Search results for: protection of victims
2503 Investigation of Corrosion of Steel Buried in Unsaturated Soil in the Presence of Cathodic Protection: The Modified Voltammetry Technique
Authors: Mandlenkosi G. R. Mahlobo, Peter A. Olubambi, Philippe Refait
Abstract:
The aim of this study was to use voltammetry as a method to understand the behaviour of steel in unsaturated soil in the presence of cathodic protection (CP). Three carbon steel coupons were buried in artificial soil wetted at 65-70% of saturation for 37 days. All three coupons were left at open circuit potential (OCP) for the first seven days in the unsaturated soil before CP, which was only applied on two of the three coupons at the protection potential -0.8 V vs Cu/CuSO₄ for the remaining 30 days of the experiment. Voltammetry was performed weekly on the coupon without CP, while electrochemical impedance spectroscopy (EIS) was performed daily to monitor and correct the applied CP potential from the ohmic drop. Voltammetry was finally performed on the last day on the coupons under CP. All the voltammograms were modeled with mathematical equations in order to compute the electrochemical parameters and subsequently deduced the corrosion rate of the steel coupons. For the coupon without CP, the corrosion rate was determined at 300 µm/y. For the coupons under CP, the residual corrosion rate under CP was estimated at 12 µm/y while the corrosion rate of the coupons, after interruption of CP, was estimated at 25 µm/y. This showed that CP was efficient due to two effects: a direct effect from the decreased potential and an induced effect associated with the increased interfacial pH that promoted the formation of a protective layer on the steel surface.Keywords: carbon steel, cathodic protection, voltammetry, unsaturated soil, Raman spectroscopy
Procedia PDF Downloads 632502 Empirical Analysis of the Global Impact of Cybercrime Laws on Cyber Attacks and Malware Types
Authors: Essang Anwana Onuntuei, Chinyere Blessing Azunwoke
Abstract:
The study focused on probing the effectiveness of online consumer privacy and protection laws, electronic transaction laws, privacy and data protection laws, and cybercrime legislation amid frequent cyber-attacks and malware types worldwide. An empirical analysis was engaged to uncover ties and causations between the stringency and implementation of these legal structures and the prevalence of cyber threats. A deliberate sample of seventy-eight countries (thirteen countries each from six continents) was chosen as sample size to study the challenges linked with trending regulations and possible panoramas for improving cybersecurity through refined legal approaches. Findings establish if the frequency of cyber-attacks and malware types vary significantly. Also, the result proved that various cybercrime laws differ statistically, and electronic transactions law does not statistically impact the frequency of cyber-attacks. The result also statistically revealed that the online Consumer Privacy and Protection law does not influence the total number of cyber-attacks. In addition, the results implied that Privacy and Data Protection laws do not statistically impact the total number of cyber-attacks worldwide. The calculated value also proved that cybercrime law does not statistically impact the total number of cyber-attacks. Finally, the computed value concludes that combined multiple cyber laws do not significantly impact the total number of cyber-attacks worldwide. Suggestions were produced based on findings from the study, contributing to the ongoing debate on the validity of legal approaches in battling cybercrime and shielding consumers in the digital age.Keywords: cybercrime legislation, cyber attacks, consumer privacy and protection law, detection, electronic transaction law, prevention, privacy and data protection law, prohibition, prosecution
Procedia PDF Downloads 452501 Optimizing Nature Protection and Tourism in Urban Parks
Authors: Milena Lakicevic
Abstract:
The paper deals with the problem of optimizing management options for urban parks within different scenarios of nature protection and tourism importance. The procedure is demonstrated on a case study example of urban parks in Novi Sad (Serbia). Six management strategies for the selected area have been processed by the decision support method PROMETHEE. Two criteria used for the evaluation were nature protection and tourism and each of them has been divided into a set of indicators: for nature protection those were biodiversity and preservation of original landscape, while for tourism those were recreation potential, aesthetic values, accessibility and culture features. It was pre-assumed that each indicator in a set is equally important to a corresponding criterion. This way, the research was focused on a sensitivity analysis of criteria weights. In other words, weights of indicators were fixed and weights of criteria altered along the entire scale (from the value of 0 to the value of 1), and the assessment has been performed in two-dimensional surrounding. As a result, one could conclude which management strategy would be the most appropriate along with changing of criteria importance. The final ranking of management alternatives was followed up by investigating the mean PROMETHEE Φ values for all options considered and when altering the importance of nature protection/tourism. This type of analysis enabled detecting an alternative with a solid performance along the entire scale, i.e., regardlessly of criteria importance. That management strategy can be seen as a compromise solution when the weight of criteria is not defined. As a conclusion, it can be said that, in some cases, instead of having criteria importance fixed it is important to test the outputs depending on the different schemes of criteria weighting. The research demonstrates the state of the final decision when the decision maker can estimate criteria importance, but also in cases when the importance of criteria is not established or known.Keywords: criteria weights, PROMETHEE, sensitivity analysis, urban parks
Procedia PDF Downloads 1882500 Assessing the Adaptive Re-Use Potential of Buildings as Part of the Disaster Management Process
Authors: A. Esra İdemen, Sinan M. Şener, Emrah Acar
Abstract:
The technological paradigm of the disaster management field, especially in the case of governmental intervention strategies, is generally based on rapid and flexible accommodation solutions. From various technical solution patterns used to address the immediate housing needs of disaster victims, the adaptive re-use of existing buildings can be considered to be both low-cost and practical. However, there is a scarcity of analytical methods to screen, select and adapt buildings to help decision makers in cases of emergency. Following an extensive literature review, this paper aims to highlight key points and problem areas associated with the adaptive re-use of buildings within the disaster management context. In other disciplines such as real estate management, the adaptive re-use potential (ARP) of existing buildings is typically based on the prioritization of a set of technical and non-technical criteria which are then weighted to arrive at an economically viable investment decision. After a disaster, however, the assessment of the ARP of buildings requires consideration of different/additional layers of analysis which stem from general disaster management principles and the peculiarities of different types of disasters, as well as of their victims. In this paper, a discussion of the development of an adaptive re-use potential (ARP) assessment model is presented. It is thought that governmental and non-governmental decision makers who are required to take quick decisions to accommodate displaced masses following disasters are likely to benefit from the implementation of such a model.Keywords: adaptive re-use of buildings, disaster management, temporary housing, assessment model
Procedia PDF Downloads 3322499 Understanding Psychological Distress and Protection Issues among Children Associated with Armed Groups
Authors: Grace Onubedo
Abstract:
The primary objective of this research study is to contribute to and deepen the understanding of the realities and conditions for which children recruited by violent extremist organisations in Nigeria live, as well as ascertain the state of their mental health following their reunification with either family or protection workers. The research is intended to contribute to a more focused child protection programming agenda for children associated with armed forces and groups in Nigeria and the wider conflict setting. The extent to which violence has affected the psychological well-being and mental health of children abducted and exposed to activities of Violent Extremist groups remains a largely empirical question. This research attempts to answer the following research questions with the aim of providing further evidences for informed programming: I. What are the demographic characteristics of children associated with armed groups? II. What is the state of their mental health? III. What is the relationship between their background and their mental health?Keywords: counterterrorism, psychosocial support, psychological distress, children, armed groups
Procedia PDF Downloads 1322498 Collective Redress in Consumer Protection in South East Europe: Cross-National Comparisons, Issues of Commonality and Difference
Authors: Veronika Efremova
Abstract:
In recent decades, there have been significant developments in the European Union in the field of collective consumer redress. South East European countries (SEE) covered by this paper, in line with their EU accession priorities and duties under Stabilisation and Association Agreements, have to harmonize their national laws with the relevant EU acquis for consumer protection (Chapter 28: Health and Consumer). In these countries, only minimal compliance is achieved. SEE countries have introduced rudimentary collective redress mechanisms, with modest enforcement of collective redress and case law. This paper is based on comprehensive interdisciplinary research conducted for SEE countries on common principles for injunctive and compensatory collective redress mechanisms, emphasizing cross-national comparisons, underlining issues of commonality and difference aiming to develop recommendations for an adequate enforcement of collective redress. SEE countries are recognized by the sectoral approach for regulating collective redress contrary to the majority of EU Member States with having adopted horizontal approach to collective redress. In most SEE countries, the laws do not recognize compensatory but only injunctive collective redress in consumer protection. All responsible stakeholders for implementation of collective redress in SEE countries, lack information and awareness on collective redress mechanisms and the way they function in practice. Therefore, specific actions are needed in these countries to make the whole system of collective redress for consumer protection operational and efficient. Taking into consideration the various designated stakeholders in collective redress in each SEE countries, there is a need of their mutual coordination and cooperation in order to develop consumer protection system and policies. By putting into practice the national collective redress mechanisms, effective access to justice for all consumers, the principle of rule of law will be secured and appropriate procedural guarantees to avoid abusive litigation will be ensured.Keywords: collective redress mechanism, consumer protection, commonality and difference, South East Europe
Procedia PDF Downloads 2212497 The Economic Impact of State Paid Family Leave and Medical Acts on Working Families with Old and Disabled Adults
Authors: Ngoc Dao
Abstract:
State Paid Leave Programs (PFL) complement the Federal Family and Medical Leave Act (FMLA) by offering workers time off to take care of their newborns or sick family members with supplemental income, and further job protection. Up to date, four states (California, New Jersey, Rhode Island, and New York) implemented paid leave policies. This study adds further understanding of how state PFL policies help working families with elder parents improve their work balance by examining the paid leave policies on labor outcomes. Early findings suggest State Paid Leave Policies reduced the likelihood to exit the labor market by 1.6 percentage points, with larger effects among paid leave policies with job protection feature. In addition, the results imply job protection in paid leave policies matters in helping employed caregivers attach to the labor market.Keywords: family paid leave, working caregivers, employment, social welfare
Procedia PDF Downloads 1322496 Use of Vapor Corrosion Inhibitor for Tank Bottom Protection
Authors: Muhammad Arsalan Khan Sherwani
Abstract:
The use of Volatile Corrosion Inhibitors (VCI) to protect Aboveground Storage Tank (AST) bottom plates against soil-side corrosion is one of the emerging corrosion prevention methods, specifically for tanks constructed on oily sand pad. Oily sand pad and the presence of air gaps underneath the bottom plates lead to severe corrosion and high metal thickness loss. In such cases, the cathodic protection cannot be fully considered as effective due to Cathodic Protection (CP) current shielding. These situations sometimes result in serious failures on multiple fronts, such as; containment losses, system shutdowns, extensive repairs, environmental impact and safety concerns in case of flammable fluids. Recently, East West Pipeline Department (EWPD) of Saudi Aramco has deployed this technology to one of the crude oil storage tanks, which showed high metal thickness loss during its out of service inspection. Soil-side corrosion rustled in major repairs of bottom plates and ultimately caused enormous unplanned activities in term of time as well as cost. This paper mainly focuses on the methodology of VCI installation, corrosion monitoring system and the expected results of protection.Keywords: Vapor Corrosion Inhibitor, Soil Side Corrosion, External Corrosion, Above Grade Storage Tank
Procedia PDF Downloads 752495 Armed Groups and Intra State Conflict: A Study on the Egyptian Case
Authors: Ghzlan Mahmoud Abdel Aziz
Abstract:
This case study aims to identify the intrastate conflicts between the nation state and armed groups. Nowadays, most wars weaken states against armed groups. Thus, it is very important to negotiate with such groups in order to reinforce the law for the protection of victims. These armed groups are the cause of conflicts and they are related with many of humanitarian issues that result out of conflicts. In this age of rivalry; terrorists, insurgents, or transnational criminal parties have surfaced to the top as a reaction to these armed groups in an effort to set up a new world order. Moreover, the intra state conflicts became increasingly treacherous than the interstate conflicts, particularly when nation state systems deal with armed groups which try to influence the state. The unexpected upraising of the Arab Spring during 2011 in parts of the Middle East and North Africa formed various patterns of conflicts. The events of the Arab Spring resulted in current and long term change across the region. Significant modifications in the level, strength and period of armed conflict around the world have been made. Egypt was in the center of these events. It has fought back the armed groups under the name of terrorism and spread common disorder and violence among civilians. On this note, this study focuses on the problem of the transformation in the methods of organized violence within one state rather than between two state or more and analyzes the objectives, strategies, and internal composition of armed groups and the environments that foster them, with a focus on the Egyptian case.Keywords: armed groups, conflicts, Egyptian armed forces, intrastate conflicts
Procedia PDF Downloads 4602494 Deposit Guarantee Fund: One Perspective
Authors: Rute Abreu, Fátima David, Liliane Cristina Segura
Abstract:
The Deposit Guarantee Fund (DGF) and its communication with the Society, in general, and with the deposit client of Financial Institutions, in particular, is discussed through the challenges of the accounting and financial report. The Bank of Portugal promotes the Portuguese Deposit Guarantee Fund (PDGF) as a financial institution that enhanced the market confidence and stability on the deposit-insurance system. Due to the nature of their functions, it must be subject to regulation and supervision that provides a first line of defense against adversely affect confidence on the Portuguese financial market. First, this research provides evidence of the effectiveness of the protection mechanisms on the deposit insurance system, which provides high and equal protection to all stakeholders. Second, it emphasizes the need of requirements of rigorous accounting process and effective financial report to reduce the moral hazard implications. Third, this research focuses on the need of total disclosure of the financial information which gives higher transparency and protection to deposit client of financial institutions.Keywords: deposit guarantee fund, Portugal, accounting, financial report
Procedia PDF Downloads 4382493 The Constraints of Modern Islamic Boarding School's Strategy in Addressing Physical Violence: A Case Study in Indonesia
Authors: Syauqi Asfiya R.
Abstract:
This study examines the constraints faced by Islamic boarding school (Pesantren) in Indonesia in effectively addressing physical violence within their educational institutions. The vulnerability to violence in the education sector remains pervasive, including in Pesantren, primarily due to the residential nature of the boarding school system, which necessitates round-the-clock interaction among students from diverse backgrounds. Additionally, environmental factors, parenting styles, individual characteristics, and media influences further complicate the conditions within Pesantren. Numerous cases of physical violence have been reported, underscoring the need to identify the constraints of violence prevention strategies implemented by Pesantren. Adopting a case study approach, this research focuses on a Modern Pesantren in Tangerang and utilizes interviews conducted with 20 victims of violence to explore the aspects of Pesantren's violence prevention strategies that may have been overlooked. The findings indicate that many students face a dilemma when reporting the violence they experience, as the imposed sanctions often prove excessively severe and carry the risk of exacerbating the violence perpetrated by the offenders. Consequently, numerous victims choose to remain silent, thereby enabling the perpetuation of violence. Moreover, senior students (mudabbir) are prohibited from giving punishment, but there are still many who punish other students based on their personal moods. Furthermore, violence is also perpetrated by religious teachers (ustadz), despite their responsibility for addressing such issues. The evaluation process often follows a unidirectional approach wherein the santri have limited freedom compared to the Mudabbir or ustadz when it comes to providing feedback. Additionally, sentiment within specific student generations is reinforced due to the segregation of dormitories based on cohorts. Lastly, the absence of psychologists to address the trauma experienced by victims further exacerbates the situation. This research sheds light on the constraints faced by Pesantren in effectively preventing physical violence and emphasizes the importance of implementing comprehensive measures to create safer and nurturing learning environments within these institutions.Keywords: physical violence, islam, boarding school, constraint
Procedia PDF Downloads 772492 Proposition on Improving Environmental Forensic System in China
Authors: Huilei Wang, Yuanfeng Wang
Abstract:
In the early period of China, economy developed rapidly at the cost of environment. Recently, it is generally recognized that the heavily polluted environment not only puts a brake on economic development but also paces negative impact on people’ health as well as probably next decades of generations. Accordingly, the latest Environmental Protection Law revised in 2014 makes a clear-cut division of environmental responsibility and regulates stricter penalties of breaching law. As the new environmental law is enforced gradually, environmental forensic is increasingly required in the process of ascertaining facts in judicial proceedings of environmental cases. Based on the outcomes of documentary analysis for all environmental cases judged on the basis of new environmental law, it is concluded that there still exists problems in present system of environmental forensic. Thus, this paper is aimed to make proposition on improving Chinese environmental forensic system, which involves: (i) promoting capability of environmental forensic system (EFS) to handle professional questions; (ii) develop price mechanism; (iii) multi-departments cooperate to establish unifying and complete EFS system;(iv) enhance the probative value of results of EFS. Such protocol for amending present regulation on environmental forensic is of significant importance because a quality report of environmental forensic will contributes to providing strong probative evidence of culprits’ activity of releasing contaminant into environment, degree of damages for victims and above all, causality between the behavior of public nuisance and damages.Keywords: China, environmental cases, environmental forensic system, proposition
Procedia PDF Downloads 3792491 A Group Setting of IED in Microgrid Protection Management System
Authors: Jyh-Cherng Gu, Ming-Ta Yang, Chao-Fong Yan, Hsin-Yung Chung, Yung-Ruei Chang, Yih-Der Lee, Chen-Min Chan, Chia-Hao Hsu
Abstract:
There are a number of distributed generations (DGs) installed in microgrid, which may have diverse path and direction of power flow or fault current. The overcurrent protection scheme for the traditional radial type distribution system will no longer meet the needs of microgrid protection. Integrating the intelligent electronic device (IED) and a supervisory control and data acquisition (SCADA) with IEC 61850 communication protocol, the paper proposes a microgrid protection management system (MPMS) to protect power system from the fault. In the proposed method, the MPMS performs logic programming of each IED to coordinate their tripping sequence. The GOOSE message defined in IEC 61850 is used as the transmission information medium among IEDs. Moreover, to cope with the difference in fault current of microgrid between grid-connected mode and islanded mode, the proposed MPMS applies the group setting feature of IED to protect system and robust adaptability. Once the microgrid topology varies, the MPMS will recalculate the fault current and update the group setting of IED. Provided there is a fault, IEDs will isolate the fault at once. Finally, the Matlab/Simulink and Elipse Power Studio software are used to simulate and demonstrate the feasibility of the proposed method.Keywords: IEC 61850, IED, group Setting, microgrid
Procedia PDF Downloads 4632490 Encounter, Dialogue and Presence in Doris Salcedo's Works
Authors: Wen-Shu Lai, Yi-Ting Wang
Abstract:
The purpose of this paper is to discuss and clarify what are the essences of Colombian-born sculptor Doris Salcedo’s works. Under the frameworks of Buber’s dialogical philosophy of the “I-Thou relation” and Zurmuehlen’s philosophy of “Art as Presence” within the context of art praxis, Salcedo’s selected works are analyzed and interpreted. Salcedo’s sculptures and installations have expressed her concerns of the collective and personal memories within the context of Colombia’s violent, historical and political conflicts, especially the trauma inscribed onto her fellow people. Salcedo tried to rescue that memory though her work does not directly represent the violent incidents happened in Colombia. They are indirect portraits of the disappeared, the victims, and the lack of identity. What the viewers see is something in between vanishing and emergence, personal and collective. The work, the artist and the viewer are witnesses and also survivors of Columbia’s violent incidents. On the site, the work, the disappeared and the witness-survivors encounter each other, then mourning, memory and dialogue are unfolded, brought to present. Firstly, it is the power of encounter that allows the viewer-witness to recognize the effaced victims, repressive violence, and the profound mourning for the loss, then restore their existence through dialogues and bring them to present. In her sculptures and installations, the displacement of the fragments and the incoherent sites make these daily household objects become unfamiliar, arose feelings of uncanniness of the viewer. The feelings of alienation, confusion, displacement bring the viewer to here and now. The more one studies these objects and sites, the more hidden details begin to appear. And the more one looks at the details, the more absent memories or stories reveals themselves and becomes present. Salcedo’s work is about loss, displacement and alienation caused by violence. She expressed that words are no longer possible when one deals with violence. However, her installation translates the violence, memory, and loss of beloved ones into a place of dialogue, in which the visitors can immerse themselves in a twilight zone between knowing and not knowing, remembering and forgetting. The spaces are the sites or non-sites inhabited by the remains or traces of the victims, the wonders of the survivor-witnesses where they join together through encounter, remain present to others through genuine dialogue. In the moment, the past memory and the ongoing life merge, accept each other, and reconcile. Salcedo reconfigures the silent violence and repressive history in Colombia and transforms them into sites and installations. The victims, the viewer and the artist join together while contemplating and sharing the human situation of silent repression. In the moment of contemplating, a dialogue, spoken or not, occurs in the specific sites. People have become aware and present, and mutual understanding has achieved. This research concludes that encounter, presence and dialogue are the three essences embedded in Salcedo’s works.Keywords: dialogue, Doris Salcedo, encounter, presence
Procedia PDF Downloads 3812489 Religion and Sustainable Development: A Comparative Study of Buddhist and Christian Farmers’ Contribution to the Environmental Protection in Taiwan
Authors: Jijimon Alakkalam Joseph
Abstract:
The UN 2030 Agenda for Sustainable Development claims to be a comprehensive and integrated plan of action for prosperity for people and the planet, including almost all dimensions of human existence. Nevertheless, critics have pointed out the exclusion of the religious dimension from development discussions. Care for the earth is one of the vital aspects of sustainable development. Farmers all over the world contribute much to environmental protection. Most farmers are religious believers, and religious ideologies influence their agricultural practices. This nexus between faith and agriculture has forced policymakers to include religion in development discussions. This paper delves deeper into this religion and sustainable development connection. Buddhism and Christianity have contributed much to environmental protection in Taiwan. However, interviews conducted among 40 Taiwanese farmers (10 male and female farmers from Buddhism and Christianity) show that their faith experiences make them relate to the natural environment differently. Most of the Buddhist farmers interviewed admitted that they chose their religious adherence, while most of the Christian farmers inherited their faith. The in-depth analysis of the interview data collected underlines the close relationship between religion and sustainable development. More importantly, concerning their intention to care for the earth, farmers whose religious adherence is ‘chosen’ are self-motivated and more robust compared to those whose religious adherence is ‘inherited’.Keywords: Buddhism, Christianity, environmental protection, sustainable development
Procedia PDF Downloads 862488 Assessment the Capacity of Retention of a Natural Material for the Protection of Ground Water
Authors: Hakim Aguedal, Abdelkader Iddou, Abdalla Aziz, Abdelhadi Bentouami, Ferhat Bensalah, Salah Bensadek
Abstract:
The major environmental risk of soil pollution is the contamination of groundwater by infiltration of organic and inorganic pollutants that can cause a serious pollution. To prevent the migration of this pollution through this structure, many studies propose the installation of layers, which play a role of a barrier that inhibiting the contamination of groundwater by limiting or slowing the flow of rainwater carrying pollution through the layers of soil. However, it is practically impossible to build a barrier layer that let through only water, but it is possible to design a structure with low permeability, which reduces the infiltration of dangerous pollutant. In an environmental context of groundwater protection, the main objective of this study was to investigate the environmental and appropriate suitability method to preserve groundwater, by establishment of a permeable reactive barrier (PRB) intermediate in soil. Followed the influence of several parameters allow us to find the most effective materials and the most appropriate way to incorporate this barrier in the soil.Keywords: Ground water, protection, permeable reactive Barrier, soil pollution.
Procedia PDF Downloads 5572487 Vr-GIS and Ar-GIS In Education: A Case Study
Authors: Ilario Gabriele Gerloni, Vincenza Carchiolo, Alessandro Longheu, Ugo Becciani, Eva Sciacca, Fabio Vitello
Abstract:
ICT tools and platforms endorse more and more educational process. Many models and techniques for people to be educated and trained about specific topics and skills do exist, as classroom lectures with textbooks, computers, handheld devices and others. The choice to what extent ICT is applied within learning contexts is related to personal access to technologies as well as to the infrastructure surrounding environment. Among recent techniques, the adoption of Virtual Reality (VR) and Augmented Reality (AR) provides significant impulse in fully engaging users senses. In this paper, an application of AR/VR within Geographic Information Systems (GIS) context is presented. It aims to provide immersive environment experiences for educational and training purposes (e.g. for civil protection personnel), useful especially for situations where real scenarios are not easily accessible by humans. First acknowledgments are promising for building an effective tool that helps civil protection personnel training with risk reduction.Keywords: education, virtual reality, augmented reality, GIS, civil protection
Procedia PDF Downloads 1782486 A Comparative and Doctrinal Analysis towards the Investigation of a Right to Be Forgotten in Hong Kong
Authors: Jojo Y. C. Mo
Abstract:
Memories are good. They remind us of people, places and experiences that we cherish. But memories cannot be changed and there may well be memories that we do not want to remember. This is particularly true in relation to information which causes us embarrassment and humiliation or simply because it is private – we all want to erase or delete such information. This desire to delete is recently recognised by the Court of Justice of the European Union in the 2014 case of Google Spain SL, Google Inc. v Agencia Española de Protección de Datos, Mario Costeja González in which the court ordered Google to remove links to some information about the complainant which he wished to be removed. This so-called ‘right to be forgotten’ received serious attention and significantly, the European Council and the European Parliament enacted the General Data Protection Regulation (GDPR) to provide a more structured and normative framework for implementation of right to be forgotten across the EU. This development in data protection laws will, undoubtedly, have significant impact on companies and co-operations not just within the EU but outside as well. Hong Kong, being one of the world’s leading financial and commercial center as well as one of the first jurisdictions in Asia to implement a comprehensive piece of data protection legislation, is therefore a jurisdiction that is worth looking into. This article/project aims to investigate the following: a) whether there is a right to be forgotten under the existing Hong Kong data protection legislation b) if not, whether such a provision is necessary and why. This article utilises a comparative methodology based on a study of primary and secondary resources, including scholarly articles, government and law commission reports and working papers and relevant international treaties, constitutional documents, case law and legislation. The author will primarily engage literature and case-law review as well as comparative and doctrinal analyses. The completion of this article will provide privacy researchers with more concrete principles and data to conduct further research on privacy and data protection in Hong Kong and internationally and will provide a basis for policy makers in assessing the rationale and need for a right to be forgotten in Hong Kong.Keywords: privacy, right to be forgotten, data protection, Hong Kong
Procedia PDF Downloads 1912485 Expand Rabies Post-Exposure Prophylaxis to Where It Is Needed the Most
Authors: Henry Wilde, Thiravat Hemachudha
Abstract:
Human rabies deaths are underreported worldwide at 55,000 annual cases; more than of dengue and Japanese encephalitis. Almost half are children. A recent study from the Philippines of nearly 2,000 rabies deaths revealed that none of had received incomplete or no post exposure prophylaxis. Coming from a canine rabies endemic country, this is not unique. There are two major barriers to reducing human rabies deaths: 1) the large number of unvaccinated dogs and 2) post-exposure prophylaxis (PEP) that is not available, incomplete, not affordable, or not within reach for bite victims travel means. Only the first barrier, inadequate vaccination of dogs, is now being seriously addressed. It is also often not done effectively or sustainably. Rabies PEP has evolved as a complex, prolonged process, usually delegated to centers in larger cities. It is virtually unavailable in villages or small communities where most dog bites occur, victims are poor and usually unable to travel a long distance multiple times to receive PEP. Reseacrh that led to better understanding of the pathophysiology of rabies and immune responses to potent vaccines and immunoglobulin have allowed shortening and making PEP more evidence based. This knowledge needs to be adopted and applied so that PEP can be rendered safely and affordably where needed the most: by village health care workers who have long performed more complex services after appropriate training. Recent research makes this an important and long neglected goal that is now within our means to implement.Keywords: rabies, post-exposure prophylaxis, availability, immunoglobulin
Procedia PDF Downloads 2642484 Domestic Violence against Rural Women in Haryana State of India
Authors: Jatesh Kathpalia, Subhash Chander
Abstract:
Violence against women has spread into a global epidemic. This has debilitating effect over the performance of women. Due to deep-rooted values, traditional Indian culture women fear the consequences of reporting violence and declare an unwillingness to subject themselves to the shame of being identified as battered women. Main interest was to study types of domestic violence which women face and to encourage them to report the matter. The study involved understanding the nature, extent and types of domestic violence. Two hundred rural women respondents were selected at random, interview schedule was prepared, and victims afflicted with domestic violence were identified. Data were collected and analyzed for different forms of domestic violence faced by women. 60% of the respondents faced domestic violence in different forms. Out of 120 women who were affected, 92.5% faced emotional, 90.8% faced verbal, 49.1% faced economic and 58.3% faced physical violence. 45.0% faced violence within three months of the marriage. Out of these, only 6.6% reported the violence to the police. Frequently faced forms of violence were slapping (27.1%), beating (24.3%) and starvation (25.7%). Number of women who were not allowed to spend money of their own stood at 30.5%. About 50% victims of emotional violence were facing constant criticism by their in-laws. Significant association was found between age, education and socio-economic status of the respondents and domestic violence. Rural women in Haryana face grave problem of domestic violence which need to be curbed for improving condition of women in society.Keywords: domestic violence against women, economic, emotional, physical and verbal violence, marriage, rural women
Procedia PDF Downloads 3902483 “Protection” or “Destruction”: Taking the Cultural Heritage Protection of the Grand Canal in Huaxian and Xunxian Sections of Henan Province as Example
Abstract:
The Grand Canal of China has been in use for more than two thousand years. It runs through the central and eastern regions of China and communicates with the five major river systems of Haihe River, Yellow River, Huaihe River, Yangtze River and Qiantang River from north to south. It is a complex, systematic and comprehensive water conservancy project in the period of agricultural civilization and includes the three parts of the Beijing-Hangzhou Canal, the Sui and Tang Dynasties Canal and the Eastern Zhejiang Canal. It covers eight provinces and cities including Beijing, Tianjin, Hebei, Shandong, Jiangsu, Zhejiang, Henan and Anhui. The Grand Canal is an important channel connecting the Central Plains and the Beijing-Hangzhou Canal, and it is also an important waterway trade channel. Nowadays, although the Grand Canal no longer bears the burden of communicating water transportation between the north and the south, the site of the Grand Canal is still a “historical museum” of the lifestyle of people who lived on the canal from the Ming and Qing Dynasties to the Republic of China. By means of literature reading and field investigation, this paper compares the different protection strategies of the Grand Canal in the region between the ancient villages of Huaxian and Xunxian, which witness the vicissitudes of canal water transport, to explore whether the protective renovation of historical and cultural routes is “protection” or “destruction”, and puts forward some protection suggestions.Keywords: The Grand Canal, heritage conservation, cultural route, ancient villages, strategies
Procedia PDF Downloads 1532482 A Theoretical Study of Multi-Leaf Spring in Seismic Response Control
Authors: M. Ezati Kooshki , H. Pourmohamad
Abstract:
Leaf spring dampers are used for commercial vehicles and heavy tracks. The main function of this damper in these vehicles is protection against damage and providing comfort for drivers by creating suspension between road and vehicle. This paper presents a new device, circular leaf spring damper, which is frequently used on vehicles, aiming to gain seismic protection of structures. Finite element analyses were conducted on several one-story structures using finite element software (Abaqus, v6.10-1). The time history analysis was conducted on the records of Kobe (1995) and San Fernando (1971) ground motions to demonstrate the advantages of using leaf spring in structures as compared to simple bracing system. This paper also suggests extending the use of this damper in structures, considering its large control force despite high cycle fatigue properties and low prices.Keywords: bracing system, finite element analysis, leaf spring, seismic protection, time history analysis
Procedia PDF Downloads 4072481 Packaging Processes for the Implantable Medical Microelectronics
Authors: Chung-Yu Wu, Chia-Chi Chang, Wei-Ming Chen, Pu-Wei Wu, Shih-Fan Chen, Po-Chun Chen
Abstract:
Electrostimulation medical devices for neural diseases require electroactive and biocompatible materials to transmit signals from electrodes to targeting tissues. Protection of surrounding tissues has become a great challenge for long-term implants. In this study, we designed back-end processes with compatible, efficient, and reliable advantages over the current state-of-the-art. We explored a hermetic packaging process with high quality of adhesion and uniformity as the biocompatible devices for long-term implantation. This approach is able to provide both excellent biocompatibility and protection to the biomedical electronic devices by performing conformal coating of biocompatible materials. We successfully developed a packaging process that is capable of exposing the stimulating electrode and cover all other faces of chip with high quality of protection to prevent leakage of devices and body fluid.Keywords: biocompatible package, medical microelectronics, surface coating, long-term implantation
Procedia PDF Downloads 5252480 A Loop between Victimhood and Women with Choice: Case of Trafficked North Korean Women in China
Authors: Jinah Kwon
Abstract:
Why are there North Korean women who prefer their life in China, living as an undocumented migrant, to legal residence in South Korea? What is the line between choice and coercion in trafficking and how does it relate to family, especially in Asian culture? Is family function as a haven in the unsecured world or a fetter against the better world? Are the current international mechanisms on trafficked victims fully reflecting the voices of the victims? This study is about the paradoxical conditions of North Korean women situated in China as the trafficked victim and as members of their Chinese family. In order to answer the questions above, this study explored the case of trafficked North Korean women in China. This mixed-methods study employed in-depth interviews of 18 trafficked women living in China and a survey of 98 North Korean origin women residing in South Korea. From the survey, 40 out of 98 women from the survey indicated an unexpected function of trafficking, which was used as a channel of supporting the subjectivity of women in the North Korean context. Such results supported the actual observation and narratives of North Korean women who experienced trafficking from the author’s two visits to the Northeastern area of China in 2012 and 2018, respectively. Based on the findings, the last part of the study makes policy implications on international trafficking mechanisms—theories by Gayatri Spivak and Herbert A. Simon was employed to approach the relatively less dealt aspect of trafficking.Keywords: China, North Korean women, trafficking, victimhood
Procedia PDF Downloads 1922479 Arc Flash Analysis: Technique to Mitigate Fire Incidents in Substations
Authors: M. H. Saeed, M. Rasool, M. A. Jawed
Abstract:
Arc Flash Analysis has been a subject of great interest since the electrical fire incidents have been reduced to a great extent after the implementation of arc flash study at different sites. An Arc flash in substations is caused by short circuits over the air or other melted conductors and small shrapnel. Arc flash incidents result in the majority of deaths in substations worldwide. Engro Fertilizers Limited (EFERT) site having a mix of vintage non-internal arc rated and modern arc rated switchgears, carried out an arc flash study of the whole site in accordance with NFPA70E standard. The results not only included optimizing site protection coordination settings but also included marking of Shock and Arc flash protection boundaries in all switchgear rooms. Work permit procedures upgradation is also done in accordance with this study to ensure proper arc rated PPEs and arc flash boundaries protocols are fully observed and followed. With the new safety, protocols working on electrical equipment will be much safer than ever before.Keywords: Arc flash, non-internal arc rated, protection coordination, shock boundary
Procedia PDF Downloads 1792478 Unequal Error Protection of VQ Image Transmission System
Authors: Khelifi Mustapha, A. Moulay lakhdar, I. Elawady
Abstract:
We will study the unequal error protection for VQ image. We have used the Reed Solomon (RS) Codes as Channel coding because they offer better performance in terms of channel error correction over a binary output channel. One such channel (binary input and output) should be considered if it is the case of the application layer, because it includes all the features of the layers located below and on the what it is usually not feasible to make changes.Keywords: vector quantization, channel error correction, Reed-Solomon channel coding, application
Procedia PDF Downloads 3652477 People’s Perception towards the ASEAN Economic Community (AEC)
Authors: Nopadol Burananuth
Abstract:
The purposes of this research paper were to study the relationship between the economic factor and political factor, the relationship between political and economic factor and social factor, and the effects of economic factor, political factor, and social factor to the people’s perception about ASEAN Economic Community (AEC). A total of 400 samples were selected from four sub-districts from Arunyaprathet District, Srakaow Province. Data analysis method included multiple regression analysis. The findings revealed that political factor depended on trade cooperation, transportation cooperation, and communication cooperation. Social factor was depended on disaster protection, terrorism protection, and international relations. In addition, the people’s perception of the AEC depended on disaster perception, terrorism protection, international relations, transportation cooperation, communication cooperation, interdependence, and labor movement.Keywords: economic factors, perception, political factors, social factors
Procedia PDF Downloads 5912476 Microbial Deterioration of Some Different Archaeological Objects Made from Cellulose by Bacillus Group
Authors: Mohammad Abdel Fattah Mohammad Kewisha
Abstract:
Microbial deterioration of ancient materials became one of the biggest problems facing the workers in the field of cultural heritage protection because the microbial deterioration of artifacts causes detrimental effects on the aesthetic value of the monuments due to colonization, whether they are made of inorganic materials such as stone or organic like wood, textiles, wall paintings, and paper. So, the early identification of the bacterial strains that caused deterioration is the most important point for the protection of monument objects. The present study focuses on the Bacillus spp. group, which was isolated from some biodeterioration monuments from different areas of Egypt. The investigated objects in this study were made from organic materials (cellulose), paper, textile, and wood. Isolated strains were identified up to the species level biochemically. Eleven bacterial isolates were obtained from collected samples. They were taken from different archaeological objects, four microbicides, cetrimonium bromide, sodium azide, tetraethyl ammonium bromide, and dichloroxylenol, at various concentrations ranging from 25 ppm to 500 ppm. They were screened for their antibacterial activity against the Bacillus spp. isolates, and detection of Minimum inhibitory concentration (MIC). It was also necessary to indicate the ideal Minimum inhibitory concentration for each strain for the purpose of biotreatment of the infected monuments with less damaging effect on monument materials.Keywords: microbial deterioration, ancient materials, heritage protection, protection of monuments, biodeteriorative monuments
Procedia PDF Downloads 602475 Ontology-Driven Generation of Radiation Protection Procedures
Authors: Chamseddine Barki, Salam Labidi, Hanen Boussi Rahmouni
Abstract:
In this article, we present the principle and suitable methodology for the design of a medical ontology that highlights the radiological and dosimetric knowledge, applied in diagnostic radiology and radiation-therapy. Our ontology, which we named «Onto.Rap», is the subject of radiation protection in medical and radiology centers by providing a standardized regulatory oversight. Thanks to its added values of knowledge-sharing, reuse and the ease of maintenance, this ontology tends to solve many problems. Of which we name the confusion between radiological procedures a practitioner might face while performing a patient radiological exam. Adding to it, the difficulties they might have in interpreting applicable patient radioprotection standards. Here, the ontology, thanks to its concepts simplification and expressiveness capabilities, can ensure an efficient classification of radiological procedures. It also provides an explicit representation of the relations between the different components of the studied concept. In fact, an ontology based-radioprotection expert system, when used in radiological center, could implement systematic radioprotection best practices during patient exam and a regulatory compliance service auditing afterwards.Keywords: knowledge, ontology, radiation protection, radiology
Procedia PDF Downloads 3152474 R-Killer: An Email-Based Ransomware Protection Tool
Authors: B. Lokuketagoda, M. Weerakoon, U. Madushan, A. N. Senaratne, K. Y. Abeywardena
Abstract:
Ransomware has become a common threat in past few years and the recent threat reports show an increase of growth in Ransomware infections. Researchers have identified different variants of Ransomware families since 2015. Lack of knowledge of the user about the threat is a major concern. Ransomware detection methodologies are still growing through the industry. Email is the easiest method to send Ransomware to its victims. Uninformed users tend to click on links and attachments without much consideration assuming the emails are genuine. As a solution to this in this paper R-Killer Ransomware detection tool is introduced. Tool can be integrated with existing email services. The core detection Engine (CDE) discussed in the paper focuses on separating suspicious samples from emails and handling them until a decision is made regarding the suspicious mail. It has the capability of preventing execution of identified ransomware processes. On the other hand, Sandboxing and URL analyzing system has the capability of communication with public threat intelligence services to gather known threat intelligence. The R-Killer has its own mechanism developed in its Proactive Monitoring System (PMS) which can monitor the processes created by downloaded email attachments and identify potential Ransomware activities. R-killer is capable of gathering threat intelligence without exposing the user’s data to public threat intelligence services, hence protecting the confidentiality of user data.Keywords: ransomware, deep learning, recurrent neural networks, email, core detection engine
Procedia PDF Downloads 216