Search results for: aerosol protection
1385 3D-Mesh Robust Watermarking Technique for Ownership Protection and Authentication
Authors: Farhan A. Alenizi
Abstract:
Digital watermarking has evolved in the past years as an important means for data authentication and ownership protection. The images and video watermarking was well known in the field of multimedia processing; however, 3D objects' watermarking techniques have emerged as an important means for the same purposes, as 3D mesh models are in increasing use in different areas of scientific, industrial, and medical applications. Like the image watermarking techniques, 3D watermarking can take place in either space or transform domains. Unlike images and video watermarking, where the frames have regular structures in both space and temporal domains, 3D objects are represented in different ways as meshes that are basically irregular samplings of surfaces; moreover, meshes can undergo a large variety of alterations which may be hard to tackle. This makes the watermarking process more challenging. While the transform domain watermarking is preferable in images and videos, they are still difficult to implement in 3d meshes due to the huge number of vertices involved and the complicated topology and geometry, and hence the difficulty to perform the spectral decomposition, even though significant work was done in the field. Spatial domain watermarking has attracted significant attention in the past years; they can either act on the topology or on the geometry of the model. Exploiting the statistical characteristics in the 3D mesh models from both geometrical and topological aspects was useful in hiding data. However, doing that with minimal surface distortions to the mesh attracted significant research in the field. A 3D mesh blind watermarking technique is proposed in this research. The watermarking method depends on modifying the vertices' positions with respect to the center of the object. An optimal method will be developed to reduce the errors, minimizing the distortions that the 3d object may experience due to the watermarking process, and reducing the computational complexity due to the iterations and other factors. The technique relies on the displacement process of the vertices' locations depending on the modification of the variances of the vertices’ norms. Statistical analyses were performed to establish the proper distributions that best fit each mesh, and hence establishing the bins sizes. Several optimizing approaches were introduced in the realms of mesh local roughness, the statistical distributions of the norms, and the displacements in the mesh centers. To evaluate the algorithm's robustness against other common geometry and connectivity attacks, the watermarked objects were subjected to uniform noise, Laplacian smoothing, vertices quantization, simplification, and cropping. Experimental results showed that the approach is robust in terms of both perceptual and quantitative qualities. It was also robust against both geometry and connectivity attacks. Moreover, the probability of true positive detection versus the probability of false-positive detection was evaluated. To validate the accuracy of the test cases, the receiver operating characteristics (ROC) curves were drawn, and they’ve shown robustness from this aspect. 3D watermarking is still a new field but still a promising one.Keywords: watermarking, mesh objects, local roughness, Laplacian Smoothing
Procedia PDF Downloads 1601384 Seismic Perimeter Surveillance System (Virtual Fence) for Threat Detection and Characterization Using Multiple ML Based Trained Models in Weighted Ensemble Voting
Authors: Vivek Mahadev, Manoj Kumar, Neelu Mathur, Brahm Dutt Pandey
Abstract:
Perimeter guarding and protection of critical installations require prompt intrusion detection and assessment to take effective countermeasures. Currently, visual and electronic surveillance are the primary methods used for perimeter guarding. These methods can be costly and complicated, requiring careful planning according to the location and terrain. Moreover, these methods often struggle to detect stealthy and camouflaged insurgents. The object of the present work is to devise a surveillance technique using seismic sensors that overcomes the limitations of existing systems. The aim is to improve intrusion detection, assessment, and characterization by utilizing seismic sensors. Most of the similar systems have only two types of intrusion detection capability viz., human or vehicle. In our work we could even categorize further to identify types of intrusion activity such as walking, running, group walking, fence jumping, tunnel digging and vehicular movements. A virtual fence of 60 meters at GCNEP, Bahadurgarh, Haryana, India, was created by installing four underground geophones at a distance of 15 meters each. The signals received from these geophones are then processed to find unique seismic signatures called features. Various feature optimization and selection methodologies, such as LightGBM, Boruta, Random Forest, Logistics, Recursive Feature Elimination, Chi-2 and Pearson Ratio were used to identify the best features for training the machine learning models. The trained models were developed using algorithms such as supervised support vector machine (SVM) classifier, kNN, Decision Tree, Logistic Regression, Naïve Bayes, and Artificial Neural Networks. These models were then used to predict the category of events, employing weighted ensemble voting to analyze and combine their results. The models were trained with 1940 training events and results were evaluated with 831 test events. It was observed that using the weighted ensemble voting increased the efficiency of predictions. In this study we successfully developed and deployed the virtual fence using geophones. Since these sensors are passive, do not radiate any energy and are installed underground, it is impossible for intruders to locate and nullify them. Their flexibility, quick and easy installation, low costs, hidden deployment and unattended surveillance make such systems especially suitable for critical installations and remote facilities with difficult terrain. This work demonstrates the potential of utilizing seismic sensors for creating better perimeter guarding and protection systems using multiple machine learning models in weighted ensemble voting. In this study the virtual fence achieved an intruder detection efficiency of over 97%.Keywords: geophone, seismic perimeter surveillance, machine learning, weighted ensemble method
Procedia PDF Downloads 781383 Assessment of the Effectiveness of the Anti-Debris Flow Engineering Constructed to Reduce the Risk of Expected Debris Flow in the River Mletiskhevi by Computer Program RAMMS
Authors: Sopio Gogilava, Goga Chakhaia, Levan Tsulukidze, Zurab Laoshvili, Irina Khubulava, Shalva Bosikashvili, Teimuraz Gugushvili
Abstract:
Geoinformatics systems (GIS) integrated computer program RAMMS is widely used for forecasting debris flows and accordingly for the determination of anticipating risks with 85% accuracy. In view of the above, the work introduces new capabilities of the computer program RAMMS, which evaluates the effectiveness of anti-debris flow engineering construction, namely: the possibility of decreasing the expected velocity, kinetic energy, and output cone volume in the Mletiskhevi River. As a result of research has been determined that the anti-debris flow engineering construction designed to reduce the expected debris flow risk in the Mletiskhevi River is an effective environmental protection technology, that's why its introduction is promising.Keywords: construction, debris flow, geoinformatics systems, program RAMMS
Procedia PDF Downloads 1451382 The Effect of Artificial Intelligence on Human Rights Legislations and Evolution
Authors: Nawal Yacoub Halim Abdelmasih
Abstract:
The link between terrorism and human rights has grown to be a chief challenge in the combat against terrorism around the sector. This is primarily based on the truth that terrorism and human rights are so closely related that after the former starts, the latter is violated. This direct connection is identified in the Vienna Declaration and program of movement adopted by way of the sector Convention on Human Rights in Vienna on June 25, 1993, which acknowledges that acts of terrorism in all their paperwork and manifestations intended to damage the human rights of people. Terrorism, therefore, represents an assault on our maximum fundamental human rights. To this stop, the first part of this article makes a specialty of the connections between terrorism and human rights and seeks to spotlight the interdependence between those two standards. The second part discusses the rising idea of cyberterrorism and its manifestations. An evaluation of the fight against cyberterrorism inside the context of human rights is likewise performed.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.
Procedia PDF Downloads 51381 Mosquito Repellent Finishing of Cotton Using Pepper Tree (Schinus molle) Seed Oil Extract
Authors: Granch Berhe Tseghai, Tekalgn Gebremedhin Belay, Abrehaley Hagos Gebremariam
Abstract:
Mosquito repellent textiles are one of the most growing ways to advance the textile field by providing the needed characteristics of protecting against mosquitoes, especially in the tropical areas. These types of textiles ensure the protection of human beings from the mosquitoes and the mosquito-borne disease includes malaria, filariasis and dengue fever. In this work Schinus Molle oil (pepper tree oil) was used for mosquito repellent finish as a preformatted thing. This study focused on the penetration of mosquito repellent finish in textile applications as well as nature based alternatives to commercial chemical mosquito repellents in the market. Suitable techniques and materials to achieve mosquito repellency are discussed and pointed out according to our project. In this study textile, sample was treated with binder and schinus oil. The different property has been studied for effective mosquito repellency.Keywords: cotton, Schinus molle seed oil, mosquito repellent, mosquito-borne diseases
Procedia PDF Downloads 2851380 Algorithmic Obligations: Proactive Liability for AI-Generated Content and Copyright Compliance
Authors: Aleksandra Czubek
Abstract:
As AI systems increasingly shape content creation, existing copyright frameworks face significant challenges in determining liability for AI-generated outputs. Current legal discussions largely focus on who bears responsibility for infringing works, be it developers, users, or entities benefiting from AI outputs. This paper introduces a novel concept of algorithmic obligations, proposing that AI developers be subject to proactive duties that ensure their models prevent copyright infringement before it occurs. Building on principles of obligations law traditionally applied to human actors, the paper suggests a shift from reactive enforcement to proactive legal requirements. AI developers would be legally mandated to incorporate copyright-aware mechanisms within their systems, turning optional safeguards into enforceable standards. These obligations could vary in implementation across international, EU, UK, and U.S. legal frameworks, creating a multi-jurisdictional approach to copyright compliance. This paper explores how the EU’s existing copyright framework, exemplified by the Copyright Directive (2019/790), could evolve to impose a duty of foresight on AI developers, compelling them to embed mechanisms that prevent infringing outputs. By drawing parallels to GDPR’s “data protection by design,” a similar principle could be applied to copyright law, where AI models are designed to minimize copyright risks. In the UK, post-Brexit text and data mining exemptions are seen as pro-innovation but pose risks to copyright protections. This paper proposes a balanced approach, introducing algorithmic obligations to complement these exemptions. AI systems benefiting from text and data mining provisions should integrate safeguards that flag potential copyright violations in real time, ensuring both innovation and protection. In the U.S., where copyright law focuses on human-centric works, this paper suggests an evolution toward algorithmic due diligence. AI developers would have a duty similar to product liability, ensuring that their systems do not produce infringing outputs, even if the outputs themselves cannot be copyrighted. This framework introduces a shift from post-infringement remedies to preventive legal structures, where developers actively mitigate risks. The paper also breaks new ground by addressing obligations surrounding the training data of large language models (LLMs). Currently, training data is often treated under exceptions such as the EU’s text and data mining provisions or U.S. fair use. However, this paper proposes a proactive framework where developers are obligated to verify and document the legal status of their training data, ensuring it is licensed or otherwise cleared for use. In conclusion, this paper advocates for an obligations-centered model that shifts AI-related copyright law from reactive litigation to proactive design. By holding AI developers to a heightened standard of care, this approach aims to prevent infringement at its source, addressing both the outputs of AI systems and the training processes that underlie them.Keywords: ip, technology, copyright, data, infringement, comparative analysis
Procedia PDF Downloads 181379 Gender Dimension of Migrations Influenced by Genocide and Feminicides around the Globe
Authors: Lejla Mušić
Abstract:
Gender dimension of migration analyzes the intersection in between the world statistics on male and female migrations, around the world, involving the questions of youth migrations. Comparative analyses of world migration statistics as methodology offer the insight into the position of women in labor market around world. There are different forms of youth debris in contemporary world. The main problems are illegal migration, feminization of poverty, kidnapping the girls in Nigeria, femicides in Juarez and Mexico. Illegal migrations involve forced labor, rape and prostitution. Transgender youth share ideas through the online media (anti-bullying videos) and develop their own styles such as anarcho-punk, rave, or rock. Therefore, the stronger gender equality laws and laws for protection of women on work should be enforced.Keywords: hyperfeminisation, rape, gangs of girls, rent boys masculinities, Varoç in Istanbul, forced labor, rape and prostitution, illegal emigrations
Procedia PDF Downloads 2571378 Acetylation of Peruvian Wood Species
Authors: A. Loayza
Abstract:
Wood acetilationhapens when woody cell wall is saturated with acetic anhydride, the free hydroxyl groups present on cellulosic structures are replaced. Thus, the capillary spaces are filled with acetyl groups, and this replacement avoids further reactions with water. But, there is no information about wood acetilation in peruvianamzonic Wood species (SchizolobiumExcelsumVoge and CalycophyllumSpruceanum). So, in this research, we test acetylation of this two peruvian species in order to assess its ability as a protection estrategy, like the artificially cultivated species common for this type of treatment. A know experimental methodology was applied, using a laboratory reactor, evaluating the time as a principal variable. In this research, we were able to evaluate weight gains. The acetylation was carriet out considering one immersion time of 3 and 6 hours on acetic anhydride, were could it be observed weight gains ranged between 14 and 20% and the improvement of mention properties such as: a) Dimensional stability and water absorption capacity improved as well as its compressive strength.Keywords: acetylation, calycophyllum spruceanum benth. Hook. F., cedrelinga cateniformis, copaifera langsdorffii, dimensional stability, schizolobium parahybum
Procedia PDF Downloads 971377 Protective Approach of Mentha Piperita against Cadmium Induced Renotoxicity in Albino Rats
Authors: Baby Tabassum, Priya Bajaj
Abstract:
Cadmium is the second most hazardous heavy metal occurring in both elemental as well as compound forms. It is a highly toxic metal with a very high bio-concentration factor (BCF>100). WHO permitted groundwater cadmium concentration is 0.005 mg/L only, but reality is far away from this limit. A number of natural and anthropogenic industrial activities contribute to the spread of cadmium into the environment. The present study had been designated to find out the renal changes at functional level after cadmium intoxication and protection against these changes offered by Mentha piperata. For the purpose, albino rats were selected as the model organism. Cadmium significantly increases the serum level of serum proteins and nitrogenous wastes showing reduced filtration rate of kidneys. Pretreatment with Mentha piperata leaf extract causes significant retention of these levels to normalcy. These findings conclude that Cadmium exposure affects renal functioning but Mentha could prevent it, proving its nephro-protective potential against heavy metal toxicity.Keywords: albino rat, cadmium, Mentha piperata, nephrotoxicity
Procedia PDF Downloads 3991376 Assessment of the Simulation Programs Usable to Support Decision Making Processes of the Critical Infrastructure Emergency Management
Authors: Jiří Barta, Oldřich Svoboda
Abstract:
This article deals with the issue of practical training of the management staff during emergency events in the frame of critical infrastructure. Critical infrastructure represents one of the possible targets of destructive activities as well as operational accidents and incidents which can seriously influence the functioning of the system of ensuring the basic needs of the inhabitants. Therefore, protection of critical infrastructure and training of the staff in dealing with emergencies becomes a broadly discussed topic. Nowadays, the market offers a wide range of simulation tools which proclaim that they are suitable for practical training of management staff and completing their tasks. Another group of programs declares that they are not primarily designed for this type of simulations. However, after some minor adaptations, for example by adding or changing users‘ roles, they are able to fulfil the needs of practical training as well as the process of emergency simulation. This paper characterises and selects simulators and programs for simulating emergency events.Keywords: computer simulation, Symos´97, simulation software, harmful substances, Konstruktivní simulace, SIMEX
Procedia PDF Downloads 2581375 The International Legal Protection of Foreign Investment Through Bilateral Investment Treaties and Double Taxation Treaties in the Context of International Investment Law and International Tax Law
Authors: Abdulmajeed Abdullah Alqarni
Abstract:
This paper is devoted a study of the current frameworks applicable to foreign investments at the levels of domestic and international law, with a particular focus on the legitimate balance to be achieved between the rights of the host state and the legal protections owed to foreign investors. At the wider level of analysis, the paper attempts to map and critically examine the relationship between foreign investment and economic development. In doing so, the paper offers a study in how current discourses and practices on investment law can reconcile the competing interests of developing and developed countries. The study draws on the growing economic imperative for developing nations to create a favorable investment climate capable of attracting private foreign investment. It notes that that over the past decades, an abundance of legal standards that establish substantive and procedural protections for legal forms of foreign investments in the host countries have evolved and crystalized. The study then goes on to offer a substantive analysis of legal reforms at the domestic level in countries such as Saudi Arabia before going on to provide an in- depth and substantive examination of the most important instruments developed at the levels of international law: bilateral investment agreements and double taxation agreements. As to its methods, the study draws on case studies and from data assessing the link between double taxation and economic development. Drawing from the extant literature and doctrinal research, and international and comparative jurisprudence, the paper excavates and critically examines contemporary definitions and norms of international investment law, many of which have been given concrete form and specificity in an ever-expanding number of bilateral and multilateral investment treaties. By reconsidering the wider challenges of conflicts of law and jurisdiction, and the competing aims of the modern investment law regime, the study reflects on how bilateral investment treaties might succeed in achieving the dual aims of rights protection and economic sovereignty. Through its examination of the double taxation phenomena, the study goes on to identify key practical challenges raised by the implementation of bilateral treaties whilst also assessing the sufficiency of the domestic and international legal solutions that are proposed in response. In its final analysis, the study aims to contribute to existing scholarship by assessing contemporary legal and economic barriers to the free flow of investment with due regard for the legitimate concerns and diversity of developing nations. It does by situating its analysis of the domestic enforcement of international investment instrument in its wider historical and normative context. By focusing on the economic and legal dimensions of foreign investment, the paper also aims to offer an interdisciplinary and holistic perspective on contemporary issues and developments in investment law while offering practical reform proposals that can be used to be achieve a more equitable balance between the rights and interests of states and private entities in an increasingly trans nationalized sphere of investment regulation and treaty arbitration.Keywords: foreign investment, bilateral investment treaties, international tax law, double taxation treaties
Procedia PDF Downloads 881374 Legal Basis for Water Resources Management in Brazil: Case Study of the Rio Grande Basin
Authors: Janaína F. Guidolini, Jean P. H. B. Ometto, Angélica Giarolla, Peter M. Toledo, Carlos A. Valera
Abstract:
The water crisis, a major problem of the 21st century, occurs mainly due to poor management. The central issue that should govern the management is the integration of the various aspects that interfere with the use of water resources and their protection, supported by legal basis. A watershed is a unit of water interacting with the physical, biotic, social, economic and cultural variables. The Brazilian law recognized river basin as the territorial management unit. Based on the diagnosis of the current situation of the water resources of the Rio Grande Basin, a discussion informed in the Brazilian legal basis was made to propose measures to fight or mitigate damages and environmental degradation in the Basin. To manage water resources more efficiently, conserve water and optimize their multiple uses, the integration of acquired scientific knowledge and management is essential. Moreover, it is necessary to monitor compliance with environmental legislation.Keywords: conservation of soil and water, environmental laws, river basin, sustainability
Procedia PDF Downloads 2791373 Involvement of Multi-Drug Resistance Protein (Mrp) 3 in Resveratrol Protection against Methotrexate-Induced Testicular Damage
Authors: Mohamed A. Morsy, Azza A. K. El-Sheikh, Abdulla Y. Al-Taher
Abstract:
The aim of the present study is to investigate the effect of resveratrol (RES) on methotrexate (MTX)-induced testicular damage. RES (10 mg/kg/day) was given for 8 days orally and MTX (20 mg/kg i.p.) was given at day 4 of experiment, with or without RES in rats. MTX decreased serum testosterone, induced histopathological testicular damage, increased testicular tumor necrosis factor-α level and expression of nuclear factor-κB and cyclooxygenase-2. In MTX/RES group, significant reversal of these parameters was noticed, compared to MTX group. Testicular expression of multidrug resistance protein (Mrp) 3 was three- and five-folds higher in RES- and MTX/RES-treated groups, respectively. In vitro, using prostate cancer cells, each of MTX and RES alone induced cytotoxicity with IC50 0.18 ± 0.08 and 20.5 ± 3.6 µM, respectively. RES also significantly enhanced cytotoxicity of MTX. In conclusion, RES appears to have dual beneficial effect, as it promotes MTX tumor cytotoxicity, while protecting the testes, probably via up-regulation of testicular Mrp3 as a novel mechanism.Keywords: resveratrol, methotrexate, multidrug resistance protein 3, tumor necrosis factor-α, nuclear factor-κB, cyclooxygenase-2
Procedia PDF Downloads 4541372 Disease Control of Rice Blast Caused by Pyricularia Oryzae Cavara Using Novel Chitosan-based Agronanofungicides
Authors: Abdulaziz Bashir Kutawa, Khairulmazmi Ahmad, Mohd Zobir Hussein, Asgar Ali, Mohd Aswad Abdul Wahab, Amara Rafi, Mahesh Tiran Gunasena, Muhammad Ziaur Rahman, Md. Imam Hossain, Syazwan Afif Mohd Zobir
Abstract:
Rice is a cereal crop and belongs to the family Poaceae, it was domesticated in southern China and North-Eastern India around 8000 years ago, and it’s the staple nourishment for over half of the total world’s population. Rice production worldwide is affected by different abiotic and biotic stresses. Diseases are important challenges for the production of rice, among all the diseases in rice plants, the most severe and common disease is the rice blast. Worldwide, it is one of the most damaging diseases affecting rice cultivation, the disease is caused by the non-obligate filamentous ascomycete fungus called Magnaporthe grisae or Pyricularia oryzae Cav. Nanotechnology is a new idea to improve agriculture by combating the diseases of plants, as nanoparticles were found to possess an inhibitory effect on different species of fungi. This work aimed to develop and determine the efficacy of agronanofungicides, and commercial fungicides (in-vitro and in-vivo). The agronanofungicides were developed using ionic gelation methods. In-vitro antifungal activity of the synthesized agronanofungicides was evaluated against P. oryzae using the poisoned medium technique. The potato dextrose agar (PDA) was amended in several concentrations; 0.001, 0.005, 0.01, 0.025, 0.05, 0.1, 0.15, 0.20, 0.25, 0.30, and 0.35 ppm for the agronanofungicides. Medium with the only solvent served as a control. Mycelial growth was recorded every day, and the percentage inhibition of radial growth (PIRG) was also calculated. Based on the results of the zone of inhibition, the chitosan-hexaconazole agronanofungicide (2g/mL) was the most effective fungicide to inhibit the growth of the fungus with 100% inhibition at 0.2, 0.25, 0.30, and 0.35 ppm, respectively. The least were found to be propiconazole and basamid fungicides with 100% inhibition only at 100 ppm. In terms of the glasshouse results, the chitosan-hexaconazole-dazomet agronanofungicide (CHDEN) treatment (2.5g/L) was found to be the most effective fungicide to reduce the intensity of the disease with a disease severity index (DSI) of 19.80%, protection index (PI) of 82.26%, lesion length of 1.63cm, disease reduction (DR) of 80.20%, and AUDPC (390.60 Unit2). The least effective fungicide was found to be ANV with a disease severity index (45.60%), protection index (45.24%), lesion length (3.83 cm), disease reduction (54.40%), and AUDPC (1205.75 Unit2). The negative control did not show any symptoms during the glasshouse assay, while the untreated control treatment exhibited severe symptoms of the disease with a DSI value of 64.38%, lesion length of 5.20 cm, and AUDPC value of 2201.85 Unit2, respectively. The treatments of agronanofungicides have enhanced the yield significantly with CHDEN having 239.00 while the healthy control had 113.67 for the number of grains per panicle. The use of CHEN and CHDEN will help immensely in reducing the severity of rice blast in the fields, and this will increase the yield and profit of the farmers that produced rice.Keywords: chitosan, dazomet, disease severity, efficacy, and blast disease
Procedia PDF Downloads 871371 A Comparative Study of Criminal Liability for Art Forgery in Poland and Selected European Countries
Authors: Olivia Rybak-Karkosz
Abstract:
Art forgery is a serious problem present in the art market in every country despite its scale and experience. In the Polish art market, this problem has existed since its beginnings. The market expansion in recent years attracted new buyers, which led to growing prices of polish art. And that attracted deceitful sellers who supply the market with forgeries. Moreover, there are many new types of buyers, many of whom are art non-specialists. But even the most experienced collectors must be cautious when purchasing a piece of art. In this paper, the author would like to discuss legal acts in Polish law that criminalize the forgery of a piece of art and compare them with similar regulations from four European countries - the Italian Republic, Kingdom of the Netherlands, French Republic, and the Federal Republic of Germany. The author wants to verify if any solutions could inspire Polish legislators to implement them in domestic law to help reduce this crime and improve the criminal procedure of art forgery. The paper contains a concluding statement to implement a similar solution used in one of the presented countries.Keywords: art forgery, comparative law, criminal law, criminal liability, protection of works of art
Procedia PDF Downloads 891370 Study on Ecological Water Demand Evaluation of Typical Mountainous Rivers in Zhejiang Province: Taking Kaihua River as an Example
Authors: Kaiping Xu, Aiju You, Lei Hua
Abstract:
In view of the ecological environmental problems and protection needs of mountainous rivers in Zhejiang province, a suitable ecological water demand evaluation system was established based on investigation and monitoring. Taking the Kaihua river as an example, the research on ecological water demand and the current situation evaluation were carried out. The main types of ecological water demand in Majin River are basic ecological flow and lake wetland outside the river, and instream flow and water demands for water quality in Zhongcun river. In the wet season, each ecological water demand is 18.05m3/s and 2.56m3 / s, and in the dry season is 3.00m3/s and 0.61m3/s. Three indexes of flow, duration and occurrence time are used to evaluate the ecological water demand. The degree of ecological water demand in the past three years is low level of satisfaction. Meanwhile, the existing problems are analyzed, and put forward reasonable and operable safeguards and suggestions.Keywords: Zhejiang province, mountainous river, ecological water demand, Kaihua river, evaluation
Procedia PDF Downloads 2411369 Exploiting JPEG2000 into Reversible Information
Authors: Te-Jen Chang, I-Hui Pan, Kuang-Hsiung Tan, Shan-Jen Cheng, Chien-Wu Lan, Chih-Chan Hu
Abstract:
With the event of multimedia age in order to protect data not to be tampered, damaged, and faked, information hiding technologies are proposed. Information hiding means important secret information is hidden into cover multimedia and then camouflaged media is produced. This camouflaged media has the characteristic of natural protection. Under the undoubted situation, important secret information is transmitted out.Reversible information hiding technologies for high capacity is proposed in this paper. The gray images are as cover media in this technology. We compress gray images and compare with the original image to produce the estimated differences. By using the estimated differences, expression information hiding is used, and higher information capacity can be achieved. According to experimental results, the proposed technology can be approved. For these experiments, the whole capacity of information payload and image quality can be satisfied.Keywords: cover media, camouflaged media, reversible information hiding, gray image
Procedia PDF Downloads 3271368 Titanium-Aluminium Oxide Coating on Aluminized Steel
Authors: Fuyan Sun, Guang Wang, Xueyuan Nie
Abstract:
In this study, a plasma electrolytic oxidation (PEO) process was used to form titanium-aluminium oxide coating on aluminized steel. The present work was mainly to study the effects of treatment time of PEO process on properties of the titanium coating. A potentiodynamic polarization corrosion test was employed to investigate the corrosion resistance of the coating. The friction coefficient and wear resistance of the coating were studied by using pin-on-disc test. The thermal transfer behaviours of uncoated and PEO-coated aluminized steels were also studied. It could be seen that treatment time of PEO process significantly influenced the properties of the titanium oxide coating. Samples with a longer treatment time had a better performance for corrosion and wear protection. This paper demonstrated different treatment time could alter the surface behaviour of the coating material.Keywords: titanium-aluminum oxide, plasma electrolytic oxidation, corrosion, wear, thermal property
Procedia PDF Downloads 3561367 Protection Not Punishment: Use of Electronic Monitoring to Reduce the Risk of Cross-Border Parental Child Abduction
Authors: Nazia Yaqub
Abstract:
Globally, the number of cases of international parental child abduction has remained consistent in the past decade despite the legal provision designed to prevent and deter abduction, and so it appears the current legal approach to prevent abduction is lacking. Reflecting on the findings of an empirical study conducted by the author between 2017-19 on parental abduction from the UK, the article considers a solution to the predicament of protecting children at risk of abduction through electronic monitoring. The electronic monitoring of children has negative connotations, particularly in its use in the criminal justice system, yet in the context of family law proceedings, the article considers whether electronic monitoring could serve a protective rather than a punitive purpose. The article reflects on the use of electronic monitoring in parental abduction cases by the Family Courts and examines the ethical considerations of the proposal, drawing on the rights found in the European Convention on Human Rights and the UN Convention on the Rights of the Child.Keywords: law, parental child abduction, electronic monitoring, legal solutions
Procedia PDF Downloads 671366 Gender Policy in Nigeria: Implications for Sustainable Development in the Fourth Republic
Authors: Adadu Yahaya, Abdullahi Erunke Canice
Abstract:
The study sets out to examine the interface that tends to exist in the relationship between gender policy and Nigeria’s socio-economic development. Despite Nigeria’s ratification of virtually all international instruments on the protection and promotion of gender rights and equality, it appears that the practice is honored in the breach than in observance; hence, these policies have not been adequately domesticated and implemented. The implication of this is that the women folks have generally been isolated from mainstream politics and their political rights and privileges truncated in the scheme of things. The paper observes that gender inequality and marginalization in Nigeria has practically occasioned the unwholesome subjugation of Nigerian women to the background, hence poses more critical questions and challenges to the national question. The consequence of this, to this paper, is that Nigeria’s development process will be adversely affected if this trend is not checked. The paper sums up with appropriate policy options which are believed to have the potentials of giving women the right pride of place in the socio-economic and political dynamics in the 21st century Nigeria and beyond.Keywords: development, equality, gender, policy
Procedia PDF Downloads 4901365 Valorization of Sawdust for the Treatment of Purified Water for Irrigation
Authors: Dalila Oulhaci, Mohammed Zahaf
Abstract:
The watering technique is essential to maintain a moist perimeter around the roots of the crop. This is the case with topical watering, where the soil around the root system can be kept permanently moist between the two extremes of water content. Moreover, one of the oldest methods used since Roman times throughout North Africa and the Near East was based on the repeated pouring of water into porous earthen vessels buried in the ground. In this context, these two techniques have been combined by replacing the earthen vase with plastic bottles filled with sand which release water through their perforated walls into the surrounding soil. The objective of this work is to first determine the purifying power of the activated sludge treatment plant of Toggourt and then that of the bottled Sawdust filter. For the station, the BOD purification rate was (96.5%), the COD purification rate was (87%) and suspended solids (90%). For the bottle, the BOD removal rate was (35%), and COD removal rate was (12.58%). This work falls within the framework of water saving, sustainable development and environmental protection, and also within the framework of agriculture.Keywords: wasterwater, sawdust, purification, irrigation, touggourt (Algeria)
Procedia PDF Downloads 861364 Sustainable Land Use Policy and Monitoring Urban Land Expansion in Kabul: A Case Study of Rapid Urbanization
Authors: Osama Hidayat, Yoshitaka Kajiat
Abstract:
Kabul is a city that is highly representative of Afghanistan’s rapid urbanization process. As the city rapidly expands, there are enormous challenges to the sustainable use of land resources. This paper evaluates land use change and urban spatial expansion, from 1950 to 2016, in Kabul the capital of Afghanistan, using satellite images, field observation, and socio-economic data. The discussion covers the reduction in rural-to-urban land conversion, the delineation of urban growth boundaries, arable land reclamation and the establishment of farmland protection areas, urban upgrading, and the investigation and prosecution of illegal construction. This paper considers the aspects of urbanization and land management systems in Afghanistan. Efficient frames are outlined in Kabul for the following elements: governmental self-restraint and policy modification. The paper concludes that Kabul’s sustainable land use practices can provide a reference for other cities in Afghanistan.Keywords: urban land expansion, urbanization, land use policy, sustainable development
Procedia PDF Downloads 1651363 Exploitation of Terpenes as Guardians in Plant Biotechnology
Authors: Farzad Alaeimoghadam, Farnaz Alaeimoghadam
Abstract:
Plants are always being threatened by biotic and abiotic elements in their abode. Although they have inherited mechanisms to defend themselves, sometimes due to overpowering of their enemies or weakening of themselves, they just suffer from those elements. Human, as to help plants defend themselves, have developed several methods among which application of terpenes via plant biotechnology is promising. Terpenes are the most frequent and diverse secondary metabolites in plants. In these plants, terpenes are involved in different protective aspects. In this field, by utilizing biotechnological approaches on them, a delicate, precise, and an economic intervention will be achieved. In this review, first, the importance of terpenes as guardians in plants, which include their allelopathy effect, a call for alliances, and a mitigation impact on abiotic stresses will be pointed out. Second, problems concerning terpenes application in plant biotechnology comprising: damage to cell, undesirable terpene production and undesirable concentration and proportion of terpenes will be discussed. At the end, the approaches in plant biotechnology of terpenes including tampering with terpene gene sequences, compartmentalization, and localization and utilization of membrane transporters will be expressed. It is concluded with some useful notions concerning the topic.Keywords: plant biotechnology, plant protection, terpenes, terpenoids
Procedia PDF Downloads 3541362 Monitoring of Pesticide Content in Biscuits Available on the Vojvodina Market, Serbia
Authors: Ivana Loncarevic, Biljana Pajin, Ivana Vasiljevic, Milana Lazovic, Danica Mrkajic, Aleksandar Fises, Strahinja Kovacevic
Abstract:
Biscuits belong to a group of flour-confectionery products that are considerably consumed worldwide. The basic raw material for their production is wheat flour or integral flour as a nutritionally highly valuable component. However, this raw material is also a potential source of contamination since it may contain the residues of biochemical compounds originating from plant and soil protection agents. Therefore, it is necessary to examine the health safety of both raw materials and final products. The aim of this research was to examine the content of undesirable residues of pesticides (mostly organochlorine pesticides, organophosphorus pesticides, carbamate pesticides, triazine pesticides, and pyrethroid pesticides) in 30 different biscuit samples of domestic origin present on the Vojvodina market using Gas Chromatograph Thermo ISQ/Trace 1300. The results showed that all tested samples had the limit of detection of pesticide content below 0.01 mg/kg, indicating that this type of confectionary products is not contaminated with pesticides.Keywords: biscuits, pesticides, contamination, quality
Procedia PDF Downloads 1841361 The Lawfulness of the Determination of a Criminal Suspect as a New Pre-Trial's Object
Authors: Muhammad Tanziel Aziezi
Abstract:
In Indonesia, pre-trial (in Indonesia called ‘praperadilan’) is a mechanism that is regulated on Criminal Procedure Code as a form of oversight and check and balance on the process at the stage of inquiry, investigation, and prosecution, so that actions taken by the State (in this case, the police and prosecutor) is carried out in accordance with its authority and not violate human rights. Article 77 of the Criminal Procedure Code has been set that the object may be filed pretrial is just about the lawfulness of the arrest, the lawfulness of the detention, and the legitimacy of stopping investigation and prosecution. However, since the beginning of 2015, there was a further object which is then entered as a pre-trial object, namely the lawfulness of the determination of a criminal suspect. This is because the determination of the suspect is considered as one of the forceful measures that could restrict the rights of a person, so the implementation should have oversight and checks and balances by the courts. This paper will discuss the development of the pre-trial on the lawfulness of the determination of a criminal suspect as a new judicial mechanism as the protection of human rights in Indonesia.Keywords: criminal procedure law, pre-trial, lawfulness of determination of a criminal suspect, check and balance by the court
Procedia PDF Downloads 3391360 Applications of AI, Machine Learning, and Deep Learning in Cyber Security
Authors: Hailyie Tekleselase
Abstract:
Deep learning is increasingly used as a building block of security systems. However, neural networks are hard to interpret and typically solid to the practitioner. This paper presents a detail survey of computing methods in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests that of accelerating the intelligence of the security systems. There are many AI-based applications used in industrial scenarios such as Internet of Things (IoT), smart grids, and edge computing. Machine learning technologies require a training process which introduces the protection problems in the training data and algorithms. We present machine learning techniques currently applied to the detection of intrusion, malware, and spam. Our conclusions are based on an extensive review of the literature as well as on experiments performed on real enterprise systems and network traffic. We conclude that problems can be solved successfully only when methods of artificial intelligence are being used besides human experts or operators.Keywords: artificial intelligence, machine learning, deep learning, cyber security, big data
Procedia PDF Downloads 1261359 Anti-Inflammatory Activity of Topical Anthocyanins by Complexation and Niosomal Encapsulation
Authors: Aroonsri Priprem, Sucharat Limsitthichaikoon, Suttasinee Thappasarapong
Abstract:
Anthocyanins are natural pigments with effective UV protection but their topical use could be limited due to their physicochemical characteristics. An attempt to overcome such limitations by complexation of 2 major anthocyanin-rich sources, C. ternatea, and Z. mays, for investigation on potential use as topical anti-inflammatory. Cell studies indicate no cytotoxicity of the anthocyanin complex (AC) up to 1 mg/ml tested in HaCaT and human forehead fibroblasts by MTT. Croton oil-induced ear edema in Wistar rats suggests an effective dose of 5 mg/cm2 of AC as a topical anti-inflammatory in comparison to 0.5 mg/cm2 of fluocinolone acetonide. Niosomal encapsulation of the AC significantly prolonged the anti-inflammatory activity particularly at 8 h after topical application (p = 0.0001). The AC was not cytotoxic and its anti-inflammatory and activity was dose-dependent and prolonged by niosomal encapsulation. It has also shown to promote collagen type 1 production in cell culture. Thus, AC could be a potential candidate for topical anti-inflammatory agent from natural resources.Keywords: anthocyanin complex, ear edema, inflammation, niosomes, skin
Procedia PDF Downloads 3281358 Mapping the Intrinsic Vulnerability of the Quaternary Aquifer of the Eastern Mitidja (Northern Algeria)
Authors: Abida Haddouche, Ahmed Chrif Toubal
Abstract:
The Neogene basin of the Eastern Mitidja, object of the study area, represents potential water resources and especially groundwater reserves. This water is an important economic; this resource is highly sensitive which need protection and preservation. Unfortunately, these waters are exposed to various forms of pollution, whether from urban, agricultural, industrial or merely accidental. This pollution is a permanent risk of limiting resource. In this context, the work aims to evaluate the intrinsic vulnerability of the aquifer to protect and preserve the quality of this resource. It will focus on the disposal of water and land managers a cartographic document accessible to locate the areas where the water has a high vulnerability. Vulnerability mapping of the Easter Mitidja quaternary aquifer is performed by applying three methods (DRASTIC, DRIST, and GOD). Comparison and validation results show that the DRASTIC method is the most suitable method for aquifer vulnerability of the study area.Keywords: Aquifer of Mitidja, DRASTIC method, geographic information system (GIS), vulnerability mapping
Procedia PDF Downloads 3841357 A Conceptual Model of Sex Trafficking Dynamics in the Context of Pandemics and Provisioning Systems
Authors: Brian J. Biroscak
Abstract:
In the United States (US), “sex trafficking” is defined at the federal level in the Trafficking Victims Protection Act of 2000 as encompassing a number of processes such as recruitment, transportation, and provision of a person for the purpose of a commercial sex act. It involves the use of force, fraud, or coercion, or in which the person induced to perform such act has not attained 18 years of age. Accumulating evidence suggests that sex trafficking is exacerbated by social and environmental stressors (e.g., pandemics). Given that “provision” is a key part of the definition, “provisioning systems” may offer a useful lens through which to study sex trafficking dynamics. Provisioning systems are the social systems connecting individuals, small groups, entities, and embedded communities as they seek to satisfy their needs and wants for goods, services, experiences and ideas through value-based exchange in communities. This project presents a conceptual framework for understanding sex trafficking dynamics in the context of the COVID pandemic. The framework is developed as a system dynamics simulation model based on published evidence, social and behavioral science theory, and key informant interviews with stakeholders from the Protection, Prevention, Prosecution, and Partnership sectors in one US state. This “4 P Paradigm” has been described as fundamental to the US government’s anti-trafficking strategy. The present research question is: “How do sex trafficking systems (e.g., supply, demand and price) interact with other provisioning systems (e.g., networks of organizations that help sexually exploited persons) to influence trafficking over time vis-à-vis the COVID pandemic?” Semi-structured interviews with stakeholders (n = 19) were analyzed based on grounded theory and combined for computer simulation. The first step (Problem Definition) was completed by open coding video-recorded interviews, supplemented by a literature review. The model depicts provision of sex trafficking services for victims and survivors as declining in March 2020, coincidental with COVID, but eventually rebounding. The second modeling step (Dynamic Hypothesis Formulation) was completed by open- and axial coding of interview segments, as well as consulting peer-reviewed literature. Part of the hypothesized explanation for changes over time is that the sex trafficking system behaves somewhat like a commodities market, with each of the other subsystems exhibiting delayed responses but collectively keeping trafficking levels below what they would be otherwise. Next steps (Model Building & Testing) led to a ‘proof of concept’ model that can be used to conduct simulation experiments and test various action ideas, by taking model users outside the entire system and seeing it whole. If sex trafficking dynamics unfold as hypothesized, e.g., oscillated post-COVID, then one potential leverage point is to address the lack of information feedback loops between the actual occurrence and consequences of sex trafficking and those who seek to prevent its occurrence, prosecute the traffickers, protect the victims and survivors, and partner with the other anti-trafficking advocates. Implications for researchers, administrators, and other stakeholders are discussed.Keywords: pandemics, provisioning systems, sex trafficking, system dynamics modeling
Procedia PDF Downloads 791356 Threats and Preventive Methods to Avoid Bird Strikes at the Deblin Military Airfield, Poland
Authors: J. Cwiklak, M. Grzegorzewski, M. Adamski
Abstract:
The paper presents results of the project conducted in Poland devoted to study on bird strikes at military airfields. The main aim of this project was to develop methods of aircraft protection against threats from birds. The studies were carried out using two methods. One by transect and the other one by selected sector scanning. During the research, it was recorded, that 104 species of birds in the number about of 36000 were observed. The most frequent ones were starling Sturnus vulgaris (31.0%), jackdaw Corvus monedula (18.3%), rook Corvus frugilegus (15.9 %), lapwing Vanellus vanellus (6.2%). Moreover, it was found, that starlings constituted the most serious threat. It resulted from their relatively high attendance at the runway (about 300 individuals). Possible repellent techniques concerning of the Deblin military airfield were discussed. The analysis of the birds’ concentration depending on the altitude, part of the day, year, part of the airfield constituted a base to work out critical flight phase and appropriate procedures to prevent bird strikes.Keywords: airport, bird strikes, flight safety, preventive methods
Procedia PDF Downloads 403