Search results for: end fault protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2824

Search results for: end fault protection

2524 Robust Diagnosis Efficiency by Bond-Graph Approach

Authors: Benazzouz Djamel, Termeche Adel, Touati Youcef, Alem Said, Ouziala Mahdi

Abstract:

This paper presents an approach which detect and isolate efficiently a fault in a system. This approach avoids false alarms, non-detections and delays in detecting faults. A study case have been proposed to show the importance of taking into consideration the uncertainties in the decision-making procedure and their effect on the degradation diagnostic performance and advantage of using Bond Graph (BG) for such degradation. The use of BG in the Linear Fractional Transformation (LFT) form allows generating robust Analytical Redundancy Relations (ARR’s), where the uncertain part of ARR’s is used to generate the residuals adaptive thresholds. The study case concerns an electromechanical system composed of a motor, a reducer and an external load. The aim of this application is to show the effectiveness of the BG-LFT approach to robust fault detection.

Keywords: bond graph, LFT, uncertainties, detection and faults isolation, ARR

Procedia PDF Downloads 288
2523 Protection and Renewal Strategies of Historical Blocks from the Perspective of “Staged Authenticity”

Authors: Xu Yingqiang, Wang Zhongde

Abstract:

In the age of stock development, the contradiction between the protection and development of historical blocks in China has become increasingly prominent, among which how to reconcile the contradiction between tourists and local residents and inherit urban culture is an important proposition. Based on this, this paper introduces the theory of " staged authenticity ", combs its development process and related research progress, constructs an analysis and research model of historical blocks based on the theory of " staged authenticity ", and puts forward the protection and renewal strategy of historical blocks from the perspective of " staged authenticity ", which provides theoretical basis for coordinating the tourism-residence contradiction and protecting urban characteristics in the protection and renewal of historical blocks. The research holds that we should pay attention to the important value of "curtain" space, rationally arrange "curtain" and divide "foreground" and "background"; extract "props" from real history and culture to restore the authenticity of "stage" scenes; clever arrangement of tour streamline, so that all scenes are connected in series rhythmically; make the "actors" perform interactively in the "foreground" space, so as to enhance the "audience" sense of scene substitution.

Keywords: historic block, protection and renewal, staged authenticity, curtain

Procedia PDF Downloads 46
2522 Fault Prognostic and Prediction Based on the Importance Degree of Test Point

Authors: Junfeng Yan, Wenkui Hou

Abstract:

Prognostics and Health Management (PHM) is a technology to monitor the equipment status and predict impending faults. It is used to predict the potential fault and provide fault information and track trends of system degradation by capturing characteristics signals. So how to detect characteristics signals is very important. The select of test point plays a very important role in detecting characteristics signal. Traditionally, we use dependency model to select the test point containing the most detecting information. But, facing the large complicated system, the dependency model is not built so easily sometimes and the greater trouble is how to calculate the matrix. Rely on this premise, the paper provide a highly effective method to select test point without dependency model. Because signal flow model is a diagnosis model based on failure mode, which focuses on system’s failure mode and the dependency relationship between the test points and faults. In the signal flow model, a fault information can flow from the beginning to the end. According to the signal flow model, we can find out location and structure information of every test point and module. We break the signal flow model up into serial and parallel parts to obtain the final relationship function between the system’s testability or prediction metrics and test points. Further, through the partial derivatives operation, we can obtain every test point’s importance degree in determining the testability metrics, such as undetected rate, false alarm rate, untrusted rate. This contributes to installing the test point according to the real requirement and also provides a solid foundation for the Prognostics and Health Management. According to the real effect of the practical engineering application, the method is very efficient.

Keywords: false alarm rate, importance degree, signal flow model, undetected rate, untrusted rate

Procedia PDF Downloads 363
2521 Appropriate Legal System for Protection of Plant Innovations in Afghanistan

Authors: Mohammad Reza Fooladi

Abstract:

Because of the importance and effect of plant innovations on economy, industry, and especially agriculture, they have been on the core attention of legislators at the national level, and have been a topic of international documents related to intellectual innovations in the recent decades. For protection of plant innovations, two legal systems (i.e. particular system based on International Convention for protection of new variety of plants, and the patent system) have been considered. Ease of access to the support and the level of support in each of these systems are different. Our attempt in this paper, in addition to describing and analyzing the characteristics of each system, is to suggest the compatible system to the industry and agriculture of Afghanistan. Due to the lack of sufficient industrial infrastructure and academic research, the particular system based on the International Convention on the protection of new variety of plants is suggested. At the same time, appropriate industrial and legal infrastructures, as well as laboratories and research centers should be provided in order that plant innovations under the patent system could also be supported.

Keywords: new varieties of plant, patent, agriculture, Afghanistan

Procedia PDF Downloads 310
2520 A Recombinant Group a Streptococcus (GAS-2W) Strain Elicits Protective Immunity in Mice through Induction of an IFN-γ Dependent Humoral Response

Authors: Shiva Emami, Jenny Persson, Bengt Johansson Lindbom

Abstract:

Group A streptococcus (GAS) is a prevalent human pathogen, causing a wide range of infections and diseases. One of the most well-known virulence factors in GAS is M protein, a surface protein that facilitates bacterial invasion. In this study, we used a recombinant GAS strain (GAS-2W) expressing M protein containing a hyper immunogenic peptide (2W). Mice were immunized three times with heat-killed-GAS subcutaneously at three weeks intervals. Three weeks post last immunization, mice were challenged intraperitoneally with a lethal dose of live GAS. In order to investigate the impact of IFN-ƴ and antibodies in protection against GAS infection, we used a mouse model knock-out for IFN-ƴ (IFN-ƴ KO). We observed immunization with GAS-2W strain can increase protection against GAS infection in mice compared with the original GAS strain. Higher levels of antibodies against M1 protein were measured in GAS-2W-immunized mice. There was also a significant increase in IgG2c response in mice immunized with GAS2W. By using IFN-ƴ KO mice, we showed that not a high level of total IgG, but IgG2c was correlated with protection through the i.p challenge. It also emphasizes the importance of IFN-ƴ cytokine to combat GAS by isotype switching to IgG2c (which is opsonic for phagocytosis). Our data indicate the crucial role of IFN-ƴ in the protective immune response that, together with IgG2c, can induce protection against GAS.

Keywords: Group A streptococcus, IgG2c, IFN-γ, protection

Procedia PDF Downloads 72
2519 Human Rights to Environment: The Constitutional and Judicial Perspective in India

Authors: Varinder Singh

Abstract:

The primitive man had not known anything like human rights. In the later centuries of human progress with the development of scientific and technological knowledge, the growth of population and the tremendous changes in the human environment, the laws of nature that maintained the Eco-balance crumbled. The race for better and comfortable life landed mankind in a vicious circle. It created environmental imbalance, unplanned and uneven development, breakdown of self-sustaining village economy, mushrooming of shanty towns and slums, widening the chasm between the rich and the poor, over-exploitation of natural resources, desertification of arable lands, pollution of different kinds, heating up of earth and depletion of ozone layer. Modem International Life has been deeply marked and transformed by current endeavors to meet the needs and fulfill the requirements of protection of human person and of the environment. Such endeavors have been encouraged by the widespread recognition that protection of human being and the environment reflects common superior values and constitutes a common concern of mankind. The parallel evolutions of human rights protection and environmental protection disclose some close affinities. There was the occurrence of process of internationalization of both human rights protection and environmental protection, the former beginning with the 1948 Universal Declaration of Human Rights, the latter with the 1972 Stockholm Declaration on the Human Environment.It is now well established that it is the basic human right of every individual to live in a pollution free environment with full human dignity. The judiciary has so far pronounced a number of judgments in this regard. The Supreme Court in view of various laws relating to environment protection and the constitutional provision has held that right to pollution free environment. Article-21 is the heart of the fundamental rights and has received expanded meanings from time to time.

Keywords: human rights, law, environment, polluter

Procedia PDF Downloads 207
2518 Fault Analysis of Ship Power System Comprising of Parallel Generators and Variable Frequency Drive

Authors: Umair Ashraf, Kjetil Uhlen, Sverre Eriksen, Nadeem Jelani

Abstract:

Although advancement in technology has increased the reliability and ease of work in ship power system, but these advancements are also adding complexities. Ever increasing non linear loads, like power electronics (PE) devices effect the stability of the system. Frequent load variations and complex load dynamics are due to the frequency converters and motor drives, these problem are more prominent when system is connected with the weak grid. In the ship power system major consumers are thruster motors for the propulsion. For the control operation of these motors variable frequency drives (VFD) are used, mostly VFDs operate on nominal voltage of the system. Some of the consumers in ship operate on lower voltage than nominal, these consumers got supply through step down transformers. In this paper the vector control scheme is used for the control of both rectifier and inverter, parallel operation of the synchronous generators is also demonstrated. The simulation have been performed with induction motor as load on VFD and parallel RLC load. Fault analysis has been performed first for the system which do not have VFD and then for the system with VFD. Three phase to the ground, single phase to the ground fault were implemented and behavior of the system in both the cases was observed.

Keywords: non-linear load, power electronics, parallel operating generators, pulse width modulation, variable frequency drives, voltage source converters, weak grid

Procedia PDF Downloads 555
2517 The Impact of the Saudi New E-Commerce Law on Protecting E-Commerce Investments in Saudi Arabia

Authors: Faris Algarni

Abstract:

The Kingdom of Saudi Arabia adopted a new law of e-commerce on July 10, 2019, which is the first Saudi law regarding e-commerce. The practice of e-commerce has been started in Saudi Arabia a few years ago with no specific rules to govern e-commerce in the Kingdom. The adoption of the law raises the concern of the ability of the law to provide real protection to both the investors and the customers. Based on that, this article seeks to respond to some questions related to the protection of investors of e-commerce in Saudi Arabia, using a quantitative method through questionnaires to gather primary data. The study tried to find the impact of adopting a new Saudi law of e-commerce on the protection of the investors from the point of view of those investors. By answering this main question, this article provides an answer to the question of whether there is a need to reform the Saudi law of e-commerce to convince existing and potential foreign investors to invest in the Kingdom through e-commerce. Questions were put to the respondents to determine their level of satisfaction with the Saudi law of e-commerce and what reforms to that system would enhance the attractiveness of the Kingdom as an investment environment for e-commerce investors, based on the information gathered and the analysis of them. A key finding is that the law of e-commerce is a core factor in the decision of investors to continue investing in the e-commerce market in Saudi Arabia. A subsequent finding is that some of the respondents are not fully satisfied with the new law and think that the law provides more protection to the customers than the investors. So, they are suggesting some legal reforms to be implemented in the bylaw of e-commerce, which is not adopted yet in order to attract them to continue investing in the Kingdom.

Keywords: e-commerce, law, investors, protection, Saudi Arabia

Procedia PDF Downloads 107
2516 Effect of Soil Resistivity on the Development of a Cathodic Protection System Using Zinc Anode

Authors: Chinedu F. Anochie

Abstract:

The deterioration of materials as a result of their interaction with the environment has been a huge challenge to engineering. Many steps have been taking to tackle corrosion and its effects on harmful effects on engineering materials and structures. Corrosion inhibition, coating, passivation, materials selection, and cathodic protection are some of the methods utilized to curtail the rate at which materials corrode. The use of sacrificial anodes (magnesium, aluminum, or zinc) to protect the metal of interest is a widespread technique used to prevent corrosion in underground structures, ship hauls, and other structures susceptible to corrosion attack. However, certain factors, like resistivity, affect the performance of sacrificial anodes. To establish the effect of soil resistivity on the effectiveness of a cathodic protection system, a mild steel specimen was cathodically protected around Workshop 2 area, Federal University of Technology, Owerri, Nigeria. Design calculations showed that one zinc anode was sufficient to protect the pipe. The specimen (mild steel pipe) was coated with white and black polykene tapes and was subsequently buried in a high resistivity soil. The pipe-to-soil potential measurements were obtained using a digital fluke multimeter. The protection potential obtained on installation was higher than the minimum protection criteria. However, the potential results obtained over a fourteen-day intervals continually decreased to a value significantly lower than the minimum protection criteria. This showed that the sacrificial anode (zinc) was rendered ineffective by the high resistivity of the area of installation. It has been shown that the resistivity of the soil has a marked effect on the feasibility of cathodic protection systems. This work justified that zinc anode cannot be used for cathodic protection around Workshop 2 area, Federal University of Technology, Owerri, Nigeria, because of the high resistivity of the area. An experimental data which explains the effectiveness of galvanic anode cathodic protection system on corrosion control of a small steel structure, exposed to a soil of high resistivity has been established.

Keywords: cathodic protection, corrosion, pipe, sacrificial anode

Procedia PDF Downloads 162
2515 Sustainable Development: The Human Rights Approach to Environmental Protection in South Africa

Authors: CM van der Bank, Marjoné van der Bank

Abstract:

International and domestic environmental law has evolved quite rapidly in the last few decades. At the international level the Stockholm and Rio Declarations paved the way for a broad based consensus of the international community on environmental issues and principles. At the Domestic level also many states have incorporated environmental protection in their constitutions and even more states are doing the same at least in their domestic legislations. In this process of evolution environmental law has unleashed a number of novel principles such as; the participatory principle, the polluter pays principle, the precautionary principle, the inter-generational and intra-generational principles, the prevention principle, the sustainable development principle and so on.

Keywords: environment, human rights, international law, protection

Procedia PDF Downloads 454
2514 The Impact of the General Data Protection Regulation on Human Resources Management in Schools

Authors: Alexandra Aslanidou

Abstract:

The General Data Protection Regulation (GDPR), concerning the protection of natural persons within the European Union with regard to the processing of personal data and on the free movement of such data, became applicable in the European Union (EU) on 25 May 2018 and transformed the way personal data were being treated under the Data Protection Directive (DPD) regime, generating sweeping organizational changes to both public sector and business. A social practice that is considerably influenced in the way of its day-to-day operations is Human Resource (HR) management, for which the importance of GDPR cannot be underestimated. That is because HR processes personal data coming in all shapes and sizes from many different systems and sources. The significance of the proper functioning of an HR department, specifically in human-centered, service-oriented environments such as the education field, is decisive due to the fact that HR operations in schools, conducted effectively, determine the quality of the provided services and consequently have a considerable impact on the success of the educational system. The purpose of this paper is to analyze the decisive role that GDPR plays in HR departments that operate in schools and in order to practically evaluate the aftermath of the Regulation during the first months of its applicability; a comparative use cases analysis in five highly dynamic schools, across three EU Member States, was attempted.

Keywords: general data protection regulation, human resource management, educational system

Procedia PDF Downloads 85
2513 Industrial Process Mining Based on Data Pattern Modeling and Nonlinear Analysis

Authors: Hyun-Woo Cho

Abstract:

Unexpected events may occur with serious impacts on industrial process. This work utilizes a data representation technique to model and to analyze process data pattern for the purpose of diagnosis. In this work, the use of triangular representation of process data is evaluated using simulation process. Furthermore, the effect of using different pre-treatment techniques based on such as linear or nonlinear reduced spaces was compared. This work extracted the fault pattern in the reduced space, not in the original data space. The results have shown that the non-linear technique based diagnosis method produced more reliable results and outperforms linear method.

Keywords: process monitoring, data analysis, pattern modeling, fault, nonlinear techniques

Procedia PDF Downloads 372
2512 Democracy Bytes: Interrogating the Exploitation of Data Democracy by Radical Terrorist Organizations

Authors: Nirmala Gopal, Sheetal Bhoola, Audecious Mugwagwa

Abstract:

This paper discusses the continued infringement and exploitation of data by non-state actors for destructive purposes, emphasizing radical terrorist organizations. It will discuss how terrorist organizations access and use data to foster their nefarious agendas. It further examines how cybersecurity, designed as a tool to curb data exploitation, is ineffective in raising global citizens' concerns about how their data can be kept safe and used for its acquired purpose. The study interrogates several policies and data protection instruments, such as the Data Protection Act, Cyber Security Policies, Protection of Personal Information(PPI) and General Data Protection Regulations (GDPR), to understand data use and storage in democratic states. The study outcomes point to the fact that international cybersecurity and cybercrime legislation, policies, and conventions have not curbed violations of data access and use by radical terrorist groups. The study recommends ways to enhance cybersecurity and reduce cyber risks using democratic principles.

Keywords: cybersecurity, data exploitation, terrorist organizations, data democracy

Procedia PDF Downloads 181
2511 The Time-Frequency Domain Reflection Method for Aircraft Cable Defects Localization

Authors: Reza Rezaeipour Honarmandzad

Abstract:

This paper introduces an aircraft cable fault detection and location method in light of TFDR keeping in mind the end goal to recognize the intermittent faults adequately and to adapt to the serial and after-connector issues being hard to be distinguished in time domain reflection. In this strategy, the correlation function of reflected and reference signal is used to recognize and find the airplane fault as per the qualities of reflected and reference signal in time-frequency domain, so the hit rate of distinguishing and finding intermittent faults can be enhanced adequately. In the work process, the reflected signal is interfered by the noise and false caution happens frequently, so the threshold de-noising technique in light of wavelet decomposition is used to diminish the noise interference and lessen the shortcoming alert rate. At that point the time-frequency cross connection capacity of the reference signal and the reflected signal based on Wigner-Ville appropriation is figured so as to find the issue position. Finally, LabVIEW is connected to execute operation and control interface, the primary capacity of which is to connect and control MATLAB and LABSQL. Using the solid computing capacity and the bottomless capacity library of MATLAB, the signal processing turn to be effortlessly acknowledged, in addition LabVIEW help the framework to be more dependable and upgraded effectively.

Keywords: aircraft cable, fault location, TFDR, LabVIEW

Procedia PDF Downloads 460
2510 Robust Diagnosability of PEMFC Based on Bond Graph LFT

Authors: Ould Bouamama, M. Bressel, D. Hissel, M. Hilairet

Abstract:

Fuel cell (FC) is one of the best alternatives of fossil energy. Recently, the research community of fuel cell has shown a considerable interest for diagnosis in view to ensure safety, security, and availability when faults occur in the process. The problematic for model based FC diagnosis consists in that the model is complex because of coupling of several kind of energies and the numerical values of parameters are not always known or are uncertain. The present paper deals with use of one tool: the Linear Fractional Transformation bond graph tool not only for uncertain modelling but also for monitorability (ability to detect and isolate faults) analysis and formal generation of robust fault indicators with respect to parameter uncertainties.The developed theory applied to a nonlinear FC system has proved its efficiency.

Keywords: bond graph, fuel cell, fault detection and isolation (FDI), robust diagnosis, structural analysis

Procedia PDF Downloads 351
2509 Using Game Engines in Lightning Shielding: The Application of the Rolling Spheres Method on Virtual As-Built Power Substations

Authors: Yuri A. Gruber, Matheus Rosendo, Ulisses G. A. Casemiro, Klaus de Geus, Rafael T. Bee

Abstract:

Lightning strikes can cause severe negative impacts to the electrical sector causing direct damage to equipment as well as shutdowns, especially when occurring in power substations. In order to mitigate this problem, a meticulous planning of the power substation protection system is of vital importance. A critical part of this is the distribution of shielding wires through the substation, which creates a 3D imaginary protection mesh similar to a circus tarpaulin. Equipment enclosed in the volume defined by that 3D mesh is considered protected against lightning strikes. The use of traditional methods of longitudinal cutting analysis based on 2D CAD tools makes the process laborious and the results obtained may not guarantee satisfactory protection of electrical equipment. This work describes the application of a Game Engine to the problem of lightning protection of power substations providing the visualization of the 3D protection mesh, the amount of protected components and the highlight of equipment which remain unprotected. In addition, aspects regarding the implementation and the advantages of approaching the problem using Unreal® Engine 4 are described. In order to validate results, a comparison with traditional 2D methods is applied to the same case study to which the proposed technique has been applied. Finally, a comparative study involving different levels of protection using the technique developed in this work is presented, showing that modern game engines can be a powerful accessory for simulations in several areas of engineering.

Keywords: game engine, rolling spheres method, substation protection, UE4, Unreal Engine 4

Procedia PDF Downloads 514
2508 Design and Analysis of Shielding Magnetic Field for Active Space Radiation Protection

Authors: Chaoyan Huang, Hongxia Zheng

Abstract:

For deep space exploration and long duration interplanetary manned missions, protection of astronauts from cosmic radiation is an unavoidable problem. However, passive shielding can be little effective for protecting particles which energies are greater than 1GeV/nucleon. In this study, active magnetic protection method is adopted. Taking into account the structure and size of the end-cap, eight shielding magnetic field configurations are designed based on the Hoffman configuration. The shielding effect of shielding magnetic field structure, intensity B and thickness L on H particles with 2GeV energy is compared by test particle simulation. The result shows that the shielding effect is better with the linear type magnetic field structure in the end-cap region. Furthermore, two magnetic field configurations with better shielding effect are investigated through H and He galactic cosmic spectra. And the shielding effect of the linear type configuration adopted in the barrel and end-cap regions is best.

Keywords: galactic cosmic rays, active protection, shielding magnetic field configuration, shielding effect

Procedia PDF Downloads 118
2507 Traditional versus New Media: Creating Awareness on Environment Protection in Pakistan

Authors: Hafsah Javed

Abstract:

Environment protection is a major issue grabbing widespread attention of policymakers, both, locally and globally. Pakistan is among the countries most affected by global climate changes; media, besides governments, have a prime responsibility to create awareness among people about its hazards, and managing strategies. Advances in Information Communication Technologies have eased people's access to information and created an interactive space to discuss environment related issues and influence the policy decisions on the issue. This study, therefore, aims to examine, from the perspective of the audience, the contribution of Pakistani traditional and social media in creating awareness about Environment Protection and its implications. The objectives are achieved through quantitative survey method. Young university students are selected as ‘audience’ for the study. The findings show lack of awareness among people regarding environment protection. Neither traditional media outlets like radio, TV and newspapers prioritize the issue on their agenda, nor audience pull information about the issue from social media. A stark indifference and non-serious attitude is being exercised towards the issue from two quarters. People do not know much about local and international laws on environment; media are used more than a source of entertainment than awareness. The study implicates that there is an exigency to launch a nationwide awareness campaign on the issue, and for that media need to be on the driving seat.

Keywords: awareness, climate change, environment protection, new media, role of media, youngsters

Procedia PDF Downloads 126
2506 Artificial Neural Networks with Decision Trees for Diagnosis Issues

Authors: Y. Kourd, D. Lefebvre, N. Guersi

Abstract:

This paper presents a new idea for fault detection and isolation (FDI) technique which is applied to industrial system. This technique is based on Neural Networks fault-free and Faulty behaviors Models (NNFM's). NNFM's are used for residual generation, while decision tree architecture is used for residual evaluation. The decision tree is realized with data collected from the NNFM’s outputs and is used to isolate detectable faults depending on computed threshold. Each part of the tree corresponds to specific residual. With the decision tree, it becomes possible to take the appropriate decision regarding the actual process behavior by evaluating few numbers of residuals. In comparison to usual systematic evaluation of all residuals, the proposed technique requires less computational effort and can be used for on line diagnosis. An application example is presented to illustrate and confirm the effectiveness and the accuracy of the proposed approach.

Keywords: neural networks, decision trees, diagnosis, behaviors

Procedia PDF Downloads 478
2505 Role of Fracturing, Brecciation and Calcite Veining in Fluids Flow and Permeability Enhancement in Low-Porosity Rock Masses: Case Study of Boulaaba Aptian Dolostones, Kasserine, Central Tunisia

Authors: Mohamed Khali Zidi, Mohsen Henchiri, Walid Ben Ahmed

Abstract:

In the context of a hypogene hydrothermal travertine system, including low-porosity brittle bedrock and rock-mass permeability in Aptian dolostone of Boulaaba, Kasserine is enhanced through faulting and fracturing. This permeability enhancement related to the deformation modes along faults and fractures is likely to be in competition with permeability reduction when microcracks, fractures, and faults all become infilled with breccias and low-permeability hydrothermal precipitates. So that, fault continual or intermittent reactivation is probably necessary for them to keep their potential as structural high-permeability conduits. Dilational normal faults in strong mechanical stratigraphy associated with fault segments with dip changes are sites for porosity and permeability in groundwater infiltration and flow, hydrocarbon reservoirs, and also may be important sources of mineralization. The brecciation mechanism through dilational faulting and gravitational collapse originates according to hosting lithologies chaotic clast-supported breccia in strong lithologies such as sandstones, limestones, and dolostones, and matrix-supported cataclastic in weaker lithologies such as marls and shales. Breccias contribute to controlling fluid flow when the porosity is sealed either by low-permeability hydrothermal precipitates or by fine matrix materials. All these mechanisms of fault-related rock-mass permeability enhancement and reduction can be observed and analyzed in the region of Sidi Boulaaba, Kasserine, central Tunisia, where dilational normal faulting occurs in mechanical strong dolostone layering alternating with more weak marl and shale lithologies, has originated a variety of fault voids (fluid conduits) breccias (chaotic, crackle and mosaic breccias) and carbonate cement.

Keywords: travertine, Aptian dolostone, Boulaaba, fracturing

Procedia PDF Downloads 46
2504 Predicting Factors of Hearing Protection Device Use of Workers in Kaolin Mineral Dressing Factories, Thailand

Authors: Watcharapong Yaowarat, Thanee Kaewthummanukul, Waruntorn Jongrungrotsakul

Abstract:

Noise-induced hearing loss, the most significant occupational and safety problem among the working population, can be effectively prevented through hearing protection devices (HPDs) use. This study aimed to examine whether the following factors, perceived benefits, perceived barriers, perceived self-efficacy, and interpersonal and situational influences about using hearing protection could predict HPD use among 132 qualified workers in production lines at Kaolin Mineral Dressing factories, Uttaradit and Lampang provinces. Data collection was undertaken from August to September 2020 according to the interview form developed by Yaruang et al. (2010), which was assured by a panel of experts and its reliability value was at an acceptable level. Data analysis was performed using logistic regression analysis. The results revealed that only the situational factor of using hearing protection could predict HPD use, which accounted for 21.80 percent of the total variance for HPD use. It was also found that the study sample who had a score for the situational factors on using hearing protection greater than or equal to the median was 4.16 times more likely to use HPDs than those who had lower median scores. (OR = 4.16, p < .05). The results, thus, indicate that organization policies addressing worker health along with enhancing a supportive environment for HPD use, in particular, the provision of various HPDs, are of great importance. Therefore, occupational health nurses and related health teams should enhance workers’ use of HPDs effectively through knowledge dissemination by adopting strategies appropriate to the workplace context leading to an achievement of worker health policy focusing on work safety.

Keywords: predicting factors, hearing protection device, factors predicting hearing protection device use, kaolin mineral dressing factories

Procedia PDF Downloads 117
2503 The Redistributive Effects of Debtor Protection Laws

Authors: Hamid Boustanifar, Geraldo Cerqueiro, María Fabiana Penas

Abstract:

We exploit state-level changes in the amount of personal wealth individuals can protect under Chapter 7 to analyze the causal effect of debtor protection on income inequality. We find that an increase in state exemptions significantly increases inequality by reducing income for low-income individuals and by increasing income for high-income individuals. The increase in inequality is four times larger among the self-employed than among wage earners, and it is due mainly to a growing income gap between skilled (i.e., individuals with a college degree) and unskilled entrepreneurs. We also find that the employment rate of skilled entrepreneurs significantly increases, while the employment rate of unskilled wage earners falls. Our results are consistent with a recent literature that shows that higher exemptions redistribute credit from low-wealth to high-wealth entrepreneurs, affecting the performance of their businesses.

Keywords: debtor protection, credit markets, income inequality, debtor protection laws

Procedia PDF Downloads 419
2502 Compensation Mechanism Applied to Eco-Tourism Development in China

Authors: Min Wei

Abstract:

With the rapid development eco-tourism resources exploitation, the conflict between economy development and ecological environment is increasingly prominent. The environmental protection laws, however, are lack of necessary legal support to use market mechanism and economic means to carry out ecological compensation and promote the environmental protection. In order to protect the sustainable utilization of eco-tourism resources and the benign development of the interests of various stakeholders, protection of ecological compensation balance should be put on schedule. The main role of institutional guarantee in eco-tourism resources' value compensation mechanism is to solve the question 'how to guarantee compensation'. The evaluation of the game model in this paper reveals that interest balance of stakeholders is an important cornerstone to obtain the sustainable development. The findings result in constructing a sustainable development pattern of eco- tourism industry based on tripartite game equilibrium among government, tourism enterprises and tourists. It is important that the social, economic and ecological environment should be harmonious development during the pursuit of eco-tourism growth.

Keywords: environmental protection, ecological compensation, eco-tourism, market mechanism

Procedia PDF Downloads 362
2501 Environmental Impact Assessment of Electromagnetic Fields Emitted from Mobile Base Station in Central Area of KSA

Authors: Mohammed Abdullah Alrajhi

Abstract:

The rapid growth in the number of mobile phone subscribers has resulted in an increased number of mobile base stations all over the world. Generally, mobile base stations are existing in huge numbers in populated areas than in non-populated ones to serve the largest number of users. The total number of mobile subscriptions in the Kingdom of Saudi Arabia reached around 50 million at the end of 2014, with a penetration rate of 165.1% according to the quarterly electronic newsletter issued by the Communications and Information Technology Commission. The current investigation was conducted primarily to measure the level of electromagnetic fields emitted from 400 mobile base stations for the purpose of environmental safety and radiation protection in light of national guidelines for public exposure as well as the International Commission on Non-Ionizing Radiation Protection (ICNIRP). The outcomes of this investigation provide valuable comments and recommendation for safety and protection of electromagnetic fields emitted from mobile base stations.

Keywords: electromagnetic fields, mobile, safety, protection, ICNIRP

Procedia PDF Downloads 396
2500 Children Protection in the Digital Space

Authors: Beverly Komen

Abstract:

Online crimes have been on the rise in the recent days, especially with the hit of the covid-19 pandemic. The coronavirus pandemic has led to an unprecedented rise in screen time, this means more families are relying on technology and digital solutions to keep children learning, spending more time on the virtual platforms can leave children vulnerable to online abuse and exploitation. With ease access of affordable phones, internet, and increased online activities, all children are at risk of being abused online hence making the digital space unsafe for children. With these increased use of technology and its accessibility, children are at risk of facing challenges such as access to inappropriate content, online grooming, identity theft, cyber bullying, among other risks. The big question is; as we enjoy the benefits brought in by technology, how do we ensure that our children are save in this digital space? With the analysis of the current trends, there is a gap in knowledge on people’s understanding on child online protection and safety measures when using the digital space. A survey conducted among 50 parents in Nairobi in Kenya indicated that there is a gap in knowledge on online protection of children and over 50 % of the participants shared that for sure they have no idea on how to protect children online. This paper seeks to address the concept of child protection in the digital space and come up with viable solutions in protecting children from online vices.

Keywords: child protection, digital space, online risks, online grooming, cyber bulying, online child sexual exploitation, and abuse

Procedia PDF Downloads 165
2499 The Effect of General Data Protection Regulation on South Asian Data Protection Laws

Authors: Sumedha Ganjoo, Santosh Goswami

Abstract:

The rising reliance on technology places national security at the forefront of 21st-century issues. It complicates the efforts of emerging and developed countries to combat cyber threats and increases the inherent risk factors connected with technology. The inability to preserve data securely might have devastating repercussions on a massive scale. Consequently, it is vital to establish national, regional, and global data protection rules and regulations that penalise individuals who participate in immoral technology usage and exploit the inherent vulnerabilities of technology. This study paper seeks to analyse GDPR-inspired Bills in the South Asian Region and determine their suitability for the development of a worldwide data protection framework, considering that Asian countries are much more diversified than European ones. In light of this context, the objectives of this paper are to identify GDPR-inspired Bills in the South Asian Region, identify their similarities and differences, as well as the obstacles to developing a regional-level data protection mechanism, thereby satisfying the need to develop a global-level mechanism. Due to the qualitative character of this study, the researcher did a comprehensive literature review of prior research papers, journal articles, survey reports, and government publications on the aforementioned topics. Taking into consideration the survey results, the researcher conducted a critical analysis of the significant parameters highlighted in the literature study. Many nations in the South Asian area are in the process of revising their present data protection measures in accordance with GDPR, according to the primary results of this study. Consideration is given to the data protection laws of Thailand, Malaysia, China, and Japan. Significant parallels and differences in comparison to GDPR have been discussed in detail. The conclusion of the research analyses the development of various data protection legislation regimes in South Asia.

Keywords: data privacy, GDPR, Asia, data protection laws

Procedia PDF Downloads 64
2498 Active Cyber Defense within the Concept of NATO’s Protection of Critical Infrastructures

Authors: Serkan Yağlı, Selçuk Dal

Abstract:

Cyber-attacks pose a serious threat to all states. Therefore, states constantly seek for various methods to encounter those threats. In addition, recent changes in the nature of cyber-attacks and their more complicated methods have created a new concept: active cyber defence (ACD). This article tries to answer firstly why ACD is important to NATO and find out the viewpoint of NATO towards ACD. Secondly, infrastructure protection is essential to cyber defence. Critical infrastructure protection with ACD means is even more important. It is assumed that by implementing active cyber defence, NATO may not only be able to repel the attacks but also be deterrent. Hence, the use of ACD has a direct positive effect in all international organizations’ future including NATO.

Keywords: active cyber defence, advanced persistent treat, critical infrastructure, NATO

Procedia PDF Downloads 229
2497 Performance Assessment of PV Based Grid Connected Solar Plant with Varying Load Conditions

Authors: Kusum Tharani, Ratna Dahiya

Abstract:

This paper aims to analyze the power flow of a grid connected 100-kW Photovoltaic(PV) array connected to a 25-kV grid via a DC-DC boost converter and a three-phase three-level Voltage Source Converter (VSC). Maximum Power Point Tracking (MPPT) is implemented in the boost converter bymeans of a Simulink model using the 'Perturb & Observe' technique. First, related papers and technological reports were extensively studied and analyzed. Accordingly, the system is tested under various loading conditions. Power flow analysis is done using the Newton-Raphson method in Matlab environment. Finally, the system is subject to Single Line to Ground Fault and Three Phase short circuit. The results are simulated under the grid-connected operating model.

Keywords: grid connected PV Array, Newton-Raphson Method, power flow analysis, three phase fault

Procedia PDF Downloads 537
2496 The Consequences of Complaint Offenses against Copyright Protection

Authors: Chryssantus Kastowo, Theresia Anita Christiani, Anny Retnowati

Abstract:

Copyright infringement as a form of infringement does not always mean causing harm to the creator. This can be proven with so many copyright violations in society and there is no significant law enforcement effort when compared with the violations that occurred. Copyright law as a form of appreciation from the state to the creator becomes counter productive if there is omission of violations. The problem raised in this article is how is the model of copyright regulation in accordance with the purpose of the law of copyright protection. This article is based on normative legal research focusing on secondary data. The analysis used is a conceptual approach. The analysis shows that the regulation of copyright emphasizes as a subjective right that is wholly within the author's power. This perspective will affect the claim of rights by the creator or allow violations. The creator is obliged to maintain the overall performance of copyright protection, especially in the event of a violation.

Keywords: copyright, enforcement, law, violation

Procedia PDF Downloads 120
2495 Hydrothermal Alteration and Mineralization of Cisarua, Nanggung District, Bogor Regency, West Java, Indonesia

Authors: A. Asaga, N. I. Basuki

Abstract:

The research area is located in Cisarua, Bogor Regency, West Java, with 12,8 km2 wide. This area belongs to mining region of PT Aneka Tambang Tbk. The purpose of this research is to study geological condition, alteration type and pattern, and type of mineralization. Geomorphology of the research area is at young to mature stage, which can be divided into Ciparigi’s Parasite Volcanic Cone Unit, Ciparigi Caldera Valley Unit, Ciparigi Caldera Rim Hill Unit, and Pongkor Volcanic Hill. Stratigraphy of the research area consist of five units, they are Laharic Breccia (Pliocene), Pyroclastic Breccia, Lapilli Tuff, Flow Tuff, Fall Tuff, and Andesite Lava (Pleistocene). Based on mineral composition, it is interpreted that there is magma composition changing from rhyolite to andesitic. Geological structures in the research area are caused by NE-SW and N-S stress direction; they are Ciparay Right Strike-Slip Fault (Pliocene), Cisarua Right Strike-Slip Fault, G. Singa Left Strike-Slip Fault, and Cinyuncung Right Strike-Slip Fault (Pleistocene). Weak to strong hydrothermal alteration can be found in the research area.They are Chlorite ± Smectite ± Halloysite Zone, Smectite - Illite - Quartz Zone, Smectite - Kaolinite - Illite - Chlorite Zone, and Smectite - Chlorite - Calcite - Quartz Zone. The distribution and assemblage of alteration minerals is controlled by lithology and geological structures in Pleistocene. Mineralization produce ore minerals, those are pyrite, marcasite, chalcopyrite, sphalerite, galena, and chalcocite. There are calcite and quartz veins that show colloform, comb, and crystalline textures. Hydrothermal alteration assemblages, ore minerals, and cavity filling textures suggest that mineralization type in research area is epithermal low sulphidation.

Keywords: Pongkor, hydrothermal alteration, epithermal, geochemistry

Procedia PDF Downloads 385