Search results for: protection methods
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 16523

Search results for: protection methods

16373 A Comparative Analysis of the Factors Determining Improvement and Effectiveness of Mediation in Family Matters Regarding Child Protection in Australia and Poland

Authors: Beata Anna Bronowicka

Abstract:

Purpose The purpose of this paper is to improve effectiveness of mediation in family matters regarding child protection in Australia and Poland. Design/methodology/approach the methodological approach is phenomenology. Two phenomenological methods of data collection were used in this research 1/ a doctrinal research 2/an interview. The doctrinal research forms the basis for obtaining information on mediation, the date of introduction of this alternative dispute resolution method to the Australian and Polish legal systems. No less important were the analysis of the legislation and legal doctrine in the field of mediation in family matters, especially child protection. In the second method, the data was collected by semi-structured interview. The collected data was translated from Polish to English and analysed using software program. Findings- The rights of children in the context of mediation in Australia and Poland differ from the recommendations of the UN Committee on the Rights of the Child, which require that children be included in all matters that concern them. It is the room for improvement in the mediation process by increasing child rights in mediation between parents in matters related to children. Children should have the right to express their opinion similarly to the case in the court process. The challenge with mediation is also better understanding the role of professionals in mediation as lawyers, mediators. Originality/value-The research is anticipated to be of particular benefit to parents, society as whole, and professionals working in mediation. These results may also be helpful during further legislative initiatives in this area.

Keywords: mediation, family law, children's rights, australian and polish family law

Procedia PDF Downloads 53
16372 The Implications of Instrumental Animal Protection for the Legal and Moral Status of Animals

Authors: Ankita Shanker, Angus Nurse

Abstract:

The notion of animal rights is an emerging trend in various spaces, including judicial and societal discourse. But one of the key purposes of recognizing the fundamental rights of anyone is their de-objectification. Animals are a prime example of a group that has rights that are neither recognized nor protected in any meaningful way, and anything that purports differently fails to ameliorate this because it still objectifies animals. Animals are currently treated by law and society as commodities with primarily (though not exclusively) instrumental value to some other rights-holder, such as humans or nature. So most protections that are afforded to them are done so in furtherance of the interests that they allegedly further, be it social morality or environmental protection. Animal rights are thus often seen as an application or extension of the rights of humans or, more commonly, the rights of nature. What this means is that animal rights are not always protected or even recognized in their own regard, but as stemming from some other reason, or worse, instrumentally as means to some other ends. This has two identifiable effects from a legal perspective: animal rights are not seen as inherently justified and are not seen as inherently valuable. Which in turn means that there can be no fundamental protection of animal rights. In other words, judicial protection does not always entail protection of animal ‘rights’ qua animal rights, which is needed for any meaningful protections to be afforded to animals. But the effects of this legal paradigm do not end at the legal status of animals. Because this status, in turn, affects how persons and the societies of which they form part see animals as a part of the rights of others, such as humans or nature, or as valuable only insofar as they further these rights, as opposed to as individuals with inherent worth and value deserving of protection regardless of their instrumental usefulness to these other objectives. This does nothing to truly de-objectify animals. Because even though most people would agree that animals are not objects, they continue to treat them as such wherever it serves them. For individuals and society to resolve, this inconsistency between stance and actions is for them to believe that animals are more than objects on a psychological and societal level. In this paper, we examine the implications of this perception of animals and their rights on the legal protections afforded to them and on the minds of individuals and civil society. We also argue that a change in the legal and societal status of animals can be brought about only through judicial, psychological, and sociological acknowledgment that animals have inherent value and deserve protection on this basis. Animal rights derived in such a way would not need to place reliance on other justifications and would not be subject to subjugation to other rights should a conflict arise.

Keywords: animal rights law, animal protection laws, psycho-socio-legal studies, animal rights, human rights, rights of nature

Procedia PDF Downloads 63
16371 Violent Conflict and the Protection of Women from Sex and Gender-Based Violence: A Third World Feminist Critique of the United Nations Women, Peace, and Security Agenda

Authors: Seember Susan Aondoakura

Abstract:

This paper examines the international legal framework established to address the challenges women and girls experience in situations of violent conflict. The United Nations (UN) women, peace, and security agenda (hereafter WPS agenda, the Agenda) aspire to make wars safer for women. It recognizes women's agency in armed conflict and their victimization and formulates measures for their protection. The Agenda also acknowledges women's participation in conflict transformation and post-conflict reconstruction. It also calls for the involvement of women in conflict transformation, encourages the protection of women from sex and gender-based violence (SGBV), and provides relief and recovery from conflict-related SGBV. Using Third World Critical Feminist Theory, this paper argues that the WPS agenda overly focus on the protection of women from SGBV occurring in the less developed and conflict-ridden states in the global south, obscures the complicity of western states and economies to the problem, and silences the privileges that such states derive from war economies that continue to fuel conflict. This protectionist approach of the UN also obliterates other equally pressing problems in need of attention, like the high rates of economic degradation in conflict-ravaged societies of the global south. Prioritising protection also 'others' the problem, obliterating any sense of interconnections across geographical locations and situating women in the less developed economies of the global south as the victims and their men as the perpetrators. Prioritising protection ultimately situates western societies as saviours of Third World women with no recourse to their role in engendering and sustaining war. The paper demonstrates that this saviour mentality obliterates chances of any meaningful coalition between the local and the international in framing and addressing the issue, as solutions are formulated from a specific lens—the white hegemonic lens.

Keywords: conflict, protection, security, SGBV

Procedia PDF Downloads 67
16370 Vegetable Oil-Based Anticorrosive Coatings for Metals Protection

Authors: Brindusa Balanuca, Raluca Stan, Cristina Ott, Matei Raicopol

Abstract:

The current study aims to develop anti corrosive coatings using vegetable oil (VO)-based polymers. Due to their chemical versatility, reduced costs and more important, higher hydrophobicity, VO’s are great candidates in the field of anti-corrosive materials. Lignin (Ln) derivatives were also used in this research study in order to achieve performant hydrophobic anti-corrosion layers. Methods Through a rational functionalization pathway, the selected VO (linseed oil) is converted to more reactive monomer – methacrylate linseed oil (noted MLO). The synthesized MLO cover the metals surface in a thin layer and through different polymerization techniques (using visible radiation or temperature, respectively) and well-established reaction conditions, is converted to a hydrophobic coating capable to protect the metals against corrosive factors. In order to increase the anti-corrosion protection, lignin (Ln) was selected to be used together with MLO macromonomer. Thus, super hydrophobic protective coatings will be formulated. Results The selected synthetic strategy to convert the VO in more reactive compounds – MLO – has led to a functionalization degree of greater than 80%. The obtained monomers were characterized through NMR and FT-IR by monitoring the characteristic signals after each synthesis step. Using H-NMR data, the functionalization degrees were established. VO-based and also VO-Ln anti corrosion formulations were both photochemical and thermal polymerized in specific reaction conditions (initiators, temperature range, reaction time) and were tested as anticorrosive coatings. Complete and advances characterization of the synthesized materials will be presented in terms of thermal, mechanical and morphological properties. The anticorrosive properties were also evaluated and will be presented. Conclusions Through the design strategy briefly presented, new composite materials for metal corrosion protection were successfully developed, using natural derivatives: vegetable oils and lignin, respectively.

Keywords: anticorrosion protection, hydrophobe layers, lignin, methacrylates, vegetable oil

Procedia PDF Downloads 148
16369 A Light in the Road of Protection of Civilians: Responsibility to Protect

Authors: Zeynep Selin Acar

Abstract:

In the world of wars, it is aimed to find ways to protect civilians propound by political elites. Current threats may come from edges of the security concerns, meaning uncontrollable terrorist groups, unanticipated government-supported armed groups or separatists, and unimaginable merge of the previous with foreign supports or oppositions of which could flow into all groups– flaws of international state system. These threats resulted in transformation of inter-state system into a world system with distinctive actors and brought along the changes in strategic plans of political and military bodies, as well as adaptations of principles framing the strategies in terms of may-be-applicable international law constrained by ethical considerations. This paper aims to analyse the Responsibility to Protect (RtoP), being one of those, with its criteria aiming to regulate military interventions taking the protection of civilians both as the reason for intervention, jus ad bellum or right to war, and as the duties during the intervention, jus in bello or how to conduct the war. In addition it will discuss the rise of its bindingness in terms of Responsibility Not to Veto (RNtoV), Franco/Mexican Political Declaration opened in signature for UN member states on September 2015.

Keywords: civilian protection, protection as responsibility, responsibility to protect, responsibility not to veto

Procedia PDF Downloads 234
16368 Regulating Issues concerning Data Protection in Cloud Computing: Developing a Saudi Approach

Authors: Jumana Majdi Qutub

Abstract:

Rationale: Cloud computing has rapidly developed the past few years. Because of the importance of providing protection for personal data used in cloud computing, the role of data protection in promoting trust and confidence in users’ data has become an important policy priority. This research examines key regulatory challenges rose by the growing use and importance of cloud computing with focusing on protection of individuals personal data. Methodology: Describing and analyzing governance challenges facing policymakers and industry in Saudi Arabia, with an account of anticipated governance responses. The aim of the research is to describe and define the regulatory challenges on cloud computing for policy making in Saudi Arabia and comparing it with potential complied issues rose in respect of transported data to EU member state. In addition, it discusses information privacy issues. Finally, the research proposes policy recommendation that would resolve concerns surrounds the privacy and effectiveness of clouds computing frameworks for data protection. Results: There are still no clear regulation in Saudi Arabia specialized in legalizing cloud computing and specialty regulations in transferring data internationally and locally. Decision makers need to review the applicable law in Saudi Arabia that protect information in cloud computing. This should be from an international and a local view in order to identify all requirements surrounding this area. It is important to educate cloud computing users about their information value and rights before putting it in the cloud to avoid further legal complications, such as making an educational program to prevent giving personal information to a bank employee. Therefore, with many kinds of cloud computing services, it is important to have it covered by the law in all aspects.

Keywords: cloud computing, cyber crime, data protection, privacy

Procedia PDF Downloads 232
16367 Acetalization of Carbonyl Compounds by Using Al2 (HPO4)3 under Green Condition Mg HPO4

Authors: Fariba Jafari, Samaneh Heydarian

Abstract:

Al2(HPO4)3 was easily prepared and used as a solid acid in acetalization of carbonyl compounds at room temperature and under solvent-free conditions. The protection was done in short reaction times and in good to high isolated yields. The cheapness and availability of this reagent with easy procedure and work-up make this method attractive for the organic synthesis.

Keywords: acetalization, acid catalysis, carbonylcompounds, green condition, protection

Procedia PDF Downloads 295
16366 The Implementation of Anti-Circumvention Legislations in Thai Copyright System

Authors: Chuencheewin Yimfuang

Abstract:

The WIPO copyright treaty (WCT) was established by the World Intellectual Property Organisation (WIPO). This agreement required the contracting nations to provide adequate protection to technological measures to prevent massive copyright infringement in the internet system. Thailand had to implement the anti-circumvention rules into domestic legislation to comply with this international obligation. The purpose of this paper is to critically discuss the legislative standard under the WCT. It also aims to examine the legal development of technological protection measures in Thailand and demonstrate that the scope of prohibitions under the copyright Act 2022 (NO.5) is similar to the Digital Millennium Copyright Act 1998 (DMCA) of the United States (US). It could be found that the anti-circumvention laws of Thailand prohibit the circumvention of access-control technologies, and the regulation on trafficking circumvention devices has been added to the latest version of the Thai Copyright Act. These legislative evolutions have revealed the attempt to reinforce the legal protection of technological measures and copyright holders in order to be in line with global practices. However, the amendment has problems concerning the legal definitions of effective technological measure and the prohibited act of circumvention. The vagueness might affect the scope of protection and the boundary of prohibition. With this aspect, the DMCA will be evaluated and compared to gain guidelines for interpretation and enforcement in Thailand. The lessons and experiences learned from this study might be useful to correct the flaws or at least clarify the ambiguities embodied in Thai copyright legislation.

Keywords: legal development, technological protection measure, circumvention, Thailand

Procedia PDF Downloads 61
16365 Corrosion Protection of Steel 316 by Electrochemically Synthesized Conductive Poly (O-Toluidine)

Authors: H. Acar, M. Karakışla, L. Aksu, M. Saçak

Abstract:

The corrosion protection effect of poly(o-toluidine) (POT) coated on steel 316 electrode was determined in corrosive media such as NaCl, H2SO4 and HCl with the use of Tafel curves and electrochemical impedance spectroscopy techniques. The POT coatings were prepared with cyclic voltammetry technique in aqueous solution of oxalic acid and they were characterized by FTIR and UV-Visible absorption spectroscopy. The Tafel curves revealed that the POT coating provides the most effective protection compared to the bare steel 316 electrode in NaCl as corrosive medium. The results were evaluated based upon data decrease of corrosion current and shift to positive potentials with the increase of number of scans. Electrochemical impedance spectroscopy measurements were found to support Tafel data of POT coating.

Keywords: corrosion, impedance spectroscopy, steel 316, poly(o-toluidine)

Procedia PDF Downloads 283
16364 Digital Watermarking Using Fractional Transform and (k,n) Halftone Visual Cryptography (HVC)

Authors: R. Rama Kishore, Sunesh Malik

Abstract:

Development in the usage of internet for different purposes in recent times creates great threat for the copy right protection of the digital images. Digital watermarking is the best way to rescue from the said problem. This paper presents detailed review of the different watermarking techniques, latest trends in the field and categorized like spatial and transform domain, blind and non-blind methods, visible and non visible techniques etc. It also discusses the different optimization techniques used in the field of watermarking in order to improve the robustness and imperceptibility of the method. Different measures are discussed to evaluate the performance of the watermarking algorithm. At the end, this paper proposes a watermarking algorithm using (k.n) shares of halftone visual cryptography (HVC) instead of (2, 2) share cryptography. (k,n) shares visual cryptography improves the security of the watermark. As halftone is a method of reprographic, it helps in improving the visual quality of watermark image. The proposed method uses fractional transformation to improve the robustness of the copyright protection of the method.

Keywords: digital watermarking, fractional transform, halftone, visual cryptography

Procedia PDF Downloads 319
16363 The Search of New Laws for a Gluten Kingdom

Authors: Mohammed Saleem Tariq

Abstract:

The enthusiasm for gluten avoidance in a growing market is met by improvements in sensitive detection methods for analysing gluten content. Paradoxically, manufacturers employ no such systems in the production process but continue to market their product as gluten free, a significant risk posed to an undetermined coeliac population. The paper resonates with an immunological response that causes gastrointestinal scarring and villous atrophy with the conventional description of personal injury. The current developing regime in the UK however, it is discussed, has avoided creating specific rules to provide an adequate level of protection for this type of vulnerable ‘characteristic’. Due to the struggle involved with identifying an appropriate cause of action, this paper analyses whether a claim brought in misrepresentation, negligence and/or under the Consumer Protect Act 1987 could be sustained. A necessary comparison is then made with the approach adopted by the Americans with Disability Act 1990 which recognises this chronic disease as a disability. The ongoing failure to introduce a level of protection which matches that afforded to those who fall into any one of the ‘protected characteristics’ under the Equality Act 2010, is inconceivable given the outstanding level of legal vulnerability.

Keywords: coeliac, litigation, misrepresentation, negligence

Procedia PDF Downloads 340
16362 Privacy Protection Principles of Omnichannel Approach

Authors: Renata Mekovec, Dijana Peras, Ruben Picek

Abstract:

The advent of the Internet, mobile devices and social media is revolutionizing the experience of retail customers by linking multiple sources through various channels. Omnichannel retailing is a retailing that combines multiple channels to allow customers to seamlessly leverage all the distribution information online and offline while shopping. Therefore, today data are an asset more critical than ever for all organizations. Nonetheless, because of its heterogeneity through platforms, developers are currently facing difficulties in dealing with personal data. Considering the possibilities of omnichannel communication, this paper presents channel categorization that could enhance the customer experience of omnichannel center called hyper center. The purpose of this paper is fundamentally to describe the connection between the omnichannel hyper center and the customer, with particular attention to privacy protection. The first phase was finding the most appropriate channels of communication for hyper center. Consequently, a selection of widely used communication channels has been identified and analyzed with regard to the effect requirements for optimizing user experience. The evaluation criteria are divided into 3 groups: general, user profile and channel options. For each criterion the weight of importance for omnichannel communication was defined. The most important thing was to consider how the hyper center can make user identification while respecting the privacy protection requirements. The study carried out also shows what customer experience across digital networks would look like, based on an omnichannel approach owing to privacy protection principles.

Keywords: personal data, privacy protection, omnichannel communication, retail

Procedia PDF Downloads 112
16361 Broad Protection against Avian Influenza Virus by Using a Modified Vaccinia Ankara Virus Expressing a Mosaic Hemagglutinin

Authors: Attapon Kamlangdee, Brock Kingstad-Bakke, Tavis K. Anderson, Tony L. Goldberg, Jorge E. Osorio

Abstract:

A critical failure in our preparedness for an influenza pandemic is the lack of a universal vaccine. Influenza virus strains diverge by 1 to 2% per year, and commercially available vaccines often do not elicit protection from one year to the next, necessitating frequent formulation changes. This represents a major challenge to the development of a cross-protective vaccine that can protect against circulating viral antigenic diversity. We have constructed a recombinant modified vaccinia virus Ankara (MVA) that expresses an H5N1 mosaic hemagglutinin (H5M) (MVA-H5M). This mosaic was generated in silico using 2,145 field-sourced H5N1 isolates. A single dose of MVA-H5M provided 100% protection in mice against clade 0, 1, and 2 avian influenza viruses and also protected against seasonal H1N1 virus (A/Puerto Rico/8/34). It also provided short-term (10 days) and long-term (6 months) protection post vaccination. Both neutralizing antibodies and antigen-specific CD4+and CD8+ T cells were still detected at 5 months post vaccination, suggesting that MVA-H5M provides long-lasting immunity.

Keywords: modified vaccinia Ankara, MVA, H5N1, hemagglutinin, influenza vaccine

Procedia PDF Downloads 257
16360 Biological Treatment of Tannery Wastewater Using Pseudomonas Strains

Authors: A. Benhadji, R. Maachi

Abstract:

Environmental protection has become a major economic development issues. Indeed, the environment has become both market growth factor and element of competition. It is now an integral part of all industrial strategies. Ecosystem protection is based on the reduction of the pollution load in the treatment of liquid waste. The physicochemical techniques are commonly used which a transfer of pollution is generally found. Alternative to physicochemical methods is the use of microorganisms for cleaning up the waste waters. The objective of this research is the evaluation of the effects of exogenous added Pseudomonas strains on pollutants biodegradation. The influence of the critical parameters such as inoculums concentration and duration treatment are studied. The results show that Pseudomonas putida is found to give a maximum reduction in chemical organic demand (COD) in 4 days of incubation. However, toward to protect biological pollution of environment, the treatment is achieved by electro coagulation process using aluminium electrodes. The results indicate that this process allows disinfecting the water and improving the electro coagulated sludge quality.

Keywords: tannery, pseudomonas, biological treatment, electrocoagulation process, sludge quality

Procedia PDF Downloads 332
16359 Migration-Related Challenges during the Covid-19 Pandemic in South Africa. A Case of Alexandra Township

Authors: Edwin Mwasakidzeni Mutyenyoka

Abstract:

Without ignoring migration-related challenges in transit zones and places of origin, this inquiry focuses on arrived international immigrants’ exacerbated vulnerability during crises. The aim is to underline longstanding inequalities and demonstrate that crises merely amplify and exacerbate challenges that low-income migrants already face during ‘non-crises’ periods. Social protection, as an agenda for reducing vulnerability, poverty, and risk for low-income households, with regard to basic consumption and services, has been foregrounded in the post-apartheid development discourse in South Africa. Evidently, however, the state, through the South African Social Security Agency (SASSA), systemically excludes the majority of non-citizens from state-sponsored social assistance programs - often leaving them heavily dependent on sporadic non-state options and erosive coping mechanisms. In this paper, migration itself should not only be understood as a social protection strategy against poverty and risk but also as a source of vulnerability that often requires social protection. For quasi-ethnographic, it use one migrant destination, Alex Park Township, as a “contact zone” and space of negotiation during the pandemic.

Keywords: south-south migration, crises, social protection, Covid-19 pandemic

Procedia PDF Downloads 68
16358 Juridical Protection to Consumers in Electronic Contracts: Need of a Uniform International Law

Authors: Parul Sinha

Abstract:

Electronic commerce facilitates increased choice and information on goods or services for consumers but at the same time it compounds the inequality of bargaining power many consumers face when contracting with sellers. Due to the ‘inequality of bargaining power’ experienced by consumers when contracting by electronic means with business sellers in different jurisdictions, it may be difficult to determine where either the consumer is domiciled or the place where the seller is situated or conducts its business. The question arises in such situation that if one party wants to sue the other, then where can one sue? Which court has jurisdiction to try international conflicts arising from electronic contracts concluded through the internet? Will the same rules applicable to conventional contracts apply? Or should other considerations be taken into account? In all these situations the degree of consumer protection in electronic contracts comes into picture. In the light of the above, the paper discusses the jurisdiction and choice of law rules applied in EU and United States. Further, the paper considers the current uncertainty plaguing questions of jurisdiction in India. Therefore, the jurisdiction and choice of law rules for electronic contracts must be applied consistently and provide an automatic, harmonised rule in favour of the consumer’s jurisdiction and law. Lastly, the paper suggests the need for a uniform law in order to achieve effective juridical protection.

Keywords: electronic commerce, electronic contracts, jurisdiction, consumer protection

Procedia PDF Downloads 216
16357 Simulation of Hamming Coding and Decoding for Microcontroller Radiation Hardening

Authors: Rehab I. Abdul Rahman, Mazhar B. Tayel

Abstract:

This paper presents a method of hardening the 8051 microcontroller, that able to assure reliable operation in the presence of bit flips caused by radiation. Aiming at avoiding such faults in the 8051 microcontroller, Hamming code protection was used in its SRAM memory and registers. A VHDL code and its simulation have been used for this hamming code protection.

Keywords: radiation, hardening, bitflip, hamming

Procedia PDF Downloads 473
16356 Acid-Responsive Polymer Conjugates as a New Generation of Corrosion Protecting Materials

Authors: Naruphorn Dararatana, Farzad Seidi, Daniel Crespy

Abstract:

Protection of metals is a critical issue in industry. The annual cost of corrosion in the world is estimated to be about 2.5 trillion dollars and continuously increases. Therefore, there is a need for developing novel protection approaches to improve corrosion protection. We designed and synthesized smart polymer/corrosion inhibitor conjugates as new generations of corrosion protecting materials. Firstly, a polymerizable acrylate derivative of 8-hydroxyquinoline (8HQ), an effective corrosion inhibitor, containing acid-labile β-thiopropionate linkage was prepared in three steps. Then, it was copolymerized with ethyl acrylate in the presence of 1,1′-azobis(cyclohexanecarbonitrile) (ABCN) by radical polymerization. Nanoparticles with an average diameter of 140 nm were prepared from the polymer conjugate by the miniemulsion-solvent evaporation process. The release behavior of 8HQ from the the nanoparticles was studied in acidic (pH 3.5) and neutral media (pH 7.0). The release profile showed a faster release of 8HQ in acidic medium in comparison with neutral medium. Indeed 100% of 8HQ was released after 14 days in acidic medium whereas only around 15% of 8HQ was released during the same period at neutral pH. Therefore, the polymer conjugate nanoparticles are suitable materials as additives or to form coatings on metal substrates for corrosion protection.

Keywords: Corrosion inhibitor, 8-Hydroxyquinoline, Polymer conjugated, β-Thiopropionate

Procedia PDF Downloads 165
16355 Thermal Method for Testing Small Chemisorbent Samples on the Base of Potassium Superoxide

Authors: Pavel V. Balabanov, Daria A. Liubimova, Aleksandr P. Savenkov

Abstract:

The increase of technogenic and natural accidents, accompanied by air pollution, for example, by combustion products, leads to the necessity of respiratory protection. This work is devoted to the development of a calorimetric method and a device which allow investigating quickly the kinetics of carbon dioxide sorption by chemo-sorbents on the base of potassium superoxide in order to assess the protective properties of respiratory protective closed-circuit apparatus. The features of the traditional approach for determining the sorption properties in a thin layer of chemo-sorbent are described, as well as methods and devices, which can be used for the sorption kinetics study. The authors of the paper developed an approach (as opposed to the traditional approach) based on the power measurement of internal heat sources in the chemo-sorbent layer. The emergence of the heat sources is a result of the exothermic reaction of carbon dioxide sorption. This approach eliminates the necessity of chemical analysis of samples and can significantly reduce the time and material expenses during chemo-sorbents testing. The error of determining the volume fraction of adsorbed carbon dioxide by the developed method does not exceed 12%. Taking into account the efficiency of the method, we consider that it is a good alternative to traditional methods of chemical analysis under the assessment of the protection sorbents quality.

Keywords: carbon dioxide chemisorption, exothermic reaction, internal heat sources, respiratory protective apparatus

Procedia PDF Downloads 380
16354 Adaptive Envelope Protection Control for the below and above Rated Regions of Wind Turbines

Authors: Mustafa Sahin, İlkay Yavrucuk

Abstract:

This paper presents a wind turbine envelope protection control algorithm that protects Variable Speed Variable Pitch (VSVP) wind turbines from damage during operation throughout their below and above rated regions, i.e. from cut-in to cut-out wind speed. The proposed approach uses a neural network that can adapt to turbines and their operating points. An algorithm monitors instantaneous wind and turbine states, predicts a wind speed that would push the turbine to a pre-defined envelope limit and, when necessary, realizes an avoidance action. Simulations are realized using the MS Bladed Wind Turbine Simulation Model for the NREL 5 MW wind turbine equipped with baseline controllers. In all simulations, through the proposed algorithm, it is observed that the turbine operates safely within the allowable limit throughout the below and above rated regions. Two example cases, adaptations to turbine operating points for the below and above rated regions and protections are investigated in simulations to show the capability of the proposed envelope protection system (EPS) algorithm, which reduces excessive wind turbine loads and expectedly increases the turbine service life.

Keywords: adaptive envelope protection control, limit detection and avoidance, neural networks, ultimate load reduction, wind turbine power control

Procedia PDF Downloads 106
16353 Analyzing Current Transformers Saturation Characteristics for Different Connected Burden Using LabVIEW Data Acquisition Tool

Authors: D. Subedi, S. Pradhan

Abstract:

Current transformers are an integral part of power system because it provides a proportional safe amount of current for protection and measurement applications. However when the power system experiences an abnormal situation leading to huge current flow, then this huge current is proportionally injected to the protection and metering circuit. Since the protection and metering equipment’s are designed to withstand only certain amount of current with respect to time, these high currents pose a risk to man and equipment. Therefore during such instances, the CT saturation characteristics have a huge influence on the safety of both man and equipment and also on the reliability of the protection and metering system. This paper shows the effect of burden on the Accuracy Limiting factor/ Instrument security factor of current transformers and also the change in saturation characteristics of the CT’s. The response of the CT to varying levels of overcurrent at different connected burden will be captured using the data acquisition software LabVIEW. Analysis is done on the real time data gathered using LabVIEW. Variation of current transformer saturation characteristics with changes in burden will be discussed.

Keywords: accuracy limiting factor, burden, current transformer, instrument security factor, saturation characteristics

Procedia PDF Downloads 394
16352 Payments for Forest Environmental Services: Advantages and Disadvantages in the Different Mechanisms in Vietnam North Central Area

Authors: Huong Nguyen Thi Thanh, Van Mai Thi Khanh

Abstract:

For around the world, payments for environmental services have been implemented since the late 1970s in Europe and North America; then, it was spread to Latin America, Asia, Africa, and finally Oceania in 2008. In Vietnam, payments for environmental services are an interesting issue recently with the forest as the main focus and therefore known as the program on payment for forest environmental services (PFES). PFES was piloted in Lam Dong and Son La in 2008 and has been widely applied in many provinces after 2010. PFES is in the orientation for the socialization of national forest protection in Vietnam and has made great strides in the last decade. By using the primary data and secondary data simultaneously, the paper clarifies two cases of implementing PFES in the Vietnam North Central area with the different mechanisms of payment. In the first case at Phu Loc district (Thua Thien Hue province), PFES is an indirect method by a water supply company via the Forest Protection and Development Fund. In the second one at Phong Nha – Ke Bang National Park (Quang Binh Province), tourism companies are the direct payers to forest owners. The paper describes the PFES implementation process at each site, clarifies the payment mechanism, and models the relationship between stakeholders in PFES implementation. Based on the current status of PFES sites, the paper compares and analyzes the advantages and disadvantages of the two payment methods. Finally, the paper proposes recommendations to improve the existing shortcomings in each payment mechanism.

Keywords: advantages and disadvantages, forest environmental services, forest protection, payment mechanism

Procedia PDF Downloads 95
16351 A Biometric Template Security Approach to Fingerprints Based on Polynomial Transformations

Authors: Ramon Santana

Abstract:

The use of biometric identifiers in the field of information security, access control to resources, authentication in ATMs and banking among others, are of great concern because of the safety of biometric data. In the general architecture of a biometric system have been detected eight vulnerabilities, six of them allow obtaining minutiae template in plain text. The main consequence of obtaining minutia templates is the loss of biometric identifier for life. To mitigate these vulnerabilities several models to protect minutiae templates have been proposed. Several vulnerabilities in the cryptographic security of these models allow to obtain biometric data in plain text. In order to increase the cryptographic security and ease of reversibility, a minutiae templates protection model is proposed. The model aims to make the cryptographic protection and facilitate the reversibility of data using two levels of security. The first level of security is the data transformation level. In this level generates invariant data to rotation and translation, further transformation is irreversible. The second level of security is the evaluation level, where the encryption key is generated and data is evaluated using a defined evaluation function. The model is aimed at mitigating known vulnerabilities of the proposed models, basing its security on the impossibility of the polynomial reconstruction.

Keywords: fingerprint, template protection, bio-cryptography, minutiae protection

Procedia PDF Downloads 141
16350 Implications of Measuring the Progress towards Financial Risk Protection Using Varied Survey Instruments: A Case Study of Ghana

Authors: Jemima C. A. Sumboh

Abstract:

Given the urgency and consensus for countries to move towards Universal Health Coverage (UHC), health financing systems need to be accurately and consistently monitored to provide valuable data to inform policy and practice. Most of the indicators for monitoring UHC, particularly catastrophe and impoverishment, are established based on the impact of out-of-pocket health payments (OOPHP) on households’ living standards, collected through varied household surveys. These surveys, however, vary substantially in survey methods such as the length of the recall period or the number of items included in the survey questionnaire or the farming of questions, potentially influencing the level of OOPHP. Using different survey instruments can provide inaccurate, inconsistent, erroneous and misleading estimates of UHC, subsequently influencing wrong policy decisions. Using data from a household budget survey conducted by the Navrongo Health Research Center in Ghana from May 2017 to December 2018, this study intends to explore the potential implications of using surveys with varied levels of disaggregation of OOPHP data on estimates of financial risk protection. The household budget survey, structured around food and non-food expenditure, compared three OOPHP measuring instruments: Version I (existing questions used to measure OOPHP in household budget surveys), Version II (new questions developed through benchmarking the existing Classification of the Individual Consumption by Purpose (COICOP) OOPHP questions in household surveys) and Version III (existing questions used to measure OOPHP in health surveys integrated into household budget surveys- for this, the demographic and health surveillance (DHS) health survey was used). Version I, II and III contained 11, 44, and 56 health items, respectively. However, the choice of recall periods was held constant across versions. The sample size for Version I, II and III were 930, 1032 and 1068 households, respectively. Financial risk protection will be measured based on the catastrophic and impoverishment methodologies using STATA 15 and Adept Software for each version. It is expected that findings from this study will present valuable contributions to the repository of knowledge on standardizing survey instruments to obtain estimates of financial risk protection that are valid and consistent.

Keywords: Ghana, household budget surveys, measuring financial risk protection, out-of-pocket health payments, survey instruments, universal health coverage

Procedia PDF Downloads 107
16349 Analyzing the Risk Based Approach in General Data Protection Regulation: Basic Challenges Connected with Adapting the Regulation

Authors: Natalia Kalinowska

Abstract:

The adoption of the General Data Protection Regulation, (GDPR) finished the four-year work of the European Commission in this area in the European Union. Considering far-reaching changes, which will be applied by GDPR, the European legislator envisaged two-year transitional period. Member states and companies have to prepare for a new regulation until 25 of May 2018. The idea, which becomes a new look at an attitude to data protection in the European Union is risk-based approach. So far, as a result of implementation of Directive 95/46/WE, in many European countries (including Poland) there have been adopted very particular regulations, specifying technical and organisational security measures e.g. Polish implementing rules indicate even how long password should be. According to the new approach from May 2018, controllers and processors will be obliged to apply security measures adequate to level of risk associated with specific data processing. The risk in GDPR should be interpreted as the likelihood of a breach of the rights and freedoms of the data subject. According to Recital 76, the likelihood and severity of the risk to the rights and freedoms of the data subject should be determined by reference to the nature, scope, context and purposes of the processing. GDPR does not indicate security measures which should be applied – in recitals there are only examples such as anonymization or encryption. It depends on a controller’s decision what type of security measures controller considered as sufficient and he will be responsible if these measures are not sufficient or if his identification of risk level is incorrect. Data protection regulation indicates few levels of risk. Recital 76 indicates risk and high risk, but some lawyers think, that there is one more category – low risk/now risk. Low risk/now risk data processing is a situation when it is unlikely to result in a risk to the rights and freedoms of natural persons. GDPR mentions types of data processing when a controller does not have to evaluate level of risk because it has been classified as „high risk” processing e.g. processing on a large scale of special categories of data, processing with using new technologies. The methodology will include analysis of legal regulations e.g. GDPR, the Polish Act on the Protection of personal data. Moreover: ICO Guidelines and articles concerning risk based approach in GDPR. The main conclusion is that an appropriate risk assessment is a key to keeping data safe and avoiding financial penalties. On the one hand, this approach seems to be more equitable, not only for controllers or processors but also for data subjects, but on the other hand, it increases controllers’ uncertainties in the assessment which could have a direct impact on incorrect data protection and potential responsibility for infringement of regulation.

Keywords: general data protection regulation, personal data protection, privacy protection, risk based approach

Procedia PDF Downloads 223
16348 A Comparative Assessment of the FoodSupply Vulnerability to Large-Scale Disasters in OECD Countries

Authors: Karolin Bauer, Anna Brinkmann

Abstract:

Vulnerabilities in critical infrastructure can cause significant difficulties for the affected population during crises. Securing the food supply as part of the critical infrastructure in crisis situations is an essential part of public services and a ground stone for a successful concept of civil protection. In most industrialized countries, there are currently no comparative studies regarding the food supply of the population during crisis and disaster events. In order to mitigate the potential impact in case of major disasters in Germany, it is absolutely necessary to investigate how the food supply can be secured. The research project aims to provide in-depth research on the experiences gathered during past large-scale disasters in the 34 OECD member countries in order to discover alternatives for an updated civil protection system in Germany. The basic research question is: "Which international approaches and structures of civil protection have been proven and would be useful to modernize the German civil protection with regards to the critical infrastructure and food supply?" Research findings should be extracted from an extensive literature review covering the entire research period as well as from personal and online-based interviews with experts and responsible persons from involved institutions. The capability of the research project insists on the deliberate choice to investigate previous large-scale disasters to formulate important and practical approaches to modernize civil protection in Germany.

Keywords: food supply, vulnerabilty, critical infratstructure, large-scale disaster

Procedia PDF Downloads 312
16347 Protective Custody in Child Protection: Reflection of Residential Care Workers in the Philippines

Authors: Hazel S. Cometa-Lamberte

Abstract:

This paper presents the residential care workers reflections in working with children who were under protective custody and placed in a residential care facility for children. Key informant interviews and focus group discussion were employed in this study to analyze the views of residential care workers on the programs and services and case management system in residential care for children. Results suggest that working in a residential care facility for children needs the interplay of both the worker’s personal and professional values, knowledge and skills in working with children. Analyzing the residential care workers experiences in handling children in residential care facilities is vital for the improvement of the policies, programs and services, the repertoire of techniques and facilitate the creation of a new social work practice framework/model in child protection specifically in residential care facilities.

Keywords: child protection, residential care, residential care workers, social workers

Procedia PDF Downloads 139
16346 Synthesis and Properties of Nanosized Mixed Oxide Systems for Environmental Protection

Authors: I. Yordanova, H. Kolev, S. Todorova, Z. Cherkezova-Zheleva

Abstract:

Catalysis plays a key role in solving many environmental problems by establishing efficient catalytic systems for environmental protection and reducing emissions of greenhouse gases from industry. Volatile organic compounds are major air pollutants. There are several ways to dispose of emissions like - adsorption, condensation, absorption, bio-filtration, thermal, catalytic, plasma and ultraviolet oxidation. The catalytic oxidation has more advantages over other methods. For example - lower energy consumption; the concentration of the organic contaminant may be low or may vary within wide limits. Catalysts for complete oxidation of VOCs can be classified into three categories: noble metal, metal oxides or supported metal oxides and mixture of noble metals and metal oxides. Most of the catalysts for the complete catalytic oxidation are based on Pt, Pd, Rh or a combination thereof. The oxides of the transition metal are one of the alternatives to noble metal catalysts for these reactions. They are less active at low temperatures, but at higher - their activity is similar. The properties of the catalyst depend on the distribution of the active phase, the medium type of the pre-treatment, the interaction between the active phase and the support and the interaction between the active phase and the reaction medium. Supported mono-component Mn and bi-component Mn-Co systems are examined in present study. The samples are prepared using co-precipitation method. SiO2 (Aerosil) is used as a support. The studied samples were precipitated by NH4OH. The synthesized samples were characterized by XRD, XPS, TPR and tested in the catalytic reaction of complete oxidation of n-hexane, propane, methanol, ethanol and propanol.

Keywords: catalytic oxidation, Co-Mn oxide, oxidation of hydrocarbons and alcohols, environmental protection

Procedia PDF Downloads 362
16345 Utilization Reactive Dilutes to Improve the Properties of Epoxy Resin as Anticorrosion Coating

Authors: El-Sayed Negim, Ainakulova D. T., Puteri S. M., Khaldun M. Azzam, Bekbayeva L. K., Arpit Goyal, Ganjian E.

Abstract:

Anticorrosion coatings protect metal surfaces from environmental factors including moisture, oxygen, and gases that caused corrosion to the metal. Various types of anticorrosion coatings are available, with different properties and application methods. Many researchers have been developing methods to prevent corrosion, and epoxy polymers are one of the wide methods due to their excellent adhesion, chemical resistance, and durability. In this study, synthesis reactive dilute based on glycidyl methacrylate (GMA) with each of 2-ethylhexyl acrylate (2-EHA) and butyl acrylate (BuA) to improve the performance of epoxy resin and anticorrosion coating. The copolymers were synthesized with composition ratio (5/5) by bulk polymerization technique using benzoyl peroxide as a catalyst and temperature at 85 oC for 2 hours and at 90 oC for 30 minutes to complete the polymerization process. The obtained copolymers were characterized by FTIR, viscosity and thixotropic index. The effect of copolymers as reactive dilute on the physical and mechanical properties of epoxy resin was investigated. Metal plates coated by the modified epoxy resins with different contents of copolymers were tested using alkali and salt test methods, and the copolymer based on GMA and BUA showed the best protection efficiency due to the barrier effect of the polymer layer.

Keywords: epoxy, coating, dilute, corrosion, reactive

Procedia PDF Downloads 5
16344 Data Protection, Data Privacy, Research Ethics in Policy Process Towards Effective Urban Planning Practice for Smart Cities

Authors: Eugenio Ferrer Santiago

Abstract:

The growing complexities of the modern world on high-end gadgets, software applications, scams, identity theft, and Artificial Intelligence (AI) make the “uninformed” the weak and vulnerable to be victims of cybercrimes. Artificial Intelligence is not a new thing in our daily lives; the principles of database management, logical programming, and garbage in and garbage out are all connected to AI. The Philippines had in place legal safeguards against the abuse of cyberspace, but self-regulation of key industry players and self-protection by individuals are primordial to attain the success of these initiatives. Data protection, Data Privacy, and Research Ethics must work hand in hand during the policy process in the course of urban planning practice in different environments. This paper focuses on the interconnection of data protection, data privacy, and research ethics in coming up with clear-cut policies against perpetrators in the urban planning professional practice relevant in sustainable communities and smart cities. This paper shall use expository methodology under qualitative research using secondary data from related literature, interviews/blogs, and the World Wide Web resources. The claims and recommendations of this paper will help policymakers and implementers in the policy cycle. This paper shall contribute to the body of knowledge as a simple treatise and communication channel to the reading community and future researchers to validate the claims and start an intellectual discourse for better knowledge generation for the good of all in the near future.

Keywords: data privacy, data protection, urban planning, research ethics

Procedia PDF Downloads 26