Search results for: protection of victims
1513 The Industrial Property in the Context of Wine Production in Brazil
Authors: Fátima R. Zan, Daniela C. Guimarães, Rosângela O. Soares, Suzana L. Russo
Abstract:
The wine until it reaches the consumer has a long way to go, from planting the wine to the bottling and the placing on the market, bringing many years of experimentation, and through several generations to have recognition for quality and excellence. The winemaking grew dramatically and are today many brands, including the associated locations, demonstrating their origin and cultural order that is associated with their production. The production, circulation and marketing of wines and products of grape and wine in Brazil is regulated by Law 7.678/88, amended by Law 10970/04, and adjusting the legislation to Regulation Wine Mercosur. This study was based on a retrospective study, and aimed to identify and characterize the modalities of industrial property used in wine production in Brazil. The wineries were selected from the 2014 ranking list, drawn up by the World Association of Journalists and Writers of Wines and Spirits (WAWWJ). The results show that the registration with INPI, regarding Patents, Trademarks, Industrial Designs and Geographical Indications, is not used by the wineries analyzed.Keywords: counterfeiting, industrial property, protection, wine production
Procedia PDF Downloads 5741512 Solar System with Plate Heat Exchanger
Authors: Christer Frennfelt
Abstract:
Solar heating is the most environmentally friendly way to heat water. Brazed Plate Heat Exchangers (BPHEs) are a key component in many solar heating applications for harvesting solar energy into accumulator tanks, producing hot tap water, and heating pools. The combination of high capacity in a compact format, efficient heat transfer, and fast response makes the BPHE the ideal heat exchanger for solar thermal systems. Solar heating is common as a standalone heat source, and as an add-on heat source for boilers, heat pumps, or district heating systems. An accumulator provides the possibility to store heat, which enables combination of different heat sources to a larger extent. In turn this works as protection to reduced access to energy or increased energy prices. For example heat from solar panels is preferably stored during the day for use at night.Keywords: district heating and cooling, thermal storage, brazed plate heat exchanger, solar domestic hot water and combisystems
Procedia PDF Downloads 3511511 A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence
Authors: Li Qiang, Yang Ze-Ming, Liu Bao-Xu, Jiang Zheng-Wei
Abstract:
With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain and evidence chain of cyber-attack on threat intelligence platform through data calculation, analysis and reasoning. Then, we used a number of cyber-attack events which we have observed and analyzed to test the reasoning method and demo system, the result of testing indicates that the reasoning method can provide certain help in cyber-attack attribution.Keywords: reasoning, Bayesian networks, cyber-attack attribution, Kill Chain, threat intelligence
Procedia PDF Downloads 4521510 Human Rights Impact on Citizens Evolution
Authors: Joseph Marzouk Gerais Abdelmalak
Abstract:
The interface between development and human rights has long been the subject of academic debate. Therefore, to understand the dynamics between the two concepts, a number of principles have been adopted, ranging from the right to development to a human rights-based approach to development. Despite these attempts, the exact connection between development and human rights is not yet fully understood. However, the inherent interdependence between these two concepts and the idea that development efforts should be undertaken with respect for human rights guarantees have gained momentum in recent years. It will then be examined whether the right to sustainable development is recognized.The article therefore concludes that the principles of sustainable development are recognized, directly or indirectly, in various human rights instruments, which represents a positive answer to the question posed above. Therefore, this work discusses international and regional human rights instruments as well as case law and interpretative guidelines from human rights bodies to demonstrate this hypothesis.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security
Procedia PDF Downloads 741509 Pattern of External Injuries Sustained during Bomb Blast Attacks in Karachi, Pakistan from 2000 to 2007
Authors: Arif Anwar Surani, Salman Ali, Asif Surani, Sohaib Zahid, Akbar Shoukat Ali, Zeeshan-Ul-Hassan Usmani, Joseph Varon, Salim Surani
Abstract:
Objective: Terrorism and suicidal bomb blast attacks are commonplace in Karachi, Pakistan. During the years 2000 to 2007, there were over 60 bomb explosions resulting in more than 1500 casualties. These explosions produce a wide variety of external injuries. We undertook this study to evaluate pattern of external injury produced after bomb blast attacks and to compare injury profile resulting from explosions in open versus semi-confined blast environments. Method: A retrospective, cross-sectional, study was conducted to review injuries sustained after bomb blast attacks in Karachi, Pakistan, from January 2000 to October 2007. Emergency medical records and medico legal certificates of patients presented to three major public sector hospitals of Karachi were evaluated using self-design proforma. Results: Data of 481 victims meet inclusion criteria and were incorporated for final analysis. Of these, 63.6% were injured in open spaces and 36.4% were injured in semi-confined blast environments. Lacerations were commonly encountered as external injury (47.7%) followed by penetrating wounds (15.3%). Lower and upper extremities were most commonly affected (38.6% and 19% respectively). Open and semi-confined blast environments produced a specific injury pattern and profile (p=<0.001). Conclusions: Bomb blast attacks in Karachi produce an external injury pattern consistent with other studies, with exception of an increased frequency in penetrating wounds. Semi-confined blast environments were associated with severe injuries. Further studies are required to better classify injuries and their severity based on standardized scoring systems. Effective emergency response systems must be designed to cope with mass causalities following bomb explosions.Keywords: bomb blast attacks, injury pattern, external injury, open space, semi-confined space, blast environment
Procedia PDF Downloads 3991508 Metoo in China: An Analysis of the Metoo Movement in China's Social Media
Authors: Xinrui Zhao
Abstract:
Connective actions acquired a completely different outlook of a social movement which credited with the rapid developed of social media technologies. New social movements amalgamate and mobilize around hashtags, memes, and personalized action frames. In 2017, the #MeToo movements from America spread to a variety of countries as a hashtag on social media. It attempted to demonstrate the widespread prevalence of sexual assault and harassment movement. It also encouraged Chinese women to participate by devoting and contributing their voices and acts. Furthermore, China’s #MeToo movement shows certain characteristics which are strongly shaped by particular political and cultural backgrounds, that also need to be studied. This paper serves as supplementary materials of connective action studies by addressing the #MeToo movement issues in China, which is rarely mentioned previously in the literature, it also supports a view that suggests that ideological and cultural drivers both strategically contribute to personalized action frames. This paper combines textual analysis methods, collecting attached materials from search engines in China’s social media, portrays the structure of China’s #MeToo movements by showing prominent activists, scholars, organization and the public’s action frame in China’s social media(Weibo, wechat, zhihu, douban). In doing so, it seeks to find how China’s #MeToo movements are organized and reveal diversities of social action approaches among those three subjects, digs out the correlations of their actions related to different social media platforms. This analysis suggests that while facing the government's censorship and moral judgments from the public, China’s #MeToo movement combines with few influential sexual assault and harassment events and is lead by the prominent activists who also are the victims in the events. The debates and critiques among Chinese scholars concerned the outcomes and significance of China’s #MeToo movement are divided into sides. Organizations still show less power in participating China’s movement social media. Public’s participation is varied of platforms which hugely affected by their personal experiences and knowledge.Keywords: connective action, China, MeToo movement, social media
Procedia PDF Downloads 1301507 Protected Status: Violation of the Provisions of Protected Status under International Humanitarian Law during the Liberation War of Bangladesh
Authors: Sabera Sultana
Abstract:
In today's war-torn world, it is crucial to identify, understand, and apply the laws aimed at minimizing civilian casualty during wartime. The purpose of this paper is to analyze the provisions of protected status under international humanitarian law and evaluate the historical facts and shreds of evidences of violation of protected status during the Liberation War of Bangladesh. This legal research paper evaluates the international humanitarian laws and case laws regarding protected status of people during wartime and evaluates them against the historical facts and well-documented evidences of violation of protected status during the Liberation War of Bangladesh. This paper will help to create a brief guideline on Protected Status under international humanitarian law, which will help to protect our civilians during wartime if ever required.Keywords: civilian protection, international humanitarian laws, liberation war of Bangladesh, protected status
Procedia PDF Downloads 2201506 The Impact of Artificial Intelligence on Human Rights Legislations and Evolution
Authors: Shenouda Farag Aziz Ibrahim
Abstract:
The relationship between terrorism and human rights has become an important issue in the fight against terrorism worldwide. This is based on the fact that terrorism and human rights are closely linked, so that when the former begins, the latter suffers. This direct link was recognized in the Vienna Declaration and Program of Action adopted by the International Conference on Human Rights held in Vienna on 25 June 1993, which recognized that terrorist acts aim to violate human rights in all their forms and manifestations. . Therefore, terrorism represents an attack on fundamental human rights. For this purpose, the first part of this article focuses on the relationship between terrorism and human rights and aims to show the relationship between these two concepts. In the second part, the concept of cyber threat and its manifestations are discussed. An analysis of the fight against terrorism in the context of human rights was also made..Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.
Procedia PDF Downloads 431505 Ultrasonographic Study of Normal Scapula in Horse
Authors: Mohamad Saeed Ahrari-Khafi, Abutorab Tabatabai-Naini, Niloofar Ajvadi
Abstract:
Scapular fracture is not common in horses, due to the proper protection of scapular muscles. However, if it happens, it can cause lameness in horses. Because of the overlapping of the scapula on the contralateral scapula and the thorax, usually radiography cannot be helpful in evaluation, except in small amount of its ventral part. Although ultrasonography is mainly used for diagnosis of soft tissue injuries, it also can be used for evaluation of bone surface abnormalities. This study was intended to document the normal ultrasonographic appearance of the equine scapula. Right forelimb of six horses was used. To facilitate the image assessment, a zoning system was developed. Ultrasonography was performed by using a 5-11 MHz linear array transducer. Ultrasonographic anatomy of scapula in different parts and planes was imaged and documented, hoping to help practitioners to diagnose fractures and injuries. Results showed that ultrasonography is capable to depict different parts of the scapula and regional muscles, and can be used for detecting fractures and other abnormalities.Keywords: horse, scapula, scapular fracture, ultrasonography
Procedia PDF Downloads 3081504 Seismic Performance Evaluation of Bridge Structures Using 3D Finite Element Methods in South Korea
Authors: Woo Young Jung, Bu Seog Ju
Abstract:
This study described the seismic performance evaluation of bridge structures, located near Daegu metropolitan city in Korea. The structural design code or regulatory guidelines is focusing on the protection of brittle failure or collapse in bridges’ lifetime during an earthquake. This paper illustrated the procedure in terms of the safety evaluation of bridges using simple linear elastic 3D Finite Element (FE) model in ABAQUS platform. The design response spectra based on KBC 2009 were then developed, in order to understand the seismic behavior of bridge structures. Besides, the multiple directional earthquakes were applied and it revealed that the most dominated earthquake direction was transverse direction of the bridge. Also, the bridge structure under the compressive stress was more fragile than the tensile stress and the vertical direction of seismic ground motions was not significantly affected to the structural system.Keywords: seismic, bridge, FEM, evaluation, numerical analysis
Procedia PDF Downloads 3671503 Fatherhood and Caregiving: An Exploratory Study of Parenting Patterns in Pakistani Families
Authors: Kate Jonathan
Abstract:
This article presents the findings of a qualitative study into parenting practices in families of Pakistani origin in the North of England. It focuses on the involvement of fathers in childrearing within the Pakistani community. Data was generated from thirty parents’ in-depth interviews and ethnographic observation of parent-child relationships. The data was analyzed by an initial coding, identifying themes, a grouping of patterns, and arriving at a meaningful understanding. The study shows that the traditional role of fathers as breadwinners, providing discipline and protection, was still prominent in most of the Pakistani families who took part in the study. However, few men were becoming pragmatic and would engage in more childrearing chores, as their wives. The findings indicate that previous general portrayal of fatherhood as the primary, and sometimes, only, breadwinner is changing to encompass a lot more in Pakistani communities. Nowadays, some fathers are more involved in caregiving and are increasingly become co-contributors in the development of their children. However, the change is slower in some families than others and varied within this community.Keywords: caregiving, childrearing, fathers, Pakistani families
Procedia PDF Downloads 3031502 Pioneering Conservation of Aquatic Ecosystems under Australian Law
Authors: Gina M. Newton
Abstract:
Australia’s Environment Protection and Biodiversity Conservation Act (EPBC Act) is the premiere, national law under which species and 'ecological communities' (i.e., like ecosystems) can be formally recognised and 'listed' as threatened across all jurisdictions. The listing process involves assessment against a range of criteria (similar to the IUCN process) to demonstrate conservation status (i.e., vulnerable, endangered, critically endangered, etc.) based on the best available science. Over the past decade in Australia, there’s been a transition from almost solely terrestrial to the first aquatic threatened ecological community (TEC or ecosystem) listings (e.g., River Murray, Macquarie Marshes, Coastal Saltmarsh, Salt-wedge Estuaries). All constitute large areas, with some including multiple state jurisdictions. Development of these conservation and listing advices has enabled, for the first time, a more forensic analysis of three key factors across a range of aquatic and coastal ecosystems: -the contribution of invasive species to conservation status, -how to demonstrate and attribute decline in 'ecological integrity' to conservation status, and, -identification of related priority conservation actions for management. There is increasing global recognition of the disproportionate degree of biodiversity loss within aquatic ecosystems. In Australia, legislative protection at Commonwealth or State levels remains one of the strongest conservation measures. Such laws have associated compliance mechanisms for breaches to the protected status. They also trigger the need for environment impact statements during applications for major developments (which may be denied). However, not all jurisdictions have such laws in place. There remains much opposition to the listing of freshwater systems – for example, the River Murray (Australia's largest river) and Macquarie Marshes (an internationally significant wetland) were both disallowed by parliament four months after formal listing. This was mainly due to a change of government, dissent from a major industry sector, and a 'loophole' in the law. In Australia, at least in the immediate to medium-term time frames, invasive species (aliens, native pests, pathogens, etc.) appear to be the number one biotic threat to the biodiversity and ecological function and integrity of our aquatic ecosystems. Consequently, this should be considered a current priority for research, conservation, and management actions. Another key outcome from this analysis was the recognition that drawing together multiple lines of evidence to form a 'conservation narrative' is a more useful approach to assigning conservation status. This also helps to addresses a glaring gap in long-term ecological data sets in Australia, which often precludes a more empirical data-driven approach. An important lesson also emerged – the recognition that while conservation must be underpinned by the best available scientific evidence, it remains a 'social and policy' goal rather than a 'scientific' goal. Communication, engagement, and 'politics' necessarily play a significant role in achieving conservation goals and need to be managed and resourced accordingly.Keywords: aquatic ecosystem conservation, conservation law, ecological integrity, invasive species
Procedia PDF Downloads 1331501 Valorization of Local Materials in the Waterproofing Technique of Landfills Site "TLS"
Authors: M. Debieche, F. Kaoua
Abstract:
This paper deals with the use two locals materials abundant in our country, with the view to use a mixture in the waterproofing the landfills. Our interest comes from the necessity to the environment protection, which has recently considerably grown. The site's waterproofing technique, in the landfills sites, is nowadays a very necessary condition to protect the environment, which requires the use of appropriate materials. To this end, an optimal mixture ensuring good performance in terms of hydraulic conductivity, durability and shear strength, mixtures based of sand at different concentrations of sodium bentonite, at compact state are prepared and studied. This study showed that a low permeability of mixture (sand / bentonite) can be achieved 6% of sodium bentonite. This mixture confers also good mechanical behavior, expressed by the recorded, reduction of friction (φ) and the increase of the cohesion (C). Thus, the selected formulation represents an optimal mixture for waterproofing systems. It guarantees an economical and ecological advantages.Keywords: hydraulic conductivity, sand, sodium bentonite, sustainability
Procedia PDF Downloads 2761500 Influence of Household Conservation Benefits on the Sustainability of Burunge Wildlife Management Areas in Tanzania
Authors: Gasto Lyakurwa, Glory Bakari, Edwin Sabuhoro
Abstract:
Wildlife Management Areas (WMAs) are established to promote and act as a remedy to the protection of wildlife resources outside the core protected area. WMAs aim to address issues of poverty, ensure sustainable use of wildlife resources, and share benefits from wildlife with the member villages. Successfully managed WMA in Tanzania improves local livelihood and conserves local biodiversity through tourism revenues and the protection of wildlife, respectively. Benefits accrued at household levels as a result of conservation activities in WMA can positively influence attitudes towards wildlife conservation. This research intends to assess the positive socio-economic impacts of WMA benefits on households in Burunge WMA in Tanzania. A questionnaire survey was conducted among four randomly selected villages in the ten villages forming the Burunge WMA to explore the household-level benefits of conservation activities. An example of a question item was whether household heads feel that they are benefiting from WMA and if they could remember some of the benefits. Interviews with leaders from WMA and member villages combined the survey to capture aspects of benefit distribution to households. A total of 80 households were used as samples of the recruited study sites. Moreover, the four WMA leaders and the eight village leaders of the respective study villages were interviewed. The study findings revealed that the shared benefit has mostly reached the community level and is less likely to reach the household level. Economic activities such as agriculture and livestock keeping were found to be more important for households than conservation-related economic activities. Conservation-related economic activities generate marginal direct benefits from WMA benefits to households, with ecotourism accounting for only 19.5%. The study also indicates that a direct share of financial benefits from WMA to households is lacking. Wildlife conservation benefits are less likely to reach household levels in WMAs, with the implication of reducing people's conservation attitudes and impeding community conservation success. WMA can utilize the finances from tourism fees and concessions to establish a Community Considerations Bank, which can lend money to some individuals at no or low interest rates. Considering the importance of education and health to households, WMA stands in a good position to provide health insurance premiums and student scholarships to motivate household participation in conservation activities. Community-based organizations and governments responsible for wildlife conservation should create mechanisms to channel conservation benefits to households in order to ensure the achievement of wildlife conservation objectives through WMA. These findings are expected to contribute to forming more WMAs with enhanced mechanisms for sharing conservation benefits to benefit the conservation of natural resources outside of the core protected areas. Motivated households are expected to respect wildlife and are less likely to engage in illegal activities such as poaching and harvesting conserved natural resources while coexisting with wildlife.Keywords: social economic benefits, individuals, wildlife management areas, biodiversity, community
Procedia PDF Downloads 651499 The Importance of Sustainable Urban Development and Its Impacts on Turkey’s Urban Environmental Laws
Authors: Azadeh Rezafar, Sevkiye Sence Turk
Abstract:
Rapid population growth in urban areas and extinction danger of natural resources in order to meet the food needs of these population, has revealed the need for sustainability. It did not last long that city planners realized the importance of an equal access to natural resources with protecting and managing them in cities, in accordance with the concept of sustainable development. Like in other countries The Turkish Government is aware of the importance of the sustainable development in their cities. The government issued new laws for protection of environmental assets and so that the preservation of natural ecology. The main objective of this article is to emphasis the importance of the sustainable development in the context of the developing world by giving special information about the method of the Turkish Government for protecting nature with approval of difference laws in this area.Keywords: population growth, sustainable development, Turkey, Turkish Urban Environmental Laws
Procedia PDF Downloads 3461498 Impact Load Response of Light Rail Train Rail Guard
Authors: Eyob Hundessa Gose
Abstract:
Nowadays, it is obviously known that the construction of different infrastructures is one measurement of the development of a country; infrastructures like buildings, bridges, roads, and railways are among them. In the capital city of Ethiopia, the so-called Addis Ababa, the Light Rail Train (LRT), was built Four years ago to satisfy the demand for transportation among the people in the city. The lane of the Train and vehicle separation Media was built with a curb and rail guard installation system to show the right-of-way and for protection of vehicles entering the Train Lane, but this Rail guard fails easily when impacted by vehicles and found that the impact load response of the Rail guard is weak and the Rail guard cannot withstand impact load. This study investigates the effect of variation of parameters such as vehicle speed and different mass effects and assesses the failure mode FRP and Steel reinforcement bar rail guards of deflection and damage state.Keywords: impact load, fiber reinforced polymer, rail guard, LS-DYNA
Procedia PDF Downloads 591497 Formulating a Definition of Hate Speech: From Divergence to Convergence
Authors: Avitus A. Agbor
Abstract:
Numerous incidents, ranging from trivial to catastrophic, do come to mind when one reflects on hate. The victims of these belong to specific identifiable groups within communities. These experiences evoke discussions on Islamophobia, xenophobia, homophobia, anti-Semitism, racism, ethnic hatred, atheism, and other brutal forms of bigotry. Common to all these is an invisible but portent force that drives all of them: hatred. Such hatred is usually fueled by a profound degree of intolerance (to diversity) and the zeal to impose on others their beliefs and practices which they consider to be the conventional norm. More importantly, the perpetuation of these hateful acts is the unfortunate outcome of an overplay of invectives and hate speech which, to a greater extent, cannot be divorced from hate. From a legal perspective, acknowledging the existence of an undeniable link between hate speech and hate is quite easy. However, both within and without legal scholarship, the notion of “hate speech” remains a conundrum: a phrase that is quite easily explained through experiences than propounding a watertight definition that captures the entire essence and nature of what it is. The problem is further compounded by a few factors: first, within the international human rights framework, the notion of hate speech is not used. In limiting the right to freedom of expression, the ICCPR simply excludes specific kinds of speeches (but does not refer to them as hate speech). Regional human rights instruments are not so different, except for the subsequent developments that took place in the European Union in which the notion has been carefully delineated, and now a much clearer picture of what constitutes hate speech is provided. The legal architecture in domestic legal systems clearly shows differences in approaches and regulation: making it more difficult. In short, what may be hate speech in one legal system may very well be acceptable legal speech in another legal system. Lastly, the cornucopia of academic voices on the issue of hate speech exude the divergence thereon. Yet, in the absence of a well-formulated and universally acceptable definition, it is important to consider how hate speech can be defined. Taking an evidence-based approach, this research looks into the issue of defining hate speech in legal scholarship and how and why such a formulation is of critical importance in the prohibition and prosecution of hate speech.Keywords: hate speech, international human rights law, international criminal law, freedom of expression
Procedia PDF Downloads 771496 Flexible Design of Triboelectric Nanogenerators for Efficient Vibration Energy Harvesting
Authors: Meriam Khelifa
Abstract:
In recent years, many studies have focused on the harvesting of the vibrations energy to produce electrical energy using contact separation (CS) triboelectric nanogenerators (TENG). The simplest design for a TENG consists of a capacitor comprising a single moving electrode. The conversion efficiency of vibration energy into electrical energy can, in principle, reach 100%. But to actually achieve this objective, it is necessary to optimize the parameters of the TENG, such as the dielectric constant and the thickness of the insulator, the load resistance, etc. In particular, the use of a switch which is actioned at optimal times within the TENG cycle is essential. Using numerical modeling and experimental design, we applied a methodology to find the TENG parameters which optimize the energy transfer efficiency (ETE) to almost 100% for any vibration frequency and amplitude. The rather simple design of a TENG is promising as an environment friendly device. It opens the doors for harvesting acoustic vibrations from the environment and to design effective protection against environmental noise.Keywords: vibrations, CS TENG, efficiency, design of experiments
Procedia PDF Downloads 901495 Estimating Industrial Pollution Load in Phnom Penh by Industrial Pollution Projection System
Authors: Vibol San, Vin Spoann
Abstract:
Manufacturing plays an important role in job creation around the world. In 2013, it is estimated that there were more than half a billion jobs in manufacturing. In Cambodia in 2015, the primary industry occupies 26.18% of the total economy, while agriculture is contributing 29% and the service sector 39.43%. The number of industrial factories, which are dominated by garment and textiles, has increased since 1994, mainly in Phnom Penh city. Approximately 56% out of total 1302 firms are operated in the Capital city in Cambodia. Industrialization to achieve the economic growth and social development is directly responsible for environmental degradation, threatening the ecosystem and human health issues. About 96% of total firms in Phnom Penh city are the most and moderately polluting firms, which have contributed to environmental concerns. Despite an increasing array of laws, strategies and action plans in Cambodia, the Ministry of Environment has encountered some constraints in conducting the monitoring work, including lack of human and financial resources, lack of research documents, the limited analytical knowledge, and lack of technical references. Therefore, the necessary information on industrial pollution to set strategies, priorities and action plans on environmental protection issues is absent in Cambodia. In the absence of this data, effective environmental protection cannot be implemented. The objective of this study is to estimate industrial pollution load by employing the Industrial Pollution Projection System (IPPS), a rapid environmental management tool for assessment of pollution load, to produce a scientific rational basis for preparing future policy direction to reduce industrial pollution in Phnom Penh city. Due to lack of industrial pollution data in Phnom Penh, industrial emissions to the air, water and land as well as the sum of emissions to all mediums (air, water, land) are estimated using employment economic variable in IPPS. Due to the high number of employees, the total environmental load generated in Phnom Penh city is estimated to be 476.980.93 tons in 2014, which is the highest industrial pollution compared to other locations in Cambodia. The result clearly indicates that Phnom Penh city is the highest emitter of all pollutants in comparison with environmental pollutants released by other provinces. The total emission of industrial pollutants in Phnom Penh shares 55.79% of total industrial pollution load in Cambodia. Phnom Penh city generates 189,121.68 ton of VOC, 165,410.58 ton of toxic chemicals to air, 38,523.33 ton of toxic chemicals to land and 28,967.86 ton of SO2 in 2014. The results of the estimation show that Textile and Apparel sector is the highest generators of toxic chemicals into land and air, and toxic metals into land, air and water, while Basic Metal sector is the highest contributor of toxic chemicals to water. Textile and Apparel sector alone emits 436,015.84 ton of total industrial pollution loads. The results suggest that reduction in industrial pollution could be achieved by focusing on the most polluting sectors.Keywords: most polluting area, polluting industry, pollution load, pollution intensity
Procedia PDF Downloads 2601494 Transforming Healthcare Data Privacy: Integrating Blockchain with Zero-Knowledge Proofs and Cryptographic Security
Authors: Kenneth Harper
Abstract:
Blockchain technology presents solutions for managing healthcare data, addressing critical challenges in privacy, integrity, and access. This paper explores how privacy-preserving technologies, such as zero-knowledge proofs (ZKPs) and homomorphic encryption (HE), enhance decentralized healthcare platforms by enabling secure computations and patient data protection. An examination of the mathematical foundations of these methods, their practical applications, and how they meet the evolving demands of healthcare data security is unveiled. Using real-world examples, this research highlights industry-leading implementations and offers a roadmap for future applications in secure, decentralized healthcare ecosystems.Keywords: blockchain, cryptography, data privacy, decentralized data management, differential privacy, healthcare, healthcare data security, homomorphic encryption, privacy-preserving technologies, secure computations, zero-knowledge proofs
Procedia PDF Downloads 201493 Proposal for Sustainable Construction of a New College Hostel Building
Authors: Reshma Raskar-Phule, Abhay Shinde, Manesh Konkani, Rohit Nighot, Shrirang Mahajan, Viraj Thorat
Abstract:
Sustainability in construction projects can be considered from three dimensions - environment, economy and society. Key concepts of sustainable construction include the protection of the natural environment, choice of non-toxic materials, reduction and reuse of resources, waste minimization, and life cycle analysis. The present paper attempts to identify and analyze the use of sustainable construction materials for a new college hostel building in terms of sustainability development indices (SDIs). Low SDI materials, say as composite fiberglass reinforcement (SDI 4074.96), compressed earth blocks (SDI 0.47), and fiber-reinforced doors (SDI 0.13) are the proposed sustainable materials for the hostel building. Indian Green Building Certification (IGBC) is applied for the hostel building and it earns 5 points out of total 16 points for criterion 5 – Building Materials and Resources of IGBC.Keywords: sustainable development, construction materials, IGBC, hostel building
Procedia PDF Downloads 1171492 How COVID 19 Changed Policy Makers Behavior toward Environmental Policy
Authors: Ammar Alrefaei
Abstract:
The COVID-19 pandemic changed human life. The vast majority of the COVID effect was on the healthcare sector, but its impact on the global economy cannot be denied. In the field of environment, the pandemic may have a more significant impact on the environment than all environmental activity and policies of recent years. The pandemic consequences for the environment may be far more unpredictable than one might assume. In view of this, it is imperative for legislators from different states to be prepared to apply adequate measures to counteract such consequences. This article aimed to examine the obstacles to implementing effective environmental policies after the COVID-19 pandemic using different examples from different countries. Also, how adopting new initiatives, such as the Saudi Green Initiative and the Middle East Green Initiative, can help policymakers and legislators adopt new laws and policies. In addition, this paper reviewed the developing dangers to environmental protection after the pandemic and analyzed the major challenges to instrument active environmental policies during COVID-19 and in the world after COVID.Keywords: environmental policy, environment law, green initiative, COVID 19
Procedia PDF Downloads 1131491 The Impact of the COVID-19 on the Cybercrimes in Hungary and the Possible Solutions for Prevention
Authors: László Schmidt
Abstract:
Technological and digital innovation is constantly and dynamically evolving, which poses an enormous challenge to both lawmaking and law enforcement. To legislation because artificial intelligence permeates many areas of people’s daily lives that the legislator must regulate. it can see how challenging it is to regulate e.g. self-driving cars/taxis/camions etc. Not to mention cryptocurrencies and Chat GPT, the use of which also requires legislative intervention. Artificial intelligence also poses an extraordinary challenge to law enforcement. In criminal cases, police and prosecutors can make great use of AI in investigations, e.g. in forensics, DNA samples, reconstruction, identification, etc. But it can also be of great help in the detection of crimes committed in cyberspace. In the case of cybercrime, on the one hand, it can be viewed as a new type of crime that can only be committed with the help of information systems, and that has a specific protected legal object, such as an information system or data. On the other hand, it also includes traditional crimes that are much easier to commit with the help of new tools. According to Hungarian Criminal Code section 375 (1), any person who, for unlawful financial gain, introduces data into an information system, or alters or deletes data processed therein, or renders data inaccessible, or otherwise interferes with the functioning of the information system, and thereby causes damage, is guilty of a felony punishable by imprisonment not exceeding three years. The Covid-19 coronavirus epidemic has had a significant impact on our lives and our daily lives. It was no different in the world of crime. With people staying at home for months, schools, restaurants, theatres, cinemas closed, and no travel, criminals have had to change their ways. Criminals were committing crimes online in even greater numbers than before. These crimes were very diverse, ranging from false fundraising, the collection and misuse of personal data, extortion to fraud on various online marketplaces. The most vulnerable age groups (minors and elderly) could be made more aware and prevented from becoming victims of this type of crime through targeted programmes. The aim of the study is to show the Hungarian judicial practice in relation to cybercrime and possible preventive solutions.Keywords: cybercrime, COVID-19, Hungary, criminal law
Procedia PDF Downloads 611490 Contemplating Preference Ratings of Corporate Social Responsibility Practices for Supply Chain Performance System Implementation
Authors: Mohit Tyagi, Pradeep Kumar
Abstract:
The objective of this research work is to identify and analyze the significant corporate social responsibility (CSR) practices with an aim to improve the supply chain performance of automobile industry located at National Capital Region (NCR) of India. To achieve the objective, 6 CSR practices have been considered and analyzed using expert’s preference rating (EPR) approach. The considered CSR practices are namely, Top management and employee awareness about CSR (P1), Employee involvement in social and environmental problems (P2), Protection of human rights (P3), Waste reduction, energy saving and water conservation (P4), Proper visibility of CSR guidelines (P5) and Broad perception towards CSR initiatives (P6). The outcomes of this research may help mangers in decision making processes and framing polices for SCP implementation under CSR context.Keywords: supply chain performance, corporate social responsibility, CSR practices, expert’s preference rating approach
Procedia PDF Downloads 3351489 The Political Economy of Police Corruption in Nigeria
Authors: Tosin Osasona
Abstract:
The Nigeria Police Force bears the constitutional mandate as the primary policing agency for the protection of life and property within Nigeria; however, the police have an historical ill-reputation for corruption, ineptitude and impunity. Using the institutional theory of police as the framework of analysis, the paper argues that the performance of the police in Nigeria mirrors the dominant political, social and economic institutions and the structural environment of the Nigerian state. The article puts in perspective the deliberate political decision to underfund the police, leaving officers of the force the extra task of foraging for funds to undertake the duty that the Nigeria state primarily exists for; the article further explores the nexus between corruption in the police in Nigeria and the issue of funding. The article finds that the Nigerian state, by deliberately under-funding the police, while expecting the agency to perform its duties, has indirectly sanctioned the corruption of the force and approved the cooption of the institution of police and policing for private use in Nigeria.Keywords: Police Corruption, Funding , Informal Taxation, POlice Checkpoint
Procedia PDF Downloads 1601488 The Effects of Leadership on the Claim of Responsibility
Authors: Katalin Kovacs
Abstract:
In most forms of violence the perpetrators intend to hide their identities. Terrorism is different. Terrorist groups often take responsibility for their attacks, and consequently they reveal their identities. This unique characteristic of terrorism has been largely overlooked, and scholars are still puzzled as to why terrorist groups claim responsibility for their attacks. Certainly, the claim of responsibility is worth analysing. It would help to have a clearer picture of what terrorist groups try to achieve and how, but also to develop an understanding of the strategic planning of terrorist attacks and the message the terrorists intend to deliver. The research aims to answer the question why terrorist groups choose to claim responsibility for some of their attacks and not for others. In order to do so the claim of responsibility is considered to be a tactical choice, based on the assumption that terrorists weigh the costs and benefits of claiming responsibility. The main argument is that terrorist groups do not claim responsibility in cases when there is no tactical advantage gained from claiming responsibility. The idea that the claim of responsibility has tactical value offers the opportunity to test these assertions using a large scale empirical analysis. The claim of responsibility as a tactical choice depends on other tactical choices, such as the choice of target, the internationality of the attack, the number of victims and whether the group occupies territory or operates as an underground group. The structure of the terrorist groups and the level of decision making also affects the claim of responsibility. Terrorists on the lower level are less disciplined than the leaders. This means that the terrorists on lower levels pay less attention to the strategic objectives and engage easier in indiscriminate violence, and consequently they would less like to claim responsibility. Therefore, the research argues that terrorists, who are on a highest level of decision making would claim responsibility for the attacks as those are who takes into account the strategic objectives. As most studies on terrorism fail to provide definitions; therefore the researches are fragmented and incomparable. Separate, isolated researches do not support comprehensive thinking. It is also very important to note that there are only a few researches using quantitative methods. The aim of the research is to develop a new and comprehensive overview of the claim of responsibility based on strong quantitative evidence. By using well-established definitions and operationalisation the current research focuses on a broad range of attributes that can have tactical values in order to determine circumstances when terrorists are more likely to claim responsibility.Keywords: claim of responsibility, leadership, tactical choice, terrorist group
Procedia PDF Downloads 3131487 Hepatitis B Virus Infection Among Egyptian Children Vaccinated during Infancy
Authors: Iman I. Salama, Samia M. Sami, Somaia I. Salama, Zeinab N. Said, Thanaa M. Rabah, Aida M. Abdel-Mohsin
Abstract:
This is a national community-based project to evaluate the effectiveness of HBV vaccination program in prevention of infection. HBV markers were tested in the sera of 3600 vaccinated children. Infected children were followed up for 1 year. Prevalence of HBV infection was 0.39 % (0.28% positive for anti-HBc, 0.03% positive for HBsAg and 0.08% positive for both). One year later, 50% of positive anti-HBc children turned negative with sustained positivity for positive HBsAg cases. HBV infection was significantly higher at age above 9 years (0.6%) compared to 0.2% at age 3-9 years and 0% at younger age (P < 0.05). Logistic analysis revealed that predictors for HBV infection were history of blood transfusion, regular medical injection, and family history of either HBV infection or drug abuse (adjusted odds ratios 6.2, 5.6, 7.6 & 19.1 respectively). HBV vaccination program produced adequate protection. Adherence to infection control measures and safe blood transfusion are recommended.Keywords: HBV infection, HBV vaccine, children, Egypt
Procedia PDF Downloads 4481486 Women and Terrorism in Nigeria: Policy Templates for Addressing Complex Challenges in a Changing Democratic State
Authors: Godiya Pius Atsiya
Abstract:
One of the most devastating impacts of terrorism on the Nigerian state is the danger it has posed on women, children and other vulnerable groups. The complexity of terrorism in Nigeria, especially in most parts of Northern Nigeria has entrenched unprecedented security challenges such as refugee crisis, kidnapping, food shortages, increase in death tolls, malnutrition, fear, rape and several other psychological factors. Of particular interest in this paper as it relates to terrorism is the high rate of Internally Displaced Persons(IDPs), with women, children and the aged being the most affected. Empirical evidence arising from recent development in Nigeria’s North-East geo-political zone shows that large numbers of refugees fleeing the Boko Haram attacks have doubled. The attendant consequences of this mass exodus of people in the affected areas are that the victims now suffer untold and unwarranted economic hardship. In another dimension, recent findings have it that most powerless women and young teenage girls have been forcefully conscripted into the Islamic extremist groups and used as shields. In some respect, these groups of people have been used as available tools for suicide bombing and other criminal tendencies, the result of which can be detrimental to social cohesion and integration. This work is a theoretical insight into terrorism discourses; hence, the paper relies on existing works of scholars in carrying out the research. The paper argues that the implications of terrorism on women gender have grounding effects on the moral psyche of women who are supposed to be home managers and custodians of morality in society. The burden of terrorism and all it tends to propagate has literally upturned social lives and hence, Nigeria is gradually being plunged into the Hobesian state of nature. As a panacea to resolving this social malaise, the paper submits that government and indeed, all stakeholders in the nation’s democratic project must expedite action to nip this trend in the bud. The paper sums up with conclusion and other alternative policy measures to mitigate the challenges of terrorism in Nigeria.Keywords: changing democratic state, policy measures, terrorism, women
Procedia PDF Downloads 2331485 Monitoring Future Climate Changes Pattern over Major Cities in Ghana Using Coupled Modeled Intercomparison Project Phase 5, Support Vector Machine, and Random Forest Modeling
Authors: Stephen Dankwa, Zheng Wenfeng, Xiaolu Li
Abstract:
Climate change is recently gaining the attention of many countries across the world. Climate change, which is also known as global warming, referring to the increasing in average surface temperature has been a concern to the Environmental Protection Agency of Ghana. Recently, Ghana has become vulnerable to the effect of the climate change as a result of the dependence of the majority of the population on agriculture. The clearing down of trees to grow crops and burning of charcoal in the country has been a contributing factor to the rise in temperature nowadays in the country as a result of releasing of carbon dioxide and greenhouse gases into the air. Recently, petroleum stations across the cities have been on fire due to this climate changes and which have position Ghana in a way not able to withstand this climate event. As a result, the significant of this research paper is to project how the rise in the average surface temperature will be like at the end of the mid-21st century when agriculture and deforestation are allowed to continue for some time in the country. This study uses the Coupled Modeled Intercomparison Project phase 5 (CMIP5) experiment RCP 8.5 model output data to monitor the future climate changes from 2041-2050, at the end of the mid-21st century over the ten (10) major cities (Accra, Bolgatanga, Cape Coast, Koforidua, Kumasi, Sekondi-Takoradi, Sunyani, Ho, Tamale, Wa) in Ghana. In the models, Support Vector Machine and Random forest, where the cities as a function of heat wave metrics (minimum temperature, maximum temperature, mean temperature, heat wave duration and number of heat waves) assisted to provide more than 50% accuracy to predict and monitor the pattern of the surface air temperature. The findings identified were that the near-surface air temperature will rise between 1°C-2°C (degrees Celsius) over the coastal cities (Accra, Cape Coast, Sekondi-Takoradi). The temperature over Kumasi, Ho and Sunyani by the end of 2050 will rise by 1°C. In Koforidua, it will rise between 1°C-2°C. The temperature will rise in Bolgatanga, Tamale and Wa by 0.5°C by 2050. This indicates how the coastal and the southern part of the country are becoming hotter compared with the north, even though the northern part is the hottest. During heat waves from 2041-2050, Bolgatanga, Tamale, and Wa will experience the highest mean daily air temperature between 34°C-36°C. Kumasi, Koforidua, and Sunyani will experience about 34°C. The coastal cities (Accra, Cape Coast, Sekondi-Takoradi) will experience below 32°C. Even though, the coastal cities will experience the lowest mean temperature, they will have the highest number of heat waves about 62. Majority of the heat waves will last between 2 to 10 days with the maximum 30 days. The surface temperature will continue to rise by the end of the mid-21st century (2041-2050) over the major cities in Ghana and so needs to be addressed to the Environmental Protection Agency in Ghana in order to mitigate this problem.Keywords: climate changes, CMIP5, Ghana, heat waves, random forest, SVM
Procedia PDF Downloads 2011484 How Unpleasant Emotions, Morals and Normative Beliefs of Severity Relate to Cyberbullying Intentions
Authors: Paula C. Ferreira, Ana Margarida Veiga Simão, Nádia Pereira, Aristides Ferreira, Alexandra Marques Pinto, Alexandra Barros, Vitor Martinho
Abstract:
Cyberbullying is a phenomenon of worldwide concern regarding children and adolescents’ mental health and risk behavior. Bystanders of this phenomenon can help diminish the incidence of this phenomenon if they engage in pro-social behavior. However, different social-cognitive and affective bystander reactions may surface because of the lack of contextual information and emotional cues in cyberbullying situations. Hence, this study investigated how cyberbullying bystanders’ unpleasant emotions could be related to their personal moral beliefs and their behavioral intentions to cyberbully or defend the victim. It also proposed to investigate how their normative beliefs of perceived severity about cyberbullying behavior could be related to their personal moral beliefs and their behavioral intentions. Three groups of adolescents participated in this study, namely a first of group 402 students (5th – 12th graders; Mage = 13.12; SD = 2.19; 55.7% girls) to compute explorative factorial analyses of the instruments used; a second group of 676 students (5th – 12th graders; Mage = 14.10; SD = 2.74; 55.5% were boys) to run confirmatory factor analyses; and a third group (N = 397; 5th – 12th graders; Mage = 13.88 years; SD = 1.45; 55.5% girls) to perform the main analyses to test the research hypotheses. Self-report measures were used, such as the Personal moral beliefs about cyberbullying behavior questionnaire, the Normative beliefs of perceived severity about cyberbullying behavior questionnaire, the Unpleasant emotions about cyberbullying incidents questionnaires, and the Bystanders’ behavioral intentions in cyberbullying situations questionnaires. Path analysis results revealed that unpleasant emotions were mediators of the relationship between adolescent cyberbullying bystanders’ personal moral beliefs and their intentions to help the victims in cyberbullying situations. Moreover, adolescent cyberbullying bystanders’ normative beliefs of gravity were mediators of the relationship between their personal moral beliefs and their intentions to cyberbully others. These findings provide insights for the development of prevention and intervention programs that promote social and emotional learning strategies as a means to prevent and intervene in cyberbullying.Keywords: cyberbullying, normative beliefs of perceived severity, personal moral beliefs, unpleasant emotions
Procedia PDF Downloads 217