Search results for: fire protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2809

Search results for: fire protection

2449 Combustion Characteristic of Propane/Acetylene Fuel Blends Pool Fire

Authors: Yubo Bi, Xiao Chen, Shouxiang Lu

Abstract:

A kind of gas-fueled burner, named Burning Rate Emulator, was proposed for the purpose of the emulation of condensed fuel recently. The gaseous fuel can be pure combustible fuel gas or blends of gaseous fuel or inert gas. However, this concept was recently proposed without detailed study on the combustion characteristic of fuel blends. In this study, two kinds of common gaseous fuels were selected, propane and acetylene, to provide the combustion heat as well as a large amount of smoke, which widely exists in liquid and solid fuel burning process. A set of experiments were carried out using a gas-fueled burner with a diameter of 8 cm. The total volume flow rate of propane and acetylene was kept at 3 liters per minute. The volume fraction of propane varied from 0% to 100% at interval of 10%. It is found that the flame height increases with propane volume fraction, which may be caused by the increase of heat release rate, as the energy density of propane is larger than that of acetylene. The dimensionless flame height is correlated against dimensionless heat release rate, which shows a power function relationship. The radiation fraction of the flame does not show a monotonic relationship with propane volume fraction. With the increase of propane volume fraction from 0% to 100%, the value of radiation fraction increases first and reach a maximum value around 0.46 at a propane volume fraction of 10%, and then decreases continuously to a value of 0.25 at the propane volume fraction of 100%. The flame radiation is related to the soot in the flame. The trend of the radiation fraction reflects that there may be a synergistic effect of soot formation between propane and acetylene which can be guessed from the significantly high radiation fraction at a propane volume fraction of 10%. This work provides data for combustion of gaseous fuel blends pool fire and also give reference on the design of Burning Rate Emulator.

Keywords: Burning Rate Emulator, fuel blends pool fire, flame height, radiation fraction

Procedia PDF Downloads 225
2448 Regulating Issues concerning Data Protection in Cloud Computing: Developing a Saudi Approach

Authors: Jumana Majdi Qutub

Abstract:

Rationale: Cloud computing has rapidly developed the past few years. Because of the importance of providing protection for personal data used in cloud computing, the role of data protection in promoting trust and confidence in users’ data has become an important policy priority. This research examines key regulatory challenges rose by the growing use and importance of cloud computing with focusing on protection of individuals personal data. Methodology: Describing and analyzing governance challenges facing policymakers and industry in Saudi Arabia, with an account of anticipated governance responses. The aim of the research is to describe and define the regulatory challenges on cloud computing for policy making in Saudi Arabia and comparing it with potential complied issues rose in respect of transported data to EU member state. In addition, it discusses information privacy issues. Finally, the research proposes policy recommendation that would resolve concerns surrounds the privacy and effectiveness of clouds computing frameworks for data protection. Results: There are still no clear regulation in Saudi Arabia specialized in legalizing cloud computing and specialty regulations in transferring data internationally and locally. Decision makers need to review the applicable law in Saudi Arabia that protect information in cloud computing. This should be from an international and a local view in order to identify all requirements surrounding this area. It is important to educate cloud computing users about their information value and rights before putting it in the cloud to avoid further legal complications, such as making an educational program to prevent giving personal information to a bank employee. Therefore, with many kinds of cloud computing services, it is important to have it covered by the law in all aspects.

Keywords: cloud computing, cyber crime, data protection, privacy

Procedia PDF Downloads 254
2447 Acetalization of Carbonyl Compounds by Using Al2 (HPO4)3 under Green Condition Mg HPO4

Authors: Fariba Jafari, Samaneh Heydarian

Abstract:

Al2(HPO4)3 was easily prepared and used as a solid acid in acetalization of carbonyl compounds at room temperature and under solvent-free conditions. The protection was done in short reaction times and in good to high isolated yields. The cheapness and availability of this reagent with easy procedure and work-up make this method attractive for the organic synthesis.

Keywords: acetalization, acid catalysis, carbonylcompounds, green condition, protection

Procedia PDF Downloads 313
2446 The Implementation of Anti-Circumvention Legislations in Thai Copyright System

Authors: Chuencheewin Yimfuang

Abstract:

The WIPO copyright treaty (WCT) was established by the World Intellectual Property Organisation (WIPO). This agreement required the contracting nations to provide adequate protection to technological measures to prevent massive copyright infringement in the internet system. Thailand had to implement the anti-circumvention rules into domestic legislation to comply with this international obligation. The purpose of this paper is to critically discuss the legislative standard under the WCT. It also aims to examine the legal development of technological protection measures in Thailand and demonstrate that the scope of prohibitions under the copyright Act 2022 (NO.5) is similar to the Digital Millennium Copyright Act 1998 (DMCA) of the United States (US). It could be found that the anti-circumvention laws of Thailand prohibit the circumvention of access-control technologies, and the regulation on trafficking circumvention devices has been added to the latest version of the Thai Copyright Act. These legislative evolutions have revealed the attempt to reinforce the legal protection of technological measures and copyright holders in order to be in line with global practices. However, the amendment has problems concerning the legal definitions of effective technological measure and the prohibited act of circumvention. The vagueness might affect the scope of protection and the boundary of prohibition. With this aspect, the DMCA will be evaluated and compared to gain guidelines for interpretation and enforcement in Thailand. The lessons and experiences learned from this study might be useful to correct the flaws or at least clarify the ambiguities embodied in Thai copyright legislation.

Keywords: legal development, technological protection measure, circumvention, Thailand

Procedia PDF Downloads 84
2445 Corrosion Protection of Steel 316 by Electrochemically Synthesized Conductive Poly (O-Toluidine)

Authors: H. Acar, M. Karakışla, L. Aksu, M. Saçak

Abstract:

The corrosion protection effect of poly(o-toluidine) (POT) coated on steel 316 electrode was determined in corrosive media such as NaCl, H2SO4 and HCl with the use of Tafel curves and electrochemical impedance spectroscopy techniques. The POT coatings were prepared with cyclic voltammetry technique in aqueous solution of oxalic acid and they were characterized by FTIR and UV-Visible absorption spectroscopy. The Tafel curves revealed that the POT coating provides the most effective protection compared to the bare steel 316 electrode in NaCl as corrosive medium. The results were evaluated based upon data decrease of corrosion current and shift to positive potentials with the increase of number of scans. Electrochemical impedance spectroscopy measurements were found to support Tafel data of POT coating.

Keywords: corrosion, impedance spectroscopy, steel 316, poly(o-toluidine)

Procedia PDF Downloads 311
2444 The Effect of Artificial Intelligence on Petroleum Industry and Production

Authors: Mina Shokry Hanna Saleh Tadros

Abstract:

The centrality of the Petroleum Industry in the world energy is undoubted. The world economy almost runs and depends on petroleum. Petroleum industry is a multi-trillion industry; it turns otherwise poor and underdeveloped countries into wealthy nations and thrusts them at the center of international diplomacy. Although these developing nations lack the necessary technology to explore and exploit petroleum resources they are not without help as developed nations, represented by their multinational corporations are ready and willing to provide both the technical and managerial expertise necessary for the development of this natural resource. However, the exploration of these petroleum resources comes with, sometimes, grave, concomitant consequences. These consequences are especially pronounced with respect to the environment. From the British Petroleum Oil rig explosion and the resultant oil spillage and pollution in New Mexico, United States to the Mobil Oil spillage along Egyptian coast, the story and consequence is virtually the same. Egypt’s delta Region produces Nigeria’s petroleum which accounts for more than ninety-five percent of Nigeria’s foreign exchange earnings. Between 1999 and 2007, Egypt earned more than $400 billion from petroleum exports. Nevertheless, petroleum exploration and exploitation has devastated the Delta environment. From oil spillage which pollutes the rivers, farms and wetlands to gas flaring by the multi-national corporations; the consequences is similar-a region that has been devastated by petroleum exploitation. This paper thus seeks to examine the consequences and impact of petroleum pollution in the Egypt Delta with particular reference on the right of the people of Niger Delta to a healthy environment. The paper further seeks to examine the relevant international, regional instrument and Nigeria’s municipal laws that are meant to protect the result of the people of the Egypt Delta and their enforcement by the Nigerian State. It is quite worrisome that the Egypt Delta Region and its people have suffered and are still suffering grave violations of their right to a healthy environment as a result of petroleum exploitation in their region. The Egypt effort at best is half-hearted in its protection of the people’s right.

Keywords: crude oil, fire, floating roof tank, lightning protection systemenvironment, exploration, petroleum, pollutionDuvernay petroleum system, oil generation, oil-source correlation, Re-Os

Procedia PDF Downloads 67
2443 Privacy Protection Principles of Omnichannel Approach

Authors: Renata Mekovec, Dijana Peras, Ruben Picek

Abstract:

The advent of the Internet, mobile devices and social media is revolutionizing the experience of retail customers by linking multiple sources through various channels. Omnichannel retailing is a retailing that combines multiple channels to allow customers to seamlessly leverage all the distribution information online and offline while shopping. Therefore, today data are an asset more critical than ever for all organizations. Nonetheless, because of its heterogeneity through platforms, developers are currently facing difficulties in dealing with personal data. Considering the possibilities of omnichannel communication, this paper presents channel categorization that could enhance the customer experience of omnichannel center called hyper center. The purpose of this paper is fundamentally to describe the connection between the omnichannel hyper center and the customer, with particular attention to privacy protection. The first phase was finding the most appropriate channels of communication for hyper center. Consequently, a selection of widely used communication channels has been identified and analyzed with regard to the effect requirements for optimizing user experience. The evaluation criteria are divided into 3 groups: general, user profile and channel options. For each criterion the weight of importance for omnichannel communication was defined. The most important thing was to consider how the hyper center can make user identification while respecting the privacy protection requirements. The study carried out also shows what customer experience across digital networks would look like, based on an omnichannel approach owing to privacy protection principles.

Keywords: personal data, privacy protection, omnichannel communication, retail

Procedia PDF Downloads 137
2442 Broad Protection against Avian Influenza Virus by Using a Modified Vaccinia Ankara Virus Expressing a Mosaic Hemagglutinin

Authors: Attapon Kamlangdee, Brock Kingstad-Bakke, Tavis K. Anderson, Tony L. Goldberg, Jorge E. Osorio

Abstract:

A critical failure in our preparedness for an influenza pandemic is the lack of a universal vaccine. Influenza virus strains diverge by 1 to 2% per year, and commercially available vaccines often do not elicit protection from one year to the next, necessitating frequent formulation changes. This represents a major challenge to the development of a cross-protective vaccine that can protect against circulating viral antigenic diversity. We have constructed a recombinant modified vaccinia virus Ankara (MVA) that expresses an H5N1 mosaic hemagglutinin (H5M) (MVA-H5M). This mosaic was generated in silico using 2,145 field-sourced H5N1 isolates. A single dose of MVA-H5M provided 100% protection in mice against clade 0, 1, and 2 avian influenza viruses and also protected against seasonal H1N1 virus (A/Puerto Rico/8/34). It also provided short-term (10 days) and long-term (6 months) protection post vaccination. Both neutralizing antibodies and antigen-specific CD4+and CD8+ T cells were still detected at 5 months post vaccination, suggesting that MVA-H5M provides long-lasting immunity.

Keywords: modified vaccinia Ankara, MVA, H5N1, hemagglutinin, influenza vaccine

Procedia PDF Downloads 276
2441 Technological Challenges for First Responders in Civil Protection; the RESPOND-A Solution

Authors: Georgios Boustras, Cleo Varianou Mikellidou, Christos Argyropoulos

Abstract:

Summer 2021 was marked by a number of prolific fires in the EU (Greece, Cyprus, France) as well as outside the EU (USA, Turkey, Israel). This series of dramatic events have stretched national civil protection systems and first responders in particular. Despite the introduction of National, Regional and International frameworks (e.g. rescEU), a number of challenges have arisen, not only related to climate change. RESPOND-A (funded by the European Commission by Horizon 2020, Contract Number 883371) introduces a unique five-tier project architectural structure for best associating modern telecommunications technology with novel practices for First Responders of saving lives, while safeguarding themselves, more effectively and efficiently. The introduced architecture includes Perception, Network, Processing, Comprehension, and User Interface layers, which can be flexibly elaborated to support multiple levels and types of customization, so, the intended technologies and practices can adapt to any European Environment Agency (EEA)-type disaster scenario. During the preparation of the RESPOND-A proposal, some of our First Responder Partners expressed the need for an information management system that could boost existing emergency response tools, while some others envisioned a complete end-to-end network management system that would offer high Situational Awareness, Early Warning and Risk Mitigation capabilities. The intuition behind these needs and visions sits on the long-term experience of these Responders, as well, their smoldering worry that the evolving threat of climate change and the consequences of industrial accidents will become more frequent and severe. Three large-scale pilot studies are planned in order to illustrate the capabilities of the RESPOND-A system. The first pilot study will focus on the deployment and operation of all available technologies for continuous communications, enhanced Situational Awareness and improved health and safety conditions for First Responders, according to a big fire scenario in a Wildland Urban Interface zone (WUI). An important issue will be examined during the second pilot study. Unobstructed communication in the form of the flow of information is severely affected during a crisis; the flow of information between the wider public, from the first responders to the public and vice versa. Call centers are flooded with requests and communication is compromised or it breaks down on many occasions, which affects in turn – the effort to build a common operations picture for all firstr esponders. At the same time the information that reaches from the public to the operational centers is scarce, especially in the aftermath of an incident. Understandably traffic if disrupted leaves no other way to observe but only via aerial means, in order to perform rapid area surveys. Results and work in progress will be presented in detail and challenges in relation to civil protection will be discussed.

Keywords: first responders, safety, civil protection, new technologies

Procedia PDF Downloads 136
2440 Migration-Related Challenges during the Covid-19 Pandemic in South Africa. A Case of Alexandra Township

Authors: Edwin Mwasakidzeni Mutyenyoka

Abstract:

Without ignoring migration-related challenges in transit zones and places of origin, this inquiry focuses on arrived international immigrants’ exacerbated vulnerability during crises. The aim is to underline longstanding inequalities and demonstrate that crises merely amplify and exacerbate challenges that low-income migrants already face during ‘non-crises’ periods. Social protection, as an agenda for reducing vulnerability, poverty, and risk for low-income households, with regard to basic consumption and services, has been foregrounded in the post-apartheid development discourse in South Africa. Evidently, however, the state, through the South African Social Security Agency (SASSA), systemically excludes the majority of non-citizens from state-sponsored social assistance programs - often leaving them heavily dependent on sporadic non-state options and erosive coping mechanisms. In this paper, migration itself should not only be understood as a social protection strategy against poverty and risk but also as a source of vulnerability that often requires social protection. For quasi-ethnographic, it use one migrant destination, Alex Park Township, as a “contact zone” and space of negotiation during the pandemic.

Keywords: south-south migration, crises, social protection, Covid-19 pandemic

Procedia PDF Downloads 86
2439 Juridical Protection to Consumers in Electronic Contracts: Need of a Uniform International Law

Authors: Parul Sinha

Abstract:

Electronic commerce facilitates increased choice and information on goods or services for consumers but at the same time it compounds the inequality of bargaining power many consumers face when contracting with sellers. Due to the ‘inequality of bargaining power’ experienced by consumers when contracting by electronic means with business sellers in different jurisdictions, it may be difficult to determine where either the consumer is domiciled or the place where the seller is situated or conducts its business. The question arises in such situation that if one party wants to sue the other, then where can one sue? Which court has jurisdiction to try international conflicts arising from electronic contracts concluded through the internet? Will the same rules applicable to conventional contracts apply? Or should other considerations be taken into account? In all these situations the degree of consumer protection in electronic contracts comes into picture. In the light of the above, the paper discusses the jurisdiction and choice of law rules applied in EU and United States. Further, the paper considers the current uncertainty plaguing questions of jurisdiction in India. Therefore, the jurisdiction and choice of law rules for electronic contracts must be applied consistently and provide an automatic, harmonised rule in favour of the consumer’s jurisdiction and law. Lastly, the paper suggests the need for a uniform law in order to achieve effective juridical protection.

Keywords: electronic commerce, electronic contracts, jurisdiction, consumer protection

Procedia PDF Downloads 244
2438 Simulation of Hamming Coding and Decoding for Microcontroller Radiation Hardening

Authors: Rehab I. Abdul Rahman, Mazhar B. Tayel

Abstract:

This paper presents a method of hardening the 8051 microcontroller, that able to assure reliable operation in the presence of bit flips caused by radiation. Aiming at avoiding such faults in the 8051 microcontroller, Hamming code protection was used in its SRAM memory and registers. A VHDL code and its simulation have been used for this hamming code protection.

Keywords: radiation, hardening, bitflip, hamming

Procedia PDF Downloads 493
2437 Acid-Responsive Polymer Conjugates as a New Generation of Corrosion Protecting Materials

Authors: Naruphorn Dararatana, Farzad Seidi, Daniel Crespy

Abstract:

Protection of metals is a critical issue in industry. The annual cost of corrosion in the world is estimated to be about 2.5 trillion dollars and continuously increases. Therefore, there is a need for developing novel protection approaches to improve corrosion protection. We designed and synthesized smart polymer/corrosion inhibitor conjugates as new generations of corrosion protecting materials. Firstly, a polymerizable acrylate derivative of 8-hydroxyquinoline (8HQ), an effective corrosion inhibitor, containing acid-labile β-thiopropionate linkage was prepared in three steps. Then, it was copolymerized with ethyl acrylate in the presence of 1,1′-azobis(cyclohexanecarbonitrile) (ABCN) by radical polymerization. Nanoparticles with an average diameter of 140 nm were prepared from the polymer conjugate by the miniemulsion-solvent evaporation process. The release behavior of 8HQ from the the nanoparticles was studied in acidic (pH 3.5) and neutral media (pH 7.0). The release profile showed a faster release of 8HQ in acidic medium in comparison with neutral medium. Indeed 100% of 8HQ was released after 14 days in acidic medium whereas only around 15% of 8HQ was released during the same period at neutral pH. Therefore, the polymer conjugate nanoparticles are suitable materials as additives or to form coatings on metal substrates for corrosion protection.

Keywords: Corrosion inhibitor, 8-Hydroxyquinoline, Polymer conjugated, β-Thiopropionate

Procedia PDF Downloads 186
2436 Green Economy and Environmental Protection Economic Policy Challenges in Georgia

Authors: Gulnaz Erkomaishvili

Abstract:

Introduction. One of the most important issues of state economic policy in the 21st century is the problem of environmental protection. The Georgian government considers the green economy as one of the most important means of sustainable economic development and takes the initiative to implement voluntary measures to promote sustainable development. In this context, it is important to promote the development of ecosystem services, clean production, environmental education and green jobs.The development of the green economy significantly reduces the inefficient use of natural resources, waste generation, emissions into the atmosphere and the discharge of untreated water into bodies of water.It is, therefore, an important instrument in the environmental orientation of sustainable development. Objectives.The aim of the paper is to analyze the current status of the green economy in Georgia and identify effective ways to improve the environmental, economic policy of sustainable development. Methodologies: This paper uses general and specific methods, in particular, analysis, synthesis, induction, deduction, scientific abstraction, comparative and statistical methods, as well as experts’ evaluation. bibliographic research of scientific works and reports of organizations was conducted; Publications of the National Statistics Office of Georgia are used to determine the regularity between analytical and statistical estimations. Also, theoretical and applied research of international organizations and scientist-economists are used. Contributions: The country should implement such an economic policy that ensures the transition to a green economy, in particular, revising water, air and waste laws, strengthening existing environmental management tools and introcing new tools (including economic tools). Perfecting the regulatory legal framework of the environmental impact assessment system, which includes the harmonization of Georgian legislation with the requirements of the European Union. To ensure the protection and rational use of Georgia's forests, emphasis should be placed on sustainable forestry, protection and restoration of forests.

Keywords: green economy, environmental protection, environmental protection economic policy, environmental protection policy challanges

Procedia PDF Downloads 59
2435 Adaptive Envelope Protection Control for the below and above Rated Regions of Wind Turbines

Authors: Mustafa Sahin, İlkay Yavrucuk

Abstract:

This paper presents a wind turbine envelope protection control algorithm that protects Variable Speed Variable Pitch (VSVP) wind turbines from damage during operation throughout their below and above rated regions, i.e. from cut-in to cut-out wind speed. The proposed approach uses a neural network that can adapt to turbines and their operating points. An algorithm monitors instantaneous wind and turbine states, predicts a wind speed that would push the turbine to a pre-defined envelope limit and, when necessary, realizes an avoidance action. Simulations are realized using the MS Bladed Wind Turbine Simulation Model for the NREL 5 MW wind turbine equipped with baseline controllers. In all simulations, through the proposed algorithm, it is observed that the turbine operates safely within the allowable limit throughout the below and above rated regions. Two example cases, adaptations to turbine operating points for the below and above rated regions and protections are investigated in simulations to show the capability of the proposed envelope protection system (EPS) algorithm, which reduces excessive wind turbine loads and expectedly increases the turbine service life.

Keywords: adaptive envelope protection control, limit detection and avoidance, neural networks, ultimate load reduction, wind turbine power control

Procedia PDF Downloads 127
2434 Analyzing Current Transformers Saturation Characteristics for Different Connected Burden Using LabVIEW Data Acquisition Tool

Authors: D. Subedi, S. Pradhan

Abstract:

Current transformers are an integral part of power system because it provides a proportional safe amount of current for protection and measurement applications. However when the power system experiences an abnormal situation leading to huge current flow, then this huge current is proportionally injected to the protection and metering circuit. Since the protection and metering equipment’s are designed to withstand only certain amount of current with respect to time, these high currents pose a risk to man and equipment. Therefore during such instances, the CT saturation characteristics have a huge influence on the safety of both man and equipment and also on the reliability of the protection and metering system. This paper shows the effect of burden on the Accuracy Limiting factor/ Instrument security factor of current transformers and also the change in saturation characteristics of the CT’s. The response of the CT to varying levels of overcurrent at different connected burden will be captured using the data acquisition software LabVIEW. Analysis is done on the real time data gathered using LabVIEW. Variation of current transformer saturation characteristics with changes in burden will be discussed.

Keywords: accuracy limiting factor, burden, current transformer, instrument security factor, saturation characteristics

Procedia PDF Downloads 410
2433 Testing Plastic-Sand Construction Blocks Made from Recycled Polyethylene Terephthalate (rPET)

Authors: Cassi Henderson, Lucia Corsini, Shiv Kapila, Egle Augustaityte, Tsemaye Uwejamomere Zinzan Gurney, Aleyna Yildirim

Abstract:

Plastic pollution is a major threat to human and planetary health. In Low- and Middle-Income Countries, plastic waste poses a major problem for marginalized populations who lack access to formal waste management systems. This study explores the potential for converting waste plastic into construction blocks. It is the first study to analyze the use of polyethylene terephthalate (PET) as a binder in plastic-sand bricks. Unlike previous studies of plastic sand-bricks, this research tests the properties of bricks that were made using a low-cost kiln technology that was co-designed with a rural, coastal community in Kenya.  The mechanical strength, resistance to fire and water absorption properties of the bricks are tested in this study. The findings show that the bricks meet structural standards for mechanical performance, fire resistance and water absorption. It was found that 30:70 PET to sand demonstrated the best overall performance.

Keywords: recycling, PET, plastic, sustainable construction, sustainable development

Procedia PDF Downloads 120
2432 Comparison of Spiking Neuron Models in Terms of Biological Neuron Behaviours

Authors: Fikret Yalcinkaya, Hamza Unsal

Abstract:

To understand how neurons work, it is required to combine experimental studies on neural science with numerical simulations of neuron models in a computer environment. In this regard, the simplicity and applicability of spiking neuron modeling functions have been of great interest in computational neuron science and numerical neuroscience in recent years. Spiking neuron models can be classified by exhibiting various neuronal behaviors, such as spiking and bursting. These classifications are important for researchers working on theoretical neuroscience. In this paper, three different spiking neuron models; Izhikevich, Adaptive Exponential Integrate Fire (AEIF) and Hindmarsh Rose (HR), which are based on first order differential equations, are discussed and compared. First, the physical meanings, derivatives, and differential equations of each model are provided and simulated in the Matlab environment. Then, by selecting appropriate parameters, the models were visually examined in the Matlab environment and it was aimed to demonstrate which model can simulate well-known biological neuron behaviours such as Tonic Spiking, Tonic Bursting, Mixed Mode Firing, Spike Frequency Adaptation, Resonator and Integrator. As a result, the Izhikevich model has been shown to perform Regular Spiking, Continuous Explosion, Intrinsically Bursting, Thalmo Cortical, Low-Threshold Spiking and Resonator. The Adaptive Exponential Integrate Fire model has been able to produce firing patterns such as Regular Ignition, Adaptive Ignition, Initially Explosive Ignition, Regular Explosive Ignition, Delayed Ignition, Delayed Regular Explosive Ignition, Temporary Ignition and Irregular Ignition. The Hindmarsh Rose model showed three different dynamic neuron behaviours; Spike, Burst and Chaotic. From these results, the Izhikevich cell model may be preferred due to its ability to reflect the true behavior of the nerve cell, the ability to produce different types of spikes, and the suitability for use in larger scale brain models. The most important reason for choosing the Adaptive Exponential Integrate Fire model is that it can create rich ignition patterns with fewer parameters. The chaotic behaviours of the Hindmarsh Rose neuron model, like some chaotic systems, is thought to be used in many scientific and engineering applications such as physics, secure communication and signal processing.

Keywords: Izhikevich, adaptive exponential integrate fire, Hindmarsh Rose, biological neuron behaviours, spiking neuron models

Procedia PDF Downloads 174
2431 Analysing “The Direction of Artificial Intelligence Legislation from a Global Perspective” from the Perspective of “AIGC Copyright Protection” Content

Authors: Xiaochen Mu

Abstract:

Due to the diversity of stakeholders and the ambiguity of ownership boundaries, the current protection models for Artificial Intelligence Generated Content (AIGC) have many disadvantages. In response to this situation, there are three different protection models worldwide. The United States Copyright Office stipulates that works autonomously generated by artificial intelligence ‘lack’ the element of human creation, and non-human AI cannot create works. To protect and promote investment in the field of artificial intelligence, UK legislation, through Section 9(3) of the CDPA, designates the author of AI-generated works as ‘the person by whom the arrangements necessary for the creation of the work are undertaken.’ China neither simply excludes the work attributes of AI-generated content based on the lack of a natural person subject as the sole reason, nor does it generalize that AIGC should or should not be protected. Instead, it combines specific case circumstances and comprehensively evaluates the degree of originality of AIGC and the contributions of natural persons to AIGC. In China's first AI drawing case, the court determined that the image in question was the result of the plaintiff's design and selection through inputting prompt words and setting parameters, reflecting the plaintiff's intellectual investment and personalized expression, and should be recognized as a work in the sense of copyright law. Despite opposition, the ruling also established the feasibility of the AIGC copyright protection path. The recognition of the work attributes of AIGC will not lead to overprotection that hinders the overall development of the AI industry. Just as with the legislation and regulation of AI by various countries, there is a need for a balance between protection and development. For example, the provisional agreement reached on the EU AI Act, based on a risk classification approach, seeks a dynamic balance between copyright protection and the development of the AI industry.

Keywords: generative artificial intelligence, originality, works, copyright

Procedia PDF Downloads 31
2430 A Biometric Template Security Approach to Fingerprints Based on Polynomial Transformations

Authors: Ramon Santana

Abstract:

The use of biometric identifiers in the field of information security, access control to resources, authentication in ATMs and banking among others, are of great concern because of the safety of biometric data. In the general architecture of a biometric system have been detected eight vulnerabilities, six of them allow obtaining minutiae template in plain text. The main consequence of obtaining minutia templates is the loss of biometric identifier for life. To mitigate these vulnerabilities several models to protect minutiae templates have been proposed. Several vulnerabilities in the cryptographic security of these models allow to obtain biometric data in plain text. In order to increase the cryptographic security and ease of reversibility, a minutiae templates protection model is proposed. The model aims to make the cryptographic protection and facilitate the reversibility of data using two levels of security. The first level of security is the data transformation level. In this level generates invariant data to rotation and translation, further transformation is irreversible. The second level of security is the evaluation level, where the encryption key is generated and data is evaluated using a defined evaluation function. The model is aimed at mitigating known vulnerabilities of the proposed models, basing its security on the impossibility of the polynomial reconstruction.

Keywords: fingerprint, template protection, bio-cryptography, minutiae protection

Procedia PDF Downloads 165
2429 Analyzing the Risk Based Approach in General Data Protection Regulation: Basic Challenges Connected with Adapting the Regulation

Authors: Natalia Kalinowska

Abstract:

The adoption of the General Data Protection Regulation, (GDPR) finished the four-year work of the European Commission in this area in the European Union. Considering far-reaching changes, which will be applied by GDPR, the European legislator envisaged two-year transitional period. Member states and companies have to prepare for a new regulation until 25 of May 2018. The idea, which becomes a new look at an attitude to data protection in the European Union is risk-based approach. So far, as a result of implementation of Directive 95/46/WE, in many European countries (including Poland) there have been adopted very particular regulations, specifying technical and organisational security measures e.g. Polish implementing rules indicate even how long password should be. According to the new approach from May 2018, controllers and processors will be obliged to apply security measures adequate to level of risk associated with specific data processing. The risk in GDPR should be interpreted as the likelihood of a breach of the rights and freedoms of the data subject. According to Recital 76, the likelihood and severity of the risk to the rights and freedoms of the data subject should be determined by reference to the nature, scope, context and purposes of the processing. GDPR does not indicate security measures which should be applied – in recitals there are only examples such as anonymization or encryption. It depends on a controller’s decision what type of security measures controller considered as sufficient and he will be responsible if these measures are not sufficient or if his identification of risk level is incorrect. Data protection regulation indicates few levels of risk. Recital 76 indicates risk and high risk, but some lawyers think, that there is one more category – low risk/now risk. Low risk/now risk data processing is a situation when it is unlikely to result in a risk to the rights and freedoms of natural persons. GDPR mentions types of data processing when a controller does not have to evaluate level of risk because it has been classified as „high risk” processing e.g. processing on a large scale of special categories of data, processing with using new technologies. The methodology will include analysis of legal regulations e.g. GDPR, the Polish Act on the Protection of personal data. Moreover: ICO Guidelines and articles concerning risk based approach in GDPR. The main conclusion is that an appropriate risk assessment is a key to keeping data safe and avoiding financial penalties. On the one hand, this approach seems to be more equitable, not only for controllers or processors but also for data subjects, but on the other hand, it increases controllers’ uncertainties in the assessment which could have a direct impact on incorrect data protection and potential responsibility for infringement of regulation.

Keywords: general data protection regulation, personal data protection, privacy protection, risk based approach

Procedia PDF Downloads 250
2428 A Comparative Assessment of the FoodSupply Vulnerability to Large-Scale Disasters in OECD Countries

Authors: Karolin Bauer, Anna Brinkmann

Abstract:

Vulnerabilities in critical infrastructure can cause significant difficulties for the affected population during crises. Securing the food supply as part of the critical infrastructure in crisis situations is an essential part of public services and a ground stone for a successful concept of civil protection. In most industrialized countries, there are currently no comparative studies regarding the food supply of the population during crisis and disaster events. In order to mitigate the potential impact in case of major disasters in Germany, it is absolutely necessary to investigate how the food supply can be secured. The research project aims to provide in-depth research on the experiences gathered during past large-scale disasters in the 34 OECD member countries in order to discover alternatives for an updated civil protection system in Germany. The basic research question is: "Which international approaches and structures of civil protection have been proven and would be useful to modernize the German civil protection with regards to the critical infrastructure and food supply?" Research findings should be extracted from an extensive literature review covering the entire research period as well as from personal and online-based interviews with experts and responsible persons from involved institutions. The capability of the research project insists on the deliberate choice to investigate previous large-scale disasters to formulate important and practical approaches to modernize civil protection in Germany.

Keywords: food supply, vulnerabilty, critical infratstructure, large-scale disaster

Procedia PDF Downloads 330
2427 Protective Custody in Child Protection: Reflection of Residential Care Workers in the Philippines

Authors: Hazel S. Cometa-Lamberte

Abstract:

This paper presents the residential care workers reflections in working with children who were under protective custody and placed in a residential care facility for children. Key informant interviews and focus group discussion were employed in this study to analyze the views of residential care workers on the programs and services and case management system in residential care for children. Results suggest that working in a residential care facility for children needs the interplay of both the worker’s personal and professional values, knowledge and skills in working with children. Analyzing the residential care workers experiences in handling children in residential care facilities is vital for the improvement of the policies, programs and services, the repertoire of techniques and facilitate the creation of a new social work practice framework/model in child protection specifically in residential care facilities.

Keywords: child protection, residential care, residential care workers, social workers

Procedia PDF Downloads 165
2426 Minority Rights in Islamic Law (Sharia) and International Law Protection Mechanisms in the Region Kurdistan of Iraq

Authors: Ardawan Mustafa Ismail, Rebaz Sdiq Ismail

Abstract:

The subject of minorities takes an exceptional importance at all levels, around the world, especially those whose population is composed of many nationalities, and this subject became a very affective part in every country for its security, entity and stability, such as the nationality, religion or culture, as a result of internal factors and external influences, and at the same time it became clear that enslaving minorities had become a matter of reality. Which made the rights of minorities one of the legal, political and geographical issues, many attempts emerged that specialists and non-specialists have given the minorities ’problems their realistic solutions away from theorizing and assumption. On this chosen topic, there are many researches that are written in general places, but… It is believed did not see any in-depth studies dealing with the protection of minority rights of the Region of Kurdistan/ Iraq, because in the Region of Kurdistan/ Iraq there are many minorities living in this area, such as: Muslims, Yazidi, Assyrian, Christian, Chaldeans, and others.

Keywords: minority, international law, protection, Kurdistan, people

Procedia PDF Downloads 22
2425 Building Resilient Communities: The Traumatic Effect of Wildfire on Mati, Greece

Authors: K. Vallianou, T. Alexopoulos, V. Plaka, M. K. Seleventi, V. Skanavis, C. Skanavis

Abstract:

The present research addresses the role of place attachment and emotions in community resiliency and recovery within the context of a disaster. Natural disasters represent a disruption in the normal functioning of a community, leading to a general feeling of disorientation. This study draws on the trauma caused by a natural hazard such as a forest fire. The changes of the sense of togetherness are being assessed. Finally this research determines how the place attachment of the inhabitants was affected during the reorientation process of the community. The case study area is Mati, a small coastal town in eastern Attica, Greece. The fire broke out on July 23rd, 2018. A quantitative research was conducted through questionnaires via phone interviews, one year after the disaster, to address community resiliency in the long-run. The sample was composed of 159 participants from the rural community of Mati plus 120 coming from Skyros Island that was used as a control group. Inhabitants were prompted to answer items gauging their emotions related to the event, group identification and emotional significance of their community, and place attachment before and a year after the fire took place. Importantly, the community recovery and reorientation were examined within the context of a relative absence of government backing and official support. Emotions related to the event were aggregated into 4 clusters related to: activation/vigilance, distress/disorientation, indignation, and helplessness. The findings revealed a decrease in the level of place attachment in the impacted area of Mati as compared to the control group of Skyros Island. Importantly, initial distress caused by the fire prompted the residents to identify more with their community and to report more positive feelings toward their community. Moreover, a mediation analysis indicated that the positive effect of community cohesion on place attachment one year after the disaster was mediated by the positive feelings toward the community. Finally, place attachment contributes to enhanced optimism and a more positive perspective concerning Mati’s future prospects. Despite an insufficient state support to this affected area, the findings suggest an important role of emotions and place attachment during the process of recovery. Implications concerning the role of emotions and social dynamics in meshing place attachment during the disaster recovery process as well as community resiliency are discussed.

Keywords: community resilience, natural disasters, place attachment, wildfire

Procedia PDF Downloads 95
2424 Data Protection, Data Privacy, Research Ethics in Policy Process Towards Effective Urban Planning Practice for Smart Cities

Authors: Eugenio Ferrer Santiago

Abstract:

The growing complexities of the modern world on high-end gadgets, software applications, scams, identity theft, and Artificial Intelligence (AI) make the “uninformed” the weak and vulnerable to be victims of cybercrimes. Artificial Intelligence is not a new thing in our daily lives; the principles of database management, logical programming, and garbage in and garbage out are all connected to AI. The Philippines had in place legal safeguards against the abuse of cyberspace, but self-regulation of key industry players and self-protection by individuals are primordial to attain the success of these initiatives. Data protection, Data Privacy, and Research Ethics must work hand in hand during the policy process in the course of urban planning practice in different environments. This paper focuses on the interconnection of data protection, data privacy, and research ethics in coming up with clear-cut policies against perpetrators in the urban planning professional practice relevant in sustainable communities and smart cities. This paper shall use expository methodology under qualitative research using secondary data from related literature, interviews/blogs, and the World Wide Web resources. The claims and recommendations of this paper will help policymakers and implementers in the policy cycle. This paper shall contribute to the body of knowledge as a simple treatise and communication channel to the reading community and future researchers to validate the claims and start an intellectual discourse for better knowledge generation for the good of all in the near future.

Keywords: data privacy, data protection, urban planning, research ethics

Procedia PDF Downloads 53
2423 The Influence of Design Complexity of a Building Structure on the Expected Performance

Authors: Ormal Lishi

Abstract:

This research presents a computationally efficient probabilistic method to assess the performance of compartmentation walls with similar Fire Resistance Levels (FRL) but varying complexity. Specifically, a masonry brick wall and a light-steel framed (LSF) wall with comparable insulation performance are analyzed. A Monte Carlo technique, employing Latin Hypercube Sampling (LHS), is utilized to quantify uncertainties and determine the probability of failure for both walls exposed to standard and parametric fires, following ISO 834 and Eurocodes guidelines. Results show that the probability of failure for the brick masonry wall under standard fire exposure is estimated at 4.8%, while the LSF wall is 7.6%. These probabilities decrease to 0.4% and 4.8%, respectively, when subjected to parametric fires. Notably, the complex LSF wall exhibits higher variability in predicting time to failure for specific criteria compared to the less complex brick wall, especially at higher temperatures. The proposed approach highlights the need for Probabilistic Risk Assessment (PRA) to accurately evaluate the reliability and safety levels of complex designs.

Keywords: design complexity, probability of failure, monte carlo analysis, compartmentation walls, insulation

Procedia PDF Downloads 60
2422 The Judiciary as Pacemaker? Considering the Role of Courts in an Expansion of Protection for War Refugees and People Fleeing Natural Disasters

Authors: Charlotte Lülf

Abstract:

Migration flows, resulting from war, climate change or economic crisis cannot be tackled by single states but need to be addressed as a transnational and international responsibility. The traditional architecture surrounding the work of the UNHCR and the 1951 Convention, however, is not equipped to deal with these challenges. Widely excluded from legal protection are people not individually persecuted for the statutory criteria, people that flee from the indiscriminate effects of an armed conflict as well as people fleeing natural disasters. With the lack of explicit legal protection and the political reluctance of nation states worldwide to extend their commitment in new asylum laws, the judiciary must be put in focus: it plays a unique role in interpreting and potentially expanding the application of existing regulations. This paper as part of an ongoing Ph.D. Project deals with the current and partly contradicting approaches to the protection of war- and climate refugees. Changing jurisprudential practice of national and regional courts will be assessed, as will be their dialogue to interpret the international obligations of human rights law, migration laws, and asylum laws in an interacting world. In recent judgments refoulment to an armed conflict as well as countries without adequate disaster relief or health care was argued as violating fundamental human and asylum law rights and therefore prohibited – even for applicants without refugee status: The first step towards access to subsidiary protection could herewith be established. Can one observe similar developments in other parts of the world? This paper will evaluate the role of the judiciary to define, redefine and potentially expand protection for people seeking refuge from armed conflicts and natural disasters.

Keywords: human rights law, asylum-seekers, displacement, migration

Procedia PDF Downloads 273
2421 Cybervetting and Online Privacy in Job Recruitment – Perspectives on the Current and Future Legislative Framework Within the EU

Authors: Nicole Christiansen, Hanne Marie Motzfeldt

Abstract:

In recent years, more and more HR professionals have been using cyber-vetting in job recruitment in an effort to find the perfect match for the company. These practices are growing rapidly, accessing a vast amount of data from social networks, some of which is privileged and protected information. Thus, there is a risk that the right to privacy is becoming a duty to manage your private data. This paper investigates to which degree a job applicant's fundamental rights are protected adequately in current and future legislation in the EU. This paper argues that current data protection regulations and forthcoming regulations on the use of AI ensure sufficient protection. However, even though the regulation on paper protects employees within the EU, the recruitment sector may not pay sufficient attention to the regulation as it not specifically targeting this area. Therefore, the lack of specific labor and employment regulation is a concern that the social partners should attend to.

Keywords: AI, cyber vetting, data protection, job recruitment, online privacy

Procedia PDF Downloads 80
2420 The Relationship between Human Pose and Intention to Fire a Handgun

Authors: Joshua van Staden, Dane Brown, Karen Bradshaw

Abstract:

Gun violence is a significant problem in modern-day society. Early detection of carried handguns through closed-circuit television (CCTV) can aid in preventing potential gun violence. However, CCTV operators have a limited attention span. Machine learning approaches to automating the detection of dangerous gun carriers provide a way to aid CCTV operators in identifying these individuals. This study provides insight into the relationship between human key points extracted using human pose estimation (HPE) and their intention to fire a weapon. We examine the feature importance of each keypoint and their correlations. We use principal component analysis (PCA) to reduce the feature space and optimize detection. Finally, we run a set of classifiers to determine what form of classifier performs well on this data. We find that hips, shoulders, and knees tend to be crucial aspects of the human pose when making these predictions. Furthermore, the horizontal position plays a larger role than the vertical position. Of the 66 key points, nine principal components could be used to make nonlinear classifications with 86% accuracy. Furthermore, linear classifications could be done with 85% accuracy, showing that there is a degree of linearity in the data.

Keywords: feature engineering, human pose, machine learning, security

Procedia PDF Downloads 86