Search results for: civil protection.
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 791

Search results for: civil protection.

611 A Nonoblivious Image Watermarking System Based on Singular Value Decomposition and Texture Segmentation

Authors: Soroosh Rezazadeh, Mehran Yazdi

Abstract:

In this paper, a robust digital image watermarking scheme for copyright protection applications using the singular value decomposition (SVD) is proposed. In this scheme, an entropy masking model has been applied on the host image for the texture segmentation. Moreover, the local luminance and textures of the host image are considered for watermark embedding procedure to increase the robustness of the watermarking scheme. In contrast to all existing SVD-based watermarking systems that have been designed to embed visual watermarks, our system uses a pseudo-random sequence as a watermark. We have tested the performance of our method using a wide variety of image processing attacks on different test images. A comparison is made between the results of our proposed algorithm with those of a wavelet-based method to demonstrate the superior performance of our algorithm.

Keywords: Watermarking, copyright protection, singular value decomposition, entropy masking, texture segmentation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1763
610 Fault Classification of Double Circuit Transmission Line Using Artificial Neural Network

Authors: Anamika Jain, A. S. Thoke, R. N. Patel

Abstract:

This paper addresses the problems encountered by conventional distance relays when protecting double-circuit transmission lines. The problems arise principally as a result of the mutual coupling between the two circuits under different fault conditions; this mutual coupling is highly nonlinear in nature. An adaptive protection scheme is proposed for such lines based on application of artificial neural network (ANN). ANN has the ability to classify the nonlinear relationship between measured signals by identifying different patterns of the associated signals. One of the key points of the present work is that only current signals measured at local end have been used to detect and classify the faults in the double circuit transmission line with double end infeed. The adaptive protection scheme is tested under a specific fault type, but varying fault location, fault resistance, fault inception angle and with remote end infeed. An improved performance is experienced once the neural network is trained adequately, which performs precisely when faced with different system parameters and conditions. The entire test results clearly show that the fault is detected and classified within a quarter cycle; thus the proposed adaptive protection technique is well suited for double circuit transmission line fault detection & classification. Results of performance studies show that the proposed neural network-based module can improve the performance of conventional fault selection algorithms.

Keywords: Double circuit transmission line, Fault detection and classification, High impedance fault and Artificial Neural Network.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3186
609 Analytical Evaluation on Hysteresis Performance of Circular Shear Panel Damper

Authors: Daniel Y. Abebe, Jaehyouk Choi

Abstract:

The idea of adding metallic energy dissipaters to a structure to absorb a large part of the seismic energy began four decades ago. There are several types of metal-based devices conceived as dampers for the seismic energy absorber whereby damages to the major structural components could be minimized for both new and existing structures. This paper aimed to develop and evaluate structural performance of both stiffened and non stiffened circular shear panel damper for passive seismic energy protection by inelastic deformation. Structural evaluation was done using commercially available nonlinear FE simulation program. Diameter-to-thickness ratio is employed as main parameter to investigate the hysteresis performance of stiffened and unstiffened circular shear panel. Depending on these parameters three different buckling mode and hysteretic behavior was found: yielding prior to buckling without strength degradation, yielding prior to buckling with strength degradation and yielding with buckling and strength degradation which forms pinching at initial displacement. Hence, the hysteresis behavior is identified, specimens which deform without strength degradation so it will be used as passive energy dissipating device in civil engineering structures.

Keywords: Circular shear panel damper, FE analysis, Hysteretic behavior, Large deformation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2548
608 Smart Monitoring and Control of Tap Changer Using Intelligent Electronic Device

Authors: K. N. Dinesh Babu, G. R. Manjunatha, R. Ramaprabha, V. Rajini, M. V. Gopalan

Abstract:

In this paper, monitoring and control of tap changer mechanism of a transformer implementation in an Intelligent Electronic Device (IED) is discussed. It has been a custom for decades to provide a separate panel for on load tap changer control for monitoring the tap position. However, this facility cannot either record or transfer the information to remote control centers. As there is a technology shift towards the smart grid protection and control standards, the need for implementing remote control and monitoring has necessitated the implementation of this feature in numerical relays. This paper deals with the programming, settings and logic implementation which is applicable to both IEC 61850 compatible and non-compatible IEDs thereby eliminating the need for separate tap changer control equipment. The monitoring mechanism has been implemented in a 28MVA, 110 /6.9kV transformer with 16 tap position with GE make T60 IED at Ultratech cement limited Gulbarga, Karnataka and is in successful service.

Keywords: Transformer protection, tap changer control, tap position monitoring, on load tap changer, intelligent electronic device (IED).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4029
607 Key Issues and Challenges of Intrusion Detection and Prevention System: Developing Proactive Protection in Wireless Network Environment

Authors: M. Salman, B. Budiardjo, K. Ramli

Abstract:

Nowadays wireless technology plays an important role in public and personal communication. However, the growth of wireless networking has confused the traditional boundaries between trusted and untrusted networks. Wireless networks are subject to a variety of threats and attacks at present. An attacker has the ability to listen to all network traffic which becoming a potential intrusion. Intrusion of any kind may lead to a chaotic condition. In addition, improperly configured access points also contribute the risk to wireless network. To overcome this issue, a security solution that includes an intrusion detection and prevention system need to be implemented. In this paper, first the security drawbacks of wireless network will be analyzed then investigate the characteristics and also the limitations on current wireless intrusion detection and prevention system. Finally, the requirement of next wireless intrusion prevention system will be identified including some key issues which should be focused on in the future to overcomes those limitations.

Keywords: intrusion detection, intrusion prevention, wireless networks, proactive protection

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3938
606 SCR-Stacking Structure with High Holding Voltage for I/O and Power Clamp

Authors: Hyun-Young Kim, Chung-Kwang Lee, Han-Hee Cho, Sang-Woon Cho, Yong-Seo Koo

Abstract:

In this paper, we proposed a novel SCR (Silicon Controlled Rectifier) - based ESD (Electrostatic Discharge) protection device for I/O and power clamp. The proposed device has a higher holding voltage characteristic than conventional SCR. These characteristics enable to have latch-up immunity under normal operating conditions as well as superior full chip ESD protection. The proposed device was analyzed to figure out electrical characteristics and tolerance robustness in term of individual design parameters (D1, D2, D3). They are investigated by using the Synopsys TCAD simulator. As a result of simulation, holding voltage increased with different design parameters. The holding voltage of the proposed device changes from 3.3V to 7.9V. Also, N-Stack structure ESD device with the high holding voltage is proposed. In the simulation results, 2-stack has holding voltage of 6.8V and 3-stack has holding voltage of 10.5V. The simulation results show that holding voltage of stacking structure can be larger than the operation voltage of high-voltage application.

Keywords: ESD, SCR, holding voltage, stack, power clamp.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2061
605 Agreement Options on Multi Criteria Group Decision and Negotiation

Authors: Christiono Utomo, Arazi Idrus, Madzlan Napiah, Mohd. Faris Khamidi

Abstract:

This paper presents a conceptual model of agreement options on negotiation support for civil engineering decision. The negotiation support facilitates the solving of group choice decision making problems in civil engineering decision to reduce the impact of mud volcano disaster in Sidoarjo, Indonesia. The approach based on application of analytical hierarchy process (AHP) method for multi criteria decision on three level of decision hierarchy. Decisions for reducing impact is very complicated since many parties involved in a critical time. Where a number of stakeholders are involved in choosing a single alternative from a set of solution alternatives, there are different concern caused by differing stakeholder preferences, experiences, and background. Therefore, a group choice decision support is required to enable each stakeholder to evaluate and rank the solution alternatives before engaging into negotiation with the other stakeholders. Such civil engineering solutions as alternatives are referred to as agreement options that are determined by identifying the possible stakeholder choice, followed by determining the optimal solution for each group of stakeholder. Determination of the optimal solution is based on a game theory model of n-person general sum game with complete information that involves forming coalitions among stakeholders.

Keywords: Agreement options, AHP, agent, negotiation, multicriteria, game theory, and coalition.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1642
604 Design, Implementation and Testing of Mobile Agent Protection Mechanism for MANETS

Authors: Khaled E. A. Negm

Abstract:

In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depends on the presence of an authentication authority. The advantage of the proposed system is that security measures is an integral part of the design, thus common security retrofitting problems do not arise. This is due to the presence of AlGamal encryption mechanism to protect its confidential content and any collected data by the agent from the visited host . So that eavesdropping on information from the agent is no longer possible to reveal any confidential information. Also the inherent security constraints within the framework allow the system to operate as an intrusion detection system for any mobile agent environment. The mechanism is tested for most of the well known severe attacks against agents and networked systems. The scheme proved a promising performance that makes it very much recommended for the types of transactions that needs highly secure environments, e. g., business to business.

Keywords: Mobile agent security, mobile accesses, agent encryption.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2038
603 Web Usability : A Fuzzy Approach to the Navigation Structure Enhancement in a Website System, Case of Iranian Civil Aviation Organization Website

Authors: Hamed Qahri Saremi, Gholam Ali Montazer

Abstract:

With the proliferation of World Wide Web, development of web-based technologies and the growth in web content, the structure of a website becomes more complex and web navigation becomes a critical issue to both web designers and users. In this paper we define the content and web pages as two important and influential factors in website navigation and paraphrase the enhancement in the website navigation as making some useful changes in the link structure of the website based on the aforementioned factors. Then we suggest a new method for proposing the changes using fuzzy approach to optimize the website architecture. Applying the proposed method to a real case of Iranian Civil Aviation Organization (CAO) website, we discuss the results of the novel approach at the final section.

Keywords: Web content, Web navigation, Website system, Webusage mining.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1788
602 Security, Securitization and Human Capital: The New Wave of Canadian Immigration Laws

Authors: Robert M. Russo

Abstract:

This paper analyzes the linkage between migration, economic globalization and terrorism concerns. On a broad level, I analyze Canadian economic and political considerations, searching for causal relationships between political and economic actors on the one hand, and Canadian immigration law on the other. Specifically, the paper argues that there are contradictory impulses affecting state sovereignty. These impulses are are currently being played out in the field of Canadian immigration law through several proposed changes to Canada-s Immigration and Refugee Protection Act (IRPA). These changes reflect an ideological conception of sovereignty that is intrinsically connected with decision-making capacity centered on an individual. This conception of sovereign decision-making views Parliamentary debate and bureaucratic inefficiencies as both equally responsible for delaying essential decisions relating to the protection of state sovereignty, economic benefits and immigration control This paper discusses these concepts in relation to Canadian immigration policy under Canadian governments over the past twenty five years.

Keywords: Globalization, immigration law, security, anti-terrorism.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3224
601 Simulating Flow Transients in Conveying Pipeline Systems by Rigid Column and Full Elastic Methods: Pump Combined with Air Chamber

Authors: I. Abuiziah, A. Oulhaj, K. Sebari, D. Ouazar, A. A. Saber

Abstract:

In water pipeline systems, the flow control is an integrated part of the operation, for instance, opening and closing the valves, starting and stopping the pumps, when these operations very quickly performed, they shall cause the hydraulic transient phenomena, which may cause pump and, valve failures and catastrophic pipe ruptures. Fluid transient analysis is one of the more challenging and complicated flow problems in the design and the operation of water pipeline systems. Transient control has become an essential requirement for ensuring safe operation of water pipeline systems. An accurate analysis and suitable protection devices should be used to protect water pipeline systems. The fourth-order Runge-Kutta method has been used to solve the dynamic and continuity equations in the rigid column method, while the characteristics method used to solve these equations in the full elastic methods. This paper presents the problem of modeling and simulating of transient phenomena in conveying pipeline systems based on the rigid column and full elastic methods. Also, it provides the influence of using the protection devices to protect the pipeline systems from damaging due to the gain pressure which occur in the transient state. The results obtained provide that the model is an efficient tool for flow transient analysis and provide approximately identical results by using these two methods. Moreover; using the closed surge tank reduces the unfavorable effects of transients.

Keywords: Flow transient, Pipeline, Air chamber, Numerical model, Protection devices, Elastic method, Rigid column method.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4407
600 Accurate Fault Classification and Section Identification Scheme in TCSC Compensated Transmission Line using SVM

Authors: Pushkar Tripathi, Abhishek Sharma, G. N. Pillai, Indira Gupta

Abstract:

This paper presents a new approach for the protection of Thyristor-Controlled Series Compensator (TCSC) line using Support Vector Machine (SVM). One SVM is trained for fault classification and another for section identification. This method use three phase current measurement that results in better speed and accuracy than other SVM based methods which used single phase current measurement. This makes it suitable for real-time protection. The method was tested on 10,000 data instances with a very wide variation in system conditions such as compensation level, source impedance, location of fault, fault inception angle, load angle at source bus and fault resistance. The proposed method requires only local current measurement.

Keywords: Fault Classification, Section Identification, Feature Selection, Support Vector Machine (SVM), Thyristor-Controlled Series Compensator (TCSC)

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2524
599 Program Camouflage: A Systematic Instruction Hiding Method for Protecting Secrets

Authors: Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto

Abstract:

This paper proposes an easy-to-use instruction hiding method to protect software from malicious reverse engineering attacks. Given a source program (original) to be protected, the proposed method (1) takes its modified version (fake) as an input, (2) differences in assembly code instructions between original and fake are analyzed, and, (3) self-modification routines are introduced so that fake instructions become correct (i.e., original instructions) before they are executed and that they go back to fake ones after they are executed. The proposed method can add a certain amount of security to a program since the fake instructions in the resultant program confuse attackers and it requires significant effort to discover and remove all the fake instructions and self-modification routines. Also, this method is easy to use (with little effort) because all a user (who uses the proposed method) has to do is to prepare a fake source code by modifying the original source code.

Keywords: Copyright protection, program encryption, program obfuscation, self-modification, software protection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1507
598 Water Reallocation Policies – The Importance of Rural and Urban Differences in Alberta, Canada

Authors: Henning Bjornlund, Alec Zuo, Sarah Wheeler, Rob de Loë

Abstract:

There is currently intensive debate in Alberta, Canada, regarding rural to urban water reallocation. This paper explores the demographic and attitudinal influences that are associated with the acceptance of water reallocation policies and whether such acceptance differs between urban and rural residents. We investigate three policy orientations in regards to water policies: i) government intervention; ii) environmental protection; and iii) protecting irrigators- water rights. We find that urban dwellers are more likely to favour government intervention while rural dwellers are more likely to support policies that aim at protecting irrigators- water rights. While urban dwellers are also more likely to favour environmental protection, the difference is not statistically significant. We also find that other factors have a significant impact on policy choice irrespective of residence such as demographic and socioeconomic factors as well as the values people hold toward water and the environment.

Keywords: Canada, rural, urban, water transfers.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1397
597 Implementing an Adaptive Behavior for Spread Spectrum Watermarking Procedures

Authors: Franco Frattolillo

Abstract:

The advances in multimedia and networking technologies have created opportunities for Internet pirates, who can easily copy multimedia contents and illegally distribute them on the Internet, thus violating the legal rights of content owners. This paper describes how a simple and well-known watermarking procedure based on a spread spectrum method and a watermark recovery by correlation can be improved to effectively and adaptively protect MPEG-2 videos distributed on the Internet. In fact, the procedure, in its simplest form, is vulnerable to a variety of attacks. However, its security and robustness have been increased, and its behavior has been made adaptive with respect to the video terminals used to open the videos and the network transactions carried out to deliver them to buyers. In fact, such an adaptive behavior enables the proposed procedure to efficiently embed watermarks, and this characteristic makes the procedure well suited to be exploited in web contexts, where watermarks usually generated from fingerprinting codes have to be inserted into the distributed videos “on the fly", i.e. during the purchase web transactions.

Keywords: Copyright protection, digital watermarking, intellectualproperty protection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1382
596 Steady State Simulation of Power Systems with Change in Topology

Authors: Aidil Azwin Zainul Abidin, Farrukh Hafiz Nagi, Agileswari K. Ramasamy, Izham Zainal Abidin

Abstract:

In power system protection, the need to know the load current together with the fault level detected by a relay is important. This is due to the fact that the relay is required to isolate the equipment being protected if a fault is present and keep the breaker associated with it closed if the current level is lower than the maximum load level. This is not an issue for a radial system. This is not the same however in a looped power system. In a looped power system, the isolation of an equipment system will contribute to a topology change. The change in the power system topology will then influence or change the maximum load current and the fault level detected by each relay. In this paper, a method of data collection for changing topology using matlab and sim-power will be presented. The method will take into consideration the change in topology and collect data for each possible topology.

Keywords: Topology Change, Power System Protection, Power System simulation, Matlab, Sim-power.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1985
595 Criminal Protection Objectivity of the Child's Right to Life and Physical and Psychological Safety

Authors: Hezha Hewa, Taher Sur

Abstract:

Nowadays, child affairs is a matter of both national and international interests. This issue is regarded a vital topic for various scientific fields across ages, and for all the communities without exception. However, the nature of child caring may vary due to the verities in science perspectives. So, considering child's affairs from different perspectives is helpful to have a complementary image about this matter. The purpose behind selecting this topic is to keep a balance between the victim on the one hand, and the guardian and the offender on the other hand, (i.e.) to avoid any kind of excessiveness either in the protection of the child and its rights not in the punishment of the offender. This is achieved through considering various legal materials in the Iraqi legislation and in the comparative legislations that are concerned with the child's issue and the extent to which the child makes use of these rights. The scope of this study involves the crimes that are considered as aggressions against the child's right to life, and the crimes that are dangerous to their physical and psychological safety. So, this study comprehensively considers the intentional murder of child, child murder to avoid disgrace, child kidnapping, child abandonment, physical abuse for the sake of punishment or not, child circumcision, verbal violence, and abstaining from leaving a child with a person who has the right of custody. This study ends with the most significant concluding points that have been derived throughout this study, which are: Unlike the Iraqi legislation, the Egyptian legislation defines the child in the Article 2 of the Child Law No. 12 of 1996 amended by the Law No. 126 of 2008 that the child is a person who does not exceed 18 years of age. Some legislation does not provide special criminal protection for child intentional murder, as in the Iraqi and the Egyptian legislation. However, some others have provided special criminal protection for a child, as in French and Syrian legislations. Child kidnapping is regarded as one of the most dangerous crimes that affects the child and the family as well, as it may expose the child's life to danger or to death. The most significant recommendations from the researcher are: The Iraqi legislation is recommended to take the necessary measures to establish a particular legislation for the child by including all the legal provisions that are associated with this weak creature, and make use of the Egyptian legislator’s experience as a pioneer in this respect. Both the Iraqi legislation and the Egyptian legislation are recommended to enact special laws to protect a child from the crimes of intentional murder, as the crime of child murder is currently subjected to the same provisions consider for adult murder.

Keywords: Child abuse, juvenile, legislation, punishment and aggravation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1066
594 Investigation of Shear Thickening Liquid Protection Fibrous Material

Authors: Po-Yun Chen, Jui-Liang Yen, Chang-Ping Chang, Wen-Hua Hu, Yu-Liang Chen, Yih-Ming Liu, Chin-Yi Chou, Ming-Der Ger

Abstract:

The stab resistance performance of newly developed fabric composites composed of hexagonal paper honeycombs, filled with shear thickening fluid (STF), and woven Kevlar® fabric or UHMPE was investigated in this study. The STF was prepared by dispersing submicron SiO2 particles into polyethylene glycol (PEG). Our results indicate that the STF-Kevlar composite possessed lower penetration depth than that of neat Kevlar. In other words, the STF-Kevlar composite can attain the same energy level in stab-resistance test with fewer layers of Kevlar fabrics than that of the neat Kevlar fabrics. It also indicates that STF can be used for the fabrication of flexible body armors and can provide improved protection against stab threats. We found that the stab resistance of the STF-Kevlar composite increases with the increase of SiO2 concentration in STF. Moreover, the silica particles functionalized with silane coupling agent can further improve the stab resistance.

Keywords: shear thickening fluid, SiO2, Kevlar, stab

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3293
593 Exchange Traded Products on the Warsaw Stock Exchange

Authors: Piotr Prewysz-Kwinto

Abstract:

A dynamic development of financial market is accompanied by the emergence of new products on stock exchanges which give absolutely new possibilities of investing money. Currently, the most innovative financial instruments offered to investors are exchange traded products (ETP). They can be defined as financial instruments whose price depends on the value of the underlying instrument. Thus, they offer investors a possibility of making a profit that results from the change in value of the underlying instrument without having to buy it. Currently, the Warsaw Stock Exchange offers many types of ETPs. They are investment products with full or partial capital protection, products without capital protection as well as leverage products, issued on such underlying instruments as indices, sector indices, commodity indices, prices of energy commodities, precious metals, agricultural produce or prices of shares of domestic and foreign companies. This paper presents the mechanism of functioning of ETP available on the Warsaw Stock Exchange and the results of the analysis of statistical data on these financial instruments.

Keywords: Exchange traded products, financial market, investment, stock exchange.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1175
592 Investigating Performance of Numerical Distance Relay with Higher Order Antialiasing Filter

Authors: Venkatesh C., K. Shanti Swarup

Abstract:

This paper investigates the impact on operating time delay and relay maloperation when 1st,2nd and 3rd order analog antialiasing filters are used in numerical distance protection. RC filter with cut-off frequency 90 Hz is used. Simulations are carried out for different SIR (Source to line Impedance Ratio), load, fault type and fault conditions using SIMULINK, where the voltage and current signals are fed online to the developed numerical distance relay model. Matlab is used for plotting the impedance trajectory. Investigation results shows that, about 75 % of the simulated cases, numerical distance relay operating time is not increased even-though there is a time delay when higher order filters are used. Relay maloperation (selectivity) also reduces (increases) when higher order filters are used in numerical distance protection.

Keywords: Antialiasing, capacitive voltage transformers, delay estimation, discrete Fourier transform (DFT), distance measurement, low-pass filters, source to line impedance ratio (SIR), protective relaying.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2797
591 Wavelet based ANN Approach for Transformer Protection

Authors: Okan Özgönenel

Abstract:

This paper presents the development of a wavelet based algorithm, for distinguishing between magnetizing inrush currents and power system fault currents, which is quite adequate, reliable, fast and computationally efficient tool. The proposed technique consists of a preprocessing unit based on discrete wavelet transform (DWT) in combination with an artificial neural network (ANN) for detecting and classifying fault currents. The DWT acts as an extractor of distinctive features in the input signals at the relay location. This information is then fed into an ANN for classifying fault and magnetizing inrush conditions. A 220/55/55 V, 50Hz laboratory transformer connected to a 380 V power system were simulated using ATP-EMTP. The DWT was implemented by using Matlab and Coiflet mother wavelet was used to analyze primary currents and generate training data. The simulated results presented clearly show that the proposed technique can accurately discriminate between magnetizing inrush and fault currents in transformer protection.

Keywords: Artificial neural network, discrete wavelet transform, fault detection, magnetizing inrush current.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1845
590 Overview of Development of a Digital Platform for Building Critical Infrastructure Protection Systems in Smart Industries

Authors: Bruno Vilić Belina, Ivan Župan

Abstract:

Smart industry concepts and digital transformation are very popular in many industries. They develop their own digital platforms, which have an important role in innovations and transactions. The main idea of smart industry digital platforms is central data collection, industrial data integration and data usage for smart applications and services. This paper presents the development of a digital platform for building critical infrastructure protection systems in smart industries. Different service contraction modalities in Service Level Agreements (SLAs), Customer Relationship Management (CRM) relations, trends and changes in business architectures (especially process business architecture) for the purpose of developing infrastructural production and distribution networks, information infrastructure meta-models and generic processes by critical infrastructure owner demanded by critical infrastructure law, satisfying cybersecurity requirements and taking into account hybrid threats are researched.

Keywords: Cybersecurity, critical infrastructure, smart industries, digital platform.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 228
589 Intervention of Sambucus Nigra Polyphenolic Extract in Experimental Arterial Hypertension

Authors: Manuela Ciocoiu, Laur Badescu, Oana Badulescu, Magda Badescu

Abstract:

The research focuses on the effects of polyphenols extracted from Sambucus nigra fruit, using an experimental arterial hypertension pattern, as well as their influence on the oxidative stress. The results reveal the normalization of the reduced glutathion concentration, as well as a considerable reduction in the malondialdehide serum concentration by the polyphenolic protection. The rat blood pressure values were recorded using a CODATM system, which uses a non-invasive blood pressure measuring method. All the measured blood pressure components revealed a biostatistically significant (p<0.05) blood pressure drop between the AHT and the AHT+P groups. The results prove that oxidative stress is considerably lower, statistically speaking, in rats with hypertension but also provided with natural polyphenolic protection from Sambucus nigra fruits than in the rats belonging to the control group. In addition to the demonstrated antioxidant effects, natural polyphenols also have other biological properties that might contribute to the cardioprotective effects.

Keywords: Arterial hypertension, Oxidative stress, Sambucus nigra

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3342
588 Energy Efficient Shading Strategies for Windows of Hospital ICUs in the Desert

Authors: A. Sherif, A. El Zafarany, R. Arafa

Abstract:

Hospitals, everywhere, are considered heavy energy consumers. Hospital Intensive Care Unit spaces pose a special challenge, where design guidelines requires the provision of external windows for daylighting and external view. Window protection strategies could be employed to reduce energy loads without detriment effect on comfort or health care. This paper addresses the effectiveness of using various window strategies on the annual cooling, heating and lighting energy use of a typical Hospital Intensive Unit space. Series of experiments were performed using the EnergyPlus simulation software for a typical Intensive Care Unit (ICU) space in Cairo, located in the Egyptian desert. This study concluded that the use of shading systems is more effective in conserving energy in comparison with glazing of different types, in the Cairo ICUs. The highest energy savings in the West and South orientations were accomplished by external perforated solar screens, followed by overhangs positioned at a protection angle of 45°.

Keywords: Energy, Hospital, Intensive Care Units, Shading.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2555
587 Soil Improvement using Cement Dust Mixture

Authors: Mohie Eldin Mohamed Afifiy Elmashad

Abstract:

Day by day technology increases and problems associated with this technology also increase. Several researches were carried out to investigate the deployment of such material safely in geotechnical engineering in particular and civil engineering in general. However, different types of waste material have such as cement duct, fly ash and slag been proven to be suitable in several applications. In this research cement dust mixed with different percentages of sand will be used in some civil engineering application as will be explained later in this paper throughout filed and laboratory test. The used mixer (waste material with sand) prove high performance, durability to environmental condition, low cost and high benefits. At higher cement dust ratio, small cement ratio is valuable for compressive strength and permeability. Also at small cement dust ratio higher cement ratio is valuable for compressive strength.

Keywords: cement dust, cement, soil improvement, permeability

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2925
586 Effect of TCSR on Measured Impedance by Distance Protection in Presence Single Phase to Earth Fault

Authors: Mohamed Zellagui, Abdelaziz Chaghi

Abstract:

This paper presents the impact study of apparent reactance injected by series Flexible AC Transmission System (FACTS) i.e. Thyristor Controlled Series Reactor (TCSR) on the measured impedance of a 400 kV single electrical transmission line in the presence of phase to earth fault with fault resistance. The study deals with an electrical transmission line of Eastern Algerian transmission networks at Group Sonelgaz (Algerian Company of Electrical and Gas) compensated by TCSR connected at midpoint of the line. This compensator used to inject active and reactive powers is controlled by three TCSR-s. The simulations results investigate the impacts of the TCSR on the parameters of short circuit calculation and parameters of measured impedance by distance relay in the presence of earth fault for three cases study.

Keywords: TCSR, Transmission line, Apparent reactance, Earth fault, Symmetrical components, Distance protection, Measured impedance.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2550
585 Flood Control Structures in the River Göta Älv to Protect Gothenburg City (Sweden) during the 21st Century - Preliminary Evaluation

Authors: M. Irannezhad, E. H. N. Gashti, U. Moback, B. Kløve

Abstract:

Climate change would cause mean sea level to rise +1 m by 2100. To prevent coastal floods resulting from the sea level rising, different flood control structures have been built, with acceptable protection levels. Gothenburg with the River Göta älv located on the southwest coast of Sweden is a vulnerable city to the accelerated rises in mean sea level. We evaluated using a sea barrage in the River Göta älv to protect Gothenburg during this century. The highest sea level was estimated to 2.95 m above the current mean sea level by 2100. To verify flood protection against such high sea levels, both barriers have to be closed. To prevent high water level in the River Göta älv reservoir, the barriers would be open when the sea level is low. The suggested flood control structures would successfully protect the city from flooding events during this century.

Keywords: Climate change, Flood control structures, Gothenburg, Sea level rising, Water level model.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4739
584 A Critical Review of the Adequacy of EIA Reports-Evidence from Pakistan

Authors: Obaidullah Nadeem, Rizwan Hameed

Abstract:

The preparation of good-quality Environmental Impact Assessment (EIA) reports contribute to enhancing overall effectiveness of EIA. This component of the EIA process becomes more important in situation where public participation is weak and there is lack of expertise on the part of the competent authority. In Pakistan, EIA became mandatory for every project likely to cause adverse environmental impacts from July 1994. The competent authority also formulated guidelines for preparation and review of EIA reports in 1997. However, EIA is yet to prove as a successful decision support tool to help in environmental protection. One of the several reasons of this ineffectiveness is the generally poor quality of EIA reports. This paper critically reviews EIA reports of some randomly selected projects. Interviews of EIA consultants, project proponents and concerned government officials have also been conducted to underpin the root causes of poor quality of EIA reports. The analysis reveals several inadequacies particularly in areas relating to identification, evaluation and mitigation of key impacts and consideration of alternatives. The paper identifies some opportunities and suggests measures for improving the quality of EIA reports and hence making EIA an effective tool to help in environmental protection.

Keywords: Environmental Impact Assessment, EIA Guidelines, EIA Reports, Pakistan.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3308
583 Image Adaptive Watermarking with Visual Model in Orthogonal Polynomials based Transformation Domain

Authors: Krishnamoorthi R., Sheba Kezia Malarchelvi P. D.

Abstract:

In this paper, an image adaptive, invisible digital watermarking algorithm with Orthogonal Polynomials based Transformation (OPT) is proposed, for copyright protection of digital images. The proposed algorithm utilizes a visual model to determine the watermarking strength necessary to invisibly embed the watermark in the mid frequency AC coefficients of the cover image, chosen with a secret key. The visual model is designed to generate a Just Noticeable Distortion mask (JND) by analyzing the low level image characteristics such as textures, edges and luminance of the cover image in the orthogonal polynomials based transformation domain. Since the secret key is required for both embedding and extraction of watermark, it is not possible for an unauthorized user to extract the embedded watermark. The proposed scheme is robust to common image processing distortions like filtering, JPEG compression and additive noise. Experimental results show that the quality of OPT domain watermarked images is better than its DCT counterpart.

Keywords: Orthogonal Polynomials based Transformation, Digital Watermarking, Copyright Protection, Visual model.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1696
582 The Forensic Swing of Things: The Current Legal and Technical Challenges of IoT Forensics

Authors: Pantaleon Lutta, Mohamed Sedky, Mohamed Hassan

Abstract:

The inability of organizations to put in place management control measures for Internet of Things (IoT) complexities persists to be a risk concern. Policy makers have been left to scamper in finding measures to combat these security and privacy concerns. IoT forensics is a cumbersome process as there is no standardization of the IoT products, no or limited historical data are stored on the devices. This paper highlights why IoT forensics is a unique adventure and brought out the legal challenges encountered in the investigation process. A quadrant model is presented to study the conflicting aspects in IoT forensics. The model analyses the effectiveness of forensic investigation process versus the admissibility of the evidence integrity; taking into account the user privacy and the providers’ compliance with the laws and regulations. Our analysis concludes that a semi-automated forensic process using machine learning, could eliminate the human factor from the profiling and surveillance processes, and hence resolves the issues of data protection (privacy and confidentiality).

Keywords: Cloud forensics, data protection laws, GDPR, IoT forensics, machine learning.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1099