Search results for: hydraulic protection
2419 SCR-Stacking Structure with High Holding Voltage for IO and Power Clamp
Authors: Hyun Young Kim, Chung Kwang Lee, Han Hee Cho, Sang Woon Cho, Yong Seo Koo
Abstract:
In this paper, we proposed a novel SCR (Silicon Controlled Rectifier) - based ESD (Electrostatic Discharge) protection device for I/O and power clamp. The proposed device has a higher holding voltage characteristic than conventional SCR. These characteristics enable to have latch-up immunity under normal operating conditions as well as superior full chip ESD protection. The proposed device was analyzed to figure out electrical characteristics and tolerance robustness in term of individual design parameters (D1, D2, D3). They are investigated by using the Synopsys TCAD simulator. As a result of simulation, holding voltage increased with different design parameters. The holding voltage of the proposed device changes from 3.3V to 7.9V. Also, N-Stack structure ESD device with the high holding voltage is proposed. In the simulation results, 2-stack has holding voltage of 6.8V and 3-stack has holding voltage of 10.5V. The simulation results show that holding voltage of stacking structure can be larger than the operation voltage of high-voltage application.Keywords: ESD, SCR, holding voltage, stack, power clamp
Procedia PDF Downloads 5552418 2D-Numerical Modelling of Local Scour around a Circular Pier in Steady Current
Authors: Mohamed Rajab Peer Mohamed, Thiruvenkatasamy Kannabiran
Abstract:
In the present investigation, the scour around a circular pier subjected to a steady current were studied numerically using two-dimensional MIKE21 Flow Model (FM) and Sand Transport (ST)Modulewhich is developed by Danish Hydraulic Institute (DHI), Denmark. The unstructured flexible mesh generated with rectangular flume dimension of 10 m wide, 1 m deep, and 30 m long. The grain size of the sand was d50 = 0.16 mm, sediment size, sediment gradation=1.16, pier diameter D= 30 mm and depth-averaged current velocity, U = 0.449 m/s are considered in the model. The estimated scour depth obtained from this model is validated and it is observed that the results of the model have good agreement with flume experimental results.In order to estimate the scour depth, several simulations were made for three cases viz., Case I:change in sediment transport model description in the numerical model viz, i) Engelund-Hansen model, ii) Engelund-Fredsøe model, and iii) Van Rijn model, Case II: change in current velocity for keeping constant pile diameter D=0.03 m and Case III:change in pier diameter for constant depth averaged current speed U=0.449 m/s.In case I simulations, the results indicate that the scour depth S/D is the order of 1.73 for Engelund-Hansen model, 0.64 for Engelund-Fredsøe model and 0.46 for VanRijn model. The scour depth estimates using Engelund-Hansen method compares well the experimental results.In case II, simulations show that the scour depth increases with increasing current component of the flow.In case III simulations, the results indicate that the scour depth increases with increase in pier diameter and it stabilize attains steady value when the Froude number> 2.71.All the results of the numerical simulations are clearly matches with reported values of the experimental results. Hence, this MIKE21 FM –Sand Transport model can be used as a suitable tool to estimate the scour depth for field applications. Moreover, to provide suitable scour protection methods, the maximum scour depth is to be predicted, Engelund-Hansen method can be adopted to estimate the scour depth in the steady current region.Keywords: circular pier, MIKE21, numerical model, scour, sediment transport
Procedia PDF Downloads 3152417 Study of the Behavior of an Organic Coating Applied on Algerian Oil Tanker in Sea Water
Authors: Nadia Hammouda, K. Belmokre
Abstract:
Organic coatings are widely employed in the corrosion protection of most metal surfaces, particularly steel. They provide a barrier against corrosive species present in the environment, due to their high resistance to oxygen, water and ions transport. This study focuses on the evaluation of corrosion protection performance of epoxy paint on the carbon steel surface in sea water by Electrochemical Impedance Spectroscopy (EIS). The electrochemical behavior of painted surface was estimated by EIS parameters that contained paint film resistance, paint film capacitance and double layer capacitance. On the basis of calculation using EIS spectrums it was observed that pore resistance (Rpore) decreased with the appearance of doubled layer capacitance (Cdl) due to the electrolyte penetration through the film. This was further confirmed by the decrease of diffusion resistance (Rd) which was also the indicator of the deterioration of paint film protectiveness.Keywords: epoxy paints, carbon steel, electrochemical impedance spectroscopy, corrosion mechanisms, sea water
Procedia PDF Downloads 4792416 Conflating Voluntary Sex Work and Trafficked Sex Work in Malaysia
Authors: Haezreena Begum Abdul Hamid
Abstract:
This article will explore the conflation between voluntary sex work and trafficked sex work. In doing so, the article will analyse the meaning of trafficking according to the United Nations ‘Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and Children’ and the Malaysian Anti-Trafficking in Persons and Anti-Migrant Smuggling Act, 2007 (ATIP), and discuss the ambiguities that may arise in understanding the term. While the law on human trafficking has long been understood by scholars, key stakeholders, and enforcement officers, identifying a victim of trafficking is far from being straight forward. This is because of the diverse understanding on sex trafficking and sex work, and the fact that ‘consent’ by trafficked persons remains irrelevant in cases of trafficking. As a result, women who voluntarily engage in sex work are sometimes categorised as ‘trafficked’ and are ‘rescued’ by the authorities in the name of ‘protection’, while those who insist of having agency can be charged for violating the immigration laws. In light of such circumstances, this article aims to explore the conflation between voluntary sex work and trafficked sex work and how such conflation have succeeded in fostering distrust between sex workers and authorities.Keywords: voluntary sex work, trafficked sex work, sex work, coercion, protection
Procedia PDF Downloads 2392415 Transparency of Algorithmic Decision-Making: Limits Posed by Intellectual Property Rights
Authors: Olga Kokoulina
Abstract:
Today, algorithms are assuming a leading role in various areas of decision-making. Prompted by a promise to provide increased economic efficiency and fuel solutions for pressing societal challenges, algorithmic decision-making is often celebrated as an impartial and constructive substitute for human adjudication. But in the face of this implied objectivity and efficiency, the application of algorithms is also marred with mounting concerns about embedded biases, discrimination, and exclusion. In Europe, vigorous debates on risks and adverse implications of algorithmic decision-making largely revolve around the potential of data protection laws to tackle some of the related issues. For example, one of the often-cited venues to mitigate the impact of potentially unfair decision-making practice is a so-called 'right to explanation'. In essence, the overall right is derived from the provisions of the General Data Protection Regulation (‘GDPR’) ensuring the right of data subjects to access and mandating the obligation of data controllers to provide the relevant information about the existence of automated decision-making and meaningful information about the logic involved. Taking corresponding rights and obligations in the context of the specific provision on automated decision-making in the GDPR, the debates mainly focus on efficacy and the exact scope of the 'right to explanation'. In essence, the underlying logic of the argued remedy lies in a transparency imperative. Allowing data subjects to acquire as much knowledge as possible about the decision-making process means empowering individuals to take control of their data and take action. In other words, forewarned is forearmed. The related discussions and debates are ongoing, comprehensive, and, often, heated. However, they are also frequently misguided and isolated: embracing the data protection law as ultimate and sole lenses are often not sufficient. Mandating the disclosure of technical specifications of employed algorithms in the name of transparency for and empowerment of data subjects potentially encroach on the interests and rights of IPR holders, i.e., business entities behind the algorithms. The study aims at pushing the boundaries of the transparency debate beyond the data protection regime. By systematically analysing legal requirements and current judicial practice, it assesses the limits of the transparency requirement and right to access posed by intellectual property law, namely by copyrights and trade secrets. It is asserted that trade secrets, in particular, present an often-insurmountable obstacle for realising the potential of the transparency requirement. In reaching that conclusion, the study explores the limits of protection afforded by the European Trade Secrets Directive and contrasts them with the scope of respective rights and obligations related to data access and portability enshrined in the GDPR. As shown, the far-reaching scope of the protection under trade secrecy is evidenced both through the assessment of its subject matter as well as through the exceptions from such protection. As a way forward, the study scrutinises several possible legislative solutions, such as flexible interpretation of the public interest exception in trade secrets as well as the introduction of the strict liability regime in case of non-transparent decision-making.Keywords: algorithms, public interest, trade secrets, transparency
Procedia PDF Downloads 1242414 Sunglasses Frame: UV Protection beyond Lens Spectroscopy
Authors: Augusto P. Andrade, Pedro L. Guedes, Pedro T. Da Silva, Liliane Ventura
Abstract:
The present study evaluates the contribution of sunglasses frames as additional eye safety for ultraviolet backscatter light. Current sunglasses standards establish safe limits regarding lens transmittance in the 280 nm to 380 nm range. However, frames are additionally relevant in protecting the eyes from ultraviolet exposure. This study involves the use of a prototype that simulates backscattered light environments and quantifies the contribution of the frame as a function of the light that reaches the eye when wearing sunglasses. The prototype consists of an LED illuminated sphere, a mannequin head with optical sensors, and baseline and measurements are performed. A set of 29 samples was tested, and results show the variation of light blocking presented by different types of frames, ranging from 68% to 80%. This is still ongoing research. Prototype improvements for allowing albedo simulation, as well as the six types of sky simulation, are being implemented to show the intensity of UV light reaching the eye for several environments worldwide.Keywords: sunglasses standards, sunglasses frame, ultraviolet protection, albedo
Procedia PDF Downloads 1012413 A Proper Design of Wind Turbine Grounding Systems under Lightning
Authors: M. A. Abd-Allah, Mahmoud N. Ali, A. Said
Abstract:
Lightning Protection Systems (LPS) for wind power generation is becoming an important public issue. A serious damage of blades, accidents where low-voltage and control circuit breakdowns frequently occur in many wind farms. A grounding system is one of the most important components required for appropriate LPSs in wind turbines WTs. Proper design of a wind turbine grounding system is demanding and several factors for the proper and effective implementation must be taken into account. This paper proposed procedure of proper design of grounding systems for a wind turbine was introduced. This procedure depends on measuring of ground current of simulated wind farm under lightning taking into consideration the soil ionization. The procedure also includes the Ground Potential Rise (GPR) and the voltage distributions at ground surface level and Touch potential. In particular, the contribution of mitigating techniques, such as rings, rods and the proposed design were investigated.Keywords: WTs, Lightning Protection Systems (LPS), GPR, grounding system, mitigating techniques
Procedia PDF Downloads 3752412 Effects of Drought and Anthropism on Vegetation and Soil Elements in the Steppe of Algeria: Case of the Station of Tadmit (Wilaya of Djelfa)
Authors: L. Benseghir, H. Kadi-Hanifi
Abstract:
Vegetation of the high steppic plains of southern Algiers region has ever been used by human occupation. The harsh climatic context characterized by long periods of drought and an ovine livestock in constant growth lead us to devote a particular attention to the biodiversity of those living environment. The diachronic study made in Tadmit (50 km south of the district of Djelfa) about the specific recording led us to notice that: The floristic recording of Tadmit is not reduced in time but fluctuate, depending on the pasture intensity, the annual rainfall and especially by the protection area of the following two years from January 2004. The forming specific recording of the station undergo significant changes from a period to another. Those changes in floristic list concern nearly 50% of the initial flora that could disappear or be replaced by new species. Finally, the alfa steppe is in a marked decline and is substituted by new facies that were privileged by the overgrazing, stranding or clearance.Keywords: overgrazing, diachronic study, protection area, climate, desertification
Procedia PDF Downloads 2682411 Determining the Effectiveness of Radiation Shielding and Safe Time for Radiation Worker by Employing Monitoring of Accumulation Dose in the Operator Room of CT Scan
Authors: Risalatul Latifah, Bunawas Bunawas, Lailatul Muqmiroh, Anggraini D. Sensusiati
Abstract:
Along with the increasing frequency of the use of CT-Scan for radiodiagnostics purposes, it is necessary to study radiation protection. This study examined aspects of radiation protection of workers. This study tried using thermoluminescent dosimeter (TLD) for evaluating radiation shielding and estimating safe time for workers during CT Scan examination. Six TLDs were placed on door, wall, and window inside and outside of the CT Scan room for 1 month. By using TLD monitoring, it could be seen how much radiation was exposed in the operator room. The results showed the effective dose at door, window, and wall was respectively 0.04 mSv, 0.05 mSv, and 0.04 mSv. With these values, it could be evaluated the effectiveness of radiation shielding on doors, glass and walls were respectively 90.6%, 95.5%, and 92.2%. By applying the dose constraint and the estimation of the accumulated dose for one month, radiation workers were still safe to perform the irradiation for 180 patients.Keywords: CT scan room, TLD, radiation worker, dose constraint
Procedia PDF Downloads 2862410 Criminal Protection Objectivity of the Child's Right to Life and Physical and Psychological Safety
Authors: Hezha Hewa, Taher Sur
Abstract:
Nowadays, child affairs is a matter of both national and international interests. This issue is regarded a vital topic for various scientific fields across ages, and for all the communities without exception. However, the nature of child caring may vary due to the verities in science perspectives. So, considering child's affairs from different perspectives is helpful to have a complementary image about this matter. The purpose behind selecting this topic is to keep a balance between the victim on the one hand, and the guardian and the offender on the other hand, (i.e.) to avoid any kind of excessiveness either in the protection of the child and its rights not in the punishment of the offender. This is achieved through considering various legal materials in the Iraqi legislation and in the comparative legislations that are concerned with the child's issue and the extent to which the child makes use of these rights. The scope of this study involves the crimes that are considered as aggressions against the child's right to life, and the crimes that are dangerous to their physical and psychological safety. So, this study comprehensively considers the intentional murder of child, child murder to avoid disgrace, child kidnapping, child abandonment, physical abuse for the sake of punishment or not, child circumcision, verbal violence, and abstaining from leaving a child with a person who has the right of custody. This study ends with the most significant concluding points that have been derived throughout this study, which are: Unlike the Iraqi legislation, the Egyptian legislation defines the child in the Article 2 of the Child Law No. 12 of 1996 amended by the Law No. 126 of 2008 that the child is a person who does not exceed 18 years of age. Some legislation does not provide special criminal protection for child intentional murder, as in the Iraqi and the Egyptian legislation. However, some others have provided special criminal protection for a child, as in French and Syrian legislations. Child kidnapping is regarded as one of the most dangerous crimes that affects the child and the family as well, as it may expose the child's life to danger or to death. The most significant recommendations from the researcher are: The Iraqi legislation is recommended to take the necessary measures to establish a particular legislation for the child by including all the legal provisions that are associated with this weak creature, and make use of the Egyptian legislator’s experience as a pioneer in this respect. Both the Iraqi legislation and the Egyptian legislation are recommended to enact special laws to protect a child from the crimes of intentional murder, as the crime of child murder is currently subjected to the same provisions consider for adult murder.Keywords: child, criminal, penal, law, safety
Procedia PDF Downloads 2582409 Protection of Steel Bars in Reinforce Concrete with Zinc Based Coverings
Authors: Hamed Rajabzadeh Gatabi, Soroush Dastgheibifard, Mahsa Asnafi
Abstract:
There is no doubt that reinforced concrete is known as one of the most significant materials which is used in construction industry for many years. Although, some natural elements in dealing with environment can contribute to its corrosion or failure. One of which is bar or so-called reinforcement failure. So as to combat this problem, one of the oxidization prevention methods investigated was the barrier protection method implemented over the application of an organic coating, specifically fusion-bonded epoxy. In this study comparative method is prepared on two different kinds of covered bars (zinc-riches epoxy and polyamide epoxy coated bars) and also uncoated bar. With the aim of evaluate these reinforced concretes, the stickiness, toughness, thickness and corrosion performance of coatings were compared by some tools like Cu/CuSo4 electrodes, EIS and etc. Different types of concretes were exposed to the salty environment (NaCl 3.5%) and their durability was measured. As stated by the experiments in research and investigations, thick coatings (named epoxies) have acceptable stickiness and strength. Polyamide epoxy coatings stickiness to the bars was a bit better than that of zinc-rich epoxy coatings; nonetheless it was stiffer than the zinc rich epoxy coatings. Conversely, coated bars with zinc-rich epoxy showed more negative oxidization potentials, which take revenge protection of bars by zinc particles. On the whole, zinc-rich epoxy coverings is more corrosion-proof than polyamide epoxy coatings due to consuming zinc elements and some other parameters, additionally if the epoxy coatings without surface defects are applied on the rebar surface carefully, it can be said that the life of steel structures is subjected to increase dramatically.Keywords: surface coating, epoxy polyamide, reinforce concrete bars, salty environment
Procedia PDF Downloads 2882408 Simulation of Hydraulic Fracturing Fluid Cleanup for Partially Degraded Fracturing Fluids in Unconventional Gas Reservoirs
Authors: Regina A. Tayong, Reza Barati
Abstract:
A stable, fast and robust three-phase, 2D IMPES simulator has been developed for assessing the influence of; breaker concentration on yield stress of filter cake and broken gel viscosity, varying polymer concentration/yield stress along the fracture face, fracture conductivity, fracture length, capillary pressure changes and formation damage on fracturing fluid cleanup in tight gas reservoirs. This model has been validated as against field data reported in the literature for the same reservoir. A 2-D, two-phase (gas/water) fracture propagation model is used to model our invasion zone and create the initial conditions for our clean-up model by distributing 200 bbls of water around the fracture. A 2-D, three-phase IMPES simulator, incorporating a yield-power-law-rheology has been developed in MATLAB to characterize fluid flow through a hydraulically fractured grid. The variation in polymer concentration along the fracture is computed from a material balance equation relating the initial polymer concentration to total volume of injected fluid and fracture volume. All governing equations and the methods employed have been adequately reported to permit easy replication of results. The effect of increasing capillary pressure in the formation simulated in this study resulted in a 10.4% decrease in cumulative production after 100 days of fluid recovery. Increasing the breaker concentration from 5-15 gal/Mgal on the yield stress and fluid viscosity of a 200 lb/Mgal guar fluid resulted in a 10.83% increase in cumulative gas production. For tight gas formations (k=0.05 md), fluid recovery increases with increasing shut-in time, increasing fracture conductivity and fracture length, irrespective of the yield stress of the fracturing fluid. Mechanical induced formation damage combined with hydraulic damage tends to be the most significant. Several correlations have been developed relating pressure distribution and polymer concentration to distance along the fracture face and average polymer concentration variation with injection time. The gradient in yield stress distribution along the fracture face becomes steeper with increasing polymer concentration. The rate at which the yield stress (τ_o) is increasing is found to be proportional to the square of the volume of fluid lost to the formation. Finally, an improvement on previous results was achieved through simulating yield stress variation along the fracture face rather than assuming constant values because fluid loss to the formation and the polymer concentration distribution along the fracture face decreases as we move away from the injection well. The novelty of this three-phase flow model lies in its ability to (i) Simulate yield stress variation with fluid loss volume along the fracture face for different initial guar concentrations. (ii) Simulate increasing breaker activity on yield stress and broken gel viscosity and the effect of (i) and (ii) on cumulative gas production within reasonable computational time.Keywords: formation damage, hydraulic fracturing, polymer cleanup, multiphase flow numerical simulation
Procedia PDF Downloads 1292407 Synthesis and Characterization of Iron and Aluminum-Containing AFm Phases
Authors: Aurore Lechevallier, Mohend Chaouche, Jerome Soudier, Guillaume Renaudin
Abstract:
The cement industry accounts for 8% of the global CO₂ emissions, and approximately 60% of these emissions are associated with the Portland cement clinker production from the decarbonization of limestone (CaCO3). Their impact on the greenhouse effect results in growing social awareness. Therefore, CO2 footprint becomes a product selection choice, and substituting Portland cement with a lower CO2-footprint alternative binder is sought. In this context, new hydraulic binders have been studied as a potential Ordinary Portland Cement substitute. Many of them are composed of iron oxides and aluminum oxides, present in the Ca₄Al₂-xFe₂+ₓO₁₀-like phase and forming Ca-LDH (i.e. AFM) as a hydration product. It has become essential to study the possible existence of Fe/Al AFM solid solutions to characterize the hydration process properly. Ca₂Al₂-xFex(OH)₆.X.nH₂O layered AFM samples intercalated with either nitrate or chloride X anions were synthesized based on the co-precipitation method under a nitrogen atmosphere to avoid the carbonation effect.AFM samples intercalated with carbonate anions were synthesized based on the anionic exchange process, using AFM-NO₃ as the source material. These three AFM samples were synthesized with varying Fe/Al molar ratios. The experimental conditions were optimized to make possible the formation of Al-AFM and Fe-AFM using the same parameters (namely pH value and salt concentration). Rietveld refinements were performed to demonstrate the existence of a solid solution between the two trivalent metallic end members. Spectroscopic analyses were used to confirm the intercalation of the targeted anion; secondary electron images were taken to analyze the AFM samples’ morphology, and energy dispersive X-ray spectroscopy (EDX) was carried out to determine the elemental composition of the AFM samples. Results of this study make it possible to quantify the Al/Fe ratio of the AFM phases precipitated in our hydraulic binder, thanks to the determined Vegard's law characteristic to the corresponding solid solutionsKeywords: AFm phase, iron-rich binder, low-carbon cement, solid solution
Procedia PDF Downloads 1352406 Towards Conservation and Recovery of Species at Risk in Ontario: Progress on Recovery Planning and Implementation and an Overview of Key Research Needs
Authors: Rachel deCatanzaro, Madeline Austen, Ken Tuininga, Kathy St. Laurent, Christina Rohe
Abstract:
In Canada, the federal Species at Risk Act (SARA) provides protection for wildlife species at risk and a national legislative framework for the conservation or recovery of species that are listed as endangered, threatened, or special concern under Schedule 1 of SARA. Key aspects of the federal species at risk program include the development of recovery documents (recovery strategies, action plans, and management plans) outlining threats, objectives, and broad strategies or measures for conservation or recovery of the species; the identification and protection of critical habitat for threatened and endangered species; and working with groups and organizations to implement on-the-ground recovery actions. Environment Canada’s progress on the development of recovery documents and on the identification and protection of critical habitat in Ontario will be presented, along with successes and challenges associated with on-the ground implementation of recovery actions. In Ontario, Environment Canada is currently involved in several recovery and monitoring programs for at-risk bird species such as the Loggerhead Shrike, Piping Plover, Golden-winged Warbler and Cerulean Warbler and has provided funding for a wide variety of recovery actions targeting priority species at risk and geographic areas each year through stewardship programs including the Habitat Stewardship Program, Aboriginal Fund for Species at Risk, and the Interdepartmental Recovery Fund. Key research needs relevant to the recovery of species at risk have been identified, and include: surveys and monitoring of population sizes and threats, population viability analyses, and addressing knowledge gaps identified for individual species (e.g., species biology and habitat needs). The engagement of all levels of government, the local and international conservation communities, and the scientific research community plays an important role in the conservation and recovery of species at risk in Ontario– through surveying and monitoring, filling knowledge gaps, conducting public outreach, and restoring, protecting, or managing habitat – and will be critical to the continued success of the federal species at risk program.Keywords: conservation biology, habitat protection, species at risk, wildlife recovery
Procedia PDF Downloads 4502405 Protection towards Investor: Enforcement of the Authorities of Indonesian Financial Services Authority (OJK) during Capital Market Integration
Authors: Muhammad Ilham Agus Salim, Muhammad Ikbal
Abstract:
The ASEAN Economic Community (AEC) was set up in 2003 with the objectives of creating a single market and production base, enhancing equitable economic development as well as facilitating the integration into the global economy. The AEC involves liberalization and facilitation of trade in goods, skilled labour, services, and investment, as well as protection and promotion of investment. The thesis outlines the AEC Blueprint actions in scope of globalization of investment and capital market. Free flows of investment and freer flows of capital market urge countries in South East Asia to coordinate and to collaborate in securing the interest of public, and this leads to the importance of financial services authorities in ASEAN to prepare the mechanism of guarding the flows of investment. There is no exception, especially for Indonesian Financial Services Authority (OJK) as one of the authorized body in capital market supervision, to enforce its authorities as supervisory body.Keywords: AEC blueprint, OJK, capital market, integration
Procedia PDF Downloads 3122404 Geological and Geotechnical Investigation of a Landslide Prone Slope Along Koraput- Rayagada Railway Track Odisha, India: A Case Study
Authors: S. P. Pradhan, Amulya Ratna Roul
Abstract:
A number of landslides are occurring during the rainy season along Rayagada-Koraput Railway track for past three years. The track was constructed about 20 years ago. However, the protection measures are not able to control the recurring slope failures now. It leads to a loss to Indian Railway and its passengers ultimately leading to wastage of time and money. The slopes along Rayagada-Koraput track include both rock and soil slopes. The rock types include mainly Khondalite and Charnockite whereas soil slopes are mainly composed of laterite ranging from less weathered to highly weathered laterite. The field studies were carried out in one of the critical slope. Field study was followed by the kinematic analysis to assess the type of failure. Slake Durability test, Uniaxial Compression test, specific gravity test and triaxial test were done on rock samples to calculate and assess properties such as weathering index, unconfined compressive strength, density, cohesion, and friction angle. Following all the laboratory tests, rock mass rating was calculated. Further, from Kinematic analysis and Rock Mass Ratingbasic, Slope Mass Rating was proposed for each slope. The properties obtained were used to do the slope stability simulations using finite element method based modelling. After all the results, suitable protection measures, to prevent the loss due to slope failure, were suggested using the relation between Slope Mass Rating and protection measures.Keywords: landslides, slope stability, rock mass rating, slope mass rating, numerical simulation
Procedia PDF Downloads 1802403 A Comparative Study of European Terrazzo and Tibetan Arga Floor Making Techniques
Authors: Hubert Feiglstorfer
Abstract:
The technique of making terrazzo has been known since ancient times. During the Roman Empire, known as opus signinum, at the time of the Renaissance, known as composto terrazzo marmorino or at the turn of the 19th and 20th centuries, the use of terrazzo experienced a common use in Europe. In Asia, especially in the Himalayas and the Tibetan highlands, a particular floor and roof manufacturing technique is commonly used for about 1500 years, known as arga. The research question in this contribution asks for technical and cultural-historical synergies of these floor-making techniques. The making process of an arga floor shows constructive parallels to the European terrazzo. Surface processing by grinding, burnishing and sealing, in particular, reveals technological similarities. The floor structure itself, on the other hand, shows differences, for example in the use of hydraulic aggregate in the terrazzo, while the arga floor is used without hydraulic material, but the result of both techniques is a tight, water-repellent and shiny surface. As part of this comparative study, the materials, processing techniques and quality features of the two techniques are compared and parallels and differences are analysed. In addition to text and archive research, the methods used are results of material analyses and ethnographic research such as participant observation. Major findings of the study are the investigation of the mineralogical composition of arga floors and its comparison with terrazzo floors. The study of the cultural-historical context in which both techniques are embedded will give insight into technical developments in Europe and Asia, parallels and differences. Synergies from this comparison let possible technological developments in the production, conservation and renovation of European terrazzo floors appear in a new light. By making arga floors without cement-based aggregates, the renovation of historical floors from purely natural products and without using energy by means of a burning process can be considered.Keywords: European and Asian crafts, material culture, floor making technology, terrazzo, arga, Tibetan building traditions
Procedia PDF Downloads 2482402 A Hybrid Watermarking Model Based on Frequency of Occurrence
Authors: Hamza A. A. Al-Sewadi, Adnan H. M. Al-Helali, Samaa A. K. Khamis
Abstract:
Ownership proofs of multimedia such as text, image, audio or video files can be achieved by the burial of watermark is them. It is achieved by introducing modifications into these files that are imperceptible to the human senses but easily recoverable by a computer program. These modifications would be in the time domain or frequency domain or both. This paper presents a procedure for watermarking by mixing amplitude modulation with frequency transformation histogram; namely a specific value is used to modulate the intensity component Y of the YIQ components of the carrier image. This scheme is referred to as histogram embedding technique (HET). Results comparison with those of other techniques such as discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) have shown an enhance efficiency in terms of ease and performance. It has manifested a good degree of robustness against various environment effects such as resizing, rotation and different kinds of noise. This method would prove very useful technique for copyright protection and ownership judgment.Keywords: authentication, copyright protection, information hiding, ownership, watermarking
Procedia PDF Downloads 5642401 EIS Study of the Corrosion Behavior of an Organic Coating Applied on Algerian Oil Tanker in Sea Water
Authors: Nadia Hammouda, Kamel Belmokre
Abstract:
Organic coatings are widely employed in the corrosion protection of most metal surfaces, particularly steel. They provide a barrier against corrosive species present in the environment, due to their high resistance to oxygen, water and ions transport. This study focuses on the evaluation of corrosion protection performance of epoxy paint on the carbon steel surface in sea water by Electrochemical Impedance Spectroscopy (EIS). The electrochemical behavior of painted surface was estimated by EIS parameters that contained paint film resistance, paint film capacitance and double layer capacitance. On the basis of calculation using EIS spectrums it was observed that pore resistance (Rpore) decreased with the appearance of doubled layer capacitance (Cdl) due to the electrolyte penetration through the film. This was further confirmed by the decrease of diffusion resistance (Rd) which was also the indicator of the deterioration of paint film protectiveness.Keywords: epoxy paints, carbon steel, electrochemical impedance spectroscopy, corrosion mechanisms, sea water
Procedia PDF Downloads 3722400 Characterization of Complex Electromagnetic Environment Created by Multiple Sources of Electromagnetic Radiation
Authors: Clement Temaneh-Nyah, Josiah Makiche, Josephine Nujoma
Abstract:
This paper considers the characterisation of a complex electromagnetic environment due to multiple sources of electromagnetic radiation as a five-dimensional surface which can be described by a set of several surface sections including: instant EM field intensity distribution maps at a given frequency and altitude, instantaneous spectrum at a given location in space and the time evolution of the electromagnetic field spectrum at a given point in space. This characterization if done over time can enable the exposure levels of Radio Frequency Radiation at every point in the analysis area to be determined and results interpreted based on comparison of the determined RFR exposure level with the safe guidelines for general public exposure given by recognised body such as the International commission on non-ionising radiation protection (ICNIRP), Institute of Electrical and Electronic Engineers (IEEE), the National Radiation Protection Authority (NRPA).Keywords: complex electromagnetic environment, electric field strength, mathematical models, multiple sources
Procedia PDF Downloads 3672399 Means of Securing Graves in the Egyptian Kingdom Era
Authors: Mohamed Saeed Ahmed Salman
Abstract:
This research aims to study the means of securing graves in the Egyptian kingdom era, and revolves around many basic ideas used by the ancient Egyptian to protect his graves from thieves, which included architectural characteristics, which gave it importance only others. The most important of which was the choice of the place of the grave, which chose a kohl place in the desert to protect the graves, which is the valley of kings, and whether the choice of that place had an impact in protecting the grave or not, in addition to other elements followed in the architectural planning, which was in the valley of kings. The multiplicity of the tomb, the construction of the well chamber to deceive the thieves by the end of the graves suddenly, the construction of the wells of the tombs, which contained the burial chamber at the bottom of the main well and the effect of all these factors on the graves, and this shows the importance of the graves to the ancient Egyptian and his belief in resurrection and immortality. The Egyptian resorted to the elements of protection and was a religious worker by The protector gods and special texts to protect the deceased from any danger to protect the tomb. As for the human factor of securing the tomb through human guards (police) and security teams based on the guard and the words indicating the protection and the guard teams and the teams of the majai. The most important developments that arose on the cemetery from Tamit entrance, corridors, chambers, burial chamber and coffin, and the use of sand to close the well after from one cemetery to another and from time to time where it was built in the late period inside the temple campus to be under the attention of the priests and their protection, as the study dealt with an analytical study For the means of securing graves in the Egyptian kingdom period.Keywords: Egyptian kingdom, ancient Egyptian, securing graves, Means of securing graves, Egypt, archaeology
Procedia PDF Downloads 712398 Application of Electrochemical Impedance Spectroscopy to Monitor the Steel/Soil Interface During Cathodic Protection of Steel in Simulated Soil Solution
Authors: Mandlenkosi George Robert Mahlobo, Tumelo Seadira, Major Melusi Mabuza, Peter Apata Olubambi
Abstract:
Cathodic protection (CP) has been widely considered a suitable technique for mitigating corrosion of buried metal structures. Plenty of efforts have been made in developing techniques, in particular non-destructive techniques, for monitoring and quantifying the effectiveness of CP to ensure the sustainability and performance of buried steel structures. The aim of this study was to investigate the evolution of the electrochemical processes at the steel/soil interface during the application of CP on steel in simulated soil. Carbon steel was subjected to electrochemical tests with NS4 solution used as simulated soil conditions for 4 days before applying CP for a further 11 days. A previously modified non-destructive voltammetry technique was applied before and after the application of CP to measure the corrosion rate. Electrochemical impedance spectroscopy (EIS), in combination with mathematical modeling through equivalent electric circuits, was applied to determine the electrochemical behavior at the steel/soil interface. The measured corrosion rate was found to have decreased from 410 µm/yr to 8 µm/yr between days 5 and 14 because of the applied CP. Equivalent electrical circuits were successfully constructed and used to adequately model the EIS results. The modeling of the obtained EIS results revealed the formation of corrosion products via a mixed activation-diffusion mechanism during the first 4 days, while the activation mechanism prevailed in the presence of CP, resulting in a protective film. The x-ray diffraction analysis confirmed the presence of corrosion products and the predominant protective film corresponding to the calcareous deposit.Keywords: carbon steel, cathodic protection, NS4 solution, voltammetry, EIS
Procedia PDF Downloads 632397 Industrial and Environmental Safety in the Integrated Security Policy of the Industry: A Corporation and an Enterprise
Authors: Vladimir A. Grachev
Abstract:
Today, in the context of rapidly developing technosphere and hourly emerging new technologies, the industrial and environmental safety issue is ever more pressing. The article is devoted to the relationship of social, environmental, and industrial policies with industrial safety, occupational health and safety, environmental safety, and environmental protection. The author assesses the up-to-day situation through system analysis and on the basis of the existing practices. A complex system of the policies implementation without "gaps" and missing links ensures preservation of human lives, health and a favorable living environment. The author demonstrates that absence of an "environmental safety" high-priority link can lead to a significant loss of human lives and health and the global changes in the environment. The role of implementing the environmental policy of enterprises and organizations, and of economic sectors in the implementation of national environmental policy is shown. It was established that the system for implementing environmental policy should be based on a system analysis.Keywords: environmental protection, environmental safety, industrial safety, occupational health and safety
Procedia PDF Downloads 2142396 Means of Securing Graves in the Egyptian Kingdom Era
Authors: Mohamed Ahmed Madkour, Haitham Magdy Hamad
Abstract:
This research aims to study the means of securing graves in the Egyptian kingdom era, and revolves around many basic ideas used by the ancient Egyptian to protect his graves from thieves, which included architectural characteristics, which gave it importance only others. The most important of which was the choice of the place of the grave, which chose a kohl place in the desert to protect the graves, which is the valley of kings, and whether the choice of that place had an impact in protecting the grave or not, in addition to other elements followed in the architectural planning, which was in the valley of kings. The multiplicity of the tomb, the construction of the well chamber to deceive the thieves by the end of the graves suddenly, the construction of the wells of the tombs, which contained the burial chamber at the bottom of the main well and the effect of all these factors on the graves, and this shows the importance of the graves to the ancient Egyptian and his belief in resurrection and immortality. The Egyptian resorted to the elements of protection and was a religious worker by The protector gods and special texts to protect the deceased from any danger to protect the tomb. As for the human factor of securing the tomb through human guards (police) and security teams based on the guard and the words indicating the protection and the guard teams and the teams of the majai. The most important developments that arose on the cemetery from Tamit entrance, corridors, chambers, burial chamber and coffin, and the use of sand to close the well after from one cemetery to another and from time to time where it was built in the late period inside the temple campus to be under the attention of the priests and their protection, as the study dealt with an analytical study For the means of securing graves in the Egyptian kingdom period.Keywords: archaeology, Egyptian kingdom era, graves, tombs, ancient Egyptian
Procedia PDF Downloads 702395 Frequency of Occurrence Hybrid Watermarking Scheme
Authors: Hamza A. Ali, Adnan H. M. Al-Helali
Abstract:
Generally, a watermark is information that identifies the ownership of multimedia (text, image, audio or video files). It is achieved by introducing modifications into these files that are imperceptible to the human senses but easily recoverable by a computer program. These modifications are done according to a secret key in a descriptive model that would be either in the time domain or frequency domain or both. This paper presents a procedure for watermarking by mixing amplitude modulation with frequency transformation histogram; namely a specific value is used to modulate the intensity component Y of the YIQ components of the carrier image. This scheme is referred to as histogram embedding technique (HET). Results comparison with those of other techniques such as discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) have shown an enhance efficiency in terms of ease and performance. It has manifested a good degree of robustness against various environment effects such as resizing, rotation and different kinds of noise. This method would prove very useful technique for copyright protection and ownership judgment.Keywords: watermarking, ownership, copyright protection, steganography, information hiding, authentication
Procedia PDF Downloads 3672394 Study on the Effects of Grassroots Characteristics on Reinforced Soil Performance by Direct Shear Test
Authors: Zhanbo Cheng, Xueyu Geng
Abstract:
Vegetation slope protection technique is economic, aesthetic and practical. Herbs are widely used in practice because of rapid growth, strong erosion resistance, obvious slope protection and simple method, in which the root system of grass plays a very important role. In this paper, through changing the variables value of grassroots quantity, grassroots diameter, grassroots length and grassroots reinforce layers, the direct shear tests were carried out to discuss the change of shear strength indexes of grassroots reinforced soil under different reinforce situations, and analyse the effects of grassroots characteristics on reinforced soil performance. The laboratory test results show that: (1) in the certain number of grassroots diameter, grassroots length and grassroots reinforce layers, the value of shear strength, and cohesion first increase and then reduce with the increasing of grassroots quantity; (2) in the certain number of grassroots quantity, grassroots length and grassroots reinforce layers, the value of shear strength and cohesion rise with the increasing of grassroots diameter; (3) in the certain number of grassroots diameter, and grassroots reinforce layers, the value of shear strength and cohesion raise with the increasing of grassroots length in a certain range of grassroots quantity, while the value of shear strength and cohesion first rise and then decline with the increasing of grassroots length when the grassroots quantity reaches a certain value; (4) in the certain number of grassroots quantity, grassroots diameter, and grassroots length, the value of shear strength and cohesion first climb and then decline with the increasing of grassroots reinforced layers; (5) the change of internal friction angle is small in different parameters of grassroots. The research results are of importance for understanding the mechanism of vegetation protection for slopes and determining the parameters of grass planting.Keywords: direct shear test, reinforced soil, grassroots characteristics, shear strength indexes
Procedia PDF Downloads 1762393 Optimized and Secured Digital Watermarking Using Fuzzy Entropy, Bezier Curve and Visual Cryptography
Authors: R. Rama Kishore, Sunesh
Abstract:
Recent development in the usage of internet for different purposes creates a great threat for the copyright protection of the digital images. Digital watermarking can be used to address the problem. This paper presents detailed review of the different watermarking techniques, latest trends in the field of secured, robust and imperceptible watermarking. It also discusses the different optimization techniques used in the field of watermarking in order to improve the robustness and imperceptibility of the method. Different measures are discussed to evaluate the performance of the watermarking algorithm. At the end, this paper proposes a watermarking algorithm using (2, 2) share visual cryptography and Bezier curve based algorithm to improve the security of the watermark. The proposed method uses fractional transformation to improve the robustness of the copyright protection of the method. The algorithm is optimized using fuzzy entropy for better results.Keywords: digital watermarking, fractional transform, visual cryptography, Bezier curve, fuzzy entropy
Procedia PDF Downloads 3652392 Crossing Borders: A Case Study on the Entry and Asylum of Sirius Refugees in Turkey
Authors: Stephanie M. De Oliveira
Abstract:
For a long time, migrations are characterized as a difficult problem to solve. Various phenomena throughout human history caused personnel migrations, whether by the free will of migrants or not. Nowadays, governments that seek to give these people protection and dignity, either to asylum or to build a new life in a different country, make refugee protection. At present, a large amount of people, have been crossing their country's borders by land, air or sea, becoming refugees and seeking a new life away from fear, threat or violence they suffered in their country of origin. It is known that some countries have already instituted rights and rules for refugees who wish to become citizens in the country to which they immigrated, even though this is not what happens in most cases. The article will be based on research made with UN Refugee Agency (UNHCR) material as well as will analyze the interaction of the Turkish government with the European Union. Since Turkey is not part of the Union, it will be understood how the interaction was made, as well as the search for consensus, and not only humanitarian but also financial aid. The treatment of refugees and the defense of human rights within the country will also be considered.Keywords: refugees, Turkey, asylum seekers, United Nations
Procedia PDF Downloads 3682391 Striving towards an Ambush Free Olympics: Effective Strategies and Intellectual Property Legislations
Authors: Mahit T. Anand
Abstract:
The modern Olympic Games present an unparalleled platform for companies to gain worldwide visibility. The increasing popularity of such an event supplemented by large sums of money paid by sponsors for the privilege of being associated with the Olympic Games has spawned its own particular brand of unfair competition, called ‘ambush marketing’. This research examines the practice of ambush marketing which has long been troubling the International Olympic Committee (I.O.C.) and its corporate sponsors. It emphasizes on implementing stringent legislative reforms by the host nations and to carry out effective ‘Brand Protection Programs’ for the upcoming Winter Olympics due to begin in February 2014 at Sochi, Russia and the Summer Olympics at Rio de Janeiro, Brazil in 2016. The research is carried out in the backdrop of out-standing legislative enactments made by the previous host nations and effective ‘Brand Protection Program’ formulated by their respective organizing committees.Keywords: ambush marketing, international olympic committee (IOC), official sponsors, trademark
Procedia PDF Downloads 3422390 Liquid Nitrogen as Fracturing Method for Hot Dry Rocks in Kazakhstan
Authors: Sotirios Longinos, Anna Loskutova, Assel Tolegenova, Assem Imanzhussip, Lei Wang
Abstract:
Hot, dry rock (HDR) has substantial potential as a thermal energy source. It has been exploited by hydraulic fracturing to extract heat and generate electricity, which is a well-developed technique known for creating the enhanced geothermal systems (EGS). These days, LN2 is being tested as an environmental friendly fracturing fluid to generate densely interconnected crevices to augment heat exchange efficiency and production. This study examines experimentally the efficacy of LN2 cryogenic fracturing for granite samples in Kazakhstan with immersion method. A comparison of two different experimental models is carried out. The first mode is rock heating along with liquid nitrogen treatment (heating with freezing time), and the second mode is multiple times of heating along with liquid nitrogen treatment (heating with LN2 freezing-thawing cycles). The experimental results indicated that with multiple heating and LN2-treatment cycles, the permeability of granite first ameliorates with increasing number of cycles and later reaches a plateau after a certain number of cycles. On the other hand, density, P-wave velocity, uniaxial compressive strength, elastic modulus, and tensile strength indicate a downward trend with increasing heating and treatment cycles. The thermal treatment cycles do not seem to have an obvious effect on the Poisson’s ratio. The changing rate of granite rock properties decreases as the number of cycles increases. The deterioration of granite primarily happens within the early few cycles. The heating temperature during the cycles shows an important influence on the deterioration of granite. More specifically, mechanical deterioration and permeability amelioration become more remarkable as the heating temperature increases.LN2 fracturing generates many positives compared to conventional fracturing methods such as little water consumption, requirement of zero chemical additives, lessening of reservoir damage, and so forth. Based on the experimental observations, LN2 can work as a promising waterless fracturing fluid to stimulate hot, dry rock reservoirs.Keywords: granite, hydraulic fracturing, liquid nitrogen, Kazakhstan
Procedia PDF Downloads 160