Search results for: lightning protection system
19019 Property Rights and Trade Specialization
Authors: Sarma Binti Aralas
Abstract:
The relationship between property rights and trade specialization is examined for developing and developed countries using panel data analysis. Property rights is measured using the international property rights index while trade specialization is measured using the comparative advantage index. Cross country differences in property rights are hypothesized to lead to differences in trade specialization. Based on the argument that a weak protection of natural resources implies greater trade in resource-intensive goods, developing countries with less defined property rights are hypothesized to have a comparative advantage in resource-based exports while countries with more defined property rights will not have an advantage in resource-intensive goods. Evidence suggests that developing countries with weaker environmental protection index but are rich in natural resources do specialize in the trade of resource-intensive goods. The finding suggests that institutional frameworks to increase the stringency of environmental protection of resources may be needed to diversify exports away from the trade of resource-intensive goods.Keywords: environmental protection, panel data, renewable resources, trade specialization
Procedia PDF Downloads 45019018 Investigation of Corrosion of Steel Buried in Unsaturated Soil in the Presence of Cathodic Protection: The Modified Voltammetry Technique
Authors: Mandlenkosi G. R. Mahlobo, Peter A. Olubambi, Philippe Refait
Abstract:
The aim of this study was to use voltammetry as a method to understand the behaviour of steel in unsaturated soil in the presence of cathodic protection (CP). Three carbon steel coupons were buried in artificial soil wetted at 65-70% of saturation for 37 days. All three coupons were left at open circuit potential (OCP) for the first seven days in the unsaturated soil before CP, which was only applied on two of the three coupons at the protection potential -0.8 V vs Cu/CuSO₄ for the remaining 30 days of the experiment. Voltammetry was performed weekly on the coupon without CP, while electrochemical impedance spectroscopy (EIS) was performed daily to monitor and correct the applied CP potential from the ohmic drop. Voltammetry was finally performed on the last day on the coupons under CP. All the voltammograms were modeled with mathematical equations in order to compute the electrochemical parameters and subsequently deduced the corrosion rate of the steel coupons. For the coupon without CP, the corrosion rate was determined at 300 µm/y. For the coupons under CP, the residual corrosion rate under CP was estimated at 12 µm/y while the corrosion rate of the coupons, after interruption of CP, was estimated at 25 µm/y. This showed that CP was efficient due to two effects: a direct effect from the decreased potential and an induced effect associated with the increased interfacial pH that promoted the formation of a protective layer on the steel surface.Keywords: carbon steel, cathodic protection, voltammetry, unsaturated soil, Raman spectroscopy
Procedia PDF Downloads 6219017 Research on Transverse Ecological Compensation Mechanism in Yangtze River Economic Belt Based on Evolutionary Game Theory
Authors: Tingyu Zhang
Abstract:
The cross-basin ecological compensation mechanism is key to stimulating active participation in ecological protection across the entire basin. This study constructs an evolutionary game model of cross-basin ecological compensation in the Yangtze River Economic Belt (YREB), introducing a central government constraint and incentive mechanism (CGCIM) to explore the conditions for achieving strategies of protection and compensation that meet societal expectations. Furthermore, using a water quality-water quantity model combined with factual data from the YREB in 2020, the amount of ecological compensation is calculated. The results indicate that the stability of the evolutionary game model of the upstream and downstream governments in the YREB is closely related to the CGCIM. When the sum of the central government's reward amount to the upstream government and the penalty amount to both sides simultaneously is greater than 39.948 billion yuan, and the sum of the reward amount to the downstream government and the penalty amount to only the lower reaches is greater than 1.567 billion yuan, or when the sum of the reward amount to the downstream government and the penalty amount to both sides simultaneously is greater than 1.567 billion yuan, and the sum of the reward amount to the upstream government and the penalty amount to only the upstream government is greater than 399.48 billion yuan, the protection and compensation become the only evolutionarily stable strategy for the evolutionary game system composed of the upstream and downstream governments in the YREB. At this point, the total ecological compensation that the downstream government of the YREB should pay to the upstream government is 1.567 billion yuan, with Hunan paying 0.03 billion yuan, Hubei 2.53 billion yuan, Jiangxi 0.18 billion yuan, Anhui 1.68 billion yuan, Zhejiang 0.75 billion yuan, Jiangsu 6.57 billion yuan, and Shanghai 3.93 billion yuan. The research results can provide a reference for promoting the improvement and perfection of the cross-basin ecological compensation system in the YREB.Keywords: ecological compensation, evolutionary game model, central government constraint and incentive mechanism, Yangtze river economic belt
Procedia PDF Downloads 6419016 Improving Security in Healthcare Applications Using Federated Learning System With Blockchain Technology
Authors: Aofan Liu, Qianqian Tan, Burra Venkata Durga Kumar
Abstract:
Data security is of the utmost importance in the healthcare area, as sensitive patient information is constantly sent around and analyzed by many different parties. The use of federated learning, which enables data to be evaluated locally on devices rather than being transferred to a central server, has emerged as a potential solution for protecting the privacy of user information. To protect against data breaches and unauthorized access, federated learning alone might not be adequate. In this context, the application of blockchain technology could provide the system extra protection. This study proposes a distributed federated learning system that is built on blockchain technology in order to enhance security in healthcare. This makes it possible for a wide variety of healthcare providers to work together on data analysis without raising concerns about the confidentiality of the data. The technical aspects of the system, including as the design and implementation of distributed learning algorithms, consensus mechanisms, and smart contracts, are also investigated as part of this process. The technique that was offered is a workable alternative that addresses concerns about the safety of healthcare while also fostering collaborative research and the interchange of data.Keywords: data privacy, distributed system, federated learning, machine learning
Procedia PDF Downloads 13219015 Empirical Analysis of the Global Impact of Cybercrime Laws on Cyber Attacks and Malware Types
Authors: Essang Anwana Onuntuei, Chinyere Blessing Azunwoke
Abstract:
The study focused on probing the effectiveness of online consumer privacy and protection laws, electronic transaction laws, privacy and data protection laws, and cybercrime legislation amid frequent cyber-attacks and malware types worldwide. An empirical analysis was engaged to uncover ties and causations between the stringency and implementation of these legal structures and the prevalence of cyber threats. A deliberate sample of seventy-eight countries (thirteen countries each from six continents) was chosen as sample size to study the challenges linked with trending regulations and possible panoramas for improving cybersecurity through refined legal approaches. Findings establish if the frequency of cyber-attacks and malware types vary significantly. Also, the result proved that various cybercrime laws differ statistically, and electronic transactions law does not statistically impact the frequency of cyber-attacks. The result also statistically revealed that the online Consumer Privacy and Protection law does not influence the total number of cyber-attacks. In addition, the results implied that Privacy and Data Protection laws do not statistically impact the total number of cyber-attacks worldwide. The calculated value also proved that cybercrime law does not statistically impact the total number of cyber-attacks. Finally, the computed value concludes that combined multiple cyber laws do not significantly impact the total number of cyber-attacks worldwide. Suggestions were produced based on findings from the study, contributing to the ongoing debate on the validity of legal approaches in battling cybercrime and shielding consumers in the digital age.Keywords: cybercrime legislation, cyber attacks, consumer privacy and protection law, detection, electronic transaction law, prevention, privacy and data protection law, prohibition, prosecution
Procedia PDF Downloads 4119014 A Survey on Genetic Algorithm for Intrusion Detection System
Authors: Prikhil Agrawal, N. Priyanka
Abstract:
With the increase of millions of users on Internet day by day, it is very essential to maintain highly reliable and secured data communication between various corporations. Although there are various traditional security imparting techniques such as antivirus software, password protection, data encryption, biometrics and firewall etc. But still network security has become the main issue in various leading companies. So IDSs have become an essential component in terms of security, as it can detect various network attacks and respond quickly to such occurrences. IDSs are used to detect unauthorized access to a computer system. This paper describes various intrusion detection techniques using GA approach. The intrusion detection problem has become a challenging task due to the conception of miscellaneous computer networks under various vulnerabilities. Thus the damage caused to various organizations by malicious intrusions can be mitigated and even be deterred by using this powerful tool.Keywords: genetic algorithm (GA), intrusion detection system (IDS), dataset, network security
Procedia PDF Downloads 29719013 Optimizing Nature Protection and Tourism in Urban Parks
Authors: Milena Lakicevic
Abstract:
The paper deals with the problem of optimizing management options for urban parks within different scenarios of nature protection and tourism importance. The procedure is demonstrated on a case study example of urban parks in Novi Sad (Serbia). Six management strategies for the selected area have been processed by the decision support method PROMETHEE. Two criteria used for the evaluation were nature protection and tourism and each of them has been divided into a set of indicators: for nature protection those were biodiversity and preservation of original landscape, while for tourism those were recreation potential, aesthetic values, accessibility and culture features. It was pre-assumed that each indicator in a set is equally important to a corresponding criterion. This way, the research was focused on a sensitivity analysis of criteria weights. In other words, weights of indicators were fixed and weights of criteria altered along the entire scale (from the value of 0 to the value of 1), and the assessment has been performed in two-dimensional surrounding. As a result, one could conclude which management strategy would be the most appropriate along with changing of criteria importance. The final ranking of management alternatives was followed up by investigating the mean PROMETHEE Φ values for all options considered and when altering the importance of nature protection/tourism. This type of analysis enabled detecting an alternative with a solid performance along the entire scale, i.e., regardlessly of criteria importance. That management strategy can be seen as a compromise solution when the weight of criteria is not defined. As a conclusion, it can be said that, in some cases, instead of having criteria importance fixed it is important to test the outputs depending on the different schemes of criteria weighting. The research demonstrates the state of the final decision when the decision maker can estimate criteria importance, but also in cases when the importance of criteria is not established or known.Keywords: criteria weights, PROMETHEE, sensitivity analysis, urban parks
Procedia PDF Downloads 18819012 Protecting Human Health under International Investment Law
Authors: Qiang Ren
Abstract:
In the past 20 years, under the high standard of international investment protection, there have been numerous cases of investors ignoring the host country's measures to protect human health. Examples include investment disputes triggered by the Argentine government's measures related to human health, quality, and price of drinking water under the North American Free Trade Agreement. Examples also include Philip Morris v. Australia, in which case the Australian government announced the passing of the Plain Packing of Cigarettes Act to address the threat of smoking to public health in 2010. In order to take advantage of the investment treaty protection between Hong Kong and Australia, Philip Morris Asia acquired Philip Morris Australia in February 2011 and initiated investment arbitration under the treaty before the passage of the Act in July 2011. Philip Morris claimed the Act constitutes indirect expropriation and violation of fair and equitable treatment and claimed 4.16 billion US dollars compensation. Fortunately, the case ended at the admissibility decision stage and did not enter the substantive stage. Generally, even if the host country raises a human health defense, most arbitral tribunals will rule that the host country revoke the corresponding policy and make huge compensation in accordance with the clauses in the bilateral investment treaty to protect the rights of investors. The significant imbalance in the rights and obligations of host states and investors in international investment treaties undermines the ability of host states to act in pursuit of human health and social interests beyond economic interests. This squeeze on the nation's public policy space and disregard for the human health costs of investors' activities raises the need to include human health in investment rulemaking. The current international investment law system that emphasizes investor protection fails to fully reflect the requirements of the host country for the healthy development of human beings and even often brings negative impacts to human health. At a critical moment in the reform of the international investment law system, in order to achieve mutual enhancement of investment returns and human health development, human health should play a greater role in influencing and shaping international investment rules. International investment agreements should not be limited to investment protection tools but should also be part of national development strategies to serve sustainable development and human health. In order to meet the requirements of the new sustainable development goals of the United Nations, human health should be emphasized in the formulation of international investment rules, and efforts should be made to shape a new generation of international investment rules that meet the requirements of human health and sustainable development.Keywords: human health, international investment law, Philip Morris v. Australia, investor protection
Procedia PDF Downloads 17819011 Understanding Psychological Distress and Protection Issues among Children Associated with Armed Groups
Authors: Grace Onubedo
Abstract:
The primary objective of this research study is to contribute to and deepen the understanding of the realities and conditions for which children recruited by violent extremist organisations in Nigeria live, as well as ascertain the state of their mental health following their reunification with either family or protection workers. The research is intended to contribute to a more focused child protection programming agenda for children associated with armed forces and groups in Nigeria and the wider conflict setting. The extent to which violence has affected the psychological well-being and mental health of children abducted and exposed to activities of Violent Extremist groups remains a largely empirical question. This research attempts to answer the following research questions with the aim of providing further evidences for informed programming: I. What are the demographic characteristics of children associated with armed groups? II. What is the state of their mental health? III. What is the relationship between their background and their mental health?Keywords: counterterrorism, psychosocial support, psychological distress, children, armed groups
Procedia PDF Downloads 13019010 The Economic Impact of State Paid Family Leave and Medical Acts on Working Families with Old and Disabled Adults
Authors: Ngoc Dao
Abstract:
State Paid Leave Programs (PFL) complement the Federal Family and Medical Leave Act (FMLA) by offering workers time off to take care of their newborns or sick family members with supplemental income, and further job protection. Up to date, four states (California, New Jersey, Rhode Island, and New York) implemented paid leave policies. This study adds further understanding of how state PFL policies help working families with elder parents improve their work balance by examining the paid leave policies on labor outcomes. Early findings suggest State Paid Leave Policies reduced the likelihood to exit the labor market by 1.6 percentage points, with larger effects among paid leave policies with job protection feature. In addition, the results imply job protection in paid leave policies matters in helping employed caregivers attach to the labor market.Keywords: family paid leave, working caregivers, employment, social welfare
Procedia PDF Downloads 13119009 Study on Horizontal Ecological Compensation Mechanism in Yangtze River Economic Belt Basin: Based on Evolutionary Game Analysis and Water Quality and Quantity Model
Authors: Tingyu Zhang
Abstract:
The horizontal ecological compensation (HEC) mechanism is the key to stimulating the active participation of the whole basin in ecological protection. In this paper, we construct an evolutionary model for HEC in the Yangtze River Economic Belt (YREB) basin with the introduction of the central government constraint and incentive mechanism (CGCIM) and explore the conditions for the realization of a (Protection and compensation) strategy that meets the social expectations. Further, the water quality-water quantity model is utilized to measure the HEC amount with the characteristic factual data of the YREB in 2020-2022. The results show that the stability of the evolutionary game model of upstream and downstream governments in the YREB is closely related to the CGCIM. If (Protection Compensation) is to be realized as the only evolutionary stable strategy of the evolutionary game system composed of upstream and downstream governments, it is necessary for the CGCIM to satisfy that the sum of the incentives for the protection side and its unilateral or bilateral constraints is greater than twice the input cost of the active strategy, and the sum of the incentives for the compensation side and its unilateral or bilateral constraints is greater than the amount of ecological compensation that needs to be paid by it when it adopts the active strategy. At this point, the total amount of HEC that the downstream government should give to the upstream government of the YREB is 2856.7 million yuan in 2020, 5782.1 million yuan in 2021, and 23166.7 million yuan in 2022. The results of the study can provide a reference for promoting the improvement and refinement of the HEC mechanism in the YREB.Keywords: horizontal ecological compensation, Yangtze river economic belt, evolutionary game analysis, water quality and quantity model research on territorial ecological restoration in Mianzhu city, Sichuan, under the dual evaluation framework
Procedia PDF Downloads 4819008 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System
Authors: Nareshkumar Harale, B. B. Meshram
Abstract:
The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design
Procedia PDF Downloads 22719007 Integrated Management System Applied in Dismantling and Waste Management of the Primary Cooling System from the VVR-S Nuclear Reactor Magurele, Bucharest
Authors: Radu Deju, Carmen Mustata
Abstract:
The VVR-S nuclear research reactor owned by Horia Hubulei National Institute of Physics and Nuclear Engineering (IFIN-HH) was designed for research and radioisotope production, being permanently shut-down in 2002, after 40 years of operation. All amount of the nuclear spent fuel S-36 and EK-10 type was returned to Russian Federation (first in 2009 and last in 2012), and the radioactive waste resulted from the reprocessing of it will remain permanently in the Russian Federation. The decommissioning strategy chosen is immediate dismantling. At this moment, the radionuclides with half-life shorter than 1 year have a minor contribution to the contamination of materials and equipment used in reactor department. The decommissioning of the reactor has started in 2010 and is planned to be finalized in 2020, being the first nuclear research reactor that has started the decommissioning project from the South-East of Europe. The management system applied in the decommissioning of the VVR-S research reactor integrates all common elements of management: nuclear safety, occupational health and safety, environment, quality- compliance with the requirements for decommissioning activities, physical protection and economic elements. This paper presents the application of integrated management system in decommissioning of systems, structures, equipment and components (SSEC) from pumps room, including the management of the resulted radioactive waste. The primary cooling system of this type of reactor includes circulation pumps, heat exchangers, degasser, filter ion exchangers, piping connection, drainage system and radioactive leaks. All the decommissioning activities of primary circuit were performed in stage 2 (year 2014), and they were developed and recorded according to the applicable documents, within the requirements of the Regulatory Body Licenses. In the presentation there will be emphasized how the integrated management system provisions are applied in the dismantling of the primary cooling system, for elaboration, approval, application of necessary documentation, records keeping before, during and after the dismantling activities. Radiation protection and economics are the key factors for the selection of the proper technology. Dedicated and advanced technologies were chosen to perform specific tasks. Safety aspects have been taken into consideration. Resource constraints have also been an important issue considered in defining the decommissioning strategy. Important aspects like radiological monitoring of the personnel and areas, decontamination, waste management and final characterization of the released site are demonstrated and documented.Keywords: decommissioning, integrated management system, nuclear reactor, waste management
Procedia PDF Downloads 28919006 Dose Measurement in Veterinary Radiology Using Thermoluminescent Dosimeter
Authors: E. Saeedian, M. Shakerian, A. Zarif Sanayei, Z. Rakeb, F. N. Alizadeh, S. Sarshough, S. Sina
Abstract:
Radiological protection for plants and animals is an area of regulatory importance. Acute doses of 0.1 Gy/d (10 rad/d) or below are highly unlikely to produce permanent, measurable negative effects on populations or communities of plants or animals. The advancement of radio diagnostics for domestic animals, particularly dogs and cats, has gained popularity in veterinary medicine. As pets are considered to be members of the family worldwide, they are entitled to the same care and protection. It is important to have a system of radiological protection for nonhuman organisms that complies with the focus on human health as outlined in ICRP publication 19. The present study attempts to assess surface-skin entrance doses in small pets undergoing abdominal radio diagnostic procedures utilizing a direct measurements technique with a thermoluminescent dosimeter. These measurements allow the determination of the entrance skin dose (ESD) by calculating the amount of radiation absorbed by the skin during exposure. A group of Thirty TLD-100 dosimeters produced by Harshaw Company, each with repeatability greater than 95% and calibration using ¹³⁷Cs gamma source, were utilized to measure doses to ten small pets, including cats and dogs in the radiological department in a veterinary clinic in Shiraz, Iran. Radiological procedures were performed using a portable imaging unit (Philips Super M100, Philips Medical System, Germany) to acquire images of the abdomen; ten exams of abdomen images of different pets were monitored, measuring the thicknesses of the two projections (lateral and ventrodorsal) and the distance of the X-ray source from the surface of each pet during the exams. A group of two dosimeters was used for each pet which has been stacked on their skin on the abdomen region. The outcome of this study involved medical procedures with the same kVp, mAs, and nearly identical positions for different diagnostic X-ray procedures executed over a period of two months. The result showed the mean ESD value was 260.34±50.06 µGy due to the approximate size of pets. Based on the results, the ESD value is associated with animal size, and larger animals have higher values. If a procedure doesn't require repetition, the dose can be optimized. For smaller animals, the main challenge in veterinary radiology is the dose increase caused by repetitions, which is most noticeable in the ventrodorsal position due to the difficulty in immobilizing the animal. Animals are an area of regulatory importance. Acute doses of 0.1 Gy/d (10 rad/d) or below are highly unlikely to produce permanent, measurable negative effects on populations or communities of plants or animals. The advancement of radio diagnostics for domestic animals, particularly dogs and cats, has gained popularity in veterinary medicine. As pets are considered to be members of the family worldwide, they are entitled to the same care and protection. It is important to have a system of radiological protection for nonhuman organisms that complies with the focus on human health as outlined in ICRP publication 19. The present study attempts to assess surface-skin entrance doses in small pets undergoing abdominal radio diagnostic procedures utilizing direct measurements.Keywords: direct dose measuring, dosimetry, radiation protection, veterinary medicine
Procedia PDF Downloads 7019005 Religion and Sustainable Development: A Comparative Study of Buddhist and Christian Farmers’ Contribution to the Environmental Protection in Taiwan
Authors: Jijimon Alakkalam Joseph
Abstract:
The UN 2030 Agenda for Sustainable Development claims to be a comprehensive and integrated plan of action for prosperity for people and the planet, including almost all dimensions of human existence. Nevertheless, critics have pointed out the exclusion of the religious dimension from development discussions. Care for the earth is one of the vital aspects of sustainable development. Farmers all over the world contribute much to environmental protection. Most farmers are religious believers, and religious ideologies influence their agricultural practices. This nexus between faith and agriculture has forced policymakers to include religion in development discussions. This paper delves deeper into this religion and sustainable development connection. Buddhism and Christianity have contributed much to environmental protection in Taiwan. However, interviews conducted among 40 Taiwanese farmers (10 male and female farmers from Buddhism and Christianity) show that their faith experiences make them relate to the natural environment differently. Most of the Buddhist farmers interviewed admitted that they chose their religious adherence, while most of the Christian farmers inherited their faith. The in-depth analysis of the interview data collected underlines the close relationship between religion and sustainable development. More importantly, concerning their intention to care for the earth, farmers whose religious adherence is ‘chosen’ are self-motivated and more robust compared to those whose religious adherence is ‘inherited’.Keywords: Buddhism, Christianity, environmental protection, sustainable development
Procedia PDF Downloads 8419004 Assessment the Capacity of Retention of a Natural Material for the Protection of Ground Water
Authors: Hakim Aguedal, Abdelkader Iddou, Abdalla Aziz, Abdelhadi Bentouami, Ferhat Bensalah, Salah Bensadek
Abstract:
The major environmental risk of soil pollution is the contamination of groundwater by infiltration of organic and inorganic pollutants that can cause a serious pollution. To prevent the migration of this pollution through this structure, many studies propose the installation of layers, which play a role of a barrier that inhibiting the contamination of groundwater by limiting or slowing the flow of rainwater carrying pollution through the layers of soil. However, it is practically impossible to build a barrier layer that let through only water, but it is possible to design a structure with low permeability, which reduces the infiltration of dangerous pollutant. In an environmental context of groundwater protection, the main objective of this study was to investigate the environmental and appropriate suitability method to preserve groundwater, by establishment of a permeable reactive barrier (PRB) intermediate in soil. Followed the influence of several parameters allow us to find the most effective materials and the most appropriate way to incorporate this barrier in the soil.Keywords: Ground water, protection, permeable reactive Barrier, soil pollution.
Procedia PDF Downloads 55619003 Vr-GIS and Ar-GIS In Education: A Case Study
Authors: Ilario Gabriele Gerloni, Vincenza Carchiolo, Alessandro Longheu, Ugo Becciani, Eva Sciacca, Fabio Vitello
Abstract:
ICT tools and platforms endorse more and more educational process. Many models and techniques for people to be educated and trained about specific topics and skills do exist, as classroom lectures with textbooks, computers, handheld devices and others. The choice to what extent ICT is applied within learning contexts is related to personal access to technologies as well as to the infrastructure surrounding environment. Among recent techniques, the adoption of Virtual Reality (VR) and Augmented Reality (AR) provides significant impulse in fully engaging users senses. In this paper, an application of AR/VR within Geographic Information Systems (GIS) context is presented. It aims to provide immersive environment experiences for educational and training purposes (e.g. for civil protection personnel), useful especially for situations where real scenarios are not easily accessible by humans. First acknowledgments are promising for building an effective tool that helps civil protection personnel training with risk reduction.Keywords: education, virtual reality, augmented reality, GIS, civil protection
Procedia PDF Downloads 17819002 A Comparative and Doctrinal Analysis towards the Investigation of a Right to Be Forgotten in Hong Kong
Authors: Jojo Y. C. Mo
Abstract:
Memories are good. They remind us of people, places and experiences that we cherish. But memories cannot be changed and there may well be memories that we do not want to remember. This is particularly true in relation to information which causes us embarrassment and humiliation or simply because it is private – we all want to erase or delete such information. This desire to delete is recently recognised by the Court of Justice of the European Union in the 2014 case of Google Spain SL, Google Inc. v Agencia Española de Protección de Datos, Mario Costeja González in which the court ordered Google to remove links to some information about the complainant which he wished to be removed. This so-called ‘right to be forgotten’ received serious attention and significantly, the European Council and the European Parliament enacted the General Data Protection Regulation (GDPR) to provide a more structured and normative framework for implementation of right to be forgotten across the EU. This development in data protection laws will, undoubtedly, have significant impact on companies and co-operations not just within the EU but outside as well. Hong Kong, being one of the world’s leading financial and commercial center as well as one of the first jurisdictions in Asia to implement a comprehensive piece of data protection legislation, is therefore a jurisdiction that is worth looking into. This article/project aims to investigate the following: a) whether there is a right to be forgotten under the existing Hong Kong data protection legislation b) if not, whether such a provision is necessary and why. This article utilises a comparative methodology based on a study of primary and secondary resources, including scholarly articles, government and law commission reports and working papers and relevant international treaties, constitutional documents, case law and legislation. The author will primarily engage literature and case-law review as well as comparative and doctrinal analyses. The completion of this article will provide privacy researchers with more concrete principles and data to conduct further research on privacy and data protection in Hong Kong and internationally and will provide a basis for policy makers in assessing the rationale and need for a right to be forgotten in Hong Kong.Keywords: privacy, right to be forgotten, data protection, Hong Kong
Procedia PDF Downloads 18919001 “Protection” or “Destruction”: Taking the Cultural Heritage Protection of the Grand Canal in Huaxian and Xunxian Sections of Henan Province as Example
Abstract:
The Grand Canal of China has been in use for more than two thousand years. It runs through the central and eastern regions of China and communicates with the five major river systems of Haihe River, Yellow River, Huaihe River, Yangtze River and Qiantang River from north to south. It is a complex, systematic and comprehensive water conservancy project in the period of agricultural civilization and includes the three parts of the Beijing-Hangzhou Canal, the Sui and Tang Dynasties Canal and the Eastern Zhejiang Canal. It covers eight provinces and cities including Beijing, Tianjin, Hebei, Shandong, Jiangsu, Zhejiang, Henan and Anhui. The Grand Canal is an important channel connecting the Central Plains and the Beijing-Hangzhou Canal, and it is also an important waterway trade channel. Nowadays, although the Grand Canal no longer bears the burden of communicating water transportation between the north and the south, the site of the Grand Canal is still a “historical museum” of the lifestyle of people who lived on the canal from the Ming and Qing Dynasties to the Republic of China. By means of literature reading and field investigation, this paper compares the different protection strategies of the Grand Canal in the region between the ancient villages of Huaxian and Xunxian, which witness the vicissitudes of canal water transport, to explore whether the protective renovation of historical and cultural routes is “protection” or “destruction”, and puts forward some protection suggestions.Keywords: The Grand Canal, heritage conservation, cultural route, ancient villages, strategies
Procedia PDF Downloads 15319000 Packaging Processes for the Implantable Medical Microelectronics
Authors: Chung-Yu Wu, Chia-Chi Chang, Wei-Ming Chen, Pu-Wei Wu, Shih-Fan Chen, Po-Chun Chen
Abstract:
Electrostimulation medical devices for neural diseases require electroactive and biocompatible materials to transmit signals from electrodes to targeting tissues. Protection of surrounding tissues has become a great challenge for long-term implants. In this study, we designed back-end processes with compatible, efficient, and reliable advantages over the current state-of-the-art. We explored a hermetic packaging process with high quality of adhesion and uniformity as the biocompatible devices for long-term implantation. This approach is able to provide both excellent biocompatibility and protection to the biomedical electronic devices by performing conformal coating of biocompatible materials. We successfully developed a packaging process that is capable of exposing the stimulating electrode and cover all other faces of chip with high quality of protection to prevent leakage of devices and body fluid.Keywords: biocompatible package, medical microelectronics, surface coating, long-term implantation
Procedia PDF Downloads 52418999 Arc Flash Analysis: Technique to Mitigate Fire Incidents in Substations
Authors: M. H. Saeed, M. Rasool, M. A. Jawed
Abstract:
Arc Flash Analysis has been a subject of great interest since the electrical fire incidents have been reduced to a great extent after the implementation of arc flash study at different sites. An Arc flash in substations is caused by short circuits over the air or other melted conductors and small shrapnel. Arc flash incidents result in the majority of deaths in substations worldwide. Engro Fertilizers Limited (EFERT) site having a mix of vintage non-internal arc rated and modern arc rated switchgears, carried out an arc flash study of the whole site in accordance with NFPA70E standard. The results not only included optimizing site protection coordination settings but also included marking of Shock and Arc flash protection boundaries in all switchgear rooms. Work permit procedures upgradation is also done in accordance with this study to ensure proper arc rated PPEs and arc flash boundaries protocols are fully observed and followed. With the new safety, protocols working on electrical equipment will be much safer than ever before.Keywords: Arc flash, non-internal arc rated, protection coordination, shock boundary
Procedia PDF Downloads 17818998 Models, Methods and Technologies for Protection of Critical Infrastructures from Cyber-Physical Threats
Authors: Ivan Župan
Abstract:
Critical infrastructure is essential for the functioning of a country and is designated for special protection by governments worldwide. Due to the increase in smart technology usage in every facet of the industry, including critical infrastructure, the exposure to malicious cyber-physical attacks has grown in the last few years. Proper security measures must be undertaken in order to defend against cyber-physical threats that can disrupt the normal functioning of critical infrastructure and, consequently the functioning of the country. This paper provides a review of the scientific literature of models, methods and technologies used to protect from cyber-physical threats in industries. The focus of the literature was observed from three aspects. The first aspect, resilience, concerns itself with the robustness of the system’s defense against threats, as well as preparation and education about potential future threats. The second aspect concerns security risk management for systems with cyber-physical aspects, and the third aspect investigates available testbed environments for testing developed models on scaled models of vulnerable infrastructure.Keywords: critical infrastructure, cyber-physical security, smart industry, security methodology, security technology
Procedia PDF Downloads 7518997 LGBTQ+ Visibility: An Analysis of the Mechanisms for Safeguarding Sexual Minorities within the Common European Asylum System
Authors: Alessandra Tosi, Teia M. Rogers
Abstract:
The Common European Asylum System (CEAS) is the framework that standardises the treatment of applicants for international protection and harmonises asylum systems throughout the European Union. This paper interrogates the rules applied within the CEAS, specifically Directive 2013/33/EU of the European Parliament and of the Council of 26 June 2013, which puts forth the standards for the reception of vulnerable people applying for asylum. Absent from the definition of ‘vulnerable people’ are sexual minorities who routinely experience discrimination in reception centres and emergency accommodations. This paper undertakes an analysis of policies and legalisation of reception centres within the European Union. In confronting the flaws inherent to the system of processing asylum applications, this paper argues for the reform of the CEAS with emphasis on the inclusion of LBGTQ+ asylum seekers as vulnerable people following standards set by international human rights law.Keywords: accommodation, asylum seekers, CEAS, Common European Asylum System, European Union, LGBTQ+, reception conditions, vulnerable people
Procedia PDF Downloads 14118996 Performance Evaluation of Adsorption Refrigerating Systems
Authors: Nadia Allouache, Omar Rahli
Abstract:
Many promising technologies have been developed to harness the sun's energy. These technologies help in economizing energy and environmental protection. The solar refrigerating systems are one of these important technologies. In addition to environmental benefits and energy saving, adsorption refrigerating systems have many advantages such as lack of moving parts, simplicity of construction and low operating costs. The work aimed to establish the main factors that affect the performances of an adsorption refrigerating system using different geometries of adsorbers and different adsorbent-adsorbate pairs. The numerical modeling of the heat and mass transfer in the system, using various working pairs, such as: activated carbon-ammonia, calcium chlorid-ammonia, activated carbon fiber- methanol and activated carbon AC35-methanol, show that the adsorber design can influence the system performances; The thermal performances of system are better in the annular configuration case. An optimal value of generating temperature is observed in annular adsorber case for which the thermal performance of the cooling system is maximal. While in the plate adsorber, above a certain value of generating temperature, the performance of the system remains almost constant. The environmental conditions such as solar radiation and pressure have a great influence in the system efficiency, and the choice of the working pair depends on the environmental conditions and the geometry of the adsorber.Keywords: adsorber geometry, numerical modeling, optimal environmental conditions, working pairs.
Procedia PDF Downloads 7918995 Geographical Indication Protection for Agricultural Products: Contribution for Achieving Food Security in Indonesia
Authors: Mas Rahmah
Abstract:
Indonesia is the most populous Southeast Asian nations, as Indonesia`s population is constantly growing, food security has become a crucial trending issue. Although Indonesia has more than enough natural resources and agricultural products to ensure food security for all, Indonesia is still facing the problem of food security because of adverse weather conditions, increasing population, political instability, economic factors (unemployment, rising food prices), and the dependent system of agriculture. This paper will analyze that Geographical Indication (GI) can aid in transforming Indonesian agricultural-dependent system by tapping the unique product attributes of their quality products since Indonesia has a lot of agricultural products with unique quality and special characteristic associated with geographical factors such as Toraja Coffee, Alor Vanili, Banda Nutmeg, Java Tea, Deli Tobacco, Cianjur Rise etc. This paper argues that the reputation and agricultural products and their intrinsic quality should be protected under GI because GI will provide benefit supporting the food security program. Therefore, this paper will expose the benefit of GI protection such as increasing productivity, improving the exports of GI products, creating employment, adding economic value to products, and increasing the diversity of supply of natural and unique quality products, etc. that can contribute to food security. The analysis will finally conclude that the scenario of promoting GI may indirectly contribute to food security through adding value by incorporating territory specific cultural, environmental and social qualities into production, processing and developing of unique local, niche and special agricultural products.Keywords: geographical indication, food security, agricultural product, Indonesia
Procedia PDF Downloads 36918994 System Detecting Border Gateway Protocol Anomalies Using Local and Remote Data
Authors: Alicja Starczewska, Aleksander Nawrat, Krzysztof Daniec, Jarosław Homa, Kacper Hołda
Abstract:
Border Gateway Protocol is the main routing protocol that enables routing establishment between all autonomous systems, which are the basic administrative units of the internet. Due to the poor protection of BGP, it is important to use additional BGP security systems. Many solutions to this problem have been proposed over the years, but none of them have been implemented on a global scale. This article describes a system capable of building images of real-time BGP network topology in order to detect BGP anomalies. Our proposal performs a detailed analysis of BGP messages that come into local network cards supplemented by information collected by remote collectors in different localizations.Keywords: BGP, BGP hijacking, cybersecurity, detection
Procedia PDF Downloads 7718993 People’s Perception towards the ASEAN Economic Community (AEC)
Authors: Nopadol Burananuth
Abstract:
The purposes of this research paper were to study the relationship between the economic factor and political factor, the relationship between political and economic factor and social factor, and the effects of economic factor, political factor, and social factor to the people’s perception about ASEAN Economic Community (AEC). A total of 400 samples were selected from four sub-districts from Arunyaprathet District, Srakaow Province. Data analysis method included multiple regression analysis. The findings revealed that political factor depended on trade cooperation, transportation cooperation, and communication cooperation. Social factor was depended on disaster protection, terrorism protection, and international relations. In addition, the people’s perception of the AEC depended on disaster perception, terrorism protection, international relations, transportation cooperation, communication cooperation, interdependence, and labor movement.Keywords: economic factors, perception, political factors, social factors
Procedia PDF Downloads 59018992 The Analysis of Loss-of-Excitation Algorithm for Synchronous Generators
Authors: Pavle Dakić, Dimitrije Kotur, Zoran Stojanović
Abstract:
This paper presents the results of the study in which the excitation system fault of synchronous generator is simulated. In a case of excitation system fault (loss of field), distance relay is used to prevent further damage. Loss-of-field relay calculates complex impedance using measured voltage and current at the generator terminals. In order to obtain phasors from sampled measured values, discrete Fourier transform is used. All simulations are conducted using Matlab and Simulink software package. The analysis is conducted on the two machine system which supplies equivalent load. While simulating loss of excitation on one generator in different conditions (at idle operation, weakly loaded, and fully loaded), diagrams of active power, reactive power, and measured impedance are analyzed and monitored. Moreover, in the simulations, the effect of generator load on relay tripping time is investigated. In conclusion, the performed tests confirm that the fault in the excitation system can be detected by measuring the impedance.Keywords: loss-of-excitation, synchronous generator, distance protection, Fourier transformation
Procedia PDF Downloads 33118991 Study on the Effects of Grassroots Characteristics on Reinforced Soil Performance by Direct Shear Test
Authors: Zhanbo Cheng, Xueyu Geng
Abstract:
Vegetation slope protection technique is economic, aesthetic and practical. Herbs are widely used in practice because of rapid growth, strong erosion resistance, obvious slope protection and simple method, in which the root system of grass plays a very important role. In this paper, through changing the variables value of grassroots quantity, grassroots diameter, grassroots length and grassroots reinforce layers, the direct shear tests were carried out to discuss the change of shear strength indexes of grassroots reinforced soil under different reinforce situations, and analyse the effects of grassroots characteristics on reinforced soil performance. The laboratory test results show that: (1) in the certain number of grassroots diameter, grassroots length and grassroots reinforce layers, the value of shear strength, and cohesion first increase and then reduce with the increasing of grassroots quantity; (2) in the certain number of grassroots quantity, grassroots length and grassroots reinforce layers, the value of shear strength and cohesion rise with the increasing of grassroots diameter; (3) in the certain number of grassroots diameter, and grassroots reinforce layers, the value of shear strength and cohesion raise with the increasing of grassroots length in a certain range of grassroots quantity, while the value of shear strength and cohesion first rise and then decline with the increasing of grassroots length when the grassroots quantity reaches a certain value; (4) in the certain number of grassroots quantity, grassroots diameter, and grassroots length, the value of shear strength and cohesion first climb and then decline with the increasing of grassroots reinforced layers; (5) the change of internal friction angle is small in different parameters of grassroots. The research results are of importance for understanding the mechanism of vegetation protection for slopes and determining the parameters of grass planting.Keywords: direct shear test, reinforced soil, grassroots characteristics, shear strength indexes
Procedia PDF Downloads 17818990 Microbial Deterioration of Some Different Archaeological Objects Made from Cellulose by Bacillus Group
Authors: Mohammad Abdel Fattah Mohammad Kewisha
Abstract:
Microbial deterioration of ancient materials became one of the biggest problems facing the workers in the field of cultural heritage protection because the microbial deterioration of artifacts causes detrimental effects on the aesthetic value of the monuments due to colonization, whether they are made of inorganic materials such as stone or organic like wood, textiles, wall paintings, and paper. So, the early identification of the bacterial strains that caused deterioration is the most important point for the protection of monument objects. The present study focuses on the Bacillus spp. group, which was isolated from some biodeterioration monuments from different areas of Egypt. The investigated objects in this study were made from organic materials (cellulose), paper, textile, and wood. Isolated strains were identified up to the species level biochemically. Eleven bacterial isolates were obtained from collected samples. They were taken from different archaeological objects, four microbicides, cetrimonium bromide, sodium azide, tetraethyl ammonium bromide, and dichloroxylenol, at various concentrations ranging from 25 ppm to 500 ppm. They were screened for their antibacterial activity against the Bacillus spp. isolates, and detection of Minimum inhibitory concentration (MIC). It was also necessary to indicate the ideal Minimum inhibitory concentration for each strain for the purpose of biotreatment of the infected monuments with less damaging effect on monument materials.Keywords: microbial deterioration, ancient materials, heritage protection, protection of monuments, biodeteriorative monuments
Procedia PDF Downloads 60