Search results for: data protection laws
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 26754

Search results for: data protection laws

26094 Space Debris: An Environmental Hazard

Authors: Anwesha Pathak

Abstract:

Space law refers to all legal provisions that may regulate or apply to space travel, as well as to space-related activity. Although there is undoubtedly a core corpus of “space law,” rather than designating a conceptually distinct single kind of law, the phrase can be seen as a label applied to a bucket that includes a variety of different laws and regulations. Similar to ‘family law' or ‘environmental law' "space law" refers to a variety of laws that are identified by the subject matter they address rather than by the logical extension of a single legal concept. The word "space law" refers to the Law of Space, which can cover anything from the specifics of an insurance agreement for a specific space launch to the most general guidelines that direct state behaviour in space. Space debris, often referred to as space junk, space pollution, space waste, space trash, or space garbage, is a term used to describe abandoned human-made objects in space, primarily in Earth orbit. These include disused spacecraft, discarded launch vehicle stages, mission-related detritus, and fragmentation material from the destruction of disused rocket bodies and spacecraft, which is particularly prevalent in Earth orbit. Other types of space debris, besides abandoned human-made objects in orbit, include pieces left over from collisions, erosion, and disintegration, or even paint specks, solidified liquids ejected from spacecraft, and unburned components from solid rocket engines. The initial action of launching or using a spacecraft in near-Earth orbit imposes an external cost on others that is typically not taken into account or fully accounted for in the cost by the launcher or payload owner.

Keywords: space, outer space treaty, geostationary orbit, satellites, spacecrafts

Procedia PDF Downloads 77
26093 Risk Factors for Significant Obstetric Anal Sphincter Injury in a District General Hospital

Authors: A. Wahid Uddin

Abstract:

Obstetric anal sphincter injury carries significant morbidity for a woman and affects the quality of life to the extent of permanent damage to anal sphincter musculature. The study was undertaken in a district general hospital by retrospectively reviewing random 63 case notes of patients diagnosed with a significant third or fourth-degree perineal tear admitted between the year of 2015 to 2018. The observations were collected by a pre-designed questionnaire. All variables were expressed as percentages. The major risk factors noted were nulliparity (37%), instrumental delivery (25%), and birth weight of more than 4 kg (14%). Forceps delivery with or without episiotomy was the major contributing factor (75%). In the majority of the cases (71%), no record of any perineal protection measures undertaken. The study concluded that recommended perineal protection measures should be adopted as a routine practise.

Keywords: forceps, obstetrics, perineal, sphincter

Procedia PDF Downloads 120
26092 H.264 Video Privacy Protection Method Using Regions of Interest Encryption

Authors: Taekyun Doo, Cheongmin Ji, Manpyo Hong

Abstract:

Like a closed-circuit television (CCTV), video surveillance system is widely placed for gathering video from unspecified people to prevent crime, surveillance, or many other purposes. However, abuse of CCTV brings about concerns of personal privacy invasions. In this paper, we propose an encryption method to protect personal privacy system in H.264 compressed video bitstream with encrypting only regions of interest (ROI). There is no need to change the existing video surveillance system. In addition, encrypting ROI in compressed video bitstream is a challenging work due to spatial and temporal drift errors. For this reason, we propose a novel drift mitigation method when ROI is encrypted. The proposed method was implemented by using JM reference software based on the H.264 compressed videos, and experimental results show the verification of our proposed methods and its effectiveness.

Keywords: H.264/AVC, video encryption, privacy protection, post compression, region of interest

Procedia PDF Downloads 329
26091 Digital Watermarking Based on Visual Cryptography and Histogram

Authors: R. Rama Kishore, Sunesh

Abstract:

Nowadays, robust and secure watermarking algorithm and its optimization have been need of the hour. A watermarking algorithm is presented to achieve the copy right protection of the owner based on visual cryptography, histogram shape property and entropy. In this, both host image and watermark are preprocessed. Host image is preprocessed by using Butterworth filter, and watermark is with visual cryptography. Applying visual cryptography on water mark generates two shares. One share is used for embedding the watermark, and the other one is used for solving any dispute with the aid of trusted authority. Usage of histogram shape makes the process more robust against geometric and signal processing attacks. The combination of visual cryptography, Butterworth filter, histogram, and entropy can make the algorithm more robust, imperceptible, and copy right protection of the owner.

Keywords: digital watermarking, visual cryptography, histogram, butter worth filter

Procedia PDF Downloads 345
26090 A Proposal for a Secure and Interoperable Data Framework for Energy Digitalization

Authors: Hebberly Ahatlan

Abstract:

The process of digitizing energy systems involves transforming traditional energy infrastructure into interconnected, data-driven systems that enhance efficiency, sustainability, and responsiveness. As smart grids become increasingly integral to the efficient distribution and management of electricity from both fossil and renewable energy sources, the energy industry faces strategic challenges associated with digitalization and interoperability — particularly in the context of modern energy business models, such as virtual power plants (VPPs). The critical challenge in modern smart grids is to seamlessly integrate diverse technologies and systems, including virtualization, grid computing and service-oriented architecture (SOA), across the entire energy ecosystem. Achieving this requires addressing issues like semantic interoperability, IT/OT convergence, and digital asset scalability, all while ensuring security and risk management. This paper proposes a four-layer digitalization framework to tackle these challenges, encompassing persistent data protection, trusted key management, secure messaging, and authentication of IoT resources. Data assets generated through this framework enable AI systems to derive insights for improving smart grid operations, security, and revenue generation. Furthermore, this paper also proposes a Trusted Energy Interoperability Alliance as a universal guiding standard in the development of this digitalization framework to support more dynamic and interoperable energy markets.

Keywords: digitalization, IT/OT convergence, semantic interoperability, VPP, energy blockchain

Procedia PDF Downloads 158
26089 Energy Metabolites Show Cross-Protective Plastic Responses for Stress Resistance in a Circumtropical Drosophila Species

Authors: Ankita Pathak, Ashok Munjal, Ravi Parkash

Abstract:

Plastic responses to multiple environmental stressors in wet or dry seasonal populations of tropical Drosophila species have received less attention. We tested plastic effects of heat hardening, acclimation to drought or starvation; and changes in trehalose, proline and body lipids in D. ananassae flies reared under wet or dry season specific conditions. Wet season flies revealed significant increase in heat knockdown, starvation resistance and body lipids after heat hardening. However, accumulation of proline was observed only after desiccation acclimation of dry season flies while wet season flies elicited no proline but trehalose only. Therefore, drought-induced proline can be a marker metabolite for dry season flies. Further, partial utilization of proline and trehalose under heat hardening reflects their possible thermoprotective effects. Heat hardening elicited cross-protection to starvation stress. Stressor-specific accumulation or utilization, as well as rates of metabolic change for each energy metabolite, were significantly higher in wet season flies than dry season flies. Energy metabolite changes due to inter-related stressors (heat vs. desiccation or starvation) resulted in possible maintenance of energetic homeostasis in wet or dry season flies. Thus, low or high humidity induced plastic changes in energy metabolites can provide cross-protection to seasonally varying climatic stressors.

Keywords: wet-dry seasons, plastic changes, stress related traits, energy metabolites, cross protection

Procedia PDF Downloads 156
26088 JavaScript Object Notation Data against eXtensible Markup Language Data in Software Applications a Software Testing Approach

Authors: Theertha Chandroth

Abstract:

This paper presents a comparative study on how to check JSON (JavaScript Object Notation) data against XML (eXtensible Markup Language) data from a software testing point of view. JSON and XML are widely used data interchange formats, each with its unique syntax and structure. The objective is to explore various techniques and methodologies for validating comparison and integration between JSON data to XML and vice versa. By understanding the process of checking JSON data against XML data, testers, developers and data practitioners can ensure accurate data representation, seamless data interchange, and effective data validation.

Keywords: XML, JSON, data comparison, integration testing, Python, SQL

Procedia PDF Downloads 123
26087 Green approach of Anticorrosion Coating of Steel Based on Polybenzoxazine/Henna Nanocomposites

Authors: Salwa M. Elmesallamy, Ahmed A. Farag, Magd M. Badr, Dalia S. Fathy, Ahmed Bakry, Mona A. El-Etre

Abstract:

The term green environment is an international trend. It is become imperative to treat the corrosion of steel with a green coating to protect the environment. From the potential adverse effects of the traditional materials.A series of polybenzoxazine/henna composites (PBZ/henna), with different weight percent (3,5, and 7 wt % (of henna), were prepared for corrosion protection of carbon steel. The structures of the prepared composites were verified using FTIR analysis. The mechanical properties of the resins, such as adhesion, hardness, binding, and tensile strength, were also measured. It was found that the tensile strength increases by henna loading up to 25% higher than the tidy resin. The thermal stability was investigated by thermogravimetric analysis (TGA) the loading of lawsone (henna) molecules into the PBZ matrix increases the thermal stability of the composite. UV stability was tested by the UV weathering accelerator to examine the possibility that henna can also act as an aging UV stabilizer. The effect of henna content on the corrosion resistance of composite coatings was tested using potentiostatic polarization and electrochemical spectroscopy. The presence of henna in the coating matrix enhances the protection efficiency of polybenzoxazine coats. Increasing henna concentration increases the protection efficiency of composites. The quantum chemical calculations for polybenzoxazine/henna composites have resulted that the highest corrosion inhibition efficiency, has the highest EHOMO and lowest ELUMO; which is in good agreement with results obtained from experiments.

Keywords: polybenzoxazine, corrosion, green chemistry, carbon steel

Procedia PDF Downloads 87
26086 Public Policy and Morality Principles as Grounds for Refusal of Trademarks: A Comparative Study of Islamic Shari’a and Common Law

Authors: Nawaf Alyaseen

Abstract:

This paper provides a comparative analysis of the Islamic and Western public policy and morality principles governing trademarks. The aim of this paper is to explore public policy and morality principles that affect trademark registration and protection under Shari'a by using Kuwaiti law as a case study. The findings provide a better understanding of trademark recognition from the perspective of Shari'a and the requirements demanded by Islamic Shari'a, especially of those who deal with strict Shari'a jurisdiction countries. In addition, this understanding is required for corporations or legislators that wish to take into consideration Muslim consumers. The conclusion suggests that trademarks in Western and Islamic systems are controlled by a number of public policy and morality rules that have a direct effect on the registration and protection of trademarks. Regardless of the fact that there are many commonalities between the two systems, there are still fundamental differences.

Keywords: trademark, public policy and morality, Islamic sharia, western legal systems

Procedia PDF Downloads 62
26085 “It Just Feels Risky”: Intuition vs Evidence in Child Sexual Abuse Cases. Proposing an Empirically Derived Risk and Protection Protocol

Authors: Christian Perrin, Nicholas Blagden, Louise Allen, Sarah Impey

Abstract:

Social workers in the UK and professionals globally are faced with a particular challenge when dealing with allegations of child sexual abuse (CSA) in the community. In the absence of a conviction or incontestable evidence, staff can often find themselves unable to take decisive action to remove a child from harm, even though there may be a credible threat to their welfare. Conversely, practitioners may over-calculate risk through fear of being accountable for harm. This is, in part, due to the absence of a structured and evidence-based risk assessment tool which can predict the likelihood of a person committing child sexual abuse. Such assessments are often conducted by forensic professionals who utilise offence-specific data and personal history information to calculate risk. In situations where only allegations underpin a case, this mode of assessment is not viable. There are further ethical issues surrounding the assessment of risk in this area which require expert consideration and sensitive planning. This paper explores this entangled problem extant in the wider call to prevent sexual and child sexual abuse in the community. To this end, 32 qualitative interviews were undertaken with social workers dealing with CSA cases. Results were analysed using thematic analysis and operationalised to formulate a risk and protection protocol for use in case management. This paper reports on the early findings associated with the initial indications of protocol reliability. Implications for further research and practice are discussed.

Keywords: sexual offending, child sexual offence, offender rehabilitation, risk assessment, offence prevention

Procedia PDF Downloads 98
26084 Protection of Victims’ Rights in International Criminal Proceedings

Authors: Irina Belozerova

Abstract:

In the recent years, the number of crimes against peace and humanity has constantly been increasing. The development of the international community is inseparably connected to the compliance with the law which protects the rights and interests of citizens in all of their manifestations. The provisions of the law of criminal procedure are no exception. The rights of the victims of genocide, of the war crimes and the crimes against humanity, require particular attention. These crimes fall within the jurisdiction of the International Criminal Court governed by the Rome Statute of the International Criminal Court. These crimes have the following features. First, any such crime has a mass character and therefore requires specific regulation in the international criminal law and procedure and the national criminal law and procedure of different countries. Second, the victims of such crimes are usually children, women and old people; the entire national, ethnic, racial or religious groups are destroyed. These features influence the classification of victims by the age criterion. Article 68 of the Rome Statute provides for protection of the safety, physical and psychological well-being, dignity and privacy of victims and witnesses and thus determines the procedural status of these persons. However, not all the persons whose rights have been violated by the commission of these crimes acquire the status of victims. This is due to the fact that such crimes affect a huge number of persons and it is impossible to mention them all by name. It is also difficult to assess the entire damage suffered by the victims. While assessing the amount of damages it is essential to take into account physical and moral harm, as well as property damage. The procedural status of victims thus gains an exclusive character. In order to determine the full extent of the damage suffered by the victims it is necessary to collect sufficient evidence. However, it is extremely difficult to collect the evidence that would ensure the full and objective protection of the victims’ rights. While making requests for the collection of evidence, the International Criminal Court faces the problem of protection of national security information. Religious beliefs and the family life of victims are of great importance. In some Islamic countries, it is impossible to question a woman without her husband’s consent which affects the objectivity of her testimony. Finally, the number of victims is quantified by hundreds and thousands. The assessment of these elements demands time and highly qualified work. These factors justify the creation of a mechanism that would help to collect the evidence and establish the truth in the international criminal proceedings. This mechanism will help to impose a just and appropriate punishment for the persons accused of having committed a crime, since, committing the crime, criminals could not misunderstand the outcome of their criminal intent.

Keywords: crimes against humanity, evidence in international criminal proceedings, international criminal proceedings, protection of victims

Procedia PDF Downloads 235
26083 The Role of Formal and Informal Institutions in Water Governance in the Central Rift Valley of Ethiopia

Authors: Endalew Jibat, Feyera Senbeta, Tesfaye Zeleke, Fitsum Hagos

Abstract:

Institutions can play a key role in coordinating how natural resources are effectively used without over-exploitation. Institutions are the laws, policies, and organizational arrangements that permit, forbid or regulate human action. The aim of this study was to look into the roles of formal and informal institutions, as well as their interactions, in water resource governance in Ethiopia's Central Rift Valley (CRV), where water scarcity is a concern. Key informant interviews, group discussions, in depth-interview, and secondary data sources were used to generate relevant data. The study revealed that formal and informal institutions were involved in water resource governance in the study area. However, the influence of informal institutions on formal institutions or vice versa is trivial to change the action of water users. Lack of clear roles and responsibilities of actors, weak capacity and lack of meaningful decentralization and participation of key actors in policy development, lack of synergy and incongruence between formal and informal institutions, and absence of enforcement mechanisms including incentives are attributed to inefficient use of water resources in the CRV. Enhancing the interplay of formal and informal institutions in the water resource policy development and meaningful decentralization and key stakeholders' engagement is recommended for sustainable water use.

Keywords: institutions, governance, institutional interplay, water users

Procedia PDF Downloads 160
26082 Exergy Analysis of Reverse Osmosis for Potable Water and Land Irrigation

Authors: M. Sarai Atab, A. Smallbone, A. P. Roskilly

Abstract:

A thermodynamic study is performed on the Reverse Osmosis (RO) desalination process for brackish water. The detailed RO model of thermodynamics properties with and without an energy recovery device was built in Simulink/MATLAB and validated against reported measurement data. The efficiency of desalination plants can be estimated by both the first and second laws of thermodynamics. While the first law focuses on the quantity of energy, the second law analysis (i.e. exergy analysis) introduces quality. This paper used the Main Outfall Drain in Iraq as a case study to conduct energy and exergy analysis of RO process. The result shows that it is feasible to use energy recovery method for reverse osmosis with salinity less than 15000 ppm as the exergy efficiency increases twice. Moreover, this analysis shows that the highest exergy destruction occurs in the rejected water and lowest occurs in the permeate flow rate accounting 37% for 4.3% respectively.

Keywords: brackish water, exergy, irrigation, reverse osmosis (RO)

Procedia PDF Downloads 165
26081 Redefining Problems and Challenges of Natural Resource Management in Indonesia

Authors: Amalia Zuhra

Abstract:

Indonesia is very rich with its natural resources. Natural resource management becomes a challenge for Indonesia. Improper management will make the natural resources run out and future generations will not be able to enjoy the natural wealth. A good rule of law and proper implementation determines the success of the management of a country's natural resources. This paper examines the need to redefine problems and challenges in the management of natural resources in Indonesia in the context of law. The purpose of this article is to overview the latest issues and challenges in natural resource management and to redefine legal provisions related to environmental management and human rights protection so that the management of natural resources in the present and future will be more sustainable. This paper finds that sustainable management of natural resources is absolutely essential. The aspect of environmental protection and human rights must be elaborated more deeply so that the management of natural resources can be done maximally without harming not only people but also the environment.

Keywords: international environmental law, human rights law, natural resource management, sustainable development

Procedia PDF Downloads 257
26080 Applications of AI, Machine Learning, and Deep Learning in Cyber Security

Authors: Hailyie Tekleselase

Abstract:

Deep learning is increasingly used as a building block of security systems. However, neural networks are hard to interpret and typically solid to the practitioner. This paper presents a detail survey of computing methods in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests that of accelerating the intelligence of the security systems. There are many AI-based applications used in industrial scenarios such as Internet of Things (IoT), smart grids, and edge computing. Machine learning technologies require a training process which introduces the protection problems in the training data and algorithms. We present machine learning techniques currently applied to the detection of intrusion, malware, and spam. Our conclusions are based on an extensive review of the literature as well as on experiments performed on real enterprise systems and network traffic. We conclude that problems can be solved successfully only when methods of artificial intelligence are being used besides human experts or operators.

Keywords: artificial intelligence, machine learning, deep learning, cyber security, big data

Procedia PDF Downloads 113
26079 Particle Swarm Optimization Algorithm vs. Genetic Algorithm for Image Watermarking Based Discrete Wavelet Transform

Authors: Omaima N. Ahmad AL-Allaf

Abstract:

Over communication networks, images can be easily copied and distributed in an illegal way. The copyright protection for authors and owners is necessary. Therefore, the digital watermarking techniques play an important role as a valid solution for authority problems. Digital image watermarking techniques are used to hide watermarks into images to achieve copyright protection and prevent its illegal copy. Watermarks need to be robust to attacks and maintain data quality. Therefore, we discussed in this paper two approaches for image watermarking, first is based on Particle Swarm Optimization (PSO) and the second approach is based on Genetic Algorithm (GA). Discrete wavelet transformation (DWT) is used with the two approaches separately for embedding process to cover image transformation. Each of PSO and GA is based on co-relation coefficient to detect the high energy coefficient watermark bit in the original image and then hide the watermark in original image. Many experiments were conducted for the two approaches with different values of PSO and GA parameters. From experiments, PSO approach got better results with PSNR equal 53, MSE equal 0.0039. Whereas GA approach got PSNR equal 50.5 and MSE equal 0.0048 when using population size equal to 100, number of iterations equal to 150 and 3×3 block. According to the results, we can note that small block size can affect the quality of image watermarking based PSO/GA because small block size can increase the search area of the watermarking image. Better PSO results were obtained when using swarm size equal to 100.

Keywords: image watermarking, genetic algorithm, particle swarm optimization, discrete wavelet transform

Procedia PDF Downloads 214
26078 Multi-Source Data Fusion for Urban Comprehensive Management

Authors: Bolin Hua

Abstract:

In city governance, various data are involved, including city component data, demographic data, housing data and all kinds of business data. These data reflects different aspects of people, events and activities. Data generated from various systems are different in form and data source are different because they may come from different sectors. In order to reflect one or several facets of an event or rule, data from multiple sources need fusion together. Data from different sources using different ways of collection raised several issues which need to be resolved. Problem of data fusion include data update and synchronization, data exchange and sharing, file parsing and entry, duplicate data and its comparison, resource catalogue construction. Governments adopt statistical analysis, time series analysis, extrapolation, monitoring analysis, value mining, scenario prediction in order to achieve pattern discovery, law verification, root cause analysis and public opinion monitoring. The result of Multi-source data fusion is to form a uniform central database, which includes people data, location data, object data, and institution data, business data and space data. We need to use meta data to be referred to and read when application needs to access, manipulate and display the data. A uniform meta data management ensures effectiveness and consistency of data in the process of data exchange, data modeling, data cleansing, data loading, data storing, data analysis, data search and data delivery.

Keywords: multi-source data fusion, urban comprehensive management, information fusion, government data

Procedia PDF Downloads 376
26077 Fire Protection Performance of Different Industrial Intumescent Coatings for Steel Beams

Authors: Serkan Kocapinar, Gülay Altay

Abstract:

This study investigates the efficiency of two different industrial intumescent coatings which have different types of certifications, in the fire protection performance in steel beams in the case of ISO 834 fire for 2 hours. A better understanding of industrial intumescent coatings, which assure structural integrity and prevent a collapse of steel structures, is needed to minimize the fire risks in steel structures. A comparison and understanding of different fire protective intumescent coatings, which are Product A and Product B, are used as a thermal barrier between the steel components and the fire. Product A is tested according to EN 13381-8 and BS 476-20,22 and is certificated by ISO Standards. Product B is tested according to EN 13381-8 and ASTM UL-94 and is certificated by the Turkish Standards Institute (TSE). Generally, fire tests to evaluate the fire performance of steel components are done numerically with commercial software instead of experiments due to the high cost of an ISO 834 fire test in a furnace. Hence, there is a gap in the literature about the comparisons of different certificated intumescent coatings for fire protection in the case of ISO 834 fire in a furnace experiment for 2 hours. The experiment was carried out by using two 1-meter UPN 200 steel sections. Each one was coated by different industrial intumescent coatings. A furnace was used by the Turkish Standards Institute (TSE) for the experiment. The temperature of the protected steels and the inside of the furnace was measured with the help of 24 thermocouples which were applied before the intumescent coatings during the two hours for the performance of intumescent coatings by getting a temperature-time curve of steel components. FIN EC software was used to determine the critical temperatures of protected steels, and Abaqus was used for thermal analysis to get theoretical results to compare with the experimental results.

Keywords: fire safety, structural steel, ABAQUS, thermal analysis, FIN EC, intumescent coatings

Procedia PDF Downloads 91
26076 Electrochemical and Microstructure Properties of Chromium-Graphene and SnZn-Graphene Oxide Composite Coatings

Authors: Rekha M. Y., Punith Kumar, Anshul Kamboj, Chandan Srivastava

Abstract:

Coatings plays an important role in providing protection for a substrate and in improving the surface quality. Graphene/graphene oxide (GO) using in coating systems provides an environmental friendly solution towards protection against corrosion. Issues such as, lack of scale, high cost, low quality limits the practical application of graphene/GO as corrosion resistant coating material. One other way to employ these materials for corrosion protection is to incorporate them into coatings that are conventionally used for corrosion protection. Due to the extraordinary properties of graphene/GO, it has been demonstrated that the coatings containing graphene/GO are more corrosion resistant than pure metal/alloy coatings. In the present work, Cr-graphene and SnZn-GO composite coatings were investigated in enhancing the corrosion resistant property when compared to pure Cr coating and pure SnZn coating respectively. All the coatings were electrodeposited over mild-steel substrate. Graphene and GO were synthesized by electrochemical exfoliation method and modified Hummers’ method respectively. In Cr coatings, the microstructural study revealed that the addition of formic acid in the coatings reduced the number of cracks in the coatings. Further addition of graphene in Cr coating enhanced the Cr coating’s morphology. Chemically synthesized ZnO nanoparticles were also embedded in the as-deposited Cr and Cr-graphene coatings to enhance the adhesion of the coating, to improve the surface finish and to increase the corrosion resistant property of the coatings. Diffraction analysis revealed that the addition of graphene also altered the texture of the Cr coatings. In SnZn alloy coatings, the morphological and topographical characterization revealed that the relative smoothness and compactness of the coatings increased with increase in the addition of GO in the coatings. The microstructural investigation revealed large-scale segregation of Zn-rich and Sn-rich phases in the pure SnZn coating. However, in SnZn-GO composite coating the uniform distribution of Zn phase in the Sn-rich matrix was observed. This distribution caused the early and uniform formation of ZnO, which is the corrosion product, yielding better corrosion resistance for the SnZn-GO composite coatings as compared to pure SnZn coating. A significant improvement in corrosion resistance in terms of reduction in corrosion current and corrosion rate and increase in the polarization resistance was observed in Cr coating containing graphene and in SnZn coatings containing GO.

Keywords: coatings, corrosion, electrodeposition, graphene, graphene-oxide

Procedia PDF Downloads 163
26075 Realizing the Full Potential of Islamic Banking System: Proposed Suitable Legal Framework for Islamic Banking System in Tanzania

Authors: Maulana Ayoub Ali, Pradeep Kulshrestha

Abstract:

Laws of any given secular state have a huge contribution in the growth of the Islamic banking system because the system uses conventional laws to govern its activities. Therefore, the former should be ready to accommodate the latter in order to make the Islamic banking system work properly without affecting the current conventional banking system and therefore without affecting its system. Islamic financial rules have been practiced since the birth of Islam. Following the recent world economic challenges in the financial sector, a quick rebirth of the contemporary Islamic ethical banking system took place. The coming of the Islamic banking system is due to various reasons including but not limited to the failure of the interest based economy in solving financial problems around the globe. Therefore, the Islamic banking system has been adopted as an alternative banking system in order to recover the highly damaged global financial sector. But the Islamic banking system has been facing a number of challenges which hinder its smooth operation in different parts of the world. It has not been the aim of this paper to discuss other challenges rather than the legal ones, but the same was partly discussed when it was justified that it was proper to do so. Generally, there are so many things which have been discovered in the course of writing this paper. The most important part is the issue of the regulatory and supervisory framework for the Islamic banking system in Tanzania and in other nations is considered to be a crucial part for the development of the Islamic banking industry. This paper analyses what has been observed in the study on that area and recommends for necessary actions to be taken on board in a bid to make Islamic banking system reach its climax of serving the larger community by providing ethical, equitable, affordable, interest-free and society cantered banking system around the globe.

Keywords: Islamic banking, interest free banking, ethical banking, legal framework

Procedia PDF Downloads 137
26074 The Effect of Support Program Based on The Health Belief Model on Reproductive Health Behavior in Women with Orthopedic Disabled

Authors: Eda Yakit Ak, Ergül Aslan

Abstract:

The study was conducted using the quasi-experimental design to determine the influence of the nursing support program prepared according to the Health Belief Model on reproductive health behaviors of orthopedically disabled women in the physical therapy and rehabilitation clinic at a university hospital between August 2019-October, 2020. The research sample included 50 women (35 in the control group and 15 in the experimental group with orthopedic disability). A 3-week nursing support program was applied to the experimental group of women. To collect the data, Introductory Information Form and Scale for Determining the Protective Attitudes of Married Women towards Reproductive Health (SDPAMW) were applied. The evaluation was made with a follow-up form for four months. In the first evaluation, the total SDPAMW scores were 119.93±20.59 for the experimental group and 122.20±16.71 for the control group. In the final evaluation, the total SDPAMW scores were 144.27±11.95 for the experimental group and 118.00±16.43 for the control group. The difference between the groups regarding the first and final evaluations for the total SDPAMW scores was statistically significant (p<0.01). In the experimental group, between the first and final evaluations regarding the sub-dimensions of SDPAMW, an increase was found in the behavior of seeing the doctor on reproductive health issues, protection from reproductive organ and breast cancer, general health behaviors to protect reproductive health, and protection from genital tract infections (p<0.05). Consequently, the nursing support program based on the Health Belief Model applied to orthopedically disabled women positively affected reproductive health behaviors.

Keywords: orthopedically disabled, woman, reproductive health, nursing support program, health belief model

Procedia PDF Downloads 135
26073 Gender Equality: A Constitutional Myth When Featured with Domestic Violence

Authors: Suja S. Nayar, Mayuri Pandya

Abstract:

The foundation of legal system of any nation is its constitution and the strive to achieve equality amongst different classes prevailing in the social system. The most traditional form of inequality that is prevailing in the society is the gender inequality. The existence of inequality on the basis of gender prevails since the ancient era which has with the passing time merely continued and aggravated to a great extent. The founding fathers of our constitution were well aware of the then prevailing situation and being concerned about the future if this inequality continued to prevail, and in such view, the provisions of Article 14, 15, 38 and 44 of our Constitution were enacted with specific intent for the upliftment of women. The strive for equality is the rule of law embodied with the principle of foreseeability which is necessitated in the stability of justice system of any nation, and when it comes to equality, the first form of equality we need to achieve is gender equality. Time and again various initiatives have been announced and attempted to achieve the objective of gender equality, but analysis of the ground reality always have yielded disappointing results. The research that is proposed to be undertaken intends to cover all the above issues concerning the failures ineffective implementation of the gender-specific laws especially the provisions concerning the protection provided under Domestic Violence Act. The researchers will analyze the judgment of last five years' judgments of Supreme Court of India. In Hiral P. Harsora and ors. v Kusum Narottamdas Harsora and Ors. the Hon'ble Supreme Court recently deleting the words 'adult male' from the definition of respondent disclosed it is intent and understanding that domestic violence is being caused by a female on female also and not only restricted to males on females only. The procedure as prescribed under the act for claiming reliefs though is as per the criminal mandate, but the reliefs are of civil nature and so same needs to deal emphatically which now makes it a lengthier process. The pros and cons of such pronouncements are being weighed on the balance of constitution and social equality that is strived by the entire women fraternity.

Keywords: domestic, violence, constitution, gender, equality, women

Procedia PDF Downloads 495
26072 Education as an Important Correlate for Age at Marriage in Bangladesh

Authors: Forhana Rahman Noor, Shafia Jannat Khanam

Abstract:

A girl’s schooling is disrupted by the very act of marriage which requires her to move away from home and her school area to live with her husband’s family, according to custom and practice. Once in her new home, her husband or her in-laws decide her continuation of schooling. A plethora of research has confirmed the inter-relationship between education and age at marriage of girls. The primary data was collected from both urban and rural area in Bangladesh. The study revealed that mean age at marriage for girls was 15.69 years, as a whole and it was lower (15.21 years) in the rural area than that of the urban area (17.13 years). These readings confirm early marriage still exists. The most important determinant of age at marriage was found as low education level of the girls. The bi-variate analysis of this study discovered the relationship or association between education and age at marriage. The study also found the education level of husbands of girls has a significant effect on age at marriage of a girl.

Keywords: education, girl, age at marriage, correlate, Bangladesh

Procedia PDF Downloads 321
26071 Smart Monitoring and Control of Tap Changer Using Intelligent Electronic Device

Authors: K. N. Dinesh Babu, M. V. Gopalan, G. R. Manjunatha, R. Ramaprabha, V. Rajini

Abstract:

In this paper, monitoring and control of tap changer mechanism of a transformer implementation in an intelligent electronic device (IED) is discussed. Its been a custom for decades to provide a separate panel for on load tap changer control for monitoring the tap position. However this facility cannot either record or transfer the information to remote control centers. As there is a technology shift towards the smart grid protection and control standards, the need for implementing remote control and monitoring has necessitated the implementation of this feature in numerical relays. This paper deals with the programming, settings and logic implementation which is applicable to both IEC 61850 compatible and non-compatible IEDs thereby eliminating the need for separate tap changer control equipment. The monitoring mechanism has been implemented in a 28MVA, 110 /6.9kV transformer with 16 tap position with GE make T60 IED at Ultratech cement limited Gulbarga, Karnataka and is in successful service.

Keywords: transformer protection, tap changer control, tap position monitoring, on load tap changer, intelligent electronic device (IED)

Procedia PDF Downloads 581
26070 AI as a Tool Hindering Digital Education

Authors: Justyna Żywiołek, Marek Matulewski

Abstract:

The article presents the results of a survey conducted among students from various European countries. The aim of the study was to understand how artificial intelligence (AI) affects educational processes in a digital environment. The survey covered a wide range of topics, including students' understanding and use of AI, its impact on motivation and engagement, interaction and support issues, accessibility and equity, and data security and privacy concerns. Most respondents admitted having difficulties comprehending the advanced functions of AI in educational tools. Many students believe that excessive use of AI in education can decrease their motivation for self-study and active participation in classes. Additionally, students reported that interaction with AI-based tools is often less satisfying compared to direct contact with teachers. Furthermore, the survey highlighted inequalities in access to advanced AI tools, which can widen the educational gap between students from different economic backgrounds. Students also expressed concerns about the security and privacy of their personal data collected and processed by AI systems. The findings suggest that while AI has the potential to support digital education, significant challenges need to be addressed to make these tools more effective and acceptable for students. Recommendations include increasing training for students and teachers on using AI, providing more interactive and engaging forms of education, and implementing stricter regulations on data protection.

Keywords: AI, digital education, education tools, motivation and engagement

Procedia PDF Downloads 13
26069 Legal Pluralism and Land Administration in West Sumatra: The Implementation of the Regulations of Both Local and Nagari Governments on Communal Land Tenure

Authors: Hilaire Tegnan

Abstract:

Land administration has always been a delicate issue in the history of nations, and Indonesia, a country where a significant number of the population lives a pastoral life is not exempt from this reality. This paper discusses land tenure issues in West Sumatra, an Indonesian province which is home to the Minangkabau people with their long existing village management system known as Nagari, established to settle disputes based on adat (custom) principles as well as to protect the rights of the community members. These rights include communal land (referred to as tanahulayat hereafter). Long before the Dutch occupation of Indonesian archipelago, the nagari government was vested with powers to regulate communal land in West Sumatra. However, this authority was constantly overlooked by the then Dutch colonial administration as well as the post-independence governments (both central and regional). To reinforce the Nagari government as the guardian of the customary law (hukumadat) and to specify its jurisdiction, the Regional Government of West Sumatra enacted two laws between 2000 and 2008: Law No. 9/2000 repealed by Law No. 2/2007 and Law No. 6/2008 on communal land tenure. Although these two laws provide legal grounds to address land issues across the region, land conflicts still prevail among West Sumatran populations due to unsynchronized and contradictory regulations. The protests against the army (Korem) in Nagari Kapalo Hilalang, against the oil palm company in Nagari Kinali, and against a cement factory in Nagari Lubuk Kilangan are cited in this paper as case references.

Keywords: local government, Nagari government, Tanah Ulayat, legal pluralism, land administration

Procedia PDF Downloads 493
26068 Rohingya Problem and the Impending Crisis: Outcome of Deliberate Denial of Citizenship Status and Prejudiced Refugee Laws in South East Asia

Authors: Priyal Sepaha

Abstract:

A refugee crisis is manifested by challenges, both for the refugees and the asylum giving state. The situation turns into a mega-crisis when the situation is prejudicially handled by the home state, inappropriate refugee laws, exploding refugee population, and above all, no hope of any foreseeable solution or remedy. This paper studies the impact on the capability of stateless Rohingyas to migrate and seek refuge due to the enforcement of rigid criteria of movement imposed both by Myanmar as well as the adjoining countries in the name of national security. This theoretical study identifies the issues and the key factors and players which have precipitated the crisis. It further discusses the possible ramifications in the home, asylum giving, and the adjoining countries for not discharging their roles aptly. Additionally, an attempt has been made to understand the scarce response given to the impending crisis by the regional organizations like SAARC, ASEAN and CHOGAM as well as international organizations like United Nations Human Rights Council, Security Council, Office of High Commissioner for Refugees and so on, in the name of inadequacy of monetary funds and physical resources. Based on the refugee laws and practices pertaining to the case of Rohingyas, this paper analyses that the Rohingya Crisis is in dire need of an effective action plan to curb and resolve the biggest humanitarian crisis situation of the century. This mounting human tragedy can be mitigated permanently, by strengthening existing and creating new interdependencies among all stakeholders, as further ignorance can drive the countries of the Indian Sub-continent, in particular, and South East Asia, by and large into a violent civil war for seizing long-awaited civil rights by the marginalized Rohingyas. To curb this mass crisis, it will require the application of coercive pressure and diplomatic pursuance on the home country to acknowledge the rights of its fleeing citizens. This further necessitates mustering adequate monetary funds and physical resources for the asylum providing state. Additional challenges such as devising mechanisms for the refugee’s safe return, comprehensive planning for their holistic economic development and rehabilitation plan are needed. These, however, can only come into effect with a conscious strive by the regional and international community to fulfil their assigned role.

Keywords: asylum, citizenship, crisis, humanitarian, human rights, refugee, rohingya

Procedia PDF Downloads 120
26067 The Yak of Thailand: Folk Icons Transcending Culture, Religion, and Media

Authors: David M. Lucas, Charles W. Jarrett

Abstract:

In the culture of Thailand, the Yak serve as a mediated icon representing strength, power, and mystical protection not only for the Buddha, but for population of worshipers. Originating from the forests of China, the Yak continue to stand guard at the gates of Buddhist temples. The Yak represents Thai culture in the hearts of Thai people. This paper presents a qualitative study regarding the curious mix of media, culture, and religion that projects the Yak of Thailand as a larger than life message throughout the political, cultural, and religious spheres. The gate guardians, or gods as they are sometimes called, appear throughout the religious temples of Asian cultures. However, the Asian cultures demonstrate differences in artistic renditions (or presentations) of such sentinels. Thailand gate guards (the Yak) stand in front of many Buddhist temples, and these iconic figures display unique features with varied symbolic significance. The temple (or wat), plays a vital role in every community; and, for many people, Thailand’s temples are the country’s most endearing sights. The authors applied folk-nography as a methodology to illustrate the importance of the Thai Yak in serving as meaningful icons that transcend not only time, but the culture, religion, and mass media. The Yak represent mythical, religious, artistic, cultural, and militaristic significance for the Thai people. Data collection included interviews, focus groups, and natural observations. This paper summarizes the perceptions of the Thai people concerning their gate sentries and the relationship, communication, connection, and the enduring respect that Thai people hold for their guardians of the gates.

Keywords: communication, culture, folknography, icon, image, media, protection, religion, yak

Procedia PDF Downloads 391
26066 Improving Tower Grounding and Insulation Level vs. Line Surge Arresters for Protection of Subtransmission Lines

Authors: Navid Eghtedarpour, Mohammad Reza Hasani

Abstract:

Since renewable wind power plants are usually installed in mountain regions and high-level lands, they are often prone to lightning strikes and their hazardous effects. Although the transmission line is protected using guard wires in order to prevent the lightning surges to strike the phase conductors, the back-flashover may also occur due to tower footing resistance. A combination of back-flashover corrective methods, tower-footing resistance reduction, insulation level improvement, and line arrester installation, are analyzed in this paper for back-flashover rate reduction of a double-circuit 63 kV line in the south region of Fars province. The line crosses a mountain region in some sections with a moderate keraunic level, whereas tower-footing resistance is substantially high at some towers. Consequently, an exceptionally high back-flashover rate is recorded. A new method for insulation improvement is studied and employed in the current study. The method consists of using a composite-type creepage extender in the string. The effectiveness of this method for insulation improvement of the string is evaluated through the experimental test. Simulation results besides monitoring the one-year operation of the 63-kV line show that due to technical, practical, and economic restrictions in operated sub-transmission lines, a combination of corrective methods can lead to an effective solution for the protection of transmission lines against lightning.

Keywords: lightning protection, BF rate, grounding system, insulation level, line surge arrester

Procedia PDF Downloads 119
26065 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

Authors: N. Nalini, Bhanu Prakash Gopularam

Abstract:

The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.

Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping

Procedia PDF Downloads 368