Search results for: data protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 25746

Search results for: data protection

25566 Mechanism of Cathodic Protection to Minimize Corrosion Caused by Chloride in Reinforcement Concrete

Authors: Mohamed A. Deyab, Omnia El-Shamy

Abstract:

The main objective of this case study is to integrate the advantages of cathodic protection technologies in order to lessen chloride-induced corrosion in reinforced concrete. This research employs potentiodynamic polarisation, impedance spectroscopy (EIS), and surface characteristics. The results showed how effectively the new cathodic control strategy is preventing corrosion of the concrete iron rods. Over time, the protective system becomes more reliable and effective. The potentials of the zinc electrode persist still more negative after 30 days, implying that the zinc electrode can maintain powerful electrocatalytic behavior for a long period of time. As per the electrochemical impedance spectroscopy (EIS), using the CP technique reduces the rate of corrosion of rebar iron in cementitious materials over time.

Keywords: cathodic protection, corrosion, reinforced concrete, chloride

Procedia PDF Downloads 48
25565 Modalmetric Fiber Sensor and Its Applications

Authors: M. Zyczkowski, P. Markowski, M. Karol

Abstract:

The team from IOE MUT is developing fiber optic sensors for the security systems for 15 years. The conclusions of the work indicate that these sensors are complicated. Moreover, these sensors are expensive to produce and require sophisticated signal processing methods.We present the results of the investigations of three different applications of the modalmetric sensor: • Protection of museum collections and heritage buildings, • Protection of fiber optic transmission lines, • Protection of objects of critical infrastructure. Each of the presented applications involves different requirements for the system. The results indicate that it is possible to developed a fiber optic sensor based on a single fiber. Modification of optoelectronic parts with a change of the length of the sensor and the method of reflections of propagating light at the end of the sensor allows to adjust the system to the specific application.

Keywords: modalmetric fiber optic sensor, security sensor, optoelectronic parts, signal processing

Procedia PDF Downloads 590
25564 A 5-V to 30-V Current-Mode Boost Converter with Integrated Current Sensor and Power-on Protection

Authors: Jun Yu, Yat-Hei Lam, Boris Grinberg, Kevin Chai Tshun Chuan

Abstract:

This paper presents a 5-V to 30-V current-mode boost converter for powering the drive circuit of a micro-electro-mechanical sensor. The design of a transconductance amplifier and an integrated current sensing circuit are presented. In addition, essential building blocks for power-on protection such as a soft-start and clamp block and supply and clock ready block are discussed in details. The chip is fabricated in a 0.18-μm CMOS process. Measurement results show that the soft-start and clamp block can effectively limit the inrush current during startup and protect the boost converter from startup failure.

Keywords: boost converter, current sensing, power-on protection, step-up converter, soft-start

Procedia PDF Downloads 982
25563 Creating Risk Maps on the Spatiotemporal Occurrence of Agricultural Insecticides in Sub-Saharan Africa

Authors: Chantal Hendriks, Harry Gibson, Anna Trett, Penny Hancock, Catherine Moyes

Abstract:

The use of modern inputs for crop protection, such as insecticides, is strongly underestimated in Sub-Saharan Africa. Several studies measured toxic concentrations of insecticides in fruits, vegetables and fish that were cultivated in Sub-Saharan Africa. The use of agricultural insecticides has impact on human and environmental health, but it also has the potential to impact on insecticide resistance in malaria transmitting mosquitos. To analyse associations between historic use of agricultural insecticides and the distribution of insecticide resistance through space and time, the use and environmental fate of agricultural insecticides needs to be mapped through the same time period. However, data on the use and environmental fate of agricultural insecticides in Africa are limited and therefore risk maps on the spatiotemporal occurrence of agricultural insecticides are created using environmental data. Environmental data on crop density and crop type were used to select the areas that most likely receive insecticides. These areas were verified by a literature review and expert knowledge. Pesticide fate models were compared to select most dominant processes that are involved in the environmental fate of insecticides and that can be mapped at a continental scale. The selected processes include: surface runoff, erosion, infiltration, volatilization and the storing and filtering capacity of soils. The processes indicate the risk for insecticide accumulation in soil, water, sediment and air. A compilation of all available data for traces of insecticides in the environment was used to validate the maps. The risk maps can result in space and time specific measures that reduce the risk of insecticide exposure to non-target organisms.

Keywords: crop protection, pesticide fate, tropics, insecticide resistance

Procedia PDF Downloads 110
25562 BIM4Cult Leveraging BIM and IoT for Enhancing Fire Safety in Historical Buildings

Authors: Anastasios Manos, Despina Elisabeth Filippidou

Abstract:

Introduction: Historical buildings are an inte-gral part of the cultural heritage of every place, and beyond the obvious need for protection against risks, they have specific requirements regarding the handling of hazards and disasters such as fire, floods, earthquakes, etc. Ensuring high levels of protection and safety for these buildings is impera-tive for two distinct but interconnected reasons: a) they themselves constitute cultural heritage, and b) they are often used as museums/cultural spaces, necessitating the protection of both human life (vis-itors and workers) and the cultural treasures they house. However, these buildings present serious constraints in implementing the necessary measures to protect them from destruction due to their unique architecture, construction methods, and/or the structural materials used in the past, which have created an existing condition that is sometimes challenging to reshape and operate within the framework of modern regulations and protection measures. One of the most devastating risks that threaten historical buildings is fire. Catastrophic fires demonstrate the need for timely evaluation of fire safety measures in historical buildings. Recog-nizing the criticality of protecting historical build-ings from the risk of fire, the Confederation of Fire Protection Associations in Europe (CFPA E) issued specific guidelines in 2013 (CFPA-E Guideline No 30:2013 F) for the fire protection of historical buildings at the European level. However, until now, few actions have been implemented towards leveraging modern technologies in the field of con-struction and maintenance of buildings, such as Building Information Modeling (BIM) and the Inter-net of Things (IoT), for the protection of historical buildings from risks like fires, floods, etc. The pro-ject BIM4Cult has bee developed in order to fill this gap. It is a tool for timely assessing and monitoring of the fire safety level of historical buildings using BIM and IoT technologies in an integrated manner. The tool serves as a decision support expert system for improving the fire safety of historical buildings by continuously monitoring, controlling and as-sessing critical risk factors for fire.

Keywords: Iot, fire, BIM, expert system

Procedia PDF Downloads 38
25561 Study on the Protection and Transformation of Stone House Building in Shitang Town, Wenling, Zhejiang

Authors: Zhang Jiafeng

Abstract:

Stone houses, represented by Shitang town, Wenling town, Taizhou city, are very precious cultural relics in Zhejiang province and even in the whole country. The coastal residences in eastern Zhejiang with distinctive regional characteristics are completely different from the traditional residential styles in the inland areas of Zhejiang. However, with the aggravation of the conflict between the use function of traditional stone houses and the modern lifestyle, and the lack of effective protection, stone houses are disappearing in large numbers. Therefore, it is very important to protect and inherit the stone house building, and make effective and feasible development strategies. This paper will analyze the formation background, location selection, plane layout, architectural form, spatial organization, material application, and construction technology of the stone houses through literature research and field investigation. In addition, a series of feasibility studies are carried out on the protection and renovation of stone houses. The ultimate purpose is to attract people's attention and provide some reference for the protection, inheritance, development, and utilization of traditional houses in coastal areas.

Keywords: regional, stone house building, traditional houses, Wenling Shitang

Procedia PDF Downloads 122
25560 The Implications of Instrumental Animal Protection for the Legal and Moral Status of Animals

Authors: Ankita Shanker, Angus Nurse

Abstract:

The notion of animal rights is an emerging trend in various spaces, including judicial and societal discourse. But one of the key purposes of recognizing the fundamental rights of anyone is their de-objectification. Animals are a prime example of a group that has rights that are neither recognized nor protected in any meaningful way, and anything that purports differently fails to ameliorate this because it still objectifies animals. Animals are currently treated by law and society as commodities with primarily (though not exclusively) instrumental value to some other rights-holder, such as humans or nature. So most protections that are afforded to them are done so in furtherance of the interests that they allegedly further, be it social morality or environmental protection. Animal rights are thus often seen as an application or extension of the rights of humans or, more commonly, the rights of nature. What this means is that animal rights are not always protected or even recognized in their own regard, but as stemming from some other reason, or worse, instrumentally as means to some other ends. This has two identifiable effects from a legal perspective: animal rights are not seen as inherently justified and are not seen as inherently valuable. Which in turn means that there can be no fundamental protection of animal rights. In other words, judicial protection does not always entail protection of animal ‘rights’ qua animal rights, which is needed for any meaningful protections to be afforded to animals. But the effects of this legal paradigm do not end at the legal status of animals. Because this status, in turn, affects how persons and the societies of which they form part see animals as a part of the rights of others, such as humans or nature, or as valuable only insofar as they further these rights, as opposed to as individuals with inherent worth and value deserving of protection regardless of their instrumental usefulness to these other objectives. This does nothing to truly de-objectify animals. Because even though most people would agree that animals are not objects, they continue to treat them as such wherever it serves them. For individuals and society to resolve, this inconsistency between stance and actions is for them to believe that animals are more than objects on a psychological and societal level. In this paper, we examine the implications of this perception of animals and their rights on the legal protections afforded to them and on the minds of individuals and civil society. We also argue that a change in the legal and societal status of animals can be brought about only through judicial, psychological, and sociological acknowledgment that animals have inherent value and deserve protection on this basis. Animal rights derived in such a way would not need to place reliance on other justifications and would not be subject to subjugation to other rights should a conflict arise.

Keywords: animal rights law, animal protection laws, psycho-socio-legal studies, animal rights, human rights, rights of nature

Procedia PDF Downloads 60
25559 Violent Conflict and the Protection of Women from Sex and Gender-Based Violence: A Third World Feminist Critique of the United Nations Women, Peace, and Security Agenda

Authors: Seember Susan Aondoakura

Abstract:

This paper examines the international legal framework established to address the challenges women and girls experience in situations of violent conflict. The United Nations (UN) women, peace, and security agenda (hereafter WPS agenda, the Agenda) aspire to make wars safer for women. It recognizes women's agency in armed conflict and their victimization and formulates measures for their protection. The Agenda also acknowledges women's participation in conflict transformation and post-conflict reconstruction. It also calls for the involvement of women in conflict transformation, encourages the protection of women from sex and gender-based violence (SGBV), and provides relief and recovery from conflict-related SGBV. Using Third World Critical Feminist Theory, this paper argues that the WPS agenda overly focus on the protection of women from SGBV occurring in the less developed and conflict-ridden states in the global south, obscures the complicity of western states and economies to the problem, and silences the privileges that such states derive from war economies that continue to fuel conflict. This protectionist approach of the UN also obliterates other equally pressing problems in need of attention, like the high rates of economic degradation in conflict-ravaged societies of the global south. Prioritising protection also 'others' the problem, obliterating any sense of interconnections across geographical locations and situating women in the less developed economies of the global south as the victims and their men as the perpetrators. Prioritising protection ultimately situates western societies as saviours of Third World women with no recourse to their role in engendering and sustaining war. The paper demonstrates that this saviour mentality obliterates chances of any meaningful coalition between the local and the international in framing and addressing the issue, as solutions are formulated from a specific lens—the white hegemonic lens.

Keywords: conflict, protection, security, SGBV

Procedia PDF Downloads 61
25558 A Light in the Road of Protection of Civilians: Responsibility to Protect

Authors: Zeynep Selin Acar

Abstract:

In the world of wars, it is aimed to find ways to protect civilians propound by political elites. Current threats may come from edges of the security concerns, meaning uncontrollable terrorist groups, unanticipated government-supported armed groups or separatists, and unimaginable merge of the previous with foreign supports or oppositions of which could flow into all groups– flaws of international state system. These threats resulted in transformation of inter-state system into a world system with distinctive actors and brought along the changes in strategic plans of political and military bodies, as well as adaptations of principles framing the strategies in terms of may-be-applicable international law constrained by ethical considerations. This paper aims to analyse the Responsibility to Protect (RtoP), being one of those, with its criteria aiming to regulate military interventions taking the protection of civilians both as the reason for intervention, jus ad bellum or right to war, and as the duties during the intervention, jus in bello or how to conduct the war. In addition it will discuss the rise of its bindingness in terms of Responsibility Not to Veto (RNtoV), Franco/Mexican Political Declaration opened in signature for UN member states on September 2015.

Keywords: civilian protection, protection as responsibility, responsibility to protect, responsibility not to veto

Procedia PDF Downloads 232
25557 Data Hiding by Vector Quantization in Color Image

Authors: Yung Gi Wu

Abstract:

With the growing of computer and network, digital data can be spread to anywhere in the world quickly. In addition, digital data can also be copied or tampered easily so that the security issue becomes an important topic in the protection of digital data. Digital watermark is a method to protect the ownership of digital data. Embedding the watermark will influence the quality certainly. In this paper, Vector Quantization (VQ) is used to embed the watermark into the image to fulfill the goal of data hiding. This kind of watermarking is invisible which means that the users will not conscious the existing of embedded watermark even though the embedded image has tiny difference compared to the original image. Meanwhile, VQ needs a lot of computation burden so that we adopt a fast VQ encoding scheme by partial distortion searching (PDS) and mean approximation scheme to speed up the data hiding process. The watermarks we hide to the image could be gray, bi-level and color images. Texts are also can be regarded as watermark to embed. In order to test the robustness of the system, we adopt Photoshop to fulfill sharpen, cropping and altering to check if the extracted watermark is still recognizable. Experimental results demonstrate that the proposed system can resist the above three kinds of tampering in general cases.

Keywords: data hiding, vector quantization, watermark, color image

Procedia PDF Downloads 331
25556 Acetalization of Carbonyl Compounds by Using Al2 (HPO4)3 under Green Condition Mg HPO4

Authors: Fariba Jafari, Samaneh Heydarian

Abstract:

Al2(HPO4)3 was easily prepared and used as a solid acid in acetalization of carbonyl compounds at room temperature and under solvent-free conditions. The protection was done in short reaction times and in good to high isolated yields. The cheapness and availability of this reagent with easy procedure and work-up make this method attractive for the organic synthesis.

Keywords: acetalization, acid catalysis, carbonylcompounds, green condition, protection

Procedia PDF Downloads 289
25555 The Implementation of Anti-Circumvention Legislations in Thai Copyright System

Authors: Chuencheewin Yimfuang

Abstract:

The WIPO copyright treaty (WCT) was established by the World Intellectual Property Organisation (WIPO). This agreement required the contracting nations to provide adequate protection to technological measures to prevent massive copyright infringement in the internet system. Thailand had to implement the anti-circumvention rules into domestic legislation to comply with this international obligation. The purpose of this paper is to critically discuss the legislative standard under the WCT. It also aims to examine the legal development of technological protection measures in Thailand and demonstrate that the scope of prohibitions under the copyright Act 2022 (NO.5) is similar to the Digital Millennium Copyright Act 1998 (DMCA) of the United States (US). It could be found that the anti-circumvention laws of Thailand prohibit the circumvention of access-control technologies, and the regulation on trafficking circumvention devices has been added to the latest version of the Thai Copyright Act. These legislative evolutions have revealed the attempt to reinforce the legal protection of technological measures and copyright holders in order to be in line with global practices. However, the amendment has problems concerning the legal definitions of effective technological measure and the prohibited act of circumvention. The vagueness might affect the scope of protection and the boundary of prohibition. With this aspect, the DMCA will be evaluated and compared to gain guidelines for interpretation and enforcement in Thailand. The lessons and experiences learned from this study might be useful to correct the flaws or at least clarify the ambiguities embodied in Thai copyright legislation.

Keywords: legal development, technological protection measure, circumvention, Thailand

Procedia PDF Downloads 57
25554 Broad Protection against Avian Influenza Virus by Using a Modified Vaccinia Ankara Virus Expressing a Mosaic Hemagglutinin

Authors: Attapon Kamlangdee, Brock Kingstad-Bakke, Tavis K. Anderson, Tony L. Goldberg, Jorge E. Osorio

Abstract:

A critical failure in our preparedness for an influenza pandemic is the lack of a universal vaccine. Influenza virus strains diverge by 1 to 2% per year, and commercially available vaccines often do not elicit protection from one year to the next, necessitating frequent formulation changes. This represents a major challenge to the development of a cross-protective vaccine that can protect against circulating viral antigenic diversity. We have constructed a recombinant modified vaccinia virus Ankara (MVA) that expresses an H5N1 mosaic hemagglutinin (H5M) (MVA-H5M). This mosaic was generated in silico using 2,145 field-sourced H5N1 isolates. A single dose of MVA-H5M provided 100% protection in mice against clade 0, 1, and 2 avian influenza viruses and also protected against seasonal H1N1 virus (A/Puerto Rico/8/34). It also provided short-term (10 days) and long-term (6 months) protection post vaccination. Both neutralizing antibodies and antigen-specific CD4+and CD8+ T cells were still detected at 5 months post vaccination, suggesting that MVA-H5M provides long-lasting immunity.

Keywords: modified vaccinia Ankara, MVA, H5N1, hemagglutinin, influenza vaccine

Procedia PDF Downloads 253
25553 Migration-Related Challenges during the Covid-19 Pandemic in South Africa. A Case of Alexandra Township

Authors: Edwin Mwasakidzeni Mutyenyoka

Abstract:

Without ignoring migration-related challenges in transit zones and places of origin, this inquiry focuses on arrived international immigrants’ exacerbated vulnerability during crises. The aim is to underline longstanding inequalities and demonstrate that crises merely amplify and exacerbate challenges that low-income migrants already face during ‘non-crises’ periods. Social protection, as an agenda for reducing vulnerability, poverty, and risk for low-income households, with regard to basic consumption and services, has been foregrounded in the post-apartheid development discourse in South Africa. Evidently, however, the state, through the South African Social Security Agency (SASSA), systemically excludes the majority of non-citizens from state-sponsored social assistance programs - often leaving them heavily dependent on sporadic non-state options and erosive coping mechanisms. In this paper, migration itself should not only be understood as a social protection strategy against poverty and risk but also as a source of vulnerability that often requires social protection. For quasi-ethnographic, it use one migrant destination, Alex Park Township, as a “contact zone” and space of negotiation during the pandemic.

Keywords: south-south migration, crises, social protection, Covid-19 pandemic

Procedia PDF Downloads 67
25552 Juridical Protection to Consumers in Electronic Contracts: Need of a Uniform International Law

Authors: Parul Sinha

Abstract:

Electronic commerce facilitates increased choice and information on goods or services for consumers but at the same time it compounds the inequality of bargaining power many consumers face when contracting with sellers. Due to the ‘inequality of bargaining power’ experienced by consumers when contracting by electronic means with business sellers in different jurisdictions, it may be difficult to determine where either the consumer is domiciled or the place where the seller is situated or conducts its business. The question arises in such situation that if one party wants to sue the other, then where can one sue? Which court has jurisdiction to try international conflicts arising from electronic contracts concluded through the internet? Will the same rules applicable to conventional contracts apply? Or should other considerations be taken into account? In all these situations the degree of consumer protection in electronic contracts comes into picture. In the light of the above, the paper discusses the jurisdiction and choice of law rules applied in EU and United States. Further, the paper considers the current uncertainty plaguing questions of jurisdiction in India. Therefore, the jurisdiction and choice of law rules for electronic contracts must be applied consistently and provide an automatic, harmonised rule in favour of the consumer’s jurisdiction and law. Lastly, the paper suggests the need for a uniform law in order to achieve effective juridical protection.

Keywords: electronic commerce, electronic contracts, jurisdiction, consumer protection

Procedia PDF Downloads 212
25551 Simulation of Hamming Coding and Decoding for Microcontroller Radiation Hardening

Authors: Rehab I. Abdul Rahman, Mazhar B. Tayel

Abstract:

This paper presents a method of hardening the 8051 microcontroller, that able to assure reliable operation in the presence of bit flips caused by radiation. Aiming at avoiding such faults in the 8051 microcontroller, Hamming code protection was used in its SRAM memory and registers. A VHDL code and its simulation have been used for this hamming code protection.

Keywords: radiation, hardening, bitflip, hamming

Procedia PDF Downloads 471
25550 Acid-Responsive Polymer Conjugates as a New Generation of Corrosion Protecting Materials

Authors: Naruphorn Dararatana, Farzad Seidi, Daniel Crespy

Abstract:

Protection of metals is a critical issue in industry. The annual cost of corrosion in the world is estimated to be about 2.5 trillion dollars and continuously increases. Therefore, there is a need for developing novel protection approaches to improve corrosion protection. We designed and synthesized smart polymer/corrosion inhibitor conjugates as new generations of corrosion protecting materials. Firstly, a polymerizable acrylate derivative of 8-hydroxyquinoline (8HQ), an effective corrosion inhibitor, containing acid-labile β-thiopropionate linkage was prepared in three steps. Then, it was copolymerized with ethyl acrylate in the presence of 1,1′-azobis(cyclohexanecarbonitrile) (ABCN) by radical polymerization. Nanoparticles with an average diameter of 140 nm were prepared from the polymer conjugate by the miniemulsion-solvent evaporation process. The release behavior of 8HQ from the the nanoparticles was studied in acidic (pH 3.5) and neutral media (pH 7.0). The release profile showed a faster release of 8HQ in acidic medium in comparison with neutral medium. Indeed 100% of 8HQ was released after 14 days in acidic medium whereas only around 15% of 8HQ was released during the same period at neutral pH. Therefore, the polymer conjugate nanoparticles are suitable materials as additives or to form coatings on metal substrates for corrosion protection.

Keywords: Corrosion inhibitor, 8-Hydroxyquinoline, Polymer conjugated, β-Thiopropionate

Procedia PDF Downloads 163
25549 An Evaluation of Air Pollutant Concentrations in Gyor, Hungary

Authors: Andrea Szabo Nagy, Zsofia Csanadi

Abstract:

The purpose of this study was to evaluate the concentration levels of common inorganic gases, benzene and particulate matter (PM₁₀ and PM₂.₅) in ambient air of Győr (Hungary) based on the latest published monitoring data. The concentrations of PM10-bound heavy metals (Pb, Cd, As and Ni) and some polycyclic aromatic hydrocarbons (PAHs) were also assessed. The levels of pollutants were compared with the Hungarian and EU limit or target values defined for health protection and the WHO air quality guidelines (AQGs) or estimated reference levels. Based on the Hungarian or the EU air quality standards and using the Hungarian Air Quality Index it was found that mainly an excellent (SO₂, CO, C₆H₆, heavy metals) or good (NO₂, O₃, PM₁₀, PM₂.₅, benzo(a)pyrene (BaP)) air quality was observed in the urban area of Győr for the year 2016. The annual mean pollutant concentrations (excluding BaP) were not exceeded or just reached the WHO AQGs or reference levels.

Keywords: aerosols, air pollutant, air quality, health protection

Procedia PDF Downloads 175
25548 Green Economy and Environmental Protection Economic Policy Challenges in Georgia

Authors: Gulnaz Erkomaishvili

Abstract:

Introduction. One of the most important issues of state economic policy in the 21st century is the problem of environmental protection. The Georgian government considers the green economy as one of the most important means of sustainable economic development and takes the initiative to implement voluntary measures to promote sustainable development. In this context, it is important to promote the development of ecosystem services, clean production, environmental education and green jobs.The development of the green economy significantly reduces the inefficient use of natural resources, waste generation, emissions into the atmosphere and the discharge of untreated water into bodies of water.It is, therefore, an important instrument in the environmental orientation of sustainable development. Objectives.The aim of the paper is to analyze the current status of the green economy in Georgia and identify effective ways to improve the environmental, economic policy of sustainable development. Methodologies: This paper uses general and specific methods, in particular, analysis, synthesis, induction, deduction, scientific abstraction, comparative and statistical methods, as well as experts’ evaluation. bibliographic research of scientific works and reports of organizations was conducted; Publications of the National Statistics Office of Georgia are used to determine the regularity between analytical and statistical estimations. Also, theoretical and applied research of international organizations and scientist-economists are used. Contributions: The country should implement such an economic policy that ensures the transition to a green economy, in particular, revising water, air and waste laws, strengthening existing environmental management tools and introcing new tools (including economic tools). Perfecting the regulatory legal framework of the environmental impact assessment system, which includes the harmonization of Georgian legislation with the requirements of the European Union. To ensure the protection and rational use of Georgia's forests, emphasis should be placed on sustainable forestry, protection and restoration of forests.

Keywords: green economy, environmental protection, environmental protection economic policy, environmental protection policy challanges

Procedia PDF Downloads 26
25547 Adaptive Envelope Protection Control for the below and above Rated Regions of Wind Turbines

Authors: Mustafa Sahin, İlkay Yavrucuk

Abstract:

This paper presents a wind turbine envelope protection control algorithm that protects Variable Speed Variable Pitch (VSVP) wind turbines from damage during operation throughout their below and above rated regions, i.e. from cut-in to cut-out wind speed. The proposed approach uses a neural network that can adapt to turbines and their operating points. An algorithm monitors instantaneous wind and turbine states, predicts a wind speed that would push the turbine to a pre-defined envelope limit and, when necessary, realizes an avoidance action. Simulations are realized using the MS Bladed Wind Turbine Simulation Model for the NREL 5 MW wind turbine equipped with baseline controllers. In all simulations, through the proposed algorithm, it is observed that the turbine operates safely within the allowable limit throughout the below and above rated regions. Two example cases, adaptations to turbine operating points for the below and above rated regions and protections are investigated in simulations to show the capability of the proposed envelope protection system (EPS) algorithm, which reduces excessive wind turbine loads and expectedly increases the turbine service life.

Keywords: adaptive envelope protection control, limit detection and avoidance, neural networks, ultimate load reduction, wind turbine power control

Procedia PDF Downloads 104
25546 Field Studies of 2017 in the Water Catch Basin in the River Vere to Safeguard the Population of Tbilisi against the Erosive-Mudflow Processes and Its Evaluation

Authors: Natia Gavardashvili

Abstract:

From April through June of 2017, the field-scientific studies to ensure the safety of the population of Tbilisi were accomplished in the water catch basin of the river Vere, in the water catch basin of the river Jakhana dry gully. 5 sensitive sites were identified, and areas, 20x20 m each, were marked around them, with their locations fixed with GPS coordinates. The gained areas were plotted on a digital map, and the state of the surface was explored by considering the evaluation of erosive processes. Aiming at evaluating the soils and grounds of the sensitive areas, the ground samples were taken, and average diameter was identified, with its value changing to D0 = 4,67-15,48 mm, and integral curves of the grain size were drafted. By using the obtained data, the transporting capability of mudflow can be identified at the next stage to use to calculate mudflow peak discharges of different provisions in developing the new designs of mudflow-protection structures with the goal of ensuring the safety of Tbilisi population. The studies were accomplished under the financing of Young Scientists’ Grant of Shota Rustaveli National Science Foundation 'The study of erosive-mudflow processes in the water catch basin in the river Vere to ensure the safety of the population of Tbilisi and their consideration in developing new environmental protection plans' (YS15_2.1.5_8)

Keywords: water catch basin, mudflow-protection structures, erosive-mudflow processes, safety

Procedia PDF Downloads 279
25545 Adopting the Community Health Workers Master List Registry for Community Health Workforce in Kenya

Authors: Gikunda Aloise, Mjema Saida, Barasa Herbert, Wanyungu John, Kimani Maureen

Abstract:

Background: Community Health Workforce (CHW) is health care providers at the community level (Level 1) and serves as a bridge between the community and the formal healthcare system. This human resource has enormous potential to extend healthcare services and ensures that the vulnerable, marginalized, and hard-to-reach populations have access to quality healthcare services at the community and primary health facility levels. However, these cadres are neither recognized, remunerated, nor in most instances, registered in a master list. Management and supervision of CHWs is not easy if their individual demographics, training capacity and incentives is not well documented through a centralized registry. Description: In February 2022, Amref supported the Kenya Ministry of Health in developing a community health workforce database called Community Health Workers Master List Registry (CHWML), which is hosted in Kenya Health Information System (KHIS) tracker. CHW registration exercise was through a sensitization meeting conducted by the County Community Health Focal Person for the Sub-County Community Health Focal Person and Community Health Assistants who uploaded information on individual demographics, training undertaken and incentives received by CHVs. Care was taken to ensure compliance with Kenyan laws on the availability and use of personal data as prescribed by the Data Protection Act, 2019 (DPA). Results and lessons learnt: By June 2022, 80,825 CHWs had been registered in the system; 78,174 (96%) CHVs and 2,636 (4%) CHAs. 25,235 (31%) are male, 55,505 (68%) are female & 85 (1%) are transgender. 39,979. (49%) had secondary education and 2500 (3%) had no formal education. Only 27 641 (34%) received a monthly stipend. 68,436 CHVs (85%) had undergone basic training. However, there is a need to validate the data to align with the current situation in the counties. Conclusions/Next steps: The use of CHWML will unlock opportunities for building more resilient and sustainable health systems and inform financial planning, resource allocation, capacity development, and quality service delivery. The MOH will update the CHWML guidelines in adherence to the data protection act which will inform standard procedures for maintaining, updating the registry and integrate Community Health Workforce registry with the HRH system.

Keywords: community health registry, community health volunteers (CHVs), community health workers masters list (CHWML), data protection act

Procedia PDF Downloads 87
25544 A Comparative Assessment of the FoodSupply Vulnerability to Large-Scale Disasters in OECD Countries

Authors: Karolin Bauer, Anna Brinkmann

Abstract:

Vulnerabilities in critical infrastructure can cause significant difficulties for the affected population during crises. Securing the food supply as part of the critical infrastructure in crisis situations is an essential part of public services and a ground stone for a successful concept of civil protection. In most industrialized countries, there are currently no comparative studies regarding the food supply of the population during crisis and disaster events. In order to mitigate the potential impact in case of major disasters in Germany, it is absolutely necessary to investigate how the food supply can be secured. The research project aims to provide in-depth research on the experiences gathered during past large-scale disasters in the 34 OECD member countries in order to discover alternatives for an updated civil protection system in Germany. The basic research question is: "Which international approaches and structures of civil protection have been proven and would be useful to modernize the German civil protection with regards to the critical infrastructure and food supply?" Research findings should be extracted from an extensive literature review covering the entire research period as well as from personal and online-based interviews with experts and responsible persons from involved institutions. The capability of the research project insists on the deliberate choice to investigate previous large-scale disasters to formulate important and practical approaches to modernize civil protection in Germany.

Keywords: food supply, vulnerabilty, critical infratstructure, large-scale disaster

Procedia PDF Downloads 310
25543 Protective Custody in Child Protection: Reflection of Residential Care Workers in the Philippines

Authors: Hazel S. Cometa-Lamberte

Abstract:

This paper presents the residential care workers reflections in working with children who were under protective custody and placed in a residential care facility for children. Key informant interviews and focus group discussion were employed in this study to analyze the views of residential care workers on the programs and services and case management system in residential care for children. Results suggest that working in a residential care facility for children needs the interplay of both the worker’s personal and professional values, knowledge and skills in working with children. Analyzing the residential care workers experiences in handling children in residential care facilities is vital for the improvement of the policies, programs and services, the repertoire of techniques and facilitate the creation of a new social work practice framework/model in child protection specifically in residential care facilities.

Keywords: child protection, residential care, residential care workers, social workers

Procedia PDF Downloads 136
25542 Improving Security in Healthcare Applications Using Federated Learning System With Blockchain Technology

Authors: Aofan Liu, Qianqian Tan, Burra Venkata Durga Kumar

Abstract:

Data security is of the utmost importance in the healthcare area, as sensitive patient information is constantly sent around and analyzed by many different parties. The use of federated learning, which enables data to be evaluated locally on devices rather than being transferred to a central server, has emerged as a potential solution for protecting the privacy of user information. To protect against data breaches and unauthorized access, federated learning alone might not be adequate. In this context, the application of blockchain technology could provide the system extra protection. This study proposes a distributed federated learning system that is built on blockchain technology in order to enhance security in healthcare. This makes it possible for a wide variety of healthcare providers to work together on data analysis without raising concerns about the confidentiality of the data. The technical aspects of the system, including as the design and implementation of distributed learning algorithms, consensus mechanisms, and smart contracts, are also investigated as part of this process. The technique that was offered is a workable alternative that addresses concerns about the safety of healthcare while also fostering collaborative research and the interchange of data.

Keywords: data privacy, distributed system, federated learning, machine learning

Procedia PDF Downloads 75
25541 A Review Paper on Data Security in Precision Agriculture Using Internet of Things

Authors: Tonderai Muchenje, Xolani Mkhwanazi

Abstract:

Precision agriculture uses a number of technologies, devices, protocols, and computing paradigms to optimize agricultural processes. Big data, artificial intelligence, cloud computing, and edge computing are all used to handle the huge amounts of data generated by precision agriculture. However, precision agriculture is still emerging and has a low level of security features. Furthermore, future solutions will demand data availability and accuracy as key points to help farmers, and security is important to build robust and efficient systems. Since precision agriculture comprises a wide variety and quantity of resources, security addresses issues such as compatibility, constrained resources, and massive data. Moreover, conventional protection schemes used in the traditional internet may not be useful for agricultural systems, creating extra demands and opportunities. Therefore, this paper aims at reviewing state of the art of precision agriculture security, particularly in open field agriculture, discussing its architecture, describing security issues, and presenting the major challenges and future directions.

Keywords: precision agriculture, security, IoT, EIDE

Procedia PDF Downloads 58
25540 Simple and Effective Method of Lubrication and Wear Protection

Authors: Buddha Ratna Shrestha, Jimmy Faivre, Xavier Banquy

Abstract:

By precisely controlling the molecular interactions between anti-wear macromolecules and bottle-brush lubricating molecules in the solution state, we obtained a fluid with excellent lubricating and wear protection capabilities. The reason for this synergistic behavior relies on the subtle interaction forces between the fluid components which allow the confined macromolecules to sustain high loads under shear without rupture. Our results provide rational guides to design such fluids for virtually any type of surfaces. The lowest friction coefficient and the maximum pressure that it can sustain is 5*10-3 and 2.5 MPa which is close to the physiological pressure. Lubricating and protecting surfaces against wear using liquid lubricants is a great technological challenge. Until now, wear protection was usually imparted by surface coatings involving complex chemical modifications of the surface while lubrication was provided by a lubricating fluid. Hence, we here research for a simple, effective and applicable solution to the above problem using surface force apparatus (SFA). SFA is a powerful technique with sub-angstrom resolution in distance and 10 nN/m resolution in interaction force while performing friction experiment. Thus, SFA is used to have the direct insight into interaction force, material and friction at interface. Also, we always know the exact contact area. From our experiments, we found that by precisely controlling the molecular interactions between anti-wear macromolecules and lubricating molecules, we obtained a fluid with excellent lubricating and wear protection capabilities. The reason for this synergistic behavior relies on the subtle interaction forces between the fluid components which allow the confined macromolecules to sustain high loads under shear without rupture. The lowest friction coefficient and the maximum pressure that it can sustain in our system is 5*10-3 and 2.5 GPA which is well above the physiological pressure. Our results provide rational guides to design such fluids for virtually any type of surfaces. Most importantly this process is simple, effective and applicable method of lubrication and protection as until now wear protection was usually imparted by surface coatings involving complex chemical modifications of the surface. Currently, the frictional data that are obtained while sliding the flat mica surfaces are compared and confirmed that a particular mixture of solution was found to surpass all other combination. So, further we would like to confirm that the lubricating and antiwear protection remains the same by performing the friction experiments in synthetic cartilages.

Keywords: bottle brush polymer, hyaluronic acid, lubrication, tribology

Procedia PDF Downloads 237
25539 The Judiciary as Pacemaker? Considering the Role of Courts in an Expansion of Protection for War Refugees and People Fleeing Natural Disasters

Authors: Charlotte Lülf

Abstract:

Migration flows, resulting from war, climate change or economic crisis cannot be tackled by single states but need to be addressed as a transnational and international responsibility. The traditional architecture surrounding the work of the UNHCR and the 1951 Convention, however, is not equipped to deal with these challenges. Widely excluded from legal protection are people not individually persecuted for the statutory criteria, people that flee from the indiscriminate effects of an armed conflict as well as people fleeing natural disasters. With the lack of explicit legal protection and the political reluctance of nation states worldwide to extend their commitment in new asylum laws, the judiciary must be put in focus: it plays a unique role in interpreting and potentially expanding the application of existing regulations. This paper as part of an ongoing Ph.D. Project deals with the current and partly contradicting approaches to the protection of war- and climate refugees. Changing jurisprudential practice of national and regional courts will be assessed, as will be their dialogue to interpret the international obligations of human rights law, migration laws, and asylum laws in an interacting world. In recent judgments refoulment to an armed conflict as well as countries without adequate disaster relief or health care was argued as violating fundamental human and asylum law rights and therefore prohibited – even for applicants without refugee status: The first step towards access to subsidiary protection could herewith be established. Can one observe similar developments in other parts of the world? This paper will evaluate the role of the judiciary to define, redefine and potentially expand protection for people seeking refuge from armed conflicts and natural disasters.

Keywords: human rights law, asylum-seekers, displacement, migration

Procedia PDF Downloads 249
25538 Multilevel Gray Scale Image Encryption through 2D Cellular Automata

Authors: Rupali Bhardwaj

Abstract:

Cryptography is the science of using mathematics to encrypt and decrypt data; the data are converted into some other gibberish form, and then the encrypted data are transmitted. The primary purpose of this paper is to provide two levels of security through a two-step process, rather than transmitted the message bits directly, first encrypted it using 2D cellular automata and then scrambled with Arnold Cat Map transformation; it provides an additional layer of protection and reduces the chance of the transmitted message being detected. A comparative analysis on effectiveness of scrambling technique is provided by scrambling degree measurement parameters i.e. Gray Difference Degree (GDD) and Correlation Coefficient.

Keywords: scrambling, cellular automata, Arnold cat map, game of life, gray difference degree, correlation coefficient

Procedia PDF Downloads 341
25537 Analysis of Silicon Controlled Rectifier-Based Electrostatic Discharge Protection Circuits with Electrical Characteristics for the 5V Power Clamp

Authors: Jun-Geol Park, Kyoung-Il Do, Min-Ju Kwon, Kyung-Hyun Park, Yong-Seo Koo

Abstract:

This paper analyzed the SCR (Silicon Controlled Rectifier)-based ESD (Electrostatic Discharge) protection circuits with the turn-on time characteristics. The structures are the LVTSCR (Low Voltage Triggered SCR), the ZTSCR (Zener Triggered SCR) and the PTSCR (P-Substrate Triggered SCR). The three structures are for the 5V power clamp. In general, the structures with the low trigger voltage structure can have the fast turn-on characteristics than other structures. All the ESD protection circuits have the low trigger voltage by using the N+ bridge region of LVTSCR, by using the zener diode structure of ZTSCR, by increasing the trigger current of PTSCR. The simulation for the comparison with the turn-on time was conducted by the Synopsys TCAD simulator. As the simulation results, the LVTSCR has the turn-on time of 2.8 ns, ZTSCR of 2.1 ns and the PTSCR of 2.4 ns. The HBM simulation results, however, show that the PTSCR is the more robust structure of 430K in HBM 8kV standard than 450K of LVTSCR and 495K of ZTSCR. Therefore the PTSCR is the most effective ESD protection circuit for the 5V power clamp.

Keywords: ESD, SCR, turn-on time, trigger voltage, power clamp

Procedia PDF Downloads 320