Search results for: protection.
1805 Technological Challenges for First Responders in Civil Protection; the RESPOND-A Solution
Authors: Georgios Boustras, Cleo Varianou Mikellidou, Christos Argyropoulos
Abstract:
Summer 2021 was marked by a number of prolific fires in the EU (Greece, Cyprus, France) as well as outside the EU (USA, Turkey, Israel). This series of dramatic events have stretched national civil protection systems and first responders in particular. Despite the introduction of National, Regional and International frameworks (e.g. rescEU), a number of challenges have arisen, not only related to climate change. RESPOND-A (funded by the European Commission by Horizon 2020, Contract Number 883371) introduces a unique five-tier project architectural structure for best associating modern telecommunications technology with novel practices for First Responders of saving lives, while safeguarding themselves, more effectively and efficiently. The introduced architecture includes Perception, Network, Processing, Comprehension, and User Interface layers, which can be flexibly elaborated to support multiple levels and types of customization, so, the intended technologies and practices can adapt to any European Environment Agency (EEA)-type disaster scenario. During the preparation of the RESPOND-A proposal, some of our First Responder Partners expressed the need for an information management system that could boost existing emergency response tools, while some others envisioned a complete end-to-end network management system that would offer high Situational Awareness, Early Warning and Risk Mitigation capabilities. The intuition behind these needs and visions sits on the long-term experience of these Responders, as well, their smoldering worry that the evolving threat of climate change and the consequences of industrial accidents will become more frequent and severe. Three large-scale pilot studies are planned in order to illustrate the capabilities of the RESPOND-A system. The first pilot study will focus on the deployment and operation of all available technologies for continuous communications, enhanced Situational Awareness and improved health and safety conditions for First Responders, according to a big fire scenario in a Wildland Urban Interface zone (WUI). An important issue will be examined during the second pilot study. Unobstructed communication in the form of the flow of information is severely affected during a crisis; the flow of information between the wider public, from the first responders to the public and vice versa. Call centers are flooded with requests and communication is compromised or it breaks down on many occasions, which affects in turn – the effort to build a common operations picture for all firstr esponders. At the same time the information that reaches from the public to the operational centers is scarce, especially in the aftermath of an incident. Understandably traffic if disrupted leaves no other way to observe but only via aerial means, in order to perform rapid area surveys. Results and work in progress will be presented in detail and challenges in relation to civil protection will be discussed.Keywords: first responders, safety, civil protection, new technologies
Procedia PDF Downloads 1431804 Adopting the Community Health Workers Master List Registry for Community Health Workforce in Kenya
Authors: Gikunda Aloise, Mjema Saida, Barasa Herbert, Wanyungu John, Kimani Maureen
Abstract:
Background: Community Health Workforce (CHW) is health care providers at the community level (Level 1) and serves as a bridge between the community and the formal healthcare system. This human resource has enormous potential to extend healthcare services and ensures that the vulnerable, marginalized, and hard-to-reach populations have access to quality healthcare services at the community and primary health facility levels. However, these cadres are neither recognized, remunerated, nor in most instances, registered in a master list. Management and supervision of CHWs is not easy if their individual demographics, training capacity and incentives is not well documented through a centralized registry. Description: In February 2022, Amref supported the Kenya Ministry of Health in developing a community health workforce database called Community Health Workers Master List Registry (CHWML), which is hosted in Kenya Health Information System (KHIS) tracker. CHW registration exercise was through a sensitization meeting conducted by the County Community Health Focal Person for the Sub-County Community Health Focal Person and Community Health Assistants who uploaded information on individual demographics, training undertaken and incentives received by CHVs. Care was taken to ensure compliance with Kenyan laws on the availability and use of personal data as prescribed by the Data Protection Act, 2019 (DPA). Results and lessons learnt: By June 2022, 80,825 CHWs had been registered in the system; 78,174 (96%) CHVs and 2,636 (4%) CHAs. 25,235 (31%) are male, 55,505 (68%) are female & 85 (1%) are transgender. 39,979. (49%) had secondary education and 2500 (3%) had no formal education. Only 27 641 (34%) received a monthly stipend. 68,436 CHVs (85%) had undergone basic training. However, there is a need to validate the data to align with the current situation in the counties. Conclusions/Next steps: The use of CHWML will unlock opportunities for building more resilient and sustainable health systems and inform financial planning, resource allocation, capacity development, and quality service delivery. The MOH will update the CHWML guidelines in adherence to the data protection act which will inform standard procedures for maintaining, updating the registry and integrate Community Health Workforce registry with the HRH system.Keywords: community health registry, community health volunteers (CHVs), community health workers masters list (CHWML), data protection act
Procedia PDF Downloads 1431803 Study of the Protection of Induction Motors
Authors: Bencheikh Abdellah
Abstract:
In this paper, we present a mathematical model dedicated to the simulation breaks bars in a three-phase cage induction motor. This model is based on a mesh circuit representing the rotor cage. The tested simulation allowed us to demonstrate the effectiveness of this model to describe the behavior of the machine in a healthy state, failure.Keywords: AC motors, squirrel cage, diagnostics, MATLAB, SIMULINK
Procedia PDF Downloads 4381802 Thermal Securing of Electrical Contacts inside Oil Power Transformers
Authors: Ioan Rusu
Abstract:
In the operation of power transformers of 110 kV/MV from substations, these are traveled by fault current resulting from MV line damage. Defect electrical contacts are heated when they are travelled from fault currents. In the case of high temperatures when 135 °C is reached, the electrical insulating oil in the vicinity of the electrical faults comes into contact with these contacts releases gases, and activates the electrical protection. To avoid auto-flammability of electro-insulating oil, we designed a security system thermal of electrical contact defects by pouring fire-resistant polyurethane foam, mastic or mortar fire inside a cardboard electro-insulating cylinder. From practical experience, in the exploitation of power transformers of 110 kV/MT in oil electro-insulating were recorded some passing disconnecting commanded by the gas protection at internal defects. In normal operation and in the optimal load, nominal currents do not require thermal secure contacts inside electrical transformers, contacts are made at the fabrication according to the projects or to repair by solder. In the case of external short circuits close to the substation, the contacts inside electrical transformers, even if they are well made in sizes of Rcontact = 10‑6 Ω, are subjected to short-circuit currents of the order of 10 kA-20 kA which lead to the dissipation of some significant second-order electric powers, 100 W-400 W, on contact. At some internal or external factors which action on electrical contacts, including electrodynamic efforts at short-circuits, these factors could be degraded over time to values in the range of 10-4 Ω to 10-5 Ω and if the action time of protection is great, on the order of seconds, power dissipation on electrical contacts achieve high values of 1,0 kW to 40,0 kW. This power leads to strong local heating, hundreds of degrees Celsius and can initiate self-ignition and burning oil in the vicinity of electro-insulating contacts with action the gas relay. Degradation of electrical contacts inside power transformers may not be limited for the duration of their operation. In order to avoid oil burn with gas release near electrical contacts, at short-circuit currents 10 kA-20 kA, we have outlined the following solutions: covering electrical contacts in fireproof materials that would avoid direct burn oil at short circuit and transmission of heat from electrical contact along the conductors with heat dissipation gradually over time, in a large volume of cooling. Flame retardant materials are: polyurethane foam, mastic, cement (concrete). In the normal condition of operation of transformer, insulating of conductors coils is with paper and insulating oil. Ignition points of its two components respectively are approximated: 135 °C heat for oil and 200 0C for paper. In the case of a faulty electrical contact, about 10-3 Ω, at short-circuit; the temperature can reach for a short time, a value of 300 °C-400 °C, which ignite the paper and also the oil. By burning oil, there are local gases that disconnect the power transformer. Securing thermal electrical contacts inside the transformer, in cardboard tube with polyurethane foams, mastik or cement, ensures avoiding gas release and also gas protection working.Keywords: power transformer, oil insulatation, electric contacts, Bucholtz relay
Procedia PDF Downloads 1581801 The Application of Animal Welfare Certification System for Farm Animal in South Korea
Authors: Ahlyum Mun, Ji-Young Moon, Moon-Seok Yoon, Dong-Jin Baek, Doo-Seok Seo, Oun-Kyong Moon
Abstract:
There is a growing public concern over the standards of farm animal welfare, with higher standards of food safety. In addition, the recent low incidence of Avian Influenza in laying hens among certificated farms is receiving attention. In this study, we introduce animal welfare systems covering the rearing, transport and slaughter of farm animals in South Korea. The concepts of animal welfare farm certification are based on ensuring the five freedoms of animal. The animal welfare is also achieved by observing the condition of environment including shelter and resting area, feeding and water and the care for the animal health. The certification of farm animal welfare is handled by the Animal Protection & Welfare Division of Animal and Plant Quarantine Agency (APQA). Following the full amendment of Animal Protection Law in 2011, animal welfare farm certification program has been implemented since 2012. The certification system has expanded to cover laying hen, swine, broiler, beef cattle and dairy cow, goat and duck farms. Livestock farmers who want to be certified must apply for certification at the APQA. Upon receipt of the application, the APQA notifies the applicant of the detailed schedule of the on-site examination after reviewing the document and conducts the on-site inspection according to the evaluation criteria of the welfare standard. If the on-site audit results meet the certification criteria, APQA issues a certificate. The production process of certified farms is inspected at least once a year for follow-up management. As of 2017, a total of 145 farms have been certified (95 laying hen farms, 12 swine farms, 30 broiler farms and 8 dairy cow farms). In addition, animal welfare transportation vehicles and slaughterhouses have been designated since 2013 and currently 6 slaughterhouses have been certified. Animal Protection Law has been amended so that animal welfare certification marks can be affixed only to livestock products produced by animal welfare farms, transported through animal welfare vehicles and slaughtered at animal welfare slaughterhouses. The whole process including rearing–transportation- slaughtering completes the farm animal welfare system. APQA established its second 5-year animal welfare plan (2014-2019) that includes setting a minimum standard of animal welfare applicable to all livestock farms, transportation vehicles and slaughterhouses. In accordance with this plan, we will promote the farm animal welfare policy in order to truly advance the Korean livestock industry.Keywords: animal welfare, farm animal, certification system, South Korea
Procedia PDF Downloads 4011800 Nanoparticle Based Green Inhibitor for Corrosion Protection of Zinc in Acidic Medium
Authors: Neha Parekh, Divya Ladha, Poonam Wadhwani, Nisha Shah
Abstract:
Nano scaled materials have attracted tremendous interest as corrosion inhibitor due to their high surface area on the metal surfaces. It is well known that the zinc oxide nanoparticles have higher reactivity towards aqueous acidic solution. This work presents a new method to incorporate zinc oxide nanoparticles with white sesame seeds extract (nano-green inhibitor) for corrosion protection of zinc in acidic medium. The morphology of the zinc oxide nanoparticles was investigated by TEM and DLS. The corrosion inhibition efficiency of the green inhibitor and nano-green inhibitor was determined by Gravimetric and electrochemical impedance spectroscopy (EIS) methods. Gravimetric measurements suggested that nano-green inhibitor is more effective than green inhibitor. Furthermore, with the increasing temperature, inhibition efficiency increases for both the inhibitors. In addition, it was established the Temkin adsorption isotherm fits well with the experimental data for both the inhibitors. The effect of temperature and Temkin adsorption isotherm revealed Chemisorption mechanism occurring in the system. The activation energy (Ea) and other thermodynamic parameters for inhibition process were calculated. The data of EIS showed that the charge transfer controls the corrosion process. The surface morphology of zinc metal (specimen) in absence and presence of green inhibitor and nano-green inhibitor were performed using Scanning Electron Microscopy (SEM) and Atomic Force Microscopy (AFM) techniques. The outcomes indicated a formation of a protective layer over zinc metal (specimen).Keywords: corrosion, green inhibitor, nanoparticles, zinc
Procedia PDF Downloads 4541799 Subway Stray Current Effects on Gas Pipelines in the City of Tehran
Authors: Mohammad Derakhshani, Saeed Reza Allahkarama, Michael Isakhani-Zakaria, Masoud Samadian, Hojjat Sharifi Rasaey
Abstract:
In order to investigate the effects of stray current from DC traction systems (subway) on cathodically protected gas pipelines, the subway and the gas network maps in the city of Tehran were superimposed and a comprehensive map was prepared. 213 intersections and about 100150 meters of parallel sections of gas pipelines were found with respect to the railway right of way which was specified for field measurements. The potential measurements data were logged for one hour in each test point. 24-hour potential monitoring was carried out in selected test points as well. Results showed that dynamic stray current from subway on pipeline potential appears as fluctuations in its static potential that is visible in the diagrams during night periods. These fluctuations can cause the pipeline potential to exit the safe zone and lead to corrosion or overprotection. In this study, a maximum potential shift of 100 mv in the pipe-to-soil potential was considered as a criterion for dynamic stray current effective presence. Results showed that a potential fluctuation range between 100 mV to 3 V exists in measured points on pipelines which exceeds the proposed criterion and needs to be investigated. Corrosion rates influenced by stray currents were calculated using coupons. Results showed that coupon linked to the pipeline in one of the locations at region 1 of the city of Tehran has a corrosion rate of 4.2 mpy (with cathodic protection and under influence of stray currents) which is about 1.5 times more than free corrosion rate of 2.6 mpy.Keywords: stray current, DC traction, subway, buried Pipelines, cathodic protection list
Procedia PDF Downloads 8241798 Calculation of Solar Ultraviolet Irradiant Exposure of the Cornea through Sunglasses
Authors: Mauro Masili, Fernanda O. Duarte, Liliane Ventura
Abstract:
Ultraviolet (UV) radiation is electromagnetic waves from 100 – 400 nm wavelength. The World Health Organization and the International Commission on Non-Ionizing Radiation Protection (ICNIRP) recommend guidelines on the exposure of the eyes to UV radiation because it is correlated to ophthalmic diseases. Those exposure limits for an 8-h period are 1) UV radiant exposure should not exceed 30 J/m2 when irradiance is spectrally weighted using an actinic action spectrum; 2) unweighted radiant exposure in the UV-A spectral region 315 – 400 nm should not exceed 10 kJ/m2. Sunglasses play an important role in preventing eye injuries related to Sun exposure. We have calculated the direct and diffuse solar UV irradiance in a geometry that refers to an individual wearing a sunglass, in which the solar rays strike on a vertical surface. The diffuse rays are those scattered from the atmosphere and from the local environment. The calculations used the open-source SMARTS2 spectral model, in which we assumed a clear sky condition, aside from information about site location, date, time, ozone column, aerosols, and turbidity. In addition, we measured the spectral transmittance of a typical sunglasses lens and the global solar irradiance was weighted with the spectral transmittance profile of the lens. The radiant exposure incident on the eye’s surface was calculated in the UV and UV-A ranges following the ICNIRP’s recommendations for each day of the year. The tested lens failed the UV-A safe limit, while the UV limit failed to comply with this limit after the aging process. Hence, the ICNIRP safe limits should be considered in the standards to increase the protection against UV radiation on the eye.Keywords: ICNIRP safe limits, ISO-12312-1, sunglasses, ultraviolet radiation
Procedia PDF Downloads 931797 Assessment of Solid Waste Management in General Mohammed Inuwa Wushishi Housing Estate, Minna, Niger State, Nigeria
Authors: Garba Inuwa Kuta, Mohammed, Adamu, Mohammed Ahmed Emigilati, Ibrahim Ishiaku, Kudu Dangana
Abstract:
The study sought to identify the problems of solid waste management in General Mohammed InuwaWushishi Housing Estate. The two broad types of data, the secondary and primary data were used in the study. Questionnaires and personal observations were also used to collect some of the data. Factors impeding the effective and efficient solid waste management were identified. The study revealed that sacks disposal method and open dumping are the most commonly used method of disposal, about 30.0% of the respondent use sacks disposal method in the estate while 24.9% dump their refuse on the floor. Wrong attitudes and perceptions of the people about sanitation issues contributed to solid waste management problems of General Mohammed InuwaWushishi Housing Estate. Majority of the households did not educate their members on the need to clean their surroundings and refuse to buy drum for waste disposal from Niger State Environmental Protection Agency (NISEPA) on the basis that the drums are expensive. Virtually, all the people depended on Niger State Environmental Protection Agency (NISEPA) facilities for the disposal of their household refuse. Solid waste management problems were partly the results of NISEPA’s inability to cope with the situation because of lack of equipment. It was recommended that there should be an increase in enlightenment to the people on domestic waste disposal to keep the surroundings clean.Keywords: housing estate, assessment, solid waste, disposal, management
Procedia PDF Downloads 6551796 Geographical Indication Protection for Agricultural Products: Contribution for Achieving Food Security in Indonesia
Authors: Mas Rahmah
Abstract:
Indonesia is the most populous Southeast Asian nations, as Indonesia`s population is constantly growing, food security has become a crucial trending issue. Although Indonesia has more than enough natural resources and agricultural products to ensure food security for all, Indonesia is still facing the problem of food security because of adverse weather conditions, increasing population, political instability, economic factors (unemployment, rising food prices), and the dependent system of agriculture. This paper will analyze that Geographical Indication (GI) can aid in transforming Indonesian agricultural-dependent system by tapping the unique product attributes of their quality products since Indonesia has a lot of agricultural products with unique quality and special characteristic associated with geographical factors such as Toraja Coffee, Alor Vanili, Banda Nutmeg, Java Tea, Deli Tobacco, Cianjur Rise etc. This paper argues that the reputation and agricultural products and their intrinsic quality should be protected under GI because GI will provide benefit supporting the food security program. Therefore, this paper will expose the benefit of GI protection such as increasing productivity, improving the exports of GI products, creating employment, adding economic value to products, and increasing the diversity of supply of natural and unique quality products, etc. that can contribute to food security. The analysis will finally conclude that the scenario of promoting GI may indirectly contribute to food security through adding value by incorporating territory specific cultural, environmental and social qualities into production, processing and developing of unique local, niche and special agricultural products.Keywords: geographical indication, food security, agricultural product, Indonesia
Procedia PDF Downloads 3691795 From Protection of Sacrificial Self, to Critical Turning Points and Growth: Nurses’ Experiences of Caring for Patients on the Frontline in Ireland during the COVID-19 Pandemic
Authors: Sinead Creedon, Anna Trace
Abstract:
Nurses were the most exposed of all frontline healthcare workers during the COVID-19 pandemic. Mainly female nurses working in the acute hospital sector formed the frontline defence in the Irish health service. They faced it with resilience and courage despite exposure to risk of burnout and threats to their mental health and wellbeing. Gaining an understanding of the nurses’ journey in adapting to this harsh climate could inform positive psychology interventions and / or support staff such as senior hospital managers in an adverse work situation. Furthermore, it would strengthen our insight and theoretical understanding on the use of positive psychology interventions in adverse work conditions. An interpretative phenomenological analysis was carried out to gain insight into how nurses adapted to the changing work environment during the pandemic. Online semi-structured interviews were done with six experienced female nurses who were all redeployed to the frontline from their own roles. The three themes representing the nurses’ journey were the Protection of Sacrificial Self, The Fortifying Effect of Us, and Critical Turning Points & Growth. Nurses revitalised themselves by creating a sense of ‘us’ to help them face a harsh climate against others, which enabled additional critical turning points. This study further enriches our understanding of personal growth and trauma in adverse work conditions by including an exploration of what sacrificial commitment adds to our understanding of physical and moral courage.Keywords: COVID-19, nurses, positive psychology, resilience, sacrificial commitment, supports
Procedia PDF Downloads 1491794 Development of Orthogonally Protected 2,1':4,6-Di-O-Diisopropylidene Sucrose as the Versatile Intermediate for Diverse Synthesis of Phenylpropanoid Sucrose Esters
Authors: Li Lin Ong, Duc Thinh Khong, Zaher M. A. Judeh
Abstract:
Phenylpropanoid sucrose esters (PSEs) are natural compounds found in various medicinal plants which exhibit important biological activities such as antiproliferation and α- and β-glucosidase inhibitory activities. Despite their potential as new therapeutics, total synthesis of PSEs has been very limited as their inherent structures contain one or more (substituted) cinnamoyl groups randomly allocated on the sucrose core via ester linkage. Since direct acylation of unprotected sucrose would be complex and tedious due to the presence of eight free hydroxyl groups, partially protected 2,1’:4,6-di-O-diisopropylidene sucrose was used as the starting material instead. However, similar reactivity between the remaining four hydroxyl groups still pose a challenge in the total synthesis of PSEs as the lack of selectivity can restrict customisation where acylation at specific OH is desired. To overcome this problem, a 4-step orthogonal protection scheme was developed. In this scheme, the remaining four hydroxyl groups on 2,1’:4,6-di-O-diisopropylidene sucrose, 6’-OH, 3’-OH, 4’-OH, and 3-OH, were protected with different protecting groups with an overall yield of > 40%. This orthogonally protected intermediate would provide a convenient and divergent access to a wider range of natural and synthetic PSEs as (substituted) cinnamoyl groups can be selectively introduced at desired positions. Using this scheme, three different series of monosubstituted PSEs were successfully synthesized where (substituted) cinnamoyl groups were introduced selectively at O-3, O-3’, and O-4’ positions, respectively. The expanded library of PSEs would aid in structural-activity relationship study of PSEs for identifying key components responsible for their biological activities.Keywords: orthogonal protection, phenylpropanoid sucrose esters, selectivity, sucrose
Procedia PDF Downloads 1591793 Thermal Method for Testing Small Chemisorbent Samples on the Base of Potassium Superoxide
Authors: Pavel V. Balabanov, Daria A. Liubimova, Aleksandr P. Savenkov
Abstract:
The increase of technogenic and natural accidents, accompanied by air pollution, for example, by combustion products, leads to the necessity of respiratory protection. This work is devoted to the development of a calorimetric method and a device which allow investigating quickly the kinetics of carbon dioxide sorption by chemo-sorbents on the base of potassium superoxide in order to assess the protective properties of respiratory protective closed-circuit apparatus. The features of the traditional approach for determining the sorption properties in a thin layer of chemo-sorbent are described, as well as methods and devices, which can be used for the sorption kinetics study. The authors of the paper developed an approach (as opposed to the traditional approach) based on the power measurement of internal heat sources in the chemo-sorbent layer. The emergence of the heat sources is a result of the exothermic reaction of carbon dioxide sorption. This approach eliminates the necessity of chemical analysis of samples and can significantly reduce the time and material expenses during chemo-sorbents testing. The error of determining the volume fraction of adsorbed carbon dioxide by the developed method does not exceed 12%. Taking into account the efficiency of the method, we consider that it is a good alternative to traditional methods of chemical analysis under the assessment of the protection sorbents quality.Keywords: carbon dioxide chemisorption, exothermic reaction, internal heat sources, respiratory protective apparatus
Procedia PDF Downloads 4081792 The Spatial Analysis of Wetland Ecosystem Services Valuation on Flood Protection in Tone River Basin
Authors: Tingting Song
Abstract:
Wetlands are significant ecosystems that provide a variety of ecosystem services for humans, such as, providing water and food resources, purifying water quality, regulating climate, protecting biodiversity, and providing cultural, recreational, and educational resources. Wetlands also provide benefits, such as reduction of flood, storm damage, and soil erosion. The flood protection ecosystem services of wetlands are often ignored. Due to climate change, the flood caused by extreme weather in recent years occur frequently. Flood has a great impact on people's production and life with more and more economic losses. This study area is in the Tone river basin in the Kanto area, Japan. It is the second-longest river with the largest basin area in Japan, and it is still suffering heavy economic losses from floods. Tone river basin is one of the rivers that provide water for Tokyo and has an important impact on economic activities in Japan. The purpose of this study was to investigate land-use changes of wetlands in the Tone River Basin, and whether there are spatial differences in the value of wetland functions in mitigating economic losses caused by floods. This study analyzed the land-use change of wetland in Tone River, based on the Landsat data from 1980 to 2020. Combined with flood economic loss, wetland area, GDP, population density, and other social-economic data, a geospatial weighted regression model was constructed to analyze the spatial difference of wetland ecosystem service value. Now, flood protection mainly relies on such a hard project of dam and reservoir, but excessive dependence on hard engineering will cause the government huge financial pressure and have a big impact on the ecological environment. However, natural wetlands can also play a role in flood management, at the same time they can also provide diverse ecosystem services. Moreover, the construction and maintenance cost of natural wetlands is lower than that of hard engineering. Although it is not easy to say which is more effective in terms of flood management. When the marginal value of a wetland is greater than the economic loss caused by flood per unit area, it may be considered to rely on the flood storage capacity of the wetland to reduce the impact of the flood. It can promote the sustainable development of wetlands ecosystem. On the other hand, spatial analysis of wetland values can provide a more effective strategy for flood management in the Tone river basin.Keywords: wetland, geospatial weighted regression, ecosystem services, environment valuation
Procedia PDF Downloads 1011791 Water Quality and Coastal Management Profile Assessment of Puerto Galera Bay, Philippines
Authors: Ma. Manna Farrel B. Pinto
Abstract:
As global industrialization progresses, the environment remains to be at risk of disturbances brought by developments of cities and communities. Impacts of flourishing industries such as tourism require rapid growth of establishments and may threaten ecosystems and natural resources. Puerto Galera as a biosphere reserve and declared as the Center of the World’s Center of Marine Shorefish Biodiversity is on the brink of ecological deterioration as tourism further develops in its coastal areas. Apparently, attempts were initiated to establish a baseline for designation of protection in the economic and coastal marine zones of Puerto Galera but continuity of its implementation and coordination of concerned units remains deficient. Indications of eutrophication have been observed based on water quality analysis although parameter values still comply with the national standards for coastal waters. Water quality data, biodiversity and hydrodynamic information, gathered from studies, and local government units were analysed to assess the condition of the coast as well as acting policies implemented by the local authorities. Sources of contaminants were also located in its three main communities, and their shores wherein in recommendations for installing wastewater treatment facilities and further improvement of policies of waste discharge must be addressed. With a conceptual framework proposed in the study, a comprehensive data analysis and coordinated management are necessary to form an integrated coastal management for further protection and preservation of the sustainable coastal marine ecosystem of Puerto Galera.Keywords: coastal management, environmental management, integrated resource management, Puerto Galera
Procedia PDF Downloads 2671790 A Pathway to Sustainable Agriculture through Protection and Propagation of Indigenous Livestock Breeds of Pakistan-Cholistani Cattle as a Case Study
Authors: Umer Farooq
Abstract:
The present work is being presented with a general aim of highlighting the role of protection/propagation of indigenous breeds of livestock in an area as a sustainable tool for poverty alleviation. Specifically, the aim is to introduce a formerly neglected Cholistani breed of cattle being reared by the Cholistani desert nomads of Pakistan. The said work will present a detaile account of research work conducted during the last five years by the author. Furthermore, it will present the performance (productive and reproductive traits) of this breed as being reared under various nomadic systems of the desert. Results will be deducted on the basis of the research work conducted on Cholistani cattle and keeping abreast the latest reforms being provided by the Food and Agriculture Organization (FAO) and World Initiative to Support Pastoralism (WISP) of the UN. The timely attention towards the protection and propagation of this neglected breed of cattle will pave a smoother way towards poverty alleviation of rural/suburban areas and a successful sustainable agriculture in low input production systems such as Pakistan. The 15 recognized indigenous breeds of cattle constitute 43% of the total livestock population in Pakistan and belong to Zebu cattle. These precious breeds are currently under threat and might disappear even before proper documentation until and unless streamlined efforts are diverted towards them. This horrific state is due to many factors such as epidemic diseases, urbanization, indiscriminate crossing with native stock, misdirected cross breeding with exotic stock/semen, inclined livestock systems from extensive (subsistence) to intensive (commercial), lack of valuation of local breeds, decreasing natural resources, environmental degradation and global warming. Hefty work has been documented on many aspects of Sahiwal and Red Sindhi breeds of cattle in their respective local climates which have rightly gained them an international fame as being the vital tropical milk breeds of Pakistan. However, many other indigenous livestock breeds such as Cholistani cattle being reared under pastoral systems of Cholistan are yet unexplored. The productive and reproductive traits under their local climatic conditions need to be studied and the future researches may be streamlined to manipulate their indigenous potential. The timely attention will pave a smoother way towards poverty alleviation of rural/suburban areas and a successful sustainable agriculture in low input production systems.Keywords: Cholistan desert, Pakistan, indigenous cattle, Sahiwal cattle, pastoralism
Procedia PDF Downloads 5571789 Identification of Watershed Landscape Character Types in Middle Yangtze River within Wuhan Metropolitan Area
Authors: Huijie Wang, Bin Zhang
Abstract:
In China, the middle reaches of the Yangtze River are well-developed, boasting a wealth of different types of watershed landscape. In this regard, landscape character assessment (LCA) can serve as a basis for protection, management and planning of trans-regional watershed landscape types. For this study, we chose the middle reaches of the Yangtze River in Wuhan metropolitan area as our study site, wherein the water system consists of rich variety in landscape types. We analyzed trans-regional data to cluster and identify types of landscape characteristics at two levels. 55 basins were analyzed as variables with topography, land cover and river system features in order to identify the watershed landscape character types. For watershed landscape, drainage density and degree of curvature were specified as special variables to directly reflect the regional differences of river system features. Then, we used the principal component analysis (PCA) method and hierarchical clustering algorithm based on the geographic information system (GIS) and statistical products and services solution (SPSS) to obtain results for clusters of watershed landscape which were divided into 8 characteristic groups. These groups highlighted watershed landscape characteristics of different river systems as well as key landscape characteristics that can serve as a basis for targeted protection of watershed landscape characteristics, thus helping to rationally develop multi-value landscape resources and promote coordinated development of trans-regions.Keywords: GIS, hierarchical clustering, landscape character, landscape typology, principal component analysis, watershed
Procedia PDF Downloads 2321788 Beware the Trolldom: Speculative Interests and Policy Implications behind the Circulation of Damage Claims
Authors: Antonio Davola
Abstract:
Moving from the evaluations operated by Richard Posner in his judgment on the case Carhart v. Halaska, the paper seeks to analyse the so-called ‘litigation troll’ phenomenon and the development of a damage claims market, i.e. a market in which the right to propose claims is voluntary exchangeable for money and can be asserted by private buyers. The aim of our study is to assess whether the implementation of a ‘damage claims market’ might represent a resource for victims or if, on the contrary, it might operate solely as a speculation tool for private investors. The analysis will move from the US experience, and will then focus on the EU framework. Firstly, the paper will analyse the relation between the litigation troll phenomenon and the patent troll activity: even though these activities are considered similar by Posner, a comparative study shows how these practices significantly differ in their impact on the market and on consumer protection, even moving from similar economic perspectives. The second part of the paper will focus on the main specific concerns related to the litigation trolling activity. The main issues that will be addressed are the risk that the circulation of damage claims might spur non-meritorious litigation and the implications of the misalignment between the victim of a tort and the actual plaintiff in court arising from the sale of a claim. In its third part, the paper will then focus on the opportunities and benefits that the introduction and regulation of a claims market might imply both for potential claims sellers and buyers, in order to ultimately assess whether such a solution might actually increase individual’s legal empowerment. Through the damage claims market compensation would be granted more quickly and easily to consumers who had suffered harm: tort victims would, in fact, be compensated instantly upon the sale of their claims without any burden of proof. On the other hand, claim-buyers would profit from the gap between the amount that a consumer would accept for an immediate refund and the compensation awarded in court. In the fourth part of the paper, the analysis will focus on the legal legitimacy of the litigation trolling activity in the US and the EU framework. Even though there is no express provision that forbids the sale of the right to pursue a claim in court - or that deems such a right to be non-transferable – procedural laws of single States (especially in the EU panorama) must be taken into account in evaluating this aspect. The fifth and final part of the paper will summarize the various data collected to suggest an evaluation on if, and through which normative solutions, the litigation trolling might comport benefits for competition and which would be its overall effect over consumer’s protection.Keywords: competition, claims, consumer's protection, litigation
Procedia PDF Downloads 2311787 Bring Your Own Device Security Model in a Financial Institution of South Africa
Authors: Michael Nthabiseng Moeti, Makhulu Relebogile Langa, Joey Jansen van Vuuren
Abstract:
This paper examines the utilization of personal electronic devices like laptops, tablets, and smartphones for professional duties within a financial organization. This phenomenon is known as bring your own device (BYOD). BYOD accords employees the freedom to use their personal devices to access corporate resources from anywhere in the world with Internet access. BYOD arrangements introduce significant security risks for both organizations and users. These setups change the threat landscape for enterprises and demand unique security strategies, as conventional tools tailored for safeguarding managed devices fall short in adequately protecting enterprise assets without active user cooperation. This paper applies protection motivation theory (PMT) to highlight behavioral risks from BYOD users that may impact the security of financial institutions. Thematic analysis was applied to gain a comprehensive understanding of how users perceive this phenomenon. These findings demonstrates that the existence of a security policy does not ensure that all employees will take measures to protect their personal devices. Active promotion of BYOD security policies is crucial for financial institution employees and management. This paper developed a BYOD security model which is useful for understanding compliant behaviors. Given that BYOD security is becoming a major concern across financial sector, it is important. The paper recommends that future research could expand the number of universities from which data is collected.Keywords: BYOD, information security, protection motivation theory, security risks, thematic analysis
Procedia PDF Downloads 331786 Evaluation of the Anti Ulcer Activity of Ethyl Acetate Fraction of Methanol Leaf Extract of Clerodendrum Capitatum
Authors: M. N. Ofokansi, Onyemelukwe Chisom, Amauche Chukwuemeka, Ezema Onyinye
Abstract:
The leaves of Clerodendrumcapitatum(Lamiaceae) is mostly used in the treatment of gastric ulcer in Nigerian folk medicine. The aim of this study was to evaluate the antiulcer activity of its crude methanol leaf extract and its ethyl acetate fraction in white albino rats. The effect of crude methanol leaf extract and its ethyl acetate fraction(250mg/kg, 500mg/kg) was evaluated using an absolute ethanol induced ulcer model. Crude methanol leaf extract and the ethyl acetate fraction was treated with distilled water and 6% Tween 80, respectively. crude methanol leaf extract was further investigated using a pylorus ligation induced ulcer model. Omeprazole was used as the standard treatment. Four groups of five albino rats of either sex were used. Parameters such as mean ulcer index and percentage ulcer protection were assessed in the ethanol-induced ulcer model, while the gastric volume, pH, and total acidity were assessed in the pyloric ligation induced ulcer model. Crude methanol leaf extract of Clerodendrumcapitatum(500mg/kg) showed a very highly significant reduction in mean ulcer index(p<0.001) in the absolute ethanol-induced model. ethyl acetate fraction of crude methanol leaf extract of Clerodendrumcapitatum(250mg/kg,500mg/kg) showed a very highly significant dose-dependent reduction in mean ulcer indices (p<0.001) in the absolute ethanol-induced model. The mean ulcer indices (1.6,2.2) with dose concentration (250mg/kg, 500mg/kg) of ethyl acetate fraction increased with ulcer protection (82.85%,76.42%) respectively when compared to the control group in the absolute ethanol-induced ulcer model. Crude methanol leaf extract of Clerodendrumcapitatum(250mg/kg, 500mg/kg) treated animals showed a highly significant dose-dependent reduction in mean ulcer index(p<0.01) with an increase in ulcer protection (56.77%,63.22%) respectively in pyloric ligated induced, ulcer model. Gastric parameters such as volume of gastric juice, pH, and total acidity were of no significance in the different doses of the crude methanol leaf extract when compared to the control group. The phytochemical investigation showed that the crude methanol leaf extracts Possess Saponins and Flavonoids while its ethyl acetate fraction possess only Flavonoids. The results of the study indicate that the crude methanol leaf extract and its ethyl acetate fraction is effective and has gastro protective and ulcer healing capacity. Ethyl acetate fraction is more potent than crude methanol leaf extract against ethanol-induced This result provides scientific evidence as a validation for its folkloric use in the treatment of gastric ulcer.Keywords: gastroprotective, herbal medicine, anti-ulcer, pharmacology
Procedia PDF Downloads 1651785 Methods and Algorithms of Ensuring Data Privacy in AI-Based Healthcare Systems and Technologies
Authors: Omar Farshad Jeelani, Makaire Njie, Viktoriia M. Korzhuk
Abstract:
Recently, the application of AI-powered algorithms in healthcare continues to flourish. Particularly, access to healthcare information, including patient health history, diagnostic data, and PII (Personally Identifiable Information) is paramount in the delivery of efficient patient outcomes. However, as the exchange of healthcare information between patients and healthcare providers through AI-powered solutions increases, protecting a person’s information and their privacy has become even more important. Arguably, the increased adoption of healthcare AI has resulted in a significant concentration on the security risks and protection measures to the security and privacy of healthcare data, leading to escalated analyses and enforcement. Since these challenges are brought by the use of AI-based healthcare solutions to manage healthcare data, AI-based data protection measures are used to resolve the underlying problems. Consequently, this project proposes AI-powered safeguards and policies/laws to protect the privacy of healthcare data. The project presents the best-in-school techniques used to preserve the data privacy of AI-powered healthcare applications. Popular privacy-protecting methods like Federated learning, cryptographic techniques, differential privacy methods, and hybrid methods are discussed together with potential cyber threats, data security concerns, and prospects. Also, the project discusses some of the relevant data security acts/laws that govern the collection, storage, and processing of healthcare data to guarantee owners’ privacy is preserved. This inquiry discusses various gaps and uncertainties associated with healthcare AI data collection procedures and identifies potential correction/mitigation measures.Keywords: data privacy, artificial intelligence (AI), healthcare AI, data sharing, healthcare organizations (HCOs)
Procedia PDF Downloads 961784 Protective Potential of Hyperhalophilic Diatoms Extract Against Lead Induced Oxidative Stress in Rats and Human HepG2 and HEK293 Cells Line
Authors: Wassim Guermazi, Saoussan Boukhris, Neila Annabi Trabelsi, Tarek Rebai, Alya Sellami-Kamoun, Habib Ayadi
Abstract:
This work investigates the protective effects of the microalga Halamphora sp. extract (H. Ext) as a natural product on lead-intoxicated liver and kidney human cells in vitro and in vivo on rats wistar. HepG2 cells line derived from human hepatocellular carcinoma and HEK293 cells line derived from human embryonic kidney were used for the in vitro study. The analysis of the fatty acids methyl esters of the extract was performed by a GC/MS. Four groups of rats, each of which was composed of six animals, were used for the in vivo experiment. The pretreatment of HepG2 and HEK293 cells line with the extract (100 µg mL-1) significantly (p < 0.05) protected against cytotoxicity induced by lead exposure. In vivo, the biochemical parameters in serum, namely malondialdehyde level (MDA), superoxide dismutase (SOD), catalase (CAT) and glutathione peroxidase (GPx) activities, were measured in supernatants of organ homogenates. H. Ext was found to be rich in fatty acids, essentially palmitic and palmitoleic accounting respectively 29.46% and 42.07% of total fatty acids. Both in vitro and in vivo, the co-treatment with H. Ext allowed the protection of the liver and kidney cells structure, as well as the significant preservation of normal antioxidant and biochemical parameters in rats. Halamphora extract rich in fatty acids has been proven to be effective in protection against Pb-induced toxicity.Keywords: microalga extract, human cells line, fatty acid, lead exposure, oxidative stress, rats
Procedia PDF Downloads 881783 Optimal Management of Forest Stands under Wind Risk in Czech Republic
Authors: Zohreh Mohammadi, Jan Kaspar, Peter Lohmander, Robert Marusak, Harald Vacik, Ljusk Ola Eriksson
Abstract:
Storms are important damaging agents in European forest ecosystems. In the latest decades, significant economic losses in European forestry occurred due to storms. This study investigates the problem of optimal harvest planning when forest stands risk to be felled by storms. One of the most applicable mathematical methods which are being used to optimize forest management is stochastic dynamic programming (SDP). This method belongs to the adaptive optimization class. Sequential decisions, such as harvest decisions, can be optimized based on sequential information about events that cannot be perfectly predicted, such as the future storms and the future states of wind protection from other forest stands. In this paper, stochastic dynamic programming is used to maximize the expected present value of the profits from an area consisting of several forest stands. The region of analysis is the Czech Republic. The harvest decisions, in a particular time period, should be simultaneously taken in all neighbor stands. The reason is that different stands protect each other from possible winds. The optimal harvest age of a particular stand is a function of wind speed and different wind protection effects. The optimal harvest age often decreases with wind speed, but it cannot be determined for one stand at a time. When we consider a particular stand, this stand also protects other stands. Furthermore, the particular stand is protected by neighbor stands. In some forest stands, it may even be rational to increase the harvest age under the influence of stronger winds, in order to protect more valuable stands in the neighborhood. It is important to integrate wind risk in forestry decision-making.Keywords: Czech republic, forest stands, stochastic dynamic programming, wind risk
Procedia PDF Downloads 1481782 Creating Risk Maps on the Spatiotemporal Occurrence of Agricultural Insecticides in Sub-Saharan Africa
Authors: Chantal Hendriks, Harry Gibson, Anna Trett, Penny Hancock, Catherine Moyes
Abstract:
The use of modern inputs for crop protection, such as insecticides, is strongly underestimated in Sub-Saharan Africa. Several studies measured toxic concentrations of insecticides in fruits, vegetables and fish that were cultivated in Sub-Saharan Africa. The use of agricultural insecticides has impact on human and environmental health, but it also has the potential to impact on insecticide resistance in malaria transmitting mosquitos. To analyse associations between historic use of agricultural insecticides and the distribution of insecticide resistance through space and time, the use and environmental fate of agricultural insecticides needs to be mapped through the same time period. However, data on the use and environmental fate of agricultural insecticides in Africa are limited and therefore risk maps on the spatiotemporal occurrence of agricultural insecticides are created using environmental data. Environmental data on crop density and crop type were used to select the areas that most likely receive insecticides. These areas were verified by a literature review and expert knowledge. Pesticide fate models were compared to select most dominant processes that are involved in the environmental fate of insecticides and that can be mapped at a continental scale. The selected processes include: surface runoff, erosion, infiltration, volatilization and the storing and filtering capacity of soils. The processes indicate the risk for insecticide accumulation in soil, water, sediment and air. A compilation of all available data for traces of insecticides in the environment was used to validate the maps. The risk maps can result in space and time specific measures that reduce the risk of insecticide exposure to non-target organisms.Keywords: crop protection, pesticide fate, tropics, insecticide resistance
Procedia PDF Downloads 1421781 The Effect of Human Rights Violation in Modern Society
Authors: Hanania Nasan Shokry Abdelmasih
Abstract:
The discipline of regulation is pretty complex and has its own terminology. other than written legal guidelines, there's also dwelling regulation, which refers to prison exercise. primary legal rules purpose at the happiness of individuals in social existence and feature different characteristics in unique branches including public or non-public regulation. on the other hand, law is a countrywide phenomenon. The law of 1 state and the legal device implemented at the territory of another state can be completely exceptional. individuals who are professionals in a specific discipline of regulation in a single united states may have inadequate know-how within the regulation of every other united states. today, similarly to the neighborhood nature of regulation, worldwide and even supranational regulation rules are implemented as a way to defend basic human values and make sure the protection of human rights around the sector. systems that offer algorithmic answers to prison problems using synthetic intelligence (AI) gear will perhaps serve to produce very meaningful consequences in phrases of human rights. but, algorithms to be used need to no longer be evolved with the aid of only pc professionals, however additionally want the contribution of folks who are familiar with law, values, judicial choices, and even the social and political culture of the society to which it'll provide answers. otherwise, even supposing the set of rules works perfectly, it may not be well suited with the values of the society in which it is applied. The present day traits involving using AI techniques in legal systems suggest that artificial law will come to be a brand new subject within the area of law.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security
Procedia PDF Downloads 71780 “It Just Feels Risky”: Intuition vs Evidence in Child Sexual Abuse Cases. Proposing an Empirically Derived Risk and Protection Protocol
Authors: Christian Perrin, Nicholas Blagden, Louise Allen, Sarah Impey
Abstract:
Social workers in the UK and professionals globally are faced with a particular challenge when dealing with allegations of child sexual abuse (CSA) in the community. In the absence of a conviction or incontestable evidence, staff can often find themselves unable to take decisive action to remove a child from harm, even though there may be a credible threat to their welfare. Conversely, practitioners may over-calculate risk through fear of being accountable for harm. This is, in part, due to the absence of a structured and evidence-based risk assessment tool which can predict the likelihood of a person committing child sexual abuse. Such assessments are often conducted by forensic professionals who utilise offence-specific data and personal history information to calculate risk. In situations where only allegations underpin a case, this mode of assessment is not viable. There are further ethical issues surrounding the assessment of risk in this area which require expert consideration and sensitive planning. This paper explores this entangled problem extant in the wider call to prevent sexual and child sexual abuse in the community. To this end, 32 qualitative interviews were undertaken with social workers dealing with CSA cases. Results were analysed using thematic analysis and operationalised to formulate a risk and protection protocol for use in case management. This paper reports on the early findings associated with the initial indications of protocol reliability. Implications for further research and practice are discussed.Keywords: sexual offending, child sexual offence, offender rehabilitation, risk assessment, offence prevention
Procedia PDF Downloads 1091779 A Case Study Approach on Co-Constructing the Idea of 'Safety' with Children
Authors: Beng Zhen Yeow
Abstract:
In most work that involves children, the voice of the children is often not heard. This is ironic since a lot of discussions might involve their welfare and safety. It might seem natural that the professionals should hear from them about what they wish for instead of deciding what is best for them. However, this, unfortunately, might be more the exception than the norm in most case and hence in many instances, children are merely 'subjects' in conversations about safety instead of active participants in the construction or creation of safety in the family. There might be many reasons why it does not happen in our work. Firstly, professionals have learnt how to 'socialise' into their professional roles and hence in the process become 'un-childlike'. Secondly, there is also a lack of professional training with regards to how to talk with children. Finally, there might be also a lack of concrete tools and techniques that are developed to facilitate the process. In this paper, the case study method is used to show how the idea of safety could be concretised and discussed with children and their family members, and hence making them active participants and co-creators of their own safety. Specific skills and techniques are highlighted through the case study. In this case, there was improvement in outcomes like no repeated offence or abuse. In addition, children were also able to advocate for their own safety after six months of intervention and how the family members were able to explicitly say what they can do to improve safety. The professionals in the safety network reported significant improvements. On top of that, the abused child who was removed due to child protection concerns, had verbalized observations of change in mother’s parenting abilities, and has requested for home leave to begin due to ownership of safety planning and having confidence to co-create safety for her siblings and herself together with the professionals in the safety network. Children becoming active participants in the co-creation of safety not only serve the purpose in allowing them to own a 'voice' but at the same time, give them greater confidence to protect themselves at home and in other contexts outside of home.Keywords: partnering for safety, collaborative social work, family and systemic psychotherapy, child protection
Procedia PDF Downloads 1201778 Particle Swarm Optimization Algorithm vs. Genetic Algorithm for Image Watermarking Based Discrete Wavelet Transform
Authors: Omaima N. Ahmad AL-Allaf
Abstract:
Over communication networks, images can be easily copied and distributed in an illegal way. The copyright protection for authors and owners is necessary. Therefore, the digital watermarking techniques play an important role as a valid solution for authority problems. Digital image watermarking techniques are used to hide watermarks into images to achieve copyright protection and prevent its illegal copy. Watermarks need to be robust to attacks and maintain data quality. Therefore, we discussed in this paper two approaches for image watermarking, first is based on Particle Swarm Optimization (PSO) and the second approach is based on Genetic Algorithm (GA). Discrete wavelet transformation (DWT) is used with the two approaches separately for embedding process to cover image transformation. Each of PSO and GA is based on co-relation coefficient to detect the high energy coefficient watermark bit in the original image and then hide the watermark in original image. Many experiments were conducted for the two approaches with different values of PSO and GA parameters. From experiments, PSO approach got better results with PSNR equal 53, MSE equal 0.0039. Whereas GA approach got PSNR equal 50.5 and MSE equal 0.0048 when using population size equal to 100, number of iterations equal to 150 and 3×3 block. According to the results, we can note that small block size can affect the quality of image watermarking based PSO/GA because small block size can increase the search area of the watermarking image. Better PSO results were obtained when using swarm size equal to 100.Keywords: image watermarking, genetic algorithm, particle swarm optimization, discrete wavelet transform
Procedia PDF Downloads 2281777 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection
Authors: Mahshid Arabi
Abstract:
With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.Keywords: data protection, digital technologies, information security, modern management
Procedia PDF Downloads 331776 Computational Analysis of Thermal Degradation in Wind Turbine Spars' Equipotential Bonding Subjected to Lightning Strikes
Authors: Antonio A. M. Laudani, Igor O. Golosnoy, Ole T. Thomsen
Abstract:
Rotor blades of large, modern wind turbines are highly susceptible to downward lightning strikes, as well as to triggering upward lightning; consequently, it is necessary to equip them with an effective lightning protection system (LPS) in order to avoid any damage. The performance of existing LPSs is affected by carbon fibre reinforced polymer (CFRP) structures, which lead to lightning-induced damage in the blades, e.g. via electrical sparks. A solution to prevent internal arcing would be to electrically bond the LPS and the composite structures such that to obtain the same electric potential. Nevertheless, elevated temperatures are achieved at the joint interfaces because of high contact resistance, which melts and vaporises some of the epoxy resin matrix around the bonding. The produced high-pressure gasses open up the bonding and can ignite thermal sparks. The objective of this paper is to predict the current density distribution and the temperature field in the adhesive joint cross-section, in order to check whether the resin pyrolysis temperature is achieved and any damage is expected. The finite element method has been employed to solve both the current and heat transfer problems, which are considered weakly coupled. The mathematical model for electric current includes Maxwell-Ampere equation for induced electric field solved together with current conservation, while the thermal field is found from heat diffusion equation. In this way, the current sub-model calculates Joule heat release for a chosen bonding configuration, whereas the thermal analysis allows to determining threshold values of voltage and current density not to be exceeded in order to maintain the temperature across the joint below the pyrolysis temperature, therefore preventing the occurrence of outgassing. In addition, it provides an indication of the minimal number of bonding points. It is worth to mention that the numerical procedures presented in this study can be tailored and applied to any type of joints other than adhesive ones for wind turbine blades. For instance, they can be applied for lightning protection of aerospace bolted joints. Furthermore, they can even be customized to predict the electromagnetic response under lightning strikes of other wind turbine systems, such as nacelle and hub components.Keywords: carbon fibre reinforced polymer, equipotential bonding, finite element method, FEM, lightning protection system, LPS, wind turbine blades
Procedia PDF Downloads 164