Search results for: Egypt’s Civil Code
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2819

Search results for: Egypt’s Civil Code

2699 Gender Equality and Career Opportunities Among Female Civil Servants for Better Public Services in West Java - Indonesia

Authors: Nefi Aris Ambar Asmara

Abstract:

This paper discusses gender equality and career opportunities among female civil servants for better public services in a regency in West Java, Indonesia. Those two areas have not been considered comprehensively in terms of the goals of gender equality and career opportunities. The purposes of this paper are to describe (1) the number of available positions in relation to the number of female civil servants, (2) the socio-cultural outlook on female civil servants in relation to gender equality and career opportunities and (3) socio-cultural views on gender equality and a career in politics. To achieve these three objectives, this paper used a qualitative approach with survey and interview techniques. The results showed that (1) only 37% of the official positions were presided by female civil servants. In contrast, male civil servants occupy 63% of the available positions, (2) the sociocultural view of female civil servants affirms that they are still regarded as male companions; (3) in addition, female civil servants do not need to compete with gender opponents, including the fact that women enter politics because the political world is considered dirty for women.

Keywords: gender equality, career opportunities, female civil servants, indonesia

Procedia PDF Downloads 80
2698 Water-Sensitive Landscaping in Desert-Located Egyptian Cities through Sheer Reductions of Turfgrass and Efficient Water Use

Authors: Sarah M. Asar, Nabeel M. Elhady

Abstract:

Egypt’s current per capita water share indicates that the country suffers and has been suffering from water poverty. The abundant utilization of turfgrass in Egypt’s new urban settlements, the reliance on freshwater for irrigation, and the inadequate plant selection increase the water demand in such settlements. Decreasing the surface area of turfgrass by using alternative landscape features such as mulching, using ornamental low-maintenance plants, increasing pathways, etc., could significantly decrease the water demand of urban landscapes. The use of Ammochloa palaestina, Cenchrus crientalis (Oriental Fountain Grass), and Cistus parviflorus (with water demands of approximately 0.005m³/m²/day) as alternatives for Cynodon dactylon (0.01m³/m²/day), which is the most commonly used grass species in Egypt’s landscape, could decrease an area’s water demand by approximately 40-50%. Moreover, creating hydro-zones of similar water demanding plants would enable irrigation facilitation rather than the commonly used uniformed irrigation. Such a practice could further reduce water consumption by 15-20%. These results are based on a case-study analysis of one of Egypt’s relatively new urban settlements, Al-Rehab. Such results emphasize the importance of utilizing native, drought-tolerant vegetation in the urban landscapes of Egypt to reduce irrigation demands. Furthermore, proper implementation, monitoring, and maintenance of automated irrigation systems could be an important factor in a space’s efficient water use. As most new urban settlements in Egypt adopt sprinkler and drip irrigation systems, the lack of maintenance leads to the manual operation of such systems, and, thereby, excessive irrigation occurs.

Keywords: alternative landscape, native plants, efficient irrigation, low water demand

Procedia PDF Downloads 73
2697 Iraqi Women’s Rights Under State Civil Law and Conservative Influences: A Study of Legal Documents and Social Implementation

Authors: Rose Hattab

Abstract:

Women have been an important dynamic in religious context and the state-building process of Arab countries throughout history. During the 1970s as the movement for women’s activism and rights developed, the Iraqi state under the Ba’ath Party began to provide Iraqi women with legal and civil rights. This was done to liberate women from the grasps of social traditions and was a tangible espousing of equality between men and women in the process of nation-building. Whereas women’s rights were stronger and more supported throughout the earliest years of the Ba’ath Regime (1970-1990), the aftermath of the Gulf War and economic sanctions on the conditions of Iraqi society laid the foundation for a division of women’s rights between civil and religious authorities. Personal status codes that were secured in 1959 were being pushed back by amendments made in coordination with religious leaders. Civil laws were present on paper, but religious authority took prominence in practice. The written legal codes were inclusive of women’s rights, but there is not an active or ensured practice of these rights within Iraqi society. This is due to many different factors, such as religious, sectarian, political and conservative reasons that hold back or limit the ability for Iraqi women to have autonomy in aspects such as participation in the workforce, getting married, and ensuring social justice. This paper argues that the Personal Status Code introduced in 1959 – which replaced Sharia-run courts with personal status courts – provided Iraqi women with equality and increased mobility in social and economic dynamics. The statewide crisis felt after the Gulf War and the economic sanctions imposed by the United Nations led to a stark shift in the Ba’ath party’s political ideology. This ideological turn guided the social system to the embracement of social conservatism and religious traditions in the 1990s. The effect of this implementation continued after the establishment of a new Iraqi government during 2003-2005. Consequently, Iraqi women's rights in employment, marriage, and family became divided into paper and practice by religious authorities and civil law from that period to the present day. This paper also contributes to the literature by expanding on the gap between legal codes on paper and in practice, through providing an analysis of Iraqi women’s rights in the Iraqi Constitution of 2005 and Iraq’s Penal Code. The turn to conservative and religious traditions is derived from the multiplicity of identities that make up the Iraqi social fabric. In the aftermath of a totalitarian regime, active wars, and economic sanctions, the Iraqi people attempted to unite together through their different identities to create a sense of security in the midst of violence and chaos. This is not an excuse to diminish the importance of women’s rights, but in the process of building a new nation-state, women were lost from the narrative. Thus, the presence of gender equity is found in the written text but is not practiced and upheld in the social context.

Keywords: civil rights, Iraqi women, nation building, religion and conflict

Procedia PDF Downloads 142
2696 Egyptian Women in the Informal Economy: Implications of the Covid-19 Pandemic

Authors: Hagar Wahba

Abstract:

In an attempt to bridge a literature gap, the study explores the different gendered consequences of economic globalization on Egyptian women in informal employment. Under the intersectionality theory, the study highlights issues related to equal economic opportunities among women in different segments of informal employment during Covid-19. Accordingly, this study explores the different vulnerabilities of women in lower segments of the informal sector in Egypt, which intersected with inequalities brought by the pandemic. Therefore, through collecting primary data, the study was able to gain a more intersectional understanding of women’s experiences in informal employment during Covid-19. In women in technology-based work in Egypt were proven to be in a more advantaged position than other women whose jobs depended on face-to-face interactions during the pandemic.

Keywords: economic globalisation, informal employment, women, egypt, intersectional feminism, decent work, Covid-19

Procedia PDF Downloads 93
2695 LGBT+ Migrants: A Cultural and Legislative Comparison in Canada, Italy and Egypt

Authors: Andreas Aceranti, Simonetta Vernocchi, Federica Brondoni, Marco Colorato, Marta Primatesta

Abstract:

This study entitled “LGBT+ migrants: a cultural and legislative comparison in Canada, Italy and Egypt” suggests an analysis of the living conditions of migrants who are members of the LGBT+ community in Canada, Italy and Egypt. The acronym LGBT+ refers to lesbian, gay, bisexual, transgender and all other gender identities and sexual orientations that do not fit into the male and female binary. This study aims at reflecting on the living conditions of LGBT+ migrants and the relatable difficulties they may face due to the culture and laws of their countries. Migratory flows were examined by providing a definition of "migrant" and the choices that drive a person to migrate elsewhere explained, followed by a focus on the recognition of refugee status related to sexual orientation and gender identity. Furthermore, we will deal with Canada, Italy and Egypt respectively, by analyzing for each country the history and rise of the LGBT+ community, the different laws and especially the migrants’ rights. Finally, the services and associations designed to provide a response to the needs of these people will be analyzed, highlighting the branches which nowadays operate in those areas and the importance of the cultural mediator.

Keywords: LGBTQ+, migrants, international rights, discrimination

Procedia PDF Downloads 107
2694 Relations between the Internal Employment Conditions of International Organizations and the Characteristics of the National Civil Service

Authors: Renata Hrecska

Abstract:

This research seeks to fully examine the internal employment law of international organizations by comparing it with the characteristics of the national civil service. The aim of the research is to compare the legal system that has developed over many centuries and the relatively new internal staffing regulations to find out what solution schemes can help each other through mutual legal development in order to respond effectively to the social challenges of everyday life. Generally, the rules of civil service of any country or international entity have in common that they have, in their pragmatics inherently, the characteristic that makes them serving public interests. Though behind the common base there are many differences: there is the clear fragmentation of state regulation and the unity of organizational regulation. On the other hand, however, this difference disappears to some extent: the public service regulation of international organizations can be considered uniform until we examine it within, but not outside an organization. As soon as we compare the different organizations we may find many different solutions for staffing regulations. It is clear that the national civil service is a strong model for international organizations, but the question may be whether the staffing policy of international organizations can serve the national civil service as an example, too. In this respect, the easiest way to imagine a legislative environment would be to have a single comprehensive code, the general part of which is the Civil Service Act itself, and the specific part containing specific, necessarily differentiating rules for each layer of the civil service. Would it be advantageous to follow the footsteps of the leading international organizations, or is there any speciality in national level civil service that we cannot avoid during regulating processes? In addition to the above, the personal competencies of officials working in international organizations and public administrations also show a high degree of similarity, regardless of the type of employment. Thus, the whole public service system is characterized by the fundamental and special values that a person capable of holding a public office must be able to demonstrate, in some cases, even without special qualifications. It is also interesting how we can compare the two spheres of employment in light of the theory of Lawyer Louis Brandeis, a judge at the US Supreme Court, who formulated a complex theory of profession as distinguished from other occupations. From this point of view we can examine the continuous development of research and specialized knowledge at work; the community recognition and social status; that to what extent we can see a close-knit professional organization of altruistic philosophy; that how stability grows in the working conditions due to the stability of the profession; and that how the autonomy of the profession can prevail.

Keywords: civil service, comparative law, international organizations, regulatory systems

Procedia PDF Downloads 128
2693 Trends of Code-Mixing in a Bilingual Nigerian Child: An Investigation of a Three-Year-Old Child

Authors: Salamatu Sani

Abstract:

This study is an investigation of how code-mixing manifests in the language development of a Nigerian child, especially in the Hausa speaking environment. It is hinged on the fact that the environment influences the first language acquired by a child regardless of the cultural and/or linguistic background of the parents. The child under investigation has been subjected to close monitoring on her speech hitherto. It is a longitudinal study covering a period of twelve months (January 2018 to December 2018); that was when the subject was between twenty-four and thirty months of age. The speeches have been recorded by means of a tape recorder, video, and a diary. The study employs as a theoretical framework, emergentism, which is an eclectic of the behaviourist and the mentalist theories to the study of language development, for analysis. This is in agreement with the positions of Skinner and Watson. Sequel to this investigation, it was discovered the environment is a major factor that influences the exposure of a child to a language more than the other factors and that, if a child is exposed to more than one language, there is a great tendency for such a child to code-mix and code-switch in her speech production. The child under investigation, in spite of the linguistic background of her parents, speaks the Hausa Language much better than the other languages around her though with remarkable code-mixing with other languages around her such as English and Ebira languages. The study concludes that although a child is born with the innate ability to acquire a particular language, the environment plays a key role to trigger the innate ability and consequently, the child is exposed to the acquisition of the dominant language around her at a particular given time.

Keywords: bilingual, code-mixing, emergentism, environment, Hausa

Procedia PDF Downloads 156
2692 BodeACD: Buffer Overflow Vulnerabilities Detecting Based on Abstract Syntax Tree, Control Flow Graph, and Data Dependency Graph

Authors: Xinghang Lv, Tao Peng, Jia Chen, Junping Liu, Xinrong Hu, Ruhan He, Minghua Jiang, Wenli Cao

Abstract:

As one of the most dangerous vulnerabilities, effective detection of buffer overflow vulnerabilities is extremely necessary. Traditional detection methods are not accurate enough and consume more resources to meet complex and enormous code environment at present. In order to resolve the above problems, we propose the method for Buffer overflow detection based on Abstract syntax tree, Control flow graph, and Data dependency graph (BodeACD) in C/C++ programs with source code. Firstly, BodeACD constructs the function samples of buffer overflow that are available on Github, then represents them as code representation sequences, which fuse control flow, data dependency, and syntax structure of source code to reduce information loss during code representation. Finally, BodeACD learns vulnerability patterns for vulnerability detection through deep learning. The results of the experiments show that BodeACD has increased the precision and recall by 6.3% and 8.5% respectively compared with the latest methods, which can effectively improve vulnerability detection and reduce False-positive rate and False-negative rate.

Keywords: vulnerability detection, abstract syntax tree, control flow graph, data dependency graph, code representation, deep learning

Procedia PDF Downloads 165
2691 Mineral Chemistry of Extraordinary Ilmenite from the Gabbroic Rocks of Abu Ghalaga Area, Eastern Desert, Egypt: Evidence to Metamorphic Modification

Authors: Yaser Maher Abdel Aziz Hawa

Abstract:

An assemblage of Mn-bearing ilmenite, titanomagnetite (4-17 vol.%) and subordinate chalcopyrite, pyrrhptite and pyrite is present as dissiminations in gabbroic rocks of Abu Ghalaga area, Eastern Desert, Egypt. The neoproterozoic gabbroic rocks encompasses these opaques are emplaced during oceanic island arc stage which represents the Nubian shield of Egypt. However, some textural features of these opaques suggest a relict igneous. The high Mn (up to 5.8 MnO%, 1282% MnTiO3) and very low Mg contents (0.21 MgO%, 0.82 MgTiO3) are dissimilar to those of any igneous ilmenite of tholeiitic rocks. Most of these ilmenites are associated mostly with metamorphic hornblende. Hornblende thermometry estimate crystallization of about 560°C. the present study suggests that the ilmenite under consideration has been greatly metamorphically modified, having lost Mg and gained Mn by diffusion.

Keywords: titanomagnetite, Ghalaga, ilmenite, chemistry

Procedia PDF Downloads 326
2690 Easily Memorable Strong Password Generation and Retrieval

Authors: Shatadru Das, Natarajan Vijayarangan

Abstract:

In this paper, a system and method for generating and recovering an authorization code has been designed and analyzed. The system creates an authorization code by accepting a base-sentence from a user. Based on the characters present in this base-sentence, the system computes a base-sentence matrix. The system also generates a plurality of patterns. The user can either select the pattern from the multiple patterns suggested by the system or can create his/her own pattern. The system then performs multiplications between the base-sentence matrix and the selected pattern matrix at different stages in the path forward, for obtaining a strong authorization code. In case the user forgets the base sentence, the system has a provision to manage and retrieve 'forgotten authorization code'. This is done by fragmenting the base sentence into different matrices and storing the fragmented matrices into a repository after computing matrix multiplication with a security question-answer approach and with a secret key provided by the user.

Keywords: easy authentication, key retrieval, memorable passwords, strong password generation

Procedia PDF Downloads 396
2689 A Developmental Study of the Flipped Classroom Approach on Students’ Learning in English Language Modules in British University in Egypt

Authors: A. T. Zaki

Abstract:

The flipped classroom approach as a mode of blended learning was formally introduced to students of the English language modules at the British University in Egypt (BUE) at the start of the academic year 2015/2016. This paper aims to study the impact of the flipped classroom approach after three semesters of implementation. It will restrict itself to the examination of students’ achievement rates, student satisfaction, and how different student cohorts have benefited differently from the flipped practice. The paper concludes with recommendations of how the experience can be further developed.

Keywords: achievement rates, developmental experience, Egypt, flipped classroom, higher education, student cohorts, student satisfaction

Procedia PDF Downloads 254
2688 Theory about the Gebel El-Arak Knife: Egyptian Knife with Canaanite Relief

Authors: Doaa El-Shereef

Abstract:

This paper will focus on proving a theory that it is an Egyptian knife with Canaanite relief and will discuss the nature of the Gebel el-Arak Knife and the civilization to which it belongs and the relationship of the Canaanite deity with Mount Abydos in Egypt, and the influence between the ancient Egyptian religion and the Canaanite religion and their effect on each other. Finally, the paper will discuss in full detail the engraving of the two faces of the knife handle and analyze the register on the front face, which is the scene of the two lions engraved, and between them, an old man symbolized as the deity in the middle and compared it with other drawings similar in the Egyptian civilization. The paper will also discuss the registers on the back face, which are the engravings of a battle, soldiers, uniforms, and boats, and how the back face describes a water battle between three Egyptian boats and two foreign ships. In addition, it will prove that those foreign ships were not Mesopotamian ships because, in the period to which the knife of Gebel Al-Arak belongs, between 3300-3100 BC, there were no battles or trade exchanges between Egypt and Mesopotamia on sea routes. However, there was already a strong land and sea trade between Canaan and Egypt during Chalcolithic Age (4500-3500 BC), as described in many primary sources.

Keywords: Canaan, Egypt, Gebel el-Arak Knife, Louvre

Procedia PDF Downloads 169
2687 The Evaluation Model for the Quality of Software Based on Open Source Code

Authors: Li Donghong, Peng Fuyang, Yang Guanghua, Su Xiaoyan

Abstract:

Using open source code is a popular method of software development. How to evaluate the quality of software becomes more important. This paper introduces an evaluation model. The model evaluates the quality from four dimensions: technology, production, management, and development. Each dimension includes many indicators. The weight of indicator can be modified according to the purpose of evaluation. The paper also introduces a method of using the model. The evaluating result can provide good advice for evaluating or purchasing the software.

Keywords: evaluation model, software quality, open source code, evaluation indicator

Procedia PDF Downloads 383
2686 The Effect of Program Type on Mutation Testing: Comparative Study

Authors: B. Falah, N. E. Abakouy

Abstract:

Due to its high computational cost, mutation testing has been neglected by researchers. Recently, many cost and mutants’ reduction techniques have been developed, improved, and experimented, but few of them has relied the possibility of reducing the cost of mutation testing on the program type of the application under test. This paper is a comparative study between four operators’ selection techniques (mutants sampling, class level operators, method level operators, and all operators’ selection) based on the program code type of each application under test. It aims at finding an alternative approach to reveal the effect of code type on mutation testing score. The result of our experiment shows that the program code type can affect the mutation score and that the programs using polymorphism are best suited to be tested with mutation testing.

Keywords: equivalent mutant, killed mutant, mutation score, mutation testing, program code type, software testing

Procedia PDF Downloads 550
2685 Constructions of Linear and Robust Codes Based on Wavelet Decompositions

Authors: Alla Levina, Sergey Taranov

Abstract:

The classical approach to the providing noise immunity and integrity of information that process in computing devices and communication channels is to use linear codes. Linear codes have fast and efficient algorithms of encoding and decoding information, but this codes concentrate their detect and correct abilities in certain error configurations. To protect against any configuration of errors at predetermined probability can robust codes. This is accomplished by the use of perfect nonlinear and almost perfect nonlinear functions to calculate the code redundancy. The paper presents the error-correcting coding scheme using biorthogonal wavelet transform. Wavelet transform applied in various fields of science. Some of the wavelet applications are cleaning of signal from noise, data compression, spectral analysis of the signal components. The article suggests methods for constructing linear codes based on wavelet decomposition. For developed constructions we build generator and check matrix that contain the scaling function coefficients of wavelet. Based on linear wavelet codes we develop robust codes that provide uniform protection against all errors. In article we propose two constructions of robust code. The first class of robust code is based on multiplicative inverse in finite field. In the second robust code construction the redundancy part is a cube of information part. Also, this paper investigates the characteristics of proposed robust and linear codes.

Keywords: robust code, linear code, wavelet decomposition, scaling function, error masking probability

Procedia PDF Downloads 485
2684 Selection Criteria in the Spanish Secondary Education Content and Language Integrated Learning (CLIL) Programmes and Their Effect on Code-Switching in CLIL Methodology

Authors: Dembele Dembele, Philippe

Abstract:

Several Second Language Acquisition (SLA) studies have stressed the benefits of Content and Language Integrated Learning (CLIL) and shown how CLIL students outperformed their non-CLIL counterparts in many L2 skills. However, numerous experimental CLIL programs seem to have mainly targeted above-average and rather highly motivated language learners. The need to understand the impact of the student’s language proficiency on code-switching in CLIL instruction motivated this study. Therefore, determining the implications of the students’ low-language proficiency for CLIL methodology, as well as the frequency with which CLIL teachers use the main pedagogical functions of code-switching, seemed crucial for a Spanish CLIL instruction on a large scale. In the mixed-method approach adopted, ten face-to-face interviews were conducted in nine Valencian public secondary education schools, while over 30 CLIL teachers also contributed with their experience in two online survey questionnaires. The results showed the crucial role language proficiency plays in the Valencian CLIL/Plurilingual selection criteria. The presence of a substantial number of low-language proficient students in CLIL groups, which in turn implied important methodological consequences, was another finding of the study. Indeed, though the pedagogical use of L1 was confirmed as an extended practice among CLIL teachers, more than half of the participants perceived that code-switching impaired attaining their CLIL lesson objectives. Therein, the dissertation highlights the need for more extensive empirical research on how code-switching could prove beneficial in CLIL instruction involving low-language proficient students while maintaining the maximum possible exposure to the target language.

Keywords: CLIL methodology, low language proficiency, code switching, selection criteria, code-switching functions

Procedia PDF Downloads 76
2683 Quantum Inspired Security on a Mobile Phone

Authors: Yu Qin, Wanjiaman Li

Abstract:

The widespread use of mobile electronic devices increases the complexities of mobile security. This thesis aims to provide a secure communication environment for smartphone users. Some research proves that the one-time pad is one of the securest encryption methods, and that the key distribution problem can be solved by using the QKD (quantum key distribution). The objective of this project is to design an Android APP (application) to exchange several random keys between mobile phones. Inspired by QKD, the developed APP uses the quick response (QR) code as a carrier to dispatch large amounts of one-time keys. After evaluating the performance of APP, it allows the mobile phone to capture and decode 1800 bytes of random data in 600ms. The continuous scanning mode of APP is designed to improve the overall transmission performance and user experience, and the maximum transmission rate of this mode is around 2200 bytes/s. The omnidirectional readability and error correction capability of QR code gives it a better real-life application, and the features of adequate storage capacity and quick response optimize overall transmission efficiency. The security of this APP is guaranteed since QR code is exchanged face-to-face, eliminating the risk of being eavesdropped. Also, the id of QR code is the only message that would be transmitted through the whole communication. The experimental results show this project can achieve superior transmission performance, and the correlation between the transmission rate of the system and several parameters, such as the QR code size, has been analyzed. In addition, some existing technologies and the main findings in the context of the project are summarized and critically compared in detail.

Keywords: one-time pad, QKD (quantum key distribution), QR code, application

Procedia PDF Downloads 143
2682 Civil Liability for Digital Crimes

Authors: Pál Mészáros

Abstract:

The aim of this research topic is to examine civil law consequences caused by crimes committed in the digital space. During the commission of certain crimes, not only the rights of one person are violated, but also the rights of an entire institution, for example, if the information system of a university is attacked. The consequences of these crimes committed in the digital space may also be that the victim himself is liable to other third parties, for example, in the event that health data comes into the possession of unauthorized persons, and it can be proved that the service provider's IT system was inadequate. An interesting question may also be the civil liability of credit institutions if someone becomes a victim of fraud but is not expected from him/her to notice the fraud. In such a case, the liability of the credit institution may arise if they do not respond in time in the case of unauthorized bank transactions. Based on the above, the main topic of the research is the civil liability of the victim, or another person or company related to the victim in the case of damages caused by crimes.

Keywords: civil liability, digital crimes, transfer of responsibility, civil law

Procedia PDF Downloads 59
2681 New Result for Optical OFDM in Code Division Multiple Access Systems Using Direct Detection

Authors: Cherifi Abdelhamid

Abstract:

In optical communication systems, OFDM has received increased attention as a means to overcome various limitations of optical transmission systems such as modal dispersion, relative intensity noise, chromatic dispersion, polarization mode dispersion and self-phase modulation. The multipath dispersion limits the maximum transmission data rates. In this paper we investigate OFDM system where multipath induced intersymbol interference (ISI) is reduced and we increase the number of users by combining OFDM system with OCDMA system using direct detection Incorporate OOC (orthogonal optical code) for minimize a bit error rate.

Keywords: OFDM, OCDMA, OOC (orthogonal optical code), (ISI), prim codes (Pc)

Procedia PDF Downloads 649
2680 Civil Nuclear Liability Indian Perspective

Authors: Shivani Gupta, Shrishti Chaturvedi

Abstract:

By using a miniscule of nuclear matter, the problem of immeasurable human needs for energy can be resolved. However since nuclear energy also has the inherent potential for catastrophic destruction, one should be extremely mindful of the consequences should a mischance occur. Civil Nuclear Liability has recently gained a lot of momentum after India entered into agreements with nations like United States of America, France and others. Also now India is a part of the Convention on Supplementary Compensation (CSC). With a history of Bhopal Gas Tragedy, India is now much more vigilant about the latest developments in this sector. Therefore, it has become imperative to analyses the liability regime in the background of international conventions such as Vienna Convention 1963, Paris Convention 1960, Convention on Supplementary Compensation, 1997 and others. Also the present Indian legal scenarios in this regard which are derived from Civil Liability for Nuclear Damages Act, 2010 and Civil Liability for Nuclear Damages Rules, 2011 have also been extensively discussed in the paper.

Keywords: nuclear liability, civil liability for nuclear damages act, 2010, civil liability for nuclear damages rules, India

Procedia PDF Downloads 402
2679 Design of Seismically Resistant Tree-Branching Steel Frames Using Theory and Design Guides for Eccentrically Braced Frames

Authors: R. Gary Black, Abolhassan Astaneh-Asl

Abstract:

The International Building Code (IBC) and the California Building Code (CBC) both recognize four basic types of steel seismic resistant frames; moment frames, concentrically braced frames, shear walls and eccentrically braced frames. Based on specified geometries and detailing, the seismic performance of these steel frames is well understood. In 2011, the authors designed an innovative steel braced frame system with tapering members in the general shape of a branching tree as a seismic retrofit solution to an existing four story “lift-slab” building. Located in the seismically active San Francisco Bay Area of California, a frame of this configuration, not covered by the governing codes, would typically require model or full scale testing to obtain jurisdiction approval. This paper describes how the theories, protocols, and code requirements of eccentrically braced frames (EBFs) were employed to satisfy the 2009 International Building Code (IBC) and the 2010 California Building Code (CBC) for seismically resistant steel frames and permit construction of these nonconforming geometries.

Keywords: eccentrically braced frame, lift slab construction, seismic retrofit, shear link, steel design

Procedia PDF Downloads 464
2678 The Hague Abduction Convention and the Egyptian Position: Strategizing for a Law Reform

Authors: Abdalla Ahmed Abdrabou Emam Eldeib

Abstract:

For more than a century, the Hague Conference has tackled issues in the most challenging areas of private international law, including family law. Its actions in the realm of international child abduction have been remarkable in two ways during the last two decades. First, on October 25, 1980, the Hague Convention on the Civil Aspects of International Child Abduction (the Convention) was promulgated as an unusually inventive and powerful tool. Second, the Convention is rapidly becoming more prominent in the development of international child law. By that time, overseas travel had grown more convenient, and more couples were marrying or travelling across national lines. At the same time, parental separation and divorce have increased, leading to an increase in international child custody battles. The convention they drafted avoids legal quagmires and addresses extra-legal issues well. It literally restores the kid to its place of usual residence by establishing that the youngster was unlawfully abducted from that position or, alternatively, was wrongfully kept abroad after an allowed visit. Legal custody of a child of a contested parent is usually followed by the child's abduction or unlawful relocation to another country by the non-custodial parent or other persons. If a child's custodial parent lives outside of Egypt, the youngster may be kidnapped and brought to Egypt. It's natural to ask what laws should apply and what legal norms should be followed while hearing individual instances. This study comprehensively evaluates and estimates the relevant Hague Child Abduction Convention and the current situation in Egypt and which law is applicable for child custody. In addition, this research emphasis, detail, and focus on the position of Cross-border parental child abductions in Egypt. Moreover, examine the Islamic law compared to the Hague Convention on Child Custody in detail, as well as mentioning the treatment of Islamic countries in this matter in general and Egypt's treatment of this matter in particular, as well as the criticism directed at Egypt regarding the application and implementation of child custody issues. The present research backs up this method by using non-doctrinal techniques, including surveys, interviews, and dialogues. An important objective of this research is to examine the factors that contribute to parental child abduction. In this case, family court attorneys and other interested parties serve as the target audience from whom data is collected. A survey questionnaire was developed and sent to the target population in order to collect data for future empirical testing to validate the identified critical factors on Parental Child Abduction. The main finding in this study is breaking the reservations of many Muslim countries to join the Hague Convention with regard to child custody., Likewise, clarify the problems of implementation in practice in cases of kidnapping a child from one of the parents and traveling with him outside the borders of the country. Finally, this study is to provide suggestions for reforming the current Egyptian Family Law to make it an effective and efficient for all dispute's resolution mechanism and the possibility of joining The Hague Convention.

Keywords: egyptian family law, Hague child abduction convention, child custody, cross-border parental child abductions in egypt

Procedia PDF Downloads 67
2677 Transmission Loss Analysis for Panels Laminated with Felt and Film

Authors: Yoshio Kurosawa

Abstract:

To reduce the interior noise of cars in high-frequency region, sound proof materials are laminated with the body panels and the interior trims. Therefore, sound proof properties of the laminates play an important role for the efficient acoustical design. A program code which predicts both sound absorption properties and sound insulation properties of the laminates are developed. This program code is used for transfer matrix method by Biot theory. This report described the outline of this program code, and the calculation results almost agreed with the experimental results.

Keywords: porous media, transmission loss, Biot theory, transfer matrix method

Procedia PDF Downloads 273
2676 Recognition and Enforcement of Foreign Decree Divorces in India with Special Reference to the Hindu Marriage Act, 1955

Authors: Poonamdeep kaur

Abstract:

With the increase in number of Non-Resident Indian marriages there is also increase in foreign decree divorces which inevitably causes the problem of recognition and enforcement of foreign judgments in India. The Hindus in India are governed by the Hindu Marriage Act, 1956. According to the said Act the courts in India have jurisdiction to try the matrimonial dispute if the marriage is performed in India or the parties to the marriage have domicile in India irrespective of their nationality status. But, sometimes one of the parties to the marriage whose marriage is solemnized in India obtains divorce in foreign courts and prays for the recognition and enforcement of such divorce in India. In such case section 13 of the Indian Civil Procedure Code, 1908, comes into play for the recognition and enforcement of foreign divorces in India. The section makes a foreign judgment conclusive in India subject to the fulfilment of certain conditions. Even if a foreign decree divorce is given on personal connecting factors of the parties to the matrimonial dispute like domicile, such divorce may still be refused recognition in India by virtue of section 13 of the Indian Civil Procedure Code, 1908. It is a universal truth that municipal law of countries is not the same throughout the world. Comity plays an important role in recognition and enforcing a foreign judgment, but, now in India the principle is not applied mechanically as the divorce matter is dealt strictly with regard to Indian Law. So in this paper there will be deep analysis of Indian case laws relating to recognition and enforcement of foreign divorces and based on this a comparative study will be made with the laws of Canada and England on the same subject to find out whether the Indian law on recognition and Enforcement of foreign judgment are in line with the laws of Canada and England and whether in recent years the Indian courts have evolved some new principles of private international law to deal with limping marriages. At last conclusions will be drawn out from the comparative study and suggestions would be given to make the rules of recognition and enforcement of foreign judgments on divorce more certain.

Keywords: divorce, foreign decree, private international law, recognition and enforcement of foreign judgment

Procedia PDF Downloads 188
2675 A Study on the Influence of Aswan High Dam Reservoir Loading on Earthquake Activity

Authors: Sayed Abdallah Mohamed Dahy

Abstract:

Aswan High Dam Reservoir extends for 500 km along the Nile River; it is a vast reservoir in southern Egypt and northern Sudan. It was created as a result of the construction of the Aswan High Dam between 1958 and 1970; about 95% of the main water resources for Egypt are from it. The purpose of this study is to discuss and understand the effect of the fluctuation of the water level in the reservoir on natural and human-induced environmental like earthquakes in the Aswan area, Egypt. In summary, the correlation between the temporal variations of earthquake activity and water level changes in the Aswan reservoir from 1982 to 2014 are investigated and analyzed. This analysis confirms a weak relation between the fluctuation of the water level and earthquake activity in the area around Aswan reservoir. The result suggests that the seismicity in the area becomes active during a period when the water level is decreasing from the maximum to the minimum. Behavior of the water level in this reservoir characterized by a special manner that is the unloading season extends to July or August, and the loading season starts to reach its maximum in October or November every year. Finally, daily rate of change in the water level did not show any direct relation with the size of the earthquakes, hence, it is not possible to be used as a single tool for prediction.

Keywords: Aswan high dam reservoir, earthquake activity, environmental, Egypt

Procedia PDF Downloads 374
2674 Writing Style in a Thousand Splendid Suns

Authors: Maroof Sakhi

Abstract:

This article studies writing style in A Thousand Splendid Suns. It mainly discusses code-switching and usage of Persian words in the novel. Hosseini mainly writes in English; however, constantly he applies Persian words, phrases and syntax. Code-switching is used for different purposes in A Thousand Splendid Suns. It gives a voice to a character from Afghanistan. It is also used to mark a difference between the American and Afghanistan cultures and languages. Furthermore, representation of Persian language can be interpreted as valorization of the author’s mother tongue. In short, the writing style in A Thousand Splendid Suns represents Hosseini’s identity, culture and linguistic background.

Keywords: code-switching, hybridity, identity, linguistic background, Persian literature

Procedia PDF Downloads 94
2673 Green Housing Projects in Egypt: A Futuristic Approach

Authors: Shimaa Mahmoud Ali Ahmed, Boshra Tawfek El-Shreef

Abstract:

Sustainable development has become an important concern worldwide, and climate change has become a global threat. Some of these affect how we approach environmental issues — and how we should approach them. Environmental aspects have an important impact on the built environment, that’s why knowledge about Green Building and Green Construction become a vital dimension of urban sustainable development to face the challenges of climate change. There are several levels of green buildings, from energy-efficient lighting to 100% eco-friendly construction; the concept of green buildings in Egypt is still a rare occurrence, with the concept being relatively new to the market. There are several projects on the ground that currently employing sustainable and green solutions to some extent, some of them achieve a limit of success and others fail to employ the new solutions. The market and the cost as well, are great factors. From the last century, green architecture and environmental sustainability become a famous trend that all the researchers like to follow. Nowadays, the trend towards green has shifted to housing and real estate projects. While the environmental aspects are the key to achieve green buildings, the economic benefits, and the market forces are considered as big challenges. The paper assumes that some appropriate environmental treatments could be added to the applied prototype of the governmental social housing projects in Egypt to achieve better environmental solutions. The aim of the research is to get housing projects in Egypt closer to the track of sustainable and green buildings, through making a local future proposal to be integrated into the current policies. The proposed model is based upon adding some appropriate, cheap environmental modifications to the prototype of the Ministry of Housing, Infrastructure, and New Urban Communities. The research is based on an analytical, comparative analytical, and inductive approach to study and analyze the housing projects in Egypt and the possibilities of integrating green techniques into it.

Keywords: green buildings, urban sustainability, housing projects, sustainable development goals, Egypt 2030

Procedia PDF Downloads 133
2672 Profiling Risky Code Using Machine Learning

Authors: Zunaira Zaman, David Bohannon

Abstract:

This study explores the application of machine learning (ML) for detecting security vulnerabilities in source code. The research aims to assist organizations with large application portfolios and limited security testing capabilities in prioritizing security activities. ML-based approaches offer benefits such as increased confidence scores, false positives and negatives tuning, and automated feedback. The initial approach using natural language processing techniques to extract features achieved 86% accuracy during the training phase but suffered from overfitting and performed poorly on unseen datasets during testing. To address these issues, the study proposes using the abstract syntax tree (AST) for Java and C++ codebases to capture code semantics and structure and generate path-context representations for each function. The Code2Vec model architecture is used to learn distributed representations of source code snippets for training a machine-learning classifier for vulnerability prediction. The study evaluates the performance of the proposed methodology using two datasets and compares the results with existing approaches. The Devign dataset yielded 60% accuracy in predicting vulnerable code snippets and helped resist overfitting, while the Juliet Test Suite predicted specific vulnerabilities such as OS-Command Injection, Cryptographic, and Cross-Site Scripting vulnerabilities. The Code2Vec model achieved 75% accuracy and a 98% recall rate in predicting OS-Command Injection vulnerabilities. The study concludes that even partial AST representations of source code can be useful for vulnerability prediction. The approach has the potential for automated intelligent analysis of source code, including vulnerability prediction on unseen source code. State-of-the-art models using natural language processing techniques and CNN models with ensemble modelling techniques did not generalize well on unseen data and faced overfitting issues. However, predicting vulnerabilities in source code using machine learning poses challenges such as high dimensionality and complexity of source code, imbalanced datasets, and identifying specific types of vulnerabilities. Future work will address these challenges and expand the scope of the research.

Keywords: code embeddings, neural networks, natural language processing, OS command injection, software security, code properties

Procedia PDF Downloads 103
2671 Translation Methods Applied While Dealing With System-Bound Terms (Polish-English Translation)

Authors: Anna Kizinska

Abstract:

The research aims at discussing Polish and British incongruent terms that refer to company law. The Polish terms under analysis appear in the Polish Code of Commercial Partnerships and Companies and constitute legal terms or factual terms. The English equivalents of each Polish term under research appear in two Polish Code of Commercial Partnerships and Companies translations into English. The theoretical part of the paper includes the presentation of the definitions of a system-bound term and incongruity of terms. The aim of the analysis is to check if the classification of translation methods used in civil law terms translation comprehends the translation methods applied while translating company law terms into English. The translation procedures are defined according to Newmark. The stages of the research include 1) presentation of a definition of a Polish term, 2) enumerating the so-far published English equivalents of a given Polish term and comparing their definitions (as long as they appear in English law dictionaries ) with the definition of a given Polish term under analysis, 3) checking whether an English equivalent appears or not in, among others, the sources of the British law (legislation.gov.uk database) , 4) identifying the translation method that was applied while forming a given English equivalent.

Keywords: translation, legal terms, equivalence, company law, incongruency

Procedia PDF Downloads 79
2670 Reliability-Based Codified Design of Concrete Structures

Authors: Naser Alenezi, Ibrahim Alsakkaf, Osama Eid

Abstract:

The main objective of this study is to develop an independent reliability based code for reinforced concrete (R/C) structural components and elements solely for the State of Kuwait and its neighboring countries. The proposed code will take into account the harsh Kuwait’s harsh environment, loading conditions and material strengths. The method for developing such a code is based on structural reliability theory that takes into accounts the specific geographical and the various prescribed societal environment of the Kuwait region. These methods were developed according to the following four components: (1) loads, (2) structural strength, (3) reliability analysis, and (4) achieving target reliability levels (reliability index ’s ). The final product from this study will be a design code for R/C structural elements that include beams and columns, and some other structural members. This reliability-based LRFD design code will provide appropriate, easy, fast, and economical approach for designing R/C structural elements such as, beams and columns, for both houses and bridges, and other concrete structures. In addition, this reliability-based codified design of R/C beams, columns, and, possibly, concrete slabs will improve the design and serviceability of R/C bridge and building systems in Kuwait and neighboring GCC countries. Also, it has the potential to reduce the cost of new concrete structures, as fewer materials are used with more design efficiency.

Keywords: live laod, design, evaluation, structural building

Procedia PDF Downloads 343