Search results for: system protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 19288

Search results for: system protection

18418 Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System

Authors: Farheen Tabassum, Shoab Ahmed Khan

Abstract:

The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches.

Keywords: Distributed Denial-of-Service (DDoS), Collaborative Intrusion Detection System (CIDS), Slowloris, OSSIM (Open Source Security Information Management tool), OSSEC HIDS

Procedia PDF Downloads 354
18417 Juvenile Justice System in India: Pre and Post Nirbhaya Case

Authors: Vaibhav Singh Parihar

Abstract:

Incidents of serious offenses being committed by children are increasing day by day thereby becoming a matter of great concern. The involvement of a 17-year-old boy in the incident that took place on 16th December 2012 (most commonly known as ‘Nirbhaya Case’)wherein a 23-year-old girl was brutally gang-raped and thrown out of the moving bus, took the entire nation by shock. Previously, the legislation dealing with juvenile delinquency in India considered a child to be juvenile if he/she was below the age of 18 years. As a consequence, the accused who was just six months short of attaining the age of 18 years was convicted for only three years. The primary objective of the study is to understand the gravity as to why the need for distinguishing a child and juvenile arose in this time and to what extent legislations are successful in this regard. It initially explains the history and evolution of juvenile legislation in India and the provisions contained in the Indian Constitution. It then goes on to explain the causes of juvenile delinquency in India. Further, the study focuses on the latest trends that have developed in juvenile delinquency, explaining how the Nirbhaya Case led to the amendments made to the Juvenile Justice Act, 2010. Also, it focuses on the Child Rights and Child Protection and the stand taken by the National Human Rights Commission and the international community. An attempt has been made to settle the debate as to whether the juvenile justice system in India is reformative or punitive. The need for amendment in the Juvenile Justice Act is also highlighted. The outcome of the study suggests that the legislation relating to juvenile delinquency have not been able to achieve the desired results. The age determination method in our system has been given paramount importance. The maximum punishment prescribed, even for heinous crimes, is only three years. Also, the reformative style of punishment is not adequate and more emphasis should be laid on penalization. Finally, the author concludes that the legislation has failed at creating a deterrent effect. It is suggested to strengthen the role of government authorities and to sensitize people in this regard to increase community participation. A non-doctrinal and analytical approach has been adopted and secondary sources of data have been relied upon by the author for conducting the research for the study.

Keywords: child, delinquency, juvenile, Nirbhaya case

Procedia PDF Downloads 183
18416 Study on Ecological Water Demand Evaluation of Typical Mountainous Rivers in Zhejiang Province: Taking Kaihua River as an Example

Authors: Kaiping Xu, Aiju You, Lei Hua

Abstract:

In view of the ecological environmental problems and protection needs of mountainous rivers in Zhejiang province, a suitable ecological water demand evaluation system was established based on investigation and monitoring. Taking the Kaihua river as an example, the research on ecological water demand and the current situation evaluation were carried out. The main types of ecological water demand in Majin River are basic ecological flow and lake wetland outside the river, and instream flow and water demands for water quality in Zhongcun river. In the wet season, each ecological water demand is 18.05m3/s and 2.56m3 / s, and in the dry season is 3.00m3/s and 0.61m3/s. Three indexes of flow, duration and occurrence time are used to evaluate the ecological water demand. The degree of ecological water demand in the past three years is low level of satisfaction. Meanwhile, the existing problems are analyzed, and put forward reasonable and operable safeguards and suggestions.

Keywords: Zhejiang province, mountainous river, ecological water demand, Kaihua river, evaluation

Procedia PDF Downloads 240
18415 Monitoring and Evaluation of the Distributed Agricultural Machinery of the Department of Agriculture Using a Web-Based Information System with a Short Messaging Service Technology

Authors: Jimmy L. Caldoza, Erlito M. Albina

Abstract:

Information Systems are increasingly being used to monitor and assess government projects as well as improve transparency and combat corruption. With reference to existing information systems relevant to monitoring and evaluation systems adopted by various government agencies from other countries, this research paper aims to help the Philippine government, particularly the Department of Agriculture, in assessing the impact of their programs and projects on their target beneficiaries through the development of the web-based Monitoring and Evaluation Information System with the application of a short messaging system (sms) technology.

Keywords: monitoring and evaluation system, web-based information system, short messaging system technology, database structure and management

Procedia PDF Downloads 147
18414 Evaluation of Deformable Boundary Condition Using Finite Element Method and Impact Test for Steel Tubes

Authors: Abed Ahmed, Mehrdad Asadi, Jennifer Martay

Abstract:

Stainless steel pipelines are crucial components to transportation and storage in the oil and gas industry. However, the rise of random attacks and vandalism on these pipes for their valuable transport has led to more security and protection for incoming surface impacts. These surface impacts can lead to large global deformations of the pipe and place the pipe under strain, causing the eventual failure of the pipeline. Therefore, understanding how these surface impact loads affect the pipes is vital to improving the pipes’ security and protection. In this study, experimental test and finite element analysis (FEA) have been carried out on EN3B stainless steel specimens to study the impact behaviour. Low velocity impact tests at 9 m/s with 16 kg dome impactor was used to simulate for high momentum impact for localised failure. FEA models of clamped and deformable boundaries were modelled to study the effect of the boundaries on the pipes impact behaviour on its impact resistance, using experimental and FEA approach. Comparison of experimental and FE simulation shows good correlation to the deformable boundaries in order to validate the robustness of the FE model to be implemented in pipe models with complex anisotropic structure.

Keywords: dynamic impact, deformable boundary conditions, finite element modelling, LS-DYNA, stainless steel pipe

Procedia PDF Downloads 149
18413 Performance of Copper Coil Heat Exchangers for Heating Greenhouses: An ‎Experimental and Theoretical Investigation

Authors: Ilham ihoume, Rachid Tadili, Nora Arbaoui

Abstract:

This study examines the manner in which a solar copper coil heating system performs in a North-South-oriented greenhouse environment. In order to retain heat during the day and release it back ‎into the greenhouse environment at night, this system relies on the circulation of water in a closed ‎loop under the roof of the greenhouse. Experimental research ‎was conducted to compare the results in two identical greenhouses. The first one has a heating system, whilst the second one ‎has not and is regarded as a control. We determined the mass of the heat transfer fluid, which ‎makes up the storage system, needed to heat the greenhouse during the night to be equivalent to ‎‎689 Kg using the heat balance of the greenhouse equipped with a heating system. The findings ‎demonstrated that when compared to a controlled greenhouse without a heating system, the climatic ‎conditions within the experimental greenhouse were greatly enhanced by the solar heating system. ‎‎

Keywords: renewable energy, storage, enviromental impact, heating, agricultural greenhouse

Procedia PDF Downloads 78
18412 Developing Fuzzy Logic Model for Reliability Estimation: Case Study

Authors: Soroor K. H. Al-Khafaji, Manal Mohammad Abed

Abstract:

The research aim of this paper is to evaluate the reliability of a complex engineering system and to design a fuzzy model for the reliability estimation. The designed model has been applied on Vegetable Oil Purification System (neutralization system) to help the specialist user based on the concept of FMEA (Failure Mode and Effect Analysis) to estimate the reliability of the repairable system at the vegetable oil industry. The fuzzy model has been used to predict the system reliability for a future time period, depending on a historical database for the two past years. The model can help to specify the system malfunctions and to predict its reliability during a future period in more accurate and reasonable results compared with the results obtained by the traditional method of reliability estimation.

Keywords: fuzzy logic, reliability, repairable systems, FMEA

Procedia PDF Downloads 614
18411 Improve Divers Tracking and Classification in Sonar Images Using Robust Diver Wake Detection Algorithm

Authors: Mohammad Tarek Al Muallim, Ozhan Duzenli, Ceyhun Ilguy

Abstract:

Harbor protection systems are so important. The need for automatic protection systems has increased over the last years. Diver detection active sonar has great significance. It used to detect underwater threats such as divers and autonomous underwater vehicle. To automatically detect such threats the sonar image is processed by algorithms. These algorithms used to detect, track and classify of underwater objects. In this work, divers tracking and classification algorithm is improved be proposing a robust wake detection method. To detect objects the sonar images is normalized then segmented based on fixed threshold. Next, the centroids of the segments are found and clustered based on distance metric. Then to track the objects linear Kalman filter is applied. To reduce effect of noise and creation of false tracks, the Kalman tracker is fine tuned. The tuning is done based on our active sonar specifications. After the tracks are initialed and updated they are subjected to a filtering stage to eliminate the noisy and unstable tracks. Also to eliminate object with a speed out of the diver speed range such as buoys and fast boats. Afterwards the result tracks are subjected to a classification stage to deiced the type of the object been tracked. Here the classification stage is to deice wither if the tracked object is an open circuit diver or a close circuit diver. At the classification stage, a small area around the object is extracted and a novel wake detection method is applied. The morphological features of the object with his wake is extracted. We used support vector machine to find the best classifier. The sonar training images and the test images are collected by ARMELSAN Defense Technologies Company using the portable diver detection sonar ARAS-2023. After applying the algorithm to the test sonar data, we get fine and stable tracks of the divers. The total classification accuracy achieved with the diver type is 97%.

Keywords: harbor protection, diver detection, active sonar, wake detection, diver classification

Procedia PDF Downloads 238
18410 A Strategic Performance Control System for Municipal Organization

Authors: Emin Gundogar, Aysegul Yilmaz

Abstract:

Strategic performance control is a significant procedure in management. There are various methods to improve this procedure. This study introduces an information system that is developed to score performance for municipal management. The application of the system is clarified by exemplifying municipal processes.

Keywords: management information system, municipal management, performance control

Procedia PDF Downloads 476
18409 Biosignal Measurement System Based on Ultra-Wide Band Human Body Communication

Authors: Jonghoon Kim, Gilwon Yoon

Abstract:

A wrist-band type biosignal measurement system and its data transfer through human body communication (HBC) were investigated. An HBC method based on pulses of ultra-wide band instead of using frequency or amplitude modulations was studied and implemented since the system became very compact and it was more suited for personal or mobile health monitoring. Our system measured photo-plethysmogram (PPG) and measured PPG signals were transmitted through a finger to a monitoring PC system. The device was compact and low-power consuming. HBC communication has very strong security measures since it does not use wireless network. Furthermore, biosignal monitoring system becomes handy because it does not need to have wire connections.

Keywords: biosignal, human body communication, mobile health, PPG, ultrawide band

Procedia PDF Downloads 476
18408 The Comparative Analysis on Pre-Trial in Relation to the Reform of Pre-Trial in Indonesian Criminal Procedural Code

Authors: Muhammad Fatahillah Akbar

Abstract:

Criminal Procedural Law is established to protect the society from the abuse of authority. To achieve that purpose, the criminal procedural law shall be established in accordance with the laws of human right and the protection of the society. One of the mechanisms to protect human rights and to ensure the compliance of authorities in criminal procedural law is pre-trial mechanism. In many countries, there are various mechanisms of pre-trial. In the recent cases in Indonesia, pre-trial has been an interesting issue. The issue is also addressed by the Constitutional Court Decision Number 21/PUU-XII/2014 which enhance the competence of pre-trial which includes the suspect determination and the legality of seizure and search. Before that decision, some pre-trial decisions have made landmark decision by enhancing the competence of pre-trial, such as the suspect determination case in Budi Gunawan Case and legality of the investigation in Hadi Purnomo Case. These pre-trial cases occurred because the society needs protection even though it is not provided by written legislations, in this matter, The Indonesian Criminal Procedural Code (KUHAP). For instance, a person can be a suspect for unlimited time because the Criminal Procedural Code does not regulate the limit of investigation, so the suspect enactment shall be able to be challenged to protect human rights. Before the Constitutional Court Decision Suspect Determination cannot be challenged so that the society is not fully protected. The Constitutional Court Decision has provided more protections. Nowadays, investigators shall be more careful in conducting the investigation. However, those decisions, including the Constitutional Court Decision are not sufficient for society to be protected by abuse of authority. For example, on 7 March 2017, a single judge, in a Pre-Trial, at the Surabaya District Court, decided that the investigation was unlawful and shall be terminated. This is not regulated according to the Code and also any decisions in pre-trial. It can be seen that the reform of pre-trial is necessary. Hence, this paper aims to examine how pre-trial shall be developed in the future to provide wide access for society to have social justice in criminal justice system. The question will be answered by normative, historical, and comparative approaches. Firstly, the paper will examine the history of pre-trial in Indonesia and also landmark decisions on pre-trial. Then, the lessons learned from other countries regarding to the pre-trial mechanism will be elaborated to show how pre-trial shall be developed and what the competences of a pre-trial are. The focus of all discussions shall be on how the society is protected and provided access to legally complain to the authority. At the end of the paper, the recommendation to reform the pre-trial mechanism will be suggested.

Keywords: pre-trial, criminal procedural law, society

Procedia PDF Downloads 167
18407 Protection Not Punishment: Use of Electronic Monitoring to Reduce the Risk of Cross-Border Parental Child Abduction

Authors: Nazia Yaqub

Abstract:

Globally, the number of cases of international parental child abduction has remained consistent in the past decade despite the legal provision designed to prevent and deter abduction, and so it appears the current legal approach to prevent abduction is lacking. Reflecting on the findings of an empirical study conducted by the author between 2017-19 on parental abduction from the UK, the article considers a solution to the predicament of protecting children at risk of abduction through electronic monitoring. The electronic monitoring of children has negative connotations, particularly in its use in the criminal justice system, yet in the context of family law proceedings, the article considers whether electronic monitoring could serve a protective rather than a punitive purpose. The article reflects on the use of electronic monitoring in parental abduction cases by the Family Courts and examines the ethical considerations of the proposal, drawing on the rights found in the European Convention on Human Rights and the UN Convention on the Rights of the Child.

Keywords: law, parental child abduction, electronic monitoring, legal solutions

Procedia PDF Downloads 67
18406 Valorization of Sawdust for the Treatment of Purified Water for Irrigation

Authors: Dalila Oulhaci, Mohammed Zahaf

Abstract:

The watering technique is essential to maintain a moist perimeter around the roots of the crop. This is the case with topical watering, where the soil around the root system can be kept permanently moist between the two extremes of water content. Moreover, one of the oldest methods used since Roman times throughout North Africa and the Near East was based on the repeated pouring of water into porous earthen vessels buried in the ground. In this context, these two techniques have been combined by replacing the earthen vase with plastic bottles filled with sand which release water through their perforated walls into the surrounding soil. The objective of this work is to first determine the purifying power of the activated sludge treatment plant of Toggourt and then that of the bottled Sawdust filter. For the station, the BOD purification rate was (96.5%), the COD purification rate was (87%) and suspended solids (90%). For the bottle, the BOD removal rate was (35%), and COD removal rate was (12.58%). This work falls within the framework of water saving, sustainable development and environmental protection, and also within the framework of agriculture.

Keywords: wasterwater, sawdust, purification, irrigation, touggourt (Algeria)

Procedia PDF Downloads 85
18405 Effect of Integrity of the Earthing System on the Rise of Earth Potential

Authors: N. Ullah, A. Haddad, F. Van Der Linde

Abstract:

This paper investigates the effects of breaks in bonds, breaks in the earthing system and breaks in earth wire on the rise of the earth potential (EPR) in a substation and at the transmission tower bases using various models of an L6 tower. Different approaches were adopted to examine the integrity of the earthing system and the terminal towers. These effects were investigated to see the associated difference in the EPR magnitudes with respect to a healthy system at various locations. Comparisons of the computed EPR magnitudes were then made between the healthy and unhealthy system to detect any difference. The studies were conducted at power frequency for a uniform soil with different soil resistivities. It was found that full breaks in the double bond of the terminal towers increase the EPR significantly at the fault location, while they reduce EPR at the terminal tower bases. A fault on the isolated section of the grid can result in EPR values up to 8 times of those on a healthy system at higher soil resistivities, provided that the extended earthing system stays connected to the grid.

Keywords: bonding, earthing, EPR, integrity, system

Procedia PDF Downloads 328
18404 Security Features for Remote Healthcare System: A Feasibility Study

Authors: Tamil Chelvi Vadivelu, Nurazean Maarop, Rasimah Che Yusoff, Farhana Aini Saludin

Abstract:

Implementing a remote healthcare system needs to consider many security features. Therefore, before any deployment of the remote healthcare system, a feasibility study from the security perspective is crucial. Remote healthcare system using WBAN technology has been used in other countries for medical purposes but in Malaysia, such projects are still not yet implemented. This study was conducted qualitatively. The interview results involving five healthcare practitioners are further elaborated. The study has addressed four important security features in order to incorporate remote healthcare system using WBAN in Malaysian government hospitals.

Keywords: remote healthcare, IT security, security features, wireless sensor application

Procedia PDF Downloads 305
18403 Flood Planning Based on Risk Optimization: A Case Study in Phan-Calo River Basin in Vinh Phuc Province, Vietnam

Authors: Nguyen Quang Kim, Nguyen Thu Hien, Nguyen Thien Dung

Abstract:

Flood disasters are increasing worldwide in both frequency and magnitude. Every year in Vietnam, flood causes great damage to people, property, and environmental degradation. The flood risk management policy in Vietnam is currently updated. The planning of flood mitigation strategies is reviewed to make a decision how to reach sustainable flood risk reduction. This paper discusses the basic approach where the measures of flood protection are chosen based on minimizing the present value of expected monetary expenses, total residual risk and costs of flood control measures. This approach will be proposed and demonstrated in a case study for flood risk management in Vinh Phuc province of Vietnam. Research also proposed the framework to find a solution of optimal protection level and optimal measures of the flood. It provides an explicit economic basis for flood risk management plans and interactive effects of options for flood damage reduction. The results of the case study are demonstrated and discussed which would provide the processing of actions helped decision makers to choose flood risk reduction investment options.

Keywords: drainage plan, flood planning, flood risk, residual risk, risk optimization

Procedia PDF Downloads 242
18402 Asylum Seekers' Legal Limbo under the Migrant Protection Protocols: Implications from a US-Mexico Border Project

Authors: Tania M. Guerrero, Ileana Cortes Santiago

Abstract:

Estamos Unidos Asylum Project has served more than 2,000 asylum seekers and migrants who are under the Migrant Protection Protocols (MPP) policy in Ciudad Juarez, Mexico. The U.S. policy, implemented in January 2019, has stripped asylum seekers of their rights—forcing people fleeing violence and discrimination to wait in similar or worse conditions from which they fled and navigate their entire asylum process in a different country. Several civil rights groups, including the American Civil Liberties Union (ACLU), challenged MPP in U.S. federal courts in February 2019, arguing a violation of international U.S. obligations towards refugees and asylum-seekers under the 1951 Refugee Convention and the Refugee Act of 1980 in regards to the non-refoulement principle. MPP has influenced Mexico's policies, enforcement, and prioritization of the presence of asylum seekers and migrants; it has also altered the way international non-governmental organizations work at the Mexican Northern border. Estamos Unidos is a project situated in a logistical conundrum, as it provides needed legal services to a population in a legal and humanitarian void, i.e., a liminal space. The liminal space occupied by asylum seekers living under MPP is one that, in today's world, should not be overlooked; it dilutes asylum law and U.S. commitments to international protections. This paper provides analysis of and broader implications from a project whose main goal is to uphold the protections of asylum seekers and international refugee law. The authors identified and analyzed four critical points based on field work conducted since August 2019: (1) strategic coalition building with international, local, and national organizations; (2) brokering between domestic and international contexts and critical legal constraints; (3) flexibility to sudden policy changes and the diverse needs of the multiethnic groups of migrants and asylum seekers served by the project; and (4) the complexity of providing legal assistance to asylum seekers who are survivors of trauma. The authors concur with scholarship when highlighting the erosion of protections of asylum seekers and migrants as a dangerous and unjust global phenomenon.

Keywords: asylum, human rights, migrant protection protocols, refugees law

Procedia PDF Downloads 133
18401 Always Keep in Control: The Pattern of TV Policy Changes in China

Authors: Shan Jiang

Abstract:

China is a country with a distinct cultural system. The Chinese Communist Party (CCP) is the central factor for everything, which naturally includes culture. There are quite a lot of cultural policies in China. The same goes for TV dramas. This paper traces the evolution of Chinese TV drama policy since 1986, examines the realistic situation behind the changes, and explores the structure and role of the government in shaping the process. Using historical documents and media reports, it first analyzes four key time nodes: 1986, 2003, 2012, and 2022. It shows how the policy shifts from restricting private production to opening up to public participation, from imposing one censorship to another, and from promoting some content to restricting some other area. It finds that the policy process is not simply rectilinear but rather wandering between deregulation and strengthening control. Secondly, it divides the policies into "basic" policies that establish the overall layout and more refined "strategic" policies that respond to more refined needs. It argues that the "basic" policy process is caused by China's political, economic, and cultural system reform, and then the "strategic" policy process is affected by more environmental factors, such as the government's follow-up development strategy, industrial development, technological innovation, and specific situations. Thirdly, it analysis the main body of the 104 policies from 2000 to 2021 and puts these subjects into China's power structure and cultural system, revealing that the policy issuers are all under the highest leadership of the Chinese Central Committee. Further, the paper challenges the typical description of Chinese cultural policy, which focuses on state control exclusively, identifies the forces within and outside the system that participate in or affect the policy-making process, and reveals the inter-subjective mechanism of policy change. In conclusion, the paper reveals that China's TV drama policy is under the unified leadership of the Party and the government, which greatly guarantees the consistency of the overall direction of cultural policy, that is, the right to speak firmly in the hands. The forces within the system can sometimes promote policy changes due to common development needs. However, folk discourse is only the object of control: when it breeds a certain amount of industrial space, the government will strengthen control over this space, suppress its potential "adverse effects", and instead provide protection and create conditions for the cultivation and growth of its mainstream discourse. However, the policy combination of basic policy and strategic policy, while having a strong effect and emergency capacity, also inhibits the innovation and diversification of the TV drama market. However, the state's substantial regulation will continue to exist in the future.

Keywords: TV Policy, China, policy process, cultural policy, culture management

Procedia PDF Downloads 91
18400 Reshaping of Indian Education System with the Help of Multi-Media: Promises and Pitfalls

Authors: Geetu Gahlawat

Abstract:

The education system accustomed information on daily basis in term of variety i.e Multimedia channel. This can create a challenge to pedagogue to get hold on learner. Multimedia enhance the education system with its technology. Educators deliver their content effectively and beyond any limit through multimedia elements on another side it gives easy learning to learners and they are able to get their goals fast. This paper gives an overview of how multimedia reshape the Indian education system with its promises and pitfalls.

Keywords: multimedia, technology, techniques, development, pedagogy

Procedia PDF Downloads 281
18399 The Urgency of ASEAN Human Rights Court Establishment to Protect Human Rights in Southeast Asia

Authors: Tareq M. Aziz Elven

Abstract:

The issue of Human Rights enforcement in Southeast Asia has become the serious problem and attract the attention of international community. Principally, Association of Southeast Asian Nations (ASEAN) has mentioned the Human Rights as one of the focus and be a part of the ASEAN Charter in 2008. It was followed by the establishment of ASEAN Inter-Governmental Commission on Human Rights (AICHR). AICHR is the commission of Human Rights enforcement in Southeast Asia which has a duty, function, and an authority to conduct dissemination and protection of Human Rights. In the end of 2016, however, the function of protection mandated to AICHR have not achieved yet. It can be proved by several cases of Human Rights violation which still exist and have not settled yet. One of case which attracts the public attention recently is human rights violation towards Rohingya in Myanmar. Using the juridical-normative method, the research aims to examine the urgency of Human Rights court establishment in Southeast Asia region which able to issue the decision that binds the ASEAN members or the violating parties. The data shows that ASEAN needs to establish a regional court which intended to settle the Human Rights violations in ASEAN region. Furthermore, the research also highlights three strong factors should be settled by ASEAN for establishing human rights court i.e. the significant distinction of democracy and human rights development among the members, the strong implementation of non-intervention principle, and the financial matter to sustain the court.

Keywords: AICHR, ASEAN, human rights, human rights court

Procedia PDF Downloads 346
18398 Income Analysis of Beef Cattle Breeders for Traditional Profit-Sharing System, Tesang, in South Sulawesi Province

Authors: Sitti Nurani Sirajuddin, Muh. Aminawar, Siti Nurlaelah, Amidah Amrawaty

Abstract:

This study aimed to determine the income of beef cattle breeders from the traditional profit-sharing system named Tesang. This study was conducted in the province of South Sulawesi start from April to July 2014, used quantitative methods and data analysis is of income. The population is all beef cattle breeders who perform for the traditional profit-sharing system (Tesang) in Barru Regency and Bone Regency, province of South Sulawesi. Samples are beef cattle breeders who breeding the cattle with the traditional profit-sharing system (Tesang) in Barru Regency and Bone Regency using breeding system and cattle enlargement system (expense) by fifty breeders. The results showed beef cattle breeder’s income from the profit-sharing system (Tesang) where enlargement system (expense) at6th month maintenance periods higher than the profit-sharing system (Tesang) with using breeding the cattle.

Keywords: income, beef cattle, profit-sharing system, Teseng

Procedia PDF Downloads 284
18397 Intelligent Adaptive Learning in a Changing Environment

Authors: G. Valentis, Q. Berthelot

Abstract:

Nowadays the trend to develop ever more intelligent and autonomous systems often takes its inspiration in the living beings on Earth. Some simple isolated systems are able, once brought together, to form a strong and reliable system. When trying to adapt the idea to man-made systems it is not possible to include in their program everything the system may encounter during its life cycle. It is, thus, necessary to make the system able to take decisions based on other criteria such as its past experience, i.e. to make the system learn on its own. However, at some point the acquired knowledge depends also on environment. So the question is: if system environment is modified, how could the system respond to it quickly and appropriately enough? Here, starting from reinforcement learning to rate its decisions, and using adaptive learning algorithms for gain and loss reward, the system is made able to respond to changing environment and to adapt its knowledge as time passes. Application is made to a robot finding an exit in a labyrinth.

Keywords: reinforcement learning, neural network, autonomous systems, adaptive learning, changing environment

Procedia PDF Downloads 424
18396 Seismic Fragility of Base-Isolated Multi-Story Piping System in Critical Facilities

Authors: Bu Seog Ju, Ho Young Son, Yong Hee Ryu

Abstract:

This study is focused on the evaluation of seismic fragility of multi-story piping system installed in critical structures, isolated with triple friction pendulum bearing. The concept of this study is to isolate the critical building structure as well as nonstructural component, especially piping system in order to mitigate the earthquake damage and achieve the reliable seismic design. Then, the building system and multi-story piping system was modeled in OpenSees. In particular, the triple friction pendulum isolator was accounted for the vertical and horizontal coupling behavior in the building system subjected to seismic ground motions. Consequently, in order to generate the seismic fragility of base-isolated multi-story piping system, 21 selected seismic ground motions were carried out, by using Monte Carlo Simulation accounted for the uncertainties in demand. Finally, the system-level fragility curves corresponding to the limit state of the piping system was conducted at each T-joint system, which was commonly failure points in piping systems during and after an earthquake. Additionally, the system-level fragilities were performed to the first floor and second floor level in critical structures.

Keywords: fragility, friction pendulum bearing, nonstructural component, seismic

Procedia PDF Downloads 150
18395 Mapping the Intrinsic Vulnerability of the Quaternary Aquifer of the Eastern Mitidja (Northern Algeria)

Authors: Abida Haddouche, Ahmed Chrif Toubal

Abstract:

The Neogene basin of the Eastern Mitidja, object of the study area, represents potential water resources and especially groundwater reserves. This water is an important economic; this resource is highly sensitive which need protection and preservation. Unfortunately, these waters are exposed to various forms of pollution, whether from urban, agricultural, industrial or merely accidental. This pollution is a permanent risk of limiting resource. In this context, the work aims to evaluate the intrinsic vulnerability of the aquifer to protect and preserve the quality of this resource. It will focus on the disposal of water and land managers a cartographic document accessible to locate the areas where the water has a high vulnerability. Vulnerability mapping of the Easter Mitidja quaternary aquifer is performed by applying three methods (DRASTIC, DRIST, and GOD). Comparison and validation results show that the DRASTIC method is the most suitable method for aquifer vulnerability of the study area.

Keywords: Aquifer of Mitidja, DRASTIC method, geographic information system (GIS), vulnerability mapping

Procedia PDF Downloads 384
18394 The Gaps of Environmental Criminal Liability in Armed Conflicts and Its Consequences: An Analysis under Stockholm, Geneva and Rome

Authors: Vivian Caroline Koerbel Dombrowski

Abstract:

Armed conflicts have always meant the ultimate expression of power and at the same time, lack of understanding among nations. Cities were destroyed, people were killed, assets were devastated. But these are not only the loss of a war: the environmental damage comes to be considered immeasurable losses in the short, medium and long term. And this is because no nation wants to bear that cost. They invest in military equipment, training, technical equipment but the environmental account yet finds gaps in international law. Considering such a generalization in rights protection, many nations are at imminent danger in a conflict if the water will be used as a mass weapon, especially if we consider important rivers such as Jordan, Euphrates and Nile. The top three international documents were analyzed on the subject: the Stockholm Convention (1972), Additional Protocol I to the Geneva Convention (1977) and the Rome Statute (1998). Indeed, some references are researched in doctrine, especially scientific articles, to substantiate with consistent data about the extent of the damage, historical factors and decisions which have been successful. However, due to the lack of literature about this subject, the research tends to be exhaustive. From the study of the indicated material, it was noted that international law - humanitarian and environmental - calls in some of its instruments the environmental protection in war conflicts, but they are generic and vague rules that do not define exactly what is the environmental damage , nor sets standards for measure them. Taking into account the mains conflicts of the century XX: World War II, the Vietnam War and the Gulf War, one must realize that the environmental consequences were of great rides - never deactivated landmines, buried nuclear weapons, armaments and munitions destroyed in the soil, chemical weapons, not to mention the effects of some weapons when used (uranium, agent Orange, etc). Extending the search for more recent conflicts such as Afghanistan, it is proven that the effects on health of the civilian population were catastrophic: cancer, birth defects, and deformities in newborns. There are few reports of nations that, somehow, repaired the damage caused to the environment as a result of the conflict. In the pitch of contemporary conflicts, many nations fear that water resources are used as weapons of mass destruction, because once contaminated - directly or indirectly - can become a means of disguised genocide side effect of military objective. In conclusion, it appears that the main international treaties governing the subject mention the concern for environmental protection, however leave the normative specifications vacancies necessary to effectively there is a prevention of environmental damage in armed conflict and, should they occur, the repair of the same. Still, it appears that there is no protection mechanism to safeguard natural resources and avoid them to become a mass destruction weapon.

Keywords: armed conflicts, criminal liability, environmental damages, humanitarian law, mass weapon

Procedia PDF Downloads 420
18393 Optimization of the Energy Management for a Solar System of an Agricultural Greenhouse

Authors: Nora Arbaoui, Rachid Tadili, Ilham Ihoume

Abstract:

To improve the climatic conditions and increase production in the greenhouse during the winter season under the Mediterranean climate, this thesis project proposes a design of an integrated and autonomous solar system for heating, cooling, and conservation of production in an agricultural greenhouse. To study the effectiveness of this system, experiments are conducted in two similar agricultural greenhouses oriented north-south. The first greenhouse is equipped with an active solar system integrated into the double glazing of the greenhouse’s roof, while the second greenhouse has no system, it serves as a controlled greenhouse for comparing thermal and agronomic performance The solar system allowed for an average increase in the indoor temperature of the experimental greenhouse of 6°C compared to the outdoor environment and 4°C compared to the control greenhouse. This improvement in temperature has a favorable effect on the plants' climate and subsequently positively affects their development, quality, and production.

Keywords: solar system, agricultural greenhouse, heating, cooling, storage, drying

Procedia PDF Downloads 100
18392 The Implementation of Child Adoption as Legal Protection of Children

Authors: Sonny Dewi Judiasih

Abstract:

The principle of a marriage is to achieve a happy and eternity family based on the willing of the God. The family has a fundamental role in the society as a social individual and as a nuclear family consists of father, mother, and children. Thus, each family always would like to have children who will continue the family. However, not all family will be blessed with children and consequently, there is family without children. Therefore, the said the certain family will do any effort to fulfill the wish to have children. One of the ways is to adopt children. The implementation of child adoption is conducted by the family who does not have children but sometimes child adoption is conducted by a family who has already children. The implementation of child adoption is based on the interest of the welfare and the intellectual of the said child. Moreover, it should be based on the social liability of the individual in accordance with the developing of the traditional values as part of the nation culture. The child adoption is conducted for the welfare of the child demonstrates that a change on the basic motive (value) whereby in the past the child adoption is to fulfill the wish of foster parent (to have children in the family). Nowadays the purpose of child adoption is not merely for the interest of foster parent but in particular for the interest, welfare and the future of the child. The development of the society has caused the occurrence of changes of perspective in the society which lead to a need for new law. The court of justice has an impact of such changes. It is evidenced by the court order for child adoption in the legal framework of certainty of law. The changes of motives (value) of the child adoption in the society can be fully understood in the event that the society fully understand that the ultimate purpose of Indonesia nation is to achieve a justice and prosperity society, i.e., social welfare for all Indonesian people.

Keywords: child adoption, family law, legal protection, children

Procedia PDF Downloads 468
18391 Police Mothers at Home: Police Work and Danger-Protection Parenting Practices

Authors: Tricia Agocs, Debra Langan, Carrie B. Sanders

Abstract:

Studies of the challenges faced by women in policing have paid little attention to the specific experiences of Policewomen who are mothers. Guided by critical theorizing on the gendered nature of the police culture and domestic labor, 16 police officer mothers in Ontario, Canada, were interviewed. Our qualitative analyses explore their experiences of the “lion’s share” of domestic labor; the organizational, cultural, and operational features of policing; and the challenges of child care, and examine how these combine to foster particular stresses. In contrast to intensive mothering approaches that rely on the advice of external experts, our participants work to protect children by carefully constructing stories and asking questions that are based on their own on-the-job experiences with dangerous and/or abhorrent situations. As such, they engage in danger-protection parenting practices to prevent their children from becoming victims or offenders. Our research extends the theorizing on intensive/extensive mothering practices, builds on the scholarship on policing, and adds to the literature on women in nonstandard occupations. This sociological analysis of police mothers’ experiences and practices underscores the importance of understanding and working to change the social contexts, at work and at home, that compromise the well-being of police mothers and other emergency-response workers.

Keywords: policewomen, mothers, parenting, danger, qualitative research

Procedia PDF Downloads 555
18390 Development and Characterization of Mesoporous Silica Nanoparticles of Quercetin in Skin Cancer

Authors: Khusboo Agrawal, S. Saraf

Abstract:

Quercetin, a flavonol provides a cellular protection against UV induced oxidative damages due to its excellent free radical scavenging activity and direct pro-apoptopic effect on tumor cells. However, its topical use is limited due to its unfavorable physicochemical properties. The present study was aimed to evaluate the potential of mesoporous silica nanoparticles as topical carrier system for quercetin delivery. Complexes of quercetin with mesoporous silica was prepared with different weight ratios and characterized by thermo gravimetric analysis, X-ray diffraction, high resolution TEM, FT-IR spectroscopy, zeta potential measurements and differential scanning calorimetry The protective effect of this vehicle on UV-induced degradation of the quercetin was investigated revealing a certain positive influence of the inclusion on the photostability over time. Epidermal accumulation and transdermal permeation of this molecule were ex vivo evaluated by using Franz diffusion cells. The immobilization of Quercetin in mesoporous silica nanoparticles (MSNs) increased the stability without undermining the antioxidant efficacy.

Keywords: cancer, MSNs, quercetin, topical delivery

Procedia PDF Downloads 308
18389 Autonomic Threat Avoidance and Self-Healing in Database Management System

Authors: Wajahat Munir, Muhammad Haseeb, Adeel Anjum, Basit Raza, Ahmad Kamran Malik

Abstract:

Databases are the key components of the software systems. Due to the exponential growth of data, it is the concern that the data should be accurate and available. The data in databases is vulnerable to internal and external threats, especially when it contains sensitive data like medical or military applications. Whenever the data is changed by malicious intent, data analysis result may lead to disastrous decisions. Autonomic self-healing is molded toward computer system after inspiring from the autonomic system of human body. In order to guarantee the accuracy and availability of data, we propose a technique which on a priority basis, tries to avoid any malicious transaction from execution and in case a malicious transaction affects the system, it heals the system in an isolated mode in such a way that the availability of system would not be compromised. Using this autonomic system, the management cost and time of DBAs can be minimized. In the end, we test our model and present the findings.

Keywords: autonomic computing, self-healing, threat avoidance, security

Procedia PDF Downloads 504