Search results for: legal recognition
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3201

Search results for: legal recognition

1761 Ad Hocism Aiding Sufferings of Urban Refugees in Nepal: A Case Study of Pakistani Ahmadi Refugees

Authors: Shishir Lamichhane

Abstract:

Nepal neither is a party to any international refugee instruments nor does it have a national legislation to govern the refugee concerns legislated in the international legal instruments. In the absence of both of these, Nepal has adopted a rather ad hoc approach to dealing with refugees. Whereas Nepali state’s ad hocism seems to be paying off well with prominent (and mainstream) refugee populations of Bhutanese and Tibetans, urban refugees like Pakistani Ahmadiyya refugees have been left mostly at the odds. This paper is an attempt to reflect how the ad hoc approach taken by the host country (Nepal) is resulting in the further persecution of the Pakistani Ahmadiyya refugees and is lined up with arguments about how the basic rights of these refugees are being violated in the absence of a proper law. Relevant information regarding urban refugees residing in Kathmandu has been gathered by applying Empirical Research Methodology, while the paper also reviews pertinent literature already available on the case of Ahmadiya community.

Keywords: Pakistan, Ahmadiya community, Nepal, urban refugees

Procedia PDF Downloads 224
1760 Inspection of Railway Track Fastening Elements Using Artificial Vision

Authors: Abdelkrim Belhaoua, Jean-Pierre Radoux

Abstract:

In France, the railway network is one of the main transport infrastructures and is the second largest European network. Therefore, railway inspection is an important task in railway maintenance to ensure safety for passengers using significant means in personal and technical facilities. Artificial vision has recently been applied to several railway applications due to its potential to improve the efficiency and accuracy when analyzing large databases of acquired images. In this paper, we present a vision system able to detect fastening elements based on artificial vision approach. This system acquires railway images using a CCD camera installed under a control carriage. These images are stitched together before having processed. Experimental results are presented to show that the proposed method is robust for detection fasteners in a complex environment.

Keywords: computer vision, image processing, railway inspection, image stitching, fastener recognition, neural network

Procedia PDF Downloads 454
1759 Female Fans in Global Football Governance: A Call for Change

Authors: Yaron Covo, Tamar Kofman, Shira Palti

Abstract:

Over the recent decades, debates about the engagement of fans in football governance have focused on the club level and national level, emphasizing the significance of fans’ involvement in increasing the connection of clubs with the community, and in safeguarding the transparency, accountability, and clubs’ financial stability. This paper will offer a different conceptual justification for providing fans with access to decision-making processes in football. First, it will suggest that the participation of fans is necessary for addressing discriminatory practices against women in football stadiums. Second, it will argue that fans’ involvement in football governance is important not only at the club and national level but also at the global level, relying on the principles of Global Administrative Law. In contemporary men’s football, female fans face different forms of discrimination. Iranian women are still prohibited from attending football games at the domestic level; In Saudi Arabia, female fans are only permitted to enter designated family areas; Qatar – the host of the 2022 FIFA world cup – requires women to attend matches wearing modest clothing. Similarly, in Turkey, Lebanon, UAE, and Algeria, women face cultural barriers when attending men’s football games. In other countries, female fans suffer from subtle discrimination, including micro-aggressions, misogyny, sexism, and noninstitutionalized exclusion. Despite the vital role of fans in world football and the importance of football for many women’s lives, little has been done to address this problem. While FIFA recognizes that these discriminatory practices contradict its statutes, this recognition fails to materialize into meaningful change. This paper will argue that FIFA’s omission stems from two interrelated characteristics of world football: (1) the ultra-masculine nature of the game; (2) the insufficient recognition of fans’ significance. While fans have been given a voice in various football bodies on the domestic level, FIFA has yet to allow the representation of fans as stakeholders in world football governance. Since fans are a more heterogeneous group than players, the voices of those fans who do not fit the ultra-masculine model are not heard. Thus, by focusing mainly on male players, FIFA reproduces the hegemonic masculinity that feeds back into fan dynamics and marginalizes female fans. To rectify this problem, we will call on FIFA to provide fans and female fans in particular, with voice mechanisms and access to decision-making processes. In addition to its impact on the formation of fans’ identities, such a move will allow fans to demand better enforcement of existing anti-discrimination norms and new regulations to address their needs. The literature has yet to address the relationship between fans’ gender discrimination and global football governance. Building on Global Administrative Law scholarship and feminist theories, this paper will aim to fill this gap.

Keywords: fans, FIFA, football governance, gender discrimination, global administrative law, human rights

Procedia PDF Downloads 149
1758 Looking at Women’s Status in India through Different Lenses: Evidence from Second Wave of IHDS Data

Authors: Vidya Yadav

Abstract:

In every society, males and females are expected to behave in certain ways, and in every culture, those expectation, values and norms are different and vary accordingly. Many of the inequalities between men and women are rooted in institutional structure such as in educational field, labour market, wages, decision-making power, access to services as well as in accessing the health and well-being care also. The marriage and kinship pattern shape both men’s and women’s lives. Earlier many studies have highlighted the gender disparities which vary tremendously between regions, social classes, and communities. This study will try to explore the prominent indicators to show the status of women and well-being condition in Indian society. Primarily this paper concern with firstly identification of indicators related to gender in each area like education, work status, mobility, women participation in public and private decision making, autonomy and domestic violence etc. And once the indicators are identified next task is to define them. The indicators which are selected here are for a comparison of women’s status across Indian states. Recent Indian Human Development Survey, 2011-12 has been procured to show the current situation of women. Result shows that in spite of rising levels of education and images of growing westernization in India, love marriages remain in rarity even among urban elite. In India marriage is universal, and most of the men and women marry at relatively young age. Even though the legal age of marriage is 18, but more than 60 percent are married before the legal age. Not surprisingly, but Bihar and Rajasthan are the states with earliest age at marriage. Most of them reported that they have very limited contact with their husband before marriages. Around 69 percent of women met their husbands on the day of the wedding or shortly before. In spite of decline in fertility, still childbearing remains essential to women’s lives. Mostly women aged 25 and older had at least one child. Women’s control over household resources, physical space and mobility is also limited. Indian women’s, mostly rely on men to purchase day to day necessities, as well as medicines, as well as other necessary items. This ultimately reduces the likelihood that women have cash in hand for such purchases. The story is quite different when it comes to have control over decision over purchasing household assets such as TVs or refrigerator, names on the bank account, and home ownership papers. However, the likelihood of ownership rises among urbanite educated women’s. Women’s still have to the cultural norms and the practice of purdah or ghunghat, familial control over women’s physical movement. Wife beating and domestic violence still remain pervasive, and beaten for minor transgression like going out without permission. Development of India cannot be realized without the very significant component of gender. Therefore detailed examinations of different indicators are required to understand, strategize, plan and formulate programmes.

Keywords: autonomy, empowerment, gender, violence

Procedia PDF Downloads 297
1757 Stable Diffusion, Context-to-Motion Model to Augmenting Dexterity of Prosthetic Limbs

Authors: André Augusto Ceballos Melo

Abstract:

Design to facilitate the recognition of congruent prosthetic movements, context-to-motion translations guided by image, verbal prompt, users nonverbal communication such as facial expressions, gestures, paralinguistics, scene context, and object recognition contributes to this process though it can also be applied to other tasks, such as walking, Prosthetic limbs as assistive technology through gestures, sound codes, signs, facial, body expressions, and scene context The context-to-motion model is a machine learning approach that is designed to improve the control and dexterity of prosthetic limbs. It works by using sensory input from the prosthetic limb to learn about the dynamics of the environment and then using this information to generate smooth, stable movements. This can help to improve the performance of the prosthetic limb and make it easier for the user to perform a wide range of tasks. There are several key benefits to using the context-to-motion model for prosthetic limb control. First, it can help to improve the naturalness and smoothness of prosthetic limb movements, which can make them more comfortable and easier to use for the user. Second, it can help to improve the accuracy and precision of prosthetic limb movements, which can be particularly useful for tasks that require fine motor control. Finally, the context-to-motion model can be trained using a variety of different sensory inputs, which makes it adaptable to a wide range of prosthetic limb designs and environments. Stable diffusion is a machine learning method that can be used to improve the control and stability of movements in robotic and prosthetic systems. It works by using sensory feedback to learn about the dynamics of the environment and then using this information to generate smooth, stable movements. One key aspect of stable diffusion is that it is designed to be robust to noise and uncertainty in the sensory feedback. This means that it can continue to produce stable, smooth movements even when the sensory data is noisy or unreliable. To implement stable diffusion in a robotic or prosthetic system, it is typically necessary to first collect a dataset of examples of the desired movements. This dataset can then be used to train a machine learning model to predict the appropriate control inputs for a given set of sensory observations. Once the model has been trained, it can be used to control the robotic or prosthetic system in real-time. The model receives sensory input from the system and uses it to generate control signals that drive the motors or actuators responsible for moving the system. Overall, the use of the context-to-motion model has the potential to significantly improve the dexterity and performance of prosthetic limbs, making them more useful and effective for a wide range of users Hand Gesture Body Language Influence Communication to social interaction, offering a possibility for users to maximize their quality of life, social interaction, and gesture communication.

Keywords: stable diffusion, neural interface, smart prosthetic, augmenting

Procedia PDF Downloads 101
1756 Authentication Based on Hand Movement by Low Dimensional Space Representation

Authors: Reut Lanyado, David Mendlovic

Abstract:

Most biological methods for authentication require special equipment and, some of them are easy to fake. We proposed a method for authentication based on hand movement while typing a sentence with a regular camera. This technique uses the full video of the hand, which is harder to fake. In the first phase, we tracked the hand joints in each frame. Next, we represented a single frame for each individual using our Pose Agnostic Rotation and Movement (PARM) dimensional space. Then, we indicated a full video of hand movement in a fixed low dimensional space using this method: Fixed Dimension Video by Interpolation Statistics (FDVIS). Finally, we identified each individual in the FDVIS representation using unsupervised clustering and supervised methods. Accuracy exceeds 96% for 80 individuals by using supervised KNN.

Keywords: authentication, feature extraction, hand recognition, security, signal processing

Procedia PDF Downloads 127
1755 Reimagining Kinships: Queering the Labor of Care and Motherhood in Japan’s Rental Family Services

Authors: Maari Sugawara

Abstract:

This study investigates the constructed notion of “motherhood” and queered forms of care in contemporary Japan, focusing on rental family services. In Japan, the concept of motherhood is often equated with womanhood, reflecting a pervasive ideology that views motherhood as an essential aspect of a woman's societal role, particularly amidst economic recovery and an aging population. This study interrogates these gendered expectations by linking rental family services, particularly the role of rental mothers, to traditional caregiving roles. It critiques the gendered construction of domestic labor and aims to expand conceptions of alternative family structures and caregiving roles beyond normative frameworks. Emerging in the 1980s to provide companionship for the elderly, rental family services have evolved to meet diverse social needs, with paid actors fulfilling familial roles at various social events. Despite their growing prevalence, academic exploration of this phenomenon remains limited. This research aims to fill that gap by investigating the cultural, social, and economic factors fueling the popularity of rental family services and analyzing their implications for contemporary understandings of family dynamics and care labor in Japan. Furthermore, this study underscores the disproportionate domestic labor burden women in Japan bear, often managing time-intensive household tasks, which creates a "double burden" for those in full-time employment. Care work, including elderly and disability support, is undervalued and typically compensated at near-minimum wage levels, with women predominantly filling these low-wage roles. This gender disparity in Japan's care industry contributes to labor shortages in caregiving and childcare, highlighting broader structural inequities in the labor market. Through semi-structured qualitative interviews with fifteen rental mothers, this study investigates their experiences, motivations, role dynamics, and emotional labor. It critically examines whether the labor performed by rental family actors constitutes a subversive practice deserving of appropriate compensation. Utilizing a role-playing method, the author engages with rental mothers as if they were her own, reflecting the dynamics of compensated labor. This interaction delves into the economic and emotional aspects of constructed motherhood, facilitating a broader inquiry into the value of both productive and reproductive labor in Japan. The study also investigates the relationship between sex work and rental family services within the socio-economic landscape, recognizing the links between the welfare sector and female employment in legal sex work. Although distinct, these sectors merit joint consideration due to the commonality of male clients in both industries. This research engages with theoretical perspectives framing mobile sex work as inherently queer, directly challenging the dominance of heteronormativity. The agency exercised by sex workers complicates narratives of conformity and deviance, underscoring the need to reevaluate caregiving labor in both paid and unpaid contexts. Ultimately, this research critiques the intersection of gender, care, and labor in contemporary Japan by examining the undervaluation of traditional caregiving roles alongside the labor involved in rental family services. It challenges Japanese policies that equate womanhood with motherhood and explores the potential of viewing outsourced care as queered maternal and non-reproductive labor, advocating for the recognition of alternative family structures and non-reproductive forms of motherhood.

Keywords: motherhood, alternative family structures, carework, Japan, queer studies

Procedia PDF Downloads 14
1754 Comparison of Machine Learning and Deep Learning Algorithms for Automatic Classification of 80 Different Pollen Species

Authors: Endrick Barnacin, Jean-Luc Henry, Jimmy Nagau, Jack Molinie

Abstract:

Palynology is a field of interest in many disciplines due to its multiple applications: chronological dating, climatology, allergy treatment, and honey characterization. Unfortunately, the analysis of a pollen slide is a complicated and time consuming task that requires the intervention of experts in the field, which are becoming increasingly rare due to economic and social conditions. That is why the need for automation of this task is urgent. A lot of studies have investigated the subject using different standard image processing descriptors and sometimes hand-crafted ones.In this work, we make a comparative study between classical feature extraction methods (Shape, GLCM, LBP, and others) and Deep Learning (CNN, Autoencoders, Transfer Learning) to perform a recognition task over 80 regional pollen species. It has been found that the use of Transfer Learning seems to be more precise than the other approaches

Keywords: pollens identification, features extraction, pollens classification, automated palynology

Procedia PDF Downloads 136
1753 Music Note Detection and Dictionary Generation from Music Sheet Using Image Processing Techniques

Authors: Muhammad Ammar, Talha Ali, Abdul Basit, Bakhtawar Rajput, Zobia Sohail

Abstract:

Music note detection is an area of study for the past few years and has its own influence in music file generation from sheet music. We proposed a method to detect music notes on sheet music using basic thresholding and blob detection. Subsequently, we created a notes dictionary using a semi-supervised learning approach. After notes detection, for each test image, the new symbols are added to the dictionary. This makes the notes detection semi-automatic. The experiments are done on images from a dataset and also on the captured images. The developed approach showed almost 100% accuracy on the dataset images, whereas varying results have been seen on captured images.

Keywords: music note, sheet music, optical music recognition, blob detection, thresholding, dictionary generation

Procedia PDF Downloads 181
1752 Efficient Position Based Operation Code Authentication

Authors: Hashim Ali, Sheheryar Khan

Abstract:

Security for applications is always been a keen issue of concern. In general, security is to allow access of grant to legal user or to deny non-authorized access to the system. Shoulder surfing is an observation technique to hack an account or to enter into a system. When a malicious observer is capturing or recording the fingers of a user while he is entering sensitive inputs (PIN, Passwords etc.) and may be able to observe user’s password credential. It is very rigorous for a novice user to prevent himself from shoulder surfing or unaided observer in a public place while accessing his account. In order to secure the user account, there are five factors of authentication; they are: “(i) something you have, (ii) something you are, (iii) something you know, (iv) somebody you know, (v) something you process”. A technique has been developed of fifth-factor authentication “something you process” to provide novel approach to the user. In this paper, we have applied position based operational code authentication in such a way to more easy and user friendly to the user.

Keywords: shoulder surfing, malicious observer, sensitive inputs, authentication

Procedia PDF Downloads 272
1751 Water Safety Strategies by Service: A Study of Implementation Studies

Authors: Prince Amartey

Abstract:

Water is critical to public health, quality of life, environmental preservation, economic activity, and long-term growth. In this environment, it is critical to ensure the ongoing improvement of all processes and practices that contribute to the quality and safety of water. Water safety plans (WSPs) developed by water companies are an essential public policy instrument for achieving these objectives. This manuscript examines international evidence of water safety planning adoption and implementation and reports on the current situation in Portugal as part of the necessary adaptation of the national legal framework to the publication of the Directive on water quality for human consumption. The goal is to take lessons from various successful WSP projects throughout the world while writing new legislation in Ghana and elsewhere. According to the findings, four crucial aspects and key factors of success in establishing and implementing WSPs exist commitment from leadership, technical proficiency, administration, and cooperation among agencies.

Keywords: safe drinking, risk, policy, implementation

Procedia PDF Downloads 84
1750 The Legal Personality of The Security Council

Authors: Helyeh Doutaghi

Abstract:

The United Nations Security Council (UNSC) is one of the six principal organs of the United Nations. Under the Charter of the United Nations (UN Charter), the UNSC’s primary responsibility is maintaining international peace and security, which it does through establishing and adopting a Security Council resolution. United Nations resolutions are formal expressions of the opinion or will of United Nations organs. However, there have been times when powerful politicians (or governments with great political power) had the first say in situations where the UNSC should have had jurisdiction based on the principle of rule of law, which is the notion that people are governed by the law rather than by officials. This paper will assess the effectiveness of the UNSC by analyzing its actions during the Iran-Iraq war for it has been found that one of the major reasons for the prolongation of the war was a result of the one-sided positions taken by the UNSC and many nations. The UNSC’s success in achieving its primary goal during the war will be discussed, including an examination of the duties and structure of the UNSC by reviewing the articles in the UN Charter; this will include examples of the UNSC’s role in other international disputes as well.

Keywords: UN Security Council, Iran, Iraq, charter, international law

Procedia PDF Downloads 460
1749 Minority Rights in Islamic Law (Sharia) and International Law Protection Mechanisms in the Region Kurdistan of Iraq

Authors: Ardawan Mustafa Ismail, Rebaz Sdiq Ismail

Abstract:

The subject of minorities takes an exceptional importance at all levels, around the world, especially those whose population is composed of many nationalities, and this subject became a very affective part in every country for its security, entity and stability, such as the nationality, religion or culture, as a result of internal factors and external influences, and at the same time it became clear that enslaving minorities had become a matter of reality. Which made the rights of minorities one of the legal, political and geographical issues, many attempts emerged that specialists and non-specialists have given the minorities ’problems their realistic solutions away from theorizing and assumption. On this chosen topic, there are many researches that are written in general places, but… It is believed did not see any in-depth studies dealing with the protection of minority rights of the Region of Kurdistan/ Iraq, because in the Region of Kurdistan/ Iraq there are many minorities living in this area, such as: Muslims, Yazidi, Assyrian, Christian, Chaldeans, and others.

Keywords: minority, international law, protection, Kurdistan, people

Procedia PDF Downloads 37
1748 Children of Syria: Using Drawings for Diagnosing and Treating Trauma

Authors: Fatten F. Elkomy

Abstract:

The Syrian refugees are the largest refugee population since World War II. Mostly, children, these individuals were exposed to intense traumatic events in their homeland, throughout their journey, and during settlement in foreign lands. Art is a universal language to express feelings and tough human experiences. It is also a medium for healing and promoting creativity and resilience. Literature review was conducted to examine the use of art to facilitate psychiatric interviews, diagnosis, and therapy with traumatized children. Results show a severe impact of childhood trauma on the increased risk for abuse, neglect, and psychiatric disorders. Clinicians must recognize, evaluated and provide help for these children. In conclusion, drawings are used to tell a story, reflect deep emotions, and create a meaningful self-recognition and determination. Participants will understand art therapy using the expressive therapies continuum framework to evaluate drawings and to promote healing for refugee children.

Keywords: art therapy, children drawings, Syrian refugees, trauma in childhood

Procedia PDF Downloads 165
1747 The Inclusive Human Trafficking Checklist: A Dialectical Measurement Methodology

Authors: Maria C. Almario, Pam Remer, Jeff Resse, Kathy Moran, Linda Theander Adam

Abstract:

The identification of victims of human trafficking and consequential service provision is characterized by a significant disconnection between the estimated prevalence of this issue and the number of cases identified. This poses as tremendous problem for human rights advocates as it prevents data collection, information sharing, allocation of resources and opportunities for international dialogues. The current paper introduces the Inclusive Human Trafficking Checklist (IHTC) as a measurement methodology with theoretical underpinnings derived from dialectic theory. The presence of human trafficking in a person’s life is conceptualized as a dynamic and dialectic interaction between vulnerability and exploitation. The current papers explores the operationalization of exploitation and vulnerability, evaluates the metric qualities of the instrument, evaluates whether there are differences in assessment based on the participant’s profession, level of knowledge, and training, and assesses if users of the instrument perceive it as useful. A total of 201 participants were asked to rate three vignettes predetermined by experts to qualify as a either human trafficking case or not. The participants were placed in three conditions: business as usual, utilization of the IHTC with and without training. The results revealed a statistically significant level of agreement between the expert’s diagnostic and the application of the IHTC with an improvement of 40% on identification when compared with the business as usual condition While there was an improvement in identification in the group with training, the difference was found to have a small effect size. Participants who utilized the IHTC showed an increased ability to identify elements of identity-based vulnerabilities as well as elements of fraud, which according to the results, are distinctive variables in cases of human trafficking. In terms of the perceived utility, the results revealed higher mean scores for the groups utilizing the IHTC when compared to the business as usual condition. These findings suggest that the IHTC improves appropriate identification of cases and that it is perceived as a useful instrument. The application of the IHTC as a multidisciplinary instrumentation that can be utilized in legal and human services settings is discussed as a pivotal piece of helping victims restore their sense of dignity, and advocate for legal, physical and psychological reparations. It is noteworthy that this study was conducted with a sample in the United States and later re-tested in Colombia. The implications of the instrument for treatment conceptualization and intervention in human trafficking cases are discussed as opportunities for enhancement of victim well-being, restoration engagement and activism. With the idea that what is personal is also political, we believe that the careful observation and data collection in specific cases can inform new areas of human rights activism.

Keywords: exploitation, human trafficking, measurement, vulnerability, screening

Procedia PDF Downloads 330
1746 Gig Economy Development Trends in Georgia

Authors: Nino Grigolaia

Abstract:

The paper discusses the importance of the development of the gig economy in the economy of Georgia, analyzes the trends of the development of the gig economy, and identifies the main challenges in this field. Objective. The objective of the study is to assess the role of the gig economy, identify the main challenges and develop recommendations. Methodologies. Analysis, synthesis, comparison, induction and other methods are used; A desk study has been conducted. Findings. The advantages and disadvantages of the gig economy are identified, and the impact of the changes caused by the development of the gig economy on labor relations and employment is determined. It is argued that the ongoing technological changes have led to the emergence of new global trends in the labor market and increased the inequality of income distribution. Conclusions. Based on the analysis of the gig economy in the world and in Georgia, relevant recommendations are proposed, namely: establishing a new system of regulating the incomes of employees in this field, developing a real social protection mechanism, Development of political and legal instruments for regulation of gig economy and others.

Keywords: gig economy, economy of Georgia, digital platforms, labor relations

Procedia PDF Downloads 68
1745 The Historical Framework of International Crime in International Criminal Law

Authors: Tahraoui Boualem

Abstract:

Researching the historical framework of international crime means examining the historical facts that have contributed to uncovering this serious crime affecting international interests, and the law by which the study of the subject of international crime is determined is international criminal law, which is a branch of public international law. In this context, the historical study of international crime means recognizing the existence of an international community governed by international law, which makes us acknowledge that ancient societies lacked such stable and recurring international relations. Therefore, an attempt to monitor international crime in those ancient societies is only to demonstrate a historical fact that those societies have known some features of this crime, and have contributed in one way or another to the development of international criminal law without defining its concept or legal nature. The international community has affirmed the principle of establishing peace, achieving security, and respecting human rights. As a basis for friendly relations between the people of the international community and in case of prejudice, such as the aggressors breaching the obligations imposed on them, whether in time of peace or war.

Keywords: historical framework, of international crime, peace or war., international law

Procedia PDF Downloads 100
1744 Development of Adaptive Architecture Classrooms through the Application of Augmented Reality in Private Universities of Malaysia

Authors: Sara Namdarian, Hafez Salleh

Abstract:

This paper scrutinizes the circumstances of the application of Augmented Reality (AR) technology to enhance the adaptability of architecture classrooms in private Malaysian university classrooms. This study aims to indicate the constraints of mono-functional classrooms in comparison to the potentials of multi-functional classrooms derived from AR application through an exploratory mixed method strategy. This paper expects to contribute towards recognition of suitable AR techniques which can be applied in the development of Adaptive-AR-Classroom-Systems (AARCS) in architecture classrooms. The findings, derived from the analysis, show current classrooms have limited functional spaces, and concludes that AR application can be used in design classrooms to provide a variety of visuals and virtual objects that are required in conducting architecture projects in higher educational centers.

Keywords: design activity, space enhancement, design education, architectural design augmented reality

Procedia PDF Downloads 446
1743 Online Authenticity Verification of a Biometric Signature Using Dynamic Time Warping Method and Neural Networks

Authors: Gałka Aleksandra, Jelińska Justyna, Masiak Albert, Walentukiewicz Krzysztof

Abstract:

An offline signature is well-known however not the safest way to verify identity. Nowadays, to ensure proper authentication, i.e. in banking systems, multimodal verification is more widely used. In this paper the online signature analysis based on dynamic time warping (DTW) coupled with machine learning approaches has been presented. In our research signatures made with biometric pens were gathered. Signature features as well as their forgeries have been described. For verification of authenticity various methods were used including convolutional neural networks using DTW matrix and multilayer perceptron using sums of DTW matrix paths. System efficiency has been evaluated on signatures and signature forgeries collected on the same day. Results are presented and discussed in this paper.

Keywords: dynamic time warping, handwritten signature verification, feature-based recognition, online signature

Procedia PDF Downloads 175
1742 The International Labor Organization and the Formulation of International Labor Standards

Authors: Tahraoui Boualem

Abstract:

The International Labor Organization is one of the specialized agencies of the United Nations, and it is the only organization within the United Nations system that is distinguished by its tripartite legitimacy and which simultaneously includes governments, workers' and employers' organizations of its member states in a joint effort to set standards and policies Work to promote decent work in various parts of the world, and the expression of international labor standards basically means two types of documents, namely international labor agreements and international labor recommendations, and so far its general conference, which is held annually, has set a number of standards, the number of which has reached 184 agreements and 192 recommendations so far. For this reason, it is decided to clarify the International Labor Organization and the formulation of international labor standards within two sections. In the first topic, the researcher discusses the concept of the International Labor Organization, and in the second topic, it highlights the legal basis for the authority of the International Labor Organization in protecting the rights of workers.

Keywords: international labor, international labor standards, rights of workers, nation’s system

Procedia PDF Downloads 71
1741 Influence of Leadership Roles on Agricultural Employees’ Job Satisfaction

Authors: B. G. Abiona, E. O. Fakoya, D. O. Alabi

Abstract:

Influence of leadership roles on agricultural employees’ job satisfaction was studied. Data were from 68 randomly selected respondents. Major leadership roles include supervision of employees work (x̄=3.67), leaders were goal oriented (x̄=3.39), dissemination of information among the employees (x̄=3.35). Major employees’ satisfaction was: Employees work together with their colleagues (x̄=3.54) and also interact freely with their colleagues (x̄=3.51). Major challenges affecting employees job satisfaction were inadequate funding (x̄=3.30), irregular leave bonus (x̄=3.29), climate and weather condition (x̄=3.08) and inadequate incentive (x̄=3.02). Regression analysis showed a positive significant coefficient (P<0.05) exist between religion (p<0.05), educational status(p<0.05), year of service(p<0.05), leadership roles (p<0.005), challenges faced by respondents(P<0.05), and employees’ job satisfaction. For adequate leadership role, organization should pay attention to disbursement of training funds, availability of adequate incentive and leadership recognition.

Keywords: leadership roles, agricultural employees’, job satisfaction, institute, Nigeria

Procedia PDF Downloads 297
1740 Analyzing Data Protection in the Era of Big Data under the Framework of Virtual Property Layer Theory

Authors: Xiaochen Mu

Abstract:

Data rights confirmation, as a key legal issue in the development of the digital economy, is undergoing a transition from a traditional rights paradigm to a more complex private-economic paradigm. In this process, data rights confirmation has evolved from a simple claim of rights to a complex structure encompassing multiple dimensions of personality rights and property rights. Current data rights confirmation practices are primarily reflected in two models: holistic rights confirmation and process rights confirmation. The holistic rights confirmation model continues the traditional "one object, one right" theory, while the process rights confirmation model, through contractual relationships in the data processing process, recognizes rights that are more adaptable to the needs of data circulation and value release. In the design of the data property rights system, there is a hierarchical characteristic aimed at decoupling from raw data to data applications through horizontal stratification and vertical staging. This design not only respects the ownership rights of data originators but also, based on the usufructuary rights of enterprises, constructs a corresponding rights system for different stages of data processing activities. The subjects of data property rights include both data originators, such as users, and data producers, such as enterprises, who enjoy different rights at different stages of data processing. The intellectual property rights system, with the mission of incentivizing innovation and promoting the advancement of science, culture, and the arts, provides a complete set of mechanisms for protecting innovative results. However, unlike traditional private property rights, the granting of intellectual property rights is not an end in itself; the purpose of the intellectual property system is to balance the exclusive rights of the rights holders with the prosperity and long-term development of society's public learning and the entire field of science, culture, and the arts. Therefore, the intellectual property granting mechanism provides both protection and limitations for the rights holder. This perfectly aligns with the dual attributes of data. In terms of achieving the protection of data property rights, the granting of intellectual property rights is an important institutional choice that can enhance the effectiveness of the data property exchange mechanism. Although this is not the only path, the granting of data property rights within the framework of the intellectual property rights system helps to establish fundamental legal relationships and rights confirmation mechanisms and is more compatible with the classification and grading system of data. The modernity of the intellectual property rights system allows it to adapt to the needs of big data technology development through special clauses or industry guidelines, thus promoting the comprehensive advancement of data intellectual property rights legislation. This paper analyzes data protection under the virtual property layer theory and two-fold virtual property rights system. Based on the “bundle of right” theory, this paper establishes specific three-level data rights. This paper analyzes the cases: Google v. Vidal-Hall, Halliday v Creation Consumer Finance, Douglas v Hello Limited, Campbell v MGN and Imerman v Tchenquiz. This paper concluded that recognizing property rights over personal data and protecting data under the framework of intellectual property will be beneficial to establish the tort of misuse of personal information.

Keywords: data protection, property rights, intellectual property, Big data

Procedia PDF Downloads 39
1739 Application of Deep Learning Algorithms in Agriculture: Early Detection of Crop Diseases

Authors: Manaranjan Pradhan, Shailaja Grover, U. Dinesh Kumar

Abstract:

Farming community in India, as well as other parts of the world, is one of the highly stressed communities due to reasons such as increasing input costs (cost of seeds, fertilizers, pesticide), droughts, reduced revenue leading to farmer suicides. Lack of integrated farm advisory system in India adds to the farmers problems. Farmers need right information during the early stages of crop’s lifecycle to prevent damage and loss in revenue. In this paper, we use deep learning techniques to develop an early warning system for detection of crop diseases using images taken by farmers using their smart phone. The research work leads to building a smart assistant using analytics and big data which could help the farmers with early diagnosis of the crop diseases and corrective actions. The classical approach for crop disease management has been to identify diseases at crop level. Recently, ImageNet Classification using the convolutional neural network (CNN) has been successfully used to identify diseases at individual plant level. Our model uses convolution filters, max pooling, dense layers and dropouts (to avoid overfitting). The models are built for binary classification (healthy or not healthy) and multi class classification (identifying which disease). Transfer learning is used to modify the weights of parameters learnt through ImageNet dataset and apply them on crop diseases, which reduces number of epochs to learn. One shot learning is used to learn from very few images, while data augmentation techniques are used to improve accuracy with images taken from farms by using techniques such as rotation, zoom, shift and blurred images. Models built using combination of these techniques are more robust for deploying in the real world. Our model is validated using tomato crop. In India, tomato is affected by 10 different diseases. Our model achieves an accuracy of more than 95% in correctly classifying the diseases. The main contribution of our research is to create a personal assistant for farmers for managing plant disease, although the model was validated using tomato crop, it can be easily extended to other crops. The advancement of technology in computing and availability of large data has made possible the success of deep learning applications in computer vision, natural language processing, image recognition, etc. With these robust models and huge smartphone penetration, feasibility of implementation of these models is high resulting in timely advise to the farmers and thus increasing the farmers' income and reducing the input costs.

Keywords: analytics in agriculture, CNN, crop disease detection, data augmentation, image recognition, one shot learning, transfer learning

Procedia PDF Downloads 119
1738 Study of Icons in Enterprise Application Software Context

Authors: Shiva Subhedar, Abhishek Jain, Shivin Mittal

Abstract:

Icons are not merely decorative elements in enterprise applications but very often used because of their many advantages such as compactness, visual appeal, etc. Despite these potential advantages, icons often cause usability problems when they are designed without consideration for their many potential downsides. The aim of the current study was to examine the effect of articulatory distance – the distance between the physical appearance of an interface element and what it actually means. In other words, will the subject find the association of the function and its appearance on the interface natural or is the icon difficult for them to associate with its function. We have calculated response time and quality of identification by varying icon concreteness, the context of usage and subject experience in the enterprise context. The subjects were asked to associate icons (prepared for study purpose) with given function options in context and out of context mode. Response time and their selection were recorded for analysis.

Keywords: HCI, icons, icon concreteness, icon recognition

Procedia PDF Downloads 258
1737 Protected Status: Violation of the Provisions of Protected Status under International Humanitarian Law during the Liberation War of Bangladesh

Authors: Sabera Sultana

Abstract:

In today's war-torn world, it is crucial to identify, understand, and apply the laws aimed at minimizing civilian casualty during wartime. The purpose of this paper is to analyze the provisions of protected status under international humanitarian law and evaluate the historical facts and shreds of evidences of violation of protected status during the Liberation War of Bangladesh. This legal research paper evaluates the international humanitarian laws and case laws regarding protected status of people during wartime and evaluates them against the historical facts and well-documented evidences of violation of protected status during the Liberation War of Bangladesh. This paper will help to create a brief guideline on Protected Status under international humanitarian law, which will help to protect our civilians during wartime if ever required.

Keywords: civilian protection, international humanitarian laws, liberation war of Bangladesh, protected status

Procedia PDF Downloads 219
1736 A Framework for Vacant City-Owned Land to Be Utilised for Urban Agriculture: The Case of Cape Town, South Africa

Authors: P. S. Van Staden, M. M. Campbell

Abstract:

Vacant City of Cape Town-owned land lying un-utilized and -productive could be developed for land uses such as urban agriculture that may improve the livelihoods of low income families. The new City of Cape Town zoning scheme includes an Urban Agriculture zoning for the first time. Unstructured qualitative interviews among town planners revealed their optimism about this inclusion as it will provide low-income residents with opportunities to generate an income. An existing farming community at Philippi, located within the municipal boundary of the city, was approached and empirical data obtained through questionnaires provided proof that urban agriculture could be viable in a coastal metropolitan city such as Cape Town even if farmers only produce for their own households. The lease method proposed for urban agriculture is a usufruct agreement conferring the right to another party, other than the legal owner, to enjoy the use and advantages of the property.

Keywords: land uses, urban agriculture, agriculture, food engineering

Procedia PDF Downloads 299
1735 The Twin Terminal of Pedestrian Trajectory Based on City Intelligent Model (CIM) 4.0

Authors: Chen Xi, Lao Xuerui, Li Junjie, Jiang Yike, Wang Hanwei, Zeng Zihao

Abstract:

To further promote the development of smart cities, the microscopic "nerve endings" of the City Intelligent Model (CIM) are extended to be more sensitive. In this paper, we develop a pedestrian trajectory twin terminal based on the CIM and CNN technology. It also uses 5G networks, architectural and geoinformatics technologies, convolutional neural networks, combined with deep learning networks for human behaviour recognition models, to provide empirical data such as 'pedestrian flow data and human behavioural characteristics data', and ultimately form spatial performance evaluation criteria and spatial performance warning systems, to make the empirical data accurate and intelligent for prediction and decision making.

Keywords: urban planning, urban governance, CIM, artificial intelligence, convolutional neural network

Procedia PDF Downloads 149
1734 Towards Effective Public Consultation and Participation in Nigeria: Lessons from Shoreline Management Plans (SMPs) Activities in England

Authors: Taye O. Famuditi, Jonathan Potts, Malcolm Bray

Abstract:

This paper examines the shoreline management planning policy in England and its suitability for ameliorating the diverse environmental problems associated with Nigeria’s coastal zones. It examines the success of SMPs in England since the mid-1990s and progress achieved, with the aim of understudying the current management approach that can be transferred to Nigeria to strengthen its adoption, and as a necessary corollary, implementation of the SMPs. This paper also examines key elements of the shoreline management frameworks in England and provides answers to the question: Would shoreline management planning approach in England be appropriate and feasible in Nigeria? It further concludes that many of the action plans and principles of participation should be adoptable provided that a participatory approach that involves all stakeholders including community members and relevant sectorial ministries as well as appropriate legal framework is encouraged.

Keywords: shoreline management plans, coastal zone management, stakeholder engagement, participatory approach, Nigeria

Procedia PDF Downloads 348
1733 Foraminiferal Associations and Paleoecology of the Oligocene Sediments in Zagros Basin, SW Iran

Authors: Tahereh Habibi

Abstract:

The Oligocene carbonates are widespread along Fars Province, Zagros Basin, SW Iran. Distribution of planktonic and larger benthic foraminfera, stratal patterns and facies architecture are used as a tool to define microfacies and foraminiferal associations of these strata at Kavar Section. The presence of Nummulites spp. indicated the age of the sequence as Rupelian-Chattian (Nummulites vascus-Nummulites fichteli and Archaias asmaricus/hensoni-Miogypsinoides complanatus assemblage zones). The paleoenvironmental setting is interpreted as a homoclinal ramp environment according to the recognition of eight microfacies types. Four foraminiferal associations are recognized in the investigated ramp setting. They represent a salinity of 34-40 to 50 psu and higher than 50 psu in more restricted conditions. The depth ranges from 200 m as evidenced by the presence of planktonic foraminifera and to less than 30m in the more restricted inner ramp environment. Warm tropical and subtropical water with temperature of 18-25° C is proposed.

Keywords: foraminiferal associations, microfacies, oligocene, paleoecology

Procedia PDF Downloads 506
1732 The Molecular Bases of Δβ T-Cell Mediated Antigen Recognition

Authors: Eric Chabrol, Sidonia B.G. Eckle, Renate de Boer, James McCluskey, Jamie Rossjohn, Mirjam H.M. Heemskerk, Stephanie Gras

Abstract:

αβ and γδ T-cells are disparate T-cell lineages that, via their use of either αβ or γδ T-cell antigen receptors (TCRs) respectively, can respond to distinct antigens. Here we characterise a new population of human T-cells, term δβ T-cells, that express TCRs comprising a TCR-δ variable gene fused to a Joining-α/Constant-α domain, paired with an array of TCR-β chains. We characterised the cellular, functional, biophysical and structural characteristic feature of this new T-cells population that reveal some new insight into TCR diversity. We provide molecular bases of how δβ T-cells can recognise viral peptide presented by Human Leukocyte Antigen (HLA) molecule. Our findings highlight how components from αβ and γδTCR gene loci can recombine to confer antigen specificity thus expanding our understanding of T-cell biology and TCR diversity.

Keywords: new delta-beta TCR, HLA, viral peptide, structural immunology

Procedia PDF Downloads 425