Search results for: protection dilemma
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2554

Search results for: protection dilemma

2494 Porosity and Ultraviolet Protection Ability of Woven Fabrics

Authors: Polona Dobnik Dubrovski, Abhijit Majumdar

Abstract:

The increasing awareness of negative effects of ultraviolet radiation and regular, effective protection are actual themes in many countries. Woven fabrics as clothing items can provide convenient personal protection however not all fabrics offer sufficient UV protection. Porous structure of the material has a great effect on UPF. The paper is focused on an overview of porosity in woven fabrics, including the determination of porosity parameters on the basis of an ideal geometrical model of porous structure. Our experiment was focused on 100% cotton woven fabrics in a grey state with the same yarn fineness (14 tex) and different thread densities (to achieve relative fabric density between 59 % and 87 %) and different type of weaves (plain, 4-end twill, 5-end satin). The results of the research dealing with the modelling of UPF and the influence of volume and open porosity of tested samples on UPF are exposed. The results show that open porosity should be lower than 12 % to achieve good UV protection according to AS/NZ standard of tested samples. The results also indicate that there is no direct correlation between volume porosity and UPF, moreover, volume porosity namely depends on the type of weave and affects UPF as well. Plain fabrics did not offer any UV protection, while twill and satin fabrics offered good UV protection when volume porosity was less than 64 % and 66 %, respectively.

Keywords: fabric engineering, UV radiation, porous materials, woven fabric construction, modelling

Procedia PDF Downloads 267
2493 Rural Tourism Planning from the Perspective of Development and Protection of the River and Regional Integration: Taking Nanliangdu Village as an Example

Authors: Yadi Xu, Qingping Luo

Abstract:

Currently, there is a great tendency that more and more villages in China are trying to increase income by development of tourism. 'Beautiful Rural Construction' provides an excellent opportunity for the development of tourism. In this context, development orientation, transportation routes, and tourism service facilities are analyzed under the perspective of existing landscape utilization and regional integration based on the development tourism industry of the Nanliangdu Village in Jingxing Town, Shijiazhuang Province as a research object. In the program, the biggest issue is the contradiction between the ecological development and protection of the river and the development of economy. How to deal with the relationship between protection and development is the key to the design of this case. Furthermore, the streets and courtyard space, existing buildings, public environment, specific landscape of the ancient village with a history of thousands of years have strong regional characteristics. The article is actively exploring for suggestions and countermeasures to promote the development premised on protection and based on a regional view.

Keywords: development, integration, protection, rural tourism

Procedia PDF Downloads 294
2492 Intellectual Property and SMEs in the Baltic Sea Region: A Comparative Study on the Use of the Utility Model Protection

Authors: Christina Wainikka, Besrat Tesfaye

Abstract:

Several of the countries in the Baltic Sea region are ranked high in international innovations rankings, such as the Global Innovation Index and European Innovation Scoreboard. There are however some concerns in the performance of different countries. For example, there is a widely spread notion about “The Swedish Paradox”. Sweden is ranked high due to investments in R&D and patent activity, but the outcome is not as high as could be expected. SMEs in Sweden are also below EU average when it comes to registering intellectual property rights such as patents and trademarks. This study is concentrating on the protection of utility model. This intellectual property right does not exist in Sweden, but in for example Finland and Germany. The utility model protection is sometimes referred to as a “patent light” since it is easier to obtain than the patent protection but at the same time does cover technical solutions. In examining statistics on patent activities and activities in registering utility models it is clear that utility model protection is scarcely used in the countries that have the protection. In Germany 10 577 applications were made in 2021. In Finland there were 259 applications made in 2021. This can be compared with patent applications that were 58 568 in Germany in 2021 and 1 662 in Finland in 2021. In Sweden there has never been a protection for utility models. The only protection for technical solutions is patents and business secrets. The threshold for obtaining a patent is high, due to the legal requirements and the costs. The patent protection is there for often not chosen by SMEs in Sweden. This study examines whether the protection of utility models in other countries in the Baltic region provide SMEs in these countries with better options to protect their innovations. The legal methodology is comparative law. In order to study the effects of the legal differences statistics are examined and interviews done with SMEs from different industries.

Keywords: baltic sea region, comparative law, SME, utility model

Procedia PDF Downloads 114
2491 Protection of Television Programme Formats in Comparative Law

Authors: Mustafa Arikan, Ibrahim Ercan

Abstract:

In this paper, protection of program formats was investigated in terms of program formats. Protection of program formats was studied in the French Law in the sense of competition law and CPI. Since the English Judicial system exhibits differences from the legal system of Continental Europe, its investigation bears a special significance. The subject was also handled in German Law at length. Indeed, German Law was investigated in detail within the overall framework of the study. Here, the court decisions in the German Law and the views in the doctrine were expressed in general. There are many court decisions in the American legal system concerning the subject. These decisions also present alternatives in terms of a solution to the problem.

Keywords: comparative law, protection of television programme formats, intellectual property, american legal system

Procedia PDF Downloads 330
2490 The Research of Effectiveness of Animal Protection Act Implementation Reducing Animal Abuse

Authors: Yu Ling Chang

Abstract:

Since the United Nations announced Universal Declaration of Human Rights in 1948, people are paying more and more attention to the value of lives. On the other hand, life education is being vigorously pushed in different countries. Unfortunately, the results have been only moderately successful by reason that the concept is not implemented in everyone’s daily life. Even worse, animal abuse and killing events keep happening. This research is focused on generalizing a conclusion from different countries’ Animal Protection Act and actual execution by case studies, in order to make an approach of whether the number of animal abuse is directly influenced by different laws and regimes or not. It concludes the central notion and spirit of Animal Protection Act in German, Japan, and Taiwan. Providing the reference of specific schemes and analysis based on Taiwanese social culture.

Keywords: animal abuse, Animal Management Act, Animal Protection Act, social culture

Procedia PDF Downloads 213
2489 Ethics and Military Defections in Nonviolent Resistance Campaigns

Authors: Adi Levy

Abstract:

Military and security personnel defections during nonviolent resistance (NVR) campaigns are recognized as an effective way of undermining the regime’s power, but they also may generate moral dilemmas that contradict the moral standing of NVR tactics. NVR campaigns have been primarily praised for their adherence to moral and legal norms, yet some of NVR tactics raise serious ethical concerns. This paper focuses on NVR tactics that seek to promote defections and disobedience within military and security personnel to sustain their campaign. Academic literature regarding NVR tactics indicates that compared to violent forms of resistance, defections are more likely to occur when security forces confront nonviolent activists. Indeed, defections play a strategically fundamental role in nonviolent campaigns, particularly against authoritarian regimes, as it enables activists to undermine the regime’s central pillars of support. This study examines the events of the Arab Spring and discusses the ethical problems that arise in nonviolent activists’ promotion of defections and disobedience. The cases of Syria and Egypt suggest that the strategic promotion of defections and disobedience was significantly effective in sustaining the campaign. Yet, while such defections enhance nonviolent activists’ resilience, how they are promoted can be morally contentious and the consequences can be dire. Defections are encouraged by social, moral and emotional appeals that use the power disparities between unarmed civilians and powerful regimes to affect soldiers and security personnel’s process of decision-making. In what is commonly referred to as dilemma action, nonviolent activists deliberately entangle security forces in a moral dilemma that compels them to follow a moral code to protect unarmed civilians. In this way, activists sustain their struggle and even gain protection. Nonviolent activists are likely to be completely defeated when confronted with armed forces. Therefore they rely on the military and security personnel’s moral conscious of convincing them to refrain from using force against them. While this is effective, it also leaves soldiers and security forces exposed to the implications and punishments that might follow their disobedience or defection. As long as they remain nonviolent, activists enjoy civilian immunity despite using morally contentious tactics. But the severe implications brought upon defectors. As a result, demand a deep examination of this tactic’s moral permissibility and a discussion that assesses culpability for the moral implications of its application.

Keywords: culpability, defections, nonviolence, permissibility

Procedia PDF Downloads 117
2488 The Economic Valuation of Public Support Ecosystem: A Contingent Valuation Study in Setiu Wetland, Terengganu Malaysia

Authors: Elmira Shamshity

Abstract:

This study aimed to explore the economic approach for the Setiu wetland evaluation as a future protection strategy. A questionnaire survey was used based on the single-bounded dichotomous choice, contingent valuation method to differentiate individuals’ Willingness to Pay (WTP) for the conservation of the Setiu wetland. The location of study was Terengganu province in Malaysia. The results of the random questionnaire survey showed that protection of Setiu ecosystem is important to the indigenous community. The mean WTP for protection of ecosystem Setiu wetland was 12.985 Ringgit per month per household for 10 years. There was significant variation in the stated amounts of WTP based on the respondents’ knowledge, household income, educational level, and the bid amounts. The findings of this study may help improving understanding the WTP of indigenous people for the protection of wetland, and providing useful information for policy makers to design an effective program of ecosystem protection.

Keywords: willingness to pay, ecosystem, setiu wetland, Terengganu Malaysia

Procedia PDF Downloads 604
2487 The Need to Enhance Online Consumer Protection in KSA

Authors: Abdulrahman Aloufi

Abstract:

E-commerce has evolved to become a functional and mainstream tool of global trading, including in the Kingdom of Saudi Arabia. Consequently, online consumers need protection just as much as consumers in the offline world. In 2019, the Ministry of Commerce in Saudi Arabia established a so-called ‘e-commerce law’; however, this law does not cover the court enforcement of contracts entered into by international vendors, so it is not applicable in cross-border situations. The purpose of this paper is to identify the gaps present in this new e-commerce law in Saudi Arabia.

Keywords: consumer protection, e-commerce law, Saudi consumer, international vendor

Procedia PDF Downloads 174
2486 Study of the Behavior of an Organic Coating Applied on Algerian Oil Tanker in Seawater

Authors: N. Hammouda, K. Belmokre

Abstract:

The paints are used extensively today in the industry to protect the metallic structures of the aggressive environments. This work is devoted to the study of corrosion resistance and aging behavior of a paint coating providing external protection for oil tankers. To avoid problems related to corrosion of these vessels, two protection modes are provided: An electro chemical active protection (cathodic protection of the hull). A passive protection by external painting. Investigations are conducted using stationary and non-stationary electro chemical tools such as electro chemical impedance spectroscopy has allowed us to characterize the protective qualities of these films. The application of the EIS on our damaged in-situ painting shows the existence of several capacitive loops which is an indicator of the failure of our tested paint. Microscopic analysis (micrograph) helped bring essential elements in understanding the degradation of our paint condition and immersion training corrosion products.

Keywords: epoxy paints, electrochemical impedance spectroscopy, corrosion mechanisms, seawater

Procedia PDF Downloads 390
2485 Countering Terrorism and Defending Human Right after 9/11: The European Perspective

Authors: Anita Blagojević

Abstract:

It is well known that the terrorist attacks on the New York City and Washington, D.C. prompted unprecedented international action to enhance international cooperation in the prevention and suppression of terrorism. In the months (and years) after September 11, the world community focused on two main efforts: first, on efforts to bring those responsible for terrorist attacks to justice, and second, on efforts to prevent future terrorist attacks. In that sense, many governments took advantage of these efforts to strengthen their national security. In that process, however, human rights and civil liberties of certain groups of people were alleged. As a consequence, part of the price paid for protecting national security against terrorist attacks was the threat of infringement on people's fundamental rights and freedoms. The aim of this paper is to analyze the role of the European Union and the Council of Europe in finding the answer to the one of the main security dilemma for the present era: how to find the balance between the protection of national security and guarantee of the people's rights and fundamental freedoms?

Keywords: terrorism, antiterrorism, European Union, Council of Europe, human rights

Procedia PDF Downloads 377
2484 Application Potential of Selected Tools in Context of Critical Infrastructure Protection and Risk Analysis

Authors: Hromada Martin

Abstract:

Risk analysis is considered as a fundamental aspect relevant for ensuring the level of critical infrastructure protection, where the critical infrastructure is seen as system, asset or its part which is important for maintaining the vital societal functions. Article actually discusses and analyzes the potential application of selected tools of information support for the implementation and within the framework of risk analysis and critical infrastructure protection. Use of the information in relation to their risk analysis can be viewed as a form of simplifying the analytical process. It is clear that these instruments (information support) for these purposes are countless, so they were selected representatives who have already been applied in the selected area of critical infrastructure, or they can be used. All presented fact were the basis for critical infrastructure resilience evaluation methodology development.

Keywords: critical infrastructure, protection, resilience, risk analysis

Procedia PDF Downloads 636
2483 Structuring the Role of Indonesia's Dilemma Position in ASEAN to Combat Human Trafficking

Authors: Febi Eka Putri, Prabowo Anggorono

Abstract:

Human Trafficking has become a threat in the global phenomenon, including Indonesia as a country adopting democracy to uphold the human rights value. Indonesia is classified as a source of trafficking in persons which dominate by women and children for sexual exploitation and forced labor purposes. In this case, Indonesia has committed to combat trafficking in persons by enacted domestic law to criminalize all types of human trafficking in domestic and international level. Tracing to the efforts, we cannot just simplify it, however, in 2016 Indonesia has placed as a tier 2 country because the government does not fully achieve the minimum standard by U. S. Trafficking Victims Protection Act due to only making efforts as progress. While as a part of ASEAN member, Indonesia has signed ASEAN Human Rights Declaration but when it comes to Human Trafficking issue, there is only few ASEAN member who has ratified ASEAN Convention on Trafficking in Persons, in particular Women and Children such as Singapore, Cambodia, and Thailand. This brings the evidence to structuring the role of Indonesia to combat human trafficking.

Keywords: Indonesia, Association of Southeast Asian Nations (ASEAN), human trafficking, Tier 2 country

Procedia PDF Downloads 352
2482 The Benefits of Security Culture for Improving Physical Protection Systems at Detection and Radiation Measurement Laboratory

Authors: Ari S. Prabowo, Nia Febriyanti, Haryono B. Santosa

Abstract:

Security function that is called as Physical Protection Systems (PPS) has functions to detect, delay and response. Physical Protection Systems (PPS) in Detection and Radiation Measurement Laboratory needs to be improved continually by using internal resources. The nuclear security culture provides some potentials to support this research. The study starts by identifying the security function’s weaknesses and its strengths of security culture as a purpose. Secondly, the strengths of security culture are implemented in the laboratory management. Finally, a simulation was done to measure its effectiveness. Some changes were happened in laboratory personnel behaviors and procedures. All became more prudent. The results showed a good influence of nuclear security culture in laboratory security functions.

Keywords: laboratory, physical protection system, security culture, security function

Procedia PDF Downloads 184
2481 Modeling of Power Network by ATP-Draw for Lightning Stroke Studies

Authors: John Morales, Armando Guzman

Abstract:

Protection relay algorithms play a crucial role in Electric Power System stability, where, it is clear that lightning strokes produce the mayor percentage of faults and outages of Transmission Lines (TLs) and Distribution Feeders (DFs). In this context, it is imperative to develop novel protection relay algorithms. However, in order to get this aim, Electric Power Systems (EPS) network have to be simulated as real as possible, especially the lightning phenomena, and EPS elements that affect their behavior like direct and indirect lightning, insulator string, overhead line, soil ionization and other. However, researchers have proposed new protection relay algorithms considering common faults, which are not produced by lightning strokes, omitting these imperative phenomena for the transmission line protection relays behavior. Based on the above said, this paper presents the possibilities of using the Alternative Transient Program ATP-Draw for the modeling and simulation of some models to make lightning stroke studies, especially for protection relays, which are developed through Transient Analysis of Control Systems (TACS) and MODELS language corresponding to the ATP-Draw.

Keywords: back-flashover, faults, flashover, lightning stroke, modeling of lightning, outages, protection relays

Procedia PDF Downloads 315
2480 Protection of Transformers Against Surge Voltage

Authors: Anil S. Khopkar, Umesh N. Soni

Abstract:

Surge voltage arises in the system either by switching operations of heavy load or by natural lightning. Surge voltages cause significant failure of power system equipment if adequate protection is not provided. A Surge Arrester is a device connected to a power system to protect the equipment against surge voltages. To protect the transformers against surge voltages, metal oxide surge arresters (MOSA) are connected across each terminal. Basic Insulation Level (BIL) has been defined in national and international standards of transformers based on their voltage rating. While designing transformer insulation, the BIL of the transformer, Surge arrester ratings and its operating voltage have to be considered. However, the performance of transformer insulation largely depends on the ratings of the surge arrester connected, the location of the surge arrester, the margin considered in the insulation design, the quantity of surge voltage strike, etc. This paper demonstrates the role of Surge arresters in the protection of transformers against over-voltage, transformer insulation design, optimum location of surge arresters and their connection lead length, Insulation coordination for transformer, protection margin in BIL and methods of protection of transformers against surge voltages, in detail.

Keywords: surge voltage, surge arresters, insulation coordination, protection margin

Procedia PDF Downloads 61
2479 The Feminism of Data Privacy and Protection in Africa

Authors: Olayinka Adeniyi, Melissa Omino

Abstract:

The field of data privacy and data protection in Africa is still an evolving area, with many African countries yet to enact legislation on the subject. While African Governments are bringing their legislation to speed in this field, how patriarchy pervades every sector of African thought and manifests in society needs to be considered. Moreover, the laws enacted ought to be inclusive, especially towards women. This, in a nutshell, is the essence of data feminism. Data feminism is a new way of thinking about data science and data ethics that is informed by the ideas of intersectional feminism. Feminising data privacy and protection will involve thinking women, considering women in the issues of data privacy and protection, particularly in legislation, as is the case in this paper. The line of thought of women inclusion is not uncommon when even international and regional human rights specific for women only came long after the general human rights. The consideration is that these should have been inserted or rather included in the original general instruments in the first instance. Since legislation on data privacy is coming in this century, having seen the rights and shortcomings of earlier instruments, then the cue should be taken to ensure inclusive wholistic legislation for data privacy and protection in the first instance. Data feminism is arguably an area that has been scantily researched, albeit a needful one. With the spate of increase in the violence against women spiraling in the cyber world, compounding the issue of COVID-19 and the needful response of governments, and the effect of these on women and their rights, fast forward, the research on the feminism of data privacy and protection in Africa becomes inevitable. This paper seeks to answer the questions, what is data feminism in the African context, why is it important in the issue of data privacy and protection legislation; what are the laws, if any, existing on data privacy and protection in Africa, are they women inclusive, if not, why; what are the measures put in place for the privacy and protection of women in Africa, and how can this be made possible. The paper aims to investigate the issue of data privacy and protection in Africa, the legal framework, and the protection or provision that it has for women if any. It further aims to research the importance and necessity of feminizing data privacy and protection, the effect of lack of it, the challenges or bottlenecks in attaining this feat and the possibilities of accessing data privacy and protection for African women. The paper also researches the emerging practices of data privacy and protection of women in other jurisprudences. It approaches the research through the methodology of review of papers, analysis of laws, and reports. It seeks to contribute to the existing literature in the field and is explorative in its suggestion. It suggests a draft of some clauses to make any data privacy and protection legislation women inclusive. It would be useful for policymaking, academic, and public enlightenment.

Keywords: feminism, women, law, data, Africa

Procedia PDF Downloads 205
2478 Contextualizing Torture in Closed Institutions

Authors: Erinda Bllaca Ndroqi

Abstract:

The dilemma with which the monitoring professionals are facing in today’s reality is whether to accept that prisons all over the world constitute a place where not all rights are respected (ethical approach), or widen the scope of monitoring by prioritizing the special needs of people deprived of their liberties (human right approach), despite the context and the level of improved prison condition, staff profiling, more services oriented towards rehabilitation instead of punishment. Such dilemma becomes a concern if taking into consideration the fact that prisoners, due to their powerlessness and 'their lives at the hand of the state', are constantly under the threat of abuse of power and neglect, which in the Albanian case, has never been classified as torture. Scientific research in twenty-four (24) Albanian prisons shows that for some rights, prisoners belonging to 'vulnerable groups' such as mental illness, HIV positive status, sexual orientation, and terminal illness remain quite challenged and do not ensure that their basic rights are being met by the current criminal justice system (despite recommendations set forwards to prison authorities by the European Committee for the Prevention of Torture and Inhuman or Degrading Treatment or Punishment (CPT)). The research orients more discussion about policy and strategic recommendations that would need a thorough assessment of the impact of rehabilitation in special categories of prisoners, including recidivists.

Keywords: prisons, rehabilitation, torture, vulnerability

Procedia PDF Downloads 129
2477 A Multi Agent Based Protection Scheme for Smart Distribution Network in Presence of Distributed Energy Resources

Authors: M. R. Ebrahimi, B. Mahdaviani

Abstract:

Conventional electric distribution systems are radial in nature, supplied at one end through a main source. These networks generally have a simple protection system usually implemented using fuses, re-closers, and over-current relays. Recently, great attention has been paid to applying Distributed energy resources (DERs) throughout electric distribution systems. Presence of such generation in a network leads to losing coordination of protection devices. Therefore, it is desired to develop an algorithm which is capable of protecting distribution systems that include DER. On the other hand smart grid brings opportunities to the power system. Fast advancement in communication and measurement techniques accelerates the development of multi agent system (MAS). So in this paper, a new approach for the protection of distribution networks in the presence of DERs is presented base on MAS. The proposed scheme has been implemented on a sample 27-bus distribution network.

Keywords: distributed energy resource, distribution network, protection, smart grid, multi agent system

Procedia PDF Downloads 607
2476 Alternative Dispute Resolution Procedures for International Conflicts about Industrial Design

Authors: Moreno Liso Lourdes

Abstract:

The industrial design protects the appearance of part or all of a product resulting from the features of, in particular, the lines, contours, colors, shape, texture or materials of the product itself or its ornamentation. The industrial property offers a different answer depending on the characteristics of the shape object of protection possible, including the trademark and industrial design. There are certain cases where the trademark right invalidate the exclusive right of the industrial design. This can occur in the following situations: 1st) collected as a sign design and trademarked; and 2nd) you want to trademark and protected as a form design (either registered or unregistered). You can either get a trade mark or design right in the same sign or form, provided it meets the legal definition of brand and design and meets the requirements imposed for the protection of each of them, even able to produce an overlap of protection. However, this double protection does not have many advantages. It is, therefore, necessary to choose the best form of legal protection according to the most adequate ratios. The diversity of rights that can use the creator of an industrial design to protect your job requires you to make a proper selection to prevent others, especially their competitors, taking advantage of the exclusivity that guarantees the law. It is necessary to choose between defending the interests of the parties through a judicial or extrajudicial procedure when the conflict arises. In this paper, we opted for the defense through mediation.

Keywords: industrial design, ADR, Law, EUIPO

Procedia PDF Downloads 239
2475 Employee Whistleblower Protection: An Analysis of Malaysian Law and Islamic Law

Authors: Ashgar Ali Ali Mohamed, Farheen Baig Sardar Baig

Abstract:

In Malaysia, the Whistle-blower Protection Act 2010 provides protection to a person in an organization who exposes misconduct, alleged dishonest or illegal activity that violates the existing laws, among others. For example, alleged fraud, health and safety violations, and corruption, to name but a few. Undeniable, most whistle-blowers are internal to an organisation who report misconduct of a fellow employee or superior within their company and they frequently face reprisal at the hands of the organisation which they have accused. In fact, many people do not consider blowing the whistle because of fear of retaliation and losing their relationships at workplace. Although whistle-blowers are protected under law from employer retaliation, there have been many cases where punishment for whistleblowing has occurred, such as suspension, demotion, termination, or harsh mistreatment by other employees. Hence, this paper will analyse the adequacy of the legal protection available to employees who whistle-blow on their employers with reference to the Whistle-blower Protection Act 2010. Reference will also be made to the approach taken in other selected jurisdiction with a view of highlighting the adequacy of the Malaysian legislation on this subject besides strengthen employee whistle-blower protection. Further, reference is also made to the Islamic approach on this subject with particular reference to the concept of amr-bil-Ma’roof (ordering for acknowledged virtues) and nahi anil munkar (forbidding from sin). Allah (SWT) says: “And there should be a group amongst you who invite towards good, order for acknowledged virtues, forbid from sin and these it is that are the successful ones” (Al Imran(Chp 3), verse 104).

Keywords: whistleblower protection, employee whistleblower, detrimental and reprisal, Malaysian law

Procedia PDF Downloads 550
2474 The Effectiveness of Cathodic Protection on Microbiologically Influenced Corrosion Control

Authors: S. Taghavi Kalajahi, A. Koerdt, T. Lund Skovhus

Abstract:

Cathodic protection (CP) is an electrochemical method to control and manage corrosion in different industries and environments. CP which is widely used, especially in buried and sub-merged environments, which both environments are susceptible to microbiologically influenced corrosion (MIC). Most of the standards recommend performing CP using -800 mV, however, if MIC threats are high or sulfate reducing bacteria (SRB) is present, the recommendation is to use more negative potentials for adequate protection of the metal. Due to the lack of knowledge and research on the effectiveness of CP on MIC, to the author’s best knowledge, there is no information about what MIC threat is and how much more negative potentials should be used enabling adequate protection and not overprotection (due to hydrogen embrittlement risk). Recently, the development and cheaper price of molecular microbial methods (MMMs) open the door for more effective investigations on the corrosion in the presence of microorganisms, along with other electrochemical methods and surface analysis. In this work, using MMMs, the gene expression of SRB biofilm under different potentials of CP will be investigated. The specific genes, such as pH buffering, metal oxidizing, etc., will be compared at different potentials, enabling to determine the precise potential that protect the metal effectively from SRB. This work is the initial step to be able to standardize the recommended potential under MIC condition, resulting better protection for the infrastructures.

Keywords: cathodic protection, microbiologically influenced corrosion, molecular microbial methods, sulfate reducing bacteria

Procedia PDF Downloads 91
2473 Sequence Component-Based Adaptive Protection for Microgrids Connected Power Systems

Authors: Isabelle Snyder

Abstract:

Microgrid protection presents challenges to conventional protection techniques due to the low induced fault current. Protection relays present in microgrid applications require a combination of settings groups to adjust based on the architecture of the microgrid in islanded and grid-connected mode. In a radial system where the microgrid is at the other end of the feeder, directional elements can be used to identify the direction of the fault current and switch settings groups accordingly (grid connected or microgrid connected). However, with multiple microgrid connections, this concept becomes more challenging, and the direction of the current alone is not sufficient to identify the source of the fault current contribution. ORNL has previously developed adaptive relaying schemes through other DOE-funded research projects that will be evaluated and used as a baseline for this research. The four protection techniques in this study are the following: (1) Adaptive Current only Protection System (ACPS), Intentional (2) Unbalanced Control for Protection Control (IUCPC), (3) Adaptive Protection System with Communication Controller (APSCC) (4) Adaptive Model-Driven Protective Relay (AMDPR). The first two methods focus on identifying the islanded mode without communication by monitoring the current sequence component generated by the system (ACPS) or induced with inverter control during islanded mode (IUCPC) to identify the islanding condition without communication at the relay to adjust the settings. These two methods are used as a backup to the APSCC, which relies on a communication network to communicate the islanded configuration to the system components. The fourth method relies on a short circuit model inside the relay that is used in conjunction with communication to adjust the system configuration and computes the fault current and adjusts the settings accordingly.

Keywords: adaptive relaying, microgrid protection, sequence components, islanding detection, communication controlled protection, integrated short circuit model

Procedia PDF Downloads 93
2472 The Protection of Assets in the Crisis Management Processes

Authors: Jiri Barta

Abstract:

This paper deals with the prevention and management of emergencies. It focuses on the protection of assets of the critical infrastructure entities that are important to preventing, preparing for and management of emergencies and crisis situations. The paper defines assets and specifies their use and place in the process of crisis management and planning. Critical assets that are protected from the negative effects of emergency or crisis situation we can use in crisis management and response. This basic rule applies mainly to the substantial assets used in the protection of critical infrastructure processes.

Keywords: asset, continuity, critical infrastructure, crisis management process

Procedia PDF Downloads 515
2471 Influence of Cathodic Protection on High Strength, Pre-Stressed Corroded Tendons

Authors: Ibrahim R. Elomari, Fin O'Flaherty, Ibrahim R. Elomari, Paul Lambert

Abstract:

Cathodic protection (CP) is a technique commonly used to arrest corrosion of steel in infrastructure. However, it is not generally used on high strength, pre-stressed tendons due to the risk of hydrogen generation, leading to possible embrittlement. This paper investigates its use in such circumstances where the applied protection potential is varied to determine if CP can be safely employed on pre-stressed tendons. Plain steel tendons measuring 5.4 mm diameter were pre-stressed in timber moulds and embedded in sand/cement mortar, formulated to represent gunite. Two levels of pre-stressing were investigated (400MPa and 1200MPa). Pre-corrosion of 0% (control), 3% and 6% target loss of cross-sectional area was applied to replicate service conditions. Impressed current cathodic protection (ICCP) was then applied to the tendons at two levels of potential to identify any effect on strength. Instant-off values up to -950mV were used for normal protection with values of -1100mV or more negative to achieve overprotection. Following the ICCP phase, the tendons were removed from the mortar, cleaned and weighed to confirm actual percentage of corrosion. Tensile tests were then conducted on the tendons. The preliminary results show the influence of normal levels and overprotection of CP on the ultimate strength of the tendons.

Keywords: pre-stressed concrete, corrosion, cathodic protection, hydrogen embrittlement

Procedia PDF Downloads 265
2470 Transmission Line Protection Challenges under High Penetration of Renewable Energy Sources and Proposed Solutions: A Review

Authors: Melake Kuflom

Abstract:

European power networks involve the use of multiple overhead transmission lines to construct a highly duplicated system that delivers reliable and stable electrical energy to the distribution level. The transmission line protection applied in the existing GB transmission network are normally independent unit differential and time stepped distance protection schemes, referred to as main-1 & main-2 respectively, with overcurrent protection as a backup. The increasing penetration of renewable energy sources, commonly referred as “weak sources,” into the power network resulted in the decline of fault level. Traditionally, the fault level of the GB transmission network has been strong; hence the fault current contribution is more than sufficient to ensure the correct operation of the protection schemes. However, numerous conventional coal and nuclear generators have been or about to shut down due to the societal requirement for CO2 emission reduction, and this has resulted in a reduction in the fault level on some transmission lines, and therefore an adaptive transmission line protection is required. Generally, greater utilization of renewable energy sources generated from wind or direct solar energy results in a reduction of CO2 carbon emission and can increase the system security and reliability but reduces the fault level, which has an adverse effect on protection. Consequently, the effectiveness of conventional protection schemes under low fault levels needs to be reviewed, particularly for future GB transmission network operating scenarios. The proposed paper will evaluate the transmission line challenges under high penetration of renewable energy sources andprovides alternative viable protection solutions based on the problem observed. The paper will consider the assessment ofrenewable energy sources (RES) based on a fully rated converter technology. The DIgSILENT Power Factory software tool will be used to model the network.

Keywords: fault level, protection schemes, relay settings, relay coordination, renewable energy sources

Procedia PDF Downloads 205
2469 Testing of Complicated Bus Bar Protection Using Smart Testing Methodology

Authors: K. N. Dinesh Babu

Abstract:

In this paper, the protection of a complicated bus arrangement with a dual bus coupler and bus sectionalizer using low impedance differential protection applicable for very high voltages like 220kV and 400kV is discussed. In many power generation stations, several operational procedures are implemented to utilize the transfer bus as the main bus and to facilitate the maintenance of circuit breakers and current transformers (in each section) without shutting down the bay(s). Owing to this fact, the complications in operational philosophy have thrown challenges for the bus bar protection implementation. Many bus topologies allow any one of the main buses available in the station to be used as an auxiliary bus. In such a system, pre-defined precautions and procedures are made as guidelines, which are followed before assigning any bus as an auxiliary bus. The procedure involves shifting of links, changing rotary switches, insertion of test block, and so on, thereby causing unreliable operation. This kind of unreliable operation or inadvertent procedural lapse may result in the isolation of the bus bar from the grid due to the unpredictable operation of the bus bar protection relay, which is a commonly occurring phenomenon due to manual mistakes. With the sophisticated configuration and implementation of logic in modern intelligent electronic devices, the operator is free to select the transfer arrangement without sacrificing the protection required by a bus differential system for a reliable operation, and labor-intensive processes are completely eliminated. This paper deals with the procedure to test the security logic for such special scenarios using Megger make SMRT, bus bar protection relay to assure system stability and get rid of all the specific operational precautions/procedure.

Keywords: bus bar protection, by-pass isolator, blind spot, breaker failure, intelligent electronic device, end fault, bus unification, directional principle, zones of protection, breaker re-trip, under voltage security, smart megger relay tester

Procedia PDF Downloads 67
2468 A Mixed-method Study of Psychological Empowerment in Child Protection Practitioners

Authors: Amy Bromley

Abstract:

Child protection practitioners are a vital part of systems designed to protect children from abuse and neglect. Reforms in Anglo-American systems have shown a trend towards compliance-culture that reduces practitioner autonomy and empowerment, increasing staff turnover and negatively impacting outcomes for children. This explanatory mixed-methods study examined psychological empowerment in a national sample of child protection practitioners in Australia (n=109) using the Psychological Empowerment Instrument followed by semi-structured interviews (n=19). The results show that practitioners experience the sub-dimensions of psychological empowerment differently, perceiving themselves to have high levels of competence and satisfaction in their work but limited opportunities for self-determination and low levels of impact on decision-making in their organizations. The qualitative data revealed that practitioners do not trust systemic reforms and have experienced them as ineffective, politically driven, and bureaucratic. The increased compliance demanded from these reforms has left practitioners feeling that their expertise is not valued, leading many to leave their organizations. The practitioners who remain employed in child protection identified their use of advocacy, curiosity, and child-centered values as ways of protecting their psychological empowerment. The findings highlight the ways psychological empowerment can be promoted within child protection systems, improving staff retention and building expertise.

Keywords: child protection, implementation, psychological empowerment, systems theory

Procedia PDF Downloads 200
2467 Status of Radiation Protection at Radiation Oncology, BPKM Cancer Hospital, Nepal

Authors: Surendra B. Chand, P. P. Chaurasia, M. P. Adhikari, R. N. Yadav

Abstract:

Objective: The objective of this work was to evaluate all the safety procedures toward the radiation protection for workers in the radiation oncology department. Materials and Methods: The annual thermoluminescent dosimeters (TLDs) reports for five years of the staffs were evaluated, radiation surveys were done in the control consoles, radiotherapy machines room and waiting areas of all machines using Aloka survey meter. Results: The five years TLD reports shows that the whole body dose of the individual staffs is found within the annual dose limit except the accidental exposures. Radiation exposures in the working areas are also safe limits. Conclusion: The radiation safety practices for radiation protection are satisfactory and the radiation workers of the departments are found working within the safe limit.

Keywords: radiation protection, safety, ICRP, dose limits, TLD, radiation devices

Procedia PDF Downloads 567
2466 The Iranian Law and Refugee Survivors of Sexual and Gender-Based Violence

Authors: Aminreza Koohestani

Abstract:

This paper intends to explore the existing safeguards available within the Iranian law in protecting refugees affected by Sexual and Gender-Based Violence (SGBV). The Iranian law afforded protection for women and girls against SGBV is scattered across various bodies of law. Moreover, the degree of protection provided by the law varies greatly from one type of SGBV to another. The paper discusses the scope of applicability of Iranian laws to refugees affected by SGBV as well as substantive and procedural laws afforded protection for survivors of SGBV.

Keywords: Iran, law, violence, women

Procedia PDF Downloads 227
2465 Consumer Protection: An Exploration of the Role of the State in Protecting Consumers Before and During Inflation

Authors: Fatimah Opebiyi

Abstract:

Economic growth promotion, inflation reduction and consumer protection are among the core public interest aims of governments. Nevertheless, higher rates of default by consumers in relation to credit card loans and mortgages in recent times illustrate that government’s performance in balancing the protection of the economy and consumer is subpar. This thereby raises an important question on the role of government in protecting consumers during prolonged spells of inflation, particularly when such inflationary trends may be traceable to the acts of the government. Adopting a doctrinal research methodology, this article investigates the evolution of the concept of consumer protection in the United Kingdom and also brings to the fore the tensions and conflicts of interests in the aims and practices of the main regulators within the financial services industry. Relying on public interest theories of regulation and responsive regulatory theory, the article explores the limitations in the state’s ability to strike the right balance in meeting regulatory aims of the regulatory agencies at the opposite ends of the spectrum.

Keywords: financial regulation, consumer protection, prudential regulation, public interest theories of regulation, central bank

Procedia PDF Downloads 77