Search results for: data protection laws
26623 The Essence and Attribution of Intellectual Property Rights Generated in the Digitization of Intangible Cultural Heritage
Authors: Jiarong Zhang
Abstract:
Digitizing intangible cultural heritage is a complex and comprehensive process from which sorts of intellectual property rights may be generated. Digitizing may be a repacking process of cultural heritage, which creates copyrights; recording folk songs and indigenous performances can create 'related rights'. At the same time, digitizing intangible cultural heritage may infringe the intellectual property rights of others unintentionally. Recording religious rituals of indigenous communities without authorization can violate the moral right of the ceremony participants of the community; making digital copies of rock paintings may infringe the right of reproduction. In addition, several parties are involved in the digitization process: indigenous peoples, museums, and archives can be holders of cultural heritage; companies and research institutions can be technology providers; internet platforms can be promoters and sellers; the public and groups above can be beneficiaries. When diverse intellectual property rights versus various parties, problems and disputes can arise easily. What are the types of intellectual property rights generated in the digitization process? What is the essence of these rights? Who should these rights belong to? How to use intellectual property to protect the digitalization of cultural heritage? How to avoid infringing on the intellectual property rights of others? While the digitization has been regarded as an effective approach to preserve intangible cultural heritage, related intellectual property issues have not received the attention and full discussion. Thus, parties involving in the digitization process may face intellectual property infringement lawsuits. The article will explore those problems from the intersection perspective of intellectual property law and cultural heritage. From a comparative approach, the paper will analysis related legal documents and cases, and shed some lights of those questions listed. The findings show, although there are no intellectual property laws targeting the cultural heritage in most countries, the involved stakeholders can seek protection from existing intellectual property rights following the suggestions of the article. The research will contribute to the digitization of intangible cultural heritage from a legal and policy aspect.Keywords: copyright, digitization, intangible cultural heritage, intellectual property, Internet platforms
Procedia PDF Downloads 14426622 Environmental Effect of Empty Nest Households in Germany: An Empirical Approach
Authors: Dominik Kowitzke
Abstract:
Housing constructions have direct and indirect environmental impacts especially caused by soil sealing and gray energy consumption related to the use of construction materials. Accordingly, the German government introduced regulations limiting additional annual soil sealing. At the same time, in many regions like metropolitan areas the demand for further housing is high and of current concern in the media and politics. It is argued that meeting this demand by making better use of the existing housing supply is more sustainable than the construction of new housing units. In this context, targeting the phenomenon of so-called over the housing of empty nest households seems worthwhile to investigate for its potential to free living space and thus, reduce the need for new housing constructions and related environmental harm. Over housing occurs if no space adjustment takes place in household lifecycle stages when children move out from home and the space formerly created for the offspring is from then on under-utilized. Although in some cases the housing space consumption might actually meet households’ equilibrium preferences, frequently space-wise adjustments to the living situation doesn’t take place due to transaction or information costs, habit formation, or government intervention leading to increasing costs of relocations like real estate transfer taxes or tenant protection laws keeping tenure rents below the market price. Moreover, many detached houses are not long-term designed in a way that freed up space could be rent out. Findings of this research based on socio-economic survey data, indeed, show a significant difference between the living space of empty nest and a comparison group of households which never had children. The approach used to estimate the average difference in living space is a linear regression model regressing the response variable living space on a two-dimensional categorical variable distinguishing the two groups of household types and further controls. This difference is assumed to be the under-utilized space and is extrapolated to the total amount of empty nests in the population. Supporting this result, it is found that households that move, despite market frictions impairing the relocation, after children left their home tend to decrease the living space. In the next step, only for areas with tight housing markets in Germany and high construction activity, the total under-utilized space in empty nests is estimated. Under the assumption of full substitutability of housing space in empty nests and space in new dwellings in these locations, it is argued that in a perfect market with empty nest households consuming their equilibrium demand quantity of housing space, dwelling constructions in the amount of the excess consumption of living space could be saved. This, on the other hand, would prevent environmental harm quantified in carbon dioxide equivalence units related to average constructions of detached or multi-family houses. This study would thus provide information on the amount of under-utilized space inside dwellings which is missing in public data and further estimates the external effect of over housing in environmental terms.Keywords: empty nests, environment, Germany, households, over housing
Procedia PDF Downloads 17126621 A Hybrid Watermarking Model Based on Frequency of Occurrence
Authors: Hamza A. A. Al-Sewadi, Adnan H. M. Al-Helali, Samaa A. K. Khamis
Abstract:
Ownership proofs of multimedia such as text, image, audio or video files can be achieved by the burial of watermark is them. It is achieved by introducing modifications into these files that are imperceptible to the human senses but easily recoverable by a computer program. These modifications would be in the time domain or frequency domain or both. This paper presents a procedure for watermarking by mixing amplitude modulation with frequency transformation histogram; namely a specific value is used to modulate the intensity component Y of the YIQ components of the carrier image. This scheme is referred to as histogram embedding technique (HET). Results comparison with those of other techniques such as discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) have shown an enhance efficiency in terms of ease and performance. It has manifested a good degree of robustness against various environment effects such as resizing, rotation and different kinds of noise. This method would prove very useful technique for copyright protection and ownership judgment.Keywords: authentication, copyright protection, information hiding, ownership, watermarking
Procedia PDF Downloads 56526620 EIS Study of the Corrosion Behavior of an Organic Coating Applied on Algerian Oil Tanker in Sea Water
Authors: Nadia Hammouda, Kamel Belmokre
Abstract:
Organic coatings are widely employed in the corrosion protection of most metal surfaces, particularly steel. They provide a barrier against corrosive species present in the environment, due to their high resistance to oxygen, water and ions transport. This study focuses on the evaluation of corrosion protection performance of epoxy paint on the carbon steel surface in sea water by Electrochemical Impedance Spectroscopy (EIS). The electrochemical behavior of painted surface was estimated by EIS parameters that contained paint film resistance, paint film capacitance and double layer capacitance. On the basis of calculation using EIS spectrums it was observed that pore resistance (Rpore) decreased with the appearance of doubled layer capacitance (Cdl) due to the electrolyte penetration through the film. This was further confirmed by the decrease of diffusion resistance (Rd) which was also the indicator of the deterioration of paint film protectiveness.Keywords: epoxy paints, carbon steel, electrochemical impedance spectroscopy, corrosion mechanisms, sea water
Procedia PDF Downloads 37426619 Characterization of Complex Electromagnetic Environment Created by Multiple Sources of Electromagnetic Radiation
Authors: Clement Temaneh-Nyah, Josiah Makiche, Josephine Nujoma
Abstract:
This paper considers the characterisation of a complex electromagnetic environment due to multiple sources of electromagnetic radiation as a five-dimensional surface which can be described by a set of several surface sections including: instant EM field intensity distribution maps at a given frequency and altitude, instantaneous spectrum at a given location in space and the time evolution of the electromagnetic field spectrum at a given point in space. This characterization if done over time can enable the exposure levels of Radio Frequency Radiation at every point in the analysis area to be determined and results interpreted based on comparison of the determined RFR exposure level with the safe guidelines for general public exposure given by recognised body such as the International commission on non-ionising radiation protection (ICNIRP), Institute of Electrical and Electronic Engineers (IEEE), the National Radiation Protection Authority (NRPA).Keywords: complex electromagnetic environment, electric field strength, mathematical models, multiple sources
Procedia PDF Downloads 36826618 Means of Securing Graves in the Egyptian Kingdom Era
Authors: Mohamed Saeed Ahmed Salman
Abstract:
This research aims to study the means of securing graves in the Egyptian kingdom era, and revolves around many basic ideas used by the ancient Egyptian to protect his graves from thieves, which included architectural characteristics, which gave it importance only others. The most important of which was the choice of the place of the grave, which chose a kohl place in the desert to protect the graves, which is the valley of kings, and whether the choice of that place had an impact in protecting the grave or not, in addition to other elements followed in the architectural planning, which was in the valley of kings. The multiplicity of the tomb, the construction of the well chamber to deceive the thieves by the end of the graves suddenly, the construction of the wells of the tombs, which contained the burial chamber at the bottom of the main well and the effect of all these factors on the graves, and this shows the importance of the graves to the ancient Egyptian and his belief in resurrection and immortality. The Egyptian resorted to the elements of protection and was a religious worker by The protector gods and special texts to protect the deceased from any danger to protect the tomb. As for the human factor of securing the tomb through human guards (police) and security teams based on the guard and the words indicating the protection and the guard teams and the teams of the majai. The most important developments that arose on the cemetery from Tamit entrance, corridors, chambers, burial chamber and coffin, and the use of sand to close the well after from one cemetery to another and from time to time where it was built in the late period inside the temple campus to be under the attention of the priests and their protection, as the study dealt with an analytical study For the means of securing graves in the Egyptian kingdom period.Keywords: Egyptian kingdom, ancient Egyptian, securing graves, Means of securing graves, Egypt, archaeology
Procedia PDF Downloads 7226617 Comparing Literary Publications about Corruption in South Africa to the Legal Position
Authors: Natasha Venter
Abstract:
Recent publications, including Truth to Power by André de Ruyter, Gangster State by Pieter-Louis Myburgh, and Enemy of the People by Pieter du Toit and Adriaan Basson, expose alleged corrupt acts by high-ranking members of State, as well as those in charge of State-owned entities. These literary contributions have gripped the attention of a nation plagued by corruption scandals and the alleged misappropriation of state funds on an almost daily basis. The books, however, leave the populace with the burning question of why “nothing happens” to these individuals who are so directly implicated in the literature. The process followed by the State in the largest successful prosecution of a corrupt state official, Jackie Selebi, sheds some light as to how such high-ranking persons might be brought to book. The Supreme Court of Appeal’s definition of corruption and the interpretation of the facts (as presented by the State prosecutors) by the court is also valuable. Furthermore, some insight into the laws that criminalise corruption in South Africa, as well as applicable international instruments, is necessary. South Africa is ranked as the 70th most corrupt country out of 180 countries by Transparency International’s 2021 Corruption Perceptions Index. This is worrisome as South Africa is a signatory of the United Nations Convention Against Corruption (2004) and, as such, has certain international obligations to fulfil. However, if the political will to prosecute corrupt officials in South Africa exists, there are laws and instruments available to punish these individuals. This would not only vindicate the authors of literature about corruption in the country but also restore the hope of South Africans that, ultimately, crime does not pay.Keywords: corruption, eskom, state capture, government, literature, united nations, law, legal, Jackie selebi, supreme court of appeal
Procedia PDF Downloads 9926616 Application of Electrochemical Impedance Spectroscopy to Monitor the Steel/Soil Interface During Cathodic Protection of Steel in Simulated Soil Solution
Authors: Mandlenkosi George Robert Mahlobo, Tumelo Seadira, Major Melusi Mabuza, Peter Apata Olubambi
Abstract:
Cathodic protection (CP) has been widely considered a suitable technique for mitigating corrosion of buried metal structures. Plenty of efforts have been made in developing techniques, in particular non-destructive techniques, for monitoring and quantifying the effectiveness of CP to ensure the sustainability and performance of buried steel structures. The aim of this study was to investigate the evolution of the electrochemical processes at the steel/soil interface during the application of CP on steel in simulated soil. Carbon steel was subjected to electrochemical tests with NS4 solution used as simulated soil conditions for 4 days before applying CP for a further 11 days. A previously modified non-destructive voltammetry technique was applied before and after the application of CP to measure the corrosion rate. Electrochemical impedance spectroscopy (EIS), in combination with mathematical modeling through equivalent electric circuits, was applied to determine the electrochemical behavior at the steel/soil interface. The measured corrosion rate was found to have decreased from 410 µm/yr to 8 µm/yr between days 5 and 14 because of the applied CP. Equivalent electrical circuits were successfully constructed and used to adequately model the EIS results. The modeling of the obtained EIS results revealed the formation of corrosion products via a mixed activation-diffusion mechanism during the first 4 days, while the activation mechanism prevailed in the presence of CP, resulting in a protective film. The x-ray diffraction analysis confirmed the presence of corrosion products and the predominant protective film corresponding to the calcareous deposit.Keywords: carbon steel, cathodic protection, NS4 solution, voltammetry, EIS
Procedia PDF Downloads 6426615 Industrial and Environmental Safety in the Integrated Security Policy of the Industry: A Corporation and an Enterprise
Authors: Vladimir A. Grachev
Abstract:
Today, in the context of rapidly developing technosphere and hourly emerging new technologies, the industrial and environmental safety issue is ever more pressing. The article is devoted to the relationship of social, environmental, and industrial policies with industrial safety, occupational health and safety, environmental safety, and environmental protection. The author assesses the up-to-day situation through system analysis and on the basis of the existing practices. A complex system of the policies implementation without "gaps" and missing links ensures preservation of human lives, health and a favorable living environment. The author demonstrates that absence of an "environmental safety" high-priority link can lead to a significant loss of human lives and health and the global changes in the environment. The role of implementing the environmental policy of enterprises and organizations, and of economic sectors in the implementation of national environmental policy is shown. It was established that the system for implementing environmental policy should be based on a system analysis.Keywords: environmental protection, environmental safety, industrial safety, occupational health and safety
Procedia PDF Downloads 21526614 Innovative Design Considerations for Adaptive Spacecraft
Authors: K. Parandhama Gowd
Abstract:
Space technologies have changed the way we live in the present day society and manage many aspects of our daily affairs through Remote sensing, Navigation & Communications. Further, defense and military usage of spacecraft has increased tremendously along with civilian purposes. The number of satellites deployed in space in Low Earth Orbit (LEO), Medium Earth Orbit (MEO), and the Geostationary Orbit (GEO) has gone up. The dependency on remote sensing and operational capabilities are most invariably to be exploited more and more in future. Every country is acquiring spacecraft in one way or other for their daily needs, and spacecraft numbers are likely to increase significantly and create spacecraft traffic problems. The aim of this research paper is to propose innovative design concepts for adaptive spacecraft. The main idea here is to improve existing design methods of spacecraft design and development to further improve upon design considerations for futuristic adaptive spacecraft with inbuilt features for automatic adaptability and self-protection. In other words, the innovative design considerations proposed here are to have future spacecraft with self-organizing capabilities for orbital control and protection from anti-satellite weapons (ASAT). Here, an attempt is made to propose design and develop futuristic spacecraft for 2030 and beyond due to tremendous advancements in VVLSI, miniaturization, and nano antenna array technologies, including nano technologies are expected.Keywords: satellites, low earth orbit (LEO), medium earth orbit (MEO), geostationary earth orbit (GEO), self-organizing control system, anti-satellite weapons (ASAT), orbital control, radar warning receiver, missile warning receiver, laser warning receiver, attitude and orbit control systems (AOCS), command and data handling (CDH)
Procedia PDF Downloads 29626613 Means of Securing Graves in the Egyptian Kingdom Era
Authors: Mohamed Ahmed Madkour, Haitham Magdy Hamad
Abstract:
This research aims to study the means of securing graves in the Egyptian kingdom era, and revolves around many basic ideas used by the ancient Egyptian to protect his graves from thieves, which included architectural characteristics, which gave it importance only others. The most important of which was the choice of the place of the grave, which chose a kohl place in the desert to protect the graves, which is the valley of kings, and whether the choice of that place had an impact in protecting the grave or not, in addition to other elements followed in the architectural planning, which was in the valley of kings. The multiplicity of the tomb, the construction of the well chamber to deceive the thieves by the end of the graves suddenly, the construction of the wells of the tombs, which contained the burial chamber at the bottom of the main well and the effect of all these factors on the graves, and this shows the importance of the graves to the ancient Egyptian and his belief in resurrection and immortality. The Egyptian resorted to the elements of protection and was a religious worker by The protector gods and special texts to protect the deceased from any danger to protect the tomb. As for the human factor of securing the tomb through human guards (police) and security teams based on the guard and the words indicating the protection and the guard teams and the teams of the majai. The most important developments that arose on the cemetery from Tamit entrance, corridors, chambers, burial chamber and coffin, and the use of sand to close the well after from one cemetery to another and from time to time where it was built in the late period inside the temple campus to be under the attention of the priests and their protection, as the study dealt with an analytical study For the means of securing graves in the Egyptian kingdom period.Keywords: archaeology, Egyptian kingdom era, graves, tombs, ancient Egyptian
Procedia PDF Downloads 7126612 Frequency of Occurrence Hybrid Watermarking Scheme
Authors: Hamza A. Ali, Adnan H. M. Al-Helali
Abstract:
Generally, a watermark is information that identifies the ownership of multimedia (text, image, audio or video files). It is achieved by introducing modifications into these files that are imperceptible to the human senses but easily recoverable by a computer program. These modifications are done according to a secret key in a descriptive model that would be either in the time domain or frequency domain or both. This paper presents a procedure for watermarking by mixing amplitude modulation with frequency transformation histogram; namely a specific value is used to modulate the intensity component Y of the YIQ components of the carrier image. This scheme is referred to as histogram embedding technique (HET). Results comparison with those of other techniques such as discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) have shown an enhance efficiency in terms of ease and performance. It has manifested a good degree of robustness against various environment effects such as resizing, rotation and different kinds of noise. This method would prove very useful technique for copyright protection and ownership judgment.Keywords: watermarking, ownership, copyright protection, steganography, information hiding, authentication
Procedia PDF Downloads 36826611 Study on the Effects of Grassroots Characteristics on Reinforced Soil Performance by Direct Shear Test
Authors: Zhanbo Cheng, Xueyu Geng
Abstract:
Vegetation slope protection technique is economic, aesthetic and practical. Herbs are widely used in practice because of rapid growth, strong erosion resistance, obvious slope protection and simple method, in which the root system of grass plays a very important role. In this paper, through changing the variables value of grassroots quantity, grassroots diameter, grassroots length and grassroots reinforce layers, the direct shear tests were carried out to discuss the change of shear strength indexes of grassroots reinforced soil under different reinforce situations, and analyse the effects of grassroots characteristics on reinforced soil performance. The laboratory test results show that: (1) in the certain number of grassroots diameter, grassroots length and grassroots reinforce layers, the value of shear strength, and cohesion first increase and then reduce with the increasing of grassroots quantity; (2) in the certain number of grassroots quantity, grassroots length and grassroots reinforce layers, the value of shear strength and cohesion rise with the increasing of grassroots diameter; (3) in the certain number of grassroots diameter, and grassroots reinforce layers, the value of shear strength and cohesion raise with the increasing of grassroots length in a certain range of grassroots quantity, while the value of shear strength and cohesion first rise and then decline with the increasing of grassroots length when the grassroots quantity reaches a certain value; (4) in the certain number of grassroots quantity, grassroots diameter, and grassroots length, the value of shear strength and cohesion first climb and then decline with the increasing of grassroots reinforced layers; (5) the change of internal friction angle is small in different parameters of grassroots. The research results are of importance for understanding the mechanism of vegetation protection for slopes and determining the parameters of grass planting.Keywords: direct shear test, reinforced soil, grassroots characteristics, shear strength indexes
Procedia PDF Downloads 17826610 Optimized and Secured Digital Watermarking Using Fuzzy Entropy, Bezier Curve and Visual Cryptography
Authors: R. Rama Kishore, Sunesh
Abstract:
Recent development in the usage of internet for different purposes creates a great threat for the copyright protection of the digital images. Digital watermarking can be used to address the problem. This paper presents detailed review of the different watermarking techniques, latest trends in the field of secured, robust and imperceptible watermarking. It also discusses the different optimization techniques used in the field of watermarking in order to improve the robustness and imperceptibility of the method. Different measures are discussed to evaluate the performance of the watermarking algorithm. At the end, this paper proposes a watermarking algorithm using (2, 2) share visual cryptography and Bezier curve based algorithm to improve the security of the watermark. The proposed method uses fractional transformation to improve the robustness of the copyright protection of the method. The algorithm is optimized using fuzzy entropy for better results.Keywords: digital watermarking, fractional transform, visual cryptography, Bezier curve, fuzzy entropy
Procedia PDF Downloads 36526609 Crossing Borders: A Case Study on the Entry and Asylum of Sirius Refugees in Turkey
Authors: Stephanie M. De Oliveira
Abstract:
For a long time, migrations are characterized as a difficult problem to solve. Various phenomena throughout human history caused personnel migrations, whether by the free will of migrants or not. Nowadays, governments that seek to give these people protection and dignity, either to asylum or to build a new life in a different country, make refugee protection. At present, a large amount of people, have been crossing their country's borders by land, air or sea, becoming refugees and seeking a new life away from fear, threat or violence they suffered in their country of origin. It is known that some countries have already instituted rights and rules for refugees who wish to become citizens in the country to which they immigrated, even though this is not what happens in most cases. The article will be based on research made with UN Refugee Agency (UNHCR) material as well as will analyze the interaction of the Turkish government with the European Union. Since Turkey is not part of the Union, it will be understood how the interaction was made, as well as the search for consensus, and not only humanitarian but also financial aid. The treatment of refugees and the defense of human rights within the country will also be considered.Keywords: refugees, Turkey, asylum seekers, United Nations
Procedia PDF Downloads 36826608 Investigation of Online Child Sexual Abuse: An Account of Covert Police Operations Across the Globe
Authors: Shivalaxmi Arumugham
Abstract:
Child sexual abuse (CSA) has taken several forms, particularly with the advent of internet technologies that provide pedophiles access to their targets anonymously at an affordable rate. To combat CSA which has far-reaching consequences on the physical and psychological health of the victims, a special act, the Protection of Children from Sexual Offences (POCSO) Act, was formulated amongst the existing laws. With its latest amendment criminalizing various online activities about child pornography also known as child sexual abuse materials in 2019, tremendous pressure is speculated on law enforcement to identify offenders online. Effective investigations of CSA cases help in not only to detect perpetrators but also in preventing the re-victimization of children. Understanding the vulnerability of the child population and that the offenders continue to develop stealthier strategies to operate, it is high time that traditional investigation, where the focus is on apprehending and prosecuting the offender, must make a paradigm shift to proactively investigate to prevent victimization at the first place. One of the proactive policing techniques involves understanding the psychology of the offenders and children and operating undercover to catch the criminals before a real child is victimized. With the fundamental descriptive approach to research, the article attempts to identify the multitude of issues associated with the investigation of child sexual abuse cases currently in practice in India. Then, the article contextualizes the various covert operations carried out by numerous law enforcement agencies across the globe. To provide this comprehensive overview, the paper examines various reports, websites, guidelines, protocols, judicial pronouncements, and research articles. Finally, the paper presents the challenges and ethical issues that are to be considered before getting into undercover operations either in the guise of a pedophile or as a child. The research hopes to contribute to the making of standard operating protocols for investigation officers and other relevant policymakers in this regard.Keywords: child sexual abuse, cybercrime against children, covert police operations, investigation of CSA
Procedia PDF Downloads 9726607 Striving towards an Ambush Free Olympics: Effective Strategies and Intellectual Property Legislations
Authors: Mahit T. Anand
Abstract:
The modern Olympic Games present an unparalleled platform for companies to gain worldwide visibility. The increasing popularity of such an event supplemented by large sums of money paid by sponsors for the privilege of being associated with the Olympic Games has spawned its own particular brand of unfair competition, called ‘ambush marketing’. This research examines the practice of ambush marketing which has long been troubling the International Olympic Committee (I.O.C.) and its corporate sponsors. It emphasizes on implementing stringent legislative reforms by the host nations and to carry out effective ‘Brand Protection Programs’ for the upcoming Winter Olympics due to begin in February 2014 at Sochi, Russia and the Summer Olympics at Rio de Janeiro, Brazil in 2016. The research is carried out in the backdrop of out-standing legislative enactments made by the previous host nations and effective ‘Brand Protection Program’ formulated by their respective organizing committees.Keywords: ambush marketing, international olympic committee (IOC), official sponsors, trademark
Procedia PDF Downloads 34226606 AI as a Tool Hindering Digital Education
Authors: Justyna Żywiołek, Marek Matulewski
Abstract:
The article presents the results of a survey conducted among students from various European countries. The aim of the study was to understand how artificial intelligence (AI) affects educational processes in a digital environment. The survey covered a wide range of topics, including students' understanding and use of AI, its impact on motivation and engagement, interaction and support issues, accessibility and equity, and data security and privacy concerns. Most respondents admitted having difficulties comprehending the advanced functions of AI in educational tools. Many students believe that excessive use of AI in education can decrease their motivation for self-study and active participation in classes. Additionally, students reported that interaction with AI-based tools is often less satisfying compared to direct contact with teachers. Furthermore, the survey highlighted inequalities in access to advanced AI tools, which can widen the educational gap between students from different economic backgrounds. Students also expressed concerns about the security and privacy of their personal data collected and processed by AI systems. The findings suggest that while AI has the potential to support digital education, significant challenges need to be addressed to make these tools more effective and acceptable for students. Recommendations include increasing training for students and teachers on using AI, providing more interactive and engaging forms of education, and implementing stricter regulations on data protection.Keywords: AI, digital education, education tools, motivation and engagement
Procedia PDF Downloads 2826605 Human Rights and Fundamental Freedoms in Crisis as Viewed during Bangladesh Parliamentary Election-2018 and Afterwards: A Contestant's Perspective on Social Measures
Authors: Mohammad S. Islam
Abstract:
Elections in Bangladesh are always controversial, and sometimes it becomes a violent affair when state power is combined with politics. Despite the commitment of the ruling party- the polling government to ensure free, fair, and credible elections, the participants of opposition parties and the general voters became very disappointed, terribly frustrated, and severely shocked. It happened when numerous claims of serious irregularities of vote rigging and violence came out in broad daylight during the election. This paper addresses the issues of how the ruling party created frightening and a horror situation to make people silent over electoral fraud and violent incidents, including gang rape. It also seeks to demonstrate that election-2018 was simply the deceptive action of the ruling party to legitimate their power, but not to provide a minimum opportunity for voters to exercise their fundamental right to vote. The fundamental freedom and the rule of law seemed to be ignored completely in this election process and afterwards. With the help of state machinery, the government of the ruling party violated human rights, restricted fundamental freedoms, and humiliated social protection & dignity. The contestant’s views as witnessed and relevant literatures are cited first for conceptual understanding. Then, the paper will examine how a new dimension of circumstantial social measures related to sustained protection can reduce all kinds of violence against humanity towards establishing a peaceful democratic society. Finally, this paper interprets the key findings and considers wider implications.Keywords: electoral fraud, human rights, sustained protection, social measures, vote rigging
Procedia PDF Downloads 18826604 Agricultural Waste Recovery For Industrial Effluent Treatment And Environmental Protection
Authors: Salim Ahmed
Abstract:
In many countries, water pollution from industrial effluents is a real problem. It may have a negative impact on the environment. To minimize the adverse effects of these contaminants, various methods are used to improve effluent purification, including physico-chemical processes such as adsorption.The present study focuses on applying a naturally biodegradable adsorbent based on argan (southern Morocco) in a physico-chemical adsorption process to reduce the harmful effects of pollutants on the environment. Tests were carried out with the cationic dye methylene blue (MB) and revealed that removal is significantly higher within the first 15 minutes. The parameters studied in this study are adsorbent mass and concentration. The Freundlich model provides an excellent example of the adsorption phenomenon of BMs over argan powder. The results of this study show that argan kernels are a highly beneficial alternative for local communities, as they help to achieve a triple objective: pollution reduction, waste recovery and water recycling.Keywords: environmental protection, activated carbon, water treatment, adsorption
Procedia PDF Downloads 6226603 Mining Big Data in Telecommunications Industry: Challenges, Techniques, and Revenue Opportunity
Authors: Hoda A. Abdel Hafez
Abstract:
Mining big data represents a big challenge nowadays. Many types of research are concerned with mining massive amounts of data and big data streams. Mining big data faces a lot of challenges including scalability, speed, heterogeneity, accuracy, provenance and privacy. In telecommunication industry, mining big data is like a mining for gold; it represents a big opportunity and maximizing the revenue streams in this industry. This paper discusses the characteristics of big data (volume, variety, velocity and veracity), data mining techniques and tools for handling very large data sets, mining big data in telecommunication and the benefits and opportunities gained from them.Keywords: mining big data, big data, machine learning, telecommunication
Procedia PDF Downloads 40926602 Security in Cyberspace: A Comprehensive Review of COVID-19 Continued Effects on Security Threats and Solutions in 2021 and the Trajectory of Cybersecurity Going into 2022
Authors: Mojtaba Fayaz, Richard Hallal
Abstract:
This study examines the various types of dangers that our virtual environment is vulnerable to, including how it can be attacked and how to avoid/secure our data. The terrain of cyberspace is never completely safe, and Covid- 19 has added to the confusion, necessitating daily periodic checks and evaluations. Cybercriminals have been able to enact with greater skill and undertake more conspicuous and sophisticated attacks while keeping a higher level of finesse by operating from home. Different types of cyberattacks, such as operation-based attacks, authentication-based attacks, and software-based attacks, are constantly evolving, but research suggests that software-based threats, such as Ransomware, are becoming more popular, with attacks expected to increase by 93 percent by 2020. The effectiveness of cyber frameworks has shifted dramatically as the pandemic has forced work and private life to become intertwined, destabilising security overall and creating a new front of cyber protection for security analysis and personal. The high-rise formats in which cybercrimes are carried out, as well as the types of cybercrimes that exist, such as phishing, identity theft, malware, and DDoS attacks, have created a new front of cyber protection for security analysis and personal safety. The overall strategy for 2022 will be the introduction of frameworks that address many of the issues associated with offsite working, as well as education that provides better information about commercialised software that does not provide the highest level of security for home users, allowing businesses to plan better security around their systems.Keywords: cyber security, authentication, software, hardware, malware, COVID-19, threat actors, awareness, home users, confidentiality, integrity, availability, attacks
Procedia PDF Downloads 11626601 Artificial Intelligence as a User of Copyrighted Work: Descriptive Study
Authors: Dominika Collett
Abstract:
AI applications, such as machine learning, require access to a vast amount of data in the training phase, which can often be the subject of copyright protection. During later usage, the various content with which the application works can be recorded or made available on the basis of which it produces the resulting output. The EU has recently adopted new legislation to secure machine access to protected works under the DSM Directive; but, the issue of machine use of copyright works is not clearly addressed. However, such clarity is needed regarding the increasing importance of AI and its development. Therefore, this paper provides a basic background of the technology used in the development of applications in the field of computer creativity. The second part of the paper then will focus on a legal analysis of machine use of the authors' works from the perspective of existing European and Czech legislation. The main results of the paper discuss the potential collision of existing legislation in regards to machine use of works with special focus on exceptions and limitations. The legal regulation of machine use of copyright work will impact the development of AI technology.Keywords: copyright, artificial intelligence, legal use, infringement, Czech law, EU law, text and data mining
Procedia PDF Downloads 12326600 Human Rights in the United States: Challenges and Lessons from the Period 1948-2018
Authors: Mary Carmen Peloche Barrera
Abstract:
Since its early years as an independent nation, the United States has been one of the main promoters regarding the recognition, legislation, and protection of human rights. In the matter of freedom, the founding father Thomas Jefferson envisioned the role of the U.S. as a defender of freedom and equality throughout the world. This founding ideal shaped America’s domestic and foreign policy in the 19th and the 20th century and became an aspiration of the ideals of the country to expand its values and institutions. The history of the emergence of human rights cannot be studied without making reference to leaders such as Woodrow Wilson, Franklin, and Eleanor Roosevelt, as well as Martin Luther King. Throughout its history, this country has proclaimed that the protection of the freedoms of men, both inside and outside its borders, is practically the reason for its existence. Although the United States was one of the first countries to recognize the existence of inalienable rights for individuals, as well as the main promoter of the Universal Declaration of Human Rights of 1948, the country has gone through critical moments that had led to questioning its commitment to the issue. Racial segregation, international military interventions, national security strategy, as well as national legislation on immigration, are some of the most controversial issues related to decisions and actions driven by the United States, which at the same time mismatched with its role as an advocate of human rights, both in the Americas and in the rest of the world. The aim of this paper is to study the swinging of the efforts and commitments of the United States towards human rights. The paper will analyze the history and evolution of human rights in the United States, to study the greatest challenges for the country in this matter. The paper will focus on both the domestic policy (related to demographic issues) and foreign policy (about its role in a post-war world). Currently, more countries are joining the multilateral efforts for the promotion and protection of human rights. At the same time, the United States is one of the least committed countries in this respect, having ratified only 5 of the 18 treaties emanating from the United Nations. The last ratification was carried out in 2002 and, since then, the country has been losing ground, in an increasingly vertiginous way, in its credibility and, even worse, in its role as leader of 'the free world'. With or without the United States, the protection of human rights should remain the main goal of the international community.Keywords: United States, human rights, foreign policy, domestic policy
Procedia PDF Downloads 11726599 Research on the Overall Protection of Historical Cities Based on the 'City Image' in Ancient Maps: Take the Ancient City of Shipu, Zhejiang, China as an Example
Authors: Xiaoya Yi, Yi He, Zhao Lu, Yang Zhang
Abstract:
In the process of rapid urbanization, many historical cities have undergone excessive demolition and construction under the protection and renewal mechanism. The original pattern of the city has been changed, the urban context has been cut off, and historical features have gradually been lost. The historical city gradually changed into the form of decentralization and fragmentation. The understanding of the ancient city includes two levels. The first one refers to the ancient city on the physical space, which defined an ancient city by its historic walls. The second refers to the public perception of the image, which is derived from people's spatial identification of the ancient city. In ancient China, people draw maps to show their way of understanding the city. Starting from ancient maps and exploring the spatial characteristics of traditional Chinese cities from the perspective of urban imagery is a key clue to understanding the spatial characteristics of historical cities on an overall level. The spatial characteristics of the urban image presented by the ancient map are summarized into two levels by typology. The first is the spatial pattern composed of the center, axis and boundary. The second is the space element that contains the city, street, and sign system. Taking the ancient city of Shipu as a typical case, the "city image" in the ancient map is analyzed as a prototype, and it is projected into the current urban space. The research found that after a long period of evolution, the historical spatial pattern of the ancient city has changed from “dominant” to “recessive control”, and the historical spatial elements are non-centralized and fragmented. The wall that serves as the boundary of the ancient city is transformed into “fragmentary remains”, the streets and lanes that serve as the axis of the ancient city are transformed into “structural remains”, and the symbols of the ancient city center are transformed into “site remains”. Based on this, the paper proposed the methods of controlling the protection of land boundaries, the protecting of the streets and lanes, and the selective restoring of the city wall system and the sign system by accurate assessment. In addition, this paper emphasizes the continuity of the ancient city's traditional spatial pattern and attempts to explore a holistic conservation method of the ancient city in the modern context.Keywords: ancient city protection, ancient maps, Shipu ancient city, urban intention
Procedia PDF Downloads 12826598 Wildlife Habitat Corridor Mapping in Urban Environments: A GIS-Based Approach Using Preliminary Category Weightings
Authors: Stefan Peters, Phillip Roetman
Abstract:
The global loss of biodiversity is threatening the benefits nature provides to human populations and has become a more pressing issue than climate change and requires immediate attention. While there have been successful global agreements for environmental protection, such as the Montreal Protocol, these are rare, and we cannot rely on them solely. Thus, it is crucial to take national and local actions to support biodiversity. Australia is one of the 17 countries in the world with a high level of biodiversity, and its cities are vital habitats for endangered species, with more of them found in urban areas than in non-urban ones. However, the protection of biodiversity in metropolitan Adelaide has been inadequate, with over 130 species disappearing since European colonization in 1836. In this research project we conceptualized, developed and implemented a framework for wildlife Habitat Hotspots and Habitat Corridor modelling in an urban context using geographic data and GIS modelling and analysis. We used detailed topographic and other geographic data provided by a local council, including spatial and attributive properties of trees, parcels, water features, vegetated areas, roads, verges, traffic, and census data. Weighted factors considered in our raster-based Habitat Hotspot model include parcel size, parcel shape, population density, canopy cover, habitat quality and proximity to habitats and water features. Weighted factors considered in our raster-based Habitat Corridor model include habitat potential (resulting from the Habitat Hotspot model), verge size, road hierarchy, road widths, human density, and presence of remnant indigenous vegetation species. We developed a GIS model, using Python scripting and ArcGIS-Pro Model-Builder, to establish an automated reproducible and adjustable geoprocessing workflow, adaptable to any study area of interest. Our habitat hotspot and corridor modelling framework allow to determine and map existing habitat hotspots and wildlife habitat corridors. Our research had been applied to the study case of Burnside, a local council in Adelaide, Australia, which encompass an area of 30 km2. We applied end-user expertise-based category weightings to refine our models and optimize the use of our habitat map outputs towards informing local strategic decision-making.Keywords: biodiversity, GIS modeling, habitat hotspot, wildlife corridor
Procedia PDF Downloads 11526597 Evaluation of Agricultural Drought Impact in the Crop Productivity of East Gojjam Zone
Authors: Walelgn Dilnesa Cherie, Fasikaw Atanaw Zimale, Bekalu W. Asres
Abstract:
The most catastrophic condition for agricultural production is a drought event, which is also one of the most hydro-metrological-related hazards. According to the combined susceptibility of plants to meteorological and hydrological conditions, agricultural drought is defined as the magnitude, severity, and duration of a drought that affects crop production. The accurate and timely assessment of agricultural drought can lead to the development of risk management strategies, appropriate proactive mechanisms for the protection of farmers, and the improvement of food security. The evaluation of agricultural drought in the East Gojjam zone was the primary subject of this study. To identify the agricultural drought, soil moisture anomalies, soil moisture deficit indices, and Normalized Difference Vegetation Indices (NDVI) are used. The measured welting point, field capacity, and soil moisture were utilized to validate the soil water deficit indices computed from the satellite data. The soil moisture and soil water deficit indices in 2013 in all woredas were minimum; this makes vegetation stress also in all woredas. The soil moisture content decreased in 2013/2014/2019, and 2021 in Dejen, 2014, and 2019 in Awobel Woreda. The max/ min values of NDVI in 2013 are minimum; it dominantly shows vegetation stress and an observed agricultural drought that happened in all woredas. The validation process of satellite and in-situ soil moisture and soil water deficit indices shows a good agreement with a value of R²=0.87 and 0.56, respectively. The study area becomes drought detected region, so government officials, policymakers, and environmentalists pay attention to the protection of drought effects.Keywords: NDVI, agricultural drought, SWDI, soil moisture
Procedia PDF Downloads 8526596 Campaign Contributions as Freedom of Expression: A Comparative Study Between the United States and Germany
Authors: Kristof Lukas Heidemann
Abstract:
In times of democratic backsliding in Western nations restoring public trust in the electoral process ranks among the most urgent tasks on the public agenda. Addressing the role of money in politics is one major part of this effort, however, such an endeavor might affect the constitutional freedom of expression. Attempts to regulate political spending in the U.S. have in recent decades increasingly been overruled by the U.S. Supreme through an expansion of the protective umbrella of the First Amendment over campaign contributions by private organizations, especially in the decisions Buckley v. Valeo and Citizens United v. FEC. In Germany on the other hand this line of argumentation has so far not been submitted to the national Supreme Court. Given that voices calling for stricter and more transparent political financing laws in Germany are growing, it seems only a matter of time until the issue will have to be addressed by the country’s judiciary as well. Therefore, this paper conducts a comparative analysis of the constitutional right to free expression in these two leading democracies in to assess whether the problem of a lack of regulatory options to achieve stricter campaign spending laws due to constitutional restrictions will also arise in Germany. In order to present a comprehensive picture of the subject, the analysis does not only touch upon doctrinal aspects of both systems but also scrutinizes the practical implications from a socio-legal perspective. Although the list of forms of expression in the wording of Art. 5 of the German constitution is generally considered to be non-exhaustive, the investigation concludes that the subsumption of election campaign donations under it is not justifiable using recognized methods of interpretation, in particular concerning a systematic interpretation in light of the principle of equality in Art. 3 of the German constitution.Keywords: comparative constitutional law, constitutional justice, constitutional law, election law, freedom of speech, fundamental rights, law reform
Procedia PDF Downloads 726595 Competition Law as a “Must Have” Course in Legal Education
Authors: Noemia Bessa Vilela, Jose Caramelo Gomes
Abstract:
All law student are familiarized, in the first years of their bachelor of laws with the concepts of “public goods” and “ private goods”; often, such legal concept does not exactly match such economic concept, and there are consequences are some sort of confusion being created. The list of goods that follow under each category is not exhaustive, nor are students given proper mechanisms to acknowledge that some legal fields can, on its own, be considered as a “public good”; this is the case of Competition. Legal authors consider that “competition law is used to promote public interest” and, as such, it is a “public good”; in economics theory, Competition is the first public good in a market economy, as the enabler of allocation efficiency. Competition law is the legal tool to support the proper functioning of the market economy and democracy itself. It is fact that Competition Law only applies to economic activities, still, competition is object of private litigation as an integral part of Public Law. Still, regardless of the importance of Competition Law in the economic activity and market regulation, most student complete their studies in law, join the Bar Associations and engage in their professional activities never having been given sufficient tools to deal with the increasing demands of a globalized world. The lack of knowledge of economics, market functioning and the mechanisms at their reach in order to ensure proper realization of their duties as lawyers/ attorneys-at-law would be tackled if Competition Law would be included as part of the curricula of Law Schools. Proper teaching of Competition Law would combine the foundations of Competition Law, doctrine, case solving and Case Law study. Students should to understand and apply the analytical model. Special emphasis should be given to EU Competition Law, namely the TFEU Articles 101 to 106. Damages Directive should also be part of the curriculum. Students must in the first place acquire and master the economic rationale as competition and the world of competition law are the cornerstone of sound and efficient market. The teaching of Competition Law in undergraduate programs in Law would contribute to fulfill the potential of the students who will deal with matters related to consumer protection, economic and commercial law issues both in private practice and as in-house lawyers for companies.Keywords: higher education, competition law, legal education, law, market economy, industrial economics
Procedia PDF Downloads 14226594 Child Care Policy in Kazakhstan: A New Model
Authors: Dina Maratovna Aikenova
Abstract:
Child care policy must be a priority area of public authorities in any country. This study investigates child care policy in Kazakhstan in accordance with the current position of children and laws. The results show that Kazakhstan policy in this sphere needs more systematic model including state economic and social measures, parental involvement and role of non-government organizations.Keywords: children, Kazakhstan, policy, vulnerability
Procedia PDF Downloads 484