Search results for: protection and preparedness
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2528

Search results for: protection and preparedness

1628 Steps of the Pancreatic Differentiation in the Grass Snake (Natrix natrix) Embryos

Authors: Magdalena Kowalska, Weronika Rupik

Abstract:

The pancreas is an important organ present in all vertebrate species. It contains two different tissues, exocrine and endocrine, that act as two glands in one. The development and differentiation of the pancreas in reptiles is poorly known in comparison to other vertebrates. Therefore, the aim of this study was to investigate the particular steps concerning the differentiation of the pancreas in the grass snake (Natrix natrix) embryos. For this, histological methods (including hematoxylin and eosin, and Heidenhain's AZAN staining), transmission electron microscopy and three-dimensional (3D) reconstructions from serial paraffin sections were used. The results of this study indicated that the first step of pancreas development in Natrix was the connection of the two pancreatic buds: dorsal and ventral one. Then, duct walls in both buds started to be remodeled from the multilayered to single-layered epithelium. This remodeling started in the dorsal bud and was simultaneously with the differentiation of the duct lumens which occurred by the cavition. During this process, the cells that had no contact with the mesenchyme underwent cell death named anoikis. These findings indicated that the walls of ducts in the embryonic pancreas of the grass snake were initially formed by the abundant principal and single endocrine cells. Later the basal and goblet cells differentiated. Among the endocrine cells, as the first the B and A cells differentiated, then the D and PP cells. The next step of the pancreatic development was the withdrawing of the endocrine cells from the duct walls to form the pancreatic islets. The endocrine cells and islets were found only in the dorsal part of the pancreas in Natrix embryos what is different than in other vertebrate species. The islets were formed mainly by the A cells. Simultaneously, with the differentiation of the endocrine pancreas, the acinar tissue started to differentiate. The source of the acinar cells were pancreatic ducts similar as in other vertebrates. The acini formation began at the proximal part of the pancreas and went towards the caudal direction. Differentiating pancreatic ducts developed into the branched system that can be divided into extralobular, intralobular, and intercalated ducts, similarly as in other vertebrate species. However, the pattern of branching was different. In conclusions, particular steps of the pancreas differentiation in the grass snake were different than in other vertebrates. It can be supposed that these differences are related to the specific topography of the snake’s internal organs and their taxonomy position. All specimens used in the study were captured according to the Polish regulations concerning the protection of wild species. Permission was granted by the Local Ethics Commission in Katowice (41/2010; 87/2015) and the Regional Directorate for Environmental Protection in Katowice (WPN.6401.257.2015.DC).

Keywords: embryogenesis, organogenesis, pancreas, Squamata

Procedia PDF Downloads 167
1627 Learning from Flood: A Case Study of a Frequently Flooded Village in Hubei, China

Authors: Da Kuang

Abstract:

Resilience is a hotly debated topic in many research fields (e.g., engineering, ecology, society, psychology). In flood management studies, we are experiencing the paradigm shift from flood resistance to flood resilience. Flood resilience refers to tolerate flooding through adaptation or transformation. It is increasingly argued that our city as a social-ecological system holds the ability to learn from experience and adapt to flood rather than simply resist it. This research aims to investigate what kinds of adaptation knowledge the frequently flooded village learned from past experience and its advantages and limitations in coping with floods. The study area – Xinnongcun village, located in the west of Wuhan city, is a linear village and continuously suffered from both flash flood and drainage flood during the past 30 years. We have a field trip to the site in June 2017 and conducted semi-structured interviews with local residents. Our research summarizes two types of adaptation knowledge that people learned from the past floods. Firstly, at the village scale, it has formed a collective urban form which could help people live during both flood and dry season. All houses and front yards were elevated about 2m higher than the road. All the front yards in the village are linked and there is no barrier. During flooding time, people walk to neighbors through houses yards and boat to outside village on the lower road. Secondly, at individual scale, local people learned tacit knowledge of preparedness and emergency response to flood. Regarding the advantages and limitations, the adaptation knowledge could effectively help people to live with flood and reduce the chances of getting injuries. However, it cannot reduce local farmers’ losses on their agricultural land. After flood, it is impossible for local people to recover to the pre-disaster state as flood emerges during June and July will result in no harvest. Therefore, we argue that learning from past flood experience could increase people’s adaptive capacity. However, once the adaptive capacity cannot reduce people’s losses, it requires a transformation to a better regime.

Keywords: adaptation, flood resilience, tacit knowledge, transformation

Procedia PDF Downloads 330
1626 System Detecting Border Gateway Protocol Anomalies Using Local and Remote Data

Authors: Alicja Starczewska, Aleksander Nawrat, Krzysztof Daniec, Jarosław Homa, Kacper Hołda

Abstract:

Border Gateway Protocol is the main routing protocol that enables routing establishment between all autonomous systems, which are the basic administrative units of the internet. Due to the poor protection of BGP, it is important to use additional BGP security systems. Many solutions to this problem have been proposed over the years, but none of them have been implemented on a global scale. This article describes a system capable of building images of real-time BGP network topology in order to detect BGP anomalies. Our proposal performs a detailed analysis of BGP messages that come into local network cards supplemented by information collected by remote collectors in different localizations.

Keywords: BGP, BGP hijacking, cybersecurity, detection

Procedia PDF Downloads 70
1625 The Corrosion Resistance of the 32CrMoV13 Steel Nitriding

Authors: Okba Belahssen, Lazhar Torchane, Said Benramache, Abdelouahed Chala

Abstract:

This paper presents corrosion behavior of the plasma-nitrided 32CrMoV13 steel. Different kinds of samples were tested: non-treated, plasma nitrided samples. The structure of layers was determined by X-ray diffraction, while the morphology was observed by scanning electron microscopy (SEM). The corrosion behavior was evaluated by electrochemical techniques (potentiodynamic curves and electrochemical impedance spectroscopy). The corrosion tests were carried out in acid chloride solution (HCl 1M). Experimental results showed that the nitrides ε-Fe2−3N and γ′-Fe4N present in the white layer are nobler than the substrate but may promote, by galvanic effect, a localized corrosion through open porosity. The better corrosion protection was observed for nitrided sample.

Keywords: plasma-nitrided, 32CrMoV13 steel, corrosion, EIS

Procedia PDF Downloads 581
1624 Root Causes of Child Labour in Hargeisa, Somaliland

Authors: Abdikarim Yusuf

Abstract:

This study uses data from Somalia to analyse child labour using a descriptive and qualitative method. The study set out to identify root causes of child labour in Hargeisa and its implications for children. The study shows that poverty, droughts, family separation, and loss of properties are primary drivers of child labour in Hargeisa. The study found that children work in very difficult jobs such as car wash, casual work, and shoe shining for boys while girls work as housemaids, selling tea, Khat and sometimes are at risk of exploitation such as sexual abuse, rape and harassment. The majority of the parents responded that they don’t know any policy, act or law that protects children. Men showed greater awareness than the women respondents in recognizing child labour as a child rights violation.

Keywords: abuse, child, violence, protection

Procedia PDF Downloads 144
1623 Psychological Factors of Readiness of Defectologists to Professional Development: On the Example of Choosing an Educational Environment

Authors: Inna V. Krotova

Abstract:

The study pays special attention to the definition of the psychological potential of a specialist-defectologist, which determines his desire to increase the level of his or her professional competence. The group included participants of the educational environment – an additional professional program 'Technologies of psychological and pedagogical assistance for children with complex developmental disabilities' implemented by the department of defectology and clinical psychology of the KFU jointly with the Support Fund for the Deafblind people 'Co-Unity'. The purpose of our study was to identify the psychological aspects of the readiness of the specialist-defectologist to his or her professional development. The study assessed the indicators of psychological preparedness, and its four components were taken into account: motivational, cognitive, emotional and volitional. We used valid and standardized tests during the study. As a result of the factor analysis of data received (from Extraction Method: Principal Component Analysis, Rotation Method: Varimax with Kaiser Normalization, Rotation converged in 12 iterations), there were identified three factors with maximum factor load from 24 indices, and their correlation coefficients with other indicators were taken into account at the level of reliability p ≤ 0.001 and p ≤ 0.01. Thus the system making factor was determined – it’s a 'motivation to achieve success'; it formed a correlation galaxy with two other factors: 'general internality' and 'internality in the field of achievements', as well as with such psychological indicators as 'internality in the field of family relations', 'internality in the field of interpersonal relations 'and 'low self-control-high self-control' (the names of the scales used is the same as names in the analysis methods. In conclusion of the article, we present some proposals to take into account the psychological model of readiness of specialists-defectologists for their professional development, to stimulate the growth of their professional competence. The study has practical value for all providers of special education and organizations that have their own specialists-defectologists, teachers-defectologists, teachers for correctional and ergotherapeutic activities, specialists working in the field of correctional-pedagogical activity (speech therapists) to people with special needs who need true professional support.

Keywords: psychological readiness, defectologist, professional development, psychological factors, special education, professional competence, innovative educational environment

Procedia PDF Downloads 171
1622 A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform

Authors: Nidal F. Shilbayeh, Belal AbuHaija, Zainab N. Al-Qudsy

Abstract:

In this paper, a hybrid blind digital watermarking system using Discrete Wavelet Transform (DWT) and Contourlet Transform (CT) has been implemented and tested. The implemented combined digital watermarking system has been tested against five common types of image attacks. The performance evaluation shows improved results in terms of imperceptibility, robustness, and high tolerance against these attacks; accordingly, the system is very effective and applicable.

Keywords: discrete wavelet transform (DWT), contourlet transform (CT), digital image watermarking, copyright protection, geometric attack

Procedia PDF Downloads 389
1621 Enhancing Security and Privacy Protocols in Telehealth: A Comprehensive Approach across IoT/Fog/Cloud Environments

Authors: Yunyong Guo, Man Wang, Bryan Guo, Nathan Guo

Abstract:

This paper introduces an advanced security and privacy model tailored for Telehealth systems, emphasizing end-to-end protection across IoT, Fog, and Cloud components. The proposed model integrates encryption, key management, intrusion detection, and privacy-preserving measures to safeguard patient data. A comprehensive simulation study evaluates the model's effectiveness in scenarios such as unauthorized access, physical breaches, and insider threats. Results indicate notable success in detecting and mitigating threats yet underscore areas for refinement. The study contributes insights into the intricate balance between security and usability in Telehealth environments, setting the stage for continued advancements.

Keywords: cloud, enhancing security, fog, IoT, telehealth

Procedia PDF Downloads 66
1620 Irish Print Media Framing of Syrian Migration to Ireland in the Irish Times and Irish Independent

Authors: Moufida Benmoussa

Abstract:

Since the escalation of the Syrian conflict in 2011, 6.9 million Syrians have fled to neighbouring countries, and 6.7 have remained displaced in Syria. Out of the 6.9 who fled Syria, over one million have crossed the Mediterranean Sea and become refugees and asylum seekers in various European countries. As a European and a member country of the EU, the Republic of Ireland was not an exception. In response to the refugee crisis caused mainly by the Syrian displacement, Ireland established the Syrian Humanitarian Admission Programme (SHAM) in 2014 and the Irish Refugee Protection Programme (IRPP) in 2015, followed by its second phase in 2019. In light of these events, Irish print media played a significant role in covering the Irish government’s decisions, political stance, and public opinion on the debate on taking Syrian refugees into Ireland. Considering the tremendous impact of media on politics and public opinion, my research examined how The Irish Times and Irish Independent framed Syrian migration to Ireland. I adopted a qualitative framing analysis to identify the prominent framings in these two newspapers. The collection of newspaper articles focused on three periods. The first period is from the first of January 2014 to the end of December 2014. During this period, the media covered the launch of the Syrian Humanitarian Admission Programme (SHAP) and stories about the first arrival of the Syrian refugees to Ireland. The second period is the year 2015. During this year, various events gained the attention of the Irish media. These events include Ireland’s establishment of the Irish Refugee Protection Programme, the Paris attacks, and the publishing of Aylan Kurdi’s Photograph. The third period is from the first of December 2019 to the thirtieth of January 2020. In this period, the media covered the convention of Ireland with the UNHCR and the European Union to provide sanctuary to 2900 refugees in the years 2020, 2021, 2022, and 2023. The primary findings of my study indicate that The Irish Times and Irish Independent’s framing of Syrian migration to Ireland was various. My research findings indicate that The Irish Times and Irish Independent’s framing of Syrian migration to Ireland was varied and asymmetrical. The dominant frames used by these two newspapers are humanitarian, responsibility, contribution, burden, intruder, and threat. The former three frames positively perceive Syrian migration to Ireland and support the Irish government’s decisions to welcome more Syrian refugees. On the other hand, the last three frames perceive Syrian migration and refugees negatively and stand for the principle that Ireland should not take Syrian refugees.

Keywords: framing, Syrian migration, Ireland, newspaper

Procedia PDF Downloads 63
1619 The Use of Cement Dust in the Glass Industry

Authors: Magda Kosmal, Anna A. Kuśnierz, Joanna Rybicka-Łada

Abstract:

In the case of waste glass cullet, a fully functioning recycling system for individual glass industries was developed, while recycling of cement dust encounters a number of difficulties and is conducted to a limited extent in the packaging and flat glass industry. The aim of the project was to examine the possibility of using dust arising in cement plants in the process of melting various types of glasses. Dust management has a positive effect on the aspect of environmental protection and ecology. Sets have been designed, and the parameters of the melting process have been optimized. Glasses were obtained with the addition of selected cement dust on a laboratory scale, using DTA, XRD, SEM tests, and a gradient furnace was conducted to check the tendency to crystallization.

Keywords: cement dust, crystallization, glass, XRD, SEM

Procedia PDF Downloads 78
1618 Incident Management System: An Essential Tool for Oil Spill Response

Authors: Ali Heyder Alatas, D. Xin, L. Nai Ming

Abstract:

An oil spill emergency can vary in size and complexity, subject to factors such as volume and characteristics of spilled oil, incident location, impacted sensitivities and resources required. A major incident typically involves numerous stakeholders; these include the responsible party, response organisations, government authorities across multiple jurisdictions, local communities, and a spectrum of technical experts. An incident management team will encounter numerous challenges. Factors such as limited access to location, adverse weather, poor communication, and lack of pre-identified resources can impede a response; delays caused by an inefficient response can exacerbate impacts caused to the wider environment, socio-economic and cultural resources. It is essential that all parties work based on defined roles, responsibilities and authority, and ensure the availability of sufficient resources. To promote steadfast coordination and overcome the challenges highlighted, an Incident Management System (IMS) offers an essential tool for oil spill response. It provides clarity in command and control, improves communication and coordination, facilitates the cooperation between stakeholders, and integrates resources committed. Following the preceding discussion, a comprehensive review of existing literature serves to illustrate the application of IMS in oil spill response to overcome common challenges faced in a major-scaled incident. With a primary audience comprising practitioners in mind, this study will discuss key principles of incident management which enables an effective response, along with pitfalls and challenges, particularly, the tension between government and industry; case studies will be used to frame learning and issues consolidated from previous research, and provide the context to link practice with theory. It will also feature the industry approach to incident management which was further crystallized as part of a review by the Joint Industry Project (JIP) established in the wake of the Macondo well control incident. The authors posit that a common IMS which can be adopted across the industry not only enhances response capacity towards a major oil spill incident but is essential to the global preparedness effort.

Keywords: command and control, incident management system, oil spill response, response organisation

Procedia PDF Downloads 150
1617 A Review on the Vulnerability of Rural-Small Scale Farmers to Insect Pest Attacks in the Eastern Cape Province, South Africa

Authors: Nolitha L. Skenjana, Bongani P. Kubheka, Maxwell A. Poswal

Abstract:

The Eastern Cape Province of South Africa is characterized by subsistence farming, which is mostly distributed in the rural areas of the province. It is estimated that cereal crops such as maize and sorghum, and vegetables such as cabbage are grown in more than 400.000 rural households, with maize being the most dominant crop. However, compared to commercial agriculture, small-scale farmers receive minimal support from research and development, limited technology transfer on the latest production practices and systems and have poor production infrastructure and equipment. Similarly, there is limited farmers' appreciation on best practices in insect pest management and control. The paper presents findings from the primary literature and personal observations on insect pest management practices of small-scale farmers in the province. Inferences from literature and personal experiences in the production areas have led to a number of deductions regarding the level of exposure and extent of vulnerability. Farmers' pest management practices, which included not controlling at all though there is a pest problem, resulted in their crop stands to be more vulnerable to pest attacks. This became more evident with the recent brown locust, African armyworm, and Fall armyworm outbreaks, and with the incidences of opportunistic phytophagous insects previously collected on wild hosts only, found causing serious damages on crops. In most of these occurrences, damage to crops resulted in low or no yield. Improvements on farmers' reaction and response to pest problems were only observed in areas where focused awareness campaigns and trainings on specific pests and their management techniques were done. This then calls for a concerted effort from all role players in the sphere of small-scale crop production, to train and equip farmers with relevant skills, and provide them with information on affordable and climate-smart strategies and technologies in order to create a state of preparedness. This is necessary for the prevention of substantial crop losses that may exacerbate food insecurity in the province.

Keywords: Eastern Cape Province, small-scale farmers, insect pest management, vulnerability

Procedia PDF Downloads 132
1616 Network User Rules in Universities

Authors: Michel Berthiaume, Daniel Chamberland-Tremblay, Elaine Paiva Mosconi, Jérôme Blanchet-Brisson

Abstract:

This presentation documents the overall failure of North-American universities to build an effective IT Policies communication with their primary users: the students. A sample of 12 universities was selected. A set of indicators based on usability principles to assess the content of IT Policies vas devised. Then, IT Policies were rated according to the indicators and the results analyzed to build an overall picture of the potential of communication problems in policy communication. The initial finding is that network security professionals in Universities have to reach a delicate balance between asset protection, asset valorization and user security awareness.

Keywords: computer security, IT policy, security awareness, network user rules

Procedia PDF Downloads 557
1615 The Fight against Terrorist Radicalization: A French Perspective

Authors: Julia Burchett

Abstract:

After France became the target of an increasing number of terrorist attacks committed by people who have been declared ‘radicalized’, the issue of radicalization has become the main component of the national Action Plan for the Prevention of terrorism, thus stressing the need to address the roots causes of this peril. Therefore, the aim of this research paper is to provide a preliminary review of Frances’s strategy in the fight against terrorist radicalization in order to point out the challenges posed by this phenomenon while also highlighting its contemporary version and the understanding the results. In this regard, it should not be forgotten that the process of radicalization does not always lead to a terrorist act. To this end, the French legal framework that applies to radicalization coupled with the judicial response provided by the National Court will be analyzed in the light of the need for a balance between the concern for security and the protection of fundamental freedoms.

Keywords: criminal law, France, fundamental freedoms, radicalization, terrorism

Procedia PDF Downloads 425
1614 Screening of Commonly Used Reinforcement Materials for Tomb Murals

Authors: Liping Qiu, Xiaofeng Zhang

Abstract:

In its long history, precious tomb murals suffered from various diseases due to natural and man-made destruction. The key to how to protect tomb murals is how to strengthen and protect the tomb murals. In order to maximize the life of the tomb murals, the artistic, historic, and scientific values of the tomb murals can be continued. In this paper, four kinds of traditional reinforcement materials (silicone acrylic lotion, pure acrylic lotion, polyvinyl acetate lotion, and B72) are selected to reinforce the ground support layer of tomb murals, and the reinforcement effect of each reinforcement material on the ground support layer of murals is compared and analyzed, and the best protection material is obtained.

Keywords: mural, destruction cycle, reinforcement material, disease

Procedia PDF Downloads 122
1613 Achieving Product Robustness through Variation Simulation: An Industrial Case Study

Authors: Narendra Akhadkar, Philippe Delcambre

Abstract:

In power protection and control products, assembly process variations due to the individual parts manufactured from single or multi-cavity tooling is a major problem. The dimensional and geometrical variations on the individual parts, in the form of manufacturing tolerances and assembly tolerances, are sources of clearance in the kinematic joints, polarization effect in the joints, and tolerance stack-up. All these variations adversely affect the quality of product, functionality, cost, and time-to-market. Variation simulation analysis may be used in the early product design stage to predict such uncertainties. Usually, variations exist in both manufacturing processes and materials. In the tolerance analysis, the effect of the dimensional and geometrical variations of the individual parts on the functional characteristics (conditions) of the final assembled products are studied. A functional characteristic of the product may be affected by a set of interrelated dimensions (functional parameters) that usually form a geometrical closure in a 3D chain. In power protection and control products, the prerequisite is: when a fault occurs in the electrical network, the product must respond quickly to react and break the circuit to clear the fault. Usually, the response time is in milliseconds. Any failure in clearing the fault may result in severe damage to the equipment or network, and human safety is at stake. In this article, we have investigated two important functional characteristics that are associated with the robust performance of the product. It is demonstrated that the experimental data obtained at the Schneider Electric Laboratory prove the very good prediction capabilities of the variation simulation performed using CETOL (tolerance analysis software) in an industrial context. Especially, this study allows design engineers to better understand the critical parts in the product that needs to be manufactured with good, capable tolerances. On the contrary, some parts are not critical for the functional characteristics (conditions) of the product and may lead to some reduction of the manufacturing cost, ensuring robust performance. The capable tolerancing is one of the most important aspects in product and manufacturing process design. In the case of miniature circuit breaker (MCB), the product's quality and its robustness are mainly impacted by two aspects: (1) allocation of design tolerances between the components of a mechanical assembly and (2) manufacturing tolerances in the intermediate machining steps of component fabrication.

Keywords: geometrical variation, product robustness, tolerance analysis, variation simulation

Procedia PDF Downloads 161
1612 Reviewing Privacy Preserving Distributed Data Mining

Authors: Sajjad Baghernezhad, Saeideh Baghernezhad

Abstract:

Nowadays considering human involved in increasing data development some methods such as data mining to extract science are unavoidable. One of the discussions of data mining is inherent distribution of the data usually the bases creating or receiving such data belong to corporate or non-corporate persons and do not give their information freely to others. Yet there is no guarantee to enable someone to mine special data without entering in the owner’s privacy. Sending data and then gathering them by each vertical or horizontal software depends on the type of their preserving type and also executed to improve data privacy. In this study it was attempted to compare comprehensively preserving data methods; also general methods such as random data, coding and strong and weak points of each one are examined.

Keywords: data mining, distributed data mining, privacy protection, privacy preserving

Procedia PDF Downloads 519
1611 The Impact of COVID-19 Measures on Children with Disabilities and Their Families in the Kingdom of Saudi Arabia

Authors: Faris Algahtani

Abstract:

The COVID 19 pandemic and associated public health measures have disrupted the lives of peoplearound the world, including children. There is little knowledge about how pandemic measures have affected children in the Kingdom of Saudi Arabia (KSA). The aim and objectives of this qualitative study was to learn about the outcomes and impacts of the pandemic on children ages 0-8 in KSA. The study was based on 40 in-depth interviews that were conducted with experts in health, social protection, education, and early learning, children with special needs, and economics, including decision makers as well as specialists in service provision. The interviews were recorded and translated from Arabic to English into summary notes. The narrative was coded and analyzed following a thematic analysis.

Keywords: disabilities, COVID-19, families, children

Procedia PDF Downloads 208
1610 Multilevel Gray Scale Image Encryption through 2D Cellular Automata

Authors: Rupali Bhardwaj

Abstract:

Cryptography is the science of using mathematics to encrypt and decrypt data; the data are converted into some other gibberish form, and then the encrypted data are transmitted. The primary purpose of this paper is to provide two levels of security through a two-step process, rather than transmitted the message bits directly, first encrypted it using 2D cellular automata and then scrambled with Arnold Cat Map transformation; it provides an additional layer of protection and reduces the chance of the transmitted message being detected. A comparative analysis on effectiveness of scrambling technique is provided by scrambling degree measurement parameters i.e. Gray Difference Degree (GDD) and Correlation Coefficient.

Keywords: scrambling, cellular automata, Arnold cat map, game of life, gray difference degree, correlation coefficient

Procedia PDF Downloads 371
1609 A Comparative Study between Japan and the European Union on Software Vulnerability Public Policies

Authors: Stefano Fantin

Abstract:

The present analysis outcomes from the research undertaken in the course of the European-funded project EUNITY, which targets the gaps in research and development on cybersecurity and privacy between Europe and Japan. Under these auspices, the research presents a study on the policy approach of Japan, the EU and a number of Member States of the Union with regard to the handling and discovery of software vulnerabilities, with the aim of identifying methodological differences and similarities. This research builds upon a functional comparative analysis of both public policies and legal instruments from the identified jurisdictions. The result of this analysis is based on semi-structured interviews with EUNITY partners, as well as by the participation of the researcher to a recent report from the Center for EU Policy Study on software vulnerability. The European Union presents a rather fragmented legal framework on software vulnerabilities. The presence of a number of different legislations at the EU level (including Network and Information Security Directive, Critical Infrastructure Directive, Directive on the Attacks at Information Systems and the Proposal for a Cybersecurity Act) with no clear focus on such a subject makes it difficult for both national governments and end-users (software owners, researchers and private citizens) to gain a clear understanding of the Union’s approach. Additionally, the current data protection reform package (general data protection regulation), seems to create legal uncertainty around security research. To date, at the member states level, a few efforts towards transparent practices have been made, namely by the Netherlands, France, and Latvia. This research will explain what policy approach such countries have taken. Japan has started implementing a coordinated vulnerability disclosure policy in 2004. To date, two amendments can be registered on the framework (2014 and 2017). The framework is furthermore complemented by a series of instruments allowing researchers to disclose responsibly any new discovery. However, the policy has started to lose its efficiency due to a significant increase in reports made to the authority in charge. To conclude, the research conducted reveals two asymmetric policy approaches, time-wise and content-wise. The analysis therein will, therefore, conclude with a series of policy recommendations based on the lessons learned from both regions, towards a common approach to the security of European and Japanese markets, industries and citizens.

Keywords: cybersecurity, vulnerability, European Union, Japan

Procedia PDF Downloads 152
1608 Laser Paint Stripping on Large Zones on AA 2024 Based Substrates

Authors: Selen Unaldi, Emmanuel Richaud, Matthieu Gervais, Laurent Berthe

Abstract:

Aircrafts are painted with several layers to guarantee their protection from external attacks. For aluminum AA 2024-T3 (metallic structural part of the plane), a protective primer is applied to ensure its corrosion protection. On top of this layer, the top coat is applied for aesthetic aspects. During the lifetime of an aircraft, top coat stripping has an essential role which should be operated as an average of every four years. However, since conventional stripping processes create hazardous disposals and need long hours of labor work, alternative methods have been investigated. Amongst them, laser stripping appears as one of the most promising techniques not only because of the reasons mentioned above but also its controllable and monitorable aspects. The application of a laser beam from the coated side provides stripping, but the depth of the process should be well controlled in order to prevent damage to a substrate and the anticorrosion primer. Apart from that, thermal effects should be taken into account on the painted layers. As an alternative, we worked on developing a process that includes the usage of shock wave propagation to create the stripping via mechanical effects with the application of the beam from the substrate side (back face) of the samples. Laser stripping was applied on thickness-specified samples with a thickness deviation of 10-20%. First, the stripping threshold is determined as a function of power density which is the first flight off of the top coats. After obtaining threshold values, the same power densities were applied to specimens to create large stripping zones with a spot overlap of 10-40%. Layer characteristics were determined on specimens in terms of physicochemical properties and thickness range both before and after laser stripping in order to validate the substrate material health and coating properties. The substrate health is monitored by measuring the roughness of the laser-impacted zones and free surface energy tests (both before and after laser stripping). Also, Hugoniot Elastic Limit (HEL) is determined from VISAR diagnostic on AA 2024-T3 substrates (for the back face surface deformations). In addition, the coating properties are investigated as a function of adhesion levels and anticorrosion properties (neutral salt spray test). The influence of polyurethane top-coat thickness is studied in order to verify the laser stripping process window for industrial aircraft applications.

Keywords: aircraft coatings, laser stripping, laser adhesion tests, epoxy, polyurethane

Procedia PDF Downloads 73
1607 The Rural Q'eqchi' Maya Consciousness and the Agricultural Rituals: A Case of San Agustin Lanquin, Guatemala

Authors: Y.S. Lea

Abstract:

This paper investigates the agricultural rituals in relation to the historical continuity of cultural ideology concerning the praxis of cultural sustenance of the indigenous Mayas. The praxis is delineated in two dimensions: 1) The ceremonial and quotidian rituals of the rural Q’eqchi’ Mayas in Lanquin, Guatemala; 2) The indigenous Maya resistance of 2014 against the legislation of the 'Law for the Protection of New Plant Varieties,' commonly known as 'the Monsanto Law' in Guatemala. Through the intersection of ideology in practice, the praxis of cultural sustenance is construed.

Keywords: Q'eqchi' Mayas, San Agustin Lanquin, Alta Verapaz, Guatemala, Maya animism, Q’eqchi' deities, Tzuultaq'as

Procedia PDF Downloads 243
1606 Ecorium: The Ecological Project in Montevideo Uruguay

Authors: Chettou Souhaila, Soufi Omar, Roumia Mohammed Ammar

Abstract:

Protecting the environment is to preserve the survival and future of humanity. Indeed, the environment is our source of food and drinking water, the air is our source of oxygen, the climate allows our survival and biodiversity are a potential drug reservoir. Preserving the environment is, therefore, a matter of survival. The objective of this project is to familiarize the general public with environmental problems not only with the theme of environmental protection, but also with the concept of biodiversity in different ecosystems. For it, the aim of our project was to create the Ecorium which is a place that preserves many species of plants of different ecosystems, schools, malls, buildings, offices, ecological transports, gardens, and many familial activities that participated in the ecosystems development, strategic biodiversity and sustainable development.

Keywords: ecological system, ecorium, environment, sustainable development

Procedia PDF Downloads 331
1605 Indonesian Marriage Law Reform: A Doctrinal Research to Find the Way to Strengthen Children's Rights against Child Marriage

Authors: Erni Agustin, Zendy Prameswari

Abstract:

The Law Number 1 Year 1974 on Marriage was issued by Indonesian Government to replace the old marriage law stipulated in Burgerlijk Wetboek inherited from the Dutch colonial. The Law defines marriage as both physical and mental bond between a man and a woman as husband and wife with the purpose to form a harmonious family based on deity. Marriage shall be conducted when determined requirements are met based on the Law. Article 7 of the Law Number 1 Year 1974 stipulates the minimum age requirement to enter into marriage, which is 19 years for men and 16 years for women. This stipulation is made to make the marriage achieve the true goal to form a happy, eternal and prosperous family. It is expected at that age, each party has a mature soul and physic. However, it is possible for those who have not reached the age to enter into marriage if there is a dispensation granted by the courts or other official designated by the parents of each party in the marriage. As many other countries in the world, Indonesia has serious problems linked with the child or underage marriage. Indonesia is one of the countries with the highest absolute numbers of child marriage. In 2012, a judicial review was filed to the Constitutional Court against the provisions of the minimum age limit in the Law Number 1 Year 1974 on Marriage. The appeal was filed in order to raise the limit of minimum age for women from 16 years to be 18 years. However, the Constitutional Court considered that the provisions on the minimum age in the Law Number 1 Year 1974 on Marriage is constitutional. At the international level, Indonesia has participated in the formulation of variety of international human rights instrument which have an impact on children, and is a party to a number of them. Indonesia ratified the CRC through Presidential Decree of the Republic of Indonesia Number 36 Year 1990 on 5 September 1990. This paper attempts to analyze three main issues. Firstly, it will scrutinize the ratio legis of the stipulation on minimum age requirement to enter into marriage in the Law Number 1 Year 1974 on Marriage. Secondly, it will discuss the conformity of Indonesian marriage law to the principles and provisions on the CRC. Last, this paper will elaborate the legal measures shall be taken to strengthen the legal protection for children against child marriage. This paper is a doctrinal research using statute, conceptual and historical approaches. This study argues that The Law-making of Indonesian marriage law influenced by religious values that live in Indonesia. With regard to the conformity of Indonesian marriage law with the CRC, Indonesia is facing the issue of the compatibility of its respective national law with the CRC. Therefore, the legal measures that have to be taken are to review and amend the Indonesian Marriage Law to provide better protection for the children against underage marriage.

Keywords: child marriage, children’s rights, indonesian marriage law, underage marriage

Procedia PDF Downloads 195
1604 The Protection of Artificial Intelligence (AI)-Generated Creative Works Through Authorship: A Comparative Analysis Between the UK and Nigerian Copyright Experience to Determine Lessons to Be Learnt from the UK

Authors: Esther Ekundayo

Abstract:

The nature of AI-generated works makes it difficult to identify an author. Although, some scholars have suggested that all the players involved in its creation should be allocated authorship according to their respective contribution. From the programmer who creates and designs the AI to the investor who finances the AI and to the user of the AI who most likely ends up creating the work in question. While others suggested that this issue may be resolved by the UK computer-generated works (CGW) provision under Section 9(3) of the Copyright Designs and Patents Act 1988. However, under the UK and Nigerian copyright law, only human-created works are recognised. This is usually assessed based on their originality. This simply means that the work must have been created as a result of its author’s creative and intellectual abilities and not copied. Such works are literary, dramatic, musical and artistic works and are those that have recently been a topic of discussion with regards to generative artificial intelligence (Generative AI). Unlike Nigeria, the UK CDPA recognises computer-generated works and vests its authorship with the human who made the necessary arrangement for its creation . However, making necessary arrangement in the case of Nova Productions Ltd v Mazooma Games Ltd was interpreted similarly to the traditional authorship principle, which requires the skills of the creator to prove originality. Although, some recommend that computer-generated works complicates this issue, and AI-generated works should enter the public domain as authorship cannot be allocated to AI itself. Additionally, the UKIPO recognising these issues in line with the growing AI trend in a public consultation launched in the year 2022, considered whether computer-generated works should be protected at all and why. If not, whether a new right with a different scope and term of protection should be introduced. However, it concluded that the issue of computer-generated works would be revisited as AI was still in its early stages. Conversely, due to the recent developments in this area with regards to Generative AI systems such as ChatGPT, Midjourney, DALL-E and AIVA, amongst others, which can produce human-like copyright creations, it is therefore important to examine the relevant issues which have the possibility of altering traditional copyright principles as we know it. Considering that the UK and Nigeria are both common law jurisdictions but with slightly differing approaches to this area, this research, therefore, seeks to answer the following questions by comparative analysis: 1)Who is the author of an AI-generated work? 2)Is the UK’s CGW provision worthy of emulation by the Nigerian law? 3) Would a sui generis law be capable of protecting AI-generated works and its author under both jurisdictions? This research further examines the possible barriers to the implementation of the new law in Nigeria, such as limited technical expertise and lack of awareness by the policymakers, amongst others.

Keywords: authorship, artificial intelligence (AI), generative ai, computer-generated works, copyright, technology

Procedia PDF Downloads 81
1603 EU Regulation 868/04: Report of a Unilateral Approach on Unfair Subsidisation and Unfair Pricing Practices and Its Failure

Authors: Andrea Trimarchi

Abstract:

This paper is designed to provide a comprehensive overview on the EU Regulation No. 868/2004 concerning protection against subsidisation and unfair pricing practices regarding non-EU carriers and causing injury to Community air carriers. The analysis will focus, at first, on the exegetical scrutiny of the legal categories encompassed by the Regulation. In addition to that, while considering the peculiarities of such legal instrument, the attention will be addressed on the assessment on its effectiveness. The Regulation, indeed, having received lots of criticism, is in need of a profound revision. In this context, the present work will try to take into account the policy alternatives. In light of the failure of Regulation 868, which is to be seen as the expression of a unilateral and regional approach, there would seem to be the necessity for the aviation sector to reconsider the topic of subsidisation and unfair pricing practices in a more international oriented manner.

Keywords: non-EU airlines, aviation, subisidisation, unfair

Procedia PDF Downloads 337
1602 Legal Implications of a Single African Air Transport Market on Airlines and Passengers in Nigeria

Authors: Adejoke Omowumi Adediran

Abstract:

The commitment of African states to liberalise civil aviation in Africa through the implementation of the Yamoussoukro Decision of 1999 was reiterated in 2015 at the African Union Assembly meeting. A declaration was made by African Heads of government at the meeting to ensure the immediate implementation of the decision towards the establishment of a Single African Air Transport Market (SAATM) by 2017. A SAATM will imply among others, a removal of all commercial restrictions for African airlines in Africa; access to any route in Africa by African airlines without any required permit or authorisation; and a common set of regulations for airlines in African member states. As the envisioned 2017 date for launching the SAATM could not be met, a new date of January 2018 has been set. The lack of political will by African States, however, remains a prominent challenge to the realisation of the SAATM. As at June 2017, only twenty-one states had signed the commitment to actualise the decision creating the SAATM. In actualisation of the SAATM, a regulatory framework has been established to efficiently manage the new African airline industry, and regulatory texts have been adopted as part of the legal regime. This legal regime is to regulate both interstate and domestic operations. Airlines in Nigeria are currently faced with certain challenges which ultimately affect their effectiveness and passengers as well do not enjoy utmost customer satisfaction with services rendered by the airlines. Although Nigeria has demonstrated support for the SAATM since 2015, as Nigeria alongside ten other states, signed the initial commitment, whether or not SAATM will eventually be beneficial to airlines and passengers has become an issue in the light of the challenges of the Nigerian airline industry. Remarkably, the benefit of the SAATM is to a large extent ultimately determined by its legal framework. Using doctrinal research, this paper examines the legal implications of the SAATM on airlines and passengers in Nigeria. This paper analyses the legal framework of SAATM and juxtaposes this with the particular issues affecting airlines and passengers in Nigeria such as financial difficulties on the part of airlines and consumer protection as regards passengers. Among others, it can be asserted that the legal regime affords an opportunity for business expansion and creates a fair environment for competition. This is beneficial not only to the airlines but to passengers as well. In addition, in the interest of passengers, consumer rights are prescribed, and the regulations also cater for situations where airlines interrupt their services, as losses arising from these situations will be mitigated. There is indeed no doubt that the SAATM will be of great utility to both airlines and passengers in Nigeria.

Keywords: airlines, civil aviation, competition, consumer protection, passengers, single African air transport market, yamoussoukro decision

Procedia PDF Downloads 131
1601 The Effect of Artificial Intelligence on Banking Development and Progress

Authors: Mina Malak Hanna Saad

Abstract:

New strategies for supplying banking services to the customer have been brought, which include online banking. Banks have begun to recall electronic banking (e-banking) as a manner to replace some conventional department features by means of the usage of the internet as a brand-new distribution channel. A few clients have at least one account at multiple banks and get admission to those debts through online banking. To test their present-day internet worth, customers need to log into each of their debts, get particular statistics, and paint closer to consolidation. Not only is it time-ingesting; however, but it is also a repeatable activity with a certain frequency. To solve this problem, the idea of account aggregation was delivered as a solution. Account consolidation in e-banking as a form of digital banking appears to build stronger dating with clients. An account linking service is usually known as a service that permits customers to manipulate their bank accounts held at exceptional institutions through a common online banking platform that places a high priority on safety and statistics protection. The object affords an outline of the account aggregation approach in e-banking as a distinct carrier in the area of e-banking. The advanced facts generation is becoming a vital thing in the improvement of financial services enterprise, specifically the banking enterprise. It has brought different ways of delivering banking to the purchaser, which includes net Banking. Banks began to study electronic banking (e-banking) as a means to update some of their traditional branch functions and the use of the net as a distribution channel. Some clients have at least multiple accounts throughout banks and get the right of entry to that money owed through the usage of e-banking offerings. To examine the contemporary internet's well-worth position, customers have to log in to each of their money owed, get the information and work on consolidation. This no longer takes sufficient time; however, it is a repetitive interest at a specified frequency. To address this point, an account aggregation idea is brought as an answer. E-banking account aggregation, as one of the e-banking kinds, appeared to construct a more potent dating with clients. Account Aggregation carrier usually refers to a service that allows clients to control their bank bills maintained in one-of-a-kind institutions via a common Internet banking working platform, with an excessive subject to protection and privateness. This paper offers an overview of an e-banking account aggregation technique as a new provider in the e-banking field.

Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise developmente-banking, enterprise development

Procedia PDF Downloads 24
1600 Undeserving Hybrids: The Enduring Legacy of Eugenics in Conservation

Authors: Maria-Vittoria Carminati

Abstract:

Conservations laws do not protect hybrids. From the United States’ Endangered Species Act to the European Union’s conservation policies to the International Union for the Conservation of Nature’s Red List, hybrids don’t get the benefit of human preservation efforts. This paper tests the hypothesis that this practice is a byproduct of the co-birth of eugenics and conservation as twin fields and that while the first has been discredited and abandoned, the latter still bears the marks of its unfortunate primordial association. The research explores historical perspectives from so-called conservation luminaries such as Madison Grant, Ernst Mayr, and Charles Davenport and sheds light on how these influences continue to shape contemporary conservation approaches. The paper provides a comprehensive analysis of the implications of these factors on biodiversity conservation and the ethical considerations surrounding hybrid species protection.

Keywords: conservation, hybridization, eugenics, speciation, evolution

Procedia PDF Downloads 85
1599 Synthesis and Analytical Characterisation of Polymer-Silica Nanoparticles Composite for the Protection and Preservation of Stone Monuments

Authors: Sayed M. Ahmed, Sawsan S. Darwish, Nagib A. Elmarzugi, Mohammad A. Al-Dosari, Mahmoud A. Adam, Nadia A. Al-Mouallimi

Abstract:

Historical stone surfaces and architectural heritage may undergo unwanted changes due to the exposure to many physical and chemical deterioration factors, the innovative properties of the nano - materials can have advantageous application in the restoration and conservation of the cultural heritage with relation to the tailoring of new products for protection and consolidation of stone. The current work evaluates the effectiveness of inorganic compatible treatments; based on nanosized particles of silica (SiO2) dispersed in silicon based product, commonly used as a water-repellent/ consolidation for the construction materials affected by different kinds of decay. The nanocomposites obtained by dispersing the silica nanoparticles in polymeric matrices SILRES® BS OH 100 (solventless mixtures of ethyl silicates), in order to obtain a new nanocomposite, with hydrophobic and consolidation properties, to improve the physical and mechanical properties of the stone material. The nanocomposites obtained and pure SILRES® BS OH 100 were applied by brush Experimental stone blocks. The efficacy of the treatments has been evaluated after consolidation and artificial Thermal aging, through capillary water absorption measurements, Ultraviolet-light exposure to evaluate photo-induced and the hydrophobic effects of the treated surface, Scanning electron microscopy (SEM) examination is performed to evaluate penetration depth, re-aggregating effects of the deposited phase and the surface morphology before and after artificialaging. Sterio microscopy investigation is performed to evaluate the resistant to the effects of the erosion, acids and salts. Improving of stone mechanical properties were evaluated by compressive strength tests, colorimetric measurements were used to evaluate the optical appearance. All the results get together with the apparent effect that, silica/polymer nanocomposite is efficient material for the consolidation of artistic and architectural sandstone monuments, completely compatible, enhanced the durability of sandstone toward thermal and UV aging. In addition, the obtained nanocomposite improved the stone mechanical properties and the resistant to the effects of the erosion, acids and salts compared to the samples treated with pure SILRES® BS OH 100 without silica nanoparticles.

Keywords: colorimetric measurements, compressive strength, nanocomposites, porous stone consolidation, silica nanoparticles, sandstone

Procedia PDF Downloads 248