Search results for: lightning protection systemenvironment
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2411

Search results for: lightning protection systemenvironment

1751 Investor Beware - Significance of Investor Conduct under the Fair and Equitable Treatment Standard

Authors: Damayanti Sen

Abstract:

The Fair and Equitable Treatment standard has emerged as a core tenet of a formulated legal structure aimed at encouraging investment through the granting of a secure and stable environment for the investor in the Host State. As an absolute, non-contingent standard, it constitutes an independent and reliable system for the protection of the investor and is frequently invoked and applied in investor-state dispute settlement under bilateral and multilateral investment treaties. Thus far, the standard has been examined principally as a measure for determining the responsibility of host countries towards investors and investments. The conduct of investor in applying the Fair and Equitable Treatment Standard is relatively unexplored. Such an assessment may be necessary in light of the development of new defenses to demands of host governments to confine the application of the standard in order to ensure a proper balance between the protection of investors and the inherent right of a State to regulate economic conduct within its borders. This paper explores the implications of including considerations of investor conduct in the determination of whether an act of the host country’s administrative and/or judicial authorities has breached the fair and equitable treatment principle. The need for such defenses are of special concern for governments of developing countries, whose limited resources can affect their ability to provide an effective evaluation of the nature of the proposed investment, and, subsequently, to ensure that the expected benefits are realized. On the basis of conceptual analysis, and emerging international judicial and arbitral case law, this paper suggests that investor duties such as, the avoidance of unconscionable conduct, the reasonable assessment of investment risk in the host country, and a duty to operate an investment reasonably are leading to a new limit upon the fair and equitable treatment standard- one that can be succinctly captured in the phrase “Caveat Investor”.

Keywords: BITs, FET Standard, investor behavior, arbitral case law

Procedia PDF Downloads 312
1750 Comparison of Clinical Profiles of Patients Seen in a Women and Children Protection Unit in a Local Government Hospital in Makati, Philippines Before and During the COVID-19 Pandemic Between January 2018 to February 2020 and March 2020 to December 2021

Authors: Margaret Denise P. Del Rosario, Geraldine Alcantara

Abstract:

Background: The declaration of the COVID-19 pandemic has impacted hospital visits of child abuse cases with less consults but more severe injuries. Objective: The study aims to identify the clinical profiles of patients seen in the hospital ng Makati Women and Children Protection Unit before and during the pandemic. Design: A cross-sectional analytic study design through review of records that underwent quantitative analysis. Results: 264 cases pre-pandemic and 208 cases during the pandemic were reviewed. Most reported cases were neglect comprising of 47% of the pre-pandemic cases and 68% of cases during the pandemic. Supervisory neglect was most commonly reported. An equal distribution between males and females were seen among victims and alleged perpetrators. The age group of both victims and alleged perpetrators during the pandemic was significantly younger compared to the pre-pandemic period. Children belonging to larger family groups were commonly encountered with most of them being the eldest amongst siblings. Alleged perpetrators were mostly secondary graduates for both time periods. A significant increase of cases during the pandemic occurred at home. More patients required hospitalization during the pandemic period with 37% compared to the 23% of admissions prior to the pandemic. Furthermore, a three-fold increase of injuries sustained during the pandemic required intensive care. Conclusion: The study reflects increased severity of injuries related to abuse during the pandemic compared to pre-pandemic times. A significant increase in injuries requiring intensive care were also seen despite less reported cases.

Keywords: child abuse, COVID-19, violence against children, WCPU, neglect

Procedia PDF Downloads 51
1749 Tourist’s Perception and Identification of Landscape Elements of Traditional Village

Authors: Mengxin Feng, Feng Xu, Zhiyong Lai

Abstract:

As a typical representative of the countryside, traditional Chinese villages are rich in cultural landscape resources and historical information, but they are still in continuous decline. The problems of people's weak protection awareness and low cultural recognition are still serious, and the protection of cultural heritage is imminent. At the same time, with the rapid development of rural tourism, its cultural value has been explored and paid attention to again. From the perspective of tourists, this study aimed to explore people's perception and identity of cultural landscape resources under the current cultural tourism development background. We selected eleven typical landscape elements of Lingshui Village, a traditional village in Beijing, as research objects and conducted a questionnaire survey with two scales of perception and identity to explore the characteristics of people's perception and identification of landscape elements. We found that there was a strong positive correlation between the perception and identity of each element and that geographical location influenced visitors' overall perception. The perception dimensions scored the highest in location, and the lowest in history and culture, and the identity dimensions scored the highest in meaning and lowest in emotion. We analyzed the impact of visitors' backgrounds on people's perception and identity characteristics and found that age and education were two important factors. The elderly had a higher degree of perceived identity, as the familiarity effect increased their attention. Highly educated tourists had more stringent criteria for perception and identification. The above findings suggest strategies for conserving and optimizing landscape elements in the traditional village to improve the acceptance and recognition of cultural information in traditional villages, which will inject new vitality into the development of traditional villages.

Keywords: traditional village, tourist perception, landscape elements, perception and identity

Procedia PDF Downloads 143
1748 Laboratory Simulation of Subway Dynamic Stray Current Interference with Cathodically Protected Structures

Authors: Mohammad Derakhshani, Saeed Reza Allahkaram, Michael Isakani-Zakaria, Masoud Samadian, Hojat Sharifi Rasaey

Abstract:

Dynamic stray currents tend to change their magnitude and polarity with time at their source which will create anodic and cathodic spots on a nearby interfered structure. To date, one of the biggest known dynamic stray current sources are DC traction systems. Laboratory simulation is a suitable method to apply theoretical principles in order to identify effective parameters in dynamic stray current influenced corrosion. Simulation techniques can be utilized for various mitigation methods applied in a small scales for selection of the most efficient method with regards to field applications. In this research, laboratory simulation of potential fluctuations caused by dynamic stray current on a cathodically protected structure was investigated. A lab model capable of generating DC static and dynamic stray currents and simulating its effects on cathodically protected samples were developed based on stray current induced (contact-less) polarization technique. Stray current pick-up and discharge spots on an influenced structure were simulated by inducing fluctuations in the sample’s stationary potential. Two mitigation methods for dynamic stray current interference on buried structures namely application of sacrificial anodes as preferred discharge point for the stray current and potentially controlled cathodic protection was investigated. Results showed that the application of sacrificial anodes can be effective in reducing interference only in discharge spot. But cathodic protection through potential controlling is more suitable for mitigating dynamic stray current effects.

Keywords: simulation, dynamic stray current, fluctuating potentials, sacrificial anode

Procedia PDF Downloads 300
1747 Addressing Supply Chain Data Risk with Data Security Assurance

Authors: Anna Fowler

Abstract:

When considering assets that may need protection, the mind begins to contemplate homes, cars, and investment funds. In most cases, the protection of those assets can be covered through security systems and insurance. Data is not the first thought that comes to mind that would need protection, even though data is at the core of most supply chain operations. It includes trade secrets, management of personal identifiable information (PII), and consumer data that can be used to enhance the overall experience. Data is considered a critical element of success for supply chains and should be one of the most critical areas to protect. In the supply chain industry, there are two major misconceptions about protecting data: (i) We do not manage or store confidential/personally identifiable information (PII). (ii) Reliance on Third-Party vendor security. These misconceptions can significantly derail organizational efforts to adequately protect data across environments. These statistics can be exciting yet overwhelming at the same time. The first misconception, “We do not manage or store confidential/personally identifiable information (PII)” is dangerous as it implies the organization does not have proper data literacy. Enterprise employees will zero in on the aspect of PII while neglecting trade secret theft and the complete breakdown of information sharing. To circumvent the first bullet point, the second bullet point forges an ideology that “Reliance on Third-Party vendor security” will absolve the company from security risk. Instead, third-party risk has grown over the last two years and is one of the major causes of data security breaches. It is important to understand that a holistic approach should be considered when protecting data which should not involve purchasing a Data Loss Prevention (DLP) tool. A tool is not a solution. To protect supply chain data, start by providing data literacy training to all employees and negotiating the security component of contracts with vendors to highlight data literacy training for individuals/teams that may access company data. It is also important to understand the origin of the data and its movement to include risk identification. Ensure processes effectively incorporate data security principles. Evaluate and select DLP solutions to address specific concerns/use cases in conjunction with data visibility. These approaches are part of a broader solutions framework called Data Security Assurance (DSA). The DSA Framework looks at all of the processes across the supply chain, including their corresponding architecture and workflows, employee data literacy, governance and controls, integration between third and fourth-party vendors, DLP as a solution concept, and policies related to data residency. Within cloud environments, this framework is crucial for the supply chain industry to avoid regulatory implications and third/fourth party risk.

Keywords: security by design, data security architecture, cybersecurity framework, data security assurance

Procedia PDF Downloads 88
1746 Regulation Aspects for a Radioisotope Production Installation in Brazil

Authors: Rian O. Miranda, Lidia V. de Sa, Julio C. Suita

Abstract:

The Brazilian Nuclear Energy Commission (CNEN) is the main manufacturer of radiopharmaceuticals in Brazil. The Nuclear Engineering Institute (IEN), located at Rio de Janeiro, is one of its main centers of research and production, attending public and private hospitals in the state. This radiopharmaceutical production is used in diagnostic and therapy procedures and allows one and a half million nuclear medicine procedures annually. Despite this, the country is not self-sufficient to meet national demand, creating the need for importation and consequent dependence on other countries. However, IEN facilities were designed in the 60's, and today its structure is inadequate in relation to the good manufacturing practices established by sanitary regulator (ANVISA) and radiological protection leading to the need for a new project. In order to adapt and increase production in the country, a new plant will be built and integrated to the existing facilities with a new 30 MeV Cyclotron that is actually in project detailing process. Thus, it is proposed to survey current CNEN and ANVISA standards for radiopharmaceutical production facilities, as well as the radiological protection analysis of each area of the plant, following good manufacturing practices recommendations adopted nationally besides licensing exigencies for radioactive facilities. In this way, the main requirements for proper operation, equipment location, building materials, area classification, and maintenance program have been implemented. The access controls, interlocks, segregation zones and pass-through boxes integrated into the project were also analyzed. As a result, IEN will in future have the flexibility to produce all necessary radioisotopes for nuclear medicine application, more efficiently by simultaneously bombarding two targets, allowing the simultaneous production of two different radioisotopes, minimizing radiation exposure and saving operating costs.

Keywords: cyclotron, legislation, norms, production, radiopharmaceuticals

Procedia PDF Downloads 135
1745 Radon-222 Concentration and Potential Risk to Workers of Al-Jalamid Phosphate Mines, North Province, Saudi Arabia

Authors: El-Said. I. Shabana, Mohammad S. Tayeb, Maher M. T. Qutub, Abdulraheem A. Kinsara

Abstract:

Usually, phosphate deposits contain 238U and 232Th in addition to their decay products. Due to their different pathways in the environment, the 238U/232Th activity concentration ratio usually found to be greater than unity in phosphate sediments. The presence of these radionuclides creates a potential need to control exposure of workers in the mining and processing activities of the phosphate minerals in accordance with IAEA safety standards. The greatest dose to workers comes from exposure to radon, especially 222Rn from the uranium series, and has to be controlled. In this regard, radon (222Rn) was measured in the atmosphere (indoor and outdoor) of Al-Jalamid phosphate-mines working area using a portable radon-measurement instrument RAD7, in a purpose of radiation protection. Radon was measured in 61 sites inside the open phosphate mines, the phosphate upgrading facility (offices and rooms of the workers, and in some open-air sites) and in the dwellings of the workers residence-village that lies at about 3 km from the mines working area. The obtained results indicated that the average indoor radon concentration was about 48.4 Bq/m3. Inside the upgrading facility, the average outdoor concentrations were 10.8 and 9.7 Bq/m3 in the concentrate piles and crushing areas, respectively. It was 12.3 Bq/m3 in the atmosphere of the open mines. These values are comparable with the global average values. Based on the average values, the annual effective dose due to radon inhalation was calculated and risk estimates have been done. The average annual effective dose to workers due to the radon inhalation was estimated by 1.32 mSv. The potential excess risk of lung cancer mortality that could be attributed to radon, when considering the lifetime exposure, was estimated by 53.0x10-4. The results have been discussed in detail.

Keywords: dosimetry, environmental monitoring, phosphate deposits, radiation protection, radon

Procedia PDF Downloads 271
1744 Applying Wavelet Transform to Ferroresonance Detection and Protection

Authors: Chun-Wei Huang, Jyh-Cherng Gu, Ming-Ta Yang

Abstract:

Non-synchronous breakage or line failure in power systems with light or no loads can lead to core saturation in transformers or potential transformers. This can cause component and capacitance matching resulting in the formation of resonant circuits, which trigger ferroresonance. This study employed a wavelet transform for the detection of ferroresonance. Simulation results demonstrate the efficacy of the proposed method.

Keywords: ferroresonance, wavelet transform, intelligent electronic device, transformer

Procedia PDF Downloads 494
1743 Lactational Amenorrhea Method for Family Planning: An Evaluation of Compliance in the Philippines

Authors: Ellen Bautista, Rebecca M. Flueckiger, Easter Dasmarinas, Rajeev Colaco, Fulbert Alec R. Gillego, Alma M. Lozada, Cristina Bisson

Abstract:

Lactational Amenorrhea Method (LAM) for family planning is at least 98% effective at preventing pregnancy when all criteria are met; (1) the mother is exclusively or nearly exclusively breastfeeding, (2) the mother is amenorrheic (not menstruating), and (3) the baby is six months old or younger. LAM is particularly suited for women interested in family planning accepted by religious authorities. As a majority catholic nation, LAM is a common and accepted form of family planning in the Philippines. The USAID funded, LuzonHealth project conducted a prospective evaluation in Legazpi City to inform the enhancement of guidelines aimed at increasing LAM compliance and encouraging a second form of contraceptive once LAM protection expires. LAM compliance, reasons for non-compliance, family planning referral and uptake of secondary modern family planning methods were tracked over a nine-month period among 521 postpartum women. The evaluation found that at three months postpartum, 97% of women either met LAM criteria or had shifted to a non-LAM modern family planning method. In month six 87% of women no longer met LAM criteria and of these only 35% had shifted to an alternative modern family planning method. This means that at six-months postpartum 65% of the women in this evaluation were not protected against pregnancy through modern family planning methods. By postpartum month nine, 70% of the women had been referred to family planning counseling, yet of those referred only 34% reported using modern family planning methods. This evaluation clearly indicates scale-up of non-LAM modern family planning does not sufficiently complement the scale-down of LAM compliance. There is a need to increase client knowledge and understanding of LAM as a temporary family planning method with a strong focus on preparing to shift to another form of modern family planning once LAM protection expires. Additionally, there is great need to restructure the referral mechanism to ensure efficacy and quality of care.

Keywords: Philippines, family planning, lactational amenorrhea method, contraceptives

Procedia PDF Downloads 241
1742 Intellectual Property Laws: Protection of Celebrities’ Identity

Authors: Soumya Chaturvedi

Abstract:

Ever since India opened its doors for the world economy to enter, there has not been a single instance of recoil. A consequence of this move by the government of India resulted in India evolving as a consumer-driven market and in order to survive in this era of extreme competition, the corporate houses have employed every possible means to reach out and hit onto the sentiments of the consumers. The most obvious way to ensure a strong perseverance towards the specific product or brand is through celebrity endorsements. In a country like India, whose film industry accounts for the largest sales and output, it is indeed appalling to acknowledge the fact that it lacks an effective mechanism of protection of the commercial exploitation of celebrities’ attributes under the ambit of law. The western half of the globe has very well accepted and recognized the rights of the celebrities to decide upon the quantum of commercial exploitation of their own attributes and earn profit out of the same. However, the eastern half seems to be a little reluctant in accepting and enforcing these views per se. A celebrity has a right to publicity over the traits of his personality which involves voice, autographs, reputation, and style, so on and so forth as it is these attributes that are responsible for huge trade profits concerning the products to which such traits are attributed to. This clearly involves the right of the celebrity to benefit himself by commercially exploiting the same and refraining the unauthorized gain to third parties. The market is making it nearly impossible to proceed further with such weak laws considering the escalating rate of celebrity endorsements in the nation. This paper discusses the lacunae in law per se to identify a right as such by a celebrity over his traits that are potentially under the circle of commercial exploitation and the need of a definite legislation that would ensure a change in the paradigm of the Courts in India. Also, it discusses the only remedy available currently for violation, which is, a suit for passing off by Indian Courts under Trademark and Copyright laws and a comparison of the same with the mechanisms adopted by the legal systems across the globe.

Keywords: celebrity, rights, intellectual property, trademark, copyrights

Procedia PDF Downloads 334
1741 Precursors Signatures of Few Major Earthquakes in Italy Using Very Low Frequency Signal of 45.9kHz

Authors: Keshav Prasad Kandel, Balaram Khadka, Karan Bhatta, Basu Dev Ghimire

Abstract:

Earthquakes still exist as a threating disaster. Being able to predict earthquakes will certainly help prevent substantial loss of life and property. Perhaps, Very Low Frequency/Low Frequency (VLF/LF) signal band (3-30 kHz), which is effectively reflected from D-layer of ionosphere, can be established as a tool to predict earthquake. On May 20 and May 29, 2012, earthquakes of magnitude 6.1 and 5.8 respectively struck Emilia-Romagna of Italy. A year back, on August 24, 2016, an earthquake of magnitude 6.2 struck Central Italy (42.7060 N and 13.2230 E) at 1:36 UT. We present the results obtained from the US Navy VLF Transmitter’s NSY signal of 45.9 kHz transmitted from Niscemi, in the province of Sicily, Italy and received at the Kiel Longwave Monitor, Germany for 2012 and 2016. We analyzed the terminator times, their individual differences and nighttime fluctuation counts. We also analyzed trends, dispersion and nighttime fluctuation which gave us a possible precursors to these earthquakes. Since perturbations in VLF amplitude could also be due to various other factors like lightning, geomagnetic activities (storms, auroras etc.) and solar activities (flares, UV flux, etc.), we filtered the possible perturbations due to these agents to guarantee that the perturbations seen in VLF/LF amplitudes were as a precursor to Earthquakes. As our TRGCP path is North-south, the sunrise and sunset time in transmitter and receiver places matches making pathway for VLF/LF smoother and therefore hoping to obtain more natural data. To our surprise, we found many clear anomalies (as precursors) in terminator times 5 days to 16 days before the earthquakes. Moreover, using night time fluctuation method, we found clear anomalies 5 days to 13 days prior to main earthquakes. This exactly correlates with the findings of previous authors that ionospheric perturbations are seen few days to one month before the seismic activity. In addition to this, we were amazed to observe unexpected decrease of dispersion on certain anomalies where it was supposed to increase, thereby not supporting our finding to some extent. To resolve this problem, we devised a new parameter called dispersion nighttime (dispersion). On analyzing, this parameter decreases significantly on days of nighttime anomalies thereby supporting our precursors to much extent.

Keywords: D-layer, TRGCP (Transmitter Receiver Great Circle Path), terminator times, VLF/LF

Procedia PDF Downloads 189
1740 Climate Change and Perceived Socialization: The Role of Parents’ Climate Change Coping Style and Household Communication

Authors: Estefanya Vazquez-Casaubon, Veroline Cauberghe, Dieneke Van de Sompel, Hayley Pearce

Abstract:

Working together to reduce the anthropogenic impact should be a collective action, including effort within the household. In the matter, children are considered to have an important role in influencing the household to reduce the environmental impact through reversed socialization where children motivate and increase the concern of the parents towards environmental protection. Previous studies reveal that communication between parents and kids is key for effective reversed socialization. However, multiple barriers have been identified in the literature, such as the acceptance of the influence from the kids, the properties of the communication, among other factors. Based on the previous evidence, the present study aims to assess barriers and facilitators of communication at the household level that have an impact on reversed socialization. More precisely, the study examines how parents’ climate change coping strategy (problem-focused, meaning-focused, disregarding) influences the valence and the type of the communication related to climate change, and eventually the extent to which they report their beliefs and behaviours to be influenced by the pro-environmental perspectives of their children; i.e. reversed socialization. Via an online survey, 723 Belgian parents self-reported on communication about environmental protection and risk within their household (such as the frequency of exchange about topics related to climate change sourced from school, the household rules, imparting knowledge to the children, and outer factors like media or peer pressure, the emotional valence of the communication), their perceived socialization, and personal factors (coping mechanisms towards climate change). The results, using structural equation modelling, revealed that parents applying a problem-solving coping strategy related to climate change, appear to communicate more often in a positive than in a negative manner. Parents with a disregarding coping style towards climate change appear to communicate less often in a positive way within the household. Parents that cope via meaning-making of climate change showed to communicate less often in either a positive or negative way. Moreover, the perceived valence of the communication (positive or negative) influenced the frequency and type of household communication. Positive emotions increased the frequency of the communication overall. However, the direct effect of neither of the coping mechanisms on the reversed socialization was significant. High frequency of communication about the media, environmental views of the household members among other external topics had a positive impact on the perceived socialization, followed by discussions school-related; while parental instructing had a negative impact on the perceived socialization. Moreover, the frequency of communication was strongly affected by the perceived valence of the communication (positive or negative). The results go in line with previous evidence that a higher frequency of communication facilitates reversed socialization. Hence the results outstand how the coping mechanisms of the parents can be either a facilitator when they cope via problem-solving, while parents that disregard might avert frequent communication about climate change at the household.

Keywords: communication, parents’ coping mechanisms, environmental protection, household, perceived socialization

Procedia PDF Downloads 83
1739 Legal Provisions on Child Pornography in Bangladesh: A Comparative Study on South Asian Landscape

Authors: Monira Nazmi Jahan, Nusrat Jahan Nishat

Abstract:

'Child Pornography' is a sex crime that portrays illegal images and videos of a minor over the Internet and now has become a social concern with the increase of commission of this crime. The major objective of this paper is to identify and examine the laws relating to child pornography in Bangladesh and to compare this with other South Asian countries. In Bangladesh to prosecute under child pornography, provisions have been made in ‘Digital Security Act, 2018’ where it has been defined as involving child in areas of child sexuality or in sexuality and whoever commits the crime will be punished for 10 years imprisonment or 10 lac taka fine. In India, the crime is dealt with ‘The Protection of Children from Sexual Offences Act, 2012’ (POSCO) where the offenders for commission of this crime has been divided separately and has provision for punishments starting from three years to rigorous life imprisonment and shall also be liable to fine. In the Maldives, there is ‘Special Provisions Act to Deal with Child Sex Abuse Offenders, Act number 12/2009’. In this act it has been provided that a person is guilty of such an act if intentionally runs child prostitution, involves child in the creation of pornography or displays child’s sexual organ in pornography then shall be punished between 20 to 25 years of imprisonment. Nepal prosecutes this crime through ‘Act Relating to Children, 2018’ and the conviction of using child in prostitution or sexual services is imprisonment up to fifteen years and fine up to one hundred fifty thousand rupees. In Pakistan, child pornography is prosecuted with ‘Pakistan Penal Code Child Abuse Amendment Act, 2016’. This provides that one is guilty of this offence if he involves child with or without consent in such activities. It provides punishment for two to seven years of imprisonment or fine from two hundred thousand to seven hundred thousand rupees. In Bhutan child pornography is not explicitly addressed under the municipal laws. The Penal Code of Bhutan penalizes all kinds of pornography including child pornography under the provisions of computer pornography and the offence shall be a misdemeanor. Child Pornography is also prohibited under the ‘Child Care and Protection Act’. In Sri Lanka, ‘The Penal Code’ de facto criminalizes child prohibition and has a penalty of two to ten years and may also be liable to fine. The most shocking scenario exists in Afghanistan. There is no specific law for the protection of children from pornography, whereas this serious crime is present there. This paper will be conducted through a qualitative research method that is, the primary sources will be laws, and secondary sources will be journal articles and newspapers. The conclusion that can be drawn is except Afghanistan all other South Asian countries have laws for controlling this crime but still have loopholes. India has the most amended provisions. Nepal has no provision for fine, and Bhutan does not mention any specific punishment. Bangladesh compared to these countries, has a good piece of law; however, it also has space to broaden the laws for controlling child pornography.

Keywords: child abuse, child pornography, life imprisonment, penal code, South Asian countries

Procedia PDF Downloads 228
1738 Radioprotective Efficacy of Costus afer against the Radiation-Induced Hematology and Histopathology Damage in Mice

Authors: Idowu R. Akomolafe, Naven Chetty

Abstract:

Background: The widespread medical application of ionizing radiation has raised public concern about radiation exposure and, thus, associated cancer risk. The production of reactive oxygen species and free radicals as a result of radiation exposure can cause severe damage to deoxyribonucleic acid (DNA) of cells, thus leading to biological effect. Radiotherapy is an excellent modality in the treatment of cancerous cells, comes with a few challenges. A significant challenge is the exposure of healthy cells surrounding the tumour to radiation. The last few decades have witnessed lots of attention shifted to plants, herbs, and natural product as an alternative to synthetic compound for radioprotection. Thus, the study investigated the radioprotective efficacy of Costus afer against whole-body radiation-induced haematological, histopathological disorder in mice. Materials and Method: Fifty-four mice were randomly divided into nine groups. Animals were pretreated with the extract of Costus afer by oral gavage for six days before irradiation. Control: 6 mice received feed and water only; 6 mice received feed, water, and 3Gy; 6 mice received feed, water, and 6Gy; experimental: 6 mice received 250 mg/kg extract; 6 mice received 500 mg/kg extract; 6 mice received 250 mg/kg extract and 3Gy; 6 mice received 500 mg/kg extract and 3Gy; 6 mice received 250 mg/kg extract and 6Gy; 6 mice received 500 mg/kg extract and 6Gy in addition to feeding and water. The irradiation was done at the Radiotherapy and Oncology Department of Grey's Hospital using linear accelerator (LINAC). Thirty-six mice were sacrificed by cervical dislocation 48 hours after irradiation, and blood was collected for haematology tests. Also, the liver and kidney of the sacrificed mice were surgically removed for histopathology tests. The remaining eighteen (18) mice were used for mortality and survival studies. Data were analysed by one-way ANOVA, followed by Tukey's multiple comparison test. Results: Prior administration of Costus afer extract decreased the symptoms of radiation sickness and caused a significant delay in the mortality as demonstrated in the experimental mice. The first mortality was recorded on day-5 post irradiation, and this happened to the group E- that is, mice that received 6Gy but no extract. There was significant protection in the experimental mice, as demonstrated in the blood counts against hematopoietic and gastrointestinal damage when compared with the control. The protection was seen in the increase in blood counts of experimental animals and the number of survivor. The protection offered by Costus afer may be due to its ability to scavenge free radicals and restore gastrointestinal and bone marrow damage produced by radiation. Conclusions: The study has demonstrated that exposure of mice to radiation could cause modifications in the haematological and histopathological parameters of irradiated mice. However, the changes were relieved by the methanol extract of Costus afer, probably through its free radical scavenging and antioxidant properties.

Keywords: costus afer, hematological, mortality, radioprotection, radiotherapy

Procedia PDF Downloads 138
1737 Determination of Authorship of the Works Created by the Artificial Intelligence

Authors: Vladimir Sharapaev

Abstract:

This paper seeks to address the question of the authorship of copyrighted works created solely by the artificial intelligence or with the use thereof, and proposes possible interpretational or legislative solutions to the problems arising from the plurality of the persons potentially involved in the ultimate creation of the work and division of tasks among such persons. Being based on the commonly accepted assumption that a copyrighted work can only be created by a natural person, the paper does not deal with the issues regarding the creativity of the artificial intelligence per se (or the lack thereof), and instead focuses on the distribution of the intellectual property rights potentially belonging to the creators of the artificial intelligence and/or the creators of the content used for the formation of the copyrighted work. Moreover, the technical development and rapid improvement of the AI-based programmes, which tend to be reaching even greater independence on a human being, give rise to the question whether the initial creators of the artificial intelligence can be entitled to the intellectual property rights to the works created by such AI at all. As the juridical practice of some European courts and legal doctrine tends to incline to the latter opinion, indicating that the works created by the AI may not at all enjoy copyright protection, the questions of authorships appear to be causing great concerns among the investors in the development of the relevant technology. Although the technology companies dispose with further instruments of protection of their investments, the risk of the works in question not being copyrighted caused by the inconsistency of the case law and a certain research gap constitutes a highly important issue. In order to assess the possible interpretations, the author adopted a doctrinal and analytical approach to the research, systematically analysing the European and Czech copyright laws and case law in some EU jurisdictions. This study aims to contribute to greater legal certainty regarding the issues of the authorship of the AI-created works and define possible clues for further research.

Keywords: artificial intelligence, copyright, authorship, copyrighted work, intellectual property

Procedia PDF Downloads 120
1736 Study of Lamination Quality of Semi-Flexible Solar Modules with Special Textile Materials

Authors: K. Drabczyk, Z. Starowicz, S. Maleczek, P. Zieba

Abstract:

The army, police and fire brigade commonly use dedicated equipment based on special textile materials. The properties of these textiles should ensure human life and health protection. Equally important is the ability to use electronic equipment and this requires access to the source of electricity. Photovoltaic cells integrated with such textiles can be solution for this problem in the most of outdoor circumstances. One idea may be to laminate the cells to textile without changing their properties. The main goal of this work was analyzed lamination quality of special designed semi-flexible solar module with special textile materials as a backsheet. In the first step of investigation, the quality of lamination was determined using device equipped with dynamometer. In this work, the crystalline silicon solar cells 50 x 50 mm and thin chemical tempered glass - 62 x 62 mm and 0.8 mm thick - were used. The obtained results showed the correlation between breaking force and type of textile weave and fiber. The breaking force was in the ranges: 4.5-5.5 N, 15-20 N and 30-33 N depending on the type of wave and fiber type. To verify these observations the microscopic and FTIR analysis of fibers was performed. The studies showed the special textile can be used as a backsheet of semi-flexible solar modules. This work presents a new composition of solar module with special textile layer which, to our best knowledge, has not been published so far. Moreover, the work presents original investigations on adhesion of EVA (ethylene-vinyl acetate) polymer to textile with respect to fiber structure of laminated substrate. This work is realized for the GEKON project (No. GEKON2/O4/268473/23/2016) sponsored by The National Centre for Research and Development and The National Fund for Environmental Protection and Water Management.

Keywords: flexible solar modules, lamination process, solar cells, textile for photovoltaics

Procedia PDF Downloads 357
1735 The Evaluation of the Performance of CaCO3/Polymer Nano-Composites for the Preservation of Historic Limestone Monuments

Authors: Mohammed Badereldien, Rezk Diab, Mohamoud Ali, Ayman Aboelkassem

Abstract:

The stone surfaces of historical architectural heritage in Egypt are under threat from of various environmental factors such as temperature fluctuation, humidity, pollution, and microbes. Due to these factors, the facades of buildings are deteriorating deformation and disfiguration of external decoration and the formation of black accretion also often from the stone works. The aim of this study is to evaluate the effectiveness of CaCO₃ nano-particles as consolidation and protection material for calcareous stone monuments. Selected tests were carried out in order to estimate the superficial consolidating and protective effect of the treatment. When applied the nanoparticles dispersed in the acrylic copolymer; poly ethylmethacrylate (EMA)/methylacrylate (MA) (70/30, respectively) (EMA)/methylacrylate (MA) (70/30, respectively). The synthesis process of CaCO₃ nanoparticles/polymer nano-composite was prepared using in situ emulsion polymerization system. The consolidation and protection were characterized by TEM, while the penetration depth, re-aggregating effects of the deposited phase, and the surface morphology before and after treatment were examined by SEM (Scanning Electron Microscopy). Improvement of the stones' mechanical properties was evaluated by compressive strength tests. Changes in water-interaction properties were evaluated by water absorption capillarity measurements, and colorimetric measurements were used to evaluate the optical appearance. Together the results appear to demonstrate that CaCO₃/polymer nanocomposite is an efficient material for the consolidation of limestone architecture and monuments. As compared with samples treated with pure acrylic copolymer without Calcium carbonate nanoparticles, for example, CaCO₃ nanoparticles are completely compatible, strengthening limestone against thermal aging and improving its mechanical properties.

Keywords: calcium carbonate nanoparticles, consolidation, nanocomposites, calcareous stone, colorimetric measurements, compressive strength

Procedia PDF Downloads 131
1734 Detection of Resistive Faults in Medium Voltage Overhead Feeders

Authors: Mubarak Suliman, Mohamed Hassan

Abstract:

Detection of downed conductors occurring with high fault resistance (reaching kilo-ohms) has always been a challenge, especially in countries like Saudi Arabia, on which earth resistivity is very high in general (reaching more than 1000 Ω-meter). The new approaches for the detection of resistive and high impedance faults are based on the analysis of the fault current waveform. These methods are still under research and development, and they are currently lacking security and dependability. The other approach is communication-based solutions which depends on voltage measurement at the end of overhead line branches and communicate the measured signals to substation feeder relay or a central control center. However, such a detection method is costly and depends on the availability of communication medium and infrastructure. The main objective of this research is to utilize the available standard protection schemes to increase the probability of detection of downed conductors occurring with a low magnitude of fault currents and at the same time avoiding unwanted tripping in healthy conditions and feeders. By specifying the operating region of the faulty feeder, use of tripping curve for discrimination between faulty and healthy feeders, and with proper selection of core balance current transformer (CBCT) and voltage transformers with fewer measurement errors, it is possible to set the pick-up of sensitive earth fault current to minimum values of few amps (i.e., Pick-up Settings = 3 A or 4 A, …) for the detection of earth faults with fault resistance more than (1 - 2 kΩ) for 13.8kV overhead network and more than (3-4) kΩ fault resistance in 33kV overhead network. By implementation of the outcomes of this study, the probability of detection of downed conductors is increased by the utilization of existing schemes (i.e., Directional Sensitive Earth Fault Protection).

Keywords: sensitive earth fault, zero sequence current, grounded system, resistive fault detection, healthy feeder

Procedia PDF Downloads 115
1733 Encapsulated Western Red Cedar (Thuja Plicata) Essential Oil as a Prospective Biopesticide against Phytophthora Pathogens

Authors: Aleksandar M. Radojković, Jovana M. Ćirković, Sanja Z. Perać, Jelena N. Jovanović, Zorica M. Branković, Slobodan D. Milanović, Ivan Lj. Milenković, Jovan N. Dobrosavljević, Nemanja V. Simović, Vanja M. Tadić, Ana R. Žugić, Goran O. Branković

Abstract:

In many parts of the world, various Phytophthora species pose a serious threat to forests and crops. With the rapidly growing international trade in plants and the ongoing impacts of climate change, the harmful effects of plant pathogens of the genus Phytophthora are increasing, damaging the biodiversity and sustainability of forest ecosystems. This genus is one of the most destructive plant pathogens, causing the majority of fine root (66%) and collar rot diseases (90%) of woody plant species worldwide. Eco-friendly biopesticides, based on plant-derived products, such as essential oils (EOs), are one of the promising solutions to this problem. In this study, among three different EOs investigated (Chamaecyparis lawsoniana (A. Murr.) Parl., Thuja plicata Donn ex D.Don and Juniperus communis L.), western red cedar (Thuja plicata) essential oil almost completely inhibited the growth of three Phytophthora species (P. plurivora Jung and Burgess, P. quercina Jung, and P. ×cambivora (Petri) Buisman) during seven days of exposure for the EO concentrations of 0.1% and 0.5% (v/v). To prolong the inhibiting effect, Thuja plicata EO was encapsulated into a biopolymer matrix consisting of a chitosan-gelatin mixture to form a water-in-oil emulsion. This approach allowed the prolonged effect of the essential oil by its slow release from the biopolymer matrix and protection of the active components from atmospheric influences. Thus, it was demonstrated that encapsulated Thuja plicata EO consisting of sustainable bioproducts is efficient in controlling of Phytophthora species and can be considered a means of protection in natural and semi-natural ecosystems.

Keywords: emulsions, essential oils, phytophthora, thuja plicata

Procedia PDF Downloads 90
1732 Interactive IoT-Blockchain System for Big Data Processing

Authors: Abdallah Al-ZoubI, Mamoun Dmour

Abstract:

The spectrum of IoT devices is becoming widely diversified, entering almost all possible fields and finding applications in industry, health, finance, logistics, education, to name a few. The IoT active endpoint sensors and devices exceeded the 12 billion mark in 2021 and are expected to reach 27 billion in 2025, with over $34 billion in total market value. This sheer rise in numbers and use of IoT devices bring with it considerable concerns regarding data storage, analysis, manipulation and protection. IoT Blockchain-based systems have recently been proposed as a decentralized solution for large-scale data storage and protection. COVID-19 has actually accelerated the desire to utilize IoT devices as it impacted both demand and supply and significantly affected several regions due to logistic reasons such as supply chain interruptions, shortage of shipping containers and port congestion. An IoT-blockchain system is proposed to handle big data generated by a distributed network of sensors and controllers in an interactive manner. The system is designed using the Ethereum platform, which utilizes smart contracts, programmed in solidity to execute and manage data generated by IoT sensors and devices. such as Raspberry Pi 4, Rasbpian, and add-on hardware security modules. The proposed system will run a number of applications hosted by a local machine used to validate transactions. It then sends data to the rest of the network through InterPlanetary File System (IPFS) and Ethereum Swarm, forming a closed IoT ecosystem run by blockchain where a number of distributed IoT devices can communicate and interact, thus forming a closed, controlled environment. A prototype has been deployed with three IoT handling units distributed over a wide geographical space in order to examine its feasibility, performance and costs. Initial results indicated that big IoT data retrieval and storage is feasible and interactivity is possible, provided that certain conditions of cost, speed and thorough put are met.

Keywords: IoT devices, blockchain, Ethereum, big data

Procedia PDF Downloads 148
1731 The Web of Injustice: Untangling Violations of Personality Rights in European International Private Law

Authors: Sara Vora (Hoxha)

Abstract:

Defamation, invasion of privacy, and cyberbullying have all increased in tandem with the growth of the internet. European international private law may struggle to deal with such transgressions if they occur in many jurisdictions. The current study examines how effectively the legal system of European international private law addresses abuses of personality rights in cyberspace. The study starts by discussing how established legal frameworks are being threatened by online personality rights abuses. The article then looks into the rules and regulations of European international private law that are in place to handle overseas lawsuits. This article examines the different elements that courts evaluate when deciding which law to use in a particular case, focusing on the concepts of jurisdiction, choice of law, and recognition and execution of foreign judgements. Next, the research analyses the function of the European Union in preventing and punishing online personality rights abuses. Key pieces of law that control the collecting and processing of personal data on the Internet, including the General Data Protection Regulation (GDPR) and the e-Commerce Directive, are discussed. In addition, this article investigates how the ECtHR handles cases involving the infringement of personal freedoms, including privacy and speech. The article finishes with an assessment of how well the legal framework of European international private law protects individuals' right to privacy online. It draws attention to problems with the present legal structure, such as the inability to enforce international judgements, the inconsistency between national laws, and the necessity for stronger measures to safeguard people' rights online. This paper concludes that while European international private law provides a useful framework for dealing with violations of personality rights online, further harmonisation and stronger enforcement mechanisms are necessary to effectively protect individuals' rights in the digital age.

Keywords: European international private law, personality rights, internet, jurisdiction, cross-border disputes, data protection

Procedia PDF Downloads 73
1730 An Analysis of Institutional Environments on Corporate Social Responsibility Practices in Nigerian Renewable Energy Firms

Authors: Bolanle Deborah Motilewa, E. K. Rowland Worlu, Gbenga Mayowa Agboola, Ayodele Maxwell Olokundun

Abstract:

Several studies have proposed a one-size fit all approach to Corporate Social Responsibility (CSR) practices, such that CSR as it applies to developed countries is adapted to developing countries, ignoring the differing institutional environments (such as the regulative, economic, social and political environments), which affects the profitability and practices of businesses operating in them. CSR as it applies to filling institutional gaps in developing countries, was categorized into four themes: environmental protection, product and service innovation, social innovation and local cluster development. Based on the four themes, the study employed a qualitative research approach through the use of interviews and review of available publications to study the influence of institutional environments on CSR practices engaged in by three renewable energy firms operating in Nigeria. Over the course of three 60-minutes sessions with the top management and selected workers of the firms, four propositions were made: regulatory environment influences environmental protection practice of Nigerian renewable firms, economic environment influences product and service innovation practice of Nigerian renewable energy firms, the social environment impacts on social innovation in Nigerian renewable energy firms, and political environment affects local cluster development practice of Nigerian renewable energy firms. It was also observed that beyond institutional environments, the international exposure of an organization’s managers reflected in their approach to CSR. This finding on the influence of international exposure on CSR practices creates an area for further study. Insights from this paper are set to help policy makers in developing countries, CSR managers, and future researchers.

Keywords: corporate social responsibility, renewable energy firms, institutional environment, social entrepreneurship

Procedia PDF Downloads 290
1729 Application of Pyridine-based Water-soluble Corrosion Inhibitor in Offshore Sweet Oil Pipeline

Authors: M. S. Yalfani, J. Kohzadi, P. Ghadimi, S. Sobhani, M. Ghadimi

Abstract:

The use of oil and water-soluble corrosion inhibitors has been established in Iranian oil and gas production systems for a long time. Imidazoline and its derivatives are being extensively used which are known as conventional corrosion inhibitors. This type of product has shown significant performance and low side effects, so that could monopolize the market of inhibitors in this region. However, the price growth of imidazolines, as well as the development of new lower-cost components with similar or even higher performance than imidazoline, have influenced the exclusive market of imidazoline-based products. During the latest years, pyridine and its derivatives have challenged imidazoline due to their remarkable anticorrosive properties and lower prices as well. Recently, we presented a formulated water-soluble inhibitor based on pyridine - an alkyl pyridine quaternary salt (APQS) - which could successfully pass all lab tests and eventually succeeded in being applied in an offshore sweet oil pipeline. The product was able to achieve high corrosion protection (> 90 %) with the LPR technique at low dosages of 15-25 ppm under severe corrosion conditions. Moreover, the lab test results showed that the APQS molecule is able to form a strong and persistent bond with the metal surface. The product was later nominated to be evaluated through a field trial in an offshore sweet oil pipeline where PH2S < 0.05 psi and CO2 is 6.4 mol%. The three-month trial - extended to six months- resulted in remarkable internal protection obtained by continuous injection of 10 ppm inhibitor, which was as low as 1 mpy measured by both weight loss corrosion coupons and online ER probes. In addition, no side effects, such as tight emulsion and stable foaming, were observed. The residual of the corrosion inhibitor was measured at the end of the pipeline to ensure the full coverage of the inhibitor throughout the pipeline. Eventually, these promising results were able to convince the end user to consider pyridine-based inhibitors as a reliable alternative to imidazoline.

Keywords: corrosion inhibitor, pyridine, sweet oil, pipeline, offshore

Procedia PDF Downloads 5
1728 Security of Database Using Chaotic Systems

Authors: Eman W. Boghdady, A. R. Shehata, M. A. Azem

Abstract:

Database (DB) security demands permitting authorized users and prohibiting non-authorized users and intruders actions on the DB and the objects inside it. Organizations that are running successfully demand the confidentiality of their DBs. They do not allow the unauthorized access to their data/information. They also demand the assurance that their data is protected against any malicious or accidental modification. DB protection and confidentiality are the security concerns. There are four types of controls to obtain the DB protection, those include: access control, information flow control, inference control, and cryptographic. The cryptographic control is considered as the backbone for DB security, it secures the DB by encryption during storage and communications. Current cryptographic techniques are classified into two types: traditional classical cryptography using standard algorithms (DES, AES, IDEA, etc.) and chaos cryptography using continuous (Chau, Rossler, Lorenz, etc.) or discreet (Logistics, Henon, etc.) algorithms. The important characteristics of chaos are its extreme sensitivity to initial conditions of the system. In this paper, DB-security systems based on chaotic algorithms are described. The Pseudo Random Numbers Generators (PRNGs) from the different chaotic algorithms are implemented using Matlab and their statistical properties are evaluated using NIST and other statistical test-suits. Then, these algorithms are used to secure conventional DB (plaintext), where the statistical properties of the ciphertext are also tested. To increase the complexity of the PRNGs and to let pass all the NIST statistical tests, we propose two hybrid PRNGs: one based on two chaotic Logistic maps and another based on two chaotic Henon maps, where each chaotic algorithm is running side-by-side and starting from random independent initial conditions and parameters (encryption keys). The resulted hybrid PRNGs passed the NIST statistical test suit.

Keywords: algorithms and data structure, DB security, encryption, chaotic algorithms, Matlab, NIST

Procedia PDF Downloads 263
1727 Cloud Computing: Deciding Whether It Is Easier or Harder to Defend Against Cyber Attacks

Authors: Emhemed Shaklawoon, Ibrahim Althomali

Abstract:

We propose that we identify different defense mechanisms that were used before the introduction of the cloud and compare if their protection mechanisms are still valuable and to what degree. Note that in order to defend against vulnerability, we must know how this vulnerability is abused in an attack. Only then, we will be able to recognize if it is easier or harder to defend against cyber attacks.

Keywords: cloud computing, privacy, cyber attacks, defend the cloud

Procedia PDF Downloads 422
1726 An Advanced Numerical Tool for the Design of Through-Thickness Reinforced Composites for Electrical Applications

Authors: Bing Zhang, Jingyi Zhang, Mudan Chen

Abstract:

Fibre-reinforced polymer (FRP) composites have been extensively utilised in various industries due to their high specific strength, e.g., aerospace, renewable energy, automotive, and marine. However, they have relatively low electrical conductivity than metals, especially in the out-of-plane direction. Conductive metal strips or meshes are typically employed to protect composites when designing lightweight structures that may be subjected to lightning strikes, such as composite wings. Unfortunately, this approach downplays the lightweight advantages of FRP composites, thereby limiting their potential applications. Extensive studies have been undertaken to improve the electrical conductivity of FRP composites. The authors are amongst the pioneers who use through-thickness reinforcement (TTR) to tailor the electrical conductivity of composites. Compared to the conventional approaches using conductive fillers, the through-thickness reinforcement approach has been proven to be able to offer a much larger improvement to the through-thickness conductivity of composites. In this study, an advanced high-fidelity numerical modelling strategy is presented to investigate the effects of through-thickness reinforcement on both the in-plane and out-of-plane electrical conductivities of FRP composites. The critical micro-structural features of through-thickness reinforced composites incorporated in the modelling framework are 1) the fibre waviness formed due to TTR insertion; 2) the resin-rich pockets formed due to resin flow in the curing process following TTR insertion; 3) the fibre crimp, i.e., fibre distortion in the thickness direction of composites caused by TTR insertion forces. In addition, each interlaminar interface is described separately. An IMA/M21 composite laminate with a quasi-isotropic stacking sequence is employed to calibrate and verify the modelling framework. The modelling results agree well with experimental measurements for bothering in-plane and out-plane conductivities. It has been found that the presence of conductive TTR can increase the out-of-plane conductivity by around one order, but there is less improvement in the in-plane conductivity, even at the TTR areal density of 0.1%. This numerical tool provides valuable references as a design tool for through-thickness reinforced composites when exploring their electrical applications. Parametric studies are undertaken using the numerical tool to investigate critical parameters that affect the electrical conductivities of composites, including TTR material, TTR areal density, stacking sequence, and interlaminar conductivity. Suggestions regarding the design of electrical through-thickness reinforced composites are derived from the numerical modelling campaign.

Keywords: composite structures, design, electrical conductivity, numerical modelling, through-thickness reinforcement

Procedia PDF Downloads 87
1725 Microencapsulation for Enhancing the Survival of S. thermophilus and L. bulgaricus during Spray Drying of Sweetened Yoghurt

Authors: Dibyakanta Seth, Hari Niwas Mishra, Sankar Chandra Deka

Abstract:

Microencapsulation is an established method of protecting bacteria from the adverse conditions. An improved extrusion spraying technique was used to encapsulate mixed bacteria culture of S. thermophilus and L. bulgaricus using sodium alginate as the coating material. The effect of nozzle air pressure (200, 300, 400 and 500 kPa), sodium alginate concentration (1%, 1.5%, 2%, 2.5% and 3% w/v), different concentration of calcium chloride (0.1, 0.2, 1 M) and initial cell loads (10⁷, 10⁸, 10⁹ cfu/ml) on the viability of encapsulated bacteria were investigated. With the increase in air pressure the size of microcapsules decreased, however the effect was non-significant. There was no significant difference (p > 0.05) in the viability of encapsulated cells when the concentration of calcium chloride was increased. Increased level of sodium alginate significantly increased the survival ratio of encapsulated bacteria (P < 0.01). Encapsulation with 3% alginate was treated as optimum since a higher concentration of alginate increased the gel strength of the solution and thus was difficult to spray. Under optimal conditions 3% alginate, 10⁹ cfu/ml cell load, 20 min hardening time in 0.1 M CaCl2 and 400 kPa nozzle air pressure, the viability of bacteria cells was maximum compared to the free cells. The microcapsules made at the optimal condition when mixed with yoghurt and subjected to spray drying at 148°C, the survival ratio was 2.48×10⁻¹ for S. thermophilus and 7.26×10⁻¹ for L. bulgaricus. In contrast, the survival ratio of free cells of S. thermophilus and L. bulgaricus were 2.36×10⁻³ and 8.27×10⁻³, respectively. This study showed a decline in viable cells count of about 0.5 log over a period of 7 weeks while there was a decline of about 1 log in cultures which were incorporated as free cells in yoghurt. Microencapsulation provided better protection at higher acidity compared to free cells. This study demonstrated that microencapsulation of yoghurt culture in sodium alginate is an effective technique of protection against extreme drying conditions.

Keywords: extrusion, microencapsulation, spray drying, sweetened yoghurt

Procedia PDF Downloads 251
1724 Design, Shielding and Infrastructure of an X-Ray Diagnostic Imaging Area

Authors: D. Diaz, C. Guevara, P. Rey

Abstract:

This paper contains information about designing, shielding and protocols building in order to avoid ionizing radiation in X-Rays imaging areas as generated by X-Ray, mammography equipment, computed tomography equipment and digital subtraction angiography equipment, according to global standards. Furthermore, tools and elements about infrastructure to improve protection over patients, physicians and staff involved in a diagnostic imaging area are presented. In addition, technical parameters about each machine and the architecture designs and maps are described.

Keywords: imaging area, X-ray, shielding, dose

Procedia PDF Downloads 446
1723 Flood Prevention Strategy for Reserving Quality Ground Water Considering Future Population Growth in Kabul

Authors: Said Moqeem Sadat, Saito Takahiro, Inuzuka Norikazu, Sugiyama Ikuo

Abstract:

Kabul city is the capital of Afghanistan with a population of about 4.0 million in 2009 and 6.5 million in 2025. It is geographically located in a narrow plain valley along the Kabul River and is surrounded by high mountains. Due to its sharp geological condition, the city has been suffering from floods caused by storm water and snow melting water in the rainy season. Meanwhile, potable water resources are becoming a critical issue as the underground water table is decreasing falling rapidly due to domestic usage, industrial and agricultural activities usage especially in the dry season. This paper focuses on flood water management in Kabul including suburban agricultural area considering not only for flood protection but also: 1. To reserve the quality underground water for the future population growth. 2. To irrigate farming area in dry season using storm water ponds in rainy season. 3. To discharge city contaminated flood water to the downstream safely using existing channels/new pipes. Cost and benefit is considered in this study to find out a suitable flood protection method both in rural area and city center from a view point of 1 to 3 mentioned above. In this analysis, cost mainly consists of lost opportunity to develop lands due to flood ponds in addition to construction and maintenance one including connecting channels for water collecting/discharging. Benefit mainly consists of damage reduction of flood loss due to counter measures (this is corresponding cost) in addition to the contribution to agricultural crops. As far as reservation of the ground water for the future city growth is concerned, future demand and supply are compared in case that the pumping amount is limited by this irrigation system.

Keywords: cost-benefit, hydrological modeling, water management, water quality

Procedia PDF Downloads 268
1722 Valorization and Conservation of Rock Painting and Engravings of Kabylia Region (Algeria)

Authors: Samia Ait Ali Yahia

Abstract:

In Algeria, the most impressive and most known prehistoric art is the painted or engraved rock art which is present with abundance in several regions. The existence of rock art in Great Kabylia region has been known for over sixty years. The main purpose of this research is to show the dangers facing these rock paintings and engravings and what are the arrangements for their protection and recovery. As every vestige destroyed is a part of the world's memory which disappears, some steps have to be taken in order to protect these historical and archaeological heritages.

Keywords: rock paintings and engravings, preservation, valorization, Kabylia

Procedia PDF Downloads 454