226 resultados para Passive protection
Resumo:
The use of cathodic protection in reinforced concrete is becoming increasingly common with such systems being installed on a number of structures throughout the United Kingdom and Ireland. However the prescribed design lives (or service life) of each cathodic protection system vary widely. The aim of this project was to assess the effectiveness of a sacrificial anode cathodic protection system and to predict its design life through a series of laboratory based experiments. The experimental plan involved casting a number of slabs which represented a common road bridge structure. The corrosion of the steel within the experimental slabs was then accelerated prior to installation of a cathodic protection system. During the experiment corrosion potential of the steel reinforcement was monitored using half-cell measurement. Additionally the current flow between the cathodic protection system and the steel reinforcement was recorded to assess the degree of protection. A combination of theoretical calculations and experimental results were then collated to determine the design life of this cathodic protection system. It can be concluded that this sacrificial anode based cathodic protection system was effective in halting the corrosion of steel reinforcement in the concrete slabs studied. Both the corrosion current and half-cell potentials indicated a change in passivity for the steel reinforcement once sacrificial anodes were introduced. The corrosion current was observed to be sensitive to the changes to the exposure environment. Based on the experimental variables studied the design life of this sacrificial anode can be taken as 26 to 30 years.
Resumo:
A novel approach to the modelling of passive intermodulation (PIM) generation in passive components with distributed weak nonlinearities is outlined. Based upon the formalism of X-parameters, it provides a unified framework for co-design of antenna beamforming networks, filters, combiners, phase shifters and other passive and active devices containing nonlinearities at RF front-end. The effects of discontinuities and complex circuit layouts can be efficiently evaluated with the aid of the equivalent networks of the canonical nonlinear elements. The main concepts are illustrated by examples of numerical simulations of PIM generation in the transmission lines and comparison with the measurement results.
Resumo:
The aim is to explore the protection that international human rights law offers to refugees, asylum-seekers, and the forcibly displaced. The ambition of the global rights framework is to guarantee a defined range of rights to all human beings, and thus move the basis for normative entitlement from exclusive reliance on national membership to a common humanity. This comprehensive and international perspective remains formally tied to states - acting individually or collectively - in terms of creation and implementation. The norms must find an entry point into the empirical world, and there must be clarity on responsibilities for practical delivery. It should remain unsurprising that the expectations raised by the normative reach of the law are frequently dashed in the complex and difficult human world of instrumental politics, power, and conflict. The intention here is to outline the international human rights law context, and indicate the value and limitations for the protection of refugees and asylum-seekers. A question is then raised about possible reform.
Resumo:
This book presents a comprehensive assessment of regional responses to the crisis in the asylum/refugee system and critically examines how different regions tackle the problem. The chapters consider the fundamental challenges which undermine an effective asylum process as well as regional difficulties with the various circumstances surrounding asylum seekers. With contributions on Africa, Europe, Latin America, South Asia and the Middle East, and the Pacific, the collection strives to appreciate what informs each region’s approach to the asylum process and asks if there are issues common to every region and if regions can learn from one another. The book seeks an understanding of the existing legal regime for the protection of asylum seekers and how regional institutions such as human rights commissions and regional courts enforce and adjudicate the law.
Resumo:
While video surveillance systems have become ubiquitous in our daily lives, they have introduced concerns over privacy invasion. Recent research to address these privacy issues includes a focus on privacy region protection, whereby existing video scrambling techniques are applied to specific regions of interest (ROI) in a video while the background is left unchanged. Most previous work in this area has only focussed on encrypting the sign bits of nonzero coefficients in the privacy region, which produces a relatively weak scrambling effect. In this paper, to enhance the scrambling effect for privacy protection, it is proposed to encrypt the intra prediction modes (IPM) in addition to the sign bits of nonzero coefficients (SNC) within the privacy region. A major issue with utilising encryption of IPM is that drift error is introduced outside the region of interest. Therefore, a re-encoding method, which is integrated with the encryption of IPM, is also proposed to remove drift error. Compared with a previous technique that uses encryption of IPM, the proposed re-encoding method offers savings in the bitrate overhead while completely removing the drift error. Experimental results and analysis based on H.264/AVC were carried out to verify the effectiveness of the proposed methods. In addition, a spiral binary mask mechanism is proposed that can reduce the bitrate overhead incurred by flagging the position of the privacy region. A definition of the syntax structure for the spiral binary mask is given. As a result of the proposed techniques, the privacy regions in a video sequence can be effectively protected by the enhanced scrambling effect with no drift error and a lower bitrate overhead.
Resumo:
There are a range of theoretical approaches which may inform the interface between child protection and adult mental health services. These theoretical perspectives tend to be focused on either child protection or mental health with no agreed integrating framework. The interface continues to be identified, in research, case management reviews and inquiry reports, as complex and problematic. This paper proposes that more positive, integrated approaches to service user engagement, risk assessment and management may lead to better outcomes in working with families experiencing parental mental health problems and child protection concerns. It is proposed that the recovery approach, increasingly used in mental health services, can inform the processes of engagement, assessment and intervention at the mental health and child protection interface. The article provides a critical overview of the recovery approach and compares it with approaches typifying interventions in child protection work to date. Relevant research and inquiries are also examined as a context for how to more effectively respond to cases where there are issues around parental mental health problems and child protection. The article concludes with case material to illustrate the potential application of the recovery approach to the interface between mental health and child protection services.
Resumo:
This article analyses the relevance of the ECJ ruling in Junk for German labour law.
Resumo:
This study investigates the potential of the prohibition of indirect race discrimination to be used for law reform, and to uncover discriminatory practices. It reflects on the history and contents of the concept, and focuses in particular on its application in the Republic of South Africa
Resumo:
Child welfare professionals regularly make crucial decisions that have a significant impact on children and their families. The present study presents the Judgments and Decision Processes in Context model (JUDPIC) and uses it to examine the relationships between three indepndent domains: case characteristic (mother’s wish with regard to removal), practitioner characteristic (child welfare attitudes), and protective system context (four countries: Israel, the Netherlands, Northern Ireland and Spain); and three dependent factors: substantiation of maltreatment, risk assessment, and intervention recommendation.
The sample consisted of 828 practitioners from four countries. Participants were presented with a vignette of a case of alleged child maltreatment and were asked to determine whether maltreatment was substantiated, assess risk and recommend an intervention using structured instruments. Participants’ child welfare attitudes were assessed.
The case characteristic of mother’s wish with regard to removal had no impact on judgments and decisions. In contrast, practitioners’ child welfare attitudes were associated with substantiation, risk assessments and recommendations. There were significant country differences on most measures.
The findings support most of the predictions derived from the JUDPIC model. The significant differences between practitioners from different countries underscore the importance of context in child protection decision making. Training should enhance practitioners’ awareness of the impact that their attitudes and the context in which they are embedded have on their judgments and decisions.
Resumo:
Active network scanning injects traffic into a network and observes responses to draw conclusions about the network. Passive network analysis works by looking at network meta data or by analyzing traffic as it traverses a fixed point on the network. It may be infeasible or inappropriate to scan critical infrastructure networks. Techniques exist to uniquely map assets without resorting to active scanning. In many cases, it is possible to characterize and identify network nodes by passively analyzing traffic flows. These techniques are considered in particular with respect to their application to power industry critical infrastructure.
Resumo:
We used glycine betaine (5–20% w/v) for blanching green peas (100°C, 60 s), and their subsequent freezing and storage (–20°C, 90 days). Blanching after the addition of glycine betaine at ≥10% (w/v) followed by a 90 day storage period which resulted in the most desirable outcome: higher vitamin C levels, a superior green color, enhanced organoleptic quality and texture, and improved retention of peroxidase and lipoxygenase activity relative to control peas (no glycine betaine added). Microscopic characterizations of control and treated peas revealed that glycine betaine acts as a cryoprotectant which maintains cellular integrity. Glycine betaine (10% w/v) could be used commercially for production of frozen peas with better quality attributes.