Abstract: To determine the presence and location of faults in a transmission by the adaptation of protective distance relay based on the measurement of fixed settings as line impedance is achieved by several different techniques. Moreover, a fast, accurate and robust technique for real-time purposes is required for the modern power systems. The appliance of radial basis function neural network in transmission line protection is demonstrated in this paper. The method applies the power system via voltage and current signals to learn the hidden relationship presented in the input patterns. It is experiential that the proposed technique is competent to identify the particular fault direction more speedily. System simulations studied show that the proposed approach is able to distinguish the direction of a fault on a transmission line swiftly and correctly, therefore suitable for the real-time purposes.
Abstract: The globe Sustainability has become the subject of international attention, the key reason is that global climate change. Climate and disasters around the abnormal frequency multiplier, the global temperature of the catastrophe and disaster continue to occur throughout the world, as well as countries around the world. Currently there are many important international conferences and policy, it is a "global environmental sustainability " and "living human health " as the goal of development, including the APEC 2007 meeting to "climate Clean Energy" as the theme Sydney Declaration, 2008 World Economic Forum's "Carbon - promote Cool Earth energy efficiency improvement project", the EU proposed "Green Idea" program, the Japanese annual policy, "low-carbon society, sustainable eco-city environment (Eco City) "And from 2009 to 2010 to promote the "Eco-Point" to promote green energy and carbon reduction products .And the 2010 World Climate Change Conference (COP16 United Nations Climate Change Conference Copenhagen), the world has been the subject of Negative conservative "Environmental Protection ", "save energy consumption, " into a positive response to the "Sustainable " and" LOHAS", while Taiwan has actively put forward eco-cities, green building, green building materials and other related environmental response Measures, especially green building construction environment that is the basis of factors, the most widely used application level, and direct contact with human health and the key to sustainable planet. "Sustainable development "is a necessary condition for continuation of the Earth, "healthy and comfortable" is a necessary condition for the continuation of life, and improve the "quality" is a necessary condition for economic development, balance between the three is "to enhance the efficiency of ", According to the World Business Council for Sustainable Development (WBCSD) for the "environmental efficiency "(Eco-Efficiency) proposed: " the achievement of environmental efficiency, the price to be competitive in the provision of goods or services to meet people's needs, improve living Quality at the same time, the goods or services throughout the life cycle. Its impact on the environment and natural resource utilization and gradually reduced to the extent the Earth can load. "whichever is the economy "Economic" and " Ecologic". The research into the methodology to obtain the Taiwan Green Building Material Labeling product as the scope of the study, by investigating and weight analysis to explore green building environmental load (Ln) factor and the Green Building Quality (Qn) factor to Establish green building environmental efficiency assessment model (GBM Eco-Efficiency). And building materials for healthy green label products for priority assessment object, the object is set in the material evidence for the direct response to the environmental load from the floor class-based, explicit feedback correction to the Green Building environmental efficiency assessment model, "efficiency " as a starting point to achieve balance between human "health "and Earth "sustainable development of win-win strategy. The study is expected to reach 1.To establish green building materials and the quality of environmental impact assessment system, 2. To establish value of GBM Eco-Efficiency model, 3. To establish the GBM Eco-Efficiency model for application of green building material feedback mechanisms.
Abstract: Dredging activities inevitably cause sediment
dispersion. In certain locations, where there are important ecological
areas such as mangroves or coral reefs, carefully planning the
dredging can significantly reduce negative impacts. This article
utilizes the dredging at Phuket port, Thailand, as a case study to
demonstrate how computer simulations can be helpful to protect
existing coral reefs. A software package named MIKE21 was
applied. Necessary information required by the simulations was
gathered. After calibrating and verifying the model, various dredging
scenario were simulated to predict spoil movement. The simulation
results were used as guidance to setting up an environmental
measure. Finally, the recommendation to dredge during flood tide
with silt curtains installed was made.
Abstract: While service quality is acceptably most valued in the tourism industry, the issue of safety and security plays a key role in sustaining the industry success. Such an issue has been part of Thailand-s tourism development and promotion for several years. Evidently, the Tourist Police Department was set up for this purpose. Its main responsibility is to deal with international tourists- safety and confidence in travelling within Thai territory. However, to strengthen the tourism safety of the country, it is important to better understand international tourists- safety concerns about Thailand. This article seeks to compare international tourists- safety needs and Thai tourist polices- perception towards the tourists- safety concern to determine what measure should be taken to assure the tourist of Thailand-s secure environment. Through the employment of quantitative and qualitative methodological approaches, the tourism safety need of international tourists from Europe, North America and Asia was excavated, how Thai tourist polices and local polices perceived the international tourist-s safety concern was investigated, and opinion and experiences about how the police deal with international tourists- problems in eight touristic areas were also explored. A comparative result reveals a certain degrees of differences in international tourists- safety needs and Thai polices- perception towards their needs. The tourism safety prevention and protection measure and practice are also suggested.
Abstract: A new approach for protection of power transformer is
presented using a time-frequency transform known as Wavelet transform.
Different operating conditions such as inrush, Normal, load,
External fault and internal fault current are sampled and processed
to obtain wavelet coefficients. Different Operating conditions provide
variation in wavelet coefficients. Features like energy and Standard
deviation are calculated using Parsevals theorem. These features
are used as inputs to PNN (Probabilistic neural network) for fault
classification. The proposed algorithm provides more accurate results
even in the presence of noise inputs and accurately identifies inrush
and fault currents. Overall classification accuracy of the proposed
method is found to be 96.45%. Simulation of the fault (with and
without noise) was done using MATLAB AND SIMULINK software
taking 2 cycles of data window (40 m sec) containing 800 samples.
The algorithm was evaluated by using 10 % Gaussian white noise.
Abstract: Flood management is one of the important fields in
urban storm water management. Floods are influenced by the
increase of huge storm event, or improper planning of the area. This study mainly provides the flood protection in four stages; planning,
flood event, responses and evaluation. However it is most effective then flood protection is considered in planning/design and
evaluation stages since both stages represent the land development of the area. Structural adjustments are often more reliable than nonstructural
adjustments in providing flood protection, however
structural adjustments are constrained by numerous factors such as
political constraints and cost. Therefore it is important to balance
both adjustments with the situation. The technical decisions provided
will have to be approved by the higher-ups who have the power to
decide on the final solution. Costs however, are the biggest factor in
determining the final decision. Therefore this study recommends
flood protection system should have been integrated and enforces
more in the early stages (planning and design) as part of the storm
water management plan. Factors influencing the technical decisions
provided should be reduced as low as possible to avoid a reduction in
the expected performance of the proposed adjustments.
Abstract: Corrosion of metallic water pipelines buried below
ground surface is a function of the nature of the surrounding soil and
groundwater. This gives the importance of knowing the physical and
chemical characteristics of the pipe-s surrounding environment. The
corrosion of externally – unprotected metallic water pipelines,
specially ductile iron pipes, in localities with aggressive soil
conditions is becoming a significant problem. Anticorrosive
protection for metallic water pipelines, their fittings and accessories
is very important, because they may be attached by corrosion with
time. The tendency of a metallic substrate to corrode is a function of
the surface characteristics of the metal and of the metal/protective
film interface, the physical, electrical and electrochemical properties
of the film, and the nature of the environment in which the pipelines
system is placed. In this work the authors have looked at corrosion
problems of water pipelines and their control. The corrosive
properties of groundwater and soil environments are reviewed, and
parameters affecting corrosion are discussed. The purpose of this
work is to provide guidelines for materials selection in water and soil
environments, and how the water pipelines can be protected against
metallic corrosion.
Abstract: Huge losses in apple production are caused by pathogens that cannot be seen shortly after harvest. After-harvest thermotherapy treatments can considerably improve control of storage diseases on apples and become an alternative to chemical pesticides. In the years 2010-2012 carried out research in this area. Apples of 'Topaz' cultivar were harvested at optimal maturity time for long storage and subject to water bath treatment at 45, 50, 52, 55°C for 60, 120, 180 and 240 seconds. The control was untreated fruits. After 12 and 24 weeks and during so called simulated trade turnover the fruits were checked for their condition and the originators of diseases were determined by using the standard phytopathological methods. The most common originator of 'Topaz' apple infection during storage were the fungi of genus Gloeosporium. In this paper it was proven that for effective protection of 'Topaz' apples against diseases, thermotherapy by using water treatments at temperature range of 50-52°C is quite sufficient.
Abstract: The manufacturing transmission line tower parts has
being generated hazardous waste which is required proper disposal
of waste for protection of land pollution. Manufacturing Process in
the manufacturing of steel angle, plates, pipes, channels are passes
through conventional, semi automatic and CNC machines for
cutting, marking, punching, drilling, notching, bending operations.
All fabricated material Coated with thin layer of Zinc in Galvanizing
plant where molten zinc is used for coating. Prior to Galvanizing,
chemical like 33% concentrated HCl Acid, ammonium chloride and
d-oil being used for pretreatment of iron. The bath of water with
sodium dichromate is used for cooling and protection of the
galvanized steel. For the heating purpose the furnace oil burners are
used. These above process the Zinc dross, Zinc ash, ETP sludge and
waste pickled acid generated as hazardous waste. The RPG has
made captive secured land fill site, since 1997 since then it was
using for disposal of hazardous waste after completion of SLF
(Secured land fill) site. The RPG has raised height from ground
level then now it is being used for disposal of waste as he designed
the SLF after in creasing height of from GL it is functional without
leach ate or adverse impacts in the environment.
Abstract: In power systems, protective relays must filter their
inputs to remove undesirable quantities and retain signal quantities of
interest. This job must be performed accurate and fast. A new
method for filtering the undesirable components such as DC and
harmonic components associated with the fundamental system
signals. The method is s based on a dynamic filtering algorithm. The
filtering algorithm has many advantages over some other classical
methods. It can be used as dynamic on-line filter without the need of
parameters readjusting as in the case of classic filters. The proposed
filter is tested using different signals. Effects of number of samples
and sampling window size are discussed. Results obtained are
presented and discussed to show the algorithm capabilities.
Abstract: Information and communication service providers
(ICSP) that are significant in size and provide Internet-based services
take administrative, technical, and physical protection measures via
the information security check service (ISCS). These protection
measures are the minimum action necessary to secure the stability and
continuity of the information and communication services (ICS) that
they provide. Thus, information assets are essential to providing ICS,
and deciding the relative importance of target assets for protection is a
critical procedure. The risk analysis model designed to decide the
relative importance of information assets, which is described in this
study, evaluates information assets from many angles, in order to
choose which ones should be given priority when it comes to
protection. Many-sided risk analysis (MSRS) grades the importance of
information assets, based on evaluation of major security check items,
evaluation of the dependency on the information and communication
facility (ICF) and influence on potential incidents, and evaluation of
major items according to their service classification, in order to
identify the ISCS target. MSRS could be an efficient risk analysis
model to help ICSPs to identify their core information assets and take
information protection measures first, so that stability of the ICS can
be ensured.
Abstract: The advances in multimedia and networking technologies
have created opportunities for Internet pirates, who can easily
copy multimedia contents and illegally distribute them on the Internet,
thus violating the legal rights of content owners. This paper describes
how a simple and well-known watermarking procedure based on a
spread spectrum method and a watermark recovery by correlation can
be improved to effectively and adaptively protect MPEG-2 videos
distributed on the Internet. In fact, the procedure, in its simplest
form, is vulnerable to a variety of attacks. However, its security
and robustness have been increased, and its behavior has been
made adaptive with respect to the video terminals used to open
the videos and the network transactions carried out to deliver them
to buyers. In fact, such an adaptive behavior enables the proposed
procedure to efficiently embed watermarks, and this characteristic
makes the procedure well suited to be exploited in web contexts,
where watermarks usually generated from fingerprinting codes have
to be inserted into the distributed videos “on the fly", i.e. during the
purchase web transactions.
Abstract: A study has been carried out to determine the effect of
coating two commercial glass-ionomer cements in either petroleum
jelly or wax. After coating, specimens were stored in water for 24 or
168 hours, then the coating removed and the surface examined.
Coating in wax was found to increase the surface hardness
significantly compared with the uncoated control, whereas coating
the specimens in petroleum jelly led to only a slight increase in
surface hardness. Coating in wax led to no detectable ion release
after either 24 or 168 hours, though there was some ion release after
the coating had been removed and the specimens exposed to water
for a further 24 hours. This shows that soluble species remained in
these specimens. Overall, this study confirms the idea that immature
glass-ionomers should be protected from early exposure to moisture,
and that the protection offered by petroleum jelly is only modest.
Abstract: Internet is largely composed of textual contents and a
huge volume of digital contents gets floated over the Internet daily.
The ease of information sharing and re-production has made it
difficult to preserve author-s copyright. Digital watermarking came
up as a solution for copyright protection of plain text problem after
1993. In this paper, we propose a zero text watermarking algorithm
based on occurrence frequency of non-vowel ASCII characters and
words for copyright protection of plain text. The embedding
algorithm makes use of frequency non-vowel ASCII characters and
words to generate a specialized author key. The extraction algorithm
uses this key to extract watermark, hence identify the original
copyright owner. Experimental results illustrate the effectiveness of
the proposed algorithm on text encountering meaning preserving
attacks performed by five independent attackers.
Abstract: One part of the total employee-s reward is apart from basic wages or salary, employee-s benefits and intangible elements also so called contingent (variable) pay. Contingent pay is connected to performance, contribution, capcompetency or skills of individual employees, and to team-s or company-wide performance or to combination of few of the mentioned possibilities. Main aim of this article is to define, based on available information, contingent pay, describe reasons for its implementation and arguments for and against this type of remuneration, but also bring information not only about its extent and level of utilization by organizations of the Czech Republic operating in the field of environmental protection, but also mention their practical experience with this type of remuneration.
Abstract: In the last decade digital watermarking procedures have
become increasingly applied to implement the copyright protection
of multimedia digital contents distributed on the Internet. To this
end, it is worth noting that a lot of watermarking procedures
for images and videos proposed in literature are based on spread
spectrum techniques. However, some scepticism about the robustness
and security of such watermarking procedures has arisen because
of some documented attacks which claim to render the inserted
watermarks undetectable. On the other hand, web content providers
wish to exploit watermarking procedures characterized by flexible and
efficient implementations and which can be easily integrated in their
existing web services frameworks or platforms. This paper presents
how a simple spread spectrum watermarking procedure for MPEG-2
videos can be modified to be exploited in web contexts. To this end,
the proposed procedure has been made secure and robust against some
well-known and dangerous attacks. Furthermore, its basic scheme
has been optimized by making the insertion procedure adaptive with
respect to the terminals used to open the videos and the network transactions
carried out to deliver them to buyers. Finally, two different
implementations of the procedure have been developed: the former
is a high performance parallel implementation, whereas the latter is
a portable Java and XML based implementation. Thus, the paper
demonstrates that a simple spread spectrum watermarking procedure,
with limited and appropriate modifications to the embedding scheme,
can still represent a valid alternative to many other well-known and
more recent watermarking procedures proposed in literature.
Abstract: The protection of the contents of digital products is
referred to as content authentication. In some applications, to be able
to authenticate a digital product could be extremely essential. For
example, if a digital product is used as a piece of evidence in the
court, its integrity could mean life or death of the accused. Generally,
the problem of content authentication can be solved using semifragile
digital watermarking techniques. Recently many authors have
proposed Computer Generated Hologram Watermarking (CGHWatermarking)
techniques. Starting from these studies, in this paper
a semi-fragile Computer Generated Hologram coding technique is
proposed, which is able to detect malicious tampering while
tolerating some incidental distortions. The proposed technique uses
as watermark an encrypted image, and it is well suitable for digital
image authentication.
Abstract: In this paper we propose an NLP-based method for
Ontology Population from texts and apply it to semi automatic
instantiate a Generic Knowledge Base (Generic Domain Ontology) in
the risk management domain. The approach is semi-automatic and
uses a domain expert intervention for validation. The proposed
approach relies on a set of Instances Recognition Rules based on
syntactic structures, and on the predicative power of verbs in the
instantiation process. It is not domain dependent since it heavily
relies on linguistic knowledge.
A description of an experiment performed on a part of the
ontology of the PRIMA1 project (supported by the European
community) is given. A first validation of the method is done by
populating this ontology with Chemical Fact Sheets from
Environmental Protection Agency2. The results of this experiment
complete the paper and support the hypothesis that relying on the
predicative power of verbs in the instantiation process improves the
performance.
Abstract: This study investigated a strategy of blending lead-laden sludge and Al-rich precursors to reduce the release of metals from the stabilized products. Using PbO as the simulated lead-laden sludge to sinter with γ-Al2O3 by Pb:Al molar ratios of 1:2 and 1:12, PbAl2O4 and PbAl12O19 were formed as final products during the sintering process, respectively. By firing the PbO + γ-Al2O3 mixtures with different Pb/Al molar ratios at 600 to 1000 °C, the lead transformation was determined through X-ray diffraction (XRD) data. In Pb/Al molar ratio of 1/2 system, the formation of PbAl2O4 is initiated at 700 °C, but an effective formation was observed above 750 °C. An intermediate phase, Pb9Al8O21, was detected in the temperature range of 800-900 °C. However, different incorporation behavior for sintering PbO with Al-rich precursors at a Pb/Al molar ratio of 1/12 was observed during the formation of PbAl12O19 in this system. In the sintering process, both temperature and time effect on the formation of PbAl2O4 and PbAl12O19 phases were estimated. Finally, a prolonged leaching test modified from the U.S. Environmental Protection Agency-s toxicity characteristic leaching procedure (TCLP) was used to evaluate the durability of PbO, Pb9Al8O21, PbAl2O4 and PbAl12O19 phases. Comparison for the leaching results of the four phases demonstrated the higher intrinsic resistance of PbAl12O19 against acid attack.
Abstract: This paper presents a watermarking protocol able to
solve the well-known “customer-s right problem" and “unbinding
problem". In particular, the protocol has been purposely designed
to be adopted in a web context, where users wanting to buy digital
contents are usually neither provided with digital certificates issued
by certification authorities (CAs) nor able to autonomously perform
specific security actions. Furthermore, the protocol enables users to
keep their identities unexposed during web transactions as well as
allows guilty buyers, i.e. who are responsible distributors of illegal
replicas, to be unambiguously identified. Finally, the protocol has
been designed so that web content providers (CPs) can exploit
copyright protection services supplied by web service providers (SPs)
in a security context. Thus, CPs can take advantage of complex
services without having to directly implement them.