Search results for: system protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 19287

Search results for: system protection

18777 Privacy Policy Prediction for Uploaded Image on Content Sharing Sites

Authors: Pallavi Mane, Nikita Mankar, Shraddha Mazire, Rasika Pashankar

Abstract:

Content sharing sites are very useful in sharing information and images. However, with the increasing demand of content sharing sites privacy and security concern have also increased. There is need to develop a tool for controlling user access to their shared content. Therefore, we are developing an Adaptive Privacy Policy Prediction (A3P) system which is helpful for users to create privacy settings for their images. We propose the two-level framework which assigns the best available privacy policy for the users images according to users available histories on the site.

Keywords: online information services, prediction, security and protection, web based services

Procedia PDF Downloads 358
18776 Evaluation and Proposal for Improvement of the Flow Measurement Equipment in the Bellavista Drinking Water System of the City of Azogues

Authors: David Quevedo, Diana Coronel

Abstract:

The present article carries out an evaluation of the drinking water system in the Bellavista sector of the city of Azogues, with the purpose of determining the appropriate equipment to record the actual consumption flows of the inhabitants in said sector. Taking into account that the study area is located in a rural and economically disadvantaged area, there is an urgent need to establish a control system for the consumption of drinking water in order to conserve and manage the vital resource in the best possible way, considering that the water source supplying this sector is approximately 9km away. The research began with the collection of cartographic, demographic, and statistical data of the sector, determining the coverage area, population projection, and a provision that guarantees the supply of drinking water to meet the water needs of the sector's inhabitants. By using hydraulic modeling through the United States Environmental Protection Agency Application for Modeling Drinking Water Distribution Systems EPANET 2.0 software, theoretical hydraulic data were obtained, which were used to design and justify the most suitable measuring equipment for the Bellavista drinking water system. Taking into account a minimum service life of the drinking water system of 30 years, future flow rates were calculated for the design of the macro-measuring device. After analyzing the network, it was evident that the Bellavista sector has an average consumption of 102.87 liters per person per day, but considering that Ecuadorian regulations recommend a provision of 180 liters per person per day for the geographical conditions of the sector, this value was used for the analysis. With all the collected and calculated information, the conclusion was reached that the Bellavista drinking water system needs to have a 125mm electromagnetic macro-measuring device for the first three quinquenniums of its service life and a 150mm diameter device for the following three quinquenniums. The importance of having equipment that provides real and reliable data will allow for the control of water consumption by the population of the sector, measured through micro-measuring devices installed at the entrance of each household, which should match the readings of the macro-measuring device placed after the water storage tank outlet, in order to control losses that may occur due to leaks in the drinking water system or illegal connections.

Keywords: macrometer, hydraulics, endowment, water

Procedia PDF Downloads 73
18775 Data Monetisation by E-commerce Companies: A Need for a Regulatory Framework in India

Authors: Anushtha Saxena

Abstract:

This paper examines the process of data monetisation bye-commerce companies operating in India. Data monetisation is collecting, storing, and analysing consumers’ data to use further the data that is generated for profits, revenue, etc. Data monetisation enables e-commerce companies to get better businesses opportunities, innovative products and services, a competitive edge over others to the consumers, and generate millions of revenues. This paper analyses the issues and challenges that are faced due to the process of data monetisation. Some of the issues highlighted in the paper pertain to the right to privacy, protection of data of e-commerce consumers. At the same time, data monetisation cannot be prohibited, but it can be regulated and monitored by stringent laws and regulations. The right to privacy isa fundamental right guaranteed to the citizens of India through Article 21 of The Constitution of India. The Supreme Court of India recognized the Right to Privacy as a fundamental right in the landmark judgment of Justice K.S. Puttaswamy (Retd) and Another v. Union of India . This paper highlights the legal issue of how e-commerce businesses violate individuals’ right to privacy by using the data collected, stored by them for economic gains and monetisation and protection of data. The researcher has mainly focused on e-commerce companies like online shopping websitesto analyse the legal issue of data monetisation. In the Internet of Things and the digital age, people have shifted to online shopping as it is convenient, easy, flexible, comfortable, time-consuming, etc. But at the same time, the e-commerce companies store the data of their consumers and use it by selling to the third party or generating more data from the data stored with them. This violatesindividuals’ right to privacy because the consumers do not know anything while giving their data online. Many times, data is collected without the consent of individuals also. Data can be structured, unstructured, etc., that is used by analytics to monetise. The Indian legislation like The Information Technology Act, 2000, etc., does not effectively protect the e-consumers concerning their data and how it is used by e-commerce businesses to monetise and generate revenues from that data. The paper also examines the draft Data Protection Bill, 2021, pending in the Parliament of India, and how this Bill can make a huge impact on data monetisation. This paper also aims to study the European Union General Data Protection Regulation and how this legislation can be helpful in the Indian scenarioconcerning e-commerce businesses with respect to data monetisation.

Keywords: data monetization, e-commerce companies, regulatory framework, GDPR

Procedia PDF Downloads 120
18774 Evolution of Floating Photovoltaic System Technology and Future Prospect

Authors: Young-Kwan Choi, Han-Sang Jeong

Abstract:

Floating photovoltaic system is a technology that combines photovoltaic power generation with floating structure. However, since floating technology has not been utilized in photovoltaic generation, there are no standardized criteria. It is separately developed and used by different installation bodies. This paper aims to discuss the change of floating photovoltaic system technology based on examples of floating photovoltaic systems installed in Korea.

Keywords: floating photovoltaic system, floating PV installation, ocean floating photovoltaic system, tracking type floating photovoltaic system

Procedia PDF Downloads 560
18773 Object Oriented Software Engineering Approach to Industrial Information System Design and Implementation

Authors: Issa Hussein Manita

Abstract:

This paper presents an example of industrial information system design and implementation (IIDC), the most common software engineering design steps that are applied to the different design stages. We are going through the life cycle of software system development. We start by a study of system requirement and end with testing and delivering system, going by system design and coding, program integration and system integration step. The most modern software design tools available used in the design this includes, but not limited to, Unified Modeling Language (UML), system modeling, SQL server side application, uses case analysis, design and testing as applied to information processing systems. The system is designed to perform tasks specified by the client with real data. By the end of the implementation of the system, default or user defined acceptance policy to provide an overall score as an indication of the system performance is used. To test the reliability of he designed system, it is tested in different environment and different work burden such as multi-user environment.

Keywords: software engineering, design, system requirement, integration, unified modeling language

Procedia PDF Downloads 570
18772 Smart Monitoring and Control of Tap Changer Using Intelligent Electronic Device

Authors: K. N. Dinesh Babu, M. V. Gopalan, G. R. Manjunatha, R. Ramaprabha, V. Rajini

Abstract:

In this paper, monitoring and control of tap changer mechanism of a transformer implementation in an intelligent electronic device (IED) is discussed. Its been a custom for decades to provide a separate panel for on load tap changer control for monitoring the tap position. However this facility cannot either record or transfer the information to remote control centers. As there is a technology shift towards the smart grid protection and control standards, the need for implementing remote control and monitoring has necessitated the implementation of this feature in numerical relays. This paper deals with the programming, settings and logic implementation which is applicable to both IEC 61850 compatible and non-compatible IEDs thereby eliminating the need for separate tap changer control equipment. The monitoring mechanism has been implemented in a 28MVA, 110 /6.9kV transformer with 16 tap position with GE make T60 IED at Ultratech cement limited Gulbarga, Karnataka and is in successful service.

Keywords: transformer protection, tap changer control, tap position monitoring, on load tap changer, intelligent electronic device (IED)

Procedia PDF Downloads 593
18771 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques

Authors: John Onyima, Ikechukwu Ezepue

Abstract:

Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.

Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection

Procedia PDF Downloads 305
18770 An Ensemble System of Classifiers for Computer-Aided Volcano Monitoring

Authors: Flavio Cannavo

Abstract:

Continuous evaluation of the status of potentially hazardous volcanos plays a key role for civil protection purposes. The importance of monitoring volcanic activity, especially for energetic paroxysms that usually come with tephra emissions, is crucial not only for exposures to the local population but also for airline traffic. Presently, real-time surveillance of most volcanoes worldwide is essentially delegated to one or more human experts in volcanology, who interpret data coming from different kind of monitoring networks. Unfavorably, the high nonlinearity of the complex and coupled volcanic dynamics leads to a large variety of different volcanic behaviors. Moreover, continuously measured parameters (e.g. seismic, deformation, infrasonic and geochemical signals) are often not able to fully explain the ongoing phenomenon, thus making the fast volcano state assessment a very puzzling task for the personnel on duty at the control rooms. With the aim of aiding the personnel on duty in volcano surveillance, here we introduce a system based on an ensemble of data-driven classifiers to infer automatically the ongoing volcano status from all the available different kind of measurements. The system consists of a heterogeneous set of independent classifiers, each one built with its own data and algorithm. Each classifier gives an output about the volcanic status. The ensemble technique allows weighting the single classifier output to combine all the classifications into a single status that maximizes the performance. We tested the model on the Mt. Etna (Italy) case study by considering a long record of multivariate data from 2011 to 2015 and cross-validated it. Results indicate that the proposed model is effective and of great power for decision-making purposes.

Keywords: Bayesian networks, expert system, mount Etna, volcano monitoring

Procedia PDF Downloads 246
18769 Progress of Legislation in Post-Colonial, Post-Communist and Socialist Countries for the Intellectual Property Protection of the Autonomous Output of Artificial Intelligence

Authors: Ammar Younas

Abstract:

This paper is an attempt to explore the legal progression in procedural laws related to “intellectual property protection for the autonomous output of artificial intelligence” in Post-Colonial, Post-Communist and Socialist Countries. An in-depth study of legal progression in Pakistan (Common Law), Uzbekistan (Post-Soviet Civil Law) and China (Socialist Law) has been conducted. A holistic attempt has been made to explore that how the ideological context of the legal systems can impact, not only on substantive components but on the procedural components of the formal laws related to IP Protection of autonomous output of Artificial Intelligence. Moreover, we have tried to shed a light on the prospective IP laws and AI Policy in the countries, which are planning to incorporate the concept of “Digital Personality” in their legal systems. This paper will also address the question: “How far IP of autonomous output of AI can be protected with the introduction of “Non-Human Legal Personality” in legislation?” By using the examples of China, Pakistan and Uzbekistan, a case has been built to highlight the legal progression in General Provisions of Civil Law, Artificial Intelligence Policy of the country and Intellectual Property laws. We have used a range of multi-disciplinary concepts and examined them on the bases of three criteria: accuracy of legal/philosophical presumption, applying to the real time situations and testing on rational falsification tests. It has been observed that the procedural laws are designed in a way that they can be seen correlating with the ideological contexts of these countries.

Keywords: intellectual property, artificial intelligence, digital personality, legal progression

Procedia PDF Downloads 118
18768 The Development of OTOP Web Application: Case of Samut Songkhram Province

Authors: Satien Janpla, Kunyanuth Kularbphettong

Abstract:

This paper aims to present the development of a web‑based system to serve the need of selling OTOP products in Samut Songkhram, Thailand. This system was designed to promote and sell OTOP products on website. We describe the design approaches and functional components of this system. The system was developed by PHP and JavaScript and MySQL database System. To evaluate the system performance, questionnaires were used to measure user satisfaction with system usability by specialists and users. The results were satisfactory as followed: Means for specialists and users were 4.05 and 3.97, and standard deviation for specialists and users were 0.563 and 0.644 respectively. Further analysis showed that the quality of One Tambon One Product (OTOP) Website was also at a good level as well.

Keywords: web-based system, OTOP, product, website

Procedia PDF Downloads 306
18767 Saudi Arabia Border Security Informatics: Challenges of a Harsh Environment

Authors: Syed Ahsan, Saleh Alshomrani, Ishtiaq Rasool, Ali Hassan

Abstract:

In this oral presentation, we will provide an overview of the technical and semantic architecture of a desert border security and critical infrastructure protection security system. Modern border security systems are designed to reduce the dependability and intrusion of human operators. To achieve this, different types of sensors are use along with video surveillance technologies. Application of these technologies in a harsh desert environment of Saudi Arabia poses unique challenges. Environmental and geographical factors including high temperatures, desert storms, temperature variations and remoteness adversely affect the reliability of surveillance systems. To successfully implement a reliable, effective system in a harsh desert environment, the following must be achieved: i) Selection of technology including sensors, video cameras, and communication infrastructure that suit desert environments. ii) Reduced power consumption and efficient usage of equipment to increase the battery life of the equipment. iii) A reliable and robust communication network with efficient usage of bandwidth. Also, to reduce the expert bottleneck, an ontology-based intelligent information systems needs to be developed. Domain knowledge unique and peculiar to Saudi Arabia needs to be formalized to develop an expert system that can detect abnormal activities and any intrusion.

Keywords: border security, sensors, abnormal activity detection, ontologies

Procedia PDF Downloads 481
18766 The Legal Framework for Solid Waste Disposal and Management in Kwara State, Nigeria

Authors: Alabi Odunayo Mayowa, Ajayi Oluwasola Felix

Abstract:

Solid waste such as “garbage” “trash” “refuse” “slug” and “rubbish” is disposed off or is required to be disposed off in accordance with national law. The study relies on primary and secondary sources of information. The primary sources include the Constitution, statutes and subsidiary legislation. The secondary sources of information include books, journals, conference proceedings, newspapers, magazines and internet materials. The information obtained from these sources is subjected to content and contextual analysis. The study examines the Kwara State Environmental Protection Agency Law, 1992 and other laws on waste disposal and management in Kwara State, Nigeria. The study also examines the regulations and the agency i.e. the Kwara State Environmental Protection Agency created by the law with a view to determine the inadequacies in the law.

Keywords: solid waste, waste disposal, waste management, domestic waste

Procedia PDF Downloads 474
18765 Resistance of African States Against the African Court on Human and People Rights (ACPHR)

Authors: Ayyoub Jamali

Abstract:

At the first glance, it seems that the African Court on Human and People’s Rights has achieved a tremendous development in the protection of human rights in Africa. Since its first judgement in 2009, the court has taken a robust approach/ assertive stance, showing its strength by finding states to be in violation of the Africana Charter and other human rights treaties. This paper seeks to discuss various challenges and resistance that the Court has faced since the adoption of the Founding Protocol to the Establishment of the African Court on Human and People’s Rights. The outcome of the paper casts shadow on the legitimacy and effectiveness of the African Court as the guarantor of human rights within the African continent.

Keywords: African Court on Human and People’s Rights, African Union, African regional human rights system, compliance

Procedia PDF Downloads 153
18764 Evaluation of an Organic Coating Applied on Algerian Oil Tanker in Sea water by EIS

Authors: Nadia Hammouda, Kamel Belmokre

Abstract:

Organic coatings are widely employed in the corrosion protection of most metal surfaces, particularly steel. They provide a barrier against corrosive species present in the environment, due to their high resistance to oxygen, water and ions transport. This study focuses on the evaluation of corrosion protection performance of epoxy paint on the carbon steel surface in sea water by Electrochemical Impedance Spectroscopy (EIS). The electrochemical behavior of painted surface was estimated by EIS parameters that contained paint film resistance, paint film capacitance and double layer capacitance. On the basis of calculation using EIS spectrums it was observed that pore resistance (Rpore) decreased with the appearance of doubled layer capacitance (Cdl) due to the electrolyte penetration through the film. This was further confirmed by the decrease of diffusion resistance (Rd) which was also the indicator of the deterioration of paint film protectiveness.

Keywords: epoxy paints, carbon steel, electrochemical impedance spectroscopy, corrosion mechanisms, seawater

Procedia PDF Downloads 417
18763 Synthesis and Properties of Nanosized Mixed Oxide Systems for Environmental Protection

Authors: I. Yordanova, H. Kolev, S. Todorova, Z. Cherkezova-Zheleva

Abstract:

Catalysis plays a key role in solving many environmental problems by establishing efficient catalytic systems for environmental protection and reducing emissions of greenhouse gases from industry. Volatile organic compounds are major air pollutants. There are several ways to dispose of emissions like - adsorption, condensation, absorption, bio-filtration, thermal, catalytic, plasma and ultraviolet oxidation. The catalytic oxidation has more advantages over other methods. For example - lower energy consumption; the concentration of the organic contaminant may be low or may vary within wide limits. Catalysts for complete oxidation of VOCs can be classified into three categories: noble metal, metal oxides or supported metal oxides and mixture of noble metals and metal oxides. Most of the catalysts for the complete catalytic oxidation are based on Pt, Pd, Rh or a combination thereof. The oxides of the transition metal are one of the alternatives to noble metal catalysts for these reactions. They are less active at low temperatures, but at higher - their activity is similar. The properties of the catalyst depend on the distribution of the active phase, the medium type of the pre-treatment, the interaction between the active phase and the support and the interaction between the active phase and the reaction medium. Supported mono-component Mn and bi-component Mn-Co systems are examined in present study. The samples are prepared using co-precipitation method. SiO2 (Aerosil) is used as a support. The studied samples were precipitated by NH4OH. The synthesized samples were characterized by XRD, XPS, TPR and tested in the catalytic reaction of complete oxidation of n-hexane, propane, methanol, ethanol and propanol.

Keywords: catalytic oxidation, Co-Mn oxide, oxidation of hydrocarbons and alcohols, environmental protection

Procedia PDF Downloads 386
18762 Means of Securing Graves in the Egyptian Kingdom Era

Authors: Haitham Nabil Zaghlol Hasan

Abstract:

This research aims to study the means of securing graves in the Egyptian kingdom era, and revolves around many basic ideas used by the ancient Egyptian to protect his graves from thieves, which included architectural characteristics, which gave it importance only others. The most important of which was the choice of the place of the grave, which chose a kohl place in the desert to protect the graves, which is the valley of kings, and whether the choice of that place had an impact in protecting the grave or not, in addition to other elements followed in the architectural planning, which was in the valley of kings. The multiplicity of the tomb, the construction of the well chamber to deceive the thieves by the end of the graves suddenly, the construction of the wells of the tombs, which contained the burial chamber at the bottom of the main well and the effect of all these factors on the graves, and this shows the importance of the graves to the ancient Egyptian and his belief in resurrection and immortality. The Egyptian resorted to the elements of protection and was a religious worker by The protector gods and special texts to protect the deceased from any danger to protect the tomb. As for the human factor of securing the tomb through human guards (police) and security teams based on the guard and the words indicating the protection and the guard teams and the teams of the majai. The most important developments that arose on the cemetery from Tamit entrance, corridors, chambers, burial chamber and coffin, and the use of sand to close the well after from one cemetery to another and from time to time where it was built in the late period inside the temple campus to be under the attention of the priests and their protection, as the study dealt with an analytical study For the means of securing graves in the Egyptian kingdom period.

Keywords: Egypt, archaeology, civilization, Egyptian

Procedia PDF Downloads 75
18761 The Role of Microbes in Organic Sustainable Agriculture and Plant Protection

Authors: Koppula Prawan, Kehinde D. Oyeyemi, Kushal P. Singh

Abstract:

As people become more conscious of the detrimental consequences of conventional agricultural practices on the environment and human health, organic, sustainable agriculture and plant protection employing microorganisms have grown in importance. Although the use of microorganisms in agriculture is a centuries-old tradition, it has recently attracted renewed interest as a sustainable alternative to chemical-based plant protection and fertilization. Healthy soil is the cornerstone of sustainable agriculture, and microbes are essential to this process. Synthetic fertilizers and pesticides can destroy the beneficial microorganisms in the soil, upsetting the ecosystem's equilibrium. By utilizing organic farming's natural practices, such as the usage of microbes, it aims to maintain and improve the health of the soil. Microbes have several functions in agriculture, including nitrogen fixation, phosphorus solubilization, and disease suppression. Nitrogen fixation is the process by which certain microbes, such as rhizobia and Azotobacter, convert atmospheric nitrogen into a form that plants can use. Phosphorus solubilization involves the conversion of insoluble phosphorus into a soluble form that plants can absorb. Disease suppression involves the use of microbes to control plant diseases by competing with pathogenic organisms for resources or by producing antimicrobial compounds. Microbes can be applied to plants through seed coatings, foliar sprays, or soil inoculants. Seed coatings involve applying a mixture of microbes and nutrients to the surface of seeds before planting. Foliar sprays involve applying microbes and nutrients to the leaves of plants during the growing season. Soil inoculants involve adding microbes to the soil before planting. The use of microbes in plant protection and fertilization has several advantages over conventional methods. Firstly, microbes are natural and non-toxic, making them safe for human health and the environment. Secondly, microbes have the ability to adapt to changing environmental conditions, making them more resilient to drought and other stressors. Finally, the use of microbes can reduce the need for synthetic fertilizers and pesticides, reducing costs and minimizing environmental impact. In conclusion, organic, sustainable agriculture and plant protection using microbes are an effective and sustainable alternatives to conventional farming practices. The use of microbes can help to preserve and enhance soil health, increase plant productivity, and reduce the need for synthetic fertilizers and pesticides. As the demand for organic and sustainable agriculture continues to grow, the use of microbes is likely to become more widespread, providing a more environmentally friendly and sustainable future for agriculture.

Keywords: microbes, inoculants, fertilization, soil health, conventional.

Procedia PDF Downloads 83
18760 Radiation Protection Assessment of the Emission of a d-t Neutron Generator: Simulations with MCNP Code and Experimental Measurements in Different Operating Conditions

Authors: G. M. Contessa, L. Lepore, G. Gandolfo, C. Poggi, N. Cherubini, R. Remetti, S. Sandri

Abstract:

Practical guidelines are provided in this work for the safe use of a portable d-t Thermo Scientific MP-320 neutron generator producing pulsed 14.1 MeV neutron beams. The neutron generator’s emission was tested experimentally and reproduced by MCNPX Monte Carlo code. Simulations were particularly accurate, even generator’s internal components were reproduced on the basis of ad-hoc collected X-ray radiographic images. Measurement campaigns were conducted under different standard experimental conditions using an LB 6411 neutron detector properly calibrated at three different energies, and comparing simulated and experimental data. In order to estimate the dose to the operator vs. the operating conditions and the energy spectrum, the most appropriate value of the conversion factor between neutron fluence and ambient dose equivalent has been identified, taking into account both direct and scattered components. The results of the simulations show that, in real situations, when there is no information about the neutron spectrum at the point where the dose has to be evaluated, it is possible - and in any case conservative - to convert the measured value of the count rate by means of the conversion factor corresponding to 14 MeV energy. This outcome has a general value when using this type of generator, enabling a more accurate design of experimental activities in different setups. The increasingly widespread use of this type of device for industrial and medical applications makes the results of this work of interest in different situations, especially as a support for the definition of appropriate radiation protection procedures and, in general, for risk analysis.

Keywords: instrumentation and monitoring, management of radiological safety, measurement of individual dose, radiation protection of workers

Procedia PDF Downloads 132
18759 Effects of Lung Protection Ventilation Strategies on Postoperative Pulmonary Complications After Noncardiac Surgery: A Network Meta-Analysis of Randomized Controlled Trials

Authors: Ran An, Dang Wang

Abstract:

Background: Mechanical ventilation has been confirmed to increase the incidence of postoperative pulmonary complications (PPCs), and several studies have shown that low tidal volumes combined with positive end-expiratory pressure (PEEP) and recruitment manoeuvres (RM) reduce the incidence of PPCs. However, the optimal lung-protective ventilatory strategy remains unclear. Methods: Multiple databases were searched for randomized controlled trials (RCTs) published prior to October 2023. The association between individual PEEP (iPEEP) or other forms of lung-protective ventilation and the incidence of PPCs was evaluated by Bayesian network meta-analysis. Results: We included 58 studies (11610 patients) in this meta-analysis. The network meta-analysis showed that low ventilation (LVt) combined with iPEEP and RM was associated with significantly lower incidences of PPCs [HVt: OR=0.38 95CrI (0.19, 0.75), LVt: OR=0.33, 95% CrI (0.12, 0.82)], postoperative atelectasis, and pneumonia than was HVt or LVt. In abdominal surgery, LVT combined with iPEEP or medium-to-high PEEP and RM were associated with significantly lower incidences of PPCs, postoperative atelectasis, and pneumonia. LVt combined with iPEEP and RM was ranked the highest, which was based on SUCRA scores. Conclusion: LVt combined with iPEEP and RM decreased the incidences of PPCs, postoperative atelectasis, and pneumonia in noncardiac surgery patients. iPEEP-guided ventilation was the optimal lung protection ventilation strategy. The quality of evidence was moderate.

Keywords: protection ventilation strategies, postoperative pulmonary complications, network meta-analysis, noncardiac surgery

Procedia PDF Downloads 35
18758 SCR-Stacking Structure with High Holding Voltage for IO and Power Clamp

Authors: Hyun Young Kim, Chung Kwang Lee, Han Hee Cho, Sang Woon Cho, Yong Seo Koo

Abstract:

In this paper, we proposed a novel SCR (Silicon Controlled Rectifier) - based ESD (Electrostatic Discharge) protection device for I/O and power clamp. The proposed device has a higher holding voltage characteristic than conventional SCR. These characteristics enable to have latch-up immunity under normal operating conditions as well as superior full chip ESD protection. The proposed device was analyzed to figure out electrical characteristics and tolerance robustness in term of individual design parameters (D1, D2, D3). They are investigated by using the Synopsys TCAD simulator. As a result of simulation, holding voltage increased with different design parameters. The holding voltage of the proposed device changes from 3.3V to 7.9V. Also, N-Stack structure ESD device with the high holding voltage is proposed. In the simulation results, 2-stack has holding voltage of 6.8V and 3-stack has holding voltage of 10.5V. The simulation results show that holding voltage of stacking structure can be larger than the operation voltage of high-voltage application.

Keywords: ESD, SCR, holding voltage, stack, power clamp

Procedia PDF Downloads 556
18757 Quantum Entanglement and Thermalization in Superconducting Two-Qubit Systems

Authors: E. Karami, M. Bohloul, P. Najmadi

Abstract:

The superconducting system is a suitable system for quantum computers. Quantum entanglement is a fundamental phenomenon that is key to the power of quantum computers. Quantum entanglement has been studied in different superconducting systems. In this paper, we are investigating a superconducting two-qubit system as a macroscopic system. These systems include two coupled Quantronium circuits. We calculate quantum entanglement and thermalization for system evolution and compare them. We observe, thermalization and entanglement have different behavior, and equilibrium thermal state has maximum entanglement.

Keywords: macroscopic system, quantum entanglement, thermalization, superconducting system

Procedia PDF Downloads 155
18756 A Study of Sexual Violence on Women and Children in Hong Kong

Authors: Wing Hang Shelley Leung

Abstract:

With the rise of the recent social movement, namely #MeToo, it shows that a lot of women and children in fact suffered from sexual abuse and some even suffered from child abuse, including in Hong Kong. In view of the ongoing social movements, this paper argues that we have to look beyond their impacts and understand the roots of the problem: what if the underlying cause of the recent social movements was the inherited values that were rooted in us since we were young, or the public’s lack of confidence in the legal system when it comes to this type of personal matters? What if the movements reveal the problematic issue of the lack of protection plans, either in the private or public sphere? If the legal system is presumed to not be able to preemptively protect everyone or effectively punish all perpetrators, can other pillars provide supports to fill in the loopholes of the legal system? This paper takes a theoretical approach to look into current sexuality education, the legal system in Hong Kong and the adoption of Asian values in society to argue that difficulties that are being placed onto victims in disclosing sexual violence they had experienced. Reviews of the current system and recent sexual assaults court cases for case studies allow the research to address the issues of victims’ experience including (a) their reactions to incidents; (b) issues they have in trials; (c) psychological impacts of the incidents; and (d) their understandings of gender equality before and after incidents. The study is significant because it criticises the current legal system in Hong Kong and provides insights to the public by explaining the dynamics between the problem, the legal system and the society. Also, it contributes to the ongoing research about the psychological impacts to victims in Hong Kong, especially how they are placed in a disadvantaged position in the legal system and society and even for their recovery. It contributes to the findings of how family structures, parental responsibilities and gender studies influence a child’s perception of gender equality in Hong Kong and hence their immediate reactions to incidents. To fully address the needs of victims, especially our younger generation, as well as to prevent future harm and to raise awareness, an inclusive framework which recognizes the needs of protecting and safeguarding women and children in the private sphere and a proper education for gender equality are needed.

Keywords: child abuse, children's rights, domestic violence, gender equality, Hong Kong, Me too, sexual violence, women's rights

Procedia PDF Downloads 169
18755 Nanocomplexes on the Base of Triterpene Saponins Isolated from Glycyrrhiza glabra and Saponaria officinalis Plants as an Efficient Adjuvants for Influenza Vaccine Use

Authors: Vladimir Berezin, Andrey Bogoyavlenskiy, Pavel Alexyuk, Madina Alexyuk, Aizhan Turmagambetova, Irina Zaitseva, Nadezhda Sokolova, Elmira Omirtaeva

Abstract:

Introduction: Triterpene saponins of plant origin are one of the most promising candidates for elaboration of novel adjuvants. Due to the combination of immunostimulating activity and the capacity interact with amphipathic molecules with formation of highly immunogenic nanocomplexes, triterpene saponins could serve as a good adjuvant/delivery system for vaccine use. In the research presented adjuvants on the base of nanocomplexes contained triterpene saponins isolated from Glycyrrhiza glabra and Saponaria officinalis plants indigenous to Kazakhstan were elaborated for influenza vaccine use. Methods: Purified triterpene saponins 'Glabilox' and 'SO1' with low toxicity and high immunostimulatory activity were isolated from plants Glycyrrhiza glabra L. and Saponaria officinalis L. by high-performance liquid chromatography (HPLC) and identified using electrospray ionization mass spectrometry (ESI-MS). Influenza virus A/St-Petersburg/5/09 (H1N1) propagated in 9-days old chicken embryos was concentrated and purified by centrifugation in sucrose gradient. Nanocomplexes contained lipids, and triterpene saponins Glabilox or SO1 were prepared by dialysis technique. Immunostimulating activity of experimental vaccine preparations was studied in vaccination/challenge experiments in mice. Results: Humoral and cellular immune responses and protection against influenza virus infection were examined after single subcutaneous and intranasal immunization. Mice were immunized subunit influenza vaccine (HA+NA) or whole virus inactivated influenza vaccine in doses 3.0/5.0/10.0 µg antigen/animal mixed with adjuvant in dose 15.0 µg/animal. Sera were taken 14-21 days following single immunization and mice challenged by A/St-Petersburg/5/09 influenza virus in dose 100 EID₅₀. Study of experimental influenza vaccine preparations in animal immunization experiments has shown that subcutaneous and intranasal immunization with subunit influenza vaccine mixed with nanocomplexes contained Glabilox or SO1 saponins stimulated high levels of humoral immune response (IgM, IgA, IgG1, IgG2a, and IgG2b antibody) and cellular immune response (IL-2, IL-4, IL-10, and IFN-γ cytokines) and resulted 80-90% protection against lethal influenza infection. Also, single intranasal and single subcutaneous immunization with whole virus inactivated influenza vaccine mixed with nanoparticulated adjuvants stimulated high levels of humoral and cellular immune responses and provided 100% protection against lethal influenza infection. Conclusion: The results of study have shown that nanocomplexes contained purified triterpene saponins Glabilox and SO1 isolated from plants indigenous to Kazakhstan can stimulate a broad spectrum of humoral and cellular immune responses and induce protection against lethal influenza infection. Both elaborated adjuvants are promising for incorporation to influenza vaccine intended for subcutaneous and intranasal routes of immunization.

Keywords: influenza vaccine, adjuvants, triterpene saponins, immunostimulating activity

Procedia PDF Downloads 137
18754 Study of the Behavior of an Organic Coating Applied on Algerian Oil Tanker in Sea Water

Authors: Nadia Hammouda, K. Belmokre

Abstract:

Organic coatings are widely employed in the corrosion protection of most metal surfaces, particularly steel. They provide a barrier against corrosive species present in the environment, due to their high resistance to oxygen, water and ions transport. This study focuses on the evaluation of corrosion protection performance of epoxy paint on the carbon steel surface in sea water by Electrochemical Impedance Spectroscopy (EIS). The electrochemical behavior of painted surface was estimated by EIS parameters that contained paint film resistance, paint film capacitance and double layer capacitance. On the basis of calculation using EIS spectrums it was observed that pore resistance (Rpore) decreased with the appearance of doubled layer capacitance (Cdl) due to the electrolyte penetration through the film. This was further confirmed by the decrease of diffusion resistance (Rd) which was also the indicator of the deterioration of paint film protectiveness.

Keywords: epoxy paints, carbon steel, electrochemical impedance spectroscopy, corrosion mechanisms, sea water

Procedia PDF Downloads 481
18753 Conflating Voluntary Sex Work and Trafficked Sex Work in Malaysia

Authors: Haezreena Begum Abdul Hamid

Abstract:

This article will explore the conflation between voluntary sex work and trafficked sex work. In doing so, the article will analyse the meaning of trafficking according to the United Nations ‘Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and Children’ and the Malaysian Anti-Trafficking in Persons and Anti-Migrant Smuggling Act, 2007 (ATIP), and discuss the ambiguities that may arise in understanding the term. While the law on human trafficking has long been understood by scholars, key stakeholders, and enforcement officers, identifying a victim of trafficking is far from being straight forward. This is because of the diverse understanding on sex trafficking and sex work, and the fact that ‘consent’ by trafficked persons remains irrelevant in cases of trafficking. As a result, women who voluntarily engage in sex work are sometimes categorised as ‘trafficked’ and are ‘rescued’ by the authorities in the name of ‘protection’, while those who insist of having agency can be charged for violating the immigration laws. In light of such circumstances, this article aims to explore the conflation between voluntary sex work and trafficked sex work and how such conflation have succeeded in fostering distrust between sex workers and authorities.

Keywords: voluntary sex work, trafficked sex work, sex work, coercion, protection

Procedia PDF Downloads 240
18752 Auto Calibration and Optimization of Large-Scale Water Resources Systems

Authors: Arash Parehkar, S. Jamshid Mousavi, Shoubo Bayazidi, Vahid Karami, Laleh Shahidi, Arash Azaranfar, Ali Moridi, M. Shabakhti, Tayebeh Ariyan, Mitra Tofigh, Kaveh Masoumi, Alireza Motahari

Abstract:

Water resource systems modelling have constantly been a challenge through history for human being. As the innovative methodological development is evolving alongside computer sciences on one hand, researches are likely to confront more complex and larger water resources systems due to new challenges regarding increased water demands, climate change and human interventions, socio-economic concerns, and environment protection and sustainability. In this research, an automatic calibration scheme has been applied on the Gilan’s large-scale water resource model using mathematical programming. The water resource model’s calibration is developed in order to attune unknown water return flows from demand sites in the complex Sefidroud irrigation network and other related areas. The calibration procedure is validated by comparing several gauged river outflows from the system in the past with model results. The calibration results are pleasantly reasonable presenting a rational insight of the system. Subsequently, the unknown optimized parameters were used in a basin-scale linear optimization model with the ability to evaluate the system’s performance against a reduced inflow scenario in future. Results showed an acceptable match between predicted and observed outflows from the system at selected hydrometric stations. Moreover, an efficient operating policy was determined for Sefidroud dam leading to a minimum water shortage in the reduced inflow scenario.

Keywords: auto-calibration, Gilan, large-scale water resources, simulation

Procedia PDF Downloads 335
18751 Transparency of Algorithmic Decision-Making: Limits Posed by Intellectual Property Rights

Authors: Olga Kokoulina

Abstract:

Today, algorithms are assuming a leading role in various areas of decision-making. Prompted by a promise to provide increased economic efficiency and fuel solutions for pressing societal challenges, algorithmic decision-making is often celebrated as an impartial and constructive substitute for human adjudication. But in the face of this implied objectivity and efficiency, the application of algorithms is also marred with mounting concerns about embedded biases, discrimination, and exclusion. In Europe, vigorous debates on risks and adverse implications of algorithmic decision-making largely revolve around the potential of data protection laws to tackle some of the related issues. For example, one of the often-cited venues to mitigate the impact of potentially unfair decision-making practice is a so-called 'right to explanation'. In essence, the overall right is derived from the provisions of the General Data Protection Regulation (‘GDPR’) ensuring the right of data subjects to access and mandating the obligation of data controllers to provide the relevant information about the existence of automated decision-making and meaningful information about the logic involved. Taking corresponding rights and obligations in the context of the specific provision on automated decision-making in the GDPR, the debates mainly focus on efficacy and the exact scope of the 'right to explanation'. In essence, the underlying logic of the argued remedy lies in a transparency imperative. Allowing data subjects to acquire as much knowledge as possible about the decision-making process means empowering individuals to take control of their data and take action. In other words, forewarned is forearmed. The related discussions and debates are ongoing, comprehensive, and, often, heated. However, they are also frequently misguided and isolated: embracing the data protection law as ultimate and sole lenses are often not sufficient. Mandating the disclosure of technical specifications of employed algorithms in the name of transparency for and empowerment of data subjects potentially encroach on the interests and rights of IPR holders, i.e., business entities behind the algorithms. The study aims at pushing the boundaries of the transparency debate beyond the data protection regime. By systematically analysing legal requirements and current judicial practice, it assesses the limits of the transparency requirement and right to access posed by intellectual property law, namely by copyrights and trade secrets. It is asserted that trade secrets, in particular, present an often-insurmountable obstacle for realising the potential of the transparency requirement. In reaching that conclusion, the study explores the limits of protection afforded by the European Trade Secrets Directive and contrasts them with the scope of respective rights and obligations related to data access and portability enshrined in the GDPR. As shown, the far-reaching scope of the protection under trade secrecy is evidenced both through the assessment of its subject matter as well as through the exceptions from such protection. As a way forward, the study scrutinises several possible legislative solutions, such as flexible interpretation of the public interest exception in trade secrets as well as the introduction of the strict liability regime in case of non-transparent decision-making.

Keywords: algorithms, public interest, trade secrets, transparency

Procedia PDF Downloads 124
18750 Sunglasses Frame: UV Protection beyond Lens Spectroscopy

Authors: Augusto P. Andrade, Pedro L. Guedes, Pedro T. Da Silva, Liliane Ventura

Abstract:

The present study evaluates the contribution of sunglasses frames as additional eye safety for ultraviolet backscatter light. Current sunglasses standards establish safe limits regarding lens transmittance in the 280 nm to 380 nm range. However, frames are additionally relevant in protecting the eyes from ultraviolet exposure. This study involves the use of a prototype that simulates backscattered light environments and quantifies the contribution of the frame as a function of the light that reaches the eye when wearing sunglasses. The prototype consists of an LED illuminated sphere, a mannequin head with optical sensors, and baseline and measurements are performed. A set of 29 samples was tested, and results show the variation of light blocking presented by different types of frames, ranging from 68% to 80%. This is still ongoing research. Prototype improvements for allowing albedo simulation, as well as the six types of sky simulation, are being implemented to show the intensity of UV light reaching the eye for several environments worldwide.

Keywords: sunglasses standards, sunglasses frame, ultraviolet protection, albedo

Procedia PDF Downloads 103
18749 Internet of Things Based Process Model for Smart Parking System

Authors: Amjaad Alsalamah, Liyakathunsia Syed

Abstract:

Transportation is an essential need for many people to go to their work, school, and home. In particular, the main common method inside many cities is to drive the car. Driving a car can be an easy job to reach the destination and load all stuff in a reasonable time. However, deciding to find a parking lot for a car can take a long time using the traditional system that can issue a paper ticket for each customer. The old system cannot guarantee a parking lot for all customers. Also, payment methods are not always available, and many customers struggled to find their car among a numerous number of cars. As a result, this research focuses on providing an online smart parking system in order to save time and budget. This system provides a flexible management system for both parking owner and customers by receiving all request via the online system and it gets an accurate result for all available parking and its location.

Keywords: smart parking system, IoT, tracking system, process model, cost, time

Procedia PDF Downloads 335
18748 Effects of Drought and Anthropism on Vegetation and Soil Elements in the Steppe of Algeria: Case of the Station of Tadmit (Wilaya of Djelfa)

Authors: L. Benseghir, H. Kadi-Hanifi

Abstract:

Vegetation of the high steppic plains of southern Algiers region has ever been used by human occupation. The harsh climatic context characterized by long periods of drought and an ovine livestock in constant growth lead us to devote a particular attention to the biodiversity of those living environment. The diachronic study made in Tadmit (50 km south of the district of Djelfa) about the specific recording led us to notice that: The floristic recording of Tadmit is not reduced in time but fluctuate, depending on the pasture intensity, the annual rainfall and especially by the protection area of the following two years from January 2004. The forming specific recording of the station undergo significant changes from a period to another. Those changes in floristic list concern nearly 50% of the initial flora that could disappear or be replaced by new species. Finally, the alfa steppe is in a marked decline and is substituted by new facies that were privileged by the overgrazing, stranding or clearance.

Keywords: overgrazing, diachronic study, protection area, climate, desertification

Procedia PDF Downloads 269