Search results for: protection for victim of trafficking
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2660

Search results for: protection for victim of trafficking

2180 Hybrid Energy Harvesting System with Energy Storage Management

Authors: Lucian Pîslaru-Dănescu, George-Claudiu Zărnescu, Laurențiu Constantin Lipan, Rareș-Andrei Chihaia

Abstract:

In recent years, the utilization of supercapacitors for energy storage (ES) devices that are designed for energy harvesting (EH) applications has increased substantially. The use of supercapacitors as energy storage devices in hybrid energy harvesting systems allows the miniaturization of electronic structures for energy storage. This study is concerned with the concept of energy management capacitors – supercapacitors and the new electronic structures for energy storage used for energy harvesting devices. Supercapacitors are low-voltage devices, and electronic overvoltage protection is needed for powering the source. The power management device that uses these proposed new electronic structures for energy storage is better than conventional electronic structures used for this purpose, like rechargeable batteries, supercapacitors, and hybrid systems. A hybrid energy harvesting system with energy storage management is able to simultaneously use several energy sources with recovery from the environment. The power management device uses a summing electronic block to combine the electric power obtained from piezoelectric composite plates and from a photovoltaic conversion system. Also, an overvoltage protection circuit used as a voltage detector and an improved concept of charging supercapacitors is presented. The piezoelectric composite plates are realized only by pressing two printed circuit boards together without damaging or prestressing the piezoceramic elements. The photovoltaic conversion system has the advantage that the modules are covered with glass plates with nanostructured film of ZnO with the role of anti-reflective coating and to improve the overall efficiency of the solar panels.

Keywords: supercapacitors, energy storage, electronic overvoltage protection, energy harvesting

Procedia PDF Downloads 82
2179 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: root of trust, secure boot, memory protection, hardware security

Procedia PDF Downloads 215
2178 Suspected Odyssean Malaria Outbreak in Gauteng Province, September 2014

Authors: Patience Manjengwa-Hungwe, Carmen White

Abstract:

Background: Odyssean malaria refers to malaria acquired by infected mosquito bites from malaria endemic to non-endemic regions by mechanical modes of transport, such as airplanes, water vessels, trains and vehicles. Odyssean Malaria is rare and is characterised by absence of travel history to malaria endemic areas. As not anticipated in non-endemic areas, late diagnosis and treatment lead to a high case fatality rate. On 26 September 2014, the Outbreak Response Unit at the National Institute of Communicable Diseases was notified of a suspected death from Odyssean Malaria in Johannesburg, Gauteng Province, a non-endemic area. The main objective of this investigation was to identify the etiological agent's mode and source of transmission. Methods: Epidemiological surveys were conducted with the deceased’s family and clinical details were obtained from doctors who treated the victim in Southrand, Johannesburg. Blood samples were collected prior to death and sent to the National Health Laboratory Services, Johannesburg laboratory for a full blood count, urea electrolytes, creatinine, and C-reactive protein. Environmental assessments and entomological investigations, including collection of mosquito and larvae, were conducted at the deceased’s home and surrounding areas and sent to the laboratory for analysis. Results: Epidemiological surveys revealed no travel history, no mechanical transmission through blood transfusion and no previous possible exposure of the victim to malaria mosquitoes. Laboratory findings indicated that the platelet count was low. A further smear revealed that the malaria parasite was present and malaria antigen for P. falciparum was positive. Entomological findings revealed that none of the six adult or larval mosquitoes collected on site were malaria vectors. Dumping sites found at the back of the house were identified as possible sites where mosquitoes from endemic places could possibly breed. Conclusion: Given that there was no travel history or the possibility of mechanical transmission (blood transfusion or needle), the research team concluded that it is highly probable that the infection was acquired through an infective Anopheles mosquito inadvertently translocated from a Malaria endemic area by mechanical modes of transport. We recommend that clinicians in non-endemic malaria areas be aware of this type of malaria and test for malaria in patients showing malaria-like symptoms.

Keywords: Odyssean Malaria, vector Bourne, malaria, epidemiological surveys

Procedia PDF Downloads 338
2177 Luminescence Dating of Ancient Agricultural Terraced Landscapes: Prospects for Heritage Protection

Authors: Lisa Snape, Andreas Lang, Tony Brown, Dan Fallu, Ben Pears

Abstract:

Agricultural terraced landscapes are widespread in mountainous areas in a variety of climatic zones around the World. The most famous are those found associated with the famous Inca site of Machu Pichu in the Andes, the arid lands in upland areas of Yemen, and the abundant rice terraces covering the hilltops in tropical areas such as Thailand, Vietnam, and China and also Bali. Terraces were designed using advanced engineered techniques, requiring specialist knowledge of bedrock geology, soil cultivation and maintenance, and ecosystem management to grow a variety of crops in specific environmental conditions. These enigmatic landscapes were often overlooked in the past but have now received widespread attention to further understand their age, origins, and evolution as the landscapes and environment changed over time. By understanding the age and chronologies of agricultural terrace technology, we can enhance our understanding of these unique features considered widely as important ecosystem services in the present day. We present distinct luminescence dating evidence from a variety of terraced systems found in different European environmental settings, such as the UK, Italy and Belgium, as part of the wider ERC-funded TerrACE Project. Our research aims to better understand their history and advocate for their protection and effective management as important cultural, heritage and environmental assets, creating new avenues for future scientific research.

Keywords: terraces, agriculture, luminescence dating, heritage protection

Procedia PDF Downloads 54
2176 The Urban Stray Animal Identification Management System Based on YOLOv5

Authors: Chen Xi, Kuan Sinman, LI Haofeng, Huang Hongming, Zeng Chengyu, Tong Zhiyuan

Abstract:

Stray animals are on the rise in mainland China's cities. There are legal reasons for this, namely the lack of protection for domestic pets in mainland China, where only wildlife protection laws exist. At a social level, the ease with which families adopt pets and the lack of a social view of animal nature has led to the frequent abandonment and loss of stray animals. If left unmanaged, conflicts between humans and stray animals can also increase. This project provides an inexpensive and widely applicable management tool for urban management by collecting videos and pictures of stray animals captured by surveillance or transmitted by humans and using artificial intelligence technology (mainly using YOLOv5 recognition technology) and recording and managing them in a database.

Keywords: urban planning, urban governance, artificial intelligence, convolutional neural network

Procedia PDF Downloads 104
2175 Analysis of Standard Tramway Surge Protection Methods Based on Real Cases

Authors: Alain Rousseau, Alfred Aragones, Gilles Rougier

Abstract:

The study is based on lightning and surge standards mainly the EN series 62305 for facility protection, EN series 61643 for Low Voltage Surge Protective Devices, High Voltage surge arrester standard en 60099-4 and the traction arrester standards namely EN 50526-1 and 50526-1 dealing respectively with railway applications fixed installations D.C. surge arresters and voltage limiting devices. The more severe stress for tramways installations is caused by direct lightning on the catenary line. In such case, the surge current propagates towards the various poles and sparkover the insulators leading to a lower stress. If the impact point is near enough, a significant surge current will flow towards the traction surge arrester that is installed on the catenary at the location the substation is connected. Another surge arrester can be installed at the entrance of the substation or even inside the rectifier to avoid insulation damages. In addition, surge arresters can be installed between + and – to avoid damaging sensitive circuits. Based on disturbances encountered in a substation following a lighting event, the engineering department of RATP has decided to investigate the cause of such damage and more generally to question the efficiency of the various possible protection means. Based on the example of a recent tramway line the paper present the result of a lightning study based on direct lightning strikes. As a matter of fact, the induced surges on the catenary are much more frequent but much less damaging. First, a lightning risk assessment is performed for the substations that takes into account direct lightning and induced lightning both on the substation and its connected lines such as the catenary. Then the paper deals with efficiency of the various surge arresters is discussed based on field experience and calculations. The efficiency of the earthing system used at the bottom of the pole is also addressed based on high frequency earthing measurement. As a conclusion, the paper is making recommendations for an enhanced efficiency of existing protection means.

Keywords: surge arrester, traction, lightning, risk, surge protective device

Procedia PDF Downloads 259
2174 Parental Separation and 'the Best Interests of the Child' at International Law: Guidance for Nation States in the 21st Century

Authors: Cassandra Seery

Abstract:

During the twentieth century, the notion of child rights at the international level began with the League of Nations’ Geneva Declaration of the Rights of the Child 1924, culminating in the development and adoption of the UN Convention on the Rights of the Child (‘the Convention’) in 1989. A key foundation of child rights lies in the development of the ‘best interests of the child’ principle and its subsequent incorporation into domestic legislation across the globe. This principle has become a key concept in child rights protection and has become a widely recognized principle in the protection of child rights. However, despite its status as the primary operating standard in child and family law and its ‘deepening hold in domestic and international instruments’, the meaning of the ‘best interests of the child’ principle has been criticised as open-ended and vague. This paper explores the evolution and development of the principle in the context of parental separation at international law throughout the 21st century and identifies opportunities for the Nation States to further improve legislative responses in associated child protection cases. An extensive review of relevant United Nations documentation (including instruments, resolutions and comments, jurisprudence, reports, guidelines and policies, training materials and so forth) explores: (i) what progress has been made to further develop the principle at the international level with regard to parental separation; and (ii) what developments participating the Nation States should consider as part of future legal and social policy reforms in this space. It will highlight opportunities for improvement and explore the benefit and relevance of international approaches for the Nation States moving forward.

Keywords: international human rights, best interests of the child, legal and social policy, child rights

Procedia PDF Downloads 261
2173 Geo-Collaboration Model between a City and Its Inhabitants to Develop Complementary Solutions for Better Household Waste Collection

Authors: Abdessalam Hijab, Hafida Boulekbache, Eric Henry

Abstract:

According to several research studies, the city as a whole is a complex, spatially organized system; its modeling must take into account several factors, socio-economic, and political, or geographical, acting at multiple scales of observation according to varied temporalities. Sustainable management and protection of the environment in this complex system require significant human and technical investment, particularly for monitoring and maintenance. The objective of this paper is to propose an intelligent approach based on the coupling of Geographic Information System (GIS) and Information and Communications Technology (ICT) tools in order to integrate the inhabitants in the processes of sustainable management and protection of the urban environment, specifically in the processes of household waste collection in urban areas. We are discussing a collaborative 'city/inhabitant' space. Indeed, it is a geo-collaborative approach, based on the spatialization and real-time geo-localization of topological and multimedia data taken by the 'active' inhabitant, in the form of geo-localized alerts related to household waste issues in their city. Our proposal provides a good understanding of the extent to which civil society (inhabitants) can help and contribute to the development of complementary solutions for the collection of household waste and the protection of the urban environment. Moreover, it allows the inhabitant to contribute to the enrichment of a data bank for future uses. Our geo-collaborative model will be tested in the Lamkansa sampling district of the city of Casablanca in Morocco.

Keywords: geographic information system, GIS, information and communications technology, ICT, geo-collaboration, inhabitants, city

Procedia PDF Downloads 116
2172 Risk Factors for Significant Obstetric Anal Sphincter Injury in a District General Hospital

Authors: A. Wahid Uddin

Abstract:

Obstetric anal sphincter injury carries significant morbidity for a woman and affects the quality of life to the extent of permanent damage to anal sphincter musculature. The study was undertaken in a district general hospital by retrospectively reviewing random 63 case notes of patients diagnosed with a significant third or fourth-degree perineal tear admitted between the year of 2015 to 2018. The observations were collected by a pre-designed questionnaire. All variables were expressed as percentages. The major risk factors noted were nulliparity (37%), instrumental delivery (25%), and birth weight of more than 4 kg (14%). Forceps delivery with or without episiotomy was the major contributing factor (75%). In the majority of the cases (71%), no record of any perineal protection measures undertaken. The study concluded that recommended perineal protection measures should be adopted as a routine practise.

Keywords: forceps, obstetrics, perineal, sphincter

Procedia PDF Downloads 135
2171 H.264 Video Privacy Protection Method Using Regions of Interest Encryption

Authors: Taekyun Doo, Cheongmin Ji, Manpyo Hong

Abstract:

Like a closed-circuit television (CCTV), video surveillance system is widely placed for gathering video from unspecified people to prevent crime, surveillance, or many other purposes. However, abuse of CCTV brings about concerns of personal privacy invasions. In this paper, we propose an encryption method to protect personal privacy system in H.264 compressed video bitstream with encrypting only regions of interest (ROI). There is no need to change the existing video surveillance system. In addition, encrypting ROI in compressed video bitstream is a challenging work due to spatial and temporal drift errors. For this reason, we propose a novel drift mitigation method when ROI is encrypted. The proposed method was implemented by using JM reference software based on the H.264 compressed videos, and experimental results show the verification of our proposed methods and its effectiveness.

Keywords: H.264/AVC, video encryption, privacy protection, post compression, region of interest

Procedia PDF Downloads 340
2170 Digital Watermarking Based on Visual Cryptography and Histogram

Authors: R. Rama Kishore, Sunesh

Abstract:

Nowadays, robust and secure watermarking algorithm and its optimization have been need of the hour. A watermarking algorithm is presented to achieve the copy right protection of the owner based on visual cryptography, histogram shape property and entropy. In this, both host image and watermark are preprocessed. Host image is preprocessed by using Butterworth filter, and watermark is with visual cryptography. Applying visual cryptography on water mark generates two shares. One share is used for embedding the watermark, and the other one is used for solving any dispute with the aid of trusted authority. Usage of histogram shape makes the process more robust against geometric and signal processing attacks. The combination of visual cryptography, Butterworth filter, histogram, and entropy can make the algorithm more robust, imperceptible, and copy right protection of the owner.

Keywords: digital watermarking, visual cryptography, histogram, butter worth filter

Procedia PDF Downloads 358
2169 Quality Assessment of the Given First Aid on the Spot Events in the Opinion of Members of the Teams of the Medical Rescue in Warsaw in Poland

Authors: Aneta Binkowska, Artur Kamecki

Abstract:

The ability to provide first aid should be one of the basic skills of each of us. First aid by the Law on National Medical Emergency dated 8 September 2006 as amended, is a set of actions undertaken to save a person at the scene of an accident. In Poland, on the basis of Article 162 of the Criminal Code, we are obliged to provide first aid to the victim. In addition, according to a large part of society, unselfishness towards others in need of help is our moral obligation. The aim of the study was to learn the opinion of the members of Medical Rescue Teams (MRT) of the ‘Meditrans’ Provincial Ambulance and Sanitary Transport Service (PA and STS ‘Meditrans’) in Warsaw on how people react in real situations threatening life or health of the injured person. The study was conducted in the third quarter of 2015 on 335 members of medical rescue teams, including 77 W and 258 M, who provided medical services in the ‘Meditrans’ Provincial Ambulance and Sanitary Transport Service MRT in Warsaw. The research tool was an anonymous questionnaire survey of own design, which consisted of 12 questions: closed, half open and one open question. Respondents were divided into 3 age groups and by individual medical professions (doctor, paramedic, nurse). The straight majority of respondents encountered granting the first aid the event on the spot. However, the frequency of appearing in such proceedings isn’t too high. The first aid has most often been given in the street and in houses. The final audited fairly important element is the reason not to provide first aid by bystanders in the opinion of members of the medical teams. Respondents to this question, which was an open question were asked to name the reason for not taking any action while waiting for an ambulance. Over 50% of respondents could not answer. The most common answers were: fear, lack of knowledge and skills, reluctance, indifference, lack of training, lack of experience and fear that harm. Conclusion: The majority of respondents have encountered instances of first aid provision, but respondents assessed the frequency of such situations as low. Placing the victim in the recovery position is the simplest and most common form of first aid. Therefore, training should be introduced not only on CPR but also in the scope of helping persons in sudden health emergency, who do not have a sudden cardiac arrest. A statement can be formulated, as a main conclusion of the analysis, that only continuous education and in particular practical training will help people to overcome the barrier of their limitations in order to help others. Among the largest group of witnesses providing first aid are the elderly and youth, who are subjected to various forms of education related to first aid provision.

Keywords: BLS, first aid, medical rescue, resuscitation

Procedia PDF Downloads 152
2168 Data Mining Techniques for Anti-Money Laundering

Authors: M. Sai Veerendra

Abstract:

Today, money laundering (ML) poses a serious threat not only to financial institutions but also to the nation. This criminal activity is becoming more and more sophisticated and seems to have moved from the cliché of drug trafficking to financing terrorism and surely not forgetting personal gain. Most of the financial institutions internationally have been implementing anti-money laundering solutions (AML) to fight investment fraud activities. However, traditional investigative techniques consume numerous man-hours. Recently, data mining approaches have been developed and are considered as well-suited techniques for detecting ML activities. Within the scope of a collaboration project on developing a new data mining solution for AML Units in an international investment bank in Ireland, we survey recent data mining approaches for AML. In this paper, we present not only these approaches but also give an overview on the important factors in building data mining solutions for AML activities.

Keywords: data mining, clustering, money laundering, anti-money laundering solutions

Procedia PDF Downloads 537
2167 Energy Metabolites Show Cross-Protective Plastic Responses for Stress Resistance in a Circumtropical Drosophila Species

Authors: Ankita Pathak, Ashok Munjal, Ravi Parkash

Abstract:

Plastic responses to multiple environmental stressors in wet or dry seasonal populations of tropical Drosophila species have received less attention. We tested plastic effects of heat hardening, acclimation to drought or starvation; and changes in trehalose, proline and body lipids in D. ananassae flies reared under wet or dry season specific conditions. Wet season flies revealed significant increase in heat knockdown, starvation resistance and body lipids after heat hardening. However, accumulation of proline was observed only after desiccation acclimation of dry season flies while wet season flies elicited no proline but trehalose only. Therefore, drought-induced proline can be a marker metabolite for dry season flies. Further, partial utilization of proline and trehalose under heat hardening reflects their possible thermoprotective effects. Heat hardening elicited cross-protection to starvation stress. Stressor-specific accumulation or utilization, as well as rates of metabolic change for each energy metabolite, were significantly higher in wet season flies than dry season flies. Energy metabolite changes due to inter-related stressors (heat vs. desiccation or starvation) resulted in possible maintenance of energetic homeostasis in wet or dry season flies. Thus, low or high humidity induced plastic changes in energy metabolites can provide cross-protection to seasonally varying climatic stressors.

Keywords: wet-dry seasons, plastic changes, stress related traits, energy metabolites, cross protection

Procedia PDF Downloads 170
2166 Green approach of Anticorrosion Coating of Steel Based on Polybenzoxazine/Henna Nanocomposites

Authors: Salwa M. Elmesallamy, Ahmed A. Farag, Magd M. Badr, Dalia S. Fathy, Ahmed Bakry, Mona A. El-Etre

Abstract:

The term green environment is an international trend. It is become imperative to treat the corrosion of steel with a green coating to protect the environment. From the potential adverse effects of the traditional materials.A series of polybenzoxazine/henna composites (PBZ/henna), with different weight percent (3,5, and 7 wt % (of henna), were prepared for corrosion protection of carbon steel. The structures of the prepared composites were verified using FTIR analysis. The mechanical properties of the resins, such as adhesion, hardness, binding, and tensile strength, were also measured. It was found that the tensile strength increases by henna loading up to 25% higher than the tidy resin. The thermal stability was investigated by thermogravimetric analysis (TGA) the loading of lawsone (henna) molecules into the PBZ matrix increases the thermal stability of the composite. UV stability was tested by the UV weathering accelerator to examine the possibility that henna can also act as an aging UV stabilizer. The effect of henna content on the corrosion resistance of composite coatings was tested using potentiostatic polarization and electrochemical spectroscopy. The presence of henna in the coating matrix enhances the protection efficiency of polybenzoxazine coats. Increasing henna concentration increases the protection efficiency of composites. The quantum chemical calculations for polybenzoxazine/henna composites have resulted that the highest corrosion inhibition efficiency, has the highest EHOMO and lowest ELUMO; which is in good agreement with results obtained from experiments.

Keywords: polybenzoxazine, corrosion, green chemistry, carbon steel

Procedia PDF Downloads 96
2165 Public Policy and Morality Principles as Grounds for Refusal of Trademarks: A Comparative Study of Islamic Shari’a and Common Law

Authors: Nawaf Alyaseen

Abstract:

This paper provides a comparative analysis of the Islamic and Western public policy and morality principles governing trademarks. The aim of this paper is to explore public policy and morality principles that affect trademark registration and protection under Shari'a by using Kuwaiti law as a case study. The findings provide a better understanding of trademark recognition from the perspective of Shari'a and the requirements demanded by Islamic Shari'a, especially of those who deal with strict Shari'a jurisdiction countries. In addition, this understanding is required for corporations or legislators that wish to take into consideration Muslim consumers. The conclusion suggests that trademarks in Western and Islamic systems are controlled by a number of public policy and morality rules that have a direct effect on the registration and protection of trademarks. Regardless of the fact that there are many commonalities between the two systems, there are still fundamental differences.

Keywords: trademark, public policy and morality, Islamic sharia, western legal systems

Procedia PDF Downloads 76
2164 The Urban Stray Animal Identification Management System Based on YOLOv5

Authors: Chen Xi, LIU Xuebin, Kuan Sinman, LI Haofeng, Huang Hongming, Zeng Chengyu, Lao Xuerui

Abstract:

Stray animals are on the rise in mainland China's cities. There are legal reasons for this, namely the lack of protection for domestic pets in mainland China, where only wildlife protection laws exist. At a social level, the ease with which families adopt pets and the lack of a social view of animal nature have led to the frequent abandonment and loss of stray animals. If left unmanaged, conflicts between humans and stray animals can also increase. This project provides an inexpensive and widely applicable management tool for urban management by collecting videos and pictures of stray animals captured by surveillance or transmitted by humans and using artificial intelligence technology (mainly using Yolov5 recognition technology) and recording and managing them in a database.

Keywords: urban planning, urban governance, artificial intelligence, convolutional neural network, machine vision

Procedia PDF Downloads 99
2163 Protection of Victims’ Rights in International Criminal Proceedings

Authors: Irina Belozerova

Abstract:

In the recent years, the number of crimes against peace and humanity has constantly been increasing. The development of the international community is inseparably connected to the compliance with the law which protects the rights and interests of citizens in all of their manifestations. The provisions of the law of criminal procedure are no exception. The rights of the victims of genocide, of the war crimes and the crimes against humanity, require particular attention. These crimes fall within the jurisdiction of the International Criminal Court governed by the Rome Statute of the International Criminal Court. These crimes have the following features. First, any such crime has a mass character and therefore requires specific regulation in the international criminal law and procedure and the national criminal law and procedure of different countries. Second, the victims of such crimes are usually children, women and old people; the entire national, ethnic, racial or religious groups are destroyed. These features influence the classification of victims by the age criterion. Article 68 of the Rome Statute provides for protection of the safety, physical and psychological well-being, dignity and privacy of victims and witnesses and thus determines the procedural status of these persons. However, not all the persons whose rights have been violated by the commission of these crimes acquire the status of victims. This is due to the fact that such crimes affect a huge number of persons and it is impossible to mention them all by name. It is also difficult to assess the entire damage suffered by the victims. While assessing the amount of damages it is essential to take into account physical and moral harm, as well as property damage. The procedural status of victims thus gains an exclusive character. In order to determine the full extent of the damage suffered by the victims it is necessary to collect sufficient evidence. However, it is extremely difficult to collect the evidence that would ensure the full and objective protection of the victims’ rights. While making requests for the collection of evidence, the International Criminal Court faces the problem of protection of national security information. Religious beliefs and the family life of victims are of great importance. In some Islamic countries, it is impossible to question a woman without her husband’s consent which affects the objectivity of her testimony. Finally, the number of victims is quantified by hundreds and thousands. The assessment of these elements demands time and highly qualified work. These factors justify the creation of a mechanism that would help to collect the evidence and establish the truth in the international criminal proceedings. This mechanism will help to impose a just and appropriate punishment for the persons accused of having committed a crime, since, committing the crime, criminals could not misunderstand the outcome of their criminal intent.

Keywords: crimes against humanity, evidence in international criminal proceedings, international criminal proceedings, protection of victims

Procedia PDF Downloads 249
2162 Redefining Problems and Challenges of Natural Resource Management in Indonesia

Authors: Amalia Zuhra

Abstract:

Indonesia is very rich with its natural resources. Natural resource management becomes a challenge for Indonesia. Improper management will make the natural resources run out and future generations will not be able to enjoy the natural wealth. A good rule of law and proper implementation determines the success of the management of a country's natural resources. This paper examines the need to redefine problems and challenges in the management of natural resources in Indonesia in the context of law. The purpose of this article is to overview the latest issues and challenges in natural resource management and to redefine legal provisions related to environmental management and human rights protection so that the management of natural resources in the present and future will be more sustainable. This paper finds that sustainable management of natural resources is absolutely essential. The aspect of environmental protection and human rights must be elaborated more deeply so that the management of natural resources can be done maximally without harming not only people but also the environment.

Keywords: international environmental law, human rights law, natural resource management, sustainable development

Procedia PDF Downloads 275
2161 Downward Vertical Evacuation for Disabilities People from Tsunami Using Escape Bunker Technology

Authors: Febrian Tegar Wicaksana, Niqmatul Kurniati, Surya Nandika

Abstract:

Indonesia is one of the countries that have great number of disaster occurrence and threat because it is located in not only between three tectonic plates such as Eurasia plates, Indo-Australia plates and Pacific plates, but also in the Ring of Fire path, like earthquake, Tsunami, volcanic eruption and many more. Recently, research shows that there are potential areas that will be devastated by Tsunami in southern coast of Java. Tsunami is a series of waves in a body of water caused by the displacement of a large volume of water, generally in an ocean. When the waves enter shallow water, they may rise to several feet or, in rare cases, tens of feet, striking the coast with devastating force. The parameter for reference such as magnitude, the depth of epicentre, distance between epicentres with land, the depth of every points, when reached the shore and the growth of waves. Interaction between parameters will bring the big variance of Tsunami wave. Based on that, we can formulate preparation that needed for disaster mitigation strategies. The mitigation strategies will take the important role in an effort to reduce the number of victims and damage in the area. It will reduce the number of victim and casualties. Reducing is directed to the most difficult mobilization casualties in the tsunami disaster area like old people, sick people and disabilities people. Until now, the method that used for rescuing people from Tsunami is basic horizontal evacuation. This evacuation system is not optimal because it needs so long time and it cannot be used by people with disabilities. The writers propose to create a vertical evacuation model with an escape bunker system. This bunker system is chosen because the downward vertical evacuation is considered more efficient and faster. Especially in coastal areas without any highlands surround it. The downward evacuation system is better than upward evacuation because it can avoid the risk of erosion at the ground around the structure which can affect the building. The structure of the bunker and the evacuation process while, and even after, disaster are the main priority to be considered. The power of bunker has quake’s resistance, the durability from water stream, variety of interaction to the ground, and waterproof design. When the situation is back to normal, victim and casualties can go into the safer place. The bunker will be located near the hospital and public places, and will have wide entrance supported by large slide in it so it will ease the disabilities people. The technology of the escape bunker system is expected to reduce the number of victims who have low mobility in the Tsunami.

Keywords: escape bunker, tsunami, vertical evacuation, mitigation, disaster management

Procedia PDF Downloads 492
2160 Evaluation of Occupational Doses in Interventional Radiology

Authors: Fernando Antonio Bacchim Neto, Allan Felipe Fattori Alves, Maria Eugênia Dela Rosa, Regina Moura, Diana Rodrigues De Pina

Abstract:

Interventional Radiology is the radiology modality that provides the highest dose values to medical staff. Recent researches show that personal dosimeters may underestimate dose values in interventional physicians, especially in extremities (hands and feet) and eye lens. The aim of this work was to study radiation exposure levels of medical staff in different interventional radiology procedures and estimate the annual maximum numbers of procedures (AMN) that each physician could perform without exceed the annual limits of dose established by normative. For this purpose LiF:Mg,Ti (TLD-100) dosimeters were positioned in different body regions of the interventional physician (eye lens, thyroid, chest, gonads, hand and foot) above the radiological protection vests as lead apron and thyroid shield. Attenuation values for lead protection vests were based on international guidelines. Based on these data were chosen as 90% attenuation of the lead vests and 60% attenuation of the protective glasses. 25 procedures were evaluated: 10 diagnostics, 10 angioplasty, and 5-aneurysm treatment. The AMN of diagnostic procedures was 641 for the primary interventional radiologist and 930 for the assisting interventional radiologist. For the angioplasty procedures, the AMN for primary interventional radiologist was 445 and for assisting interventional radiologist was 1202. As for the procedures of aneurism treatment, the AMN for the primary interventional radiologist was 113 and for the assisting interventional radiologist were 215. All AMN were limited by the eye lens doses already considering the use of protective glasses. In all categories evaluated, the higher dose values are found in gonads and in the lower regions of professionals, both for the primary interventionist and for the assisting, but the eyes lens dose limits are smaller than these regions. Additional protections as mobile barriers, which can be positioned between the interventionist and the patient, can decrease the exposures in the eye lens, providing a greater protection for the medical staff. The alternation of professionals to perform each type of procedure can reduce the dose values received by them over a period. The analysis of dose profiles proposed in this work showed that personal dosimeters positioned in chest might underestimate dose values in other body parts of the interventional physician, especially in extremities and eye lens. As each body region of the interventionist is subject to different levels of exposure, dose distribution in each region provides a better approach to what actions are necessary to ensure the radiological protection of medical staff.

Keywords: interventional radiology, radiation protection, occupationally exposed individual, hemodynamic

Procedia PDF Downloads 393
2159 Payments for Forest Environmental Services: Advantages and Disadvantages in the Different Mechanisms in Vietnam North Central Area

Authors: Huong Nguyen Thi Thanh, Van Mai Thi Khanh

Abstract:

For around the world, payments for environmental services have been implemented since the late 1970s in Europe and North America; then, it was spread to Latin America, Asia, Africa, and finally Oceania in 2008. In Vietnam, payments for environmental services are an interesting issue recently with the forest as the main focus and therefore known as the program on payment for forest environmental services (PFES). PFES was piloted in Lam Dong and Son La in 2008 and has been widely applied in many provinces after 2010. PFES is in the orientation for the socialization of national forest protection in Vietnam and has made great strides in the last decade. By using the primary data and secondary data simultaneously, the paper clarifies two cases of implementing PFES in the Vietnam North Central area with the different mechanisms of payment. In the first case at Phu Loc district (Thua Thien Hue province), PFES is an indirect method by a water supply company via the Forest Protection and Development Fund. In the second one at Phong Nha – Ke Bang National Park (Quang Binh Province), tourism companies are the direct payers to forest owners. The paper describes the PFES implementation process at each site, clarifies the payment mechanism, and models the relationship between stakeholders in PFES implementation. Based on the current status of PFES sites, the paper compares and analyzes the advantages and disadvantages of the two payment methods. Finally, the paper proposes recommendations to improve the existing shortcomings in each payment mechanism.

Keywords: advantages and disadvantages, forest environmental services, forest protection, payment mechanism

Procedia PDF Downloads 129
2158 Fire Protection Performance of Different Industrial Intumescent Coatings for Steel Beams

Authors: Serkan Kocapinar, Gülay Altay

Abstract:

This study investigates the efficiency of two different industrial intumescent coatings which have different types of certifications, in the fire protection performance in steel beams in the case of ISO 834 fire for 2 hours. A better understanding of industrial intumescent coatings, which assure structural integrity and prevent a collapse of steel structures, is needed to minimize the fire risks in steel structures. A comparison and understanding of different fire protective intumescent coatings, which are Product A and Product B, are used as a thermal barrier between the steel components and the fire. Product A is tested according to EN 13381-8 and BS 476-20,22 and is certificated by ISO Standards. Product B is tested according to EN 13381-8 and ASTM UL-94 and is certificated by the Turkish Standards Institute (TSE). Generally, fire tests to evaluate the fire performance of steel components are done numerically with commercial software instead of experiments due to the high cost of an ISO 834 fire test in a furnace. Hence, there is a gap in the literature about the comparisons of different certificated intumescent coatings for fire protection in the case of ISO 834 fire in a furnace experiment for 2 hours. The experiment was carried out by using two 1-meter UPN 200 steel sections. Each one was coated by different industrial intumescent coatings. A furnace was used by the Turkish Standards Institute (TSE) for the experiment. The temperature of the protected steels and the inside of the furnace was measured with the help of 24 thermocouples which were applied before the intumescent coatings during the two hours for the performance of intumescent coatings by getting a temperature-time curve of steel components. FIN EC software was used to determine the critical temperatures of protected steels, and Abaqus was used for thermal analysis to get theoretical results to compare with the experimental results.

Keywords: fire safety, structural steel, ABAQUS, thermal analysis, FIN EC, intumescent coatings

Procedia PDF Downloads 103
2157 Electrochemical and Microstructure Properties of Chromium-Graphene and SnZn-Graphene Oxide Composite Coatings

Authors: Rekha M. Y., Punith Kumar, Anshul Kamboj, Chandan Srivastava

Abstract:

Coatings plays an important role in providing protection for a substrate and in improving the surface quality. Graphene/graphene oxide (GO) using in coating systems provides an environmental friendly solution towards protection against corrosion. Issues such as, lack of scale, high cost, low quality limits the practical application of graphene/GO as corrosion resistant coating material. One other way to employ these materials for corrosion protection is to incorporate them into coatings that are conventionally used for corrosion protection. Due to the extraordinary properties of graphene/GO, it has been demonstrated that the coatings containing graphene/GO are more corrosion resistant than pure metal/alloy coatings. In the present work, Cr-graphene and SnZn-GO composite coatings were investigated in enhancing the corrosion resistant property when compared to pure Cr coating and pure SnZn coating respectively. All the coatings were electrodeposited over mild-steel substrate. Graphene and GO were synthesized by electrochemical exfoliation method and modified Hummers’ method respectively. In Cr coatings, the microstructural study revealed that the addition of formic acid in the coatings reduced the number of cracks in the coatings. Further addition of graphene in Cr coating enhanced the Cr coating’s morphology. Chemically synthesized ZnO nanoparticles were also embedded in the as-deposited Cr and Cr-graphene coatings to enhance the adhesion of the coating, to improve the surface finish and to increase the corrosion resistant property of the coatings. Diffraction analysis revealed that the addition of graphene also altered the texture of the Cr coatings. In SnZn alloy coatings, the morphological and topographical characterization revealed that the relative smoothness and compactness of the coatings increased with increase in the addition of GO in the coatings. The microstructural investigation revealed large-scale segregation of Zn-rich and Sn-rich phases in the pure SnZn coating. However, in SnZn-GO composite coating the uniform distribution of Zn phase in the Sn-rich matrix was observed. This distribution caused the early and uniform formation of ZnO, which is the corrosion product, yielding better corrosion resistance for the SnZn-GO composite coatings as compared to pure SnZn coating. A significant improvement in corrosion resistance in terms of reduction in corrosion current and corrosion rate and increase in the polarization resistance was observed in Cr coating containing graphene and in SnZn coatings containing GO.

Keywords: coatings, corrosion, electrodeposition, graphene, graphene-oxide

Procedia PDF Downloads 181
2156 Data Monetisation by E-commerce Companies: A Need for a Regulatory Framework in India

Authors: Anushtha Saxena

Abstract:

This paper examines the process of data monetisation bye-commerce companies operating in India. Data monetisation is collecting, storing, and analysing consumers’ data to use further the data that is generated for profits, revenue, etc. Data monetisation enables e-commerce companies to get better businesses opportunities, innovative products and services, a competitive edge over others to the consumers, and generate millions of revenues. This paper analyses the issues and challenges that are faced due to the process of data monetisation. Some of the issues highlighted in the paper pertain to the right to privacy, protection of data of e-commerce consumers. At the same time, data monetisation cannot be prohibited, but it can be regulated and monitored by stringent laws and regulations. The right to privacy isa fundamental right guaranteed to the citizens of India through Article 21 of The Constitution of India. The Supreme Court of India recognized the Right to Privacy as a fundamental right in the landmark judgment of Justice K.S. Puttaswamy (Retd) and Another v. Union of India . This paper highlights the legal issue of how e-commerce businesses violate individuals’ right to privacy by using the data collected, stored by them for economic gains and monetisation and protection of data. The researcher has mainly focused on e-commerce companies like online shopping websitesto analyse the legal issue of data monetisation. In the Internet of Things and the digital age, people have shifted to online shopping as it is convenient, easy, flexible, comfortable, time-consuming, etc. But at the same time, the e-commerce companies store the data of their consumers and use it by selling to the third party or generating more data from the data stored with them. This violatesindividuals’ right to privacy because the consumers do not know anything while giving their data online. Many times, data is collected without the consent of individuals also. Data can be structured, unstructured, etc., that is used by analytics to monetise. The Indian legislation like The Information Technology Act, 2000, etc., does not effectively protect the e-consumers concerning their data and how it is used by e-commerce businesses to monetise and generate revenues from that data. The paper also examines the draft Data Protection Bill, 2021, pending in the Parliament of India, and how this Bill can make a huge impact on data monetisation. This paper also aims to study the European Union General Data Protection Regulation and how this legislation can be helpful in the Indian scenarioconcerning e-commerce businesses with respect to data monetisation.

Keywords: data monetization, e-commerce companies, regulatory framework, GDPR

Procedia PDF Downloads 120
2155 Smart Monitoring and Control of Tap Changer Using Intelligent Electronic Device

Authors: K. N. Dinesh Babu, M. V. Gopalan, G. R. Manjunatha, R. Ramaprabha, V. Rajini

Abstract:

In this paper, monitoring and control of tap changer mechanism of a transformer implementation in an intelligent electronic device (IED) is discussed. Its been a custom for decades to provide a separate panel for on load tap changer control for monitoring the tap position. However this facility cannot either record or transfer the information to remote control centers. As there is a technology shift towards the smart grid protection and control standards, the need for implementing remote control and monitoring has necessitated the implementation of this feature in numerical relays. This paper deals with the programming, settings and logic implementation which is applicable to both IEC 61850 compatible and non-compatible IEDs thereby eliminating the need for separate tap changer control equipment. The monitoring mechanism has been implemented in a 28MVA, 110 /6.9kV transformer with 16 tap position with GE make T60 IED at Ultratech cement limited Gulbarga, Karnataka and is in successful service.

Keywords: transformer protection, tap changer control, tap position monitoring, on load tap changer, intelligent electronic device (IED)

Procedia PDF Downloads 593
2154 Progress of Legislation in Post-Colonial, Post-Communist and Socialist Countries for the Intellectual Property Protection of the Autonomous Output of Artificial Intelligence

Authors: Ammar Younas

Abstract:

This paper is an attempt to explore the legal progression in procedural laws related to “intellectual property protection for the autonomous output of artificial intelligence” in Post-Colonial, Post-Communist and Socialist Countries. An in-depth study of legal progression in Pakistan (Common Law), Uzbekistan (Post-Soviet Civil Law) and China (Socialist Law) has been conducted. A holistic attempt has been made to explore that how the ideological context of the legal systems can impact, not only on substantive components but on the procedural components of the formal laws related to IP Protection of autonomous output of Artificial Intelligence. Moreover, we have tried to shed a light on the prospective IP laws and AI Policy in the countries, which are planning to incorporate the concept of “Digital Personality” in their legal systems. This paper will also address the question: “How far IP of autonomous output of AI can be protected with the introduction of “Non-Human Legal Personality” in legislation?” By using the examples of China, Pakistan and Uzbekistan, a case has been built to highlight the legal progression in General Provisions of Civil Law, Artificial Intelligence Policy of the country and Intellectual Property laws. We have used a range of multi-disciplinary concepts and examined them on the bases of three criteria: accuracy of legal/philosophical presumption, applying to the real time situations and testing on rational falsification tests. It has been observed that the procedural laws are designed in a way that they can be seen correlating with the ideological contexts of these countries.

Keywords: intellectual property, artificial intelligence, digital personality, legal progression

Procedia PDF Downloads 118
2153 The Legal Framework for Solid Waste Disposal and Management in Kwara State, Nigeria

Authors: Alabi Odunayo Mayowa, Ajayi Oluwasola Felix

Abstract:

Solid waste such as “garbage” “trash” “refuse” “slug” and “rubbish” is disposed off or is required to be disposed off in accordance with national law. The study relies on primary and secondary sources of information. The primary sources include the Constitution, statutes and subsidiary legislation. The secondary sources of information include books, journals, conference proceedings, newspapers, magazines and internet materials. The information obtained from these sources is subjected to content and contextual analysis. The study examines the Kwara State Environmental Protection Agency Law, 1992 and other laws on waste disposal and management in Kwara State, Nigeria. The study also examines the regulations and the agency i.e. the Kwara State Environmental Protection Agency created by the law with a view to determine the inadequacies in the law.

Keywords: solid waste, waste disposal, waste management, domestic waste

Procedia PDF Downloads 475
2152 Improving Tower Grounding and Insulation Level vs. Line Surge Arresters for Protection of Subtransmission Lines

Authors: Navid Eghtedarpour, Mohammad Reza Hasani

Abstract:

Since renewable wind power plants are usually installed in mountain regions and high-level lands, they are often prone to lightning strikes and their hazardous effects. Although the transmission line is protected using guard wires in order to prevent the lightning surges to strike the phase conductors, the back-flashover may also occur due to tower footing resistance. A combination of back-flashover corrective methods, tower-footing resistance reduction, insulation level improvement, and line arrester installation, are analyzed in this paper for back-flashover rate reduction of a double-circuit 63 kV line in the south region of Fars province. The line crosses a mountain region in some sections with a moderate keraunic level, whereas tower-footing resistance is substantially high at some towers. Consequently, an exceptionally high back-flashover rate is recorded. A new method for insulation improvement is studied and employed in the current study. The method consists of using a composite-type creepage extender in the string. The effectiveness of this method for insulation improvement of the string is evaluated through the experimental test. Simulation results besides monitoring the one-year operation of the 63-kV line show that due to technical, practical, and economic restrictions in operated sub-transmission lines, a combination of corrective methods can lead to an effective solution for the protection of transmission lines against lightning.

Keywords: lightning protection, BF rate, grounding system, insulation level, line surge arrester

Procedia PDF Downloads 130
2151 Analysis and Performance of European Geostationary Navigation Overlay Service System in North of Algeria for GPS Single Point Positioning

Authors: Tabti Lahouaria, Kahlouche Salem, Benadda Belkacem, Beldjilali Bilal

Abstract:

The European Geostationary Navigation Overlay Service (EGNOS) provides an augmentation signal to GPS (Global Positioning System) single point positioning. Presently EGNOS provides data correction and integrity information using the GPS L1 (1575.42 MHz) frequency band. The main objective of this system is to provide a better real-time positioning precision than using GPS only. They are expected to be used with single-frequency code observations. EGNOS offers navigation performance for an open service (OS), in terms of precision and availability this performance gradually degrades as moving away from the service area. For accurate system performance, the service will become less and less available as the user moves away from the EGNOS service. The improvement in position solution is investigated using the two collocated dual frequency GPS, where no EGNOS Ranging and Integrity Monitoring Station (RIMS) exists. One of the pseudo-range was kept as GPS stand-alone and the other was corrected by EGNOS to estimate the planimetric and altimetric precision for different dates. It is found that precision in position improved significantly in the second due to EGNOS correction. The performance of EGNOS system in the north of Algeria is also investigated in terms of integrity. The results show that the horizontal protection level (HPL) value is below 18.25 meters (95%) and the vertical protection level (VPL) is below 42.22 meters (95 %). These results represent good integrity information transmitted by EGNOS for APV I service. This service is thus compliant with the aviation requirements for Approaches with Vertical Guidance (APV-I), which is characterised by 40 m HAL (horizontal alarm limit) and 50 m VAL (vertical alarm limit).

Keywords: EGNOS, GPS, positioning, integrity, protection level

Procedia PDF Downloads 225