Search results for: legal problem
8106 Predictive Power of Achievement Motivation on Student Engagement and Collaborative Problem Solving Skills
Authors: Theresa Marie Miller, Ma. Nympha Joaquin
Abstract:
The aim of this study was to check the predictive power of social-oriented and individual-oriented achievement motivation on student engagement and collaborative problem-solving skills in mathematics. A sample of 277 fourth year high school students from the Philippines were selected. Surveys and videos of collaborative problem solving activity were used to collect data from respondents. The mathematics teachers of the participants were interviewed to provide qualitative support on the data. Systemaitc correlation and regression analysis were employed. Results of the study showed that achievement motivations−SOAM and IOAM− linearly predicted student engagement but was not significantly associated to the collaborative problem-solving skills in mathematics. Student engagement correlated positively with collaborative problem-solving skills in mathematics. The results contribute to theorizing about the predictive power of achievement motivations, SOAM and IOAM on the realm of academic behaviors and outcomes as well as extend the understanding of collaborative problem-solving skills of 21st century learners.Keywords: achievement motivation, collaborative problem-solving skills, individual-oriented achievement motivation, social-oriented achievement motivation, student engagement
Procedia PDF Downloads 3138105 The Role of State in Promoting the Green Innovation: Challenges and Opportunities in Taiwan
Authors: Po-Kun Tsai
Abstract:
The issue of climate change is essential in the 21st century. State governments have launched types of strategic industrial policies to encourage more widespread R&D in green technology. Research also indicates that technology is an essential tool to mitigate some of extreme situations. However, one could learn from several prominent cases in international trade area that they have been easily argued and disputed by the foreign counterparts. Thus, how to justify the public sector’s R&D measures under the current world trading system and how to promote the transfer of environmentally sound technologies (EST) to developing states are crucial. The study is to undertake a preliminary examination of the current R&D research area in green technology in Taiwan. Through selective interviews and comparative approach, it tries to identify the loopholes under the current legal framework in Taiwan. It would be, as a basis, for further legal and policy recommendations for the benefits of mankind.Keywords: government, R&D, innovation, environmentally sound technology (EST)
Procedia PDF Downloads 4798104 Marriage, Foundation of Family Strength and the Best Opportunity for Human Existence and Relationships
Authors: Tamriko Pavliashvili
Abstract:
Marriage is such an important institution of family law, which is an indicator of the development of society. Although a family can be created by the birth of a child between an unmarried couple, marriage is still the main basis for the creation of a family, during which the rights and duties imposed require legal regulation. At present, in the conditions of globalization, there are different types of marriage, although in the main countries, it is still a union of a woman and a man, which involves voluntary cohabitation and assuming and fulfilling the norms and responsibilities established on the basis of the law. Modern society is at the stage where there is a need to create a family, and therefore marriage provides the best opportunity for relationships and existence between people. The mentioned paper about the state institution - marriage gives us the opportunity to get more information about the existing habits, legal norms from the ancient times to the modern period in Georgia, and also through comparison we will see what the differences and commonalities were and are in the marriage law of the countries of the world and Georgia.Keywords: marriage, family law, the union of man and woman, church law
Procedia PDF Downloads 698103 Piracy Killed the Radio Star: A System Archetype Analysis of Digital Music Theft
Authors: Marton Gergely
Abstract:
Digital experience goods, such as music and video, are readily available and easily accessible through a sundry of illegal mediums. Furthermore, the rate of music theft has been increasing at a seemingly unstoppable rate. Instead of studying the effect of copyright infringement on affected shareholders, this paper aims to examine the overall impact that digital music piracy has on society as a whole. Through a systems dynamics approach, an archetype is built to model the behavior of both legal and illegal music users. Additionally, the effects over time are considered. The conceptual model suggests that if piracy continues to grow at the current pace, industry shareholders will eventually lose the motivation to supply new music. In turn, this tragedy would affect not only the illegal players, but legal consumers as well, by means of a decrease in overall quality of life.Keywords: music piracy, illegal downloading, tragedy of the commons, system archetypes
Procedia PDF Downloads 3568102 Discrete Breeding Swarm for Cost Minimization of Parallel Job Shop Scheduling Problem
Authors: Tarek Aboueldahab, Hanan Farag
Abstract:
Parallel Job Shop Scheduling Problem (JSP) is a multi-objective and multi constrains NP- optimization problem. Traditional Artificial Intelligence techniques have been widely used; however, they could be trapped into the local minimum without reaching the optimum solution, so we propose a hybrid Artificial Intelligence model (AI) with Discrete Breeding Swarm (DBS) added to traditional Artificial Intelligence to avoid this trapping. This model is applied in the cost minimization of the Car Sequencing and Operator Allocation (CSOA) problem. The practical experiment shows that our model outperforms other techniques in cost minimization.Keywords: parallel job shop scheduling problem, artificial intelligence, discrete breeding swarm, car sequencing and operator allocation, cost minimization
Procedia PDF Downloads 1878101 Japanese and Europe Legal Frameworks on Data Protection and Cybersecurity: Asymmetries from a Comparative Perspective
Authors: S. Fantin
Abstract:
This study is the result of the legal research on cybersecurity and data protection within the EUNITY (Cybersecurity and Privacy Dialogue between Europe and Japan) project, aimed at fostering the dialogue between the European Union and Japan. Based on the research undertaken therein, the author offers an outline of the main asymmetries in the laws governing such fields in the two regions. The research is a comparative analysis of the two legal frameworks, taking into account specific provisions, ratio legis and policy initiatives. Recent doctrine was taken into account, too, as well as empirical interviews with EU and Japanese stakeholders and project partners. With respect to the protection of personal data, the European Union has recently reformed its legal framework with a package which includes a regulation (General Data Protection Regulation), and a directive (Directive 680 on personal data processing in the law enforcement domain). In turn, the Japanese law under scrutiny for this study has been the Act on Protection of Personal Information. Based on a comparative analysis, some asymmetries arise. The main ones refer to the definition of personal information and the scope of the two frameworks. Furthermore, the rights of the data subjects are differently articulated in the two regions, while the nature of sanctions take two opposite approaches. Regarding the cybersecurity framework, the situation looks similarly misaligned. Japan’s main text of reference is the Basic Cybersecurity Act, while the European Union has a more fragmented legal structure (to name a few, Network and Information Security Directive, Critical Infrastructure Directive and Directive on the Attacks at Information Systems). On an relevant note, unlike a more industry-oriented European approach, the concept of cyber hygiene seems to be neatly embedded in the Japanese legal framework, with a number of provisions that alleviate operators’ liability by turning such a burden into a set of recommendations to be primarily observed by citizens. With respect to the reasons to fill such normative gaps, these are mostly grounded on three basis. Firstly, the cross-border nature of cybercrime brings to consider both magnitude of the issue and its regulatory stance globally. Secondly, empirical findings from the EUNITY project showed how recent data breaches and cyber-attacks had shared implications between Europe and Japan. Thirdly, the geopolitical context is currently going through the direction of bringing the two regions to significant agreements from a trade standpoint, but also from a data protection perspective (with an imminent signature by both parts of a so-called ‘Adequacy Decision’). The research conducted in this study reveals two asymmetric legal frameworks on cyber security and data protection. With a view to the future challenges presented by the strengthening of the collaboration between the two regions and the trans-national fashion of cybercrime, it is urged that solutions are found to fill in such gaps, in order to allow European Union and Japan to wisely increment their partnership.Keywords: cybersecurity, data protection, European Union, Japan
Procedia PDF Downloads 1238100 Experimental Assessment of the Effectiveness of Judicial Instructions and of Expert Testimony in Improving Jurors’ Evaluation of Eyewitness Evidence
Authors: Alena Skalon, Jennifer L. Beaudry
Abstract:
Eyewitness misidentifications can sometimes lead to wrongful convictions of innocent people. This occurs in part because jurors tend to believe confident eyewitnesses even when the identification took place under suggestive conditions. Empirical research demonstrated that jurors are often unaware of the factors that can influence the reliability of eyewitness identification. Most common legal safeguards that are designed to educate jurors about eyewitness evidence are judicial instructions and expert testimony. To date, very few studies assessed the effectiveness of judicial instructions and most of them found that judicial instructions make jurors more skeptical of eyewitness evidence or do not have any effect on jurors’ judgments. Similar results were obtained for expert testimony. However, none of the previous studies focused on the ability of legal safeguards to improve jurors’ assessment of evidence obtained from suggestive identification procedures—this is one of the gaps addressed by this paper. Furthermore, only three studies investigated whether legal safeguards improve the ultimate accuracy of jurors’ judgments—that is, whether after listening to judicial instructions or expert testimony jurors can differentiate between accurate and inaccurate eyewitnesses. This presentation includes two studies. Both studies used genuine eyewitnesses (i.e., eyewitnesses who watched the crime) and manipulated the suggestiveness of identification procedures. The first study manipulated the presence of judicial instructions; the second study manipulated the presence of one of two types of expert testimony: a traditional, verbal expert testimony or expert testimony accompanied by visual aids. All participant watched a video-recording of an identification procedure and of an eyewitness testimony. The results indicated that neither judicial instructions nor expert testimony affected jurors’ judgments. However, consistent with the previous findings, when the identification procedure was non-suggestive, jurors believed accurate eyewitnesses more often than inaccurate eyewitnesses. When the procedure was suggestive, jurors believed accurate and inaccurate eyewitnesses at the same rate. The paper will discuss the implications of these studies and directions for future research.Keywords: expert testimony, eyewitness evidence, judicial instructions, jurors’ decision making, legal safeguards
Procedia PDF Downloads 1778099 Urgent Need for E -Waste Management in Mongolia
Authors: Enkhjargal Bat-Ochir
Abstract:
The global market of electrical and electronic equipment (EEE) has increasing rapidly while the lifespan of these products has become increasingly shorter. So, e-waste is becoming the world’s fastest growing waste stream. E-waste is a huge problem when it’s not properly disposed of, as these devices contain substances that are harmful to the environment and to human health as they contaminate the land, water, and air. This paper tends to highlight e-waste problem and harmful effects and can grasp the extent of the problem and take the necessary measures to solve it in Mongolia and to improve standards and human health.Keywords: e -waste, recycle, electrical, Mongolia
Procedia PDF Downloads 4198098 Analysis of an Error Estimate for the Asymptotic Solution of the Heat Conduction Problem in a Dilated Pipe
Authors: E. Marušić-Paloka, I. Pažanin, M. Prša
Abstract:
Subject of this study is the stationary heat conduction problem through a pipe filled with incompressible viscous fluid. In previous work, we observed the existence and uniqueness theorems for the corresponding boundary-value problem and within we have taken into account the effects of the pipe's dilatation due to the temperature of the fluid inside of the pipe. The main difficulty comes from the fact that flow domain changes depending on the solution of the observed heat equation leading to a non-standard coupled governing problem. The goal of this work is to find solution estimate since the exact solution of the studied problem is not possible to determine. We use an asymptotic expansion in order of a small parameter which is presented as a heat expansion coefficient of the pipe's material. Furthermore, an error estimate is provided for the mentioned asymptotic approximation of the solution for inner area of the pipe. Close to the boundary, problem becomes more complex so different approaches are observed, mainly Theory of Perturbations and Separations of Variables. In view of that, error estimate for the whole approximation will be provided with additional software simulations of gotten situation.Keywords: asymptotic analysis, dilated pipe, error estimate, heat conduction
Procedia PDF Downloads 2358097 Existence of Positive Solutions for Second-Order Difference Equation with Discrete Boundary Value Problem
Authors: Thanin Sitthiwirattham, Jiraporn Reunsumrit
Abstract:
We study the existence of positive solutions to the three points difference summation boundary value problem. We show the existence of at least one positive solution if f is either superlinear or sublinear by applying the fixed point theorem due to Krasnoselskii in cones.Keywords: positive solution, boundary value problem, fixed point theorem, cone
Procedia PDF Downloads 4398096 Common Laws Principles: A Way to Solve Global Environmental Change
Authors: Neelam Kadyan
Abstract:
Global environmental change is happening at an alarming rate in the present world. Floods, Tsunamis’, Avalanches, Change in Weather patterns, Rise in sea temperature, Landslides, are only few evidences of this change. To regulate such alarming growth of global change in environment certain regulatory system or mechanism is required. Nuisance,negligence,absolute liability,strict liability and trespass are some of the effective common law principles which are helpful in environmental problems. What we need today is sufficient law and adequate machinery to enforce the legal standards. Without law environmental standards cannot be enforced and once again there is need to adopt the common law approach in solving the problem of environmental change as through this approach the affected person can get compensation and as the same time it puts check on wrongdoer.Keywords: global environmental problems, nuisance, negligence, trespass, strict liability, absolute liability
Procedia PDF Downloads 5658095 A Heuristic Based Decomposition Approach for a Hierarchical Production Planning Problem
Authors: Nusrat T. Chowdhury, M. F. Baki, A. Azab
Abstract:
The production planning problem is concerned with specifying the optimal quantities to produce in order to meet the demand for a prespecified planning horizon with the least possible expenditure. Making the right decisions in production planning will affect directly the performance and productivity of a manufacturing firm, which is important for its ability to compete in the market. Therefore, developing and improving solution procedures for production planning problems is very significant. In this paper, we develop a Dantzig-Wolfe decomposition of a multi-item hierarchical production planning problem with capacity constraint and present a column generation approach to solve the problem. The original Mixed Integer Linear Programming model of the problem is decomposed item by item into a master problem and a number of subproblems. The capacity constraint is considered as the linking constraint between the master problem and the subproblems. The subproblems are solved using the dynamic programming approach. We also propose a multi-step iterative capacity allocation heuristic procedure to handle any kind of infeasibility that arises while solving the problem. We compare the computational performance of the developed solution approach against the state-of-the-art heuristic procedure available in the literature. The results show that the proposed heuristic-based decomposition approach improves the solution quality by 20% as compared to the literature.Keywords: inventory, multi-level capacitated lot-sizing, emission control, setup carryover
Procedia PDF Downloads 1388094 Labour Migration in Russia in the Context of Russia’s National Security Problem
Authors: A. V. Dolzhikova
Abstract:
The article deals with the problems of labour migration in the Russian Federation in the context of Russia's national security, provides the typology of migrants residing in the territory of the Russian Federation and analyzes the risk factors. The author considers the structure of migration flows and the terms of legal, economic and socio-cultural adaptation of migrants in the Russian Federation. In this connection, the status of the Russian migration legislation, the concept of the comprehensive exam in Russian as a foreign language, history of Russia and the basics of the Russian Federation legislation for foreign citizens which was introduced in Russia on January 1, 2015, are analyzed. The article discloses its role as the adaptation strategy and the factor of Russia's migration security.Keywords: comprehensive exam, migration policy, migration legislation, Russia's national security
Procedia PDF Downloads 3658093 Culture as a Barrier: Political Rights of Women in Pakhtun Society
Authors: Muhammad Adil
Abstract:
Women in different parts of the world confront several barriers to accomplishing their legal rights, particularly political rights. One of the common barriers in this respect is the indigenous culture of the locality. In the same way, women in Khyber Pakhtunkhwa are facing difficulties in accomplishing their political rights. The most significant obstacle in this context is Pakhtunwali, the traditional code of conduct in Pakhtun society, which is perceived as a substantial impediment for Pakhtun women in practicing their political rights as guaranteed by the Constitution of Pakistan and international legal instruments. Several codes of Pakhtunwali, like peghor (slander or abuse), tor (blame or disgraced), sharam (shame and dishonor), purdah (gender segregation), and ghayrat (honor) have a prominent role in this regard. The research approach employed a combination of both qualitative and quantitative methods to ensure a thorough exploration of the subject. Not only different documents have been analyzed but also a questionnaire has been developed to get accurate findings. Simultaneously, both primary and secondary data have been utilized. The finding shows that the Pakhtun culture is a formidable hurdle in accomplishing women’s political rights in Pakhtun society, particularly in rural areas. Observation reveals that a prevailing societal perception is that having women as their representatives would be viewed as a challenge to the honor of Pakhtun men. Consequently, women candidates who participated in the general elections in Khyber Pakhtunkhwa received only 1 percent or less than 1 percent of the votes compared to their male counterparts. It is recommended that certain codes of Pakhtunwali should be redefined and made compatible with international legal instruments.Keywords: constitution, fundamental rights, honor, pakhtunwali.
Procedia PDF Downloads 508092 Job Shop Scheduling: Classification, Constraints and Objective Functions
Authors: Majid Abdolrazzagh-Nezhad, Salwani Abdullah
Abstract:
The job-shop scheduling problem (JSSP) is an important decision facing those involved in the fields of industry, economics and management. This problem is a class of combinational optimization problem known as the NP-hard problem. JSSPs deal with a set of machines and a set of jobs with various predetermined routes through the machines, where the objective is to assemble a schedule of jobs that minimizes certain criteria such as makespan, maximum lateness, and total weighted tardiness. Over the past several decades, interest in meta-heuristic approaches to address JSSPs has increased due to the ability of these approaches to generate solutions which are better than those generated from heuristics alone. This article provides the classification, constraints and objective functions imposed on JSSPs that are available in the literature.Keywords: job-shop scheduling, classification, constraints, objective functions
Procedia PDF Downloads 4448091 An Evolutionary Multi-Objective Optimization for Airport Gate Assignment Problem
Authors: Seyedmirsajad Mokhtarimousavi, Danial Talebi, Hamidreza Asgari
Abstract:
Gate Assignment Problem (GAP) is one of the most substantial issues in airport operation. In principle, GAP intends to maintain the maximum capacity of the airport through the best possible allocation of the resources (gates) in order to reach the optimum outcome. The problem involves a wide range of dependent and independent resources and their limitations, which add to the complexity of GAP from both theoretical and practical perspective. In this study, GAP was mathematically formulated as a three-objective problem. The preliminary goal of multi-objective formulation was to address a higher number of objectives that can be simultaneously optimized and therefore increase the practical efficiency of the final solution. The problem is solved by applying the second version of Non-dominated Sorting Genetic Algorithm (NSGA-II). Results showed that the proposed mathematical model could address most of major criteria in the decision-making process in airport management in terms of minimizing both airport/airline cost and passenger walking distance time. Moreover, the proposed approach could properly find acceptable possible answers.Keywords: airport management, gate assignment problem, mathematical modeling, genetic algorithm, NSGA-II
Procedia PDF Downloads 2998090 The Economic Limitations of Defining Data Ownership Rights
Authors: Kacper Tomasz Kröber-Mulawa
Abstract:
This paper will address the topic of data ownership from an economic perspective, and examples of economic limitations of data property rights will be provided, which have been identified using methods and approaches of economic analysis of law. To properly build a background for the economic focus, in the beginning a short perspective of data and data ownership in the EU’s legal system will be provided. It will include a short introduction to its political and social importance and highlight relevant viewpoints. This will stress the importance of a Single Market for data but also far-reaching regulations of data governance and privacy (including the distinction of personal and non-personal data, data held by public bodies and private businesses). The main discussion of this paper will build upon the briefly referred to legal basis as well as methods and approaches of economic analysis of law.Keywords: antitrust, data, data ownership, digital economy, property rights
Procedia PDF Downloads 818089 Cybercrime: International Police Cooperation with Europol
Authors: Daniel Suarez Alonso
Abstract:
Cybercrime is a growing international threat and a challenge for law enforcement agencies and judicial systems worldwide. International cooperation is necessary to solve this problem because cybercrime knows no borders and often involves multiple jurisdictions, being related to organised crime. The purpose of this article is to analyse international cooperation in the investigation and prosecution of cybercrime, focusing on the framework of the Regulation of the European Union Agency for Law Enforcement Cooperation (EUROPOL), cooperation that takes place between police authorities from different countries. It examines the legal and operational mechanisms in place to facilitate international cooperation in Europe in this area and assesses their effectiveness in the fight against cybercrime. In addition, the study of a Spanish investigation where cooperation with EUROPOL took place will be examined, analyzing how international cooperation was carried out to investigate and track down criminals. Lessons learned from this case will be discussed and recommendations for improving international cooperation in the fight against cybercrime will be proposed.Keywords: Europol, international cooperation, cybercrime, computer crime, law
Procedia PDF Downloads 668088 Parameterized Lyapunov Function Based Robust Diagonal Dominance Pre-Compensator Design for Linear Parameter Varying Model
Authors: Xiaobao Han, Huacong Li, Jia Li
Abstract:
For dynamic decoupling of linear parameter varying system, a robust dominance pre-compensator design method is given. The parameterized pre-compensator design problem is converted into optimal problem constrained with parameterized linear matrix inequalities (PLMI); To solve this problem, firstly, this optimization problem is equivalently transformed into a new form with elimination of coupling relationship between parameterized Lyapunov function (PLF) and pre-compensator. Then the problem was reduced to a normal convex optimization problem with normal linear matrix inequalities (LMI) constraints on a newly constructed convex polyhedron. Moreover, a parameter scheduling pre-compensator was achieved, which satisfies robust performance and decoupling performances. Finally, the feasibility and validity of the robust diagonal dominance pre-compensator design method are verified by the numerical simulation of a turbofan engine PLPV model.Keywords: linear parameter varying (LPV), parameterized Lyapunov function (PLF), linear matrix inequalities (LMI), diagonal dominance pre-compensator
Procedia PDF Downloads 3998087 Modeling and Simulation of Flow Shop Scheduling Problem through Petri Net Tools
Authors: Joselito Medina Marin, Norberto Hernández Romero, Juan Carlos Seck Tuoh Mora, Erick S. Martinez Gomez
Abstract:
The Flow Shop Scheduling Problem (FSSP) is a typical problem that is faced by production planning managers in Flexible Manufacturing Systems (FMS). This problem consists in finding the optimal scheduling to carry out a set of jobs, which are processed in a set of machines or shared resources. Moreover, all the jobs are processed in the same machine sequence. As in all the scheduling problems, the makespan can be obtained by drawing the Gantt chart according to the operations order, among other alternatives. On this way, an FMS presenting the FSSP can be modeled by Petri nets (PNs), which are a powerful tool that has been used to model and analyze discrete event systems. Then, the makespan can be obtained by simulating the PN through the token game animation and incidence matrix. In this work, we present an adaptive PN to obtain the makespan of FSSP by applying PN analytical tools.Keywords: flow-shop scheduling problem, makespan, Petri nets, state equation
Procedia PDF Downloads 2988086 Heuristic for Scheduling Correlated Parallel Machine to Minimize Maximum Lateness and Total Weighed Completion Time
Authors: Yang-Kuei Lin, Yun-Xi Zhang
Abstract:
This research focuses on the bicriteria correlated parallel machine scheduling problem. The two objective functions considered in this problem are to minimize maximum lateness and total weighted completion time. We first present a mixed integer programming (MIP) model that can find the entire efficient frontier for the studied problem. Next, we have proposed a bicriteria heuristic that can find non-dominated solutions for the studied problem. The performance of the proposed bicriteria heuristic is compared with the efficient frontier generated by solving the MIP model. Computational results indicate that the proposed bicriteria heuristic can solve the problem efficiently and find a set of diverse solutions that are uniformly distributed along the efficient frontier.Keywords: bicriteria, correlated parallel machines, heuristic, scheduling
Procedia PDF Downloads 1418085 A Numerical Solution Based on Operational Matrix of Differentiation of Shifted Second Kind Chebyshev Wavelets for a Stefan Problem
Authors: Rajeev, N. K. Raigar
Abstract:
In this study, one dimensional phase change problem (a Stefan problem) is considered and a numerical solution of this problem is discussed. First, we use similarity transformation to convert the governing equations into ordinary differential equations with its boundary conditions. The solutions of ordinary differential equation with the associated boundary conditions and interface condition (Stefan condition) are obtained by using a numerical approach based on operational matrix of differentiation of shifted second kind Chebyshev wavelets. The obtained results are compared with existing exact solution which is sufficiently accurate.Keywords: operational matrix of differentiation, similarity transformation, shifted second kind chebyshev wavelets, stefan problem
Procedia PDF Downloads 4028084 Violence of Tyrant Children to Their Parents: An Interdisciplinary Approach
Authors: Marta Maria Aguilar Carceles, Ginesa Torrente Hernandez
Abstract:
The goal of the current study is focused on giving an interdisciplinary comprehension of an increased phenomenon in recent years: violence against parents. Violence can take different forms depending on the context and the vulnerability of the victims, but in this kind of situations, the relationship between parents and young people can become abusive and uncontrollable. Taking a sample from the Spanish Criminal Courts, this study explores those psychological and sociological factors that can contribute to the appearance and continuity of this kind of behaviors in minors. It is considered factors like the type of offence, presence or absence of psychopathology in the subjects, family aspects, or sociodemographic factors, getting a criminal profile of the minor and evaluating which measures are more efficient or adequate in each particular case. Finally, it will be discussed on how getting effective interventions and restorative responses to address teen violence against their parents within the Spanish Legal System.Keywords: criminality, legal system, parents, tyrant sons, violence
Procedia PDF Downloads 1468083 Climate Change and Food Security: The Legal Aspects with Special Focus on the European Union
Authors: M. Adamczak-Retecka, O. Hołub-Śniadach
Abstract:
Dangerous of climate change is now global problem and as such has a strategic priority also for the European Union. Europe and European citizens try to do their best to cut greenhouse gas emissions, moreover they substantially encourage other nations and regions to follow the same way. The European Commission and a number of Member States have developed adaptation strategies in order to help strengthen EU's resilience to the inevitable impacts of climate change. The EU has long been a driving force in international negotiations on climate change and was instrumental in the development of the UN Framework Convention on Climate Change. As the world's leading donor of development aid, the EU also provides substantial funding to help developing countries tackle climate change problem. Global warming influences human health, biodiversity, ecosystems but also many social and economic sectors. The aim of this paper is to focus on impact of claimant change on for food security. Food security challenges are directly related to globalization, climate change. It means that current and future food policy is exposed to all cross-cutting and that must be linked with environmental and climate targets, which supposed to be achieved. In the 7th EAP —The new general Union Environment Action Program to 2020, called “Living well, within the limits of our planet” EU has agreed to step up its efforts to protect natural capital, stimulate resource efficient, low carbon growth and innovation, and safeguard people’s health and wellbeing– while respecting the Earth’s natural limits.Keywords: climate change, food security, sustainable food consumption, climate governance
Procedia PDF Downloads 1798082 Finite Element Analysis of a Dynamic Linear Crack Problem
Authors: Brian E. Usibe
Abstract:
This paper addresses the problem of a linear crack located in the middle of a homogeneous elastic media under normal tension-compression harmonic loading. The problem of deformation of the fractured media is solved using the direct finite element numerical procedure, including the analysis of the dynamic field variables of the problem. A finite element algorithm that satisfies the unilateral Signorini contact constraint is also presented for the solution of the contact interaction of the crack faces and how this accounts for the qualitative and quantitative changes in the solution when determining the dynamic fracture parameter.Keywords: harmonic loading, linear crack, fracture parameter, wave number, FEA, contact interaction
Procedia PDF Downloads 428081 A Method for Improving the Embedded Runge Kutta Fehlberg 4(5)
Authors: Sunyoung Bu, Wonkyu Chung, Philsu Kim
Abstract:
In this paper, we introduce a method for improving the embedded Runge-Kutta-Fehlberg 4(5) method. At each integration step, the proposed method is comprised of two equations for the solution and the error, respectively. This solution and error are obtained by solving an initial value problem whose solution has the information of the error at each integration step. The constructed algorithm controls both the error and the time step size simultaneously and possesses a good performance in the computational cost compared to the original method. For the assessment of the effectiveness, EULR problem is numerically solved.Keywords: embedded Runge-Kutta-Fehlberg method, initial value problem, EULR problem, integration step
Procedia PDF Downloads 4638080 Supplier Selection by Considering Cost and Reliability
Authors: K. -H. Yang
Abstract:
Supplier selection problem is one of the important issues of supply chain problems. Two categories of methodologies include qualitative and quantitative approaches which can be applied to supplier selection problems. However, due to the complexities of the problem and lacking of reliable and quantitative data, qualitative approaches are more than quantitative approaches. This study considers operational cost and supplier’s reliability factor and solves the problem by using a quantitative approach. A mixed integer programming model is the primary analytic tool. Analyses of different scenarios with variable cost and reliability structures show that the effectiveness of this approach to the supplier selection problem.Keywords: mixed integer programming, quantitative approach, supplier’s reliability, supplier selection
Procedia PDF Downloads 3848079 Patterns of Problem Behavior of Out-Of-School Adolescents and Gender Difference in South Korea
Authors: Jaeyoung Lee, Minji Je
Abstract:
Objectives: The adolescents not attending school are named out-of-school adolescents. They are more vulnerable to health management and are likely to be exposed to a number of risk factors. This study was conducted to investigate the problem behavior of out-of-school adolescents and analyze the difference caused by gender. Methods: In this study, the problem behaviors of out-of-school adolescents, the vulnerable class, were defined in 8 types and based on this definition, the survey on run away from home, drop out, prostitution, violence, internet game addiction, theft, drug addiction, and smoking was conducted. The study was conducted in a total of 507 out-of-school adolescents, including 342 males, and 165 females. The type, frequency and start time of the 8 problem behaviors were identified. The collected data were analyzed with chi-square test and t-test using SPSS statistics 22. Results: Among the problem behaviors of the subjects, violence ( =17.41, p < .001), internet game addiction ( =16.14, p < .001), theft ( =22.48, p < .001), drug addiction ( =4.17, p=.041), and smoking ( =3.90, p=.048) were more significantly high in male out-of-school adolescents than female out-of-school adolescents. In addition, the frequency of the problem behavior was higher in male out-of-school adolescents with statistical significance than in female out-of-school adolescents (t=5.08, p= < .001). In terms of the start time of the problem behavior, only internet game addiction was higher in male out-of-school adolescents with the statistical significance than in female out-of-school adolescents ( =6.22, p=.032). No statistically significant difference was found in other problem behaviors (p > .05). Conclusions: In this study, it was found that gender difference in problem behaviors of out-of-school adolescents exists, and its frequency and difference of types were identified. When the social countermeasures were provided for those adolescents, a distinguished approach is required depending on the patterns of problem behavior and gender. When preparing policy alternatives and interventions for out-of-school adolescents, it is required to reflect the results of this study.Keywords: addictive behavior, adolescent, gender, problem behavior
Procedia PDF Downloads 2058078 Pre-Service Teachers’ Reasoning and Sense Making of Variables
Authors: Olteanu Constanta, Olteanu Lucian
Abstract:
Researchers note that algebraic reasoning and sense making is essential for building conceptual knowledge in school mathematics. Consequently, pre-service teachers’ own reasoning and sense making are useful in fostering and developing students’ algebraic reasoning and sense making. This article explores the forms of reasoning and sense making that pre-service mathematics teachers exhibit and use in the process of analysing problem-posing tasks with a focus on first-degree equations. Our research question concerns the characteristics of the problem-posing tasks used for reasoning and sense making of first-degree equations as well as the characteristics of pre-service teachers’ reasoning and sense making in problem-posing tasks. The analyses are grounded in a post-structuralist philosophical perspective and variation theory. Sixty-six pre-service primary teachers participated in the study. The results show that the characteristics of reasoning in problem-posing tasks and of pre-service teachers are selecting, exploring, reconfiguring, encoding, abstracting and connecting. The characteristics of sense making in problem-posing tasks and of pre-service teachers are recognition, relationships, profiling, comparing, laddering and verifying. Beside this, the connection between reasoning and sense making is rich in line of flight in problem-posing tasks, while the connection is rich in line of rupture for pre-service teachers.Keywords: first-degree equations, problem posing, reasoning, rhizomatic assemblage, sense-making, variation theory
Procedia PDF Downloads 1138077 Exploring the Intersection Between the General Data Protection Regulation and the Artificial Intelligence Act
Authors: Maria Jędrzejczak, Patryk Pieniążek
Abstract:
The European legal reality is on the eve of significant change. In European Union law, there is talk of a “fourth industrial revolution”, which is driven by massive data resources linked to powerful algorithms and powerful computing capacity. The above is closely linked to technological developments in the area of artificial intelligence, which has prompted an analysis covering both the legal environment as well as the economic and social impact, also from an ethical perspective. The discussion on the regulation of artificial intelligence is one of the most serious yet widely held at both European Union and Member State level. The literature expects legal solutions to guarantee security for fundamental rights, including privacy, in artificial intelligence systems. There is no doubt that personal data have been increasingly processed in recent years. It would be impossible for artificial intelligence to function without processing large amounts of data (both personal and non-personal). The main driving force behind the current development of artificial intelligence is advances in computing, but also the increasing availability of data. High-quality data are crucial to the effectiveness of many artificial intelligence systems, particularly when using techniques involving model training. The use of computers and artificial intelligence technology allows for an increase in the speed and efficiency of the actions taken, but also creates security risks for the data processed of an unprecedented magnitude. The proposed regulation in the field of artificial intelligence requires analysis in terms of its impact on the regulation on personal data protection. It is necessary to determine what the mutual relationship between these regulations is and what areas are particularly important in the personal data protection regulation for processing personal data in artificial intelligence systems. The adopted axis of considerations is a preliminary assessment of two issues: 1) what principles of data protection should be applied in particular during processing personal data in artificial intelligence systems, 2) what regulation on liability for personal data breaches is in such systems. The need to change the regulations regarding the rights and obligations of data subjects and entities processing personal data cannot be excluded. It is possible that changes will be required in the provisions regarding the assignment of liability for a breach of personal data protection processed in artificial intelligence systems. The research process in this case concerns the identification of areas in the field of personal data protection that are particularly important (and may require re-regulation) due to the introduction of the proposed legal regulation regarding artificial intelligence. The main question that the authors want to answer is how the European Union regulation against data protection breaches in artificial intelligence systems is shaping up. The answer to this question will include examples to illustrate the practical implications of these legal regulations.Keywords: data protection law, personal data, AI law, personal data breach
Procedia PDF Downloads 65