Abstract: This paper outlines the basic installation and operation of magnetic inductive flow velocity sensors on large underground cooling water pipelines. Research on the effects of cathodic protection as well as into other factors that might influence the overall performance of the meter is presented in this paper. The experiments were carried out on an immersion type magnetic meter specially used for flow measurement of cooling water pipeline. An attempt has been made in this paper to outline guidelines that can ensure accurate measurement related to immersion type magnetic meters on underground pipelines.
Abstract: China is currently the world's largest producer and distributor of electric bicycle (e-bike). The increasing number of e-bikes on the road is accompanied by rising injuries and even deaths of e-bike drivers. Therefore, there is a growing need to improve the safety structure of e-bikes. This 3D frictionless contact analysis is a preliminary, but necessary work for further structural design improvement of an e-bike. The contact analysis between e-bike and the ground was carried out as follows: firstly, the Penalty method was illustrated and derived from the simplest spring-mass system. This is one of the most common methods to satisfy the frictionless contact case; secondly, ANSYS static analysis was carried out to verify finite element (FE) models with contact pair (without friction) between e-bike and the ground; finally, ANSYS transient analysis was used to obtain the data of the penetration p(u) of e-bike with respect to the ground. Results obtained from the simulation are as estimated by comparing with that from theoretical method. In the future, protective shell will be designed following the stability criteria and added to the frame of e-bike. Simulation of side falling of the improvedsafety structure of e-bike will be confirmed with experimental data.
Abstract: Risk analysis is considered as a fundamental aspect
relevant for ensuring the level of critical infrastructure protection,
where the critical infrastructure is seen as system, asset or its part
which is important for maintaining the vital societal functions. Article
actually discusses and analyzes the potential application of selected
tools of information support for the implementation and within the
framework of risk analysis and critical infrastructure protection. Use
of the information in relation to their risk analysis can be viewed as a
form of simplifying the analytical process. It is clear that these
instruments (information support) for these purposes are countless, so
they were selected representatives who have already been applied in
the selected area of critical infrastructure, or they can be used. All
presented fact were the basis for critical infrastructure resilience
evaluation methodology development.
Abstract: In reference to the legal state in the Thai legal system,
most people understand the minor principles of the legal state form,
which are the principles that can be explained and understood easily
and the results can be seen clearly, especially in the legitimacy of
administrative acts. Therefore, there is no awareness of justice, which
is the fundamental value of Thai law. The legitimacy of administrative
acts requires the administration to adhere to the constitution and
legislative laws in enforcement of the laws. If it appears that the
administrative acts are illegitimate, the administrative court, as the
court of justice, will revoke those acts as if they had never been set in
the legal system, this will affect people’s trust as they are unaware as
to whether the administrative acts that appoint their lives are
legitimate or not. Regarding the revocation of administrative orders
by the administrative court as if those orders had never existed, the
common individual surely cannot be expected to comprehend the
security of their juristic position. Therefore, the legal state does not
require a revocation of the government’s acts to terminate its legal
results merely because those acts are illegitimate, but there should be
considerations and realizations regarding the “The Principle of the
Protection of Legitimate Expectation,” which is a minor principle in
the legal state’s content that focuses on supporting and protecting
legitimate expectations of the juristic position of an individual and
maintaining justice, which is the fundamental value of Thai law.
Abstract: The main aim of this research was to investigate a
prototype bamboo shading device. There were two objectives to this
study: first, to investigate the effects of non-chemical treatments on
bamboo shading devices damaged by powder-post beetles and fungi,
and second to develop a prototype bamboo shading device. This
study of the effects of non-chemical treatments on bamboo shading
devices damage by powder-post beetles in the laboratory showed
that, among seven treatments tested, wood vinegar treatment can
protect powder-post beetles better than the original method by up to
92.91%. It was also found that wood vinegar treatment shows the
best performance in fungi protection and works better than the
original method by up to 40%. A second experiment was carried out
by constructing four bamboo shading devices and installing them on
a building for 28 days. All aspects of shading device were
investigated in terms of their beauty, durability, and ease of
construction and assembly. The final prototype was developed from
the lessons learned from the test results. In conclusion, this study
showed the effectiveness of some natural preservatives against insect
and fungi damage, and it also illustrated the characteristics of a
prototype bamboo shading device that can be constructed by rural
workers within one week.
Abstract: Every machine plays roles of client and server
simultaneously in a peer-to-peer (P2P) network. Though a P2P
network has many advantages over traditional client-server models
regarding efficiency and fault-tolerance, it also faces additional
security threats. Users/IT administrators should be aware of risks
from malicious code propagation, downloaded content legality, and
P2P software’s vulnerabilities. Security and preventative measures
are a must to protect networks from potential sensitive information
leakage and security breaches. Bit Torrent is a popular and scalable
P2P file distribution mechanism which successfully distributes large
files quickly and efficiently without problems for origin server. Bit
Torrent achieved excellent upload utilization according to
measurement studies, but it also raised many questions as regards
utilization in settings, than those measuring, fairness, and Bit
Torrent’s mechanisms choice. This work proposed a block selection
technique using Fuzzy ACO with optimal rules selected using ACO.
Abstract: The wear measuring and wear modelling are
fundamental issues in the industrial field, mainly correlated to the
economy and safety. Therefore, there is a need to study the wear
measurements and wear estimation. Pin-on-disc test is the most
common test which is used to study the wear behaviour. In this paper,
the pin-on-disc (AEROTECH UNIDEX 11) is used for the
investigation of the effects of normal load and hardness of material on
the wear under dry and sliding conditions. In the pin-on-disc rig, two
specimens were used; one, a pin is made of steel with a tip, positioned
perpendicular to the disc, where the disc is made of aluminium. The
pin wear and disc wear were measured by using the following
instruments: The Talysurf instrument, a digital microscope, and the
alicona instrument. The Talysurf profilometer was used to measure
the pin/disc wear scar depth, digital microscope was used to measure
the diameter and width of wear scar, and the alicona was used to
measure the pin wear and disc wear. After that, the Archard model,
American Society for Testing and Materials model (ASTM), and
neural network model were used for pin/disc wear modelling.
Simulation results were implemented by using the Matlab program.
This paper focuses on how the alicona can be used for wear
measurements and how the neural network can be used for wear
estimation.
Abstract: Agriculture is the backbone of economy of Pakistan
and cotton is the major agricultural export and supreme source of raw
fiber for our textile industry. To combat severe problems of insect
and weed, combination of three genes namely Cry1Ac, Cry2A and
EPSPS genes was transferred in locally cultivated cotton variety
MNH-786 with the use of Agrobacterium mediated genetic
transformation. The present study focused on the molecular screening
of transgenic cotton plants at T3 generation in order to confirm
integration and expression of all three genes (Cry1Ac, Cry2A and
EPSP synthase) into the cotton genome. Initially, glyphosate spray
assay was used for screening of transgenic cotton plants containing
EPSP synthase gene at T3 generation. Transgenic cotton plants which
were healthy and showed no damage on leaves were selected after 07
days of spray. For molecular analysis of transgenic cotton plants in
the laboratory, the genomic DNA of these transgenic cotton plants
were isolated and subjected to amplification of the three genes. Thus,
seventeen out of twenty (Cry1Ac gene), ten out of twenty (Cry2A
gene) and all twenty (EPSP synthase gene) were produced positive
amplification. On the base of PCR amplification, ten transgenic plant
samples were subjected to protein expression analysis through
ELISA. The results showed that eight out of ten plants were actively
expressing the three transgenes. Real-time PCR was also done to
quantify the mRNA expression levels of Cry1Ac and EPSP synthase
gene. Finally, eight plants were confirmed for the presence and active
expression of all three genes at T3 generation.
Abstract: This paper presents a method of hardening the 8051
micro-controller, able to assure reliable operation in the presence of
bit flips caused by radiation. Aiming at avoiding such faults in the
8051 micro-controller, Hamming code protection was used in its
SRAM memory and registers. A VHDL code has been used for this
hamming code protection.
Abstract: This paper seeks to analyse the benefits of big data
and more importantly the challenges it pose to the subject of privacy
and data protection. First, the nature of big data will be briefly
deliberated before presenting the potential of big data in the present
days. Afterwards, the issue of privacy and data protection is
highlighted before discussing the challenges of implementing this
issue in big data. In conclusion, the paper will put forward the debate
on the adequacy of the existing legal framework in protecting
personal data in the era of big data.
Abstract: It is important to take security measures to protect
your computer information, reduce identify theft, and prevent from
malicious cyber-attacks. With cyber-attacks on the continuous rise,
people need to understand and learn ways to prevent from these
attacks. Cyber-attack is an important factor to be considered if one is
to be able to protect oneself from malicious attacks. Without proper
security measures, most computer technology would hinder home
users more than such technologies would help. Knowledge of how
cyber-attacks operate and protective steps that can be taken to reduce
chances of its occurrence are key to increasing these security
measures. The purpose of this paper is to inform home users on the
importance of identifying and taking preventive steps to avoid cyberattacks.
Throughout this paper, many aspects of cyber-attacks will be
discuss: what a cyber-attack is, the affects of cyber-attack for home
users, different types of cyber-attacks, methodology to prevent such
attacks; home users can take to fortify security of their computer.
Abstract: The restrained construction zoning, an important part
in the urban master plan, is a necessary planning tool to control the city
sprawl, to guarantee the reservation implementation of the various
types of protective elements, and to realize the storage of the essential
urban spatial resources. Simultaneously, owing to the diverse
constitutes of restrained construction area and the various stakeholders
involved in, its planning requires an overall consideration of all
elements from the perspective of coordination+, balance and
practicability to deal with the problems and conflicts in this process.
Taking Yangzijin Ecological Restrained Construction Area in
Yangzhou as an example, this study analyzes all the potential actors,
agencies and stakeholders in this restrained construction area, as well
as the relevant conflicts between each other. Besides, this study tries to
build up a planning procedure based on the framework of governance
theory, and proposes a possible planning method that combines
"rigidity" and "flexibility" to protect the ecological limitation
boundary, to take every interest into account, and to promote economic
development in a harmonious society.
Abstract: As the use of geothermal energy grows internationally
more effort is required to monitor and protect areas with rare and
important geothermal surface features. A number of approaches are
presented for developing and calibrating numerical geothermal
reservoir models that are capable of accurately representing
geothermal surface features. The approaches are discussed in the
context of cases studies of the Rotorua geothermal system and the
Orakei-korako geothermal system, both of which contain important
surface features. The results show that models are able to match the
available field data accurately and hence can be used as valuable
tools for predicting the future response of the systems to changes in
use.
Abstract: Arising problems of countries’ public finances, social
and demographic changes motivate scientific and policy debates on
public spending size, structure and efficiency in order to meet the
changing needs of society and business. The concept of sustainable
development poses new challenges for scientists and policy-makers
in the field of public finance. This paper focuses on the investigation
of the relationship between government expenditure and country’s
economic development in the context of sustainable development.
Empirical analysis focuses on the data of the European Union (except
Croatia and Luxemburg) countries. The study covers 2003 – 2012
years, using annual cross-sectional data. Summarizing the research
results, it can be stated that governments should pay more attention to
the needs that ensure sustainable development in the long-run when
formulating public expenditure policy, particularly in the field of
environment protection.
Abstract: The distribution networks are often exposed to harmful
incidents which can halt the electricity supply of the customer. In this
context, we studied a real case of a critical zone of the Tunisian
network which is currently characterized by the dysfunction of its
plan of protection. In this paper, we were interested in the
harmonization of the protection plan settings in order to ensure a
perfect selectivity and a better continuity of service on the whole of
the network.
Abstract: In this paper, two options of anodic alumina barrier
layer thinning have been demonstrated. The approaches varied with
the duration of the voltage step. It was found that too long step of the
barrier layer thinning process leads to chemical etching of the
nanopores on their top. At the bottoms pores are not fully opened
what is disadvantageous for further applications in nanofabrication.
On the other hand, while the duration of the voltage step is controlled
by the current density (value of the current density cannot exceed
75% of the value recorded during previous voltage step) the pores are
fully opened. However, pores at the bottom obtained with this
procedure have smaller diameter, nevertheless this procedure
provides electric contact between the bare aluminum (substrate) and
electrolyte, what is suitable for template assisted electrodeposition,
one of the most cost-efficient synthesis method in nanotechnology.
Abstract: The tombolo of Giens is located in the town of Hyères
(France). We recall the history of coastal erosion, and prominent
factors affecting the evolution of the western tombolo. We then
discuss the possibility of stabilizing the western tombolo. Our
argumentation relies on a coupled model integrating swells, currents,
water levels and sediment transport. We present the conclusions of
the simulations of various scenarios, including pre-existing
propositions from coastal engineering offices. We conclude that
beach replenishment seems to be necessary but not sufficient for the
stabilization of the beach. Breakwaters reveal effective particularly in
the most exposed northern area. Some solutions fulfill conditions so
as to be elected as satisfactory. We give a comparative analysis of the
efficiency of 14 alternatives for the protection of the tombolo.
Abstract: The aim of this paper is to give an assessment of
environmental effects of IPPC permit conditions of installations that
are in specific territory with high concentration of industrial
activities.
The IPPC permit is the permit that each operator should hold to
operate the installation as stated by the directive 2010/75/UE on
industrial emissions (integrated pollution prevention and control),
known as IED (Industrial Emissions Directive).
The IPPC permit includes all the measures necessary to achieve a
high level of protection of the environment as a whole, also defining
the monitoring requirements as measurement methodology,
frequency and evaluation procedure. The emissions monitoring of a
specific plant may also give indications of the contribution of these
emissions on the air quality of a definite area.
So, it is clear that the IPPC permits are important tools both to
improve the environmental framework and to achieve the air quality
standards, assisting to assess the possible industrial sources
contributions to air pollution.
Abstract: The research presented in this paper has been focused
on analysing the impact of traffic on the sustainable development of
tourism in Croatia's Dubrovacko-Neretvanska County by the year
2020, based on the figures and trends reported in 2014 and using the
relevant variables that characterise the synergy of traffic and tourism
in, speaking from the geographic viewpoint, the most problematic
county in the Republic of Croatia. The basic hypothesis has been
confirmed through scientifically obtained research results, through
the quantification of the model's variables and the direct growth rates
of the designed model. On the basis of scientific insights into the
sustainable development of traffic and tourism in Dubrovacko-
Neretvanska County, it is possible to propose a new information
model for traffic at the service of the sustainable development of
tourism in the County for the period 2014-2020.
Abstract: The study of organisations’ information security
cultures has attracted scholars as well as healthcare services industry
to research the topic and find appropriate tools and approaches to
develop a positive culture. The vast majority of studies in Saudi
national health services are on the use of technology to protect and
secure health services information. On the other hand, there is a lack
of research on the role and impact of an organisation’s cultural
dimensions on information security. This research investigated and
analysed the role and impact of cultural dimensions on information
security in Saudi Arabia health service. Hypotheses were tested and
two surveys were carried out in order to collect data and information
from three major hospitals in Saudi Arabia (SA). The first survey
identified the main cultural-dimension problems in SA health
services and developed an initial information security culture
framework model. The second survey evaluated and tested the
developed framework model to test its usefulness, reliability and
applicability. The model is based on human behaviour theory, where
the individual’s attitude is the key element of the individual’s
intention to behave as well as of his or her actual behaviour. The
research identified a set of cultural and sub-cultural dimensions in SA
health information security and services.