Search results for: code enforcement
1119 Challenges for Implementing Standards Compliant with Iso/Iec 17025, for Narcotics and DNA Laboratory’s
Authors: Blerim Olluri
Abstract:
A forensic science laboratory in Kosovo has never been organized at the level of most modern forensic science laboratories. This was made possible after the war of 1999 with the help and support from the United States. The United States Government/ICITAP provided 9.5 million dollars to support this project, this support have greatly benefitted law enforcement in Kosovo. With the establishment of Operative Procedures of Work and the law for Kosovo Agency of Forensic, the accreditation with ISO/IEC 17025 of the KAF labs it becomes mandatory. Since 2012 Laboratory’s DNA/Serology and Narcotics has begun reviewing and harmonizing their procedures according to ISO/IEC 17025. The focus of this work was to create quality manuals, procedures, work instructions, quality documentation and quality records. Furthermore, during this time is done the validation of work methods from scientific qualified personnel of KAF, without any help from other foreign agencies or accreditation body.In October 2014 we had the first evaluation based on ISO 17025 standards. According to the initial report of this assessment we have non conformity in test and Calibration methods method’s, and accommodation and environmental conditions. We identified several issues that are of extreme importance to KAF. One the most important issue is to create a professional group with experts of KAF, which will work in all the obligations, requested from ISO/IEC 17025. As conclusions that we earn in this path of accreditation, are that laboratory’s need to take corrective action, and all nonconformance’s must be addressed and corrective action taken before accreditation can be granted.Keywords: accreditation, assessment, narcotics, DNA
Procedia PDF Downloads 3641118 NFTs, between Opportunities and Absence of Legislation: A Study on the Effect of the Rulings of the OpenSea Case
Authors: Andrea Ando
Abstract:
The development of the blockchain has been a major innovation in the technology field. It opened the door to the creation of novel cyberassets and currencies. In more recent times, the non-fungible tokens have started to be at the centre of media attention. Their popularity has been increasing since 2021, and they represent the latest in the world of distributed ledger technologies and cryptocurrencies. It seems more and more likely that NFTs will play a more important role in our online interactions. They are indeed increasingly taking part in the arts and technology sectors. Their impact on society and the market is still very difficult to define, but it is very likely that there will be a turning point in the world of digital assets. There are some examples of their peculiar behaviour and effect in our contemporary tech-market: the former CEO of the famous social media site Twitter sold an NFT of his first tweet for around £2,1 million ($2,5 million), or the National Basketball Association has created a platform to sale unique moment and memorabilia from the history of basketball through the non-fungible token technology. Their growth, as imaginable, paved the way for civil disputes, mostly regarding their position under the current intellectual property law in each jurisdiction. In April 2022, the High Court of England and Wales ruled in the OpenSea case that non-fungible tokens can be considered properties. The judge, indeed, concluded that the cryptoasset had all the indicia of property under common law (National Provincial Bank v. Ainsworth). The research has demonstrated that the ruling of the High Court is not providing enough answers to the dilemma of whether minting an NFT is a violation or not of intellectual property and/or property rights. Indeed, if, on the one hand, the technology follows the framework set by the case law (e.g., the 4 criteria of Ainsworth), on the other hand, the question that arises is what is effectively protected and owned by both the creator and the purchaser. Then the question that arises is whether a person has ownership of the cryptographed code, that it is indeed definable, identifiable, intangible, distinct, and has a degree of permanence, or what is attached to this block-chain, hence even a physical object or piece of art. Indeed, a simple code would not have any financial importance if it were not attached to something that is widely recognised as valuable. This was demonstrated first through the analysis of the expectations of intellectual property law. Then, after having laid the foundation, the paper examined the OpenSea case, and finally, it analysed whether the expectations were met or not.Keywords: technology, technology law, digital law, cryptoassets, NFTs, NFT, property law, intellectual property law, copyright law
Procedia PDF Downloads 891117 The Interdisciplinary Synergy Between Computer Engineering and Mathematics
Authors: Mitat Uysal, Aynur Uysal
Abstract:
Computer engineering and mathematics share a deep and symbiotic relationship, with mathematics providing the foundational theories and models for computer engineering advancements. From algorithm development to optimization techniques, mathematics plays a pivotal role in solving complex computational problems. This paper explores key mathematical principles that underpin computer engineering, illustrating their significance through a case study that demonstrates the application of optimization techniques using Python code. The case study addresses the well-known vehicle routing problem (VRP), an extension of the traveling salesman problem (TSP), and solves it using a genetic algorithm.Keywords: VRP, TSP, genetic algorithm, computer engineering, optimization
Procedia PDF Downloads 131116 Numerical Flow Simulation around HSP Propeller in Open Water and behind a Vessel Wake Using RANS CFD Code
Authors: Kadda Boumediene, Mohamed Bouzit
Abstract:
The prediction of the flow around marine propellers and vessel hulls propeller interaction is one of the challenges of Computational fluid dynamics (CFD). The CFD has emerged as a potential tool in recent years and has promising applications. The objective of the current study is to predict the hydrodynamic performances of HSP marine propeller in open water and behind a vessel. The unsteady 3-D flow was modeled numerically along with respectively the K-ω standard and K-ω SST turbulence models for steady and unsteady cases. The hydrodynamic performances such us a torque and thrust coefficients and efficiency show good agreement with the experiment results.Keywords: seiun maru propeller, steady, unstead, CFD, HSP
Procedia PDF Downloads 3051115 Using HABIT to Estimate the Concentration of CO2 and H2SO4 for Kuosheng Nuclear Power Plant
Authors: Y. Chiang, W. Y. Li, J. R. Wang, S. W. Chen, W. S. Hsu, J. H. Yang, Y. S. Tseng, C. Shih
Abstract:
In this research, the HABIT code was used to estimate the concentration under the CO2 and H2SO4 storage burst conditions for Kuosheng nuclear power plant (NPP). The Final Safety Analysis Report (FSAR) and reports were used in this research. In addition, to evaluate the control room habitability for these cases, the HABIT analysis results were compared with the R.G. 1.78 failure criteria. The comparison results show that the HABIT results are below the criteria. Additionally, some sensitivity studies (stability classification, wind speed and control room intake rate) were performed in this study.Keywords: BWR, HABIT, habitability, Kuosheng
Procedia PDF Downloads 4891114 Climate Refugees In International Law – Analyzing The Legal Framework
Authors: Kristof Lukas Heidemann
Abstract:
The adverse effects of climate change, such as rising sea levels, increased temperatures, and extreme weather events are already posing a significant threat to the lives of people living in extreme weather zones all around the globe and could displace more than a billion people worldwide in the upcoming decades, causing a wave of climate-induced migration. Notwithstanding the urgency of the situation, this situation has so far not been addressed in a specific international treaty. Therefore, this paper analyses whether solutions might be found through existing legal framework. Accordingly, the investigation scrutinizes the possibilities of overcoming the conceptual challenge of combining climate law, refugee law, and human rights law. To this end, the study particularly reflects upon the example of Pacific Islanders by assessing the reasoning within the decisions Ioane Teitota v. New Zealand and Daniel Billy and Others v. Australia. The paper concludes that the differences in objective, scope, and enforcement of the three fields are too fundamental to be surmounted by overlapping concepts, e.g. state responsibility or the non-refoulement principle. Consequently, states are urged to tackle the problem with a separate international treaty in which the advantages of the different traditions are incorporated into a new protection mechanism.Keywords: climate change, climate treaties, forcibly displaced persons, human rights, improving and creating advanced knowledge of concepts, non-refoulement, state responsibility, refugee law, refugee status
Procedia PDF Downloads 41113 A Collection of Voices on Higher Educational Access, Quality and Equity in Africa: A Systematic Review
Authors: Araba A. Z. Osei-Tutu, Ebenezer Odame, Joseph Bawa, Samuel Amponsah
Abstract:
Education is recognized as a fundamental human right and a catalyst for development. Despite progress in the provision of higher education on the African continent, there persist challenges with the tripartite areas of access, equity and quality. Therefore, this systematic review aimed at providing a comprehensive overview of conversations and voices of scholars on these three concepts in HE in Africa. The systematic review employed a thematic analysis approach, synthesizing findings from 38 selected sources. After a critical analysis of the sources included in the systematic review, deficits in access, quality, and equity were outlined, focusing on infrastructure, regional disparities, and privatization challenges. The review also revealed the weak enforcement of quality assurance measures. Strategies for improvement, proffered by the study, include expanding public sector HE, deregulating the educational sector, promoting open and distance learning, implementing preferential admission policies, and enhancing financial aid. This research contributes valuable insights for policymakers, educators, and stakeholders, fostering a collaborative approach to address challenges and promote holistic development in African higher education.Keywords: access, equity, quality, higher education, Africa, systematic review, strategies
Procedia PDF Downloads 711112 The Political Economy of Human Trafficking and Human Insecurity in Asia: The Case of Japan, Thailand and India
Authors: Mohammed Bashir Uddin
Abstract:
Human trafficking remains as a persistent problem in many parts of the world. It is considered by many countries as an issue of a threat to national security. Border enforcement to prevent trafficking has been the main incentive, which eventually causes human insecurity for vulnerable people, especially for women. This research argues that focus needs to be placed on the political economy of trafficking, hence on the supply and demand sides of trafficking from a broader socio-economic perspective. Trafficking is a global phenomenon with its contemporary origins in the international capitalist market system. This research investigates particularly the supply-demand nexus on the backdrop of globalization and its impact on human security. It argues that the nexus varies across the countries, particularly the demand side. While prostitution has been the sole focus of the demand side in all countries in Asia, the paper argues that organ trade, bonded labor, cheap and exploitable labor through false recruitment (male trafficking) and adoption are some of the rising demands that explore new trends of trafficking, which could be better explained through international political economy (IPE). Following a qualitative research method, the paper argues that although demands vary in destination countries, they are the byproducts of IPE which have different socio-economic impacts both on trafficked individuals and the states.Keywords: globalization, human security, human trafficking, political economy
Procedia PDF Downloads 4711111 An Investigation of Cyber Financial Crimes After the Enactment of PECA: A Case Study of Pakistan’s Banking Sector During 2016 to 2022
Authors: Zain Khalid
Abstract:
The paper outlines the trends of cyber financial crimes and frauds – approximating upto – in Pakistan after the enactment of The Prevention of Electronic Crimes Act in 2016. The paper elaborates on the newer methods that fraudsters have adopted after tighter preventive and counter measures were employed in Pakistan partly as a result of following the international finance related commitments, particularly the FATF regulations. The paper adopts case studies methods to highlight various aspects of the financial frauds and crimes committed and later investigated jointly by Pakistan’s one of the federal law enforcement agencies, the Federal Investigation Agency, and Mobilink Microfinance Bank , Pakistan’s premier microfinance bank. It additionally enriches the data through expert interviews – with crime investigators and the experts to carry out an in-depth analysis of the various factors involving the crime. This paper emphasizes the structural and situational factors that shape up the cyber financial crimes in Pakistan vis-à-vis digital illiteracy and lack of awareness among the users of financial services. This paper, thus, on the basis of findings and expert interviews, suggests policy reforms to reduce the instances of the financial crimes, especially in the remotest areas of the country.Keywords: financial crimes, cyber crimes, digital literacy, terrorism financing, banking sector
Procedia PDF Downloads 881110 An Analysis of the Efficacy of Criminal Sanctions in Combating Cartel Conduct: The Case of South Africa
Authors: S. Tavuyanago
Abstract:
Cartels within the international competition law framework have been dubbed the most egregious of competition law violations; this is because they entail a concerted effort by two or more competitor firms to knowingly ‘rob’ consumers of their welfare through their cooperation instead of competition. The net effect of cartel conduct is that the market is distorted as the colluding firms gain enough market power to constrain the supply of goods or services, ultimately driving up prices. As a result, consumers end up paying inflated prices for goods and services, which eventually affects their welfare. It is against this backdrop that competition authorities worldwide have mounted a robust fight against the proliferation of cartels. In South Africa, the fight against cartels saw an amendment to the Competition Act to allow for criminal prosecution of individuals who cause their firms to take part in cartels. The Competition Amendment Act 1 of 2009 introduced section 73A into the principal Competition Act, making it a criminal offence to engage in cartel conduct. This paper assesses the rationale for criminalisation of cartel conduct, discusses the challenges or potential challenges associated with criminalisation, and provides an evaluation of the efficacy of criminalisation of cartel conduct. It questions whether criminal sanctions for cartel conduct as a competition enforcement tool aimed at deterring such conduct are generally effective and whether they have been effective in South Africa specifically. It concludes by offering recommendations on how to effectively root out cartels.Keywords: cartels, criminalisation, competition, deterrence, South Africa
Procedia PDF Downloads 991109 Greening of the Hotel Industry in Malawi: An Examination of the Governance and Policing Tools
Authors: Lameck Zetu Khonje, Mulala Danny Simatele
Abstract:
Malawi’s economy is agriculture based. Recently the government earmarked the tourism sector as an important economic sector which could support the agriculture sector to bring about sustainable economic development and help socioeconomic wellbeing of the local people. Greening of the hotel industry is one of the proven ideal ways of creating a sustainable tourism industry which brings about sustainable economic development in a country like Malawi. This study uses qualitative methodology to examine the efficacy of the governance and policing tools that Malawi uses to guide the development and general practices of the hotel sector to ascertain whether these tools are for greening or not. Grounded Theory method is used whereby semi-structured interviews and field visits were conducted to collect data for the study. The results of the study show that there are loopholes in the governance system in Malawi. The results also reveal gaps within the policing tools such that the hotel industry is not properly guided on green issues. Furthermore, the results show that there is a lack of collaboration for the enforcement of the green practices in the hotel industry. It is also revealed that there is a lack of knowledge of green issues within the governance structures. Awareness campaigns and capacity building would improve greening of the hotel industry in Malawi.Keywords: governance, greening, Grounded Theory, Malawi
Procedia PDF Downloads 1901108 Detection Characteristics of the Random and Deterministic Signals in Antenna Arrays
Authors: Olesya Bolkhovskaya, Alexey Davydov, Alexander Maltsev
Abstract:
In this paper approach to incoherent signal detection in multi-element antenna array are researched and modeled. Two types of useful signals with unknown wavefront were considered. First one is deterministic (Barker code), the second one is random (Gaussian distribution). The derivation of the sufficient statistics took into account the linearity of the antenna array. The performance characteristics and detecting curves are modeled and compared for different useful signals parameters and for different number of elements of the antenna array. Results of researches in case of some additional conditions can be applied to a digital communications systems.Keywords: antenna array, detection curves, performance characteristics, quadrature processing, signal detection
Procedia PDF Downloads 4051107 An Ethnographic Study on How Namibian Sex Workers Experience Their Violation of Rights
Authors: Tessa Verhallen, Mama Africa
Abstract:
By co-constructing personal narratives of sex workers in Namibia this paper represents how sex workers experience their violation of rights in Namibia. It is written from an emic (as an advisor for a sex worker-led organization named Rights not Rescue Trust) and an etic (as an ethnographer) point of view, in collaboration with the staff of the organization Rights not Rescue Trust. This organization represents circa 3000 members. The paper describes the current deplorable situation of sex workers in Namibia, encompassing the stigma and discrimination they face, their struggle to have their work decriminalized and their urge to advocate for human rights and the end of violations. Based on a triangular research design (ethnography, narratives, literature study, human rights’ training and counseling sessions) the authors show that sex workers, particularly LGBTI sex workers, are extremely vulnerable to emotional, physical, and sexual violence in Namibia. The main perpetrators of violence turn out to be not only clients and intimate partners but also law enforcement officers and health care workers who are supposed to protect and support sex workers. The sex workers’ narratives voice their disgraceful circumstances regarding how their rights are violated. It also highlights their importance to fight for their rights and access to health care, legal services and education in order to improve the sexual reproductive health of sex workers.Keywords: HIV/aids, LGBTI, methodological innovative, sex work
Procedia PDF Downloads 3121106 Analysis of Security Vulnerabilities for Mobile Health Applications
Authors: Yuli Paola Cifuentes Sanabria, Lina Paola Beltrán Beltrán, Leonardo Juan Ramírez López
Abstract:
The availability to deploy mobile applications for healthcare is increasing daily thru different mobile app stores. But within these capabilities the number of hacking attacks has also increased, in particular into medical mobile applications. The security vulnerabilities in medical mobile apps can be triggered by errors in code, incorrect logic, poor design, among other parameters. This is usually used by malicious attackers to steal or modify the users’ information. The aim of this research is to analyze the vulnerabilities detected in mobile medical apps according to risk factor standards defined by OWASP in 2014.Keywords: mHealth apps, OWASP, protocols, security vulnerabilities, risk factors
Procedia PDF Downloads 5171105 Sexual Diversity Training for Hong Kong Teachers Preliminary Themes Identified from Qualitative Interviews
Authors: Diana K. Kwok
Abstract:
Despite the fact that Hong Kong government aims to develop an inclusive society, sexual minority students continue to encounter sexual prejudice without legal protection. They also have difficulties accessing relevant services from mental health and educational professionals, who do not receive systematic training to work with sexual minority students. Informed by the literature on sexual prejudice, heterosexual hegemony, genderism, as well as code of practice for frontline practitioners, the authors explored self-perceived knowledge of teachers and sexual minorities on sexuality and sexual prejudice, and how they perceive prejudice towards sexual minorities in Chinese cultural context. Semi-structure qualitative interviews were carried out with 31 school personnel informants (school teachers and counseling team members) and 25 sexual minority informants on their understanding of sexuality knowledge, their perception of sexual prejudice within school context in Hong Kong, as well as their suggested themes on teachers training on sexual prejudice reduction. This presentation specifically focuses on transcripts from sexual minority informants. Data analysis was carried out through NVivo, and followed the procedures spelt out in the qualitative research literature. Trustworthiness of the study was addressed through various strategies. Preliminary themes emerged from transcript content analysis: 1) A gap of knowledge between sexual minority informants and teachers; 2) Perception on sexual prejudice within cultural context; 3) Heterosexual hegemony and genderism within school system; 4) Needs for mandatory training: contents and strategies. The sexual minority informants found that teachers they encountered were predominantly adopted concepts of binary sex and dichotomous gender. Informants also indicated that the teachings of Confucianism cultural values, religiosity in Hong Kong might well be important cultural forces contributing to sexual prejudice manifested in school context. Although human rights and social justice concepts were embedded in professional code of practice of teachers and school helping professionals, informants found that teachers they encountered may face a dilemma when supporting sexual minority students navigating heterosexual hegemony and genderism in, as a consequence of their personal, institutional, cultural and religious backgrounds. Acknowledgments: The sexual prejudice project was funded by the Hong Kong Research Grant Council (ECS28401614), 2015 to 2017.Keywords: sexual prejudice, Chinese teachers, Chinese sexual minorities, teacher training
Procedia PDF Downloads 2821104 Relevancy Measures of Errors in Displacements of Finite Elements Analysis Results
Authors: A. B. Bolkhir, A. Elshafie, T. K. Yousif
Abstract:
This paper highlights the methods of error estimation in finite element analysis (FEA) results. It indicates that the modeling error could be eliminated by performing finite element analysis with successively finer meshes or by extrapolating response predictions from an orderly sequence of relatively low degree of freedom analysis results. In addition, the paper eliminates the round-off error by running the code at a higher precision. The paper provides application in finite element analysis results. It draws a conclusion based on results of application of methods of error estimation.Keywords: finite element analysis (FEA), discretization error, round-off error, mesh refinement, richardson extrapolation, monotonic convergence
Procedia PDF Downloads 4951103 Static Modeling of the Delamination of a Composite Material Laminate in Mode II
Authors: Y. Madani, H. Achache, B. Boutabout
Abstract:
The purpose of this paper is to analyze numerically by the three-dimensional finite element method, using ABAQUS calculation code, the mechanical behavior of a unidirectional and multidirectional delaminated stratified composite under mechanical loading in Mode II. This study consists of the determination of the energy release rate G in mode II as well as the distribution of equivalent von Mises stresses along the damaged zone by varying several parameters such as the applied load and the delamination length. It allowed us to deduce that the high energy release rate favors delamination at the free edges of a stratified plate subjected to bending.Keywords: delamination, energy release rate, finite element method, stratified composite
Procedia PDF Downloads 1761102 Jungle Justice on Emotional Health Challenges among Lagosians
Authors: Aaron Akinloye
Abstract:
This research examined the influence of jungle justice as it affects the emotional health challenges among residents in Lagos metropolitan city. Descriptive survey research design was used along with the questionnaire as research instrument. Population for the study comprised residents in Yaba and Shomolu Communities of Lagos State, Nigeria. Accidental sampling technique was used to sample 300 Residents. Self-developed questionnaire was used to obtain data on the variables under investigation. Research instrument was validated following the face, content, and construct validation of the instrument. Thereafter, the reliability coefficient yielded 0.84. It is therefore concluded and recommended that; there is a significant influence of jungle justice on trauma among residents- df (298) t= 2.33, p< 0.05; there is a significant influence of jungle justice on pressure among residents- df (298) t= 2.16, p< 0.05: there is a significant influence of jungle justice on fear among residents- df (298) t= 2.20, p< 0.05; there is a significant influence of jungle justice on depression among residents- df (298) t= 2.14, p< 0.05. Recommendations were made that; there should be deliberate effort to implement comprehensive awareness campaigns to educate the residents on the detrimental effects of jungle justice on individuals and the community members as a whole; there should be an improvement in the effectiveness and efficiency of the existing law enforcement agencies in Lagos metropolitan city; development and implementation of support systems for victims of jungle justice, which include trauma, counselling, mental health services, and rehabilitation programmes; there should be proper review and revision of the legal framework to address the issue of jungle justice effectively.Keywords: jungle justice, emotional health, depression, fear
Procedia PDF Downloads 981101 Simulation of Direct Solar Dryer with ANSYS
Authors: Boukhris Lahouari
Abstract:
Simulation of solar dryers with ANSYS has revolutionized the way in which drying processes are optimized and analyzed in various industries. This advanced software allows engineers and researchers to simulate the behavior of a solar dryer under different conditions, helping to improve efficiency and reduce energy consumption. This work presents a numerical study of a direct solar dryer, which uses radiation and natural convection to dry agricultural products. The simulations were made in order to determine the dynamic and thermal fields under the influence of the variation in the size of the inlet and outlet opening. The conservation equations based on the standard k-ε turbulence model are solved by the finite volume method using the ANSYS-Fluent commercial code.Keywords: solar dryer, CFD, solar radiation, natural convection, turbulent flow
Procedia PDF Downloads 231100 An Examination of Changes on Natural Vegetation due to Charcoal Production Using Multi Temporal Land SAT Data
Authors: T. Garba, Y. Y. Babanyara, M. Isah, A. K. Muktari, R. Y. Abdullahi
Abstract:
The increased in demand of fuel wood for heating, cooking and sometimes bakery has continued to exert appreciable impact on natural vegetation. This study focus on the use of multi-temporal data from land sat TM of 1986, land sat EMT of 1999 and lands sat ETM of 2006 to investigate the changes of Natural Vegetation resulting from charcoal production activities. The three images were classified based on bare soil, built up areas, cultivated land, and natural vegetation, Rock out crop and water bodies. From the classified images Land sat TM of 1986 it shows natural vegetation of the study area to be 308,941.48 hectares equivalent to 50% of the area it then reduces to 278,061.21 which is 42.92% in 1999 it again depreciated to 199,647.81 in 2006 equivalent to 30.83% of the area. Consequently cultivated continue increasing from 259,346.80 hectares (42%) in 1986 to 312,966.27 hectares (48.3%) in 1999 and then to 341.719.92 hectares (52.78%). These show that within the span of 20 years (1986 to 2006) the natural vegetation is depreciated by 119,293.81 hectares. This implies that if the menace is not control the natural might likely be lost in another twenty years. This is because forest cleared for charcoal production is normally converted to farmland. The study therefore concluded that there is the need for alternatives source of domestic energy such as the use of biomass which can easily be accessible and affordable to people. In addition, the study recommended that there should be strong policies enforcement for the protection forest reserved.Keywords: charcoal, classification, data, images, land use, natural vegetation
Procedia PDF Downloads 3631099 The Risk of Ground Movements After Digging Two Parallel Vertical Tunnel in Urban
Authors: Djelloul Chafia, Demagh Rafik, Kareche Toufik
Abstract:
Human activities, made without precautions, accelerate the degradation of the soil structure and reduces its resistance. Operations, such as tunnel construction may exercise an influence more or less permanent on the grounds which surrounded them, these structures alter soil it is necessary to predict their impacts by suitable measures. This research is a numerical analysis that deals the risks and effects due to the weakening of the soil after digging two parallel vertical circular tunnels in urban areas, and suggests forecasting techniques based essentially on the organization of underground space. The simulations are performed using the finite-difference code FLAC in a two-dimensional case and with an elasto-plastic behavior of the soil.Keywords: sol, weakening, degradation, prevention, tunnel
Procedia PDF Downloads 5571098 The Contribution of the Lomé Charter to Combating Trafficking in Persons at Sea: Nigerian and South African Legal Perspective
Authors: Obinna Emmanuel Nkomadu
Abstract:
A major maritime problem in the African continent is the widespread proliferation of threats to maritime security, and one of which is the traffic in persons (TIP) at sea, which victims are sometimes assaulted, injured, killed, and in many cases go missing. The South African and Nigerian law on TIP at sea is the Prevention and Combating of Trafficking in Persons Act and the Trafficking in Persons (Prohibition) Enforcement and Administration Act, respectively. These legislation prohibits TIP at sea but does not provides effective and efficient national coordination structures and international cooperation measures against traffickers who engage on human trafficking on the African maritime domain. As a result of the limitations on the maritime security laws of most African States and the maritime security threats on the continent, the African Union in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (Lome Charter). The Lomé Charter provides mechanisms for national and international cooperation on maritime security threats, including TIP at sea. However, the Charter is yet to come into force due to the number of States required to accede or ratify the Charter. This paper identifies gaps on existing instruments on TIP at sea by those States and justify on South Africa and Nigeria should adopt the Charter. The justification flow from analysing relevant international law instruments, as well as legislation on human trafficking.Keywords: cooperation against trafficking in persons at sea, lomé charter, maritime security, Nigerian legislation on trafficking in persons, South African legislation on trafficking in person, and trafficking in persons at sea
Procedia PDF Downloads 1501097 Pension Policy and Police Retirement: An Exploratory Study Applied to Special Policy Enforcement in Taiwan
Authors: Yung-Ching Chou, Albert Shangpao Yeh, Luke H. C. Hsiao
Abstract:
Police used to be an honor job. However, the police are no longer concerned about the mission and public safety instead of the issue of retirement. The main reason is the amendment of 'Public Servants Retirement Act' in Taiwan was effective since January 2011. The purposes of change were to solve the problem of the financial crisis which caused by the Hugh deficit of the civil servants pension fund. The policy of the civil servants pension reform was not only seriously impact the motives of policy, but also negatively impact the workforce of police. This research conducted a secondary data of Baoanjingcha Fifth Police Corps during the period between 2011 and 2015. Secondly, the research interviewed six representatives from the retired police in order to explore the retirement motives. In short, there were several major findings and suggestions in the following: 1. The police won't choice to retire which the nature of task is simple. 2. The ranking level of positions positively correlated with the retired age of police. 3. The police officers who are categorized as 'hazardous work' first class personnel should decrease the standard of the retirement age and allow the option of a monthly pension. 4. The information of the retirees' rights, as well as protection, are correlated with the service as well professional of personnel officer. More findings, as well as suggestions, will be elaborated on the content of this paper.Keywords: human resource management, pension policy change, police retirement rush, public servants retirement act
Procedia PDF Downloads 3231096 Legal Interpretation of the Transplanted Law
Authors: Wahyu Kurniawan
Abstract:
Indonesia developed the legal system radically since 1999. Several laws have been established and mostly the result of transplantation. Laws were made general but legal problems have been growing. In the legal enforcement, the judges have authority to interpret the laws. Authority and freedom are the source of corruption by the courts in Indonesia. Therefore, it should be built the conceptual framework to interpret the transplanted laws as the legal basis in deciding the cases. This article describes legal development based on interpretation of transplanted law in Indonesia by using the Indonesian Supervisory Commission for Business Competition (KPPU) decisions between 2000 and 2010 as the object of the research. The study was using law as a system theory and theories of legal interpretation especially the static and dynamic interpretations. The research showed that the KPPU interpreted the concept that exists in the Competition Law by using static and dynamic interpretation. Static interpretation was used to interpret the legal concepts based on two grounds, minute of meeting during law making process and the definitions that have been recognized in the Indonesian legal system. Dynamic interpretation was used when the KPPU developing the definition of the legal concepts. The general purpose of the law and the theories of the basis of the law were the conceptual framework in using dynamic interpretation. There are two recommendations in this article. Firstly, interpreting the laws by the judges should be based on the correct conceptual framework. Secondly, the technique of interpreting the laws would be the method of controlling the judges.Keywords: legal interpretation, legal transplant, competition law, KPPU
Procedia PDF Downloads 3411095 Adaptive Analysis of Housing Policies in Development Programming After 1970s (Case Study: Kermanshah City in the Western Iran)
Authors: Zeinab. Shahrokhifar, Abolfazl Meshkini, Seyed Ali. Alavi
Abstract:
Considering the different dimensions of deprivation, housing supply is noted as a basic requirement in Iran after 1979 (coming to work of the new government). The government had built the constitution and obliged to meet this need in the form of five-year development programs in Iran’s provinces. This study focused on the adaptive analysis of housing policies in these five development programs in Kermanshah province located in western Iran. Our research is divided into two different analytical sections. In the first section, we collected the documentary information using approved plans and field studies. In the second section, a questionnaire was prepared and designed for the elite community (30) to support the documentary analysis. The results showed that various projects adopted in the form of strategic plans and implemented the policies included both quantitative and qualitative housing in Kermanshah province after 1979. The quality of housing, from the first to the fifth development plans has improved the situation in the housing indicators. The quantity of housing units for households has also been implemented through various policies that has desired results. The sequences of housing policies and plans do not overlap in the five development programs. According to the radar graph, the development programs overlapped in some policies, which shows the continuation of the previous policies, but this overlap is not perfect.Keywords: law enforcement policy, housing policy, development programs, housing indicators, the city of Kermanshah
Procedia PDF Downloads 731094 A Framework for SQL Learning: Linking Learning Taxonomy, Cognitive Model and Cross Cutting Factors
Authors: Huda Al Shuaily, Karen Renaud
Abstract:
Databases comprise the foundation of most software systems. System developers inevitably write code to query these databases. The de facto language for querying is SQL and this, consequently, is the default language taught by higher education institutions. There is evidence that learners find it hard to master SQL, harder than mastering other programming languages such as Java. Educators do not agree about explanations for this seeming anomaly. Further investigation may well reveal the reasons. In this paper, we report on our investigations into how novices learn SQL, the actual problems they experience when writing SQL, as well as the differences between expert and novice SQL query writers. We conclude by presenting a model of SQL learning that should inform the instructional material design process better to support the SQL learning process.Keywords: pattern, SQL, learning, model
Procedia PDF Downloads 2541093 A Fault-Tolerant Full Adder in Double Pass CMOS Transistor
Authors: Abdelmonaem Ayachi, Belgacem Hamdi
Abstract:
This paper presents a fault-tolerant implementation for adder schemes using the dual duplication code. To prove the efficiency of the proposed method, the circuit is simulated in double pass transistor CMOS 32nm technology and some transient faults are voluntary injected in the Layout of the circuit. This fully differential implementation requires only 20 transistors which mean that the proposed design involves 28.57% saving in transistor count compared to standard CMOS technology.Keywords: digital electronics, integrated circuits, full adder, 32nm CMOS tehnology, double pass transistor technology, fault toleance, self-checking
Procedia PDF Downloads 3461092 Developing API Economy: Associating Value to APIs and Microservices in an Enterprise
Authors: Mujahid Sultan
Abstract:
The IT industry has seen many transformations in the Software Development Life Cycle (SDLC) methodologies and development approaches. SDLCs range from waterfall to agile, and the development approaches from monolith to microservices. Management, orchestration, and monetization of microservices have created an API economy in the modern enterprise. There are two approaches to API design, code first and design first. Design first is gaining popularity in the industry as this allows capturing the API needs from the stakeholders rather than the development teams guesstimating the needs and associating a monetary value with the APIs and microservices. In this publication, we describe an approach to organizing and creating stakeholder needs and requirements for designing microservices and APIs.Keywords: requirements engineering, enterprise architecture, APIs, microservices, DevOps, continuous delivery, continuous integration, stakeholder viewpoints
Procedia PDF Downloads 1911091 The Role of Formal and Informal Institutions in Water Governance in the Central Rift Valley of Ethiopia
Authors: Endalew Jibat, Feyera Senbeta, Tesfaye Zeleke, Fitsum Hagos
Abstract:
Institutions can play a key role in coordinating how natural resources are effectively used without over-exploitation. Institutions are the laws, policies, and organizational arrangements that permit, forbid or regulate human action. The aim of this study was to look into the roles of formal and informal institutions, as well as their interactions, in water resource governance in Ethiopia's Central Rift Valley (CRV), where water scarcity is a concern. Key informant interviews, group discussions, in depth-interview, and secondary data sources were used to generate relevant data. The study revealed that formal and informal institutions were involved in water resource governance in the study area. However, the influence of informal institutions on formal institutions or vice versa is trivial to change the action of water users. Lack of clear roles and responsibilities of actors, weak capacity and lack of meaningful decentralization and participation of key actors in policy development, lack of synergy and incongruence between formal and informal institutions, and absence of enforcement mechanisms including incentives are attributed to inefficient use of water resources in the CRV. Enhancing the interplay of formal and informal institutions in the water resource policy development and meaningful decentralization and key stakeholders' engagement is recommended for sustainable water use.Keywords: institutions, governance, institutional interplay, water users
Procedia PDF Downloads 1781090 A Generalization of the Secret Sharing Scheme Codes Over Certain Ring
Authors: Ibrahim Özbek, Erdoğan Mehmet Özkan
Abstract:
In this study, we generalize (k,n) threshold secret sharing scheme on the study Ozbek and Siap to the codes over the ring Fq+ αFq. In this way, it is mentioned that the method obtained in that article can also be used on codes over rings, and new advantages to be obtained. The method of securely sharing the key in cryptography, which Shamir first systematized and Massey carried over to codes, became usable for all error-correcting codes. The firewall of this scheme is based on the hardness of the syndrome decoding problem. Also, an open study area is left for those working for other rings and code classes. All codes that correct errors with this method have been the working area of this method.Keywords: secret sharing scheme, linear codes, algebra, finite rings
Procedia PDF Downloads 74