Search results for: protection of victims
1782 Human Lens Metabolome: A Combined LC-MS and NMR Study
Authors: Vadim V. Yanshole, Lyudmila V. Yanshole, Alexey S. Kiryutin, Timofey D. Verkhovod, Yuri P. Tsentalovich
Abstract:
Cataract, or clouding of the eye lens, is the leading cause of vision impairment in the world. The lens tissue have very specific structure: It does not have vascular system, the lens proteins – crystallins – do not turnover throughout lifespan. The protection of lens proteins is provided by the metabolites which diffuse inside the lens from the aqueous humor or synthesized in the lens epithelial layer. Therefore, the study of changes in the metabolite composition of a cataractous lens as compared to a normal lens may elucidate the possible mechanisms of the cataract formation. Quantitative metabolomic profiles of normal and cataractous human lenses were obtained with the combined use of high-frequency nuclear magnetic resonance (NMR) and ion-pairing high-performance liquid chromatography with high-resolution mass-spectrometric detection (LC-MS) methods. The quantitative content of more than fifty metabolites has been determined in this work for normal aged and cataractous human lenses. The most abundant metabolites in the normal lens are myo-inositol, lactate, creatine, glutathione, glutamate, and glucose. For the majority of metabolites, their levels in the lens cortex and nucleus are similar, with the few exceptions including antioxidants and UV filters: The concentrations of glutathione, ascorbate and NAD in the lens nucleus decrease as compared to the cortex, while the levels of the secondary UV filters formed from primary UV filters in redox processes increase. That confirms that the lens core is metabolically inert, and the metabolic activity in the lens nucleus is mostly restricted by protection from the oxidative stress caused by UV irradiation, UV filter spontaneous decomposition, or other factors. It was found that the metabolomic composition of normal and age-matched cataractous human lenses differ significantly. The content of the most important metabolites – antioxidants, UV filters, and osmolytes – in the cataractous nucleus is at least ten fold lower than in the normal nucleus. One may suppose that the majority of these metabolites are synthesized in the lens epithelial layer, and that age-related cataractogenesis might originate from the dysfunction of the lens epithelial cells. Comprehensive quantitative metabolic profiles of the human eye lens have been acquired for the first time. The obtained data can be used for the analysis of changes in the lens chemical composition occurring with age and with the cataract development.Keywords: cataract, lens, NMR, LC-MS, metabolome
Procedia PDF Downloads 3241781 Trafficking of Women in International Migration: Issues and Major Challenges in Present Scenario
Authors: Neha Singh, Anshuman Rana
Abstract:
Gender-Based Violence (GBV) is a violation of human rights and a form of discrimination which reinforces inequalities between men and women. It is defined as violence that is directed against a person on the basis of gender. There has been increased attention to human trafficking that has exposed to illegal migration. Trafficking is complex, but it generally takes place due to “push and pull factors”. India is both a source as well as a transit country for trafficking. Women are bought and sold with impunity and trafficked to other countries. They are forced to work as sex worker, forced labour and other practices of slavery. Trafficked victims often suffer from serious abuse and physical exhaustion. The effects of violence on women vary widely. GBV typically has physical, psychological and social effects. They face unwanted pregnancies, miscarriages, high rate of infertility and sexually transmitted disease. The social exclusion of women is so great that it constitutes a new form of apartheid. Women are considered as lesser value and deprived of their fundamental rights. Violation of human rights and fundamental freedom such as- trafficking of women, girls for sex trade, forced prostitution and sex tourism have become the focus of internationally organized crimes. My paper will analyse the impact of violence on society as well. Law alone cannot change the scenario and problem of gender-biasness. The whole issue of gender violence needs social awakening and change in attitude of masses, so that due respect and equal status is given to women.Keywords: gender-based violence, trafficking, migration, violence impact, social exclusion, law enforcement
Procedia PDF Downloads 2831780 A Regulatory Analysis on Legal Problems of BitCoin
Authors: Fady Tawakol
Abstract:
BitCoin is a decentralized cryptocurrency that can be used without the need of traditional central banks to accomplish any e-commerce trade. The use of such currency could facilitate new economic interactions and linkages. However, without effective and efficient regulations, cryptocurrency transactions are mostly used by criminals to commit crimes such as money laundering, theft, and blackmailing. And because law is one step behind technological developments, this paper discusses the importance of regulations and supervision for the BitCoin-system, to provide unified regulatory solutions for our digital future in the Middle East. It will provide a detailed analysis of the legal nature of BitCoin along with, its regulation with respect to criminal and civil law.Keywords: BitCoin, financial protection, crypto currency, money laundering
Procedia PDF Downloads 2101779 The Protection and Enhancement of the Roman Roads in Algeria
Authors: Tarek Ninouh, Ahmed Rouili
Abstract:
The Roman paths or roads offer a very interesting archaeological material, because they allow us to understand the history of human settlement and are also factors that increase territorial identity. Roman roads are one of the hallmarks of the Roman empire, which extends to North Africa. The objective of this investigation is to attract the attention of researchers to the importance of Roman roads and paths, which are found in Algeria, according to the quality of the materials and techniques used in this period of our history, and to encourage other decision makers to protect and enhance these routes because the current urbanization, intensive agricultural practices, or simply forgotten, decreases the sustainability of this important historical heritage.Keywords: Roman paths, quality of materials, property, valuation
Procedia PDF Downloads 4301778 Global Migration and Endangered Majorities in Europe
Authors: Liav Orgad
Abstract:
This article challenges one of the most fundamental propositions in the democratic theory that the majority culture is protected merely by the forces of democracy and thus needs no special legal protection. By describing changes in the patterns of migration to Europe, in the face of the European society, and in the world as a whole, the Article demonstrates that the majority culture is no longer automatically protected by the forces of democracy. It claims that the changing reality is not adequately addressed by political theory and human rights law and advances the promotion of a new concept—'cultural majority rights'.Keywords: European migration, European demography, democratic theory, majority rights, integration
Procedia PDF Downloads 4021777 Civilization and Violence: Islam, the West, and the Rest
Authors: Imbesat Daudi
Abstract:
One of the most discussed topics of the last century happens to be if Islamic civilization is violent. Many Western intellectuals have promoted the notion that Islamic civilization is violent. Citing 9/11, in which 3000 civilians were killed, they argue that Muslims are prone to violence because Islam promotes violence. However, Muslims reject this notion as nonsense. This topic has not been properly addressed. First, violence of civilizations cannot be proven by citing religious texts, which have been used in discussions over civilizational violence. Secondly, the question of whether Muslims are violent is inappropriate, as there is implicit bias suggesting that Islamic civilization is violent. A proper question should be which civilization is more violent. Third, whether Islamic civilization is indeed violent can only be established if more war-related casualties can be documented within the borders of Islamic civilization than that of their cohorts. This has never been done. Finally, the violent behavior of Muslim countries can be examined by comparing acts of violence committed by Muslim countries with acts of violence of groups of nations belonging to other civilizations by appropriate parameters of violence. Therefore, parameters reflecting group violence have been defined; violent conflicts of various civilizations of the last two centuries were documented, quantified by number of conflicts and number of victims, and compared with each other by following the established principles of statistics. The results show that whereas 80% of genocides and massacres were conducted by Western nations, less than 5% of acts of violence were committed by Muslim countries. Furthermore, the West has the highest incidence (new) and prevalence (new and old) of violent conflicts among all groups of nations. The result is unambiguous and statistically significant. Becoming informed can only be done by a methodical collection of relevant data, objective analysis of data, and unbiased information, a process which this paper follows.Keywords: Islam and violence, civilizational violence, demonization of Islam
Procedia PDF Downloads 541776 Exploring the Correlation between Human Security, Human Rights and Justice in Addressing and Remedying Contemporary Challenges in Africa
Authors: Sikhumbuzo Zondi, Serges A. Kamga
Abstract:
Human security and human rights are mutually reinforcing concepts given that human security addresses questions related to human conditions such as the safety of individuals and the protection of individual rights and civil liberties. It does this by suggesting that the proper referent for security should be the individual and not the nation-state, due to the individual’s vulnerability to threats such as malnutrition and poverty, conflicts, exploitation and marginalization, despotism and climate change. Due to the primacy of the individual, human security comfortably expand to the notion of social justice, given that for far too-long, many individuals around the world have been denied of their basic human rights through racial discrimination, unfair labour and segregation policies and as a result encountered widespread social, environmental and economic injustices which are evident in the current structural division of the world between the developed north and the underdeveloped or developing south. In light of this view, ensuring freedom from want and freedom from fear, for all individuals is arguably the sound route to addressing and remedying the global ills of our time and a way to promoting human rights for all. The promotion of human security provides an important part of human/societal progress because inclusive security facilitates development and human rights protection, while insecurity reduces people’s growth and investment prospects and prolongs historical injustices. Therefore, this paper seeks to show that human security and human rights complements one another and that this correlation provides the necessary mechanisms for addressing and remedying the historical injustices that still affect most of the world’s population. It will look at linkages between human security and the individual right to equality and freedom from discrimination, right to life, liberty, and personal security; development; own property; adequate living standard; education; desirable work and to join trade unions; participate in government and in free elections; social security and equality before the law. The paper considers these human rights and liberties as vital for securing the core values of human life while at the same addressing socio-economic injustices that still persist in the contemporary world. The paper will be a desktop study using qualitative research methods on two case studies in Africa namely Cameroun and South Africa.Keywords: justice, human security, human rights, injustices
Procedia PDF Downloads 1671775 Closing the Front Door of Child Protection: Rethinking Mandated Reporting
Authors: Miriam Itzkowitz, Katie Olson
Abstract:
Through an interdisciplinary and trauma-responsive lens, this article reviews the legal and social history of mandated reporting laws and family separation, examines the ethical conundrum of mandated reporting as it relates to evidence-based practice, and discusses alternatives to mandated reporting as a primary prevention strategy. Using existing and emerging data, the authors argue that mandated reporting as a universal strategy contributes to racial disproportionality in the child welfare system and that anti-racist practices should begin with an examination of our reliance on mandated reporting.Keywords: child welfare, education, mandated reporting, racial disproportionality, trauma
Procedia PDF Downloads 3551774 Digital Immunity System for Healthcare Data Security
Authors: Nihar Bheda
Abstract:
Protecting digital assets such as networks, systems, and data from advanced cyber threats is the aim of Digital Immunity Systems (DIS), which are a subset of cybersecurity. With features like continuous monitoring, coordinated reactions, and long-term adaptation, DIS seeks to mimic biological immunity. This minimizes downtime by automatically identifying and eliminating threats. Traditional security measures, such as firewalls and antivirus software, are insufficient for enterprises, such as healthcare providers, given the rapid evolution of cyber threats. The number of medical record breaches that have occurred in recent years is proof that attackers are finding healthcare data to be an increasingly valuable target. However, obstacles to enhancing security include outdated systems, financial limitations, and a lack of knowledge. DIS is an advancement in cyber defenses designed specifically for healthcare settings. Protection akin to an "immune system" is produced by core capabilities such as anomaly detection, access controls, and policy enforcement. Coordination of responses across IT infrastructure to contain attacks is made possible by automation and orchestration. Massive amounts of data are analyzed by AI and machine learning to find new threats. After an incident, self-healing enables services to resume quickly. The implementation of DIS is consistent with the healthcare industry's urgent requirement for resilient data security in light of evolving risks and strict guidelines. With resilient systems, it can help organizations lower business risk, minimize the effects of breaches, and preserve patient care continuity. DIS will be essential for protecting a variety of environments, including cloud computing and the Internet of medical devices, as healthcare providers quickly adopt new technologies. DIS lowers traditional security overhead for IT departments and offers automated protection, even though it requires an initial investment. In the near future, DIS may prove to be essential for small clinics, blood banks, imaging centers, large hospitals, and other healthcare organizations. Cyber resilience can become attainable for the whole healthcare ecosystem with customized DIS implementations.Keywords: digital immunity system, cybersecurity, healthcare data, emerging technology
Procedia PDF Downloads 691773 Development of the Squamate Egg Tooth on the Basis of Grass Snake Natrix natrix Studies
Authors: Mateusz Hermyt, Pawel Kaczmarek, Weronika Rupik
Abstract:
The egg tooth is a crucial structure during hatching of lizards and snakes. In contrast to birds, turtles, crocodiles, and monotremes, egg tooth of squamate reptiles is a true tooth sharing common features of structure and development with all the other teeth of vertebrates. The egg tooth; however, due to its function, exhibits structural differences in relation to regular teeth. External morphology seems to be important in the context of phylogenetic relationships within Squamata but up to date, there is scarce information concerning structure and development of the egg tooth at the submicroscopical level. In presented studies detailed analysis of the egg tooth development in grass snake has been performed with the usage of light (including fluorescent), transmission and scanning electron microscopy. Grass snake embryo’s heads have been used in our studies. Grass snake is common snake species occurring in most of Europe including Poland. The grass snake is characterized by the presence of single unpaired egg tooth (as in most squamates) in contrast to geckos and dibamids possessing paired egg teeth. Studies show changes occurring on the external morphology, tissue and cellular levels of differentiating egg tooth. The egg tooth during its development changes its curvature. Initially, faces directly downward and in the course of its differentiation, it gradually changes to rostro-ventral orientation. Additionally, it forms conical dentinal protrusions on the sides. Histological analysis showed that egg tooth development occurs in similar steps in relation to regular teeth. It undergoes initiation, bud, cap and bell morphological stages. Analyses focused on describing morphological changes in hard tissues (mainly dentin and predentin) of egg tooth and in cells which enamel organ consists of. It included: outer enamel epithelium, stratum intermedium, inner enamel epithelium, odontoblasts, and cells of dental pulp. All specimens used in the study were captured according to the Polish regulations concerning the protection of wild species. Permission was granted by the Local Ethics Commission in Katowice (41/2010; 87/2015) and the Regional Directorate for Environmental Protection in Katowice (WPN.6401.257.2015.DC).Keywords: hatching, organogenesis, reptile, Squamata
Procedia PDF Downloads 1801772 The Regulation of Reputational Information in the Sharing Economy
Authors: Emre Bayamlıoğlu
Abstract:
This paper aims to provide an account of the legal and the regulative aspects of the algorithmic reputation systems with a special emphasis on the sharing economy (i.e., Uber, Airbnb, Lyft) business model. The first section starts with an analysis of the legal and commercial nature of the tripartite relationship among the parties, namely, the host platform, individual sharers/service providers and the consumers/users. The section further examines to what extent an algorithmic system of reputational information could serve as an alternative to legal regulation. Shortcomings are explained and analyzed with specific examples from Airbnb Platform which is a pioneering success in the sharing economy. The following section focuses on the issue of governance and control of the reputational information. The section first analyzes the legal consequences of algorithmic filtering systems to detect undesired comments and how a delicate balance could be struck between the competing interests such as freedom of speech, privacy and the integrity of the commercial reputation. The third section deals with the problem of manipulation by users. Indeed many sharing economy businesses employ certain techniques of data mining and natural language processing to verify consistency of the feedback. Software agents referred as "bots" are employed by the users to "produce" fake reputation values. Such automated techniques are deceptive with significant negative effects for undermining the trust upon which the reputational system is built. The third section is devoted to explore the concerns with regard to data mobility, data ownership, and the privacy. Reputational information provided by the consumers in the form of textual comment may be regarded as a writing which is eligible to copyright protection. Algorithmic reputational systems also contain personal data pertaining both the individual entrepreneurs and the consumers. The final section starts with an overview of the notion of reputation as a communitarian and collective form of referential trust and further provides an evaluation of the above legal arguments from the perspective of public interest in the integrity of reputational information. The paper concludes with certain guidelines and design principles for algorithmic reputation systems, to address the above raised legal implications.Keywords: sharing economy, design principles of algorithmic regulation, reputational systems, personal data protection, privacy
Procedia PDF Downloads 4671771 Understanding Gender-Based Violence through an Adolescent Lens: Qualitative Findings from Delhi, India
Authors: Pratishtha Singh
Abstract:
Gender-based violence (GBV) or gendered violence refers to violence inflicted on a person because of their gender. Majority of men who perpetrate gender-based violence, first do so during their teenage years. Further, the first sexual experience of most girls is coerced. In order to reduce the widespread occurrence of GBV, it is vital to intervene and reach people, especially boys, when their attitudes and beliefs about sexuality and gender are developing. This study aims to understand GBV through an adolescent lens, focusing on their knowledge, attitudes and experiences regarding gendered abuse. This is a cross-sectional, qualitative study. The respondents are Delhi based students in grades 11th and 12th, recruited via snowball sampling. Sixteen in-depth, telephonic interviews were carried out in the month of April, 2020. The data was transcribed verbatim into MS Word and qualitative coding was undertaken in Atlas.ti 8. Twelve out of sixteen respondents admitted experiencing sexual GBV. Out of these, a little more than half of the victims reported it to somebody. Thematic analysis revealed key themes of: (i) Introduction and reinforcement of a patriarchal structure (ii) Violence in teen dating (iii) Acceptability and normalization of violence and (iv) Justice System. Findings reflect a process wherein GBV becomes an intricate part of adolescents’ lives. Participants showed a moderately well-informed understanding of gendered abuse whereas attitudes reflected a complex combination of internalized patriarchy and a desire to bring positive societal reform. The results of this study highlight a need for health promoting, gender-equitable interventions.Keywords: adolescents, gender, health, violence
Procedia PDF Downloads 1281770 Blue Nature-Based Tourism to Enhance Sustainable Development in Pakistan Coastal Areas
Authors: Giulia Balestracci
Abstract:
Pakistan is endowed with diversified natural capital spanning along the 1000-kilometer-long coastline, shared by the coastal provinces of Sindh and Balochistan. It includes some of the most diverse, extensive, and least disturbed reef areas in the Indian Ocean. Pakistani marine and coastal ecosystems are fundamental for the social and economic well-being of the region. They support economic activities such as fishing, shrimp farming, tourism, and shipping, which contribute to income, food security, and the livelihood of millions of people. The coastal regions of Sindh and Balochistan are rich in natural resources and diverse ecosystems, and host also rural coastal communities that have been the keepers of rich cultural legacies and pristine natural landscapes. However, significant barriers hinder tourism development, such as the daunting socio-economic challenges, including the post-COVID-19 scenario, forced migration, institutional gaps, and the ravages of climate change. Pakistan holds immense potential for the tourism sector development within the framework of a sustainable blue economy, thereby fostering greener economic growth and employment opportunities, securing financing for the protection and conservation of its coastal and marine natural assets. Based on the assessment of Pakistan’s natural and cultural coastal and maritime tourism resources, a deep study of the regulatory and institutional aspects of the tourism sector in the country accompanied by the SWOT analysis and accompanied by an in-depth interview with a member of the Pakistan National Tourism Coordination Board (NTCB). A market analysis has been developed, and Lao PDR, Thailand, and Indonesia’s ecotourism development have been analyzed under a comparative analysis length to recommend some nature-based tourism activities for the sustainable development of the coastal areas in Pakistan. Nature-based tourism represents a win-win option as it uses economic incentives for the protection and cultural uses of natural resources. This article stresses the importance of nature-based activities for blue tourism, aligning conservation with developmental goals to safeguard natural resources and cultural heritage, all while fostering economic prosperity.Keywords: blue tourism, coastal Pakistan, nature-based tourism, sustainable blue economy, sustainable development
Procedia PDF Downloads 841769 Strategic Management for Corporate Social Responsibility in Colombian Industries: A Typology of CSR
Authors: Iris Maria Velez Osorio
Abstract:
There has been in the last decade a concern about the environment, particularly about clean and enough water for human consumption but, some enterprises had some trouble to understand the limited resources in the environment. This research tries to understand how some industries are better oriented to the preservation of the environment through investment for strategic management of scarce resources and try in the best way possible, the contaminants. It was made an industry classification since four different group of theories for Corporate Social Responsibility agree with variables of: investment in environmental care, water protection, and residues treatment finding different levels of commitment with CSR.Keywords: corporate social responsibility, environment, strategic management, water
Procedia PDF Downloads 3771768 Grid Connected Photovoltaic Micro Inverter
Authors: S. J. Bindhu, Edwina G. Rodrigues, Jijo Balakrishnan
Abstract:
A grid-connected photovoltaic (PV) micro inverter with good performance properties is proposed in this paper. The proposed inverter with a quadrupler, having more efficiency and less voltage stress across the diodes. The stress that come across the diodes that use in the inverter section is considerably low in the proposed converter, also the protection scheme that we provided can eliminate the chances of the error due to fault. The proposed converter is implemented using perturb and observe algorithm so that the fluctuation in the voltage can be reduce and can attain maximum power point. Finally, some simulation and experimental results are also presented to demonstrate the effectiveness of the proposed converter.Keywords: DC-DC converter, MPPT, quadrupler, PV panel
Procedia PDF Downloads 8421767 Evaluation of Radio Protective Potential of Indian Bamboo Leaves
Authors: Mansi Patel, Priti Mehta
Abstract:
Background: Ionizing radiations have detrimental effects on humans, and the growing technological encroachment has increased human exposure to it enormously. So, the safety issues have emphasized researchers to develop radioprotector from natural resources having minimal toxicity. A substance having anti-inflammatory, antioxidant, and immunomodulatory activity can be a potential candidate for radioprotection. One such plant with immense potential i.e. Bamboo was selected for the present study. Purpose: The study aims to evaluate the potential of Indian bamboo leaves for protection against the clastogenic effect of gamma radiation. Methods: The protective effect of bamboo leaf extract against gamma radiation-induced genetic damage in human peripheral blood lymphocytes (HPBLs) was evaluated in vitro using Cytokinesis blocked micronuclei assay (CBMN). The blood samples were pretreated with varying concentration of extract 30 min before the radiation exposure (4Gy & 6Gy). The reduction in the frequency of micronuclei was observed for the irradiated and control groups. The effect of various concentration of bamboo leaf extract (400,600,800 mg/kg) on the development of radiation induced sickness and altered mortality in mice exposed to 8 Gy of whole-body gamma radiation was studied. The developed symptoms were clinically scored by multiple endpoints for 30 days. Results: Treatment of HPBLs with varying concentration of extract before exposure to a different dose of γ- radiation resulted in significant (P < 0.0001) decline of radiation induced micronuclei. It showed dose dependent and concentration driven activity. The maximum protection ~ 70% was achieved at nine µg/ml concentration. Extract treated whole body irradiated mice showed 50%, 83.3% and 100% survival for 400, 600, and 800mg/kg with 1.05, 0.43 and 0 clinical score respectively when compared to Irradiated mice having 6.03 clinical score and 0% survival. Conclusion: Our findings indicate bamboo leaf extract reduced the radiation induced cytogenetic damage. It has also increased the survival ratio and reduced the radiation induced sickness and mortality when exposed to a lethal dose of gamma radiation.Keywords: bamboo leaf extract, Cytokinesis blocked micronuclei (CBMN) assay, ionizing radiation, radio protector
Procedia PDF Downloads 1471766 The Relevance of Family Involvement in the Journey of Dementia Patients
Authors: Akankunda Veronicah Karuhanga
Abstract:
Dementia is an age mental disorder that makes victims lose normal functionality that needs delicate attention. It has been technically defined as a clinical syndrome that presents a number of difficulties in speech and other cognitive functions that change someone’s behaviors and can also cause impairments in activities of daily living, not forgetting a range of neurological disorders that bring memory loss and cognitive impairment. Family members are the primary healthcare givers and therefore, the way how they handle the situation in its early stages determines future deterioration syndromes like total memory loss. Unfortunately, most family members are ignorant about this condition and in most cases, the patients are brought to our facilities when their condition was already mismanaged by family members and we thus cannot do much. For example, incontinence can be managed at early stages through potty training or toilet scheduling before resorting to 24/7 diapers which are also not good. Professional Elderly care should be understood and practiced as an extension of homes, not a dumping place for people considered “abnormal” on account of ignorance. Immediate relatives should therefore be sensitized concerning the normalcy of dementia in the context of old age so that they can be understanding and supportive of dementia patients rather than discriminating against them as present-day lepers. There is a need to skill home-based caregivers on how to handle dementia in its early stages. Unless this is done, many of our elderly homes shall be filled with patients who should have been treated and supported from their homes. This skilling of home-based caregivers is a vital intervention because until elderly care is appreciated as a human moral obligation, many transactional rehabilitation centers will crop up and this shall be one of the worst moral decadences of our times.Keywords: dementia, family, Alzheimers, relevancy
Procedia PDF Downloads 971765 Early-Warning Lights Classification Management System for Industrial Parks in Taiwan
Authors: Yu-Min Chang, Kuo-Sheng Tsai, Hung-Te Tsai, Chia-Hsin Li
Abstract:
This paper presents the early-warning lights classification management system for industrial parks promoted by the Taiwan Environmental Protection Administration (EPA) since 2011, including the definition of each early-warning light, objectives, action program and accomplishments. All of the 151 industrial parks in Taiwan were classified into four early-warning lights, including red, orange, yellow and green, for carrying out respective pollution management according to the monitoring data of soil and groundwater quality, regulatory compliance, and regulatory listing of control site or remediation site. The Taiwan EPA set up a priority list for high potential polluted industrial parks and investigated their soil and groundwater qualities based on the results of the light classification and pollution potential assessment. In 2011-2013, there were 44 industrial parks selected and carried out different investigation, such as the early warning groundwater well networks establishment and pollution investigation/verification for the red and orange-light industrial parks and the environmental background survey for the yellow-light industrial parks. Among them, 22 industrial parks were newly or continuously confirmed that the concentrations of pollutants exceeded those in soil or groundwater pollution control standards. Thus, the further investigation, groundwater use restriction, listing of pollution control site or remediation site, and pollutant isolation measures were implemented by the local environmental protection and industry competent authorities; the early warning lights of those industrial parks were proposed to adjust up to orange or red-light. Up to the present, the preliminary positive effect of the soil and groundwater quality management system for industrial parks has been noticed in several aspects, such as environmental background information collection, early warning of pollution risk, pollution investigation and control, information integration and application, and inter-agency collaboration. Finally, the work and goal of self-initiated quality management of industrial parks will be carried out on the basis of the inter-agency collaboration by the classified lights system of early warning and management as well as the regular announcement of the status of each industrial park.Keywords: industrial park, soil and groundwater quality management, early-warning lights classification, SOP for reporting and treatment of monitored abnormal events
Procedia PDF Downloads 3271764 Lessons from Nature: Defensive Designs for the Built Environment
Authors: Rebecca A. Deek
Abstract:
There is evidence that erratic and extreme weather is becoming a common occurrence, and even predictions that this will become even more frequent and more severe. It also appears that the severity of earthquakes is intensifying. Some observers believe that human conduct has given reasons for such change; others attribute this to environmental and geological cycles. However, as some physicists, environmental scientists, politicians, and others continue to debate the connection between weather events, seismic activities, and climate change, other scientists, engineers, and urban planners are exploring how can our habitat become more responsive and resilient to such phenomena. There are a number of recent instances of nature’s destructive events that provide basis for the development of defensive measures.Keywords: biomimicry, natural disasters, protection of human lives, resilient infrastructures
Procedia PDF Downloads 5101763 The Influence of Immunity on the Behavior and Dignity of Judges
Authors: D. Avnieli
Abstract:
Immunity of judges from liability represents a departure from the principle that all are equal under the law, and that victims may be granted compensation from their offenders. The purpose of the study is to determine if judicial immunity coincides with the need to ensure the existence of highly independent and incorruptible judiciary. Judges are immune from civil and criminal liability for their judicial acts. Judicial immunity is justified by the need to maintain complete independence and discretion of the judiciary. Scholars and judges believe that absolute immunity is needed to shield judges from pressures, threats, or outside interference. It is commonly accepted, that judges should be free to perform their judicial role in accordance with their assessment of the fact and their understanding of the law, without any restrictions, influences, inducements or interferences. In most countries, immunity applies when judges act in excess of jurisdiction. In some countries, it applies even when they act maliciously or corruptly. The only exception to absolute immunity applicable in all judicial systems is when judges act without jurisdiction over the subject matter. The Israeli Supreme Court recently decided to embrace absolute immunity and strike off a lawsuit of a refugee, who was unlawfully incarcerated. The Court ruled that the plaintiff cannot sue the State or the judge for damages. The questions of malice, dignity, and public scrutiny were not discussed. This paper, based on comparative analysis of many cases, aims to determine if immunity affects the dignity and behavior of judges. It demonstrates that most judges maintain their dignity and ethical code of behavior, but sometimes do not hesitate to act consciously in excess of jurisdiction, and in rare cases even corruptly. Therefore, in order to maintain independent and incorruptible judiciary, immunity should not be applied where judges act consciously in excess of jurisdiction or with malicious incentives.Keywords: incorruptible judiciary, immunity, independent, judicial, judges, jurisdiction
Procedia PDF Downloads 1061762 Enabling Oral Communication and Accelerating Recovery: The Creation of a Novel Low-Cost Electroencephalography-Based Brain-Computer Interface for the Differently Abled
Authors: Rishabh Ambavanekar
Abstract:
Expressive Aphasia (EA) is an oral disability, common among stroke victims, in which the Broca’s area of the brain is damaged, interfering with verbal communication abilities. EA currently has no technological solutions and its only current viable solutions are inefficient or only available to the affluent. This prompts the need for an affordable, innovative solution to facilitate recovery and assist in speech generation. This project proposes a novel concept: using a wearable low-cost electroencephalography (EEG) device-based brain-computer interface (BCI) to translate a user’s inner dialogue into words. A low-cost EEG device was developed and found to be 10 to 100 times less expensive than any current EEG device on the market. As part of the BCI, a machine learning (ML) model was developed and trained using the EEG data. Two stages of testing were conducted to analyze the effectiveness of the device: a proof-of-concept and a final solution test. The proof-of-concept test demonstrated an average accuracy of above 90% and the final solution test demonstrated an average accuracy of above 75%. These two successful tests were used as a basis to demonstrate the viability of BCI research in developing lower-cost verbal communication devices. Additionally, the device proved to not only enable users to verbally communicate but has the potential to also assist in accelerated recovery from the disorder.Keywords: neurotechnology, brain-computer interface, neuroscience, human-machine interface, BCI, HMI, aphasia, verbal disability, stroke, low-cost, machine learning, ML, image recognition, EEG, signal analysis
Procedia PDF Downloads 1191761 Flexible Current Collectors for Printed Primary Batteries
Authors: Vikas Kumar
Abstract:
Portable batteries are reliable source of mobile energy to power smart wearable electronics, medical devices, communications, and others internet of thing (IoT) devices. There is a continuous increase in demand for thinner, more flexible battery with high energy density and reliability to meet the requirement. For a flexible battery, factors that affect these properties are the stability of current collectors, electrode materials and their interfaces with the corrosive electrolytes. State-of-the-art conventional and flexible batteries utilise carbon as an electrode and current collectors which cause high internal resistance (~100 ohms) and limit the peak current to ~1mA. This makes them unsuitable for a wide range of applications. Replacing the carbon parts with metallic components would reduce the internal resistance (and hence reduce parasitic loss), but significantly increases the risk of corrosion due to galvanic interactions within the battery. To overcome these challenges, low cost electroplated nickel (Ni) on copper (Cu) was studied as a potential anode current collector for a zinc-manganese oxide primary battery with different concentration of NH4Cl/ZnCl2 electrolyte. Using electrical impedance spectroscopy (EIS), we monitored the open circuit potential (OCP) of electroplated nickel (different thicknesses) in different concentration of electrolytes to optimise the thickness of Ni coating. Our results show that electroless Ni coating suffer excessive corrosion in these electrolytes. Corrosion rates of Ni coatings for different concentrations of electrolytes have been calculated with Tafel analysis. These results suggest that for electroplated Ni, channelling and/or open porosity is a major issue, which was confirmed by morphological analysis. These channels are an easy pathway for electrolyte to penetrate thorough Ni to corrode the Ni/Cu interface completely. We further investigated the incorporation of a special printed graphene layer on Ni to provide corrosion protection in this corrosive electrolyte medium. We find that the incorporation of printed graphene layer provides the corrosion protection to the Ni and enhances the chemical bonding between the active materials and current collector and also decreases the overall internal resistance of the battery system.Keywords: corrosion, electrical impedance spectroscopy, flexible battery, graphene, metal current collector
Procedia PDF Downloads 1291760 Analysis of Histogram Asymmetry for Waste Recognition
Authors: Janusz Bobulski, Kamila Pasternak
Abstract:
Despite many years of effort and research, the problem of waste management is still current. So far, no fully effective waste management system has been developed. Many programs and projects improve statistics on the percentage of waste recycled every year. In these efforts, it is worth using modern Computer Vision techniques supported by artificial intelligence. In the article, we present a method of identifying plastic waste based on the asymmetry analysis of the histogram of the image containing the waste. The method is simple but effective (94%), which allows it to be implemented on devices with low computing power, in particular on microcomputers. Such de-vices will be used both at home and in waste sorting plants.Keywords: waste management, environmental protection, image processing, computer vision
Procedia PDF Downloads 1201759 Discrimination Faced by Dalit Women in India
Authors: Soundarya Lahari Vedula
Abstract:
Dalit women make up a significant portion of the Indian population. However, they are victims of age old discrimination. This paper presents a brief background of the Indian caste system which is a hierarchical division placing Dalits at the lowest rank. Dalits are forced to perform menial and harsh tasks. They often face social ostracism. The situation of Dalit women is of unique significance as they face triple discrimination due to their caste, gender, and class. Dalit women are strictly withheld by the rigid boundaries of the caste system. They are discriminated at every stage of their life and are denied access to public places, education and healthcare facilities among others. They face the worst forms of sexual violence. In spite of legislations and international conventions in place, their plight is not adequately addressed. This paper discusses, in brief, the legal mechanism in place to prohibit untouchability. Furthermore, this paper details on the specific human rights violations faced by Dalit women in the social, economic and political spheres. The violations range from discrimination in public places, denial of education and health services, sexual exploitation and barriers to political representation. Finally, this paper identifies certain lacunae in the existing Indian statutes and broadens on the measures to be taken to improve the situation of Dalit women. This paper offers some recommendations to address the plight of Dalit women such as amendments to the existing statutes, effective implementation of legal mechanisms and a more meaningful interpretation of the international conventions.Keywords: Dalit, caste, class, discrimination, equality
Procedia PDF Downloads 2021758 African Traditional Method of Social Control Mechanism: A Sociological Review of Native Charms in Farm Security in Ayetoro Community, Ogun State, Nigeria
Authors: Adebisi A. Sunday, Babajide Adeokin
Abstract:
The persistent rise in farm theft in rural region of Nigeria is attributed to the lack of adequate and effective policing in the regions; thus, this brought about the inevitable introduction of native charms on farmlands as a means of fortification of harvests against theft in Ayetoro community. The use of charm by farmers as security on farmlands is a traditional crime control mechanism that is largely based on unwritten laws which greatly influenced the lives of people, and their attitudes toward the society. This research presents a qualitative sociological study on how native charms are deployed by farmers for protection against theft. The study investigated the various types of charms that are employed as security measures among farmers in Ayetoro community and the rationale behind the use of these mechanisms as farm security. The study utilized qualitative method to gather data in the research process. Under the qualitative method, in-depth interview method was adopted to generate a robust and detailed data from the respondents. Also the data generated were analysed qualitatively using thematic content analysis and simple description which was preceded by transcription of data from the recorder. It was revealed that amidst numerous charms known, two major charms are used on farmlands as a measure of social control in Ayetoro community, Ogun state South West Nigeria. Furthermore, the result of this study showed that, the desire for safekeeping of harvest from pilferers and the heavy punishments dispense on offenders by native charms are the reasons why farmers deploy charms on their farms. In addition, findings revealed that the adoption of these charms for protection has improved yields among farmers in the community because the safety of harvest has been made possible by virtue of the presence of various charms in the farm lands. Therefore, based on the findings of this study, it is recommended that such measures should be recognized in mainstream social control mechanisms in the fight against crime in Nigeria and the rest of the world. Lastly, native charms could be installed in all social and cooperate organisation and position of authority to prevent theft of valuables and things hold with utmost importance.Keywords: Ayetoro, farm theft, mechanism, native charms, Pilferer
Procedia PDF Downloads 1461757 The Right to Development as Constitutive and Prescriptive Right: The Lower Omo Valley Case of Ethiopia
Authors: Kebene K. Wodajo
Abstract:
The right to development (RTD) has gone through different phases of metamorphoses, from the right to economic growth to full human development. Despite the fact that Africa has taken the lead in articulating and recognizing the RTD in a binding multilateral human rights treaty, realization of the right poses a challenge at the operational level. The challenge is worse in Sub-Saharan Africa, mainly because governments often tend to set economic growth as their ultimate goal, with very little consideration to the local peoples’ welfare in their territory. Ethiopia is not an exception to this. While recording a fast economic growth, yet this has been accompanied by increasing severity of multidimensional poverty. This paper explores the place of the ‘people’ in the development trajectory Ethiopia is pursuing and if and how a right-based approach to development could be brought to practice beyond the rhetoric. By inquiring into the place of the ‘people’, the paper attempts to show whether the people are at the center or at the periphery, beneficiary or victims of the ongoing development. In doing so, it divulges the gulf between the rhetoric and the reality of development practice. By asking/discussing if and how a right-based approach to development could bridge the gap, the paper shows how this approach could translate ‘people’s’ need into right, and recognize them as active subjects and stakeholders of the process of development. As an instance of showing the gap, the paper takes the Lower Omo valley sugar plantation project as a case in point. Through analysis the paper demonstrates that the development trajectory being followed by Ethiopia falls short of fitting into the human development discourse of UN Declaration on the Right to Development (DRD), the African Charter on People and Human Rights (the Charter) and the Ethiopian constitution. The paper argues that Ethiopia’s development efforts must take account of both the constitutive and prescriptive nature of the RTD if social equity is to be met.Keywords: development, Ethiopia, lower Omo valley, right-based approach, right to development, people, people’s right
Procedia PDF Downloads 3231756 Conservation of Sea Turtle in Cox’s Bazar- Teknaf Peninsula and Sonadia Island Ecologically Critical Area (ECA) of Bangladesh
Authors: Pronob Kumar Mozumder M. Nazrul Islam, M. Abdur Rob Mollah
Abstract:
This study was conducted in Cox’s Bazar-Teknaf Peninsula and Sonadia Island Ecologically Critical Areas during the period of October, 2011 to June, 2013. Six species of marine turtle are found in the Indian Ocean. Among them, olive ridley (Lepidochelys olivacea) listed as endangered in the IUCN Red List of Threatened Species. Marine turtle populations in the Indian Ocean have been depleted through long-term exploitation of eggs and adults, incidental capture (fisheries bycatch) and many other sources of mortality. The specific objective of the study was to conserve the sea turtles specially the olive ridley (Lepidochelys olivacea) with a view to contribute towards protection of the turtle species from extinction and to facilitate hatching of eggs through providing protection to turtle eggs or nest through ex-situ conservation efforts. In order to achieve the desired outputs and success, a total of five turtle hatcheries were established at Pechardwip, Khurermukh, Hazompara, Bodormokam, and Sonadia Eastpara sites. In total, 31,853 eggs were collected from 260 nests and were transferred to five hatcheries. The number of eggs/nest varied from 38 to 190 with an average clutch size of 122 eggs/ nest. Hatching of eggs took place during January to June with a peak in April. Sea turtle eggs were incubated by metabolic heat and the heat of the sun. The incubation period of turtle eggs in Cox’s Bazar-Teknaf Peninsula and Sonadia Island ECAs extended from 54 to 75 days depending on the month with an average of 66 days. During study period the temperature in the ECAs varied between 10.5-34.5°C. A total of 27,937 hatchlings of turtle were produced from the five hatcheries and all the hatchlings produced were released into the sea. Hatching rates varied from 74-98 % depending on the location and months with an average of 88 %. Sea turtles spend the majority of their lives in the sea, only emerging on beaches to nest. Despite the intense conservation efforts on the beaches, some populations have still declined to the edge of extinction. So proper conservation and awareness measure should be taken for prevention of turtle extinction.Keywords: conservation of sea turtle, Bangladesh, ecologically critical area, ECA, Lepidochelys olivacea
Procedia PDF Downloads 5151755 Pathway to Sustainable Shipping: Electric Ships
Authors: Wei Wang, Yannick Liu, Lu Zhen, H. Wang
Abstract:
Maritime transport plays an important role in global economic development but also inevitably faces increasing pressures from all sides, such as ship operating cost reduction and environmental protection. An ideal innovation to address these pressures is electric ships. The electric ship is in the early stage. Considering the special characteristics of electric ships, i.e., travel range limit, to guarantee the efficient operation of electric ships, the service network needs to be re-designed carefully. This research designs a cost-efficient and environmentally friendly service network for electric ships, including the location of charging stations, charging plan, route planning, ship scheduling, and ship deployment. The problem is formulated as a mixed-integer linear programming model with the objective of minimizing total cost comprised of charging cost, the construction cost of charging stations, and fixed cost of ships. A case study using data of the shipping network along the Yangtze River is conducted to evaluate the performance of the model. Two operating scenarios are used: an electric ship scenario where all the transportation tasks are fulfilled by electric ships and a conventional ship scenario where all the transportation tasks are fulfilled by fuel oil ships. Results unveil that the total cost of using electric ships is only 42.8% of using conventional ships. Using electric ships can reduce 80% SOx, 93.47% NOx, 89.47% PM, and 42.62% CO2, but will consume 2.78% more time to fulfill all the transportation tasks. Extensive sensitivity analyses are also conducted for key operating factors, including battery capacity, charging speed, volume capacity, and a service time limit of transportation task. Implications from the results are as follows: 1) it is necessary to equip the ship with a large capacity battery when the number of charging stations is low; 2) battery capacity will influence the number of ships deployed on each route; 3) increasing battery capacity will make the electric ship more cost-effective; 4) charging speed does not affect charging amount and location of charging station, but will influence the schedule of ships on each route; 5) there exists an optimal volume capacity, at which all costs and total delivery time are lowest; 6) service time limit will influence ship schedule and ship cost.Keywords: cost reduction, electric ship, environmental protection, sustainable shipping
Procedia PDF Downloads 781754 Winning the “Culture War”: Greater Hungary and the American Confederacy as Sites of Nostalgia, Mythology, and Problem-Making for the Far Right in the US and Hungary
Authors: Grace Rademacher
Abstract:
Trauma” of the Kingdom of Hungary and the “Lost Cause” of the American Confederacy. Applying Nicole Maurantonio’s articulation of “confederate exceptionalism” and Svetlana Boym’s definition of “restorative nostalgia”, this article argues that, via memorialization and public discourse, both far right bodies flood their constituencies with narratives of nostalgia and martyrdom to sow existential anxieties about past and prophetic victimhood, all under the guise of protecting or restoring heritage. Linking this practice to gamification and conspiracy theorizing and following the work of Patrick Jagoda, this article identifies such industries of nostalgia as means by which the far right in both nations can partake in the “immanent and improvisational process of problem making.” Reified through monuments and references to the Trianon Trauma and the American confederacy, political actors “problem make” by alleging that they are victims of the West or the Left, subject to the cruel whims of liberalism and denial of historical legitimacy. In both nations, relying on their victimhood, pundits and politicians can appeal to white supremacists and distract citizens from legitimate active conflicts, such as wars or democratic rollbacks, redirecting them to fictional, mythical attacks on Hungarian or American society and civilization. This article will examine memorials and monuments as “lieux de memoire” and identify the purposeful similarities between the discourse of public figures and politicians such as María Schmidt, János Lázár, and Viktor Orbán, with that of Donald Trump and pundits such as Tucker Carlson.Keywords: nationalism, political memory, white supremacy, trianon
Procedia PDF Downloads 771753 Estimate of Maximum Expected Intensity of One-Half-Wave Lines Dancing
Authors: A. Bekbaev, M. Dzhamanbaev, R. Abitaeva, A. Karbozova, G. Nabyeva
Abstract:
In this paper, the regression dependence of dancing intensity from wind speed and length of span was established due to the statistic data obtained from multi-year observations on line wires dancing accumulated by power systems of Kazakhstan and the Russian Federation. The lower and upper limitations of the equations parameters were estimated, as well as the adequacy of the regression model. The constructed model will be used in research of dancing phenomena for the development of methods and means of protection against dancing and for zoning plan of the territories of line wire dancing.Keywords: power lines, line wire dancing, dancing intensity, regression equation, dancing area intensity
Procedia PDF Downloads 313