Search results for: protection of victims
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2772

Search results for: protection of victims

1902 Determination of Authorship of the Works Created by the Artificial Intelligence

Authors: Vladimir Sharapaev

Abstract:

This paper seeks to address the question of the authorship of copyrighted works created solely by the artificial intelligence or with the use thereof, and proposes possible interpretational or legislative solutions to the problems arising from the plurality of the persons potentially involved in the ultimate creation of the work and division of tasks among such persons. Being based on the commonly accepted assumption that a copyrighted work can only be created by a natural person, the paper does not deal with the issues regarding the creativity of the artificial intelligence per se (or the lack thereof), and instead focuses on the distribution of the intellectual property rights potentially belonging to the creators of the artificial intelligence and/or the creators of the content used for the formation of the copyrighted work. Moreover, the technical development and rapid improvement of the AI-based programmes, which tend to be reaching even greater independence on a human being, give rise to the question whether the initial creators of the artificial intelligence can be entitled to the intellectual property rights to the works created by such AI at all. As the juridical practice of some European courts and legal doctrine tends to incline to the latter opinion, indicating that the works created by the AI may not at all enjoy copyright protection, the questions of authorships appear to be causing great concerns among the investors in the development of the relevant technology. Although the technology companies dispose with further instruments of protection of their investments, the risk of the works in question not being copyrighted caused by the inconsistency of the case law and a certain research gap constitutes a highly important issue. In order to assess the possible interpretations, the author adopted a doctrinal and analytical approach to the research, systematically analysing the European and Czech copyright laws and case law in some EU jurisdictions. This study aims to contribute to greater legal certainty regarding the issues of the authorship of the AI-created works and define possible clues for further research.

Keywords: artificial intelligence, copyright, authorship, copyrighted work, intellectual property

Procedia PDF Downloads 122
1901 Study of Lamination Quality of Semi-Flexible Solar Modules with Special Textile Materials

Authors: K. Drabczyk, Z. Starowicz, S. Maleczek, P. Zieba

Abstract:

The army, police and fire brigade commonly use dedicated equipment based on special textile materials. The properties of these textiles should ensure human life and health protection. Equally important is the ability to use electronic equipment and this requires access to the source of electricity. Photovoltaic cells integrated with such textiles can be solution for this problem in the most of outdoor circumstances. One idea may be to laminate the cells to textile without changing their properties. The main goal of this work was analyzed lamination quality of special designed semi-flexible solar module with special textile materials as a backsheet. In the first step of investigation, the quality of lamination was determined using device equipped with dynamometer. In this work, the crystalline silicon solar cells 50 x 50 mm and thin chemical tempered glass - 62 x 62 mm and 0.8 mm thick - were used. The obtained results showed the correlation between breaking force and type of textile weave and fiber. The breaking force was in the ranges: 4.5-5.5 N, 15-20 N and 30-33 N depending on the type of wave and fiber type. To verify these observations the microscopic and FTIR analysis of fibers was performed. The studies showed the special textile can be used as a backsheet of semi-flexible solar modules. This work presents a new composition of solar module with special textile layer which, to our best knowledge, has not been published so far. Moreover, the work presents original investigations on adhesion of EVA (ethylene-vinyl acetate) polymer to textile with respect to fiber structure of laminated substrate. This work is realized for the GEKON project (No. GEKON2/O4/268473/23/2016) sponsored by The National Centre for Research and Development and The National Fund for Environmental Protection and Water Management.

Keywords: flexible solar modules, lamination process, solar cells, textile for photovoltaics

Procedia PDF Downloads 358
1900 The Evaluation of the Performance of CaCO3/Polymer Nano-Composites for the Preservation of Historic Limestone Monuments

Authors: Mohammed Badereldien, Rezk Diab, Mohamoud Ali, Ayman Aboelkassem

Abstract:

The stone surfaces of historical architectural heritage in Egypt are under threat from of various environmental factors such as temperature fluctuation, humidity, pollution, and microbes. Due to these factors, the facades of buildings are deteriorating deformation and disfiguration of external decoration and the formation of black accretion also often from the stone works. The aim of this study is to evaluate the effectiveness of CaCO₃ nano-particles as consolidation and protection material for calcareous stone monuments. Selected tests were carried out in order to estimate the superficial consolidating and protective effect of the treatment. When applied the nanoparticles dispersed in the acrylic copolymer; poly ethylmethacrylate (EMA)/methylacrylate (MA) (70/30, respectively) (EMA)/methylacrylate (MA) (70/30, respectively). The synthesis process of CaCO₃ nanoparticles/polymer nano-composite was prepared using in situ emulsion polymerization system. The consolidation and protection were characterized by TEM, while the penetration depth, re-aggregating effects of the deposited phase, and the surface morphology before and after treatment were examined by SEM (Scanning Electron Microscopy). Improvement of the stones' mechanical properties was evaluated by compressive strength tests. Changes in water-interaction properties were evaluated by water absorption capillarity measurements, and colorimetric measurements were used to evaluate the optical appearance. Together the results appear to demonstrate that CaCO₃/polymer nanocomposite is an efficient material for the consolidation of limestone architecture and monuments. As compared with samples treated with pure acrylic copolymer without Calcium carbonate nanoparticles, for example, CaCO₃ nanoparticles are completely compatible, strengthening limestone against thermal aging and improving its mechanical properties.

Keywords: calcium carbonate nanoparticles, consolidation, nanocomposites, calcareous stone, colorimetric measurements, compressive strength

Procedia PDF Downloads 136
1899 Detection of Resistive Faults in Medium Voltage Overhead Feeders

Authors: Mubarak Suliman, Mohamed Hassan

Abstract:

Detection of downed conductors occurring with high fault resistance (reaching kilo-ohms) has always been a challenge, especially in countries like Saudi Arabia, on which earth resistivity is very high in general (reaching more than 1000 Ω-meter). The new approaches for the detection of resistive and high impedance faults are based on the analysis of the fault current waveform. These methods are still under research and development, and they are currently lacking security and dependability. The other approach is communication-based solutions which depends on voltage measurement at the end of overhead line branches and communicate the measured signals to substation feeder relay or a central control center. However, such a detection method is costly and depends on the availability of communication medium and infrastructure. The main objective of this research is to utilize the available standard protection schemes to increase the probability of detection of downed conductors occurring with a low magnitude of fault currents and at the same time avoiding unwanted tripping in healthy conditions and feeders. By specifying the operating region of the faulty feeder, use of tripping curve for discrimination between faulty and healthy feeders, and with proper selection of core balance current transformer (CBCT) and voltage transformers with fewer measurement errors, it is possible to set the pick-up of sensitive earth fault current to minimum values of few amps (i.e., Pick-up Settings = 3 A or 4 A, …) for the detection of earth faults with fault resistance more than (1 - 2 kΩ) for 13.8kV overhead network and more than (3-4) kΩ fault resistance in 33kV overhead network. By implementation of the outcomes of this study, the probability of detection of downed conductors is increased by the utilization of existing schemes (i.e., Directional Sensitive Earth Fault Protection).

Keywords: sensitive earth fault, zero sequence current, grounded system, resistive fault detection, healthy feeder

Procedia PDF Downloads 116
1898 Encapsulated Western Red Cedar (Thuja Plicata) Essential Oil as a Prospective Biopesticide against Phytophthora Pathogens

Authors: Aleksandar M. Radojković, Jovana M. Ćirković, Sanja Z. Perać, Jelena N. Jovanović, Zorica M. Branković, Slobodan D. Milanović, Ivan Lj. Milenković, Jovan N. Dobrosavljević, Nemanja V. Simović, Vanja M. Tadić, Ana R. Žugić, Goran O. Branković

Abstract:

In many parts of the world, various Phytophthora species pose a serious threat to forests and crops. With the rapidly growing international trade in plants and the ongoing impacts of climate change, the harmful effects of plant pathogens of the genus Phytophthora are increasing, damaging the biodiversity and sustainability of forest ecosystems. This genus is one of the most destructive plant pathogens, causing the majority of fine root (66%) and collar rot diseases (90%) of woody plant species worldwide. Eco-friendly biopesticides, based on plant-derived products, such as essential oils (EOs), are one of the promising solutions to this problem. In this study, among three different EOs investigated (Chamaecyparis lawsoniana (A. Murr.) Parl., Thuja plicata Donn ex D.Don and Juniperus communis L.), western red cedar (Thuja plicata) essential oil almost completely inhibited the growth of three Phytophthora species (P. plurivora Jung and Burgess, P. quercina Jung, and P. ×cambivora (Petri) Buisman) during seven days of exposure for the EO concentrations of 0.1% and 0.5% (v/v). To prolong the inhibiting effect, Thuja plicata EO was encapsulated into a biopolymer matrix consisting of a chitosan-gelatin mixture to form a water-in-oil emulsion. This approach allowed the prolonged effect of the essential oil by its slow release from the biopolymer matrix and protection of the active components from atmospheric influences. Thus, it was demonstrated that encapsulated Thuja plicata EO consisting of sustainable bioproducts is efficient in controlling of Phytophthora species and can be considered a means of protection in natural and semi-natural ecosystems.

Keywords: emulsions, essential oils, phytophthora, thuja plicata

Procedia PDF Downloads 93
1897 Carbon Monoxide Poisoning in Children

Authors: Atitallah Sofien, Bouyahia Olfa, Hadj Salah Ibrahim, Ben Saleh Foued, Missaoui Nada, Ben Rabeh Rania, Yahyaoui Salem, Mazigh Sonia, Boukthir Samir

Abstract:

Introduction: Carbon monoxide (CO) poisoning is a common pathology responsible for high morbidity and mortality worldwide. Aim: The purpose of this study was to determine the epidemiological profile of CO poisoning as well as its clinical, paraclinical, therapeutic, and evolutionary aspects. Methods: Our study included observations of CO poisoning in children hospitalized in the pediatric department C of the Children's Hospital in Tunis over a period of 3 years. Results: We have collected 199 cases of CO poisoning in children. The average age was 5.43 years, with a sex ratio of 0.98. The source of CO was inside the home in 73.2% of cases, and it was the gas bath heater in 68.8% of cases. The intoxication was collective in 93.5% of the cases, and it occurred during the month of January in 35.8% of the cases. The clinical manifestations were headaches in 69.5% of cases. The rate of carboxyhemoglobin was pathological in 73.9% of cases. All patients received normobaric oxygen therapy, and only 3.6% of patients had a hyperbaric oxygen therapy session. We did not deplore any case of death in our study. Conclusion: CO poisoning remains a public health problem in Tunisia with high morbidity. The risk of secondary complications, particularly neuropsychiatric, requires clinical and possibly neuroradiological monitoring of these victims.

Keywords: poisoning, carbon monoxide, children, hyperbaric oxygenation

Procedia PDF Downloads 72
1896 Interactive IoT-Blockchain System for Big Data Processing

Authors: Abdallah Al-ZoubI, Mamoun Dmour

Abstract:

The spectrum of IoT devices is becoming widely diversified, entering almost all possible fields and finding applications in industry, health, finance, logistics, education, to name a few. The IoT active endpoint sensors and devices exceeded the 12 billion mark in 2021 and are expected to reach 27 billion in 2025, with over $34 billion in total market value. This sheer rise in numbers and use of IoT devices bring with it considerable concerns regarding data storage, analysis, manipulation and protection. IoT Blockchain-based systems have recently been proposed as a decentralized solution for large-scale data storage and protection. COVID-19 has actually accelerated the desire to utilize IoT devices as it impacted both demand and supply and significantly affected several regions due to logistic reasons such as supply chain interruptions, shortage of shipping containers and port congestion. An IoT-blockchain system is proposed to handle big data generated by a distributed network of sensors and controllers in an interactive manner. The system is designed using the Ethereum platform, which utilizes smart contracts, programmed in solidity to execute and manage data generated by IoT sensors and devices. such as Raspberry Pi 4, Rasbpian, and add-on hardware security modules. The proposed system will run a number of applications hosted by a local machine used to validate transactions. It then sends data to the rest of the network through InterPlanetary File System (IPFS) and Ethereum Swarm, forming a closed IoT ecosystem run by blockchain where a number of distributed IoT devices can communicate and interact, thus forming a closed, controlled environment. A prototype has been deployed with three IoT handling units distributed over a wide geographical space in order to examine its feasibility, performance and costs. Initial results indicated that big IoT data retrieval and storage is feasible and interactivity is possible, provided that certain conditions of cost, speed and thorough put are met.

Keywords: IoT devices, blockchain, Ethereum, big data

Procedia PDF Downloads 150
1895 The Web of Injustice: Untangling Violations of Personality Rights in European International Private Law

Authors: Sara Vora (Hoxha)

Abstract:

Defamation, invasion of privacy, and cyberbullying have all increased in tandem with the growth of the internet. European international private law may struggle to deal with such transgressions if they occur in many jurisdictions. The current study examines how effectively the legal system of European international private law addresses abuses of personality rights in cyberspace. The study starts by discussing how established legal frameworks are being threatened by online personality rights abuses. The article then looks into the rules and regulations of European international private law that are in place to handle overseas lawsuits. This article examines the different elements that courts evaluate when deciding which law to use in a particular case, focusing on the concepts of jurisdiction, choice of law, and recognition and execution of foreign judgements. Next, the research analyses the function of the European Union in preventing and punishing online personality rights abuses. Key pieces of law that control the collecting and processing of personal data on the Internet, including the General Data Protection Regulation (GDPR) and the e-Commerce Directive, are discussed. In addition, this article investigates how the ECtHR handles cases involving the infringement of personal freedoms, including privacy and speech. The article finishes with an assessment of how well the legal framework of European international private law protects individuals' right to privacy online. It draws attention to problems with the present legal structure, such as the inability to enforce international judgements, the inconsistency between national laws, and the necessity for stronger measures to safeguard people' rights online. This paper concludes that while European international private law provides a useful framework for dealing with violations of personality rights online, further harmonisation and stronger enforcement mechanisms are necessary to effectively protect individuals' rights in the digital age.

Keywords: European international private law, personality rights, internet, jurisdiction, cross-border disputes, data protection

Procedia PDF Downloads 76
1894 An Analysis of Institutional Environments on Corporate Social Responsibility Practices in Nigerian Renewable Energy Firms

Authors: Bolanle Deborah Motilewa, E. K. Rowland Worlu, Gbenga Mayowa Agboola, Ayodele Maxwell Olokundun

Abstract:

Several studies have proposed a one-size fit all approach to Corporate Social Responsibility (CSR) practices, such that CSR as it applies to developed countries is adapted to developing countries, ignoring the differing institutional environments (such as the regulative, economic, social and political environments), which affects the profitability and practices of businesses operating in them. CSR as it applies to filling institutional gaps in developing countries, was categorized into four themes: environmental protection, product and service innovation, social innovation and local cluster development. Based on the four themes, the study employed a qualitative research approach through the use of interviews and review of available publications to study the influence of institutional environments on CSR practices engaged in by three renewable energy firms operating in Nigeria. Over the course of three 60-minutes sessions with the top management and selected workers of the firms, four propositions were made: regulatory environment influences environmental protection practice of Nigerian renewable firms, economic environment influences product and service innovation practice of Nigerian renewable energy firms, the social environment impacts on social innovation in Nigerian renewable energy firms, and political environment affects local cluster development practice of Nigerian renewable energy firms. It was also observed that beyond institutional environments, the international exposure of an organization’s managers reflected in their approach to CSR. This finding on the influence of international exposure on CSR practices creates an area for further study. Insights from this paper are set to help policy makers in developing countries, CSR managers, and future researchers.

Keywords: corporate social responsibility, renewable energy firms, institutional environment, social entrepreneurship

Procedia PDF Downloads 292
1893 Application of Pyridine-based Water-soluble Corrosion Inhibitor in Offshore Sweet Oil Pipeline

Authors: M. S. Yalfani, J. Kohzadi, P. Ghadimi, S. Sobhani, M. Ghadimi

Abstract:

The use of oil and water-soluble corrosion inhibitors has been established in Iranian oil and gas production systems for a long time. Imidazoline and its derivatives are being extensively used which are known as conventional corrosion inhibitors. This type of product has shown significant performance and low side effects, so that could monopolize the market of inhibitors in this region. However, the price growth of imidazolines, as well as the development of new lower-cost components with similar or even higher performance than imidazoline, have influenced the exclusive market of imidazoline-based products. During the latest years, pyridine and its derivatives have challenged imidazoline due to their remarkable anticorrosive properties and lower prices as well. Recently, we presented a formulated water-soluble inhibitor based on pyridine - an alkyl pyridine quaternary salt (APQS) - which could successfully pass all lab tests and eventually succeeded in being applied in an offshore sweet oil pipeline. The product was able to achieve high corrosion protection (> 90 %) with the LPR technique at low dosages of 15-25 ppm under severe corrosion conditions. Moreover, the lab test results showed that the APQS molecule is able to form a strong and persistent bond with the metal surface. The product was later nominated to be evaluated through a field trial in an offshore sweet oil pipeline where PH2S < 0.05 psi and CO2 is 6.4 mol%. The three-month trial - extended to six months- resulted in remarkable internal protection obtained by continuous injection of 10 ppm inhibitor, which was as low as 1 mpy measured by both weight loss corrosion coupons and online ER probes. In addition, no side effects, such as tight emulsion and stable foaming, were observed. The residual of the corrosion inhibitor was measured at the end of the pipeline to ensure the full coverage of the inhibitor throughout the pipeline. Eventually, these promising results were able to convince the end user to consider pyridine-based inhibitors as a reliable alternative to imidazoline.

Keywords: corrosion inhibitor, pyridine, sweet oil, pipeline, offshore

Procedia PDF Downloads 15
1892 Security of Database Using Chaotic Systems

Authors: Eman W. Boghdady, A. R. Shehata, M. A. Azem

Abstract:

Database (DB) security demands permitting authorized users and prohibiting non-authorized users and intruders actions on the DB and the objects inside it. Organizations that are running successfully demand the confidentiality of their DBs. They do not allow the unauthorized access to their data/information. They also demand the assurance that their data is protected against any malicious or accidental modification. DB protection and confidentiality are the security concerns. There are four types of controls to obtain the DB protection, those include: access control, information flow control, inference control, and cryptographic. The cryptographic control is considered as the backbone for DB security, it secures the DB by encryption during storage and communications. Current cryptographic techniques are classified into two types: traditional classical cryptography using standard algorithms (DES, AES, IDEA, etc.) and chaos cryptography using continuous (Chau, Rossler, Lorenz, etc.) or discreet (Logistics, Henon, etc.) algorithms. The important characteristics of chaos are its extreme sensitivity to initial conditions of the system. In this paper, DB-security systems based on chaotic algorithms are described. The Pseudo Random Numbers Generators (PRNGs) from the different chaotic algorithms are implemented using Matlab and their statistical properties are evaluated using NIST and other statistical test-suits. Then, these algorithms are used to secure conventional DB (plaintext), where the statistical properties of the ciphertext are also tested. To increase the complexity of the PRNGs and to let pass all the NIST statistical tests, we propose two hybrid PRNGs: one based on two chaotic Logistic maps and another based on two chaotic Henon maps, where each chaotic algorithm is running side-by-side and starting from random independent initial conditions and parameters (encryption keys). The resulted hybrid PRNGs passed the NIST statistical test suit.

Keywords: algorithms and data structure, DB security, encryption, chaotic algorithms, Matlab, NIST

Procedia PDF Downloads 265
1891 Cloud Computing: Deciding Whether It Is Easier or Harder to Defend Against Cyber Attacks

Authors: Emhemed Shaklawoon, Ibrahim Althomali

Abstract:

We propose that we identify different defense mechanisms that were used before the introduction of the cloud and compare if their protection mechanisms are still valuable and to what degree. Note that in order to defend against vulnerability, we must know how this vulnerability is abused in an attack. Only then, we will be able to recognize if it is easier or harder to defend against cyber attacks.

Keywords: cloud computing, privacy, cyber attacks, defend the cloud

Procedia PDF Downloads 423
1890 Women's Cyber Intimate Partner Violence Victimization

Authors: Mylène Fernet, Geneviève Brodeur, Martine Hébert

Abstract:

Background: The growth of information and communication technologies has led to an increase in the prevalence of cyber intimate partner violence among women in early adulthood. However, there is a lack of research addressing the intervention needs of women who have been victims of cyber intimate partner violence. This qualitative study aimed to identify the knowledge, resources, and tools that women require to better respond to such violence. Methodology: Semi-structured individual interviews and four online discussion groups were conducted with 28 Canadian women aged 18 to 29 who had experienced cyber intimate partner violence by a romantic or intimate partner or an ex-partner. The data were analyzed using thematic analysis. Findings: The key elements identified suggest that women need information to help them recognize the signs and varied forms of cyber intimate partner violence, particularly those that are more nuanced and harder to detect. Furthermore, participants emphasized the importance of having access to both online and offline support to aid in their recovery from cyber intimate partner violence. Additionally, the women's narratives also highlighted their need for resources on how to protect themselves from cyber intimate partner violence. Conclusion: Based on the findings from this study, it is essential to develop prevention and intervention strategies for cyber intimate partner violence that address these knowledge gaps, provide support options, and offer prevention tools tailored to adult women.

Keywords: women, cyberviolence, intimate partner violence, prevention strategies

Procedia PDF Downloads 23
1889 A Two Year Follow Up of Sexually Abused Children

Authors: Horesh Reinman Netta

Abstract:

Early research on child sexual abuse (CSA) attempted to assess its possible effects. Researchers found that victims of CSA are prone to a host of emotional disorders, including post-traumatic stress disorder, depression, dissociative disorders, anxiety disorders and suicidality later in life. The study examined the development of symptoms over a two-year period at base line and after six months. Factors including the age at the onset of abuse, the gender of the abused child and academic achievements were also examined. Other variables examined include the complex association among self-disclosure, self-esteem, the child’s attachment and coping styles, and psychological adjustment. The abused child’s domestic environment has been found to have a relevant impact on the psychological outcomes of CSA. The study examined inter-parental conflicts, cohesion in the child’s home, parental attachment styles and psychopathology. To the best of our knowledge, no investigation of this nature has yet been performed. Hence, the study makes a major contribution to research in this field. In addition, a combined examination of abuse characteristics, child characteristics, domestic environment and therapeutic history will facilitate enhanced understanding of the interactions among CSA, mediating factors and psychological outcomes.

Keywords: sexual abuse, follow up, victimization, children

Procedia PDF Downloads 75
1888 Minors and Terrorism: A Discussion about the Recruitment and Resilience

Authors: Marta Maria Aguilar Carceles

Abstract:

This theoretical study argues how terrorism is rising around the world and which are the factors and situations that contribute to this process. Linked to aspects of human development, minors are one of the most vulnerable collectives to be engaged for this purpose. Its special weakness and lower possibility of self-defense makes them more likely to become victims as a result of a brainwashing process. Terrorism is an illicit way to achieve political and social changes and new technologies and available resources make it easier to spread. In this sense, throughout a theoretical revision of different recent and scientific articles, it is evaluated which risk factors can provoke its affiliation and later develop of antisocial and illicit behavior. An example of this group of factors could be the inter-generational continuity between parents and their children, as well as the sociodemographic aspects joined to cultural experiences (i.e. sense of dishonor, frustration, etc.). The assess of this kind of variables must be accompanied by the evaluation of protective factors, because the reasons through one person decides to join to terrorism are inherently idiosyncratic and we can only install mechanisms of prevention knowing those personal characteristics. To sum, both aspects underline the relevance of the internalizing and externalizing personal factors, each of them in one specific direction: a) to increase the possibility of being recruited or follow this type of criminal group by himself, and b) to be able of avoiding the effects and consequences of terrorism thanks to personal and resilient characteristics (resilience).

Keywords: criminality, minors, recruitment, resilience, terrorism

Procedia PDF Downloads 135
1887 The Suffering Other and the Deserving Self; When Humanitarianism Intersects with Individualism and Neo-Liberalism

Authors: Irene Bruna Seu

Abstract:

This paper draws on a three-year research project investigating everyday moral reasoning in relation to donations and prosocial behaviour in the humanitarian context. The analysis focuses on the principle of deservingness by which members of the public decide who and under which conditions to help and illustrates how the speakers engage in ideological dilemmas. The paper focuses on the theme ‘Something for nothing’ to examine how the position of ‘deserving’ and the speaker’s rights and duties in relation to victims of humanitarian crises are negotiated. Discursive analyses of this dilemmatic storyline of deservingness illuminate the cultural and ideological resources buttressing this construction. They also illustrate how humanitarianism intersects and clashes with other ideologies and value systems. The presentation will focus on the role of Individualism underpinned by Neo-liberalism ideology. The data propose that neo-liberal ideology, which endorses self-gratification, materialistic and individualistic ethics play an important role in decisions regarding humanitarian helping. The paper argues for the need for psychological research to engage more actively with the dilemmatic nature of moral reasoning in the humanitarian context, and to contextualize decisions about giving and helping within the socio-cultural and ideological landscape in which the helpers operate.

Keywords: humanitarianism, individualism, ideological dilemmas, discourse, neo-liberalism, prosocial behaviour

Procedia PDF Downloads 215
1886 Microencapsulation for Enhancing the Survival of S. thermophilus and L. bulgaricus during Spray Drying of Sweetened Yoghurt

Authors: Dibyakanta Seth, Hari Niwas Mishra, Sankar Chandra Deka

Abstract:

Microencapsulation is an established method of protecting bacteria from the adverse conditions. An improved extrusion spraying technique was used to encapsulate mixed bacteria culture of S. thermophilus and L. bulgaricus using sodium alginate as the coating material. The effect of nozzle air pressure (200, 300, 400 and 500 kPa), sodium alginate concentration (1%, 1.5%, 2%, 2.5% and 3% w/v), different concentration of calcium chloride (0.1, 0.2, 1 M) and initial cell loads (10⁷, 10⁸, 10⁹ cfu/ml) on the viability of encapsulated bacteria were investigated. With the increase in air pressure the size of microcapsules decreased, however the effect was non-significant. There was no significant difference (p > 0.05) in the viability of encapsulated cells when the concentration of calcium chloride was increased. Increased level of sodium alginate significantly increased the survival ratio of encapsulated bacteria (P < 0.01). Encapsulation with 3% alginate was treated as optimum since a higher concentration of alginate increased the gel strength of the solution and thus was difficult to spray. Under optimal conditions 3% alginate, 10⁹ cfu/ml cell load, 20 min hardening time in 0.1 M CaCl2 and 400 kPa nozzle air pressure, the viability of bacteria cells was maximum compared to the free cells. The microcapsules made at the optimal condition when mixed with yoghurt and subjected to spray drying at 148°C, the survival ratio was 2.48×10⁻¹ for S. thermophilus and 7.26×10⁻¹ for L. bulgaricus. In contrast, the survival ratio of free cells of S. thermophilus and L. bulgaricus were 2.36×10⁻³ and 8.27×10⁻³, respectively. This study showed a decline in viable cells count of about 0.5 log over a period of 7 weeks while there was a decline of about 1 log in cultures which were incorporated as free cells in yoghurt. Microencapsulation provided better protection at higher acidity compared to free cells. This study demonstrated that microencapsulation of yoghurt culture in sodium alginate is an effective technique of protection against extreme drying conditions.

Keywords: extrusion, microencapsulation, spray drying, sweetened yoghurt

Procedia PDF Downloads 253
1885 Impact of Mass Rape on HIV Incidence and Prevalence in Conflict Situations: Mathematical Analysis of the War in Tigray, Ethiopia

Authors: Abdelkadir Muzey Mohammed, Habtu Alemayehu Atsbaha, Yohannes Yirga Kefela, Woldegebriel Assefa Woldegerima, Kiros Tedla Gebrehiwot

Abstract:

The circumstances of war and conflict have long been associated with concerns about heightening HIV infection due to the use of sexual violence and rape as a weapon of war and lack of health services access to the patients with HIV as well as sexual violence and rape victims. This paper examines the impact of war related mass rape on HIV incidence and prevalence in the war ravaged Tigray, Ethiopia. Risk equation model and uncertainty analyses with sampled ranges of parameters were employed using data from WHO, Ethiopian Public Health Institute and Ethiopian Central Statistical Agency was used. Our analysis indicated that the mass rape committed in Tigray could cause an increase of incidence and prevalence by a median of 63.01% and 1.14% respectively. The significant increase in HIV incidence and prevalence due to mass rape demands a special attention including region wide improved surveillance and tracing of rape survivors. Furthermore, HIV prevention and treatment strategies such as delivery of emergency health service, providing pre and post exposure treatments on the basis of human rights should priority of governmental and nongovernmental organizations in a conflict situation.

Keywords: conflict situation, mass rape, HIV, mathematical model, uncertainty analysis

Procedia PDF Downloads 20
1884 Design, Shielding and Infrastructure of an X-Ray Diagnostic Imaging Area

Authors: D. Diaz, C. Guevara, P. Rey

Abstract:

This paper contains information about designing, shielding and protocols building in order to avoid ionizing radiation in X-Rays imaging areas as generated by X-Ray, mammography equipment, computed tomography equipment and digital subtraction angiography equipment, according to global standards. Furthermore, tools and elements about infrastructure to improve protection over patients, physicians and staff involved in a diagnostic imaging area are presented. In addition, technical parameters about each machine and the architecture designs and maps are described.

Keywords: imaging area, X-ray, shielding, dose

Procedia PDF Downloads 449
1883 Flood Prevention Strategy for Reserving Quality Ground Water Considering Future Population Growth in Kabul

Authors: Said Moqeem Sadat, Saito Takahiro, Inuzuka Norikazu, Sugiyama Ikuo

Abstract:

Kabul city is the capital of Afghanistan with a population of about 4.0 million in 2009 and 6.5 million in 2025. It is geographically located in a narrow plain valley along the Kabul River and is surrounded by high mountains. Due to its sharp geological condition, the city has been suffering from floods caused by storm water and snow melting water in the rainy season. Meanwhile, potable water resources are becoming a critical issue as the underground water table is decreasing falling rapidly due to domestic usage, industrial and agricultural activities usage especially in the dry season. This paper focuses on flood water management in Kabul including suburban agricultural area considering not only for flood protection but also: 1. To reserve the quality underground water for the future population growth. 2. To irrigate farming area in dry season using storm water ponds in rainy season. 3. To discharge city contaminated flood water to the downstream safely using existing channels/new pipes. Cost and benefit is considered in this study to find out a suitable flood protection method both in rural area and city center from a view point of 1 to 3 mentioned above. In this analysis, cost mainly consists of lost opportunity to develop lands due to flood ponds in addition to construction and maintenance one including connecting channels for water collecting/discharging. Benefit mainly consists of damage reduction of flood loss due to counter measures (this is corresponding cost) in addition to the contribution to agricultural crops. As far as reservation of the ground water for the future city growth is concerned, future demand and supply are compared in case that the pumping amount is limited by this irrigation system.

Keywords: cost-benefit, hydrological modeling, water management, water quality

Procedia PDF Downloads 271
1882 Valorization and Conservation of Rock Painting and Engravings of Kabylia Region (Algeria)

Authors: Samia Ait Ali Yahia

Abstract:

In Algeria, the most impressive and most known prehistoric art is the painted or engraved rock art which is present with abundance in several regions. The existence of rock art in Great Kabylia region has been known for over sixty years. The main purpose of this research is to show the dangers facing these rock paintings and engravings and what are the arrangements for their protection and recovery. As every vestige destroyed is a part of the world's memory which disappears, some steps have to be taken in order to protect these historical and archaeological heritages.

Keywords: rock paintings and engravings, preservation, valorization, Kabylia

Procedia PDF Downloads 456
1881 Synthesis and Characterization of Heterogeneous Silver Nanoparticles for Protection of Ancient Egyptian Artifacts from Microbial Deterioration

Authors: Mohamed Abd Elfattah Ibraheem Elghrbawy

Abstract:

Biodeterioration of cultural heritage is a complex process which is caused by the interaction of many physical, chemical and biological agents; the growth of microorganisms can cause staining, cracking, powdering, disfigurement and displacement of monuments material, which leads to the permanent loss of monuments material. Organisms causing biodeterioration on monuments have usually been controlled by chemical products (biocides). In order to overcome the impact of biocides on the environment, human health and monument substrates, alternative tools such as antimicrobial agents from natural products can be used for monuments conservation and protection. The problem is how to formulate antibacterial agents with high efficiency and low toxicity. Various types of biodegradable metal nanoparticles (MNPs) have many applications in plant extract delivery. So, Nano-encapsulation of metal and natural antimicrobial agents using polymers such as chitosan increases their efficacy, specificity and targeting ability. Green synthesis and characterization of metal nanoparticles such as silver with natural products extracted from some plants having antimicrobial properties, using the ecofriendly method one pot synthesis. Encapsulation of the new synthesized mixture using some biopolymers such as chitosan nanoparticles. The dispersions and homogeneity of the antimicrobial heterogeneous metal nanoparticles encapsulated by biopolymers will be characterized and confirmed by Fourier Transform Infrared Spectroscopy (FTIR), Transmission Electron Microscopy (TEM), Scanning Electron Microscopy (SEM) and Zeta seizer. The effect of the antimicrobial biopolymer metal nano-formulations on normal human cell lines will be investigated to evaluate the environmental safety of these formulations. The antimicrobial toxic activity of the biopolymeric antimicrobial metal nanoparticles formulations will be will be investigated to evaluate their efficiency towards different pathogenic bacteria and fungi.

Keywords: antimicrobial, biodeterioration, chitosan, cultural heritage, silver

Procedia PDF Downloads 81
1880 Credit Cooperatives: A Factor for Improving the Sustainable Management of Private Forests

Authors: Todor Nickolov Stoyanov

Abstract:

Cooperatives are present in all countries and in almost all sectors, including agriculture, forestry, food, finance, health, marketing, insurance and credit. Strong cooperatives are able to overcome many of the difficulties faced by private owners. Cooperatives use seven principles, including the 'Community Concern" principle, which enables cooperatives to work for the sustainable development of the community. The members of cooperatives may use different systems for generating year-round employment and for receiving sustainable income through performing different forestry activities. Various methods are used during the preparation of the report. These include literature reviews, statistics, secondary data and expert interviews. The members of the cooperatives are benefits exclusively from increasing the efficiency of the various products and from the overall yield of the harvest, and ultimately from achieving better profit through cooperative efforts. Cooperatives also use other types of activities that are an additional opportunity for cooperative income. There are many heterogeneous activities in the production and service sectors of the forest cooperatives under consideration. Some cooperatives serve dairies, distilleries, woodworking enterprises, tourist homes, hotels and motels, shops, ski slopes, sheep breeding, etc. Through the revenue generated by the activity, cooperatives have the opportunity to carry out various environmental and protective activities - recreation, water protection, protection of endangered and endemic species, etc., which in the case of small-scale forests cannot be achieved and the management is not sustainable. The conclusions indicate the results received in the analysis. Cooperative management of forests and forest lands gives higher incomes to individual owners. The management of forests and forest lands through cooperatives helps to carry out different environmental and protective activities. Cooperative forest management provides additional means of subsistence to the owners of poor forest lands. Cooperative management of forests and forest lands support owners to implement the forest management plans and to apply sustainable management of these territories.

Keywords: cooperative, forestry, forest owners, principles of cooperation

Procedia PDF Downloads 245
1879 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks

Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar

Abstract:

Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.

Keywords: mobile operating system, security, privacy, Malware

Procedia PDF Downloads 90
1878 Successful Natural Reproduction of the 'Extinct in the Wild; Yangtze Sturgeon Through Ecological Hydraulics-Based Spawning Habitat Creation

Authors: Hao Du, Xuan Ban, Pengcheng Li, Jinming Wu, Junyi Li

Abstract:

The Yangtze sturgeon, a Class I protected aquatic wildlife species in China, has suffered a rapid decline due to human activities such as dam construction, channel dredging, sand and stone mining, and overfishing. Its natural reproduction ceased by 2000, and it was assessed as ‘extinct in the wild’ by the IUCN in 2022. To save this endangered species, the Chinese government is fully committed to restoring the Yangtze's fishery resources, implementing policies such as the ‘10-year fishing ban’ and the Yangtze River Protection Law. Researchers have established an artificial population tier using limited wild stock and attempted to restore natural reproduction through parental release. Based on ecological hydraulics simulations of historical spawning grounds of the Chinese sturgeon and Yangtze sturgeon in the upper Yangtze River, this study identified flow velocity, substrate, and topography as key environmental factors for sturgeon reproduction. Through six consecutive years of indoor artificial spawning ground simulations, researchers pinpointed critical environmental parameters for Yangtze sturgeon's natural reproduction. Subsequently, they created a spawning habitat in the natural waters of the Jiajiang River, a branch of the Yangtze, successfully inducing natural reproduction of the Yangtze sturgeon for two consecutive years, with a total of 980,000 eggs laid and fertilization rates ranging from 54% to 83%. This breakthrough resolved the 20-year challenge of interrupted natural reproduction of the Yangtze sturgeon. This report systematically introduces research progress on the protection of the Yangtze sturgeon, providing a classic case for the reconstruction of wild populations of critically endangered aquatic animals and offering a reference for global freshwater biodiversity conservation.

Keywords: dam, ecohydraulic conditions, spawning ground, habitat creation, natural reproduction, sturgeon, Yangzte River

Procedia PDF Downloads 8
1877 Psychopathic Disorders and Judges Sentencing: Can Neurosciences Change this Aggravating Factor in a Mitigating Factor?

Authors: Kevin Moustapha

Abstract:

Psychopathy is perceived today as being «the most important concept in the criminal justice system» and as «the most important legal notion of the early 21 th century». The explosion of research related to psychopathy seems to perfectly illustrate this trend. Traditionally, many studies tend to focus on links between insanity defense and psychopathy. That is why our purpose in this article is to analyze psychopathic disorders in the scope of judges sentencing in Canada. Indeed, in every Canadian case related to dangerous offenders, judges must balance between fairness and protection of the individuals rights of the accused and protection of society from dangerous predators who may commit future acts of physical or sexual violence. Increasingly, psychopathic disorders are taking an important part in judge sentencing, especially in Canada. This phenomenon can be illustrated by the high proportion of psychopath offenders incarcerated in North American prisons. Many decisions in Canadians courtrooms seem to point out that psychopathy is often used as a strong argument by the judges to preserve public safety. The fact that psychopathy is often associated with violence, recklessness and recidivism, it could explain why many judges consider psychopathic disorders as an aggravating factor. Generally, the judge reasoning is based on article 753 of Canadian Criminal Code related to dangerous offenders, which is used for individuals who show a pattern of repetitive and persistent aggressive behaviour. However, with cognitive neurosciences, the psychopath’s situation in courtrooms would probably change. Cerebral imaging and news data provided by the neurosciences show that emotional and volitional functions in psychopath’s brains are impaired. Understanding these new issues could enable some judges to recognize psychopathic disorders as a mitigating factor. Two important questions ought to be raised in this article: can exploring psychopaths ‘brains really change the judge sentencing in Canadian courtrooms? If yes, can judges consider psychopathy more as a mitigating factor than an aggravating factor?

Keywords: criminal law, judges sentencing, neurosciences, psychopathy

Procedia PDF Downloads 927
1876 The Effect of Composite Hybridization on the Back Face Deformation of Armor Plates

Authors: Attef Kouadria, Yehya Bouteghrine, Amar Manaa, Tarek Mouats, Djalel Eddine Tria, Hamid Abdelhafid Ghouti

Abstract:

Personal protection systems have been used in several forms for centuries. The need for light-weight composite structures has been in great demand due to their weight and high mechanical properties ratios in comparison to heavy and cumbersome steel plates. In this regard, lighter ceramic plates with a backing plate made of high strength polymeric fibers, mostly aramids, are widely used for protection against ballistic threats. This study aims to improve the ballistic performance of ceramic/composite plates subjected to ballistic impact by reducing the back face deformation (BFD) measured after each test. A new hybridization technique was developed in this investigation to increase the energy absorption capabilities of the backing plates. The hybridization consists of combining different types of aramid fabrics with different linear densities of aramid fibers (Dtex) and areal densities with an epoxy resin to form the backing plate. Therefore, several composite structures architectures were prepared and tested. For better understanding the effect of the hybridization, a serial of tensile, compression, and shear tests were conducted to determine the mechanical properties of the homogeneous composite materials prepared from different fabrics. It was found that the hybridization allows the backing plate to combine between the mechanical properties of the used fabrics. Aramid fabrics with higher Dtex were found to increase the mechanical strength of the backing plate, while those with lower Dtex found to enhance the lateral wave dispersion ratio due to their lower areal density. Therefore, the back face deformation was significantly reduced in comparison to a homogeneous composite plate.

Keywords: aramid fabric, ballistic impact, back face deformation, body armor, composite, mechanical testing

Procedia PDF Downloads 152
1875 A Benchmark System for Testing Medium Voltage Direct Current (MVDC-CB) Robustness Utilizing Real Time Digital Simulation and Hardware-In-Loop Theory

Authors: Ali Kadivar, Kaveh Niayesh

Abstract:

The integration of green energy resources is a major focus, and the role of Medium Voltage Direct Current (MVDC) systems is exponentially expanding. However, the protection of MVDC systems against DC faults is a challenge that can have consequences on reliable and safe grid operation. This challenge reveals the need for MVDC circuit breakers (MVDC CB), which are in infancies of their improvement. Therefore will be a lack of MVDC CBs standards, including thresholds for acceptable power losses and operation speed. To establish a baseline for comparison purposes, a benchmark system for testing future MVDC CBs is vital. The literatures just give the timing sequence of each switch and the emphasis is on the topology, without in-depth study on the control algorithm of DCCB, as the circuit breaker control system is not yet systematic. A digital testing benchmark is designed for the Proof-of-concept of simulation studies using software models. It can validate studies based on real-time digital simulators and Transient Network Analyzer (TNA) models. The proposed experimental setup utilizes data accusation from the accurate sensors installed on the tested MVDC CB and through general purpose input/outputs (GPIO) from the microcontroller and PC Prototype studies in the laboratory-based models utilizing Hardware-in-the-Loop (HIL) equipment connected to real-time digital simulators is achieved. The improved control algorithm of the circuit breaker can reduce the peak fault current and avoid arc resignation, helping the coordination of DCCB in relay protection. Moreover, several research gaps are identified regarding case studies and evaluation approaches.

Keywords: DC circuit breaker, hardware-in-the-loop, real time digital simulation, testing benchmark

Procedia PDF Downloads 81
1874 Chemical Warfare Agent Simulant by Photocatalytic Filtering Reactor: Effect of Operating Parameters

Authors: Youcef Serhane, Abdelkrim Bouzaza, Dominique Wolbert, Aymen Amin Assadi

Abstract:

Throughout history, the use of chemical weapons is not exclusive to combats between army corps; some of these weapons are also found in very targeted intelligence operations (political assassinations), organized crime, and terrorist organizations. To improve the speed of action, important technological devices have been developed in recent years, in particular in the field of protection and decontamination techniques to better protect and neutralize a chemical threat. In order to assess certain protective, decontaminating technologies or to improve medical countermeasures, tests must be conducted. In view of the great toxicity of toxic chemical agents from (real) wars, simulants can be used, chosen according to the desired application. Here, we present an investigation about using a photocatalytic filtering reactor (PFR) for highly contaminated environments containing diethyl sulfide (DES). This target pollutant is used as a simulant of CWA, namely of Yperite (Mustard Gas). The influence of the inlet concentration (until high concentrations of DES (1200 ppmv, i.e., 5 g/m³ of air) has been studied. Also, the conversion rate was monitored under different relative humidity and different flow rates (respiratory flow - standards: ISO / DIS 8996 and NF EN 14387 + A1). In order to understand the efficacity of pollutant neutralization by PFR, a kinetic model based on the Langmuir–Hinshelwood (L–H) approach and taking into account the mass transfer step was developed. This allows us to determine the adsorption and kinetic degradation constants with no influence of mass transfer. The obtained results confirm that this small configuration of reactor presents an extremely promising way for the use of photocatalysis for treatment to deal with highly contaminated environments containing real chemical warfare agents. Also, they can give birth to an individual protection device (an autonomous cartridge for a gas mask).

Keywords: photocatalysis, photocatalytic filtering reactor, diethylsulfide, chemical warfare agents

Procedia PDF Downloads 105
1873 Women Mayors and Management of Spanish Councils: An Empirical Analysis

Authors: Carmen Maria Hernandez-Nicolas, Juan Francisco Martín-Ugedo, Antonio Mínguez-Vera

Abstract:

This paper analyses the influence of gender of the mayors of Spanish local governments on different budget items using a sample of 8,243 town councils between 2002 and 2010 period and 64,361 observations. The system Generalized Method of Moments (GMM) technique was employed to examine this panel data. This powerful methodology allows controlling for the endogenity of the variables and the heterogeneity of the sample. Unlike previous works focused on the study of gender influence on firm decisions, the present work analyzes the influence of the gender of the major in the council’s decisions. Specifically, we examine the differences in financial liabilities, security, protection and social promotion expenses and income items relating to public management. In addition, the study focuses on the Spanish context, which is characterized by the presence of decentralization of public responsibility to a greater extent than in neighboring countries, feeding the debate on the operational efficiency of local government increased with an open debate on the importance of gender in public management. The results show that female mayors tend to have lower expenses in general without significant differences in incomes obtained for men and women majors. We also find that female majors incur fewer financial liabilities, one of the most important problems in the Spanish public sector. However, despite of cutting in the public sector, these councils have higher expenditure on security, protection and social promotion. According to these evidences, the presence of women in politics may serve to improve the councils’ economic situation and it is not only necessary for social justice but for economics efficiency. Besides, in councils with more inhabitants, women mayors are more common, but women who served for a very long time are less common.

Keywords: councils, gender, local budgets, public management, women mayors

Procedia PDF Downloads 401