Search results for: animal protection laws
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4064

Search results for: animal protection laws

3254 Normative Reflections on the International Court of Justice's Jurisprudence on the Protection of Human Rights in Times of War

Authors: Roger-Claude Liwanga

Abstract:

This article reflects on the normative aspects of the jurisprudence on the protection of human rights in times of war that the International Court of Justice (ICJ) developed in 2005 in the Case Concerning Armed Activities on the Territory of the Congo (Democratic Republic of Congo v. Uganda). The article focuses on theories raised in connection with the Democratic Republic of Congo (DRC)'s claim of the violation of human rights of its populations by Uganda as opposed to the violation of its territorial integrity claims. The article begins with a re-visitation of the doctrine of state extraterritorial responsibility for violations of human rights by suggesting that a state's accountability for the breach of its international obligations is not territorially confined but rather transcends the State's national borders. The article highlights the criteria of assessing the State's extraterritorial responsibility, including the circumstances: (1) where the concerned State has effective control over the territory of another State in the context of belligerent occupation, and (2) when the unlawful actions committed by the State's organs on the occupied territory can be attributable to that State. The article also analyzes the ICJ's opinions articulated in DRC v. Uganda with reference to the relationship between human rights law and humanitarian law, and it contends that the ICJ had revised the traditional interaction between these two bodies of law to the extent that human rights law can no longer be excluded from applying in times of war as both branches are complementary rather than exclusive. The article correspondingly looks at the issue of reparations for victims of human rights violations. It posits that reparations for victims of human rights violations should be integral (including restitution, compensation, rehabilitation, satisfaction, and guarantees of non-repetition). Yet, the article concludes by emphasizing that reparations for victims were not integral in DRC v. Uganda because: (1) the ICJ failed to set a reasonable timeframe for the negotiations between the DRC and Uganda on the amount of compensation, resulting in Uganda paying no financial reparation to the DRC since 2005; and (2) the ICJ did not request Uganda to domestically prosecute the perpetrators of human rights abuses.

Keywords: human rights law, humanitarian law, civilian protection, extraterritorial responsibility

Procedia PDF Downloads 119
3253 Improving Food Security and Commercial Development through Promotion of High Value Medicinal and Industrial Plants in the Swat Valley of Pakistan

Authors: Hassan Sher

Abstract:

Agriculture has a pivotal role in Pakistan’s economy, accounting for about one-fourth of the GDP and employing almost half the population. However, the competitiveness, productivity, growth, employment potential, export opportunity, and contribution to GDP of the sector is significantly hampered by agriculture marketing laws/regulations at the provincial level that reward rent seeking behavior, promote monopoly power, artificially reduce farmer incomes while inflating prices to consumers, and act as disincentives to investment. Although of more recent vintage than some other provincial agricultural marketing laws, the NWFP Agricultural and Livestock Produce Markets Act, 2007 is a throwback to a colonial paradigm, where restrictions on agricultural produce marketing and Government control of distribution channels is the norm. The Swat Valley (in which we include its tributary valleys) is an area of Pakistan in which there is poverty is both extreme and pervasive. For many, a significant portion of the family’s income comes from selling plants that are used as herbs, medicines, and perfumes. Earlier studies have shown that the benefit they derive from this work is less than they might because of: Lack of knowledge concerning which plants and which plant parts are valuable, Lack of knowledge concerning optimal preservation and storage of material, illiteracy. Another concern that much of the plant material sold from the valley is collected in the wild, without an appreciation of the negative impact continued collecting has on wild populations. We propose: Creating colored cards to help inhabitants recognize the 25 most valuable plants in their area; Developing and sharing protocols for growing the 25 most valuable plants in a home garden; Developing and sharing efficient mechanisms for drying plants so they do not lose value; Encouraging increased literacy by incorporating numbers and a few words in the handouts.

Keywords: food security, medicinal plants, industrial plants, economic development

Procedia PDF Downloads 312
3252 The Regulation of Alternative Dispute Resolution Institutions in Consumer Redress and Enforcement: A South African Perspective

Authors: Jacolien Barnard, Corlia Van Heerden

Abstract:

Effective and accessible consensual dispute resolution and in particular alternative dispute resolution, are central to consumer protection legislation. In this regard, the Consumer Protection Act 68 of 2008 (CPA) of South Africa is no exception. Due to the nature of consumer disputes, alternative dispute resolution (in theory) is an effective vehicle for the adjudication of disputes in a timely manner avoiding overburdening of the courts. The CPA sets down as one of its core purposes the provision of ‘an accessible, consistent, harmonized, effective and efficient system of redress for consumers’ (section 3(1)(h) of the CPA). Section 69 of the Act provides for the enforcement of consumer rights and provides for the National Consumer Commission to be the Central Authority which streamlines, adjudicates and channels disputes to the appropriate forums which include Alternative Dispute Resolution Agents (ADR-agents). The purpose of this paper is to analyze the regulation of these enforcement and redress mechanisms with particular focus on the Central Authority as well as the ADR-agents and their crucial role in successful and efficient adjudication of disputes in South Africa. The South African position will be discussed comparatively with the European Union (EU) position. In this regard, the European Union (EU) Directive on Alternative Dispute Resolution for Consumer Disputes (2013/11/EU) will be discussed (The ADR Directive). The aim of the ADR Directive is to solve contractual disputes between consumers and traders (suppliers or businesses) regardless of whether the agreement was concluded offline or online or whether or not the trader is situated in another member state (Recitals 4-6). The ADR Directive provides for a set of quality requirements that an ADR body or entity tasked with resolving consumer disputes should adhere to in member states which include regulatory mechanisms for control. Transparency, effectiveness, fairness, liberty and legality are all requirements for a successful ADR body and discussed within this chapter III of the Directive. Chapters III and IV govern the importance of information and co-operation. This includes information between ADR bodies and the European Commission (EC) but also between ADR bodies or entities and national authorities enforcing legal acts on consumer protection and traders. (In South Africa the National Consumer Tribunal, Provincial Consumer Protectors and Industry ombuds come to mind). All of which have a responsibility to keep consumers informed. Ultimately the papers aims to provide recommendations as to the successfulness of the current South African position in light of the comparative position in Europe and the highlight the importance of proper regulation of these redress and enforcement institutions.

Keywords: alternative dispute resolution, consumer protection law, enforcement, redress

Procedia PDF Downloads 209
3251 Examining the Relationship Between Traditional Property Rights and Online Intellectual Property Rights in the Digital Age

Authors: Luljeta Plakolli-Kasumi

Abstract:

In the digital age, the relationship between traditional property rights and online intellectual property rights is becoming increasingly complex. On the one hand, the internet and advancements in technology have allowed for the widespread distribution and use of digital content, making it easier for individuals and businesses to access and share information. On the other hand, the rise of digital piracy and illegal file-sharing has led to increased concerns about the protection of intellectual property rights. This paper aims to examine the relationship between traditional property rights and online intellectual property rights in the digital age by analyzing the current legal frameworks, key challenges and controversies that arise, and potential solutions for addressing these issues. The paper will look at how traditional property rights concepts such as ownership and possession are being applied in the online context and how they intersect with new and evolving forms of intellectual property such as digital downloads, streaming services, and online content creation. It will also discuss the tension between the need for strong intellectual property protection to encourage creativity and innovation and the public interest in promoting access to information and knowledge. Ultimately, the paper will explore how the legal system can adapt to better balance the interests of property owners, creators, and users in the digital age.

Keywords: intellectual property, traditional property, digital age, digital content

Procedia PDF Downloads 79
3250 The Current Situation of Veterinary Services and a Reform for Enhancing the Veterinary Services in Developing Countries

Authors: Sufian Abdo Jilo

Abstract:

Veterinary services conserve and maintain animal life and improve the living conditions of human beings through improving rural livelihoods and feeding; veterinary services also address global health crises by preventing risks such as emerging pandemic diseases, antimicrobial resistance, contamination of foods, and environmental health problems at their origin. The purpose of this policy brief is to analyze the way veterinary organizations provide services and to propose an optimal organization for veterinary services in developing countries. The current situation of veterinary institutions in developing countries can't counter the challenge related to animal health and productivity. As a result, reorganization, amalgamation, merging, and consolidation of veterinary health services (veterinary clinics, slaughterhouses, quarantine, and veterinary markets) together with the construction of closer veterinary service facilities and the construction of common areas will help institutions to strengthen cooperation among different veterinarians, which is the first steps for the implementation of a One Health platform and multidisciplinary activities. The improvement and reorganization of the veterinary services institutions will also help the veterinary clinics easily obtain various medical chemicals such as blood and rumen from abattoirs, enhance the surveillance of livestock diseases, enable the community to buy healthy animals from the animal market, and help to reduce economic waste. The services can be performed by a small number of veterinarians through a model of specific areas common to all veterinary services. This model improves the skills and knowledge of veterinarians in all aspects of veterinary medicine and saves students and researchers time. Communities or customers can save time by getting all veterinary services at once. It saves the budget on purchasing medical equipment and medicines at each location and avoids expiration dates on medicines. This model is the latest solution to the global health crisis and should be implemented in the near future to combat the emergence and reemergence of new pathogenic microorganisms.

Keywords: abattoir, developing countries, reform, service, veterinary

Procedia PDF Downloads 60
3249 A Cross-Cultural Analysis of Ethical Standards in Social and Behavioral Research

Authors: Xiwu Feng

Abstract:

The paper is to analyze research ethics in social and behavioral sciences from a cross-cultural perspective. A multi-phase study investigated implementations of ethical standards and guidelines in higher institutions in China. Institutional policies and procedures on human subject research and perceptions of human subject protection were assessed in the Chinese research universities from different regions. The findings of the study indicate that the implementations of ethical standards and guidelines vary from institution to institution and from region to region. Education and cultural backgrounds of the participants influence their perceptions of the welfare and privacy of human subjects. The results of the study reveal great differences and complexities in ethical standards for the protection of human subjects of research in contrast to the Western world. The Chinese collectivistic values and the cooperative-harmonious democracy play a significant role in perceiving and implementing ethical guidelines. Chinese researchers find themselves a long way to go before seeing implementations of regulations and guidelines on human subject research in social and behavioral sciences.

Keywords: ethical standards, human subjects, research ethics, social and behavioral research

Procedia PDF Downloads 184
3248 Using Computational Fluid Dynamics to Model and Design a Preventative Application for Strong Wind

Authors: Ming-Hwi Yao, Su-Szu Yang

Abstract:

Typhoons are one of the major types of disasters that affect Taiwan each year and that cause severe damage to agriculture. Indeed, the damage exacted during a typical typhoon season can be up to $1 billion, and is responsible for nearly 75% of yearly agricultural losses. However, there is no consensus on how to reduce the damage caused by the strong winds and heavy precipitation engendered by typhoons. One suggestion is the use of windbreak nets, which are a low-cost and easy-to-use disaster mitigation strategy for crop production. In the present study, we conducted an evaluation to determine the optimal conditions of a windbreak net by using a computational fluid dynamics (CFD) model. This model may be used as a reference for crop protection. The results showed that CFD simulation validated windbreak nets of different mesh sizes and heights in the experimental area; thus, CFD is an efficient tool for evaluating the effectiveness of windbreak nets. Specifically, the effective wind protection length and height were found to be 6 and 1.3 times the length and height of the windbreak net, respectively. During a real typhoon, maximum wind gusts of 18 m s-1 can be reduced to 4 m s-1 by using a windbreak net that has a 70% blocking rate. In short, windbreak nets are significantly effective in protecting typhoon-affected areas.

Keywords: computational fluid dynamics, disaster, typhoon, windbreak net

Procedia PDF Downloads 175
3247 Comparative Analysis of Patent Protection between Health System and Enterprises in Shanghai, China

Authors: Na Li, Yunwei Zhang, Yuhong Niu

Abstract:

The study discussed the patent protections of health system and enterprises in Shanghai. The comparisons of technical distribution and scopes of patent protections between Shanghai health system and enterprises were used by the methods of IPC classification, co-words analysis and visual social network. Results reflected a decreasing order within IPC A61 area, namely A61B, A61K, A61M, and A61F. A61B required to be further investigated. The highest authorized patents A61B17 of A61B of IPC A61 area was found. Within A61B17, fracture fixation, ligament reconstruction, cardiac surgery, and biopsy detection were regarded as common concerned fields by Shanghai health system and enterprises. However, compared with cardiac closure which Shanghai enterprises paid attention to, Shanghai health system was more inclined to blockages and hemostatic tools. The results also revealed that the scopes of patent protections of Shanghai enterprises were relatively centralized. Shanghai enterprises had a series of comprehensive strategies for protecting core patents. In contrast, Shanghai health system was considered to be lack of strategic patent protections for core patents.

Keywords: co-words analysis, IPC classification, patent protection, technical distribution

Procedia PDF Downloads 118
3246 Cosmic Radiation Hazards and Protective Strategies in Space Exploration

Authors: Mehrnaz Mostafavi, Alireza Azani, Mahtab Shabani, Fatemeh Ghafari

Abstract:

While filled with promise and wonder, space exploration also presents significant challenges, one of the foremost being the threat of cosmic radiation to astronaut health. Recent advancements in assessing these risks and developing protective strategies have shed new light on this issue. Cosmic radiation encompasses a variety of high-energy particles originating from sources like solar particle events, galactic cosmic rays, and cosmic rays from beyond the solar system. These particles, composed of protons, electrons, and heavy ions, pose a substantial threat to human health in space due to the lack of Earth's protective atmosphere and magnetic field. Researchers have made significant progress in assessing the risks associated with cosmic radiation exposure. By employing advanced dosimetry techniques and conducting biological studies, they have gained insights into how cosmic radiation affects astronauts' health, including increasing the risk of cancer and radiation sickness. This research has led to personalized risk assessment methods tailored to individual astronaut profiles. Distinctive protection strategies have been proposed to combat the dangers of cosmic radiation. These include developing spacecraft shielding materials and designs to enhance radiation protection. Additionally, researchers are exploring pharmacological interventions such as radioprotective drugs and antioxidant therapies to mitigate the biological effects of radiation exposure and preserve astronaut well-being. The findings from recent research have significant implications for the future of space exploration. By advancing our understanding of cosmic radiation risks and developing effective protection strategies, we pave the way for safer and more sustainable human missions beyond Earth's orbit. This is especially crucial for long-duration missions to destinations like Mars, where astronauts will face prolonged exposure to cosmic radiation. In conclusion, recent research has marked a milestone in addressing the challenges posed by cosmic radiation in space exploration. By delving into the complexities of cosmic radiation exposure and developing innovative protection strategies, scientists are ensuring the health and resilience of astronauts as they venture into the vast expanse of the cosmos. Continued research and collaboration in this area are essential for overcoming the cosmic radiation challenge and enabling humanity to embark on new frontiers of exploration and discovery in space.

Keywords: Space exploration, cosmic radiation, astronaut health, risk assessment, protective strategies

Procedia PDF Downloads 28
3245 Effectiveness of the Resistance to Irradiance Test on Sunglasses Standards

Authors: Mauro Masili, Liliane Ventura

Abstract:

It is still controversial in the literature the ultraviolet (UV) radiation effects on the ocular media, but the World Health Organization has established safe limits on the exposure of eyes to UV radiation based on reports in literature. Sunglasses play an important role in providing safety, and their lenses should provide adequate UV filters. Regarding UV protection for ocular media, the resistance-to-irradiance test for sunglasses under many national standards requires irradiating lenses for 50 uninterrupted hours with a 450 W solar simulator. This artificial aging test may provide a corresponding evaluation of exposure to the sun. Calculating the direct and diffuse solar irradiance at a vertical surface and the corresponding radiant exposure for the entire year, we compare the latter with the 50-hour radiant exposure of a 450 W xenon arc lamp from a solar simulator required by national standards. Our calculations indicate that this stress test is ineffective in its present form. We provide evidence of the need to re-evaluate the parameters of the tests to establish appropriate safe limits against UV radiation. This work is potentially significant for scientists and legislators in the field of sunglasses standards to improve the requirements of sunglasses quality and safety.

Keywords: ISO 12312-1, solar simulator, sunglasses standards, UV protection

Procedia PDF Downloads 184
3244 Analysis and Suggestion on Patent Protection in Shanghai, China

Authors: Yuhong Niu, Na Li, Chunlin Jin, Hansheng Ding

Abstract:

The study reviewed all types of patents applied by Shanghai health system to analyze how patent development in China from the year of 1990 to 2012. The study used quantitative and comparative analysis to investigate the change and trends of patent numbers, patent types, patent claims, forward citations, patent life, patent transactions, etc. Results reflected an obviously increased numbers of invention patents, applications, and authorizations and short-life patents, but the ratio of invention patents represented an up and down change. Forward citations and transactions ratio always kept at a low level. The results meant that the protection of intellectual property in the Shanghai health sector had made great progress and lots of positive changes due to incentive policies by local government. However, the low-quality patents, at the same time, increased rapidly. Thus, in the future, it is suggested that the quality management should be strengthened, and invents should be estimated before patent application. It is also suggested that the incentives for intellectual property should be optimized to promote the comprehensive improvement of patent quantity and quality.

Keywords: patent claims, forward citations, patent life, patent transactions ratio

Procedia PDF Downloads 147
3243 Intellectual Property Rights (IPR) in the Relations among Nations: Towards a Renewed Hegemony or Not

Authors: Raju K. Thadikkaran

Abstract:

Introduction: The IPR have come to the centre stage of development discourse today for a variety of reasons: It ranges from the arbitrariness in the enforcement, overlapping and mismatch with various international agreements and conventions, divergence in the definition, nature and content and the duration as well as severe adverse consequences to technologically weak developing countries. In turn, the IPR have acquired prominence in the foreign policy making as well as in the relations among nations. Quite naturally, there is ample scope for an examination of the correlation between Technology, IPR and International Relations in the contemporary world. Nature and Scope: A cursory examination of the realm of IPR and its protection shall reveals the acute divergence that exists in the perspectives, on all matters related to the very definition, nature, content, scope and duration. The proponents of stronger protection, mostly technologically advanced countries, insist on a stringent IP Regime whereas technologically weak developing countries seem to advocate for flexibilities. From the perspective of developing countries like India, one of the most crucial concerns is related to the patenting of life forms and the protection of TK and BD. There have been several instances of Bio-piracy and Bio-prospecting of the resources related to BD and TK from the Bio-rich Global South. It is widely argued that many provisions in the TRIPS are capable of offsetting the welcome provisions in the CBD such as the Access and Benefit Sharing and Prior Informed Consent. The point that is being argued out is as to how the mismatch between the provisions in the TRIPS Agreement and the CBD could be addressed in a healthy manner so that the essential minimum legitimate interests of all stakeholders could be secured thereby introducing a new direction to the international relations. The findings of this study reveal that the challenges roused by the TRIPS Regime over-weigh the opportunities. The mismatch in the provisions in this regard has generated various crucial issues such as Bio-piracy and Bio-prospecting. However, there is ample scope for managing and protecting IP through institutional innovation, legislative, executive and administrative initiative at the global, national and regional levels. The Indian experience is quite reflective of the same and efforts are being made through the new national IPR policy. This paper, employing Historical Analytical Method, has Three Sections. The First Section shall trace the correlation between the Technology, IPR and international relations. The Second Section shall review the issues and potential concerns in the protection and management of IP related to the BD and TK in the developing countries in the wake of the TRIPS and the CBD. The Final Section shall analyze the Indian Experience in this regard and the experience of the bio-rich Kerala in particular.

Keywords: IPR, technology and international relations, bio-diversity, traditional knowledge

Procedia PDF Downloads 360
3242 Use of Vegetative Coverage for Slope Stability in the Brazilian Midwest: Case Study

Authors: Weber A. R. Souza, Andre A. N. Dantas, Marcio A. Medeiros, Rafaella F. Costa

Abstract:

The erosive processes are natural phenomena that cause changes in the soil continuously due to the actions of natural erosive agents and their speed can be intensified or retarded by factors such as climate, inclination, type of matrix rock, vegetation and anthropic activities, the latter being very relevant in occupied areas without planning and urban infrastructure. Inadequate housing sites associated with an inefficient urban drainage network and lack of vegetation cover potentiate the erosive processes that, over time, are gaining alarming proportions, as is the case of the erosion in Planaltina in Federal district, a Brazilian state in the central west. Thus, the aim of this work was to compare the use of Vetiver grass and Alfalfa as vegetation cover to slope protection. For that, a study was carried out in the scientific literature about the improvement of the soil properties provided by them and verification of the safety factor through the simulation of slopes with different heights and inclination using SLOPE / W software. The Vetiver grass presented little more satisfactory results than the Alfalfa, but these obtained results slightly closer to that of the vetiver grass in less time of planting.

Keywords: erosive processes, planting, slope protection, vegetation cover

Procedia PDF Downloads 163
3241 Sharing Experience in Authentic Learning for Mobile Security

Authors: Kai Qian, Lixin Tao

Abstract:

Mobile devices such as smartphones are getting more and more popular in our daily lives. The security vulnerability and threat attacks become a very emerging and important research and education topic in computing security discipline. There is a need to have an innovative mobile security hands-on laboratory to provide students with real world relevant mobile threat analysis and protection experience. This paper presents an authentic teaching and learning mobile security approach with smartphone devices which covers most important mobile threats in most aspects of mobile security. Each lab focuses on one type of mobile threats, such as mobile messaging threat, and conveys the threat analysis and protection in multiple ways, including lectures and tutorials, multimedia or app-based demonstration for threats analysis, and mobile app development for threat protections. This authentic learning approach is affordable and easily-adoptable which immerse students in a real world relevant learning environment with real devices. This approach can also be applied to many other mobile related courses such as mobile Java programming, database, network, and any security relevant courses so that can learn concepts and principles better with the hands-on authentic learning experience.

Keywords: mobile computing, Android, network, security, labware

Procedia PDF Downloads 386
3240 Trees in Different Vegetation Types of Mt. Hamiguitan Range, Davao Oriental, Mindanao Island, Philippines

Authors: Janece Jean A. Polizon, Victor B. Amoroso

Abstract:

Mt. Hamiguitan Range in Davao Oriental, Mindanao Island, Philippines is the only protected area with pygmy forest and a priority site for protection and conservation. This range harbors different vegetation types such as agroecosystem, dipterocarp forest, montane forest and mossy forest. This study was conducted to determine the diversity of trees and shrubs in different vegetation types of Mt. Hamiguitan Range. Transect walk and 16 sampling plots of 20 x 20 m were established in the different vegetation types. Specimens collected were classified and identified using the Flora Malesiana and type images. Assessment of status was determined based on International Union for the Conservation of Nature (IUCN). There were 223 species of trees, 141 genera and 71 families. Of the vegetation types, the pygmy forest obtained a comparatively high diversity value of H=1.348 followed by montane forest with H=1.284. The high species importance value (SIV) of Diospyros philippinensis for trees indicates that these species have an important role in regulating the stability of the ecosystem. The tree profile of the pygmy forest is different due to the ultramafic substrate causing the dwarfness of the trees. These forest types should be given high priority for protection and conservation.

Keywords: diversity, Mt Hamiguitan, vegetation, trees, shrubs

Procedia PDF Downloads 389
3239 The Hindrances Associated with Internet Banking Services in Nigeria: The Lagos State Perspective

Authors: Patience Oluchi Silas, Yemi Adeshina

Abstract:

Financial transactions involving the use of the internet has become an important practice among commercial banks in Nigeria with the introduction of internet banking and this has improved banking efficiency in rending services to customers. However, customers in Lagos State are enslaved in the fear of insecurity, technical failure, inadequate operational facilities, including improper telecommunications and poor power supply. It is in line with this that this paper explores the obstacles faced by Lagosians, tourists, small scale business owners, companies, customers and the government's attitude in addressing the challenges associated with online banking system in Nigeria through relevant legislations. Internet banking has the potential to transform economic activity and achieve developmental goals. If the associated Challenges are addressed quickly, then it will have the desired impact on the Nigerian economy. In this study, Respondents, mostly bank employees and customers were issued well designed and structured questionnaires to effectively examine the new developments brought about by the introduction of Internet banking and the challenges inhibiting its adoption. Hypotheses were formulated to test assumptions and claims generated from the study. The results were statistically analyzed to address the issues of errors and chances, and at the end, the result of the statistical analysis shows that all especially insecurity, inadequate operational facilities and poor power supply are the significant factors affecting the adoption of internet banking services in Nigeria. The study recommends that for internet banking to assume a developmental dimension in Nigeria and for the country to be fully integrated and respected in global financial environment, the prevalent level of frauds in Lagos State and among Nigerians must first be addressed and the relevant local laws should be put in place and in consonance with international laws and conventions; get the citizens well educated on the intricacies of Internet usage and frauds.

Keywords: internet-banking, adoption, challenges, insecurity, legislation, fraud, Lagos state, statistics

Procedia PDF Downloads 325
3238 The Effects of Damping Devices on Displacements, Velocities and Accelerations of Structures

Authors: Radhwane Boudjelthia

Abstract:

The most recent earthquakes that occurred in the world and particularly in Algeria, have killed thousands of people and severe damage. The example that is etched in our memory is the last earthquake in the regions of Boumerdes and Algiers (Boumerdes earthquake of May 21, 2003). For all the actors involved in the building process, the earthquake is the litmus test for construction. The goal we set ourselves is to contribute to the implementation of a thoughtful approach to the seismic protection of structures. For many engineers, the most conventional approach protection works (buildings and bridges) the effects of earthquakes is to increase rigidity. This approach is not always effective, especially when there is a context that favors the phenomenon of resonance and amplification of seismic forces. Therefore, the field of earthquake engineering has made significant inroads among others catalyzed by the development of computational techniques in computer form and the use of powerful test facilities. This has led to the emergence of several innovative technologies, such as the introduction of special devices insulation between infrastructure and superstructure. This approach, commonly known as "seismic isolation" to absorb the significant efforts without the structure is damaged and thus ensuring the protection of lives and property. In addition, the restraints to the construction by the ground shaking are located mainly at the supports. With these moves, the natural period of construction is increasing, and seismic loads are reduced. Thus, there is an attenuation of the seismic movement. Likewise, the insulation of the base mechanism may be used in combination with earthquake dampers in order to control the deformation of the insulation system and the absolute displacement of the superstructure located above the isolation interface. On the other hand, only can use these earthquake dampers to reduce the oscillation amplitudes and thus reduce seismic loads. The use of damping devices represents an effective solution for the rehabilitation of existing structures. Given all these acceleration reducing means considered passive, much research has been conducted for several years to develop an active control system of the response of buildings to earthquakes.

Keywords: earthquake, building, seismic forces, displacement, resonance, response

Procedia PDF Downloads 111
3237 Collaborative Governance in Dutch Flood Risk Management: An Historical Analysis

Authors: Emma Avoyan

Abstract:

The safety standards for flood protection in the Netherlands have been revised recently. It is expected that all major flood-protection structures will have to be reinforced to meet the new standards. The Dutch Flood Protection Programme aims at accomplishing this task through innovative integrated projects such as construction of multi-functional flood defenses. In these projects, flood safety purposes will be combined with spatial planning, nature development, emergency management or other sectoral objectives. Therefore, implementation of dike reinforcement projects requires early involvement and collaboration between public and private sectors, different governmental actors and agencies. The development and implementation of such integrated projects has been an issue in Dutch flood risk management since long. Therefore, this article analyses how cross-sector collaboration within flood risk governance in the Netherlands has evolved over time, and how this development can be explained. The integrative framework for collaborative governance is applied as an analytical tool to map external factors framing possibilities as well as constraints for cross-sector collaboration in Dutch flood risk domain. Supported by an extensive document and literature analysis, the paper offers insights on how the system context and different drivers changing over time either promoted or hindered cross-sector collaboration between flood protection sector, urban development, nature conservation or any other sector involved in flood risk governance. The system context refers to the multi-layered and interrelated suite of conditions that influence the formation and performance of complex governance systems, such as collaborative governance regimes, whereas the drivers initiate and enable the overall process of collaboration. In addition, by applying a method of process tracing we identify a causal and chronological chain of events shaping cross-sectoral interaction in Dutch flood risk management. Our results indicate that in order to evaluate the performance of complex governance systems, it is important to firstly study the system context that shapes it. Clear understanding of the system conditions and drivers for collaboration gives insight into the possibilities of and constraints for effective performance of complex governance systems. The performance of the governance system is affected by the system conditions, while at the same time the governance system can also change the system conditions. Our results show that the sequence of changes within the system conditions and drivers over time affect how cross-sector interaction in Dutch flood risk governance system happens now. Moreover, we have traced the potential of this governance system to shape and change the system context.

Keywords: collaborative governance, cross-sector interaction, flood risk management, the Netherlands

Procedia PDF Downloads 116
3236 Contested Space for Regulation in Higher Education

Authors: Sulila Anar

Abstract:

Institutions of any kind are regulated by laws which could be formal or informal, visible or invisible that influences the very structure of the institutions itself. Here in this paper the attempt will be to see how institutions of higher education are regulated by the regulatory institutions by taking the case of India, the third largest education system in the world. The attempt is to try to see how regulation of higher education creates a space for contestation among regulatory institutions based on secondary resources and how this affects the governance of university to achieve the goals and visions.

Keywords: higher education, regulation, autonomy, space

Procedia PDF Downloads 380
3235 Data Protection and Regulation Compliance on Handling Physical Child Abuse Scenarios- A Scoping Review

Authors: Ana Mafalda Silva, Rebeca Fontes, Ana Paula Vaz, Carla Carreira, Ana Corte-Real

Abstract:

Decades of research on the topic of interpersonal violence against minors highlight five main conclusions: 1) it causes harmful effects on children's development and health; 2) it is prevalent; 3) it violates children's rights; 4) it can be prevented and 5) parents are the main aggressors. The child abuse scenario is identified through clinical observation, administrative data and self-reports. The most used instruments are self-reports; however, there are no valid and reliable self-report instruments for minors, which consist of a retrospective interpretation of the situation by the victim already in her adult phase and/or by her parents. Clinical observation and collection of information, namely from the orofacial region, are essential in the early identification of these situations. The management of medical data, such as personal data, must comply with the General Data Protection Regulation (GDPR), in Europe, and with the General Law of Data Protection (LGPD), in Brazil. This review aims to answer the question: In a situation of medical assistance to minors, in the suspicion of interpersonal violence, due to mistreatment, is it necessary for the guardians to provide consent in the registration and sharing of personal data, namely medical ones. A scoping review was carried out based on a search by the Web of Science and Pubmed search engines. Four papers and two documents from the grey literature were selected. As found, the process of identifying and signaling child abuse by the health professional, and the necessary early intervention in defense of the minor as a victim of abuse, comply with the guidelines expressed in the GDPR and LGPD. This way, the notification in maltreatment scenarios by health professionals should be a priority and there shouldn’t be the fear or anxiety of legal repercussions that stands in the way of collecting and treating the data necessary for the signaling procedure that safeguards and promotes the welfare of children living with abuse.

Keywords: child abuse, disease notifications, ethics, healthcare assistance

Procedia PDF Downloads 81
3234 Judicial Activism and the Supreme Court of India

Authors: Shreeya Umashankar

Abstract:

The Supreme Court of India has emerged as the most powerful organ of State and amongst the foremost constitutional courts in the world through the instrument of Public Interest Litigation (PIL), the exercise of writ jurisdiction and the expansive interpretation of fundamental rights guaranteed by the Constitution of India. Judicial activism impinging on every facet of governance has become the norm in recent times. This paper traces the evolution of judicial activism since Independence through pronouncements of the Supreme Court. It brings out distinct phases in this evolution– the initial phase of judicial restraint, the first phase of an activist judiciary where the Supreme Court primarily was concerned with protection of fundamental rights and humane treatment of citizens; the second phase where the Supreme Court took keen interest in preservation and protection of the environment; the third phase where the Supreme Court extended its reach into the socio-economic arena and the fourth phase when issues of transparency and probity in governance led to interventions by the Supreme Court. The paper illustrates through judgements of the Supreme Court that the instrument of the PIL and the exercise of writ jurisdiction by the Supreme Court go beyond the traditional postulates of judicial processes and political theory on separation of powers between the organs of State.

Keywords: fundamental rights, judicial activism, public interest litigation, Supreme Court of India

Procedia PDF Downloads 602
3233 Reconciling the Fatigue of Space Property Rights

Authors: King Kumire

Abstract:

The Outer Space Treaty and the Moon Treaty have been the backbone of space law. However, scientists, engineers, and policymakers have been silent about how human settlement on celestial bodies would change the legal dimensions of space law. Indeed, these legal space regimes should have a prescription on how galactic courts should deal with the aspect of space property ownership. On this planet earth, one can vindicate his own assets. In extraterrestrial environments, this is not the case because space law is fatigued by terrestrial body sovereignty, which must be upheld. However, the recent commercialization of microgravity environments requires property ownership laws to be enacted. Space activities have mutated to the extent that it is almost possible to build communities in space. The discussions on the moon village concept will be mentioned as well to give clarity on the subject to the audience. It should be stated that launchers can now explore the cosmos with space tourists. The world is also busy doing feasibility studies on how to implement space mining projects. These activities indisputably show that the research is important because it will not only expose how the cosmic world is constrained by existing legal frameworks, but it will provide a remedy for how the inevitable dilemma of property rights can be resolved through the formulation of multilateral and all-inclusive policies. The discussion will model various aspects of terrestrial property rights and the associated remedies against what can be applicable and customized for use in extraterrestrial environments. Transfer of ownership in space is also another area of interest as the researcher shall try to distinguish between envisaged personal and real rights in the new frontier vis-a-vis mainland transfer transactions. The writer imagines the extent to which the concepts of servitudes, accession, prescription and commixes, and other property templates can act as a starting point when cosmic probers move forward with the revision of orbital law. The article seeks to reconcile these ownership constraints by working towards the development of a living space common law which is elastic and embroidered by sustainable recommendations. A balance between transplanting terrestrial laws to the galactic arena and the need to enact new ones which will complement the existing space treaties will be meticulously pivoted.

Keywords: rights, commercialisation, ownership, sovereignty

Procedia PDF Downloads 104
3232 Other-Generated Disclosure: A Challenge to Privacy on Social Network Sites

Authors: Tharntip Tawnie Chutikulrungsee, Oliver Kisalay Burmeister, Maumita Bhattacharya, Dragana Calic

Abstract:

Sharing on social network sites (SNSs) has rapidly emerged as a new social norm and has become a global phenomenon. Billions of users reveal not only their own information (self disclosure) but also information about others (other-generated disclosure), resulting in a risk and a serious threat to either personal or informational privacy. Self-disclosure (SD) has been extensively researched in the literature, particularly regarding control of individual and existing privacy management. However, far too little attention has been paid to other-generated disclosure (OGD), especially by insiders. OGD has a strong influence on self-presentation, self-image, and electronic word of mouth (eWOM). Moreover, OGD is more credible and less likely manipulated than SD, but lacks privacy control and legal protection to some extent. This article examines OGD in depth, ranging from motivation to both online and offline impacts, based upon lived experiences from both ‘the disclosed’ and ‘the discloser’. Using purposive sampling, this phenomenological study involves an online survey and in-depth interviews. The findings report the influence of peer disclosure as well as users’ strategies to mitigate privacy issues. This article also calls attention to the challenge of OGD privacy and inadequacies in the law related to privacy protection in the digital domain.

Keywords: facebook, online privacy, other-generated disclosure, social networks sites (SNSs)

Procedia PDF Downloads 233
3231 Investigation of Electrochemical, Morphological, Rheological and Mechanical Properties of Nano-Layered Graphene/Zinc Nanoparticles Incorporated Cold Galvanizing Compound at Reduced Pigment Volume Concentration

Authors: Muhammad Abid

Abstract:

The ultimate goal of this research was to produce a cold galvanizing compound (CGC) at reduced pigment volume concentration (PVC) to protect metallic structures from corrosion. The influence of the partial replacement of Zn dust by nano-layered graphene (NGr) and Zn metal nanoparticles on the electrochemical, morphological, rheological, and mechanical properties of CGC was investigated. EIS was used to explore the electrochemical nature of coatings. The EIS results revealed that the partial replacement of Zn by NGr and Zn nanoparticles enhanced the cathodic protection at reduced PVC (4:1) by improving the electrical contact between the Zn particles and the metal substrate. The Tafel scan was conducted to support the cathodic behaviour of the coatings. The sample formulated solely with Zn at PVC 4:1 was found to be dominated in physical barrier characteristics over cathodic protection. By increasing the concentration of NGr in the formulation, the corrosion potential shifted towards a more negative side. The coating with 1.5% NGr showed the highest galvanic action at reduced PVC. FE-SEM confirmed the interconnected network of conducting particles. The coating without NGr and Zn nanoparticles at PVC 4:1 showed significant gaps between the Zn dust particles. The novelty was evidenced when micrographs showed the consistent distribution of NGr and Zn nanoparticles all over the surface, which acted as a bridge between spherical Zn particles and provided cathodic protection at a reduced PVC. The layered structure of graphene also improved the physical shielding effect of the coatings, which limited the diffusion of electrolytes and corrosion products (oxides/hydroxides) into the coatings, which was reflected by the salt spray test. The rheological properties of coatings showed good liquid/fluid properties. All the coatings showed excellent adhesion but had different strength values. A real-time scratch resistance assessment showed all the coatings had good scratch resistance.

Keywords: protective coatings, anti-corrosion, galvanization, graphene, nanomaterials, polymers

Procedia PDF Downloads 74
3230 Contribution at Dimensioning of the Energy Dissipation Basin

Authors: M. Aouimeur

Abstract:

The environmental risks of a dam and particularly the security in the Valley downstream of it,, is a very complex problem. Integrated management and risk-sharing become more and more indispensable. The definition of "vulnerability “concept can provide assistance to controlling the efficiency of protective measures and the characterization of each valley relatively to the floods's risk. Security can be enhanced through the integrated land management. The social sciences may be associated to the operational systems of civil protection, in particular warning networks. The passage of extreme floods in the site of the dam causes the rupture of this structure and important damages downstream the dam. The river bed could be damaged by erosion if it is not well protected. Also, we may encounter some scouring and flooding problems in the downstream area of the dam. Therefore, the protection of the dam is crucial. It must have an energy dissipator in a specific place. The basin of dissipation plays a very important role for the security of the dam and the protection of the environment against floods downstream the dam. It allows to dissipate the potential energy created by the dam with the passage of the extreme flood on the weir and regularize in a natural manner and with more security the discharge or elevation of the water plan on the crest of the weir, also it permits to reduce the speed of the flow downstream the dam, in order to obtain an identical speed to the river bed. The problem of the dimensioning of a classic dissipation basin is in the determination of the necessary parameters for the dimensioning of this structure. This communication presents a simple graphical method, that is fast and complete, and a methodology which determines the main features of the hydraulic jump, necessary parameters for sizing the classic dissipation basin. This graphical method takes into account the constraints imposed by the reality of the terrain or the practice such as the one related to the topography of the site, the preservation of the environment equilibrium and the technical and economic side.This methodology is to impose the loss of head DH dissipated by the hydraulic jump as a hypothesis (free design) to determine all the others parameters of classical dissipation basin. We can impose the loss of head DH dissipated by the hydraulic jump that is equal to a selected value or to a certain percentage of the upstream total head created by the dam. With the parameter DH+ =(DH/k),(k: critical depth),the elaborate graphical representation allows to find the other parameters, the multiplication of these parameters by k gives the main characteristics of the hydraulic jump, necessary parameters for the dimensioning of classic dissipation basin.This solution is often preferred for sizing the dissipation basins of small concrete dams. The results verification and their comparison to practical data, confirm the validity and reliability of the elaborate graphical method.

Keywords: dimensioning, energy dissipation basin, hydraulic jump, protection of the environment

Procedia PDF Downloads 570
3229 Induction of Cellular and Humoral Immune Responses in BALB/c Mice Immunized With rB2L and rF1L Proteins of Orf Virus Adjuvanted With Alumina Nanoparticles

Authors: Alhaji Modu Bukar, Faez Firdaus Abdullah Jesse, Che Azurahanim Che Abdullah, Mustapha M. Noordin, Mohd-Lila Mohd Azmia

Abstract:

Orf virus (ORFV) is the causative agent of a proliferative skin lesion known as contagious ecthyma in sheep and goats. Currently used live attenuated vaccines against ORFV infection have been reported to cause severe outbreaks in vaccinated animals. In this study, we investigated the immunogenicity of the B2L and F1L proteins of the virus, which are thought to elicit a protective immune response The 6-week-old 50 female mice were divided into 8 groups: seven experimental groups and one control group. Each animal in the experimental group received an initial immunisation with the nanoparticles or proteins coated with the nanoparticles, followed by two booster immunizations with the same products 14 days apart. Ten days after the last booster inoculation, the mice were either humanely killed or lethally challenged with UPM /HSN-2-ORFV at a dose of 106 TCID50/mL in a volume of 50 μl. The spleen was examined for histopathological changes and quantification of T cells by flow cytometry. On the other hand, the degree of protection of mice from the lethal virus was evaluated by lesion size, weight loss, and histopathological examination of skin and liver. The results showed that mice immunised with rB2L alone, rB2L-Al₂O₃-NPs, rB2L/rF1L, and rB2L/rF1L-Al₂O₃-NPs elicited statistically higher levels of anti-rB2L and/or rF1L-specific IgA/IgG and CD4/CD8 cell immune responses than mice in the control groups (p < 0.01). The vaccine candidate did not exhibit severe skin damage after monitoring histopathology, morbidity, and mortality. Overall, the results suggest that recombinant rB2L and rF1L antigens may be useful universal vaccine candidates against ORFV infections.

Keywords: orf virus, antigen nanoparticles, virus, nanoparticles

Procedia PDF Downloads 43
3228 A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted Techniques

Authors: Zhang Xingnan, Huang Jingjia, Feng Yue, Burra Venkata Durga Kumar

Abstract:

This paper proposes a comprehensive approach to mitigate ROP (Return-Oriented Programming) attacks by combining internal operating system protection mechanisms and hardware-assisted techniques. Through extensive literature review, we identify the effectiveness of ASLR (Address Space Layout Randomization) and LBR (Last Branch Record) in preventing ROP attacks. We present a process involving buffer overflow detection, hardware-assisted ROP attack detection, and the use of Turing detection technology to monitor control flow behavior. We envision a specialized tool that views and analyzes the last branch record, compares control flow with a baseline, and outputs differences in natural language. This tool offers a graphical interface, facilitating the prevention and detection of ROP attacks. The proposed approach and tool provide practical solutions for enhancing software security.

Keywords: operating system, ROP attacks, returning-oriented programming attacks, ASLR, LBR, CFI, DEP, code randomization, hardware-assisted CFI

Procedia PDF Downloads 76
3227 Prevalence of Different Poultry Parasitoses in Farms Modern in the North of Ivory Coast

Authors: Coulibaly Fatoumata, Gragnon Biego, Aka N. David, Mbari K. Benjamin, Soro Y. René, Ndiaye Jean-louis

Abstract:

Poultry is nowadays one of the most consumed sources of protein, and its livestock represents one of the few opportunities for savings, investment and protection against risk. It provides income for the most vulnerable sections of society, in particular, women (70%) and children who mainly practice this breeding. A study was conducted in the commune of Korhogo at the level of 52 poultry farms, the objective of which was to know the epidemiological situation of parasitism external and internal poultry in order to contribute to the improvement of the health status of modern poultry farms in the said commune. The method described by OIE (2005), consisting of using the standard formula (n = δ2*p*(1-p) *c /i2), made it possible to calculate the size of the sample. Then, samples of droppings and ectoparasites were taken from the affected farms. After analysis and identification, two (2) species of mallophagous lice, including Menopon gallinae (50%) and Menacanthus stramineus (33%) and a species of bug Cimex lectularius (17%) were highlighted. The laying hens were more infested than broilers. Regarding gastrointestinal parasites, different species (six) have been identified: Trichostrongylus tenuis (17%), Syngamus trachea (19%), Heterakis sp (10%), Ascaridia sp (17%), Raillietina sp (8%) and Eimeria sp (29%). In addition, coccidiosis (Eimeria sp) proved to be the dominant pathology representing 67% of pathologies in broiler farms and 33% in poultry farms. The presence of these parasitoses in these modern farms constitutes a constraint major contribution to productivity and their development In view of all these difficulties, proposals have been made in order to participate in the establishment of a good prophylaxis program (health and medical). In addition, the Ivorian government, with the support of veterinarians, must interfere more in the organization of the health monitoring of traditional chickens and poultry in general through supervision and training in order to preserve public health ( animal, human and environmental health).

Keywords: gastrointestinal parasites, ectoparasites, pathologies, poultry, korhogo.

Procedia PDF Downloads 65
3226 Enhancing Healthcare Data Protection and Security

Authors: Joseph Udofia, Isaac Olufadewa

Abstract:

Everyday, the size of Electronic Health Records data keeps increasing as new patients visit health practitioner and returning patients fulfil their appointments. As these data grow, so is their susceptibility to cyber-attacks from criminals waiting to exploit this data. In the US, the damages for cyberattacks were estimated at $8 billion (2018), $11.5 billion (2019) and $20 billion (2021). These attacks usually involve the exposure of PII. Health data is considered PII, and its exposure carry significant impact. To this end, an enhancement of Health Policy and Standards in relation to data security, especially among patients and their clinical providers, is critical to ensure ethical practices, confidentiality, and trust in the healthcare system. As Clinical accelerators and applications that contain user data are used, it is expedient to have a review and revamp of policies like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Fast Healthcare Interoperability Resources (FHIR), all aimed to ensure data protection and security in healthcare. FHIR caters for healthcare data interoperability, FHIR caters to healthcare data interoperability, as data is being shared across different systems from customers to health insurance and care providers. The astronomical cost of implementation has deterred players in the space from ensuring compliance, leading to susceptibility to data exfiltration and data loss on the security accuracy of protected health information (PHI). Though HIPAA hones in on the security accuracy of protected health information (PHI) and PCI DSS on the security of payment card data, they intersect with the shared goal of protecting sensitive information in line with industry standards. With advancements in tech and the emergence of new technology, it is necessary to revamp these policies to address the complexity and ambiguity, cost barrier, and ever-increasing threats in cyberspace. Healthcare data in the wrong hands is a recipe for disaster, and we must enhance its protection and security to protect the mental health of the current and future generations.

Keywords: cloud security, healthcare, cybersecurity, policy and standard

Procedia PDF Downloads 66
3225 Blocking of Random Chat Apps at Home Routers for Juvenile Protection in South Korea

Authors: Min Jin Kwon, Seung Won Kim, Eui Yeon Kim, Haeyoung Lee

Abstract:

Numerous anonymous chat apps that help people to connect with random strangers have been released in South Korea. However, they become a serious problem for young people since young people often use them for channels of prostitution or sexual violence. Although ISPs in South Korea are responsible for making inappropriate content inaccessible on their networks, they do not block traffic of random chat apps since 1) the use of random chat apps is entirely legal. 2) it is reported that they use HTTP proxy blocking so that non-HTTP traffic cannot be blocked. In this paper, we propose a service model that can block random chat apps at home routers. A service provider manages a blacklist that contains blocked apps’ information. Home routers that subscribe the service filter the traffic of the apps out using deep packet inspection. We have implemented a prototype of the proposed model, including a centralized server providing the blacklist, a Raspberry Pi-based home router that can filter traffic of the apps out, and an Android app used by the router’s administrator to locally customize the blacklist.

Keywords: deep packet inspection, internet filtering, juvenile protection, technical blocking

Procedia PDF Downloads 330