Search results for: environment protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10475

Search results for: environment protection

10325 The Impact of the General Data Protection Regulation on Human Resources Management in Schools

Authors: Alexandra Aslanidou

Abstract:

The General Data Protection Regulation (GDPR), concerning the protection of natural persons within the European Union with regard to the processing of personal data and on the free movement of such data, became applicable in the European Union (EU) on 25 May 2018 and transformed the way personal data were being treated under the Data Protection Directive (DPD) regime, generating sweeping organizational changes to both public sector and business. A social practice that is considerably influenced in the way of its day-to-day operations is Human Resource (HR) management, for which the importance of GDPR cannot be underestimated. That is because HR processes personal data coming in all shapes and sizes from many different systems and sources. The significance of the proper functioning of an HR department, specifically in human-centered, service-oriented environments such as the education field, is decisive due to the fact that HR operations in schools, conducted effectively, determine the quality of the provided services and consequently have a considerable impact on the success of the educational system. The purpose of this paper is to analyze the decisive role that GDPR plays in HR departments that operate in schools and in order to practically evaluate the aftermath of the Regulation during the first months of its applicability; a comparative use cases analysis in five highly dynamic schools, across three EU Member States, was attempted.

Keywords: general data protection regulation, human resource management, educational system

Procedia PDF Downloads 76
10324 A Hybrid Watermarking Model Based on Frequency of Occurrence

Authors: Hamza A. A. Al-Sewadi, Adnan H. M. Al-Helali, Samaa A. K. Khamis

Abstract:

Ownership proofs of multimedia such as text, image, audio or video files can be achieved by the burial of watermark is them. It is achieved by introducing modifications into these files that are imperceptible to the human senses but easily recoverable by a computer program. These modifications would be in the time domain or frequency domain or both. This paper presents a procedure for watermarking by mixing amplitude modulation with frequency transformation histogram; namely a specific value is used to modulate the intensity component Y of the YIQ components of the carrier image. This scheme is referred to as histogram embedding technique (HET). Results comparison with those of other techniques such as discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) have shown an enhance efficiency in terms of ease and performance. It has manifested a good degree of robustness against various environment effects such as resizing, rotation and different kinds of noise. This method would prove very useful technique for copyright protection and ownership judgment.

Keywords: authentication, copyright protection, information hiding, ownership, watermarking

Procedia PDF Downloads 541
10323 EIS Study of the Corrosion Behavior of an Organic Coating Applied on Algerian Oil Tanker in Sea Water

Authors: Nadia Hammouda, Kamel Belmokre

Abstract:

Organic coatings are widely employed in the corrosion protection of most metal surfaces, particularly steel. They provide a barrier against corrosive species present in the environment, due to their high resistance to oxygen, water and ions transport. This study focuses on the evaluation of corrosion protection performance of epoxy paint on the carbon steel surface in sea water by Electrochemical Impedance Spectroscopy (EIS). The electrochemical behavior of painted surface was estimated by EIS parameters that contained paint film resistance, paint film capacitance and double layer capacitance. On the basis of calculation using EIS spectrums it was observed that pore resistance (Rpore) decreased with the appearance of doubled layer capacitance (Cdl) due to the electrolyte penetration through the film. This was further confirmed by the decrease of diffusion resistance (Rd) which was also the indicator of the deterioration of paint film protectiveness.

Keywords: epoxy paints, carbon steel, electrochemical impedance spectroscopy, corrosion mechanisms, sea water

Procedia PDF Downloads 348
10322 Democracy Bytes: Interrogating the Exploitation of Data Democracy by Radical Terrorist Organizations

Authors: Nirmala Gopal, Sheetal Bhoola, Audecious Mugwagwa

Abstract:

This paper discusses the continued infringement and exploitation of data by non-state actors for destructive purposes, emphasizing radical terrorist organizations. It will discuss how terrorist organizations access and use data to foster their nefarious agendas. It further examines how cybersecurity, designed as a tool to curb data exploitation, is ineffective in raising global citizens' concerns about how their data can be kept safe and used for its acquired purpose. The study interrogates several policies and data protection instruments, such as the Data Protection Act, Cyber Security Policies, Protection of Personal Information(PPI) and General Data Protection Regulations (GDPR), to understand data use and storage in democratic states. The study outcomes point to the fact that international cybersecurity and cybercrime legislation, policies, and conventions have not curbed violations of data access and use by radical terrorist groups. The study recommends ways to enhance cybersecurity and reduce cyber risks using democratic principles.

Keywords: cybersecurity, data exploitation, terrorist organizations, data democracy

Procedia PDF Downloads 169
10321 Frequency of Occurrence Hybrid Watermarking Scheme

Authors: Hamza A. Ali, Adnan H. M. Al-Helali

Abstract:

Generally, a watermark is information that identifies the ownership of multimedia (text, image, audio or video files). It is achieved by introducing modifications into these files that are imperceptible to the human senses but easily recoverable by a computer program. These modifications are done according to a secret key in a descriptive model that would be either in the time domain or frequency domain or both. This paper presents a procedure for watermarking by mixing amplitude modulation with frequency transformation histogram; namely a specific value is used to modulate the intensity component Y of the YIQ components of the carrier image. This scheme is referred to as histogram embedding technique (HET). Results comparison with those of other techniques such as discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) have shown an enhance efficiency in terms of ease and performance. It has manifested a good degree of robustness against various environment effects such as resizing, rotation and different kinds of noise. This method would prove very useful technique for copyright protection and ownership judgment.

Keywords: watermarking, ownership, copyright protection, steganography, information hiding, authentication

Procedia PDF Downloads 346
10320 Using Game Engines in Lightning Shielding: The Application of the Rolling Spheres Method on Virtual As-Built Power Substations

Authors: Yuri A. Gruber, Matheus Rosendo, Ulisses G. A. Casemiro, Klaus de Geus, Rafael T. Bee

Abstract:

Lightning strikes can cause severe negative impacts to the electrical sector causing direct damage to equipment as well as shutdowns, especially when occurring in power substations. In order to mitigate this problem, a meticulous planning of the power substation protection system is of vital importance. A critical part of this is the distribution of shielding wires through the substation, which creates a 3D imaginary protection mesh similar to a circus tarpaulin. Equipment enclosed in the volume defined by that 3D mesh is considered protected against lightning strikes. The use of traditional methods of longitudinal cutting analysis based on 2D CAD tools makes the process laborious and the results obtained may not guarantee satisfactory protection of electrical equipment. This work describes the application of a Game Engine to the problem of lightning protection of power substations providing the visualization of the 3D protection mesh, the amount of protected components and the highlight of equipment which remain unprotected. In addition, aspects regarding the implementation and the advantages of approaching the problem using Unreal® Engine 4 are described. In order to validate results, a comparison with traditional 2D methods is applied to the same case study to which the proposed technique has been applied. Finally, a comparative study involving different levels of protection using the technique developed in this work is presented, showing that modern game engines can be a powerful accessory for simulations in several areas of engineering.

Keywords: game engine, rolling spheres method, substation protection, UE4, Unreal Engine 4

Procedia PDF Downloads 503
10319 Design and Analysis of Shielding Magnetic Field for Active Space Radiation Protection

Authors: Chaoyan Huang, Hongxia Zheng

Abstract:

For deep space exploration and long duration interplanetary manned missions, protection of astronauts from cosmic radiation is an unavoidable problem. However, passive shielding can be little effective for protecting particles which energies are greater than 1GeV/nucleon. In this study, active magnetic protection method is adopted. Taking into account the structure and size of the end-cap, eight shielding magnetic field configurations are designed based on the Hoffman configuration. The shielding effect of shielding magnetic field structure, intensity B and thickness L on H particles with 2GeV energy is compared by test particle simulation. The result shows that the shielding effect is better with the linear type magnetic field structure in the end-cap region. Furthermore, two magnetic field configurations with better shielding effect are investigated through H and He galactic cosmic spectra. And the shielding effect of the linear type configuration adopted in the barrel and end-cap regions is best.

Keywords: galactic cosmic rays, active protection, shielding magnetic field configuration, shielding effect

Procedia PDF Downloads 106
10318 The Redistributive Effects of Debtor Protection Laws

Authors: Hamid Boustanifar, Geraldo Cerqueiro, María Fabiana Penas

Abstract:

We exploit state-level changes in the amount of personal wealth individuals can protect under Chapter 7 to analyze the causal effect of debtor protection on income inequality. We find that an increase in state exemptions significantly increases inequality by reducing income for low-income individuals and by increasing income for high-income individuals. The increase in inequality is four times larger among the self-employed than among wage earners, and it is due mainly to a growing income gap between skilled (i.e., individuals with a college degree) and unskilled entrepreneurs. We also find that the employment rate of skilled entrepreneurs significantly increases, while the employment rate of unskilled wage earners falls. Our results are consistent with a recent literature that shows that higher exemptions redistribute credit from low-wealth to high-wealth entrepreneurs, affecting the performance of their businesses.

Keywords: debtor protection, credit markets, income inequality, debtor protection laws

Procedia PDF Downloads 408
10317 Investigation of Water Absorption and Compressive Strength of Resin Coated Mortar

Authors: Yasir Ali, Zain Ul Abdin, Muhammad Wisal Khattak

Abstract:

Nowadays various advanced techniques are used to enhance the performance of materials in the field of construction engineering. Structures exposed to an aggressive, humid and hostile environment are experiencing severe negative impacts which lead to premature failure. Polyester resin is one of the advanced material used for improving performance of structural materials especially for repair/ refurbish purpose of structures and protection from contaminated environmental effect/ hazards. This study investigated the aptness of the polyester resin as coating agent on the mortar and assessed its performance in an ambient environment of Pakistan. Cubical specimens of mortar were fabricated. These specimens were tested for water absorption and compressive strength after one day and sixty days. These tests were performed under different exposure conditions (ambient environment and submerged in water). The specimens were coated with one, two and three layers and results were compared to control (no/ zero resin layer) specimens. Test results indicated that there is a significant decrease in water absorption of mortar coated with resin when compared to controlled specimens. The compressive strength test results revealed that resin coated specimen had higher strength when compared to controlled specimens. The results suggested that resin is a promising material and can be used effectively in structures which are exposed to high temperatures. The study would be helpful in improving performance of the structural material in a hazardous environment.

Keywords: ambient environment, coating, mortar, polyester resin

Procedia PDF Downloads 336
10316 Emphasizing Sumak Kawsay in Peace Ethics

Authors: Lisa Tragbar

Abstract:

Since the Rio declaration, the agreement resulting from the Earth Summit in 1992, the UN member states acknowledge that peace and environmental protection are deeply linked to each other. It has also been made clear by Contemporary Peace research since the early 2000 that the lack of natural resources increases conflicts, as well as potential war conflicts (general environmental conflict thesis). I argue that peace ethics need to reconsider the role of the environment in peace ethics, from conflict prevention to peacebuilding. Sumak kawsay is a concept that offers a non-anthropocentric perspective on the subject. Several Contemporary Peace Ethicists don’t take environmental peace sufficiently into account. 1. The Peace theorist Johan Galtung famously argues that positive peace depends mostly on social, economic and political factors, as institutional structures establish peace. Galtung has a relational approach to peace, yet only between human interactors. 2. Michael Fox claims in his anti-war argument to consider nonhuman entities in conflicts. Because of their species interrelation, humans cannot decide on the fate of other species. 3. Although Mark Woods considers himself a peace ecologist, following Reichberg and Syse, and argues from a duty-based perspective towards nature, he mostly focuses on the protection of the environment during war conflicts. I want to focus on a non-anthropocentric view to argue that the environment is an entity of human concern in order to construct peace. Based on the premises that the lack of natural resources create tensions that play a significant part in international conflicts and these conflicts are potential war conflicts, I argue that a non-anthropocentric account to peace ethics is an indispensable perspective towards the recovery of these resources and therefore the reduction of war conflicts. Sumak kawsay is an approach contributing to a peaceful environment, which can play a crucial role in international peacekeeping operations. To emphasize sumak kawsay in peace ethics, it is necessary to explain what this principle includes and how it renews Contemporary Peace ethics. The indigenous philosophy of life of the Andean Quechua philosophy in Ecuador and varities from other countries from the Global South include a holistic real-world vision that contains concepts like the de-hierarchization of humans and nature as well as the reciprocity principle towards nature. Sumak kawsay represents the idea of the intrinsic value of nature and an egalitarian way of life and interconnectedness between human and nonhuman entities, which has been widely neglected in Traditional War and Peace Ethics. If sumak kawsay is transferred to peacekeeping practices, peacekeepers have restorative duties not only towards humans, but also towards nature. Resource conservation and environmental protection are the first step towards a positive peace. By recognising that healthy natural resources contribute to peacebuilding, by restoring balance through compensatory justice practices like recovery, by fostering dialogue between peacekeeping forces and by entitling ecosystems with rights natural resources and environmental conflicts are more unlikely to happen. This holistic approach pays nature sufficient attention and can contribute to a positive peace.

Keywords: environment, natural resources, peace, Sumak Kawsay

Procedia PDF Downloads 48
10315 Environmental Impact Assessment of Electromagnetic Fields Emitted from Mobile Base Station in Central Area of KSA

Authors: Mohammed Abdullah Alrajhi

Abstract:

The rapid growth in the number of mobile phone subscribers has resulted in an increased number of mobile base stations all over the world. Generally, mobile base stations are existing in huge numbers in populated areas than in non-populated ones to serve the largest number of users. The total number of mobile subscriptions in the Kingdom of Saudi Arabia reached around 50 million at the end of 2014, with a penetration rate of 165.1% according to the quarterly electronic newsletter issued by the Communications and Information Technology Commission. The current investigation was conducted primarily to measure the level of electromagnetic fields emitted from 400 mobile base stations for the purpose of environmental safety and radiation protection in light of national guidelines for public exposure as well as the International Commission on Non-Ionizing Radiation Protection (ICNIRP). The outcomes of this investigation provide valuable comments and recommendation for safety and protection of electromagnetic fields emitted from mobile base stations.

Keywords: electromagnetic fields, mobile, safety, protection, ICNIRP

Procedia PDF Downloads 382
10314 Children Protection in the Digital Space

Authors: Beverly Komen

Abstract:

Online crimes have been on the rise in the recent days, especially with the hit of the covid-19 pandemic. The coronavirus pandemic has led to an unprecedented rise in screen time, this means more families are relying on technology and digital solutions to keep children learning, spending more time on the virtual platforms can leave children vulnerable to online abuse and exploitation. With ease access of affordable phones, internet, and increased online activities, all children are at risk of being abused online hence making the digital space unsafe for children. With these increased use of technology and its accessibility, children are at risk of facing challenges such as access to inappropriate content, online grooming, identity theft, cyber bullying, among other risks. The big question is; as we enjoy the benefits brought in by technology, how do we ensure that our children are save in this digital space? With the analysis of the current trends, there is a gap in knowledge on people’s understanding on child online protection and safety measures when using the digital space. A survey conducted among 50 parents in Nairobi in Kenya indicated that there is a gap in knowledge on online protection of children and over 50 % of the participants shared that for sure they have no idea on how to protect children online. This paper seeks to address the concept of child protection in the digital space and come up with viable solutions in protecting children from online vices.

Keywords: child protection, digital space, online risks, online grooming, cyber bulying, online child sexual exploitation, and abuse

Procedia PDF Downloads 156
10313 The Effect of General Data Protection Regulation on South Asian Data Protection Laws

Authors: Sumedha Ganjoo, Santosh Goswami

Abstract:

The rising reliance on technology places national security at the forefront of 21st-century issues. It complicates the efforts of emerging and developed countries to combat cyber threats and increases the inherent risk factors connected with technology. The inability to preserve data securely might have devastating repercussions on a massive scale. Consequently, it is vital to establish national, regional, and global data protection rules and regulations that penalise individuals who participate in immoral technology usage and exploit the inherent vulnerabilities of technology. This study paper seeks to analyse GDPR-inspired Bills in the South Asian Region and determine their suitability for the development of a worldwide data protection framework, considering that Asian countries are much more diversified than European ones. In light of this context, the objectives of this paper are to identify GDPR-inspired Bills in the South Asian Region, identify their similarities and differences, as well as the obstacles to developing a regional-level data protection mechanism, thereby satisfying the need to develop a global-level mechanism. Due to the qualitative character of this study, the researcher did a comprehensive literature review of prior research papers, journal articles, survey reports, and government publications on the aforementioned topics. Taking into consideration the survey results, the researcher conducted a critical analysis of the significant parameters highlighted in the literature study. Many nations in the South Asian area are in the process of revising their present data protection measures in accordance with GDPR, according to the primary results of this study. Consideration is given to the data protection laws of Thailand, Malaysia, China, and Japan. Significant parallels and differences in comparison to GDPR have been discussed in detail. The conclusion of the research analyses the development of various data protection legislation regimes in South Asia.

Keywords: data privacy, GDPR, Asia, data protection laws

Procedia PDF Downloads 52
10312 Active Cyber Defense within the Concept of NATO’s Protection of Critical Infrastructures

Authors: Serkan Yağlı, Selçuk Dal

Abstract:

Cyber-attacks pose a serious threat to all states. Therefore, states constantly seek for various methods to encounter those threats. In addition, recent changes in the nature of cyber-attacks and their more complicated methods have created a new concept: active cyber defence (ACD). This article tries to answer firstly why ACD is important to NATO and find out the viewpoint of NATO towards ACD. Secondly, infrastructure protection is essential to cyber defence. Critical infrastructure protection with ACD means is even more important. It is assumed that by implementing active cyber defence, NATO may not only be able to repel the attacks but also be deterrent. Hence, the use of ACD has a direct positive effect in all international organizations’ future including NATO.

Keywords: active cyber defence, advanced persistent treat, critical infrastructure, NATO

Procedia PDF Downloads 215
10311 Transformer Life Enhancement Using Dynamic Switching of Second Harmonic Feature in IEDs

Authors: K. N. Dinesh Babu, P. K. Gargava

Abstract:

Energization of a transformer results in sudden flow of current which is an effect of core magnetization. This current will be dominated by the presence of second harmonic, which in turn is used to segregate fault and inrush current, thus guaranteeing proper operation of the relay. This additional security in the relay sometimes obstructs or delays differential protection in a specific scenario, when the 2nd harmonic content was present during a genuine fault. This kind of scenario can result in isolation of the transformer by Buchholz and pressure release valve (PRV) protection, which is acted when fault creates more damage in transformer. Such delays involve a huge impact on the insulation failure, and chances of repairing or rectifying fault of problem at site become very dismal. Sometimes this delay can cause fire in the transformer, and this situation becomes havoc for a sub-station. Such occurrences have been observed in field also when differential relay operation was delayed by 10-15 ms by second harmonic blocking in some specific conditions. These incidences have led to the need for an alternative solution to eradicate such unwarranted delay in operation in future. Modern numerical relay, called as intelligent electronic device (IED), is embedded with advanced protection features which permit higher flexibility and better provisions for tuning of protection logic and settings. Such flexibility in transformer protection IEDs, enables incorporation of alternative methods such as dynamic switching of second harmonic feature for blocking the differential protection with additional security. The analysis and precautionary measures carried out in this case, have been simulated and discussed in this paper to ensure that similar solutions can be adopted to inhibit analogous issues in future.

Keywords: differential protection, intelligent electronic device (IED), 2nd harmonic inhibit, inrush inhibit

Procedia PDF Downloads 262
10310 Hybrid Energy Harvesting System with Energy Storage Management

Authors: Lucian Pîslaru-Dănescu, George-Claudiu Zărnescu, Laurențiu Constantin Lipan, Rareș-Andrei Chihaia

Abstract:

In recent years, the utilization of supercapacitors for energy storage (ES) devices that are designed for energy harvesting (EH) applications has increased substantially. The use of supercapacitors as energy storage devices in hybrid energy harvesting systems allows the miniaturization of electronic structures for energy storage. This study is concerned with the concept of energy management capacitors – supercapacitors and the new electronic structures for energy storage used for energy harvesting devices. Supercapacitors are low-voltage devices, and electronic overvoltage protection is needed for powering the source. The power management device that uses these proposed new electronic structures for energy storage is better than conventional electronic structures used for this purpose, like rechargeable batteries, supercapacitors, and hybrid systems. A hybrid energy harvesting system with energy storage management is able to simultaneously use several energy sources with recovery from the environment. The power management device uses a summing electronic block to combine the electric power obtained from piezoelectric composite plates and from a photovoltaic conversion system. Also, an overvoltage protection circuit used as a voltage detector and an improved concept of charging supercapacitors is presented. The piezoelectric composite plates are realized only by pressing two printed circuit boards together without damaging or prestressing the piezoceramic elements. The photovoltaic conversion system has the advantage that the modules are covered with glass plates with nanostructured film of ZnO with the role of anti-reflective coating and to improve the overall efficiency of the solar panels.

Keywords: supercapacitors, energy storage, electronic overvoltage protection, energy harvesting

Procedia PDF Downloads 37
10309 The Control System Architecture of Space Environment Simulator

Authors: Zhan Haiyang, Gu Miao

Abstract:

This article mainly introduces the control system architecture of space environment simulator, simultaneously also briefly introduce the automation control technology of industrial process and the measurement technology of vacuum and cold black environment. According to the volume of chamber, the space environment simulator is divided into three types of small, medium and large. According to the classification and application of space environment simulator, the control system is divided into the control system of small, medium, large space environment simulator and the centralized control system of multiple space environment simulators.

Keywords: space environment simulator, control system, architecture, automation control technology

Procedia PDF Downloads 444
10308 The Consequences of Complaint Offenses against Copyright Protection

Authors: Chryssantus Kastowo, Theresia Anita Christiani, Anny Retnowati

Abstract:

Copyright infringement as a form of infringement does not always mean causing harm to the creator. This can be proven with so many copyright violations in society and there is no significant law enforcement effort when compared with the violations that occurred. Copyright law as a form of appreciation from the state to the creator becomes counter productive if there is omission of violations. The problem raised in this article is how is the model of copyright regulation in accordance with the purpose of the law of copyright protection. This article is based on normative legal research focusing on secondary data. The analysis used is a conceptual approach. The analysis shows that the regulation of copyright emphasizes as a subjective right that is wholly within the author's power. This perspective will affect the claim of rights by the creator or allow violations. The creator is obliged to maintain the overall performance of copyright protection, especially in the event of a violation.

Keywords: copyright, enforcement, law, violation

Procedia PDF Downloads 109
10307 Luminescence Dating of Ancient Agricultural Terraced Landscapes: Prospects for Heritage Protection

Authors: Lisa Snape, Andreas Lang, Tony Brown, Dan Fallu, Ben Pears

Abstract:

Agricultural terraced landscapes are widespread in mountainous areas in a variety of climatic zones around the World. The most famous are those found associated with the famous Inca site of Machu Pichu in the Andes, the arid lands in upland areas of Yemen, and the abundant rice terraces covering the hilltops in tropical areas such as Thailand, Vietnam, and China and also Bali. Terraces were designed using advanced engineered techniques, requiring specialist knowledge of bedrock geology, soil cultivation and maintenance, and ecosystem management to grow a variety of crops in specific environmental conditions. These enigmatic landscapes were often overlooked in the past but have now received widespread attention to further understand their age, origins, and evolution as the landscapes and environment changed over time. By understanding the age and chronologies of agricultural terrace technology, we can enhance our understanding of these unique features considered widely as important ecosystem services in the present day. We present distinct luminescence dating evidence from a variety of terraced systems found in different European environmental settings, such as the UK, Italy and Belgium, as part of the wider ERC-funded TerrACE Project. Our research aims to better understand their history and advocate for their protection and effective management as important cultural, heritage and environmental assets, creating new avenues for future scientific research.

Keywords: terraces, agriculture, luminescence dating, heritage protection

Procedia PDF Downloads 16
10306 Professionals’ Learning from Casework in Child Protection: The View from Within

Authors: Jude Harrison

Abstract:

Child protection is a complex and sensitive practice. The core responsibility is the care and protection of children and young people who have been subject to or who are at risk from abuse and neglect. The work involves investigating allegations of harm, preparing for and making representations to the legal system, and case planning and management across a continuum of complicated care interventions. Professionals’ learning for child protection practice is evident in a range of literature investigating multiple learning processes such as university preparation, student placements, professional supervision, training, and other post-qualifying professional development experiences at work. There is, however, very limited research into how caseworkers learn in and through their daily practice. Little is known, therefore, about how learning at work unfolds for caseworkers, the dimensions in which it can be understood or the ways in which it can be best facilitated and supported. Compounding this, much of the current child protection learning literature reflects an orthodox conception of learning as mentalistic and individualised, in which knowledge is typically understood as abstract theory or as technical skill or competency. This presentation outlines key findings from a PhD research study that explored learning at work for statutory child protection caseworkers from an alternative interpretation of learning using a practice theory approach. Practice theory offers an interpretation of learning as performative and grounded in situated experience. The findings of the study show that casework practice is both a mode and site of learning. The study was ethnographic in design based and followed 17 child protection caseworkers via in-depth interviews, observations and participant reflective journaling. Inductive and abductive analysis was used to organise and interpret the data and expand analysis, leading to themes. Key findings show learning to be a sociomaterial property of doing; the social ontological character of learning; and teleoaffectivity as a feature of learning. The findings contribute to theoretical and practical understandings of learning and practice in child protection, child welfare and the professional learning literature more broadly. The findings have potential to contribute to policy directions at state, territory and national levels to enhance child protection practice and systems.

Keywords: adiult learning, workplace learning, child welfare, sociomaterial, practice theory

Procedia PDF Downloads 26
10305 An Attenuated Quadruple Gene Mutant of Mycobacterium tuberculosis Imparts Protection against Tuberculosis in Guinea Pigs

Authors: Shubhita Mathur, Ritika Kar Bahal, Priyanka Chauhan, Anil K. Tyagi

Abstract:

Mycobacterium tuberculosis, the causative agent of human tuberculosis, is a major cause of mortality. Bacillus Calmette-Guérin (BCG), the only licensed vaccine available for protection against tuberculosis confers highly variable protection ranging from 0%-80%. Thus, novel vaccine strains need to be evaluated for their potential as a vaccine against tuberculosis. We had previously constructed a triple gene mutant of M. tuberculosis (MtbΔmms), having deletions in genes encoding for phosphatases mptpA, mptpB, and sapM that are involved in host-pathogen interaction. Though vaccination with Mtb∆mms strain induced protection in the lungs of guinea pigs, the mutant strain was not able to control the hematogenous spread of the challenge strain to the spleens. Additionally, inoculation with Mtb∆mms resulted in some pathological damage to the spleens in the early phase of infection. In order to overcome the pathology caused by MtbΔmms in the spleens of guinea pigs and also to control the dissemination of the challenge strain, MtbΔmms was genetically modified by disrupting bioA gene to generate MtbΔmmsb strain. Further, in vivo attenuation of MtbΔmmsb was evaluated, and its protective efficacy was assessed against virulent M. tuberculosis challenge in guinea pigs. Our study demonstrates that Mtb∆mmsb mutant was highly attenuated for growth and virulence in guinea pigs. Vaccination with Mtb∆mmsb mutant generated significant protection in comparison to sham-immunized animals at 4 and 12 weeks post-infection in lungs and spleens of the infected animals. Our findings provide evidence that deletion of genes involved in signal transduction and biotin biosynthesis severely attenuates the pathogen and the single immunization with the auxotroph was able to provide significant protection as compared to sham-immunized animals. The protection imparted by Mtb∆mmsb fell short in comparison to the protection observed in BCG-immunized animals. This study nevertheless indicates the importance of attenuated multiple gene deletion mutants of M. tuberculosis in generating protection against tuberculosis.

Keywords: Mycobacterium tuberculosis, BCG, MtbΔmmsb, bioA, guinea pigs

Procedia PDF Downloads 102
10304 Control Mechanisms for Sprayer Used in Turkey

Authors: Huseyin Duran, Yesim Benal Oztekin, Kazim Kubilay Vursavus, Ilker Huseyin Celen

Abstract:

There are two main approaches to manufacturing, market and usage of plant protection machinery in Turkey. The first approach is called as ‘Product Safety Approach’ and could be summarized as minimum health and safety requirements of consumer needs on plant protection equipment and machinery products. The second approach is the practices related to the Plant Protection Equipment and Machinery Directive. Product safety approach covers the plant protection machinery product groups within the framework of a new approach directive, Machinery Safety Directive (2006/42 / AT). The new directive is in practice in our country by 03.03.2009, parallel to the revision of the EU Regulation on the Directive (03.03.2009 dated and numbered 27158 published in the Official Gazette). ‘Pesticide Application for Machines’ paragraph is added to the 2006/42 / EC Machinery Safety Directive, which is, in particular, reveals the importance of primary health care and product safety issue, explaining the safety requirements for machines used in the application of plant protection products. The Ministry of Science, Industry and Technology is the authorized organizations in our country for the publication and implementation of this regulation. There is a special regulation, carried out by Ministry of Food, Agriculture and Livestock General Directorate of Food and Control, on the manufacture and sale of plant protection machinery. This regulation, prepared based on 5996 Veterinary Services, Plant Health, Food and Feed Law, is ‘Regulation on Plant Protection Equipment and Machinery’ (published on 02.04.2011 whit number 27893 in the Official Gazette). The purposes of this regulation are practicing healthy and reliable crop production, the preparation, implementation and dissemination of the integrated pest management programs and projects for the development of human health and environmentally friendly pest control methods. This second regulation covers: approval, manufacturing, licensing of Plant Protection Equipment and Machinery; duties and responsibilities of the dealers; principles and procedures related to supply and control of the market. There are no inspection procedures for the application of currently used plant protection machinery in Turkey. In this study, content and application principles of all regulation approaches currently used in Turkey are summarized.

Keywords: plant protection equipment and machinery, product safety, market surveillance, inspection procedures

Procedia PDF Downloads 236
10303 Effect of Repellent Coatings, Aerosol Protective Liners, and Lamination on the Properties of Chemical/Biological Protective Textiles

Authors: Natalie Pomerantz, Nicholas Dugan, Molly Richards, Walter Zukas

Abstract:

The primary research question to be answered for Chemical/Biological (CB) protective clothing, is how to protect wearers from a range of chemical and biological threats in liquid, vapor, and aerosol form, while reducing the thermal burden. Currently, CB protective garments are hot, heavy, and wearers are limited by short work times in order to prevent heat injury. This study demonstrates how to incorporate different levels of protection on a material level and modify fabric composites such that the thermal burden is reduced to such an extent it approaches that of a standard duty uniform with no CB protection. CB protective materials are usually comprised of several fabric layers: a cover fabric with a liquid repellent coating, a protective layer which is comprised of a carbon-based sorptive material or semi-permeable membrane, and a comfort next-to-skin liner. In order to reduce thermal burden, all of these layers were laminated together to form one fabric composite which had no insulative air gap in between layers. However, the elimination of the air gap also reduced the CB protection of the fabric composite. In order to increase protection in the laminated composite, different nonwoven aerosol protective liners were added, and a super repellent coating was applied to the cover fabric, prior to lamination. Different adhesive patterns were investigated to determine the durability of the laminate with the super repellent coating, and the effect on air permeation. After evaluating the thermal properties, textile properties and protective properties of the iterations of these fabric composites, it was found that the thermal burden of these materials was greatly reduced by decreasing the thermal resistance with the elimination of the air gap between layers. While the level of protection was reduced in laminate composites, the addition of a super repellent coating increased protection towards low volatility agents without impacting thermal burden. Similarly, the addition of aerosol protective liner increased protection without reducing water vapor transport, depending on the nonwoven used, however, the air permeability was significantly decreased. The balance of all these properties and exploration of the trade space between thermal burden and protection will be discussed.

Keywords: aerosol protection, CBRNe protection, lamination, nonwovens, repellent coatings, thermal burden

Procedia PDF Downloads 330
10302 Volunteers’ Preparedness for Natural Disasters and EVANDE Project

Authors: A. Kourou, A. Ioakeimidou, E. Bafa, C. Fassoulas, M. Panoutsopoulou

Abstract:

The role of volunteers in disaster management is of decisive importance and the need of their involvement is well recognized, both for prevention measures and for disaster management. During major catastrophes, whereas professional personnel are outsourced, the role of volunteers is crucial. In Greece experience has shown that various groups operating in the civil protection mechanism like local administration staff or volunteers, in many cases do not have the necessary knowledge and information on best practices to act against natural disasters. One of the major problems is the lack of volunteers’ education and training. In the above given framework, this paper presents the results of a survey aimed to identify the level of education and preparedness of civil protection volunteers in Greece. Furthermore, the implementation of earthquake protection measures at individual, family and working level, are explored. More specifically, the survey questionnaire investigates issues regarding pre-earthquake protection actions, appropriate attitudes and behaviors during an earthquake and existence of contingency plans in the workplace. The questionnaires were administered to citizens from different regions of the country and who attend the civil protection training program: “Protect Myself and Others”. A closed-form questionnaire was developed for the survey, which contained questions regarding the following: a) knowledge of self-protective actions; b) existence of emergency planning at home; c) existence of emergency planning at workplace (hazard mitigation actions, evacuation plan, and performance of drills); and, d) respondents` perception about their level of earthquake preparedness. The results revealed a serious lack of knowledge and preparedness among respondents. Taking into consideration the aforementioned gap and in order to raise awareness and improve preparedness and effective response of volunteers acting in civil protection, the EVANDE project was submitted and approved by the European Commission (EC). The aim of that project is to educate and train civil protection volunteers on the most serious natural disasters, such as forest fires, floods, and earthquakes, and thus, increase their performance.

Keywords: civil protection, earthquake, preparedness, volunteers

Procedia PDF Downloads 200
10301 Realistic Testing Procedure of Power Swing Blocking Function in Distance Relay

Authors: Farzad Razavi, Behrooz Taheri, Mohammad Parpaei, Mehdi Mohammadi Ghalesefidi, Siamak Zarei

Abstract:

As one of the major problems in protecting large-dimension power systems, power swing and its effect on distance have caused a lot of damages to energy transfer systems in many parts of the world. Therefore, power swing has gained attentions of many researchers, which has led to invention of different methods for power swing detection. Power swing detection algorithm is highly important in distance relay, but protection relays should have general requirements such as correct fault detection, response rate, and minimization of disturbances in a power system. To ensure meeting the requirements, protection relays need different tests during development, setup, maintenance, configuration, and troubleshooting steps. This paper covers power swing scheme of the modern numerical relay protection, 7sa522 to address the effect of the different fault types on the function of the power swing blocking. In this study, it was shown that the different fault types during power swing cause different time for unblocking distance relay.

Keywords: power swing, distance relay, power system protection, relay test, transient in power system

Procedia PDF Downloads 342
10300 Analysis of Ancient and Present Lightning Protection Systems of Large Heritage Stupas in Sri Lanka

Authors: J.R.S.S. Kumara, M.A.R.M. Fernando, S.Venkatesh, D.K. Jayaratne

Abstract:

Protection of heritage monuments against lightning has become extremely important as far as their historical values are concerned. When such structures are large and tall, the risk of lightning initiated from both cloud and ground can be high. This paper presents a lightning risk analysis of three giant stupas in Anuradhapura era (fourth century BC onwards) in Sri Lanka. The three stupas are Jethawaaramaya (269-296 AD), Abayagiriya (88-76 BC) and Ruwanweliseya (161-137 BC), the third, fifth and seventh largest ancient structures in the world. These stupas are solid brick structures consisting of a base, a near hemispherical dome and a conical spire on the top. The ancient stupas constructed with a dielectric crystal on the top and connected to the ground through a conducting material, was considered as the hypothesis for their original lightning protection technique. However, at present, all three stupas are protected with Franklin rod type air termination systems located on top of the spire. First, a risk analysis was carried out according to IEC 62305 by considering the isokeraunic level of the area and the height of the stupas. Then the standard protective angle method and rolling sphere method were used to locate the possible touching points on the surface of the stupas. The study was extended to estimate the critical current which could strike on the unprotected areas of the stupas. The equations proposed by (Uman 2001) and (Cooray2007) were used to find the striking distances. A modified version of rolling sphere method was also applied to see the effects of upward leaders. All these studies were carried out for two scenarios: with original (i.e. ancient) lightning protection system and with present (i.e. new) air termination system. The field distribution on the surface of the stupa in the presence of a downward leader was obtained using finite element based commercial software COMSOL Multiphysics for further investigations of lightning risks. The obtained results were analyzed and compared each other to evaluate the performance of ancient and new lightning protection methods and identify suitable methods to design lightning protection systems for stupas. According to IEC standards, all three stupas with new and ancient lightning protection system has Level IV protection as per protection angle method. However according to rolling sphere method applied with Uman’s equation protection level is III. The same method applied with Cooray’s equation always shows a high risk with respect to Uman’s equation. It was found that there is a risk of lightning strikes on the dome and square chamber of the stupa, and the corresponding critical current values were different with respect to the equations used in the rolling sphere method and modified rolling sphere method.

Keywords: Stupa, heritage, lightning protection, rolling sphere method, protection level

Procedia PDF Downloads 208
10299 A Novel Solution to Restricted Earth Fault Low Impedance Relay Mal Operation

Authors: K. N. Dinesh Babu, R. Ramaprabha, V. Rajini, V. Nagarajan

Abstract:

In this paper, the various methods of providing restricted earth fault protection are discussed. The proper operation of high and low impedance restricted earth fault (REF) protection for various applications has been discussed. The mal operation of a relay due to improper placement of CTs has been identified and a simple/unique solution has been proposed in this work with a case study. Moreover, it is found that the proper placement of CT in high impedance method will provide the same result with reduced CT. This methododlocy has been successfully implemented in Al Takreer refinery for a 2000 KVA transformer. The outcome of the paper may be included in IEEEC37.91 standard to give the proper guidance for protection engineers to sort out the problems related to mal functioning of REF relays.

Keywords: relay mal operation, transformer, low impedance REF, MATLAB, 64R, IEEE C37.91

Procedia PDF Downloads 507
10298 Cultural Self-Efficacy of Child Protection Social Workers in Norway: Barriers and Opportunities in Working with Migrant Families

Authors: Justyna Mroczkowska

Abstract:

Social worker's ability to provide culturally sensitive assistance in child protection is taken for granted; given limited training opportunities and lack of clear guidance, practitioners report working with migrant families more demanding in comparison to working with native families. In this study, the author developed and factor analyzed the Norwegian Cultural Self-Efficacy Scale to describe the level of cultural capability among Norwegian child protection professionals. The study aimed to determine the main influencing factors to cultural efficacy and examine the relationship between self-efficacy and perceived difficulty in working with migrant families. The scale was administered to child protection workers in Norway (N=251), and the reliability of the scale measured by Cronbach's alpha coefficient was .904. The confirmatory factor analysis of social work cultural self-efficacy found support for four separate but correlated subscales: Assessment, Communication, Support Request, and Teamwork. Regression analyses found the experience in working with migrant families, training and support from external agencies, and colleague support to be significant predictors of cultural self-efficacy. Self-efficacy in assessment skills and self-efficacy in communication skills were moderately related to the perceived difficulty to work with migrant families. The findings conclude with previous research and highlight the need for both professional development programs and institutional resources to be provided to support the practitioner's preparation for multicultural practice in child protection.

Keywords: child protection, cultural self-efficacy, cultural competency, migration, resources

Procedia PDF Downloads 107
10297 Effects of Flame Retardant Nano Bio-Filler on the Fire Behaviour of Thin Film Intumescent Coatings

Authors: Ming Chian Yew, Ming Kun Yew, Lip Huat Saw, Tan Ching Ng, Rajkumar Durairaj, Jing Han Beh

Abstract:

This paper analyzes the fire protection performance, char formation and heat release characteristics of the thin film intumescent coatings that incorporate waste eggshell (ES) as a nano bio-filler. In this study, the Bunsen burner and the fire propagation (BS 476: Part 6) tests of coatings were measured. Experiments on the samples were also tested to evaluate their fire behavior using a cone calorimeter according to ISO 5660-1 specifications. On exposure, the samples B, C and D had been certified to be Class 0 due to the fire propagation indexes of the samples were less than 12. Samples B and D showed a significant reduction in total heat rate (B=11.6 MJ/m² and D=12.0 MJ/m²) and uniform char structures with the addition of 3.30 wt.% and 2.75 wt.% ES nano bio-filler, respectively. As a result, ES nano bio-filler composition good to slow down the fire expanding and demonstrate better fire protection due to its positive synergistic effect with flame retardant ingredients on physical and chemical reactions in fire protection.

Keywords: cone calorimeter, eggshell, fire protection, heat release rate, intumescent coating

Procedia PDF Downloads 248
10296 Assessment the Influence of Bitumen Emulsion PAHs Content in Arid Land

Authors: Jalil Badamfirooz

Abstract:

Soil wind erosion has a negative impact on the environment. Mulching is one of the most efficient soil protection techniques. Bitumen emulsion has recently been utilized as a soil cover that is sprayed directly over the soil and forms a thin film. The thin coating of bitumen emulsion prevents soil erosion and keeps moisture in the soil. Besides, some compounds release into the soil and cause environmental problems. In the present study, the effect of bitumen emulsion on the release of polycyclic aromatic hydrocarbons (PAHs) into the soil is studied in an arid land located in the central part of Iran. The soil was Loamy-Sand and saline with a pH of 8.03. Bitumen emulsion was used in this study as mulch at a rate of 4 L m2. The effect of this mulch on soil properties was investigated after 6 months of mulch application. Then PAHs concentrations were determined in samples collected from different depths in bitumen emulsion sprayed and control soils. In general, bitumen emulsion application on soil led to a significant increase in some PAHs, which was higher than soil pollution standards critical level of pollution for commerce, groundwater protection, pasture forest, and park and residence uses.

Keywords: mulch, bitumen emulsion, arid land, PAH

Procedia PDF Downloads 54