Search results for: general data protection regulation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9071

Search results for: general data protection regulation

8951 Generic Model for Timetabling Problems by Integer Linear Programming Approach

Authors: N. A. H. Aizam, V. Uvaraja

Abstract:

The agenda of showing the scheduled time for performing certain tasks is known as timetabling. It is widely used in many departments such as transportation, education, and production. Some difficulties arise to ensure all tasks happen in the time and place allocated. Therefore, many researchers invented various programming models to solve the scheduling problems from several fields. However, the studies in developing the general integer programming model for many timetabling problems are still questionable. Meanwhile, this thesis describes about creating a general model which solves different types of timetabling problems by considering the basic constraints. Initially, the common basic constraints from five different fields are selected and analyzed. A general basic integer programming model was created and then verified by using the medium set of data obtained randomly which is much similar to realistic data. The mathematical software, AIMMS with CPLEX as a solver has been used to solve the model. The model obtained is significant in solving many timetabling problems easily since it is modifiable to all types of scheduling problems which have same basic constraints.

Keywords: AIMMS mathematical software, integer linear programming, scheduling problems, timetabling.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3034
8950 The Key Challenges of the New Bank Regulations

Authors: Petr Teply

Abstract:

The New Basel Capital Accord (Basel II) influences how financial institutions around the world, and especially European Union institutions, determine the amount of capital to reserve. However, as the recent global crisis has shown, the revision of Basel II is needed to reflect current trends, such as increased volatility and correlation, in the world financial markets. The overall objective of Basel II is to increase the safety and soundness of the international financial system. Basel II builds on three main pillars: Pillar I deals with the minimum capital requirements for credit, market and operational risk, Pillar II focuses on the supervisory review process and finally Pillar III promotes market discipline through enhanced disclosure requirements for banks. The aim of this paper is to provide the historical background, key features and impact of Basel II on financial markets. Moreover, we discuss new proposals for international bank regulation (sometimes referred to as Basel III) which include requirements for higher quality, constituency and transparency of banks' capital and risk management, regulation of OTC markets and introduction of new liquidity standards for internationally active banks.

Keywords: Basel II, Basel III, risk management, bank regulation

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2074
8949 Mean-Square Performance of Adaptive Filter Algorithms in Nonstationary Environments

Authors: Mohammad Shams Esfand Abadi, John Hakon Husøy

Abstract:

Employing a recently introduced unified adaptive filter theory, we show how the performance of a large number of important adaptive filter algorithms can be predicted within a general framework in nonstationary environment. This approach is based on energy conservation arguments and does not need to assume a Gaussian or white distribution for the regressors. This general performance analysis can be used to evaluate the mean square performance of the Least Mean Square (LMS) algorithm, its normalized version (NLMS), the family of Affine Projection Algorithms (APA), the Recursive Least Squares (RLS), the Data-Reusing LMS (DR-LMS), its normalized version (NDR-LMS), the Block Least Mean Squares (BLMS), the Block Normalized LMS (BNLMS), the Transform Domain Adaptive Filters (TDAF) and the Subband Adaptive Filters (SAF) in nonstationary environment. Also, we establish the general expressions for the steady-state excess mean square in this environment for all these adaptive algorithms. Finally, we demonstrate through simulations that these results are useful in predicting the adaptive filter performance.

Keywords: Adaptive filter, general framework, energy conservation, mean-square performance, nonstationary environment.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2187
8948 Frequency Regulation Support by Variable-Speed Wind Turbines and SMES

Authors: M. Saleh, H. Bevrani

Abstract:

This paper quantifies the impact of providing a shortterm excess active power support of a variable speed wind turbine (VSWT) and effect of super magnetic energy storage (SMES) unit on frequency control, particularly temporary minimum frequency (TMF) term. To demonstrate the effect of these factors on the power system frequency, a three-area power system is considered as a test system.

Keywords: Frequency regulation, inertia, primary frequencycontrol, rotational energy, variable speed wind turbine.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2222
8947 Design of AC Electronics Load Surge Protection

Authors: N. Mungkung, S. Wongcharoen, C. Sukkongwari, Somchai Arunrungrasmi

Abstract:

This study examines the design and construction of AC Electronics load surge protection in order to carry electric surge load arisen from faults in low voltage electricity system (single phase/220V) by using the principle of electronics load clamping voltage during induction period so that electric voltage could go through to safe load and continue to work. The qualification of the designed device could prevent both transient over voltage and voltage swell. Both will work in cooperation, resulting in the ability to improve and modify the quality of electrical power in Thailand electricity distribution system more effective than the past and help increase the lifetime of electric appliances, electric devices, and electricity protection equipments.

Keywords: Electronics Load, Transient Over Voltage, Voltage Swell.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2673
8946 Volunteers’ Preparedness for Natural Disasters and EVANDE Project

Authors: A. Kourou, A. Ioakeimidou, E. Bafa, C. Fassoulas, M. Panoutsopoulou

Abstract:

The role of volunteers in disaster management is of decisive importance and the need of their involvement is well recognized, both for prevention measures and for disaster management. During major catastrophes, whereas professional personnel are outsourced, the role of volunteers is crucial. In Greece experience has shown that various groups operating in the civil protection mechanism like local administration staff or volunteers, in many cases do not have the necessary knowledge and information on best practices to act against natural disasters. One of the major problems is the lack of volunteers’ education and training. In the above given framework, this paper presents the results of a survey aimed to identify the level of education and preparedness of civil protection volunteers in Greece. Furthermore, the implementation of earthquake protection measures at individual, family and working level, are explored. More specifically, the survey questionnaire investigates issues regarding pre-earthquake protection actions, appropriate attitudes and behaviors during an earthquake and existence of contingency plans in the workplace. The questionnaires were administered to citizens from different regions of the country and who attend the civil protection training program: “Protect Myself and Others”. A closed-form questionnaire was developed for the survey, which contained questions regarding the following: a) knowledge of self-protective actions; b) existence of emergency planning at home; c) existence of emergency planning at workplace (hazard mitigation actions, evacuation plan, and performance of drills); and, d) respondents` perception about their level of earthquake preparedness. The results revealed a serious lack of knowledge and preparedness among respondents. Taking into consideration the aforementioned gap and in order to raise awareness and improve preparedness and effective response of volunteers acting in civil protection, the EVANDE project was submitted and approved by the European Commission (EC). The aim of that project is to educate and train civil protection volunteers on the most serious natural disasters, such as forest fires, floods, and earthquakes, and thus, increase their performance.

Keywords: Civil protection, earthquake preparedness, volunteers.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1214
8945 The Current Status of Middle Class Internet Use in China: An Analysis Based on the Chinese General Social Survey 2015 Data and Semi-Structured Investigation

Authors: Abigail Qian Zhou

Abstract:

In today's China, the well-educated middle class, with stable jobs and above-average income, are the driving force behind its Internet society. Through the analysis of data from the 2015 Chinese General Social Survey and 50 interviewees, this study investigates the current situation of this group’s specific internet usage. The findings of this study demonstrate that daily life among the members of this socioeconomic group is closely tied to the Internet. For Chinese middle class, the Internet is used to socialize and entertain self and others. It is also used to search for and share information as well as to build their identities. The empirical results of this study will provide a reference, supported by factual data, for enterprises seeking to target the Chinese middle class through online marketing efforts.

Keywords: China, internet use, middle class, network behavior, online marketing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 761
8944 A Novel Solution to Restricted Earth Fault Low Impedance Relay Maloperation

Authors: K. N. Dinesh Babu, R. Ramaprabha, V. Rajini, V. Nagarajan

Abstract:

In this paper, various methods of providing restricted earth fault protection are discussed. The proper operation of high and low impedance Restricted Earth Fault (REF) protection for various applications has been discussed. The maloperation of a relay due to improper placement of CTs has been identified and a simple/unique solution has been proposed in this work with a case study. Moreover, it is found that the proper placement of CT in high impedance method will provide the same result with reduced CT. This methodology has been successfully implemented in Al Takreer refinery for a 2000 KVA transformer. The outcome of the paper may be included in IEEEC37.91 standard to give the proper guidance for protection engineers to sort out the issues related to mal functioning of REF relays.

Keywords: Relay maloperation, transformer, low impedance REF, MatLab, 64R, IEEE C37.91.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3924
8943 Contingent Pay and Experience with its use by Organizations of the Czech Republic Operating in the Field of Environmental Protection

Authors: Petra Horváthová, Marcela Davidová, Miroslava Bendová

Abstract:

One part of the total employee-s reward is apart from basic wages or salary, employee-s benefits and intangible elements also so called contingent (variable) pay. Contingent pay is connected to performance, contribution, capcompetency or skills of individual employees, and to team-s or company-wide performance or to combination of few of the mentioned possibilities. Main aim of this article is to define, based on available information, contingent pay, describe reasons for its implementation and arguments for and against this type of remuneration, but also bring information not only about its extent and level of utilization by organizations of the Czech Republic operating in the field of environmental protection, but also mention their practical experience with this type of remuneration.

Keywords: Contingent pay, environmental protection, experience in using, organizations of the Czech Republic.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3831
8942 Analysis of Electrical Installation of a Photovoltaic Power Park in Greece

Authors: D. E. Gourgoulis, C. G. Yakinthos, M. G. Vassiliadou

Abstract:

The scope of this paper is to describe a real electrical installation of renewable energy using photovoltaic cells. The displayed power grid connected network was established in 2007 at area of Northern Greece. The photovoltaic park is composed of 6120 photovoltaic cells able to deliver a total power of 1.101.600 Wp. For the transformation of DC voltage to AC voltage have been used 25 stand alone three phases inverters and for the connection at the medium voltage network of Greek Power Authority have been installed two oil immersed transformer of 630 kVA each one. Due to the wide space area of installation a specific external lightning protection system has been designed. Additionally, due to the sensitive electronics of the control and protection systems of park, surge protection, equipotent bonding and shielding were also of major importance.

Keywords: Inverter, Photovoltaic cells, Transformer.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1566
8941 Active Cyber Defense within the Concept of NATO’s Protection of Critical Infrastructures

Authors: Serkan Yağlı, Selçuk Dal

Abstract:

Cyber attacks pose a serious threat to all states. Therefore, states constantly seek for various methods to encounter those threats. In addition, recent changes in the nature of cyber attacks and their more complicated methods have created a new concept: active cyber defense (ACD). This article tries to answer firstly why ACD is important to NATO and find out the viewpoint of NATO towards ACD. Secondly, infrastructure protection is essential to cyber defense. Critical infrastructure protection with ACD means is even more important. It is assumed that by implementing active cyber defense, NATO may not only be able to repel the attacks but also be deterrent. Hence, the use of ACD has a direct positive effect in all international organizations’ future including NATO.

Keywords: Active cyber defense, advanced persistent treat, critical infrastructure, NATO.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3786
8940 Modeling and Design of an Active Leg Orthosis for Tumble Protection

Authors: Eileen Chih-Ying Yang, Liang-Han Wu, Chieh-Min Chang

Abstract:

The design of an active leg orthosis for tumble protection is proposed in this paper. The orthosis would be applied to assist elders or invalids in rebalancing while they fall unexpectedly. We observe the regain balance motion of healthy and youthful people, and find the difference to elders or invalids. First, the physical model of leg would be established, and we consider the leg motions are achieve through four joints (phalanx stem, ankle, knee, and hip joint) and five links (phalanges, talus, tibia, femur, and hip bone). To formulate the dynamic equations, the coordinates which can clearly describe the position in 3D space are first defined accordance with the human movement of leg, and the kinematics and dynamics of the leg movement can be formulated based on the robotics. For the purpose, assisting elders and invalids in avoiding tumble, the posture variation of unbalance and regaining balance motion are recorded by the motion-capture image system, and the trajectory is taken as the desire one. Then we calculate the force and moment of each joint based on the leg motion model through programming MATLAB code. The results would be primary information of the active leg orthosis design for tumble protection.

Keywords: Active leg orthosis, Tumble protection

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1644
8939 A Silicon Controlled Rectifier-Based ESD Protection Circuit with High Holding Voltage and High Robustness Characteristics

Authors: Kyoung-il Do, Byung-seok Lee, Hee-guk Chae, Jeong-yun Seo Yong-seo Koo

Abstract:

In this paper, a Silicon Controlled Rectifier (SCR)-based Electrostatic Discharge (ESD) protection circuit with high holding voltage and high robustness characteristics is proposed. Unlike conventional SCR, the proposed circuit has low trigger voltage and high holding voltage and provides effective ESD protection with latch-up immunity. In addition, the TCAD simulation results show that the proposed circuit has better electrical characteristics than the conventional SCR. A stack technology was used for voltage-specific applications. Consequentially, the proposed circuit has a trigger voltage of 17.60 V and a holding voltage of 3.64 V.

Keywords: ESD, SCR, latch-up, power clamp, holding voltage.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 830
8938 Controlling Transient Flow in Pipeline Systems by Desurging Tank with Automatic Air Control

Authors: I. Abuiziah, A. Oulhaj, K. Sebari, D. Ouazar

Abstract:

Desurging tank with automatic air control “DTAAC” is a water hammer protection device, operates either an open or closed surge tank according to the water level inside the surge tank, with the volume of air trapped in the filling phase, this protection device has the advantages of its easy maintenance, and does not need to run any external energy source (air compressor). A computer program has been developed based on the characteristic method to simulate flow transient phenomena in pressurized water pipeline systems, it provides the influence of using the protection devices to control the adverse effects due to excessive and low pressure occurring in this phenomena. The developed model applied to a simple main water pipeline system: pump combined with DTAAC connected to a reservoir.  The results obtained provide that the model is an efficient tool for water hammer analysis. Moreover; using the DTAAC reduces the unfavorable effects of the transients.

Keywords: DTAAC, Flow transient, Numerical model, Pipeline system, Protection devices.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2814
8937 The Study on the Overall Protection of the Ancient Villages

Authors: Zhang Yu, Ding Yi

Abstract:

The discussion about elements of cultural heritage and their relevance among the ancient villages is comparably insufficient. The protection work is strongly influenced by touristic development and cultural gimmick, resulting in low protection efficiency and many omissions. Historical villages as the cultural settlement patterns bear a large number of heritage relics. They were regionally scattered with a clear characteristic of gathering. First of all, this study proposes the association and similarities of the forming mechanism between four historic cultural villages in Mian Mountain. Secondly, the study reveals that these villages own the strategic pass, underground passage, and the mountain barrier. Thirdly, based on the differentiated characteristics of villages’ space, the study discusses about the integrated conservation from three levels: the regional heritage conservation, the cultural line shaping, and the featured brand building.

Keywords: Mian Mountain, fortress, historical villages, conservation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 840
8936 Environmental Policy Instruments and Greenhouse Gas Emissions: VAR Analysis

Authors: Veronika Solilová, Danuše Nerudová

Abstract:

The paper examines the interaction between the environmental taxation, size of government spending on environmental protection and greenhouse gas emissions and gross inland energy consumption. The aim is to analyze the effects of environmental taxation and government spending on environmental protection as an environmental policy instruments on greenhouse gas emissions and gross inland energy consumption in the EU15. The empirical study is performed using a VAR approach with the application of aggregated data of EU15 over the period 1995 to 2012. The results provide the evidence that the reactions of greenhouse gas emission and gross inland energy consumption to the shocks of environmental policy instruments are strong, mainly in the short term and decay to zero after about 8 years. Further, the reactions of the environmental policy instruments to the shocks of greenhouse gas emission and gross inland energy consumption are also strong in the short term, however with the deferred effects. In addition, the results show that government spending on environmental protection together with gross inland energy consumption has stronger effect on greenhouse gas emissions than environmental taxes in EU15 over the examined period.

Keywords: VAR analysis, greenhouse gas emissions, environmental taxation, government spending.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1816
8935 Opening up Government Datasets for Big Data Analysis to Support Policy Decisions

Authors: K. Hardy, A. Maurushat

Abstract:

Policy makers are increasingly looking to make evidence-based decisions. Evidence-based decisions have historically used rigorous methodologies of empirical studies by research institutes, as well as less reliable immediate survey/polls often with limited sample sizes. As we move into the era of Big Data analytics, policy makers are looking to different methodologies to deliver reliable empirics in real-time. The question is not why did these people do this for the last 10 years, but why are these people doing this now, and if the this is undesirable, and how can we have an impact to promote change immediately. Big data analytics rely heavily on government data that has been released in to the public domain. The open data movement promises greater productivity and more efficient delivery of services; however, Australian government agencies remain reluctant to release their data to the general public. This paper considers the barriers to releasing government data as open data, and how these barriers might be overcome.

Keywords: Big data, open data, productivity, transparency.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1637
8934 Many-Sided Self Risk Analysis Model for Information Asset to Secure Stability of the Information and Communication Service

Authors: Jin-Tae Lee, Jung-Hoon Suh, Sang-Soo Jang, Jae-Il Lee

Abstract:

Information and communication service providers (ICSP) that are significant in size and provide Internet-based services take administrative, technical, and physical protection measures via the information security check service (ISCS). These protection measures are the minimum action necessary to secure the stability and continuity of the information and communication services (ICS) that they provide. Thus, information assets are essential to providing ICS, and deciding the relative importance of target assets for protection is a critical procedure. The risk analysis model designed to decide the relative importance of information assets, which is described in this study, evaluates information assets from many angles, in order to choose which ones should be given priority when it comes to protection. Many-sided risk analysis (MSRS) grades the importance of information assets, based on evaluation of major security check items, evaluation of the dependency on the information and communication facility (ICF) and influence on potential incidents, and evaluation of major items according to their service classification, in order to identify the ISCS target. MSRS could be an efficient risk analysis model to help ICSPs to identify their core information assets and take information protection measures first, so that stability of the ICS can be ensured.

Keywords: Information Asset, Information CommunicationFacility, Evaluation, ISCS (Information Security Check Service), Evaluation, Grade.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1448
8933 Development of Face Surrogate for Impact Protection Design for Cyclist

Authors: Sanga Monthatipkul, Pio Iovenitti, Igor Sbarski

Abstract:

Bicycle usage for exercise, recreation, and commuting to work in Australia shows that pedal cycling is the fourth most popular activity with 10.6% increase in participants between 2001 and 2007. As with other means of transport, accident and injury becomes common although mandatory bicycle helmet wearing has been introduced. The research aims to develop a face surrogate made of sandwich of rigid foam and rubber sheets to represent human facial bone under blunt impact. The facial surrogate will serve as an important test device for further development of facial-impact protection for cyclist. A test procedure was developed to simulate the energy of impact and record data to evaluate the effect of impact on facial bones. Drop tests were performed to establish a suitable combination of materials. It was found that the sandwich structure of rigid extruded-polystyrene foam (density of 40 kg/m3 with a pattern of 6-mm-holes), Neoprene rubber sponge, and Abrasaflex rubber backing, had impact characteristics comparable to that of human facial bone. In particular, the foam thickness of 30 mm and 25 mm was found suitable to represent human zygoma (cheekbone) and maxilla (upper-jaw bone), respectively.

Keywords: Facial impact protection, face surrogate, cyclist, accident prevention

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1526
8932 A Comparison of Transdiagnostic Components in Generalized Anxiety Disorder, Unipolar Mood Disorder and Nonclinical Population

Authors: I. Abasi, L. Fata, M. Sadeghi, S. Banihashemi, A. Mohammadee

Abstract:

Background: Dimensional and transdiagnostic approaches as a result of high comorbidity among mental disorders have captured researchers and clinicians interests for exploring the latent factors to development and maintenance of some psychological disorders. The goal of present study is comparing some of these common factors between generalized anxiety disorder and unipolar mood disorder. Methods: 27 patients with generalized anxiety disorder, 29 patients with depression disorder were recruited by using SCID-I and 69 non-clinical populations were selected by using GHQ cut off point. MANCOVA was used for analyzing data. Results: The results show that worry, rumination, intolerance of uncertainty, maladaptive metacognitive beliefs, and experiential avoidance were all significantly different between GAD and unipolar mood disorder groups. However, there weren’t any significant differences in difficulties in emotion regulation and neuroticism between GAD and unipolar mood disorder groups. Discussion: Results indicate that although there are some transdiagnostic and common factors in GAD and unipolar mood disorder, there may be some specific vulnerability factors for each disorder. Further study is needed for answering these questions.

Keywords: Depression, emotion regulation, generalized anxiety disorder, transdiagnostic.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3443
8931 Stealthy Network Transfer of Data

Authors: N. Veerasamy, C. J. Cheyne

Abstract:

Users of computer systems may often require the private transfer of messages/communications between parties across a network. Information warfare and the protection and dominance of information in the military context is a prime example of an application area in which the confidentiality of data needs to be maintained. The safe transportation of critical data is therefore often a vital requirement for many private communications. However, unwanted interception/sniffing of communications is also a possibility. An elementary stealthy transfer scheme is therefore proposed by the authors. This scheme makes use of encoding, splitting of a message and the use of a hashing algorithm to verify the correctness of the reconstructed message. For this proof-of-concept purpose, the authors have experimented with the random sending of encoded parts of a message and the construction thereof to demonstrate how data can stealthily be transferred across a network so as to prevent the obvious retrieval of data.

Keywords: Construction, encode, interception, stealthy.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1196
8930 A 5-V to 30-V Current-Mode Boost Converter with Integrated Current Sensor and Power-on Protection

Authors: Jun Yu, Yat-Hei Lam, Boris Grinberg, Kevin Chai Tshun Chuan

Abstract:

This paper presents a 5-V to 30-V current-mode boost converter for powering the drive circuit of a micro-electro-mechanical sensor. The design of a transconductance amplifier and an integrated current sensing circuit are presented. In addition, essential building blocks for power-on protection such as a soft-start and clamp block and supply and clock ready block are discussed in details. The chip is fabricated in a 0.18-μm CMOS process. Measurement results show that the soft-start and clamp block can effectively limit the inrush current during startup and protect the boost converter from startup failure.

Keywords: Boost Converter, Current Sensing, Power-on protection, Step-up Converter, Soft-start.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2047
8929 A Holistic Framework for Unifying Data Security and Management in Modern Enterprises

Authors: Ashly Joseph

Abstract:

Modern businesses struggle significantly to secure and manage their data properly as the volume and complexity of their data both expand exponentially. Through the use of a multi-layered defense strategy, a centralized management platform, and cutting-edge technologies like AI, this research paper presents a comprehensive framework to integrate data security and management. The constraints of current data protection and management strategies, technological advancements, and the evolving threat landscape are all examined in this article. It suggests best practices for putting into practice integrated data security and governance models, placing an emphasis on ongoing adaptation. The advantages mentioned include a strengthened security posture, simpler procedures, lower costs, and reduced complexity. Additionally, issues including skill shortages, antiquated systems, and cultural obstacles are examined. Security executives and Chief Information Security Officers are given practical advice on how to evaluate, plan, and put into place strong data-centric security and management capabilities. The goal of the paper is to provide a thorough study of the data security and management landscape and to arm contemporary businesses with the knowledge they need to be proactive in protecting their data assets.

Keywords: Data security, security management, cloud computing, cybersecurity, data governance, security architecture, data management.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 275
8928 Review of Scouring on Integral Bridge and its Possible Protection

Authors: Shatirah Akib, Teuku K. Syamsura, S.M. Shirazi, Moatasem M. Fayyadh, Budhi Primasari

Abstract:

The purpose of this paper is to summarize the following protection of scouring countermeasures by using Bentonite-Enhanced Sand (BES) mixtures. The concept of underground improvement is being used in this study to reduce the void of the sand. The sand bentonite mixture was used to bond the ground soil conditions surrounding the pile of integral bridge. The right composition of sand bentonite mixture was proposed based on previous findings. The swelling effect of bentonite also was investigated to ensure there is no adverse impact to the structure of the integral bridge. ScourScour, another name for severe erosion, occurs when the erosive capacity of water resulting from natural and manmade events exceeds the ability of earth materials to resist its effects. According to AASHTO LRFD Specifications (Section C3.7.5), scour is the most common reason for the collapse of highway bridges in the United States

Keywords: bentonite, integral bridge, possible protection, scouring

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1774
8927 Acetalization of Carbonyl Compounds by Using Al2 (HPO4)3 under Green Condition Mg HPO4

Authors: Fariba Jafari, Samaneh Heydarian

Abstract:

Al2(HPO4)3 was easily prepared and used as a solid acid in acetalization of carbonyl compounds at room temperature and under solvent-free conditions. The protection was done in short reaction times and in good to high isolated yields. The cheapness and availability of this reagent with easy procedure and work-up make this method attractive for the organic synthesis.

Keywords: Acetalization, acid catalysis, carbonylcompounds, green condition, protection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1342
8926 Data Mining in Medicine Domain Using Decision Trees and Vector Support Machine

Authors: Djamila Benhaddouche, Abdelkader Benyettou

Abstract:

In this paper, we used data mining to extract biomedical knowledge. In general, complex biomedical data collected in studies of populations are treated by statistical methods, although they are robust, they are not sufficient in themselves to harness the potential wealth of data. For that you used in step two learning algorithms: the Decision Trees and Support Vector Machine (SVM). These supervised classification methods are used to make the diagnosis of thyroid disease. In this context, we propose to promote the study and use of symbolic data mining techniques.

Keywords: A classifier, Algorithms decision tree, knowledge extraction, Support Vector Machine.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1870
8925 Improve of Evaluation Method for Information Security Levels of CIIP (Critical Information Infrastructure Protection)

Authors: Dong-Young Yoo, Jong-Whoi Shin, Gang Shin Lee, Jae-Il Lee

Abstract:

As the disfunctions of the information society and social development progress, intrusion problems such as malicious replies, spam mail, private information leakage, phishing, and pharming, and side effects such as the spread of unwholesome information and privacy invasion are becoming serious social problems. Illegal access to information is also becoming a problem as the exchange and sharing of information increases on the basis of the extension of the communication network. On the other hand, as the communication network has been constructed as an international, global system, the legal response against invasion and cyber-attack from abroad is facing its limit. In addition, in an environment where the important infrastructures are managed and controlled on the basis of the information communication network, such problems pose a threat to national security. Countermeasures to such threats are developed and implemented on a yearly basis to protect the major infrastructures of information communication. As a part of such measures, we have developed a methodology for assessing the information protection level which can be used to establish the quantitative object setting method required for the improvement of the information protection level.

Keywords: Information Security Evaluation Methodology, Critical Information Infrastructure Protection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1660
8924 A Family of Affine Projection Adaptive Filtering Algorithms With Selective Regressors

Authors: Mohammad Shams Esfand Abadi, Nader Hadizadeh Kashani, Vahid Mehrdad

Abstract:

In this paper we present a general formalism for the establishment of the family of selective regressor affine projection algorithms (SR-APA). The SR-APA, the SR regularized APA (SR-RAPA), the SR partial rank algorithm (SR-PRA), the SR binormalized data reusing least mean squares (SR-BNDR-LMS), and the SR normalized LMS with orthogonal correction factors (SR-NLMS-OCF) algorithms are established by this general formalism. We demonstrate the performance of the presented algorithms through simulations in acoustic echo cancellation scenario.

Keywords: Adaptive filter, affine projection, selective regressor.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1574
8923 Effect of Mass on Bus Superstructure Strength Having Rollover Crash

Authors: Mustafa Bin Yusof, Mohammad Amirul Affiz Bin Afripin

Abstract:

Safety of bus journey is a fundamental concern. Risk of injuries and fatalities is severe when bus superstructure fails during rollover accident. Adequate design and sufficient strength of bus superstructure can reduce the number of injuries and fatalities. This paper deals with structural analysis of bus superstructure undergoes rollover event. Several value of mass will be varied in multiple simulations. The purpose of this work is to analyze structural response of bus superstructure in terms of deformation, stress and strain under several loading and constraining conditions. A complete bus superstructure with forty four passenger-s capability was developed using finite element analysis software. Simulations have been conducted to observe the effect of total mass of bus on the strength of superstructure. These simulations are following United Nation Economic Commission of Europe regulation 66 which focuses on strength of large vehicle superstructure. Validation process had been done using simple box model experiment and results obtained are comparing with simulation results. Inputs data from validation process had been used in full scale simulation. Analyses suggested that, the failure of bus superstructure during rollover situation is basically dependent on the total mass of bus and on the strength of bus superstructure.

Keywords: Bus, rollover, superstructure strength, UNECE regulation 66.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2557
8922 Protection of Transformers against Surge Voltage

Authors: Anil S. Khopkar, Umesh N. Soni

Abstract:

Surge voltage arises in the system either by switching operations of heavy load or by natural lightning. Surge voltages cause significant failure of power system equipment if adequate protection not provided. The surge arrestor is device which is connected in a power system to protect the equipment against surge voltages. To protect the transformers against surge voltages, metal oxide surge arrestors (MOSA) are connected across each terminal. The Basic Insulation Level (BIL) of transformers has been defined in the national and international standards based on its voltage rating. While designing transformer insulation, factors such as BIL, surge arrestor ratings, and its operating voltage have to be considered. However, the performance of transformer insulation largely depends on the ratings of the surge arrestor ratings, their location, the margin considered in insulation design, the quantity of surge voltage strikes, etc. This paper demonstrates the role of surge arrestors in protecting transformers against overvoltage, transformer insulation design, the optimum location of surge arrestors and their connection lead length, insulation coordination for transformers, the protection margin in BIL, and methods of safeguarding transformers against surge voltages in detail.  

Keywords: Surge voltage, surge arrestors, transformer, protection margin.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 80