help will also be approximated. Learning Polish is not obligatory, which causes problems with assimilation and integration with other members of the new community. In centers for foreigners, there are no translators - a translator from an external company is rented if necessary. The waiting time for an interpreter makes the refugees feel anxious, unable to communicate with the employees of the centers (this is a situation in which the refugees do not know either English, Polish or Russian). Psychologist's help is available on designated days of the week. There is no separate specialist in child psychology, which is a serious problem.Keywords: human rights, Polish centres, foreigners, fundamental freedoms
Procedia PDF Downloads 13626785 Case Study of Sexual Violence Victim Assessment in Semarang Regency
Authors: Sujana T, Kurniasari MD, Ayakeding AM
Abstract:
Background: Sexual violence is one of the violence with high incidence in Indonesia. Purpose: This research aims to describe the implementation of sexual violence victim assessment in Semarang Regency. Method: This research is a qualitative research with embeded single case study design. Data is analized with two units of analysis. The first unit of analysis is victim’s examiner with minimum one year of work experience. Semi-structured interview method is used to obtain the data. The second unit of analysis is document related. The data is taken by observing the pathway and description of every document and how it supported each implementation of assessment. Results: This study is resulted with three themes, which are: The first theme is assessments of sexual violence in Semarang regency has been standardized. The laws of the Republic of Indonesia have regulated the handling of victims of sexual violence in outline. Victims of sexual violence can be dealt with by the police, the Integrated Service Center for Women and Children Empowerment and the Regional General Hospital. Each examination site has different operational procedures standards for dealing with victims of sexual violence. Cooperation with family and witnesses is also required in the review process to obtain accurate results and evidence; The second idea that resulted from this study is there are inhibits factors in the assessments process. Victims sometimes feel embarrassed and reluctant to recount the chronological events during reporting. The examining officer should be able to approach and build a trust to convince the victim to be able to cooperate. The third theme is there are other things to consider in the process of assessing victims of sexual violence. Ensuring implementation in accordance with applicable operational procedures standards, providing exclusive examination rooms, counseling and safeguarding the privacy of victims are important to be considered in the assessment.Keywords: assessment, case study, Semarang regency, sexual violence
Procedia PDF Downloads 14726784 Protection of the Object of the Critical Infrastructure in the Czech Republic
Authors: Michaela Vašková
Abstract:
With the increasing dependence of countries on the critical infrastructure, it increases their vulnerability. Big threat is primarily in the human factor (personnel of the critical infrastructure) and in terrorist attacks. It emphasizes the development of methodology for searching of weak points and their subsequent elimination. This article discusses methods for the analysis of safety in the objects of critical infrastructure. It also contains proposal for methodology for training employees of security services in the objects of the critical infrastructure and developing scenarios of attacks on selected objects of the critical infrastructure.Keywords: critical infrastructure, object of critical infrastructure, protection, safety, security, security audit
Procedia PDF Downloads 35026783 Analysis and Performance of European Geostationary Navigation Overlay Service System in North of Algeria for GPS Single Point Positioning
Authors: Tabti Lahouaria, Kahlouche Salem, Benadda Belkacem, Beldjilali Bilal
Abstract:
The European Geostationary Navigation Overlay Service (EGNOS) provides an augmentation signal to GPS (Global Positioning System) single point positioning. Presently EGNOS provides data correction and integrity information using the GPS L1 (1575.42 MHz) frequency band. The main objective of this system is to provide a better real-time positioning precision than using GPS only. They are expected to be used with single-frequency code observations. EGNOS offers navigation performance for an open service (OS), in terms of precision and availability this performance gradually degrades as moving away from the service area. For accurate system performance, the service will become less and less available as the user moves away from the EGNOS service. The improvement in position solution is investigated using the two collocated dual frequency GPS, where no EGNOS Ranging and Integrity Monitoring Station (RIMS) exists. One of the pseudo-range was kept as GPS stand-alone and the other was corrected by EGNOS to estimate the planimetric and altimetric precision for different dates. It is found that precision in position improved significantly in the second due to EGNOS correction. The performance of EGNOS system in the north of Algeria is also investigated in terms of integrity. The results show that the horizontal protection level (HPL) value is below 18.25 meters (95%) and the vertical protection level (VPL) is below 42.22 meters (95 %). These results represent good integrity information transmitted by EGNOS for APV I service. This service is thus compliant with the aviation requirements for Approaches with Vertical Guidance (APV-I), which is characterised by 40 m HAL (horizontal alarm limit) and 50 m VAL (vertical alarm limit).Keywords: EGNOS, GPS, positioning, integrity, protection level
Procedia PDF Downloads 22726782 Radiation Protection Assessment of the Emission of a d-t Neutron Generator: Simulations with MCNP Code and Experimental Measurements in Different Operating Conditions
Authors: G. M. Contessa, L. Lepore, G. Gandolfo, C. Poggi, N. Cherubini, R. Remetti, S. Sandri
Abstract:
Practical guidelines are provided in this work for the safe use of a portable d-t Thermo Scientific MP-320 neutron generator producing pulsed 14.1 MeV neutron beams. The neutron generator’s emission was tested experimentally and reproduced by MCNPX Monte Carlo code. Simulations were particularly accurate, even generator’s internal components were reproduced on the basis of ad-hoc collected X-ray radiographic images. Measurement campaigns were conducted under different standard experimental conditions using an LB 6411 neutron detector properly calibrated at three different energies, and comparing simulated and experimental data. In order to estimate the dose to the operator vs. the operating conditions and the energy spectrum, the most appropriate value of the conversion factor between neutron fluence and ambient dose equivalent has been identified, taking into account both direct and scattered components. The results of the simulations show that, in real situations, when there is no information about the neutron spectrum at the point where the dose has to be evaluated, it is possible - and in any case conservative - to convert the measured value of the count rate by means of the conversion factor corresponding to 14 MeV energy. This outcome has a general value when using this type of generator, enabling a more accurate design of experimental activities in different setups. The increasingly widespread use of this type of device for industrial and medical applications makes the results of this work of interest in different situations, especially as a support for the definition of appropriate radiation protection procedures and, in general, for risk analysis.Keywords: instrumentation and monitoring, management of radiological safety, measurement of individual dose, radiation protection of workers
Procedia PDF Downloads 13626781 Design and Optimization Fire Alarm System to Protect Gas Condensate Reservoirs With the Use of Nano-Technology
Authors: Hefzollah Mohammadian, Ensieh Hajeb, Mohamad Baqer Heidari
Abstract:
In this paper, for the protection and safety of tanks gases (flammable materials) and also due to the considerable economic value of the reservoir, the new system for the protection, the conservation and fire fighting has been cloned. The system consists of several parts: the Sensors to detect heat and fire with Nanotechnology (nano sensor), Barrier for isolation and protection from a range of two electronic zones, analyzer for detection and locating point of fire accurately, Main electronic board to announce fire, Fault diagnosis in different locations, such as relevant alarms and activate different devices for fire distinguish and announcement. An important feature of this system, high speed and capability of fire detection system in a way that is able to detect the value of the ambient temperature that can be adjusted. Another advantage of this system is autonomous and does not require human operator in place. Using nanotechnology, in addition to speeding up the work, reduces the cost of construction of the sensor and also the notification system and fire extinguish.Keywords: analyser, barrier, heat resistance, general fault, general alarm, nano sensor
Procedia PDF Downloads 46026780 Public-Private Partnership for Better Protection of Trafficked Victims in Thailand: Case Study on Public Protection and Welfare Center in Cooperation with Jim Thompson Foundation in Occupational Development on Silk Sewing and Tailoring
Authors: Aungkana Kmonpetch
Abstract:
Protection of trafficked victims and partnership among stakeholders are established as core principles in 5P’ strategies in international and national anti-human trafficking policies. In this article, it is of interest to discuss how the role of public-private partnerships in promoting the occupation development for employment in wage will enhance the better protection for victims of trafficking who affirmatively decide they want a criminal justice intervention, using Thailand as a case. Most of the victims who have accepted to be witness in the criminal justice system have lost income during their absence from work. The analysis of Thailand case is based on two methodological approaches: 1) interview with victims of trafficking, protection authorities, service providers, trainers and teachers, social workers, NGOs, police, prosecutors, business owners and enterprises, ILO, UNDP etc.; 2) create collaborative effort through workshops/consultation meetings in participation of all stakeholders – governmental agencies, private organizations, UN and international agencies. The linking of protection and partnership is anchored in international conventions and human trafficking directives. While this is actually framed as a responsive advantage for 5P strategies of anti-human trafficking – prevention, protection, persecution, punishment, and partnership, in reality, there might have more practical requirements of care and support. The article addresses how the partnership between governmental agencies and private organizations provide opportunities for trafficked victims to engage in high-skilled occupational development such as Silk-Sewing and Tailoring. The discussion is also focused how this approach of capacity building of the trainer for trainee, be enable the trafficked victims to cultivate the practices of high-skilled training to engage them into the business of social enterprise with employment in wage. The partnership coordination draws specifically to two aspects: firstly, to formulate appropriate assistance for promotion and protection of human rights of the trafficked victims in response to the 5P’ strategies of anti-human trafficking policy; secondly, to empower them to settle some economic stability for livelihood opportunity in the country of origin on their return and reintegration. Therefore, they can define how they want to move forward to prevent them at risk of vulnerable situations where they might being trafficked again or going on to work in exploitative conditions. It strengthens proper access to protection and assistance, depending on how the incentive of protection for cooperation is perceived to be and how useful the capacity building in occupation development for employment in wage will be implemented practically both in the host country and in the country of origin. This also brings into question how the victim of trafficking are able to access to the trade of market and are supported the employment opportunity according to the concept of decent work as they are constituted as witnesses. We discuss these issues in the area of a broader literature on social protection, economic security, gender, law, and victimhood.Keywords: employment opportunity, occupation development, protection for victim of trafficking, public-private partnership
Procedia PDF Downloads 23026779 Minimization of Denial of Services Attacks in Vehicular Adhoc Networking by Applying Different Constraints
Authors: Amjad Khan
Abstract:
The security of Vehicular ad hoc networking is of great importance as it involves serious life threats. Thus to provide secure communication amongst Vehicles on road, the conventional security system is not enough. It is necessary to prevent the network resources from wastage and give them protection against malicious nodes so that to ensure the data bandwidth availability to the legitimate nodes of the network. This work is related to provide a non conventional security system by introducing some constraints to minimize the DoS (Denial of services) especially data and bandwidth. The data packets received by a node in the network will pass through a number of tests and if any of the test fails, the node will drop those data packets and will not forward it anymore. Also if a node claims to be the nearest node for forwarding emergency messages then the sender can effectively identify the true or false status of the claim by using these constraints. Consequently the DoS(Denial of Services) attack is minimized by the instant availability of data without wasting the network resources.Keywords: black hole attack, grey hole attack, intransient traffic tempering, networking
Procedia PDF Downloads 28626778 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System
Authors: Nareshkumar Harale, B. B. Meshram
Abstract:
The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design
Procedia PDF Downloads 23026777 Intrusion Detection in SCADA Systems
Authors: Leandros A. Maglaras, Jianmin Jiang
Abstract:
The protection of the national infrastructures from cyberattacks is one of the main issues for national and international security. The funded European Framework-7 (FP7) research project CockpitCI introduces intelligent intrusion detection, analysis and protection techniques for Critical Infrastructures (CI). The paradox is that CIs massively rely on the newest interconnected and vulnerable Information and Communication Technology (ICT), whilst the control equipment, legacy software/hardware, is typically old. Such a combination of factors may lead to very dangerous situations, exposing systems to a wide variety of attacks. To overcome such threats, the CockpitCI project combines machine learning techniques with ICT technologies to produce advanced intrusion detection, analysis and reaction tools to provide intelligence to field equipment. This will allow the field equipment to perform local decisions in order to self-identify and self-react to abnormal situations introduced by cyberattacks. In this paper, an intrusion detection module capable of detecting malicious network traffic in a Supervisory Control and Data Acquisition (SCADA) system is presented. Malicious data in a SCADA system disrupt its correct functioning and tamper with its normal operation. OCSVM is an intrusion detection mechanism that does not need any labeled data for training or any information about the kind of anomaly is expecting for the detection process. This feature makes it ideal for processing SCADA environment data and automates SCADA performance monitoring. The OCSVM module developed is trained by network traces off line and detects anomalies in the system real time. The module is part of an IDS (intrusion detection system) developed under CockpitCI project and communicates with the other parts of the system by the exchange of IDMEF messages that carry information about the source of the incident, the time and a classification of the alarm.Keywords: cyber-security, SCADA systems, OCSVM, intrusion detection
Procedia PDF Downloads 55826776 The Impact of Social Protection Intervention on Alleviating Social Vulnerability (Evidence from Ethiopian Rural Households)
Authors: Tewelde Gebresslase Haile, S. P. Singh
Abstract:
To bridge the existing knowledge gap on public intervention implementations, this study estimates the impact of social protection intervention (SPI) on alleviating social vulnerability. Following a multi-stage sampling, primary information was gathered through a self-administered questionnaire, FGD, and interviews from the target households located at four systematically selected districts of Tigrai, Ethiopia. Factor analysis and Propensity Score Matching are applied to construct Social Vulnerability Index (SVI) and measuring the counterfactual impact of selected intervention. As a multidimensional challenge, social vulnerability is found as an important concept used to guide policy evaluation. Accessibility of basic services of Social Affairs, Agriculture, Health and Education sectors, and Food Security Program are commonly used as SPIs. Finally, this study discovers that the households who had access to SPI have scored 9.65% lower SVI than in the absence of the intervention. Finally, this study suggests the provision of integrated, proactive, productive, and evidence-based SPIs to alleviate social vulnerability.Keywords: social protection, livelihood assets, social vulnerability, public policy SVI
Procedia PDF Downloads 9326775 Data Transformations in Data Envelopment Analysis
Authors: Mansour Mohammadpour
Abstract:
Data transformation refers to the modification of any point in a data set by a mathematical function. When applying transformations, the measurement scale of the data is modified. Data transformations are commonly employed to turn data into the appropriate form, which can serve various functions in the quantitative analysis of the data. This study addresses the investigation of the use of data transformations in Data Envelopment Analysis (DEA). Although data transformations are important options for analysis, they do fundamentally alter the nature of the variable, making the interpretation of the results somewhat more complex.Keywords: data transformation, data envelopment analysis, undesirable data, negative data
Procedia PDF Downloads 2926774 Digital Immunity System for Healthcare Data Security
Authors: Nihar Bheda
Abstract:
Protecting digital assets such as networks, systems, and data from advanced cyber threats is the aim of Digital Immunity Systems (DIS), which are a subset of cybersecurity. With features like continuous monitoring, coordinated reactions, and long-term adaptation, DIS seeks to mimic biological immunity. This minimizes downtime by automatically identifying and eliminating threats. Traditional security measures, such as firewalls and antivirus software, are insufficient for enterprises, such as healthcare providers, given the rapid evolution of cyber threats. The number of medical record breaches that have occurred in recent years is proof that attackers are finding healthcare data to be an increasingly valuable target. However, obstacles to enhancing security include outdated systems, financial limitations, and a lack of knowledge. DIS is an advancement in cyber defenses designed specifically for healthcare settings. Protection akin to an "immune system" is produced by core capabilities such as anomaly detection, access controls, and policy enforcement. Coordination of responses across IT infrastructure to contain attacks is made possible by automation and orchestration. Massive amounts of data are analyzed by AI and machine learning to find new threats. After an incident, self-healing enables services to resume quickly. The implementation of DIS is consistent with the healthcare industry's urgent requirement for resilient data security in light of evolving risks and strict guidelines. With resilient systems, it can help organizations lower business risk, minimize the effects of breaches, and preserve patient care continuity. DIS will be essential for protecting a variety of environments, including cloud computing and the Internet of medical devices, as healthcare providers quickly adopt new technologies. DIS lowers traditional security overhead for IT departments and offers automated protection, even though it requires an initial investment. In the near future, DIS may prove to be essential for small clinics, blood banks, imaging centers, large hospitals, and other healthcare organizations. Cyber resilience can become attainable for the whole healthcare ecosystem with customized DIS implementations.Keywords: digital immunity system, cybersecurity, healthcare data, emerging technology
Procedia PDF Downloads 7126773 Optimal Protection Coordination in Distribution Systems with Distributed Generations
Authors: Abdorreza Rabiee, Shahla Mohammad Hoseini Mirzaei
Abstract:
The advantages of distributed generations (DGs) based on renewable energy sources (RESs) leads to high penetration level of DGs in distribution network. With incorporation of DGs in distribution systems, the system reliability and security, as well as voltage profile, is improved. However, the protection of such systems is still challenging. In this paper, at first, the related papers are reviewed and then a practical scheme is proposed for coordination of OCRs in distribution system with DGs. The coordination problem is formulated as a nonlinear programming (NLP) optimization problem with the object function of minimizing total operating time of OCRs. The proposed method is studied based on a simple test system. The optimization problem is solved by General Algebraic Modeling System (GAMS) to calculate the optimal time dial setting (TDS) and also pickup current setting of OCRs. The results show the effectiveness of the proposed method and its applicability.Keywords: distributed generation, DG, distribution network, over current relay, OCR, protection coordination, pickup current, time dial setting, TDS
Procedia PDF Downloads 14026772 Overtopping Protection Systems for Overflow Earth Dams
Authors: Omid Pourabdollah, Mohsen Misaghian
Abstract:
Overtopping is known as one the most important reasons for the failure of earth dams. In some cases, it has resulted in heavy damages and losses. Therefore, enhancing the safety of earth dams against overtopping has received much attention in the past four decades. In this paper, at first, the overtopping phenomena and its destructive consequences will be introduced. Then, overtopping failure mechanism of embankments will be described. Finally, different types of protection systems for stabilization of earth dams against overtopping will be presented. These include timber cribs, riprap and gabions, reinforced earth, roller compacted concrete, and the precast concrete blocks.Keywords: embankment dam, overtopping, roller compacted concrete, wedge concrete block
Procedia PDF Downloads 16426771 The Impact of Non State Actor’s to Protect Refugees in Kurdistan Region of Iraq
Authors: Rozh Abdulrahman Kareem
Abstract:
The displacement of individuals has become a common interest for international players. Mostly occurs in Islamic states, as religion is considered the most common cause of this form of displacement. Therefore, this thesis aims to depict the reality of the situations of the refugees, particularly in KRI, illustrating how they are treated and protected and if the treatment merits the protection clause as envisaged in the 1951 Refugee Convention. Overall, the aim is to touch on the issue of protection by non-governmental organizations and government towards the refugees here. In light of this, it focused on the adequate protection of refugees in relation to the refugee law. In the Middle East, including Iraq, there have been multiple reports on violations of these refugee laws and human rights. Protection involves providing physical security to the concerned parties, functional administration with legal structures, and infrastructural setup that could help citizens exercise rights. The KRI has provided the refugees with various benefits, including education, access to residency, and employment. It also provided transitionary in various social dimensions like gender-based violence. The Convention on Status of Refugees 1951 tried to resolve this problem, whereby the principle of ‘nonrefoulement’ under Article 33 was passed. The ‘nonrefoulement’, an exceptional reference, was enacted to protect refugees from forcible return to their countries of the original. However, the convention never addressed an unusual scenario regarding the application of this principle, ‘Extradition Treaties.’ Even though some scholarly article exists regarding the problems of refugees, the topic of interplay between Nonrefoulement and Extradition Treaties has never been explained in detail in the available books on refugee laws and practices. Each year, millions of refugees seek protection from foreign countries for fear of being tortured, victimized, or executed. People seeking international protection are susceptible and insecure. The main objective of the prevention is to provide security to citizens susceptible to inhuman treatment, distress, oppression, or other human rights defilements when they arrive back in their own countries. The refugee situation may get worse in the near future. Just like several nations within the Middle East, Iraq is not a signatory to the globally acknowledged legal structure for the protection of refugees. The first law of 1971 in Iraq was issued only for military or political causes. This law also establishes benefits such as the right to education and health services and the right to acquire employment just as the Iraqi nationals. The other legislative instrument is the 21st law from the ministry of migration of Iraq widened the description of an immigrant to incorporate the definition from the refugee resolution. Nonetheless, there is a lack of overall consistency in the protection provided under these legislations regarding rights and entitlement. A Memorandum of Understanding was signed in October 2016 by the UNHCR and the Iraq government to develop the protection of refugees. Under the term of this MoU, the Iraqi Government is obligated to provide identity documents to asylum seekers beside that UNHCR provides more guidance.Keywords: law, refugee, protection, Kurdistan
Procedia PDF Downloads 6726770 Delimitation of the Perimeters of PR Otection of the Wellfield in the City of Adrar, Sahara of Algeria through the Used Wyssling’s Method
Authors: Ferhati Ahmed, Fillali Ahmed, Oulhadj Younsi
Abstract:
delimitation of the perimeters of protection in the catchment area of the city of Adrar, which are established around the sites for the collection of water intended for human consumption of drinking water, with the objective of ensuring the preservation and reducing the risks of point and accidental pollution of the resource (Continental Intercalar groundwater of the Northern Sahara of Algeria). This wellfield is located in the northeast of the city of Adrar, it covers an area of 132.56 km2 with 21 Drinking Water Supply wells (DWS), pumping a total flow of approximately 13 Hm3/year. The choice of this wellfield is based on the favorable hydrodynamic characteristics and their location in relation to the agglomeration. The vulnerability to pollution of this slick is very high because the slick is free and suffers from the absence of a protective layer. In recent years, several factors have been introduced around the field that can affect the quality of this precious resource, including the presence of a strong centre for domestic waste and agricultural and industrial activities. Thus, its sustainability requires the implementation of protection perimeters. The objective of this study is to set up three protection perimeters: immediate, close and remote. The application of the Wyssling method makes it possible to calculate the transfer time (t) of a drop of groundwater located at any point in the aquifer up to the abstraction and thus to define isochrones which in turn delimit each type of perimeter, 40 days for the nearer and 100 days for the farther away. Special restrictions are imposed for all activities depending on the distance of the catchment. The application of this method to the Adrar city catchment field showed that the close and remote protection perimeters successively occupy areas of 51.14 km2 and 92.9 km2. Perimeters are delimited by geolocated markers, 40 and 46 markers successively. These results show that the areas defined as "near protection perimeter" are free from activities likely to present a risk to the quality of the water used. On the other hand, on the areas defined as "remote protection perimeter," there is some agricultural and industrial activities that may present an imminent risk. A rigorous control of these activities and the restriction of the type of products applied in industrial and agricultural is imperative.Keywords: continental intercalaire, drinking water supply, groundwater, perimeter of protection, wyssling method
Procedia PDF Downloads 10126769 Analyzing the Prospects and Challenges in Implementing the Legal Framework for Competition Regulation in Nigeria
Authors: Oluchukwu P. Obioma, Amarachi R. Dike
Abstract:
Competition law promotes market competition by regulating anti-competitive conduct by undertakings. There is a need for a third party to regulate the market for efficiency and supervision, since, if the market is left unchecked, it may be skewed against the consumers and the economy. Competition law is geared towards the protection of consumers from economic exploitation. It is the duty of every rational government to optimally manage its economic system by employing the best regulatory practices over the market to ensure it functions effectively and efficiently. The Nigerian government has done this by enacting the Federal Competition and Consumer Protection Act, 2018 (FCCPA). This is a comprehensive legal framework with the objective of governing competition issues in Nigeria. Prior to its enactment, the competition law regime in Nigeria was grossly inadequate despite Nigeria being the biggest economy in Africa. This latest legislation has become a bold step in the right direction. This study will use the doctrinal methodology in analyzing the FCCPA, 2018 in order to discover the extent to which the Act will guard against anti-competitive practices and promote competitive markets for the benefit of the Nigerian economy and consumers. The study finds that although the FCCPA, 2018 provides for the regulation of competition in Nigeria, there is a need to effectively tackle the challenges to the implementation of the Act and the development of anti-trust jurisprudence in Nigeria. This study concludes that incisive implementation of competition law in Nigeria will help protect consumers and create a conducive environment for economic growth, development, and protection of consumers from obnoxious competition practices.Keywords: anti-competitive practices, competition law, competition regulation, consumer protection.
Procedia PDF Downloads 18426768 Evaluation of Occupational Doses in Interventional Radiology
Authors: Fernando Antonio Bacchim Neto, Allan Felipe Fattori Alves, Maria Eugênia Dela Rosa, Regina Moura, Diana Rodrigues De Pina
Abstract:
Interventional Radiology is the radiology modality that provides the highest dose values to medical staff. Recent researches show that personal dosimeters may underestimate dose values in interventional physicians, especially in extremities (hands and feet) and eye lens. The aim of this work was to study radiation exposure levels of medical staff in different interventional radiology procedures and estimate the annual maximum numbers of procedures (AMN) that each physician could perform without exceed the annual limits of dose established by normative. For this purpose LiF:Mg,Ti (TLD-100) dosimeters were positioned in different body regions of the interventional physician (eye lens, thyroid, chest, gonads, hand and foot) above the radiological protection vests as lead apron and thyroid shield. Attenuation values for lead protection vests were based on international guidelines. Based on these data were chosen as 90% attenuation of the lead vests and 60% attenuation of the protective glasses. 25 procedures were evaluated: 10 diagnostics, 10 angioplasty, and 5-aneurysm treatment. The AMN of diagnostic procedures was 641 for the primary interventional radiologist and 930 for the assisting interventional radiologist. For the angioplasty procedures, the AMN for primary interventional radiologist was 445 and for assisting interventional radiologist was 1202. As for the procedures of aneurism treatment, the AMN for the primary interventional radiologist was 113 and for the assisting interventional radiologist were 215. All AMN were limited by the eye lens doses already considering the use of protective glasses. In all categories evaluated, the higher dose values are found in gonads and in the lower regions of professionals, both for the primary interventionist and for the assisting, but the eyes lens dose limits are smaller than these regions. Additional protections as mobile barriers, which can be positioned between the interventionist and the patient, can decrease the exposures in the eye lens, providing a greater protection for the medical staff. The alternation of professionals to perform each type of procedure can reduce the dose values received by them over a period. The analysis of dose profiles proposed in this work showed that personal dosimeters positioned in chest might underestimate dose values in other body parts of the interventional physician, especially in extremities and eye lens. As each body region of the interventionist is subject to different levels of exposure, dose distribution in each region provides a better approach to what actions are necessary to ensure the radiological protection of medical staff.Keywords: interventional radiology, radiation protection, occupationally exposed individual, hemodynamic
Procedia PDF Downloads 39626767 Development of Personal Protection Equipment for Dental Surgeon
Authors: Thi. A. D. Tran, Matthieu Arnold, Dominique Adolphe, Laurence Schcher, Guillaume Reys
Abstract:
During daily oral health cares, dental surgeons are in contact with numerous potentially infectious germs from patients' saliva and blood. In order to take into account these risks, a product development process has been unrolled to propose to the dental surgeon a personal protection equipment that is suitable with their expectations in terms of images, protection and comfort. After a consumer study, to evaluate how the users wear the garment and their expectations, specifications have been carried out and technical solutions have been developed in order to answer to the maximum of the desiderata. Thermal studies and comfort studies have been performed. The obtained results lead to define the technical solutions concerning the design of the new scrub. Three main functions have been investigated, the ergonomic aspect, the protection and the thermal comfort. In terms of ergonomic aspect, instrumented garments have been worn and pressure measurements have been done. The results highlight that a raglan shape for the sleeves has to be selected for a better dynamic comfort. Moreover, spray tests helped us to localize the potential contamination area and therefore protection devices have been placed on the garment. Concerning the thermal comfort, an I-R study was conducted in consulting room under the real working conditions; the heating zones have been detected. Based on these results, solutions have been proposed and implemented in a new gown. This new gown is currently composed of three different parts; a protective layer placed in the chest area to avoid contamination; a breathable layer placed in the back and in the armpits and a normal PET/Cotton fabric for the rest of the gown. Through the fitting tests conducted in hospital, it was obtained that the new design was highly appreciated. Some points can nevertheless be further improved. A final product will be produced based on necessary improvements.Keywords: comfort, dentists, garment, thermal
Procedia PDF Downloads 31426766 Nanoparticle Based Green Inhibitor for Corrosion Protection of Zinc in Acidic Medium
Authors: Neha Parekh, Divya Ladha, Poonam Wadhwani, Nisha Shah
Abstract:
Nano scaled materials have attracted tremendous interest as corrosion inhibitor due to their high surface area on the metal surfaces. It is well known that the zinc oxide nanoparticles have higher reactivity towards aqueous acidic solution. This work presents a new method to incorporate zinc oxide nanoparticles with white sesame seeds extract (nano-green inhibitor) for corrosion protection of zinc in acidic medium. The morphology of the zinc oxide nanoparticles was investigated by TEM and DLS. The corrosion inhibition efficiency of the green inhibitor and nano-green inhibitor was determined by Gravimetric and electrochemical impedance spectroscopy (EIS) methods. Gravimetric measurements suggested that nano-green inhibitor is more effective than green inhibitor. Furthermore, with the increasing temperature, inhibition efficiency increases for both the inhibitors. In addition, it was established the Temkin adsorption isotherm fits well with the experimental data for both the inhibitors. The effect of temperature and Temkin adsorption isotherm revealed Chemisorption mechanism occurring in the system. The activation energy (Ea) and other thermodynamic parameters for inhibition process were calculated. The data of EIS showed that the charge transfer controls the corrosion process. The surface morphology of zinc metal (specimen) in absence and presence of green inhibitor and nano-green inhibitor were performed using Scanning Electron Microscopy (SEM) and Atomic Force Microscopy (AFM) techniques. The outcomes indicated a formation of a protective layer over zinc metal (specimen).Keywords: corrosion, green inhibitor, nanoparticles, zinc
Procedia PDF Downloads 46126765 Implementation of Invisible Digital Watermarking
Authors: V. Monisha, D. Sindhuja, M. Sowmiya
Abstract:
Over the decade, the applications about multimedia have been developed rapidly. The advancement in the communication field at the faster pace, it is necessary to protect the data during transmission. Thus, security of multimedia contents becomes a vital issue, and it is a need for protecting the digital content against malfunctions. Digital watermarking becomes the solution for the copyright protection and authentication of data in the network. In multimedia applications, embedded watermarks should be robust, and imperceptible. For improving robustness, the discrete wavelet transform is used. Both encoding and extraction algorithm can be done using MATLAB R2012a. In this Discrete wavelet transform (DWT) domain of digital image, watermarking algorithm is used, and hardware implementation can be done on Xilinx based FPGA.Keywords: digital watermarking, DWT, robustness, FPGA
Procedia PDF Downloads 41626764 Legal Regulations for the Environmental Pollution of Multinational Corporations in China
Authors: Zhang Rui
Abstract:
Multinational corporations have significantly increased their investment in China due to their strong economic strength and advanced production technology. On the one hand, this has promoted the development of China's economy, created a large amount of tax revenue for China's finance, and brought huge economic benefits to China's economic development. On the other hand, it has also consumed huge resources in China and even caused serious environmental damage, which has attracted widespread attention from all sectors of society to the environmental violations committed by multinational corporations in China. Due to the incomplete legal regulation of environmental responsibility of multinational corporations in China, there are legal gaps that provide convenient conditions for them to transfer pollution. These multinational corporations in China will take advantage of the loopholes in Chinese laws and even achieve "zero pollution" in their home country's environmental protection, but their branches in China only meet the minimum standards stipulated by Chinese environmental protection laws. Therefore, the differential treatment of environmental protection by multinational corporations urgently needs to be regulated from a legal perspective in China to promote the balance and harmony between ecological environment protection and economic development. At present, the environmental pollution caused by multinational corporations in China has received widespread attention from Chinese scholars. Through research on the environmental pollution and legal aspects of multinational corporations in China, it not only helps to enrich the theoretical research results of environmental pollution and legal regulation of multinational corporations in China, but also promotes the continuous improvement of the relevant legal system for environmental pollution caused by multinational corporations in China, so as to effectively regulate the environmental pollution caused by multinational corporations in China in practice, and provide legal basis for the governance of environmental violations.Keywords: international law, environmental law, multinational corporations, jurisdiction
Procedia PDF Downloads 2826763 Prototype for Measuring Blue Light Protection in Sunglasses
Authors: A. D. Loureiro, L. Ventura
Abstract:
Exposure to high-energy blue light has been strongly linked to the development of some eye diseases, such as age-related macular degeneration. Over the past few years, people have become more and more concerned about eye damage from blue light and how it can be prevented. We developed a prototype that allows users to self-check the blue light protection of their sunglasses and determines if the protection is adequate. Weighting functions approximating those defined in ISO 12312-1 were used to measure the luminous transmittance and blue light transmittance of sunglasses. The blue light transmittance value must be less than 1.2 times the luminous transmittance to be considered adequate. The prototype consists of a Golden Dragon Ultra White LED from OSRAM and a TCS3472 photodetector from AMS TAOS. Together, they provide four transmittance values weighted with different functions. These four transmittance values were then linearly combined to produce transmittance values with weighting functions close to those defined in ISO 12312-1 for luminous transmittance and for blue light transmittance. To evaluate our prototype, we used a VARIAN Cary 5000 spectrophotometer, a gold standard in the field, to measure the luminous transmittance and the blue light transmittance of 60 sunglasses lenses. (and Bland-Altman analysis was performed) Bland-Altman analysis was performed and showed non-significant bias and narrow 95% limits of agreement within predefined tolerances for both luminous transmittance and blue light transmittance. The results show that the prototype is a viable means of providing blue light protection information to the general public and a quick and easy way for industry and retailers to test their products. In addition, our prototype plays an important role in educating the public about a feature to look for in sunglasses before purchasing.Keywords: blue light, sunglasses, eye protective devices, transmittance measurement, standards, ISO 12312-1
Procedia PDF Downloads 17226762 Implementation of Performance Management and Development System: The Case of the Eastern Cape Provincial Department of Health, South Africa
Authors: Thanduxolo Elford Fana
Abstract:
Rationale and Purpose: Performance management and development system are central to effective and efficient service delivery, especially in highly labour intensive sectors such as South African public health. Performance management and development systems seek to ensure that good employee performance is rewarded accordingly, while those who underperform are developed so that they can reach their full potential. An effective and efficiently implemented performance management system motivates and improves employee engagement. The purpose of this study is to examine the implementation of the performance management and development system and the challenges that are encountered during its implementation in the Eastern Cape Provincial Department of Health. Methods: A qualitative research approach and a case study design was adopted in this study. The primary data were collected through observations, focus group discussions with employees, a group interview with shop stewards, and in-depth interviews with supervisors and managers, from April 2019 to September 2019. There were 45 study participants. In-depth interviews were held with 10 managers at facility level, which included chief executive officer, chief medical officer, assistant director’s in human resources management, patient admin, operations, finance, and two area manager and two operation managers nursing. A group interview was conducted with five shop stewards and an in-depth interview with one shop steward from the group. Five focus group discussions were conducted with clinical and non-clinical staff. The focus group discussions were supplemented with an in-depth interview with one person from each group in order to counter the group effect. Observations included moderation committee, contracting, and assessment meetings. Findings: The study shows that the performance management and development system was not properly implemented. There was non-compliance to performance management and development system policy guidelines in terms of time lines for contracting, evaluation, payment of incentives to good performers, and management of poor performance. The study revealed that the system is ineffective in raising the performance of employees and unable to assist employees to grow. The performance bonuses were no longer paid to qualifying employees. The study also revealed that lack of capacity and commitment, poor communication, constant policy changes, financial constraints, weak and highly bureaucratic management structures, union interference were challenges that were encountered during the implementation of the performance management and development system. Lastly, employees and supervisors were rating themselves three irrespective of how well or bad they performed. Conclusion: Performance management is regarded as vital to improved performance of the health workforce and healthcare service delivery among populations. Effective implementation of performance management and development system depends on well-capacitated and unbiased management at facility levels. Therefore, there is an urgent need to improve communication, link performance management to rewards, and capacitate staff on performance management and development system, as it is key to improved public health sector outcomes or performance.Keywords: challenges, implementation, performance management and development system, public hospital
Procedia PDF Downloads 13926761 Deep Well Grounded Magnetite Anode Chains Retrieval and Installation for Raslanuf Complex Impressed Current Cathodic Protection System Rectification
Authors: Mohamed Ahmed Khali
Abstract:
Numbers of deep well anode ground beds (GBs) have been retrieved due to un operated anode chains. New identical magnetite anode chains(MAC) have been installed at Raslanuf complex impressed current Cathodic protection(ICCP) system, distributed at different plants(Utility, ethylene and polyethylene). All problems associated with retrieving and installation of MACs have been discussed, rectified and presented. All GB associated severely corroded wellhead casings were well maintained and/ or replaced by new fabricated and modified ones. The main cause of wellhead casings internal corrosion was discussed, and the conducted remedy action to overcome future corrosion problem is presented. All GB connected anode junction boxes (AJBs) and shunts were closely inspected, maintained, and necessary replacement/and or modification were carried out on shunts. All damaged GB concrete foundations (CF) have been inspected and completely replaced. All GB associated Transformer-Rectifiers units (TRUs) were subjected to through inspection, and necessary maintenance has been performed on each individual TRU. After completion of all MACs and TRU maintenance activities, each cathodic protection station (CPS) has been re-operated. An alternative current (AC), direct current (DC), voltage and structure to soil potential (S/P) measurements have been conducted, recorded, and all obtained test results are presented. DC current outputs has been adjusted, and DC current outputs of each MAC has been recorded for each GB AJB.Keywords: magnatite anode, deep well, ground bed, cathodic protection, transformer rectifies, impreced current, junction box
Procedia PDF Downloads 11726760 Safety System Design and Overfill Protection for Loading Asphalt onto Trucks
Authors: Wendy Ampadu, Ray Diezmos, Hassan Malik, Jeremy Hyslob
Abstract:
There are several technologies out there for use as high-level switches as part of a system for shutting down flow to a vessel. Given that the asphalt truck loading poses issues such as poor visibility, coating, condensation, and fumes, a solution that is robust enough to last in these conditions is often needed in industries. Furthermore, the design of the loading arm, rack, and process equipment should allow for the safety of workers. The objective of this report includes the redesign of structures for use at loading facilities and selecting an overflow technology protection from hot bitumen. The report is based on loading facilities at a Canadian bitumen production company. The engineering design approach was used to create multiple redesign concepts for the loading dock system. Research on overfill systems was also completed by surveying the existing market for technologies and securing quotes from over 20 Canadian and United States instrumentation companies. A final loading dock redesign and level transmitter for overfill protection solution were chosen.Keywords: bitumen, reliability engineering, safety system, process safety management, asphalt, loading docks, tanker trucks
Procedia PDF Downloads 16026759 An Analysis of Urban Institutional Arrangements and Their Implications on Wetlands Allocation for Development Purposes: A Case of Harare, Zimbabwe
Authors: Effort M. Magoso
Abstract:
This study analyses urban institutional arrangements and their implications on allocation of wetlands for development purposes in Zimbabwe using a case study of Harare. It was driven by the need to get to the root of the current urban assault on wetlands. The study sought to analyse institutions that influence wetlands governance in Harare, to ascertain level of wetlands loss and to determine the adequacy of the legal and regulatory framework for governing wetlands. Theories of common property resources and of institutions are the paradigms that undergird this study. A qualitative research methodology was employed, while in-depth interviews, observations and document review were used to gather data. The study found out that unchecked infrastructure developments are taking place in the city’s wetlands. Urban institutional arrangements in Harare were exposed as having negative implications on the protection of wetlands. It is the key argument of this study that good institutional arrangements are priceless in the protection of commons such as wetlands. This study also recommends a new framework that has environmentalists and technocrats as the final decision maker in land allocation as the solution to protect wetlands from undue anthropogenic activities.Keywords: institutional arrangements, common property resources, wetlands, institutions
Procedia PDF Downloads 39326758 Experimental Study on Using the Aluminum Sacrificial Anode as a Cathodic Protection for Marine Structures
Authors: A. Radwan, A. Elbatran, A. Mehanna, M. Shehadeh
Abstract:
The corrosion is natural chemical phenomenon that is applied in many engineering structures. Hence, it is one of the important topics to study in the engineering research. Ship and offshore structures are most exposed to corrosion due to the presence of corrosive medium of air and the seawater. Consequently, investigation of the corrosion behavior and properties over ship and offshore hulls is one of the important topics to study in the marine engineering research. Using sacrificial anode is the most popular solution for protecting marine structures from corrosion. Hence, this research investigates the extent of corrosion between the composite ship model and relative velocity of water, along with the sacrificial aluminum anode consumption and its degree of protection in seawater. In this study, the consumption rate of sacrificial aluminum anode with respect to relative velocity at different Reynold’s numbers was studied experimentally, and it was found that, the degree of cathodic protection represented by the cathode potential at a given distance from the aluminum anode was decreased slightly with increment of the relative velocity.Keywords: corrosion, Reynold's numbers, sacrificial anode, velocity
Procedia PDF Downloads 55826757 Hearing Conservation Aspects of Soldier’s Exposure to Harmfull Noise within Military Armored Vehicles
Authors: Fink Nir
Abstract:
Soldiers within armored vehicles are exposed to continuous noise reaching levels as high as 120 dB. The use of hearing protection devices (HPD) may attenuate noise by as 25 dB, but attenuated noise reaching the ear is still harmful and may result in hearing loss. Hearing conservation programs in the military suggest methods to manage the harmful effects of noise. These include noise absorption within vehicles, evaluating HPD's performance, limiting time exposure, and providing guidance.Keywords: armored vehicle noise, hearing loss, hearing protection devices, military noise, noise attenuation
Procedia PDF Downloads 151