Search results for: data protection officer
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 27080

Search results for: data protection officer

26810 Assessment the Capacity of Retention of a Natural Material for the Protection of Ground Water

Authors: Hakim Aguedal, Abdelkader Iddou, Abdalla Aziz, Abdelhadi Bentouami, Ferhat Bensalah, Salah Bensadek

Abstract:

The major environmental risk of soil pollution is the contamination of groundwater by infiltration of organic and inorganic pollutants that can cause a serious pollution. To prevent the migration of this pollution through this structure, many studies propose the installation of layers, which play a role of a barrier that inhibiting the contamination of groundwater by limiting or slowing the flow of rainwater carrying pollution through the layers of soil. However, it is practically impossible to build a barrier layer that let through only water, but it is possible to design a structure with low permeability, which reduces the infiltration of dangerous pollutant. In an environmental context of groundwater protection, the main objective of this study was to investigate the environmental and appropriate suitability method to preserve groundwater, by establishment of a permeable reactive barrier (PRB) intermediate in soil. Followed the influence of several parameters allow us to find the most effective materials and the most appropriate way to incorporate this barrier in the soil.

Keywords: Ground water, protection, permeable reactive Barrier, soil pollution.

Procedia PDF Downloads 559
26809 Vr-GIS and Ar-GIS In Education: A Case Study

Authors: Ilario Gabriele Gerloni, Vincenza Carchiolo, Alessandro Longheu, Ugo Becciani, Eva Sciacca, Fabio Vitello

Abstract:

ICT tools and platforms endorse more and more educational process. Many models and techniques for people to be educated and trained about specific topics and skills do exist, as classroom lectures with textbooks, computers, handheld devices and others. The choice to what extent ICT is applied within learning contexts is related to personal access to technologies as well as to the infrastructure surrounding environment. Among recent techniques, the adoption of Virtual Reality (VR) and Augmented Reality (AR) provides significant impulse in fully engaging users senses. In this paper, an application of AR/VR within Geographic Information Systems (GIS) context is presented. It aims to provide immersive environment experiences for educational and training purposes (e.g. for civil protection personnel), useful especially for situations where real scenarios are not easily accessible by humans. First acknowledgments are promising for building an effective tool that helps civil protection personnel training with risk reduction.

Keywords: education, virtual reality, augmented reality, GIS, civil protection

Procedia PDF Downloads 181
26808 Vegetable Oil-Based Anticorrosive Coatings for Metals Protection

Authors: Brindusa Balanuca, Raluca Stan, Cristina Ott, Matei Raicopol

Abstract:

The current study aims to develop anti corrosive coatings using vegetable oil (VO)-based polymers. Due to their chemical versatility, reduced costs and more important, higher hydrophobicity, VO’s are great candidates in the field of anti-corrosive materials. Lignin (Ln) derivatives were also used in this research study in order to achieve performant hydrophobic anti-corrosion layers. Methods Through a rational functionalization pathway, the selected VO (linseed oil) is converted to more reactive monomer – methacrylate linseed oil (noted MLO). The synthesized MLO cover the metals surface in a thin layer and through different polymerization techniques (using visible radiation or temperature, respectively) and well-established reaction conditions, is converted to a hydrophobic coating capable to protect the metals against corrosive factors. In order to increase the anti-corrosion protection, lignin (Ln) was selected to be used together with MLO macromonomer. Thus, super hydrophobic protective coatings will be formulated. Results The selected synthetic strategy to convert the VO in more reactive compounds – MLO – has led to a functionalization degree of greater than 80%. The obtained monomers were characterized through NMR and FT-IR by monitoring the characteristic signals after each synthesis step. Using H-NMR data, the functionalization degrees were established. VO-based and also VO-Ln anti corrosion formulations were both photochemical and thermal polymerized in specific reaction conditions (initiators, temperature range, reaction time) and were tested as anticorrosive coatings. Complete and advances characterization of the synthesized materials will be presented in terms of thermal, mechanical and morphological properties. The anticorrosive properties were also evaluated and will be presented. Conclusions Through the design strategy briefly presented, new composite materials for metal corrosion protection were successfully developed, using natural derivatives: vegetable oils and lignin, respectively.

Keywords: anticorrosion protection, hydrophobe layers, lignin, methacrylates, vegetable oil

Procedia PDF Downloads 172
26807 Impact of Internal Control on Fraud Detection and Prevention: A Survey of Selected Organisations in Nigeria

Authors: Amos Olusola Akinola

Abstract:

The aim of this study is to evaluate the internal control system on fraud prevention in Nigerian business organizations. A survey research was undertaken in five organizations from the banking and manufacturing sectors in Nigeria using the simple random sampling technique and primary data was obtained with the aid structured questionnaire drawn on five likert’s scale. Four Hypotheses were formulated and tested using the T-test Statistics, Correlation and Regression Analysis at 95% confidence interval. It was discovered that internal control has a significant positive relationship with fraud prevention and that a weak internal control system permits fraudulent activities among staff. Based on the findings, it was recommended that organizations should continually and methodically review and evaluate the components of its internal control system whether activities are working as planned or not and that every organization should have pre-determined guidelines for conducting its operations and ensures compliance with these set guidelines while proactive steps should be taken to establish the independence of the internal audit by making the audit reportable to the governing council of an organization and not the chief executive officer.

Keywords: internal control, internal system, internal audit, fraud prevention, fraud detection

Procedia PDF Downloads 387
26806 The Role and Challenges of Social Workers in Child Protection: The Case of Indonesia

Authors: B. Rusyidi

Abstract:

Since 2009, the Indonesian Ministry of Social Affairs has been implementing Program Kesejahteraan Sosial Anak (PKSA) (Child Welfare Program) a conditional cash transfer program that targets neglected children, children with disabilities, street children, children in conflict with the law, and children in need of special protection, all from poor households. PKSA integrates three elements: Transfer of cash, care and social services through social workers, and institutional childcare assistance. This qualitative study analyzed the roles and the challenges of social workers in implementing PKSA and lays out recommendations to inform policy changes. Data were collected in late 2014 from national and local government and non-government child welfare agencies, social workers, and childcare institution representatives through interviews and Focused Group Discussions (FGDs). Field work took place in six districts in the provinces of Jakarta, Central Java and South Sulawesi. The study found that the social workers’ role was significant in facilitating cash transfer, providing education and guidance, and linking children and families to basic social services. This improved utilization of basic social services enhanced children and families’ behaviors and contributed to the well being of the children. However, only a small number of childcare institutions have social workers, leaving many children and families without care and social service linkages, depriving them of rehabilitative components to help them regain their social functions. Some social workers reported their struggles with heavy workloads, lack of professional competencies and training, limited job security, and inadequate professional acknowledgment from other professions. Parts of those challenges were due to the centralized nature of the program and the lack of shared vision and commitment about the child protection system among related government agencies both at the national and local levels. The study highlights the necessity to implement an integrated child protection system, decentralize the PKSA program, and increase the number, competence, case management, and management and monitoring of social workers. The most recent progress of the program and its impacts on social workers are also discussed.

Keywords: child protection, conditional cash transfer, program decentralization, social worker, working conditions

Procedia PDF Downloads 219
26805 Identifying the Determinants of Compliance with Maritime Environmental Legislation in the North and Baltic Sea Area: A Model Developed from Exploratory Qualitative Data Collection

Authors: Thea Freese, Michael Gille, Andrew Hursthouse, John Struthers

Abstract:

Ship operators on the North and Baltic Sea have been experiencing increased political interest in marine environmental protection and cleaner vessel operations. Stricter legislation on SO2 and NOx emissions, ballast water management and other measures of protection are currently being phased in or will come into force in the coming years. These measures benefit the health of the marine environment, while increasing company’s operational costs. In times of excess shipping capacity and linked consolidation in the industry non-compliance with environmental rules is one way companies might hope to stay competitive with both intra- and inter-modal trade. Around 5-15% of industry participants are believed to neglect laws on vessel-source pollution willingly or unwillingly. Exploratory in-depth interviews conducted with 12 experts from various stakeholder groups informed the researchers about variables influencing compliance levels, including awareness and apprehension, willingness to comply, ability to comply and effectiveness of controls. Semi-structured expert interviews were evaluated using qualitative content analysis. A model of determinants of compliance was developed and is presented here. While most vessel operators endeavour to achieve full compliance with environmental rules, a lack of availability of technical solutions, expediency of implementation and operation and economic feasibility might prove a hindrance. Ineffective control systems on the other hand foster willing non-compliance. With respect to motivations, lacking time, lacking financials and the absence of commercial advantages decrease compliance levels. These and other variables were inductively developed from qualitative data and integrated into a model on environmental compliance. The outcomes presented here form part of a wider research project on economic effects of maritime environmental legislation. Research on determinants of compliance might inform policy-makers about actual behavioural effects of shipping companies and might further the development of a comprehensive legal system for environmental protection.

Keywords: compliance, marine environmental protection, exploratory qualitative research study, clean vessel operations, North and Baltic Sea area

Procedia PDF Downloads 387
26804 “Protection” or “Destruction”: Taking the Cultural Heritage Protection of the Grand Canal in Huaxian and Xunxian Sections of Henan Province as Example

Authors: Yue Sun, Yuan Wang

Abstract:

The Grand Canal of China has been in use for more than two thousand years. It runs through the central and eastern regions of China and communicates with the five major river systems of Haihe River, Yellow River, Huaihe River, Yangtze River and Qiantang River from north to south. It is a complex, systematic and comprehensive water conservancy project in the period of agricultural civilization and includes the three parts of the Beijing-Hangzhou Canal, the Sui and Tang Dynasties Canal and the Eastern Zhejiang Canal. It covers eight provinces and cities including Beijing, Tianjin, Hebei, Shandong, Jiangsu, Zhejiang, Henan and Anhui. The Grand Canal is an important channel connecting the Central Plains and the Beijing-Hangzhou Canal, and it is also an important waterway trade channel. Nowadays, although the Grand Canal no longer bears the burden of communicating water transportation between the north and the south, the site of the Grand Canal is still a “historical museum” of the lifestyle of people who lived on the canal from the Ming and Qing Dynasties to the Republic of China. By means of literature reading and field investigation, this paper compares the different protection strategies of the Grand Canal in the region between the ancient villages of Huaxian and Xunxian, which witness the vicissitudes of canal water transport, to explore whether the protective renovation of historical and cultural routes is “protection” or “destruction”, and puts forward some protection suggestions.

Keywords: The Grand Canal, heritage conservation, cultural route, ancient villages, strategies

Procedia PDF Downloads 156
26803 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: root of trust, secure boot, memory protection, hardware security

Procedia PDF Downloads 227
26802 Design of an Ensemble Learning Behavior Anomaly Detection Framework

Authors: Abdoulaye Diop, Nahid Emad, Thierry Winter, Mohamed Hilia

Abstract:

Data assets protection is a crucial issue in the cybersecurity field. Companies use logical access control tools to vault their information assets and protect them against external threats, but they lack solutions to counter insider threats. Nowadays, insider threats are the most significant concern of security analysts. They are mainly individuals with legitimate access to companies information systems, which use their rights with malicious intents. In several fields, behavior anomaly detection is the method used by cyber specialists to counter the threats of user malicious activities effectively. In this paper, we present the step toward the construction of a user and entity behavior analysis framework by proposing a behavior anomaly detection model. This model combines machine learning classification techniques and graph-based methods, relying on linear algebra and parallel computing techniques. We show the utility of an ensemble learning approach in this context. We present some detection methods tests results on an representative access control dataset. The use of some explored classifiers gives results up to 99% of accuracy.

Keywords: cybersecurity, data protection, access control, insider threat, user behavior analysis, ensemble learning, high performance computing

Procedia PDF Downloads 132
26801 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection

Authors: Mahshid Arabi

Abstract:

With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.

Keywords: data protection, digital technologies, information security, modern management

Procedia PDF Downloads 38
26800 A Theoretical Study of Multi-Leaf Spring in Seismic Response Control

Authors: M. Ezati Kooshki , H. Pourmohamad

Abstract:

Leaf spring dampers are used for commercial vehicles and heavy tracks. The main function of this damper in these vehicles is protection against damage and providing comfort for drivers by creating suspension between road and vehicle. This paper presents a new device, circular leaf spring damper, which is frequently used on vehicles, aiming to gain seismic protection of structures. Finite element analyses were conducted on several one-story structures using finite element software (Abaqus, v6.10-1). The time history analysis was conducted on the records of Kobe (1995) and San Fernando (1971) ground motions to demonstrate the advantages of using leaf spring in structures as compared to simple bracing system. This paper also suggests extending the use of this damper in structures, considering its large control force despite high cycle fatigue properties and low prices.

Keywords: bracing system, finite element analysis, leaf spring, seismic protection, time history analysis

Procedia PDF Downloads 410
26799 Exchange Traded Products on the Warsaw Stock Exchange

Authors: Piotr Prewysz-Kwinto

Abstract:

A dynamic development of financial market is accompanied by the emergence of new products on stock exchanges which give absolutely new possibilities of investing money. Currently, the most innovative financial instruments offered to investors are exchange traded products (ETP). They can be defined as financial instruments whose price depends on the value of the underlying instrument. Thus, they offer investors a possibility of making a profit that results from the change in value of the underlying instrument without having to buy it. Currently, the Warsaw Stock Exchange offers many types of ETPs. They are investment products with full or partial capital protection, products without capital protection as well as leverage products, issued on such underlying instruments as indices, sector indices, commodity indices, prices of energy commodities, precious metals, agricultural produce or prices of shares of domestic and foreign companies. This paper presents the mechanism of functioning of ETP available on the Warsaw Stock Exchange and the results of the analysis of statistical data on these financial instruments.

Keywords: exchange traded products, financial market, investment, stock exchange

Procedia PDF Downloads 351
26798 Packaging Processes for the Implantable Medical Microelectronics

Authors: Chung-Yu Wu, Chia-Chi Chang, Wei-Ming Chen, Pu-Wei Wu, Shih-Fan Chen, Po-Chun Chen

Abstract:

Electrostimulation medical devices for neural diseases require electroactive and biocompatible materials to transmit signals from electrodes to targeting tissues. Protection of surrounding tissues has become a great challenge for long-term implants. In this study, we designed back-end processes with compatible, efficient, and reliable advantages over the current state-of-the-art. We explored a hermetic packaging process with high quality of adhesion and uniformity as the biocompatible devices for long-term implantation. This approach is able to provide both excellent biocompatibility and protection to the biomedical electronic devices by performing conformal coating of biocompatible materials. We successfully developed a packaging process that is capable of exposing the stimulating electrode and cover all other faces of chip with high quality of protection to prevent leakage of devices and body fluid.

Keywords: biocompatible package, medical microelectronics, surface coating, long-term implantation

Procedia PDF Downloads 527
26797 Arc Flash Analysis: Technique to Mitigate Fire Incidents in Substations

Authors: M. H. Saeed, M. Rasool, M. A. Jawed

Abstract:

Arc Flash Analysis has been a subject of great interest since the electrical fire incidents have been reduced to a great extent after the implementation of arc flash study at different sites. An Arc flash in substations is caused by short circuits over the air or other melted conductors and small shrapnel. Arc flash incidents result in the majority of deaths in substations worldwide. Engro Fertilizers Limited (EFERT) site having a mix of vintage non-internal arc rated and modern arc rated switchgears, carried out an arc flash study of the whole site in accordance with NFPA70E standard. The results not only included optimizing site protection coordination settings but also included marking of Shock and Arc flash protection boundaries in all switchgear rooms. Work permit procedures upgradation is also done in accordance with this study to ensure proper arc rated PPEs and arc flash boundaries protocols are fully observed and followed. With the new safety, protocols working on electrical equipment will be much safer than ever before.

Keywords: Arc flash, non-internal arc rated, protection coordination, shock boundary

Procedia PDF Downloads 183
26796 Study on Horizontal Ecological Compensation Mechanism in Yangtze River Economic Belt Basin: Based on Evolutionary Game Analysis and Water Quality and Quantity Model

Authors: Tingyu Zhang

Abstract:

The horizontal ecological compensation (HEC) mechanism is the key to stimulating the active participation of the whole basin in ecological protection. In this paper, we construct an evolutionary model for HEC in the Yangtze River Economic Belt (YREB) basin with the introduction of the central government constraint and incentive mechanism (CGCIM) and explore the conditions for the realization of a (Protection and compensation) strategy that meets the social expectations. Further, the water quality-water quantity model is utilized to measure the HEC amount with the characteristic factual data of the YREB in 2020-2022. The results show that the stability of the evolutionary game model of upstream and downstream governments in the YREB is closely related to the CGCIM. If (Protection Compensation) is to be realized as the only evolutionary stable strategy of the evolutionary game system composed of upstream and downstream governments, it is necessary for the CGCIM to satisfy that the sum of the incentives for the protection side and its unilateral or bilateral constraints is greater than twice the input cost of the active strategy, and the sum of the incentives for the compensation side and its unilateral or bilateral constraints is greater than the amount of ecological compensation that needs to be paid by it when it adopts the active strategy. At this point, the total amount of HEC that the downstream government should give to the upstream government of the YREB is 2856.7 million yuan in 2020, 5782.1 million yuan in 2021, and 23166.7 million yuan in 2022. The results of the study can provide a reference for promoting the improvement and refinement of the HEC mechanism in the YREB.

Keywords: horizontal ecological compensation, Yangtze river economic belt, evolutionary game analysis, water quality and quantity model research on territorial ecological restoration in Mianzhu city, Sichuan, under the dual evaluation framework

Procedia PDF Downloads 55
26795 Unequal Error Protection of VQ Image Transmission System

Authors: Khelifi Mustapha, A. Moulay lakhdar, I. Elawady

Abstract:

We will study the unequal error protection for VQ image. We have used the Reed Solomon (RS) Codes as Channel coding because they offer better performance in terms of channel error correction over a binary output channel. One such channel (binary input and output) should be considered if it is the case of the application layer, because it includes all the features of the layers located below and on the what it is usually not feasible to make changes.

Keywords: vector quantization, channel error correction, Reed-Solomon channel coding, application

Procedia PDF Downloads 367
26794 PUF-Based Lightweight Iot Secure Authentication Chip Design

Authors: Wenxuan Li, Lei Li, Jin Li, Yuanhang He

Abstract:

This paper designed a secure chip for IoT communication security integrated with the PUF-based firmware protection scheme. Then, the Xilinx Kintex-7 and STM-32 were used for the prototype verification. Firmware protection worked well on FPGA and embedded platforms. For the ASIC implementation of the PUF module, contact PUF is chosen. The post-processing method and its improvement are analyzed with emphasis. This paper proposed a more efficient post-processing method for contact PUF named SXOR, which has practical value for realizing lightweight security modules in IoT devices. The analysis was carried out under the hypothesis that the contact holes are independent and combine the existing data in the open literature. The post-processing effects of SXOR and XOR are basically the same under the condition that the proposed post-processing circuit occupies only 50.6% of the area of XOR. The average Hamming weight of the PUF output bit sequence obtained by the proposed post-processing method is 0.499735, and the average Hamming weight obtained by the XOR-based post-processing method is 0.499999.

Keywords: PUF, IoT, authentication, secure communication, encryption, XOR

Procedia PDF Downloads 146
26793 Microbial Deterioration of Some Different Archaeological Objects Made from Cellulose by Bacillus Group

Authors: Mohammad Abdel Fattah Mohammad Kewisha

Abstract:

Microbial deterioration of ancient materials became one of the biggest problems facing the workers in the field of cultural heritage protection because the microbial deterioration of artifacts causes detrimental effects on the aesthetic value of the monuments due to colonization, whether they are made of inorganic materials such as stone or organic like wood, textiles, wall paintings, and paper. So, the early identification of the bacterial strains that caused deterioration is the most important point for the protection of monument objects. The present study focuses on the Bacillus spp. group, which was isolated from some biodeterioration monuments from different areas of Egypt. The investigated objects in this study were made from organic materials (cellulose), paper, textile, and wood. Isolated strains were identified up to the species level biochemically. Eleven bacterial isolates were obtained from collected samples. They were taken from different archaeological objects, four microbicides, cetrimonium bromide, sodium azide, tetraethyl ammonium bromide, and dichloroxylenol, at various concentrations ranging from 25 ppm to 500 ppm. They were screened for their antibacterial activity against the Bacillus spp. isolates, and detection of Minimum inhibitory concentration (MIC). It was also necessary to indicate the ideal Minimum inhibitory concentration for each strain for the purpose of biotreatment of the infected monuments with less damaging effect on monument materials.

Keywords: microbial deterioration, ancient materials, heritage protection, protection of monuments, biodeteriorative monuments

Procedia PDF Downloads 64
26792 The Lighthouse Project: Recent Initiatives to Navigate Australian Families Safely Through Parental Separation

Authors: Kathryn McMillan

Abstract:

A recent study of 8500 adult Australians aged 16 and over revealed 62% had experienced childhood maltreatment. In response to multiple recommendations by bodies such as the Australian Law Reform Commission, parliamentary reports and stakeholder input, a number of key initiatives have been developed to grapple with the difficulties of a federal-state system and to screen and triage high-risk families navigating their way through the court system. The Lighthouse Project (LHP) is a world-first initiative of the Federal Circuit and Family Courts in Australia (FCFOCA) to screen family law litigants for major risk factors, including family violence, child abuse, alcohol or substance abuse and mental ill-health at the point of filing in all applications that seek parenting orders. It commenced on 7 December 2020 on a pilot basis but has now been expanded to 15 registries across the country. A specialist risk screen, Family DOORS, Triage has been developed – focused on improving the safety and wellbeing of families involved in the family law system safety planning and service referral, and ¬ differentiated case management based on risk level, with the Evatt List specifically designed to manage the highest risk cases. Early signs are that this approach is meeting the needs of families with multiple risks moving through the Court system. Before the LHP, there was no data available about the prevalence of risk factors experienced by litigants entering the family courts and it was often assumed that it was the litigation process that was fueling family violence and other risks such as suicidality. Data from the 2022 FCFCOA annual report indicated that in parenting proceedings, 70% alleged a child had been or was at risk of abuse, 80% alleged a party had experienced Family Violence, 74 % of children had been exposed to Family Violence, 53% alleged through substance misuse by party children had caused or was at risk of causing harm to children and 58% of matters allege mental health issues of a party had caused or placed a child at risk of harm. Those figures reveal the significant overlap between child protection and family violence, both of which are under the responsibility of state and territory governments. Since 2020, a further key initiative has been the co-location of child protection and police officials amongst a number of registries of the FCFOCA. The ability to access in a time-effective way details of family violence or child protection orders, weapons licenses, criminal convictions or proceedings is key to managing issues across the state and federal divide. It ensures a more cohesive and effective response to family law, family violence and child protection systems.

Keywords: child protection, family violence, parenting, risk screening, triage.

Procedia PDF Downloads 83
26791 Sexual Health and Sexual Risk Behavior of the Youth with HIV Positive in Northeastern Part, Thailand

Authors: Orathai Srithongtham, Ubonsri Thabuddha

Abstract:

The youth with HIV positive is not difference from the general youth in term of sexual needs. Sexual health is crucial the most to support the youth with HIV positive to be sexual well-being. This study aims to elucidate the sexual health on protection from STDs (Sexual Transmitted Diseases) and HIV transmission and to explain sexual risk behavior of the youth with HIV positive. The target group was the youth with HIV positive about 23 cases from two provinces in northeastern part of Thailand. Qualitative method was applied for collecting data by in-depth interview. Content analysis was use for data analysis. The youth with HIV positive was protection from STDs and HIV transmission by using the condom during sexual activity. The reason to deny the condom use were ashamed, condom is not a part of life, no have fit size, and the youth fear to stigmatized as a mental disorder and fear to stigmatized as going to fuck someone. The youth who trust with nurse in clinic was dare to request the condom by face. Sexual activity without condom use is sexual risk behavior. The major causes were couple trust and the sexual enjoyment first and sexual active competition with friend without condom use. The concern on HIV was the boyfriend or girlfriend not accepts the HIV positive people, worry about the HIV transmutation, and finally not compliance to ARV drug. The youth with HIV positive was lacking of the knowledge on sexual health on the issues of access to condom and the concern to keep on relationship with the boyfriend or girlfriend. This concern issues was led to the non-adherence of ARV drug and HIV distribution. To provide the sexual health service is more essential to the youth with HIV positive.

Keywords: sexual health, sexual risk behavior, youth, HIV

Procedia PDF Downloads 480
26790 Ontology-Driven Generation of Radiation Protection Procedures

Authors: Chamseddine Barki, Salam Labidi, Hanen Boussi Rahmouni

Abstract:

In this article, we present the principle and suitable methodology for the design of a medical ontology that highlights the radiological and dosimetric knowledge, applied in diagnostic radiology and radiation-therapy. Our ontology, which we named «Onto.Rap», is the subject of radiation protection in medical and radiology centers by providing a standardized regulatory oversight. Thanks to its added values of knowledge-sharing, reuse and the ease of maintenance, this ontology tends to solve many problems. Of which we name the confusion between radiological procedures a practitioner might face while performing a patient radiological exam. Adding to it, the difficulties they might have in interpreting applicable patient radioprotection standards. Here, the ontology, thanks to its concepts simplification and expressiveness capabilities, can ensure an efficient classification of radiological procedures. It also provides an explicit representation of the relations between the different components of the studied concept. In fact, an ontology based-radioprotection expert system, when used in radiological center, could implement systematic radioprotection best practices during patient exam and a regulatory compliance service auditing afterwards.

Keywords: knowledge, ontology, radiation protection, radiology

Procedia PDF Downloads 317
26789 Spectral Anomaly Detection and Clustering in Radiological Search

Authors: Thomas L. McCullough, John D. Hague, Marylesa M. Howard, Matthew K. Kiser, Michael A. Mazur, Lance K. McLean, Johanna L. Turk

Abstract:

Radiological search and mapping depends on the successful recognition of anomalies in large data sets which contain varied and dynamic backgrounds. We present a new algorithmic approach for real-time anomaly detection which is resistant to common detector imperfections, avoids the limitations of a source template library and provides immediate, and easily interpretable, user feedback. This algorithm is based on a continuous wavelet transform for variance reduction and evaluates the deviation between a foreground measurement and a local background expectation using methods from linear algebra. We also present a technique for recognizing and visualizing spectrally similar clusters of data. This technique uses Laplacian Eigenmap Manifold Learning to perform dimensional reduction which preserves the geometric "closeness" of the data while maintaining sensitivity to outlying data. We illustrate the utility of both techniques on real-world data sets.

Keywords: radiological search, radiological mapping, radioactivity, radiation protection

Procedia PDF Downloads 698
26788 Cross-Disciplinary Perspectives on Climate-Induced Migration in Brazil: Legislation, Policies and Practice

Authors: Heloisa H. Miura, Luiza M. Pallone

Abstract:

In Brazil, people forced to move due to environmental causes, called 'environmental migrants', have always been neglected by public policies and legislation. Meanwhile, the numbers of climate-induced migration within and to Brazil continues to increase. The operating Immigration Law, implemented in 1980 under the Brazilian military regime, is widely considered to be out of date, once it does not offer legal protection to migrants who do not fit the definition of a refugee and are not allowed to stay regularly in the country. Aiming to reformulate Brazil’s legislation and policies on the matter, a new Migration Bill (PL 2516/2015) is currently being discussed in the Senate and is expected to define a more humanized approach to migration. Although the present draft foresees an expansion of the legal protection to different types of migrants, it still hesitates to include climate-induced displacements in its premises and to establish a migration management strategy. By introducing a human rights-based approach, this paper aims to provide a new multidisciplinary perspective to the protection of environmental migrants in Brazil.

Keywords: environmental migrants, human mobility, climate change, migration policy

Procedia PDF Downloads 406
26787 Maintaining Organizational Harmony: The Way Forward in Ghanaian Basic Schools

Authors: Dominic Kwaku Danso Mensah

Abstract:

The study examined conflict management strategies among head teachers and teachers in selected basic schools in Okai-Koi sub metro in the greater region of Ghana. In all, 270 participants were engaged in the study, comprising 237 teachers, 32 head teachers, and one officer in charge of the Metropolis. The study employed descriptive survey while using purposive and simple random sampling techniques to sample participants. Interview guides and questionnaires were the main instruments used for gathering primary data. The study found that conflict is inevitable in the schools. Conflicts in schools are usually subtle and hardly noticed by outsiders even though they occur on daily basis. The causes of conflict include among other things, high expectation from head teachers, inability to attain goals set, communication from head teachers and power struggle. The study found out that, in managing and resolving conflicts, issues such as identifying and focusing on the problem, building of trust and cooperation, clarifying goals and objectives were seen to be effective means of managing conflict and recommended that management should design and develop conflict management strategies to quickly resolve conflict.

Keywords: basic education, conflict management, organizational harmony, power

Procedia PDF Downloads 291
26786 Coastal Cliff Protection in Beit Yanai, Israel: Examination of Alternatives and Public Preference Analysis

Authors: Tzipi Eshet

Abstract:

The primary objectives of this work are the examination of public preferences and attributed importance to different characteristics of coastal cliff protection alternatives, and drawing conclusions about the applicable alternative in Beit-Yanai beach. Erosion of coastal cliffs is a natural phenomenon that occurs in many places in the world. This creates problems along the coastlines, which are densely populated areas with highly developed economic activity. In recent years, various aspects of the aeolianite cliffs along the Israeli coast have been studied extensively. There is a consensus among researchers regarding a general trend of cliff retreat. This affects civilian infrastructure, wildlife habitats and heritage values, as well as Increases the risk to human life. The Israeli government, committed to the integrated coastal zones management approach, decided on a policy and guidelines to deal with cliff erosion, which includes establishing physical protection on land and in the sea, sand nourishment and runoff drainage. Physical protection solutions to reduce the rate of retreat of the cliffs are considerably important both for planning authorities and visitors to the beach. Direct costs of different protection alternatives, as well as external costs and benefits, may vary, thus affecting consumer preferences. Planning and execution of sustainable coastal cliff protection alternatives must take into account the different characteristics and their impact on aspects of economics, environment and leisure. The rocky shore of Beit-Yanai Beach was chosen as a case study to examine the nature of the influence of various protective solutions on consumer preferences. This beach is located in the center of Israel's coastline, and acts as a focus of attraction for recreation, land and sea sports, and educational activities as well. If no action will be taken, cliff retreat will continue. A survey was conducted to reveal the importance of coastal protection alternatives characteristics and the visual preferences to visitors at beach Beit-Yanai and residents living on the cliff (N=287). Preferences and willingness-to-pay were explored using Contingent-Ranking and Choice-Experiments techniques. Results show that visitors’ and residents’ willingness-to-pay for coastal cliff protection alternatives is affected both by financial and environmental aspects, as well as leisure. They prefer coastal cliff protection alternatives that are not visible and do not need constant maintenance, do not affect the quality of seawater or the habitats of wildlife and do not lower the security level of the swimmers. No significant difference was found comparing willingness-to-pay among local and non-local users. Additionally, they mostly prefer a protection solution which is integrated in the coastal landscape and maintains the natural appearance of the beach. Of the possible protection alternatives proposed for the protection of the cliff in Beit Yanai beach are two techniques that meet public preferences: rock revetments and submerged detached breakwaters. Results indicate that the visiting public prefer the implementation of these protection alternatives and will be willing to pay for them. Future actions to reduce retreat rate in Beit-Yanai have to consider implications on the economic, environmental and social conditions, along with weighting public interest against the interest of the individual.

Keywords: contingent-ranking, choice-experiments, coastal cliff protection, erosion of coastal cliffs, environment

Procedia PDF Downloads 307
26785 Use of Corporate Social Responsibility in Environmental Protection: Modern Mechanisms of Environmental Self-Regulation

Authors: Jakub Stelina, Janina Ciechanowicz-McLean

Abstract:

Fifty years of existence and development of international environmental law brought a deep disappointment with efficiency and effectiveness of traditional command and control mechanisms of environmental regulation. Agenda 21 agreed during the first Earth Summit in Rio de Janeiro 1992 was one of the first international documents, which explicitly underlined the importance of public participation in environmental protection. This participation includes also the initiatives undertaken by business corporations in the form of private environmental standards setting. Twenty years later during the Rio 20+ Earth Summit the private sector obligations undertaken during the negotiations have proven to be at least as important as the ones undertaken by the governments. The private sector has taken the leading role in environmental standard setting. Among the research methods used in the article two are crucial in the analysis. The comparative analysis of law is the instrument used in the article to analyse the practice of states and private business companies in the field of sustainable development. The article uses economic analysis of law to estimate the costs and benefits of Corporate Social Responsibility Projects in the field of environmental protection. The study is based on the four premises. First is the role of social dialogue, which is crucial for both Corporate Social Responsibility and modern environmental protection regulation. The Aarhus Convention creates a procedural environmental human right to participate in administrative procedures of law setting and environmental decisions making. The public participation in environmental impact assessment is nowadays a universal standard. Second argument is about the role of precaution as a principle of modern environmental regulation. This principle can be observed both in governmental regulatory undertakings and also private initiatives within the Corporate Social Responsibility environmental projects. Even in the jurisdictions which are relatively reluctant to use the principle of preventive action in environmental regulation, the companies often use this standard in their own private business standard setting initiatives. This is often due to the fact that soft law standards are used as the basis for private Corporate Social Responsibility regulatory initiatives. Third premise is about the role of ecological education in environmental protection. Many soft law instruments underline the importance of environmental education. Governments use environmental education only to the limited extent due to the costs of such projects and problems with effects assessment. Corporate Social Responsibility uses various means of ecological education as the basis of their actions in the field of environmental protection. Last but not least Sustainable development is a goal of both legal protection of the environment, and economic instruments of companies development. Modern environmental protection law uses to the increasing extent the Corporate Social Responsibility. This may be the consequence of the limits of hard law regulation. Corporate Social Responsibility is nowadays not only adapting to soft law regulation of environmental protection but also creates such standards by itself, showing new direction for development of international environmental law. Corporate Social Responsibility in environmental protection can be good investment in future development of the company.

Keywords: corporate social responsibility, environmental CSR, environmental justice, stakeholders dialogue

Procedia PDF Downloads 303
26784 Present Status, Driving Forces and Pattern Optimization of Territory in Hubei Province, China

Authors: Tingke Wu, Man Yuan

Abstract:

“National Territorial Planning (2016-2030)” was issued by the State Council of China in 2017. As an important initiative of putting it into effect, territorial planning at provincial level makes overall arrangement of territorial development, resources and environment protection, comprehensive renovation and security system construction. Hubei province, as the pivot of the “Rise of Central China” national strategy, is now confronted with great opportunities and challenges in territorial development, protection, and renovation. Territorial spatial pattern experiences long time evolution, influenced by multiple internal and external driving forces. It is not clear what are the main causes of its formation and what are effective ways of optimizing it. By analyzing land use data in 2016, this paper reveals present status of territory in Hubei. Combined with economic and social data and construction information, driving forces of territorial spatial pattern are then analyzed. Research demonstrates that the three types of territorial space aggregate distinctively. The four aspects of driving forces include natural background which sets the stage for main functions, population and economic factors which generate agglomeration effect, transportation infrastructure construction which leads to axial expansion and significant provincial strategies which encourage the established path. On this basis, targeted strategies for optimizing territory spatial pattern are then put forward. Hierarchical protection pattern should be established based on development intensity control as respect for nature. By optimizing the layout of population and industry and improving the transportation network, polycentric network-based development pattern could be established. These findings provide basis for Hubei Territorial Planning, and reference for future territorial planning in other provinces.

Keywords: driving forces, Hubei, optimizing strategies, spatial pattern, territory

Procedia PDF Downloads 108
26783 Designing Self-Healing Lubricant-Impregnated Surfaces for Corrosion Protection

Authors: Sami Khan, Kripa Varanasi

Abstract:

Corrosion is a widespread problem in several industries and developing surfaces that resist corrosion has been an area of interest since the last several decades. Superhydrophobic surfaces that combine hydrophobic coatings along with surface texture have been shown to improve corrosion resistance by creating voids filled with air that minimize the contact area between the corrosive liquid and the solid surface. However, these air voids can incorporate corrosive liquids over time, and any mechanical faults such as cracks can compromise the coating and provide pathways for corrosion. As such, there is a need for self-healing corrosion-resistance surfaces. In this work, the anti-corrosion properties of textured surfaces impregnated with a lubricant have been systematically studied. Since corrosion resistance depends on the area and physico-chemical properties of the material exposed to the corrosive medium, lubricant-impregnated surfaces (LIS) have been designed based on the surface tension, viscosity and chemistry of the lubricant and its spreading coefficient on the solid. All corrosion experiments were performed in a standard three-electrode cell using iron, which readily corrodes in a 3.5% sodium chloride solution. In order to obtain textured iron surfaces, thin films (~500 nm) of iron were sputter-coated on silicon wafers textured using photolithography, and subsequently impregnated with lubricants. Results show that the corrosion rate on LIS is greatly reduced, and offers an over hundred-fold improvement in corrosion protection. Furthermore, it is found that the spreading characteristics of the lubricant are significant in ensuring corrosion protection: a spreading lubricant (e.g., Krytox 1506) that covers both inside the texture, as well as the top of the texture, provides a two-fold improvement in corrosion protection as compared to a non-spreading lubricant (e.g., Silicone oil) that does not cover texture tops. To enhance corrosion protection of surfaces coated with a non-spreading lubricant, pyramid-shaped textures have been developed that minimize exposure to the corrosive solution, and a consequent twenty-fold increased in corrosion protection is observed. An increase in viscosity of the lubricant scales with greater corrosion protection. Finally, an equivalent cell-circuit model is developed for the lubricant-impregnated systems using electrochemical impedance spectroscopy. Lubricant-impregnated surfaces find attractive applications in harsh corrosive environments, especially where the ability to self-heal is advantageous.

Keywords: lubricant-impregnated surfaces, self-healing surfaces, wettability, nano-engineered surfaces

Procedia PDF Downloads 137
26782 Advanced Textiles for Soldier Clothes Based on Coordination Polymers

Authors: Hossam E. Emam

Abstract:

The functional textiles development history in the military field could be ascribed as a uniquely interesting research topic. Soldiers are like a high-performance athletes, where monitoring their physical and physiological capabilities is a vital requirement. Functional clothes represent a “second skin” that has a close, “intimate” relationship with the human body. For the application of textiles in military purposes, which is normally required in difficult weather and environmental conditions, several functions are required. The requirements for designing functional military textiles for soldier's protection can be categorized into three categories; i) battle field (protection from chemical warfare agents, flames, and thermal radiation), ii) environmental (water proof, air permeable, UV-protection, antibacterial), iii) physiological (minimize heat stress, low weight, insulative, durability). All of these requirements are important, but the means to fulfill these requirements are not simple and straight forward. Additionally, the combination of more than one function is reported to be very expensive and requires many complicated steps, and the final product is found to be low durability. Not only do all of these requirements are overlapping, but they are also contradicting each other at various levels. Thus, we plan to produce multi-functional textiles (e.g., anti-microbial, UV-protection, fire retardant, photoluminescent) to be applied in military clothes. The current project aims to use quite a simple and applicable technique through the modification of textiles with different coordination polymers and functionalized coordination polymers.

Keywords: functional textiles, military clothes, coordination polymers, antimicrobial, fire retardant, photolumenscent

Procedia PDF Downloads 186
26781 Cultural Identity in Environmental Protection Areas of Nova Friburgo: Heritage, Tourism, and Traditions

Authors: Camila Dazzi, Crisitiane Passos de Mattos, Thiago Leite

Abstract:

The paper discusses the cultural identity of the communities located in Environmental Protection Area (APAs), in the mountainous region of Rio de Janeiro, constituted almost entirely by descendants of Swiss immigrants who arrived in Brazil in the nineteenth century. The communication is the result of an extension project named "Cultural Identity in Environmental Protection Areas of Nova Friburgo." The objectives of this project were framed in the identification of local history, cultural demonstrations, crafts, religious events, festivals, the "know-how" and traditions. While an extension project, developed by students and teachers of a Bachelor of Tourism Management program, the work provided a more practical action: awareness the communities that inhabit the APAs on the possible implementation of the cultural community-based tourism, a sustainable alternative for economic development, involving local people as propagators of local culture, and tourism as a way of valuing and safeguarding of Intangible Heritage.

Keywords: tourism and cultural heritage, tourism and cultural impacts, tourism and cultural change, cultural identity

Procedia PDF Downloads 546