Search results for: common law legal system
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 22634

Search results for: common law legal system

21914 The Log S-fbm Nested Factor Model

Authors: Othmane Zarhali, Cécilia Aubrun, Emmanuel Bacry, Jean-Philippe Bouchaud, Jean-François Muzy

Abstract:

The Nested factor model was introduced by Bouchaud and al., where the asset return fluctuations are explained by common factors representing the market economic sectors and residuals (noises) sharing with the factors a common dominant volatility mode in addition to the idiosyncratic mode proper to each residual. This construction infers that the factors-residuals log volatilities are correlated. Here, we consider the case of a single factor where the only dominant common mode is a S-fbm process (introduced by Peng, Bacry and Muzy) with Hurst exponent H around 0.11 and the residuals having in addition to the previous common mode idiosyncratic components with Hurst exponents H around 0. The reason for considering this configuration is twofold: preserve the Nested factor model’s characteristics introduced by Bouchaud and al. and propose a framework through which the stylized fact reported by Peng and al. is reproduced, where it has been observed that the Hurst exponents of stock indices are large as compared to those of individual stocks. In this work, we show that the Log S-fbm Nested factor model’s construction leads to a Hurst exponent of single stocks being the ones of the idiosyncratic volatility modes and the Hurst exponent of the index being the one of the common volatility modes. Furthermore, we propose a statistical procedure to estimate the Hurst factor exponent from the stock returns dynamics together with theoretical guarantees, with good results in the limit where the number of stocks N goes to infinity. Last but not least, we show that the factor can be seen as an index constructed from the single stocks weighted by specific coefficients.

Keywords: hurst exponent, log S-fbm model, nested factor model, small intermittency approximation

Procedia PDF Downloads 24
21913 Risk Mitigation of Data Causality Analysis Requirements AI Act

Authors: Raphaël Weuts, Mykyta Petik, Anton Vedder

Abstract:

Artificial Intelligence has the potential to create and already creates enormous value in healthcare. Prescriptive systems might be able to make the use of healthcare capacity more efficient. Such systems might entail interpretations that exclude the effect of confounders that brings risks with it. Those risks might be mitigated by regulation that prevents systems entailing such risks to come to market. One modality of regulation is that of legislation, and the European AI Act is an example of such a regulatory instrument that might mitigate these risks. To assess the risk mitigation potential of the AI Act for those risks, this research focusses on a case study of a hypothetical application of medical device software that entails the aforementioned risks. The AI Act refers to the harmonised norms for already existing legislation, here being the European medical device regulation. The issue at hand is a causal link between a confounder and the value the algorithm optimises for by proxy. The research identifies where the AI Act already looks at confounders (i.a. feedback loops in systems that continue to learn after being placed on the market). The research identifies where the current proposal by parliament leaves legal uncertainty on the necessity to check for confounders that do not influence the input of the system, when the system does not continue to learn after being placed on the market. The authors propose an amendment to article 15 of the AI Act that would require high-risk systems to be developed in such a way as to mitigate risks from those aforementioned confounders.

Keywords: AI Act, healthcare, confounders, risks

Procedia PDF Downloads 240
21912 Intellectual Property Implications in the Context of Space Exploration with a Special Focus on ESA Rules and Regulations

Authors: Linda Ana Maria Ungureanu

Abstract:

This article details the manner in which European law establishes the protection and ownership rights over works created in off-world environments or in relation to space exploration. In this sense, the analysis is focused on identifying the legal treatment applicable to creative works based on the provisions regulated under the International Space Treaties, on one side, and the International IP Treaties and subsequent EU legislation, on the other side, with a special interest on ESA Rules and Regulations. Furthermore, the article analyses the manner in which ESA regulates the ownership regime applicable for creative works, taking into account the relationship existing between the inventor/creator and ESA and the environment in which the creative work was developed. Moreover, the article sets a series of de lege ferenda proposals for the regulation of intellectual property matters in the context of space exploration, the main purpose being to identify legal measures and steps that need to be taken in order to ensure that creative activities are fostered and understood as a significant catalyst for encouraging space exploration.

Keywords: intellectual property law, ESA guidelines, international IP treaties, EU legislation

Procedia PDF Downloads 169
21911 Engaging the World Bank: Good Governance and Human Rights-Based Approaches

Authors: Lottie Lane

Abstract:

It is habitually assumed and stated that the World Bank should engage and comply with international human rights standards. However, the basis for holding the Bank to such standards is unclear. Most advocates of the idea invoke aspects of international law to argue that the Bank has existing obligations to act in compliance with human rights standards. The Bank itself, however, does not appear to accept such arguments, despite having endorsed the importance of human rights for a considerable length of time. A substantial challenge is that under the current international human rights law framework, the World Bank is considered a non-state actor, and as such, has no direct human rights obligations. In the absence of clear legal duties for the Bank, it is necessary to look at the tools available beyond the international human rights framework to encourage the Bank to comply with human rights standards. This article critically examines several bases for arguing that the Bank should comply and engage with human rights through its policies and practices. Drawing on the Bank’s own ‘good governance’ approach as well as the United Nations’ ‘human rights-based-approach’ to development, a new basis is suggested. First, the relationship between the World Bank and human rights is examined. Three perspectives are considered: (1) the legal position – what the status of the World Bank is under international human rights law, and whether it can be said to have existing legal human rights obligations; (2) the Bank’s own official position – how the Bank envisages its relationship with and role in the protection of human rights; and (3) the relationship between the Bank’s policies and practices and human rights (including how its attitudes are reflected in its policies and how the Bank’s operations impact human rights enjoyment in practice). Here, the article focuses on two examples – the (revised) 2016 Environmental and Social Safeguard Policies and the 2012 case-study regarding Gambella, Ethiopia. Both examples are widely considered missed opportunities for the Bank to actively engage with human rights. The analysis shows that however much pressure is placed on the Bank to improve its human rights footprint, it is extremely reluctant to do so explicitly, and the legal bases available are insufficient for requiring concrete, ex ante action by the Bank. Instead, the Bank’s own ‘good governance’ approach to development – which it has been advocating since the 1990s – can be relied upon. ‘Good governance’ has been used and applied by many actors in many contexts, receiving numerous different definitions. This article argues that human rights protection can now be considered a crucial component of good governance, at least in the context of development. In doing so, the article explains the relationship and interdependence between the two concepts, and provides three rationales for the Bank to take a ‘human rights-based approach’ to good governance. Ultimately, this article seeks to look beyond international human rights law and take a governance approach to provide a convincing basis upon which to argue that the World Bank should comply with human rights standards.

Keywords: World Bank, international human rights law, good governance, human rights-based approach

Procedia PDF Downloads 337
21910 From Restraint to Obligation: The Protection of the Environment in Times of Armed Conflict

Authors: Aaron Walayat

Abstract:

Protection of the environment in international law has been one of the most developed in the context of international humanitarian law. This paper examines the history of the protection of the environment in times of armed conflict, beginning with the traditional notion of restraint observed in antiquity towards the obligation to protect the environment, examining the treaties and agreements, both binding and non-binding which have contributed to environmental protection in war. The paper begins with a discussion of the ancient concept of restraint. This section examines the social norms in favor of protection of the environment as observed in the Bible, Greco-Roman mythology, and even more contemporary literature. The study of the traditional rejection of total war establishes the social foundation on which the current legal regime has stemmed. The paper then studies the principle of restraint as codified in international humanitarian law. It mainly examines Additional Protocol I of the Geneva Convention of 1949 and existing international law concerning civilian objects and the principles of international humanitarian law in the classification between civilian objects and military objectives. The paper then explores the environment’s classification as both a military objective and as a civilian object as well as explores arguments in favor of the classification of the whole environment as a civilian object. The paper will then discuss the current legal regime surrounding the protection of the environment, discussing some declarations and conventions including the 1868 Declaration of St. Petersburg, the 1907 Hague Convention No. IV, the Geneva Conventions, and the 1976 Environmental Modification Convention. The paper concludes with the outline noting the movement from codification of the principles of restraint into the various treaties, agreements, and declarations of the current regime of international humanitarian law. This paper provides an analysis of the history and significance of the relationship between international humanitarian law as a major contributor to the growing field of international environmental law.

Keywords: armed conflict, environment, legal regime, restraint

Procedia PDF Downloads 176
21909 An intelligent Troubleshooting System and Performance Evaluator for Computer Network

Authors: Iliya Musa Adamu

Abstract:

This paper seeks to develop an expert system that would troubleshoot computer network and evaluate the network system performance so as to reduce the workload on technicians and increase the efficiency and effectiveness of solutions proffered to computer network problems. The platform of the system was developed using ASP.NET, whereas the codes are implemented in Visual Basic and integrated with SQL Server 2005. The knowledge base was represented using production rule, whereas the searching method that was used in developing the network troubleshooting expert system is the forward-chaining-rule-based-system. This software tool offers the advantage of providing an immediate solution to most computer network problems encountered by computer users.

Keywords: expert system, forward chaining rule based system, network, troubleshooting

Procedia PDF Downloads 622
21908 Evaluation of Medication Errors in Outpatient Pharmacies: Electronic Prescription System vs. Paper System

Authors: Mera Ababneh, Sayer Al-Azzam, Karem Alzoubi, Abeer Rababa'h

Abstract:

Background: Medication errors are among the most common medical errors. Their occurrences result in patient’s mortality, morbidity, and additional healthcare costs. Continuous monitoring and detection is required. Objectives: The aim of this study was to compare medication errors in outpatient’s prescriptions in two different hospitals (paper system vs. electronic system). Methods: This was a cross sectional observational study conducted in two major hospitals; King Abdullah University Hospital (KAUH) and Princess Bassma Teaching Hospital (PBTH) over three months period. Data collection was conducted by two trained pharmacists at each site. During the study period, medication prescriptions and dispensing procedures were screened for medication errors in both participating centers by two trained pharmacist. Results: In the electronic prescription hospital, 2500 prescriptions were screened in which 631 medication errors were detected. Prescription errors were 231 (36.6%), and dispensing errors were 400 (63.4%) of all errors. On the other side, analysis of 2500 prescriptions in paper-based hospital revealed 3714 medication errors, of which 288 (7.8%) were prescription errors, and 3426 (92.2%) were dispensing errors. A significant number of 2496 (67.2%) were inadequately and/or inappropriately labeled. Conclusion: This study provides insight for healthcare policy makers, professionals, and administrators to invest in advanced technology systems, education, and epidemiological surveillance programs to minimize medication errors.

Keywords: medication errors, prescription errors, dispensing errors, electronic prescription, handwritten prescription

Procedia PDF Downloads 259
21907 Countering Radicalization to Violent Extremism: A Comparative Study of Canada, the UK and South East Asia

Authors: Daniel Alati

Abstract:

Recent high-profile terrorist events in Canada, the United Kingdom and Europe – the London Bridge attacks, the terrorist attacks in Nice, France and Barcelona, Spain, the 2014 Ottawa Parliament attacks and the 2017 attacks in Edmonton – have all raised levels of public and academic concern with so-called “lone-wolf” and “radicalized” terrorism. Similarly, several countries outside of the “Western” world have been dealing with radicalization to violent extremism for several years. Many South East Asian countries, including Indonesia, Malaysia, Singapore and the Philippines have all had experience with what might be described as ISIS or extremist-inspired acts of terrorism. Indeed, it appears the greatest strength of groups such as ISIS has been their ability to spread a global message of violent extremism that has led to radicalization in markedly different jurisdictions throughout the world. These markedly different jurisdictions have responded with counter-radicalization strategies that warrant further comparative analysis. This paper utilizes an inter-disciplinary legal methodology. In doing so, it compares legal, political, cultural and historical aspects of the counter-radicalization strategies employed by Canada, the United Kingdom and several South East Asian countries (Indonesia, Malaysia, Singapore and the Philippines). Whilst acknowledging significant legal and political differences between these jurisdictions, the paper engages in these analyses with an eye towards understanding which best practices might be shared between the jurisdictions. In doing so, it presents valuable findings of a comparative nature that are useful to both academic and practitioner audiences in several jurisdictions.

Keywords: Canada, United Kingdom and South East Asia, comparative law and politics, radicalization to violent extremism, terrorism

Procedia PDF Downloads 325
21906 Different Motor Inhibition Processes in Action Selection Stage: A Study with Spatial Stroop Paradigm

Authors: German Galvez-Garcia, Javier Albayay, Javiera Peña, Marta Lavin, George A. Michael

Abstract:

The aim of this research was to investigate whether the selection of the actions needs different inhibition processes during the response selection stage. In Experiment 1, we compared the magnitude of the Spatial Stroop effect, which occurs in response selection stage, in two motor actions (lifting vs reaching) when the participants performed both actions in the same block or in different blocks (mixed block vs. pure blocks).Within pure blocks, we obtained faster latencies when lifting actions were performed, but no differences in the magnitude of the Spatial Stroop effect were observed. Within mixed block, we obtained faster latencies as well as bigger-magnitude for Spatial Stroop effect when reaching actions were performed. We concluded that when no action selection is required (the pure blocks condition), inhibition works as a unitary system, whereas in the mixed block condition, where action selection is required, different inhibitory processes take place within a common processing stage. In Experiment 2, we investigated this common processing stage in depth by limiting participants’ available resources, requiring them to engage in a concurrent auditory task within a mixed block condition. The Spatial Stroop effect interacted with Movement as it did in Experiment 1, but it did not significantly interact with available resources (Auditory task x Spatial Stroop effect x Movement interaction). Thus, we concluded that available resources are distributed equally to both inhibition processes; this reinforces the likelihood of there being a common processing stage in which the different inhibitory processes take place.

Keywords: inhibition process, motor processes, selective inhibition, dual task

Procedia PDF Downloads 367
21905 The Forensic Swing of Things: The Current Legal and Technical Challenges of IoT Forensics

Authors: Pantaleon Lutta, Mohamed Sedky, Mohamed Hassan

Abstract:

The inability of organizations to put in place management control measures for Internet of Things (IoT) complexities persists to be a risk concern. Policy makers have been left to scamper in finding measures to combat these security and privacy concerns. IoT forensics is a cumbersome process as there is no standardization of the IoT products, no or limited historical data are stored on the devices. This paper highlights why IoT forensics is a unique adventure and brought out the legal challenges encountered in the investigation process. A quadrant model is presented to study the conflicting aspects in IoT forensics. The model analyses the effectiveness of forensic investigation process versus the admissibility of the evidence integrity; taking into account the user privacy and the providers’ compliance with the laws and regulations. Our analysis concludes that a semi-automated forensic process using machine learning, could eliminate the human factor from the profiling and surveillance processes, and hence resolves the issues of data protection (privacy and confidentiality).

Keywords: cloud forensics, data protection Laws, GDPR, IoT forensics, machine Learning

Procedia PDF Downloads 130
21904 The New Family Law in Kuwait: A Step Towards International Standards

Authors: Dina Hadad

Abstract:

Women empowerment in the Arab world remains a central issue in the context of development and human rights. Akin to many societies around the globe, gender equality is yet to be achieved. This research will provide an introduction into the current legal stand of some Arab countries in terms of gender equality and women rights in the context of family law. It will look specifically into the recent family law in Kuwait and why many women consider it a positive step towards affirming their rights and their needs. Depending on comparative material from the area, the research argues that whilst some countries made efforts to promote women’s empowerment as a concept and practice throughout its policies, others have indeed some unique journeys that reflect organic and from within evolutions. Nonetheless, these efforts are yet to reflect a comprehensive structure that addresses women legal and political empowerment let alone social status. A contradiction in the realities of different Arab states is nothing new since the lack of comprehensive rights-based policy making in Arab countries has contributed to the disconnect between economic growth and development challenges.

Keywords: women empowerment, cultural challenges, gender equality, Islamic law, international standards, family law

Procedia PDF Downloads 179
21903 Magnetic Braking System of an Elevator in the Event of Sudden Breakage of the Hoisting Cable

Authors: Amita Singha

Abstract:

The project describes the scope of magnetic braking. The potential applications of the braking system can be a de-accelerating system to increase the safety of an elevator or any guided rail transportation system.

Keywords: boost and buck converter, electromagnet, elevator, ferromagnetic material, sensor, solenoid, timer

Procedia PDF Downloads 422
21902 The Impact of Constitutional and Legal Provisions on the Indian Women’s Status in 21st Century

Authors: Mamta Chandrashekhar

Abstract:

Women’s participation in mainstream political and social activity has important implications for the broader arena of governance in any country. This research work will highlights some of the key issues that concerned with the impact of constitutional & Legal provision on the Indian women Status in present century. The principle of gender equality is enshrined in the Indian Constitution in its Preamble, Fundamental Rights, Fundamental Duties and Directive Principles. The Constitution not only grants equality to women, but also empowers the State to adopt measures of positive discrimination in favour of women. In recent years, the empowerment of women has been recognized as the central issue in determining the status of women. The main objective of this research is to analyzed the status of Indian women and the existing wide gap between the goals enunciated in the Constitution, legislation, policies, plans, programmes, and related mechanisms on the one hand and the situational reality of the status of women in India, This work encourage and inspire to women empowerment, will be beneficial to build a well-organized ideal society through Gender Equality and Development & Peace in the 21st century.

Keywords: awareness, constitution, development, empowerment

Procedia PDF Downloads 491
21901 New Coordinate System for Countries with Big Territories

Authors: Mohammed Sabri Ali Akresh

Abstract:

The modern technologies and developments in computer and Global Positioning System (GPS) as well as Geographic Information System (GIS) and total station TS. This paper presents a new proposal for coordinates system by a harmonic equations “United projections”, which have five projections (Mercator, Lambert, Russell, Lagrange, and compound of projection) in one zone coordinate system width 14 degrees, also it has one degree for overlap between zones, as well as two standards parallels for zone from 10 S to 45 S. Also this paper presents two cases; first case is to compare distances between a new coordinate system and UTM, second case creating local coordinate system for the city of Sydney to measure the distances directly from rectangular coordinates using projection of Mercator, Lambert and UTM.

Keywords: harmonic equations, coordinate system, projections, algorithms, parallels

Procedia PDF Downloads 457
21900 A Study of Predicting Judgments on Causes of Online Privacy Invasions: Based on U.S Judicial Cases

Authors: Minjung Park, Sangmi Chai, Myoung Jun Lee

Abstract:

Since there are growing concerns on online privacy, enterprises could involve various personal privacy infringements cases resulting legal causations. For companies that are involving online business, it is important for them to pay extra attentions to protect users’ privacy. If firms can aware consequences from possible online privacy invasion cases, they can more actively prevent future online privacy infringements. This study attempts to predict the probability of ruling types caused by various invasion cases under U.S Personal Privacy Act. More specifically, this research explores online privacy invasion cases which was sentenced guilty to identify types of criminal punishments such as penalty, imprisonment, probation as well as compensation in civil cases. Based on the 853 U.S judicial cases ranged from January, 2000 to May, 2016, which related on data privacy, this research examines the relationship between personal information infringements cases and adjudications. Upon analysis results of 41,724 words extracted from 853 regal cases, this study examined online users’ privacy invasion cases to predict the probability of conviction for a firm as an offender in both of criminal and civil law. This research specifically examines that a cause of privacy infringements and a judgment type, whether it leads a civil or criminal liability, from U.S court. This study applies network text analysis (NTA) for data analysis, which is regarded as a useful method to discover embedded social trends within texts. According to our research results, certain online privacy infringement cases caused by online spamming and adware have a high possibility that firms are liable in the case. Our research results provide meaningful insights to academia as well as industry. First, our study is providing a new insight by applying Big Data analytics to legal cases so that it can predict the cause of invasions and legal consequences. Since there are few researches applying big data analytics in the domain of law, specifically in online privacy, this study suggests new area that future studies can explore. Secondly, this study reflects social influences, such as a development of privacy invasion technologies and changes of users’ level of awareness of online privacy on judicial cases analysis by adopting NTA method. Our research results indicate that firms need to improve technical and managerial systems to protect users’ online privacy to avoid negative legal consequences.

Keywords: network text analysis, online privacy invasions, personal information infringements, predicting judgements

Procedia PDF Downloads 211
21899 Various Advanced Statistical Analyses of Index Values Extracted from Outdoor Agricultural Workers Motion Data

Authors: Shinji Kawakura, Ryosuke Shibasaki

Abstract:

We have been grouping and developing various kinds of practical, promising sensing applied systems concerning agricultural advancement and technical tradition (guidance). These include advanced devices to secure real-time data related to worker motion, and we analyze by methods of various advanced statistics and human dynamics (e.g. primary component analysis, Ward system based cluster analysis, and mapping). What is more, we have been considering worker daily health and safety issues. Targeted fields are mainly common farms, meadows, and gardens. After then, we observed and discussed time-line style, changing data. And, we made some suggestions. The entire plan makes it possible to improve both the aforementioned applied systems and farms.

Keywords: advanced statistical analysis, wearable sensing system, tradition of skill, supporting for workers, detecting crisis

Procedia PDF Downloads 378
21898 Country Experience on Regulation of Traditional Medicine in Eritrea

Authors: Liya Abraham

Abstract:

Eritrea is located along the Red Sea, north of the Horn of Africa, between Djibouti and Sudan and has a population of about 3.2 million as of 2010. It has six administrative regions; Anseba, Debub, Debubawi K’eyih Bahri, Gash-Barka, Ma'akel, and Semenawi K’eyih Bahri. Eritrea has got its independence in 1991 after 30 years war of liberation. The country is blessed with various medicinal flora and fauna, and marine and terrestrial biodiversity. Traditional Medicine (TM) has been an integral part of the Eritrean culture for centuries. So far, more than 19 TM modalities have been recognized, and are broadly categorized as; herbal, procedure-based and spiritual. Despite the availability of modern medicine to the majority of the population, TM is still widely practiced. The rationale behind widespread use is accessibility, affordability and cultural acceptability. Hence, TM is of great contribution to the Eritrean health care system. As a matter of fact, harnessing the potential contribution of effective and safe TM in order to attain Universal Health Coverage (UHC) has been emphasized in the WHO TM strategy 2014-2023. The Eritrean TM, however, was operating without regulation and reliable scientific justification behind its safety and efficacy. Thus, the Ministry of Health (MoH), in recognition of the role of TM in primary healthcare and safeguard public health, established a regulatory body for TM so-called as Traditional Medicine Unit (TMU) in 2012. The mission of the unit is to ensure rational TM use through an integrated health service delivery system and contribute to the country’s economic and social development. The unit has established its national TM policy in 2017. The activities of the unit are guided by the National TM Advisory Committee (TMAC), responsible for the provision of technical assistance and advisory role. Moreover, the Legal Framework and Code of Ethics and Practice which provide a legal basis for the regulation of TM have also been drafted. In recognition of the importance of TM research and development, the unit launched a nationwide TM survey in 2017 and had surveyed two zones (Gash-Barka and Debub). The findings of the survey were subjected to a research dissemination workshop and publication in international journals. Furthermore, TM-related adverse events reporting tool (Green Form) aiming to guide regulatory interventions and researches have been established by the unit, and ever since reports are flowing. The unit has also been offering training to THPs, pharmacy students and health care professionals regarding TM and its regulatory activities. In addition, as part of the establishment of the national medicinal plants' database and herbal monograph, more than 329 and 30 medicinal plants, have been compiled respectively. In conclusion, TM is still widely accepted and practiced in Eritrea. The TMU ever since its establishment is endeavoring to ensure the safety and efficacy of the TM, and its integration in the mainstream health service delivery system.

Keywords: efficacy, regulation, safety, traditional medicine, traditional medicine unit, universal health coverage

Procedia PDF Downloads 159
21897 Incident Management System: An Essential Tool for Oil Spill Response

Authors: Ali Heyder Alatas, D. Xin, L. Nai Ming

Abstract:

An oil spill emergency can vary in size and complexity, subject to factors such as volume and characteristics of spilled oil, incident location, impacted sensitivities and resources required. A major incident typically involves numerous stakeholders; these include the responsible party, response organisations, government authorities across multiple jurisdictions, local communities, and a spectrum of technical experts. An incident management team will encounter numerous challenges. Factors such as limited access to location, adverse weather, poor communication, and lack of pre-identified resources can impede a response; delays caused by an inefficient response can exacerbate impacts caused to the wider environment, socio-economic and cultural resources. It is essential that all parties work based on defined roles, responsibilities and authority, and ensure the availability of sufficient resources. To promote steadfast coordination and overcome the challenges highlighted, an Incident Management System (IMS) offers an essential tool for oil spill response. It provides clarity in command and control, improves communication and coordination, facilitates the cooperation between stakeholders, and integrates resources committed. Following the preceding discussion, a comprehensive review of existing literature serves to illustrate the application of IMS in oil spill response to overcome common challenges faced in a major-scaled incident. With a primary audience comprising practitioners in mind, this study will discuss key principles of incident management which enables an effective response, along with pitfalls and challenges, particularly, the tension between government and industry; case studies will be used to frame learning and issues consolidated from previous research, and provide the context to link practice with theory. It will also feature the industry approach to incident management which was further crystallized as part of a review by the Joint Industry Project (JIP) established in the wake of the Macondo well control incident. The authors posit that a common IMS which can be adopted across the industry not only enhances response capacity towards a major oil spill incident but is essential to the global preparedness effort.

Keywords: command and control, incident management system, oil spill response, response organisation

Procedia PDF Downloads 138
21896 Coordinated Community Response to Intimate Partner Violence on College Campuses

Authors: Robert D. Hanser, Gina M. Hanser

Abstract:

This paper provides an overview of Coordinated Community Response Teams (CCRT) to Intimate Partner Violence (IPV). The CCRT, as a partnership and collaborative effort between multiple agencies is highlighted. This paper is a legal analysis that showcases new legislation and legal requirements in the United States for investigating, processing, and reporting to acts of victimization have transformed the role of the university’s CCRT on campus, making its mission all the more important, both internal and external to the campus. As a specific example, discussion of the CCRT in Northeast Louisiana at the University of Louisiana at Monroe is provided as an example of involvement in this initiative, where federal grant funding has allowed a micro version of the region’s CCRT to be implemented on that campus. Simultaneously, university personnel also work with external agencies throughout the community in intimate partner violence response. Amidst this, the result is a genuine partnership between practitioners and researchers who work together to provide public awareness, prevention, first-responder, and intervention services in a comprehensive manner throughout Northeast Louisiana.

Keywords: interperaonal violence, sexual assault, dating violence, campus violence

Procedia PDF Downloads 293
21895 Knowledge Based Automated Software Engineering Platform Used for the Development of Bulgarian E-Customs

Authors: Ivan Stanev, Maria Koleva

Abstract:

Described are challenges to the Bulgarian e-Customs (BeC) related to low level of interoperability and standardization, inefficient use of available infrastructure, lack of centralized identification and authorization, extremely low level of software process automation, and insufficient quality of data stored in official registers. The technical requirements for BeC are prepared with a focus on domain independent common platform, specialized customs and excise components, high scalability, flexibility, and reusability. The Knowledge Based Automated Software Engineering (KBASE) Common Platform for Automated Programming (CPAP) is selected as an instrument covering BeC requirements for standardization, programming automation, knowledge interpretation and cloud computing. BeC stage 3 results are presented and analyzed. BeC.S3 development trends are identified.

Keywords: service oriented architecture, cloud computing, knowledge based automated software engineering, common platform for automated programming, e-customs

Procedia PDF Downloads 355
21894 Smart Side View Mirror Camera for Real Time System

Authors: Nunziata Ivana Guarneri, Arcangelo Bruna, Giuseppe Spampinato, Antonio Buemi

Abstract:

In the last decade, automotive companies have invested a lot in terms of innovation about many aspects regarding the automatic driver assistance systems. One innovation regards the usage of a smart camera placed on the car’s side mirror for monitoring the back and lateral road situation. A common road scenario is the overtaking of the preceding car and, in this case, a brief distraction or a loss of concentration can lead the driver to undertake this action, even if there is an already overtaking vehicle, leading to serious accidents. A valid support for a secure drive can be a smart camera system, which is able to automatically analyze the road scenario and consequentially to warn the driver when another vehicle is overtaking. This paper describes a method for monitoring the side view of a vehicle by using camera optical flow motion vectors. The proposed solution detects the presence of incoming vehicles, assesses their distance from the host car, and warns the driver through different levels of alert according to the estimated distance. Due to the low complexity and computational cost, the proposed system ensures real time performances.

Keywords: camera calibration, ego-motion, Kalman filters, object tracking, real time systems

Procedia PDF Downloads 211
21893 Domestic Violence Against Women (With Special Reference to India): A Human Rights Issue

Authors: N. B. Chandrakala

Abstract:

Domestic violence is one of the most under-reported crimes. Problem with domestic violence is that it is not even considered as abuse in many parts of the world especially certain parts of Asia, Africa and Middle East. It is viewed as “doing the needful”. Domestic violence could be in form of emotional harassment, physical injury or psychological abuse perpetrated by one of the family members to another. It is a worldwide phenomenon mainly targeting women. The acts of violence have terrible negative impact on women. It is also an infringement of women’s rights and can be safely termed as human rights abuse. In cases pertaining to domestic violence, male adults often misuses his authority and power to control another using physical or psychological means. Violence and other forms of abuse are common in domestic violence. Sexual assaults, molestation and battering are common in these cases. Domestic violence is a human rights issue and a serious deterrent to development. Domestic violence could also take place in subtle forms like making the person feel worthless or not giving the victims any personal space or freedom. The problematic aspect is cases of domestic violence are very rarely reported. The majority of the victims are women but children are also made to suffer silently. They are abused and neglected. Their innocent minds are adversely affected with the incidents of domestic violence. According to a report by World Health Organization (WHO), sexual trafficking, female feticide, dowry death, public humiliation and physical torture are some of the most common forms of domestic violence against Indian women. Such acts belie our growth and claim as an economic superpower. It is ironic that we claim to be one of the most rapidly advancing countries in the world and yet we have done hardly anything of note against social hazards like domestic violence. Laws are not that stringent when it comes to reporting acts of domestic violence. Even if the report is filed it turns out to be a long drawn process and not every victim has that much resource to fight till the end. It is also a social taboo to make your family matters public. The big challenge in front now is to enforce it in true sense. Steps that are actually needed; tough laws against domestic violence, speedy execution and change in the mindset of society only then we can expect to have some improvement in such inhuman cases. An effective response to violence must be multi-sectoral; addressing the immediate practical needs of women experiencing abuse; providing long-term follow up and assistance; and focusing on changing those cultural norms, attitudes and legal provisions that promote the acceptance of and even encourage violence against women, and undermine women's enjoyment of their full human rights and freedoms. Hence the responses to the problem must be based on integrated approach. The effectiveness of measures and initiatives will depend on coherence and coordination associated with their design and implementation.

Keywords: domestic violence, human rights, sexual assaults, World Health Organization

Procedia PDF Downloads 529
21892 Human Rights as Part of the Core Values System of International Organisations: A Comparative Study

Authors: Ayyoub Jamali, Jennie Edlund, Alena Kozlová

Abstract:

This paper evaluates the monitoring, prevention, and enforcing mechanisms of the core values of international organisations (IOs) in a comparative human rights perspective. The IOs in focus are the European Union, the Council of Europe, the African Union, and the Organization of American States. The paper will take the founding treaties of these IOs and their relevant protocols as a starting point to identify the values and the mechanisms used for their implementation. It will explore the scope of violations, the procedures in place and evaluate what type of response to those breaches seems to work best in terms of achieving its declared objectives. The study will identify and compare the weaknesses and strengths of each mechanism used by the IOs and recognize common challenges and means, thereby drawing inter-organizational comparisons. Consequently, the findings of this paper can be used among the IOs to improve their system and thus enhance their effectiveness.

Keywords: international organizations, core values, human rights, enforcement mechanism, compliance

Procedia PDF Downloads 163
21891 Prevention of Road Accidents by Computerized Drowsiness Detection System

Authors: Ujjal Chattaraj, P. C. Dasbebartta, S. Bhuyan

Abstract:

This paper aims to propose a method to detect the action of the driver’s eyes, using the concept of face detection. There are three major key contributing methods which can rapidly process the framework of the facial image and hence produce results which further can program the reactions of the vehicles as pre-programmed for the traffic safety. This paper compares and analyses the methods on the basis of their reaction time and their ability to deal with fluctuating images of the driver. The program used in this study is simple and efficient, built using the AdaBoost learning algorithm. Through this program, the system would be able to discard background regions and focus on the face-like regions. The results are analyzed on a common computer which makes it feasible for the end users. The application domain of this experiment is quite wide, such as detection of drowsiness or influence of alcohols in drivers or detection for the case of identification.

Keywords: AdaBoost learning algorithm, face detection, framework, traffic safety

Procedia PDF Downloads 143
21890 Big Brain: A Single Database System for a Federated Data Warehouse Architecture

Authors: X. Gumara Rigol, I. Martínez de Apellaniz Anzuola, A. Garcia Serrano, A. Franzi Cros, O. Vidal Calbet, A. Al Maruf

Abstract:

Traditional federated architectures for data warehousing work well when corporations have existing regional data warehouses and there is a need to aggregate data at a global level. Schibsted Media Group has been maturing from a decentralised organisation into a more globalised one and needed to build both some of the regional data warehouses for some brands at the same time as the global one. In this paper, we present the architectural alternatives studied and why a custom federated approach was the notable recommendation to go further with the implementation. Although the data warehouses are logically federated, the implementation uses a single database system which presented many advantages like: cost reduction and improved data access to global users allowing consumers of the data to have a common data model for detailed analysis across different geographies and a flexible layer for local specific needs in the same place.

Keywords: data integration, data warehousing, federated architecture, Online Analytical Processing (OLAP)

Procedia PDF Downloads 221
21889 Intellectual Property Rights and Health Rights: A Feasible Reform Proposal to Facilitate Access to Drugs in Developing Countries

Authors: M. G. Cattaneo

Abstract:

The non-effectiveness of certain codified human rights is particularly apparent with reference to the lack of access to essential drugs in developing countries, which represents a breach of the human right to receive adequate health assistance. This paper underlines the conflict and the legal contradictions between human rights, namely health rights, international Intellectual Property Rights, in particular patent law, as well as international trade law. The paper discusses the crucial links between R&D costs for innovation, patents and new medical drugs, with the goal of reformulating the hierarchies of priorities and of interests at stake in the international intellectual property (IP) law system. Different from what happens today, International patent law should be a legal instrument apt at rebalancing an axiological asymmetry between the (conflicting) needs at stake The core argument in the paper is the proposal of an alternative pathway, namely a feasible proposal for a patent law reform. IP laws tend to balance the benefits deriving from innovation with the costs of the provided monopoly, but since developing countries and industrialized countries are in completely different political and economic situations, it is necessary to (re)modulate such exchange according to the different needs. Based on this critical analysis, the paper puts forward a proposal, called Trading Time for Space (TTS), whereby a longer time for patent exclusive life in western countries (Time) is offered to the patent holder company, in exchange for the latter selling the medical drug at cost price in developing countries (Space). Accordingly, pharmaceutical companies should sell drugs in developing countries at the cost price, or alternatively grant a free license for the sale in such countries, without any royalties or fees. However, such social service shall be duly compensated. Therefore, the consideration for such a service shall be an extension of the temporal duration of the patent’s exclusive in the country of origin that will compensate the reduced profits caused by the supply at the price cost in developing countries.

Keywords: global health, global justice, patent law reform, access to drugs

Procedia PDF Downloads 236
21888 Proposal for a Generic Context Meta-Model

Authors: Jaouadi Imen, Ben Djemaa Raoudha, Ben Abdallah Hanene

Abstract:

The access to relevant information that is adapted to users’ needs, preferences and environment is a challenge in many applications running. That causes an appearance of context-aware systems. To facilitate the development of this class of applications, it is necessary that these applications share a common context meta-model. In this article, we will present our context meta-model that is defined using the OMG Meta Object facility (MOF). This meta-model is based on the analysis and synthesis of context concepts proposed in literature.

Keywords: context, meta-model, MOF, awareness system

Procedia PDF Downloads 542
21887 Software Defined Storage: Object Storage over Hadoop Platform

Authors: Amritesh Srivastava, Gaurav Sharma

Abstract:

The purpose of this project is to develop an open source object storage system that is highly durable, scalable and reliable. There are two representative systems in cloud computing: Google and Amazon. Their storage systems for Google GFS and Amazon S3 provide high reliability, performance and stability. Our proposed system is highly inspired from Amazon S3. We are using Hadoop Distributed File System (HDFS) Java API to implement our system. We propose the architecture of object storage system based on Hadoop. We discuss the requirements of our system, what we expect from our system and what problems we may encounter. We also give detailed design proposal along with the abstract source code to implement it. The final goal of the system is to provide REST based access to our object storage system that exists on top of HDFS.

Keywords: Hadoop, HBase, object storage, REST

Procedia PDF Downloads 315
21886 Artificial intelligence and Law

Authors: Mehrnoosh Abouzari, Shahrokh Shahraei

Abstract:

With the development of artificial intelligence in the present age, intelligent machines and systems have proven their actual and potential capabilities and are mindful of increasing their presence in various fields of human life in the fields of industry, financial transactions, marketing, manufacturing, service affairs, politics, economics and various branches of the humanities .Therefore, despite the conservatism and prudence of law enforcement, the traces of artificial intelligence can be seen in various areas of law. Including judicial robotics capability estimation, intelligent judicial decision making system, intelligent defender and attorney strategy adjustment, dissemination and regulation of different and scattered laws in each case to achieve judicial coherence and reduce opinion, reduce prolonged hearing and discontent compared to the current legal system with designing rule-based systems, case-based, knowledge-based systems, etc. are efforts to apply AI in law. In this article, we will identify the ways in which AI is applied in its laws and regulations, identify the dominant concerns in this area and outline the relationship between these two areas in order to answer the question of how artificial intelligence can be used in different areas of law and what the implications of this application will be. The authors believe that the use of artificial intelligence in the three areas of legislative, judiciary and executive power can be very effective in governments' decisions and smart governance, and helping to reach smart communities across human and geographical boundaries that humanity's long-held dream of achieving is a global village free of violence and personalization and human error. Therefore, in this article, we are going to analyze the dimensions of how to use artificial intelligence in the three legislative, judicial and executive branches of government in order to realize its application.

Keywords: artificial intelligence, law, intelligent system, judge

Procedia PDF Downloads 97
21885 Combining Instance-Based and Reasoning-Based Approaches for Ontology Matching

Authors: Abderrahmane Khiat, Moussa Benaissa

Abstract:

Due to the increasing number of sources of information available on the web and their distribution and heterogeneity, ontology alignment became a very important and inevitable problem to ensure semantic interoperability. Instance-based ontology alignment is based on the comparison of the extensions of concepts; and represents a very promising technique to find semantic correspondences between entities of different ontologies. In practice, two situations may arise: ontologies that share many common instances and ontologies that share few or do not share common instances. In this paper, we describe an approach to manage the latter case. This approach exploits the reasoning on ontologies in order to create a corpus of common instances. We show that it is theoretically powerful because it is based on description logics and very useful in practice. We present the experimental results obtained by running our approach on ontologies of OAEI 2012 benchmark test. The results show the performance of our approach.

Keywords: description logic inference, instance-based ontology alignment, semantic interoperability, semantic web

Procedia PDF Downloads 426