Search results for: Egypt’s Civil Code
2450 Central American Security Issue: Civil War Legacy and Contemporary Challenges
Authors: Olga Andrianova, Lazar Jeifets
Abstract:
The security issue has always been one of the most sensitive and significant in Latin American context, especially focused on Central American region. Despite the fact that the time of the civil wars has ended, violence, delinquency, insecurity, discrimination still exist and keep relevance in the 21st century. This article is dedicated to consider this kind of problems, to find out the main causes and to propose solution approaches.Keywords: Central America, insecurity, instability, post-war countries, violence
Procedia PDF Downloads 4732449 Impact of Climate Change on Some Physiological Parameters of Cyclic Female Egyptian Buffalo
Authors: Nabil Abu-Heakal, Ismail Abo-Ghanema, Basma Hamed Merghani
Abstract:
The aim of this investigation is to study the effect of seasonal variations in Egypt on hematological parameters, reproductive and metabolic hormones of Egyptian buffalo-cows. This study lasted one year extending from December 2009 to November 2010 and was conducted on sixty buffalo-cows. Group of 5 buffalo-cows at estrus phase were selected monthly. Then, after blood sampling through tail vein puncture in the 2nd day after natural service, they were divided in two samples: one with anticoagulant for hematological analysis and the other without anticoagulant for serum separation. Results of this investigation revealed that the highest atmospheric temperature was in hot summer 32.61±1.12°C versus 26.18±1.67°C in spring and 19.92±0.70°C in winter season, while the highest relative humidity % was in winter season 43.50±1.60% versus 32.50±2.29% in summer season. The rise in temperature-humidity index from 63.73±1.29 in winter to 78.53±1.58 in summer indicates severe heat stress which is associated with significant reduction in total red blood cell count (3.20±0.15×106), hemoglobin concentration (8.83±0.43 g/dl), packed cell volume (30.73±0.12%), lymphocytes % (40.66±2.33 %), serum progesterone hormone concentration (0.56±0.03 ng/mll), estradiol17-B concentration (16.8±0.64 ng/ml), triiodothyronin (T3) concentration (2.33±0.33 ng/ml) and thyroxin hormone (T4) concentration (21.66±1.66 ng/ml), while hot summer resulted in significant increase in mean cell volume (96.55±2.25 fl), mean cell hemoglobin (30.81±1.33 pg), total white blood cell count (10.63±0.97×103), neutrophils % (49.66±2.33%), serum prolactin hormone (PRL) concentration (23.45±1.72 ng/ml) and cortisol hormone concentration (4.47±0.33 ng/ml) compared to winter season. There was no significant seasonal variation in mean cell hemoglobin concentration (MCHC). It was concluded that in Egypt there was a seasonal variation in atmospheric temperature, relative humidity, temperature humidity index (THI) and the rise in THI above the upper critical level (72 units), which, for lactating buffalo-cows in Egypt is the major constraint on buffalo-cows' hematological parameters and hormonal secretion that affects animal reproduction. Hence, we should improve climatic conditions inside the dairy farm to eliminate or reduce summer infertility.Keywords: buffalo, climate change, Egypt, physiological parameters
Procedia PDF Downloads 6602448 The Jurisprudential Evolution of Corruption Offenses in Spain: Before and after the Economic Crisis
Authors: Marta Fernandez Cabrera
Abstract:
The period of economic boom generated by the housing bubble created a climate of social indifference to the problem of corruption. This resulted in the persecution and conviction for these criminal offenses being low. After the economic recession, social awareness about the problem of corruption has increased. This has led to the Spanish citizenship requiring the public authorities to try to end the problem in the most effective way possible. In order to respond to the continuous social demands that require an exemplary punishment, the legislator has made changes in crimes against the public administration in the Spanish Criminal Code. However, from the point of view of criminal law, the social change has not served to modify only the law, but also the jurisprudence. After the recession, judges are punishing more severely these conducts than in the past. Before the crisis, it was usual for criminal judges to divert relevant behavior to other areas of the legal system such as administrative law and acquit in the criminal field. Criminal judges have considered that administrative law already has mechanisms that can effectively deal with this type of behavior in order to respect the principle of subsidiarity or ultima ratio. It has also been usual for criminal judges to acquit civil servants due to the absence of requirements unrelated to the applicable offense. For example, they have required an economic damage to the public administration when the offense in the criminal code does not require it. Nevertheless, for some years, these arguments have either partially disappeared or considerably transformed. Since 2010, a jurisprudential stream has been consolidated that aims to provide a more severe response to corruption than it had received until now. This change of opinion, together with greater prosecution of these behaviors by judges and prosecutors, has led to a significant increase in the number of individuals convicted of corruption crimes. This paper has two objectives. The first one is to show that even though judges apply the law impartially, they are flexible to social changes. The second one is to identify the erroneous arguments the courts have used up until now. To carry out the present paper, it has been done a detailed analysis of the judgments of the supreme court before and after the year 2010. Therefore, the jurisprudential analysis is complemented with the statistical data on corruption available.Keywords: corruption, public administration, social perception, ultima ratio principle
Procedia PDF Downloads 1462447 Development of a Context Specific Planning Model for Achieving a Sustainable Urban City
Authors: Jothilakshmy Nagammal
Abstract:
This research paper deals with the different case studies, where the Form-Based Codes are adopted in general and the different implementation methods in particular are discussed to develop a method for formulating a new planning model. The organizing principle of the Form-Based Codes, the transect is used to zone the city into various context specific transects. An approach is adopted to develop the new planning model, city Specific Planning Model (CSPM), as a tool to achieve sustainability for any city in general. A case study comparison method in terms of the planning tools used, the code process adopted and the various control regulations implemented in thirty two different cities are done. The analysis shows that there are a variety of ways to implement form-based zoning concepts: Specific plans, a parallel or optional form-based code, transect-based code /smart code, required form-based standards or design guidelines. The case studies describe the positive and negative results from based zoning, Where it is implemented. From the different case studies on the method of the FBC, it is understood that the scale for formulating the Form-Based Code varies from parts of the city to the whole city. The regulating plan is prepared with the organizing principle as the transect in most of the cases. The various implementation methods adopted in these case studies for the formulation of Form-Based Codes are special districts like the Transit Oriented Development (TOD), traditional Neighbourhood Development (TND), specific plan and Street based. The implementation methods vary from mandatory, integrated and floating. To attain sustainability the research takes the approach of developing a regulating plan, using the transect as the organizing principle for the entire area of the city in general in formulating the Form-Based Codes for the selected Special Districts in the study area in specific, street based. Planning is most powerful when it is embedded in the broader context of systemic change and improvement. Systemic is best thought of as holistic, contextualized and stake holder-owned, While systematic can be thought of more as linear, generalisable, and typically top-down or expert driven. The systemic approach is a process that is based on the system theory and system design principles, which are too often ill understood by the general population and policy makers. The system theory embraces the importance of a global perspective, multiple components, interdependencies and interconnections in any system. In addition, the recognition that a change in one part of a system necessarily alters the rest of the system is a cornerstone of the system theory. The proposed regulating plan taking the transect as an organizing principle and Form-Based Codes to achieve sustainability of the city has to be a hybrid code, which is to be integrated within the existing system - A Systemic Approach with a Systematic Process. This approach of introducing a few form based zones into a conventional code could be effective in the phased replacement of an existing code. It could also be an effective way of responding to the near-term pressure of physical change in “sensitive” areas of the community. With this approach and method the new Context Specific Planning Model is created towards achieving sustainability is explained in detail this research paper.Keywords: context based planning model, form based code, transect, systemic approach
Procedia PDF Downloads 3352446 Central American Security Issue: Civil Wars Legacy and Contemporary Challenges
Authors: Olga Andrianova, Lazar Jeifets
Abstract:
The security issue has always been one of the most sensitive and significant in Latin American context, especially focused on Central American region. Despite the fact that the time of the civil wars has ended, violence, delinquency, insecurity, discrimination still exist and keep relevance in the 21st century. This article is dedicated to consider this kind of problems, to find out the main causes and to propose solution approaches.Keywords: Central America, insecurity, instability, violence
Procedia PDF Downloads 3952445 Calculation of Secondary Neutron Dose Equivalent in Proton Therapy of Thyroid Gland Using FLUKA Code
Authors: M. R. Akbari, M. Sadeghi, R. Faghihi, M. A. Mosleh-Shirazi, A. R. Khorrami-Moghadam
Abstract:
Proton radiotherapy (PRT) is becoming an established treatment modality for cancer. The localized tumors, the same as undifferentiated thyroid tumors are insufficiently handled by conventional radiotherapy, while protons would propose the prospect of increasing the tumor dose without exceeding the tolerance of the surrounding healthy tissues. In spite of relatively high advantages in giving localized radiation dose to the tumor region, in proton therapy, secondary neutron production can have significant contribution on integral dose and lessen advantages of this modality contrast to conventional radiotherapy techniques. Furthermore, neutrons have high quality factor, therefore, even a small physical dose can cause considerable biological effects. Measuring of this neutron dose is a very critical step in prediction of secondary cancer incidence. It has been found that FLUKA Monte Carlo code simulations have been used to evaluate dose due to secondaries in proton therapy. In this study, first, by validating simulated proton beam range in water phantom with CSDA range from NIST for the studied proton energy range (34-54 MeV), a proton therapy in thyroid gland cancer was simulated using FLUKA code. Secondary neutron dose equivalent of some organs and tissues after the target volume caused by 34 and 54 MeV proton interactions were calculated in order to evaluate secondary cancer incidence. A multilayer cylindrical neck phantom considering all the layers of neck tissues and a proton beam impinging normally on the phantom were also simulated. Trachea (accompanied by Larynx) had the greatest dose equivalent (1.24×10-1 and 1.45 pSv per primary 34 and 54 MeV protons, respectively) among the simulated tissues after the target volume in the neck region.Keywords: FLUKA code, neutron dose equivalent, proton therapy, thyroid gland
Procedia PDF Downloads 4252444 Application of Numerical Modeling and Field Investigations for Groundwater Recharge Characterization at Abydos Archeological Site, Sohag, Egypt
Authors: Sherif A. Abu El-Magd, Ahmed M. Sefelnasr, Ahmed M. Masoud
Abstract:
Groundwater modeling is the way and tool for assessing and managing groundwater resources efficiently. The present work was carried out in the ancient Egyptian archeological site (Abydos) fromDynastyIandII.Theareaislocated about 13km west of the River Nilecourse, Upper Egypt. The main problem in this context is that the ground water level rise threatens and damages fragile carvings and paintings of the ancient buildings. The main objective of the present work is to identify the sources of the groundwater recharge in the site, further more, equally important there is to control the ground water level rise. Numerical modeling combined with field water level measurements was implemented to understand the ground water recharge sources. However, building a conceptual model was an important step in the groundwater modeling to phase to satisfy the modeling objectives. Therefore, boreholes, crosssections, and a high-resolution digital elevation model were used to construct the conceptual model. To understand the hydrological system in the site, the model was run under both steady state and transient conditions. Then, the model was calibrated agains the observation of the water level measurements. Finally, the results based on the modeling indicated that the groundwater recharge is originating from an indirect flow path mainly from the southeast. Besides, there is a hydraulic connection between the surface water and groundwater in the study site. The decision-makers and archeologyists could consider the present work to understand the behavior of groundwater recharge and water table level rise.Keywords: numerical modeling, archeological site, groundwater recharge, egypt
Procedia PDF Downloads 1232443 Patient-Friendly Hand Gesture Recognition Using AI
Authors: K. Prabhu, K. Dinesh, M. Ranjani, M. Suhitha
Abstract:
During the tough times of covid, those people who were hospitalized found it difficult to always convey what they wanted to or needed to the attendee. Sometimes the attendees might also not be there. In that case, the patients can use simple hand gestures to control electrical appliances (like its set it for a zero watts bulb)and three other gestures for voice note intimation. In this AI-based hand recognition project, NodeMCU is used for the control action of the relay, and it is connected to the firebase for storing the value in the cloud and is interfaced with the python code via raspberry pi. For three hand gestures, a voice clip is added for intimation to the attendee. This is done with the help of Google’s text to speech and the inbuilt audio file option in the raspberry pi 4. All the five gestures will be detected when shown with their hands via the webcam, which is placed for gesture detection. The personal computer is used for displaying the gestures and for running the code in the raspberry pi imager.Keywords: nodeMCU, AI technology, gesture, patient
Procedia PDF Downloads 1662442 A Comparison between Modelled and Actual Thermal Performance of Load Bearing Rammed Earth Walls in Egypt
Authors: H. Hafez, A. Mekkawy, R. Rostom
Abstract:
Around 10% of the world’s CO₂ emissions could be attributed to the operational energy of buildings; that is why more research is directed towards the use of rammed earth walls which is claimed to have enhanced thermal properties compared to conventional building materials. The objective of this paper is to outline how the thermal performance of rammed earth walls compares to conventional reinforced concrete skeleton and red brick in-fill walls. For this sake, the indoor temperature and relative humidity of a classroom built with rammed earth walls and a vaulted red brick roof in the area of Behbeit, Giza, Egypt were measured hourly over 6 months using smart sensors. These parameters for the rammed earth walls were later also compared against the values obtained using a 'DesignBuilder v5' model to verify the model assumptions. The thermal insulation of rammed earth walls was found to be 30% better than this of the redbrick infill, and the recorded data were found to be almost 90% similar to the modelled values.Keywords: rammed earth, thermal insulation, indoor air quality, design builder
Procedia PDF Downloads 1462441 Present and Future Climate Extreme Indices over Sinai Peninsula, Egypt
Authors: Mahmoud Roushdi, Hany Mostafa, Khaled Kheireldin
Abstract:
Sinai Peninsula and Suez Canal Corridor are promising and important economic regions in Egypt due to the unique location and development opportunities. Thus, the climate change impacts should be assessed over the mentioned area. Accordingly, this paper aims to assess the climate extreme indices in through the last 35 year over Sinai Peninsula and Suez Canal Corridor in addition to predict the climate extreme indices up to 2100. Present and future climate indices were analyzed with using different RCP scenarios 4.5 and 8.5 from 2010 until 2100 for Sinai Peninsula and Suez Canal Corridor. Furthermore, both CanESM and HadGEM2 global circulation models were used. The results indicate that the number of summer days is predicted to increase, on the other hand the frost days is predicted to decrease. Moreover, it is noted a slight positive trend for the percentile of wet and extremely days R95p and R99p for RCP4.5 and negative trend for RCP8.5.Keywords: climate change, extreme indices, RCP, Sinai Peninsula
Procedia PDF Downloads 4362440 Dynamic Modeling of Orthotropic Cracked Materials by X-FEM
Authors: S. Houcine Habib, B. Elkhalil Hachi, Mohamed Guesmi, Mohamed Haboussi
Abstract:
In this paper, dynamic fracture behaviors of cracked orthotropic structure are modeled using extended finite element method (X-FEM). In this approach, the finite element method model is first created and then enriched by special orthotropic crack tip enrichments and Heaviside functions in the framework of partition of unity. The mixed mode stress intensity factor (SIF) is computed using the interaction integral technique based on J-integral in order to predict cracking behavior of the structure. The developments of these procedures are programmed and introduced in a self-software platform code. To assess the accuracy of the developed code, results obtained by the proposed method are compared with those of literature.Keywords: X-FEM, composites, stress intensity factor, crack, dynamic orthotropic behavior
Procedia PDF Downloads 5692439 Taphonomy and Paleoecology of Cenomanian Oysters (Mollusca: Bivalvia) from Egypt
Authors: Ahmed El-Sabbagh, Heba Mansour, Magdy El-Hedeny
Abstract:
This study provided a taphonomic alteration and paleoecology of Cenomanian oysters from the Musabaa Salama area, south western Sinai, Egypt. Three oyster zones can be recognized in the studied area, a lower one of Amphidonte (Ceratostreon) flabellatum (lower-middle Cenomanian), a middle zone of Ilymatogyra (Afrogyra) africana (upper Cenomanian) and an upper one of Exogyra (Costagyra) olisiponensis (upper Cenomanian). Taphonomic features including disarticulation, fragmentation, encrustation and bioerosion were subjected to multivariate statistical analyses. The analyses showed that the distributions of the identified ichnospecies were greatly similar within the identified oyster zones in the Musabaa Salama section. With rare exceptions, Entobia cretacea, Gastrochaenolites torpedo and Maeandropolydora decipiens are considered as common to abundant ichnospecies within the three recorded oyster zones. In contrast, and with some exceptions, E. ovula, E. retiformis and Rogerella pattei are considered as frequent to common ichnospecies within the identified oyster zones. Other ichnospecies, including Caulostrepsis cretacea, G. orbicularis, Trypanites solitarius, E. geometrica and C. taeniola, are mostly recorded in rare to frequent occurrences. Careful investigation of these host shells and the preserved encrusters and/or bioerosion sculptures provided data concerning: 1) the substrate characteristics, 2) time of encrustation and bioerosion, 3) rate of sedimentation, 4) the planktonic productivity level, and 5) the general bathymetry and the rate of transgression across the substrate.Keywords: oysters, Cenomanian, taphonomy, palaeoecology, Sinai, Egypt
Procedia PDF Downloads 3092438 Turkey’s Ideological and Identity Politics towards Iran in the Arab Uprising: The Case of Syrian Civil War
Authors: Cangul Altundas Akcay
Abstract:
With the beginning of the mass movement called as the Arab Uprising, Middle Eastern politics has demonstrated an influential shift which has been threatening the existence of the ruling regimes. In this environment, in particular, regional powers have desired to control regional politics, and to expand their regional influence. Bearing that in mind, Turkey and Iran, two significant regional powers, have engaged in competition so as to affect the shifted regional geopolitics. In this context, this paper aims to investigate how regional powers, especially non-Arab ones, have viewed each other in the Arab Uprising, whereby focusing on Turkish perspectives towards Iran. In other words, it will shed light on how Turkey has conducted foreign policy towards Iran during the Arab Uprising. To analyse this, Turkey’s ideological and identity politics towards Iran will be examined as one of its foreign policy approaches. The question is thus that how ideological and identity politics have determined Turkish foreign policy towards Iran in the Arab Uprising. To answer that, the Syrian civil war will be analysed as the case study in this qualitative study, hypothesising that Turkey, which has both Turkish identity and Sunni sect, has competed with Iran, which has both Farsi identity and Shia sect, over the Syrian civil war.Keywords: Arab uprising, ideological and identity politics, Iran, Turkey, Syrian civil war
Procedia PDF Downloads 3082437 Necessity of Recognition of Same-Sex Marriages and Civil Partnerships Concluded Abroad from Civil Status Registry Point of View
Authors: Ewa Kamarad
Abstract:
Recent problems with adopting the EU Regulation on matrimonial property regimes have clearly proven that Member States are unable to agree on the scope of the Regulation and, therefore, on the definitions of matrimonial property and marriage itself. Taking into account that the Regulation on the law applicable to divorce and legal separation, as well as the Regulation on matrimonial property regimes, were adopted in the framework of enhanced cooperation, it is evident that lack of a unified definition of marriage has very wide-ranging consequences. The main problem with the unified definition of marriage is that the EU is not entitled to adopt measures in the domain of material family law, as this area remains under the exclusive competence of the Member States. Because of that, the legislation on marriage in domestic legal orders of the various Member States is very different. These differences concern not only issues such as form of marriage or capacity to enter into marriage, but also the most basic matter, namely the core of the institution of marriage itself. Within the 28 Member States, we have those that allow both different-sex and same-sex marriages, those that have adopted special, separate institutions for same-sex couples, and those that allow only marriage between a man and a woman (e.g. Hungary, Latvia, Lithuania, Poland, Slovakia). Because of the freedom of movement within the European Union, it seems necessary to somehow recognize the civil effects of a marriage that was concluded in another Member State. The most crucial issue is how far that recognition should go. The thesis presented in the presentation is that, at an absolute minimum, the authorities of all Member States must recognize the civil status of the persons who enter into marriage in another Member State. Lack of such recognition might cause serious problems, both for the spouses and for other individuals. The authorities of some Member States may treat the marriage as if it does not exist because it was concluded under foreign law that defines marriage differently. Because of that, it is possible for the spouse to obtain a certificate of civil status stating that he or she is single and thus eligible to enter into marriage – despite being legally married under the law of another Member State. Such certificate can then be used in another country to serve as a proof of civil status. Eventually the lack of recognition can lead to so-called “international bigamy”. The biggest obstacle to recognition of marriages concluded under the law of another Member State that defines marriage differently is the impossibility of transcription of a foreign civil certificate in the case of such a marriage. That is caused by the rule requiring that a civil certificate issued (or transcribed) under one country's law can contain only records of legal institutions recognized by that country's legal order. The presentation is going to provide possible solutions to this problem.Keywords: civil status, recognition of marriage, conflict of laws, private international law
Procedia PDF Downloads 2352436 Using Confirmatory Factor Analysis to Test the Dimensional Structure of Tourism Service Quality
Authors: Ibrahim A. Elshaer, Alaa M. Shaker
Abstract:
Several previous empirical studies have operationalized service quality as either a multidimensional or unidimensional construct. While few earlier studies investigated some practices of the assumed dimensional structure of service quality, no study has been found to have tested the construct’s dimensionality using confirmatory factor analysis (CFA). To gain a better insight into the dimensional structure of service quality construct, this paper tests its dimensionality using three CFA models (higher order factor model, oblique factor model, and one factor model) on a set of data collected from 390 British tourists visited Egypt. The results of the three tests models indicate that service quality construct is multidimensional. This result helps resolving the problems that might arise from the lack of clarity concerning the dimensional structure of service quality, as without testing the dimensional structure of a measure, researchers cannot assume that the significant correlation is a result of factors measuring the same construct.Keywords: service quality, dimensionality, confirmatory factor analysis, Egypt
Procedia PDF Downloads 5912435 Genetic Characterization of a Composite Transposon Carrying armA and Aac(6)-Ib Genes in an Escherichia coli Isolate from Egypt
Authors: Omneya M. Helmy, Mona T. Kashef
Abstract:
Aminoglycosides are used in treating a wide range of infections caused by both Gram-negative and Gram positive bacteria. The presence of 16S rRNA methyl transferases (16S-RMTase) is among the newly discovered resistance mechanisms that confer high resistance to clinically useful aminoglycosides. Cephalosporins are the most commonly used antimicrobials in Egypt; therefore, this study was conducted to determine the isolation frequency of 16S rRNA methyl transferases among third generation cephalosporin-resistant clinical isolates in Egypt. One hundred and twenty three cephalosporin resistant Gram-negative clinical isolates were screened for aminoglycoside resistance by the Kirby Bauer disk diffusion method and tested for possible production of 16S-RMTase. PCR testing and sequencing were used to confirm the presence of 16S-RMTase and the associated antimicrobial resistance determinants, as well as the genetic region surrounding the armA gene. Out of 123 isolates, 66 (53.66%) were resistant to at least one aminoglycoside antibiotic. Only one Escherichia coli isolate (E9ECMO) which was totally resistant to all tested aminoglycosides, was confirmed to have the armA gene in association with blaTEM-1, blaCTX-M-15, blaCTX-M-14 and aac(6)-Ib genes. The armA gene was found to be carried on a large A/C plasmid. Genetic mapping of the armA surrounding region revealed, for the first time, the association of armA with aac(6)-Ib on the same transposon. In Conclusion, the isolation frequency of 16S-RMTase was low among the tested cephalosporin-resistant clinical samples. However, a novel composite transposon has been detected conferring high-level aminoglycosides resistance.Keywords: aminoglcosides, armA gene, β lactmases, 16S rRNA methyl transferases
Procedia PDF Downloads 2822434 Challenges of New Technologies in the Field of Criminal Law: The Protection of the Right to Privacy in the Spanish Penal Code
Authors: Deborah Garcia-Magna
Abstract:
The use of new technologies has become widespread in the last decade, giving rise to various risks associated with the transfer of personal data and the publication of sensitive material on social media. There are already several supranational instruments that seek to protect the citizens involved in this growing traffic of personal information and, especially, the most vulnerable people, such as minors, who are also the ones who make the most intense use of these new means of communication. In this sense, the configuration of the concept of privacy as a legal right has necessarily been influenced by these new social uses and supranational instruments. The researcher considers correct the decision to introduce sexting as a new criminal behaviour in the Penal Code in 2015, but questions the concrete manner in which it has been made. To this end, an updated review of the various options that our legal system already offered is made, assessing whether these legal options adequately addressed the new social needs and guidelines from jurisprudence and other supranational instruments. Some important issues emerge as to whether the principles of fragmentarity and subsidiarity may be violated since the new article 197.7 of the Spanish Penal Code could refer to very varied behaviours and protect not only particularly vulnerable persons. In this sense, the research focuses on issues such as the concept of 'seriousness' of the infringement of privacy, the possible reckless conduct of the victim, who hang over its own private material to third parties, the affection to other legal rights such as freedom and sexual indemnity, the possible problems of concurrent offences, etc.Keywords: criminal law reform, ECHR jurisprudence, right to privacy, sexting
Procedia PDF Downloads 1942433 Design and Development of Automatic Onion Harvester
Authors: P. Revathi, T. Mrunalini, K. Padma Priya, P. Ramya, R. Saranya
Abstract:
During the tough times of covid, those people who were hospitalized found it difficult to always convey what they wanted to or needed to the attendee. Sometimes the attendees might also not be there. In that case, the patients can use simple hand gestures to control electrical appliances (like its set it for a zero watts bulb)and three other gestures for voice note intimation. In this AI-based hand recognition project, NodeMCU is used for the control action of the relay, and it is connected to the firebase for storing the value in the cloud and is interfaced with the python code via raspberry pi. For three hand gestures, a voice clip is added for intimation to the attendee. This is done with the help of Google’s text to speech and the inbuilt audio file option in the raspberry pi 4. All the 5 gestures will be detected when shown with their hands via a webcam which is placed for gesture detection. A personal computer is used for displaying the gestures and for running the code in the raspberry pi imager.Keywords: onion harvesting, automatic pluging, camera, raspberry pi
Procedia PDF Downloads 1982432 AI Ethical Values as Dependent on the Role and Perspective of the Ethical AI Code Founder- A Mapping Review
Authors: Moshe Davidian, Shlomo Mark, Yotam Lurie
Abstract:
With the rapid development of technology and the concomitant growth in the capability of Artificial Intelligence (AI) systems and their power, the ethical challenges involved in these systems are also evolving and increasing. In recent years, various organizations, including governments, international institutions, professional societies, civic organizations, and commercial companies, have been choosing to address these various challenges by publishing ethical codes for AI systems. However, despite the apparent agreement that AI should be “ethical,” there is debate about the definition of “ethical artificial intelligence.” This study investigates the various AI ethical codes and their key ethical values. From the vast collection of codes that exist, it analyzes and compares 25 ethical codes that were found to be representative of different types of organizations. In addition, as part of its literature review, the study overviews data collected in three recent reviews of AI codes. The results of the analyses demonstrate a convergence around seven key ethical values. However, the key finding is that the different AI ethical codes eventually reflect the type of organization that designed the code; i.e., the organizations’ role as regulator, user, or developer affects the view of what ethical AI is. The results show a relationship between the organization’s role and the dominant values in its code. The main contribution of this study is the development of a list of the key values for all AI systems and specific values that need to impact the development and design of AI systems, but also allowing for differences according to the organization for which the system is being developed. This will allow an analysis of AI values in relation to stakeholders.Keywords: artificial intelligence, ethical codes, principles, values
Procedia PDF Downloads 1072431 The Effect of Gas Pollutants on Museum Environment: Case Study of an Oil Paintings in Ethnographic Museum, Egypt
Authors: Hagar Ezzat, Mostafa Attia, Ahmed Bedeir, Abdelrazek Elnagger, Matija Strlic
Abstract:
Ethnographic Museum in Cairo- Egypt is a place of valuable collections (manuscripts, paintings, textiles and other ethnographic materials), the museum experiences serious neglecting with unacceptable display and storage conditions, the museum is located in Tahrir sq., which consider a high traffic area where pollution levels exceed the acceptable levels in museums. The materials used in manufacturing the display cases are expected to be source of many pollutants which affecting the sensitive oil paintings objects in the galleries. 24 diffusion tubes (12 No2, So2 & 12 O3) have been used in "winter 2014 and spring 2014" for monitoring museum environment with three cases "outdoor & indoor and in the gallery display". A series of analytical techniques with scientific tools: Ion Chromatography have been used to assess measurements and effects of gas pollutants on the museum which help us to make good assessment for the damage of oil paintings objects and the condition of the museum and understand the effect of the museum environment on the deterioration of the sensitive oil paintings.Keywords: environment, museum, paintings, ethnographic, conservation
Procedia PDF Downloads 2402430 Automatic Fluid-Structure Interaction Modeling and Analysis of Butterfly Valve Using Python Script
Authors: N. Guru Prasath, Sangjin Ma, Chang-Wan Kim
Abstract:
A butterfly valve is a quarter turn valve which is used to control the flow of a fluid through a section of pipe. Generally, butterfly valve is used in wide range of applications such as water distribution, sewage, oil and gas plants. In particular, butterfly valve with larger diameter finds its immense applications in hydro power plants to control the fluid flow. In-lieu with the constraints in cost and size to run laboratory setup, analysis of large diameter values will be mostly studied by computational method which is the best and inexpensive solution. For fluid and structural analysis, CFD and FEM software is used to perform large scale valve analyses, respectively. In order to perform above analysis in butterfly valve, the CAD model has to recreate and perform mesh in conventional software’s for various dimensions of valve. Therefore, its limitation is time consuming process. In-order to overcome that issue, python code was created to outcome complete pre-processing setup automatically in Salome software. Applying dimensions of the model clearly in the python code makes the running time comparatively lower and easier way to perform analysis of the valve. Hence, in this paper, an attempt was made to study the fluid-structure interaction (FSI) of butterfly valves by varying the valve angles and dimensions using python code in pre-processing software, and results are produced.Keywords: butterfly valve, flow coefficient, automatic CFD analysis, FSI analysis
Procedia PDF Downloads 2412429 A Comparative Assessment of the FoodSupply Vulnerability to Large-Scale Disasters in OECD Countries
Authors: Karolin Bauer, Anna Brinkmann
Abstract:
Vulnerabilities in critical infrastructure can cause significant difficulties for the affected population during crises. Securing the food supply as part of the critical infrastructure in crisis situations is an essential part of public services and a ground stone for a successful concept of civil protection. In most industrialized countries, there are currently no comparative studies regarding the food supply of the population during crisis and disaster events. In order to mitigate the potential impact in case of major disasters in Germany, it is absolutely necessary to investigate how the food supply can be secured. The research project aims to provide in-depth research on the experiences gathered during past large-scale disasters in the 34 OECD member countries in order to discover alternatives for an updated civil protection system in Germany. The basic research question is: "Which international approaches and structures of civil protection have been proven and would be useful to modernize the German civil protection with regards to the critical infrastructure and food supply?" Research findings should be extracted from an extensive literature review covering the entire research period as well as from personal and online-based interviews with experts and responsible persons from involved institutions. The capability of the research project insists on the deliberate choice to investigate previous large-scale disasters to formulate important and practical approaches to modernize civil protection in Germany.Keywords: food supply, vulnerabilty, critical infratstructure, large-scale disaster
Procedia PDF Downloads 3362428 The Image of Victim and Criminal in Love Crimes on Social Media in Egypt: Facebook Discourse Analysis
Authors: Sherehan Hamdalla
Abstract:
Egypt has experienced a series of terrifying love crimes in the last few months. This ‘trend’ of love crimes started with a young man caught on video slaughtering his ex-girlfriend in the street in the city of El Mansoura. The crime shocked all Egyptian citizens at all levels; unfortunately, not less than three similar crimes took place in other different Egyptian cities with the same killing trigger. The characteristics and easy access and reach of social media consider the reason why it is one of the most crucial online communication channels; users utilize social media platforms for sharing and exchanging ideas, news, and many other activities; they can freely share posts that reflect their mindset or personal views regarding any issues, these posts are going viral in all social media account by reposting or numbers of shares for these posts to support the content included, or even to attack. The repetition of sharing certain posts could mobilize other supporters with the same point of view, especially when that crowd’s online participation is confronting a public opinion case’s consequences. The death of that young woman was followed by similar crimes in other cities, such as El Sharkia and Port Said. These love crimes provoked a massive wave of contention among all social classes in Egypt. Strangely, some were supporting the criminal and defending his side for several reasons, which the study will uncover. Facebook, the most popular social media platform for Egyptians, reflects the debate between supporters of the victim and supporters of the criminal. Facebook pages were created specifically to disseminate certain viewpoints online, for example, asking for the maximum penalty to be given to criminals. These pages aimed to mobilize the maximum number of supporters and to affect the outcome of the trials.Keywords: love crimes, victim, criminal, social media
Procedia PDF Downloads 762427 Flipped Learning Application on the Development of Capabilities for Civil Engineering Education in Labs
Authors: Hector Barrios-Piña, Georgia García-Arellano, Salvador García-Rodríguez, Gerardo Bocanegra-García, Shashi Kant
Abstract:
This work shows the methodology of application and the effectiveness of the Flipped Learning technique for Civil Engineering laboratory classes. It was experimented by some of the professors of the Department of Civil Engineering at Tecnológico de Monterrey while teaching their laboratory classes. A total of 28 videos were created. The videos primarily demonstrate instructions of the experimental practices other than the usage of tools and materials. The technique allowed the students to prepare for their classes in advance. A survey was conducted on the participating professors and students (semester of August-December 2019) to quantify the effectiveness of the Flipped Learning technique. The students reported it as an excellent way of improving their learning aptitude, including self-learning whereas, the professors felt it as an efficient technique for optimizing their class session, which also provided an extra slot for class-interaction. A comparison of grades was analyzed between the students of the traditional classes and with Flipped Learning. It did not distinguish the benefits of Flipped Learning. However, the positive responses from the students and the professors provide an impetus for continuing and promoting the Flipped Learning technique in future classes.Keywords: flipped learning, laboratory classes, civil engineering, competences development
Procedia PDF Downloads 1602426 Impact of Applying Bag House Filter Technology in Cement Industry on Ambient Air Quality - Case Study: Alexandria Cement Company
Authors: Haggag H. Mohamed, Ghatass F. Zekry, Shalaby A. Elsayed
Abstract:
Most sources of air pollution in Egypt are of anthropogenic origin. Alexandria Governorate is located at north of Egypt. The main contributing sectors of air pollution in Alexandria are industry, transportation and area source due to human activities. Alexandria includes more than 40% of the industrial activities in Egypt. Cement manufacture contributes a significant amount to the particulate pollution load. Alexandria Portland Cement Company (APCC) surrounding was selected to be the study area. APCC main kiln stack Total Suspended Particulate (TSP) continuous monitoring data was collected for assessment of dust emission control technology. Electro Static Precipitator (ESP) was fixed on the cement kiln since 2002. The collected data of TSP for first quarter of 2012 was compared to that one in first quarter of 2013 after installation of new bag house filter. In the present study, based on these monitoring data and metrological data a detailed air dispersion modeling investigation was carried out using the Industrial Source Complex Short Term model (ISC3-ST) to find out the impact of applying new bag house filter control technology on the neighborhood ambient air quality. The model results show a drastic reduction of the ambient TSP hourly average concentration from 44.94μg/m3 to 5.78μg/m3 which assures the huge positive impact on the ambient air quality by applying bag house filter technology on APCC cement kilnKeywords: air pollution modeling, ambient air quality, baghouse filter, cement industry
Procedia PDF Downloads 2692425 Detecting Logical Errors in Haskell
Authors: Vanessa Vasconcelos, Mariza A. S. Bigonha
Abstract:
In order to facilitate both processes, this paper presents HaskellFL, a tool that uses fault localization techniques to locate a logical error in Haskell code. The Haskell subset used in this work is sufficiently expressive for those studying functional programming to get immediate help debugging their code and to answer questions about key concepts associated with the functional paradigm. HaskellFL was tested against functional programming assignments submitted by students enrolled at the functional programming class at the Federal University of Minas Gerais and against exercises from the Exercism Haskell track that are publicly available on GitHub. Furthermore, the EXAM score was chosen to evaluate the tool’s effectiveness, and results showed that HaskellFL reduced the effort needed to locate an error for all tested scenarios. Results also showed that the Ochiai method was more effective than Tarantula.Keywords: debug, fault localization, functional programming, Haskell
Procedia PDF Downloads 2982424 Radiative Reactions Analysis at the Range of Astrophysical Energies
Authors: A. Amar
Abstract:
Analysis of the elastic scattering of protons on 10B nuclei has been done in the framework of the optical model and single folding model at the beam energies up to 17 MeV. We could enhance the optical potential parameters using Esis88 Code, as well as SPI GENOA Code. Linear relationship between volume real potential (V0) and proton energy (Ep) has been obtained. Also, surface imaginary potential WD is proportional to the proton energy (Ep) in the range 0.400 and 17 MeV. The radiative reaction 10B(p,γ)11C has been analyzed using potential model. A comparison between 10B(p,γ)11C and 6Li(p,γ)7Be has been made. Good agreement has been found between theoretical and experimental results in the whole range of energy. The radiative resonance reaction 7Li(p,γ)8Be has been studied.Keywords: elastic scattering of protons on 10B nuclei, optical potential parameters, potential model, radiative reaction
Procedia PDF Downloads 2092423 Bypassing Docker Transport Layer Security Using Remote Code Execution
Authors: Michael J. Hahn
Abstract:
Docker is a powerful tool used by many companies such as PayPal, MetLife, Expedia, Visa, and many others. Docker works by bundling multiple applications, binaries, and libraries together on top of an operating system image called a container. The container runs on a Docker engine that in turn runs on top of a standard operating system. This centralization saves a lot of system resources. In this paper, we will be demonstrating how to bypass Transport Layer Security and execute remote code within Docker containers built on a base image of Alpine Linux version 3.7.0 through the use of .apk files due to flaws in the Alpine Linux package management program. This exploit renders any applications built using Docker with a base image of Alpine Linux vulnerable to unwanted outside forces.Keywords: cloud, cryptography, Docker, Linux, security
Procedia PDF Downloads 1982422 Biogas Control: Methane Production Monitoring Using Arduino
Authors: W. Ait Ahmed, M. Aggour, M. Naciri
Abstract:
Extracting energy from biomass is an important alternative to produce different types of energy (heat, electricity, or both) assuring low pollution and better efficiency. It is a new yet reliable approach to reduce green gas emission by extracting methane from industry effluents and use it to power machinery. We focused in our project on using paper and mill effluents, treated in a UASB reactor. The methane produced is used in the factory’s power supply. The aim of this work is to develop an electronic system using Arduino platform connected to a gas sensor, to measure and display the curve of daily methane production on processing. The sensor will send the gas values in ppm to the Arduino board so that the later sends the RS232 hardware protocol. The code developed with processing will transform the values into a curve and display it on the computer screen.Keywords: biogas, Arduino, processing, code, methane, gas sensor, program
Procedia PDF Downloads 3212421 Large-Scale Simulations of Turbulence Using Discontinuous Spectral Element Method
Authors: A. Peyvan, D. Li, J. Komperda, F. Mashayek
Abstract:
Turbulence can be observed in a variety fluid motions in nature and industrial applications. Recent investment in high-speed aircraft and propulsion systems has revitalized fundamental research on turbulent flows. In these systems, capturing chaotic fluid structures with different length and time scales is accomplished through the Direct Numerical Simulation (DNS) approach since it accurately simulates flows down to smallest dissipative scales, i.e., Kolmogorov’s scales. The discontinuous spectral element method (DSEM) is a high-order technique that uses spectral functions for approximating the solution. The DSEM code has been developed by our research group over the course of more than two decades. Recently, the code has been improved to run large cases in the order of billions of solution points. Running big simulations requires a considerable amount of RAM. Therefore, the DSEM code must be highly parallelized and able to start on multiple computational nodes on an HPC cluster with distributed memory. However, some pre-processing procedures, such as determining global element information, creating a global face list, and assigning global partitioning and element connection information of the domain for communication, must be done sequentially with a single processing core. A separate code has been written to perform the pre-processing procedures on a local machine. It stores the minimum amount of information that is required for the DSEM code to start in parallel, extracted from the mesh file, into text files (pre-files). It packs integer type information with a Stream Binary format in pre-files that are portable between machines. The files are generated to ensure fast read performance on different file-systems, such as Lustre and General Parallel File System (GPFS). A new subroutine has been added to the DSEM code to read the startup files using parallel MPI I/O, for Lustre, in a way that each MPI rank acquires its information from the file in parallel. In case of GPFS, in each computational node, a single MPI rank reads data from the file, which is specifically generated for the computational node, and send them to other ranks on the node using point to point non-blocking MPI communication. This way, communication takes place locally on each node and signals do not cross the switches of the cluster. The read subroutine has been tested on Argonne National Laboratory’s Mira (GPFS), National Center for Supercomputing Application’s Blue Waters (Lustre), San Diego Supercomputer Center’s Comet (Lustre), and UIC’s Extreme (Lustre). The tests showed that one file per node is suited for GPFS and parallel MPI I/O is the best choice for Lustre file system. The DSEM code relies on heavily optimized linear algebra operation such as matrix-matrix and matrix-vector products for calculation of the solution in every time-step. For this, the code can either make use of its matrix math library, BLAS, Intel MKL, or ATLAS. This fact and the discontinuous nature of the method makes the DSEM code run efficiently in parallel. The results of weak scaling tests performed on Blue Waters showed a scalable and efficient performance of the code in parallel computing.Keywords: computational fluid dynamics, direct numerical simulation, spectral element, turbulent flow
Procedia PDF Downloads 133