Search results for: end fault protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2890

Search results for: end fault protection

1510 Verifying the Performance of the Argon-41 Monitoring System from Fluorine-18 Production for Medical Applications

Authors: Nicole Virgili, Romolo Remetti

Abstract:

The aim of this work is to characterize, from radiation protection point of view, the emission into the environment of air contaminated by argon-41. In this research work, 41Ar is produced by a TR19PET cyclotron, operated at 19 MeV, installed at 'A. Gemelli' University Hospital, Rome, Italy, for fluorine-18 production. The production rate of 41Ar has been calculated on the basis of the scheduled operation cycles of the cyclotron and by utilising proper production algorithms. Then extensive Monte Carlo calculations, carried out by MCNP code, have allowed to determine the absolute detection efficiency to 41Ar gamma rays of a Geiger Muller detector placed in the terminal part of the chimney. Results showed unsatisfactory detection efficiency values and the need for integrating the detection system with more efficient detectors.

Keywords: Cyclotron, Geiger Muller detector, MCNPX, argon-41, emission of radioactive gas, detection efficiency determination

Procedia PDF Downloads 147
1509 Modeling Intelligent Threats: Case of Continuous Attacks on a Specific Target

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

In this paper, we treat a model that falls in the area of protecting targeted systems from intelligent threats including terrorism. We introduce the concept of system survivability, in the context of continuous attacks, as the probability that a system under attack will continue operation up to some fixed time t. We define a constant attack rate (CAR) process as an attack on a targeted system that follows an exponential distribution. We consider the superposition of several CAR processes. From the attacker side, we determine the optimal attack strategy that minimizes the system survivability. We also determine the optimal strengthening strategy that maximizes the system survivability under limited defensive resources. We use operations research techniques to identify optimal strategies of each antagonist. Our results may be used as interesting starting points to develop realistic protection strategies against intentional attacks.

Keywords: CAR processes, defense/attack strategies, exponential failure, survivability

Procedia PDF Downloads 393
1508 Gig Economy Development Trends in Georgia

Authors: Nino Grigolaia

Abstract:

The paper discusses the importance of the development of the gig economy in the economy of Georgia, analyzes the trends of the development of the gig economy, and identifies the main challenges in this field. Objective. The objective of the study is to assess the role of the gig economy, identify the main challenges and develop recommendations. Methodologies. Analysis, synthesis, comparison, induction and other methods are used; A desk study has been conducted. Findings. The advantages and disadvantages of the gig economy are identified, and the impact of the changes caused by the development of the gig economy on labor relations and employment is determined. It is argued that the ongoing technological changes have led to the emergence of new global trends in the labor market and increased the inequality of income distribution. Conclusions. Based on the analysis of the gig economy in the world and in Georgia, relevant recommendations are proposed, namely: establishing a new system of regulating the incomes of employees in this field, developing a real social protection mechanism, Development of political and legal instruments for regulation of gig economy and others.

Keywords: gig economy, economy of Georgia, digital platforms, labor relations

Procedia PDF Downloads 66
1507 Paleogene Syn-Rift Play Identification in Palembang Sub-Basin, South Sumatera, Indonesia

Authors: Perdana Rakhmana Putra, Hansen Wijaya, Sri Budiyani, Muhamad Natsir, Alexis badai Samudra

Abstract:

The Palembang Sub-Basin (PSB) located in southern part of South Sumatera basin (SSB) consist of half-graben complex trending N-S to NW-SE. These geometries are believe as an impact of strike-slip regime developed in Eocene-Oligocene. Generally, most of the wells in this area produced hydrocarbon from late stage of syn-rift sequences called Lower Talang Akar (LTAF) and post-rift sequences called Batu Raja Formation (BRF) and drilled to proved hydrocarbon on structural trap; three-way dip anticline, four-way dip anticline, dissected anticline, and stratigraphy trap; carbonate build-up and stratigraphic pinch out. Only a few wells reached the deeper syn-rift sequences called Lahat Formation (LAF) and Lemat Formation (LEF). The new interpretation of subsurface data was done by the tectonostratigraphy concept and focusing on syn-rift sequence. Base on seismic characteristic on basin centre, it divided into four sequences: pre-rift sequence, rift initiation, maximum rift and late rift. These sequences believed as a new exploration target on PSB mature basin. This paper will demonstrate the paleo depositional setting during Paleogene and exploration play concept of syn-rift sequence in PSB. The main play for this area consists of stratigraphic and structure play, where the stratigraphic play is Eocene-Oligocene sediment consist of LAF sandstone, LEF-Benakat formation, and LAF with pinch-out geometry. The pinch-out, lenses geometry and on-lap features can be seen on the seismic reflector and formed at the time of the syn-rift sequence. The structural play is dominated by a 3 Way Dip play related to reverse fault trap.

Keywords: syn-rift, tectono-stratigraphy, exploration play, basin center play, south sumatera basin

Procedia PDF Downloads 192
1506 Harnessing Artificial Intelligence for Early Detection and Management of Infectious Disease Outbreaks

Authors: Amarachukwu B. Isiaka, Vivian N. Anakwenze, Chinyere C. Ezemba, Chiamaka R. Ilodinso, Chikodili G. Anaukwu, Chukwuebuka M. Ezeokoli, Ugonna H. Uzoka

Abstract:

Infectious diseases continue to pose significant threats to global public health, necessitating advanced and timely detection methods for effective outbreak management. This study explores the integration of artificial intelligence (AI) in the early detection and management of infectious disease outbreaks. Leveraging vast datasets from diverse sources, including electronic health records, social media, and environmental monitoring, AI-driven algorithms are employed to analyze patterns and anomalies indicative of potential outbreaks. Machine learning models, trained on historical data and continuously updated with real-time information, contribute to the identification of emerging threats. The implementation of AI extends beyond detection, encompassing predictive analytics for disease spread and severity assessment. Furthermore, the paper discusses the role of AI in predictive modeling, enabling public health officials to anticipate the spread of infectious diseases and allocate resources proactively. Machine learning algorithms can analyze historical data, climatic conditions, and human mobility patterns to predict potential hotspots and optimize intervention strategies. The study evaluates the current landscape of AI applications in infectious disease surveillance and proposes a comprehensive framework for their integration into existing public health infrastructures. The implementation of an AI-driven early detection system requires collaboration between public health agencies, healthcare providers, and technology experts. Ethical considerations, privacy protection, and data security are paramount in developing a framework that balances the benefits of AI with the protection of individual rights. The synergistic collaboration between AI technologies and traditional epidemiological methods is emphasized, highlighting the potential to enhance a nation's ability to detect, respond to, and manage infectious disease outbreaks in a proactive and data-driven manner. The findings of this research underscore the transformative impact of harnessing AI for early detection and management, offering a promising avenue for strengthening the resilience of public health systems in the face of evolving infectious disease challenges. This paper advocates for the integration of artificial intelligence into the existing public health infrastructure for early detection and management of infectious disease outbreaks. The proposed AI-driven system has the potential to revolutionize the way we approach infectious disease surveillance, providing a more proactive and effective response to safeguard public health.

Keywords: artificial intelligence, early detection, disease surveillance, infectious diseases, outbreak management

Procedia PDF Downloads 65
1505 Flushing Model for Artificial Islands in the Persian Gulf

Authors: Sawsan Eissa, Momen Gharib, Omnia Kabbany

Abstract:

A flushing numerical study has been performed for intended artificial islands on the Persian Gulf coast in Abu Dhabi, UAE. The island masterplan was tested for flushing using the DELFT 3D hydrodynamic model, and it was found that its residence time exceeds the acceptable PIANC flushing Criteria. Therefore, a number of mitigation measures were applied and tested one by one using the flushing model. Namely, changing the location of the entrance opening, dredging, removing part of the mangrove existing in the near vicinity to create a channel, removing the mangrove altogether, using culverts of different numbers and locations, and pumping at selected points. The pumping option gave the best solution, but it was disregarded due to high capital and running costs. Therefore, it opted for a combination of other solutions, including removing mangroves, introducing culverts, and adjusting island boundaries and types of protection.

Keywords: hydrodynamics, flushing, delft 3d, Persian Gulf, artificial islands.

Procedia PDF Downloads 53
1504 Effects of IPPC Permits on Ambient Air Quality

Authors: C. Cafaro, P. Ceci, L. De Giorgi

Abstract:

The aim of this paper is to give an assessment of environmental effects of IPPC permit conditions of installations that are in the specific territory with a high concentration of industrial activities. The IPPC permit is the permit that each operator should hold to operate the installation as stated by the directive 2010/75/UE on industrial emissions (integrated pollution prevention and control), known as IED (Industrial Emissions Directive). The IPPC permit includes all the measures necessary to achieve a high level of protection of the environment as a whole, also defining the monitoring requirements as measurement methodology, frequency, and evaluation procedure. The emissions monitoring of a specific plant may also give indications of the contribution of these emissions on the air quality of a definite area. So, it is clear that the IPPC permits are important tools both to improve the environmental framework and to achieve the air quality standards, assisting in assessing the possible industrial sources contributions to air pollution.

Keywords: IPPC, IED, emissions, permits, air quality, large combustion plants

Procedia PDF Downloads 449
1503 Technology Impact on the Challenge between Human Rights and Cyber Terrorism

Authors: Abanoub Zare Zakaria Herzalla

Abstract:

The link between terrorism and human rights has become a major challenge in the fight against terrorism around the world. This is based on the fact that terrorism and human rights are so closely linked that when the former starts, the latter are violated. This direct connection was recognized in the Vienna Declaration and Program of Action adopted by the World Conference on Human Rights in Vienna on June 25, 1993, which recognizes that acts of terrorism in all their forms and manifestations aim to destroy the human rights of people. Terrorism therefore represents an attack on our most basic human rights. To this end, the first part of this article focuses on the connections between terrorism and human rights and seeks to highlight the interdependence between these two concepts. The second part discusses the emerging concept of cyberterrorism and its manifestations. An analysis of the fight against cyberterrorism in the context of human rights is also carried out.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.

Procedia PDF Downloads 46
1502 Consumer Cognitive Models of Vaccine Attitudes: Behavioral Informed Strategies Promoting Vaccination Policy in Greece

Authors: Halkiopoulos Constantinos, Koutsopoulou Ioanna, Gkintoni Evgenia, Antonopoulou Hera

Abstract:

Immunization appears to be an essential part of health care service in times of pandemics such as covid-19 and aims not only to protect the health of the population but also the health and sustainability of the economies of the countries affected. It is reported that more than 3.44 billion doses have been administered so far, which accounts for 45 doses for 100 people. Vaccination programs in various countries have been promoted and accepted by people differently and therefore they proceeded in different ways and speed; most countries directing them towards people with vulnerable chronic or recent health statuses. Large scale restriction measures or lockdown, personal protection measures such as masks and gloves and a decrease in leisure and sports activities were also implemented around the world as part of the protection health strategies against the covid-19 pandemic. This research aims to present an analysis based on variations on people’s attitudes towards vaccination based on demographic, social and epidemiological characteristics, and health status on the one hand and perception of health, health satisfaction, pain, and quality of life on the other hand. 1500 Greek e-consumers participated in the research, mainly through social media who took part in an online-based survey voluntarily. The questionnaires included demographic, social and medical characteristics of the participants, and questions asking people’s willingness to be vaccinated and their opinion on whether there should be a vaccine against covid-19. Other stressor factors were also reported in the questionnaires and participants’ loss of someone close due to covid-19, or staying at home quarantine due to being infected from covid-19. WHOQUOL-BREF and GLOBAL PSYCHOTRAUMA SCREEN- GPS were used with kind permission from WHO and from the International Society for Traumatic Stress Studies in this study. Attitudes towards vaccination varied significantly related to aging, level of education, health status and consumer behavior. Health professionals’ attitudes also varied in relation to age, level of education, profession, health status and consumer needs. Vaccines have been the most common technological aid of human civilization so far in the fight against viruses. The results of this study can be used for health managers and digital marketers of pharmaceutical companies and also other staff involved in vaccination programs and for designing health policy immunization strategies during pandemics in order to achieve positive attitudes towards vaccination and larger populations being vaccinated in shorter periods of time after the break out of pandemic. Health staff needs to be trained, aided and supervised to go through with vaccination programs and to be protected through vaccination programs themselves. Feedback in each country’s vaccination program, short backs, deficiencies and delays should be addressed and worked out.

Keywords: consumer behavior, cognitive models, vaccination policy, pandemic, Covid-19, Greece

Procedia PDF Downloads 184
1501 Influence of Graphene Content on Corrosion Behavior of Electrodeposited Zinc–Graphene Composite Coatings

Authors: Bin Yang, Xiaofang Chen, Guangxin Wang

Abstract:

Zinc coating as a sacrificial protection plays an important role in the traditional steel anticorrosion field. Adding second-phase reinforcement particles into zinc matrix is an interesting approach to further enhance its corrosion performance. In this paper, pure Zn and Zn–graphene composite coatings of different graphene contents were prepared by direct current electrodeposition on 304 stainless steel substrate. The coatings were characterized by XRD, SEM/EDS, and Raman spectroscopy. Tafel polarization and electrochemical impedance spectroscopic methods were used to study their corrosion behavior. Result obtained have shown that the concentration of grapheme oxide (GO) in zinc sulfate bath has an important effect on textured structure and surface morphology of Zn–graphene composite coatings. The coating prepared with 1.0g/L GO has shown the best corrosion resistance compared to other coatings prepared in this study.

Keywords: Zn-graphene coatings, electrodeposition, microstructure, corrosion behavior

Procedia PDF Downloads 258
1500 CRYPTO COPYCAT: A Fashion Centric Blockchain Framework for Eliminating Fashion Infringement

Authors: Magdi Elmessiry, Adel Elmessiry

Abstract:

The fashion industry represents a significant portion of the global gross domestic product, however, it is plagued by cheap imitators that infringe on the trademarks which destroys the fashion industry's hard work and investment. While eventually the copycats would be found and stopped, the damage has already been done, sales are missed and direct and indirect jobs are lost. The infringer thrives on two main facts: the time it takes to discover them and the lack of tracking technologies that can help the consumer distinguish them. Blockchain technology is a new emerging technology that provides a distributed encrypted immutable and fault resistant ledger. Blockchain presents a ripe technology to resolve the infringement epidemic facing the fashion industry. The significance of the study is that a new approach leveraging the state of the art blockchain technology coupled with artificial intelligence is used to create a framework addressing the fashion infringement problem. It transforms the current focus on legal enforcement, which is difficult at best, to consumer awareness that is far more effective. The framework, Crypto CopyCat, creates an immutable digital asset representing the actual product to empower the customer with a near real time query system. This combination emphasizes the consumer's awareness and appreciation of the product's authenticity, while provides real time feedback to the producer regarding the fake replicas. The main findings of this study are that implementing this approach can delay the fake product penetration of the original product market, thus allowing the original product the time to take advantage of the market. The shift in the fake adoption results in reduced returns, which impedes the copycat market and moves the emphasis to the original product innovation.

Keywords: fashion, infringement, blockchain, artificial intelligence, textiles supply chain

Procedia PDF Downloads 258
1499 The Industrial Property in the Context of Wine Production in Brazil

Authors: Fátima R. Zan, Daniela C. Guimarães, Rosângela O. Soares, Suzana L. Russo

Abstract:

The wine until it reaches the consumer has a long way to go, from planting the wine to the bottling and the placing on the market, bringing many years of experimentation, and through several generations to have recognition for quality and excellence. The winemaking grew dramatically and are today many brands, including the associated locations, demonstrating their origin and cultural order that is associated with their production. The production, circulation and marketing of wines and products of grape and wine in Brazil is regulated by Law 7.678/88, amended by Law 10970/04, and adjusting the legislation to Regulation Wine Mercosur. This study was based on a retrospective study, and aimed to identify and characterize the modalities of industrial property used in wine production in Brazil. The wineries were selected from the 2014 ranking list, drawn up by the World Association of Journalists and Writers of Wines and Spirits (WAWWJ). The results show that the registration with INPI, regarding Patents, Trademarks, Industrial Designs and Geographical Indications, is not used by the wineries analyzed.

Keywords: counterfeiting, industrial property, protection, wine production

Procedia PDF Downloads 572
1498 Solar System with Plate Heat Exchanger

Authors: Christer Frennfelt

Abstract:

Solar heating is the most environmentally friendly way to heat water. Brazed Plate Heat Exchangers (BPHEs) are a key component in many solar heating applications for harvesting solar energy into accumulator tanks, producing hot tap water, and heating pools. The combination of high capacity in a compact format, efficient heat transfer, and fast response makes the BPHE the ideal heat exchanger for solar thermal systems. Solar heating is common as a standalone heat source, and as an add-on heat source for boilers, heat pumps, or district heating systems. An accumulator provides the possibility to store heat, which enables combination of different heat sources to a larger extent. In turn this works as protection to reduced access to energy or increased energy prices. For example heat from solar panels is preferably stored during the day for use at night.

Keywords: district heating and cooling, thermal storage, brazed plate heat exchanger, solar domestic hot water and combisystems

Procedia PDF Downloads 349
1497 A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence

Authors: Li Qiang, Yang Ze-Ming, Liu Bao-Xu, Jiang Zheng-Wei

Abstract:

With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain and evidence chain of cyber-attack on threat intelligence platform through data calculation, analysis and reasoning. Then, we used a number of cyber-attack events which we have observed and analyzed to test the reasoning method and demo system, the result of testing indicates that the reasoning method can provide certain help in cyber-attack attribution.

Keywords: reasoning, Bayesian networks, cyber-attack attribution, Kill Chain, threat intelligence

Procedia PDF Downloads 449
1496 Human Rights Impact on Citizens Evolution

Authors: Joseph Marzouk Gerais Abdelmalak

Abstract:

The interface between development and human rights has long been the subject of academic debate. Therefore, to understand the dynamics between the two concepts, a number of principles have been adopted, ranging from the right to development to a human rights-based approach to development. Despite these attempts, the exact connection between development and human rights is not yet fully understood. However, the inherent interdependence between these two concepts and the idea that development efforts should be undertaken with respect for human rights guarantees have gained momentum in recent years. It will then be examined whether the right to sustainable development is recognized.The article therefore concludes that the principles of sustainable development are recognized, directly or indirectly, in various human rights instruments, which represents a positive answer to the question posed above. Therefore, this work discusses international and regional human rights instruments as well as case law and interpretative guidelines from human rights bodies to demonstrate this hypothesis.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security

Procedia PDF Downloads 72
1495 Protected Status: Violation of the Provisions of Protected Status under International Humanitarian Law during the Liberation War of Bangladesh

Authors: Sabera Sultana

Abstract:

In today's war-torn world, it is crucial to identify, understand, and apply the laws aimed at minimizing civilian casualty during wartime. The purpose of this paper is to analyze the provisions of protected status under international humanitarian law and evaluate the historical facts and shreds of evidences of violation of protected status during the Liberation War of Bangladesh. This legal research paper evaluates the international humanitarian laws and case laws regarding protected status of people during wartime and evaluates them against the historical facts and well-documented evidences of violation of protected status during the Liberation War of Bangladesh. This paper will help to create a brief guideline on Protected Status under international humanitarian law, which will help to protect our civilians during wartime if ever required.

Keywords: civilian protection, international humanitarian laws, liberation war of Bangladesh, protected status

Procedia PDF Downloads 217
1494 The Impact of Artificial Intelligence on Human Rights Legislations and Evolution

Authors: Shenouda Farag Aziz Ibrahim

Abstract:

The relationship between terrorism and human rights has become an important issue in the fight against terrorism worldwide. This is based on the fact that terrorism and human rights are closely linked, so that when the former begins, the latter suffers. This direct link was recognized in the Vienna Declaration and Program of Action adopted by the International Conference on Human Rights held in Vienna on 25 June 1993, which recognized that terrorist acts aim to violate human rights in all their forms and manifestations. . Therefore, terrorism represents an attack on fundamental human rights. For this purpose, the first part of this article focuses on the relationship between terrorism and human rights and aims to show the relationship between these two concepts. In the second part, the concept of cyber threat and its manifestations are discussed. An analysis of the fight against terrorism in the context of human rights was also made..

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.

Procedia PDF Downloads 37
1493 Ultrasonographic Study of Normal Scapula in Horse

Authors: Mohamad Saeed Ahrari-Khafi, Abutorab Tabatabai-Naini, Niloofar Ajvadi

Abstract:

Scapular fracture is not common in horses, due to the proper protection of scapular muscles. However, if it happens, it can cause lameness in horses. Because of the overlapping of the scapula on the contralateral scapula and the thorax, usually radiography cannot be helpful in evaluation, except in small amount of its ventral part. Although ultrasonography is mainly used for diagnosis of soft tissue injuries, it also can be used for evaluation of bone surface abnormalities. This study was intended to document the normal ultrasonographic appearance of the equine scapula. Right forelimb of six horses was used. To facilitate the image assessment, a zoning system was developed. Ultrasonography was performed by using a 5-11 MHz linear array transducer. Ultrasonographic anatomy of scapula in different parts and planes was imaged and documented, hoping to help practitioners to diagnose fractures and injuries. Results showed that ultrasonography is capable to depict different parts of the scapula and regional muscles, and can be used for detecting fractures and other abnormalities.

Keywords: horse, scapula, scapular fracture, ultrasonography

Procedia PDF Downloads 304
1492 Seismic Performance Evaluation of Bridge Structures Using 3D Finite Element Methods in South Korea

Authors: Woo Young Jung, Bu Seog Ju

Abstract:

This study described the seismic performance evaluation of bridge structures, located near Daegu metropolitan city in Korea. The structural design code or regulatory guidelines is focusing on the protection of brittle failure or collapse in bridges’ lifetime during an earthquake. This paper illustrated the procedure in terms of the safety evaluation of bridges using simple linear elastic 3D Finite Element (FE) model in ABAQUS platform. The design response spectra based on KBC 2009 were then developed, in order to understand the seismic behavior of bridge structures. Besides, the multiple directional earthquakes were applied and it revealed that the most dominated earthquake direction was transverse direction of the bridge. Also, the bridge structure under the compressive stress was more fragile than the tensile stress and the vertical direction of seismic ground motions was not significantly affected to the structural system.

Keywords: seismic, bridge, FEM, evaluation, numerical analysis

Procedia PDF Downloads 364
1491 The Effect of Diapirs on the Geometry and Evolution of the Ait Ourir Basin, High Atlas Mountains of Marrakesh, Morocco

Authors: Hadach Fatiha, Algouti Ahmed, Algouti Abdellah, Jdaba Naji, Es-Sarrar Othman, Mourabit Zahra

Abstract:

This paper investigates the structure and evolution of diapirism in the Ait Ourir basin, located in the High Atlas of Marrakesh, using structural and sedimentological fieldwork integrated with field mapping. A tectonic-sedimentological study of the Mesozoic cover of the Ait Ourir basin area revealed that these units were subjected to important saccadic halokinetic activity, reflected by anticline structures associated with regional faults that created several synclinal mini-basins. However, the lack of seismic coverage in the study area makes the proposed interpretation based on extrapolations of information observed on the surface. In this work, we suggest that faults and salt activity led to the formation of different structures within the studied area. The growth of the Triassic evaporites at different stages during the Mesozoic is reflected by progressive and local unconformities, recorded as having different ages. These structures created high diapiric zones with reduced sedimentation, showing abrupt lateral thickness variations in several places where this activity was occurring; this is clearly defined within the Wanina and Jbel Sour’s mini-basins, where the Senonian was observed to rest at an angular unconformity over the entire sedimentary cover encompassing the time period from the Liassic to the Turonian. The diapirism associated with the major faults, especially encountered between the basins, is often accompanied by late Triassic volcanic material. This diapir-fault relationship resulted in shallow and often depocentric zones in a pull-apart system within a distensive context.

Keywords: diapir, evaporites, faults, pull-apart, Mesozoic cover, Ait Ourir, western High Atlas, Morocco

Procedia PDF Downloads 69
1490 Fatherhood and Caregiving: An Exploratory Study of Parenting Patterns in Pakistani Families

Authors: Kate Jonathan

Abstract:

This article presents the findings of a qualitative study into parenting practices in families of Pakistani origin in the North of England. It focuses on the involvement of fathers in childrearing within the Pakistani community. Data was generated from thirty parents’ in-depth interviews and ethnographic observation of parent-child relationships. The data was analyzed by an initial coding, identifying themes, a grouping of patterns, and arriving at a meaningful understanding. The study shows that the traditional role of fathers as breadwinners, providing discipline and protection, was still prominent in most of the Pakistani families who took part in the study. However, few men were becoming pragmatic and would engage in more childrearing chores, as their wives. The findings indicate that previous general portrayal of fatherhood as the primary, and sometimes, only, breadwinner is changing to encompass a lot more in Pakistani communities. Nowadays, some fathers are more involved in caregiving and are increasingly become co-contributors in the development of their children. However, the change is slower in some families than others and varied within this community.

Keywords: caregiving, childrearing, fathers, Pakistani families

Procedia PDF Downloads 294
1489 Some Codes for Variants in Graphs

Authors: Sofia Ait Bouazza

Abstract:

We consider the problem of finding a minimum identifying code in a graph. This problem was initially introduced in 1998 and has been since fundamentally connected to a wide range of applications (fault diagnosis, location detection …). Suppose we have a building into which we need to place fire alarms. Suppose each alarm is designed so that it can detect any fire that starts either in the room in which it is located or in any room that shares a doorway with the room. We want to detect any fire that may occur or use the alarms which are sounding to not only to not only detect any fire but be able to tell exactly where the fire is located in the building. For reasons of cost, we want to use as few alarms as necessary. The first problem involves finding a minimum domination set of a graph. If the alarms are three state alarms capable of distinguishing between a fire in the same room as the alarm and a fire in an adjacent room, we are trying to find a minimum locating domination set. If the alarms are two state alarms that can only sound if there is a fire somewhere nearby, we are looking for a differentiating domination set of a graph. These three areas are the subject of much active research; we primarily focus on the third problem. An identifying code of a graph G is a dominating set C such that every vertex x of G is distinguished from other vertices by the set of vertices in C that are at distance at most r≥1 from x. When only vertices out of the code are asked to be identified, we get the related concept of a locating dominating set. The problem of finding an identifying code (resp a locating dominating code) of minimum size is a NP-hard problem, even when the input graph belongs to a number of specific graph classes. Therefore, we study this problem in some restricted classes of undirected graphs like split graph, line graph and path in a directed graph. Then we present some results on the identifying code by giving an exact value of upper total locating domination and a total 2-identifying code in directed and undirected graph. Moreover we determine exact values of locating dominating code and edge identifying code of thin headless spider and locating dominating code of complete suns.

Keywords: identiying codes, locating dominating set, split graphs, thin headless spider

Procedia PDF Downloads 476
1488 Pioneering Conservation of Aquatic Ecosystems under Australian Law

Authors: Gina M. Newton

Abstract:

Australia’s Environment Protection and Biodiversity Conservation Act (EPBC Act) is the premiere, national law under which species and 'ecological communities' (i.e., like ecosystems) can be formally recognised and 'listed' as threatened across all jurisdictions. The listing process involves assessment against a range of criteria (similar to the IUCN process) to demonstrate conservation status (i.e., vulnerable, endangered, critically endangered, etc.) based on the best available science. Over the past decade in Australia, there’s been a transition from almost solely terrestrial to the first aquatic threatened ecological community (TEC or ecosystem) listings (e.g., River Murray, Macquarie Marshes, Coastal Saltmarsh, Salt-wedge Estuaries). All constitute large areas, with some including multiple state jurisdictions. Development of these conservation and listing advices has enabled, for the first time, a more forensic analysis of three key factors across a range of aquatic and coastal ecosystems: -the contribution of invasive species to conservation status, -how to demonstrate and attribute decline in 'ecological integrity' to conservation status, and, -identification of related priority conservation actions for management. There is increasing global recognition of the disproportionate degree of biodiversity loss within aquatic ecosystems. In Australia, legislative protection at Commonwealth or State levels remains one of the strongest conservation measures. Such laws have associated compliance mechanisms for breaches to the protected status. They also trigger the need for environment impact statements during applications for major developments (which may be denied). However, not all jurisdictions have such laws in place. There remains much opposition to the listing of freshwater systems – for example, the River Murray (Australia's largest river) and Macquarie Marshes (an internationally significant wetland) were both disallowed by parliament four months after formal listing. This was mainly due to a change of government, dissent from a major industry sector, and a 'loophole' in the law. In Australia, at least in the immediate to medium-term time frames, invasive species (aliens, native pests, pathogens, etc.) appear to be the number one biotic threat to the biodiversity and ecological function and integrity of our aquatic ecosystems. Consequently, this should be considered a current priority for research, conservation, and management actions. Another key outcome from this analysis was the recognition that drawing together multiple lines of evidence to form a 'conservation narrative' is a more useful approach to assigning conservation status. This also helps to addresses a glaring gap in long-term ecological data sets in Australia, which often precludes a more empirical data-driven approach. An important lesson also emerged – the recognition that while conservation must be underpinned by the best available scientific evidence, it remains a 'social and policy' goal rather than a 'scientific' goal. Communication, engagement, and 'politics' necessarily play a significant role in achieving conservation goals and need to be managed and resourced accordingly.

Keywords: aquatic ecosystem conservation, conservation law, ecological integrity, invasive species

Procedia PDF Downloads 130
1487 Valorization of Local Materials in the Waterproofing Technique of Landfills Site "TLS"

Authors: M. Debieche, F. Kaoua

Abstract:

This paper deals with the use two locals materials abundant in our country, with the view to use a mixture in the waterproofing the landfills. Our interest comes from the necessity to the environment protection, which has recently considerably grown. The site's waterproofing technique, in the landfills sites, is nowadays a very necessary condition to protect the environment, which requires the use of appropriate materials. To this end, an optimal mixture ensuring good performance in terms of hydraulic conductivity, durability and shear strength, mixtures based of sand at different concentrations of sodium bentonite, at compact state are prepared and studied. This study showed that a low permeability of mixture (sand / bentonite) can be achieved 6% of sodium bentonite. This mixture confers also good mechanical behavior, expressed by the recorded, reduction of friction (φ) and the increase of the cohesion (C). Thus, the selected formulation represents an optimal mixture for waterproofing systems. It guarantees an economical and ecological advantages.

Keywords: hydraulic conductivity, sand, sodium bentonite, sustainability

Procedia PDF Downloads 272
1486 Influence of Household Conservation Benefits on the Sustainability of Burunge Wildlife Management Areas in Tanzania

Authors: Gasto Lyakurwa, Glory Bakari, Edwin Sabuhoro

Abstract:

Wildlife Management Areas (WMAs) are established to promote and act as a remedy to the protection of wildlife resources outside the core protected area. WMAs aim to address issues of poverty, ensure sustainable use of wildlife resources, and share benefits from wildlife with the member villages. Successfully managed WMA in Tanzania improves local livelihood and conserves local biodiversity through tourism revenues and the protection of wildlife, respectively. Benefits accrued at household levels as a result of conservation activities in WMA can positively influence attitudes towards wildlife conservation. This research intends to assess the positive socio-economic impacts of WMA benefits on households in Burunge WMA in Tanzania. A questionnaire survey was conducted among four randomly selected villages in the ten villages forming the Burunge WMA to explore the household-level benefits of conservation activities. An example of a question item was whether household heads feel that they are benefiting from WMA and if they could remember some of the benefits. Interviews with leaders from WMA and member villages combined the survey to capture aspects of benefit distribution to households. A total of 80 households were used as samples of the recruited study sites. Moreover, the four WMA leaders and the eight village leaders of the respective study villages were interviewed. The study findings revealed that the shared benefit has mostly reached the community level and is less likely to reach the household level. Economic activities such as agriculture and livestock keeping were found to be more important for households than conservation-related economic activities. Conservation-related economic activities generate marginal direct benefits from WMA benefits to households, with ecotourism accounting for only 19.5%. The study also indicates that a direct share of financial benefits from WMA to households is lacking. Wildlife conservation benefits are less likely to reach household levels in WMAs, with the implication of reducing people's conservation attitudes and impeding community conservation success. WMA can utilize the finances from tourism fees and concessions to establish a Community Considerations Bank, which can lend money to some individuals at no or low interest rates. Considering the importance of education and health to households, WMA stands in a good position to provide health insurance premiums and student scholarships to motivate household participation in conservation activities. Community-based organizations and governments responsible for wildlife conservation should create mechanisms to channel conservation benefits to households in order to ensure the achievement of wildlife conservation objectives through WMA. These findings are expected to contribute to forming more WMAs with enhanced mechanisms for sharing conservation benefits to benefit the conservation of natural resources outside of the core protected areas. Motivated households are expected to respect wildlife and are less likely to engage in illegal activities such as poaching and harvesting conserved natural resources while coexisting with wildlife.

Keywords: social economic benefits, individuals, wildlife management areas, biodiversity, community

Procedia PDF Downloads 61
1485 The Importance of Sustainable Urban Development and Its Impacts on Turkey’s Urban Environmental Laws

Authors: Azadeh Rezafar, Sevkiye Sence Turk

Abstract:

Rapid population growth in urban areas and extinction danger of natural resources in order to meet the food needs of these population, has revealed the need for sustainability. It did not last long that city planners realized the importance of an equal access to natural resources with protecting and managing them in cities, in accordance with the concept of sustainable development. Like in other countries The Turkish Government is aware of the importance of the sustainable development in their cities. The government issued new laws for protection of environmental assets and so that the preservation of natural ecology. The main objective of this article is to emphasis the importance of the sustainable development in the context of the developing world by giving special information about the method of the Turkish Government for protecting nature with approval of difference laws in this area.

Keywords: population growth, sustainable development, Turkey, Turkish Urban Environmental Laws

Procedia PDF Downloads 344
1484 Impact Load Response of Light Rail Train Rail Guard

Authors: Eyob Hundessa Gose

Abstract:

Nowadays, it is obviously known that the construction of different infrastructures is one measurement of the development of a country; infrastructures like buildings, bridges, roads, and railways are among them. In the capital city of Ethiopia, the so-called Addis Ababa, the Light Rail Train (LRT), was built Four years ago to satisfy the demand for transportation among the people in the city. The lane of the Train and vehicle separation Media was built with a curb and rail guard installation system to show the right-of-way and for protection of vehicles entering the Train Lane, but this Rail guard fails easily when impacted by vehicles and found that the impact load response of the Rail guard is weak and the Rail guard cannot withstand impact load. This study investigates the effect of variation of parameters such as vehicle speed and different mass effects and assesses the failure mode FRP and Steel reinforcement bar rail guards of deflection and damage state.

Keywords: impact load, fiber reinforced polymer, rail guard, LS-DYNA

Procedia PDF Downloads 57
1483 Flexible Design of Triboelectric Nanogenerators for Efficient Vibration Energy Harvesting

Authors: Meriam Khelifa

Abstract:

In recent years, many studies have focused on the harvesting of the vibrations energy to produce electrical energy using contact separation (CS) triboelectric nanogenerators (TENG). The simplest design for a TENG consists of a capacitor comprising a single moving electrode. The conversion efficiency of vibration energy into electrical energy can, in principle, reach 100%. But to actually achieve this objective, it is necessary to optimize the parameters of the TENG, such as the dielectric constant and the thickness of the insulator, the load resistance, etc. In particular, the use of a switch which is actioned at optimal times within the TENG cycle is essential. Using numerical modeling and experimental design, we applied a methodology to find the TENG parameters which optimize the energy transfer efficiency (ETE) to almost 100% for any vibration frequency and amplitude. The rather simple design of a TENG is promising as an environment friendly device. It opens the doors for harvesting acoustic vibrations from the environment and to design effective protection against environmental noise.

Keywords: vibrations, CS TENG, efficiency, design of experiments

Procedia PDF Downloads 87
1482 Estimating Industrial Pollution Load in Phnom Penh by Industrial Pollution Projection System

Authors: Vibol San, Vin Spoann

Abstract:

Manufacturing plays an important role in job creation around the world. In 2013, it is estimated that there were more than half a billion jobs in manufacturing. In Cambodia in 2015, the primary industry occupies 26.18% of the total economy, while agriculture is contributing 29% and the service sector 39.43%. The number of industrial factories, which are dominated by garment and textiles, has increased since 1994, mainly in Phnom Penh city. Approximately 56% out of total 1302 firms are operated in the Capital city in Cambodia. Industrialization to achieve the economic growth and social development is directly responsible for environmental degradation, threatening the ecosystem and human health issues. About 96% of total firms in Phnom Penh city are the most and moderately polluting firms, which have contributed to environmental concerns. Despite an increasing array of laws, strategies and action plans in Cambodia, the Ministry of Environment has encountered some constraints in conducting the monitoring work, including lack of human and financial resources, lack of research documents, the limited analytical knowledge, and lack of technical references. Therefore, the necessary information on industrial pollution to set strategies, priorities and action plans on environmental protection issues is absent in Cambodia. In the absence of this data, effective environmental protection cannot be implemented. The objective of this study is to estimate industrial pollution load by employing the Industrial Pollution Projection System (IPPS), a rapid environmental management tool for assessment of pollution load, to produce a scientific rational basis for preparing future policy direction to reduce industrial pollution in Phnom Penh city. Due to lack of industrial pollution data in Phnom Penh, industrial emissions to the air, water and land as well as the sum of emissions to all mediums (air, water, land) are estimated using employment economic variable in IPPS. Due to the high number of employees, the total environmental load generated in Phnom Penh city is estimated to be 476.980.93 tons in 2014, which is the highest industrial pollution compared to other locations in Cambodia. The result clearly indicates that Phnom Penh city is the highest emitter of all pollutants in comparison with environmental pollutants released by other provinces. The total emission of industrial pollutants in Phnom Penh shares 55.79% of total industrial pollution load in Cambodia. Phnom Penh city generates 189,121.68 ton of VOC, 165,410.58 ton of toxic chemicals to air, 38,523.33 ton of toxic chemicals to land and 28,967.86 ton of SO2 in 2014. The results of the estimation show that Textile and Apparel sector is the highest generators of toxic chemicals into land and air, and toxic metals into land, air and water, while Basic Metal sector is the highest contributor of toxic chemicals to water. Textile and Apparel sector alone emits 436,015.84 ton of total industrial pollution loads. The results suggest that reduction in industrial pollution could be achieved by focusing on the most polluting sectors.

Keywords: most polluting area, polluting industry, pollution load, pollution intensity

Procedia PDF Downloads 259
1481 Examining Child Rape Provisions of Bangladesh in Comparison with Other South Asian Countries

Authors: Monira Nazmi Jahan

Abstract:

Child rape or child abuse is a serious and fearsome crime against children, which is an epidemic almost in every state of today’s world. However, in the case of Bangladesh, the scenario is terrifying. The objective of this paper is to examine the laws relating to child rape in Bangladesh as according to a renowned Daily Newspaper 'Prothom Alo', nearly 346 children are being raped since January 2019. This paper discusses and draws the difference of child rape provisions of Bangladesh with other South-Asian countries, comprises of India, Maldives, Pakistan, Sri Lanka, Nepal, Bhutan, and Afghanistan. In Bangladesh, girls below 18 years are considered to be a child. ‘The Penal Code, 1860’ and a special law ‘Nari O Shishu Nirjatan Daman Ain, 2012’ provides that any person committing child rape will be punished with rigorous life imprisonment and fine. This piece of law also gives provisions for punishment in case of child’s death after the commission of rape and gang rape, and the punishment is the death penalty. In India there is ‘The Protection of Children from Sexual Offences Act, 2012’ (POSCO) which has separate provisions for sexual assault, penetrative sexual assault and aggravated penetrative sexual assault by different categories of person such as relatives, institutional officers and trustees and also for mentally and physically challenged child victims and provides punishment up to death penalty. In Pakistan, there is ‘Pakistan Penal Code Amended Act, 2016’ which has only two provisions for child rape. In case offence committed by one person, the punishment is 10 to 25 years of imprisonment and fine. In case of offence committed by two or more persons, each shall be liable to death or imprisonment for life. Unfortunately, Afghanistan has no laws for the protection of rape victims of women let alone children, whereas there are a lot of child rape cases, including both girls and boys who are used for sexual slavery. The Maldives has a special law named ‘Special Provisions Act to Deal with Child Sex Abuse Offenders.’ This has categorized the offenders like POSCO and has provided punishments accordingly. The punishments are: punishments range from 1 to 25 years accordingly, whereas Bangladesh has lesser provisions, but the gravity and duration of punishments are much higher. The Penal Code of Sri Lanka imposes a minimum sentence of 10 years for those convicted of raping a child under 18 years. In Bhutan, child rape provision is made according to the age of a child. ‘The Penal Code of Bhutan, 2004’, mentions provisions for the rape of a child in case of child rape below and above 12 years, gang rape of a child below and above 12 years and has graded the punishments as first, second and third degree. Though Bangladesh has better provisions for punishments, the ages are not categorized in the laws. In Nepal there is ‘Act relating to Children, 2018’ provisions are made for offenders who use or cause or engage child sexual exploitation, and the punishment is same for rape offenders according to prevailing laws in Nepal. No separate punishments for child offenders are made. The ultimate conclusion that can be drawn is Bangladesh has better punishments than all other South-Asian countries and same punishment as India however, Bangladesh can make or amend the laws and categorize offenders as like POSCO of India, Special provisions of Maldives and Bhutan.

Keywords: child rape, death penalty, sexual slavery, South Asia

Procedia PDF Downloads 109