Search results for: Coastal protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2966

Search results for: Coastal protection

2486 Toxin-Producing Algae of Nigerian Coast, Gulf of Guinea

Authors: Medina O. Kadiri, Jeffrey U. Ogbebor

Abstract:

Toxin-producing algae are algal species that produce potent toxins, which accumulate in food chains and cause various gastrointestinal and neurological illnesses in humans and other animals. They result in shellfish toxicity, ecosystem alteration, cause fish kills and mortality of other animals and humans, in addition to compromised product quality as well as decreased consumer confidence. Animals, including man, are directly exposed to toxins by absorbing toxins from the water via swimming, drinking water with toxins, or ingestion of algal species via feeding on contaminated seafood. These toxins, algal toxins, undergo bioaccumulation, biotransformation, biotransferrence, and biomagnification through the natural food chains and food webs, thereby endangering animals and humans. The Nigerian coast is situated on the Atlantic Ocean, the Gulf of Guinea, one of Africa’s five large marine ecosystems (LME), and studies on toxic algae in this ecosystem are generally lacking. Algal samples were collected from eight coastal states and ten locations spanning the Bight of Bonny and the Bight of Benin. A total of 70 species of toxin-producing algae were found in the coastal waters of Nigeria. There was a great variety of toxin-producing algae in the coastal waters of Nigeria. They were Domoic acid-producing forms (DSP), Saxitoxin-producing, Gonyautoxin-producing, and Yessotoxin-producing (all PSP). Others were Okadaic acid-producing, Dinophysistoxin-producing, and Palytoxin-producing, which are representatives of DSP; CFP was represented by Ciguatoxin-producing forms and NSP by Brevitoxin-producing species. Emerging or new toxins are comprising of Gymnodimines, Spirolides, Palytoxins, and Prorocentrolidess-producing algae. The CyanoToxin Poisoning (CTP) was represented by Anatoxin-, Microcystin-, Cylindrospermopsis-Lyngbyatoxin-, Nordularin-Applyssiatoxin and Debromoapplatoxin-producing species. The highest group was the Saxitoxin-producing species, followed by Microcystin-producing species, then Anatoxin-producing species. Gonyautoxin (PSP), Palytoxin (DSP), Emerging toxins, and Cylindrospermopsin -producing species had a very substantial representation. Only Ciguatoxin-producing species, Lyngbyatoxin-Nordularin, Applyssiatoxin, and Debromoapplatoxin-producing species were represented by one taxon each. The presence of such overwhelming diversity of toxin-producing algae on the Nigerian coast is a source of concern for fisheries, aquaculture, human health, and ecosystem services. Therefore routine monitoring of toxic and harmful algae is greatly recommended.

Keywords: algal syndromes, Atlantic Ocean, harmful algae, Nigeria

Procedia PDF Downloads 196
2485 Awarding Copyright Protection to Artificial Intelligence Technology for its Original Works: The New Way Forward

Authors: Vibhuti Amarnath Madhu Agrawal

Abstract:

Artificial Intelligence (AI) and Intellectual Property are two emerging concepts that are growing at a fast pace and have the potential of having a huge impact on the economy in the coming times. In simple words, AI is nothing but work done by a machine without any human intervention. It is a coded software embedded in a machine, which over a period of time, develops its own intelligence and begins to take its own decisions and judgments by studying various patterns of how people think, react to situations and perform tasks, among others. Intellectual Property, especially Copyright Law, on the other hand, protects the rights of individuals and Companies in content creation that primarily deals with application of intellect, originality and expression of the same in some tangible form. According to some of the reports shared by the media lately, ChatGPT, an AI powered Chatbot, has been involved in the creation of a wide variety of original content, including but not limited to essays, emails, plays and poetry. Besides, there have been instances wherein AI technology has given creative inputs for background, lights and costumes, among others, for films. Copyright Law offers protection to all of these different kinds of content and much more. Considering the two key parameters of Copyright – application of intellect and originality, the question, therefore, arises that will awarding Copyright protection to a person who has not directly invested his / her intellect in the creation of that content go against the basic spirit of Copyright laws? This study aims to analyze the current scenario and provide answers to the following questions: a. If the content generated by AI technology satisfies the basic criteria of originality and expression in a tangible form, why should such content be denied protection in the name of its creator, i.e., the specific AI tool / technology? B. Considering the increasing role and development of AI technology in our lives, should it be given the status of a ‘Legal Person’ in law? C. If yes, what should be the modalities of awarding protection to works of such Legal Person and management of the same? Considering the current trends and the pace at which AI is advancing, it is not very far when AI will start functioning autonomously in the creation of new works. Current data and opinions on this issue globally reflect that they are divided and lack uniformity. In order to fill in the existing gaps, data obtained from Copyright offices from the top economies of the world have been analyzed. The role and functioning of various Copyright Societies in these countries has been studied in detail. This paper provides a roadmap that can be adopted to satisfy various objectives, constraints and dynamic conditions related AI technology and its protection under Copyright Law.

Keywords: artificial intelligence technology, copyright law, copyright societies, intellectual property

Procedia PDF Downloads 64
2484 Shoreline Variation with Construction of a Pair of Training Walls, Ponnani Inlet, Kerala, India

Authors: Jhoga Parth, T. Nasar, K. V. Anand

Abstract:

An idealized definition of shoreline is that it is the zone of coincidence of three spheres such as atmosphere, lithosphere, and hydrosphere. Despite its apparent simplicity, this definition in practice a challenge to apply. In reality, the shoreline location deviates continually through time, because of various dynamic factors such as wave characteristics, currents, coastal orientation and the bathymetry, which makes the shoreline volatile. This necessitates us to monitor the shoreline in a temporal basis. If shoreline’s nature is understood at particular coastal stretch, it need not be the same trend at the other location, though belonging to the same sea front. Shoreline change is hence a local phenomenon and has to be studied with great intensity considering as many factors involved as possible. Erosion and accretion of sediment are such natures of a shoreline, which needs to be quantified by comparing with its predeceasing variations and understood before implementing any coastal projects. In recent years, advent of Global Positioning System (GPS) and Geographic Information System (GIS) acts as an emerging tool to quantify the intra and inter annual sediment rate getting accreted or deposited compared to other conventional methods in regards with time was taken and man power. Remote sensing data, on the other hand, paves way to acquire historical sets of data where field data is unavailable with a higher resolution. Short term and long term period shoreline change can be accurately tracked and monitored using a software residing in GIS - Digital Shoreline Analysis System (DSAS) developed by United States Geological Survey (USGS). In the present study, using DSAS, End Point Rate (EPR) is calculated analyze the intra-annual changes, and Linear Rate Regression (LRR) is adopted to study inter annual changes of shoreline. The shoreline changes are quantified for the scenario during the construction of breakwater in Ponnani river inlet along Kerala coast, India. Ponnani is a major fishing and landing center located 10°47’12.81”N and 75°54’38.62”E in Malappuram district of Kerala, India. The rate of erosion and accretion is explored using satellite and field data. The full paper contains the rate of change of shoreline, and its analysis would provide us understanding the behavior of the inlet at the study area during the construction of the training walls.

Keywords: DSAS, end point rate, field measurements, geo-informatics, shoreline variation

Procedia PDF Downloads 248
2483 Towards the Management of Cybersecurity Threats in Organisations

Authors: O. A. Ajigini, E. N. Mwim

Abstract:

Cybersecurity is the protection of computers, programs, networks, and data from attack, damage, unauthorised, unintended access, change, or destruction. Organisations collect, process and store their confidential and sensitive information on computers and transmit this data across networks to other computers. Moreover, the advent of internet technologies has led to various cyberattacks resulting in dangerous consequences for organisations. Therefore, with the increase in the volume and sophistication of cyberattacks, there is a need to develop models and make recommendations for the management of cybersecurity threats in organisations. This paper reports on various threats that cause malicious damage to organisations in cyberspace and provides measures on how these threats can be eliminated or reduced. The paper explores various aspects of protection measures against cybersecurity threats such as handling of sensitive data, network security, protection of information assets and cybersecurity awareness. The paper posits a model and recommendations on how to manage cybersecurity threats in organisations effectively. The model and the recommendations can then be utilised by organisations to manage the threats affecting their cyberspace. The paper provides valuable information to assist organisations in managing their cybersecurity threats and hence protect their computers, programs, networks and data in cyberspace. The paper aims to assist organisations to protect their information assets and data from cyberthreats as part of the contributions toward community engagement.

Keywords: confidential information, cyberattacks, cybersecurity, cyberspace, sensitive information

Procedia PDF Downloads 252
2482 Solving the Refugee Problem in the Modern State System: The Philosophical Dilemma of Sovereignty and Human Right

Authors: Xiaoman Dong

Abstract:

The refugee problem has a long history, but the scale and severity of modern refugee crises demand us to consider if the progress of political history exacerbates the refugee problem. This paper argues that although sovereignty owes its legitimacy to the protection of human rights, the modern state system complicates the refugee problem by first introducing then blurring the line between human rights and civil rights, and making national identity indispensable to basic livelihood and dignity. This paper first explains the source of the modern state system’s legitimacy by putting it in the context of social contract theories and the politics of nation-building. It then discusses how states create the concept of statelessness, which leads to more violations on human rights. Using historical records of the League of Nations High Commission for Refugees and the United Nations High Commissioner for Refugees, this paper reveals that neither the refugee problem of the Cold-War period nor the current refugee crisis is collateral damage of war, but rather the consequence of intentional exclusionary policies produced out of political interests. Finally, it contends that if the modern state system is to sustain, it cannot prioritize the protection of civil rights of a particular group over the protection of basic human rights of all.

Keywords: burden sharing, human rights, legitimacy of state, positive externality, sovereignty

Procedia PDF Downloads 186
2481 Urban Development from the Perspective of Lou Gang Polder System: Taihu Lake, Huzhou as an Example

Authors: Wei Bin Shen

Abstract:

Lou Gang world irrigation project heritage in Taihu Lake is a systematic irrigation project integrating water conservancy, ecology and culture. Through the methods of historical documents and field investigation, this paper deeply analyzes the formation history, connotation and value of Lou Gang polder system: Lou Gang heritage, describes in detail the relationship between Lou Gang polder system in Taihu Lake and the development and evolution of Huzhou City, and initially explores the protection and Utilization Strategies of Lou Gang water conservancy cultural heritage resources in Taihu Lake from the current situation.

Keywords: Lou Gang, protection strategy, urban evolution, waterconservancyculturalheritage

Procedia PDF Downloads 162
2480 The Impact of Human Rights on Society and Legislations

Authors: Eid Nasr Saad Nasr

Abstract:

Although human rights protection in the industrial sector has increased, human rights violations continue to occur. Although the government has passed human rights laws, labor laws, and an international treaty ratified by the United States, human rights crimes continue to occur and go undetected. The growing number of textile companies in Bekasi is also leading to an increase in human rights violations as the government has no obligation to protect them. The United States government and business leaders should respect, protect and defend the human rights of workers. The article discusses the human rights violations faced by garment factory workers in the context of the law, as well as ideas for improving the protection of workers' rights. The connection between development and human rights has long been the subject of academic debate. Therefore, to understand the dynamics between these two concepts, a number of principles have been adopted, ranging from the right to development to a human rights-based approach to development. Despite these attempts, the precise connection between development and human rights is not yet fully understood. However, the inherent interdependence between these two concepts and the idea that development efforts must respect human rights guarantees has gained momentum in recent years. It will then be examined whether the right to sustainable development is recognized.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security

Procedia PDF Downloads 52
2479 A Study on ESD Protection Circuit Applying Silicon Controlled Rectifier-Based Stack Technology with High Holding Voltage

Authors: Hee-Guk Chae, Bo-Bae Song, Kyoung-Il Do, Jeong-Yun Seo, Yong-Seo Koo

Abstract:

In this study, an improved Electrostatic Discharge (ESD) protection circuit with low trigger voltage and high holding voltage is proposed. ESD has become a serious problem in the semiconductor process because the semiconductor density has become very high these days. Therefore, much research has been done to prevent ESD. The proposed circuit is a stacked structure of the new unit structure combined by the Zener Triggering (SCR ZTSCR) and the High Holding Voltage SCR (HHVSCR). The simulation results show that the proposed circuit has low trigger voltage and high holding voltage. And the stack technology is applied to adjust the various operating voltage. As the results, the holding voltage is 7.7 V for 2-stack and 10.7 V for 3-stack.

Keywords: ESD, SCR, latch-up, power clamp, holding voltage

Procedia PDF Downloads 540
2478 Use of Protection Motivation Theory to Assess Preventive Behaviors of COVID-19

Authors: Maryam Khazaee-Pool, Tahereh Pashaei, Koen Ponnet

Abstract:

Background: The global prevalence and morbidity of Coronavirus disease 2019 (COVID-19) are high. Preventive behaviors are proven to reduce the damage caused by the disease. There is a paucity of information on determinants of preventive behaviors in response to COVID-19 in Mazandaran province, north of Iran. So, we aimed to evaluate the protection motivation theory (PMT) in promoting preventive behaviors of COVID-19 in Mazandaran province. Materials and Methods: In this descriptive cross-sectional study, 1220 individuals participated. They were selected via social networks using convenience sampling in 2020. Data were collected online using a demographic questionnaire and a valid and reliable scale based on PMT. Data analysis was done using the Pearson correlation coefficient and linear regression in SPSS V24. Result: The mean age of the participants was 39.34±8.74 years. The regression model showed perceived threat (ß =0.033, P =0.007), perceived costs (ß=0.039, P=0.045), perceived self-efficacy (ß =0.116, P>0.001), and perceived fear (ß=0.131, P>0.001) as the significant predictors of COVID-19 preventive behaviors. This model accounted for 78% of the variance in these behaviors. Conclusion: According to constructs of the PMT associated with protection against COVID-19, educational programs and health promotion based on the theory and benefiting from social networks could be helpful in increasing the motivation of people towards protective behaviors against COVID-19.

Keywords: questionnaire development, validation, intention, prevention, covid-19

Procedia PDF Downloads 35
2477 Alternative (In)Security: Using Photovoice Research Methodology to Explore Refugee Anxieties in Lebanon

Authors: Jessy Abouarab

Abstract:

For more than half a century, international norms related to refugee security and protection have proliferated, yet their role in alleviating war’s negative impacts on human life remains limited. The impact of refugee-security processes often manifests asymmetrically within populations. Many issues and people get silenced due to narrow security policies that focus either on abstract threat containment and refugee control or refugee protection and humanitarian aid. (In)security practices are gendered and experienced. Examining the case study of Syrian refugees in Lebanon, this study explores the gendered impact of refugee security mechanisms on local realities. A transnational feminist approach will be used to position this research in relation to existing studies in the field of security and the refugee-protection regime, highlighting the social, cultural, legal, and political barriers to gender equality in the areas of violence, rights, and social inclusion. Through Photovoice methodology, the Syrian refugees’ (in)securities in Lebanon were given visibility by enabling local volunteers to record and reflect their realities through pictures, at the same time voice the participants’ anxieties and recommendations to reach normative policy change. This Participatory Action Research approach helped participants observe the structural barriers and lack of culturally inclusive refugee services that hinder security, increase discrimination, stigma, and poverty. The findings have implications for a shift of the refugee protection mechanisms to a community-based approach in ways that extend beyond narrow security policies that hinder women empowerment and raise vulnerabilities such as gendered exploitation, abuse, and neglect.

Keywords: gender, (in)security, Lebanon, refugee, Syrian refugees, women

Procedia PDF Downloads 136
2476 Storage Tank Overfill Protection in Compliance with Functional Safety Standard: IEC 61511

Authors: Hassan Alsada

Abstract:

Tank overfill accidents are major concerns for industries handling large volumes of hydrocarbons. Buncefield, Jaipur, Puerto Rico, and West Virginia are just a few accidents with catastrophic consequences. Thus, it is very important for any industry to take the right safety measures for overfill prevention. Moreover, one of the main causative factors in the overfill accidents was inadequate risk analysis and, subsequently, inadequate design. This study aims to provide a full assessment in accordance with the Functional safety standard: “IEC 615 11 – Safety instrumented systems for the process industry” to the tank overfill scenario according to the standard’s Safety Life Cycle (SLC), which includes: the analysis phase, the implementation phase, and the operation phase. The paper discusses in depth the tank overfills Independent Protection Layers (IPLs) with systematic analysis to avoid the safety risks of under-design and the financial risk of facility overdesign. The result shows a clear and systematic assessment in compliance with the standards that can help to assist existing tank overfilling setup or a guide to support designing new storage facilities overfill protection.

Keywords: IEC 61511, PHA, LOPA, process safety, safety, health, environment, safety instrumented systems, safety instrumented function, functional safety, safety life cycle

Procedia PDF Downloads 82
2475 The Urban Expansion Characterization of the Bir El Djir Municipality using Remote Sensing and GIS

Authors: Fatima Achouri, Zakaria Smahi

Abstract:

Bir El Djir is an important coastal township in Oran department, located at 450 Km far away from Algiers on northwest of Algeria. In this coastal area, the urban sprawl is one of the main problems that reduce the limited highly fertile land. So, using the remote sensing and GIS technologies have shown their great capabilities to solve many earth resources issues. The aim of this study is to produce land use and cover map for the studied area at varied periods to monitor possible changes that may occurred, particularly in the urban areas and subsequently predict likely changes. For this, two spatial images SPOT and Landsat satellites from 1987 and 2014 respectively were used to assess the changes of urban expansion and encroachment during this period with photo-interpretation and GIS approach. The results revealed that the town of Bir El Djir has shown a highest growth rate in the period 1987-2014 which is 521.1 hectares in terms of area. These expansions largely concern the new real estate constructions falling within the social and promotional housing programs launched by the government. Indeed, during the last census period (1998 -2008), the population of this town has almost doubled from 73 029 to 152 151 inhabitants with an average annual growth of 5.2%. This also significant population growth is causing an accelerated urban expansion of the periphery which causing its conurbation with the towns of Oran in the West side. The most urban expansion is characterized by the new construction in the form of spontaneous or peripheral precarious habitat, but also unstructured slums settled especially in the southeastern part of town.

Keywords: urban expansion, remote sensing, photo-interpretation, spatial dynamics

Procedia PDF Downloads 265
2474 Identification of Suitable Sites for Rainwater Harvesting in Salt Water Intruded Area by Using Geospatial Techniques in Jafrabad, Amreli District, India

Authors: Pandurang Balwant, Ashutosh Mishra, Jyothi V., Abhay Soni, Padmakar C., Rafat Quamar, Ramesh J.

Abstract:

The sea water intrusion in the coastal aquifers has become one of the major environmental concerns. Although, it is a natural phenomenon but, it can be induced with anthropogenic activities like excessive exploitation of groundwater, seacoast mining, etc. The geological and hydrogeological conditions including groundwater heads and groundwater pumping pattern in the coastal areas also influence the magnitude of seawater intrusion. However, this problem can be remediated by taking some preventive measures like rainwater harvesting and artificial recharge. The present study is an attempt to identify suitable sites for rainwater harvesting in salt intrusion affected area near coastal aquifer of Jafrabad town, Amreli district, Gujrat, India. The physico-chemical water quality results show that out of 25 groundwater samples collected from the study area most of samples were found to contain high concentration of Total Dissolved Solids (TDS) with major fractions of Na and Cl ions. The Cl/HCO3 ratio was also found greater than 1 which indicates the salt water contamination in the study area. The geophysical survey was conducted at nine sites within the study area to explore the extent of contamination of sea water. From the inverted resistivity sections, low resistivity zone (<3 Ohm m) associated with seawater contamination were demarcated in North block pit and south block pit of NCJW mines, Mitiyala village Lotpur and Lunsapur village at the depth of 33 m, 12 m, 40 m, 37 m, 24 m respectively. Geospatial techniques in combination of Analytical Hierarchy Process (AHP) considering hydrogeological factors, geographical features, drainage pattern, water quality and geophysical results for the study area were exploited to identify potential zones for the Rainwater Harvesting. Rainwater harvesting suitability model was developed in ArcGIS 10.1 software and Rainwater harvesting suitability map for the study area was generated. AHP in combination of the weighted overlay analysis is an appropriate method to identify rainwater harvesting potential zones. The suitability map can be further utilized as a guidance map for the development of rainwater harvesting infrastructures in the study area for either artificial groundwater recharge facilities or for direct use of harvested rainwater.

Keywords: analytical hierarchy process, groundwater quality, rainwater harvesting, seawater intrusion

Procedia PDF Downloads 166
2473 Analyzing the Effectiveness of a Bank of Parallel Resistors, as a Burden Compensation Technique for Current Transformer's Burden, Using LabVIEW™ Data Acquisition Tool

Authors: Dilson Subedi

Abstract:

Current transformers are an integral part of power system because it provides a proportional safe amount of current for protection and measurement applications. However, due to upgradation of electromechanical relays to numerical relays and electromechanical energy meters to digital meters, the connected burden, which defines some of the CT characteristics, has drastically reduced. This has led to the system experiencing high currents damaging the connected relays and meters. Since the protection and metering equipment's are designed to withstand only certain amount of current with respect to time, these high currents pose a risk to man and equipment. Therefore, during such instances, the CT saturation characteristics have a huge influence on the safety of both man and equipment and on the reliability of the protection and metering system. This paper shows the effectiveness of a bank of parallel connected resistors, as a burden compensation technique, in compensating the burden of under-burdened CT’s. The response of the CT in the case of failure of one or more resistors at different levels of overcurrent will be captured using the LabVIEWTM data acquisition hardware (DAQ). The analysis is done on the real-time data gathered using LabVIEWTM. Variation of current transformer saturation characteristics with changes in burden will be discussed.

Keywords: accuracy limiting factor, burden, burden compensation, current transformer

Procedia PDF Downloads 242
2472 The Effect of Artificial Intelligence on Human Rights Regulations

Authors: Karam Aziz Hamdy Fahmy

Abstract:

Although human rights protection in the industrial sector has increased, human rights violations continue to occur. Although the government has passed human rights laws, labor laws, and an international treaty ratified by the United States, human rights crimes continue to occur and go undetected. The growing number of textile companies in Bekasi is also leading to an increase in human rights violations as the government has no obligation to protect them. The United States government and business leaders should respect, protect and defend the human rights of workers. The article discusses the human rights violations faced by garment factory workers in the context of the law, as well as ideas for improving the protection of workers' rights. The connection between development and human rights has long been the subject of academic debate. Therefore, to understand the dynamics between these two concepts, a number of principles have been adopted, ranging from the right to development to a human rights-based approach to development. Despite these attempts, the precise connection between development and human rights is not yet fully understood. However, the inherent interdependence between these two concepts and the idea that development efforts must respect human rights guarantees has gained momentum in recent years. It will then be examined whether the right to sustainable development is recognized.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security

Procedia PDF Downloads 58
2471 Protection of Stakeholders under the Transitional Commercial Code of Eritrea: Comparative Analysis with the 2018 Company Law of Peoples Republic of China

Authors: Hayle Makda Gebru

Abstract:

Companies are inevitable for society. They are the building blocks of every development in a country aimed at producing continuous goods and services for the people and, in turn, obliged to pay taxes, which enhances the economy of the nation. For the proper functioning of companies, their relationship with their stakeholders must be secure. The major stakeholders are suppliers, consumers, employees, creditors, etc. The law plays an important role in enhancing the relationship between these different stakeholders. If the law fails to keep track of the relationship, both the company and stakeholders remain unprotected. As a result, the potential benefits are prejudiced. This paper makes a comparative analysis of the types and formation of companies under the Transitional Commercial Code of Eritrea and the Company Law of the Peoples Republic of China. In particular, the paper addresses the legal lacuna under the TCrCE on handling the failure of shareholders to pay the promised capital. So, the methodology of the study is entirely analyzing the two countries' laws using practical cases. After analyzing the practical problems on the ground using real cases, this paper calls on Eritrea to update its outdated Commercial Code to give proper protection to the stakeholders.

Keywords: companies, company law of the People's Republic of China, transitional commercial code of Eritrea, protection of stakeholders, failure to pay the promised capital

Procedia PDF Downloads 62
2470 The Quantitative Analysis of the Traditional Rural Settlement Plane Boundary

Authors: Yifan Dong, Xincheng Pu

Abstract:

Rural settlements originate from the accumulation of residential building elements, and their agglomeration forms the settlement pattern and defines the relationship between the settlement and the inside and outside. The settlement boundary is an important part of the settlement pattern. Compared with the simplification of the urban settlement boundary, the settlement of the country is more complex, fuzzy and uncertain, and then presents a rich and diverse boundary morphological phenomenon. In this paper, China traditional rural settlements plane boundary as the research object, using fractal theory and fractal dimension method, quantitative analysis of planar shape boundary settlement, and expounds the research for the architectural design, ancient architecture protection and renewal and development and the significance of the protection of settlements.

Keywords: rural settlement, border, fractal, quantification

Procedia PDF Downloads 243
2469 A Boundary-Fitted Nested Grid Model for Modeling Tsunami Propagation of 2004 Indonesian Tsunami along Southern Thailand

Authors: Fazlul Karim, Esa Al-Islam

Abstract:

Many problems in oceanography and environmental sciences require the solution of shallow water equations on physical domains having curvilinear coastlines and abrupt changes of ocean depth near the shore. Finite-difference technique for the shallow water equations representing the boundary as stair step may give inaccurate results near the coastline where results are of greatest interest for various applications. This suggests the use of methods which are capable of incorporating the irregular boundary in coastal belts. At the same time, large velocity gradient is expected near the beach and islands as water depth vary abruptly near the coast. A nested numerical scheme with fine resolution is the best resort to enhance the numerical accuracy with the least grid numbers for the region of interests where the velocity changes rapidly and which is unnecessary for the away of the region. This paper describes the development of a boundary fitted nested grid (BFNG) model to compute tsunami propagation of 2004 Indonesian tsunami in Southern Thailand coastal waters. In this paper, we develop a numerical model employing the shallow water nested model and an orthogonal boundary fitted grid to investigate the tsunami impact on the Southern Thailand due to the Indonesian tsunami of 2004. Comparisons of water surface elevation obtained from numerical simulations and field measurements are made.

Keywords: Indonesian tsunami of 2004, Boundary-fitted nested grid model, Southern Thailand, finite difference method

Procedia PDF Downloads 437
2468 Regeneration of a Liquid Desiccant Using Membrane Distillation to Unlock Coastal Desert Agriculture Potential

Authors: Kimberly J. Cribbs, Ryan M. Lefers, TorOve Leiknes, Noreddine Ghaffour

Abstract:

In Gulf Cooperation Council (GCC) countries, domestic agriculture is hindered by a lack of freshwater, poor soil quality, and ambient temperatures unsuitable for cultivation resulting in a heavy reliance on imported food. Attempts to minimize the risk of food insecurity by growing crops domestically creates a significant demand on limited freshwater resources in this region. Cultivating food in a greenhouse allows some of these challenges, such as poor soil quality and temperatures unsuitable for cultivation, to be overcome. One of the most common methods for greenhouse cooling is evaporative cooling. This method cools the air by the evaporation of water and requires a large amount of water relative to that needed for plant growth and air with a low relative humidity. Considering that much of the population in GCC countries live within 100 km of a coast and that sea water can be utilized for evaporative cooling, coastal agriculture could reduce the risk of food insecurity and water demand. Unfortunately, coastal regions tend to experience both high temperatures and high relative humidity causing evaporative cooling by itself to be inadequate. Therefore, dehumidification is needed prior to utilizing evaporative cooling. Utilizing a liquid desiccant for air dehumidification is promising, but the desiccant regeneration to retain its dehumidification potential remains a significant obstacle for the adoption of this technology. This project studied the regeneration of a magnesium chloride (MgCl₂) desiccant solution from 20wt% to 30wt% by direct contact membrane distillation (DCMD) and explored the possibility of using the recovered water for irrigation. Two 0.2 µm hydrophobic PTFE membranes were tested at feed temperatures of 80, 70, and 60°C and with a permeate temperature of 20°C. It was observed that the permeate flux increases as the difference between the feed and coolant temperature increases and also as the feed concentration decreases. At 21wt% the permeate flux was 34,17, and 14 L m⁻² h⁻¹ for feed temperatures of 80, 70, and 60°C, respectively. Salt rejection decreased overtime; however, it remained greater than 99.9% over an experimental time span of 10 hours. The results show that DCMD can successfully regenerate the magnesium chloride desiccant solution.

Keywords: agriculture, direct contact membrane distillation, GCC countries, liquid desiccant, water recovery

Procedia PDF Downloads 143
2467 Survivable IP over WDM Network Design Based on 1 ⊕ 1 Network Coding

Authors: Nihed Bahria El Asghar, Imen Jouili, Mounir Frikha

Abstract:

Inter-datacenter transport network is very bandwidth and delay demanding. The data transferred over such a network is also highly QoS-exigent mostly because a huge volume of data should be transported transparently with regard to the application user. To avoid the data transfer failure, a backup path should be reserved. No re-routing delay should be observed. A dedicated 1+1 protection is however not applicable in inter-datacenter transport network because of the huge spare capacity. In this context, we propose a survivable virtual network with minimal backup based on network coding (1 ⊕ 1) and solve it using a modified Dijkstra-based heuristic.

Keywords: network coding, dedicated protection, spare capacity, inter-datacenters transport network

Procedia PDF Downloads 439
2466 The Right to Data Portability and Its Influence on the Development of Digital Services

Authors: Roman Bieda

Abstract:

The General Data Protection Regulation (GDPR) will come into force on 25 May 2018 which will create a new legal framework for the protection of personal data in the European Union. Article 20 of GDPR introduces a right to data portability. This right allows for data subjects to receive the personal data which they have provided to a data controller, in a structured, commonly used and machine-readable format, and to transmit this data to another data controller. The right to data portability, by facilitating transferring personal data between IT environments (e.g.: applications), will also facilitate changing the provider of services (e.g. changing a bank or a cloud computing service provider). Therefore, it will contribute to the development of competition and the digital market. The aim of this paper is to discuss the right to data portability and its influence on the development of new digital services.

Keywords: data portability, digital market, GDPR, personal data

Procedia PDF Downloads 468
2465 Japanese and Europe Legal Frameworks on Data Protection and Cybersecurity: Asymmetries from a Comparative Perspective

Authors: S. Fantin

Abstract:

This study is the result of the legal research on cybersecurity and data protection within the EUNITY (Cybersecurity and Privacy Dialogue between Europe and Japan) project, aimed at fostering the dialogue between the European Union and Japan. Based on the research undertaken therein, the author offers an outline of the main asymmetries in the laws governing such fields in the two regions. The research is a comparative analysis of the two legal frameworks, taking into account specific provisions, ratio legis and policy initiatives. Recent doctrine was taken into account, too, as well as empirical interviews with EU and Japanese stakeholders and project partners. With respect to the protection of personal data, the European Union has recently reformed its legal framework with a package which includes a regulation (General Data Protection Regulation), and a directive (Directive 680 on personal data processing in the law enforcement domain). In turn, the Japanese law under scrutiny for this study has been the Act on Protection of Personal Information. Based on a comparative analysis, some asymmetries arise. The main ones refer to the definition of personal information and the scope of the two frameworks. Furthermore, the rights of the data subjects are differently articulated in the two regions, while the nature of sanctions take two opposite approaches. Regarding the cybersecurity framework, the situation looks similarly misaligned. Japan’s main text of reference is the Basic Cybersecurity Act, while the European Union has a more fragmented legal structure (to name a few, Network and Information Security Directive, Critical Infrastructure Directive and Directive on the Attacks at Information Systems). On an relevant note, unlike a more industry-oriented European approach, the concept of cyber hygiene seems to be neatly embedded in the Japanese legal framework, with a number of provisions that alleviate operators’ liability by turning such a burden into a set of recommendations to be primarily observed by citizens. With respect to the reasons to fill such normative gaps, these are mostly grounded on three basis. Firstly, the cross-border nature of cybercrime brings to consider both magnitude of the issue and its regulatory stance globally. Secondly, empirical findings from the EUNITY project showed how recent data breaches and cyber-attacks had shared implications between Europe and Japan. Thirdly, the geopolitical context is currently going through the direction of bringing the two regions to significant agreements from a trade standpoint, but also from a data protection perspective (with an imminent signature by both parts of a so-called ‘Adequacy Decision’). The research conducted in this study reveals two asymmetric legal frameworks on cyber security and data protection. With a view to the future challenges presented by the strengthening of the collaboration between the two regions and the trans-national fashion of cybercrime, it is urged that solutions are found to fill in such gaps, in order to allow European Union and Japan to wisely increment their partnership.

Keywords: cybersecurity, data protection, European Union, Japan

Procedia PDF Downloads 118
2464 Radiation Protection and Licensing for an Experimental Fusion Facility: The Italian and European Approaches

Authors: S. Sandri, G. M. Contessa, C. Poggi

Abstract:

An experimental nuclear fusion device could be seen as a step toward the development of the future nuclear fusion power plant. If compared with other possible solutions to the energy problem, nuclear fusion has advantages that ensure sustainability and security. In particular considering the radioactivity and the radioactive waste produced, in a nuclear fusion plant the component materials could be selected in order to limit the decay period, making it possible the recycling in a new reactor after about 100 years from the beginning of the decommissioning. To achieve this and other pertinent goals many experimental machines have been developed and operated worldwide in the last decades, underlining that radiation protection and workers exposure are critical aspects of these facilities due to the high flux, high energy neutrons produced in the fusion reactions. Direct radiation, material activation, tritium diffusion and other related issues pose a real challenge to the demonstration that these devices are safer than the nuclear fission facilities. In Italy, a limited number of fusion facilities have been constructed and operated since 30 years ago, mainly at the ENEA Frascati Center, and the radiation protection approach, addressed by the national licensing requirements, shows that it is not always easy to respect the constraints for the workers' exposure to ionizing radiation. In the current analysis, the main radiation protection issues encountered in the Italian Fusion facilities are considered and discussed, and the technical and legal requirements are described. The licensing process for these kinds of devices is outlined and compared with that of other European countries. The following aspects are considered throughout the current study: i) description of the installation, plant and systems, ii) suitability of the area, buildings, and structures, iii) radioprotection structures and organization, iv) exposure of personnel, v) accident analysis and relevant radiological consequences, vi) radioactive wastes assessment and management. In conclusion, the analysis points out the needing of a special attention to the radiological exposure of the workers in order to demonstrate at least the same level of safety as that reached at the nuclear fission facilities.

Keywords: fusion facilities, high energy neutrons, licensing process, radiation protection

Procedia PDF Downloads 349
2463 The Targeting Logic of Terrorist Groups in the Sahel

Authors: Mathieu Bere

Abstract:

Al-Qaeda and Islamic State-affiliated groups such as Ja’amat Nusra al Islam Wal Muslimim (JNIM) and the Islamic State-Greater Sahara Faction, which is now part of the Boko Haram splinter group, Islamic State in West Africa, were responsible, between 2018 and 2020, for at least 1.333 violent incidents against both military and civilian targets, including the assassination and kidnapping for ransom of Western citizens in Mali, Burkina Faso and Niger, the Central Sahel. Protecting civilians from the terrorist violence that is now spreading from the Sahel to the coastal countries of West Africa has been very challenging, mainly because of the many unknowns that surround the perpetrators. To contribute to a better protection of civilians in the region, this paper aims to shed light on the motivations and targeting logic of jihadist perpetrators of terrorist violence against civilians in the central Sahel region. To that end, it draws on relevant secondary data retrieved from datasets, the media, and the existing literature, but also on primary data collected through interviews and surveys in Burkina Faso. An analysis of the data with the support of qualitative and statistical analysis software shows that military and rational strategic motives, more than purely ideological or religious motives, have been the main drivers of terrorist violence that strategically targeted government symbols and representatives as well as local leaders in the central Sahel. Behind this targeting logic, the jihadist grand strategy emerges: wiping out the Western-inspired legal, education and governance system in order to replace it with an Islamic, sharia-based political, legal, and educational system.

Keywords: terrorism, jihadism, Sahel, targeting logic

Procedia PDF Downloads 81
2462 Recent Developments and Expectations in the Legal Expenses Insurance in Turkey

Authors: İbrahim Arslan, Mücahit Ünal

Abstract:

An important issue to ensure justice is to simplify the right to seek justice. But there is a cost of seeking justice in civil law. It costs at least, attorneys' fees and judicial expenses during the beginning and in case of losing a trial. Indeed, most of the people refrain from seeking justice because of these expenses. Therefore, it is not inappropriate to say that the removal of obstacles staying on the way of seeking justice will increase the belief in justice. Legal expenses insurance is a private law contract of insurance in which the insurer is obliged to pay premiums of the insured, to provide the necessary services for the protection of legal interests of the insured person within the agreed scope. This type of insurance is being practiced in the Western world for a long time. The special rights, duties and obligations of the parties to a legal expenses insurance contract shall be governed by the Turkish Commercial Code (TCC) and the contractual agreements which are regularly closed in the form of general terms and conditions. If the number of the legal expenses insurance contracts concluded increase this will definitely improve the percentage of seeking justice before the courts. The general terms and conditions applicable in Turkey generally include litigation costs, referee fees, guarantee fund , enforcement costs , appeal costs borne decision corrections costs. In addition, besides the insured, other family members or the people specified in the policy are protected in the scope of personal/family legal expenses insurance. The commercial law disputes fall outside the scope of coverage in this insurance branch. The insured person chooses his own lawyer and the insurer is not allowed to give advice during the selection of a lawyer. In April 2015, the Prime Minister announced of a new era in the field of legal expenses insurance in Turkey and this announcement excited the insurance industry and legal community.

Keywords: insurance, in the Turkish law on legal protection insurance, legal protection insurance, legal protection

Procedia PDF Downloads 354
2461 Improving Recovery Reuse and Irrigation Scheme Efficiency – North Gaza Emergency Sewage Treatment Project as Case Study

Authors: Yaser S. Kishawi, Sadi R. Ali

Abstract:

Part of Palestine, Gaza Strip (365 km2 and 1.8 million inhabitants) is considered a semi-arid zone relies solely on the Coastal Aquifer. The coastal aquifer is only source of water with only 5-10% suitable for human use. This barely cover the domestic and agricultural needs of Gaza Strip. Palestinian Water Authority Strategy is finding non-conventional water resource from treated wastewater to cover agricultural requirements and serve the population. A new WWTP project is to replace the old-overloaded Biet Lahia WWTP. The project consists of three parts; phase A (pressure line & infiltration basins - IBs), phase B (a new WWTP) and phase C (Recovery and Reuse Scheme – RRS – to capture the spreading plume). Currently, only phase A is functioning. Nearly 23 Mm3 of partially treated wastewater were infiltrated into the aquifer. Phase B and phase C witnessed many delays and this forced a reassessment of the RRS original design. An Environmental Management Plan was conducted from Jul 2013 to Jun 2014 on 13 existing monitoring wells surrounding the project location. This is to measure the efficiency of the SAT system and the spread of the contamination plume with relation to the efficiency of the proposed RRS. Along with the proposed location of the 27 recovery wells as part of the proposed RRS. The results of monitored wells were assessed compared with PWA baseline data. This was put into a groundwater model to simulate the plume to propose the best suitable solution to the delays. The redesign mainly manipulated the pumping rate of wells, proposed locations and functioning schedules (including wells groupings). The proposed simulations were examined using visual MODFLOW V4.2 to simulate the results. The results of monitored wells were assessed based on the location of the monitoring wells related to the proposed recovery wells locations (200m, 500m and 750m away from the IBs). Near the 500m line (the first row of proposed recovery wells), an increase of nitrate (from 30 to 70mg/L) compare to a decrease in Chloride (1500 to below 900mg/L) was found during the monitoring period which indicated an expansion of plume to this distance. On this rate with the required time to construct the recovery scheme, keeping the original design the RRS will fail to capture the plume. Based on that many simulations were conducted leading into three main scenarios. The scenarios manipulated the starting dates, the pumping rate and the locations of recovery wells. A simulation of plume expansion and path-lines were extracted from the model monitoring how to prevent the expansion towards the nearby municipal wells. It was concluded that the location is the most important factor in determining the RRS efficiency. Scenario III was adopted and showed an effective results even with a reduced pumping rates. This scenario proposed adding two additional recovery wells in a location beyond the 750m line to compensate the delays and effectively capture the plume. A continuous monitoring program for current and future monitoring wells should be in place to support the proposed scenario and ensure maximum protection.

Keywords: soil aquifer treatment, recovery and reuse scheme, infiltration basins, north gaza

Procedia PDF Downloads 308
2460 Surface Elevation Dynamics Assessment Using Digital Elevation Models, Light Detection and Ranging, GPS and Geospatial Information Science Analysis: Ecosystem Modelling Approach

Authors: Ali K. M. Al-Nasrawi, Uday A. Al-Hamdany, Sarah M. Hamylton, Brian G. Jones, Yasir M. Alyazichi

Abstract:

Surface elevation dynamics have always responded to disturbance regimes. Creating Digital Elevation Models (DEMs) to detect surface dynamics has led to the development of several methods, devices and data clouds. DEMs can provide accurate and quick results with cost efficiency, in comparison to the inherited geomatics survey techniques. Nowadays, remote sensing datasets have become a primary source to create DEMs, including LiDAR point clouds with GIS analytic tools. However, these data need to be tested for error detection and correction. This paper evaluates various DEMs from different data sources over time for Apple Orchard Island, a coastal site in southeastern Australia, in order to detect surface dynamics. Subsequently, 30 chosen locations were examined in the field to test the error of the DEMs surface detection using high resolution global positioning systems (GPSs). Results show significant surface elevation changes on Apple Orchard Island. Accretion occurred on most of the island while surface elevation loss due to erosion is limited to the northern and southern parts. Concurrently, the projected differential correction and validation method aimed to identify errors in the dataset. The resultant DEMs demonstrated a small error ratio (≤ 3%) from the gathered datasets when compared with the fieldwork survey using RTK-GPS. As modern modelling approaches need to become more effective and accurate, applying several tools to create different DEMs on a multi-temporal scale would allow easy predictions in time-cost-frames with more comprehensive coverage and greater accuracy. With a DEM technique for the eco-geomorphic context, such insights about the ecosystem dynamic detection, at such a coastal intertidal system, would be valuable to assess the accuracy of the predicted eco-geomorphic risk for the conservation management sustainability. Demonstrating this framework to evaluate the historical and current anthropogenic and environmental stressors on coastal surface elevation dynamism could be profitably applied worldwide.

Keywords: DEMs, eco-geomorphic-dynamic processes, geospatial Information Science, remote sensing, surface elevation changes,

Procedia PDF Downloads 265
2459 The Architectural Conservation and Restoration Problems of Istanbul’s “Yalı” Waterfront Mansions

Authors: Zeynep Tanrıverdi

Abstract:

The Bosphorus is an international waterway in Istanbul city of Turkey connecting the Sea of Marmara and the Black Sea. The Bosphorus, which has formed an important part of the silhouette of Istanbul throughout history, has also influenced the design of the coastal structures built around it. The waterfront mansions, which are located on both sides of the Bosphorus by the sea, and can be generally of two or three storeys, are called “yalı”. The yalı buildings with their architectural characteristics of the traditional Turkish House are the most grandiose examples of Ottoman residential architecture. However, the classical Ottoman yalı architecture of the 18th century can only be seen in engravings, and today only the modest and smaller yalı examples from the 19th century can be seen because of their disappearance over time. The study aims to reveal the architectural conservation and restoration problems of waterfront mansions and propose solutions for them. Firstly, the development of the waterfront mansion architecture in Bosphorus was evaluated in its historical process. Secondly, the waterfront mansions and their architectural features were explained. Thirdly, the architectural conservation and restoration problems that caused the disappearance of waterfront mansions were discussed. These problems include disruptions in legal regulations and practices about the Bosphorus, dramatic changes in Turkey’s socio-cultural life from the Ottoman Empire to the present, inadequacies in economic resources, negative environmental effects, and errors in restoration works. Finally, solution suggestions were proposed for the problems that threaten the protection of waterfront mansions. In the study, literature on waterfront mansions was reviewed using historical reports, photographs, maps, and drawings in archival documents. It is hoped that this study will contribute the conservation of the “Yalı” waterfront mansions, which occupy a particular role in the cultural heritage of Turkey, and to their transmission with their authentic values to the next generation.

Keywords: bosphorus architecture, conservation, heritage, Istanbul, waterfront mansions (yalı)

Procedia PDF Downloads 69
2458 Jurisdictional Issues in E-Commerce Law after the 'Recast Brussels Regulation'

Authors: Seyedeh Sajedeh Salehi

Abstract:

The Regulation No. 1215/2012/EC also known as the Brussels I Regulation (Recast) deals with jurisdictional disputes in civil and commercial matters. The main aim of the Recast (as in-line with its predecessor Regulation) is to bring a reform in procuring more simplified and faster circulation of civil and commercial judgments within the EU. Hence it is significant to take a closer look at the function of this regulatory tool. Therefore, the main objective of this paper is to analyze a clear understanding of the post-Recast situation on e-commerce relevant jurisdictional matters. The e-consumer protection and the choice-of-court agreements along with the position of the Court of Justice of the European Union in its decisions within the Recast Regulation will be also taken into consideration throughout this paper.

Keywords: choice-of-court agreements, consumer protection, e-commerce, jurisdiction, Recast Brussels I Regulation

Procedia PDF Downloads 302
2457 Cultural Heritage Management and Tourism in Kosovo

Authors: Valon Shkodra

Abstract:

In our paper, we will give an overview of the cultural heritage and tourism in Kosovo. Kosovo has a history, culture, tradition and architecture that are different from those of other countries in the region, and each country has its own characteristics and peculiarities. In this paper, we will mainly present the situation of cultural heritage and its interpretation. The research is based on fieldwork and the aim of the research is to live the situation of cultural heritage and tourism. The reason why we chose this topic is that cultural heritage and tourism are now the most important industry developing many countries in the world. Besides the benefits that tourism brings, it also has an impact on the preservation, protection and promotion of culture in general. Kosovo, with its cultural diversity and very good geographical location, is also very well suited to develop these two areas as a bridge to each other. The cultural heritage holds traces from the earliest eras and shows a diversity of different civilizations that have just begun to be explored and presented.

Keywords: cultural heritage, economy, tourism, development, institutions, protection

Procedia PDF Downloads 210