CINXE.COM
Search results for: CBRNe protection
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: CBRNe protection</title> <meta name="description" content="Search results for: CBRNe protection"> <meta name="keywords" content="CBRNe protection"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="CBRNe protection" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="CBRNe protection"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 2370</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: CBRNe protection</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2370</span> Vulnerability Analysis for Risk Zones Boundary Definition to Support a Decision Making Process at CBRNE Operations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aliaksei%20Patsekha">Aliaksei Patsekha</a>, <a href="https://publications.waset.org/abstracts/search?q=Michael%20Hohenberger"> Michael Hohenberger</a>, <a href="https://publications.waset.org/abstracts/search?q=Harald%20Raupenstrauch"> Harald Raupenstrauch</a> </p> <p class="card-text"><strong>Abstract:</strong></p> An effective emergency response to accidents with chemical, biological, radiological, nuclear, or explosive materials (CBRNE) that represent highly dynamic situations needs immediate actions within limited time, information and resources. The aim of the study is to provide the foundation for division of unsafe area into risk zones according to the impact of hazardous parameters (heat radiation, thermal dose, overpressure, chemical concentrations). A decision on the boundary values for three risk zones is based on the vulnerability analysis that covered a variety of accident scenarios containing the release of a toxic or flammable substance which either evaporates, ignites and/or explodes. Critical values are selected for the boundary definition of the Red, Orange and Yellow risk zones upon the examination of harmful effects that are likely to cause injuries of varying severity to people and different levels of damage to structures. The obtained results provide the basis for creating a comprehensive real-time risk map for a decision support at CBRNE operations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=boundary%20values" title="boundary values">boundary values</a>, <a href="https://publications.waset.org/abstracts/search?q=CBRNE%20threats" title=" CBRNE threats"> CBRNE threats</a>, <a href="https://publications.waset.org/abstracts/search?q=decision%20making%20process" title=" decision making process"> decision making process</a>, <a href="https://publications.waset.org/abstracts/search?q=hazardous%20effects" title=" hazardous effects"> hazardous effects</a>, <a href="https://publications.waset.org/abstracts/search?q=vulnerability%20analysis" title=" vulnerability analysis"> vulnerability analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20zones" title=" risk zones"> risk zones</a> </p> <a href="https://publications.waset.org/abstracts/129557/vulnerability-analysis-for-risk-zones-boundary-definition-to-support-a-decision-making-process-at-cbrne-operations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/129557.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">209</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2369</span> Effect of Repellent Coatings, Aerosol Protective Liners, and Lamination on the Properties of Chemical/Biological Protective Textiles</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Natalie%20Pomerantz">Natalie Pomerantz</a>, <a href="https://publications.waset.org/abstracts/search?q=Nicholas%20Dugan"> Nicholas Dugan</a>, <a href="https://publications.waset.org/abstracts/search?q=Molly%20Richards"> Molly Richards</a>, <a href="https://publications.waset.org/abstracts/search?q=Walter%20Zukas"> Walter Zukas</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The primary research question to be answered for Chemical/Biological (CB) protective clothing, is how to protect wearers from a range of chemical and biological threats in liquid, vapor, and aerosol form, while reducing the thermal burden. Currently, CB protective garments are hot, heavy, and wearers are limited by short work times in order to prevent heat injury. This study demonstrates how to incorporate different levels of protection on a material level and modify fabric composites such that the thermal burden is reduced to such an extent it approaches that of a standard duty uniform with no CB protection. CB protective materials are usually comprised of several fabric layers: a cover fabric with a liquid repellent coating, a protective layer which is comprised of a carbon-based sorptive material or semi-permeable membrane, and a comfort next-to-skin liner. In order to reduce thermal burden, all of these layers were laminated together to form one fabric composite which had no insulative air gap in between layers. However, the elimination of the air gap also reduced the CB protection of the fabric composite. In order to increase protection in the laminated composite, different nonwoven aerosol protective liners were added, and a super repellent coating was applied to the cover fabric, prior to lamination. Different adhesive patterns were investigated to determine the durability of the laminate with the super repellent coating, and the effect on air permeation. After evaluating the thermal properties, textile properties and protective properties of the iterations of these fabric composites, it was found that the thermal burden of these materials was greatly reduced by decreasing the thermal resistance with the elimination of the air gap between layers. While the level of protection was reduced in laminate composites, the addition of a super repellent coating increased protection towards low volatility agents without impacting thermal burden. Similarly, the addition of aerosol protective liner increased protection without reducing water vapor transport, depending on the nonwoven used, however, the air permeability was significantly decreased. The balance of all these properties and exploration of the trade space between thermal burden and protection will be discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=aerosol%20protection" title="aerosol protection">aerosol protection</a>, <a href="https://publications.waset.org/abstracts/search?q=CBRNe%20protection" title=" CBRNe protection"> CBRNe protection</a>, <a href="https://publications.waset.org/abstracts/search?q=lamination" title=" lamination"> lamination</a>, <a href="https://publications.waset.org/abstracts/search?q=nonwovens" title=" nonwovens"> nonwovens</a>, <a href="https://publications.waset.org/abstracts/search?q=repellent%20coatings" title=" repellent coatings"> repellent coatings</a>, <a href="https://publications.waset.org/abstracts/search?q=thermal%20burden" title=" thermal burden"> thermal burden</a> </p> <a href="https://publications.waset.org/abstracts/67726/effect-of-repellent-coatings-aerosol-protective-liners-and-lamination-on-the-properties-of-chemicalbiological-protective-textiles" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/67726.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">363</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2368</span> Food Consumer Protection in Moroccan Legal System: A Systematic Review</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bouchaib%20Gazzaz">Bouchaib Gazzaz</a>, <a href="https://publications.waset.org/abstracts/search?q=Mounir%20Mehdi"> Mounir Mehdi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In order to ensure consumer food protection, the food industry has a legal obligation to provide food products that comply with the requirements of the legislation in force. National regulations in this area occupy an important place in the food control system in terms of consumer protection. This article discusses the legal and regulatory framework of food safety and consumer protection in Moroccan law. We used the doctrinal research approach by analyzing the judicial normative and bibliographic legal research. As a result, we were able to present the basic principles of consumer food protection by showing to what extent the food safety law provides effective consumer protection in Morocco. We have concluded that there is an impact -in terms of consumer legal protection- of food law reform on the concept of food safety. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=food%20safety" title="food safety">food safety</a>, <a href="https://publications.waset.org/abstracts/search?q=Morocco" title=" Morocco"> Morocco</a>, <a href="https://publications.waset.org/abstracts/search?q=consumer%20protection" title=" consumer protection"> consumer protection</a>, <a href="https://publications.waset.org/abstracts/search?q=framework" title=" framework"> framework</a>, <a href="https://publications.waset.org/abstracts/search?q=food%20law" title=" food law"> food law</a> </p> <a href="https://publications.waset.org/abstracts/146727/food-consumer-protection-in-moroccan-legal-system-a-systematic-review" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/146727.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">239</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2367</span> Analysis of SCR-Based ESD Protection Circuit on Holding Voltage Characteristics</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yong%20Seo%20Koo">Yong Seo Koo</a>, <a href="https://publications.waset.org/abstracts/search?q=Jong%20Ho%20Nam"> Jong Ho Nam</a>, <a href="https://publications.waset.org/abstracts/search?q=Yong%20Nam%20Choi"> Yong Nam Choi</a>, <a href="https://publications.waset.org/abstracts/search?q=Dae%20Yeol%20Yoo"> Dae Yeol Yoo</a>, <a href="https://publications.waset.org/abstracts/search?q=Jung%20Woo%20Han"> Jung Woo Han</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents a silicon controller rectifier (SCR) based ESD protection circuit for IC. The proposed ESD protection circuit has low trigger voltage and high holding voltage compared with conventional SCR ESD protection circuit. Electrical characteristics of the proposed ESD protection circuit are simulated and analyzed using TCAD simulator. The proposed ESD protection circuit verified effective low voltage ESD characteristics with low trigger voltage and high holding voltage. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=electro-static%20discharge%20%28ESD%29" title="electro-static discharge (ESD)">electro-static discharge (ESD)</a>, <a href="https://publications.waset.org/abstracts/search?q=silicon%20controlled%20rectifier%20%28SCR%29" title=" silicon controlled rectifier (SCR)"> silicon controlled rectifier (SCR)</a>, <a href="https://publications.waset.org/abstracts/search?q=holding%20voltage" title=" holding voltage"> holding voltage</a>, <a href="https://publications.waset.org/abstracts/search?q=protection%20circuit" title=" protection circuit"> protection circuit</a> </p> <a href="https://publications.waset.org/abstracts/9524/analysis-of-scr-based-esd-protection-circuit-on-holding-voltage-characteristics" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/9524.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">379</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2366</span> Strengthening Legal Protection of Personal Data through Technical Protection Regulation in Line with Human Rights</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tomy%20Prihananto">Tomy Prihananto</a>, <a href="https://publications.waset.org/abstracts/search?q=Damar%20Apri%20Sudarmadi"> Damar Apri Sudarmadi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Indonesia recognizes the right to privacy as a human right. Indonesia provides legal protection against data management activities because the protection of personal data is a part of human rights. This paper aims to describe the arrangement of data management and data management in Indonesia. This paper is a descriptive research with qualitative approach and collecting data from literature study. Results of this paper are comprehensive arrangement of data that have been set up as a technical requirement of data protection by encryption methods. Arrangements on encryption and protection of personal data are mutually reinforcing arrangements in the protection of personal data. Indonesia has two important and immediately enacted laws that provide protection for the privacy of information that is part of human rights. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Indonesia" title="Indonesia">Indonesia</a>, <a href="https://publications.waset.org/abstracts/search?q=protection" title=" protection"> protection</a>, <a href="https://publications.waset.org/abstracts/search?q=personal%20data" title=" personal data"> personal data</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20rights" title=" human rights"> human rights</a>, <a href="https://publications.waset.org/abstracts/search?q=encryption" title=" encryption"> encryption</a> </p> <a href="https://publications.waset.org/abstracts/93122/strengthening-legal-protection-of-personal-data-through-technical-protection-regulation-in-line-with-human-rights" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/93122.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">182</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2365</span> Efficient Backup Protection for Hybrid WDM/TDM GPON System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Elmahdi%20Mohammadine">Elmahdi Mohammadine</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahouzi%20Esmail"> Ahouzi Esmail</a>, <a href="https://publications.waset.org/abstracts/search?q=Najid%20Abdellah"> Najid Abdellah </a> </p> <p class="card-text"><strong>Abstract:</strong></p> This contribution aims to present a new protected hybrid WDM/TDM PON architecture using Wavelength Selective Switches and Optical Line Protection devices. The objective from using these technologies is to improve flexibility and enhance the protection of GPON networks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wavlenght%20Division%20Multiplexed%20Passive%20Optical%20Network%20%28WDM-PON%29" title="Wavlenght Division Multiplexed Passive Optical Network (WDM-PON)">Wavlenght Division Multiplexed Passive Optical Network (WDM-PON)</a>, <a href="https://publications.waset.org/abstracts/search?q=Time%20Division%20Multiplexed%20%20PON%20%28TDM-PON%29" title=" Time Division Multiplexed PON (TDM-PON)"> Time Division Multiplexed PON (TDM-PON)</a>, <a href="https://publications.waset.org/abstracts/search?q=architecture" title=" architecture"> architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=Protection" title=" Protection"> Protection</a>, <a href="https://publications.waset.org/abstracts/search?q=Wavelength%20Selective%20Switches%20%28WSS%29" title=" Wavelength Selective Switches (WSS)"> Wavelength Selective Switches (WSS)</a>, <a href="https://publications.waset.org/abstracts/search?q=Optical%20Line%20Protection%20%28OLP%29" title=" Optical Line Protection (OLP)"> Optical Line Protection (OLP)</a> </p> <a href="https://publications.waset.org/abstracts/18804/efficient-backup-protection-for-hybrid-wdmtdm-gpon-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/18804.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">542</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2364</span> Distance Protection Performance Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdelsalam%20Omar">Abdelsalam Omar </a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents simulation-based case study that indicate the need for accurate dynamic modeling of distance protection relay. In many cases, a static analysis based on current and voltage phasors may be sufficient to assess the performance of distance protection. There are several circumstances under which such a simplified study does not provide the depth of analysis necessary to obtain accurate results, however. This letter present study of the influences of magnetizing inrush and power swing on the performance of distance protection relay. One type of numerical distance protection relay has been investigated: 7SA511. The study has been performed in order to demonstrate the relay response when dynamic model of distance relay is utilized. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=distance%20protection" title="distance protection">distance protection</a>, <a href="https://publications.waset.org/abstracts/search?q=magnitizing%20inrush" title=" magnitizing inrush"> magnitizing inrush</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20swing" title=" power swing"> power swing</a>, <a href="https://publications.waset.org/abstracts/search?q=dynamic%20model%20of%20protection%20relays" title=" dynamic model of protection relays"> dynamic model of protection relays</a>, <a href="https://publications.waset.org/abstracts/search?q=simulatio" title=" simulatio"> simulatio</a> </p> <a href="https://publications.waset.org/abstracts/21116/distance-protection-performance-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21116.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">488</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2363</span> Lightning Protection Design Applied to Sustainable Development</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sylvain%20Fauveaux">Sylvain Fauveaux</a>, <a href="https://publications.waset.org/abstracts/search?q=T.%20Nowicki"> T. Nowicki</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Lightning protection is nowadays applied worldwide since the advent of international standards. Lightning protection is widely justified by the casualties and damages involved. As a matter of fact, the lightning business is constantly growing as more and more sensible areas need to be protected. However, the worldwide demand of copper materiel is increasing as well, its price too. Furthermore, the most frequently used method of protection is consuming a lot of copper. The copper production is also consuming a large amount of natural and power resources, not to mention the ecologic balance. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ESEAT" title="ESEAT">ESEAT</a>, <a href="https://publications.waset.org/abstracts/search?q=Lightning%20protection" title=" Lightning protection "> Lightning protection </a>, <a href="https://publications.waset.org/abstracts/search?q=natural%20resources%20management" title=" natural resources management"> natural resources management</a>, <a href="https://publications.waset.org/abstracts/search?q=NF%20C%2017-102" title=" NF C 17-102"> NF C 17-102</a>, <a href="https://publications.waset.org/abstracts/search?q=sustainable%20development" title=" sustainable development"> sustainable development</a> </p> <a href="https://publications.waset.org/abstracts/123819/lightning-protection-design-applied-to-sustainable-development" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/123819.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">161</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2362</span> Pilot Directional Protection Scheme Using Wireless Communication </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nitish%20Sharma">Nitish Sharma</a>, <a href="https://publications.waset.org/abstracts/search?q=G.%20G.%20Karady"> G. G. Karady</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents a scheme for the protection of loop system from all type of faults using the direction of fault current. The presence of distributed generation in today’s system increases the complexity of fault detection as the power flow is bidirectional. Hence, protection scheme specific to this purpose needs to be developed. This paper shows a fast protection scheme using communication which can be fiber optic or wireless. In this paper, the possibility of wireless communication for protection is studied to exchange the information between the relays. The negative sequence and positive sequence directional elements are used to determine the direction of fault current. A PSCAD simulation is presented and validated using commercial SEL relays. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=smart%20grid%20protection" title="smart grid protection">smart grid protection</a>, <a href="https://publications.waset.org/abstracts/search?q=pilot%20protection" title=" pilot protection"> pilot protection</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20system%20simulation" title=" power system simulation"> power system simulation</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20communication" title=" wireless communication"> wireless communication</a> </p> <a href="https://publications.waset.org/abstracts/27773/pilot-directional-protection-scheme-using-wireless-communication" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/27773.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">636</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2361</span> The Use of Crisis Workplace Technology to Protect Communication Processes of Critical Infrastructure</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jiri%20Barta">Jiri Barta</a>, <a href="https://publications.waset.org/abstracts/search?q=Ji%C5%99%C3%AD%20F.%20Urbanek"> Jiří F. Urbanek</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper deals with a protection of the national and European infrastructure. It is issue nowadays. The paper deals with the perspectives and possibilities of "smart solutions" to critical infrastructure protection. The research project deals with computers aided technologies are used from the perspective of new, better protection of selected infrastructure objects. Protection is focused on communication and information channels. These communication and information channels are very important for the functioning of the system of protection of critical infrastructure elements. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=interoperability" title="interoperability">interoperability</a>, <a href="https://publications.waset.org/abstracts/search?q=communication%20systems" title=" communication systems"> communication systems</a>, <a href="https://publications.waset.org/abstracts/search?q=controlling%20proces" title=" controlling proces"> controlling proces</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure" title=" critical infrastructure"> critical infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=crisis%20workplaces" title=" crisis workplaces"> crisis workplaces</a>, <a href="https://publications.waset.org/abstracts/search?q=continuity" title=" continuity"> continuity</a> </p> <a href="https://publications.waset.org/abstracts/17844/the-use-of-crisis-workplace-technology-to-protect-communication-processes-of-critical-infrastructure" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/17844.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">299</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2360</span> Production Structures of Energy Based on Water Force, Its Infrastructure Protection, and Possible Causes of Failure</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gabriela-Andreea%20Despescu">Gabriela-Andreea Despescu</a>, <a href="https://publications.waset.org/abstracts/search?q=M%C4%83d%C4%83lina-Elena%20Mavrodin"> Mădălina-Elena Mavrodin</a>, <a href="https://publications.waset.org/abstracts/search?q=Gheorghe%20L%C4%83z%C4%83roiu"> Gheorghe Lăzăroiu</a>, <a href="https://publications.waset.org/abstracts/search?q=Florin%20Adrian%20Gr%C4%83dinaru"> Florin Adrian Grădinaru</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of this paper is to contribute to the enhancement of a hydroelectric plant protection by coordinating protection measures and existing security and introducing new measures under a risk management process. Also, the plan identifies key critical elements of a hydroelectric plant, from its level vulnerabilities and threats it is subjected to in order to achieve the necessary protection measures to reduce the level of risk. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure" title="critical infrastructure">critical infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20analysis" title=" risk analysis"> risk analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure%20protection" title=" critical infrastructure protection"> critical infrastructure protection</a>, <a href="https://publications.waset.org/abstracts/search?q=vulnerability" title=" vulnerability"> vulnerability</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20management" title=" risk management"> risk management</a>, <a href="https://publications.waset.org/abstracts/search?q=turbine" title=" turbine"> turbine</a>, <a href="https://publications.waset.org/abstracts/search?q=impact%20analysis" title=" impact analysis"> impact analysis</a> </p> <a href="https://publications.waset.org/abstracts/37627/production-structures-of-energy-based-on-water-force-its-infrastructure-protection-and-possible-causes-of-failure" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/37627.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">547</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2359</span> SCR-Based Advanced ESD Protection Device for Low Voltage Application</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bo%20Bae%20Song">Bo Bae Song</a>, <a href="https://publications.waset.org/abstracts/search?q=Byung%20Seok%20Lee"> Byung Seok Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Hyun%20young%20Kim"> Hyun young Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Chung%20Kwang%20Lee"> Chung Kwang Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Yong%20Seo%20Koo"> Yong Seo Koo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper proposed a silicon controller rectifier (SCR) based ESD protection device to protect low voltage ESD for integrated circuit. The proposed ESD protection device has low trigger voltage and high holding voltage compared with conventional SCR-based ESD protection devices. The proposed ESD protection circuit is verified and compared by TCAD simulation. This paper verified effective low voltage ESD characteristics with low trigger voltage of 5.79V and high holding voltage of 3.5V through optimization depending on design variables (D1, D2, D3, and D4). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ESD" title="ESD">ESD</a>, <a href="https://publications.waset.org/abstracts/search?q=SCR" title=" SCR"> SCR</a>, <a href="https://publications.waset.org/abstracts/search?q=holding%20voltage" title=" holding voltage"> holding voltage</a>, <a href="https://publications.waset.org/abstracts/search?q=latch-up" title=" latch-up"> latch-up</a> </p> <a href="https://publications.waset.org/abstracts/21774/scr-based-advanced-esd-protection-device-for-low-voltage-application" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21774.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">575</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2358</span> Negative Sequence-Based Protection Techniques for Microgrid Connected Power Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Isabelle%20Snyder">Isabelle Snyder</a>, <a href="https://publications.waset.org/abstracts/search?q=Travis%20Smith"> Travis Smith</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Microgrid protection presents challenges to conventional protection techniques due to the low-induced fault current. Protection relays present in microgrid applications require a combination of settings groups to adjust based on the architecture of the microgrid in islanded and grid-connected modes. In a radial system where the microgrid is at the other end of the feeder, directional elements can be used to identify the direction of the fault current and switch settings groups accordingly (grid-connected or microgrid-connected). However, with multiple microgrid connections, this concept becomes more challenging, and the direction of the current alone is not sufficient to identify the source of the fault current contribution. ORNL has previously developed adaptive relaying schemes through other DOE-funded research projects that will be evaluated and used as a baseline for this research. The four protection techniques in this study are labeled as follows: (1) Adaptive Current only Protection System (ACPS), Intentional (2) Unbalanced Control for Protection Control (IUCPC), (3) Adaptive Protection System with Communication Controller (APSCC) (4) Adaptive Model-Driven Protective Relay (AMDPR). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=adaptive%20relaying" title="adaptive relaying">adaptive relaying</a>, <a href="https://publications.waset.org/abstracts/search?q=microgrid%20protection" title=" microgrid protection"> microgrid protection</a>, <a href="https://publications.waset.org/abstracts/search?q=sequence%20components" title=" sequence components"> sequence components</a>, <a href="https://publications.waset.org/abstracts/search?q=islanding%20detection" title=" islanding detection"> islanding detection</a> </p> <a href="https://publications.waset.org/abstracts/171820/negative-sequence-based-protection-techniques-for-microgrid-connected-power-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/171820.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">96</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2357</span> International Protection Mechanisms for Refugees</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Djehich%20Mohamed%20Yousri">Djehich Mohamed Yousri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent years, the world has witnessed a phenomenon of displacement that is unprecedented in history. The number of refugees has reached record levels, due to wars, persecution, many conflicts and repression in a number of countries. The interest of United Nations bodies and international and regional organizations in the issue of refugees has increased, as they have defined a refugee and thus Determining who is entitled to this legal protection, and the 1951 Convention for the Protection of Refugees defines rights for refugee protection and sets obligations that they must perform. The institutional mechanisms for refugee protection are represented in the various agencies that take care of refugee affairs. At the forefront of these agencies is the United Nations High Commissioner for Refugees, as well as the various efforts provided by the International Committee of the Red Cross and the United Nations Relief and Works Agency for Palestine Refugees in the Middle East (UNRWA). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=protection" title="protection">protection</a>, <a href="https://publications.waset.org/abstracts/search?q=refugees" title=" refugees"> refugees</a>, <a href="https://publications.waset.org/abstracts/search?q=international" title=" international"> international</a>, <a href="https://publications.waset.org/abstracts/search?q=persecution" title=" persecution"> persecution</a>, <a href="https://publications.waset.org/abstracts/search?q=legal" title=" legal"> legal</a> </p> <a href="https://publications.waset.org/abstracts/162667/international-protection-mechanisms-for-refugees" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/162667.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">78</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2356</span> Protection Plan of Medium Voltage Distribution Network in Tunisia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=S.%20Chebbi">S. Chebbi</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Meddeb"> A. Meddeb</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The distribution networks are often exposed to harmful incidents which can halt the electricity supply of the customer. In this context, we studied a real case of a critical zone of the Tunisian network which is currently characterized by the dysfunction of its plan of protection. In this paper, we were interested in the harmonization of the protection plan settings in order to ensure a perfect selectivity and a better continuity of service on the whole of the network. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=distribution%20network%20Gabes-Tunisia" title="distribution network Gabes-Tunisia">distribution network Gabes-Tunisia</a>, <a href="https://publications.waset.org/abstracts/search?q=continuity%20of%20service" title=" continuity of service"> continuity of service</a>, <a href="https://publications.waset.org/abstracts/search?q=protection%20plan%20settings" title=" protection plan settings"> protection plan settings</a>, <a href="https://publications.waset.org/abstracts/search?q=selectivity" title=" selectivity"> selectivity</a> </p> <a href="https://publications.waset.org/abstracts/15428/protection-plan-of-medium-voltage-distribution-network-in-tunisia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/15428.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">510</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2355</span> Automatic Approach for Estimating the Protection Elements of Electric Power Plants</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mahmoud%20Mohammad%20Salem%20Al-Suod">Mahmoud Mohammad Salem Al-Suod</a>, <a href="https://publications.waset.org/abstracts/search?q=Ushkarenko%20O.%20Alexander"> Ushkarenko O. Alexander</a>, <a href="https://publications.waset.org/abstracts/search?q=Dorogan%20I.%20Olga"> Dorogan I. Olga</a> </p> <p class="card-text"><strong>Abstract:</strong></p> New algorithms using microprocessor systems have been proposed for protection the diesel-generator unit in autonomous power systems. The software structure is designed to enhance the control automata of the system, in which every protection module of diesel-generator encapsulates the finite state machine. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=diesel-generator%20unit" title="diesel-generator unit">diesel-generator unit</a>, <a href="https://publications.waset.org/abstracts/search?q=protection" title=" protection"> protection</a>, <a href="https://publications.waset.org/abstracts/search?q=state%20diagram" title=" state diagram"> state diagram</a>, <a href="https://publications.waset.org/abstracts/search?q=control%20system" title=" control system"> control system</a>, <a href="https://publications.waset.org/abstracts/search?q=algorithm" title=" algorithm"> algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20components" title=" software components"> software components</a> </p> <a href="https://publications.waset.org/abstracts/41588/automatic-approach-for-estimating-the-protection-elements-of-electric-power-plants" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/41588.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">419</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2354</span> Protection System Mis-operations: Fundamental Concepts and Learning from Indian Power Sector</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pankaj%20Kumar%20Jha">Pankaj Kumar Jha</a>, <a href="https://publications.waset.org/abstracts/search?q=Mahendra%20Singh%20Hada"> Mahendra Singh Hada</a>, <a href="https://publications.waset.org/abstracts/search?q=Brijendra%20Singh"> Brijendra Singh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Protection system is an essential feature of the electrical system which helps in detection and removal of faults. Protection system consists of many subsystems like relays, circuit breakers, instrument transformers, auxiliary DC system, auxiliary relays etc. Although the fundamental protective and relay operating concepts are similar throughout the world, there are very significant differences in their implementation. These differences arise through different traditions, operating philosophies, experiences and national standards. Protection system mis-operation due to problem in one or more of its subsystem or inadequate knowledge of numerical relay settings and configuration are very common throughout the world. Protection system mis-operation leads to unstable and unreliable grid operation. In this paper we will discuss about the fundamental concepts of protective relaying and the reasons for protection system mis-operation due to one or more of its subsystems. Many real-world case studies of protection system mis-operation from Indian power sector are discussed in detail in this paper. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=auxiliary%20trip%20relays" title="auxiliary trip relays">auxiliary trip relays</a>, <a href="https://publications.waset.org/abstracts/search?q=bus%20zone" title=" bus zone"> bus zone</a>, <a href="https://publications.waset.org/abstracts/search?q=check%20zone" title=" check zone"> check zone</a>, <a href="https://publications.waset.org/abstracts/search?q=CT%20saturation" title=" CT saturation"> CT saturation</a>, <a href="https://publications.waset.org/abstracts/search?q=dead%20zone%20protection" title=" dead zone protection"> dead zone protection</a>, <a href="https://publications.waset.org/abstracts/search?q=DC%20ground%20faults" title=" DC ground faults"> DC ground faults</a>, <a href="https://publications.waset.org/abstracts/search?q=DMT" title=" DMT"> DMT</a>, <a href="https://publications.waset.org/abstracts/search?q=DR" title=" DR"> DR</a>, <a href="https://publications.waset.org/abstracts/search?q=end%20fault%20protection" title=" end fault protection"> end fault protection</a>, <a href="https://publications.waset.org/abstracts/search?q=instrument%20transformer" title=" instrument transformer"> instrument transformer</a>, <a href="https://publications.waset.org/abstracts/search?q=SOTF" title=" SOTF"> SOTF</a>, <a href="https://publications.waset.org/abstracts/search?q=STUB" title=" STUB"> STUB</a> </p> <a href="https://publications.waset.org/abstracts/171178/protection-system-mis-operations-fundamental-concepts-and-learning-from-indian-power-sector" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/171178.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">76</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2353</span> Hot-Dip Galvanizing as a Corrosion Protection System for Steel Hydraulic Structures</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Farrokh%20Taherkhani">Farrokh Taherkhani</a>, <a href="https://publications.waset.org/abstracts/search?q=Thomas%20Pinger"> Thomas Pinger</a>, <a href="https://publications.waset.org/abstracts/search?q=Max%20G%C3%BCndel"> Max Gündel</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Corrosion and suitable corrosion protection systems are a significant factor in the consideration of life cycle costs for steel hydraulic structures. In addition to classic coating systems (for example, epoxy resin or polyurethane), zinc and its alloys offer effective and very durable corrosion protection for steels. As a protective layer, hot-dip galvanizing prevents the corrosive media from penetrating into the steel matrix and acts as a sacrificial anode, which corrodes in preference to steel. However, hot-dip galvanizing as a corrosion protection system has not yet been approved by the relevant authority, the Federal Waterways Engineering and Research Institute (BAW) in Germany. In order to make hot-dip galvanizing usable as a corrosion protection system for steel hydraulic structures in the future, different factors must be considered. These factors are (i) corrosion protection type, (ii) resistance to mechanical stress (i.e., abrasion resistance), (iii) combinability with cathodic corrosion protection, (iv) environmental effects, and (v) the crack formation and propagation during hot-dip galvanizing. In this work, hot-dip galvanizing as a corrosion protection system for steel hydraulic steel structures, as well as open questions, are discussed. This paper is based on initial long-term exposure tests with corrosion protection systems consisting of hot-dip galvanizing and duplex systems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=steel%20hydraulic%20structure" title="steel hydraulic structure">steel hydraulic structure</a>, <a href="https://publications.waset.org/abstracts/search?q=hot-dip%20galvanizing" title=" hot-dip galvanizing"> hot-dip galvanizing</a>, <a href="https://publications.waset.org/abstracts/search?q=corrosion%20resistance" title=" corrosion resistance"> corrosion resistance</a>, <a href="https://publications.waset.org/abstracts/search?q=zinc%20coating" title=" zinc coating"> zinc coating</a>, <a href="https://publications.waset.org/abstracts/search?q=organic%20coating%20and%20duplex%20systems" title=" organic coating and duplex systems"> organic coating and duplex systems</a> </p> <a href="https://publications.waset.org/abstracts/187712/hot-dip-galvanizing-as-a-corrosion-protection-system-for-steel-hydraulic-structures" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/187712.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">43</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2352</span> Design Considerations on Cathodic Protection for X65 Steel Tank Containing Fresh Water</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20M.%20Al-Sabagh">A. M. Al-Sabagh</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20A.%20Deyab"> M. A. Deyab</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20N.%20Kroush"> M. N. Kroush</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The present study focused on critical and detailed approach for using aluminum electrode as impressed current anode for cathodic protection of X65 steel tank containing fresh water. The impressed current design calculation showed 0.6 A of current demand and voltage of 0.33 V required to adequately protect the X65 steel tank with internal surface area of 421 m². We used here one transformer rectifier with current and voltage output of 25 A and 25 V, respectively. The data showed that the potentials ranged from -0.474 to -0.509 V (vs. Cu/CuSO₄), prior to the application of cathodic protection. When the potential was measured 1 h after the application of cathodic protection, the potential values showed considerable shift within protection range (-0.950 V vs. Cu/CuSO₄). The results confirmed that aluminum anode can be used in freshwater applications with high efficiency (current capacity) and low consumption rate. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cathodic%20protection" title="cathodic protection">cathodic protection</a>, <a href="https://publications.waset.org/abstracts/search?q=aluminum" title=" aluminum"> aluminum</a>, <a href="https://publications.waset.org/abstracts/search?q=steel" title=" steel"> steel</a>, <a href="https://publications.waset.org/abstracts/search?q=fresh%20water" title=" fresh water"> fresh water</a> </p> <a href="https://publications.waset.org/abstracts/91429/design-considerations-on-cathodic-protection-for-x65-steel-tank-containing-fresh-water" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/91429.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">154</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2351</span> The Importance of Fire Safety in Egypt</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Omar%20Shakra">Omar Shakra</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper contains a huge number of benefits that we can use it in several places and times in fire safety protection in the Middle East especially in Egypt . People here in Egypt did not consider the safety and fire protection as important as it is. But on the other hand, its very important for them to contain the fire systems and safety in every facility, the companies , hospitals , police stations , and even the super markets must use the fire system. It makes the facility safe to the visitors while they are using it.From my point of view as the owner Fire Safety Company called Deluge Egypt , i can say that not all of the companies use the fire system protection according to the high cost they prefer to build their company without the protection, and this is make the building totally unsafe to be used from the visitors or client.So, i am looking for new methods and technology to invest in Egypt, and this is through attending this Conference and let the audiences know more about the services i provide and [to let them know about the importance of the Fire Safety in Egypt. The Objectives of my research 1- The system that i used in my Company. 2- The benefits of the Fire System Protection. 3-The importance of the Fire System and safety. 4-The use of the new Technologies. 5-The hardships that i found while having new deals with new clients. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fire" title="fire">fire</a>, <a href="https://publications.waset.org/abstracts/search?q=system" title=" system"> system</a>, <a href="https://publications.waset.org/abstracts/search?q=protection" title=" protection"> protection</a>, <a href="https://publications.waset.org/abstracts/search?q=fire%20hydrants" title=" fire hydrants"> fire hydrants</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=alarms" title=" alarms"> alarms</a> </p> <a href="https://publications.waset.org/abstracts/171993/the-importance-of-fire-safety-in-egypt" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/171993.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">109</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2350</span> Regulating User Experience Design, in the European Union, as a Way to Narrow Down the Gap Between Consumers’ Protection and Algorithms Employment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Prisecaru%20Diana-Sorina">Prisecaru Diana-Sorina</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper will show that, while the EU legislator tackled a series of UX patterns used in e-commerce to induce the consumers take actions that they would not normally undertake, it leaves out many other aspects related to misuse or poor UX design that adversely affect EU consumers. Further, the paper proposes a reevaluation of the regulatory addressability of the issue and hand and focuses on explaining why a joint strategy, based on the interplay between provisions aiming consumer protection and personal data protection is the key approach to this matter. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=algorithms" title="algorithms">algorithms</a>, <a href="https://publications.waset.org/abstracts/search?q=consumer%20protection" title=" consumer protection"> consumer protection</a>, <a href="https://publications.waset.org/abstracts/search?q=European%20Union" title=" European Union"> European Union</a>, <a href="https://publications.waset.org/abstracts/search?q=user%20experience%20design" title=" user experience design"> user experience design</a> </p> <a href="https://publications.waset.org/abstracts/147243/regulating-user-experience-design-in-the-european-union-as-a-way-to-narrow-down-the-gap-between-consumers-protection-and-algorithms-employment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/147243.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">136</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2349</span> Challenges in Anti-Counterfeiting of Cyber-Physical Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Daniel%20Kliewe">Daniel Kliewe</a>, <a href="https://publications.waset.org/abstracts/search?q=Arno%20K%C3%BChn"> Arno Kühn</a>, <a href="https://publications.waset.org/abstracts/search?q=Roman%20Dumitrescu"> Roman Dumitrescu</a>, <a href="https://publications.waset.org/abstracts/search?q=J%C3%BCrgen%20Gausemeier"> Jürgen Gausemeier</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper examines the system protection for cyber-physical systems (CPS). CPS are particularly characterized by their networking system components. This means they are able to adapt to the needs of their users and its environment. With this ability, CPS have new, specific requirements on the protection against anti-counterfeiting, know-how loss and manipulation. They increase the requirements on system protection because piracy attacks can be more diverse, for example because of an increasing number of interfaces or through the networking abilities. The new requirements were identified and in a next step matched with existing protective measures. Due to the found gap the development of new protection measures has to be forced to close this gap. Moreover a comparison of the effectiveness between selected measures was realized and the first results are presented in the paper. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anti-counterfeiting" title="anti-counterfeiting">anti-counterfeiting</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20physical%20systems" title=" cyber physical systems"> cyber physical systems</a>, <a href="https://publications.waset.org/abstracts/search?q=intellectual%20property%20%28IP%29" title=" intellectual property (IP)"> intellectual property (IP)</a>, <a href="https://publications.waset.org/abstracts/search?q=knowledge%20management" title=" knowledge management"> knowledge management</a>, <a href="https://publications.waset.org/abstracts/search?q=system%20protection" title=" system protection"> system protection</a> </p> <a href="https://publications.waset.org/abstracts/29278/challenges-in-anti-counterfeiting-of-cyber-physical-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29278.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">498</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2348</span> Rural Tourism Planning from the Perspective of Water Resource Protection and Regional Integration: Taking Villages along Tongji Lake as an Example</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pianpian%20Zhang">Pianpian Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Qingping%20Luo"> Qingping Luo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Currently, there is a great tendency that more and more villages in China are trying to increase income by development of tourism. Especially in Zhejiang Province, 'Beautiful Rural Construction' provides an excellent opportunity for the development of tourism. In this context, development orientation, transportation routes and tourism service facilities are analyzed under the perspective of water resources protection and regional integration based on the development tourism industry of the six villages in Pujiang County, Zhejiang Province as a research object. In the program, the biggest issue is the contradiction between the ecological protection of the water and the development of economy. How to deal with the relationship between protection and development is the key to the design of this case. Furthermore, the six villages are regarded as a whole, connecting to each other by the system of five-path and the landscape along the lake. Every village has its own features, but cannot develop without one another. The article is actively exploring for suggestions and countermeasures to promote the development premised on protection and based on a regional view. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=development" title="development">development</a>, <a href="https://publications.waset.org/abstracts/search?q=integration" title=" integration"> integration</a>, <a href="https://publications.waset.org/abstracts/search?q=protection" title=" protection"> protection</a>, <a href="https://publications.waset.org/abstracts/search?q=rural%20tourism" title=" rural tourism"> rural tourism</a> </p> <a href="https://publications.waset.org/abstracts/67148/rural-tourism-planning-from-the-perspective-of-water-resource-protection-and-regional-integration-taking-villages-along-tongji-lake-as-an-example" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/67148.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">362</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2347</span> Recognition and Protection of Indigenous Society in Indonesia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Triyanto">Triyanto</a>, <a href="https://publications.waset.org/abstracts/search?q=Rima%20Vien%20Permata%20Hartanto"> Rima Vien Permata Hartanto</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Indonesia is a legal state. The consequence of this status is the recognition and protection of the existence of indigenous peoples. This paper aims to describe the dynamics of legal recognition and protection for indigenous peoples within the framework of Indonesian law. This paper is library research based on literature. The result states that although the constitution has normatively recognized the existence of indigenous peoples and their traditional rights, in reality, not all rights were recognized and protected. The protection and recognition for indigenous people need to be strengthened. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=indigenous%20peoples" title="indigenous peoples">indigenous peoples</a>, <a href="https://publications.waset.org/abstracts/search?q=customary%20law" title=" customary law"> customary law</a>, <a href="https://publications.waset.org/abstracts/search?q=state%20law" title=" state law"> state law</a>, <a href="https://publications.waset.org/abstracts/search?q=state%20of%20law" title=" state of law"> state of law</a> </p> <a href="https://publications.waset.org/abstracts/74295/recognition-and-protection-of-indigenous-society-in-indonesia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/74295.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">330</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2346</span> Challenges in Providing Protection to the Conflict-Affected Refugee Children in Pakistan: A Critical Analysis of the 1951 Refugee Convention </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Faiz%20Bakhsh">Faiz Bakhsh</a>, <a href="https://publications.waset.org/abstracts/search?q=Tahira%20Yasmeen"> Tahira Yasmeen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Afghan refugee children in Pakistan are considered as the most vulnerable persons in danger of being abused and treated badly as compared to the minimum criteria of the protection of refugee children under 1951 refugee convention. This paper explores the impact of the 1951 refugee convention on the protection of refugee children, affected by the armed conflict in Afghanistan, residing in refugee camps in Pakistan. Despite, protection available under Refugee Convention, there exist millions of refugees in the world, including a huge portion of women and children, that remain unprotected, and their protection remains a challenging task for the world community. This study investigates the status and number of refugees in Pakistan, especially children; protection and assistance of refugees under Refugee Convention; protection of the rights of refugee children in Pakistan; and implementation of the rules of Refugee Convention relating refugee children in Pakistan and measures for the protection of refugee children in Pakistan. This socio-legal study utilizes a qualitative research approach and applies mixed methods of data collection. The primary data is collected through the interpretation of the legal framework available for the protection of refugees as well as domestic laws of Pakistan. The secondary data is collected through previous studies available on the same topic. The result of this study indicates that lack of proper implementation of the rules, of the Refugee Convention, relating protection of refugee children cause sufferings to refugee children including the provision of basic health, nutrition, family life, education and protection from child abuse. Pakistan needs a comprehensive domestic legal framework for the protection of refugees, especially refugee children. Moreover, the government of Pakistan with the help of the United Nations High Commissioner for Refugees (UNHCR) must prioritize the protection of Afghan refugee children as per standard criteria provided by the refugee convention 1951. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=refugee%20children" title="refugee children">refugee children</a>, <a href="https://publications.waset.org/abstracts/search?q=refugee%20convention" title=" refugee convention"> refugee convention</a>, <a href="https://publications.waset.org/abstracts/search?q=armed%20conflict" title=" armed conflict"> armed conflict</a>, <a href="https://publications.waset.org/abstracts/search?q=Pakistan" title=" Pakistan"> Pakistan</a> </p> <a href="https://publications.waset.org/abstracts/101975/challenges-in-providing-protection-to-the-conflict-affected-refugee-children-in-pakistan-a-critical-analysis-of-the-1951-refugee-convention" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/101975.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">160</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2345</span> Analysis on the Copyright Protection Dilemma of Webcast in 'Internet Plus' Era</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yi%20Yang">Yi Yang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the era of 'Internet plus', the rapid development of webcast has posed new challenges to the intellectual property law. Meanwhile, traditional copyright protection has also exposed the existing theoretical imbalance in webcast. Through the analysis of the outstanding problems in the copyright protection of the network live broadcast, this paper points out that the main causes of the problems are the unclear nature of the copyright of the network live broadcast, the copyright protection system of the game network live broadcast has not yet been constructed, and the copyright infringement of the pan entertainment live broadcast is mostly, and so on. Based on the current practice, this paper puts forward the specific thinking of the protection path of online live broadcast copyright. First of all, to provide a reasonable judicial solution for a large number of online live copyright cases, we need to integrate the right scope and regulatory behavior of broadcasting right and information network communication right. Secondly, in order to protect the rights of network anchors, the webcast should be regarded as works. Thirdly, in order to protect the copyright of webcast and prevent the infringement of copyright by webcast, the webcast platform will be used as an intermediary to provide solutions for solving the judicial dilemma. In the era of 'Internet plus', it is a theoretical attempt to explore the protection and method of copyright protection on webcast, which has positive guiding significance for judicial practice. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=%27Internet%20Plus%27%20era" title="'Internet Plus' era">'Internet Plus' era</a>, <a href="https://publications.waset.org/abstracts/search?q=webcast" title=" webcast"> webcast</a>, <a href="https://publications.waset.org/abstracts/search?q=copyright" title=" copyright"> copyright</a>, <a href="https://publications.waset.org/abstracts/search?q=protection%20dilemma" title=" protection dilemma"> protection dilemma</a> </p> <a href="https://publications.waset.org/abstracts/124731/analysis-on-the-copyright-protection-dilemma-of-webcast-in-internet-plus-era" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/124731.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">113</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2344</span> Infringement of Patent Rights with Doctrine of Equivalent for Turkey</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Duru%20Helin%20Ozaner">Duru Helin Ozaner</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Due to the doctrine of equivalent, the words in the claims' sentences are insufficient for the protection area provided by the patent registration. While this situation widens the boundaries of the protection area, it also obscures the boundaries of the protected area of patents. In addition, it creates distrust for third parties. Therefore, the doctrine of equivalent aims to establish a balance between the rights of patent owners and the legal security of third parties. The current legal system of Turkey has been tried to be created as a parallel judicial system to the widely applied regulations. Therefore, the regulations regarding the protection provided by patents in the current Turkish legal system are similar to many countries. However, infringement through equivalent is common by third parties. This study, it is aimed to explain that the protection provided by the patent is not only limited to the words of the claims but also the wide-ranging protection provided by the claims for the doctrine of equivalence. This study is important to determine the limits of the protection provided by the patent right holder and to indicate the importance of the equivalent elements of the protection granted to the patent right holder. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=patent" title="patent">patent</a>, <a href="https://publications.waset.org/abstracts/search?q=infringement" title=" infringement"> infringement</a>, <a href="https://publications.waset.org/abstracts/search?q=intellectual%20property" title=" intellectual property"> intellectual property</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20doctrine%20of%20equivalent" title=" the doctrine of equivalent"> the doctrine of equivalent</a> </p> <a href="https://publications.waset.org/abstracts/141450/infringement-of-patent-rights-with-doctrine-of-equivalent-for-turkey" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/141450.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">214</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2343</span> The Role of Data Protection Officer in Managing Individual Data: Issues and Challenges</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nazura%20Abdul%20Manap">Nazura Abdul Manap</a>, <a href="https://publications.waset.org/abstracts/search?q=Siti%20Nur%20Farah%20Atiqah%20Salleh"> Siti Nur Farah Atiqah Salleh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> For decades, the misuse of personal data has been a critical issue. Malaysia has accepted responsibility by implementing the Malaysian Personal Data Protection Act 2010 to secure personal data (PDPA 2010). After more than a decade, this legislation is set to be revised by the current PDPA 2023 Amendment Bill to align with the world's key personal data protection regulations, such as the European Union General Data Protection Regulations (GDPR). Among the other suggested adjustments is the Data User's appointment of a Data Protection Officer (DPO) to ensure the commercial entity's compliance with the PDPA 2010 criteria. The change is expected to be enacted in parliament fairly soon; nevertheless, based on the experience of the Personal Data Protection Department (PDPD) in implementing the Act, it is projected that there will be a slew of additional concerns associated with the DPO mandate. Consequently, the goal of this article is to highlight the issues that the DPO will encounter and how the Personal Data Protection Department should respond to this subject. The study result was produced using a qualitative technique based on an examination of the current literature. This research reveals that there are probable obstacles experienced by the DPO, and thus, there should be a definite, clear guideline in place to aid DPO in executing their tasks. It is argued that appointing a DPO is a wise measure in ensuring that the legal data security requirements are met. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=guideline" title="guideline">guideline</a>, <a href="https://publications.waset.org/abstracts/search?q=law" title=" law"> law</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20protection%20officer" title=" data protection officer"> data protection officer</a>, <a href="https://publications.waset.org/abstracts/search?q=personal%20data" title=" personal data"> personal data</a> </p> <a href="https://publications.waset.org/abstracts/164137/the-role-of-data-protection-officer-in-managing-individual-data-issues-and-challenges" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/164137.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">78</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2342</span> Stuck Down in the Mess of Aisles: Need of a Practical Consumer Welfare Policy Framework in Sri Lanka with Special Reference to Japan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=E.%20N.%20R.%20de%20Silva">E. N. R. de Silva</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The main purpose of this research is to set a policy framework for establishing a legal, institutional and social infrastructure that enhances the welfare, health, safety and economic interest of the consumers in Sri Lanka. It will help to develop an approach to continuously and successfully advocate for a consumer protection legal reform agenda and also it is significant as it gives directions to create national consumer protection associations in Sri Lanka. The methodology adopted for this research is purely a qualitative approach and it is generally and specifically categorized. Generally, part of this research looked at the existing laws, regulations and how effective they are in order to protect consumers. It will analyze the consumer protection framework and specially, consumer protection enhanced by the public organizations in Japan. This research offers a model with methods and legal instruments to enforce advocacy group to enhance consumer welfare, also brings out reforms to be made in the national legal framework on consumer welfare. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=consumer%20protection%20association" title="consumer protection association">consumer protection association</a>, <a href="https://publications.waset.org/abstracts/search?q=consumer%20protection%20law" title=" consumer protection law"> consumer protection law</a>, <a href="https://publications.waset.org/abstracts/search?q=consumer%20welfare" title=" consumer welfare"> consumer welfare</a>, <a href="https://publications.waset.org/abstracts/search?q=legal%20framework" title=" legal framework"> legal framework</a> </p> <a href="https://publications.waset.org/abstracts/63357/stuck-down-in-the-mess-of-aisles-need-of-a-practical-consumer-welfare-policy-framework-in-sri-lanka-with-special-reference-to-japan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/63357.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">370</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2341</span> Improving an Automotive Bumper Structure for Pedestrian Protection</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Hassan%20Shojaeefard">Mohammad Hassan Shojaeefard</a>, <a href="https://publications.waset.org/abstracts/search?q=Abolfazl%20Khalkhali"> Abolfazl Khalkhali</a>, <a href="https://publications.waset.org/abstracts/search?q=Khashayar%20Ghadirinejad"> Khashayar Ghadirinejad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the present study, first, a three-dimensional finite element model of lower legform impactor according to the pedestrian protection regulation EC 78/2009 is carried out. The FE model of lower legform impactor then validated on static and dynamic tests by three main criteria which are bending angle, shear displacement and upper tibia acceleration. At the second step, the validated impactor is employed to evaluate bumper of a B-class automotive based on pedestrian protection criteria defined in EC regulation. Finally, based on some investigations an improved design for the bumper is then represented and compared with the base design. Results show that very good improvement in meeting the pedestrian protection criteria is achieved. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=pedestrian%20protection" title="pedestrian protection">pedestrian protection</a>, <a href="https://publications.waset.org/abstracts/search?q=legform%20impactor" title=" legform impactor"> legform impactor</a>, <a href="https://publications.waset.org/abstracts/search?q=automotive%20bumper" title=" automotive bumper"> automotive bumper</a>, <a href="https://publications.waset.org/abstracts/search?q=finite%20element%20method" title=" finite element method"> finite element method</a> </p> <a href="https://publications.waset.org/abstracts/54450/improving-an-automotive-bumper-structure-for-pedestrian-protection" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/54450.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">251</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=CBRNe%20protection&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=CBRNe%20protection&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=CBRNe%20protection&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=CBRNe%20protection&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=CBRNe%20protection&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=CBRNe%20protection&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=CBRNe%20protection&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=CBRNe%20protection&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=CBRNe%20protection&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=CBRNe%20protection&page=78">78</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=CBRNe%20protection&page=79">79</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=CBRNe%20protection&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>