953 resultados para Data protection
Resumo:
The selective solar absorber surface is a fundamental part of a solar thermal collector, as it is responsible for the solar radiation absorption and for reduction of radiation heat losses. The surface’s optical properties, the solar absorption (á) and the emittance (å), have great impact on the solar thermal collector efficiency. In this work, two coatings types were studied: coatings obtained by physical vapor deposition (PVDs) and coatings obtained by projection with different paints (PCs) on aluminum substrates. The most common industrial high performing solar selective absorbers are nowadays produced by vacuum deposition methods, showing some disadvantages, such as lower durability, lower resistance to corrosion, adhesion and scratch, higher cost and complex production techniques. Currently, spectrally selective paints are a potential alternative for absorbing surfaces in low temperature applications, with attractive features such as ease of processing, durability and commercial availability with low cost. Solar absorber surfaces were submitted to accelerated ageing tests, specified in ISO 22975-3. This standard is applicable to the evaluation of the long term behavior and service life of selective solar absorbers for solar collectors working under typical domestic hot water system conditions. The studied coatings have, in the case of PVDs solar absorptions between 0.93 and 0.96 and emittance between 0.07 and 0.10, and in the case of PCs, solar absorptions between 0.91 and 0.93 and emittance between 0.40 and 0.60. In addition to evaluating long term behavior based on artificial ageing tests, it is also important to know the degradation mechanism of different coatings that are currently in the market. Electrochemical impedance spectroscopy (EIS) allows for the assessment of mechanistic information concerning the degradation processes, providing quantitative data as output, which can easily relate to the kinetic parameters of the system. EIS measures were carried out on Gamry FAS2 Femostat coupled with a PCL4 Controller. Two electrolytes were used, 0.5 M NaCl and 0.5 M Na2SO4, and the surfaces were tested at different immersion times up to 4 weeks. The following types of specimens have been tested: Aluminium with/without surface treatment, 3 selective paint coatings (one with a poly(urethane) binder and two with silicone binders) and 2 PVD coatings. Based on the behaviour of the specimens throughout the 4 weeks of immersion, it is possible to conclude that the coating showing the best protective properties corresponds to the selective paint coating with a polyurethane resin followed by the other paint coatings, whereas both the PVD coatings do not confer any protection to the substrate, having a deleterious effect as compared to the untreated aluminium reference.
Resumo:
Cette thèse s’intéresse à la protection de la vie privée informationnelle dans le contexte de la biosécurité. La biosécurité se définit comme le processus qui vise à prendre en charge, dans une optique de sécurité nationale, les menaces et dangers que représentent les épidémies de maladies infectieuses pour la santé des populations humaines et la sécurité de l’État. Notre projet remet en question l’idée selon laquelle la conduite des activités de surveillance de la santé publique implique nécessairement une diminution de la protection offerte aux renseignements personnels sur la santé. Nos recherches tendent à démontrer que la conciliation de la surveillance de la santé et la protection de la vie privée est non seulement possible, mais qu’elle est surtout nécessaire. Nous portons plus précisément notre attention sur le cas de la collecte et de l’utilisation de renseignements dépersonnalisés sur la santé par les systèmes de surveillance syndromique. Bien calibrée et soigneusement réglementée, cette forme novatrice et particulière de surveillance offrirait le double avantage de réduire les risques d’atteintes à la vie privée des individus et d’augmenter de manière considérable l’efficacité des capacités étatiques en matière de détection des épidémies.
Resumo:
Stainless steel is widely used in seawater reverse osmosis units (SWRO) for both good mechanical and corrosion resistance properties. However, many corrosion failures of stainless steel in SWRO desalination units have been reported. These failures may often be attributed to un-adapted stainless steel grade selection and/or to the particular aggressive seawater conditions in "warm" regions (high ambient temperature, severe biofouling, etc.). Cathodic protection (CP) is a well-known efficient system to prevent corrosion of metallic materials in seawater. It is successfully used in the oil and gas industry to protect carbon steel structures exposed in open-sea. However, the specific service conditions of SWRO units may seriously affect the efficiency of such anti-corrosion system (high flow rates, large stainless steel surfaces affected by biofouling, confinement limiting protective cathodic current flow, etc.). Hence, CP in SWRO units should be considered with special care and modeling appears as useful tool to assess an appropriate CP design. However, there is a clear lack of CP data that could be transposed to SWRO service conditions (i.e. stainless steel, effect of biofouling, high flow rate, etc.). From this background a Join Industry Program was initiated including laboratory exposures, field measurements in a full scale SWRO desalination plant, and modeling work using PROCOR software. The present paper reviews the main parameters affecting corrosion of stainless steel alloys in seawater reverse osmosis units. CP on specific stainless steel devices was investigated in order to assess its actual efficiency for SWRO units. Severe environmental conditions were intentionally used to promote corrosion on the tested stainless steel products in order to evaluate the efficiency of CP. The study includes a modeling work aiming at predicting and designing adapted CP protection to modeled stainless steel units. An excellent correlation between modeling work and field measurements was found.
Resumo:
The goal of this study is to provide a framework for future researchers to understand and use the FARSITE wildfire-forecasting model with data assimilation. Current wildfire models lack the ability to provide accurate prediction of fire front position faster than real-time. When FARSITE is coupled with a recursive ensemble filter, the data assimilation forecast method improves. The scope includes an explanation of the standalone FARSITE application, technical details on FARSITE integration with a parallel program coupler called OpenPALM, and a model demonstration of the FARSITE-Ensemble Kalman Filter software using the FireFlux I experiment by Craig Clements. The results show that the fire front forecast is improved with the proposed data-driven methodology than with the standalone FARSITE model.
Resumo:
Rapport de stage présenté à la Faculté des Études Supérieures des arts et sciences, Département de criminologie, en vue de l’obtention du grade de Maîtrise (M. Sc.) en criminologie, option intervention
Resumo:
Pesticide residues in food and environment pose serious health risks to human beings. Plant protection laws, among other things, regulate misuse of agricultural pesticides. Compliance with such laws consequently reduces risks of pesticide residues in food and the environment. Studies were conducted to assess the compliance with plant protection laws among tomato farmers in Mvomero District, Morogoro Region, Tanzania. Compliance was assessed by examining pesticide use practices that are regulated by the Tanzanian Plant Protection Act (PPA) of 1997. A total of 91 tomato farmers were interviewed using a structured questionnaire. Purposive sampling was used in selecting at least 30 respondent farmers from each of the three villages of Msufini, Mlali and Doma in Mvomero District, Morogoro Region. Simple Random Sampling was used to obtain respondents from the sampling frame. Individual and social factors were examined on how they could affect pesticide use practices regulated by the law. Descriptive statistics, mainly frequency, were used to analyze the data while associations between variables were determined using Chi-Square and logistic regression model. The results showed that respondents were generally aware of the existence of laws on agriculture, environment and consumer health, although none of them could name a specific Act. The results revealed further that 94.5% of the farmers read instructions on the pesticides label. However, only 21% used the correct doses of pesticides, 40.7% stored pesticides in special stores, 68.1% used protective gear, while 94.5% always read instructions on the label before using a pesticide product. Training influenced the application rate of pesticide (p < 0.001) while awareness of agricultural laws significantly influenced farmers’ tendency to read information on the labels (p < 0.001). The results showed further that education significantly influenced the use of protective gears by farmers (p = 0.042). Education also significantly affected the manner in which farmers stored pesticide-applying equipment (p = 0.024). Furthermore, farmers’ awareness of environmental laws significantly (p = 0.03) affected farmers’ disposal of empty pesticide containers. Results of this study suggest the need for express provisions on safe use and handling of pesticides and related offences in the Act, and that compliance should be achieved through education rather than coercion. Results also suggest establishment of pesticide disposal mechanisms and structures to reduce unsafe disposal of pesticide containers. It is recommended that farmers should be educated and trained on proper use of pesticides. Farmers’ awareness on laws affecting food, environment and agriculture should be improved.
Resumo:
2009
Resumo:
Modern power networks incorporate communications and information technology infrastructure into the electrical power system to create a smart grid in terms of control and operation. The smart grid enables real-time communication and control between consumers and utility companies allowing suppliers to optimize energy usage based on price preference and system technical issues. The smart grid design aims to provide overall power system monitoring, create protection and control strategies to maintain system performance, stability and security. This dissertation contributed to the development of a unique and novel smart grid test-bed laboratory with integrated monitoring, protection and control systems. This test-bed was used as a platform to test the smart grid operational ideas developed here. The implementation of this system in the real-time software creates an environment for studying, implementing and verifying novel control and protection schemes developed in this dissertation. Phasor measurement techniques were developed using the available Data Acquisition (DAQ) devices in order to monitor all points in the power system in real time. This provides a practical view of system parameter changes, system abnormal conditions and its stability and security information system. These developments provide valuable measurements for technical power system operators in the energy control centers. Phasor Measurement technology is an excellent solution for improving system planning, operation and energy trading in addition to enabling advanced applications in Wide Area Monitoring, Protection and Control (WAMPAC). Moreover, a virtual protection system was developed and implemented in the smart grid laboratory with integrated functionality for wide area applications. Experiments and procedures were developed in the system in order to detect the system abnormal conditions and apply proper remedies to heal the system. A design for DC microgrid was developed to integrate it to the AC system with appropriate control capability. This system represents realistic hybrid AC/DC microgrids connectivity to the AC side to study the use of such architecture in system operation to help remedy system abnormal conditions. In addition, this dissertation explored the challenges and feasibility of the implementation of real-time system analysis features in order to monitor the system security and stability measures. These indices are measured experimentally during the operation of the developed hybrid AC/DC microgrids. Furthermore, a real-time optimal power flow system was implemented to optimally manage the power sharing between AC generators and DC side resources. A study relating to real-time energy management algorithm in hybrid microgrids was performed to evaluate the effects of using energy storage resources and their use in mitigating heavy load impacts on system stability and operational security.
Resumo:
Contingent Protection has grown to become an important trade restricting device. In the European Union, protection instruments like antidumping are used extensively. This paper analyses whether macroeconomic pressures may contribute to explain the variations in the intensity of antidumping protectionism in the EU. The empirical analysis uses count data models, applying various specification tests to derive the most appropriate specification. Our results suggest that the filing activity is inversely related to the macroeconomic conditions. Moreover, they confirm existing evidence for the US suggesting that domestic macroeconomic pressures are a more important determinant of contingent protection policy than external pressures.
Resumo:
Chaque année, le piratage mondial de la musique coûte plusieurs milliards de dollars en pertes économiques, pertes d’emplois et pertes de gains des travailleurs ainsi que la perte de millions de dollars en recettes fiscales. La plupart du piratage de la musique est dû à la croissance rapide et à la facilité des technologies actuelles pour la copie, le partage, la manipulation et la distribution de données musicales [Domingo, 2015], [Siwek, 2007]. Le tatouage des signaux sonores a été proposé pour protéger les droit des auteurs et pour permettre la localisation des instants où le signal sonore a été falsifié. Dans cette thèse, nous proposons d’utiliser la représentation parcimonieuse bio-inspirée par graphe de décharges (spikegramme), pour concevoir une nouvelle méthode permettant la localisation de la falsification dans les signaux sonores. Aussi, une nouvelle méthode de protection du droit d’auteur. Finalement, une nouvelle attaque perceptuelle, en utilisant le spikegramme, pour attaquer des systèmes de tatouage sonore. Nous proposons tout d’abord une technique de localisation des falsifications (‘tampering’) des signaux sonores. Pour cela nous combinons une méthode à spectre étendu modifié (‘modified spread spectrum’, MSS) avec une représentation parcimonieuse. Nous utilisons une technique de poursuite perceptive adaptée (perceptual marching pursuit, PMP [Hossein Najaf-Zadeh, 2008]) pour générer une représentation parcimonieuse (spikegramme) du signal sonore d’entrée qui est invariante au décalage temporel [E. C. Smith, 2006] et qui prend en compte les phénomènes de masquage tels qu’ils sont observés en audition. Un code d’authentification est inséré à l’intérieur des coefficients de la représentation en spikegramme. Puis ceux-ci sont combinés aux seuils de masquage. Le signal tatoué est resynthétisé à partir des coefficients modifiés, et le signal ainsi obtenu est transmis au décodeur. Au décodeur, pour identifier un segment falsifié du signal sonore, les codes d’authentification de tous les segments intacts sont analysés. Si les codes ne peuvent être détectés correctement, on sait qu’alors le segment aura été falsifié. Nous proposons de tatouer selon le principe à spectre étendu (appelé MSS) afin d’obtenir une grande capacité en nombre de bits de tatouage introduits. Dans les situations où il y a désynchronisation entre le codeur et le décodeur, notre méthode permet quand même de détecter des pièces falsifiées. Par rapport à l’état de l’art, notre approche a le taux d’erreur le plus bas pour ce qui est de détecter les pièces falsifiées. Nous avons utilisé le test de l’opinion moyenne (‘MOS’) pour mesurer la qualité des systèmes tatoués. Nous évaluons la méthode de tatouage semi-fragile par le taux d’erreur (nombre de bits erronés divisé par tous les bits soumis) suite à plusieurs attaques. Les résultats confirment la supériorité de notre approche pour la localisation des pièces falsifiées dans les signaux sonores tout en préservant la qualité des signaux. Ensuite nous proposons une nouvelle technique pour la protection des signaux sonores. Cette technique est basée sur la représentation par spikegrammes des signaux sonores et utilise deux dictionnaires (TDA pour Two-Dictionary Approach). Le spikegramme est utilisé pour coder le signal hôte en utilisant un dictionnaire de filtres gammatones. Pour le tatouage, nous utilisons deux dictionnaires différents qui sont sélectionnés en fonction du bit d’entrée à tatouer et du contenu du signal. Notre approche trouve les gammatones appropriés (appelés noyaux de tatouage) sur la base de la valeur du bit à tatouer, et incorpore les bits de tatouage dans la phase des gammatones du tatouage. De plus, il est montré que la TDA est libre d’erreur dans le cas d’aucune situation d’attaque. Il est démontré que la décorrélation des noyaux de tatouage permet la conception d’une méthode de tatouage sonore très robuste. Les expériences ont montré la meilleure robustesse pour la méthode proposée lorsque le signal tatoué est corrompu par une compression MP3 à 32 kbits par seconde avec une charge utile de 56.5 bps par rapport à plusieurs techniques récentes. De plus nous avons étudié la robustesse du tatouage lorsque les nouveaux codec USAC (Unified Audion and Speech Coding) à 24kbps sont utilisés. La charge utile est alors comprise entre 5 et 15 bps. Finalement, nous utilisons les spikegrammes pour proposer trois nouvelles méthodes d’attaques. Nous les comparons aux méthodes récentes d’attaques telles que 32 kbps MP3 et 24 kbps USAC. Ces attaques comprennent l’attaque par PMP, l’attaque par bruit inaudible et l’attaque de remplacement parcimonieuse. Dans le cas de l’attaque par PMP, le signal de tatouage est représenté et resynthétisé avec un spikegramme. Dans le cas de l’attaque par bruit inaudible, celui-ci est généré et ajouté aux coefficients du spikegramme. Dans le cas de l’attaque de remplacement parcimonieuse, dans chaque segment du signal, les caractéristiques spectro-temporelles du signal (les décharges temporelles ;‘time spikes’) se trouvent en utilisant le spikegramme et les spikes temporelles et similaires sont remplacés par une autre. Pour comparer l’efficacité des attaques proposées, nous les comparons au décodeur du tatouage à spectre étendu. Il est démontré que l’attaque par remplacement parcimonieux réduit la corrélation normalisée du décodeur de spectre étendu avec un plus grand facteur par rapport à la situation où le décodeur de spectre étendu est attaqué par la transformation MP3 (32 kbps) et 24 kbps USAC.
Resumo:
Data sharing between organizations through interoperability initiatives involving multiple information systems is fundamental to promote the collaboration and integration of services. However, in terms of data, the considerable increase in its exposure to additional risks, require a special attention to issues related to privacy of these data. For the Portuguese healthcare sector, where the sharing of health data is, nowadays, a reality at national level, data privacy is a central issue, which needs solutions according to the agreed level of interoperability between organizations. This context led the authors to study the factors with influence on data privacy in a context of interoperability, through a qualitative and interpretative research, based on the method of case study. This article presents the final results of the research that successfully identifies 10 subdomains of factors with influence on data privacy, which should be the basis for the development of a joint protection program, targeted at issues associated with data privacy.
Resumo:
The International Seabed Authority (ISA) regulates the activities related with the exploration and exploitation of seabed mineral resources in the Area, which are considered as the "common heritage of mankind" under the United Nations Convention on the Law of the Sea.The ISA has also the mandate to ensure the protection of the marine environment.The development of good practices for the annual reporting and data submission by Contractors is crucial for the ISA to comply with the sustainable development of the mineral marine resources. In 2015,the ISA issued a new template for reporting on exploration activities, which includes the definition of the format for all geophysical, geological and environmental data to be collected and analysed during exploration. The availability of reliable data contributes to improve the assessment of the ISA on the activities in the Area while promoting transparency, which is considered as a major principle of industry bestpractices.
Resumo:
This dissertation looks at three widely accepted assumptions about how the patent system works: patent documents disclose inventions; this disclosure happens quickly, and patent owners are able to enforce patents. The first chapter estimates the effect of stronger trade secret protection on the number of patented innovations. When firms find it easier to protect business information, there is less need for patent protection, and accordingly less need for the disclosure of technical information that is required by patent law. The novel finding is that when it is easier to keep innovations, there is not only a reduction in the number of patents but also a sizeable reduction in disclosed knowledge per patent. The chapter then shows how this endogeneity of the amount of knowledge per patent can affect the measurement of innovation using patent data. The second chapter develops a game-theoretic model to study how the introduction of fee-shifting in US patent litigation would influence firms’ patenting propensities. When the defeated party to a lawsuit has to bear not only their own cost but also the legal expenditure of the winning party, manufacturing firms in the model unambiguously reduce patenting, with small firms affected the most. For fee-shifting to have the same effect as in Europe, the US legal system would require shifting of a much smaller share of fees. Lessons from European patent litigation may, therefore, have only limited applicability in the US case. The third chapter contains a theoretical analysis of the influence of delayed disclosure of patent applications by the patent office. Such a delay is a feature of most patent systems around the world but has so far not attracted analytical scrutiny. This delay may give firms various kinds of strategic (non-)disclosure incentives when they are competing for more than a single innovation.
Resumo:
In digital markets personal information is pervasively collected by firms. In the first chapter I study data ownership and product customization when there is exclusive access to non rival but excludable data about consumer preferences. I show that an incumbent firm does not have an incentive to sell an exclusively held dataset with a rival firm, but instead it has an incentive to trade a customizing technology with the other firm. In the second chapter I investigate the effects of consumer information on the intensity of competition. In a two dimensional model of product differentiation, firms use information on preferences to practice price discrimination. I contrast a full privacy and a no privacy benchmark with a regime in which firms are able to target consumers only partially. When data is partially informative, firms are always better-off with price discrimination and an exclusive access to user data is not necessarily a competition policy concern. From a consumer protection perspective, the policy recommendation is that the regulator should promote either no privacy or full privacy. In the third chapter I introduce a data broker that observes either only one or both dimensions of consumer information and sells this data to competing firms for price discrimination purposes. When the seller exogenously holds a partially informative dataset, an exclusive allocation arises. Instead, when the dataset held is fully informative, the data broker trades information non exclusively but each competitor acquires consumer data on a different dimension. When data collection is made endogenous, non exclusivity is robust if collection costs are not too high. The competition policy suggestion is that exclusivity should not be banned per se, but it is data differentiation in equilibrium that rises market power in competitive markets. Upstream competition is sufficient to ensure that both firms get access to consumer information.
Resumo:
Our cities are constantly evolving, and the necessity to improve the condition and safety of the urban infrastructures is fundamental. However, on the roads, the specific needs of cyclists and pedestrians are often neglected. The Vulnerable Road Users (VRUs), among whom cyclists and pedestrians are, rarely benefit from the most innovative safety measures. Inspired by playgrounds and aiming to reduce VRUs injuries, the Impact-Absorbing Pavements (IAP) developed as novel sidewalks, and bike lanes surface layers may help decrease injuries, fatalities, and the related societal costs. To achieve this goal, the End-of-Life Tyres (ELTs) crumb rubber (CR) is used as a primary resource, bringing its elastic properties into the surface layer. The thesis is divided into five main chapters. The first concerns the formulation and the definition of a feasible mix. The second explores the mechanical and environmental properties in detail, and the ageing effect is also assessed. The third describes the modelling of the material to simulate accidents and measure the injury reduction, especially on the head. The fourth chapter is reserved for the field trial. The last gives some perspectives on the research and proposes a way to optimize and improve the data and results collected during the doctoral research. It was observed that the specimens made with cold protocol have noticeable performances and reduce the overall carbon footprint impact of this material. The material modelling and the accident simulation proved the performance of the IAP against head injuries, and the field trial confirmed the good results obtained in the laboratory for the cold-made material. Finally, the outcomes of this thesis opened many prospective to the IAP development, such as the use of a plant-based binder or recycled aggregates and gave a positive prospect of an innovative material to the urban road infrastructures.