Search results for: forest protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3147

Search results for: forest protection

2757 Environmental and Economic Impact of Mangrove Deforestation: Case Study of Vadamaradchy East, Sri Lanka

Authors: Kumaraamy Sasikumar

Abstract:

The study was conducted in Vadamarachchi-East in Sri Lanka. Data collection was done for a period of two months from June to July 2011. The main focus of this study was to examine factors contributing to mangrove deforestation within the study area, and resultant impacts from deforestation. The study found that, the main factors that have contributed to deforestation include: Long civil wars in the region, poverty which pushed people to clear the forest to earn income through the sale of firewood and timber among others, industrial development, increasing demand for farm and settlement land, limited knowledge within the local community, weak government polices and implementation strategies, and natural disasters especially the 2004 Tsunami destruction. The impacts presented are those that impact both on the environment and the economy including; loss of income sources, loss of biodiversity, climate change, desertification, conflicts in the use of forest products and loss of land productivity due to reduced fertility caused by soil erosion. However, a few strategies have been put in place by the government to ensure the sustainable use of mangrove forest products, though these have not proved successful in reducing deforestation. The recommendations make suggestions to the government and other stakeholders to work together in ensuring sustainable use of natural resources, for example implementing laws and regulations aimed at controlling deforestation among others.

Keywords: deforestation, impacts, actors, environment, economic, sustainable development

Procedia PDF Downloads 338
2756 A Light in the Road of Protection of Civilians: Responsibility to Protect

Authors: Zeynep Selin Acar

Abstract:

In the world of wars, it is aimed to find ways to protect civilians propound by political elites. Current threats may come from edges of the security concerns, meaning uncontrollable terrorist groups, unanticipated government-supported armed groups or separatists, and unimaginable merge of the previous with foreign supports or oppositions of which could flow into all groups– flaws of international state system. These threats resulted in transformation of inter-state system into a world system with distinctive actors and brought along the changes in strategic plans of political and military bodies, as well as adaptations of principles framing the strategies in terms of may-be-applicable international law constrained by ethical considerations. This paper aims to analyse the Responsibility to Protect (RtoP), being one of those, with its criteria aiming to regulate military interventions taking the protection of civilians both as the reason for intervention, jus ad bellum or right to war, and as the duties during the intervention, jus in bello or how to conduct the war. In addition it will discuss the rise of its bindingness in terms of Responsibility Not to Veto (RNtoV), Franco/Mexican Political Declaration opened in signature for UN member states on September 2015.

Keywords: civilian protection, protection as responsibility, responsibility to protect, responsibility not to veto

Procedia PDF Downloads 241
2755 Regulating Issues concerning Data Protection in Cloud Computing: Developing a Saudi Approach

Authors: Jumana Majdi Qutub

Abstract:

Rationale: Cloud computing has rapidly developed the past few years. Because of the importance of providing protection for personal data used in cloud computing, the role of data protection in promoting trust and confidence in users’ data has become an important policy priority. This research examines key regulatory challenges rose by the growing use and importance of cloud computing with focusing on protection of individuals personal data. Methodology: Describing and analyzing governance challenges facing policymakers and industry in Saudi Arabia, with an account of anticipated governance responses. The aim of the research is to describe and define the regulatory challenges on cloud computing for policy making in Saudi Arabia and comparing it with potential complied issues rose in respect of transported data to EU member state. In addition, it discusses information privacy issues. Finally, the research proposes policy recommendation that would resolve concerns surrounds the privacy and effectiveness of clouds computing frameworks for data protection. Results: There are still no clear regulation in Saudi Arabia specialized in legalizing cloud computing and specialty regulations in transferring data internationally and locally. Decision makers need to review the applicable law in Saudi Arabia that protect information in cloud computing. This should be from an international and a local view in order to identify all requirements surrounding this area. It is important to educate cloud computing users about their information value and rights before putting it in the cloud to avoid further legal complications, such as making an educational program to prevent giving personal information to a bank employee. Therefore, with many kinds of cloud computing services, it is important to have it covered by the law in all aspects.

Keywords: cloud computing, cyber crime, data protection, privacy

Procedia PDF Downloads 236
2754 Acetalization of Carbonyl Compounds by Using Al2 (HPO4)3 under Green Condition Mg HPO4

Authors: Fariba Jafari, Samaneh Heydarian

Abstract:

Al2(HPO4)3 was easily prepared and used as a solid acid in acetalization of carbonyl compounds at room temperature and under solvent-free conditions. The protection was done in short reaction times and in good to high isolated yields. The cheapness and availability of this reagent with easy procedure and work-up make this method attractive for the organic synthesis.

Keywords: acetalization, acid catalysis, carbonylcompounds, green condition, protection

Procedia PDF Downloads 299
2753 Ethnobotanical Study of Medicinal Plants Used by Indigenous People of Community Forest User Groups of Parbat District, Nepal

Authors: Gokul Gaudel, Zhang Wen Hui, Dang Quang Hung, Le Thi Hien, Liang Xiao

Abstract:

The community forests of Nepal serve as a major source of medicinal plants for majority of local people who are dependent on traditional health care system. This study aims to explore the ethnobotanical information of the medicinal plants used by five different community forest user groups of Parbat district of Nepal. The research was conducted during different periods of the year 2015, using semi-structured, open-ended questionnaires, formal and informal interviews, and group discussions. In total 145 different plant species within 77 families were documented, the majority of them being herb were found to be used to treat 84 different ailments. In terms of plant parts use: whole plants, barks, fruits, leaves were found to be in top priorities. Oral administration was the dominant route (57%), followed by both oral and dermal route (29%) and dermal only (14%). Females were found to have 24% more ethnobotanical knowledge than male. The knowledge of ethnobotanical medicinal plants was found excellent on age group 65-75. This study showed that community forests of Parbat district are rich in medicinal plants but the new generation was found less interested in using them. Easy access to modern medicines, lack of documentation and knowledge transfer to young generations are the major causes of diminishing utility of traditional medicinal practices.

Keywords: ailments, community forest, ethnobotany, medicinal plants, Parbat

Procedia PDF Downloads 258
2752 The Implementation of Anti-Circumvention Legislations in Thai Copyright System

Authors: Chuencheewin Yimfuang

Abstract:

The WIPO copyright treaty (WCT) was established by the World Intellectual Property Organisation (WIPO). This agreement required the contracting nations to provide adequate protection to technological measures to prevent massive copyright infringement in the internet system. Thailand had to implement the anti-circumvention rules into domestic legislation to comply with this international obligation. The purpose of this paper is to critically discuss the legislative standard under the WCT. It also aims to examine the legal development of technological protection measures in Thailand and demonstrate that the scope of prohibitions under the copyright Act 2022 (NO.5) is similar to the Digital Millennium Copyright Act 1998 (DMCA) of the United States (US). It could be found that the anti-circumvention laws of Thailand prohibit the circumvention of access-control technologies, and the regulation on trafficking circumvention devices has been added to the latest version of the Thai Copyright Act. These legislative evolutions have revealed the attempt to reinforce the legal protection of technological measures and copyright holders in order to be in line with global practices. However, the amendment has problems concerning the legal definitions of effective technological measure and the prohibited act of circumvention. The vagueness might affect the scope of protection and the boundary of prohibition. With this aspect, the DMCA will be evaluated and compared to gain guidelines for interpretation and enforcement in Thailand. The lessons and experiences learned from this study might be useful to correct the flaws or at least clarify the ambiguities embodied in Thai copyright legislation.

Keywords: legal development, technological protection measure, circumvention, Thailand

Procedia PDF Downloads 68
2751 Corrosion Protection of Steel 316 by Electrochemically Synthesized Conductive Poly (O-Toluidine)

Authors: H. Acar, M. Karakışla, L. Aksu, M. Saçak

Abstract:

The corrosion protection effect of poly(o-toluidine) (POT) coated on steel 316 electrode was determined in corrosive media such as NaCl, H2SO4 and HCl with the use of Tafel curves and electrochemical impedance spectroscopy techniques. The POT coatings were prepared with cyclic voltammetry technique in aqueous solution of oxalic acid and they were characterized by FTIR and UV-Visible absorption spectroscopy. The Tafel curves revealed that the POT coating provides the most effective protection compared to the bare steel 316 electrode in NaCl as corrosive medium. The results were evaluated based upon data decrease of corrosion current and shift to positive potentials with the increase of number of scans. Electrochemical impedance spectroscopy measurements were found to support Tafel data of POT coating.

Keywords: corrosion, impedance spectroscopy, steel 316, poly(o-toluidine)

Procedia PDF Downloads 294
2750 Privacy Protection Principles of Omnichannel Approach

Authors: Renata Mekovec, Dijana Peras, Ruben Picek

Abstract:

The advent of the Internet, mobile devices and social media is revolutionizing the experience of retail customers by linking multiple sources through various channels. Omnichannel retailing is a retailing that combines multiple channels to allow customers to seamlessly leverage all the distribution information online and offline while shopping. Therefore, today data are an asset more critical than ever for all organizations. Nonetheless, because of its heterogeneity through platforms, developers are currently facing difficulties in dealing with personal data. Considering the possibilities of omnichannel communication, this paper presents channel categorization that could enhance the customer experience of omnichannel center called hyper center. The purpose of this paper is fundamentally to describe the connection between the omnichannel hyper center and the customer, with particular attention to privacy protection. The first phase was finding the most appropriate channels of communication for hyper center. Consequently, a selection of widely used communication channels has been identified and analyzed with regard to the effect requirements for optimizing user experience. The evaluation criteria are divided into 3 groups: general, user profile and channel options. For each criterion the weight of importance for omnichannel communication was defined. The most important thing was to consider how the hyper center can make user identification while respecting the privacy protection requirements. The study carried out also shows what customer experience across digital networks would look like, based on an omnichannel approach owing to privacy protection principles.

Keywords: personal data, privacy protection, omnichannel communication, retail

Procedia PDF Downloads 118
2749 Broad Protection against Avian Influenza Virus by Using a Modified Vaccinia Ankara Virus Expressing a Mosaic Hemagglutinin

Authors: Attapon Kamlangdee, Brock Kingstad-Bakke, Tavis K. Anderson, Tony L. Goldberg, Jorge E. Osorio

Abstract:

A critical failure in our preparedness for an influenza pandemic is the lack of a universal vaccine. Influenza virus strains diverge by 1 to 2% per year, and commercially available vaccines often do not elicit protection from one year to the next, necessitating frequent formulation changes. This represents a major challenge to the development of a cross-protective vaccine that can protect against circulating viral antigenic diversity. We have constructed a recombinant modified vaccinia virus Ankara (MVA) that expresses an H5N1 mosaic hemagglutinin (H5M) (MVA-H5M). This mosaic was generated in silico using 2,145 field-sourced H5N1 isolates. A single dose of MVA-H5M provided 100% protection in mice against clade 0, 1, and 2 avian influenza viruses and also protected against seasonal H1N1 virus (A/Puerto Rico/8/34). It also provided short-term (10 days) and long-term (6 months) protection post vaccination. Both neutralizing antibodies and antigen-specific CD4+and CD8+ T cells were still detected at 5 months post vaccination, suggesting that MVA-H5M provides long-lasting immunity.

Keywords: modified vaccinia Ankara, MVA, H5N1, hemagglutinin, influenza vaccine

Procedia PDF Downloads 263
2748 An Assessment on Socio-Economic Impacts of Smallholder Eucalyptus Tree Plantation in the Case of Northwest Ethiopia

Authors: Mersha Tewodros Getnet, Mengistu Ketema, Bamlaku Alemu, Girma Demilew

Abstract:

The availability of forest products determines the possibilities for forest-based livelihood options. Plantation forest is a widespread economic activity in highland areas of the Amhara regional state, owing primarily to degradation and limited access to natural forests. As a result, tree plantation has become one of the rural livelihood options in the area. Therefore, given the increasing importance of smallholder plantations in highland areas of Amhara Regional States, the aim of this research was to evaluate the extent of smallholder plantations and their socio-economic impact. To address the abovementioned research, a sequential embedded mixed research design was employed. This qualitative and quantitative information was gathered from both primary and secondary sources. Primary data were collected from 385 sample households, which were chosen using a three-stage, multi-stage sampling method based on the Cochran sample size formula. Both descriptive and inferential statistics were used to analyze the data. Smallholder eucalyptus plantations in the study area were discovered to be common, and they are now part of the livelihood portfolio for meeting both household wood consumption and generating cash income. According to the PSM model's ATT results, income from selling farm forest products certainly contributes more to total household income, farm expenditure per cultivated land, and education spending than non-planter households. As a result, the government must strengthen plantation practices by prioritizing specific intervention areas while implementing measures to counteract the plantation's inequality-increasing effect through a variety of means, including progressive taxation.

Keywords: smallholder plantation, Eucalyptus, propensity score matching, average treatment effect and income

Procedia PDF Downloads 110
2747 Migration-Related Challenges during the Covid-19 Pandemic in South Africa. A Case of Alexandra Township

Authors: Edwin Mwasakidzeni Mutyenyoka

Abstract:

Without ignoring migration-related challenges in transit zones and places of origin, this inquiry focuses on arrived international immigrants’ exacerbated vulnerability during crises. The aim is to underline longstanding inequalities and demonstrate that crises merely amplify and exacerbate challenges that low-income migrants already face during ‘non-crises’ periods. Social protection, as an agenda for reducing vulnerability, poverty, and risk for low-income households, with regard to basic consumption and services, has been foregrounded in the post-apartheid development discourse in South Africa. Evidently, however, the state, through the South African Social Security Agency (SASSA), systemically excludes the majority of non-citizens from state-sponsored social assistance programs - often leaving them heavily dependent on sporadic non-state options and erosive coping mechanisms. In this paper, migration itself should not only be understood as a social protection strategy against poverty and risk but also as a source of vulnerability that often requires social protection. For quasi-ethnographic, it use one migrant destination, Alex Park Township, as a “contact zone” and space of negotiation during the pandemic.

Keywords: south-south migration, crises, social protection, Covid-19 pandemic

Procedia PDF Downloads 73
2746 Investigation of Projected Organic Waste Impact on a Tropical Wetland in Singapore

Authors: Swee Yang Low, Dong Eon Kim, Canh Tien Trinh Nguyen, Yixiong Cai, Shie-Yui Liong

Abstract:

Nee Soon swamp forest is one of the last vestiges of tropical wetland in Singapore. Understanding the hydrological regime of the swamp forest and implications for water quality is critical to guide stakeholders in implementing effective measures to preserve the wetland against anthropogenic impacts. In particular, although current field measurement data do not indicate a concern with organic pollution, reviewing the ways in which the wetland responds to elevated organic waste influx (and the corresponding impact on dissolved oxygen, DO) can help identify potential hotspots, and the impact on the outflow from the catchment which drains into downstream controlled watercourses. An integrated water quality model is therefore developed in this study to investigate spatial and temporal concentrations of DO levels and organic pollution (as quantified by biochemical oxygen demand, BOD) within the catchment’s river network under hypothetical, projected scenarios of spiked upstream inflow. The model was developed using MIKE HYDRO for modelling the study domain, as well as the MIKE ECO Lab numerical laboratory for characterising water quality processes. Model parameters are calibrated against time series of observed discharges at three measurement stations along the river network. Over a simulation period of April 2014 to December 2015, the calibrated model predicted that a continuous spiked inflow of 400 mg/l BOD will elevate downstream concentrations at the catchment outlet to an average of 12 mg/l, from an assumed nominal baseline BOD of 1 mg/l. Levels of DO were decreased from an initial 5 mg/l to 0.4 mg/l. Though a scenario of spiked organic influx at the swamp forest’s undeveloped upstream sub-catchments is currently unlikely to occur, the outcomes nevertheless will be beneficial for future planning studies in understanding how the water quality of the catchment will be impacted should urban redevelopment works be considered around the swamp forest.

Keywords: hydrology, modeling, water quality, wetland

Procedia PDF Downloads 117
2745 Exploring Tree Growth Variables Influencing Carbon Sequestration in the Face of Climate Change

Authors: Funmilayo Sarah Eguakun, Peter Oluremi Adesoye

Abstract:

One of the major problems being faced by human society is that the global temperature is believed to be rising due to human activity that releases carbon IV oxide (CO2) to the atmosphere. Carbon IV oxide is the most important greenhouse gas influencing global warming and possible climate change. With climate change becoming alarming, reducing CO2 in our atmosphere has become a primary goal of international efforts. Forest landsare major sink and could absorb large quantities of carbon if the trees are judiciously managed. The study aims at estimating the carbon sequestration capacity of Pinus caribaea (pine)and Tectona grandis (Teak) under the prevailing environmental conditions and exploring tree growth variables that influencesthe carbon sequestration capacity in Omo Forest Reserve, Ogun State, Nigeria. Improving forest management by manipulating growth characteristics that influences carbon sequestration could be an adaptive strategy of forestry to climate change. Random sampling was used to select Temporary Sample Plots (TSPs) in the study area from where complete enumeration of growth variables was carried out within the plots. The data collected were subjected to descriptive and correlational analyses. The results showed that average carbon stored by Pine and Teak are 994.4±188.3 Kg and 1350.7±180.6 Kg respectively. The difference in carbon stored in the species is significant enough to consider choice of species relevant in climate change adaptation strategy. Tree growth variables influence the capacity of the tree to sequester carbon. Height, diameter, volume, wood density and age are positively correlated to carbon sequestration. These tree growth variables could be manipulated by the forest manager as an adaptive strategy for climate change while plantations of high wood density speciescould be relevant for management strategy to increase carbon storage.

Keywords: adaptation, carbon sequestration, climate change, growth variables, wood density

Procedia PDF Downloads 358
2744 Classification of Contexts for Mentioning Love in Interviews with Victims of the Holocaust

Authors: Marina Yurievna Aleksandrova

Abstract:

Research of the Holocaust retains value not only for history but also for sociology and psychology. One of the most important fields of study is how people were coping during and after this traumatic event. The aim of this paper is to identify the main contexts of the topic of love and to determine which contexts are more characteristic for different groups of victims of the Holocaust (gender, nationality, age). In this research, transcripts of interviews with Holocaust victims that were collected during 1946 for the "Voices of the Holocaust" project were used as data. Main contexts were analyzed with methods of network analysis and latent semantic analysis and classified by gender, age, and nationality with random forest. The results show that love is articulated and described significantly differently for male and female informants, nationality is shown results with lower values of quality metrics, as well as the age.

Keywords: Holocaust, latent semantic analysis, network analysis, text-mining, random forest

Procedia PDF Downloads 162
2743 Juridical Protection to Consumers in Electronic Contracts: Need of a Uniform International Law

Authors: Parul Sinha

Abstract:

Electronic commerce facilitates increased choice and information on goods or services for consumers but at the same time it compounds the inequality of bargaining power many consumers face when contracting with sellers. Due to the ‘inequality of bargaining power’ experienced by consumers when contracting by electronic means with business sellers in different jurisdictions, it may be difficult to determine where either the consumer is domiciled or the place where the seller is situated or conducts its business. The question arises in such situation that if one party wants to sue the other, then where can one sue? Which court has jurisdiction to try international conflicts arising from electronic contracts concluded through the internet? Will the same rules applicable to conventional contracts apply? Or should other considerations be taken into account? In all these situations the degree of consumer protection in electronic contracts comes into picture. In the light of the above, the paper discusses the jurisdiction and choice of law rules applied in EU and United States. Further, the paper considers the current uncertainty plaguing questions of jurisdiction in India. Therefore, the jurisdiction and choice of law rules for electronic contracts must be applied consistently and provide an automatic, harmonised rule in favour of the consumer’s jurisdiction and law. Lastly, the paper suggests the need for a uniform law in order to achieve effective juridical protection.

Keywords: electronic commerce, electronic contracts, jurisdiction, consumer protection

Procedia PDF Downloads 225
2742 Simulation of Hamming Coding and Decoding for Microcontroller Radiation Hardening

Authors: Rehab I. Abdul Rahman, Mazhar B. Tayel

Abstract:

This paper presents a method of hardening the 8051 microcontroller, that able to assure reliable operation in the presence of bit flips caused by radiation. Aiming at avoiding such faults in the 8051 microcontroller, Hamming code protection was used in its SRAM memory and registers. A VHDL code and its simulation have been used for this hamming code protection.

Keywords: radiation, hardening, bitflip, hamming

Procedia PDF Downloads 484
2741 Public Participation Best Practices in Environmental Decision-making in Newfoundland and Labrador: Analyzing the Forestry Management Planning Process

Authors: Kimberley K. Whyte-Jones

Abstract:

Public participation may improve the quality of environmental management decisions. However, the quality of such a decision is strongly dependent on the quality of the process that leads to it. In order to ensure an effective and efficient process, key features of best practice in participation should be carefully observed; this would also combat disillusionment of citizens, decision-makers and practitioners. The overarching aim of this study is to determine what constitutes an effective public participation process relevant to the Newfoundland and Labrador, Canada context, and to discover whether the public participation process that led to the 2014-2024 Provincial Sustainable Forest Management Strategy (PSFMS) met best practices criteria. The research design uses an exploratory case study strategy to consider a specific participatory process in environmental decision-making in Newfoundland and Labrador. Data collection methods include formal semi-structured interviews and the review of secondary data sources. The results of this study will determine the validity of a specific public participation best practice framework. The findings will be useful for informing citizen participation processes in general and will deduce best practices in public participation in environmental management in the province. The study is, therefore, meaningful for guiding future policies and practices in the management of forest resources in the province of Newfoundland and Labrador, and will help in filling a noticeable gap in research compiling best practices for environmentally related public participation processes.

Keywords: best practices, environmental decision-making, forest management, public participation

Procedia PDF Downloads 290
2740 Acid-Responsive Polymer Conjugates as a New Generation of Corrosion Protecting Materials

Authors: Naruphorn Dararatana, Farzad Seidi, Daniel Crespy

Abstract:

Protection of metals is a critical issue in industry. The annual cost of corrosion in the world is estimated to be about 2.5 trillion dollars and continuously increases. Therefore, there is a need for developing novel protection approaches to improve corrosion protection. We designed and synthesized smart polymer/corrosion inhibitor conjugates as new generations of corrosion protecting materials. Firstly, a polymerizable acrylate derivative of 8-hydroxyquinoline (8HQ), an effective corrosion inhibitor, containing acid-labile β-thiopropionate linkage was prepared in three steps. Then, it was copolymerized with ethyl acrylate in the presence of 1,1′-azobis(cyclohexanecarbonitrile) (ABCN) by radical polymerization. Nanoparticles with an average diameter of 140 nm were prepared from the polymer conjugate by the miniemulsion-solvent evaporation process. The release behavior of 8HQ from the the nanoparticles was studied in acidic (pH 3.5) and neutral media (pH 7.0). The release profile showed a faster release of 8HQ in acidic medium in comparison with neutral medium. Indeed 100% of 8HQ was released after 14 days in acidic medium whereas only around 15% of 8HQ was released during the same period at neutral pH. Therefore, the polymer conjugate nanoparticles are suitable materials as additives or to form coatings on metal substrates for corrosion protection.

Keywords: Corrosion inhibitor, 8-Hydroxyquinoline, Polymer conjugated, β-Thiopropionate

Procedia PDF Downloads 170
2739 Exploratory Tests on Structures Resistance during Forest Fires

Authors: Luis M. Ribeiro, Jorge Raposo, Ricardo Oliveira, David Caballero, Domingos X. Viegas

Abstract:

Under the scope of European project WUIWATCH a set of experimental tests on house vulnerability was performed in order to assess the resistance of selected house components during the passage of a forest fire. Among the individual elements most affected by the passage of a wildfire the windows are the ones with greater exposure. In this sense, a set of exploratory experimental tests was designed to assess some particular aspects related to the vulnerability of windows and blinds. At the same time, the importance of leaving them closed (as well as the doors inside a house) during a wild fire was explored in order to give some scientific background to guidelines for homeowners. Three sets of tests were performed: 1. Windows and blinds resistance to heat. Three types of protective blinds were tested (aluminium, PVC and wood) on 2 types of windows (single and double pane). The objective was to assess the structures resistance. 2. The influence of air flow on the transport of burning embers inside a house. A room was built to scale, and placed inside a wind tunnel, with one window and one door on opposite sides. The objective was to assess the importance of leaving an inside door opened on the probability of burning embers entering the room. 3. The influence of the dimension of openings on a window or door related to the probability of ignition inside a house. The objective was to assess the influence of different window openings in relation to the amount of burning particles that can enter a house. The main results were: 1. The purely radiative heat source provides 1.5 KW/m2 of heat impact in the structure, while the real fire generates 10 Kw/m2. When protected by the blind, the single pane window reaches 30ºC on both sides, and the double pane window has a differential of 10º from the side facing the heat (30ºC) and the opposite side (40ºC). Unprotected window constantly increases temperature until the end of the test. Window blinds reach considerably higher temperatures. PVC loses its consistency above 150ºC and melts. 2. Leaving the inside door closed results in a positive pressure differential of +1Pa from the outside to the inside, inhibiting the air flow. Opening the door in half or full reverts the pressure differential to -6 and -8 times respectively, favouring the air flow from the outside to the inside. The number of particles entering the house follows the same tendency. 3. As the bottom opening in a window increases from 0,5 cm to 4 cm the number of particles that enter the house per second also increases greatly. From 5 cm until 80cm there is no substantial increase in the number of entering particles. This set of exploratory tests proved to be an added value in supporting guidelines for home owners, regarding self-protection in WUI areas.

Keywords: forest fire, wildland urban interface, house vulnerability, house protective elements

Procedia PDF Downloads 265
2738 Efficient Credit Card Fraud Detection Based on Multiple ML Algorithms

Authors: Neha Ahirwar

Abstract:

In the contemporary digital era, the rise of credit card fraud poses a significant threat to both financial institutions and consumers. As fraudulent activities become more sophisticated, there is an escalating demand for robust and effective fraud detection mechanisms. Advanced machine learning algorithms have become crucial tools in addressing this challenge. This paper conducts a thorough examination of the design and evaluation of a credit card fraud detection system, utilizing four prominent machine learning algorithms: random forest, logistic regression, decision tree, and XGBoost. The surge in digital transactions has opened avenues for fraudsters to exploit vulnerabilities within payment systems. Consequently, there is an urgent need for proactive and adaptable fraud detection systems. This study addresses this imperative by exploring the efficacy of machine learning algorithms in identifying fraudulent credit card transactions. The selection of random forest, logistic regression, decision tree, and XGBoost for scrutiny in this study is based on their documented effectiveness in diverse domains, particularly in credit card fraud detection. These algorithms are renowned for their capability to model intricate patterns and provide accurate predictions. Each algorithm is implemented and evaluated for its performance in a controlled environment, utilizing a diverse dataset comprising both genuine and fraudulent credit card transactions.

Keywords: efficient credit card fraud detection, random forest, logistic regression, XGBoost, decision tree

Procedia PDF Downloads 35
2737 Comparison of Multivariate Adaptive Regression Splines and Random Forest Regression in Predicting Forced Expiratory Volume in One Second

Authors: P. V. Pramila , V. Mahesh

Abstract:

Pulmonary Function Tests are important non-invasive diagnostic tests to assess respiratory impairments and provides quantifiable measures of lung function. Spirometry is the most frequently used measure of lung function and plays an essential role in the diagnosis and management of pulmonary diseases. However, the test requires considerable patient effort and cooperation, markedly related to the age of patients esulting in incomplete data sets. This paper presents, a nonlinear model built using Multivariate adaptive regression splines and Random forest regression model to predict the missing spirometric features. Random forest based feature selection is used to enhance both the generalization capability and the model interpretability. In the present study, flow-volume data are recorded for N= 198 subjects. The ranked order of feature importance index calculated by the random forests model shows that the spirometric features FVC, FEF 25, PEF,FEF 25-75, FEF50, and the demographic parameter height are the important descriptors. A comparison of performance assessment of both models prove that, the prediction ability of MARS with the `top two ranked features namely the FVC and FEF 25 is higher, yielding a model fit of R2= 0.96 and R2= 0.99 for normal and abnormal subjects. The Root Mean Square Error analysis of the RF model and the MARS model also shows that the latter is capable of predicting the missing values of FEV1 with a notably lower error value of 0.0191 (normal subjects) and 0.0106 (abnormal subjects). It is concluded that combining feature selection with a prediction model provides a minimum subset of predominant features to train the model, yielding better prediction performance. This analysis can assist clinicians with a intelligence support system in the medical diagnosis and improvement of clinical care.

Keywords: FEV, multivariate adaptive regression splines pulmonary function test, random forest

Procedia PDF Downloads 287
2736 Green Economy and Environmental Protection Economic Policy Challenges in Georgia

Authors: Gulnaz Erkomaishvili

Abstract:

Introduction. One of the most important issues of state economic policy in the 21st century is the problem of environmental protection. The Georgian government considers the green economy as one of the most important means of sustainable economic development and takes the initiative to implement voluntary measures to promote sustainable development. In this context, it is important to promote the development of ecosystem services, clean production, environmental education and green jobs.The development of the green economy significantly reduces the inefficient use of natural resources, waste generation, emissions into the atmosphere and the discharge of untreated water into bodies of water.It is, therefore, an important instrument in the environmental orientation of sustainable development. Objectives.The aim of the paper is to analyze the current status of the green economy in Georgia and identify effective ways to improve the environmental, economic policy of sustainable development. Methodologies: This paper uses general and specific methods, in particular, analysis, synthesis, induction, deduction, scientific abstraction, comparative and statistical methods, as well as experts’ evaluation. bibliographic research of scientific works and reports of organizations was conducted; Publications of the National Statistics Office of Georgia are used to determine the regularity between analytical and statistical estimations. Also, theoretical and applied research of international organizations and scientist-economists are used. Contributions: The country should implement such an economic policy that ensures the transition to a green economy, in particular, revising water, air and waste laws, strengthening existing environmental management tools and introcing new tools (including economic tools). Perfecting the regulatory legal framework of the environmental impact assessment system, which includes the harmonization of Georgian legislation with the requirements of the European Union. To ensure the protection and rational use of Georgia's forests, emphasis should be placed on sustainable forestry, protection and restoration of forests.

Keywords: green economy, environmental protection, environmental protection economic policy, environmental protection policy challanges

Procedia PDF Downloads 41
2735 Adaptive Envelope Protection Control for the below and above Rated Regions of Wind Turbines

Authors: Mustafa Sahin, İlkay Yavrucuk

Abstract:

This paper presents a wind turbine envelope protection control algorithm that protects Variable Speed Variable Pitch (VSVP) wind turbines from damage during operation throughout their below and above rated regions, i.e. from cut-in to cut-out wind speed. The proposed approach uses a neural network that can adapt to turbines and their operating points. An algorithm monitors instantaneous wind and turbine states, predicts a wind speed that would push the turbine to a pre-defined envelope limit and, when necessary, realizes an avoidance action. Simulations are realized using the MS Bladed Wind Turbine Simulation Model for the NREL 5 MW wind turbine equipped with baseline controllers. In all simulations, through the proposed algorithm, it is observed that the turbine operates safely within the allowable limit throughout the below and above rated regions. Two example cases, adaptations to turbine operating points for the below and above rated regions and protections are investigated in simulations to show the capability of the proposed envelope protection system (EPS) algorithm, which reduces excessive wind turbine loads and expectedly increases the turbine service life.

Keywords: adaptive envelope protection control, limit detection and avoidance, neural networks, ultimate load reduction, wind turbine power control

Procedia PDF Downloads 113
2734 Analyzing Current Transformers Saturation Characteristics for Different Connected Burden Using LabVIEW Data Acquisition Tool

Authors: D. Subedi, S. Pradhan

Abstract:

Current transformers are an integral part of power system because it provides a proportional safe amount of current for protection and measurement applications. However when the power system experiences an abnormal situation leading to huge current flow, then this huge current is proportionally injected to the protection and metering circuit. Since the protection and metering equipment’s are designed to withstand only certain amount of current with respect to time, these high currents pose a risk to man and equipment. Therefore during such instances, the CT saturation characteristics have a huge influence on the safety of both man and equipment and also on the reliability of the protection and metering system. This paper shows the effect of burden on the Accuracy Limiting factor/ Instrument security factor of current transformers and also the change in saturation characteristics of the CT’s. The response of the CT to varying levels of overcurrent at different connected burden will be captured using the data acquisition software LabVIEW. Analysis is done on the real time data gathered using LabVIEW. Variation of current transformer saturation characteristics with changes in burden will be discussed.

Keywords: accuracy limiting factor, burden, current transformer, instrument security factor, saturation characteristics

Procedia PDF Downloads 399
2733 The Use of Remotely Sensed Data to Model Habitat Selections of Pileated Woodpeckers (Dryocopus pileatus) in Fragmented Landscapes

Authors: Ruijia Hu, Susanna T.Y. Tong

Abstract:

Light detection and ranging (LiDAR) and four-channel red, green, blue, and near-infrared (RGBI) remote sensed imageries allow an accurate quantification and contiguous measurement of vegetation characteristics and forest structures. This information facilitates the generation of habitat structure variables for forest species distribution modelling. However, applications of remote sensing data, especially the combination of structural and spectral information, to support evidence-based decisions in forest managements and conservation practices at local scale are not widely adopted. In this study, we examined the habitat requirements of pileated woodpecker (Dryocopus pileatus) (PW) in Hamilton County, Ohio, using ecologically relevant forest structural and vegetation characteristics derived from LiDAR and RGBI data. We hypothesized that the habitat of PW is shaped by vegetation characteristics that are directly associated with the availability of food, hiding and nesting resources, the spatial arrangement of habitat patches within home range, as well as proximity to water sources. We used 186 PW presence or absence locations to model their presence and absence in generalized additive model (GAM) at two scales, representing foraging and home range size, respectively. The results confirm PW’s preference for tall and large mature stands with structural complexity, typical of late-successional or old-growth forests. Besides, the crown size of dead trees shows a positive relationship with PW occurrence, therefore indicating the importance of declining living trees or early-stage dead trees within PW home range. These locations are preferred by PW for nest cavity excavation as it attempts to balance the ease of excavation and tree security. In addition, we found that PW can adjust its travel distance to the nearest water resource, suggesting that habitat fragmentation can have certain impacts on PW. Based on our findings, we recommend that forest managers should use different priorities to manage nesting, roosting, and feeding habitats. Particularly, when devising forest management and hazard tree removal plans, one needs to consider retaining enough cavity trees within high-quality PW habitat. By mapping PW habitat suitability for the study area, we highlight the importance of riparian corridor in facilitating PW to adjust to the fragmented urban landscape. Indeed, habitat improvement for PW in the study area could be achieved by conserving riparian corridors and promoting riparian forest succession along major rivers in Hamilton County.

Keywords: deadwood detection, generalized additive model, individual tree crown delineation, LiDAR, pileated woodpecker, RGBI aerial imagery, species distribution models

Procedia PDF Downloads 36
2732 The Material Behavior in Curved Glulam Beam of Jabon Timber

Authors: Erma Desmaliana, Saptahari Sugiri

Abstract:

Limited availability of solid timber in large dimensions becomes a problem. The demands of timbers in Indonesia is more increasing compared to its supply from natural forest. It is associated with the issues of global warming and environmental preservation. The uses of timbers from HTI (Industrial Planting Forest) and HTR (Society Planting Forest), such as Jabon, is an alternative source that required to solve these problems. Having shorter lifespan is the benefit of HTI/HTR timbers, although they are relatively smaller in dimension and lower in strength. Engineering Wood Product (EWP) such as glulam (glue-laminated) timber, is required to overcome their losses. Glulam is fabricated by gluing the wooden planks that having a thickness of 20 to 45 mm with an adhesive material and a certain pressure. Glulam can be made a curved beam, is one of the advantages, thus making it strength is greater than a straight beam. This paper is aimed to know the material behavior of curved glue-laminated beam of Jabon timber. Preliminary methods was to gain physical and mechanical properties, and glue spread strength of Jabon timber, which following the ASTM D-143 standard test method. Dimension of beams were 50 mm wide, 760 mm span, 50 mm thick, and 50 mm rise. Each layer of Jabon has a thickness of 5 mm and is glued with polyurethane. Cold press will be applied to beam laminated specimens for more than 5 hours. The curved glue-laminated beams specimens will be tested about the bending behavior. This experiments aims to obtain the increasing of load carrying capacity and stiffness of curved glulam beam.

Keywords: curved glulam beam, HTR&HTI, load carrying, strength

Procedia PDF Downloads 278
2731 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection

Authors: Mahshid Arabi

Abstract:

With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.

Keywords: data protection, digital technologies, information security, modern management

Procedia PDF Downloads 1
2730 Changes in Forest Cover Regulate Streamflow in Central Nigerian Gallery Forests

Authors: Rahila Yilangai, Sonali Saha, Amartya Saha, Augustine Ezealor

Abstract:

Gallery forests in sub-Saharan Africa are drastically disappearing due to intensive anthropogenic activities thus reducing ecosystem services, one of which is water provisioning. The role played by forest cover in regulating streamflow and water yield is not well understood, especially in West Africa. This pioneering 2-year study investigated the interrelationships between plant cover and hydrology in protected and unprotected gallery forests. Rainfall, streamflow, and evapotranspiration (ET) measurements/estimates over 2015-2016 were obtained to form a water balance for both catchments. In addition, transpiration in the protected gallery forest with high vegetation cover was calculated from stomatal conductance readings of selected species chosen from plot level data of plant diversity and abundance. Results showed that annual streamflow was significantly higher in the unprotected site than the protected site, even when normalized by catchment area. However, streamflow commenced earlier and lasted longer in the protected site than the degraded unprotected site, suggesting regulation by the greater tree density in the protected site. Streamflow correlated strongly with rainfall with the highest peak in August. As expected, transpiration measurements were less than potential evapotranspiration estimates, while rainfall exceeded ET in the water cycle. The water balance partitioning suggests that the lower vegetation cover in the unprotected catchment leads to a larger runoff in the rainy season and less infiltration, thereby leading to streams drying up earlier, than in the protected catchment. This baseline information is important in understanding the contribution of plants in water cycle regulation, for modeling integrative water management in applied research and natural resource management in sustaining water resources with changing the land cover and climate uncertainties in this data-poor region.

Keywords: evapotranspiration, gallery forest, rainfall, streamflow, transpiration

Procedia PDF Downloads 150
2729 A Biometric Template Security Approach to Fingerprints Based on Polynomial Transformations

Authors: Ramon Santana

Abstract:

The use of biometric identifiers in the field of information security, access control to resources, authentication in ATMs and banking among others, are of great concern because of the safety of biometric data. In the general architecture of a biometric system have been detected eight vulnerabilities, six of them allow obtaining minutiae template in plain text. The main consequence of obtaining minutia templates is the loss of biometric identifier for life. To mitigate these vulnerabilities several models to protect minutiae templates have been proposed. Several vulnerabilities in the cryptographic security of these models allow to obtain biometric data in plain text. In order to increase the cryptographic security and ease of reversibility, a minutiae templates protection model is proposed. The model aims to make the cryptographic protection and facilitate the reversibility of data using two levels of security. The first level of security is the data transformation level. In this level generates invariant data to rotation and translation, further transformation is irreversible. The second level of security is the evaluation level, where the encryption key is generated and data is evaluated using a defined evaluation function. The model is aimed at mitigating known vulnerabilities of the proposed models, basing its security on the impossibility of the polynomial reconstruction.

Keywords: fingerprint, template protection, bio-cryptography, minutiae protection

Procedia PDF Downloads 151
2728 Economic Development and New Challenges: Biomass Energy and Sustainability

Authors: Fabricia G. F. S. Rossato, Ieda G. Hidalgo, Andres Susseta, Felipe Casale, Leticia H. Nakamiti

Abstract:

This research was conducted to show the useful source of biomass energy provided from forest waste and the black liquor from the pulping process. This energy source could be able to assist and improve its area environment in a sustainable way. The research will demonstrate the challenges from producing the biomass energy and the implantation of the pulp industry in the city of Três Lagoas, MS. – Brazil. Planted forest’s potential, energy production in the pulp industries and its consequence of impacts on the local region environmental was also studied and examined. The present study is classified as descriptive purposes as it exposes the characteristics of a given population and the means such as bibliographical and documentary. All the data and information collected and demonstrate in this study was carefully analyzed and provided from reliable sources such as official government agencies.

Keywords: Brazil, pulp industry, renewable energy, Três Lagoas

Procedia PDF Downloads 303