Search results for: common law legal system
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 22634

Search results for: common law legal system

22064 Exploring the Intersection Between the General Data Protection Regulation and the Artificial Intelligence Act

Authors: Maria Jędrzejczak, Patryk Pieniążek

Abstract:

The European legal reality is on the eve of significant change. In European Union law, there is talk of a “fourth industrial revolution”, which is driven by massive data resources linked to powerful algorithms and powerful computing capacity. The above is closely linked to technological developments in the area of artificial intelligence, which has prompted an analysis covering both the legal environment as well as the economic and social impact, also from an ethical perspective. The discussion on the regulation of artificial intelligence is one of the most serious yet widely held at both European Union and Member State level. The literature expects legal solutions to guarantee security for fundamental rights, including privacy, in artificial intelligence systems. There is no doubt that personal data have been increasingly processed in recent years. It would be impossible for artificial intelligence to function without processing large amounts of data (both personal and non-personal). The main driving force behind the current development of artificial intelligence is advances in computing, but also the increasing availability of data. High-quality data are crucial to the effectiveness of many artificial intelligence systems, particularly when using techniques involving model training. The use of computers and artificial intelligence technology allows for an increase in the speed and efficiency of the actions taken, but also creates security risks for the data processed of an unprecedented magnitude. The proposed regulation in the field of artificial intelligence requires analysis in terms of its impact on the regulation on personal data protection. It is necessary to determine what the mutual relationship between these regulations is and what areas are particularly important in the personal data protection regulation for processing personal data in artificial intelligence systems. The adopted axis of considerations is a preliminary assessment of two issues: 1) what principles of data protection should be applied in particular during processing personal data in artificial intelligence systems, 2) what regulation on liability for personal data breaches is in such systems. The need to change the regulations regarding the rights and obligations of data subjects and entities processing personal data cannot be excluded. It is possible that changes will be required in the provisions regarding the assignment of liability for a breach of personal data protection processed in artificial intelligence systems. The research process in this case concerns the identification of areas in the field of personal data protection that are particularly important (and may require re-regulation) due to the introduction of the proposed legal regulation regarding artificial intelligence. The main question that the authors want to answer is how the European Union regulation against data protection breaches in artificial intelligence systems is shaping up. The answer to this question will include examples to illustrate the practical implications of these legal regulations.

Keywords: data protection law, personal data, AI law, personal data breach

Procedia PDF Downloads 42
22063 STR and SNP Markers of Y-Chromosome Unveil Similarity between the Gene Pool of Kurds and Yezidis

Authors: M. Chukhryaeva, R. Skhalyakho, J. Kagazegeva, E. Pocheshkhova, L. Yepiskopossyan, O. Balanovsky, E. Balanovska

Abstract:

The Middle East is crossroad of different populations at different times. The Kurds are of particular interest in this region. Historical sources suggested that the origin of the Kurds is associated with Medes. Therefore, it was especially interesting to compare gene pool of Kurds with other supposed descendants of Medes-Tats. Yezidis are ethno confessional group of Kurds. Yezidism as a confessional teaching was formed in the XI-XIII centuries in Iraq. Yezidism has caused reproductively isolation of Yezidis from neighboring populations for centuries. Also, isolation helps to retain Yezidian caste system. It is unknown how the history of Yezidis affected its genу pool because it has never been the object of researching. We have examined the Y-chromosome variation in Yezidis and Kurdish males to understand their gene pool. We collected DNA samples from 90 Yezidi males and 24 Kurdish males together with their pedigrees. We performed Y-STR analysis of 17 loci in the samples collected (Yfiler system from Applied Biosystems) and analysis of 42 Y-SNPs by real-time PCR. We compared our data with published data from other Kurdish groups and from European, Caucasian, and West Asian populations. We found that gene pool of Yezidis contains haplogroups common in the Middle East (J-M172(xM67,M12)- 24%, E-M35(xM78)- 9%) and in South Western Asia (R-M124- 8%) and variant with wide distribution area - R-M198(xM458- 9%). The gene pool of Kurdish has higher genetic diversity than Yezidis. Their dominants haplogroups are R-M198- 20,3 %, E-M35- 9%, J-M172- 9%. Multidimensional scaling also shows that the Kurds and Yezidis are part of the same frontier Asian cluster, which, in addition, included Armenians, Iranians, Turks, and Greeks. At the same time, the peoples of the Caucasus and Europe form isolated clusters that do not overlap with the Asian clusters. It is noteworthy that Kurds from our study gravitate towards Tats, which indicates that most likely these two populations are descendants of ancient Medes population. Multidimensional scaling also reveals similarity between gene pool of Yezidis, Kurds with Armenians and Iranians. The analysis of Yezidis pedigrees and their STR variability did not reveal a reliable connection between genetic diversity and caste system. This indicates that the Yezidis caste system is a social division and not a biological one. Thus, we showed that, despite many years of isolation, the gene pool of Yezidis retained a common layer with the gene pool of Kurds, these populations have common spectrum of haplogroups, but Yezidis have lower genetic diversity than Kurds. This study received primary support from the RSF grant No. 16-36-00122 to MC and grant No. 16-06-00364 to EP.

Keywords: gene pool, haplogroup, Kurds, SNP and STR markers, Yezidis

Procedia PDF Downloads 189
22062 The Legal Implications of Gender Quota for Public Companies

Authors: Murat Can Pehlivanoglu

Abstract:

Historically, gender equality has been mainly defended in the legal arenas of constitutional law and employment law. However, social and economic progress has required corporate law to provide gender equality on corporate boards. Recently, following the trend in Europe, the State of California (United States) enacted a law requiring that every publicly traded corporation based in California should have women on its board of directors. Still, the legal, social and economic implications of this law are yet to be discovered. The contractarian view of corporate law is predominant in the U.S. jurisprudence. However, gender quota law may not be justified through contractarian theory grounds. Therefore, the conformity of gender quota law with the general principles of U.S. corporate law remains questionable, and the immunity of close corporations from the scope of gender quota legislation provides support for the discrepancy. The methodology employed in this paper in the discussion of the rule’s conformity with corporate law is doctrinal, and American case law and legal scholarship are the basis for this discussion. This paper uses the aforementioned California law as sample legislation to evaluate the gender quota laws’ conformity with the contractarian theory of corporate law. It chooses California law as the sample due to its newness and the presence of pending shareholder lawsuits against it. Also, since California is home to global companies, the effect of such law is expected to be wider. As alternative theories laid down by corporate law may already be activated to provide gender equality on boards of publicly traded corporations, enacting a specific gender quota law would not be justified by an allegedly present statutory deficiency based on contractarian theory. However, this theoretical reality would not enable shareholders to succeed in their lawsuits against such law on corporate law grounds, and investors will have limited options against its results. This will eventually harm the integrity of the marketplace. Through the analysis of the contractarian theory of corporate law and California gender quota law, the major finding of this paper is that the contractarian theory of corporate law does not permit mandating board room equality through corporate law. In conclusion, it expresses that the issue should be dealt with through separate legislation with a different remedial structure, to preserve the traditional rationale of corporate law in U.S. law.

Keywords: board of directors, gender equality, gender quota, publicly traded corporations

Procedia PDF Downloads 110
22061 Remote Controlled of In-Situ Forming Thermo-sensitive Hydrogel Nanocomposite for Hyperthermia Therapy Application: Synthesis and Characterizations

Authors: Elbadawy A. Kamoun

Abstract:

Magnetically responsive hydrogel nanocomposite (NCH) based on composites of superparamagnetic of Fe3O4 nano-particles and temperature responsive hydrogel matrices were developed. The nanocomposite hydrogel system based on the temperature sensitive N-isopropylacrylamide hydrogels crosslinked by poly(ethylene glycol)-400 dimethacrylate (PEG400DMA) incorporating with chitosan derivative, was synthesized and characterized. Likewise, the NCH system was synthesized by visible-light free radical photopolymerization, using carboxylated camphorquinone-amine system to avoid the common risks of the use of UV-light especially in hyperthermia treatment. Superparamagnetic of iron oxide nanoparticles were introduced into the hydrogel system by polymerizing mixture technique and monomer solution. FT-IR with Raman spectroscopy and Wide angle-XRD analysis were utilized to verify the chemical structure of NCH and exfoliation reaction for nanoparticles, respectively. Additionally, morphological structure of NCH was investigated using SEM and TEM photographs. The swelling responsive of the current nanocomposite hydrogel system with different crosslinking conditions, temperature, magnetic field efficiency, and the presence effect of magnetic nanoparticles were evaluated. Notably, hydrolytic degradation of this system was proved in vitro application. While, in-vivo release profile behavior is under investigation nowadays. Moreover, the compatibility and cytotoxicity tests were previously investigated in our studies for photoinitiating system. These systems show promised polymeric material candidate devices and are expected to have a wide applicability in various biomedical applications as mildly.

Keywords: hydrogel nanocomposites, tempretaure-responsive hydrogel, superparamagnetic nanoparticles, hyperthermia therapy

Procedia PDF Downloads 258
22060 Unmanned Aerial Vehicle Landing Based on Ultra-Wideband Localization System and Optimal Strategy for Searching Optimal Landing Point

Authors: Meng Wu

Abstract:

Unmanned aerial vehicle (UAV) landing technology is a common task that is required to be fulfilled by fly robots. In this paper, the crazyflie2.0 is located by ultra-wideband (UWB) localization system that contains 4 UWB anchors. Another UWB anchor is introduced and installed on a stationary platform. One cost function is designed to find the minimum distance between crazyflie2.0 and the anchor installed on the stationary platform. The coordinates of the anchor are unknown in advance, and the goal of the cost function is to define the location of the anchor, which can be considered as an optimal landing point. When the cost function reaches the minimum value, the corresponding coordinates of the UWB anchor fixed on the stationary platform can be calculated and defined as the landing point. The simulation shows the effectiveness of the method in this paper.

Keywords: UAV landing, UWB localization system, UWB anchor, cost function, stationary platform

Procedia PDF Downloads 56
22059 Numerical Investigation of the Electromagnetic Common Rail Injector Characteristics

Authors: Rafal Sochaczewski, Ksenia Siadkowska, Tytus Tulwin

Abstract:

The paper describes the modeling of a fuel injector for common rail systems. A one-dimensional model of a solenoid-valve-controlled injector with Valve Closes Orifice (VCO) spray was modelled in the AVL Hydsim. This model shows the dynamic phenomena that occur in the injector. The accuracy of the calibration, based on a regulation of the parameters of the control valve and the nozzle needle lift, was verified by comparing the numerical results of injector flow rate. Our model is capable of a precise simulation of injector operating parameters in relation to injection time and fuel pressure in a fuel rail. As a result, there were made characteristics of the injector flow rate and backflow.

Keywords: common rail, diesel engine, fuel injector, modeling

Procedia PDF Downloads 398
22058 The International Prohibition of Religiously-Motivated 'Incitement' to Violence

Authors: J. D. Temperman

Abstract:

Introduction: In particular, in relation to religion, the meaning and scope of freedom of expression have been tested in recent times. This paper investigates the legal justifications for restrictions that have been suggested in this area and asks whether they are sustainable from an international human rights perspective. The universal human rights instruments, particularly the UN International Covenant on Civil and Political Rights (ICCPR), are increasingly geared towards eradicating ‘incitement’ to contingent harms like violence or discrimination, whilst forms of extreme speech that fall short of such incitement are to be protected rather than countered by states. Human Rights Committee’s draft-General Comment on freedom of expression, adopted in 2011, provides another strong indication that this is the envisaged way forward: repealing anti-blasphemy and anti-religious defamation laws, whilst simultaneously increasing efforts to combat ‘incitement’. Within regional human rights frameworks, notably the European Convention system, judgments have in fact supported legal restrictions on both hate speech, holocaust denial, and blasphemy or religious defamation. Major contributions to scholarship: This paper proposes an actus reus for the offense of ‘advocacy of religious hatred that constitutes incitement to discrimination or violence’, as enshrined in Article 20(2) of the UN ICCPR. In underscoring the high threshold of ‘incitement’, the author distinguishes this offense from such notions as ‘blasphemy’ or ‘defamation of religions’. In addition to treating the said provision as a sui generis prohibition, the question is addresses whether a ‘right to be protected against incitement’ may be distilled from the ICCPR. Furthermore, the author will discuss the question of how to judge incitement; notably, is mens rea required to convict someone of incitement, and if so, what degree of mens rea? This analysis also includes the question how to balance content and context factors when addressing alleged instances of incitement, notably what factors make provide for a likelihood that imminent acts of violence or discrimination will ensue from an inciteful speech act? Methodology: This paper takes a double comparative approach: (i) it endeavours to compare and contrast monitoring bodies’ approach to incitement (notably, the UN Human Rights Committee, but also the UN Committee on the Elimination of Racial Discrimination which monitors states’ compliance with Article 4 of ICERD on incitement); and (ii) it endeavours to chart and compare and analyse from an international human rights perspective recent forms of state practice in the field of dealing with incitement (i.e. a comparative legal analysis and vertical human rights analysis of newly emerging incitement legislation in the light of the said international standards). Conclusion: This paper conceptualizes a legal notion – ‘incitement’ – encapsulated in international human rights law that may have a profound bearing on contemporary challenges of radicalization and religious strife.

Keywords: incitement, international human rights law, religious hatred, violence

Procedia PDF Downloads 293
22057 Clinician's Perspective of Common Factors of Change in Family Therapy: A Cross-National Exploration

Authors: Hassan Karimi, Fred Piercy, Ruoxi Chen, Ana L. Jaramillo-Sierra, Wei-Ning Chang, Manjushree Palit, Catherine Martosudarmo, Angelito Antonio

Abstract:

Background: The two psychotherapy camps, the randomized clinical trials (RCTs) and the common factors model, have competitively claimed specific explanations for therapy effectiveness. Recently, scholars called for empirical evidence to show the role of common factors in therapeutic outcome in marriage and family therapy. Purpose: This cross-national study aims to explore how clinicians, across different nations and theoretical orientations, attribute the contribution of common factors to therapy outcome. Method: A brief common factors questionnaire (CFQ-with a Cronbach’s Alpha, 0.77) was developed and administered in seven nations. A series of statistical analyses (paired-samples t-test, independent sample t-test, ANOVA) were conducted: to compare clinicians perceived contribution of total common factors versus model-specific factors, to compare each pair of common factors’ categories, and to compare clinicians from collectivistic nations versus clinicians from individualistic nation. Results: Clinicians across seven nations attributed 86% to common factors versus 14% to model-specific factors. Clinicians attributed 34% of therapeutic change to client’s factors, 26% to therapist’s factors, 26% to relationship factors, and 14% to model-specific techniques. The ANOVA test indicated each of the three categories of common factors (client 34%, therapist 26%, relationship 26%) showed higher contribution in therapeutic outcome than the category of model specific factors (techniques 14%). Clinicians with psychology degree attributed more contribution to model-specific factors than clinicians with MFT and counseling degrees who attributed more contribution to client factors. Clinicians from collectivistic nations attributed larger contributions to therapist’s factors (M=28.96, SD=12.75) than the US clinicians (M=23.22, SD=7.73). The US clinicians attributed a larger contribution to client’s factors (M=39.02, SD=1504) than clinicians from the collectivistic nations (M=28.71, SD=15.74). Conclusion: The findings indicate clinicians across the globe attributed more than two thirds of therapeutic change to CFs, which emphasize the training of the common factors model in the field. CFs, like model-specific factors, vary in their contribution to therapy outcome in relation to specific client, therapist, problem, treatment model, and sociocultural context. Sociocultural expectations and norms should be considered as a context in which both CFs and model-specific factors function toward therapeutic goals. Clinicians need to foster a cultural competency specifically regarding the divergent ways that CFs can be activated due to specific sociocultural values.

Keywords: common factors, model-specific factors, cross-national survey, therapist cultural competency, enhancing therapist efficacy

Procedia PDF Downloads 271
22056 Strengthening Legal Protection of Personal Data through Technical Protection Regulation in Line with Human Rights

Authors: Tomy Prihananto, Damar Apri Sudarmadi

Abstract:

Indonesia recognizes the right to privacy as a human right. Indonesia provides legal protection against data management activities because the protection of personal data is a part of human rights. This paper aims to describe the arrangement of data management and data management in Indonesia. This paper is a descriptive research with qualitative approach and collecting data from literature study. Results of this paper are comprehensive arrangement of data that have been set up as a technical requirement of data protection by encryption methods. Arrangements on encryption and protection of personal data are mutually reinforcing arrangements in the protection of personal data. Indonesia has two important and immediately enacted laws that provide protection for the privacy of information that is part of human rights.

Keywords: Indonesia, protection, personal data, privacy, human rights, encryption

Procedia PDF Downloads 164
22055 Simulation Study on Comparison of Thermal Comfort during Heating with All-Air System and Radiant Floor System

Authors: Shiyun Liu

Abstract:

Radiant heating systems work fundamentally differently from air systems by taking advantage of both radiant and convective heat transfer to remove space heating load. There are rare studies on differences of heating systems between all-air system and radiant floor system. This paper uses the method of simulation based on state-space to calculate the indoor temperature and wall temperature of each system and shows how the dynamic heat transfer in rooms conditioned by a radiant system is different from an air system. Then this paper analyses the changes of indoor temperature of these two systems, finding out the differences between all-air heating system and radiant floor heating system to help the designer choose a more suitable heating system.

Keywords: radiant floor, all-air system, thermal comfort, simulation, heating system

Procedia PDF Downloads 145
22054 The Reality of E-Commerce in Egypt and Its Role in Enhancing Companies' Competitiveness

Authors: Esam El Gohary

Abstract:

— The companies’ ability to survive and compete in the fierce competition is determined by its competitiveness level. With the spread of information technology use and appearance of online shopping, it became crucial for companies to adopt e-commerce system to increase its competitiveness. This paper was conducted with the purpose of determine how increasing the service value through e-commerce factors (competitive strategy, ICT infrastructures, logistics, security, human resources and innovation) can enhance companies' competitiveness. The problem of this paper is summarized in the absence of the thorough awareness of e-commerce benefits for business owners and customers, as well as how to reduce the intangibility attributes of e-commerce. For this purpose this paper describes the e-commerce in Egypt and its success factors (infrastructures, legal and regulatory environment, human resources and innovation), as well as displays the barriers of such factor, to investigate the significant of these factors on increasing service value and enhance companies' competitiveness. This paper revealed that e-commerce companies have many opportunities to enhance its competitiveness in Egypt, which is enhanced by several factors. The most important factors are “strong ICT infrastructure, qualified and skilled human resources, in addition to the distinctive logistics that distinguish Egypt due to its location, strong legal and regulatory environment and Innovation, as well as the competitive strategy. As well as, companies encounter several threats such as; the lack of infrastructures and logistics in rural areas, the absence of the inclusive understanding and awareness of e-commerce, fear from e-payment transactions and fraud, the ambiguity and burdensome of customs. Through the research findings several recommendations were introduced to both government and companies to overcome threats and exploit opportunities to improve performance and enhance companies' competitiveness.

Keywords: e-commerce competitiveness, e-commerce factors, e-commerce in Egypt, information technology

Procedia PDF Downloads 89
22053 A Framework for Security Risk Level Measures Using CVSS for Vulnerability Categories

Authors: Umesh Kumar Singh, Chanchala Joshi

Abstract:

With increasing dependency on IT infrastructure, the main objective of a system administrator is to maintain a stable and secure network, with ensuring that the network is robust enough against malicious network users like attackers and intruders. Security risk management provides a way to manage the growing threats to infrastructures or system. This paper proposes a framework for risk level estimation which uses vulnerability database National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) and the Common Vulnerability Scoring System (CVSS). The proposed framework measures the frequency of vulnerability exploitation; converges this measured frequency with standard CVSS score and estimates the security risk level which helps in automated and reasonable security management. In this paper equation for the Temporal score calculation with respect to availability of remediation plan is derived and further, frequency of exploitation is calculated with determined temporal score. The frequency of exploitation along with CVSS score is used to calculate the security risk level of the system. The proposed framework uses the CVSS vectors for risk level estimation and measures the security level of specific network environment, which assists system administrator for assessment of security risks and making decision related to mitigation of security risks.

Keywords: CVSS score, risk level, security measurement, vulnerability category

Procedia PDF Downloads 306
22052 Pulsed-Wave Doppler Ultrasonographic Assessment of the Maximum Blood Velocity in Common Carotid Artery in Horses after Administration of Ketamine and Acepromazine

Authors: Saman Ahani, Aboozar Dehghan, Roham Vali, Hamid Salehian, Amin Ebrahimi

Abstract:

Pulsed-wave (PW) doppler ultrasonography is a non-invasive, relatively accurate imaging technique that can measure blood speed. The imaging could be obtained via the common carotid artery, as one of the main vessels supplying the blood of vital organs. In horses, factors such as susceptibility to depression of the cardiovascular system and their large muscular mass have rendered them vulnerable to changes in blood speed. One of the most important factors causing blood velocity changes is the administration of anesthetic drugs, including Ketamine and Acepromazine. Thus, in this study, the Pulsed-wave doppler technique was performed to assess the highest blood velocity in the common carotid artery following administration of Ketamine and Acepromazine. Six male and six female healthy Kurdish horses weighing 351 ± 46 kg (mean ± SD) and aged 9.2 ± 1.7 years (mean ± SD) were housed under animal welfare guidelines. After fasting for six hours, the normal blood flow velocity in the common carotid artery was measured using a Pulsed-wave doppler ultrasonography machine (BK Medical, Denmark), and a high-frequency linear transducer (12 MHz) without applying any sedative drugs as a control group. The same procedure was repeated after each individual received the following medications: 1.1, 2.2 mg/kg Ketamine (Pfizer, USA), and 0.5, 1 mg/kg Acepromizine (RACEHORSE MEDS, Ukraine), with an interval of 21 days between the administration of each dose and/or drug. The ultrasonographic study was done five (T5) and fifteen (T15) minutes after injecting each dose intravenously. Lastly, the statistical analysis was performed using SPSS software version 22 for Windows and a P value less than 0.05 was considered to be statistically significant. Five minutes after administration of Ketamine (1.1, 2.2 mg/kg) in both male and female horses, the blood velocity decreased to 38.44, 34.53 cm/s in males, and 39.06, 34.10 cm/s in females in comparison to the control group (39.59 and 40.39 cm/s in males and females respectively) while administration of 0.5 mg/kg Acepromazine led to a significant rise (73.15 and 55.80 cm/s in males and females respectively) (p<0.05). It means that the most drastic change in blood velocity, regardless of gender, refers to the latter dose/drug. In both medications and both genders, the increase in doses led to a decrease in blood velocity compared to the lower dose of the same drug. In all experiments in this study, the blood velocity approached its normal value at T15. In another study comparing the blood velocity changes affected by Ketamine and Acepromazine through femoral arteries, the most drastic changes were attributed to Ketamine; however, in this experiment, the maximum blood velocity was observed following administration of Acepromazine via the common carotid artery. Therefore, further experiments using the same medications are suggested using Pulsed-wave doppler measuring the blood velocity changes in both femoral and common carotid arteries simultaneously.

Keywords: Acepromazine, common carotid artery, horse, ketamine, pulsed-wave doppler ultrasonography

Procedia PDF Downloads 108
22051 Modeling and Analysis of Solar Assisted Adsorption Cooling System Using TRNSYS

Authors: M. Wajahat, M. Shoaib, A. Waheed

Abstract:

As a result of increase in world energy demand as well as the demand for heating, refrigeration and air conditioning, energy engineers are now more inclined towards the renewable energy especially solar based thermal driven refrigeration and air conditioning systems. This research is emphasized on solar assisted adsorption refrigeration system to provide comfort conditions for a building in Islamabad. The adsorption chiller can be driven by low grade heat at low temperature range (50 -80 °C) which is lower than that required for generator in absorption refrigeration system which may be furnished with the help of common flat plate solar collectors (FPC). The aim is to offset the total energy required for building’s heating and cooling demand by using FPC’s thus reducing dependency on primary energy source hence saving energy. TRNSYS is a dynamic modeling and simulation tool which can be utilized to simulate the working of a complete solar based adsorption chiller to meet the desired cooling and heating demand during summer and winter seasons, respectively. Modeling and detailed parametric analysis of the whole system is to be carried out to determine the optimal system configuration keeping in view various design constraints. Main focus of the study is on solar thermal loop of the adsorption chiller to reduce the contribution from the auxiliary devices.

Keywords: flat plate collector, energy saving, solar assisted adsorption chiller, TRNSYS

Procedia PDF Downloads 635
22050 Design an Expert System to Assess the Hydraulic System in Thermal and Hydrodynamic Aspect

Authors: Ahmad Abdul-Razzak Aboudi Al-Issa

Abstract:

Thermal and Hydrodynamic are basic aspects in any hydraulic system and therefore, they must be assessed with regard to this aspect before constructing the system. This assessment needs a good expertise in this aspect to obtain an efficient hydraulic system. Therefore, this study aims to build an expert system called Hydraulic System Calculations (HSC) to ensure a smooth operation for the hydraulic system. The expert system (HSC) had been designed and coded in an user-friendly interactive program called Microsoft Visual Basic 2010. The suggested code provides the designer with a number of choices to resolve the problem of hydraulic oil overheating which may arise during the continuous operation of the hydraulic unit. As a result, the HSC can minimize the human errors, effort, time and cost of hydraulic machine design.

Keywords: fluid power, hydraulic system, thermal and hydrodynamic, expert system

Procedia PDF Downloads 425
22049 Ratification of the United Nations Convention for the Promotion and Protection of Their Human Rights and the Paradoxes of the Discriminatory Right to Acquire the Status of Persons with Disabilities in Cameroon

Authors: Dakeyi Athanase

Abstract:

The ratification of an international human rights legal instrument provides signatory States with an opportunity to assume a set of obligations and rights for the benefit of their citizens, offering increased possibilities, opportunities, and means to access an improved quality of life – to be, to appear, and to become. Developed nations typically experience cultural, political, social, economic, legal, and regulatory transformations in response to this transition. In a methodologically proactive approach, mechanisms undergo a visible and comprehensible process of qualitative and quantitative change. Conversely, in nations undergoing development, the response to such ratification varies. Some demonstrate positive policy changes, while others remain stagnant or regress. Cameroon falls into the second category, despite efforts, as it legally prohibits 50% of its population with disabilities from acquiring the status of a person with a disability. The overarching goal of this communication is to highlight these deficiencies and their detrimental effects on various aspects of life, fostering awareness among beneficiaries and advocating for more inclusive transformations in the country. Our project employs a popular and participatory methodological approach by involving beneficiaries and their organizations in its preparation. It is also inclusive, representing the diversity of disabilities and engaging natural and legal persons from various backgrounds. Active consultations occur at all levels of the activities. Anticipated outcomes include raising awareness globally among nations, international cooperation organizations, NGOs, and other inclusive development actors. We seek their support for local advocacy efforts to fully implement the United Nations Convention on the Rights of Persons with Disabilities (CRPD). Concurrently, we hope they express solidarity with the victims in Cameroon who have been left behind and recommend legal reforms to align domestic and international legislation with the promotion and protection of disability rights.

Keywords: droit, convention, handicap, discrimination, participation, inclusion

Procedia PDF Downloads 40
22048 Development of E-Tendering Models for Nigerian Public Procuring Entities

Authors: Bello Abdullahi, Kabir Bala, Yahaya M. Ibrahim, Ahmed D. Ibrahim

Abstract:

Public sector tendering has traditionally been conducted using manual paper-based processes which are known to be inefficient, less transparent, and more prone to manipulations and errors. However, the advent of the Internet and its associated technologies has led to the development of numerous e-Tendering systems that addressed many of the problems associated with the manual paper-based tendering system. Currently, in Nigeria, the public tendering processes are largely conducted based on manual paper-based system that is bedevilled by a number of problems such as inordinate delays, inefficiencies, manipulation of the tender evaluation process, corruption, lack of transparency and competition, among other problems. These problems can be addressed through the adoption of existing web-based e-Tendering systems which are known to address most of these problems. However, these existing e-Tendering systems that have been developed are not based on the Nigerian legal procurement processes and as such their suitability for local application is very limited. This paper is part of a larger study that attempt to address this problem through the development of an e-Tendering system that is based on the requirements of the Nigerian public procuring entities. In this paper, the identified tendering processes commonly used by Nigerian public procuring entities in the selection of construction sources are presented. A multi-methods research approach was used to identify those tendering processes. Specifically, 19 existing business use cases used by Nigerian public procuring entities were identified and 61 system use cases were prescribed based on the identified business use cases. The use cases were used as the basis for the development of domain and software conceptual models. The models were successfully used to guide the development of an e-Tendering system called NPS-eTender. Ripple and Unified Process were adopted as the software development methodologies.

Keywords: e-tendering, e-procurement, requirement model, conceptual model, public sector tendering, public procurement

Procedia PDF Downloads 176
22047 Closing the Front Door of Child Protection: Rethinking Mandated Reporting

Authors: Miriam Itzkowitz, Katie Olson

Abstract:

Through an interdisciplinary and trauma-responsive lens, this article reviews the legal and social history of mandated reporting laws and family separation, examines the ethical conundrum of mandated reporting as it relates to evidence-based practice, and discusses alternatives to mandated reporting as a primary prevention strategy. Using existing and emerging data, the authors argue that mandated reporting as a universal strategy contributes to racial disproportionality in the child welfare system and that anti-racist practices should begin with an examination of our reliance on mandated reporting.

Keywords: child welfare, education, mandated reporting, racial disproportionality, trauma

Procedia PDF Downloads 319
22046 Low Power Consuming Electromagnetic Actuators for Pulsed Pilot Stages

Authors: M. Honarpardaz, Z. Zhang, J. Derkx, A. Trangärd, J. Larsson

Abstract:

Pilot stages are one of the most common positioners and regulators in industry. In this paper, we present two novel concepts for pilot stages with low power consumption to regulate a pneumatic device. Pilot 1, first concept, is designed based on a conventional frame core electro-magnetic actuator and a leaf spring to control the air flow and pilot 2 has an axisymmetric actuator and spring made of non-oriented electrical steel. Concepts are simulated in a system modeling tool to study their dynamic behavior. Both concepts are prototyped and tested. Experimental results are comprehensively analyzed and compared. The most promising concept that consumes less than 8 mW is highlighted and presented.

Keywords: electro-magnetic actuator, multidisciplinary system, low power consumption, pilot stage

Procedia PDF Downloads 241
22045 Realising the Socio-Economic Rights of Refugees Under Human Rights Law: A Case Study of South Africa

Authors: Taguekou Kenfack Alexie

Abstract:

For a long time, refugee protection has constituted one of the main concerns of the international community as a whole and for the South African government in particular.The focus of this paper is on the challenges refugees face in accessing their rights in South Africa. In particular, it analyses the legal framework for the protection of the socio economic rights of refugees under international law, regional and domestic law and the extent to which the rights have been realized. The main hypothesis of the study centered on the fact that the social protection of refugees in South Africa is in conformity with international standards. To test this hypothesis, the qualitative research method was applied. Refugee related legal instruments were analyzed as well as academic publications, organizational reports and internet sources. The data analyzed revealed that there has been enormous progress in meeting international standards in the areas of education, emergency relief and assistance, protection of women and refugee children. The results also indicated that much remain to be desired in such areas as nutrition, shelter, health care, freedom of movement and very importantly, employment and social security. The paper also seeks to address the obstacles which prevent the proper treatment of refugees and to make recommendations as how the South African government can better regulate the treatment of refugees living in its territory.Recommendations include the amendment of the legal instruments that provide the normative framework for protection and improvement of protection policies to reflect the changing dynamics.

Keywords: international community, refugee, socioeconomic rights, social protection

Procedia PDF Downloads 264
22044 To Ensure Maximum Voter Privacy in E-Voting Using Blockchain, Convolutional Neural Network, and Quantum Key Distribution

Authors: Bhaumik Tyagi, Mandeep Kaur, Kanika Singla

Abstract:

The advancement of blockchain has facilitated scholars to remodel e-voting systems for future generations. Server-side attacks like SQL injection attacks and DOS attacks are the most common attacks nowadays, where malicious codes are injected into the system through user input fields by illicit users, which leads to data leakage in the worst scenarios. Besides, quantum attacks are also there which manipulate the transactional data. In order to deal with all the above-mentioned attacks, integration of blockchain, convolutional neural network (CNN), and Quantum Key Distribution is done in this very research. The utilization of blockchain technology in e-voting applications is not a novel concept. But privacy and security issues are still there in a public and private blockchains. To solve this, the use of a hybrid blockchain is done in this research. This research proposed cryptographic signatures and blockchain algorithms to validate the origin and integrity of the votes. The convolutional neural network (CNN), a normalized version of the multilayer perceptron, is also applied in the system to analyze visual descriptions upon registration in a direction to enhance the privacy of voters and the e-voting system. Quantum Key Distribution is being implemented in order to secure a blockchain-based e-voting system from quantum attacks using quantum algorithms. Implementation of e-voting blockchain D-app and providing a proposed solution for the privacy of voters in e-voting using Blockchain, CNN, and Quantum Key Distribution is done.

Keywords: hybrid blockchain, secure e-voting system, convolutional neural networks, quantum key distribution, one-time pad

Procedia PDF Downloads 74
22043 GIS Based Project Management Information System for Infrastructure Projects

Authors: Riki Panchal, Debasis Sarkar

Abstract:

This paper describes the work done for the GIS-based project management for different infrastructure projects. It is a review paper which gives the idea of the trends in the construction project management and various models adopted for the betterment of the project planning and execution. Traditional scheduling and progress control techniques such as bar charts and the critical path method fail to provide information pertaining to the spatial aspects of a construction project. An integrated system was developed to represent construction progress not only in terms of a CPM schedule but also in terms of a graphical representation of the construction that is synchronized with the work schedule. Hence, it is suggested to work on the common platform from where all the data can be shared and analyzed.

Keywords: GIS, project management, integrated model, infrastructure project

Procedia PDF Downloads 500
22042 Human Dignity as a Source and Limitation of Personal Autonomy

Authors: Jan Podkowik

Abstract:

The article discusses issues of mutual relationships of human dignity and personal autonomy. According to constitutions of many countries and international human rights law, human dignity is a fundamental and inviolable value. It is the source of all freedoms and rights, including personal autonomy. Human dignity, as an inherent, inalienable and non-gradable value comprising an attribute of all people, justifies freedom of action according to one's will and following one's vision of good life. On the other hand, human dignity imposes immanent restrictions to personal autonomy regarding decisions on commercialization of the one’s body, etc. It points to the paradox of dignity – the source of freedom and conditions (basic) of its limitations. The paper shows the theoretical concept of human dignity as an objective value among legal systems, determining the boundaries of legal protection of personal autonomy. It is not, therefore, the relevant perception of human dignity and freedom as opposite values. Reference point has been made the normative provisions of the Polish Constitution and the European Convention on Human Rights and Fundamental Freedoms as well as judgments of constitutional courts.

Keywords: autonomy, constitution, human dignity, human rights

Procedia PDF Downloads 276
22041 Obtaining High-Dimensional Configuration Space for Robotic Systems Operating in a Common Environment

Authors: U. Yerlikaya, R. T. Balkan

Abstract:

In this research, a method is developed to obtain high-dimensional configuration space for path planning problems. In typical cases, the path planning problems are solved directly in the 3-dimensional (D) workspace. However, this method is inefficient in handling the robots with various geometrical and mechanical restrictions. To overcome these difficulties, path planning may be formalized and solved in a new space which is called configuration space. The number of dimensions of the configuration space comes from the degree of freedoms of the system of interest. The method can be applied in two ways. In the first way, the point clouds of all the bodies of the system and interaction of them are used. The second way is performed via using the clearance function of simulation software where the minimum distances between surfaces of bodies are simultaneously measured. A double-turret system is held in the scope of this study. The 4-D configuration space of a double-turret system is obtained in these two ways. As a result, the difference between these two methods is around 1%, depending on the density of the point cloud. The disparity between the two forms steadily decreases as the point cloud density increases. At the end of the study, in order to verify 4-D configuration space obtained, 4-D path planning problem was realized as 2-D + 2-D and a sample path planning is carried out with using A* algorithm. Then, the accuracy of the configuration space is proved using the obtained paths on the simulation model of the double-turret system.

Keywords: A* algorithm, autonomous turrets, high-dimensional C-space, manifold C-space, point clouds

Procedia PDF Downloads 129
22040 Variability Management of Contextual Feature Model in Multi-Software Product Line

Authors: Muhammad Fezan Afzal, Asad Abbas, Imran Khan, Salma Imtiaz

Abstract:

Software Product Line (SPL) paradigm is used for the development of the family of software products that share common and variable features. Feature model is a domain of SPL that consists of common and variable features with predefined relationships and constraints. Multiple SPLs consist of a number of similar common and variable features, such as mobile phones and Tabs. Reusability of common and variable features from the different domains of SPL is a complex task due to the external relationships and constraints of features in the feature model. To increase the reusability of feature model resources from domain engineering, it is required to manage the commonality of features at the level of SPL application development. In this research, we have proposed an approach that combines multiple SPLs into a single domain and converts them to a common feature model. Extracting the common features from different feature models is more effective, less cost and time to market for the application development. For extracting features from multiple SPLs, the proposed framework consists of three steps: 1) find the variation points, 2) find the constraints, and 3) combine the feature models into a single feature model on the basis of variation points and constraints. By using this approach, reusability can increase features from the multiple feature models. The impact of this research is to reduce the development of cost, time to market and increase products of SPL.

Keywords: software product line, feature model, variability management, multi-SPLs

Procedia PDF Downloads 52
22039 Predictive Analytics of Bike Sharing Rider Parameters

Authors: Bongs Lainjo

Abstract:

The evolution and escalation of bike-sharing programs (BSP) continue unabated. Since the sixties, many countries have introduced different models and strategies of BSP. These include variations ranging from dockless models to electronic real-time monitoring systems. Reasons for using this BSP include recreation, errands, work, etc. And there is all indication that complex, and more innovative rider-friendly systems are yet to be introduced. The objective of this paper is to analyze current variables established by different operators and streamline them identifying the most compelling ones using analytics. Given the contents of available databases, there is a lack of uniformity and common standard on what is required and what is not. Two factors appear to be common: user type (registered and unregistered, and duration of each trip). This article uses historical data provided by one operator based in the greater Washington, District of Columbia, USA area. Several variables including categorical and continuous data types were screened. Eight out of 18 were considered acceptable and significantly contribute to determining a useful and reliable predictive model. Bike-sharing systems have become popular in recent years all around the world. Although this trend has resulted in many studies on public cycling systems, there have been few previous studies on the factors influencing public bicycle travel behavior. A bike-sharing system is a computer-controlled system in which individuals can borrow bikes for a fee or free for a limited period. This study has identified unprecedented useful, and pragmatic parameters required in improving BSP ridership dynamics.

Keywords: sharing program, historical data, parameters, ridership dynamics, trip duration

Procedia PDF Downloads 120
22038 Iraqi Women’s Rights Under State Civil Law and Conservative Influences: A Study of Legal Documents and Social Implementation

Authors: Rose Hattab

Abstract:

Women have been an important dynamic in religious context and the state-building process of Arab countries throughout history. During the 1970s as the movement for women’s activism and rights developed, the Iraqi state under the Ba’ath Party began to provide Iraqi women with legal and civil rights. This was done to liberate women from the grasps of social traditions and was a tangible espousing of equality between men and women in the process of nation-building. Whereas women’s rights were stronger and more supported throughout the earliest years of the Ba’ath Regime (1970-1990), the aftermath of the Gulf War and economic sanctions on the conditions of Iraqi society laid the foundation for a division of women’s rights between civil and religious authorities. Personal status codes that were secured in 1959 were being pushed back by amendments made in coordination with religious leaders. Civil laws were present on paper, but religious authority took prominence in practice. The written legal codes were inclusive of women’s rights, but there is not an active or ensured practice of these rights within Iraqi society. This is due to many different factors, such as religious, sectarian, political and conservative reasons that hold back or limit the ability for Iraqi women to have autonomy in aspects such as participation in the workforce, getting married, and ensuring social justice. This paper argues that the Personal Status Code introduced in 1959 – which replaced Sharia-run courts with personal status courts – provided Iraqi women with equality and increased mobility in social and economic dynamics. The statewide crisis felt after the Gulf War and the economic sanctions imposed by the United Nations led to a stark shift in the Ba’ath party’s political ideology. This ideological turn guided the social system to the embracement of social conservatism and religious traditions in the 1990s. The effect of this implementation continued after the establishment of a new Iraqi government during 2003-2005. Consequently, Iraqi women's rights in employment, marriage, and family became divided into paper and practice by religious authorities and civil law from that period to the present day. This paper also contributes to the literature by expanding on the gap between legal codes on paper and in practice, through providing an analysis of Iraqi women’s rights in the Iraqi Constitution of 2005 and Iraq’s Penal Code. The turn to conservative and religious traditions is derived from the multiplicity of identities that make up the Iraqi social fabric. In the aftermath of a totalitarian regime, active wars, and economic sanctions, the Iraqi people attempted to unite together through their different identities to create a sense of security in the midst of violence and chaos. This is not an excuse to diminish the importance of women’s rights, but in the process of building a new nation-state, women were lost from the narrative. Thus, the presence of gender equity is found in the written text but is not practiced and upheld in the social context.

Keywords: civil rights, Iraqi women, nation building, religion and conflict

Procedia PDF Downloads 126
22037 A Constructive Analysis of the Formation of LGBTQ Families: Where Utopia and Reality Meet

Authors: Panagiotis Pentaris

Abstract:

The issue of social and legal recognition of LGBTQ families is of high importance when exploring the possibility of a family. Of equal importance is the fact that both society and the individual contribute to the overall recognition of LGBTQ families. This paper is a conceptual discussion, by methodology, of both sides; it uses a method of constructive analysis to expound on this issue. This method’s aim is to broaden conceptual theory, and introduce a new relationship between concepts that were previously not associated by evidence. This exploration has found that LGBTQ realities from an international perspective may differ and both legal and social rights are critical toward self-consciousness and the formation of a family. This paper asserts that internalised and historic oppression of LGBTQ individuals, places them, not always and not in all places, in a disadvantageous position as far as engaging with the potential of forming a family goes. The paper concludes that lack of social recognition and internalised oppression are key barriers regarding LGBTQ families.

Keywords: family, gay, self-worth, LGBTQ, social rights

Procedia PDF Downloads 115
22036 The Τraits Τhat Facilitate Successful Student Performance in Distance Education: The Case of the Distance Education Unit at European University Cyprus

Authors: Dimitrios Vlachopoulos, George Tsokkas

Abstract:

Although it is not intended to identify distance education students as a homogeneous group, recent research has demonstrated that there are some demographic and personality common traits among most of them that provide the basis for the description of a typical distance learning student. The purpose of this paper is to describe these common traits and to facilitate their learning journey within a distance education program. The described research is an initiative of the Distance Education Unit at the European University Cyprus (Laureate International Universities) in the context of its action for the improvement of the students’ performance.

Keywords: distance education students, successful student performance, European University Cyprus, common traits

Procedia PDF Downloads 470
22035 An Analysis of Possible Implications of Patent Term Extension in Pharmaceutical Sector on Indian Consumers

Authors: Anandkumar Rshindhe

Abstract:

Patents are considered as good monopoly in India. It is a mechanism by which the inventor is encouraged to do invention and also to make available to the society at large with a new useful technology. Patent system does not provide any protection to the invention itself but to the claims (rights) which the patentee has identified in relation to his invention. Thus the patentee is granted monopoly to the extent of his recognition of his own rights in the form of utilities and all other utilities of invention are for the public. Thus we find both benefit to the inventor and the public at large that is the ultimate consumer. But developing any such technology is not free of cost. Inventors do a lot of investment in the coming out with a new technologies. One such example if of Pharmaceutical industries. These pharmaceutical Industries do lot of research and invest lot of money, time and labour in coming out with these invention. Once invention is done or process identified, in order to protect it, inventors approach Patent system to protect their rights in the form of claim over invention. The patent system takes its own time in giving recognition to the invention as patent. Even after the grant of patent the pharmaceutical companies need to comply with many other legal formalities to launch it as a drug (medicine) in market. Thus major portion in patent term is unproductive to patentee and whatever limited period the patentee gets would be not sufficient to recover the cost involved in invention and as a result price of patented product is raised very much, just to recover the cost of invent. This is ultimately a burden on consumer who is paying more only because the legislature has failed to provide for the delay and loss caused to patentee. This problem can be effectively remedied if Patent Term extension is done. Due to patent term extension, the inventor gets some more time in recovering the cost of invention. Thus the end product is much more cheaper compared to non patent term extension.The basic question here arises is that when the patent period granted to a patentee is only 20 years and out of which a major portion is spent in complying with necessary legal formalities before making the medicine available in market, does the company with the limited period of monopoly recover its investment made for doing research. Further the Indian patent Act has certain provisions making it mandatory on the part of patentee to make its patented invention at reasonable affordable price in India. In the light of above questions whether extending the term of patent would be a proper solution and a necessary requirement to protect the interest of patentee as well as the ultimate consumer. The basic objective of this paper would be to check the implications of Extending the Patent term on Indian Consumers. Whether it provides the benefits to the patentee, consumer or a hardship to the Generic industry and consumer.

Keywords: patent term extention, consumer interest, generic drug industry, pharmaceutical industries

Procedia PDF Downloads 436