Search results for: data protection laws
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 27341

Search results for: data protection laws

26861 A Case for Ethics Practice under the Revised ISO 14001:2015

Authors: Reuben Govender, M. L. Woermann

Abstract:

The ISO 14001 management system standard was first published in 1996. It is a voluntary standard adopted by both private and public sector organizations globally. Adoption of the ISO 14001 standard at the corporate level is done to help manage business impacts on the environment e.g. pollution control. The International Organization for Standardization (ISO) revised the standard in 2004 and recently in 2015. The current revision of the standard appears to adopt a communitarian-type philosophy. The inclusion of requirements to consider external 'interested party' needs and expectations implies this philosophy. Therefore, at operational level businesses implementing ISO 14001 will have to consider needs and expectations beyond local laws. Should these external needs and expectations be included in the scope of the environmental management system, they become requirements to be complied with in much the same way as compliance to laws. The authors assert that the recent changes to ISO 14001 introduce an ethical dimension to the standard. The authors assert that business ethics as a discipline now finds relevance in ISO 14001 via contemporary stakeholder theory and discourse ethics. Finally, the authors postulate implications of (not) addressing these requirements before July 2018 when transition to the revised standard must be complete globally.

Keywords: business ethics, environmental ethics, ethics practice, ISO 14001:2015

Procedia PDF Downloads 261
26860 An Analysis of Urban Institutional Arrangements and Their Implications on Wetlands Allocation for Development Purposes: A Case of Harare, Zimbabwe

Authors: Effort M. Magoso

Abstract:

This study analyses urban institutional arrangements and their implications on allocation of wetlands for development purposes in Zimbabwe using a case study of Harare. It was driven by the need to get to the root of the current urban assault on wetlands. The study sought to analyse institutions that influence wetlands governance in Harare, to ascertain level of wetlands loss and to determine the adequacy of the legal and regulatory framework for governing wetlands. Theories of common property resources and of institutions are the paradigms that undergird this study. A qualitative research methodology was employed, while in-depth interviews, observations and document review were used to gather data. The study found out that unchecked infrastructure developments are taking place in the city’s wetlands. Urban institutional arrangements in Harare were exposed as having negative implications on the protection of wetlands. It is the key argument of this study that good institutional arrangements are priceless in the protection of commons such as wetlands. This study also recommends a new framework that has environmentalists and technocrats as the final decision maker in land allocation as the solution to protect wetlands from undue anthropogenic activities.

Keywords: institutional arrangements, common property resources, wetlands, institutions

Procedia PDF Downloads 388
26859 Exploring the Prevailing Unfairness in Muslim Marriage and Divorce Laws in Singapore's Dual Court System

Authors: J. Jayaletchmi

Abstract:

In seeking to manage a multiracial and multi-religious society, Singapore provides a unique solution – a dual court system whereby a common law system co-exists with a Syariah law system that administers Syariah law for the Muslim population. In this respect, Singapore seems to provide a feasible example of legal pluralism to countries grappling with a burgeoning Muslim population. However, problems have arisen regarding this peaceful coexistence of secular and religious laws that seek to balance the rights of women and religious freedom. Singapore’s interpretation of Syariah law in the context of marriage and divorce has resulted in certain inequalities for Muslim women, which are exemplified in light of the Women’s Charter, a landmark piece of legislation which provides the legal basis for equity between husband and wife, but excludes Muslims from its ambit. The success of Singapore’s dual court system has largely been at the expense of Muslim women’s rights, and, as a result, the Muslim community as a whole has begun trailing behind the progressive society it forms a part of. This paper explores the prevailing unfairness of rules governing Muslim marriage and divorce in Singapore, and puts forth bold reforms.

Keywords: legal pluralism, Singapore, Syariah law, women’s rights

Procedia PDF Downloads 254
26858 Implementation of Invisible Digital Watermarking

Authors: V. Monisha, D. Sindhuja, M. Sowmiya

Abstract:

Over the decade, the applications about multimedia have been developed rapidly. The advancement in the communication field at the faster pace, it is necessary to protect the data during transmission. Thus, security of multimedia contents becomes a vital issue, and it is a need for protecting the digital content against malfunctions. Digital watermarking becomes the solution for the copyright protection and authentication of data in the network. In multimedia applications, embedded watermarks should be robust, and imperceptible. For improving robustness, the discrete wavelet transform is used. Both encoding and extraction algorithm can be done using MATLAB R2012a. In this Discrete wavelet transform (DWT) domain of digital image, watermarking algorithm is used, and hardware implementation can be done on Xilinx based FPGA.

Keywords: digital watermarking, DWT, robustness, FPGA

Procedia PDF Downloads 413
26857 Deep Well-Grounded Magnetite Anode Chains Retrieval and Installation for Raslanuf Complex Impressed Current Cathodic Protection System Rectification

Authors: Mohamed Ahmed Khalil

Abstract:

The number of deep well anode ground beds (GBs) have been retrieved due to unoperated anode chains. New identical magnetite anode chains (MAC) have been installed at Raslanuf complex impressed current Cathodic protection (ICCP) system, distributed at different plants (Utility, ethylene and polyethylene). All problems associated with retrieving and installation of MACs have been discussed, rectified and presented. All GB-associated severely corroded wellhead casings were well maintained and/or replaced by new fabricated and modified ones. The main cause of the wellhead casing's severe internal corrosion was discussed and the conducted remedy action to overcome future corrosion problems is presented. All GB-connected anode junction boxes (AJBs) and shunts were closely inspected, maintained and necessary replacement and/or modifications were carried out on shunts. All damaged GB concrete foundations (CF) have been inspected and completely replaced. All GB-associated Transformer-Rectifiers Units (TRU) were subjected to thorough inspection and necessary maintenance was performed on each individual TRU. After completion of all MACs and TRU maintenance activities, each cathodic protection station (CPS) has been re-operated, alternative current (AC), direct current (DC), voltage and structure to soil potential (S/P) measurements have been conducted, recorded and all obtained test results are presented. DC current outputs have been adjusted and DC current outputs of each MAC have been recorded for each GB AJB.

Keywords: magnetite anodes, deep well, ground beds, cathodic protection, transformer rectifier, impressed current, junction boxes

Procedia PDF Downloads 119
26856 The Concentration of Natural Alpha Emitters Radionuclides in Fish and Their Contribution to the Internal Dose

Authors: Wagner Pereira, Alphonse Kelecom

Abstract:

Mining can impact the environment, and the major impact of some mining activities is the radiological impact. In human populations, such impact is well studied and regulated. For biota, this assessment always had as focus the protection of human food chain. The protection of biota itself is a new approach, still developing. In order to contribute to this new approach, fish collecting was carried out in areas of naturally occurring radioactive materials (NORM), where a uranium mine is in decommissioning phase. The activity concentrations were analyzed, in Bq/kg wet weight, for Uranium (Unat), Th-232 and Ra-226 in the lambari fish Astyanax bimaculatus L. (omnivorous fish) and in the traíra fish Hoplias malabaricus Bloch, 1794 (carnivorous fish). Seven composite samples (that is: a sufficient number of individuals to reach at least 2 kg of fresh weight) were collected every six months between 2013 and 2015. The mean activity concentrations (AC) for uranium ranged from 1.12 (lambari) to 0.60 (lungfish). For Th, variations ranged from 0.30 to 0.05 (lambari and traíra, respectively). Finally, the Ra-226 means ranged between 0.08 and 0.03. No temporal trends of accumulation could be identified. Systematically, the AC values of radionuclides were higher in omnivorous fish when compared to the carnivore ones.

Keywords: biota dose, NORM, fish, environmental protection

Procedia PDF Downloads 258
26855 Applying Intelligent Material in Food Packaging

Authors: Kasra Ghaemi, Syeda Tasnim, Shohel Mahmud

Abstract:

One of the main issues affecting the quality and shelf life of food products is temperature fluctuation during transportation and storage. Packaging plays an important role in protecting food from environmental conditions, especially thermal variations. In this study, the performance of using microencapsulated Phase Change Material (PCM) as a promising thermal buffer layer in smart food packaging is investigated. The considered insulation layer is evaluated for different thicknesses and the absorbed heat from the environment. The results are presented in terms of the melting time of PCM or provided thermal protection period.

Keywords: food packaging, phase change material, thermal buffer, protection time

Procedia PDF Downloads 94
26854 Water Quality and Coastal Management Profile Assessment of Puerto Galera Bay, Philippines

Authors: Ma. Manna Farrel B. Pinto

Abstract:

As global industrialization progresses, the environment remains to be at risk of disturbances brought by developments of cities and communities. Impacts of flourishing industries such as tourism require rapid growth of establishments and may threaten ecosystems and natural resources. Puerto Galera as a biosphere reserve and declared as the Center of the World’s Center of Marine Shorefish Biodiversity is on the brink of ecological deterioration as tourism further develops in its coastal areas. Apparently, attempts were initiated to establish a baseline for designation of protection in the economic and coastal marine zones of Puerto Galera but continuity of its implementation and coordination of concerned units remains deficient. Indications of eutrophication have been observed based on water quality analysis although parameter values still comply with the national standards for coastal waters. Water quality data, biodiversity and hydrodynamic information, gathered from studies, and local government units were analysed to assess the condition of the coast as well as acting policies implemented by the local authorities. Sources of contaminants were also located in its three main communities, and their shores wherein in recommendations for installing wastewater treatment facilities and further improvement of policies of waste discharge must be addressed. With a conceptual framework proposed in the study, a comprehensive data analysis and coordinated management are necessary to form an integrated coastal management for further protection and preservation of the sustainable coastal marine ecosystem of Puerto Galera.

Keywords: coastal management, environmental management, integrated resource management, Puerto Galera

Procedia PDF Downloads 267
26853 Data Transformations in Data Envelopment Analysis

Authors: Mansour Mohammadpour

Abstract:

Data transformation refers to the modification of any point in a data set by a mathematical function. When applying transformations, the measurement scale of the data is modified. Data transformations are commonly employed to turn data into the appropriate form, which can serve various functions in the quantitative analysis of the data. This study addresses the investigation of the use of data transformations in Data Envelopment Analysis (DEA). Although data transformations are important options for analysis, they do fundamentally alter the nature of the variable, making the interpretation of the results somewhat more complex.

Keywords: data transformation, data envelopment analysis, undesirable data, negative data

Procedia PDF Downloads 20
26852 Reconceptualising the Voice of Children in Child Protection

Authors: Sharon Jackson, Lynn Kelly

Abstract:

This paper proposes a conceptual review of the interdisciplinary literature which has theorised the concept of ‘children’s voices’. The primary aim is to identify and consider the theoretical relevance of conceptual thought on ‘children’s voices’ for research and practice in child protection contexts. Attending to the ‘voice of the child’ has become a core principle of social work practice in contemporary child protection contexts. Discourses of voice permeate the legislative, policy and practice frameworks of child protection practices within the UK and internationally. Voice is positioned within a ‘child-centred’ moral imperative to ‘hear the voices’ of children and take their preferences and perspectives into account. This practice is now considered to be central to working in a child-centered way. The genesis of this call to voice is revealed through sociological analysis of twentieth-century child welfare reform as rooted inter alia in intersecting political, social and cultural discourses which have situated children and childhood as cites of state intervention as enshrined in the 1989 United Nations Convention on the Rights of the Child ratified by the UK government in 1991 and more specifically Article 12 of the convention. From a policy and practice perspective, the professional ‘capturing’ of children’s voices has come to saturate child protection practice. This has incited a stream of directives, resources, advisory publications and ‘how-to’ guides which attempt to articulate practice methods to ‘listen’, ‘hear’ and above all – ‘capture’ the ‘voice of the child’. The idiom ‘capturing the voice of the child’ is frequently invoked within the literature to express the requirements of the child-centered practice task to be accomplished. Despite the centrality of voice, and an obsession with ‘capturing’ voices, evidence from research, inspection processes, serious case reviews, child abuse and death inquires has consistently highlighted professional neglect of ‘the voice of the child’. Notable research studies have highlighted the relative absence of the child’s voice in social work assessment practices, a troubling lack of meaningful engagement with children and the need to more thoroughly examine communicative practices in child protection contexts. As a consequence, the project of capturing ‘the voice of the child’ has intensified, and there has been an increasing focus on developing methods and professional skills to attend to voice. This has been guided by a recognition that professionals often lack the skills and training to engage with children in age-appropriate ways. We argue however that the problem with ‘capturing’ and [re]representing ‘voice’ in child protection contexts is, more fundamentally, a failure to adequately theorise the concept of ‘voice’ in the ‘voice of the child’. For the most part, ‘The voice of the child’ incorporates psychological conceptions of child development. While these concepts are useful in the context of direct work with children, they fail to consider other strands of sociological thought, which position ‘the voice of the child’ within an agentic paradigm to emphasise the active agency of the child.

Keywords: child-centered, child protection, views of the child, voice of the child

Procedia PDF Downloads 136
26851 Geosynthetic Containment Systems for Coastal Protection: An Indian Perspective

Authors: Tom Elias, Kiran G. Shirlal

Abstract:

Coastal erosion is one of the major issue faced by maritime countries, globally. More than 1200 km stretch of Indian coastline is marked eroding. There have been numerous attempts to impede the erosion rate and to attain equilibrium beach profiles. High cost and unavailability of natural rocks forced coastal engineers to find alternatives for conventional hard options like seawalls and groynes. Geosynthetic containment systems, emerged in the mid 20th century proved promising in catering coastal protection in countries like Australia, Germany and United States. The present study aims at reviewing Indian timeline of protection works that uses geosynthetic containment systems. Indian exploration regarding geosynthetic containment system dates back to early 2000s. Generally, protection structures use geosynthetics in the form of Geotubes, Geocontainers, and Geobags with Geotubes being most widely used in the form of submerged reefs, seawalls, groynes and breakwaters. Sand and dredged waste are used to fill these containment systems with calculated sand fill ratio. Reviewing the prominent protection works constructed in the east and west coast of India provides an insight into benefits and the difficulties faced by the practical installation. Initially, geosynthetic structures were considered as a temporary protection method prior to the construction of some other hard structure. Later Dahanu, Hamala and Pentha experiences helped in establishing geotubes as an alternative to conventional structures. Nearshore geotubes reefs aimed to attain equilibrium beach served its purpose in Hamala and Dahanu, Maharashtra, while reef constructed at Candolim, Goa underwent serious damage due to Toe Scour. In situ filling by pumping of sand slurry as in case of Shankarpur Seawall, West Bengal remains as a major concern. Geosynthetic systems supplemented by gabions and rock armours improves the wave dissipation, stability and reflection characteristics as implied in Pentha Coast, Odisha, Hazira, Gujarat and Uppada, Andhra Pradesh. Keeping improper design and deliberate destruction by vandals apart, geosynthetic containment systems offer a cost-effective alternative to conventional coastal protection methods in India. Additionally, geosynthetics supports marine growth in its surface which enhances its demand as an eco-friendly material and encourages usage.

Keywords: coastal protection, geotubes, geobags, geocontainers

Procedia PDF Downloads 150
26850 Education in the Constitutions: The Comparison of Turkey with Indonesia, France, Japan, South Africa, and the United States of America

Authors: Mehmet Durnali

Abstract:

The main purpose of this study is to find out, analyze and discuss basic principles of education and training in the constitutions, including the latest amendment, of France, Indonesia, Japan, South Africa, the United States of America, and Turkey. This research specifically aims at establishing a framework in order to compare educational values such as right of education, responsibilities of states and those of people, and other issues pertaining to education in the Constitution of Turkey to others. Additionally, it emphasizes the meaning of education in constitution, the reasons for references to education in constitutions and why it is important for people, states or nations and state organs. Qualitative analysis technique is performed to accomplish the aim of this study. Maximum variation sampling is used. The main data source of the analysis is official organic laws of those countries. The data is examined by using descriptive and content analysis method.

Keywords: education in the constitution, education law, legal principles of education, right to education

Procedia PDF Downloads 316
26849 Taxation, Evidential and Jurisdictional Issues in Electronic Commercial Transactions in Nigeria

Authors: Michael Sunday Afolayan

Abstract:

This research work examined the challenges bedevilling the development of legal framework for electronic commercial transactions (e-commerce) in Nigeria. Nigeria does not have a clear-cut legislation regulating electronic commerce in its jurisdiction despite the geometrical rate of growth and adoption of this method of trade. It specifically posed a great challenge looking at taxation, evidential and jurisdictional issues in e-commerce in Nigeria. The author in a broader research work which is abridged here, traced the origin and development of e-commerce and the attendant laws applicable in Nigeria, examining their sufficiency or otherwise. In carrying out the research work, doctrinal mode of legal research was adopted, examining both primary and secondary sources of legal research materials within their contextual meanings. It was found that the failure to enact a law which has direct regulatory bearing on e-commerce in Nigeria has led to adoption and application of circumstantial laws, rules and common law principles to tackle the problems arising out of electronic commercial transactions, especially in the areas of taxation, evidential and jurisdictional challenges. It was ultimately suggested that there is urgent need to sign into law, the Electronic Transaction Bill which had already been passed by the National Assembly since 2017.

Keywords: e-commerce, legislation, taxation, evidential, jurisdiction

Procedia PDF Downloads 86
26848 Security of Database Using Chaotic Systems

Authors: Eman W. Boghdady, A. R. Shehata, M. A. Azem

Abstract:

Database (DB) security demands permitting authorized users and prohibiting non-authorized users and intruders actions on the DB and the objects inside it. Organizations that are running successfully demand the confidentiality of their DBs. They do not allow the unauthorized access to their data/information. They also demand the assurance that their data is protected against any malicious or accidental modification. DB protection and confidentiality are the security concerns. There are four types of controls to obtain the DB protection, those include: access control, information flow control, inference control, and cryptographic. The cryptographic control is considered as the backbone for DB security, it secures the DB by encryption during storage and communications. Current cryptographic techniques are classified into two types: traditional classical cryptography using standard algorithms (DES, AES, IDEA, etc.) and chaos cryptography using continuous (Chau, Rossler, Lorenz, etc.) or discreet (Logistics, Henon, etc.) algorithms. The important characteristics of chaos are its extreme sensitivity to initial conditions of the system. In this paper, DB-security systems based on chaotic algorithms are described. The Pseudo Random Numbers Generators (PRNGs) from the different chaotic algorithms are implemented using Matlab and their statistical properties are evaluated using NIST and other statistical test-suits. Then, these algorithms are used to secure conventional DB (plaintext), where the statistical properties of the ciphertext are also tested. To increase the complexity of the PRNGs and to let pass all the NIST statistical tests, we propose two hybrid PRNGs: one based on two chaotic Logistic maps and another based on two chaotic Henon maps, where each chaotic algorithm is running side-by-side and starting from random independent initial conditions and parameters (encryption keys). The resulted hybrid PRNGs passed the NIST statistical test suit.

Keywords: algorithms and data structure, DB security, encryption, chaotic algorithms, Matlab, NIST

Procedia PDF Downloads 265
26847 Determination of Safety Distance Around Gas Pipelines Using Numerical Methods

Authors: Omid Adibi, Nategheh Najafpour, Bijan Farhanieh, Hossein Afshin

Abstract:

Energy transmission pipelines are one of the most vital parts of each country which several strict laws have been conducted to enhance the safety of these lines and their vicinity. One of these laws is the safety distance around high pressure gas pipelines. Safety distance refers to the minimum distance from the pipeline where people and equipment do not confront with serious damages. In the present study, safety distance around high pressure gas transmission pipelines were determined by using numerical methods. For this purpose, gas leakages from cracked pipeline and created jet fires were simulated as continuous ignition, three dimensional, unsteady and turbulent cases. Numerical simulations were based on finite volume method and turbulence of flow was considered using k-ω SST model. Also, the combustion of natural gas and air mixture was applied using the eddy dissipation method. The results show that, due to the high pressure difference between pipeline and environment, flow chocks in the cracked area and velocity of the exhausted gas reaches to sound speed. Also, analysis of the incident radiation results shows that safety distances around 42 inches high pressure natural gas pipeline based on 5 and 15 kW/m2 criteria are 205 and 272 meters, respectively.

Keywords: gas pipelines, incident radiation, numerical simulation, safety distance

Procedia PDF Downloads 332
26846 Protection of the Rights of Outsourced Employees and the Effect on Job Performance in Nigerian Banking Sector

Authors: Abiodun O. Ibude

Abstract:

Several organizations have devised the strategy of engaging the services of staff not directly employed by them in their production and service delivery. Some organizations also engage on contracting another organization to carry out a part of service or production process on their behalf. Outsourcing is becoming an important alternative employment option for most organizations. This paper attempts an exposition on the rights of workers within the more specific context of outsourcing as a human resource management phenomenon. Outsourced employees and their rights are treated conceptually and analytically in a generic sense as a mere subset of the larger whole, that is, labor. Outsourced employees derive their rights, like all workers, from their job context as well as the legal environment (municipal and global) in which they operate. The dynamics of globalization and the implications of this development for labor practices receive considerable attention in this exposition. In this regard, a guarded proposition is made, to examine the practice and effect of engaging outsourcing as an economic decision designed primarily to cut down on operational costs rather than a Human Resources Management decision to improve worker welfare. The population of the study was selected from purposive and simple random sampling techniques. Data obtained were analyzed through a simple percentage, Pearson product-moment correlation, and cross-tabulation. From the research conducted, it was discovered that, although outsourcing possesses opportunities for organizations, there are drawbacks arising from its implementation of job securities. It was also discovered that some employees are being exploited through this strategy. This gives rise to lower motivation and thereby decline in performance. In conclusion, there is need for examination of Human Resource Managers’ strategies that can serve as management policy tools for the protection of the rights of outsourced employees.

Keywords: legal environment, operational cost, outsourcing, protection

Procedia PDF Downloads 127
26845 Numerical Aeroacoustics Investigation of Eroded and Coated Leading Edge of NACA 64- 618 Airfoil

Authors: Zeinab Gharibi, B. Stoevesandt, J. Peinke

Abstract:

Long term surface erosion of wind turbine blades, especially at the leading edge, impairs aerodynamic performance; therefore, lowers efficiency of the blades mostly in the high-speed rotor tip regions. Blade protection provides significant improvements in annual energy production, reduces costly downtime, and protects the integrity of the blades. However, this protection still influences the aerodynamic behavior, and broadband noise caused by interaction between the impinging turbulence and blade’s leading edge. This paper presents an extensive numerical aeroacoustics approach by investigating the sound power spectra of the eroded and coated NACA 64-618 wind turbine airfoil and evaluates aeroacoustics improvements after the protection procedure. Using computational fluid dynamics (CFD), different quasi 2D numerical grids were implemented and special attention was paid to the refinement of the boundary layers. The noise sources were captured and decoupled with acoustic propagation via the derived formulation of Curle’s analogy implemented in OpenFOAM. Therefore, the noise spectra were compared for clean, coated and eroded profiles in the range of chord-based Reynolds number (1.6e6 ≤ Re ≤ 11.5e6). Angle of attack was zero in all cases. Verifications were conducted for the clean profile using available experimental data. Sensitivity studies for the far-field were done on different observational positions. Furthermore, beamforming studies were done simulating an Archimedean spiral microphone array for far-field noise directivity patterns. Comparing the noise spectra of the coated and eroded geometries, results show that, coating clearly improves aerodynamic and acoustic performance of the eroded airfoil.

Keywords: computational fluid dynamics, computational aeroacoustics, leading edge, OpenFOAM

Procedia PDF Downloads 223
26844 Therapeutic Effects of Toll Like Receptor 9 Ligand CpG-ODN on Radiation Injury

Authors: Jianming Cai

Abstract:

Exposure to ionizing radiation causes severe damage to human body and an safe and effective radioprotector is urgently required for alleviating radiation damage. In 2008, flagellin, an agonist of TLR5, was found to exert radioprotective effects on radiation injury through activating NF-kB signaling pathway. From then, the radioprotective effects of TLR ligands has shed new lights on radiation protection. CpG-ODN is an unmethylated oligonucleotide which activates TLR9 signaling pathway. In this study, we demonstrated that CpG-ODN has therapeutic effects on radiation injuries induced by γ ray and 12C6+ heavy ion particles. Our data showed that CpG-ODN increased the survival rate of mice after whole body irradiation and increased the number of leukocytes as well as the bone marrow cells. CpG-ODN also alleviated radiation damage on intestinal crypt through regulating apoptosis signaling pathway including bcl2, bax, and caspase 3 etc. By using a radiation-induced pulmonary fibrosis model, we found that CpG-ODN could alleviate structural damage, within 20 week after whole–thorax 15Gy irradiation. In this model, Th1/Th2 imbalance induced by irradiation was also reversed by CpG-ODN. We also found that TGFβ-Smad signaling pathway was regulated by CpG-ODN, which accounts for the therapeutic effects of CpG-ODN in radiation-induced pulmonary injury. On another hand, for high LET radiation protection, we investigated protective effects of CpG-ODN against 12C6+ heavy ion irradiation and found that after CpG-ODN treatment, the apoptosis and cell cycle arrest induced by 12C6+ irradiation was reduced. CpG-ODN also reduced the expression of Bax and caspase 3, while increased the level of bcl2. Then we detected the effect of CpG-ODN on heavy ion induced immune dysfunction. Our data showed that CpG-ODN increased the survival rate of mice and also the leukocytes after 12C6+ irradiation. Besides, the structural damage of immune organ such as thymus and spleen was also alleviated by CpG-ODN treatment. In conclusion, we found that TLR9 ligand, CpG-ODN reduced radiation injuries in response to γ ray and 12C6+ heavy ion irradiation. On one hand, CpG-ODN inhibited the activation of apoptosis induced by radiation through regulating bcl2, bax and caspase 3. On another hand, through activating TLR9, CpG-ODN recruit MyD88-IRAK-TRAF6 complex, activating TAK1, IRF5 and NF-kB pathway, and thus alleviates radiation damage. This study provides novel insights into protection and therapy of radiation damages.

Keywords: TLR9, CpG-ODN, radiation injury, high LET radiation

Procedia PDF Downloads 480
26843 Afghan Women’s Perceptions on Domestic Violence and Child Protection in Finland

Authors: Laleh Golamrej Eliasi

Abstract:

Finland is the second most violent country for women in the European Union (EU). 47% of women in Finland claimed to have experienced domestic violence against women (DVAW), compared to an average of 33% in the EU. Although the statistics in Finland are transparent, to the author’s best knowledge, there are no statisticsonDV by nationality in Finland. On the other hand, being a Muslim woman in a non-Muslim-majority country represents a position of double vulnerability to violence. There are 10404 Afghan refugees in Finland who are Muslim. Barriers such as unfamiliarity with support services, fear of the police, racism, language, economic and practical dependence, social isolation, and family commitments all lead to a lack of reporting of DVAW among migrants. Although witnessing and experiencing DV have devastating effects on women’s and children’s health and well-being, there is a lack of studies about DVAW among Afghan families in Finland. To fill this knowledge gap, Afghan women living in Finland are selected as the target group to assess their views on DVAW and child protection. This study is implemented in the socio-ecological approach framework to assess the impacts of individual characteristics, interpersonal relationships, community, and society components on DVAW in Afghan families. Interviews with Afghan women and content analysis are used to find out participants' views on DVAW, its risk factors, and approaches and methods to improve protection for women and children. Main purpose is to obtain information about participants' views on the subject. The findings can be used to improve culturally safe social work knowledge and practices with a bottom-up approach to reduce DV and increase child protection. Therefore, this research can have important effects on the sustainable development of services and supports the welfare and inclusion of immigrant families. The expected results will contribute to sustainable gender equality, which is in line with the fifth goal of the Sustainable Development Goals.

Keywords: domestic violence, immigrant women, immigrant child protection, social work

Procedia PDF Downloads 84
26842 Body, Sex and Culture: Gender Dissidences through Cinema

Authors: Piedad Lucia Bolivar Goez, Daniel Ignacio Garzon Luna, Maria Camila Balcero Angel, Sara Carolina Martinez Roman, Daniela Natalia Polo Rivas, Sandra Liliana Rocha Guitierrez

Abstract:

This article provides a critical analysis on the conception of disorders of sexual development (DSDs) within the bioethics framework. By means of analytical thought, the objective is to approach topics such as the rediscovery of the body, the reinvention of sexuality and link them to the liability that health personnel have to inform people about the options they have to decide over their health and body. The medicalization of sexed bodies in both psychosocial and anatomo-morpho-physiological dimensions from a legal standpoint were analyzed. Its also explored the gender stereotypes established by society and the role of laws in guaranteeing the right of autonomy that takes on greater relevance in DSD. Through this analysis, it was concluded that despite intersexuality having been analyzed by Colombia’s Constitutional Court, that it is stated as a fair entity, the stigmatization by society has not allowed these individuals to belong to an egalitarian context in which everyone has the same opportunities of access to the goods and services that they need. This leads individuals to hide their identity and expression of genre in order to be accepted in a set of contexts. Thus creating a vulnerability that the health system must be able to identify and in which it is necessary to intervene at a biopsychosocial level, in order to guarantee the protection of the individual within an unquestionable frame of equality and solidarity.

Keywords: disorders of sex development, gender identity, sexuality, transgender persons

Procedia PDF Downloads 192
26841 Sustainable Composites for Aircraft Cabin Interior Applications

Authors: Fiorenzo Lenzi, Doris Abt, Besnik Bytyqi

Abstract:

Recent developments in composite materials for the interior cabin market provide more sustainable solutions for industrial applications. One contribution comes from epoxy-based prepregs recently developed to substitute phenolic prepregs in order to reduce the environmental impact of their production process and to eliminate health and safety issues related to their handling. Another example is the use of Mica-based products for improving the fire protection of interior cabin parts. Minerals, such as Mica, can be used as reinforcement in composites to reduce the heat release rate or, more traditionally, to improve the burn-through performance of fuselage and cargo lining components.

Keywords: prepreg, epoxy, Mica, battery protection

Procedia PDF Downloads 83
26840 The Transnationalization of Anti-Corruption Compliance Programs in Latin America

Authors: Hitalo Silva

Abstract:

The most famous corruption scandals in the past four years were taken in Latin America, especially in Brazil, but besides the stain that these countries suffered in an international field, there was a huge effort to create or modernize its national anti-corruption laws. Also, the countries are implementing new standards for investigations and corporate compliance programs, in order to combat corruption and prevent the money laundering. But here is the following question: is here an invisible uniformization/transnationalization of the anti-corruption systems in Latin America? This new scenario reflects the impacts of the corruption investigations conducted in Latin America countries, such as Car Wash Operation in Brazil, Pretelt Case in Colombia, Gasoducto Sur Peruano case and the Mr. Alex Kouri’s case both in Peru. Legal and institutional pro-transparency reforms were made recently, the companies are trying to implement new standards of conduct and investing in their compliance department. In this sense, there is a huge homogeneity in Latin America concerning the structuring of corporate compliance programs, a truly transnationalization not only of laws but also corporate standards among these countries. Although legislative initiatives vary among the countries, there is a tendency to impose rigid liability standards for the companies being investigated for corruption, not only the personal punishments of their executives, which demonstrate the power of authorities to strength the investigative tools. Also, instruments such as leniency agreements and plea bargain are essential to put a central role in enforcement activities in Latin America. In other words, in a region where six former Presidents were convicted for acts of corruption, and, companies such as Odebrecht that is accused of offering bribes to politicians from Argentina to México, passing through Ecuador, Colombia, Guatemala and Panama, this demonstrates the necessity to increase strength of their legal framework in a sense that unify transnational goals. All things considered, this paper will show how anti-corruption regulators are cooperating in Latin America jurisdictions in order to unify their laws and how the private sector is dealing with this new scenario of corporate culture change.

Keywords: compliance, corruption, investigations, Latin America, transnational

Procedia PDF Downloads 125
26839 Failure Statistics Analysis of China’s Spacecraft in Full-Life

Authors: Xin-Yan Ji

Abstract:

The historical failures data of the spacecraft is very useful to improve the spacecraft design and the test philosophies and reduce the spacecraft flight risk. A study of spacecraft failures data was performed, which is the most comprehensive statistics of spacecrafts in China. 2593 on-orbit failures data and 1298 ground data that occurred on 150 spacecraft launched from 2000 to 2016 were identified and collected, which covered the navigation satellites, communication satellites, remote sensing deep space exploration manned spaceflight platforms. In this paper, the failures were analyzed to compare different spacecraft subsystem and estimate their impact on the mission, then the development of spacecraft in China was evaluated from design, software, workmanship, management, parts, and materials. Finally, the lessons learned from the past years show that electrical and mechanical failures are responsible for the largest parts, and the key solution to reduce in-orbit failures is improving design technology, enough redundancy, adequate space environment protection measures, and adequate ground testing.

Keywords: spacecraft anomalies, anomalies mechanism, failure cause, spacecraft testing

Procedia PDF Downloads 116
26838 Development of an Systematic Design in Evaluating Force-On-Force Security Exercise at Nuclear Power Plants

Authors: Seungsik Yu, Minho Kang

Abstract:

As the threat of terrorism to nuclear facilities is increasing globally after the attacks of September 11, we are striving to recognize the physical protection system and strengthen the emergency response system. Since 2015, Korea has implemented physical protection security exercise for nuclear facilities. The exercise should be carried out with full cooperation between the operator and response forces. Performance testing of the physical protection system should include appropriate exercises, for example, force-on-force exercises, to determine if the response forces can provide an effective and timely response to prevent sabotage. Significant deficiencies and actions taken should be reported as stipulated by the competent authority. The IAEA(International Atomic Energy Agency) is also preparing force-on-force exercise program documents to support exercise of member states. Currently, ROK(Republic of Korea) is implementing exercise on the force-on-force exercise evaluation system which is developed by itself for the nuclear power plant, and it is necessary to establish the exercise procedure considering the use of the force-on-force exercise evaluation system. The purpose of this study is to establish the work procedures of the three major organizations related to the force-on-force exercise of nuclear power plants in ROK, which conduct exercise using force-on-force exercise evaluation system. The three major organizations are composed of licensee, KINAC (Korea Institute of Nuclear Nonproliferation and Control), and the NSSC(Nuclear Safety and Security Commission). Major activities are as follows. First, the licensee establishes and conducts an exercise plan, and when recommendations are derived from the result of the exercise, it prepares and carries out a force-on-force result report including a plan for implementation of the recommendations. Other detailed tasks include consultation with surrounding units for adversary, interviews with exercise participants, support for document evaluation, and self-training to improve the familiarity of the MILES (Multiple Integrated Laser Engagement System). Second, KINAC establishes a force-on-force exercise plan review report and reviews the force-on-force exercise plan report established by licensee. KINAC evaluate force-on-force exercise using exercise evaluation system and prepare training evaluation report. Other detailed tasks include MILES training, adversary consultation, management of exercise evaluation systems, and analysis of exercise evaluation results. Finally, the NSSC decides whether or not to approve the force-on-force exercise and makes a correction request to the nuclear facility based on the exercise results. The most important part of ROK's force-on-force exercise system is the analysis through the exercise evaluation system implemented by KINAC after the exercise. The analytical method proceeds in the order of collecting data from the exercise evaluation system and analyzing the collected data. The exercise application process of the exercise evaluation system introduced in ROK in 2016 will be concretely set up, and a system will be established to provide objective and consistent conclusions between exercise sessions. Based on the conclusions drawn up, the ultimate goal is to complement the physical protection system of licensee so that the system makes licensee respond effectively and timely against sabotage or unauthorized removal of nuclear materials.

Keywords: Force-on-Force exercise, nuclear power plant, physical protection, sabotage, unauthorized removal

Procedia PDF Downloads 141
26837 Energy Service Companies as a Facilitator for Implementation of Energy-Environment Conventions

Authors: Bahareh Arghand

Abstract:

The establishment of rules and regulations for more effective energy-environment interactions are essential to achieving sustainable development. Sustainable development requires mechanisms that can promote compliance in energy-environment conventions. There are many binding agreements and non-binding instruments at regional and international levels on energy and the environment. These conventions try to decrease conflicts of interest between energy, environment and economic by legal principles and practical mechanisms. The major core of conventions is their implementations because the poor implementation and enforcement power affect their success. In this regard, the main goal of this study is proposing the effective implementation mechanisms. Energy service companies' (ESCOs) activities can improve energy efficiency and decrease the environmental degradations. Therefore, it can be proposed and assessed the merit mechanism of ESCO performance as a facilitator to implement energy-environment conventions. An assessment of ESCO performance, including its potentials, problems, and limitations, as a facilitator for effective implementation of the energy-environment convention, is included. This study is oriented towards effective development and application of laws and the function of ESCOs as appropriate economic instruments and facilitator for implementation of energy-environment conventions. The resulting system of close cooperation between the energy-environment conventions and ESCOs is geared toward advancing environmental protection and economic factors by the transfer of environmentally-sound technologies that meet sustainable development objectives.

Keywords: energy-environment conventions, energy service company, facilitator mechanism, sustainable development

Procedia PDF Downloads 182
26836 Optimizing Protection of Medieval Glass Mosaic

Authors: J. Valach, S. Pospisil, S. Kuznecov

Abstract:

The paper deals with experimental estimation of future environmental load on medieval mosaic of Last Judgement on entrance to St. Vitus cathedral on Prague castle. The mosaic suffers from seasonal changes of weather pattern, as well as rains, their acidity, deposition of dust and sooth particles from polluted air and also from freeze-thaw cycles. These phenomena influence state of the mosaic. The mosaic elements, tesserae are mostly made from glass prone to weathering. To estimate future procedure of the best maintenance, relation between various weather scenarios and their effect on the mosaic was investigated. At the same time local method for evaluation of protective coating was developed. Together both methods will contribute to better care for the mosaic and also visitors aesthetical experience.

Keywords: environmental load, cultural heritage, glass mosaic, protection

Procedia PDF Downloads 280
26835 The Regulation of Reputational Information in the Sharing Economy

Authors: Emre Bayamlıoğlu

Abstract:

This paper aims to provide an account of the legal and the regulative aspects of the algorithmic reputation systems with a special emphasis on the sharing economy (i.e., Uber, Airbnb, Lyft) business model. The first section starts with an analysis of the legal and commercial nature of the tripartite relationship among the parties, namely, the host platform, individual sharers/service providers and the consumers/users. The section further examines to what extent an algorithmic system of reputational information could serve as an alternative to legal regulation. Shortcomings are explained and analyzed with specific examples from Airbnb Platform which is a pioneering success in the sharing economy. The following section focuses on the issue of governance and control of the reputational information. The section first analyzes the legal consequences of algorithmic filtering systems to detect undesired comments and how a delicate balance could be struck between the competing interests such as freedom of speech, privacy and the integrity of the commercial reputation. The third section deals with the problem of manipulation by users. Indeed many sharing economy businesses employ certain techniques of data mining and natural language processing to verify consistency of the feedback. Software agents referred as "bots" are employed by the users to "produce" fake reputation values. Such automated techniques are deceptive with significant negative effects for undermining the trust upon which the reputational system is built. The third section is devoted to explore the concerns with regard to data mobility, data ownership, and the privacy. Reputational information provided by the consumers in the form of textual comment may be regarded as a writing which is eligible to copyright protection. Algorithmic reputational systems also contain personal data pertaining both the individual entrepreneurs and the consumers. The final section starts with an overview of the notion of reputation as a communitarian and collective form of referential trust and further provides an evaluation of the above legal arguments from the perspective of public interest in the integrity of reputational information. The paper concludes with certain guidelines and design principles for algorithmic reputation systems, to address the above raised legal implications.

Keywords: sharing economy, design principles of algorithmic regulation, reputational systems, personal data protection, privacy

Procedia PDF Downloads 465
26834 A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence

Authors: Li Qiang, Yang Ze-Ming, Liu Bao-Xu, Jiang Zheng-Wei

Abstract:

With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain and evidence chain of cyber-attack on threat intelligence platform through data calculation, analysis and reasoning. Then, we used a number of cyber-attack events which we have observed and analyzed to test the reasoning method and demo system, the result of testing indicates that the reasoning method can provide certain help in cyber-attack attribution.

Keywords: reasoning, Bayesian networks, cyber-attack attribution, Kill Chain, threat intelligence

Procedia PDF Downloads 450
26833 Use of Recycled PVB as a Protection against Carbonation

Authors: Michael Tupý, Vít Petránek

Abstract:

The paper is focused on testing of the poly(vinyl butyral) (PVB) layer which had the function of a CO2 insulating protection against concrete and mortar carbonation. The barrier efficiency of PVB was verified by the measurement of diffusion characteristics. Two different types of PVB were tested; original extruded PVB sheet and PVB sheet made from PVB dispersion which was obtained from recycled windshields. The work deals with the testing CO2 diffusion when polymer sheets were exposed to a CO2 atmosphere (10% v/v CO2) with 0% RH. The excellent barrier capability against CO2 permeability of original and also recycled types of PVB layers was observed. This application of PVB waste can bring advantageous use in civil engineering and significant environmental contribution.

Keywords: windshield, poly(vinyl butyral), mortar, diffusion, carbonatation, polymer waste

Procedia PDF Downloads 423
26832 Intellectual Property Law as a Tool to Enhance and Sustain Museums in Digital Era

Authors: Nayira Ahmed Galal Elden Hassan, Amr Mostafa Awad Kassem

Abstract:

The management of Intellectual Property (IP) in museums can be complex and challenging, as it requires balancing access and control. On the one hand, museums must ensure that they have balanced permissions to display works in their collections and make them accessible to the public. On the other hand, they must also protect the rights of creators and owners of works and ensure that they are not infringing on IP rights. Intellectual property has become an increasingly important aspect of museum operations in the digital age. Museums hold a vast array of cultural assets in their collections, many of which have significant value as IP assets. The balanced management of IP in museums can help to generate additional revenue and promote cultural heritage, while also protecting the rights of the museum and its collections. Digital technologies have greatly impacted the way museums manage IP, providing new opportunities for revenue generation through e-commerce and licensing, while also presenting new challenges related to IP protection and management. Museums must take a comprehensive approach to IP management, leveraging digital technologies, protecting IP rights, and engaging in licensing and e-commerce activities to maximize income and the economy of countries through the strong management of cultural institutions. Overall, the balanced management of IP in museums is crucial for ensuring the sustainability of museum operations and for preserving cultural heritage for future generations. By taking a balanced approach to identifying museum IP assets, museums can generate revenues and secure their financial sustainability to ensure the long-term preservation of their cultural heritage. We can divide IP assets in museums to two kinds, collection IP and Museum generated IP. Certain museums become confused and lose sight of their mission when trying to leverage collections-based IP. This was the case at the German state Museum in Berlin when the museum made 100 replicas from Nefertiti bust which is an Egyptian artifacts and wrote under the replicas all rights reserved to the Berlin museum and issued a certificate to prevent any person or Institution from reproducing any replica from this bust. The implications of IP in museums are far-reaching and can have significant impacts on the preservation of cultural heritage, the dissemination of information, and the development of educational programs. As such, it is important for museums to have a comprehensive understanding of IP laws and regulations, and to properly manage IP to avoid legal liability, damage to reputation, and loss of revenue. The research aims to highlight the importance and role of intellectual property in museums and provide some illustrative examples of this.

Keywords: intellectual property, museums, cultural assets, IP management, digital technologies, revenue generation, licensing, IP protection, sustainability, cultural heritage

Procedia PDF Downloads 0