Search results for: communication controlled protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8362

Search results for: communication controlled protection

8332 Controlled Mobile Platform for Service Based Humanoid Robot System

Authors: Shrikant V. Sangludkar, Dilip I. Sangotra, Sachin T. Bagde, Abhijeet A. Khandagale

Abstract:

The paper discloses a controlled tracked humanoid robot moving platform. A driving and driven wheel are controlled by a control module to drive a robot body to move according to data signals of a monitoring module, in addition, remote transmission can be achieved, and a certain remote control function can be realized. A power management module circuit board looks after in used for providing electric drive for moving of the robot body and distribution of separate power source to be used in internal of robot system. An external port circuit board is arranged, the tracked robot moving platform can be used immediately for any data acquisition. The moving platform is simple and compact in structure, strong in adaptation performance, stable in operation and suitable for being operated in severe environments. Meanwhile, a layered modular installation structure is adopted, and therefore the moving platform is convenient to assemble and disassemble.

Keywords: moving platform, humanoid robot, embedded controlled drive, mobile robot, museum robots, self-localization, obstacle avoidance, communication

Procedia PDF Downloads 401
8331 Traditional versus New Media: Creating Awareness on Environment Protection in Pakistan

Authors: Hafsah Javed

Abstract:

Environment protection is a major issue grabbing widespread attention of policymakers, both, locally and globally. Pakistan is among the countries most affected by global climate changes; media, besides governments, have a prime responsibility to create awareness among people about its hazards, and managing strategies. Advances in Information Communication Technologies have eased people's access to information and created an interactive space to discuss environment related issues and influence the policy decisions on the issue. This study, therefore, aims to examine, from the perspective of the audience, the contribution of Pakistani traditional and social media in creating awareness about Environment Protection and its implications. The objectives are achieved through quantitative survey method. Young university students are selected as ‘audience’ for the study. The findings show lack of awareness among people regarding environment protection. Neither traditional media outlets like radio, TV and newspapers prioritize the issue on their agenda, nor audience pull information about the issue from social media. A stark indifference and non-serious attitude is being exercised towards the issue from two quarters. People do not know much about local and international laws on environment; media are used more than a source of entertainment than awareness. The study implicates that there is an exigency to launch a nationwide awareness campaign on the issue, and for that media need to be on the driving seat.

Keywords: awareness, climate change, environment protection, new media, role of media, youngsters

Procedia PDF Downloads 120
8330 International Protection Mechanisms for Refugees

Authors: Djehich Mohamed Yousri

Abstract:

In recent years, the world has witnessed a phenomenon of displacement that is unprecedented in history. The number of refugees has reached record levels, due to wars, persecution, many conflicts and repression in a number of countries. The interest of United Nations bodies and international and regional organizations in the issue of refugees has increased, as they have defined a refugee and thus Determining who is entitled to this legal protection, and the 1951 Convention for the Protection of Refugees defines rights for refugee protection and sets obligations that they must perform. The institutional mechanisms for refugee protection are represented in the various agencies that take care of refugee affairs. At the forefront of these agencies is the United Nations High Commissioner for Refugees, as well as the various efforts provided by the International Committee of the Red Cross and the United Nations Relief and Works Agency for Palestine Refugees in the Middle East (UNRWA).

Keywords: protection, refugees, international, persecution, legal

Procedia PDF Downloads 50
8329 A Study on ESD Protection Circuit Applying Silicon Controlled Rectifier-Based Stack Technology with High Holding Voltage

Authors: Hee-Guk Chae, Bo-Bae Song, Kyoung-Il Do, Jeong-Yun Seo, Yong-Seo Koo

Abstract:

In this study, an improved Electrostatic Discharge (ESD) protection circuit with low trigger voltage and high holding voltage is proposed. ESD has become a serious problem in the semiconductor process because the semiconductor density has become very high these days. Therefore, much research has been done to prevent ESD. The proposed circuit is a stacked structure of the new unit structure combined by the Zener Triggering (SCR ZTSCR) and the High Holding Voltage SCR (HHVSCR). The simulation results show that the proposed circuit has low trigger voltage and high holding voltage. And the stack technology is applied to adjust the various operating voltage. As the results, the holding voltage is 7.7 V for 2-stack and 10.7 V for 3-stack.

Keywords: ESD, SCR, latch-up, power clamp, holding voltage

Procedia PDF Downloads 506
8328 Protection Plan of Medium Voltage Distribution Network in Tunisia

Authors: S. Chebbi, A. Meddeb

Abstract:

The distribution networks are often exposed to harmful incidents which can halt the electricity supply of the customer. In this context, we studied a real case of a critical zone of the Tunisian network which is currently characterized by the dysfunction of its plan of protection. In this paper, we were interested in the harmonization of the protection plan settings in order to ensure a perfect selectivity and a better continuity of service on the whole of the network.

Keywords: distribution network Gabes-Tunisia, continuity of service, protection plan settings, selectivity

Procedia PDF Downloads 484
8327 Automatic Approach for Estimating the Protection Elements of Electric Power Plants

Authors: Mahmoud Mohammad Salem Al-Suod, Ushkarenko O. Alexander, Dorogan I. Olga

Abstract:

New algorithms using microprocessor systems have been proposed for protection the diesel-generator unit in autonomous power systems. The software structure is designed to enhance the control automata of the system, in which every protection module of diesel-generator encapsulates the finite state machine.

Keywords: diesel-generator unit, protection, state diagram, control system, algorithm, software components

Procedia PDF Downloads 378
8326 Effective Communication Within Workplace: Key to Growth of Business

Authors: Mamta

Abstract:

Communication is the mixture of the various activities such as words, body language, volume and voice tone. Mankind has always throughout its history had the necessity for communication. It starts from birth and continues throughout life. Communication is just the right means of success and advancement in a workplace. Communication is one of the means to connect to different people at far distances. The modern workplace is inherently collaborative, and this collaboration relies on effective communication among co-workers. Also it has been observed that a lack in good communication skills especially within a workplace can result in conflicts and chaos hence hindering the productivity of an organization. Thus there is a dire need for developing good and effective communication skills which will result in increase in productivity and will enhance its efficiency.

Keywords: communication skills, professional communication, workplace communication, workplace efficiency

Procedia PDF Downloads 427
8325 Protection System Mis-operations: Fundamental Concepts and Learning from Indian Power Sector

Authors: Pankaj Kumar Jha, Mahendra Singh Hada, Brijendra Singh

Abstract:

Protection system is an essential feature of the electrical system which helps in detection and removal of faults. Protection system consists of many subsystems like relays, circuit breakers, instrument transformers, auxiliary DC system, auxiliary relays etc. Although the fundamental protective and relay operating concepts are similar throughout the world, there are very significant differences in their implementation. These differences arise through different traditions, operating philosophies, experiences and national standards. Protection system mis-operation due to problem in one or more of its subsystem or inadequate knowledge of numerical relay settings and configuration are very common throughout the world. Protection system mis-operation leads to unstable and unreliable grid operation. In this paper we will discuss about the fundamental concepts of protective relaying and the reasons for protection system mis-operation due to one or more of its subsystems. Many real-world case studies of protection system mis-operation from Indian power sector are discussed in detail in this paper.

Keywords: auxiliary trip relays, bus zone, check zone, CT saturation, dead zone protection, DC ground faults, DMT, DR, end fault protection, instrument transformer, SOTF, STUB

Procedia PDF Downloads 43
8324 Gas Transmission Pipeline Integrity Management System Through Corrosion Mitigation and Inspection Strategy: A Case Study of Natural Gas Transmission Pipeline from Wafa Field to Mellitah Gas Plant in Libya

Authors: Osama Sassi, Manal Eltorki, Iftikhar Ahmad

Abstract:

Poor integrity is one of the major causes of leaks and accidents in gas transmission pipelines. To ensure safe operation, it is must to have efficient and effective pipeline integrity management (PIM) system. The corrosion management is one of the important aspects of successful pipeline integrity management program together design, material selection, operations, risk evaluation and communication aspects to maintain pipelines in a fit-for-service condition. The objective of a corrosion management plan is to design corrosion mitigation, monitoring, and inspection strategy, and for maintenance in a timely manner. This paper presents the experience of corrosion management of a gas transmission pipeline from Wafa field to Mellitah gas plant in Libya. The pipeline is 525.5 km long and having 32 inches diameter. It is a buried pipeline. External corrosion on pipeline is controlled with a combination of coatings and cathodic protection while internal corrosion is controlled with a combination of chemical inhibitors, periodic cleaning and process control. The monitoring and inspection techniques provide a way to measure the effectiveness of corrosion control systems and provide an early warning when changing conditions may be causing a corrosion problem. This paper describes corrosion management system used in Mellitah Oil & Gas BV for its gas transmission pipeline based on standard practices of corrosion mitigation and inspection.

Keywords: corrosion mitigation on gas transmission pipelines, pipeline integrity management, corrosion management of gas pipelines, prevention and inspection of corrosion

Procedia PDF Downloads 41
8323 Analysis of Stacked SCR-Based ESD Protection Circuit with Low Trigger Voltage and Latch-Up Immunity

Authors: Jun-Geol Park, Kyoung-Il Do, Min-Ju Kwon, Kyung-Hyun Park, Yong-Seo Koo

Abstract:

In this paper, we proposed the SCR (Silicon Controlled Rectifier)-based ESD (Electrostatic Discharge) protection circuit for latch-up immunity. The proposed circuit has a lower trigger voltage and a higher holding voltage characteristic by using the zener diode structure. These characteristics prevent latch-up problem in normal operating conditions. The proposed circuit was analyzed to figure out the electrical characteristics by the variations of design parameters D1, D2 and stack technology to obtain the n-fold electrical characteristics. The simulations are accomplished by using the Synopsys TCAD simulator. When using the stack technology, 2-stack has the holding voltage of 6.9V and 3-stack has the holding voltage of 10.9V.

Keywords: ESD, SCR, trigger voltage, holding voltage

Procedia PDF Downloads 497
8322 Mathematical Modeling of Switching Processes in Magnetically Controlled MEMS Switches

Authors: Sergey M. Karabanov, Dmitry V. Suvorov, Dmitry Yu. Tarabrin

Abstract:

The operating principle of magnetically controlled microelectromechanical system (MEMS) switches is based on controlling the beam movement under the influence of a magnetic field. Currently, there is a MEMS switch design with a flexible ferromagnetic electrode in the form of a fixed-terminal beam, with an electrode fastened on a straight or cranked anchor. The basic performance characteristics of magnetically controlled MEMS switches (service life, sensitivity, contact resistance, fast response) are largely determined by the flexible electrode design. To ensure the stable and controlled motion of the flexible electrode, it is necessary to provide the optimal design of a flexible electrode.

Keywords: flexible electrode, magnetically controlled MEMS, mathematical modeling, mechanical stress

Procedia PDF Downloads 154
8321 A Comprehensive Theory of Communication with Biological and Non-Biological Intelligence for a 21st Century Curriculum

Authors: Thomas Schalow

Abstract:

It is commonly recognized that our present curriculum is not preparing students to function in the 21st century. This is particularly true in regard to communication needs across cultures - both human and non-human. In this paper, a comprehensive theory of communication-based on communication with non-human cultures and intelligences is presented to meet the following three imminent contingencies: communicating with sentient biological intelligences, communicating with extraterrestrial intelligences, and communicating with artificial super-intelligences. The paper begins with the argument that we need to become much more serious about communicating with the non-human, intelligent life forms that already exists around us here on Earth. We need to broaden our definition of communication and reach out to other sentient life forms in order to provide humanity with a better perspective of its place within our ecosystem. The paper next examines the science and philosophy behind CETI (communication with extraterrestrial intelligences) and how it could prove useful even in the absence of contact with alien life. However, CETI’s assumptions and methodology need to be revised in accordance with the communication theory being proposed in this paper if we are truly serious about finding and communicating with life beyond Earth. The final theme explored in this paper is communication with non-biological super-intelligences. Humanity has never been truly compelled to converse with other species, and our failure to seriously consider such intercourse has left us largely unprepared to deal with communication in a future that will be mediated and controlled by computer algorithms. Fortunately, our experience dealing with other cultures can provide us with a framework for this communication. The basic concepts behind intercultural communication can be applied to the three types of communication envisioned in this paper if we are willing to recognize that we are in fact dealing with other cultures when we interact with other species, alien life, and artificial super-intelligence. The ideas considered in this paper will require a new mindset for humanity, but a new disposition will yield substantial gains. A curriculum that is truly ready for the 21st century needs to be aligned with this new theory of communication.

Keywords: artificial intelligence, CETI, communication, language

Procedia PDF Downloads 335
8320 Night Patrolling Robot for Suspicious Activity Detection

Authors: Amruta Amune, Rohit Agrawal, Yashashree Shastri, Syeda Zarah Aiman, Rutuja Rathi, Vaishnav Suryawanshi, Sameer Sumbhe

Abstract:

Every human being needs a sense of security. The requirement for security has risen in proportion with the population growth. However, because of a scarcity of resources, effective protection is not possible. It costs a lot of money to get appropriate security that not many can handle or afford. The goal of the study was to find a solution to the issue by developing a system capable of providing strong protection at a very low cost when long-term benefits are taken into account. The objective was to design and develop a robot that could travel around and survey the region and inform the command center if anything unusual was found. The system will be controlled manually on the server to find out its workplace's paths. The system is outfitted with a camera so that it can be used to capture built-in live video of the attacker and display it on the server.

Keywords: night patrolling, node MCU, server, security

Procedia PDF Downloads 115
8319 Transmission of ASCII Code Messages Using a High Power (50mW) Underwater Laser Communication Prototype in Two Controlled Scenarios

Authors: Lessly Borja, Anthony Gualli, Kelly Baño, Fabricio Santacruz

Abstract:

In this article, a prototype of underwater communication using a long-range laser (50mW) has been carried out in two aquatic scenarios (fish tank and swimming pool) with the aim of recreating Aqua-Fi technology (the future of underwater communications) using a Bluetooth connection to the transmitter to send data in ASCII code by means of light. Initially, the transmitter and receiver circuits were programmed in Arduino so that the data would travel by light pulses in the aforementioned code. To obtain the results of the underwater communication, two scenarios were chosen (fish tank and swimming pool), where the power value of the received signal was calculated from its peak-to-peak voltage using the Oscilloscope equipment (ESPOCH). Finally, it was concluded that the maximum communication range of this prototype is 12m underwater, and it was observed that the power decreases as the distance increases. However, this prototype still needs to improve communication so that the information is not distorted or lost when there is movement and dispersion of the water. It is hoped that it will form the basis for future research.

Keywords: prototype, underwater, communication, power, voltage, distance

Procedia PDF Downloads 55
8318 Design Considerations on Cathodic Protection for X65 Steel Tank Containing Fresh Water

Authors: A. M. Al-Sabagh, M. A. Deyab, M. N. Kroush

Abstract:

The present study focused on critical and detailed approach for using aluminum electrode as impressed current anode for cathodic protection of X65 steel tank containing fresh water. The impressed current design calculation showed 0.6 A of current demand and voltage of 0.33 V required to adequately protect the X65 steel tank with internal surface area of 421 m². We used here one transformer rectifier with current and voltage output of 25 A and 25 V, respectively. The data showed that the potentials ranged from -0.474 to -0.509 V (vs. Cu/CuSO₄), prior to the application of cathodic protection. When the potential was measured 1 h after the application of cathodic protection, the potential values showed considerable shift within protection range (-0.950 V vs. Cu/CuSO₄). The results confirmed that aluminum anode can be used in freshwater applications with high efficiency (current capacity) and low consumption rate.

Keywords: cathodic protection, aluminum, steel, fresh water

Procedia PDF Downloads 129
8317 PUF-Based Lightweight Iot Secure Authentication Chip Design

Authors: Wenxuan Li, Lei Li, Jin Li, Yuanhang He

Abstract:

This paper designed a secure chip for IoT communication security integrated with the PUF-based firmware protection scheme. Then, the Xilinx Kintex-7 and STM-32 were used for the prototype verification. Firmware protection worked well on FPGA and embedded platforms. For the ASIC implementation of the PUF module, contact PUF is chosen. The post-processing method and its improvement are analyzed with emphasis. This paper proposed a more efficient post-processing method for contact PUF named SXOR, which has practical value for realizing lightweight security modules in IoT devices. The analysis was carried out under the hypothesis that the contact holes are independent and combine the existing data in the open literature. The post-processing effects of SXOR and XOR are basically the same under the condition that the proposed post-processing circuit occupies only 50.6% of the area of XOR. The average Hamming weight of the PUF output bit sequence obtained by the proposed post-processing method is 0.499735, and the average Hamming weight obtained by the XOR-based post-processing method is 0.499999.

Keywords: PUF, IoT, authentication, secure communication, encryption, XOR

Procedia PDF Downloads 105
8316 Network User Rules in Universities

Authors: Michel Berthiaume, Daniel Chamberland-Tremblay, Elaine Paiva Mosconi, Jérôme Blanchet-Brisson

Abstract:

This presentation documents the overall failure of North-American universities to build an effective IT Policies communication with their primary users: the students. A sample of 12 universities was selected. A set of indicators based on usability principles to assess the content of IT Policies vas devised. Then, IT Policies were rated according to the indicators and the results analyzed to build an overall picture of the potential of communication problems in policy communication. The initial finding is that network security professionals in Universities have to reach a delicate balance between asset protection, asset valorization and user security awareness.

Keywords: computer security, IT policy, security awareness, network user rules

Procedia PDF Downloads 533
8315 The Importance of Fire Safety in Egypt

Authors: Omar Shakra

Abstract:

This paper contains a huge number of benefits that we can use it in several places and times in fire safety protection in the Middle East especially in Egypt . People here in Egypt did not consider the safety and fire protection as important as it is. But on the other hand, its very important for them to contain the fire systems and safety in every facility, the companies , hospitals , police stations , and even the super markets must use the fire system. It makes the facility safe to the visitors while they are using it.From my point of view as the owner Fire Safety Company called Deluge Egypt , i can say that not all of the companies use the fire system protection according to the high cost they prefer to build their company without the protection, and this is make the building totally unsafe to be used from the visitors or client.So, i am looking for new methods and technology to invest in Egypt, and this is through attending this Conference and let the audiences know more about the services i provide and [to let them know about the importance of the Fire Safety in Egypt. The Objectives of my research 1- The system that i used in my Company. 2- The benefits of the Fire System Protection. 3-The importance of the Fire System and safety. 4-The use of the new Technologies. 5-The hardships that i found while having new deals with new clients.

Keywords: fire, system, protection, fire hydrants, security, alarms

Procedia PDF Downloads 70
8314 Deposit Guarantee Fund: One Perspective

Authors: Rute Abreu, Fátima David, Liliane Cristina Segura

Abstract:

The Deposit Guarantee Fund (DGF) and its communication with the Society, in general, and with the deposit client of Financial Institutions, in particular, is discussed through the challenges of the accounting and financial report. The Bank of Portugal promotes the Portuguese Deposit Guarantee Fund (PDGF) as a financial institution that enhanced the market confidence and stability on the deposit-insurance system. Due to the nature of their functions, it must be subject to regulation and supervision that provides a first line of defense against adversely affect confidence on the Portuguese financial market. First, this research provides evidence of the effectiveness of the protection mechanisms on the deposit insurance system, which provides high and equal protection to all stakeholders. Second, it emphasizes the need of requirements of rigorous accounting process and effective financial report to reduce the moral hazard implications. Third, this research focuses on the need of total disclosure of the financial information which gives higher transparency and protection to deposit client of financial institutions.

Keywords: deposit guarantee fund, Portugal, accounting, financial report

Procedia PDF Downloads 408
8313 Quantification of Leachate Potential of the Quezon City Controlled Dumping Facility Using Help Model

Authors: Paul Kenneth D. Luzon, Maria Antonia N. Tanchuling

Abstract:

The Quezon City Controlled Dumping facility also known as Payatas produces leachate which can contaminate soil and water environment in the area. The goal of this study is to quantify the leachate produced by the QCCDF using the Hydrologic Evaluation of Landfill Performance (HELP) model. Results could be used as input for groundwater contaminant transport studies. The HELP model is based on a simple water budget and is an essential “model requirement” used by the US Environmental Protection Agency (EPA). Annual waste profile of the QCCDF was calculated. Based on topographical maps and estimation of settlement due to overburden pressure and degradation, a total of 10M m^3 of waste is contained in the landfill. The input necessary for the HELP model are weather data, soil properties, and landfill design. Results showed that from 1988 to 2011, an average of 50% of the total precipitation percolates through the bottom layer. Validation of the results is still needed due to the assumptions made in the study. The decrease in porosity of the top soil cover showed the best mitigation for minimizing percolation rate. This study concludes that there is a need for better leachate management system in the QCCDF.

Keywords: help model, landfill, payatas trash slide, quezon city controlled dumping facility

Procedia PDF Downloads 262
8312 Regulating User Experience Design, in the European Union, as a Way to Narrow Down the Gap Between Consumers’ Protection and Algorithms Employment

Authors: Prisecaru Diana-Sorina

Abstract:

The paper will show that, while the EU legislator tackled a series of UX patterns used in e-commerce to induce the consumers take actions that they would not normally undertake, it leaves out many other aspects related to misuse or poor UX design that adversely affect EU consumers. Further, the paper proposes a reevaluation of the regulatory addressability of the issue and hand and focuses on explaining why a joint strategy, based on the interplay between provisions aiming consumer protection and personal data protection is the key approach to this matter.

Keywords: algorithms, consumer protection, European Union, user experience design

Procedia PDF Downloads 103
8311 Challenges in Anti-Counterfeiting of Cyber-Physical Systems

Authors: Daniel Kliewe, Arno Kühn, Roman Dumitrescu, Jürgen Gausemeier

Abstract:

This paper examines the system protection for cyber-physical systems (CPS). CPS are particularly characterized by their networking system components. This means they are able to adapt to the needs of their users and its environment. With this ability, CPS have new, specific requirements on the protection against anti-counterfeiting, know-how loss and manipulation. They increase the requirements on system protection because piracy attacks can be more diverse, for example because of an increasing number of interfaces or through the networking abilities. The new requirements were identified and in a next step matched with existing protective measures. Due to the found gap the development of new protection measures has to be forced to close this gap. Moreover a comparison of the effectiveness between selected measures was realized and the first results are presented in the paper.

Keywords: anti-counterfeiting, cyber physical systems, intellectual property (IP), knowledge management, system protection

Procedia PDF Downloads 464
8310 Framework for Implementation of National Electrical Safety Grounding Standards for Communication Infrastructure

Authors: Atif Mahmood, Mohammad Inayatullah Khan Babar

Abstract:

Communication infrastructure has been installed, operated, and maintained all over the world according to defined electrical safety standards for separate or joint structures. These safety standards have been set for the safeguard of public, utility workers (employees and contractors), utility facilities, electrical communication equipment’s connected to the utility facilities and other facilities or premise adjacent to utility facilities. Different communication utilities in Pakistan use standards of different countries due to the absence of Common National Electrical Safety Standards of Pakistan. It is really important to devise a framework for implementation of a uniform standard for strict compliance. In this context, it is important to explore the compliance of safety standards for communication conductors and equipment for separate or joint structures for which NESC standards are taken as reference. Specific reference to grounding techniques including grounding AC/DC systems and its frames, leaving Fences, Messenger wires and special circuits used for the protection for lightning etc, ungrounded so recommendations are also given after in-depth analysis of current technical practices for the installation and maintenance of communication infrastructure.

Keywords: utility facilities, grounding electrodes, special circuits, grounding conductor

Procedia PDF Downloads 316
8309 Rural Tourism Planning from the Perspective of Water Resource Protection and Regional Integration: Taking Villages along Tongji Lake as an Example

Authors: Pianpian Zhang, Qingping Luo

Abstract:

Currently, there is a great tendency that more and more villages in China are trying to increase income by development of tourism. Especially in Zhejiang Province, 'Beautiful Rural Construction' provides an excellent opportunity for the development of tourism. In this context, development orientation, transportation routes and tourism service facilities are analyzed under the perspective of water resources protection and regional integration based on the development tourism industry of the six villages in Pujiang County, Zhejiang Province as a research object. In the program, the biggest issue is the contradiction between the ecological protection of the water and the development of economy. How to deal with the relationship between protection and development is the key to the design of this case. Furthermore, the six villages are regarded as a whole, connecting to each other by the system of five-path and the landscape along the lake. Every village has its own features, but cannot develop without one another. The article is actively exploring for suggestions and countermeasures to promote the development premised on protection and based on a regional view.

Keywords: development, integration, protection, rural tourism

Procedia PDF Downloads 338
8308 Recognition and Protection of Indigenous Society in Indonesia

Authors: Triyanto, Rima Vien Permata Hartanto

Abstract:

Indonesia is a legal state. The consequence of this status is the recognition and protection of the existence of indigenous peoples. This paper aims to describe the dynamics of legal recognition and protection for indigenous peoples within the framework of Indonesian law. This paper is library research based on literature. The result states that although the constitution has normatively recognized the existence of indigenous peoples and their traditional rights, in reality, not all rights were recognized and protected. The protection and recognition for indigenous people need to be strengthened.

Keywords: indigenous peoples, customary law, state law, state of law

Procedia PDF Downloads 298
8307 Wireless Communication in Sunlight

Authors: Karmveer Sheoran

Abstract:

To make wireless communication a vast success is to use sunlight for wireless communication. We can use sunlight in upper atmosphere to encode messages to efficiently use sunlight. This use of sunlight for wireless communication will need encoders which will encode sunlight according to our message and then resultant will be spread in all atmospheres wherever sunlight goes, it will take our messages with it. With minimum requirement of cost in equipment used at the edge of atmosphere is where sunlight is being encoded. In this way a very high efficient wireless communication system can be designed. On receiver side we will need light detectors which will detect sunlight variations and will finally give the information contained i it. Sunlight can be encoded at a very high speed that nobody will be annoyed by flickering. It will be most sophisticated and efficient wireless communication ever designed. There are far more possibilities in this sunlight communication. Let us call it “Sunlight Communication".

Keywords: sunlight communication, emerging trends, wireless communication, wifi

Procedia PDF Downloads 375
8306 A Cross-Cultural Approach for Communication with Biological and Non-Biological Intelligences

Authors: Thomas Schalow

Abstract:

This paper posits the need to take a cross-cultural approach to communication with non-human cultures and intelligences in order to meet the following three imminent contingencies: communicating with sentient biological intelligences, communicating with extraterrestrial intelligences, and communicating with artificial super-intelligences. The paper begins with a discussion of how intelligence emerges. It disputes some common assumptions we maintain about consciousness, intention, and language. The paper next explores cross-cultural communication among humans, including non-sapiens species. The next argument made is that we need to become much more serious about communicating with the non-human, intelligent life forms that already exist around us here on Earth. There is an urgent need to broaden our definition of communication and reach out to the other sentient life forms that inhabit our world. The paper next examines the science and philosophy behind CETI (communication with extraterrestrial intelligences) and how it has proven useful, even in the absence of contact with alien life. However, CETI’s assumptions and methodology need to be revised and based on the cross-cultural approach to communication proposed in this paper if we are truly serious about finding and communicating with life beyond Earth. The final theme explored in this paper is communication with non-biological super-intelligences using a cross-cultural communication approach. This will present a serious challenge for humanity, as we have never been truly compelled to converse with other species, and our failure to seriously consider such intercourse has left us largely unprepared to deal with communication in a future that will be mediated and controlled by computer algorithms. Fortunately, our experience dealing with other human cultures can provide us with a framework for this communication. The basic assumptions behind intercultural communication can be applied to the many types of communication envisioned in this paper if we are willing to recognize that we are in fact dealing with other cultures when we interact with other species, alien life, and artificial super-intelligence. The ideas considered in this paper will require a new mindset for humanity, but a new disposition will prepare us to face the challenges posed by a future dominated by artificial intelligence.

Keywords: artificial intelligence, CETI, communication, culture, language

Procedia PDF Downloads 329
8305 Challenges in Providing Protection to the Conflict-Affected Refugee Children in Pakistan: A Critical Analysis of the 1951 Refugee Convention

Authors: Faiz Bakhsh, Tahira Yasmeen

Abstract:

The Afghan refugee children in Pakistan are considered as the most vulnerable persons in danger of being abused and treated badly as compared to the minimum criteria of the protection of refugee children under 1951 refugee convention. This paper explores the impact of the 1951 refugee convention on the protection of refugee children, affected by the armed conflict in Afghanistan, residing in refugee camps in Pakistan. Despite, protection available under Refugee Convention, there exist millions of refugees in the world, including a huge portion of women and children, that remain unprotected, and their protection remains a challenging task for the world community. This study investigates the status and number of refugees in Pakistan, especially children; protection and assistance of refugees under Refugee Convention; protection of the rights of refugee children in Pakistan; and implementation of the rules of Refugee Convention relating refugee children in Pakistan and measures for the protection of refugee children in Pakistan. This socio-legal study utilizes a qualitative research approach and applies mixed methods of data collection. The primary data is collected through the interpretation of the legal framework available for the protection of refugees as well as domestic laws of Pakistan. The secondary data is collected through previous studies available on the same topic. The result of this study indicates that lack of proper implementation of the rules, of the Refugee Convention, relating protection of refugee children cause sufferings to refugee children including the provision of basic health, nutrition, family life, education and protection from child abuse. Pakistan needs a comprehensive domestic legal framework for the protection of refugees, especially refugee children. Moreover, the government of Pakistan with the help of the United Nations High Commissioner for Refugees (UNHCR) must prioritize the protection of Afghan refugee children as per standard criteria provided by the refugee convention 1951.

Keywords: refugee children, refugee convention, armed conflict, Pakistan

Procedia PDF Downloads 131
8304 Infringement of Patent Rights with Doctrine of Equivalent for Turkey

Authors: Duru Helin Ozaner

Abstract:

Due to the doctrine of equivalent, the words in the claims' sentences are insufficient for the protection area provided by the patent registration. While this situation widens the boundaries of the protection area, it also obscures the boundaries of the protected area of patents. In addition, it creates distrust for third parties. Therefore, the doctrine of equivalent aims to establish a balance between the rights of patent owners and the legal security of third parties. The current legal system of Turkey has been tried to be created as a parallel judicial system to the widely applied regulations. Therefore, the regulations regarding the protection provided by patents in the current Turkish legal system are similar to many countries. However, infringement through equivalent is common by third parties. This study, it is aimed to explain that the protection provided by the patent is not only limited to the words of the claims but also the wide-ranging protection provided by the claims for the doctrine of equivalence. This study is important to determine the limits of the protection provided by the patent right holder and to indicate the importance of the equivalent elements of the protection granted to the patent right holder.

Keywords: patent, infringement, intellectual property, the doctrine of equivalent

Procedia PDF Downloads 188
8303 Facts of Near Field Communication

Authors: Amin Hamrahi

Abstract:

Near Field Communication (NFC) is one of the latest wireless communication technologies. NFC enables electronic devices to communicate in short range using the radio waves. NFC offers safe yet simple communication between electronic devices. This technology provides the fastest way to communicate two device with in a fraction of second. With NFC technology, communication occurs when an NFC-compatible device is brought within a few centimeters of another NFC device. NFC is an open-platform technology that is being standardized in the NFC Forum. NFC is based on and extends on RFID. It operates on 13.56 MHz frequency.

Keywords: near field communication, NFC technology, wireless communication technologies, NFC-compatible device, NFC, communication

Procedia PDF Downloads 427