Search results for: smart grid protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4395

Search results for: smart grid protection

3765 Renewable Energy Interfaced Shunt Active Filter Using a Virtual Flux Direct Power Control

Authors: M. R. Bengourina, M. Rahli, L. Hassaine, S. Saadi

Abstract:

In this study, we present a control method entitled virtual flux direct power control of a grid connected photovoltaic system associated with an active power filter. The virtual flux direct control of power (VF-DPC) is employed for the calculation of reference current generation. In this technique, the switches states of inverter are selected from a table of switching based on the immediate errors between the active and reactive powers and their reference values. The objectives of this paper are the reduction of Total Harmonic Distortion (THD) of source current, compensating reactive power and injecting the maximum active power available from the PV array into the load and/or grid. MATLAB/SIMULINK simulations are provided to demonstrate the performance of the proposed approach.

Keywords: shunt active power filter, VF-DPC, photovoltaic, MPPT

Procedia PDF Downloads 302
3764 Results of Three-Year Operation of 220kV Pilot Superconducting Fault Current Limiter in Moscow Power Grid

Authors: M. Moyzykh, I. Klichuk, L. Sabirov, D. Kolomentseva, E. Magommedov

Abstract:

Modern city electrical grids are forced to increase their density due to the increasing number of customers and requirements for reliability and resiliency. However, progress in this direction is often limited by the capabilities of existing network equipment. New energy sources or grid connections increase the level of short-circuit currents in the adjacent network, which can exceed the maximum rating of equipment–breaking capacity of circuit breakers, thermal and dynamic current withstand qualities of disconnectors, cables, and transformers. Superconducting fault current limiter (SFCL) is a modern solution designed to deal with the increasing fault current levels in power grids. The key feature of this device is its instant (less than 2 ms) limitation of the current level due to the nature of the superconductor. In 2019 Moscow utilities installed SuperOx SFCL in the city power grid to test the capabilities of this novel technology. The SFCL became the first SFCL in the Russian energy system and is currently the most powerful SFCL in the world. Modern SFCL uses second-generation high-temperature superconductor (2G HTS). Despite its name, HTS still requires low temperatures of liquid nitrogen for operation. As a result, Moscow SFCL is built with a cryogenic system to provide cooling to the superconductor. The cryogenic system consists of three cryostats that contain a superconductor part and are filled with liquid nitrogen (three phases), three cryocoolers, one water chiller, three cryopumps, and pressure builders. All these components are controlled by an automatic control system. SFCL has been continuously operating on the city grid for over three years. During that period of operation, numerous faults occurred, including cryocooler failure, chiller failure, pump failure, and others (like a cryogenic system power outage). All these faults were eliminated without an SFCL shut down due to the specially designed cryogenic system backups and quick responses of grid operator utilities and the SuperOx crew. The paper will describe in detail the results of SFCL operation and cryogenic system maintenance and what measures were taken to solve and prevent similar faults in the future.

Keywords: superconductivity, current limiter, SFCL, HTS, utilities, cryogenics

Procedia PDF Downloads 66
3763 Starting Order Eight Method Accurately for the Solution of First Order Initial Value Problems of Ordinary Differential Equations

Authors: James Adewale, Joshua Sunday

Abstract:

In this paper, we developed a linear multistep method, which is implemented in predictor corrector-method. The corrector is developed by method of collocation and interpretation of power series approximate solutions at some selected grid points, to give a continuous linear multistep method, which is evaluated at some selected grid points to give a discrete linear multistep method. The predictors were also developed by method of collocation and interpolation of power series approximate solution, to give a continuous linear multistep method. The continuous linear multistep method is then solved for the independent solution to give a continuous block formula, which is evaluated at some selected grid point to give discrete block method. Basic properties of the corrector were investigated and found to be zero stable, consistent and convergent. The efficiency of the method was tested on some linear, non-learn, oscillatory and stiff problems of first order, initial value problems of ordinary differential equations. The results were found to be better in terms of computer time and error bound when compared with the existing methods.

Keywords: predictor, corrector, collocation, interpolation, approximate solution, independent solution, zero stable, consistent, convergent

Procedia PDF Downloads 481
3762 Re-Engineering Management Process in IRAN’s Smart Schools

Authors: M. R. Babaei, S. M. Hosseini, S. Rahmani, L. Moradi

Abstract:

Today, the quality of education and training systems and the effectiveness of the education systems of most concern to stakeholders and decision-makers of our country's development in each country. In Iran this is a double issue of concern to numerous reasons; So that governments, over the past decade have hardly even paid the running costs of education. ICT is claiming it has the power to change the structure of a program for training, reduce costs and increase quality, and do education systems and products consistent with the needs of the community and take steps to practice education. Own of the areas that the introduction of information technology has fundamentally changed is the field of education. The aim of this research is process reengineering management in schools simultaneously has been using field studies to collect data in the form of interviews and a questionnaire survey. The statistical community of this research has been the country of Iran and smart schools under the education. Sampling was targeted. The data collection tool was a questionnaire composed of two parts. The questionnaire consists of 36 questions that each question designates one of effective factors on the management of smart schools. Also each question consists of two parts. The first part designates the operating position in the management process, which represents the domain's belonging to the management agent (planning, organizing, leading, controlling). According to the classification of Dabryn and in second part the factors affect the process of managing the smart schools were examined, that Likert scale is used to classify. Questions the validity of the group of experts and prominent university professors in the fields of information technology, management and reengineering of approved and Cronbach's alpha reliability and also with the use of the formula is evaluated and approved. To analyse the data, descriptive and inferential statistics were used to analyse the factors contributing to the rating of (Linkert scale) descriptive statistics (frequency table data, mean, median, mode) was used. To analyse the data using analysis of variance and nonparametric tests and Friedman test, the assumption was evaluated. The research conclusions show that the factors influencing the management process re-engineering smart schools in school performance is affected.

Keywords: re-engineering, management process, smart school, Iran's school

Procedia PDF Downloads 231
3761 Analyzing the Risk Based Approach in General Data Protection Regulation: Basic Challenges Connected with Adapting the Regulation

Authors: Natalia Kalinowska

Abstract:

The adoption of the General Data Protection Regulation, (GDPR) finished the four-year work of the European Commission in this area in the European Union. Considering far-reaching changes, which will be applied by GDPR, the European legislator envisaged two-year transitional period. Member states and companies have to prepare for a new regulation until 25 of May 2018. The idea, which becomes a new look at an attitude to data protection in the European Union is risk-based approach. So far, as a result of implementation of Directive 95/46/WE, in many European countries (including Poland) there have been adopted very particular regulations, specifying technical and organisational security measures e.g. Polish implementing rules indicate even how long password should be. According to the new approach from May 2018, controllers and processors will be obliged to apply security measures adequate to level of risk associated with specific data processing. The risk in GDPR should be interpreted as the likelihood of a breach of the rights and freedoms of the data subject. According to Recital 76, the likelihood and severity of the risk to the rights and freedoms of the data subject should be determined by reference to the nature, scope, context and purposes of the processing. GDPR does not indicate security measures which should be applied – in recitals there are only examples such as anonymization or encryption. It depends on a controller’s decision what type of security measures controller considered as sufficient and he will be responsible if these measures are not sufficient or if his identification of risk level is incorrect. Data protection regulation indicates few levels of risk. Recital 76 indicates risk and high risk, but some lawyers think, that there is one more category – low risk/now risk. Low risk/now risk data processing is a situation when it is unlikely to result in a risk to the rights and freedoms of natural persons. GDPR mentions types of data processing when a controller does not have to evaluate level of risk because it has been classified as „high risk” processing e.g. processing on a large scale of special categories of data, processing with using new technologies. The methodology will include analysis of legal regulations e.g. GDPR, the Polish Act on the Protection of personal data. Moreover: ICO Guidelines and articles concerning risk based approach in GDPR. The main conclusion is that an appropriate risk assessment is a key to keeping data safe and avoiding financial penalties. On the one hand, this approach seems to be more equitable, not only for controllers or processors but also for data subjects, but on the other hand, it increases controllers’ uncertainties in the assessment which could have a direct impact on incorrect data protection and potential responsibility for infringement of regulation.

Keywords: general data protection regulation, personal data protection, privacy protection, risk based approach

Procedia PDF Downloads 239
3760 Hybrid Renewable Energy Systems for Electricity and Hydrogen Production in an Urban Environment

Authors: Same Noel Ngando, Yakub Abdulfatai Olatunji

Abstract:

Renewable energy micro-grids, such as those powered by solar or wind energy, are often intermittent in nature. This means that the amount of energy generated by these systems can vary depending on weather conditions or other factors, which can make it difficult to ensure a steady supply of power. To address this issue, energy storage systems have been developed to increase the reliability of renewable energy micro-grids. Battery systems have been the dominant energy storage technology for renewable energy micro-grids. Batteries can store large amounts of energy in a relatively small and compact package, making them easy to install and maintain in a micro-grid setting. Additionally, batteries can be quickly charged and discharged, allowing them to respond quickly to changes in energy demand. However, the process involved in recycling batteries is quite costly and difficult. An alternative energy storage system that is gaining popularity is hydrogen storage. Hydrogen is a versatile energy carrier that can be produced from renewable energy sources such as solar or wind. It can be stored in large quantities at low cost, making it suitable for long-distance mass storage. Unlike batteries, hydrogen does not degrade over time, so it can be stored for extended periods without the need for frequent maintenance or replacement, allowing it to be used as a backup power source when the micro-grid is not generating enough energy to meet demand. When hydrogen is needed, it can be converted back into electricity through a fuel cell. Energy consumption data is got from a particular residential area in Daegu, South Korea, and the data is processed and analyzed. From the analysis, the total energy demand is calculated, and different hybrid energy system configurations are designed using HOMER Pro (Hybrid Optimization for Multiple Energy Resources) and MATLAB software. A techno-economic and environmental comparison and life cycle assessment (LCA) of the different configurations using battery and hydrogen as storage systems are carried out. The various scenarios included PV-hydrogen-grid system, PV-hydrogen-grid-wind, PV-hydrogen-grid-biomass, PV-hydrogen-wind, PV-hydrogen-biomass, biomass-hydrogen, wind-hydrogen, PV-battery-grid-wind, PV- battery -grid-biomass, PV- battery -wind, PV- battery -biomass, and biomass- battery. From the analysis, the least cost system for the location was the PV-hydrogen-grid system, with a net present cost of about USD 9,529,161. Even though all scenarios were environmentally friendly, taking into account the recycling cost and pollution involved in battery systems, all systems with hydrogen as a storage system produced better results. In conclusion, hydrogen is becoming a very prominent energy storage solution for renewable energy micro-grids. It is easier to store compared with electric power, so it is suitable for long-distance mass storage. Hydrogen storage systems have several advantages over battery systems, including flexibility, long-term stability, and low environmental impact. The cost of hydrogen storage is still relatively high, but it is expected to decrease as more hydrogen production, and storage infrastructure is built. With the growing focus on renewable energy and the need to reduce greenhouse gas emissions, hydrogen is expected to play an increasingly important role in the energy storage landscape.

Keywords: renewable energy systems, microgrid, hydrogen production, energy storage systems

Procedia PDF Downloads 72
3759 A Comparative Assessment of the FoodSupply Vulnerability to Large-Scale Disasters in OECD Countries

Authors: Karolin Bauer, Anna Brinkmann

Abstract:

Vulnerabilities in critical infrastructure can cause significant difficulties for the affected population during crises. Securing the food supply as part of the critical infrastructure in crisis situations is an essential part of public services and a ground stone for a successful concept of civil protection. In most industrialized countries, there are currently no comparative studies regarding the food supply of the population during crisis and disaster events. In order to mitigate the potential impact in case of major disasters in Germany, it is absolutely necessary to investigate how the food supply can be secured. The research project aims to provide in-depth research on the experiences gathered during past large-scale disasters in the 34 OECD member countries in order to discover alternatives for an updated civil protection system in Germany. The basic research question is: "Which international approaches and structures of civil protection have been proven and would be useful to modernize the German civil protection with regards to the critical infrastructure and food supply?" Research findings should be extracted from an extensive literature review covering the entire research period as well as from personal and online-based interviews with experts and responsible persons from involved institutions. The capability of the research project insists on the deliberate choice to investigate previous large-scale disasters to formulate important and practical approaches to modernize civil protection in Germany.

Keywords: food supply, vulnerabilty, critical infratstructure, large-scale disaster

Procedia PDF Downloads 321
3758 Presentation of a Mix Algorithm for Estimating the Battery State of Charge Using Kalman Filter and Neural Networks

Authors: Amin Sedighfar, M. R. Moniri

Abstract:

Determination of state of charge (SOC) in today’s world becomes an increasingly important issue in all the applications that include a battery. In fact, estimation of the SOC is a fundamental need for the battery, which is the most important energy storage in Hybrid Electric Vehicles (HEVs), smart grid systems, drones, UPS and so on. Regarding those applications, the SOC estimation algorithm is expected to be precise and easy to implement. This paper presents an online method for the estimation of the SOC of Valve-Regulated Lead Acid (VRLA) batteries. The proposed method uses the well-known Kalman Filter (KF), and Neural Networks (NNs) and all of the simulations have been done with MATLAB software. The NN is trained offline using the data collected from the battery discharging process. A generic cell model is used, and the underlying dynamic behavior of the model has used two capacitors (bulk and surface) and three resistors (terminal, surface, and end), where the SOC determined from the voltage represents the bulk capacitor. The aim of this work is to compare the performance of conventional integration-based SOC estimation methods with a mixed algorithm. Moreover, by containing the effect of temperature, the final result becomes more accurate. 

Keywords: Kalman filter, neural networks, state-of-charge, VRLA battery

Procedia PDF Downloads 176
3757 Protective Custody in Child Protection: Reflection of Residential Care Workers in the Philippines

Authors: Hazel S. Cometa-Lamberte

Abstract:

This paper presents the residential care workers reflections in working with children who were under protective custody and placed in a residential care facility for children. Key informant interviews and focus group discussion were employed in this study to analyze the views of residential care workers on the programs and services and case management system in residential care for children. Results suggest that working in a residential care facility for children needs the interplay of both the worker’s personal and professional values, knowledge and skills in working with children. Analyzing the residential care workers experiences in handling children in residential care facilities is vital for the improvement of the policies, programs and services, the repertoire of techniques and facilitate the creation of a new social work practice framework/model in child protection specifically in residential care facilities.

Keywords: child protection, residential care, residential care workers, social workers

Procedia PDF Downloads 151
3756 Smart Trash Can Interface between Origin and Destination Waste Management

Authors: Fatemeh Ghorbani

Abstract:

The increase in population in the cities has also led to the increase and accumulation of urban waste. Managing and organizing waste is an action that must be taken to prevent environmental pollution. Separation of waste from the source is the first step that must be taken to determine whether the waste should be buried, burned, recycled, or used in the industry according to its type. Separation of trash is a cultural work that the general public must learn the necessity of doing; then, it is necessary to provide suitable conditions for collecting this waste. It is necessary to put segregated garbage cans in the city so that people can put the garbage in the right place. In this research, a smart trash can has been designed, which is connected to the central system of the municipality and has information on the units of each neighborhood separately. By entering the postal code on the page connected to each bin and entering the type of waste, the section related to the waste in the existing bin is opened and the person places the waste in the desired section. In addition, all the bins are connected to the municipal system, and the sensors in it warn each relevant body about the fullness and emptiness of the bins. Also, people can know how full and empty the bins around their building are through the designed application connected to the system. In this way, each organization collects its desired waste, wet and dry waste are separated from the beginning, and city pollution and unpleasant odors are also prevented.

Keywords: connector, smart trash can, waste management

Procedia PDF Downloads 53
3755 Minority Rights in Islamic Law (Sharia) and International Law Protection Mechanisms in the Region Kurdistan of Iraq

Authors: Ardawan Mustafa Ismail , Rebaz sdiq ismail

Abstract:

The subject of minorities takes an exceptional importance at all levels, around the world, especially those whose population is composed of many nationalities, and this subject became a very affective part in every country for its security, entity and stability, such as the nationality, religion or culture, as a result of internal factors and external influences, and at the same time it became clear that enslaving minorities had become a matter of reality. Which made the rights of minorities one of the legal, political and geographical issues, many attempts emerged that specialists and non-specialists have given the minorities ’problems their realistic solutions away from theorizing and assumption. On this chosen topic, there are many researches that are written in general places, but… It is believed did not see any in-depth studies dealing with the protection of minority rights of the Region of Kurdistan/ Iraq, because in the Region of Kurdistan/ Iraq there are many minorities living in this area, such as: Muslims, Yazidi, Assyrian, Christian, Chaldeans, and others.

Keywords: minority, international law, protection, Kurdistan, people

Procedia PDF Downloads 13
3754 Proposing Smart Clothing for Addressing Criminal Acts Against Women in South Africa

Authors: Anne Mastamet-Mason

Abstract:

Crimes against women is a global concern, and South Africa, in particular, is in a dilemma of dealing with constant criminal acts that face the country. Debates on violence against women in South Africa cannot be overemphasised any longer as crimes continue to rise year by year. The recent death of a university student at the University of Cape Town, as well as many other cases, continues to strengthen the need to find solutions from all the spheres of South African society. The advanced textiles market contains a high number and variety of technologies, many of which have protected status and constitute a relatively small portion of the textiles used for the consumer market. Examples of advanced textiles include nanomaterials, such as silver, titanium dioxide and zinc oxide, designed to create an anti-microbial and self-cleaning layer on top of the fibers, thereby reducing body smell and soiling. Smart textiles propose materials and fabrics versatile and adaptive to different situations and functions. Integrating textiles and computing technologies offer an opportunity to come up with differentiated characteristics and functionality. This paper presents a proposal to design a smart camisole/Yoga sports brazier and a smart Yoga sports pant garment to be worn by women while alone and while in purported danger zones. The smart garments are to be worn under normal clothing and cannot be detected or seen, or suspected by perpetrators. The garments are imbued with devices to sense any physical aggression and any abnormal or accelerated heartbeat that may be exhibited by the victim of violence. The signals created during the attack can be transmitted to the police and family members who own a mobile application system that accepts signals emitted. The signals direct the receiver to the exact location of the offence, and the victim can be rescued before major violations are committed. The design of the Yoga sports garments will be done by Professor Mason, who is a fashion designer by profession, while the mobile phone application system will be developed by Mr. Amos Yegon, who is an independent software developer.

Keywords: smart clothing, wearable technology, south africa, 4th industrial revolution

Procedia PDF Downloads 180
3753 AgriInnoConnect Pro System Using Iot and Firebase Console

Authors: Amit Barde, Dipali Khatave, Vaishali Savale, Atharva Chavan, Sapna Wagaj, Aditya Jilla

Abstract:

AgriInnoConnect Pro is an advanced agricultural automation system designed to enhance irrigation efficiency and overall farm management through IoT technology. Using MIT App Inventor, Telegram, Arduino IDE, and Firebase Console, it provides a user-friendly interface for farmers. Key hardware includes soil moisture sensors, DHT11 sensors, a 12V motor, a solenoid valve, a stepdown transformer, Smart Fencing, and AC switches. The system operates in automatic and manual modes. In automatic mode, the ESP32 microcontroller monitors soil moisture and autonomously controls irrigation to optimize water usage. In manual mode, users can control the irrigation motor via a mobile app. Telegram bots enable remote operation of the solenoid valve and electric fencing, enhancing farm security. Additionally, the system upgrades conventional devices to smart ones using AC switches, broadening automation capabilities. AgriInnoConnect Pro aims to improve farm productivity and resource management, addressing the critical need for sustainable water conservation and providing a comprehensive solution for modern farm management. The integration of smart technologies in AgriInnoConnect Pro ensures precision farming practices, promoting efficient resource allocation and sustainable agricultural development.

Keywords: agricultural automation, IoT, soil moisture sensor, ESP32, MIT app inventor, telegram bot, smart farming, remote control, firebase console

Procedia PDF Downloads 0
3752 Evaluation of PV Orientation Effect on Mismatch between Consumption Load and PV Power Profiles

Authors: Iyad M. Muslih, Yehya Abdellatif, Sara Qutishat

Abstract:

Renewable energy and in particular solar photovoltaic energy is emerging as a reasonable power generation source. The intermittent and unpredictable nature of solar energy can represent a serious challenge to the utility grids, specifically at relatively high penetration. To minimize the impact of PV power systems on the grid, self-consumption is encouraged. Self-consumption can be improved by matching the PV power generation with the electrical load consumption profile. This study will focus in studying different load profiles and comparing them to typical solar PV power generation at the selected sites with the purpose of analyzing the mismatch in consumption load profile for different users; residential, commercial, and industrial versus the solar photovoltaic output generation. The PV array orientation can be adjusted to reduce the mismatch effects. The orientation shift produces a corresponding shift in the energy production curve. This shift has a little effect on the mismatch for residential loads due to the fact the peak load occurs at night due to lighting loads. This minor gain does not justify the power production loss associated with the orientation shift. The orientation shift for both commercial and industrial cases lead to valuable decrease in the mismatch effects. Such a design is worth considering for reducing grid penetration. Furthermore, the proposed orientation shift yielded better results during the summer time due to the extended daylight hours.

Keywords: grid impact, HOMER, power mismatch, solar PV energy

Procedia PDF Downloads 588
3751 The Judiciary as Pacemaker? Considering the Role of Courts in an Expansion of Protection for War Refugees and People Fleeing Natural Disasters

Authors: Charlotte Lülf

Abstract:

Migration flows, resulting from war, climate change or economic crisis cannot be tackled by single states but need to be addressed as a transnational and international responsibility. The traditional architecture surrounding the work of the UNHCR and the 1951 Convention, however, is not equipped to deal with these challenges. Widely excluded from legal protection are people not individually persecuted for the statutory criteria, people that flee from the indiscriminate effects of an armed conflict as well as people fleeing natural disasters. With the lack of explicit legal protection and the political reluctance of nation states worldwide to extend their commitment in new asylum laws, the judiciary must be put in focus: it plays a unique role in interpreting and potentially expanding the application of existing regulations. This paper as part of an ongoing Ph.D. Project deals with the current and partly contradicting approaches to the protection of war- and climate refugees. Changing jurisprudential practice of national and regional courts will be assessed, as will be their dialogue to interpret the international obligations of human rights law, migration laws, and asylum laws in an interacting world. In recent judgments refoulment to an armed conflict as well as countries without adequate disaster relief or health care was argued as violating fundamental human and asylum law rights and therefore prohibited – even for applicants without refugee status: The first step towards access to subsidiary protection could herewith be established. Can one observe similar developments in other parts of the world? This paper will evaluate the role of the judiciary to define, redefine and potentially expand protection for people seeking refuge from armed conflicts and natural disasters.

Keywords: human rights law, asylum-seekers, displacement, migration

Procedia PDF Downloads 265
3750 Finite Volume Method for Flow Prediction Using Unstructured Meshes

Authors: Juhee Lee, Yongjun Lee

Abstract:

In designing a low-energy-consuming buildings, the heat transfer through a large glass or wall becomes critical. Multiple layers of the window glasses and walls are employed for the high insulation. The gravity driven air flow between window glasses or wall layers is a natural heat convection phenomenon being a key of the heat transfer. For the first step of the natural heat transfer analysis, in this study the development and application of a finite volume method for the numerical computation of viscous incompressible flows is presented. It will become a part of the natural convection analysis with high-order scheme, multi-grid method, and dual-time step in the future. A finite volume method based on a fully-implicit second-order is used to discretize and solve the fluid flow on unstructured grids composed of arbitrary-shaped cells. The integrations of the governing equation are discretised in the finite volume manner using a collocated arrangement of variables. The convergence of the SIMPLE segregated algorithm for the solution of the coupled nonlinear algebraic equations is accelerated by using a sparse matrix solver such as BiCGSTAB. The method used in the present study is verified by applying it to some flows for which either the numerical solution is known or the solution can be obtained using another numerical technique available in the other researches. The accuracy of the method is assessed through the grid refinement.

Keywords: finite volume method, fluid flow, laminar flow, unstructured grid

Procedia PDF Downloads 268
3749 Cybervetting and Online Privacy in Job Recruitment – Perspectives on the Current and Future Legislative Framework Within the EU

Authors: Nicole Christiansen, Hanne Marie Motzfeldt

Abstract:

In recent years, more and more HR professionals have been using cyber-vetting in job recruitment in an effort to find the perfect match for the company. These practices are growing rapidly, accessing a vast amount of data from social networks, some of which is privileged and protected information. Thus, there is a risk that the right to privacy is becoming a duty to manage your private data. This paper investigates to which degree a job applicant's fundamental rights are protected adequately in current and future legislation in the EU. This paper argues that current data protection regulations and forthcoming regulations on the use of AI ensure sufficient protection. However, even though the regulation on paper protects employees within the EU, the recruitment sector may not pay sufficient attention to the regulation as it not specifically targeting this area. Therefore, the lack of specific labor and employment regulation is a concern that the social partners should attend to.

Keywords: AI, cyber vetting, data protection, job recruitment, online privacy

Procedia PDF Downloads 68
3748 Development of the Web-Based Multimedia N-Screen Service System for Cross Platform

Authors: S. Bae, J. Shin, S. Lee

Abstract:

As the development of smart devices such as Smart TV, Smartphone, Tablet PC, Laptop, the interest in N-Screen Services that can be cross-linked with heterogeneous devices is increasing. N-Screen means User-centric services that can share and constantly watch multimedia contents anytime and anywhere. However, the existing N-Screen system has the limitation that N-Screen system has to implement the application for each platform and device to provide multimedia service. To overcome this limitation, Multimedia N-Screen Service System is proposed through the web, and it is independent of different environments. The combination of Web and cloud computing technologies from this study results in increasing efficiency and reduction in costs.

Keywords: N-screen, web, cloud, multimedia

Procedia PDF Downloads 284
3747 Analysis of Silicon Controlled Rectifier-Based Electrostatic Discharge Protection Circuits with Electrical Characteristics for the 5V Power Clamp

Authors: Jun-Geol Park, Kyoung-Il Do, Min-Ju Kwon, Kyung-Hyun Park, Yong-Seo Koo

Abstract:

This paper analyzed the SCR (Silicon Controlled Rectifier)-based ESD (Electrostatic Discharge) protection circuits with the turn-on time characteristics. The structures are the LVTSCR (Low Voltage Triggered SCR), the ZTSCR (Zener Triggered SCR) and the PTSCR (P-Substrate Triggered SCR). The three structures are for the 5V power clamp. In general, the structures with the low trigger voltage structure can have the fast turn-on characteristics than other structures. All the ESD protection circuits have the low trigger voltage by using the N+ bridge region of LVTSCR, by using the zener diode structure of ZTSCR, by increasing the trigger current of PTSCR. The simulation for the comparison with the turn-on time was conducted by the Synopsys TCAD simulator. As the simulation results, the LVTSCR has the turn-on time of 2.8 ns, ZTSCR of 2.1 ns and the PTSCR of 2.4 ns. The HBM simulation results, however, show that the PTSCR is the more robust structure of 430K in HBM 8kV standard than 450K of LVTSCR and 495K of ZTSCR. Therefore the PTSCR is the most effective ESD protection circuit for the 5V power clamp.

Keywords: ESD, SCR, turn-on time, trigger voltage, power clamp

Procedia PDF Downloads 330
3746 Research on the Protection and Development of Ancient Town Cultural Landscape Based on “Four State” Elements: Illustrated by the Example of Qikou

Authors: Bian ChengXiang, Wang Qian

Abstract:

With the deepening of the research on the connotation of cultural heritage and human geography, the cultural landscape takes landscape as a cultural product, integrates and blends cultural and natural heritage to explore the cultural value behind its material landscape. Qikou ancient town is a typical traditional settlement with a homomorphism of mountain and water veins. Its cultural accumulation and natural landscape play an important role in its development. Therefore, this paper will combine the material and cultural elements of Qikou ancient town to analyze the composition of the cultural landscape of the ancient town and explore the protection and utilization of the cultural landscape of Qikou ancient town from the four aspects of ecology, form, cultural form, and business form, so as to provide effective strategies for the development of the ancient town.

Keywords: four state, cultural landscape, ancient town, protection, development

Procedia PDF Downloads 120
3745 Optimization of Smart Beta Allocation by Momentum Exposure

Authors: J. B. Frisch, D. Evandiloff, P. Martin, N. Ouizille, F. Pires

Abstract:

Smart Beta strategies intend to be an asset management revolution with reference to classical cap-weighted indices. Indeed, these strategies allow a better control on portfolios risk factors and an optimized asset allocation by taking into account specific risks or wishes to generate alpha by outperforming indices called 'Beta'. Among many strategies independently used, this paper focuses on four of them: Minimum Variance Portfolio, Equal Risk Contribution Portfolio, Maximum Diversification Portfolio, and Equal-Weighted Portfolio. Their efficiency has been proven under constraints like momentum or market phenomenon, suggesting a reconsideration of cap-weighting.
 To further increase strategy return efficiency, it is proposed here to compare their strengths and weaknesses inside time intervals corresponding to specific identifiable market phases, in order to define adapted strategies depending on pre-specified situations. 
Results are presented as performance curves from different combinations compared to a benchmark. If a combination outperforms the applicable benchmark in well-defined actual market conditions, it will be preferred. It is mainly shown that such investment 'rules', based on both historical data and evolution of Smart Beta strategies, and implemented according to available specific market data, are providing very interesting optimal results with higher return performance and lower risk.
 Such combinations have not been fully exploited yet and justify present approach aimed at identifying relevant elements characterizing them.

Keywords: smart beta, minimum variance portfolio, equal risk contribution portfolio, maximum diversification portfolio, equal weighted portfolio, combinations

Procedia PDF Downloads 325
3744 Just Child Protection Practice for Immigrant and Racialized Families in Multicultural Western Settings: Considerations for Context and Culture

Authors: Sarah Maiter

Abstract:

Heightened globalization, migration, displacement of citizens, and refugee needs is putting increasing demand for approaches to social services for diverse populations that responds to families to ensure the safety and protection of vulnerable members while providing supports and services. Along with this social works re-focus on socially just approaches to practice increasingly asks social workers to consider the challenging circumstances of families when providing services rather than a focus on individual shortcomings alone. Child protection workers then struggle to ensure safety of children while assessing the needs of families. This assessment can prove to be difficult when providing services to immigrant, refugee, and racially diverse families as understanding of and familiarity with these families is often limited. Furthermore, child protection intervention in western countries is state mandated having legal authority when intervening in the lives of families where child protection concerns have been identified. Within this context, racialized immigrant and refugee families are at risk of misunderstandings that can result in interventions that are overly intrusive, unhelpful, and harsh. Research shows disproportionality and overrepresentation of racial and ethnic minorities, and immigrant families in the child protection system. Reasons noted include: a) possibilities of racial bias in reporting and substantiating abuse, b) struggles on the part of workers when working with families from diverse ethno-racial backgrounds and who are immigrants and may have limited proficiency in the national language of the country, c) interventions during crisis and differential ongoing services for these families, d) diverse contexts of these families that poses additional challenges for families and children, and e) possible differential definitions of child maltreatment. While cultural and ethnic diversity in child rearing approaches have been cited as contributors to child protection concerns, this approach should be viewed cautiously as it can result in stereotyping and generalizing that then results in inappropriate assessment and intervention. However, poverty and the lack of social supports, both well-known contributors to child protection concerns, also impact these families disproportionately. Child protection systems, therefore, need to continue to examine policy and practice approaches with these families that ensures safety of children while balancing the needs of families. This presentation provides data from several research studies that examined definitions of child maltreatment among a sample of racialized immigrant families, experiences of a sample of immigrant families with the child protection system, concerns of a sample of child protection workers in the provision of services to these families, and struggles of families in the transitions to their new country. These studies, along with others provide insights into areas of consideration for practice that can contribute to safety for children while ensuring just and equitable responses that have greater potential for keeping families together rather than premature apprehension and removal of children to state care.

Keywords: child protection, child welfare services, immigrant families, racial and ethnic diversity

Procedia PDF Downloads 274
3743 Temperature-Responsive Shape Memory Polymer Filament Integrated Smart Polyester Knitted Fabric Featuring Memory Behavior

Authors: Priyanka Gupta, Bipin Kumar

Abstract:

Recent developments in smart materials motivate researchers to create novel textile products for innovative and functional applications, which have several potential uses beyond the conventional. This study investigates the memory behavior of shape memory filaments integrated into a knitted textile structure. The research advances the knowledge of how these intelligent materials respond within textile structures. This integration may also open new avenues for developing smart fabrics with unique sensing and actuation capabilities. A shape memory filament and polyester yarn were knitted to produce a shape memory knitted fabric (SMF). Thermo-mechanical tensile test was carried out to quantify the memory behavior of SMF under different conditions. The experimental findings demonstrate excellent shape recovery (100%) and shape fixity up to 88% at different strains (20% and 60%) and temperatures (30 ℃ and 50 ℃). Experimental results reveal that memory filament behaves differently in a fabric structure than in its pristine condition at various temperatures and strains. The cycle test of SMF under different thermo-mechanical conditions indicated complete shape recovery with an increase in shape fixity. So, the utterly recoverable textile structure was achieved after a few initial cycles. These intelligent textiles are beneficial for the development of novel, innovative, and functional fabrics like elegant curtains, pressure garments, compression stockings, etc. In addition to fashion and medical uses, this unique feature may also be leveraged to build textile-based sensors and actuators.

Keywords: knitting, memory filament, shape memory, smart textiles, thermo-mechanical cycle

Procedia PDF Downloads 79
3742 Protection of Floating Roof Petroleum Storage Tanks against Lightning Strokes

Authors: F. M. Mohamed, A. Y. Abdelaziz

Abstract:

The subject of petroleum storage tank fires has gained a great deal of attention due to the high cost of petroleum, and the consequent disruption of petroleum production; therefore, much of the current research has focused on petroleum storage tank fires. Also, the number of petroleum tank fires is oscillating between 15 and 20 fires per year. About 33% of all tank fires are attributed to lightning. Floating roof tanks (FRT’s) are especially vulnerable to lightning. To minimize the likelihood of a fire, the API RP 545 recommends three major modifications to floating roof tanks. This paper was inspired by a stroke of lightning that ignited a fire in a crude oil storage tank belonging to an Egyptian oil company, and is aimed at providing an efficient lightning protection system to the tank under study, in order to avoid the occurrence of such phenomena in the future and also, to give valuable recommendations to be applied to floating roof tank projects.

Keywords: crude oil, fire, floating roof tank, lightning protection system

Procedia PDF Downloads 265
3741 A Lightweight Blockchain: Enhancing Internet of Things Driven Smart Buildings Scalability and Access Control Using Intelligent Direct Acyclic Graph Architecture and Smart Contracts

Authors: Syed Irfan Raza Naqvi, Zheng Jiangbin, Ahmad Moshin, Pervez Akhter

Abstract:

Currently, the IoT system depends on a centralized client-servant architecture that causes various scalability and privacy vulnerabilities. Distributed ledger technology (DLT) introduces a set of opportunities for the IoT, which leads to practical ideas for existing components at all levels of existing architectures. Blockchain Technology (BCT) appears to be one approach to solving several IoT problems, like Bitcoin (BTC) and Ethereum, which offer multiple possibilities. Besides, IoTs are resource-constrained devices with insufficient capacity and computational overhead to process blockchain consensus mechanisms; the traditional BCT existing challenge for IoTs is poor scalability, energy efficiency, and transaction fees. IOTA is a distributed ledger based on Direct Acyclic Graph (DAG) that ensures M2M micro-transactions are free of charge. IOTA has the potential to address existing IoT-related difficulties such as infrastructure scalability, privacy and access control mechanisms. We proposed an architecture, SLDBI: A Scalable, lightweight DAG-based Blockchain Design for Intelligent IoT Systems, which adapts the DAG base Tangle and implements a lightweight message data model to address the IoT limitations. It enables the smooth integration of new IoT devices into a variety of apps. SLDBI enables comprehensive access control, energy efficiency, and scalability in IoT ecosystems by utilizing the Masked Authentication Message (MAM) protocol and the IOTA Smart Contract Protocol (ISCP). Furthermore, we suggest proof-of-work (PoW) computation on the full node in an energy-efficient way. Experiments have been carried out to show the capability of a tangle to achieve better scalability while maintaining energy efficiency. The findings show user access control management at granularity levels and ensure scale up to massive networks with thousands of IoT nodes, such as Smart Connected Buildings (SCBDs).

Keywords: blockchain, IOT, direct acyclic graphy, scalability, access control, architecture, smart contract, smart connected buildings

Procedia PDF Downloads 102
3740 Smart Helmet for Two-Wheelers

Authors: Ravi Nandu, Kuldeep Singh

Abstract:

A helmet is a protective layer that is worn in order to prevent head injury. Helmet is the most important safety gear for two wheeler riders. However, due to carelessness of people, less importance toward safety, lot of causalities is every year. According to National Crime Records Bureau (NCRB) two wheelers claimed 92 lives every day out of which most were due to helmetless drive. The system design will be such that without wearing the helmet the rider cannot start two wheelers. The helmet will be connected to vehicle key ignition systems which will be electronically controlled. The smart helmet will be having proximity sensor fitted inside it, which will act as our switch for ignition and further with wireless connection the helmet sensor circuit will be connected to the vehicle ignition system.

Keywords: helmet, proximity sensor, microcontroller, head injury

Procedia PDF Downloads 292
3739 Measuring Flood Risk concerning with the Flood Protection Embankment in Big Flooding Events of Dhaka Metropolitan Zone

Authors: Marju Ben Sayed, Shigeko Haruyama

Abstract:

Among all kinds of natural disaster, the flood is a common feature in rapidly urbanizing Dhaka city. In this research, assessment of flood risk of Dhaka metropolitan area has been investigated by using an integrated approach of GIS, remote sensing and socio-economic data. The purpose of the study is to measure the flooding risk concerning with the flood protection embankment in big flooding events (1988, 1998 and 2004) and urbanization of Dhaka metropolitan zone. In this research, we considered the Dhaka city into two parts; East Dhaka (outside the flood protection embankment) and West Dhaka (inside the flood protection embankment). Using statistical data, we explored the socio-economic status of the study area population by comparing the density of population, land price and income level. We have drawn the cross section profile of the flood protection embankment into three different points for realizing the flooding risk in the study area, especially in the big flooding year (1988, 1998 and 2004). According to the physical condition of the study area, the land use/land cover map has been classified into five classes. Comparing with each land cover unit, historical weather station data and the socio-economic data, the flooding risk has been evaluated. Moreover, we compared between DEM data and each land cover units to find out the relationship with flood. It is expected that, this study could contribute to effective flood forecasting, relief and emergency management for a future flood event in Dhaka city.

Keywords: land use, land cover change, socio-economic, Dhaka city, GIS, flood

Procedia PDF Downloads 276
3738 Using Wearable Technology to Monitor Perinatal Health: Perspectives of Community Health Workers and Potential Use by Underserved Perinatal Women in California

Authors: Tamara Jimah, Priscilla Kehoe, Pamela Pimentel, Amir Rahmani, Nikil Dutt, Yuqing Guo

Abstract:

Ensuring equitable access to maternal health care is critical for public health. Particularly for underserved women, community health workers (CHWs) have been invaluable in providing support through health education and strategies for improved maternal self-care management. Our research aimed to assess the acceptance of technology by CHWs and perinatal women to promote healthy pregnancy and postpartum wellness. This pilot study was conducted at a local community organization in Orange County, California, where CHWs play an important role in supporting low-income women through home visitations. Questionnaires were administered to 14 CHWs and 114 pregnant and postpartum women, literate in English and/or Spanish. CHWs tested two wearable devices (Galaxy watch and Oura ring) and shared their user experience, including potential reception by the perinatal women they served. In addition, perinatal women provided information on access to a smart phone and the internet, as well as their interest in using wearable devices to self-monitor personal health with guidance from a CHW. Over 85% of CHWs agreed that it was useful to track pregnancy with the smart watch and ring. The majority of perinatal women owned a smartphone (97.4%), had access to the internet (80%) and unlimited data plans (78%), expressed interest in using the smart wearable devices to self-monitor health, and were open to receiving guidance from a CHW (87%). Community health workers and perinatal women embraced the use of wearable technology to monitor maternal health. These preliminary findings have formed the basis of an ongoing research study that integrates CHW guidance and technology (i.e., smart watch, smart ring, and a mobile phone app) to promote self-efficacy and self-management among underserved perinatal women.

Keywords: community health workers, health promotion and education, health equity, maternal and child health, technology

Procedia PDF Downloads 135
3737 From Restraint to Obligation: The Protection of the Environment in Times of Armed Conflict

Authors: Aaron Walayat

Abstract:

Protection of the environment in international law has been one of the most developed in the context of international humanitarian law. This paper examines the history of the protection of the environment in times of armed conflict, beginning with the traditional notion of restraint observed in antiquity towards the obligation to protect the environment, examining the treaties and agreements, both binding and non-binding which have contributed to environmental protection in war. The paper begins with a discussion of the ancient concept of restraint. This section examines the social norms in favor of protection of the environment as observed in the Bible, Greco-Roman mythology, and even more contemporary literature. The study of the traditional rejection of total war establishes the social foundation on which the current legal regime has stemmed. The paper then studies the principle of restraint as codified in international humanitarian law. It mainly examines Additional Protocol I of the Geneva Convention of 1949 and existing international law concerning civilian objects and the principles of international humanitarian law in the classification between civilian objects and military objectives. The paper then explores the environment’s classification as both a military objective and as a civilian object as well as explores arguments in favor of the classification of the whole environment as a civilian object. The paper will then discuss the current legal regime surrounding the protection of the environment, discussing some declarations and conventions including the 1868 Declaration of St. Petersburg, the 1907 Hague Convention No. IV, the Geneva Conventions, and the 1976 Environmental Modification Convention. The paper concludes with the outline noting the movement from codification of the principles of restraint into the various treaties, agreements, and declarations of the current regime of international humanitarian law. This paper provides an analysis of the history and significance of the relationship between international humanitarian law as a major contributor to the growing field of international environmental law.

Keywords: armed conflict, environment, legal regime, restraint

Procedia PDF Downloads 180
3736 Protection of Chinese Enterprises’ Overseas Investments Under Bilateral Investment Treaties Under the Belt and Road Initiative

Authors: Bo Sun, Ni Zhong

Abstract:

Bilateral investment treaties have played a role in the construction of the Belt and Road, providing institutional protection for Chinese companies' overseas investments. However, such treaties between China and countries along the Belt and Road were signed in the 1980s and 1990s, and their provisions are outdated and insufficiently detailed to provide adequate legal protection for Chinese investors when they initiate investment arbitration against host countries. By studying cases involving China in international investment arbitration, this paper suggests that China should pay attention to further clarifying the identity of "investors", the scope of disputes that can be submitted to arbitration, and the concept of "indirect expropriation" when updating bilateral investment treaties in the future, in order to reduce the risk of losing cases for Chinese investors.

Keywords: belt and road, bilateral investment agreement, investment arbitration, indirect expropriation

Procedia PDF Downloads 234