Search results for: investor protection
1316 A Real Time Expert System for Decision Support in Nuclear Power Plants
Authors: Andressa dos Santos Nicolau, João P. da S.C Algusto, Claudio Márcio do N. A. Pereira, Roberto Schirru
Abstract:
In case of abnormal situations, the nuclear power plant (NPP) operators must follow written procedures to check the condition of the plant and to classify the type of emergency. In this paper, we proposed a Real Time Expert System in order to improve operator’s performance in case of transient or accident with reactor shutdown. The expert system’s knowledge is based on the sequence of events (SoE) of known accident and two emergency procedures of the Brazilian Pressurized Water Reactor (PWR) NPP and uses two kinds of knowledge representation: rule and logic trees. The results show that the system was able to classify the response of the automatic protection systems, as well as to evaluate the conditions of the plant, diagnosing the type of occurrence, recovery procedure to be followed, indicating the shutdown root cause, and classifying the emergency level.Keywords: emergence procedure, expert system, operator support, PWR nuclear power plant
Procedia PDF Downloads 3331315 Evaluation and Analysis of the Secure E-Voting Authentication Preparation Scheme
Authors: Nidal F. Shilbayeh, Reem A. Al-Saidi, Ahmed H. Alsswey
Abstract:
In this paper, we presented an evaluation and analysis of E-Voting Authentication Preparation Scheme (EV-APS). EV-APS applies some modified security aspects that enhance the security measures and adds a strong wall of protection, confidentiality, non-repudiation and authentication requirements. Some of these modified security aspects are Kerberos authentication protocol, PVID scheme, responder certificate validation, and the converted Ferguson e-cash protocol. Authentication and privacy requirements have been evaluated and proved. Authentication guaranteed only eligible and authorized voters were permitted to vote. Also, the privacy guaranteed that all votes will be kept secret. Evaluation and analysis of some of these security requirements have been given. These modified aspects will help in filtering the counter buffer from unauthorized votes by ensuring that only authorized voters are permitted to vote.Keywords: e-voting preparation stage, blind signature protocol, Nonce based authentication scheme, Kerberos Authentication Protocol, pseudo voter identity scheme PVID
Procedia PDF Downloads 2991314 Morpho-Dynamic Modelling of the Western 14 Km of the Togolese Coast
Authors: Sawsan Eissa, Omnia Kabbany
Abstract:
The coastline of Togo has been historically suffering from erosion for decades, which requires a solution to help control and reduce the erosion to allow for the development of the coastal area. A morpho-dynamic model using X-beach software was developed for the Western 14 Km of the Togolese coast. The model was coupled with the hydrodynamic module of DELFT 3D, flow, and the Wave module, SWAN. The data used as input included a recent bathymetric survey, a recent shoreline topographic survey, aerial photographs, ERA 5 water level and wave data, and recent test results of seabed samples. A number of scenarios were modeled: do nothing scenario, groynes, detached breakwaters system with different crest levels and alignments. The findings showed that groynes is not expected to be effective for protection against erosion, and that the best option is a system of detached breakwater, partially emerged-partially submerged couples with periodical maintenance.Keywords: hydrodynamics, morphology, Togo, Delft3D, SWAN, XBeach, coastal erosion, detached breakwaters
Procedia PDF Downloads 681313 Cybersecurity Protection Structures: The Case of Lesotho
Authors: N. N. Mosola, K. F. Moeketsi, R. Sehobai, N. Pule
Abstract:
The Internet brings increasing use of Information and Communications Technology (ICT) services and facilities. Consequently, new computing paradigms emerge to provide services over the Internet. Although there are several benefits stemming from these services, they pose several risks inherited from the Internet. For example, cybercrime, identity theft, malware etc. To thwart these risks, this paper proposes a holistic approach. This approach involves multidisciplinary interactions. The paper proposes a top-down and bottom-up approach to deal with cyber security concerns in developing countries. These concerns range from regulatory and legislative areas, cyber awareness, research and development, technical dimensions etc. The main focus areas are highlighted and a cybersecurity model solution is proposed. The paper concludes by combining all relevant solutions into a proposed cybersecurity model to assist developing countries in enhancing a cyber-safe environment to instill and promote a culture of cybersecurity.Keywords: cybercrime, cybersecurity, computer emergency response team, computer security incident response team
Procedia PDF Downloads 1561312 Structuring the Role of Indonesia's Dilemma Position in ASEAN to Combat Human Trafficking
Authors: Febi Eka Putri, Prabowo Anggorono
Abstract:
Human Trafficking has become a threat in the global phenomenon, including Indonesia as a country adopting democracy to uphold the human rights value. Indonesia is classified as a source of trafficking in persons which dominate by women and children for sexual exploitation and forced labor purposes. In this case, Indonesia has committed to combat trafficking in persons by enacted domestic law to criminalize all types of human trafficking in domestic and international level. Tracing to the efforts, we cannot just simplify it, however, in 2016 Indonesia has placed as a tier 2 country because the government does not fully achieve the minimum standard by U. S. Trafficking Victims Protection Act due to only making efforts as progress. While as a part of ASEAN member, Indonesia has signed ASEAN Human Rights Declaration but when it comes to Human Trafficking issue, there is only few ASEAN member who has ratified ASEAN Convention on Trafficking in Persons, in particular Women and Children such as Singapore, Cambodia, and Thailand. This brings the evidence to structuring the role of Indonesia to combat human trafficking.Keywords: Indonesia, Association of Southeast Asian Nations (ASEAN), human trafficking, Tier 2 country
Procedia PDF Downloads 3531311 Corrosion Protection of Structural Steel by Surfactant Containing Reagents
Authors: D. Erdenechimeg, T. Bujinlkham, N. Erdenepurev
Abstract:
The anti-corrosion performance of fatty acid coated mild steel samples is studied. Samples of structural steel coated with collector reagents deposited from surfactant in ethanol solution and overcoated with an epoxy barrier paint. A quantitative corrosion rate was determined by linear polarization resistance method using biopotentiostat/galvanostat 400. Coating morphology was determined by scanning electronic microscopy. A test for hydrophobic surface of steel by surfactant was done. From the samples, the main component or high content iron was determined by chemical method and other metal contents were determined by Inductively Coupled Plasma-Optical Emission Spectrometry (ICP-OES) method. Prior to measuring the corrosion rate, mechanical and chemical treatments were performed to prepare the test specimens. Overcoating the metal samples with epoxy barrier paint after exposing them with surfactant the corrosion rate can be inhibited by 34-35 µm/year.Keywords: corrosion, linear polarization resistance, coating, surfactant
Procedia PDF Downloads 991310 Rainwater Management: A Case Study of Residential Reconstruction of Cultural Heritage Buildings in Russia
Authors: V. Vsevolozhskaia
Abstract:
Since 1990, energy-efficient development concepts have constituted both a turning point in civil engineering and a challenge for an environmentally friendly future. Energy and water currently play an essential role in the sustainable economic growth of the world in general and Russia in particular: the efficiency of the water supply system is the second most important parameter for energy consumption according to the British assessment method, while the water-energy nexus has been identified as a focus for accelerating sustainable growth and developing effective, innovative solutions. The activities considered in this study were aimed at organizing and executing the renovation of the property in residential buildings located in St. Petersburg, specifically buildings with local or federal historical heritage status under the control of the St. Petersburg Committee for the State Inspection and Protection of Historic and Cultural Monuments (KGIOP) and UNESCO. Even after reconstruction, these buildings still fall into energy efficiency class D. Russian Government Resolution No. 87 on the structure and required content of project documentation contains a section entitled ‘Measures to ensure compliance with energy efficiency and equipment requirements for buildings, structures, and constructions with energy metering devices’. Mention is made of the need to install collectors and meters, which only calculate energy, neglecting the main purpose: to make buildings more energy-efficient, potentially even energy efficiency class A. The least-explored aspects of energy-efficient technology in the Russian Federation remain the water balance and the possibility of implementing rain and meltwater collection systems. These modern technologies are used exclusively for new buildings due to a lack of government directive to create project documentation during the planning of major renovations and reconstruction that would include the collection and reuse of rainwater. Energy-efficient technology for rain and meltwater collection is currently applied only to new buildings, even though research has proved that using rainwater is safe and offers a huge step forward in terms of eco-efficiency analysis and water innovation. Where conservation is mandatory, making changes to protected sites is prohibited. In most cases, the protected site is the cultural heritage building itself, including the main walls and roof. However, the installation of a second water supply system and collection of rainwater would not affect the protected building itself. Water efficiency in St. Petersburg is currently considered only from the point of view of the installation that regulates the flow of the pipeline shutoff valves. The development of technical guidelines for the use of grey- and/or rainwater to meet the needs of residential buildings during reconstruction or renovation is not yet complete. The ideas for water treatment, collection and distribution systems presented in this study should be taken into consideration during the reconstruction or renovation of residential cultural heritage buildings under the protection of KGIOP and UNESCO. The methodology applied also has the potential to be extended to other cultural heritage sites in northern countries and lands with an average annual rainfall of over 600 mm to cover average toilet-flush needs.Keywords: cultural heritage, energy efficiency, renovation, rainwater collection, reconstruction, water management, water supply
Procedia PDF Downloads 921309 Interactive Shadow Play Animation System
Authors: Bo Wan, Xiu Wen, Lingling An, Xiaoling Ding
Abstract:
The paper describes a Chinese shadow play animation system based on Kinect. Users, without any professional training, can personally manipulate the shadow characters to finish a shadow play performance by their body actions and get a shadow play video through giving the record command to our system if they want. In our system, Kinect is responsible for capturing human movement and voice commands data. Gesture recognition module is used to control the change of the shadow play scenes. After packaging the data from Kinect and the recognition result from gesture recognition module, VRPN transmits them to the server-side. At last, the server-side uses the information to control the motion of shadow characters and video recording. This system not only achieves human-computer interaction, but also realizes the interaction between people. It brings an entertaining experience to users and easy to operate for all ages. Even more important is that the application background of Chinese shadow play embodies the protection of the art of shadow play animation.Keywords: hadow play animation, Kinect, gesture recognition, VRPN, HCI
Procedia PDF Downloads 4011308 Effect of Radioprotectors on DNA Repair Enzyme and Survival of Gamma-Irradiated Cell Division Cycle Mutants of Saccharomyces pombe
Authors: Purva Nemavarkar, Badri Narain Pandey, Jitendra Kumar
Abstract:
Introduction: The objective was to understand the effect of various radioprotectors on DNA damage repair enzyme and survival in gamma-irradiated wild and cdc mutants of S. pombe (fission yeast) cultured under permissive and restrictive conditions. DNA repair process, as influenced by radioprotectors, was measured by activity of DNA polymerase in the cells. The use of single cell gel electrophoresis assay (SCGE) or Comet Assay to follow gamma-irradiation induced DNA damage and effect of radioprotectors was employed. In addition, studying the effect of caffeine at different concentrations on S-phase of cell cycle was also delineated. Materials and Methods: S. pombe cells grown at permissive temperature (250C) and/or restrictive temperature (360C) were followed by gamma-radiation. Percentage survival and activity of DNA Polymerase (yPol II) were determined after post-irradiation incubation (5 h) with radioprotectors such as Caffeine, Curcumin, Disulphiram, and Ellagic acid (the dose depending on individual D 37 values). The gamma-irradiated yeast cells (with and without the radioprotectors) were spheroplasted by enzyme glusulase and subjected to electrophoresis. Radio-resistant cells were obtained by arresting cells in S-phase using transient treatment of hydroxyurea (HU) and studying the effect of caffeine at different concentrations on S-phase of cell cycle. Results: The mutants of S. pombe showed insignificant difference in survival when grown under permissive conditions. However, growth of these cells under restrictive temperature leads to arrest in specific phases of cell cycle in different cdc mutants (cdc10: G1 arrest, cdc22: early S arrest, cdc17: late S arrest, cdc25: G2 arrest). All the cdc mutants showed decrease in survival after gamma radiation when grown at permissive and restrictive temperatures. Inclusion of the radioprotectors at respective concentrations during post irradiation incubation showed increase in survival of cells. Activity of DNA polymerase enzyme (yPol II) was increased significantly in cdc mutant cells exposed to gamma-radiation. Following SCGE, a linear relationship was observed between doses of irradiation and the tail moments of comets. The radioprotection of the fission yeast by radioprotectors can be seen by the reduced tail moments of the yeast comets. Caffeine also exhibited its radio-protective ability in radio-resistant S-phase cells obtained after HU treatment. Conclusions: The radioprotectors offered notable radioprotection in cdc mutants when added during irradiation. The present study showed activation of DNA damage repair enzyme (yPol II) and an increase in survival after treatment of radioprotectors in gamma irradiated wild type and cdc mutants of S. pombe cells. Results presented here showed feasibility of applying SCGE in fission yeast to follow DNA damage and radioprotection at high doses, which are not feasible with other eukaryotes. Inclusion of caffeine at 1mM concentration to S phase cells offered protection and did not decrease the cell viability. It can be proved that at minimal concentration, caffeine offered marked radioprotection.Keywords: radiation protection, cell cycle, fission yeast, comet assay, s-phase, DNA repair, radioprotectors, caffeine, curcumin, SCGE
Procedia PDF Downloads 1131307 The Importance of Value Added Services Provided by Science and Technology Parks to Boost Entrepreneurship Ecosystem in Turkey
Authors: Faruk Inaltekin, Imran Gurakan
Abstract:
This paper will aim to discuss the importance of value-added services provided by Science and Technology Parks for entrepreneurship development in Turkey. Entrepreneurship is vital subject for all countries. It has not only fostered economic development but also promoted innovation at local and international levels. To foster high tech entrepreneurship ecosystem, Technopark (Science and Technology Park/STP) concept was initiated with the establishment of Silicon Valley in the 1950s. The success and rise of Silicon Valley led to the spread of technopark activities. Developed economies have been setting up projects to plan and build STPs since the 1960s and 1970s. To promote the establishment of STPs, necessary legislations were made by Ministry of Science, Industry, and Technology in 2001, Technology Development Zones Law (No. 4691) and it has been revised in 2016 to provide more supports. STPs’ basic aim is to provide customers high-quality office spaces with various 'value added services' such as business development, network connections, cooperation programs, investor/customers meetings and internationalization services. For this aim, STPs should help startups deal with difficulties in the early stages and to support mature companies’ export activities in the foreign market. STPs should support the production, commercialization and more significantly internationalization of technology-intensive business and foster growth of companies. Nowadays within this value-added services, internationalization is very popular subject in the world. Most of STPs design clusters or accelerator programs in order to support their companies in the foreign market penetration. If startups are not ready for international competition, STPs should help them to get ready for foreign market with training and mentoring sessions. These training and mentoring sessions should take a goal based approach to working with companies. Each company has different needs and goals. Therefore the definition of ‘success' varies for each company. For this reason, it is very important to create customized value added services to meet the needs of startups. After local supports, STPs should also be able to support their startups in foreign market. Organizing well defined international accelerator program plays an important role in this mission. Turkey is strategically placed between key markets in Europe, Russia, Central Asia and the Middle East. Its population is young and well educated. So both government agencies and the private sectors endeavor to foster and encourage entrepreneurship ecosystem with many supports. In sum, the task of technoparks with these and similar value added services is very important for developing entrepreneurship ecosystem. The priorities of all value added services are to identify the commercialization and growth obstacles faced by entrepreneurs and get rid of them with the one-to-one customized services. Also, in order to have a healthy startup ecosystem and create sustainable entrepreneurship, stakeholders (technoparks, incubators, accelerators, investors, universities, governmental organizations etc.) should fulfill their roles and/or duties and collaborate with each other. STPs play an important role as bridge for these stakeholders & entrepreneurs. STPs always should benchmark and renew services offered to how to help the start-ups to survive, develop their business and benefit from these stakeholders.Keywords: accelerator, cluster, entrepreneurship, startup, technopark, value added services
Procedia PDF Downloads 1431306 The Impact of Artificial Intelligence on Human Rights Priciples and Obligations
Authors: Rady Farag Aziz Ibrahim
Abstract:
The gap between Islamic terrorism and human rights has become an important issue in the fight against Islamic terrorism worldwide. This situation is repeated because terrorism and human rights are interconnected in such a way that when the former begins, the latter becomes subject to violence. This unknown relationship was recognized in the Vienna Declaration and Program of Action adopted at the International Conference on Human Rights held in Vienna on 25 June 1993, confirming that terrorist acts, in all their forms and manifestations, aim to destroy the rights of individuals. humanity to destroy. Therefore, Islamic terrorism is a violation of basic human rights. For this purpose, the first part of the article will focus on the relationship between terrorism and human rights and the synergy between these two concepts. The second part then explores the emerging concept of cyber threats and how they exist. Additionally, technology analysis will be conducted against threats based on human rights. This will be achieved through analysis of the concept of 'securitization' of human rights and by striking a balance between counter-terrorism measures and the protection of human rights at all costs. This article concludes with recommendations on how to balance terrorism and human rights today.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development
Procedia PDF Downloads 401305 Improving Communication System through Router Configuration: The Nigerian Navy Experience
Authors: Saidu I. Rambo, Emmanuel O. Ibam, Sunday O. Adewale
Abstract:
The configuration of routers for effective communication in the Nigerian Navy (NN) enables the navy to improve on the current communication systems. The current system is faced with challenges that make the systems partially effective. The major implementation of the system is to configure routers using hierarchical model and obtaining a VSAT option on C-band platform. These routers will act as a link between Naval Headquarters and the Commands under it. The routers main responsibilities are to forward packets from source location to destination using a Link State Routing Protocol (LSRP). Also using the Point to Point Protocol (PPP), creates a strong encrypted password using Challenge Handshake Authentication Protocol (CHAP) which uses one-way hash function of Message Digest 5 (MD5) to provide complete protection against hackers/intruders. Routers can be configured using a Linux operating system or internet work operating system in the Microsoft platform. With this, system packets can be forwarded to various locations more effectively than the present system being used.Keywords: C-band, communication, router, VSAT
Procedia PDF Downloads 3661304 Bitplanes Gray-Level Image Encryption Approach Using Arnold Transform
Authors: Ali Abdrhman M. Ukasha
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: SSPCE method, image compression-salt- peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption
Procedia PDF Downloads 4361303 Evaluating the Possibility of Expanding National Health Insurance Funding From Zakat, Sudan
Authors: Fawzia Mohammed Idris
Abstract:
Zakat is an Islamic procedure for wealth distribution as a social protection mechanism for needy people. This study aimed to assess the possibility to expand the share of fund for national health insurance fund from zakat funds allocated for poor people by measuring the reduction of poverty that result from the investing on direct payment to the needy or by covering them in social health insurance. This study used stata regression as a statistical analysis tool and the finding clarified that there is no significant relationship between the poverty rate as the main indicator and, the number of poor people covered by national health insurance on one hand and the number of benefits poor people from the distribution of zakat fund. This study experienced many difficulties regarding the quality and the consistency of the data. The study suggested that a joint mission between national health insurance fund and zakat chamber to conduct study to assess the efficient use of zakat fund allocated to poor people.Keywords: health finance, poverty, social health insurance, zakat
Procedia PDF Downloads 1461302 Investigation of Additives' Corrosion Inhibition Effects on Dye
Authors: Abdullah Bilal Ozturk, Nil Acarali, Hediye Irem Ozgunduz, Hava Gizem Kandilci, Hanifi Sarac
Abstract:
In this study, zeolite, shellac and different boron chemicals were used as additive to dye and effects were comprehensively investigated. Considering previous studies additive materials that had not used before were determined for produce dye with physical properties. Literature research about the materials provides determining easily sufficient amount of additive materials. Accessible of additives or yearly production amounts are become important issue at selection of materials. Zeolite and boron chemicals are suitable selection in that easy access and has large amount of production in our country. Previous research about boron chemicals shows they have flame retardant effect on textile materials besides numerous usage areas. Also, from previous research, shellac was used widely for protection and insulation of metallic materials. Zeolite added to dye to increase adhesive effect of dye. In this study, corrosion tests were applied to find out if there are positive effects of zeolite, shellac, and boron chemicals to dye’s physical properties.Keywords: dye, corrosion, zeolite, shellac, boron
Procedia PDF Downloads 3381301 Entomofauna Biodiversity of a Citrus Orchard in Baraki, Algeria
Authors: Ahlem Guerzou, Salheddine Doumandji
Abstract:
Orchards and minimally processed with surrounding hedges form a significant source of biodiversity. These orchards are an entire ecosystem, home to a rich insect fauna associated with the presence of a large diversity of plant species. The values of the richness and diversity rise when the intensity of the chemical protection is reduced emphasizing the importance of such orchard in the conservation of biodiversity. To show the interest hedges fauna perspective, we conducted a study in an orange grove located Baraki surrounded by hedges and windbreaks consist of several plant species. With the sweep net there were the invertebrate fauna of the herbaceous and after a year of inventory was collected consists of a 2177 individuals distributed among 156 species grouped into five classes and 15 orders fauna. Hymenoptera and Diptera are in first place with 34 species (AR% = 19.3%), followed by Coleoptera with 27 species (AR% = 15.3%), Homoptera dominate in the workforce with 735 individuals (AR% = 34.1%). The Shannon-Weaver index calculated reflects a great diversity of population sampled equal to 5.2 bits. The equitability is 0.7, showing a strong trend of balance between the numbers of species present.Keywords: biodiversity, citrus orchard, reaps net, hedges, Baraki
Procedia PDF Downloads 3171300 The Impact of Women on Urban Sustainability (Case Study: Three Districts of Tehran)
Authors: Reza Mokhtari Malekabadi, Leila Jalalabadi, Zahra Kiyani Ghaleh No
Abstract:
Today, systems of management and urban planning, attempt to reach more sustainable development through monitoring developments, urban development and development plans. Monitoring of changes in the urban places and sustainable urban development accounted a base for the realization of worthy goals urban sustainable development. The importance of women in environmental protection programs is high enough that in 21 agenda has been requested from all countries to allocate more shares to women in their policies. On the other hand, urban waste landfill has become one of the environmental concerns in modern cities. This research assumes that the impact of women on recycling, reduction and proper waste landfill is much more than men. For this reason, three districts; Yousef Abad, Heshmatieh and Nezam Abad are gauged through questionnaire and using the analytical research hypothesis model. This research will be categorized as functional research. The results have shown that noticing the power of women, their participation towards realization of the development objectives and programs can be used in solving their problems.Keywords: citizens, urban, environmental, sustainability, solid waste, Tehran
Procedia PDF Downloads 3671299 Bitplanes Image Encryption/Decryption Using Edge Map (SSPCE Method) and Arnold Transform
Authors: Ali A. Ukasha
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: SSPCE method, image compression, salt and peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption
Procedia PDF Downloads 4971298 DNA Barcoding of Tree Endemic Campanula Species From Artvi̇n, Türki̇ye
Authors: Hayal Akyildirim Beğen, Özgür Emi̇nağaoğlu
Abstract:
DNA barcoding is the method of description of species based on gene diversity. In current studies, registration, genetic identification and protection of especially endemic plants pecies are carried out by DNA barcoding techniques. Molecular studies are based on the amplification and sequencing of the barcode gene region by the PCR method. Endemic Campanula choruhensis Kit Tan & Sorger, Campanula troegera Damboldt and Campanula betulifolia K.Koch is widespread in Artvin, Erzurum and around Çoruh valley passing through it. Intense road and dam constructions are carried out in and around the distribution area of this species. This situation harms the habitat of the species and puts its extinction. In this study, the plastid matK barcode gene regions (650 bp) of three Campanula species were created. To make the identification of this species quickly and accurately, gene sequence compared with sequences of other Campanula L. species. As a result of phylogenetic analysis, C. choruhensis is close relative to C. betulifolia. Morphologically, these species were determined to be more similar to each other with flower and leaf characters. C. troegera formed a separate branch.Keywords: campanula, DNA barcoding, endemic, türkiye, artvin
Procedia PDF Downloads 681297 Drying of Agro-Industrial Wastes Using a Cabinet Type Solar Dryer
Authors: N. Metidji, O. Badaoui, A. Djebli, H. Bendjebbas, R. Sellami
Abstract:
The agro-industry is considered as one of the most waste producing industrial fields as a result of food processing. Upgrading and reuse of these wastes as animal or poultry food seems to be a promising alternative. Combined with the use of clean energy resources, the recovery process would contribute more to the environment protection. It is in this framework that a new solar dryer has been designed in the Unit of Solar Equipment Development. Direct solar drying has, also, many advantages compared to natural sun drying. In fact, the first does not cause product degradation as it is protected by the drying chamber from direct sun, insects and exterior environment. The aim of this work is to study the drying kinetics of waste, generated during the processing of pepper, by using a direct natural convection solar dryer at 35◦C and 55◦C. The rate of moisture removal from the product to be dried has been found to be directly related to temperature, humidity and flow rate. The characterization of these parameters has allowed the determination of the appropriate drying time for this product namely peppers waste.Keywords: solar energy, solar dryer, energy conversion, pepper drying, forced convection solar dryer
Procedia PDF Downloads 4111296 Parental Bonding and Cognitive Emotion Regulation
Authors: Fariea Bakul, Chhanda Karmaker
Abstract:
The present study was designed to investigate the effects of parental bonding on adult’s cognitive emotion regulation and also to investigate gender differences in parental bonding and cognitive emotion regulation. Data were collected by using convenience sampling technique from 100 adult students (50 males and 50 females) of different universities of Dhaka city, ages between 20 to 25 years, using Bengali version of Parental Bonding Inventory and Bengali version of Cognitive Emotion Regulation Questionnaire. The obtained data were analyzed by using multiple regression analysis and independent samples t-test. The results revealed that fathers care (β =0.317, p < 0.05) was only significantly positively associated with adult’s cognitive emotion regulation. Adjusted R² indicated that the model explained 30% of the variance in adult’s adaptive cognitive emotion regulation. No significant association was found between parental bonding and less adaptive cognitive emotion regulations. Results from independent samples t-test also revealed that there was no significant gender difference in both parental bonding and cognitive emotion regulations.Keywords: cognitive emotion regulation, parental bonding, parental care, parental over-protection
Procedia PDF Downloads 3711295 Robust Medical Image Watermarking Using Frequency Domain and Least Significant Bits Algorithms
Authors: Volkan Kaya, Ersin Elbasi
Abstract:
Watermarking and stenography are getting importance recently because of copyright protection and authentication. In watermarking we embed stamp, logo, noise or image to multimedia elements such as image, video, audio, animation and text. There are several works have been done in watermarking for different purposes. In this research work, we used watermarking techniques to embed patient information into the medical magnetic resonance (MR) images. There are two methods have been used; frequency domain (Digital Wavelet Transform-DWT, Digital Cosine Transform-DCT, and Digital Fourier Transform-DFT) and spatial domain (Least Significant Bits-LSB) domain. Experimental results show that embedding in frequency domains resist against one type of attacks, and embedding in spatial domain is resist against another group of attacks. Peak Signal Noise Ratio (PSNR) and Similarity Ratio (SR) values are two measurement values for testing. These two values give very promising result for information hiding in medical MR images.Keywords: watermarking, medical image, frequency domain, least significant bits, security
Procedia PDF Downloads 2881294 Effect of Leachate Presence on Shear Strength Parameters of Bentonite-Amended Zeolite Soil
Authors: R. Ziaie Moayed, H. Keshavarz Hedayati
Abstract:
Over recent years, due to increased population and increased waste production, groundwater protection has become more important, therefore, designing engineered barrier systems such as landfill liners to prevent the entry of leachate into groundwater should be done with greater accuracy. These measures generally involve the application of low permeability soils such as clays. Bentonite is a natural clay with low permeability which makes it a suitable soil for using in liners. Also zeolite with high cation exchange capacity can help to reduce of hazardous materials risk. Bentonite expands when wet, absorbing as much as several times its dry mass in water. This property may effect on some structural properties of soil such as shear strength. In present study, shear strength parameters are determined by both leachates polluted and not polluted bentonite-amended zeolite soil with mixing rates (B/Z) of 5%-10% and 20% with unconfined compression test to obtain the differences. It is shown that leachate presence causes reduction in resistance in general.Keywords: bentonite, leachate, shear strength parameters, unconfined compression test
Procedia PDF Downloads 1061293 Radionuclides Transport Phenomena in Vadose Zone
Authors: R. Testoni, R. Levizzari, M. De Salve
Abstract:
Radioactive waste management is fundamental to safeguard population and environment by radiological risks. Environmental assessment of a site, where nuclear activities are located, allows understanding the hydro geological system and the radionuclides transport in groundwater and subsoil. Use of dedicated software is the basis of transport phenomena investigation and for dynamic scenarios prediction; this permits to understand the evolution of accidental contamination events, but at the same time the potentiality of the software itself can be verified. The aim of this paper is to perform a numerical analysis by means of HYDRUS 1D code, so as to evaluate radionuclides transport in a nuclear site in Piedmont region (Italy). In particular, the behaviour in vadose zone was investigated. An iterative assessment process was performed for risk assessment of radioactive contamination. The analysis therein developed considers the following aspects: i) hydro geological site characterization; ii) individuation of the main intrinsic and external site factors influencing water flow and radionuclides transport phenomena; iii) software potential for radionuclides leakage simulation purposes.Keywords: HYDRUS 1D, radionuclides transport phenomena, site characterization, radiation protection
Procedia PDF Downloads 3971292 Regional Hydrological Extremes Frequency Analysis Based on Statistical and Hydrological Models
Authors: Hadush Kidane Meresa
Abstract:
The hydrological extremes frequency analysis is the foundation for the hydraulic engineering design, flood protection, drought management and water resources management and planning to utilize the available water resource to meet the desired objectives of different organizations and sectors in a country. This spatial variation of the statistical characteristics of the extreme flood and drought events are key practice for regional flood and drought analysis and mitigation management. For different hydro-climate of the regions, where the data set is short, scarcity, poor quality and insufficient, the regionalization methods are applied to transfer at-site data to a region. This study aims in regional high and low flow frequency analysis for Poland River Basins. Due to high frequent occurring of hydrological extremes in the region and rapid water resources development in this basin have caused serious concerns over the flood and drought magnitude and frequencies of the river in Poland. The magnitude and frequency result of high and low flows in the basin is needed for flood and drought planning, management and protection at present and future. Hydrological homogeneous high and low flow regions are formed by the cluster analysis of site characteristics, using the hierarchical and C- mean clustering and PCA method. Statistical tests for regional homogeneity are utilized, by Discordancy and Heterogeneity measure tests. In compliance with results of the tests, the region river basin has been divided into ten homogeneous regions. In this study, frequency analysis of high and low flows using AM for high flow and 7-day minimum low flow series is conducted using six statistical distributions. The use of L-moment and LL-moment method showed a homogeneous region over entire province with Generalized logistic (GLOG), Generalized extreme value (GEV), Pearson type III (P-III), Generalized Pareto (GPAR), Weibull (WEI) and Power (PR) distributions as the regional drought and flood frequency distributions. The 95% percentile and Flow duration curves of 1, 7, 10, 30 days have been plotted for 10 stations. However, the cluster analysis performed two regions in west and east of the province where L-moment and LL-moment method demonstrated the homogeneity of the regions and GLOG and Pearson Type III (PIII) distributions as regional frequency distributions for each region, respectively. The spatial variation and regional frequency distribution of flood and drought characteristics for 10 best catchment from the whole region was selected and beside the main variable (streamflow: high and low) we used variables which are more related to physiographic and drainage characteristics for identify and delineate homogeneous pools and to derive best regression models for ungauged sites. Those are mean annual rainfall, seasonal flow, average slope, NDVI, aspect, flow length, flow direction, maximum soil moisture, elevation, and drainage order. The regional high-flow or low-flow relationship among one streamflow characteristics with (AM or 7-day mean annual low flows) some basin characteristics is developed using Generalized Linear Mixed Model (GLMM) and Generalized Least Square (GLS) regression model, providing a simple and effective method for estimation of flood and drought of desired return periods for ungauged catchments.Keywords: flood , drought, frequency, magnitude, regionalization, stochastic, ungauged, Poland
Procedia PDF Downloads 6021291 Antecedents of Spinouts: Technology Relatedness, Intellectual Property Rights, and Venture Capital
Authors: Sepideh Yeganegi, Andre Laplume, Parshotam Dass, Cam-Loi Huynh
Abstract:
This paper empirically examines organizational and institutional antecedents of entrepreneurial entry. We employ multi-level logistic regression modelling methods on a sub-sample of the Global Entrepreneurship Monitor’s 2011 survey covering 30 countries. The results reveal that employees who have experience with activities unrelated to the core technology of their organizations are more likely to spin out entrepreneurial ventures, whereas those with experiences related to the core technology are less likely to do so. In support of the recent theory, we find that the strength of intellectual property rights and the availability of venture capital have negative and positive effects, respectively, on the likelihood that employees turn into entrepreneurs. These institutional factors also moderate the effect of relatedness to core technology such that entrepreneurial entries by employees with experiences related to core technology are curbed more severely by stronger intellectual property rights protection regimes and lack of venture capital.Keywords: spinouts, intellectual property rights, venture capital, entrepreneurship, organizational experiences, core technology
Procedia PDF Downloads 3561290 Microwave Assisted Extractive Desulfurization of Gas Oil Feedstock
Authors: Hamida Y. Mostafa, Ghada E. Khedr, Dina M. Abd El-Aty
Abstract:
Sulfur compound removal from petroleum fractions is a critical component of environmental protection demands. Solvent extraction, oxidative desulfurization, or hydro-treatment techniques have traditionally been used as the removal processes. While all methods were capable of eliminating sulfur compounds at moderate rates, they had some limitations. A major problem with these routes is their high running expenses, which are caused by their prolonged operation times and high energy consumption. Therefore, new methods for removing sulfur are still necessary. In the current study, a simple assisted desulfurization system for gas oil fraction has been successfully developed using acetonitrile and methanol as a solvent under microwave irradiation. The key variables affecting sulfur removal have been studied, including microwave power, irradiation time, and solvent to gas oil volume ratio. At the conclusion of the research that is being presented, promising results have been found. The results show that a microwave-assisted extractive desulfurization method had remove sulfur with a high degree of efficiency under the suitable conditions.Keywords: extractive desulfurization, microwave assisted extraction, petroleum fractions, acetonitrile and methanol
Procedia PDF Downloads 1031289 Minimization of Denial of Services Attacks in Vehicular Adhoc Networking by Applying Different Constraints
Authors: Amjad Khan
Abstract:
The security of Vehicular ad hoc networking is of great importance as it involves serious life threats. Thus to provide secure communication amongst Vehicles on road, the conventional security system is not enough. It is necessary to prevent the network resources from wastage and give them protection against malicious nodes so that to ensure the data bandwidth availability to the legitimate nodes of the network. This work is related to provide a non conventional security system by introducing some constraints to minimize the DoS (Denial of services) especially data and bandwidth. The data packets received by a node in the network will pass through a number of tests and if any of the test fails, the node will drop those data packets and will not forward it anymore. Also if a node claims to be the nearest node for forwarding emergency messages then the sender can effectively identify the true or false status of the claim by using these constraints. Consequently the DoS(Denial of Services) attack is minimized by the instant availability of data without wasting the network resources.Keywords: black hole attack, grey hole attack, intransient traffic tempering, networking
Procedia PDF Downloads 2841288 Banking and Accounting Analysis Researches Effect on Environment
Authors: Marina Magdy Naguib Karas
Abstract:
New methods of providing banking services to the customer have been introduced, such as online banking. Banks have begun to consider electronic banking (e-banking) as a way to replace some traditional branch functions by using the Internet as a new distribution channel. Some consumers have at least one account at multiple banks and access these accounts through online banking. To check their current net worth, clients need to log into each of their accounts, get detailed information, and work toward consolidation. Not only is it time-consuming, but it is also a repeatable activity with a certain frequency. To solve this problem, the concept of account aggregation was added as a solution. Account consolidation in e-banking as a form of electronic banking appears to build a stronger relationship with customers. An account linking service is generally referred to as a service that allows customers to manage their bank accounts held at different institutions via a common online banking platform that places a high priority on security and data protection. The article provides an overview of the account aggregation approach in e-banking as a new service in the area of e-banking.Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise development
Procedia PDF Downloads 501287 The Effect of Artificial Intelligence on Human Rights Resources and Development
Authors: Tharwat Girgis Farag Girgis
Abstract:
The link between development and human rights has long been the subject of scholarly debate. As a result, a number of principles have been adopted, from the right to development to the human rights-based development approach, to understand the dynamics between the two concepts. Despite the initiatives taken, the exact relationship between development and human rights remains unclear. However, the rapprochement between the two concepts and the need for development efforts regarding human rights have increased in recent years. On the other hand, the emergence of sustainable development as an acceptable method in development goals and policies makes this consensus even more unstable. The place of sustainable development in the legal debate on human rights and its role in promoting sustainable development programs require further research. Therefore, this article attempts to map the relationship between development and human rights, with particular emphasis on the place given to sustainable development principles in international human rights law. It will continue to investigate whether it recognizes sustainable development rights. The article will therefore give a positive answer to question mentioned here. The jurisprudence and interpretive guidelines of human rights institutions travel to confirm this hypothesis.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security
Procedia PDF Downloads 55