Search results for: conflict of laws
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1706

Search results for: conflict of laws

1136 Psychological Functioning of Youth Experiencing Community and Collective Violence in Post-conflict Northern Ireland

Authors: Teresa Rushe, Nicole Devlin, Tara O Neill

Abstract:

In this study, we sought to examine associations between childhood experiences of community and collective violence and psychological functioning in young people who grew up in post-conflict Northern Ireland. We hypothesized that those who grew up with such experiences would demonstrate internalizing and externalizing difficulties in early adulthood and, furthermore, that these difficulties would be mediated by adverse childhood experiences occurring within the home environment. As part of the Northern Ireland Childhood Adversity Study, we recruited 213 young people aged 18-25 years (108 males) who grew up in the post-conflict society of Northern Ireland using purposive sampling. Participants completed a digital questionnaire to measure adverse childhood experiences as well as aspects of psychological functioning. We employed the Adverse Childhood Experience -International Questionnaire (ACE-IQ¬) adaptation of the original Adverse Childhood Experiences Questionnaire (ACE) as it additionally measured aspects of witnessing community violence (e.g., seeing someone being beaten/killed, fights) and experiences of collective violence (e.g., war, terrorism, police, or gangs’ battles exposure) during the first 18 years of life. 51% of our sample reported experiences of community and/or collective violence (N=108). Compared to young people with no such experiences (N=105), they also reported significantly more adverse experiences indicative of household dysfunction (e.g., family substance misuse, mental illness or domestic violence in the family, incarceration of a family member) but not more experiences of abuse or neglect. As expected, young people who grew up with the community and/or collective violence reported significantly higher anxiety and depression scores and were more likely to engage in acts of deliberate self-harm (internalizing symptoms). They also started drinking and taking drugs at a younger age and were significantly more likely to have been in trouble with the police (externalizing symptoms). When the type of violence exposure was separated by whether the violence was witnessed (community violence) or more directly experienced (collective violence), we found community and collective violence to have similar effects on externalizing symptoms, but for internalizing symptoms, we found evidence of a differential effect. Collective violence was associated with depressive symptoms, whereas witnessing community violence was associated with anxiety-type symptoms and deliberate self-harm. However, when experiences of household dysfunction were entered into the models predicting anxiety, depression, and deliberate self-harm, none of the main effects remained significant. This suggests internalizing type symptoms are mediated by immediate family-level experiences. By contrast, significant community and collective violence effects on externalizing behaviours: younger initiation of alcohol use, younger initiation of drug use, and getting into trouble with the police persisted after controlling for family-level factors and thus are directly associated with growing up with the community and collective violence. Given the cross-sectional nature of our study, we cannot comment on the direction of the effect. However, post-hoc correlational analyses revealed associations between externalising behaviours and personal factors, including greater risk-taking and young age at puberty. The implications of the findings will be discussed in relation to interventions for young people and families living with the community and collective violence.

Keywords: community and collective violence, adverse childhood experiences, youth, psychological wellbeing

Procedia PDF Downloads 69
1135 Surrogacy: A Comparative, Legal, Children’s Rights Perspective

Authors: Ronli Sifris

Abstract:

The last Australian Parliamentary inquiry into surrogacy took place in 2016. Since then, a number of countries have reviewed their surrogacy laws, including countries such as New Zealand and the United Kingdom, which traditionally have invoked similar legal approaches to Australia on a broad range of issues. The time is ripe to reform Australia’s surrogacy laws with a view to putting in place a system that best protects the rights of all parties to a surrogacy arrangement, and especially the rights of the child. There are two specific, linked issues which tend to be particularly contentious in the surrogacy context. The first relates to legal parentage. There are questions around whether the surrogate or the intended parents should be deemed the legal parents of a child born through surrogacy and what should be the process for any transfer of parentage. The second key issue relates to compensation and whether a surrogate should be compensated for the reproductive labour inherent in conceiving, gestating, and birthing a child. This paper will invoke a comparative analysis with a view to considering how different countries are regulating surrogacy and which approach best protects the rights all parties involved in the surrogacy arrangement, especially the rights of the children born through surrogacy. The specific countries to be considered are Australia, Canada, and California (United States). I have selected these countries for the following reasons: Australia is the jurisdiction where the author is based, it is, therefore, the jurisdiction with which she has the most familiarity. It allows altruistic surrogacy only and post-birth parentage orders in favour of the intended parents of children born through altruistic surrogacy California, as a jurisdiction allowing for compensated surrogacy and pre-birth parentage orders in favour of the intended parents, sits at the other end of the spectrum to Australia thereby providing an interesting point of comparison. Canada sits somewhere in the middle; it ostensibly allows only altruistic surrogacy, but in practice, many aspects of the Canadian process resemble compensated surrogacy. In addition to conducting a comparative analysis with other countries, the paper will also consider international human rights law as its overarching framework for determining the approach that best protects the rights of a child born through surrogacy. Particular attention will be paid to the United Nations Convention on the Rights of the Child as the key children’s rights treaty. The European Court of Human Rights will also be extensively considered as it has decided a number of cases relating to the rights of children born through surrogacy.

Keywords: surrogacy, children’s rights, australia, compensation, parentage

Procedia PDF Downloads 107
1134 From Knives to Kites: Developments and Dilemmas around the Use of Force in the Israeli–Palestinian Conflict since "Protective Edge"

Authors: Hilly Moodrick-Even Khen

Abstract:

This study analyzes the legal regulation of the use of force in international law in the context of three emerging Palestinian forms of struggle against Israeli occupation: the Knife Intifada, Gaza border disturbances, and the launching of incendiary kites. It discusses what legal paradigms or concepts should regulate the type and level of force used in each situation—a question that is complicated by various dilemmas—and appraises the Israel Defence Forces policies tailored in response. Methodologically, the study is based on analysis of scholarship on the conceptual legal issues as well as dicta of the courts. It evaluates the applicability of two legal paradigms regulating the use of force in military operations—(i) the conduct of hostilities and (ii) law enforcement—as well as the concept of self-defense in international law and the escalation of force procedure. While the “Knife Intifada” clearly falls under the law enforcement paradigm, the disturbances at the border and the launching of incendiary kites raise more difficult questions, as applying law enforcement, especially in the latter case, can have undesirable ramifications for safeguarding humanitarian interests. The use of force in the cases of the border disturbances and the incendiary kites should thus be regulated, mutatis mutandis, by the concept of self-defense and escalation of force procedures; and in the latter case, the hostilities paradigm can also be applied. The study provides a factual description and analysis of the background and nature of the forms of struggle in Gaza and the West Bank—in each case surveying the geo-political developments since operation Protective Edge, contextualizing how the organized and unorganized violent activities evolved, and analyzing them in terms of level of organization and intensity. It then presents the two paradigms of the use of force—law enforcement and conduct of hostilities—and the concept of self-defense. Lastly, it uses the factual findings as the basis for legally analyzing which paradigm or concept regulating the use of force applies for each form of struggle. The study concludes that in most cases, the concept of self-defense is preferable to the hostilities or the law enforcement paradigms, as it best safeguards humanitarian interests and ensures the least loss of civilian lives.

Keywords: Israeli-Palestinian conflict, self defense, terrorism, use of force

Procedia PDF Downloads 103
1133 Closing the Front Door of Child Protection: Rethinking Mandated Reporting

Authors: Miriam Itzkowitz, Katie Olson

Abstract:

Through an interdisciplinary and trauma-responsive lens, this article reviews the legal and social history of mandated reporting laws and family separation, examines the ethical conundrum of mandated reporting as it relates to evidence-based practice, and discusses alternatives to mandated reporting as a primary prevention strategy. Using existing and emerging data, the authors argue that mandated reporting as a universal strategy contributes to racial disproportionality in the child welfare system and that anti-racist practices should begin with an examination of our reliance on mandated reporting.

Keywords: child welfare, education, mandated reporting, racial disproportionality, trauma

Procedia PDF Downloads 319
1132 Healing (in) Relationship: The Theory and Practice of Inner-Outer Peacebuilding in North-Western India

Authors: Josie Gardner

Abstract:

The overall intention of this research is to reimagine peacebuilding in both in theory and practical application in light of the shortcomings and unsustainability of the current peacebuilding paradigm. These limitations are identified here as an overly rational-material approach to peacebuilding that neglects the inner dimension of peace for a fragmented rather than holistic model, and that espouses a conflict and violence-centric approach to peacebuilding. In counter, this presentation is purposed to investigate the dynamics of inner and outer peace as a holistic, complex system towards ‘inner-outer’ peacebuilding. This paper draws from primary research in the protracted conflict context of north-western India (Jammu, Kashmir & Ladakh) as a case study. This presentation has two central aims. First, to introduce the process of inner (psycho-spiritual) peacebuilding, which has thus far been neglected by mainstream and orthodox literature. Second, to examine why inner peacebuilding is essential for realising sustainable peace on a broader scale as outer (socio-political) peace and to better understand how the inner and outer dynamics of peace relate and affect one another. To these ends, Josephine (the researcher/author/presenter) partnered with Yakjah Reconciliation and Development Network to implement a series of action-oriented workshops and retreats centred around healing, reconciliation, leadership, and personal development for the dual purpose of collaboratively generating data, theory, and insights, as well as providing the youth leaders with an experiential, transformative experience. The research team created and used a novel methodological approach called Mapping Ritual Ecologies, which draws from Participatory Action Research and Digital Ethnography to form a collaborative research model with a group of 20 youth co-researchers who are emerging youth peace leaders in Kashmir, Jammu, and Ladakh. This research found significant intra- and inter-personal shifts towards an experience of inner peace through inner peacebuilding activities. Moreover, this process of inner peacebuilding affected their families and communities through interpersonal healing and peace leadership in an inside-out process of change. These insights have generated rich insights and have supported emerging theories about the dynamics between inner and outer peace, power, justice, and collective healing. This presentation argues that the largely neglected dimension of inner (psycho-spiritual) peacebuilding is imperative for broader socio-political (outer) change. Changing structures of oppression, injustice, and violence—i.e. structures of separation—requires individual, interpersonal, and collective healing. While this presentation primarily examines and advocates for inside-out peacebuilding and social justice, it will also touch upon the effect of systems of separation on the inner condition and human experience. This research reimagines peacebuilding as a holistic inner-outer approach. This offers an alternative path forward those weaves together self-actualisation and social justice. While contextualised within north-western India with a small case study population, the findings speak also to other conflict contexts as well as our global peacebuilding and social justice milieu.

Keywords: holistic, inner peacebuilding, psycho-spiritual, systems youth

Procedia PDF Downloads 91
1131 Social and Political Economy of Paid and Unpaid Work: Work of Women Home Based Workers in National Capital Region (NCR), India

Authors: Sudeshna Sengupta

Abstract:

Women’s work lives weave a complex fabric of myriad work relations and complex structures. Lives, when seen from the lens of work, is a saga of conjugated oppression by intertwined structures that are vertically and horizontally interwoven in a very complex manner. Women interact with multiple institutions through their work. The interactions and interplay of institutions shape their organization of work. They intersperse productive work with reproductive work, unpaid economic activities with unpaid care work, and all kinds of activities with leisure and self-care. The proposed paper intends to understand how women working as home-based workers in the National Capital Region (NCR) of India are organizing their everyday work, and how the organization of work is influenced by the interplay of structures. Situating itself in a multidisciplinary theoretical framework, this paper brings out how the gendering of work is playing out in the political, economic and social domain and shaping the work-life within the family, and in the paid workspace. The paper will use a primary data source, which is qualitative in nature. It will comprise 15 qualitative interviews of women home-based workers from the National Capital Region. The research uses a life history approach. The sampling was purposive using snowballing as a method. The dataset is part of the primary data (qualitative) collected for the ongoing Ph.D. work in Gender Studies at Ambedkar University Delhi. The home-based workers interviewed were in “non-factory” wage relations based on piece rates with flexible working hours. Their workplaces were their own homes with no spatial divide between living spaces and workspaces. Home-based workers were recognized as a group in the domain of labor economics in the 1980s. When menial work was cheaper than machine work, the capital owners preferred to outsource work as home-based work to women. These production spaces are fragmented and the identity of gender is created within labor processes to favor material accumulation. Both the employers and employees acknowledged the material gain of the capital owner when work was subcontracted to women at home. Simultaneously the market reinforced women’s reproductive role by conforming to patriarchal ideology. The contractors played an important role in implementing localized control on workers and also in finding workers for fragmented, gendered production processes. Their presence helped the employers in bringing together multiple forms of oppression that ranged from creating a structure to flout laws by creating shadow employers. It created an intertwined social and economic structure as well as a workspace where the line between productive and reproductive work gets blurred. The state invisibilized itself either by keeping the sector out of the domain of laws or by not implementing its own laws regulating working conditions or social security. It allowed the local hierarchy to function and define localized working conditions. The productive reproductive continuum reveals a labor control that influenced both the productive and reproductive work of women.

Keywords: informal sector, paid work, women workers, labor processes

Procedia PDF Downloads 148
1130 Crystallization of the US Supreme Court’s Role as an Arbiter of Constitutionality of Laws

Authors: Fethia Braik

Abstract:

This paper summarizes the history of the US Supreme Court. It did not enjoy today’s status. It did neither control legislation nor the executive power. It was until 1803, during Marshall’s term, that it gained the pride of ruling over the constitutionality of acts be they federal or local, congressional or presidential. The Chief Justice, whether intended or not, vested such power in the supreme judicial institution via the case of Marbury v. Madison. Such power, nevertheless, had not been exercised for many years, till the Dred Scott case.

Keywords: Judiciary Acts 1789, 1801, chief justice, associate justice, justice of peace, review of constitutionality of acts, Jay court, Ellsworth court, Marshall court

Procedia PDF Downloads 289
1129 The Influence of Family of Origin on Children: A Comprehensive Model and Implications for Positive Psychology and Psychotherapy

Authors: Meichen He, Xuan Yang

Abstract:

Background: In the field of psychotherapy, the role of the family of origin is of utmost importance. Over the past few decades, both individual-oriented and family-oriented approaches to child therapy have shown moderate success in reducing children's psychological and behavioral issues. Objective: However, in exploring how the family of origin influences individuals, it has been noted that there is a lack of comprehensive measurement indicators and an absence of an exact model to assess the impact of the family of origin on individual development. Therefore, this study aims to develop a model based on a literature review regarding the influence of the family of origin on children. Specifically, it will examine the effects of factors such as education level, economic status, maternal age, family integration, family violence, marital conflict, parental substance abuse, and alcohol consumption on children's self-confidence and life satisfaction. Through this research, we aim to further investigate the impact of the family of origin on children and provide directions for future research in positive psychology and psychotherapy. Methods: This study will employ a literature review methodology to gather and analyze relevant research articles on the influence of the family of origin on children. Subsequently, we will conduct quantitative analyses to establish a comprehensive model explaining how family of origin factors affect children's psychological and behavioral outcomes. Findings: the research has revealed that family of origin factors, including education level, economic status, maternal age, family integration, family violence, marital conflict, parental drug and alcohol consumption, have an impact on children's self-confidence and life satisfaction. These factors can affect children's psychological well-being and happiness through various pathways. Implications: The results of this study will contribute to a better understanding of the influence of the family of origin on children and provide valuable directions for future research in positive psychology and psychotherapy. This research will enhance awareness of children's psychological well-being and lay the foundation for improving psychotherapeutic methods.

Keywords: family of origion, positive psychology, developmental psychology, family education, social psychology, educational psychology

Procedia PDF Downloads 124
1128 Motion Planning of SCARA Robots for Trajectory Tracking

Authors: Giovanni Incerti

Abstract:

The paper presents a method for a simple and immediate motion planning of a SCARA robot, whose end-effector has to move along a given trajectory; the calculation procedure requires the user to define in analytical form or by points the trajectory to be followed and to assign the curvilinear abscissa as function of the time. On the basis of the geometrical characteristics of the robot, a specifically developed program determines the motion laws of the actuators that enable the robot to generate the required movement; this software can be used in all industrial applications for which a SCARA robot has to be frequently reprogrammed, in order to generate various types of trajectories with different motion times.

Keywords: motion planning, SCARA robot, trajectory tracking, analytical form

Procedia PDF Downloads 300
1127 The Impact of the Constitution of Myanmar on the Political Power of Aung San Suu Kyi and the Rohingya Conflict

Authors: Nur R. Daut

Abstract:

The objective of this paper is to offer an insight on how political power inequality has contributed and exacerbated the political violence towards the Rohingya ethnic group in Myanmar. In particular, this paper attempts to illustrate how power inequality in the country has prevented Myanmar’s leader Aung San Suu Kyi from taking effective measures on the issue. The research centers on the question of why Aung San Suu Kyi has been seen as not doing enough to stop the persecution of the Rohingya ethnic group ever since she was appointed the State Counsellor to the Myanmar government. As a Nobel Peace Prize laureate, Suu Kyi’s lack of action on the matter has come under severe criticism by the international community. Many have seen this as Suu Kyi’s failure to establish democracy and allowing mass killing to spread in the country. The real question that many perhaps should be asking, however, is how much power Suu Kyi actually holds within the government which is still heavily controlled by the military or Tatmadaw. This paper argues that Suu Kyi’s role within the government is limited which hinders constructive and effective measures to be taken on the Rohingya issue. Political power in this research is being measured by 3 factors: control over events such as burning of Rohingya villages, control over resources such as land ownership and media and control over actors such the Tatmadaw, police force and civil society who are greatly needed to ease and resolve the conflict. In order to illustrate which individuals or institution have control over all the 3 above factors, this paper will first study the constitution of Myanmar. The constitution will also be able to show the asymmetrical power relations as it will provide evidence as to how much political power Suu Kyi holds within the government in comparison to other political actors and institutions. Suu Kyi’s role as a state counsellor akin to a prime minister is a newly created position as the current constitution of Myanmar bars anyone with a foreign spouse from holding the post of a president in the country. This is already an indication of the inequality of political power between Suu Kyi and the military. Apart from studying the constitution of Myanmar, Suu Kyi’s speeches and various interviews are also studied in order to answer the research question. Unfortunately, Suu Kyi’s limited political power also involves the Buddhist monks in Myanmar who have held significant influence throughout the history of the country. This factor further prevents Suu Kyi from preserving the sanctity of human rights in Myanmar.

Keywords: Aung San Suu Kyi, constitution of Myanmar, inequality, political power, political violence, Rohingya, Tatmadaw

Procedia PDF Downloads 103
1126 Influence of Temperature on Properties of MOSFETs

Authors: Azizi Cherifa, O. Benzaoui

Abstract:

The thermal aspects in the design of power circuits often deserve as much attention as pure electric components aspects as the operating temperature has a direct influence on their static and dynamic characteristics. MOSFET is fundamental in the circuits, it is the most widely used device in the current production of semiconductor components using their honorable performance. The aim of this contribution is devoted to the effect of the temperature on the properties of MOSFETs. The study enables us to calculate the drain current as function of bias in both linear and saturated modes. The effect of temperature is evaluated using a numerical simulation, using the laws of mobility and saturation velocity of carriers as a function of temperature.

Keywords: temperature, MOSFET, mobility, transistor

Procedia PDF Downloads 334
1125 Corporate Governance and Minority Shareholders Protection in the United Kingdom

Authors: Meltem Karatepe Kaya

Abstract:

The concept of corporate governance is not new but, due to the recent international financial crisis, it has become prominent in contemporary business, accounting and legal debates. There is a wealth of anecdotal evidence which shows that protection of minority shareholders is an important issue in the corporate governance literature. Minority shareholders typically hold low amounts of stocks, so the benefits gained from their participation in shareholder meetings are very asymmetric to the cost. Therefore, the presence of a good corporate governance structure is the proper protection of and respect for the rights and interests of shareholders, particularly those of minority shareholders. The research will attempt to find answers to the following questions: Why minority shareholders’ rights should be protected? How minority shareholders’ rights could be improved? Does the legal framework in the United Kingdom provide adequate protection for minority shareholders? This study will assess regulations about the legal protections of minority shareholders and try to find answer this question: ’Why is it inevitable for company law to treat in a successful way the problems arising from minority shareholders' conflict with other shareholders of a company?’The protection of minority shareholders is not only a corporate governance objective in its own right but also has added importance particularly in developing countries. In the United Kingdom(UK) and the United States of America(USA), there are diffused ownership structures so that any shareholders do not influence the management of the company. This is in stark contrast to companies in developing countries such as Turkey where controlling shareholders and related insiders are a well-known feature of ownership structures, and where companies are often governed and managed by controlling shareholders such as family firms and associated companies through cross-shareholdings and pyramiding ownership structures. In Turkey, the agency problem is not between shareholders and management. Rather it gives rise to another dimension of the agency problem – a conflict of interest between majority shareholders (controlling) and minority shareholders. This research will make a particularly useful contribution to knowledge-based information and understanding of company law in the UK, particularly minority shareholders' remedies. It will not only give information about law and regulations of minority shareholders' remedies but also it will provide some knowledge about doctrinal discussions and relevant cases. The major contribution to study will be in the knowledge of law and regulation in the legal protections of minority shareholders in the United Kingdom and Turkey. In this study, the recommendations will be given for the development of the legal framework and practices of protections for minority shareholders and small investors.

Keywords: controlling shareholders, corporate governance, derivative actions, minority shareholders

Procedia PDF Downloads 160
1124 Alternative Approaches to Community Involvement in Resettlement Schemes to Prevent Potential Conflicts: Case Study in Chibuto District, Mozambique

Authors: Constâncio Augusto Machanguana

Abstract:

The world over, resettling communities, for whatever purpose (mining, dams, forestry and wildlife management, roads, or facilitating services delivery), often leads to tensions between those resettled, the investors, and the local and national governments involved in the process. Causes include unclear government legislation and regulations, confusing Corporate Social Responsibility policies and guidelines, and other social-economic policies leading to unrealistic expectations among those being resettled, causing frustrations within the community, shifting them to any imminent conflict against the investors (company). The exploitation of heavy mineral sands along Mozambique’s long coastline and hinterland has not been providing a benefit for the affected communities. A case in point is the exploration, since 2018, of heavy sands in Chibuto District in the Southern Province of Gaza. A likely contributing factor is the standard type of socio-economic surveys and community involvement processes that could smooth the relationship among the parties. This research aims to investigate alternative processes to plan, initiate and guide resettlement processes in such a way that tensions and conflicts are avoided. Based on the process already finished, compared to similar cases along with the country, mixed methods to collect primary data were adopted: three focus groups of 125 people, representing 324 resettled householders; five semi-structured interviews with relevant stakeholders such as the local government, NGO’s and local leaders to understand their role in all stages of the process. The preliminary results show that the community has limited or no understanding of the potential impacts of these large-scale explorations, and the apparent harmony between the parties (community and company) may hide the dissatisfaction of those resettled. So, rather than focusing on negative mining impacts, the research contributes to science by identifying the best resettlement approach that can be replicated in other contexts along with the country in the actual context of the new discovery of mineral resources.

Keywords: conflict mitigation, resettlement, mining, Mozambique

Procedia PDF Downloads 93
1123 Conceptualizing Conflict in the Gray Zone: A Comparative Analysis of Diplomatic, Military and Political Lenses

Authors: John Hardy, Paul Lushenko

Abstract:

he twenty-first century international security order has been fraught with challenges to the credibility and stability of the post-Cold War status quo. Although the American-led international system has rarely been threatened directly by dissatisfied states, an underlying challenge to the international security order has emerged in the form of a slow-burning abnegation of small but significant aspects of the status quo. Meanwhile, those security challenges which have threatened to destabilize order in the international system have not clearly belonged to the traditional notions of diplomacy and armed conflict. Instead, the main antagonists have been both states and non-state actors, the issues have crossed national and international boundaries, and contestation has occurred in a ‘gray zone’ between peace and war. Gray zone conflicts are not easily categorized as military operations, national security policies or political strategies, because they often include elements of diplomacy, military operations, and statecraft in complex combinations. This study applies three approaches to conceptualizing the gray zone in which many contemporary conflicts take place. The first approach frames gray zone conflicts as a form of coercive diplomacy, in which armed force is used to add credibility and commitment to political threats. The second approach frames gray zone conflicts as a form of discrete military operation, in which armed force is used sparingly and is limited to a specific issue. The third approach frames gray zones conflicts as a form of proxy war, in which armed force is used by or through third parties, rather than directly between belligerents. The study finds that each approach to conceptualizing the gray zone accounts for only a narrow range of issues which fall within the gap between traditional notions of peace and war. However, in combination, all three approaches are useful in explicating the gray zone and understanding the character of contemporary security challenges which defy simple categorization. These findings suggest that coercive diplomacy, discrete military operations, and proxy warfare provide three overlapping lenses for conceptualizing the gray zone and for understanding the gray zone conflicts which threaten international security in the early twenty-first century.

Keywords: gray zone, international security, military operations, national security, strategy

Procedia PDF Downloads 144
1122 Microsimulation of Potential Crashes as a Road Safety Indicator

Authors: Vittorio Astarita, Giuseppe Guido, Vincenzo Pasquale Giofre, Alessandro Vitale

Abstract:

Traffic microsimulation has been used extensively to evaluate consequences of different traffic planning and control policies in terms of travel time delays, queues, pollutant emissions, and every other common measured performance while at the same time traffic safety has not been considered in common traffic microsimulation packages as a measure of performance for different traffic scenarios. Vehicle conflict techniques that were introduced at intersections in the early traffic researches carried out at the General Motor laboratory in the USA and in the Swedish traffic conflict manual have been applied to vehicles trajectories simulated in microscopic traffic simulators. The concept is that microsimulation can be used as a base for calculating the number of conflicts that will define the safety level of a traffic scenario. This allows engineers to identify unsafe road traffic maneuvers and helps in finding the right countermeasures that can improve safety. Unfortunately, most commonly used indicators do not consider conflicts between single vehicles and roadside obstacles and barriers. A great number of vehicle crashes take place with roadside objects or obstacles. Only some recent proposed indicators have been trying to address this issue. This paper introduces a new procedure based on the simulation of potential crash events for the evaluation of safety levels in microsimulation traffic scenarios, which takes into account also potential crashes with roadside objects and barriers. The procedure can be used to define new conflict indicators. The proposed simulation procedure generates with the random perturbation of vehicle trajectories a set of potential crashes which can be evaluated accurately in terms of DeltaV, the energy of the impact, and/or expected number of injuries or casualties. The procedure can also be applied to real trajectories giving birth to new surrogate safety performance indicators, which can be considered as “simulation-based”. The methodology and a specific safety performance indicator are described and applied to a simulated test traffic scenario. Results indicate that the procedure is able to evaluate safety levels both at the intersection level and in the presence of roadside obstacles. The procedure produces results that are expressed in the same unity of measure for both vehicle to vehicle and vehicle to roadside object conflicts. The total energy for a square meter of all generated crash can be used and is shown on the map, for the test network, after the application of a threshold to evidence the most dangerous points. Without any detailed calibration of the microsimulation model and without any calibration of the parameters of the procedure (standard values have been used), it is possible to identify dangerous points. A preliminary sensitivity analysis has shown that results are not dependent on the different energy thresholds and different parameters of the procedure. This paper introduces a specific new procedure and the implementation in the form of a software package that is able to assess road safety, also considering potential conflicts with roadside objects. Some of the principles that are at the base of this specific model are discussed. The procedure can be applied on common microsimulation packages once vehicle trajectories and the positions of roadside barriers and obstacles are known. The procedure has many calibration parameters and research efforts will have to be devoted to make confrontations with real crash data in order to obtain the best parameters that have the potential of giving an accurate evaluation of the risk of any traffic scenario.

Keywords: road safety, traffic, traffic safety, traffic simulation

Procedia PDF Downloads 122
1121 Evaluation of Australian Open Banking Regulation: Balancing Customer Data Privacy and Innovation

Authors: Suman Podder

Abstract:

As Australian ‘Open Banking’ allows customers to share their financial data with accredited Third-Party Providers (‘TPPs’), it is necessary to evaluate whether the regulators have achieved the balance between protecting customer data privacy and promoting data-related innovation. Recognising the need to increase customers’ influence on their own data, and the benefits of data-related innovation, the Australian Government introduced ‘Consumer Data Right’ (‘CDR’) to the banking sector through Open Banking regulation. Under Open Banking, TPPs can access customers’ banking data that allows the TPPs to tailor their products and services to meet customer needs at a more competitive price. This facilitated access and use of customer data will promote innovation by providing opportunities for new products and business models to emerge and grow. However, the success of Open Banking depends on the willingness of the customers to share their data, so the regulators have augmented the protection of data by introducing new privacy safeguards to instill confidence and trust in the system. The dilemma in policymaking is that, on the one hand, lenient data privacy laws will help the flow of information, but at the risk of individuals’ loss of privacy, on the other hand, stringent laws that adequately protect privacy may dissuade innovation. Using theoretical and doctrinal methods, this paper examines whether the privacy safeguards under Open Banking will add to the compliance burden of the participating financial institutions, resulting in the undesirable effect of stifling other policy objectives such as innovation. The contribution of this research is three-fold. In the emerging field of customer data sharing, this research is one of the few academic studies on the objectives and impact of Open Banking in the Australian context. Additionally, Open Banking is still in the early stages of implementation, so this research traces the evolution of Open Banking through policy debates regarding the desirability of customer data-sharing. Finally, the research focuses not only on the customers’ data privacy and juxtaposes it with another important objective of promoting innovation, but it also highlights the critical issues facing the data-sharing regime. This paper argues that while it is challenging to develop a regulatory framework for protecting data privacy without impeding innovation and jeopardising yet unknown opportunities, data privacy and innovation promote different aspects of customer welfare. This paper concludes that if a regulation is appropriately designed and implemented, the benefits of data-sharing will outweigh the cost of compliance with the CDR.

Keywords: consumer data right, innovation, open banking, privacy safeguards

Procedia PDF Downloads 128
1120 The Development of Private Housing Schemes to Address the Housing Problem: A Case Study of Islamabad

Authors: Zafar Iqbal Zafar, Abdul Waheed

Abstract:

The Capital Development Authority (CDA) Ordinance 1960 requires CDA to acquire land for the provision of housing in Islamabad. However, the pace of residential development was slow and the demand for housing was increasing rapidly. To resolve the growing housing problem, CDA involved the private sector in the development of housing schemes. Detailed bye-laws for regulation of private housing schemes were prepared and these bylaws were called “Modalities & Procedures”. This paper explains how the Modalities and Procedures of CDA have been successful in regulating the development of private housing schemes in Islamabad.

Keywords: housing schemes, master plan, development works, zoning regulations

Procedia PDF Downloads 179
1119 Automatic Checkpoint System Using Face and Card Information

Authors: Kriddikorn Kaewwongsri, Nikom Suvonvorn

Abstract:

In the deep south of Thailand, checkpoints for people verification are necessary for the security management of risk zones, such as official buildings in the conflict area. In this paper, we propose an automatic checkpoint system that verifies persons using information from ID cards and facial features. The methods for a person’s information abstraction and verification are introduced based on useful information such as ID number and name, extracted from official cards, and facial images from videos. The proposed system shows promising results and has a real impact on the local society.

Keywords: face comparison, card recognition, OCR, checkpoint system, authentication

Procedia PDF Downloads 307
1118 Destruction of History and the Syrian Conflict: Upholding the Cultural Integrity of Dura Europos

Authors: Justine A. Lloyd

Abstract:

Since the onset of the Syrian Civil War in 2011, the ancient city of Dura-Europos has faced widespread destruction and looting. The site is one of many places in the country the terrorist group ISIS has specifically targeted, allegedly due to its particular representations of Syrian history and culture. However, looted art and artifacts are the extremist group’s second largest source of income, only after oil. The protection of this site is important to both academics and the millions who have called Syria a home, as it aids in the nation’s sense of identity, reveals developments in the arts, and contributes to humanity’s collective history. At a time when Syria’s culture is being flattened, this sense of cultural expression is especially important to maintain. Creating an awareness of the magnitude of the issue at hand begins with an examination of the rich history of the ancient fortress city. Located on the western bank of the Euphrates River, Dura-Europos contains artifacts dating back to the Hellenistic, Parthian, and Roman periods. Though a great deal of the art and artifacts have remained safe in institutions such as the National Museum of Damascus and the Yale University Art Gallery, hundreds of looting pits and use of heavy machinery on the site has severely set back the investigative progress made by archaeologists over the last century, as well as the prospect of future excavation. Further research draws on the current destruction of the site by both ISIS and opportunists involved with the black market. Because Dura-Europos is located in a war stricken region, the acquisition of data and possibility of immediate action is particularly challenging. Resources gained from local reports, in addition to technology such as satellite imagery, however, have provided a firm starting point for the evaluation of the state of the site. The Syrian Ministry of Culture, UNESCO, and numerous Syrian and global organizations provide insight into the historic city’s past, present issues, and future plans to ensure that the cultural integrity of the site is upheld. Though over seventy percent of Dura-Europos has been completely decimated, this research challenges the notion that physically destroyed sites are lost forever. This paper assesses preventative measures that can take place to ensure the preservation of the site’s art and architecture, including examining possible solutions to the damage, such as digital reconstruction, replication, and distribution of information through exhibitions and other forms of publically accessible information. In order to investigate any possible retribution, research also includes the necessary information pertaining the global laws and regulations dealing with cultural heritage, as it directly affects the ways in which this situation can be dealt with. With the countless experts and citizens dedicated to the importance of cultural heritage, the prospect of honoring and valuing elements of Dura-Europos is possible—whether physically preserved or otherwise.

Keywords: antiquities law, archaeological sites, restitution, Syrian Civil War

Procedia PDF Downloads 151
1117 Sexual and Gender Based Crimes in International Criminal Law: Moving Forwards or Backwards

Authors: Khadija Ali

Abstract:

Prosecution of sexual violence in international criminal law requires not only an understanding of the mechanisms employed to prosecute sexual violence but also a critical analysis of the factors facilitating perpetuation of such crimes in armed conflicts. The extrapolations laid out in this essay delve into the jurisprudence of international criminal law pertaining to sexual and gender based violence followed by the core question of this essay: Has the entrenchment of sexual violence as international crimes in the Rome Statute been successful to address such violence in armed conflicts?

Keywords: conflict, gender, international criminal law, sexual violence

Procedia PDF Downloads 562
1116 Cyber Violence Behaviors Among Social Media Users in Ghana: An Application of Self-Control Theory and Social Learning Theory

Authors: Aisha Iddrisu

Abstract:

The proliferation of cyberviolence in the wave of increased social media consumption calls for immediate attention both at the local and global levels. With over 4.70 billion social media users worldwide and 8.8 social media users in Ghana, various forms of violence have become the order of the day in most countries and communities. Cyber violence is defined as producing, retrieving, and sharing of hurtful or dangerous online content to cause emotional, psychological, or physical harm. The urgency and severity of cyber violence have led to the enactment of laws in various countries though lots still need to be done, especially in Ghana. In Ghana, studies on cyber violence have not been extensively dealt with. Existing studies concentrate only on one form or the other form of cyber violence, thus cybercrime and cyber bullying. Also, most studies in Africa have not explored cyber violence forms using empirical theories and the few that existed were qualitatively researched, whereas others examine the effect of cyber violence rather than examining why those who involve in it behave the way they behave. It is against this backdrop that this study aims to examine various cyber violence behaviour among social media users in Ghana by applying the theory of Self-control and Social control theory. This study is important for the following reasons. The outcome of this research will help at both national and international level of policymaking by adding to the knowledge of understanding cyberviolence and why people engage in various forms of cyberviolence. It will also help expose other ways by which such behaviours are enforced thereby serving as a guide in the enactment of the rightful rules and laws to curb such behaviours. It will add to literature on consequences of new media. This study seeks to confirm or reject to the following research hypotheses. H1 Social media usage has direct significant effect of cyberviolence behaviours. H2 Ineffective parental management has direct significant positive relation to Low self-control. H3 Low self-control has direct significant positive effect on cyber violence behaviours among social, H4 Differential association has significant positive effect on cyberviolence behaviour among social media users in Ghana. H5 Definitions have a significant positive effect on cyberviolence behaviour among social media users in Ghana. H6 Imitation has a significant positive effect on cyberviolence behaviour among social media users in Ghana. H7 Differential reinforcement has a significant positive effect on cyberviolence behaviour among social media users in Ghana. H8 Differential association has a significant positive effect on definitions. H9 Differential association has a significant positive effect on imitation. H10 Differential association has a significant positive effect on differential reinforcement. H11 Differential association has significant indirect positive effects on cyberviolence through the learning process.

Keywords: cyberviolence, social media users, self-control theory, social learning theory

Procedia PDF Downloads 60
1115 Autonomous Strategic Aircraft Deconfliction in a Multi-Vehicle Low Altitude Urban Environment

Authors: Loyd R. Hook, Maryam Moharek

Abstract:

With the envisioned future growth of low altitude urban aircraft operations for airborne delivery service and advanced air mobility, strategies to coordinate and deconflict aircraft flight paths must be prioritized. Autonomous coordination and planning of flight trajectories is the preferred approach to the future vision in order to increase safety, density, and efficiency over manual methods employed today. Difficulties arise because any conflict resolution must be constrained by all other aircraft, all airspace restrictions, and all ground-based obstacles in the vicinity. These considerations make pair-wise tactical deconfliction difficult at best and unlikely to find a suitable solution for the entire system of vehicles. In addition, more traditional methods which rely on long time scales and large protected zones will artificially limit vehicle density and drastically decrease efficiency. Instead, strategic planning, which is able to respond to highly dynamic conditions and still account for high density operations, will be required to coordinate multiple vehicles in the highly constrained low altitude urban environment. This paper develops and evaluates such a planning algorithm which can be implemented autonomously across multiple aircraft and situations. Data from this evaluation provide promising results with simulations showing up to 10 aircraft deconflicted through a relatively narrow low-altitude urban canyon without any vehicle to vehicle or obstacle conflict. The algorithm achieves this level of coordination beginning with the assumption that each vehicle is controlled to follow an independently constructed flight path, which is itself free of obstacle conflict and restricted airspace. Then, by preferencing speed change deconfliction maneuvers constrained by the vehicles flight envelope, vehicles can remain as close to the original planned path and prevent cascading vehicle to vehicle conflicts. Performing the search for a set of commands which can simultaneously ensure separation for each pair-wise aircraft interaction and optimize the total velocities of all the aircraft is further complicated by the fact that each aircraft's flight plan could contain multiple segments. This means that relative velocities will change when any aircraft achieves a waypoint and changes course. Additionally, the timing of when that aircraft will achieve a waypoint (or, more directly, the order upon which all of the aircraft will achieve their respective waypoints) will change with the commanded speed. Put all together, the continuous relative velocity of each vehicle pair and the discretized change in relative velocity at waypoints resembles a hybrid reachability problem - a form of control reachability. This paper proposes two methods for finding solutions to these multi-body problems. First, an analytical formulation of the continuous problem is developed with an exhaustive search of the combined state space. However, because of computational complexity, this technique is only computable for pairwise interactions. For more complicated scenarios, including the proposed 10 vehicle example, a discretized search space is used, and a depth-first search with early stopping is employed to find the first solution that solves the constraints.

Keywords: strategic planning, autonomous, aircraft, deconfliction

Procedia PDF Downloads 79
1114 Bee Keeping for Human-Elephant Conflict Mitigation: A Success Story for Sustainable Tourism in Kibale National Park, Western Uganda

Authors: Dorothy Kagazi

Abstract:

The African elephant (Loxodonta africana) remains one of the most crop-damaging species around Kibale National Park, western Uganda. Elephant crop raiding deprives communities of food and incomes, consequently impacting livelihoods, attitude, and support for conservation. It also attracts an aggressive reaction from local communities including the retaliatory killing of a species that is already endangered and listed under Appendix I of the Convention on Endangered Species of Flora and Fauna (CITES). In order to mitigate against elephant crop raiding and minimize conflict, a number of interventions were devised by the government of Uganda such as physical guarding, scare-shooting, excavation of trenches, growing of unpalatable crops and fire lighting all of which have over the years been implemented around the park. These generated varying degrees of effectiveness but largely never solved the problem of elephants crossing into communities to destroy food and shelter which had a negative effect onto sustainable tourism of the communities who often resorted to killing these animals and hence contributing the falling numbers of these animals. It was until government discovered that there are far more effective ways of deterring these animals from crossing to communities that it commissioned a study to deploy the African honeybee (Apis mellifera scutellata) as a deterrent against elephant crop raiding and income enhancement for local people around the park. These efforts led to a number of projects around Kibale National Park where communities were facilitated to keep bees for human-elephant conflict mitigation and rural income enhancement through the sale of honey. These projects have registered tremendous success in reducing crop damage, enhance rural incomes, influence positive attitude change and ultimately secure community support for elephant and park conservation which is a clear manifestation of sustainable tourism development in the area. To address the issue of sustainability, the project was aligned with four major objectives that contributed to the overall goal of maintaining the areas around the parks and the national park itself in such a manner that it remains viable over an infinite period. Among these included determining deterrence effects of bees against elephant crop raiding, assessing the contribution of beekeeping towards rural income enhancement, determining the impact of community involvement of park conservation and management among others. The project deployed 500 improved hives by placing them at specific and previously identified and mapped out elephant crossing points along the park boundary. A control site was established without any intervention to facilitate comparison of findings and data was collected on elephant raiding frequency, patterns, honey harvested, and community attitude towards the park. A socio-economic assessment was also undertaken to ascertain the contribution of beekeeping to incomes and attitude change. In conclusion, human-wildlife conflicts have disturbed conservation and sustainable tourism development efforts. Such success stories like the beekeeping strategy should hence be extensively discussed and widely shared as a conservation technique for sustainable tourism.

Keywords: bees, communities, conservation, elephants

Procedia PDF Downloads 192
1113 Using a Character’s Inner Monologue for Song Analysis

Authors: Robert Roznowski

Abstract:

The thought process of the character is never more evident than when singing alone onstage. The composer scores the emotional state and the lyricist voices the inner conflict as the character shares with an audience her or his deepest feelings. It is at these moments that a character may be thought of as voicing her or his inner monologue. Using examples from several musical theatre songs, this presentation will look at a codified approach to analyze a song from a more psychological perspective. Using the clues from the score, traditional character analysis and a psychological-based scoring method an actor may explore more fully inhabit and express the sung and unsung thoughts of the character. The approach yields a richer and more complex approach to acting the song.

Keywords: acting, analysis, musical theatre, psychology

Procedia PDF Downloads 463
1112 A Homogenized Mechanical Model of Carbon Nanotubes/Polymer Composite with Interface Debonding

Authors: Wenya Shu, Ilinca Stanciulescu

Abstract:

Carbon nanotubes (CNTs) possess attractive properties, such as high stiffness and strength, and high thermal and electrical conductivities, making them promising filler in multifunctional nanocomposites. Although CNTs can be efficient reinforcements, the expected level of mechanical performance of CNT-polymers is not often reached in practice due to the poor mechanical behavior of the CNT-polymer interfaces. It is believed that the interactions of CNT and polymer mainly result from the Van der Waals force. The interface debonding is a fracture and delamination phenomenon. Thus, the cohesive zone modeling (CZM) is deemed to give good capture of the interface behavior. The detailed, cohesive zone modeling provides an option to consider the CNT-matrix interactions, but brings difficulties in mesh generation and also leads to high computational costs. Homogenized models that smear the fibers in the ground matrix and treat the material as homogeneous are studied in many researches to simplify simulations. But based on the perfect interface assumption, the traditional homogenized model obtained by mixing rules severely overestimates the stiffness of the composite, even comparing with the result of the CZM with artificially very strong interface. A mechanical model that can take into account the interface debonding and achieve comparable accuracy to the CZM is thus essential. The present study first investigates the CNT-matrix interactions by employing cohesive zone modeling. Three different coupled CZM laws, i.e., bilinear, exponential and polynomial, are considered. These studies indicate that the shapes of the CZM constitutive laws chosen do not influence significantly the simulations of interface debonding. Assuming a bilinear traction-separation relationship, the debonding process of single CNT in the matrix is divided into three phases and described by differential equations. The analytical solutions corresponding to these phases are derived. A homogenized model is then developed by introducing a parameter characterizing interface sliding into the mixing theory. The proposed mechanical model is implemented in FEAP8.5 as a user material. The accuracy and limitations of the model are discussed through several numerical examples. The CZM simulations in this study reveal important factors in the modeling of CNT-matrix interactions. The analytical solutions and proposed homogenized model provide alternative methods to efficiently investigate the mechanical behaviors of CNT/polymer composites.

Keywords: carbon nanotube, cohesive zone modeling, homogenized model, interface debonding

Procedia PDF Downloads 114
1111 Social Movements of Central-Eastern Europe: Examining Trends of Cooperation and Antagonism by Using Big Data

Authors: Reka Zsuzsanna Mathe

Abstract:

The globalization and the Europeanization have significantly contributed to a change in the role of the nation-states. The global economic crisis, the climate changes, and the recent refugee crisis, are just a few among many challenges that cannot be effectively addressed by the traditional role of the nation-states. One of the main roles of the states is to solve collective action problems, however due to their changing roles; apparently this is getting more and more difficult. Depending on political culture, collective action problems are solved either through cooperation or conflict. The political culture of Central and Eastern European (CEE) countries is marked by low civic participation and by a weak civil society. In this type of culture collective action problems are likely to be induced through conflict, rather than the democratic process of dialogue and any type of social change is probably to be introduced by social movements. Several studies have been conducted on the social movements of the CEE countries, yet, it is still not clear if the most significant social movements of the region tend to choose rather the cooperative or the conflictual way as action strategy. This study differentiates between a national and a European action field, having different social orders. The actors of the two fields are the broadly understood civil society members, conceptualized as social movements. This research tries to answer the following questions: a) What are the norms that best characterize the CEE countries’ social order? b) What type of actors would prefer a change and in which areas? c) Is there a significant difference between the main actors active in the national versus the European field? The main hypotheses are that there are conflicting norms defining the national and the European action field, and there is a significant difference between the action strategies adopted by social movements acting in the two different fields. In mapping the social order, the study uses data provided by the European Social Survey. Big data of the Global Data on Events, Location and Tone (GDELT) database offers information regarding the main social movements and their preferred type of action. The unit of the analysis is the so called ‘Visegrad 4’ countries: Poland, Czech Republic, Slovakia and Hungary and the research uses data starting from 2005 (after the European accession of these four countries) until May, 2017. According to the data, the main hypotheses were confirmed.

Keywords: big data, Central and Eastern Europe, civil society, GDELT, social movements

Procedia PDF Downloads 139
1110 Intellectual Property Protection of CRISPR Related Technologies

Authors: Zheng Miao, Dennis Fernandez

Abstract:

CRISPR research has the potential to completely transform life science, agriculture, live-stock and the health care industry. The Intellectual Property derived from its research has raised significant attention in the academic as well as the biopharmaceutical industry culminating an urgent need for strategic IP protection. We review the rudimentary concepts and key competitors of CRISPR technologies as well as the paramount strategies for intellectual property protection. Further, we elaborate on prosecution issues related to CRISPR patents as well as possible solutions to various patent laws, interferences and litigation. Finally, we address how the bioinformatics of the CRISPR technology begs an inquiry into issues of privacy and a host of ethical concerns.

Keywords: bioinformatics, CRISPR, biotechnology, intellectual property

Procedia PDF Downloads 235
1109 Causes of Nigeria Unrest and Conflict Situation

Authors: Victor Osaghae

Abstract:

In 2005, the CIA published a report warning that Nigeria, the seventh most populous country in the world, could disintegrate within 15 years. Nigeria experiences civil unrest, violence and strikes. Nigeria has one of the highest rates of internal violence in the world, only unlike others with similar levels of bloodshed such as Colombia or Chechnya, there is not a civil war going on. The types of unrest observed in Nigeria from literatures consulted can be categorized into five namely: religious, social, political, labour, and communal or ethnic unrests. The cuases of the unrests are as follows: injustice, unemployment, religious intolerance, illiteracy and government not filling agreements reached with unions. The cost due to these unrests cannot be quantified because it affects human, material/properties and money.

Keywords: unrest, conflicts, Boko Haram, disturbance

Procedia PDF Downloads 368
1108 Human-Carnivore Interaction: Patterns, Causes and Perceptions of Local Herders of Hoper Valley in Central Karakoram National Park, Pakistan

Authors: Saeed Abbas, Rahilla Tabassum, Haider Abbas, Babar Khan, Shahid Hussain, Muhammad Zafar Khan, Fazal Karim, Yawar Abbas, Rizwan Karim

Abstract:

Human–carnivore conflict is considered to be a major conservation and rural livelihood concern because many carnivore species have been heavily victimized due to elevated conflict levels with communities. Like other snow leopard range countries, this situation prevails in Pakistan, where WWF is currently working under Asia High Mountain Project (AHMP) in Gilgit-Baltistan of Pakistan. To mitigate such conflicts requires a firm understanding of grazing and predation pattern including human-carnivore interaction. For this purpose we conducted a survey in Hoper valley (one of the AHMP project sites in Pakistan), during August, 2013 through a questionnaire based survey and unstructured interviews covering 647 households, permanently residing in the project area out of the total 900 households. The valley, spread over 409 km2 between 36°7'46" N and 74°49'2"E, at 2900m asl in Karakoram ranges is considered to be one of an important habitat of snow leopard and associated prey species such as Himalayan ibex. The valley is home of 8100 Brusho people (ancient tribe of Northern Pakistan) dependent on agro-pastoral livelihoods including farming and livestock rearing. The total number of livestock reported were (N=15,481) out of which 8346 (53.91%) were sheep, 3546 (22.91%) goats, 2193 (14.16%) cows, 903 (5.83%) yaks, 508 (3.28%) bulls, 28 (0.18%) donkeys, 27 (0.17%) zo/zomo (cross breed of yak and cow), and 4 (0.03%) horses. 83 percent respondent (n=542 households) confirmed loss of their livestock during the last one year July, 2012 to June, 2013 which account for 2246 (14.51%) animals. The major reason of livestock loss include predation by large carnivores such as snow leopards and wolf (1710, 76.14%) followed by diseases (536, 23.86%). Of the total predation cases snow leopard is suspected to kill 1478 animals (86.43%). Among livestock sheep were found to be the major prey of snow leopard (810, 55%) followed by goats (484, 32.7%) cows (151, 10.21%), yaks (15, 1.015%), zo/zomo (7, 0.5%) and donkey (1, 0.07%). The reason for the mass depredation of sheep and goats is that they tend to browse on twigs of bushes and graze on soft grass near cliffs. They are also considered to be very active as compared to other species in moving quickly and covering more grazing area. This makes them more vulnerable to snow leopard attack. The majority (1283, 75%) of livestock killed by predators occurred during the warm season (May-September) in alpine and sub-alpine pastures and remaining (427, 25%) occurred in the winter season near settlements in valley. It was evident from the recent study that Snow leopard kills outside the pen were (1351, 79.76%) as compared to inside pen (359, 20.24%). Assessing the economic loss of livestock predation we found that the total loss of livestock predation in the study area is equal to PKR 11,230,000 (USD 105,797), which is about PRK 17, 357 (USD 163.51) per household per year. Economic loss incurred by the locals due to predation is quite significant where the average cash income per household per year is PKR 85,000 (USD 800.75).

Keywords: carnivores, conflict, predation, livelihood, conservation, rural, snow leopard, livestock

Procedia PDF Downloads 326
1107 A Decision-Support Tool for Humanitarian Distribution Planners in the Face of Congestion at Security Checkpoints: A Real-World Case Study

Authors: Mohanad Rezeq, Tarik Aouam, Frederik Gailly

Abstract:

In times of armed conflicts, various security checkpoints are placed by authorities to control the flow of merchandise into and within areas of conflict. The flow of humanitarian trucks that is added to the regular flow of commercial trucks, together with the complex security procedures, creates congestion and long waiting times at the security checkpoints. This causes distribution costs to increase and shortages of relief aid to the affected people to occur. Our research proposes a decision-support tool to assist planners and policymakers in building efficient plans for the distribution of relief aid, taking into account congestion at security checkpoints. The proposed tool is built around a multi-item humanitarian distribution planning model based on multi-phase design science methodology that has as its objective to minimize distribution and back ordering costs subject to capacity constraints that reflect congestion effects using nonlinear clearing functions. Using the 2014 Gaza War as a case study, we illustrate the application of the proposed tool, model the underlying relief-aid humanitarian supply chain, estimate clearing functions at different security checkpoints, and conduct computational experiments. The decision support tool generated a shipment plan that was compared to two benchmarks in terms of total distribution cost, average lead time and work in progress (WIP) at security checkpoints, and average inventory and backorders at distribution centers. The first benchmark is the shipment plan generated by the fixed capacity model, and the second is the actual shipment plan implemented by the planners during the armed conflict. According to our findings, modeling and optimizing supply chain flows reduce total distribution costs, average truck wait times at security checkpoints, and average backorders when compared to the executed plan and the fixed-capacity model. Finally, scenario analysis concludes that increasing capacity at security checkpoints can lower total operations costs by reducing the average lead time.

Keywords: humanitarian distribution planning, relief-aid distribution, congestion, clearing functions

Procedia PDF Downloads 67