Search results for: hearing protection devices
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4844

Search results for: hearing protection devices

4304 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks

Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner

Abstract:

Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.

Keywords: USB, device, cyber security, attack, detection

Procedia PDF Downloads 376
4303 Wearable Devices Could Reduce the Risk of Injury in Parasomnias Phenotypes

Authors: Vivian Correa

Abstract:

Hypothesis There are typical patterns - phenotypes - of sleep behaviors by age and biological sex groups of parasomnia patients where wearable devices could avoid injuries. Materials and methods We analyzed public video records on sleep-related behaviors likely representing parasomnias, looking for phenotypes in different groups. We searched public internet databases using the keywords “sleepwalking”, “sleep eating,” “sleep sex”, and “aggression in sleep” in six languages. Poor-quality vide-records and those showing apparently faked sleep behaviors were excluded. We classified the videos into estimated sex and age (children, adults, elderly) groups; scored the activity types by a self-made scoring scale; and applied binary logistic regression for analyzing the association between sleep behaviors versus the groups by STATA package providing 95% confidence interval and the probability of statistical significance. Results 224 videos (102 women) were analyzed. The odds of sleepwalking and related dangerous behaviors were lower in the elderly than in adults (P<0.025). Females performed complex risky behaviors during sleepwalking more often than males (P<0.012). Elderly people presented emotional behaviors less frequently than adults (P<0.004), and females showed them twice often as males. Elderly males had 40-fold odds compared to adults and children to perform aggressive movements and 70-fold odds of complex movements in the bed compared to adults. Conclusion Unlike other groups, the high chances of adults being sleepwalkers and elderly males performing intense and violent movements in bed showed us the importance of developing wearable parasomnia devices to prevent injuries.

Keywords: parasomnia, wearable devices, sleepwalking, RBD

Procedia PDF Downloads 90
4302 Design and Fabrication of an Electrostatically Actuated Parallel-Plate Mirror by 3D-Printer

Authors: J. Mizuno, S. Takahashi

Abstract:

In this paper, design and fabrication of an actuated parallel-plate mirror based on a 3D-printer is described. The mirror and electrode layers are fabricated separately and assembled thereafter. The alignment is performed by dowel pin-hole pairs fabricated on the respective layers. The electrodes are formed on the surface of the electrode layer by Au ion sputtering using a suitable mask, which is also fabricated by a 3D-printer.For grounding the mirror layer, except the contact area with the electrode paths, all the surface is Au ion sputtered. 3D-printers are widely used for creating 3D models or mock-ups. The authors have recently proposed that these models can perform electromechanical functions such as actuators by suitably masking them followed by metallization process. Since the smallest possible fabrication size is in the order of sub-millimeters, these electromechanical devices are named by the authors as SMEMS (Sub-Milli Electro-Mechanical Systems) devices. The proposed mirror described in this paper which consists of parallel-plate electrostatic actuators is also one type of SMEMS devices. In addition, SMEMS is totally environment-clean compared to MEMS (Micro Electro-Mechanical Systems) fabrication processes because any hazardous chemicals or gases are utilized.

Keywords: MEMS, parallel-plate mirror, SMEMS, 3D-printer

Procedia PDF Downloads 414
4301 Use of Recycled PVB as a Protection against Carbonation

Authors: Michael Tupý, Vít Petránek

Abstract:

The paper is focused on testing of the poly(vinyl butyral) (PVB) layer which had the function of a CO2 insulating protection against concrete and mortar carbonation. The barrier efficiency of PVB was verified by the measurement of diffusion characteristics. Two different types of PVB were tested; original extruded PVB sheet and PVB sheet made from PVB dispersion which was obtained from recycled windshields. The work deals with the testing CO2 diffusion when polymer sheets were exposed to a CO2 atmosphere (10% v/v CO2) with 0% RH. The excellent barrier capability against CO2 permeability of original and also recycled types of PVB layers was observed. This application of PVB waste can bring advantageous use in civil engineering and significant environmental contribution.

Keywords: windshield, poly(vinyl butyral), mortar, diffusion, carbonatation, polymer waste

Procedia PDF Downloads 405
4300 Threat Modeling Methodology for Supporting Industrial Control Systems Device Manufacturers and System Integrators

Authors: Raluca Ana Maria Viziteu, Anna Prudnikova

Abstract:

Industrial control systems (ICS) have received much attention in recent years due to the convergence of information technology (IT) and operational technology (OT) that has increased the interdependence of safety and security issues to be considered. These issues require ICS-tailored solutions. That led to the need to creation of a methodology for supporting ICS device manufacturers and system integrators in carrying out threat modeling of embedded ICS devices in a way that guarantees the quality of the identified threats and minimizes subjectivity in the threat identification process. To research, the possibility of creating such a methodology, a set of existing standards, regulations, papers, and publications related to threat modeling in the ICS sector and other sectors was reviewed to identify various existing methodologies and methods used in threat modeling. Furthermore, the most popular ones were tested in an exploratory phase on a specific PLC device. The outcome of this exploratory phase has been used as a basis for defining specific characteristics of ICS embedded devices and their deployment scenarios, identifying the factors that introduce subjectivity in the threat modeling process of such devices, and defining metrics for evaluating the minimum quality requirements of identified threats associated to the deployment of the devices in existing infrastructures. Furthermore, the threat modeling methodology was created based on the previous steps' results. The usability of the methodology was evaluated through a set of standardized threat modeling requirements and a standardized comparison method for threat modeling methodologies. The outcomes of these verification methods confirm that the methodology is effective. The full paper includes the outcome of research on different threat modeling methodologies that can be used in OT, their comparison, and the results of implementing each of them in practice on a PLC device. This research is further used to build a threat modeling methodology tailored to OT environments; a detailed description is included. Moreover, the paper includes results of the evaluation of created methodology based on a set of parameters specifically created to rate threat modeling methodologies.

Keywords: device manufacturers, embedded devices, industrial control systems, threat modeling

Procedia PDF Downloads 62
4299 Flexible Alternative Current Transmission System Impact on Grid Stability and Power Markets

Authors: Abdulrahman M. Alsuhaibani, Martin Maken

Abstract:

FACTS devices have great influence on the grid stability and power markets price. Recently, there is intent to integrate a large scale of renewable energy sources to the power system which in turn push the power system to operate closer to the security limits. This paper discusses the power system stability and reliability improvement that could be achieved by using FACTS. There is a comparison between FACTS devices to evaluate their performance for different functions. A case study has also been made about its effect on reducing generation cost and minimizing transmission losses which have good impact on efficient and economic operation of electricity markets

Keywords: FACTS, grid stability, spot price, OPF

Procedia PDF Downloads 132
4298 Developing Local Wisdom to Integrate Etnobiology and Biodiversity Conservation in Mount Ungaran, Central Java Indonesia

Authors: Margareta Rahayuningsih, Nur Rahayu Utami, Tsabit A. M., Muh. Abdullah

Abstract:

Mount Ungaran is one area that has remaining natural forest in Central Java, Indonesia. Mount Ungaran consists of several habitats that supporting appropriate areas for flora, fauna, and microorganisms biodiversity, particularly of it is protected by government law and IUCN red list data. Therefore, Mount Ungaran also settled up as AZE (Alliance for Zero Extinction) and IBA (Important Bird Area). The land use for agriculture and plantation reduces forest covered areas. It is serious threat to the existence of biodiversity in Moun Ungaran. This research has been identified community local wisdom that possible to be integrated as ethno-biological research and biodiversity conservation. The result showed at least four local wisdom that possible to be integrated to ethno-biological and biodiversity conservation were Wit Weh Woh (a ceremony of life-giving tree), Grebeg Alas Susuk Wangan (a ceremony for forest protection), Iriban (a ceremony of clean water resource protection), and tingkep tandur (a ceremony for ready-harvested plant protection). It is needed ethno-biological researches of local wisdom-contained values, which essential to be developed as a strategy for biodiversity conservation in Mount Ungaran.

Keywords: Mount Ungaran, local wisdom, biodiversity, fragmentation

Procedia PDF Downloads 261
4297 New Scheme of Control and Air Supply in a Low-Power Hot Water Boiler

Authors: М. Zh. Khazimov, А. B. Kudasheva

Abstract:

The article presents the state of solid fuel reserves and their share in the world energy sector. The air pollution caused by the operation of heating devices using solid fuels is a significant problem. In order to improve the air quality, heating device producers take constant measures to improve their products. However, the emission results achieved during an initial test of heating devices in the laboratory may be much worse during operation in real operating conditions. The ways of increasing the efficiency of the boiler by improving its design for combustion in full-layer mode are shown. The results of the testing of the improved КВТС-0.2 hot water boiler is presented and the technical and economic indicators are determined, which indicate an increase in the efficiency of the boiler.

Keywords: boiler unit, grate, furnace, coal, ash

Procedia PDF Downloads 55
4296 The Copyright Eligibility of Sports Events and Performances

Authors: Emre Bayamlıoğlu

Abstract:

Apart from being the subject of neighboring rights when broadcasted on TV or of cinematographic work when fixed to a tangible medium including a hard drive, the copyright eligibility of a sports performance, and eventually the sporting event has once again given rise to controversy following the CJEU judgment in the Murphy case. Most of the arguments which deny copyright protection for sports performances focus on the fact that unlike movies, plays, television programs, or operas, athletic events are competitive and have no underlying script. The first part of the paper aims to explain that such rhetoric is rather weak simply for the fact that, several types of performances such as improvised musical or dramatic shows are still protected by copyright despite the fact that they are not based on a script. The second part argues that the core reason for the denial copyright protection was the functionality aiming certain practical results such as winning the game, scoring, eliminating an opponent, obstructing a shot and etc., but no scientific or artistic expression in whatsoever form. The paper further argues that expanding copyright protection to functional performances would give rise to unintended copyright claims by the athletes on tackles, shoots, passes, crosses etc. resulting with further restrictions on reporting and photographing of sporting events. The final part provides a policy analysis of the trend to broaden the scope of copyright to cover sports performances. It is argued that such expansion will clearly undermine the ratio legis of copyright laws since it will give rise to excessive commodification of information beyond the needs of a viable market economy. Therefore, remedies other than copyright protection such as unfair competition and unjust enrichment provides sufficient redress for the damages to be sustained by the investors of sporting events.

Keywords: copyright eligibility, idea-expression dichotomy, sports performance

Procedia PDF Downloads 458
4295 Application of Voltammetry as a Non-Destructive Tool to Quantify Cathodic Protection of Steel in Simulated Soil Solution

Authors: Mandlenkosi G. R. Mahlobo, Peter A. Olubambi

Abstract:

Cathodic protection (CP) has been widely considered as a suitable technique for mitigating corrosion of steel structures buried in soil. Plenty of efforts have been made in developing techniques, in particular non-destructive techniques, for monitoring and quantifying the effectiveness of CP to ensure the sustainability and performance of buried steel structures. This study was aimed at using a specifically modified voltammetry approach as a non-destructive tool to monitor and quantify the effectiveness of CP of steel in simulated soil. Carbon steel was subjected to electrochemical tests with NS4 solution used as simulated soil conditions for four days before applying CP for further 11 days. A specifically modified voltammetry technique was applied at various time intervals of the experiment to monitor the corrosion behaviour and therefore reflect CP effectiveness. The voltammetry results revealed that the application of CP reduced the corrosion rate from the highest value of 410 µm/yr to 8 µm/yr between days 5 and 14 of the experiments. The microstructural analysis of the steel surface performed using x-ray diffraction identified calcareous deposit as the dominant phase protecting the surface from corrosion. It was deduced that the formation of calcareous deposits was linked with the effectiveness of CP of steel.

Keywords: carbon steel, cathodic protection, NS4 solution, voltammetry, XRD

Procedia PDF Downloads 47
4294 Development and Structural Performance Evaluation on Slit Circular Shear Panel Damper

Authors: Daniel Y. Abebe, Jaehyouk Choi

Abstract:

There are several types of metal-based devices conceived as dampers for the seismic energy absorber whereby damages to the major structural components could be minimized for both new and existing structures. This paper aimed to develop and evaluate structural performance of slit circular shear panel damper for passive seismic energy protection by inelastic deformation. Structural evaluation was done using commercially available nonlinear FE simulation program. The main parameters considered are: diameter-to-thickness (D/t) ratio and slit length-to-width ratio (l/w). Depending on these parameters three different buckling modes and hysteretic behaviors were found: yielding prior to buckling without strength degradation, yielding prior to buckling with strength degradation, and yielding with buckling and strength degradation which forms pinching at initial displacement. The susceptible location at which the possible crack is initiated is also identified for selected specimens using rupture index.

Keywords: slit circular shear panel damper, hysteresis characteristics, slip length-to-width ratio, D/t ratio, FE analysis

Procedia PDF Downloads 378
4293 The Role of BPSK (Consumer Dispute Settlement Body) in the Monitoring of Standard Clause Inclusion within Indonesian Customer Protection Law

Authors: Deviana Yuanitasari

Abstract:

The rapid development of world commerce and trade nowadays has created fast-paced demand in every business activities and transactions. That also includes the need for ready to use and practical form of standard contract. For the company or business owner, the use of standard contract is an alternative way to achieve economic goals faster, effectively and efficiently. In the other hand, for the consumer the practice of using standard contract usually unfavorable, because the contract clauses usually have been defined by the company and cannot be individually negotiated. That means consumer cannot influence the substances of the contract clauses. The purpose of this study is to get deeper understanding and analyze the role of Consumer Dispute Settlement Body in the monitoring of standard clause inclusion by businesses and industries within the context of practicing consumer protection law. Furthermore, this study will focus on the procedure of sanction and the effectiveness of the sanction for the business practitioners which disregard the inclusion of the prohibited standard clause. Therefore, this study will depict the law issues and other phenomenon that related with the role of Consumer Dispute Settlement Body in monitoring the inclusion of standard clause and procedure of sanction for the business practitioners that still use exemption clause within Consumer Protection Law System. This study results that BPSK has been assigned to monitor the inclusion of standard clause and settle consumer dispute. At this stage, BPSK role is passive, which means BPSK only takes an action if there are consumer complaints. The procedure of sanction is not part of BPSK tasks, since should there be a violation of standard clause; BPSK can only ask the business practitioners to remove the prohibited clause and not give a sanction. As a result, the procedure of sanction rule for the Standard Clause violation in this context can be considered as ineffective.

Keywords: standard contract, standard clause, consumer protection law, consumer dispute settlement body

Procedia PDF Downloads 306
4292 Cyber-Med: Practical Detection Methodology of Cyber-Attacks Aimed at Medical Devices Eco-Systems

Authors: Nir Nissim, Erez Shalom, Tomer Lancewiki, Yuval Elovici, Yuval Shahar

Abstract:

Background: A Medical Device (MD) is an instrument, machine, implant, or similar device that includes a component intended for the purpose of the diagnosis, cure, treatment, or prevention of disease in humans or animals. Medical devices play increasingly important roles in health services eco-systems, including: (1) Patient Diagnostics and Monitoring; Medical Treatment and Surgery; and Patient Life Support Devices and Stabilizers. MDs are part of the medical device eco-system and are connected to the network, sending vital information to the internal medical information systems of medical centers that manage this data. Wireless components (e.g. Wi-Fi) are often embedded within medical devices, enabling doctors and technicians to control and configure them remotely. All these functionalities, roles, and uses of MDs make them attractive targets of cyber-attacks launched for many malicious goals; this trend is likely to significantly increase over the next several years, with increased awareness regarding MD vulnerabilities, the enhancement of potential attackers’ skills, and expanded use of medical devices. Significance: We propose to develop and implement Cyber-Med, a unique collaborative project of Ben-Gurion University of the Negev and the Clalit Health Services Health Maintenance Organization. Cyber-Med focuses on the development of a comprehensive detection framework that relies on a critical attack repository that we aim to create. Cyber-Med will allow researchers and companies to better understand the vulnerabilities and attacks associated with medical devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The Cyber-Med detection framework will consist of two independent, but complementary detection approaches: one for known attacks, and the other for unknown attacks. These modules incorporate novel ideas and algorithms inspired by our team's domains of expertise, including cyber security, biomedical informatics, and advanced machine learning, and temporal data mining techniques. The establishment and maintenance of Cyber-Med’s up-to-date attack repository will strengthen the capabilities of Cyber-Med’s detection framework. Major Findings: Based on our initial survey, we have already found more than 15 types of vulnerabilities and possible attacks aimed at MDs and their eco-system. Many of these attacks target individual patients who use devices such pacemakers and insulin pumps. In addition, such attacks are also aimed at MDs that are widely used by medical centers such as MRIs, CTs, and dialysis engines; the information systems that store patient information; protocols such as DICOM; standards such as HL7; and medical information systems such as PACS. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched against MDs. Very little research has been conducted in order to protect these devices from cyber-attacks, since most of the development and engineering efforts are aimed at the devices’ core medical functionality, the contribution to patients’ healthcare, and the business aspects associated with the medical device.

Keywords: medical device, cyber security, attack, detection, machine learning

Procedia PDF Downloads 343
4291 Protection of Cultural Heritage against the Effects of Climate Change Using Autonomous Aerial Systems Combined with Automated Decision Support

Authors: Artur Krukowski, Emmanouela Vogiatzaki

Abstract:

The article presents an ongoing work in research projects such as SCAN4RECO or ARCH, both funded by the European Commission under Horizon 2020 program. The former one concerns multimodal and multispectral scanning of Cultural Heritage assets for their digitization and conservation via spatiotemporal reconstruction and 3D printing, while the latter one aims to better preserve areas of cultural heritage from hazards and risks. It co-creates tools that would help pilot cities to save cultural heritage from the effects of climate change. It develops a disaster risk management framework for assessing and improving the resilience of historic areas to climate change and natural hazards. Tools and methodologies are designed for local authorities and practitioners, urban population, as well as national and international expert communities, aiding authorities in knowledge-aware decision making. In this article we focus on 3D modelling of object geometry using primarily photogrammetric methods to achieve very high model accuracy using consumer types of devices, attractive both to professions and hobbyists alike.

Keywords: 3D modelling, UAS, cultural heritage, preservation

Procedia PDF Downloads 106
4290 Aeronautical Noise Management inside an Aerodrome: Analysis of Sound Exposure on Aviation Professional’s Health

Authors: Rafael Felipe Guatura da Silva, José Luis Gomes da Silva, Luiz Antonio, Ferreira Perrone de Brito

Abstract:

Noise can cause serious damage to human health, such as hearing loss, stress, irritability, fatigue, and others. Aviation is a place where your entire process should be work out with the utmost attention and commitment of human resources, thus the need to study the effects of noise in this sector, as aeronautical noise levels are high. This study aimed to evaluate the impact of noise pollution on the performance of professionals regarding the fatigue generated by aeronautical noise and time to noise exposure. The methodology used consists of measurements of sound pressure levels at 42 points of the aerodrome. The selected points are located inside the hangars and outside the airfield hangars. All points chosen are close to the professionals' work areas, seeking to identify the sound pressure levels to which they submitted. The other part of the research used the principle on the application of a self-report questionnaire to a sample of 207 people working inside the aerodrome. The 207 professionals surveyed consist of aircraft mechanics, pilots, maintenance managers, and administrative professionals. The questionnaire was intended to evaluate the knowledge that professionals have about health risks caused by sound exposure as well as to identify diseases that professionals have, and that may be associated with exposure to high levels of sound pressure. Preliminary results identify points with sound pressure levels of up to 91.7 dB, thus highlighting the need for the use of personal protective equipment that reduces noise exposure. It was also identified a large number of professionals who are bothered by the sound exposure and approximately 25% of professionals interviewed reported having a hearing disorder.

Keywords: aeronautical noise, fatigue, noise and health, noise management

Procedia PDF Downloads 128
4289 Hysteresis in Sustainable Two-layer Circular Tube under a Lateral Compression Load

Authors: Ami Nomura, Ken Imanishi, Etsuko Ueda, Tadahiro Wada, Shinichi Enoki

Abstract:

Recently, there have been a lot of earthquakes in Japan. It is necessary to promote seismic isolation devices for buildings. The devices have been hardly diffused in attached houses, because the devices are very expensive. We should develop a low-cost seismic isolation device for detached houses. We suggested a new seismic isolation device which uses a two-layer circular tube as a unit. If hysteresis is produced in the two-layer circular tube under lateral compression load, we think that the two-layer circular tube can have energy absorbing capacity. It is necessary to contact the outer layer and the inner layer to produce hysteresis. We have previously reported how the inner layer comes in contact with the outer layer from a perspective of analysis used mechanics of materials. We have clarified that the inner layer comes in contact with the outer layer under a lateral compression load. In this paper, we explored contact area between the outer layer and the inner layer under a lateral compression load by using FEA. We think that changing the inner layer’s thickness is effective in increase the contact area. In order to change the inner layer’s thickness, we changed the shape of the inner layer. As a result, the contact area changes depending on the inner layer’s thickness. Additionally, we experimented to check whether hysteresis occurs in fact. As a consequence, we can reveal hysteresis in the two-layer circular tube under the condition.

Keywords: contact area, energy absorbing capacity, hysteresis, seismic isolation device

Procedia PDF Downloads 280
4288 Domestic Violence Against Iranian Deaf People

Authors: Laleh Golamrej Eliasi, Mahsa Tahzibi, Mohammad Torkashvand Moradabadi

Abstract:

TheIranian Ear, Throat, Nose, Head, and Neck Research Center has estimated that three to five percent of Iran’s population has moderate to profound hearing disorders. The prevalence of hearing loss in provincial centers is equal to 4.7 per thousand live births (362 cases). The deaf community has limited access to information and health services due to language and communication barriers. Communication and language limitations isolate and limit deaf people from social media, health services, and communication with caregivers and health providers.Limitedcommunicationwith the deaf has led to a lack of knowledge and information about domestic violence against the deaf (DVAD) in this target group in Iran. To fill this knowledge gap, deaf living in Iranwere selected as the target group to assess their views on DVAD. This study is implemented in the socio-ecological approach framework to assess the impacts of individual characteristics, interpersonal relationships, community, and society components on DVAD. Semi-structured interviews with the Iranian deaf and Content analysis are used to find the participants’ point of view on DVAD, its risk factors, and the reduction approach to DVAD. The main purpose is to obtain information about participants' views on the subject. The findings can be used to improve culturally safe social work knowledge and practices with a bottom-up approach to reduce DV and increase their well-being. Therefore, this research can have important effects on the sustainable development of services and supports the welfare and inclusion of the deaf.

Keywords: domestic violence, Iranian deaf, social work, content analysis

Procedia PDF Downloads 74
4287 The Principle of the Protection of Legitimate Expectation: Analysis the Adjudications of Thailand Court

Authors: Paiboon Chuwatthanakij

Abstract:

In reference to the legal state in the Thai legal system, most people understand the minor principles of the legal state form, which are the principles that can be explained and understood easily and the results can be seen clearly, especially in the legitimacy of administrative acts. Therefore, there is no awareness of justice, which is the fundamental value of Thai law. The legitimacy of administrative acts requires the administration to adhere to the constitution and legislative laws in enforcement of the laws. If it appears that the administrative acts are illegitimate, the administrative court, as the court of justice, will revoke those acts as if they had never been set in the legal system, this will affect people’s trust as they are unaware as to whether the administrative acts that appoint their lives are legitimate or not. Regarding the revocation of administrative orders by the administrative court as if those orders had never existed, the common individual surely cannot be expected to comprehend the security of their juristic position. Therefore, the legal state does not require a revocation of the government’s acts to terminate its legal results merely because those acts are illegitimate, but there should be considerations and realizations regarding the “The Principle of the Protection of Legitimate Expectation,” which is a minor principle in the legal state’s content that focuses on supporting and protecting legitimate expectations of the juristic position of an individual and maintaining justice, which is the fundamental value of Thai law

Keywords: legal state, rule of law, protection of legitimate, adjudication

Procedia PDF Downloads 370
4286 Research on Modern Semiconductor Converters and the Usage of SiC Devices in the Technology Centre of Ostrava

Authors: P. Vaculík, P. Kaňovský

Abstract:

The following article presents Technology Centre of Ostrava (TCO) in the Czech Republic. Describes the structure and main research areas realized by the project ENET-Energy Units for Utilization of non-traditional Energy Sources. More details are presented from the research program dealing with transformation, accumulation, and distribution of electric energy. Technology Centre has its own energy mix consisting of alternative sources of fuel sources that use of process gases from the storage part and also the energy from distribution network. The article will focus on the properties and application possibilities SiC semiconductor devices for power semiconductor converter for photo-voltaic systems.

Keywords: SiC, Si, technology centre of Ostrava, photovoltaic systems, DC/DC Converter, simulation

Procedia PDF Downloads 578
4285 Intelligent Indoor Localization Using WLAN Fingerprinting

Authors: Gideon C. Joseph

Abstract:

The ability to localize mobile devices is quite important, as some applications may require location information of these devices to operate or deliver better services to the users. Although there are several ways of acquiring location data of mobile devices, the WLAN fingerprinting approach has been considered in this work. This approach uses the Received Signal Strength Indicator (RSSI) measurement as a function of the position of the mobile device. RSSI is a quantitative technique of describing the radio frequency power carried by a signal. RSSI may be used to determine RF link quality and is very useful in dense traffic scenarios where interference is of major concern, for example, indoor environments. This research aims to design a system that can predict the location of a mobile device, when supplied with the mobile’s RSSIs. The developed system takes as input the RSSIs relating to the mobile device, and outputs parameters that describe the location of the device such as the longitude, latitude, floor, and building. The relationship between the Received Signal Strengths (RSSs) of mobile devices and their corresponding locations is meant to be modelled; hence, subsequent locations of mobile devices can be predicted using the developed model. It is obvious that describing mathematical relationships between the RSSIs measurements and localization parameters is one option to modelling the problem, but the complexity of such an approach is a serious turn-off. In contrast, we propose an intelligent system that can learn the mapping of such RSSIs measurements to the localization parameters to be predicted. The system is capable of upgrading its performance as more experiential knowledge is acquired. The most appealing consideration to using such a system for this task is that complicated mathematical analysis and theoretical frameworks are excluded or not needed; the intelligent system on its own learns the underlying relationship in the supplied data (RSSI levels) that corresponds to the localization parameters. These localization parameters to be predicted are of two different tasks: Longitude and latitude of mobile devices are real values (regression problem), while the floor and building of the mobile devices are of integer values or categorical (classification problem). This research work presents artificial neural network based intelligent systems to model the relationship between the RSSIs predictors and the mobile device localization parameters. The designed systems were trained and validated on the collected WLAN fingerprint database. The trained networks were then tested with another supplied database to obtain the performance of trained systems on achieved Mean Absolute Error (MAE) and error rates for the regression and classification tasks involved therein.

Keywords: indoor localization, WLAN fingerprinting, neural networks, classification, regression

Procedia PDF Downloads 318
4284 Improving Security in Healthcare Applications Using Federated Learning System With Blockchain Technology

Authors: Aofan Liu, Qianqian Tan, Burra Venkata Durga Kumar

Abstract:

Data security is of the utmost importance in the healthcare area, as sensitive patient information is constantly sent around and analyzed by many different parties. The use of federated learning, which enables data to be evaluated locally on devices rather than being transferred to a central server, has emerged as a potential solution for protecting the privacy of user information. To protect against data breaches and unauthorized access, federated learning alone might not be adequate. In this context, the application of blockchain technology could provide the system extra protection. This study proposes a distributed federated learning system that is built on blockchain technology in order to enhance security in healthcare. This makes it possible for a wide variety of healthcare providers to work together on data analysis without raising concerns about the confidentiality of the data. The technical aspects of the system, including as the design and implementation of distributed learning algorithms, consensus mechanisms, and smart contracts, are also investigated as part of this process. The technique that was offered is a workable alternative that addresses concerns about the safety of healthcare while also fostering collaborative research and the interchange of data.

Keywords: data privacy, distributed system, federated learning, machine learning

Procedia PDF Downloads 91
4283 Excitation Density and Energy Dependent Relaxation Dynamics of Charge Carriers in Large Area 2D TMDCs

Authors: Ashish Soni, Suman Kalyan Pal

Abstract:

Transition metal dichalcogenides (TMDCs) are an emerging paradigm for the generation of advanced materials which are capable of utilizing in future device applications. In recent years TMDCs have attracted researchers for their unique band structure in monolayers. Large-area monolayers could become the most appropriate candidate for flexible and thin optoelectronic devices. For this purpose, it is crucial to understand the generation and transport of charge carriers in low dimensions. A deep understanding of photo-generated hot charges and trapped charges is essential to improve the performance of optoelectronic devices. Carrier trapping by the defect states that are introduced during the growth process of the monolayer could influence the dynamical behaviour of charge carriers. Herein, we investigated some aspects of the ultrafast evolution of the initially generated hot carriers and trapped charges in large-area monolayer WS₂ by measuring transient absorption at energies above and below the band gap energy. Our excitation density and energy-dependent measurements reveal the trapping of the initially generated charge carrier. Our results could be beneficial for the development of TMDC-based optoelectronic devices.

Keywords: transient absorption, optoelectronics, 2D materials, TMDCs, exciton

Procedia PDF Downloads 49
4282 Environmental Policy Instruments and Greenhouse Gas Emissions: VAR Analysis

Authors: Veronika Solilová, Danuše Nerudová

Abstract:

The paper examines the interaction between the environmental taxation, size of government spending on environmental protection and greenhouse gas emissions and gross inland energy consumption. The aim is to analyze the effects of environmental taxation and government spending on environmental protection as an environmental policy instruments on greenhouse gas emissions and gross inland energy consumption in the EU15. The empirical study is performed using a VAR approach with the application of aggregated data of EU15 over the period 1995 to 2012. The results provide the evidence that the reactions of greenhouse gas emission and gross inland energy consumption to the shocks of environmental policy instruments are strong, mainly in the short term and decay to zero after about 8 years. Further, the reactions of the environmental policy instruments to the shocks of greenhouse gas emission and gross inland energy consumption are also strong in the short term, however with the deferred effects. In addition, the results show that government spending on environmental protection together with gross inland energy consumption has stronger effect on greenhouse gas emissions than environmental taxes in EU15 over the examined period.

Keywords: VAR analysis, greenhouse gas emissions, environmental taxation, government spending

Procedia PDF Downloads 276
4281 Evaluation of Ecological Resilience in Mountain-plain Transition Zones: A Case Study of Dujiangyan City, Chengdu

Authors: Zhu Zhizheng, Huang Yong, Li Tong

Abstract:

In the context of land and space development and resource environmental protection. Due to its special geographical location, mountain-plain transition zones are limited by many factors such as topography, mountain forest protection, etc., and their ecology is also more sensitive, with the characteristics of disaster susceptibility and resource gradient. Taking Dujiangyan City, Chengdu as an example, this paper establishes resilience evaluation indicators on the basis of ecological suitability evaluation through the analysis of current situation data and relevant policies: water conservation evaluation, soil and water conservation evaluation, biodiversity evaluation, soil erosion sensitivity evaluation, etc. Based on GIS spatial analysis, the ecological suitability and resilience evaluation results of Dujiangyan city were obtained by disjunction operation. The ecological resilience level of Dujiangyan city was divided into three categories: high, medium and low, with an area ratio of 50.81%, 16.4% and 32.79%, respectively. This paper can provide ideas for solving the contradiction between man and land in the mountain-plain transition zones, and also provide a certain basis for the construction of regional ecological protection and the delineation of three zones and three lines.

Keywords: urban and rural planning, ecological resilience, dujiangyan city, mountain-plain transition zones

Procedia PDF Downloads 92
4280 Protection of Website Owners' Rights: Proportionality of Website Blocking in Russia and Beyond

Authors: Ekaterina Semenova

Abstract:

The article explores the issue of website owners’ liability for the illicit content. Whilst various issues of secondary liability of internet access providers for the illicit content have been widely discussed in the law doctrine, the liability of website owners has attracted less attention. Meanwhile, the website blocking injunctions influence website owners’ rights most, since website owners have the interest to keep their website online, rather than internet access providers. The discussion of internet access providers’ liability overshadows the necessity to protect the website owners’ rights to due process and proportionality of blocking injunctions. The analysis of Russian website blocking regulation and case law showed that the protection of website owners’ rights depends on the kind of illicit content: some content induces automatic blocking injunctions without prior notice of website owners and any opportunity to appeal, while other content does not invoke automatic blocking and provides an opportunity for the website owner to avoid or appeal an injunction. Comparative analysis of website blocking regulations in European countries reveals different approaches to the proportionality of website blocking and website owner’s rights protection. Based on the findings of the study, we conclude that the global trend to impose website blocking injunctions on wide range of illicit content without due process of law interferes with the rights of website owners.

Keywords: illicit content, liability, Russia, website blocking

Procedia PDF Downloads 331
4279 Study on Hysteresis in Sustainable Two-Layer Circular Tube under a Lateral Compression Load

Authors: Ami Nomura, Ken Imanishi, Yukinori Taniguchi, Etsuko Ueda, Tadahiro Wada, Shinichi Enoki

Abstract:

Recently, there have been a lot of earthquakes in Japan. It is necessary to promote seismic isolation devices for buildings. The devices have been hardly diffused in attached houses, because the devices are very expensive. We should develop a low-cost seismic isolation device for detached houses. We suggested a new seismic isolation device which uses a two-layer circular tube as a unit. If hysteresis is produced in the two-layer circular tube under lateral compression load, we think that the two-layer circular tube can have energy absorbing capacity. It is necessary to contact the outer layer and the inner layer to produce hysteresis. We have previously reported how the inner layer comes in contact with the outer layer from a perspective of analysis used mechanics of materials. We have clarified that the inner layer comes in contact with the outer layer under a lateral compression load. In this paper, we explored contact area between the outer layer and the inner layer under a lateral compression load by using FEA. We think that changing the inner layer’s thickness is effective in increase the contact area. In order to change the inner layer’s thickness, we changed the shape of the inner layer. As a result, the contact area changes depending on the inner layer’s thickness. Additionally, we experimented to check whether hysteresis occurs in fact. As a consequence, we can reveal hysteresis in the two-layer circular tube under the condition.

Keywords: contact area, energy absorbing capacity, hysteresis, seismic isolation device

Procedia PDF Downloads 341
4278 Cost-Benefit Analysis for the Optimization of Noise Abatement Treatments at the Workplace

Authors: Paolo Lenzuni

Abstract:

Cost-effectiveness of noise abatement treatments at the workplace has not yet received adequate consideration. Furthermore, most of the published work is focused on productivity, despite the poor correlation of this quantity with noise levels. There is currently no tool to estimate the social benefit associated to a specific noise abatement treatment, and no comparison among different options is accordingly possible. In this paper, we present an algorithm which has been developed to predict the cost-effectiveness of any planned noise control treatment in a workplace. This algorithm is based the estimates of hearing threshold shifts included in ISO 1999, and on compensations that workers are entitled to once their work-related hearing impairments have been certified. The benefits of a noise abatement treatment are estimated by means of the lower compensation costs which are paid to the impaired workers. Although such benefits have no real meaning in strictly monetary terms, they allow a reliable comparison between different treatments, since actual social costs can be assumed to be proportional to compensation costs. The existing European legislation on occupational exposure to noise it mandates that the noise exposure level be reduced below the upper action limit (85 dBA). There is accordingly little or no motivation for employers to sustain the extra costs required to lower the noise exposure below the lower action limit (80 dBA). In order to make this goal more appealing for employers, the algorithm proposed in this work also includes an ad-hoc element that promotes actions which bring the noise exposure down below 80 dBA. The algorithm has a twofold potential: 1) it can be used as a quality index to promote cost-effective practices; 2) it can be added to the existing criteria used by workers’ compensation authorities to evaluate the cost-effectiveness of technical actions, and support dedicated employers.

Keywords: cost-effectiveness, noise, occupational exposure, treatment

Procedia PDF Downloads 301
4277 Digital Immunity System for Healthcare Data Security

Authors: Nihar Bheda

Abstract:

Protecting digital assets such as networks, systems, and data from advanced cyber threats is the aim of Digital Immunity Systems (DIS), which are a subset of cybersecurity. With features like continuous monitoring, coordinated reactions, and long-term adaptation, DIS seeks to mimic biological immunity. This minimizes downtime by automatically identifying and eliminating threats. Traditional security measures, such as firewalls and antivirus software, are insufficient for enterprises, such as healthcare providers, given the rapid evolution of cyber threats. The number of medical record breaches that have occurred in recent years is proof that attackers are finding healthcare data to be an increasingly valuable target. However, obstacles to enhancing security include outdated systems, financial limitations, and a lack of knowledge. DIS is an advancement in cyber defenses designed specifically for healthcare settings. Protection akin to an "immune system" is produced by core capabilities such as anomaly detection, access controls, and policy enforcement. Coordination of responses across IT infrastructure to contain attacks is made possible by automation and orchestration. Massive amounts of data are analyzed by AI and machine learning to find new threats. After an incident, self-healing enables services to resume quickly. The implementation of DIS is consistent with the healthcare industry's urgent requirement for resilient data security in light of evolving risks and strict guidelines. With resilient systems, it can help organizations lower business risk, minimize the effects of breaches, and preserve patient care continuity. DIS will be essential for protecting a variety of environments, including cloud computing and the Internet of medical devices, as healthcare providers quickly adopt new technologies. DIS lowers traditional security overhead for IT departments and offers automated protection, even though it requires an initial investment. In the near future, DIS may prove to be essential for small clinics, blood banks, imaging centers, large hospitals, and other healthcare organizations. Cyber resilience can become attainable for the whole healthcare ecosystem with customized DIS implementations.

Keywords: digital immunity system, cybersecurity, healthcare data, emerging technology

Procedia PDF Downloads 46
4276 Externalised Migration Controls and the Deportation of Minors and Potential Refugees from Mexico

Authors: Vickie Knox

Abstract:

Since the ‘urgent humanitarian crisis’ of the arrival of tens of thousands of Central American minors at the Mexico-US border in early 2014, the USA has increasingly externalised migration controls to Mexico. Although the resulting policy ‘Plan Frontera Sur’ claimed to protect migrants’ human rights, it has manifested as harshly delivered in-country controls and an alarming increase in deportations, particularly of minors. This is of particular concern given the ongoing situation of forced migration caused by criminal violence in Central America because these deportations do not all comply with Mexico’s international obligations and with its own legal framework for international protection that allows inter alia verbal asylum claims and grants minors additional protection against deportation. Notably, the volume of deportations, the speed with which they are carried out and the lack of adequate screening indicate non-compliance with the principle of non-refoulement and the right to claim asylum or other forms of protection. Based on qualitative data gathered in fieldwork in 2015 and quantitative data covering the period 2014-2016, this research details three types of adverse outcome resulting from these externalised controls: human rights violations perpetrated in order to deliver the policy–namely, deportations that may not comply with the principle of non-refoulement or the protection of minors; human rights violations perpetrated in the execution of policy–such as violations by state actors during apprehension and detention; and adverse consequences of the policy – such as increased risk during transit. This research has particular resonance as the Trump era brings tighter enforcement in the region, and has broader relevance for the study of externalisation tools on a global level.

Keywords: deportation, externalisation, forced migration, non-refoulement

Procedia PDF Downloads 134
4275 Simple and Effective Method of Lubrication and Wear Protection

Authors: Buddha Ratna Shrestha, Jimmy Faivre, Xavier Banquy

Abstract:

By precisely controlling the molecular interactions between anti-wear macromolecules and bottle-brush lubricating molecules in the solution state, we obtained a fluid with excellent lubricating and wear protection capabilities. The reason for this synergistic behavior relies on the subtle interaction forces between the fluid components which allow the confined macromolecules to sustain high loads under shear without rupture. Our results provide rational guides to design such fluids for virtually any type of surfaces. The lowest friction coefficient and the maximum pressure that it can sustain is 5*10-3 and 2.5 MPa which is close to the physiological pressure. Lubricating and protecting surfaces against wear using liquid lubricants is a great technological challenge. Until now, wear protection was usually imparted by surface coatings involving complex chemical modifications of the surface while lubrication was provided by a lubricating fluid. Hence, we here research for a simple, effective and applicable solution to the above problem using surface force apparatus (SFA). SFA is a powerful technique with sub-angstrom resolution in distance and 10 nN/m resolution in interaction force while performing friction experiment. Thus, SFA is used to have the direct insight into interaction force, material and friction at interface. Also, we always know the exact contact area. From our experiments, we found that by precisely controlling the molecular interactions between anti-wear macromolecules and lubricating molecules, we obtained a fluid with excellent lubricating and wear protection capabilities. The reason for this synergistic behavior relies on the subtle interaction forces between the fluid components which allow the confined macromolecules to sustain high loads under shear without rupture. The lowest friction coefficient and the maximum pressure that it can sustain in our system is 5*10-3 and 2.5 GPA which is well above the physiological pressure. Our results provide rational guides to design such fluids for virtually any type of surfaces. Most importantly this process is simple, effective and applicable method of lubrication and protection as until now wear protection was usually imparted by surface coatings involving complex chemical modifications of the surface. Currently, the frictional data that are obtained while sliding the flat mica surfaces are compared and confirmed that a particular mixture of solution was found to surpass all other combination. So, further we would like to confirm that the lubricating and antiwear protection remains the same by performing the friction experiments in synthetic cartilages.

Keywords: bottle brush polymer, hyaluronic acid, lubrication, tribology

Procedia PDF Downloads 248