Search results for: protection level
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14243

Search results for: protection level

14153 Modeling of Power Network by ATP-Draw for Lightning Stroke Studies

Authors: John Morales, Armando Guzman

Abstract:

Protection relay algorithms play a crucial role in Electric Power System stability, where, it is clear that lightning strokes produce the mayor percentage of faults and outages of Transmission Lines (TLs) and Distribution Feeders (DFs). In this context, it is imperative to develop novel protection relay algorithms. However, in order to get this aim, Electric Power Systems (EPS) network have to be simulated as real as possible, especially the lightning phenomena, and EPS elements that affect their behavior like direct and indirect lightning, insulator string, overhead line, soil ionization and other. However, researchers have proposed new protection relay algorithms considering common faults, which are not produced by lightning strokes, omitting these imperative phenomena for the transmission line protection relays behavior. Based on the above said, this paper presents the possibilities of using the Alternative Transient Program ATP-Draw for the modeling and simulation of some models to make lightning stroke studies, especially for protection relays, which are developed through Transient Analysis of Control Systems (TACS) and MODELS language corresponding to the ATP-Draw.

Keywords: back-flashover, faults, flashover, lightning stroke, modeling of lightning, outages, protection relays

Procedia PDF Downloads 288
14152 The Feminism of Data Privacy and Protection in Africa

Authors: Olayinka Adeniyi, Melissa Omino

Abstract:

The field of data privacy and data protection in Africa is still an evolving area, with many African countries yet to enact legislation on the subject. While African Governments are bringing their legislation to speed in this field, how patriarchy pervades every sector of African thought and manifests in society needs to be considered. Moreover, the laws enacted ought to be inclusive, especially towards women. This, in a nutshell, is the essence of data feminism. Data feminism is a new way of thinking about data science and data ethics that is informed by the ideas of intersectional feminism. Feminising data privacy and protection will involve thinking women, considering women in the issues of data privacy and protection, particularly in legislation, as is the case in this paper. The line of thought of women inclusion is not uncommon when even international and regional human rights specific for women only came long after the general human rights. The consideration is that these should have been inserted or rather included in the original general instruments in the first instance. Since legislation on data privacy is coming in this century, having seen the rights and shortcomings of earlier instruments, then the cue should be taken to ensure inclusive wholistic legislation for data privacy and protection in the first instance. Data feminism is arguably an area that has been scantily researched, albeit a needful one. With the spate of increase in the violence against women spiraling in the cyber world, compounding the issue of COVID-19 and the needful response of governments, and the effect of these on women and their rights, fast forward, the research on the feminism of data privacy and protection in Africa becomes inevitable. This paper seeks to answer the questions, what is data feminism in the African context, why is it important in the issue of data privacy and protection legislation; what are the laws, if any, existing on data privacy and protection in Africa, are they women inclusive, if not, why; what are the measures put in place for the privacy and protection of women in Africa, and how can this be made possible. The paper aims to investigate the issue of data privacy and protection in Africa, the legal framework, and the protection or provision that it has for women if any. It further aims to research the importance and necessity of feminizing data privacy and protection, the effect of lack of it, the challenges or bottlenecks in attaining this feat and the possibilities of accessing data privacy and protection for African women. The paper also researches the emerging practices of data privacy and protection of women in other jurisprudences. It approaches the research through the methodology of review of papers, analysis of laws, and reports. It seeks to contribute to the existing literature in the field and is explorative in its suggestion. It suggests a draft of some clauses to make any data privacy and protection legislation women inclusive. It would be useful for policymaking, academic, and public enlightenment.

Keywords: feminism, women, law, data, Africa

Procedia PDF Downloads 159
14151 Protection of Human Rights in Europe: The Parliamentary Dimension

Authors: Aleksandra Chiniaeva

Abstract:

The following paper describes the activity of national and international parliamentary assemblies of the European region in protection and promotion of human rights. It may be said that parliamentarians have a “double mandate” — as members of the international assembly and of their respective national parliaments. In other words, parliamentarization at both international and national level provides a situation for parliamentarians, where they link people, national governments and international organizations. The paper is aimed towards demonstrating that the activity of the main international parliamentary assemblies of the European region have a real positive impact on the human rights situation in the European region. In addition, the paper describes the assemblies that include protection of human rights in their Agenda as one of the main subjects: the EP, the PACE, the OSCE PA and the IPA CIS. Co-operation activities such as joint election observation; participation in inter-parliamentary associations, such as the IPU; conclusion agreements allow assemblies to provide observation of human right situation in the states that are not members of the particular organization and as consequence make their impact broader.

Keywords: human rights, international parliamentary assembly, IPU, EP, PACE, OSCE, international election observation

Procedia PDF Downloads 341
14150 Bitplanes Gray-Level Image Encryption Approach Using Arnold Transform

Authors: Ali Abdrhman M. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression-salt- peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption

Procedia PDF Downloads 399
14149 A Multi Agent Based Protection Scheme for Smart Distribution Network in Presence of Distributed Energy Resources

Authors: M. R. Ebrahimi, B. Mahdaviani

Abstract:

Conventional electric distribution systems are radial in nature, supplied at one end through a main source. These networks generally have a simple protection system usually implemented using fuses, re-closers, and over-current relays. Recently, great attention has been paid to applying Distributed energy resources (DERs) throughout electric distribution systems. Presence of such generation in a network leads to losing coordination of protection devices. Therefore, it is desired to develop an algorithm which is capable of protecting distribution systems that include DER. On the other hand smart grid brings opportunities to the power system. Fast advancement in communication and measurement techniques accelerates the development of multi agent system (MAS). So in this paper, a new approach for the protection of distribution networks in the presence of DERs is presented base on MAS. The proposed scheme has been implemented on a sample 27-bus distribution network.

Keywords: distributed energy resource, distribution network, protection, smart grid, multi agent system

Procedia PDF Downloads 571
14148 Alternative Dispute Resolution Procedures for International Conflicts about Industrial Design

Authors: Moreno Liso Lourdes

Abstract:

The industrial design protects the appearance of part or all of a product resulting from the features of, in particular, the lines, contours, colors, shape, texture or materials of the product itself or its ornamentation. The industrial property offers a different answer depending on the characteristics of the shape object of protection possible, including the trademark and industrial design. There are certain cases where the trademark right invalidate the exclusive right of the industrial design. This can occur in the following situations: 1st) collected as a sign design and trademarked; and 2nd) you want to trademark and protected as a form design (either registered or unregistered). You can either get a trade mark or design right in the same sign or form, provided it meets the legal definition of brand and design and meets the requirements imposed for the protection of each of them, even able to produce an overlap of protection. However, this double protection does not have many advantages. It is, therefore, necessary to choose the best form of legal protection according to the most adequate ratios. The diversity of rights that can use the creator of an industrial design to protect your job requires you to make a proper selection to prevent others, especially their competitors, taking advantage of the exclusivity that guarantees the law. It is necessary to choose between defending the interests of the parties through a judicial or extrajudicial procedure when the conflict arises. In this paper, we opted for the defense through mediation.

Keywords: industrial design, ADR, Law, EUIPO

Procedia PDF Downloads 214
14147 Employee Whistleblower Protection: An Analysis of Malaysian Law and Islamic Law

Authors: Ashgar Ali Ali Mohamed, Farheen Baig Sardar Baig

Abstract:

In Malaysia, the Whistle-blower Protection Act 2010 provides protection to a person in an organization who exposes misconduct, alleged dishonest or illegal activity that violates the existing laws, among others. For example, alleged fraud, health and safety violations, and corruption, to name but a few. Undeniable, most whistle-blowers are internal to an organisation who report misconduct of a fellow employee or superior within their company and they frequently face reprisal at the hands of the organisation which they have accused. In fact, many people do not consider blowing the whistle because of fear of retaliation and losing their relationships at workplace. Although whistle-blowers are protected under law from employer retaliation, there have been many cases where punishment for whistleblowing has occurred, such as suspension, demotion, termination, or harsh mistreatment by other employees. Hence, this paper will analyse the adequacy of the legal protection available to employees who whistle-blow on their employers with reference to the Whistle-blower Protection Act 2010. Reference will also be made to the approach taken in other selected jurisdiction with a view of highlighting the adequacy of the Malaysian legislation on this subject besides strengthen employee whistle-blower protection. Further, reference is also made to the Islamic approach on this subject with particular reference to the concept of amr-bil-Ma’roof (ordering for acknowledged virtues) and nahi anil munkar (forbidding from sin). Allah (SWT) says: “And there should be a group amongst you who invite towards good, order for acknowledged virtues, forbid from sin and these it is that are the successful ones” (Al Imran(Chp 3), verse 104).

Keywords: whistleblower protection, employee whistleblower, detrimental and reprisal, Malaysian law

Procedia PDF Downloads 527
14146 Health-Related Quality of Life of Caregivers of Institution-Reared Children in Metro Manila: Effects of Role Overload and Role Distress

Authors: Ian Christopher Rocha

Abstract:

This study aimed to determine the association of the quality of life (QOL) of the caregivers of children in need of special protection (CNSP) in child-caring institutions in Metro Manila with the levels of their role overload (RO) and role distress (RD). The CNSP in this study covered the orphaned, abandoned, abused, neglected, exploited, and mentally-challenged children. In this study, the domains of QOL included physical health (PH), psychological health, social health (SH), and living conditions (LC). It also intended to ascertain the association of their personal and work-related characteristics with their RO and RD levels. The respondents of this study were 130 CNSP caregivers in 17 residential child-rearing institutions in Metro Manila. A purposive non-probability sampling was used. Using a quantitative methodological approach, the survey method was utilized to gather data with the use of a self-administered structured questionnaire. Data were analyzed using both descriptive and inferential statistics. Results revealed that the level of RO, the level of RD, and the QOL of the CNSP caregivers were all moderate. Data also suggested that there were significant positive relationships between the RO level and the caregivers’ characteristics, such as age, the number of training, and years of service in the institution. At the same time, the findings revealed that there were significant positive relationships between the RD level and the caregivers’ characteristics, such as age and hours of care rendered to their care recipients. In addition, the findings suggested that all domains of their QOL obtained significant relationships with their RO level. For the correlations of their level of RO and their QOL domains, the PH and the LC obtained a moderate negative correlation with the RO level while the rest of the domains obtained weak negative correlations with RO level. For the correlations of their level of RD and the QOL domains, all domains, except SH, obtained strong negative correlations with the level of RD. The SH revealed to have a moderate negative correlation with RD level. In conclusion, caregivers who are older experience higher levels of RO and RD; caregivers who have more training and years of service experience the higher level of RO; and caregivers who have longer hours of rendered care experience the higher level of RD. In addition, the study affirmed that if the levels of RO and RD are high, the QOL is low, and vice versa. Therefore, the RO and RD levels are reliable predictors of the caregivers’ QOL. In relation, the caregiving situation in the Philippines revealed to be unique and distinct from other countries because the levels of RO and RD and the QOL of Filipino CNSP caregivers were all moderate in contrast with their foreign counterparts who experience high caregiving RO and RD leading to low QOL.

Keywords: quality of life, caregivers, children in need of special protection, physical health, psychological health, social health, living conditions, role overload, role distress

Procedia PDF Downloads 186
14145 The Willingness to Pay of People in Taiwan for Flood Protection Standard of Regions

Authors: Takahiro Katayama, Hsueh-Sheng Chang

Abstract:

Due to the global climate change, it has increased the extreme rainfall that led to serious floods around the world. In recent years, urbanization and population growth also tend to increase the number of impervious surfaces, resulting in significant loss of life and property during floods especially for the urban areas of Taiwan. In the past, the primary governmental response to floods was structural flood control and the only flood protection standards in use were the design standards. However, these design standards of flood control facilities are generally calculated based on current hydrological conditions. In the face of future extreme events, there is a high possibility to surpass existing design standards and cause damages directly and indirectly to the public. To cope with the frequent occurrence of floods in recent years, it has been pointed out that there is a need for a different standard called FPSR (Flood Protection Standard of Regions) in Taiwan. FPSR is mainly used for disaster reduction and used to ensure that hydraulic facilities draining regional flood immediately under specific return period. FPSR could convey a level of flood risk which is useful for land use planning and reflect the disaster situations that a region can bear. However, little has been reported on FPSR and its impacts to the public in Taiwan. Hence, this study proposes a quantity procedure to evaluate the FPSR. This study aimed to examine FPSR of the region and public perceptions of and knowledge about FPSR, as well as the public’s WTP (willingness to pay) for FPSR. The research is conducted via literature review and questionnaire method. Firstly, this study will review the domestic and international research on the FPSR, and provide the theoretical framework of FPSR. Secondly, CVM (Contingent Value Method) has been employed to conduct this survey and using double-bounded dichotomous choice, close-ended format elicits households WTP for raising the protection level to understand the social costs. The samplings of this study are citizens living in Taichung city, Taiwan and 700 samplings were chosen in this study. In the end, this research will continue working on surveys, finding out which factors determining WTP, and provide some recommendations for adaption policies for floods in the future.

Keywords: climate change, CVM (Contingent Value Method), FPSR (Flood Protection Standard of Regions), urban flooding

Procedia PDF Downloads 217
14144 The Effectiveness of Cathodic Protection on Microbiologically Influenced Corrosion Control

Authors: S. Taghavi Kalajahi, A. Koerdt, T. Lund Skovhus

Abstract:

Cathodic protection (CP) is an electrochemical method to control and manage corrosion in different industries and environments. CP which is widely used, especially in buried and sub-merged environments, which both environments are susceptible to microbiologically influenced corrosion (MIC). Most of the standards recommend performing CP using -800 mV, however, if MIC threats are high or sulfate reducing bacteria (SRB) is present, the recommendation is to use more negative potentials for adequate protection of the metal. Due to the lack of knowledge and research on the effectiveness of CP on MIC, to the author’s best knowledge, there is no information about what MIC threat is and how much more negative potentials should be used enabling adequate protection and not overprotection (due to hydrogen embrittlement risk). Recently, the development and cheaper price of molecular microbial methods (MMMs) open the door for more effective investigations on the corrosion in the presence of microorganisms, along with other electrochemical methods and surface analysis. In this work, using MMMs, the gene expression of SRB biofilm under different potentials of CP will be investigated. The specific genes, such as pH buffering, metal oxidizing, etc., will be compared at different potentials, enabling to determine the precise potential that protect the metal effectively from SRB. This work is the initial step to be able to standardize the recommended potential under MIC condition, resulting better protection for the infrastructures.

Keywords: cathodic protection, microbiologically influenced corrosion, molecular microbial methods, sulfate reducing bacteria

Procedia PDF Downloads 68
14143 Sequence Component-Based Adaptive Protection for Microgrids Connected Power Systems

Authors: Isabelle Snyder

Abstract:

Microgrid protection presents challenges to conventional protection techniques due to the low induced fault current. Protection relays present in microgrid applications require a combination of settings groups to adjust based on the architecture of the microgrid in islanded and grid-connected mode. In a radial system where the microgrid is at the other end of the feeder, directional elements can be used to identify the direction of the fault current and switch settings groups accordingly (grid connected or microgrid connected). However, with multiple microgrid connections, this concept becomes more challenging, and the direction of the current alone is not sufficient to identify the source of the fault current contribution. ORNL has previously developed adaptive relaying schemes through other DOE-funded research projects that will be evaluated and used as a baseline for this research. The four protection techniques in this study are the following: (1) Adaptive Current only Protection System (ACPS), Intentional (2) Unbalanced Control for Protection Control (IUCPC), (3) Adaptive Protection System with Communication Controller (APSCC) (4) Adaptive Model-Driven Protective Relay (AMDPR). The first two methods focus on identifying the islanded mode without communication by monitoring the current sequence component generated by the system (ACPS) or induced with inverter control during islanded mode (IUCPC) to identify the islanding condition without communication at the relay to adjust the settings. These two methods are used as a backup to the APSCC, which relies on a communication network to communicate the islanded configuration to the system components. The fourth method relies on a short circuit model inside the relay that is used in conjunction with communication to adjust the system configuration and computes the fault current and adjusts the settings accordingly.

Keywords: adaptive relaying, microgrid protection, sequence components, islanding detection, communication controlled protection, integrated short circuit model

Procedia PDF Downloads 58
14142 Conditionality in the European Union as a New Instrument to Guarantee the Principle of Separation of Powers

Authors: Ana Neves

Abstract:

The European Union’s multi-level constitutionalism is grounded in an intricate network of vertical and horizontal legal relationships among different levels and types of public authorities. In a very significant way since the 2008 crisis, evolving institutional arrangements and institutional dynamics in the European Union have been progressively impacting Member States and the terms under which national public authorities are organised, interact and exercise their powers. This impact occurs in both macro and micro dimensions. Several examples are relevant here, such as the involvement of national Parliaments in the activities of the European Union, the enhanced integration of public administrations, the side effects of the Council framework decision on the European Arrest Warrant, the European Union Justice Scoreboard, the protection of whistle-blowers regulation, the enhanced cooperation on the establishment of the European Public Prosecutor’s Office, the regime for the protection of the Union budget and the European Rule of Law Mechanism. A common trend or denominator underlies the deepening of institutional interdependence and the increased interactions between the European Union, Member States, and public authorities at different levels. This seems to be conditionality as a general principle. The European multi-level constitutionalism must be considered in the light of this conditionality principle, which does not “imply a relationship of command and obedience”. Nevertheless, it might be more effective or be a very compelling principle. It is as if the extension of the shared rule is being accompanied by a contrapuntal dialogue. The different public authorities at various levels are being called to rethink and readjust themselves within a broader and more plural framework concerning understanding the limitation of power.

Keywords: european union -, multi-level hierarchy, conditionality, separation of powers

Procedia PDF Downloads 71
14141 The Protection of Assets in the Crisis Management Processes

Authors: Jiri Barta

Abstract:

This paper deals with the prevention and management of emergencies. It focuses on the protection of assets of the critical infrastructure entities that are important to preventing, preparing for and management of emergencies and crisis situations. The paper defines assets and specifies their use and place in the process of crisis management and planning. Critical assets that are protected from the negative effects of emergency or crisis situation we can use in crisis management and response. This basic rule applies mainly to the substantial assets used in the protection of critical infrastructure processes.

Keywords: asset, continuity, critical infrastructure, crisis management process

Procedia PDF Downloads 492
14140 Influence of Cathodic Protection on High Strength, Pre-Stressed Corroded Tendons

Authors: Ibrahim R. Elomari, Fin O'Flaherty, Ibrahim R. Elomari, Paul Lambert

Abstract:

Cathodic protection (CP) is a technique commonly used to arrest corrosion of steel in infrastructure. However, it is not generally used on high strength, pre-stressed tendons due to the risk of hydrogen generation, leading to possible embrittlement. This paper investigates its use in such circumstances where the applied protection potential is varied to determine if CP can be safely employed on pre-stressed tendons. Plain steel tendons measuring 5.4 mm diameter were pre-stressed in timber moulds and embedded in sand/cement mortar, formulated to represent gunite. Two levels of pre-stressing were investigated (400MPa and 1200MPa). Pre-corrosion of 0% (control), 3% and 6% target loss of cross-sectional area was applied to replicate service conditions. Impressed current cathodic protection (ICCP) was then applied to the tendons at two levels of potential to identify any effect on strength. Instant-off values up to -950mV were used for normal protection with values of -1100mV or more negative to achieve overprotection. Following the ICCP phase, the tendons were removed from the mortar, cleaned and weighed to confirm actual percentage of corrosion. Tensile tests were then conducted on the tendons. The preliminary results show the influence of normal levels and overprotection of CP on the ultimate strength of the tendons.

Keywords: pre-stressed concrete, corrosion, cathodic protection, hydrogen embrittlement

Procedia PDF Downloads 235
14139 "Good" Discretion Among Private Sector Street Level Bureaucrats

Authors: Anna K. Wood, Terri Friedline

Abstract:

In April and May 2020, the private banking industry approved over 1.7 million emergency small business loans, totaling over $650 billion in federal relief funds as part of the Paycheck Protection Program (PPP). Since the program’s rollout, the extensive evidence of discriminatory lending and misuse of funds has been revealed by investigative journalism and academic studies. This study is based on 41 interviews with frontline banking industry professionals conducted during the days and weeks of the PPP rollout, presenting a real-time narrative of the program rollout through the eyes of those in the role of a street-level bureaucrat. We present two themes from this data about the conditions under which these frontline workers experienced the PPP: Exigent Timelines and Defaulting to Existing Workplace Norms and Practices. We analyze these themes using literature on street-level organizations, bureaucratic discretion, and the differences between public and private sector logic. The results of this study present new directions for theorizing sector-level differences in street-level bureaucratic discretion in the context of mixed-sector collaboration on public service delivery, particularly under conditions of crisis and urgency.

Keywords: street level bureaucracy, social policy, bureaucratic discretion, public private partnerships

Procedia PDF Downloads 70
14138 Building Safety Through Real-time Design Fire Protection Systems

Authors: Mohsin Ali Shaikh, Song Weiguo, Muhammad Kashan Surahio, Usman Shahid, Rehmat Karim

Abstract:

When the area of a structure that is threatened by a disaster affects personal safety, the effectiveness of disaster prevention, evacuation, and rescue operations can be summarized by three assessment indicators: personal safety, property preservation, and attribution of responsibility. These indicators are applicable regardless of the disaster that affects the building. People need to get out of the hazardous area and to a safe place as soon as possible because there's no other way to respond. The results of the tragedy are thus closely related to how quickly people are advised to evacuate and how quickly they are rescued. This study considers present fire prevention systems to address catastrophes and improve building safety. It proposes the methods of Prevention Level for Deployment in Advance and Spatial Transformation by Human-Machine Collaboration. We present and prototype a real-time fire protection system architecture for building disaster prevention, evacuation, and rescue operations. The design encourages the use of simulations to check the efficacy of evacuation, rescue, and disaster prevention procedures throughout the planning and design phase of the structure.

Keywords: prevention level, building information modeling, quality management system, simulated reality

Procedia PDF Downloads 28
14137 Exploring the Intersection Between the General Data Protection Regulation and the Artificial Intelligence Act

Authors: Maria Jędrzejczak, Patryk Pieniążek

Abstract:

The European legal reality is on the eve of significant change. In European Union law, there is talk of a “fourth industrial revolution”, which is driven by massive data resources linked to powerful algorithms and powerful computing capacity. The above is closely linked to technological developments in the area of artificial intelligence, which has prompted an analysis covering both the legal environment as well as the economic and social impact, also from an ethical perspective. The discussion on the regulation of artificial intelligence is one of the most serious yet widely held at both European Union and Member State level. The literature expects legal solutions to guarantee security for fundamental rights, including privacy, in artificial intelligence systems. There is no doubt that personal data have been increasingly processed in recent years. It would be impossible for artificial intelligence to function without processing large amounts of data (both personal and non-personal). The main driving force behind the current development of artificial intelligence is advances in computing, but also the increasing availability of data. High-quality data are crucial to the effectiveness of many artificial intelligence systems, particularly when using techniques involving model training. The use of computers and artificial intelligence technology allows for an increase in the speed and efficiency of the actions taken, but also creates security risks for the data processed of an unprecedented magnitude. The proposed regulation in the field of artificial intelligence requires analysis in terms of its impact on the regulation on personal data protection. It is necessary to determine what the mutual relationship between these regulations is and what areas are particularly important in the personal data protection regulation for processing personal data in artificial intelligence systems. The adopted axis of considerations is a preliminary assessment of two issues: 1) what principles of data protection should be applied in particular during processing personal data in artificial intelligence systems, 2) what regulation on liability for personal data breaches is in such systems. The need to change the regulations regarding the rights and obligations of data subjects and entities processing personal data cannot be excluded. It is possible that changes will be required in the provisions regarding the assignment of liability for a breach of personal data protection processed in artificial intelligence systems. The research process in this case concerns the identification of areas in the field of personal data protection that are particularly important (and may require re-regulation) due to the introduction of the proposed legal regulation regarding artificial intelligence. The main question that the authors want to answer is how the European Union regulation against data protection breaches in artificial intelligence systems is shaping up. The answer to this question will include examples to illustrate the practical implications of these legal regulations.

Keywords: data protection law, personal data, AI law, personal data breach

Procedia PDF Downloads 15
14136 Testing of Complicated Bus Bar Protection Using Smart Testing Methodology

Authors: K. N. Dinesh Babu

Abstract:

In this paper, the protection of a complicated bus arrangement with a dual bus coupler and bus sectionalizer using low impedance differential protection applicable for very high voltages like 220kV and 400kV is discussed. In many power generation stations, several operational procedures are implemented to utilize the transfer bus as the main bus and to facilitate the maintenance of circuit breakers and current transformers (in each section) without shutting down the bay(s). Owing to this fact, the complications in operational philosophy have thrown challenges for the bus bar protection implementation. Many bus topologies allow any one of the main buses available in the station to be used as an auxiliary bus. In such a system, pre-defined precautions and procedures are made as guidelines, which are followed before assigning any bus as an auxiliary bus. The procedure involves shifting of links, changing rotary switches, insertion of test block, and so on, thereby causing unreliable operation. This kind of unreliable operation or inadvertent procedural lapse may result in the isolation of the bus bar from the grid due to the unpredictable operation of the bus bar protection relay, which is a commonly occurring phenomenon due to manual mistakes. With the sophisticated configuration and implementation of logic in modern intelligent electronic devices, the operator is free to select the transfer arrangement without sacrificing the protection required by a bus differential system for a reliable operation, and labor-intensive processes are completely eliminated. This paper deals with the procedure to test the security logic for such special scenarios using Megger make SMRT, bus bar protection relay to assure system stability and get rid of all the specific operational precautions/procedure.

Keywords: bus bar protection, by-pass isolator, blind spot, breaker failure, intelligent electronic device, end fault, bus unification, directional principle, zones of protection, breaker re-trip, under voltage security, smart megger relay tester

Procedia PDF Downloads 43
14135 A Mixed-method Study of Psychological Empowerment in Child Protection Practitioners

Authors: Amy Bromley

Abstract:

Child protection practitioners are a vital part of systems designed to protect children from abuse and neglect. Reforms in Anglo-American systems have shown a trend towards compliance-culture that reduces practitioner autonomy and empowerment, increasing staff turnover and negatively impacting outcomes for children. This explanatory mixed-methods study examined psychological empowerment in a national sample of child protection practitioners in Australia (n=109) using the Psychological Empowerment Instrument followed by semi-structured interviews (n=19). The results show that practitioners experience the sub-dimensions of psychological empowerment differently, perceiving themselves to have high levels of competence and satisfaction in their work but limited opportunities for self-determination and low levels of impact on decision-making in their organizations. The qualitative data revealed that practitioners do not trust systemic reforms and have experienced them as ineffective, politically driven, and bureaucratic. The increased compliance demanded from these reforms has left practitioners feeling that their expertise is not valued, leading many to leave their organizations. The practitioners who remain employed in child protection identified their use of advocacy, curiosity, and child-centered values as ways of protecting their psychological empowerment. The findings highlight the ways psychological empowerment can be promoted within child protection systems, improving staff retention and building expertise.

Keywords: child protection, implementation, psychological empowerment, systems theory

Procedia PDF Downloads 154
14134 Status of Radiation Protection at Radiation Oncology, BPKM Cancer Hospital, Nepal

Authors: Surendra B. Chand, P. P. Chaurasia, M. P. Adhikari, R. N. Yadav

Abstract:

Objective: The objective of this work was to evaluate all the safety procedures toward the radiation protection for workers in the radiation oncology department. Materials and Methods: The annual thermoluminescent dosimeters (TLDs) reports for five years of the staffs were evaluated, radiation surveys were done in the control consoles, radiotherapy machines room and waiting areas of all machines using Aloka survey meter. Results: The five years TLD reports shows that the whole body dose of the individual staffs is found within the annual dose limit except the accidental exposures. Radiation exposures in the working areas are also safe limits. Conclusion: The radiation safety practices for radiation protection are satisfactory and the radiation workers of the departments are found working within the safe limit.

Keywords: radiation protection, safety, ICRP, dose limits, TLD, radiation devices

Procedia PDF Downloads 541
14133 The Iranian Law and Refugee Survivors of Sexual and Gender-Based Violence

Authors: Aminreza Koohestani

Abstract:

This paper intends to explore the existing safeguards available within the Iranian law in protecting refugees affected by Sexual and Gender-Based Violence (SGBV). The Iranian law afforded protection for women and girls against SGBV is scattered across various bodies of law. Moreover, the degree of protection provided by the law varies greatly from one type of SGBV to another. The paper discusses the scope of applicability of Iranian laws to refugees affected by SGBV as well as substantive and procedural laws afforded protection for survivors of SGBV.

Keywords: Iran, law, violence, women

Procedia PDF Downloads 199
14132 Consumer Protection: An Exploration of the Role of the State in Protecting Consumers Before and During Inflation

Authors: Fatimah Opebiyi

Abstract:

Economic growth promotion, inflation reduction and consumer protection are among the core public interest aims of governments. Nevertheless, higher rates of default by consumers in relation to credit card loans and mortgages in recent times illustrate that government’s performance in balancing the protection of the economy and consumer is subpar. This thereby raises an important question on the role of government in protecting consumers during prolonged spells of inflation, particularly when such inflationary trends may be traceable to the acts of the government. Adopting a doctrinal research methodology, this article investigates the evolution of the concept of consumer protection in the United Kingdom and also brings to the fore the tensions and conflicts of interests in the aims and practices of the main regulators within the financial services industry. Relying on public interest theories of regulation and responsive regulatory theory, the article explores the limitations in the state’s ability to strike the right balance in meeting regulatory aims of the regulatory agencies at the opposite ends of the spectrum.

Keywords: financial regulation, consumer protection, prudential regulation, public interest theories of regulation, central bank

Procedia PDF Downloads 38
14131 Impact of Instrument Transformer Secondary Connections on Performance of Protection System: Experiences from Indian POWERGRID

Authors: Pankaj Kumar Jha, Mahendra Singh Hada, Brijendra Singh, Sandeep Yadav

Abstract:

Protective relays are commonly connected to the secondary windings of instrument transformers, i.e., current transformers (CTs) and/or capacitive voltage transformers (CVTs). The purpose of CT and CVT is to provide galvanic isolation from high voltages and reduce primary currents and voltages to a nominal quantity recognized by the protective relays. Selecting the correct instrument transformers for an application is imperative: failing to do so may compromise the relay’s performance, as the output of the instrument transformer may no longer be an accurately scaled representation of the primary quantity. Having an accurately rated instrument transformer is of no use if these devices are not properly connected. The performance of the protective relay is reliant on its programmed settings and on the current and voltage inputs from the instrument transformers secondary. This paper will help in understanding the fundamental concepts of the connections of Instrument Transformers to the protection relays and the effect of incorrect connection on the performance of protective relays. Multiple case studies of protection system mal-operations due to incorrect connections of instrument transformers will be discussed in detail in this paper. Apart from the connection issue of instrument transformers to protective relays, this paper will also discuss the effect of multiple earthing of CTs and CVTs secondary on the performance of the protection system. Case studies presented in this paper will help the readers to analyse the problem through real-world challenges in complex power system networks. This paper will also help the protection engineer in better analysis of disturbance records. CT and CVT connection errors can lead to undesired operations of protection systems. However, many of these operations can be avoided by adhering to industry standards and implementing tried-and-true field testing and commissioning practices. Understanding the effect of missing neutral of CVT, multiple earthing of CVT secondary, and multiple grounding of CT star points on the performance of the protection system through real-world case studies will help the protection engineer in better commissioning the protection system and maintenance of the protection system.

Keywords: bus reactor, current transformer, capacitive voltage transformer, distance protection, differential protection, directional earth fault, disturbance report, instrument transformer, ICT, REF protection, shunt reactor, voltage selection relay, VT fuse failure

Procedia PDF Downloads 49
14130 Evaluation of Ecological Resilience in Mountain-plain Transition Zones: A Case Study of Dujiangyan City, Chengdu

Authors: Zhu Zhizheng, Huang Yong, Li Tong

Abstract:

In the context of land and space development and resource environmental protection. Due to its special geographical location, mountain-plain transition zones are limited by many factors such as topography, mountain forest protection, etc., and their ecology is also more sensitive, with the characteristics of disaster susceptibility and resource gradient. Taking Dujiangyan City, Chengdu as an example, this paper establishes resilience evaluation indicators on the basis of ecological suitability evaluation through the analysis of current situation data and relevant policies: water conservation evaluation, soil and water conservation evaluation, biodiversity evaluation, soil erosion sensitivity evaluation, etc. Based on GIS spatial analysis, the ecological suitability and resilience evaluation results of Dujiangyan city were obtained by disjunction operation. The ecological resilience level of Dujiangyan city was divided into three categories: high, medium and low, with an area ratio of 50.81%, 16.4% and 32.79%, respectively. This paper can provide ideas for solving the contradiction between man and land in the mountain-plain transition zones, and also provide a certain basis for the construction of regional ecological protection and the delineation of three zones and three lines.

Keywords: urban and rural planning, ecological resilience, dujiangyan city, mountain-plain transition zones

Procedia PDF Downloads 83
14129 Realising the Socio-Economic Rights of Refugees Under Human Rights Law: A Case Study of South Africa

Authors: Taguekou Kenfack Alexie

Abstract:

For a long time, refugee protection has constituted one of the main concerns of the international community as a whole and for the South African government in particular.The focus of this paper is on the challenges refugees face in accessing their rights in South Africa. In particular, it analyses the legal framework for the protection of the socio economic rights of refugees under international law, regional and domestic law and the extent to which the rights have been realized. The main hypothesis of the study centered on the fact that the social protection of refugees in South Africa is in conformity with international standards. To test this hypothesis, the qualitative research method was applied. Refugee related legal instruments were analyzed as well as academic publications, organizational reports and internet sources. The data analyzed revealed that there has been enormous progress in meeting international standards in the areas of education, emergency relief and assistance, protection of women and refugee children. The results also indicated that much remain to be desired in such areas as nutrition, shelter, health care, freedom of movement and very importantly, employment and social security. The paper also seeks to address the obstacles which prevent the proper treatment of refugees and to make recommendations as how the South African government can better regulate the treatment of refugees living in its territory.Recommendations include the amendment of the legal instruments that provide the normative framework for protection and improvement of protection policies to reflect the changing dynamics.

Keywords: international community, refugee, socioeconomic rights, social protection

Procedia PDF Downloads 256
14128 Positive Obligations of the State Concerning the Protection of Human Rights

Authors: Monika Florczak-Wator

Abstract:

The model of positive obligations of the state concerning the protection of the rights of an individual was created within the jurisdiction of the German Federal Constitutional Court in the 1970s. That model assumes that the state should protect an individual against infringement of their fundamental rights by another individual. It is based on the idea concerning the modification of the function and duties of the state towards an individual and society. Initially the state was perceived as the main infringer of the fundamental rights of an individual formulating the individual’s obligations of negative nature (obligation of noninterference), however, at present the state is perceived as a guarantor and protector of the fundamental rights of an individual of positive nature (obligation of protection). Examination of the chosen judicial decisions of that court will enable us to determine what the obligation of protection is specifically about, when it is updated and whether it is accompanied by claims of an individual requesting the state to take actions protecting their fundamental rights against infringement by the private entities. The comparative perspective for the German model of positive obligations of the state will be an analogous model present in the jurisdiction of the European Court of Human Rights. It is justified to include it in the research as the Convention, similarly to the constitution, focuses on the protection of an individual against the infringement of their rights by the state and both models have been developed within the jurisdiction for several dozens of years. Analysis of the provisions of the Constitution of the Republic of Poland as well as judgements of the Polish Constitutional Tribunal will allow for the presentation of the application the model of the protective duties of the state in Poland.

Keywords: human rights, horizontal relationships, constitution, state protection

Procedia PDF Downloads 457
14127 Polymorphism of HMW-GS in Collection of Wheat Genotypes

Authors: M. Chňapek, M. Tomka, R. Peroutková, Z. Gálová

Abstract:

Processes of plant breeding, testing and licensing of new varieties, patent protection in seed production, relations in trade and protection of copyright are dependent on identification, differentiation and characterization of plant genotypes. Therefore, we focused our research on utilization of wheat storage proteins as genetic markers suitable not only for differentiation of individual genotypes, but also for identification and characterization of their considerable properties. We analyzed a collection of 102 genotypes of bread wheat (Triticum aestivum L.), 41 genotypes of spelt wheat (Triticum spelta L.), and 35 genotypes of durum wheat (Triticum durum Desf.), in this study. Our results show, that genotypes of bread wheat and durum wheat were homogenous and single line, but spelt wheat genotypes were heterogenous. We observed variability of HMW-GS composition according to environmental factors and level of breeding and predict technological quality on the basis of Glu-score calculation.

Keywords: genotype identification, HMW-GS, wheat quality, polymorphism

Procedia PDF Downloads 433
14126 Bitplanes Image Encryption/Decryption Using Edge Map (SSPCE Method) and Arnold Transform

Authors: Ali A. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression, salt and peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption

Procedia PDF Downloads 460
14125 Corrosion of Concrete Reinforcing Steel Bars Tested and Compared Between Various Protection Methods

Authors: P. van Tonder, U. Bagdadi, B. M. D. Lario, Z. Masina, T. R. Motshwari

Abstract:

This paper analyses how concrete reinforcing steel bars corrode and how it can be minimised through the use of various protection methods against corrosion, such as metal-based paint, alloying, cathodic protection and electroplating. Samples of carbon steel bars were protected, using these four methods. Tests performed on the samples included durability, electrical resistivity and bond strength. Durability results indicated relatively low corrosion rates for alloying, cathodic protection, electroplating and metal-based paint. The resistivity results indicate all samples experienced a downward trend, despite erratic fluctuations in the data, indicating an inverse relationship between electrical resistivity and corrosion rate. The results indicated lowered bond strengths when the reinforced concrete was cured in seawater compared to being cured in normal water. It also showed that higher design compressive strengths lead to higher bond strengths which can be used to compensate for the loss of bond strength due to corrosion in a real-world application. In terms of implications, all protection methods have the potential to be effective at resisting corrosion in real-world applications, especially the alloying, cathodic protection and electroplating methods. The metal-based paint underperformed by comparison, most likely due to the nature of paint in general which can fade and chip away, revealing the steel samples and exposing them to corrosion. For alloying, stainless steel is the suggested material of choice, where Y-bars are highly recommended as smooth bars have a much-lowered bond strength. Cathodic protection performed the best of all in protecting the sample from corrosion, however, its real-world application would require significant evaluation into the feasibility of such a method.

Keywords: protection methods, corrosion, concrete, reinforcing steel bars

Procedia PDF Downloads 147
14124 Coastal Cliff Protection in Beit Yanai, Israel: Examination of Alternatives and Public Preference Analysis

Authors: Tzipi Eshet

Abstract:

The primary objectives of this work are the examination of public preferences and attributed importance to different characteristics of coastal cliff protection alternatives, and drawing conclusions about the applicable alternative in Beit-Yanai beach. Erosion of coastal cliffs is a natural phenomenon that occurs in many places in the world. This creates problems along the coastlines, which are densely populated areas with highly developed economic activity. In recent years, various aspects of the aeolianite cliffs along the Israeli coast have been studied extensively. There is a consensus among researchers regarding a general trend of cliff retreat. This affects civilian infrastructure, wildlife habitats and heritage values, as well as Increases the risk to human life. The Israeli government, committed to the integrated coastal zones management approach, decided on a policy and guidelines to deal with cliff erosion, which includes establishing physical protection on land and in the sea, sand nourishment and runoff drainage. Physical protection solutions to reduce the rate of retreat of the cliffs are considerably important both for planning authorities and visitors to the beach. Direct costs of different protection alternatives, as well as external costs and benefits, may vary, thus affecting consumer preferences. Planning and execution of sustainable coastal cliff protection alternatives must take into account the different characteristics and their impact on aspects of economics, environment and leisure. The rocky shore of Beit-Yanai Beach was chosen as a case study to examine the nature of the influence of various protective solutions on consumer preferences. This beach is located in the center of Israel's coastline, and acts as a focus of attraction for recreation, land and sea sports, and educational activities as well. If no action will be taken, cliff retreat will continue. A survey was conducted to reveal the importance of coastal protection alternatives characteristics and the visual preferences to visitors at beach Beit-Yanai and residents living on the cliff (N=287). Preferences and willingness-to-pay were explored using Contingent-Ranking and Choice-Experiments techniques. Results show that visitors’ and residents’ willingness-to-pay for coastal cliff protection alternatives is affected both by financial and environmental aspects, as well as leisure. They prefer coastal cliff protection alternatives that are not visible and do not need constant maintenance, do not affect the quality of seawater or the habitats of wildlife and do not lower the security level of the swimmers. No significant difference was found comparing willingness-to-pay among local and non-local users. Additionally, they mostly prefer a protection solution which is integrated in the coastal landscape and maintains the natural appearance of the beach. Of the possible protection alternatives proposed for the protection of the cliff in Beit Yanai beach are two techniques that meet public preferences: rock revetments and submerged detached breakwaters. Results indicate that the visiting public prefer the implementation of these protection alternatives and will be willing to pay for them. Future actions to reduce retreat rate in Beit-Yanai have to consider implications on the economic, environmental and social conditions, along with weighting public interest against the interest of the individual.

Keywords: contingent-ranking, choice-experiments, coastal cliff protection, erosion of coastal cliffs, environment

Procedia PDF Downloads 265