Search results for: Lightning protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2425

Search results for: Lightning protection

1255 Typical Emulsions as Probiotic Food Carrier: Effect of Cells Position on Its Viability

Authors: Mengfan Li, Filip Van Bockstaele, Wenyong Lou, Frank Devlighere

Abstract:

The development of probiotics-encapsulated emulsions that maintain the viability of probiotics during processing, storage and human gastrointestinal (GI) tract environment receives great scientific and commercial interest. In this study, typical W/O and O/W emulsions with and without oil gelation were used to encapsulate L. plantarum. The effects of emulsion types on the viability of L. plantarum during storage and GI tract were investigated. Besides, the position of L. plantarum in emulsion system and its number of viable cells when threating by adverse environment was correlated in order to figure out which type of emulsion is more suitable as food carrier for probiotics encapsulation and protection. As a result, probiotics tend to migrate from oil to water phase due to the natural hydrophilicity; however, it’s harmful for cells viability when surrounding by water for a long time. Oil gelation in emulsions is one of the promising strategies for inhibiting the cells mobility and decreasing the contact with adverse factors (e.g., water, exogenous enzymes and gastric acid), thus enhancing the number of viable cells that enough to exert its beneficial effects in host.

Keywords: emulsion, gelation, encapsulation, probiotics

Procedia PDF Downloads 110
1254 (In)Visibility of Afghan Migrants in Turkey's Informal Labour Market

Authors: Rezzan Alagoz, Seda Gonul

Abstract:

This study examines the migration, work, and social life experiences of undocumented Afghan migrants employed as shepherds in Igdır. Despite their high visibility in informal labor markets, their undocumented status renders them invisible in everyday life. Their invisibility in both official status and social life, coupled with their vulnerability to exploitation in the labor market, renders them particularly susceptible to marginalization. This research employs the concept of the subaltern to examine the characteristics of Afghan migrants as unrepresented, unheard, and invisible. It also analyzes their experiences in the labor market based on the concept of biopolitics. Undocumented Afghan migrants are engaged in labor-intensive occupations such as shepherding, thereby addressing an essential gap in the workforce that local workers are reluctant to undertake. The reliance of employers on the labor of these employees is significant; however, the undocumented status of these workers leaves them vulnerable to exploitation. In addition to serving as a critical source of low-cost labor, these individuals are susceptible to exploitation in the form of non-payment for their work, extended and intensive work schedules, and, on some occasions, physical violence. In the event of a conflict between shepherds and their employers, undocumented workers are unable to seek legal recourse, which serves to reinforce their marginalized status further. The predominant practice among Afghan shepherds is to utilize the workplace as a place of residence. In the context of shepherding work, the prevailing conditions at the workplace frequently pose a significant threat to the health and well-being of the individuals engaged in such activities. As a result of their lack of official status, these individuals lack access to basic services such as healthcare, which has the consequence of rendering them invisible in public and institutional spaces. Attempts to engage with public systems carry the risk of deportation, reinforcing the already fragile and precarious nature of their existence. This study examines the socio-political implications of undocumented status and addresses these experiences in the context of national and international migration policies. In line with Agamben's concept of the "state of exception" undocumented migrants exist in a state where fundamental rights are effectively nullified, and they are rendered outside the protection of the law. This exclusion is further exacerbated by the intersection of economic exploitation, political and physical invisibility, and limited access to basic services, which collectively contribute to a cycle of vulnerability. This research is based on in-depth interviews with 18 Afghan shepherds in Igdir province in August 2024. The research contributes to the ongoing critical debates on migration, labor exploitation, and biopolitics by focusing on the experiences of Afghan shepherds. The article examines how undocumented migrants maneuver between visibility and invisibility within the context of a system that relies on exploitation in the labor market and migration policies. The research findings demonstrate the necessity for policy intervention to address the structural exclusion of undocumented Afghan migrants from national and international protection systems, as well as their indispensable role in local economies.

Keywords: Afghan migrants, biopolitics, border economy, informal labour market, migration policy, sheepherding, Subaltern

Procedia PDF Downloads 18
1253 Augmentation of Automatic Selective Door Operation systems with UWB positioning

Authors: John Chan, Jake Linnenbank, Gavin Caird

Abstract:

Automatic Selective Door Operation (ASDO) systems are increasingly used in railways to provide Correct Side Door Enable (CSDE) protection as well as to protect passenger doors opening off the platform where the train is longer than the platform, or in overshoot or undershoot scenarios. Such ASDO systems typically utilise trackside-installed RFID beacons, such as Eurobalises for odometry positioning purposes. Installing such trackside infrastructure may not be desirable or possible due to various factors such as conflict with existing infrastructure, potential damage from track tamping and jurisdiction constraints. Ultra-wideband (UWB) positioning technology could enable ASDO positioning requirements to be met without requiring installation of equipment directly on track since UWB technology can be installed on adjacent infrastructure such as on platforms. This paper will explore the feasibility of upgrading existing ASDO systems with UWB positioning technology, the feasibility of retrofitting UWB-enabled ASDO systems onto unfitted trains, and any other considerations relating to the use of UWB positioning for ASDO applications.

Keywords: UWB, ASDO, automatic selective door operations, CSDE, correct side door enable

Procedia PDF Downloads 78
1252 Potential Contribution of Combined High-Resolution and Fluorescence Remote Sensing to Coastal Ecosystem Service Assessments

Authors: Yaner Yan, Ning Li, Yajun Qiao, Shuqing An

Abstract:

Although most studies have focused on assessing and mapping terrestrial ecosystem services, there is still a knowledge gap on coastal ecosystem services and an urgent need to assess them. Lau (2013) clearly defined five types of costal ecosystem services: carbon sequestration, shoreline protection, fish nursery, biodiversity, and water quality. While high-resolution remote sensing can provide the more direct, spatially estimates of biophysical parameters, such as species distribution relating to biodiversity service, and Fluorescence information derived from remote sensing direct relate to photosynthesis, availing in estimation of carbon sequestration and the response to environmental changes in coastal wetland. Here, we review the capabilities of high-resolution and fluorescence remote sesing for describing biodiversity, vegetation condition, ecological processes and highlight how these prodicts may contribute to costal ecosystem service assessment. In so doing, we anticipate rapid progress to combine the high-resolution and fluorescence remote sesing to estimate the spatial pattern of costal ecosystem services.

Keywords: ecosystem services, high resolution, remote sensing, chlorophyll fluorescence

Procedia PDF Downloads 507
1251 Performance Analysis of Elliptic Curve Cryptography Using Onion Routing to Enhance the Privacy and Anonymity in Grid Computing

Authors: H. Parveen Begam, M. A. Maluk Mohamed

Abstract:

Grid computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using Virtual Organization (VO). Security is a critical issue due to the open nature of the wireless channels in the grid computing which requires three fundamental services: authentication, authorization, and encryption. The privacy and anonymity are considered as an important factor while communicating over publicly spanned network like web. To ensure a high level of security we explored an extension of onion routing, which has been used with dynamic token exchange along with protection of privacy and anonymity of individual identity. To improve the performance of encrypting the layers, the elliptic curve cryptography is used. Compared to traditional cryptosystems like RSA (Rivest-Shamir-Adelman), ECC (Elliptic Curve Cryptosystem) offers equivalent security with smaller key sizes which result in faster computations, lower power consumption, as well as memory and bandwidth savings. This paper presents the estimation of the performance improvements of onion routing using ECC as well as the comparison graph between performance level of RSA and ECC.

Keywords: grid computing, privacy, anonymity, onion routing, ECC, RSA

Procedia PDF Downloads 398
1250 Norms and Laws: Fate of Community Forestry in Jharkhand

Authors: Pawas Suren

Abstract:

The conflict between livelihood and forest protection has been a perpetual phenomenon in India. In the era of climate change, the problem is expected to aggravate the declining trend of dense forest in the country, creating impediments in the climate change adaptation by the forest dependent communities. In order to access the complexity of the problem, Hazarinagh and Chatra districts of Jharkhand were selected as a case study. To identify norms practiced by the communities to manage community forestry, the ethnographic study was designed to understand the values, traditions, and cultures of forest dependent communities, most of whom were tribal. It was observed that internalization of efficient forest norms is reflected in the pride and honor of such behavior while violators are sanctioned through guilt and shame. The study analyzes the effect of norms being practiced in the management and ecology of community forestry as common property resource. The light of the findings led towards the gaps in the prevalent forest laws to address efficient allocation of property rights. The conclusion embarks on reconsidering accepted factors of forest degradation in India.

Keywords: climate change, common property resource, community forestry, norms

Procedia PDF Downloads 344
1249 Performance Evaluation of Discrete Fourier Transform Algorithm Based PMU for Wide Area Measurement System

Authors: Alpesh Adeshara, Rajendrasinh Jadeja, Praghnesh Bhatt

Abstract:

Implementation of advanced technologies requires sophisticated instruments that deal with the operation, control, restoration and protection of rapidly growing power system network under normal and abnormal conditions. Presently, the applications of Phasor Measurement Unit (PMU) are widely found in real time operation, monitoring, controlling and analysis of power system network as it eliminates the various limitations of Supervisory Control and Data Acquisition System (SCADA) conventionally used in power system. The use of PMU data is very rapidly increasing its importance for online and offline analysis. Wide Area Measurement System (WAMS) is developed as new technology by use of multiple PMUs in power system. The present paper proposes a model of MATLAB based PMU using Discrete Fourier Transform (DFT) algorithm and evaluation of its operation under different contingencies. In this paper, PMU based two bus system having WAMS network is presented as a case study.

Keywords: GPS global positioning system, PMU phasor measurement system, WAMS wide area monitoring system, DFT, PDC

Procedia PDF Downloads 496
1248 The Effects of Cross-Border Use of Drones in Nigerian National Security

Authors: H. P. Kerry

Abstract:

Drone technology has become a significant discourse in a nation’s national security, while this technology could constitute a danger to national security on the one hand, on the other hand, it is used in developed and developing countries for border security, and in some cases, for protection of security agents and migrants. In the case of Nigeria, drones are used by the military to monitor and tighten security around the borders. However, terrorist groups have devised a means to utilize the technology to their advantage. Therefore, the potential danger in the widespread proliferation of this technology has become a myriad of risks. The research on the effects of cross-border use of drones in Nigerian national security looks at the negative and positive consequences of using drone technology. The study employs the use of interviews and relevant documents to obtain data while the study applied the Just War theory to justify the reason why countries use force; it further buttresses the points with what the realist theory thinks about the use of force. In conclusion, the paper recommends that the Nigerian government through the National Assembly should pass a bill for the establishment of a law that will guide the use of armed and unarmed drones in Nigeria enforced by the Nigeria Civil Aviation Authority and the office of the National Security Adviser.

Keywords: armed drones, drones, cross-border, national security

Procedia PDF Downloads 158
1247 Implementing Bioremediation Technologies to Degrade Chemical Warfare Agents and Explosives from War Affected Regions in Sri Lanka

Authors: Elackiya Sithamparanathan

Abstract:

Chemical agents used during the Sri Lankan civil war continue to threaten human and environmental health as affected areas are re-settled. Bioremediation is a cost-effective and eco-friendly approach to degrading chemical agents, and has greater public acceptance than chemical degradation. Baseline data on contaminant distribution, environmental parameters, and indigenous microbes are required before bioremediation can commence. The culture and isolate of suitable microbes and enzymes should be followed by laboratory trials, before field application and long-term monitoring of contaminant concentration, soil parameters, microbial ecology, and public health to monitor environmental and public health. As local people are not aware of the persistence of warfare chemicals and do not understand the potential impacts on human health, community awareness programs are required. Active community participation, and collaboration with international and local agencies, would contribute to the success of bioremediation and the effective removal of chemical agents in war affected areas of Sri Lanka.

Keywords: bioremediation, environmental protection, human health, war affected regions in Sri Lanka

Procedia PDF Downloads 384
1246 Improving Security in Healthcare Applications Using Federated Learning System With Blockchain Technology

Authors: Aofan Liu, Qianqian Tan, Burra Venkata Durga Kumar

Abstract:

Data security is of the utmost importance in the healthcare area, as sensitive patient information is constantly sent around and analyzed by many different parties. The use of federated learning, which enables data to be evaluated locally on devices rather than being transferred to a central server, has emerged as a potential solution for protecting the privacy of user information. To protect against data breaches and unauthorized access, federated learning alone might not be adequate. In this context, the application of blockchain technology could provide the system extra protection. This study proposes a distributed federated learning system that is built on blockchain technology in order to enhance security in healthcare. This makes it possible for a wide variety of healthcare providers to work together on data analysis without raising concerns about the confidentiality of the data. The technical aspects of the system, including as the design and implementation of distributed learning algorithms, consensus mechanisms, and smart contracts, are also investigated as part of this process. The technique that was offered is a workable alternative that addresses concerns about the safety of healthcare while also fostering collaborative research and the interchange of data.

Keywords: data privacy, distributed system, federated learning, machine learning

Procedia PDF Downloads 136
1245 Food Processing Technology and Packaging: A Case Study of Indian Cashew-Nut Industry

Authors: Parashram Jakappa Patil

Abstract:

India is the global leader in world cashew business and cashew-nut industry is one of the important food processing industries in world. However India is the largest producer, processor, exporter and importer eschew in the world. India is providing cashew to the rest of the world. India is meeting world demand of cashew. India has a tremendous potential of cashew production and export to other countries. Every year India earns more than 2000 cores rupees through cashew trade. Cashew industry is one of the important small scale industries in the country which is playing significant role in rural development. It is generating more than 400000 jobs at remote area and 95% cashew worker are women, it is giving income to poor cashew farmers, majority cashew processing units are small and cottage, it is helping to stop migration from young farmers for employment opportunities, it is motivation rural entrepreneurship development and it is also helping to environment protection etc. Hence India cashew business is very important agribusiness in India which has potential make inclusive development. World Bank and IMF recognized cashew-nut industry is one the important tool for poverty eradication at global level. It shows important of cashew business and its strong existence in India. In spite of such huge potential cashew processing industry is facing different problems such as lack of infrastructure ability, lack of supply of raw cashew, lack of availability of finance, collection of raw cashew, unavailability of warehouse, marketing of cashew kernels, lack of technical knowledge and especially processing technology and packaging of finished products. This industry has great prospects such as scope for more cashew cultivation and cashew production, employment generation, formation of cashew processing units, alcohols production from cashew apple, shield oil production, rural development, poverty elimination, development of social and economic backward class and environment protection etc. This industry has domestic as well as foreign market; India has tremendous potential in this regard. The cashew is a poor men’s crop but rich men’s food. The cashew is a source of income and livelihood for poor farmers. Cashew-nut industry may play very important role in the development of hilly region. The objectives of this paper are to identify problems of cashew processing and use of processing technology, problems of cashew kernel packaging, evolving of cashew processing technology over the year and its impact on final product and impact of good processing by adopting appropriate technology packaging on international trade of cashew-nut. The most important problem of cashew processing industry is that is processing and packaging. Bad processing reduce the quality of cashew kernel at large extent especially broken of cashew kernel which has very less price in market compare to whole cashew kernel and not eligible for export. On the other hand if there is no good packaging of cashew kernel will get moisture which destroy test of it. International trade of cashew-nut is depend of two things one is cashew processing and other is packaging. This study has strong relevance because cashew-nut industry is the labour oriented, where processing technology is not playing important role because 95% processing work is manual. Hence processing work was depending on physical performance of worker which makes presence of large workforce inevitable. There are many cashew processing units closed because they are not getting sufficient work force. However due to advancement in technology slowly this picture is changing and processing work get improve. Therefore it is interesting to explore all the aspects in context of cashew processing and packaging of cashew business.

Keywords: cashew, processing technology, packaging, international trade, change

Procedia PDF Downloads 422
1244 The Effect of Sowing Time on Phytopathogenic Characteristics and Yield of Sunflower Hybrids

Authors: Adrienn Novák

Abstract:

The field research was carried out at the Látókép AGTC KIT research area of the University of Debrecen in Eastern-Hungary, on the area of the aeolain loess of the Hajdúság. We examined the effects of the sowing time on the phytopathogenic characteristics and yield production by applying various fertilizer treatments on two different sunflower genotypes (NK Ferti, PR64H42) in 2012 and 2013. We applied three different sowing times (early, optimal, late) and two different treatment levels of fungicides (control = no fungicides applied, double fungicide protection). During our investigations, the studied cropyears were of different sowing time optimum in terms of yield amount (2012: early, 2013: average). By Pearson’s correlation analysis, we have found that delaying the sowing time pronouncedly decreased the extent of infection in both crop years (Diaporthe: r=0.663**, r=0.681**, Sclerotinia: r=0.465**, r=0.622**). The fungicide treatment not only decreased the extent of infection, but had yield increasing effect too (2012: r=0.498**, 2013: r=0.603**). In 2012, delaying of the sowing time increased (r=0.600**), but in 2013, it decreased (r= 0.356*) the yield amount.

Keywords: fungicide treatment, genotypes, sowing time, yield, sunflower

Procedia PDF Downloads 210
1243 Enforcement of Decisions of Ombudsmen and the South African Public Protector: Muzzling the Watchdogs

Authors: Roxan Venter

Abstract:

Ombudsmen often face the challenge of a lack of authority to have their decisions and recommendations enforced. This lack of authority may be seen as one of the major obstacles in the way of the effectiveness of the institutions of Ombudsman and also the South African Public Protector. The paper will address the current legal position in South Africa with regard to the status of the decisions and recommendations of the South African Public Protector and the enforcement thereof. In addition, the paper will compare the South African position with the experiences of other jurisdictions, including Scandinavian countries like Sweden, Denmark and Norway, but also New Zealand and Northern Ireland, with regard to the enforcement of the decisions of Ombudsmen. Finally, the paper will make recommendations with regard to the enhancement of the power and authority of Ombudsmen in order to effectively enforce their decisions. It is submitted that the creation of the office of Ombudsman, and the Public Protector in the South African system, is an essential tool to ensure the protection of society against governmental abuse of power and it is therefore imperative to ensure that these watchdogs of democracy are not muzzled by a lack of powers of enforcement.

Keywords: enforcement of decisions of ombudsmen, governmental control, ombudsman, South African public protector

Procedia PDF Downloads 402
1242 Evaluation of Antioxidant Activities of Cabbage (Brassica oleracea L. var. capitata L.)

Authors: Rutanachai Thaipratum

Abstract:

At present, it is widely-known that free radicals are the causes of illness such as cancers, coronary heart disease, Alzheimer’s disease and aging. One method of protection from free radical is the consumption of antioxidant-containing foods or herbs. Several analytical methods have been used for qualitative and quantitative determination of antioxidants. This project aimed to evaluate antioxidant activity of ethanolic and aqueous extracts from cabbage (Brassicca oleracea L. var. capitata L.) measured by DPPH and hydroxyl radical scavenging method. The results show that averaged antioxidant activity measured in ethanolic extract (µmol ascorbic acid equivalent/g fresh mass) were 7.316 ± 0.715 and 4.66 ± 1.029 as determined by DPPH and hydroxyl radical scavenging activity assays, respectively. Averaged antioxidant activity measured in aqueous extract (µmol ascorbic acid equivalent/g fresh mass) were 15.141 ± 2.092 and 4.955 ± 1.975 as determined by DPPH and hydroxyl radical scavenging activity assays respectively.

Keywords: free radical, antioxidant, cabbage, Brassica oleracea L. var. capitata L.

Procedia PDF Downloads 389
1241 Solar-Electric Pump-out Boat Technology: Impacts on the Marine Environment, Public Health, and Climate Change

Authors: Joy Chiu, Colin Hemez, Emma Ryan, Jia Sun, Robert Dubrow, Michael Pascucilla

Abstract:

The popularity of recreational boating is on the rise in the United States, which raises numerous national-level challenges in the management of air and water pollution, aquatic habitat destruction, and waterway access. The need to control sewage discharge from recreational vessels underlies all of these challenges. The release of raw human waste into aquatic environments can lead to eutrophication and algal blooms; can increase human exposure to pathogenic viruses, bacteria, and parasites; can financially impact commercial shellfish harvest/fisheries and marine bathing areas; and can negatively affect access to recreational and/or commercial waterways to the detriment of local economies. Because of the damage that unregulated sewage discharge can do to environments and human health/marine life, recreational vessels in the United States are required by law to 'pump-out' sewage from their holding tanks into sewage treatment systems in all designated 'no discharge areas'. Many pump-out boats, which transfer waste out of recreational vessels, are operated and maintained using funds allocated through the Federal Clean Vessel Act (CVA). The East Shore District Health Department of Branford, Connecticut is protecting this estuary by pioneering the design and construction of the first-in-the-nation zero-emissions, the solar-electric pump-out boat of its size to replace one of its older traditional gasoline-powered models through a Connecticut Department of Energy and Environmental Protection CVA Grant. This study, conducted in collaboration with the East Shore District Health Department, the Connecticut Department of Energy and Environmental Protection, States Organization for Boating Access and Connecticut’s CVA program coordinators, had two aims: (1) To perform a national assessment of pump-out boat programs, supplemented by a limited international assessment, to establish best pump-out boat practices (regardless of how the boat is powered); and (2) to estimate the cost, greenhouse gas emissions, and environmental and public health impacts of solar-electric versus traditional gasoline-powered pump-out boats. A national survey was conducted of all CVA-funded pump-out program managers and selected pump-out boat operators to gauge best practices; costs associated with gasoline-powered pump-out boat operation and management; and the regional, cultural, and policy-related issues that might arise from the adoption of solar-electric pump-out boat technology. We also conducted life-cycle analyses of gasoline-powered and solar-electric pump-out boats to compare their greenhouse gas emissions; production of air, soil and water pollution; and impacts on human health. This work comprises the most comprehensive study into pump-out boating practices in the United States to date, in which information obtained at local, state, national, and international levels is synthesized. This study aims to enable CVA programs to make informed recommendations for sustainable pump-out boating practices and identifies the challenges and opportunities that remain for the wide adoption of solar-electric pump-out boat technology.

Keywords: pump-out boat, marine water, solar-electric, zero emissions

Procedia PDF Downloads 130
1240 Data Hiding by Vector Quantization in Color Image

Authors: Yung Gi Wu

Abstract:

With the growing of computer and network, digital data can be spread to anywhere in the world quickly. In addition, digital data can also be copied or tampered easily so that the security issue becomes an important topic in the protection of digital data. Digital watermark is a method to protect the ownership of digital data. Embedding the watermark will influence the quality certainly. In this paper, Vector Quantization (VQ) is used to embed the watermark into the image to fulfill the goal of data hiding. This kind of watermarking is invisible which means that the users will not conscious the existing of embedded watermark even though the embedded image has tiny difference compared to the original image. Meanwhile, VQ needs a lot of computation burden so that we adopt a fast VQ encoding scheme by partial distortion searching (PDS) and mean approximation scheme to speed up the data hiding process. The watermarks we hide to the image could be gray, bi-level and color images. Texts are also can be regarded as watermark to embed. In order to test the robustness of the system, we adopt Photoshop to fulfill sharpen, cropping and altering to check if the extracted watermark is still recognizable. Experimental results demonstrate that the proposed system can resist the above three kinds of tampering in general cases.

Keywords: data hiding, vector quantization, watermark, color image

Procedia PDF Downloads 366
1239 The Power of a Vulnerable State: The Rights Revolution and the Emergence of Human Resources Management Departments

Authors: Soheila Ghanbari

Abstract:

After the Civil Rights Act of 1964 was enacted, federal policy transformed employment rights. Equal employment opportunity law, legislation for occupational safety and health, and regulations for fringe benefits were established to ensure that employees have rights to equal protection, health and safety, and the benefits guaranteed by employers. In research analyzing data from 279 organizations over time, it was discovered that legal changes prompted organizations to establish personnel, antidiscrimination, safety, and benefits departments to ensure compliance. However, as the process of institutionalization advanced, middle managers began to separate these fresh offices from policy and rationalize them solely in economic terms as a component of the new human resources management model. This common occurrence is seen in the United States, where the Constitution represents government control of business as unlawful. It could potentially clarify the extended lack of a state theory in organizational analysis and shed light on a puzzle pointed out by state theorists: the federal state is weak in terms of administration but strong in terms of norms.

Keywords: management, state, human, resources, employment

Procedia PDF Downloads 55
1238 An Efficient Encryption Scheme Using DWT and Arnold Transforms

Authors: Ali Abdrhman M. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The color image is decomposed into red, green, and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using a key image that has same original size and is generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours of color image recovery can be obtained with accepted level of distortion using Canny edge detector. Experiments have demonstrated that proposed algorithm can fully encrypt 2D color image and completely reconstructed without any distortion. It has shown that the color image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: color image, wavelet transform, edge detector, Arnold transform, lossy image encryption

Procedia PDF Downloads 486
1237 Investigation on the Performance of Biodiesel and Natural Gas-Fuelled Diesel Engines for Shipboard Application

Authors: Kelvin Datonye Bob-Manuel

Abstract:

The shipping industry has begun to seriously look at ways of reducing fossil fuel consumption so that current reserves can last longer and operate their ships in a more environmentally friendly way. The concept of Green Shipping or Sustainable Shipping with the use of alternative fuels is now becoming an important issue for ship owners, shipping lines and ship builders globally. This paper provides a critical review of the performance of biodiesel and natural gas-fuelled diesel engines for shipboard application. The emission reduction technique included the use of either neat or emulsified rapeseed methyl ester (RME) for pilot ignition and the emission of NOx, CO2 and SOx were measured at engine speed range of 500 - 1500 r/min. The NOx concentrations were compared with the regulated IMO MARPOL73/78, Annex VI, Tiers I, II, III and United States Environmental Protection Agency (US-EPA) standard. All NOx emissions met Tier I and II levels and the EPA standard for the minimum specification of category 1 engines at higher speed but none met the MARPOL Tier III limit which is for designated Emission Control Areas (ECAs). No trace of soot and SOx emission were observed.

Keywords: dual-fuel, biodiesel, natural gas, NOx, SOx, MARPOL 73/78 Annex VI. USEPA Tier 3, EURO V &VI

Procedia PDF Downloads 417
1236 Physico-Chemical and Heavy Metals Analysis of Contaminated Ndawuse River in North Central of Nigeria

Authors: Abimbola Motunrayo Enitan, Ibironke Titilayo Enitan, John Odiyo

Abstract:

The study assessed quality of surface water across Ndawuse River Phase 1, District of the Federal Capital Territory (FCT), Abuja, Nigeria based on physico-chemical variables that are linked to agrochemical and eutrophication, as well as heavy metals concentrations. In total, sixteen surface water samples were obtained from five locations along the river. The results were compared with the standard limits set by both World Health Organization and Federal Environmental Protection Agency for drinking water. The results obtained indicated that BOD5, turbidity, 0.014-3.511 mg Fe/L and 0.078-0.14 mg Cr/L were all above the standard limits. The results further showed that the quality of surface water is being significantly affected by human activities around the Ndawuse River which could pose an adverse health risk to several communities that rely on these receiving water bodies primarily as their source of water. Therefore, there is a need for strict enforcement of environmental laws considering the physico-chemical analysis.

Keywords: Abuja, heavy metals, human exposure risk, Ndawuse River, Nigeria, surface water

Procedia PDF Downloads 267
1235 Corrosion Control of Carbon Steel Surface by Phosphonic Acid Nano-Layers

Authors: T. Abohalkuma, J. Telegdi

Abstract:

Preparation, characterization, and application of self-assembled monolayers (SAM) formed by fluorophosphonic and undecenyl phosphonic acids on carbon steel surfaces as anticorrosive nanocoatings were demonstrated. The anticorrosive efficacy of these SAM layers was followed by atomic force microscopy, as the change in the surface morphology caused by layer deposition and corrosion processes was monitored. The corrosion process was determined by electrochemical potentiodynamic polarization, whereas the surface wettability of the carbon steel samples was tested with the use of static and dynamic contact angle measurements. Results showed that both chemicals produced good protection against corrosion as they performed as anodic inhibitors, especially with increasing the time of layer formation, which results in a more compact molecular film. According to the atomic force microscope (AFM) images, the fluoro-phosphonic acid self-assembled molecular layer can control the general as well as the pitting corrosion, but the SAM layers of the undecenyl-phosphonic acid cannot inhibit the pitting corrosion. The AFM and the contact angle measurements confirmed the results achieved by electrochemical measurements.

Keywords: nanolayers, corrosion, phosphonic acids, coatings

Procedia PDF Downloads 172
1234 Phenolic Compounds, Antiradical Activity, and Antioxidant Efficacy of Satureja hortensisl - Extracts in Vegetable Oil Protection

Authors: Abolfazl Kamkar

Abstract:

Vegetable oils and fats are recognized as important components of our diet. They provide essential fatty acids, which are precursors of important hormones and control many physiological factors such as blood pressure, cholesterol level, and the reproductive system.Vegetable oils with higher contents of unsaturated fatty acids, especially polyunsaturated fatty acids (PUFAs) are more susceptible to oxidation.Protective effects of Sature jahortensis(SE) extracts in stabilizing soybean oil at different concentrations (200 and 400 ppm) were tested. Results showed that plant extracts could significantly (P< 0.05) lower the peroxide value and thiobarbituric acid value of oil during storage at 60 oC. The IC50 values for methanol and ethanol extracts were 31.5 ± 0.7 and 37.00 ± 0 µg/ml, respectively. In the β- carotene/linoleic acid system, methanol and ethanol extracts exhibited 87.5 ± 1.41% and 74.0 ±2.25 % inhibition against linoleic acid oxidation. The total phenolic and flavonoid contents of methanol and ethanol extracts were (101.58 ± 0. 26m g/ g) and (96.00 ± 0.027 mg/ g), (44.91 ± 0.14 m g/ g) and (14.30 ± 0.12 mg/ g) expressed in Gallic acid and Quercetin equivalents, respectively.These findings suggest that Satureja extracts may have potential application as natural antioxidants in the edible oil and food industry.

Keywords: satureja hortensis, antioxidant activity, oxidative stability, vegetable oil, extract

Procedia PDF Downloads 375
1233 Cultural Heritage, War and Heritage Legislations: An Empirical Review

Authors: Gebrekiros Welegebriel Asfaw

Abstract:

The conservation of cultural heritage during times of war is a topic of significant importance and concern in the field of heritage studies. The destruction, looting, and illicit acts against cultural heritages have devastating consequences. International and national legislations have been put in place to address these issues and provide a legal framework for protecting cultural heritage during armed conflicts. Thus, the aim of this review is to examine the existing heritage legislations and evaluate their effectiveness in protecting cultural heritage during times of war with a special insight of the Tigray war. The review is based on a comprehensive empirical analysis of existing heritage legislations related to the protection of cultural heritage during war, with a special focus on the Tigray war. The review reveals that there are several international and national legislations in place to protect cultural heritage during times of war. However, the implementation of these legislations has been insufficient and ineffective in the case of the Tigray war. The priceless cultural heritages in Tigray, which were once the centers of investment and world pride were, have been subjected to destruction, looting, and other illicit acts, in violation of both international conventions such as the UNESCO Convention and national legislations. Therefore, there is a need for consistent intervention and enforcement of different legislations from the international community and organizations to rehabilitate, repatriate, and reinstitute the irreplaceable heritages of Tigray.

Keywords: cultural heritage, heritage legislations, tigray, war

Procedia PDF Downloads 158
1232 The Concept of Anchor Hazard Potential Map

Authors: Sao-Jeng Chao, Chia-Yun Wei, Si-Han Lai, Cheng-Yu Huang, Yu-Han Teng

Abstract:

In Taiwan, the landforms are mainly dominated by mountains and hills. Many road sections of the National Highway are impossible to avoid problems such as slope excavation or slope filling. In order to increase the safety of the slope, various slope protection methods are used to stabilize the slope, especially the soil anchor technique is the most common. This study is inspired by the soil liquefaction potential map. The concept of the potential map is widely used. The typhoon, earth-rock flow, tsunami, flooded area, and the recent discussion of soil liquefaction have safety potential concepts. This paper brings the concept of safety potential to the anchored slope. Because the soil anchor inspection is only the concept of points, this study extends the concept of the point to the surface, using the Quantum GIS program to present the slope damage area, and depicts the slope appearance and soil anchor point with the slope as-built drawing. The soil anchor scores are obtained by anchor inspection data, and the low, medium and high potential areas are remitted by interpolation. Thus, the area where the anchored slope may be harmful is judged and relevant maintenance is provided. The maintenance units can thus prevent judgment and deal with the anchored slope as soon as possible.

Keywords: anchor, slope, potential map, lift-off test, existing load

Procedia PDF Downloads 142
1231 Healthcare Seeking Behaviors of Parents Who Have Children with Disabilities: A Case Study at the Effutu Municipality, Winneba-Central Region, Ghana-West Africa

Authors: Priscilla Deede Hammond

Abstract:

Healthcare seeking behaviour has emerged as a tool to tackle perceived ill-health by taking remedial actions. And currently, efforts are being directed towards encouraging people (especially parents) to learn and use health-promoting behaviours in seeking their children’s healthcare. Regardless of these efforts, most parents encounter challenges with raising a child with a disability. The purpose of the study was to explore the healthcare-seeking behaviours of parents of children with disabilities. In order to achieve the purpose of the study, a case study design was employed where the researcher used a qualitative approach such as semi-structured interview to gather the required data. Data from participants were analysed using a thematic analysis approach. It was revealed from the findings of the study that, some of the parents after the first diagnosis by health professionals consulted a spiritualist or a herbalist for help. Also, some parents stated that their response to their children’s healthcare depended on the severity of the sickness. The study recommends the Ministry of Gender, Children and Social Protection and other social agencies such as the Social Welfare Department to provide health assessment and financial support to families of children with disabilities.

Keywords: healthcare, health, parents, disabilities

Procedia PDF Downloads 225
1230 Compilation of Tall Building with Green Architecture Case Study: Babolsar City (North of Iran) at 2014-2015

Authors: Seyyed Hossein Alavi, Soudabeh Mehri Talarposhti

Abstract:

Quick development of urban population need for housing on the one hand and prevention of irregular urban extension for optimum usage of urban land, resolving problems of urban physiognomy, land using, and environmental issues and urban transport, on the other hand, proposed tall building as urban area extension requirement in developing and advanced countries. Beside the tall building, protection, and creation of green architecture is one the most important issues of today's architecture world. This research is about attending tall building with green architecture in Babolsar city 2015. For this, the issues that can make favorite conditions for green architecture has been discussed. The purpose of this discussion is skeleton extension and accessing interactions between architecture and related technologies. This discussion with using of qualitative research methods (Analytical Description) tried to studying designed performance models and also studying and analyzing the inside and foreign articles and books. Hope this research is useful in solving the existing problems in this issue.

Keywords: tall building, green architecture, skeleton extension, Babolsar city

Procedia PDF Downloads 431
1229 Numerical Analysis of Heat and Mass Transfer in an Adsorbent Bed for Different Working Pairs

Authors: N. Allouache, O. Rahli

Abstract:

Solar radiation is by far the largest and the most world’s abundant, clean, and permanent energy source. In recent years, many promising technologies have been developed to harness the sun's energy. These technologies help in environmental protection, economizing energy, and sustainable development, which are the major issues of the world. One of these important technologies is the solar refrigerating machines that make use of either absorption or adsorption technologies. In this present work, the adsorbent bed is modelized and optimized using different working pairs, such as zeolite-water, silica gel-water, activated carbon-ammonia, calcium chlorid-ammonia, activated carbon fiber- methanol and activated carbon AC35-methanol. The results show that the enhancement of the heat and mass transfer depends on the properties of the working pair; the performances of the adsorption cycle are essentially influenced by the choice of the adsorbent-adsorbate pair. The system can operate successfully for optimal parameters such as the evaporator, condenser, and generating temperatures. The activated carbon is the best adsorbent due to its high surface area and micropore volume.

Keywords: adsorbent bed, heat and mass transfer, numerical analysis, working pairs

Procedia PDF Downloads 150
1228 ‘The Guilt Complex’: Assessing the Guilt of Youth Returning From Terrorist Groups in the Narratives of Justice Presentation on the Methodological Opportunities and Concerns in Operational Research

Authors: Arpita Mitra

Abstract:

The research explores the concept of ‘guilt’ as understood in relation to children and young individuals associated with terrorist groups who are exiting these groups and returning to civilian lives (‘young returnees’). The study explores young returnees’ guilt – in its psychological, legal, and sociological manifestations and how it contributes to experiences of reintegration and justice administration. Streamlining it further, the research question on assessing guilt engages with young adults – between 18 and 30 years – who were part of a terrorist organization during their formative years and have returned to civilian life. Overall, the findings of the said research are intended to contribute first-hand operational research to criminological literature as well as transitional justice mechanisms with regard to narratives on truth, justice, reparations and institutional reform/guarantees of non-recurrence. Particularly for this paper, the focus of the paper shall be on one aspect of this research, that is, on the added value of conducting operational research and the methodological challenges encountered during this process with regard to informed consent, data protection, mental health and security considerations for the respondents and researcher.

Keywords: terrorism, reintegration, young returnees, criminology

Procedia PDF Downloads 61
1227 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography

Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou

Abstract:

Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.

Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol

Procedia PDF Downloads 276
1226 Legal Regulation and Critical Analysis for an Effectively Treatment of Pharmaceutical Waste

Authors: Merita Dauti, Edita Alili-Idrizi, Sihana Ahmeti –Lika, Ledjan Malaj

Abstract:

The extermination and proper disposal of pharmaceutical wastes from expired and unused medications remains a disputable issue due to their specific nature and characteristics. Even though the hazards from these wastes are already well known in terms of environment and human health, people still treat them as usual wastes. At a national level, in many countries the management of pharmaceutical and medical wastes has been one of the main objectives in order to protect people’s health and the environment. Even though many legal regulations exist in this respect, there has not been a single law that would clearly explain the procedures of returning medicines, ways of selection, treatment and extermination of pharmaceutical wastes. This paper aims at analyzing the practices of pharmaceutical waste management and treatment in some European countries as well as a review of the legislation and official guidelines in managing these kinds of wastes and protecting the environment and human health. A suitable treatment and management of expired medications and other similar wastes would be in the interest of public health in the first place, as well as in the interest of healthcare institutions and other bodies engaged in environment protection.

Keywords: pharmaceutical waste, legal regulation, proper disposal, environment pollution

Procedia PDF Downloads 334