Search results for: debtor protection laws
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3084

Search results for: debtor protection laws

1614 Investigation of the Relationship between Government Expenditure and Country’s Economic Development in the Context of Sustainable Development

Authors: Lina Sinevičienė

Abstract:

Arising problems of countries’ public finances, social and demographic changes motivate scientific and policy debates on public spending size, structure and efficiency in order to meet the changing needs of society and business. The concept of sustainable development poses new challenges for scientists and policy-makers in the field of public finance. This paper focuses on the investigation of the relationship between government expenditure and country’s economic development in the context of sustainable development. Empirical analysis focuses on the data of the European Union (except Croatia and Luxemburg) countries. The study covers 2003 – 2012 years, using annual cross-sectional data. Summarizing the research results, it can be stated that governments should pay more attention to the needs that ensure sustainable development in the long-run when formulating public expenditure policy, particularly in the field of environment protection.

Keywords: economic development, economic growth, government expenditure, sustainable development

Procedia PDF Downloads 297
1613 Analysis of Tools for Revitalization and Rehabilitation of Brownfields

Authors: Jiří Kugl

Abstract:

Typology and specific opportunities of brownfield revitalization are already largely described. Challenges and opportunities that brownfields represent have been adequately studied and presented, as well as specific ways in which these areas can be used or how they are used abroad. In other words, the questions why (revitalize brownfields) and what (we should do with them) are satisfactorily answered, but the question how (we can work with them) is not. This work will focus on answering this question, which will deal with tools that enable the revitalization and rehabilitation projects in the area. Tools can be divided, for example in terms of spatial planning and urban design, from an environmental perspective, from the perspective of cultural heritage protection and from the perspective of investment opportunities. The result is that the issue of brownfields is handled by numerous institutions and instruments. The aim of this paper is to identify, classify and analyze these instruments. Paper will study instruments from other countries with long-term experience with this issue (eg. France, Great Britain, USA, Germany, Denmark, Czech Republic) and analyse their contribution and the feasibility of their implementation in other countries.

Keywords: brownfields, revitalization, rehabilitation, tools, urban planning

Procedia PDF Downloads 242
1612 Green Technologies and Sustainability in the Care and Maintenance of Protective Textiles

Authors: R. Nayak, T. Panwar, R. Padhye

Abstract:

Protective textiles get soiled, stained and even worn during their use, which may not be usable after a certain period due to the loss of protective performance. They need regular cleaning and maintenance, which helps to extend the durability of the clothing, retains their useful properties and ensures that fresh clothing is ready to wear when needed. Generally, the cleaning processes used for various protective clothing include dry-cleaning (using solvents) or wet cleaning (using water). These cleaning processes can alter the fabric surface properties, dimensions, and physical, mechanical and performance properties. The technology of laundering and dry-cleaning has undergone several changes. Sustainable methods and products are available for faster, safer and improved cleaning of protective textiles. We performed a comprehensive and systematic review of green technologies and eco-friendly products for sustainable cleaning of protective textiles. Special emphasis is given on the care and maintenance procedures of protective textiles for protection from fire, bullets, chemical and other types of protective clothing.

Keywords: Sustainable cleaning, protective textiles, ecofriendly cleaning, ozone laundering, ultrasonic cleaning

Procedia PDF Downloads 240
1611 Environmental Sustainability Practice in Resort Hotels: Case of Resort Hotels in Bishoftu, Ethiopia

Authors: Mohammed Aman Kassim

Abstract:

This study aims to investigate attitudes of resort hotel managers toward environmental sustainability practice in Bishoftu Town, Ethiopia. Six resorts were selected out of twelve by using systematic sampling method and totally fifty-six managers were taken for the survey. The findings revealed that more than 99% of hotel managers possess positive attitudes but low level of performance. Owners’ attitudes and personal beliefs, government regulation and incentives for good achievement were the most important factors that motivate or influence the adoptions of environmental sustainability practices. Hotel managers’ environmental attitudes more significantly influenced by their social demographics, such as level of education and age. Therefore, in order to increase hotels commitment to become more sustainable, some measurement should be implemented, such as vigorous support of the government, cooperation with hotel associations, continuous behaviors of hotel environmental protection, and local community participation in environmental practice.

Keywords: environmental attitude, environmental sustainability, hotel managers, resorts

Procedia PDF Downloads 245
1610 Study on Science and Technology Resources Coordinated Development and Innovation of Beijing-Tianjin-Hebei Region

Authors: Hong Zhang, Runlian Miao, Min Zhang

Abstract:

Coordinated development of Beijing-Tianjin-Hebei region is of great importance and has been emphasized by the government in recent years. Beijing-Tianjin-Hebei region accumulates a large part of S&T resources of the whole country and boasts the most influential achievements. In order to improve innovation capability of the region, universities, research institutions and enterprises from Beijing, Tianjin and Hebei have cooperated in many forms, but technological innovation is not so satisfactory due to unbalanced allocation, poor sharing and low utilization efficiency of S&T resources. Therefore, it’s very necessary to promote resources sharing, optimize their overall layout, and enhance their innovation performance, which can further deepen coordination development of the region. This study focuses on S&T resources with the methods of documents research plus field investigation and qualitative research combing plus quantitive research. It starts from the macro background of promoting coordinated development of Beijing-Tianjin-Hebei region and arrives at improving regional innovation capability. Firstly, the author makes a literature review on coordinated development of Beijing-Tianjin-Hebei region and summarizes that coordinated development has been carried forward in the major fields which lay foundation for regional innovation; secondly, analyzes current S&T resources distribution and coordinated innovation by taking key industries as the examples; based on analysis of the status quo of resources sharing and innovation in the region, the author points out problems and obstacles that holdbacks coordinated innovation of the region and at last raises some suggestions to resources sharing and regional innovation. It reaches the conclusion that an efficient management mechanism, market laws, favorable environment, model innovation and incentive measures can help to accelerate resources sharing and regional innovation in the region.

Keywords: Beijing-Tianjin-Hebei region, coordinated development, innovation, S&T resources

Procedia PDF Downloads 308
1609 Towards Law Data Labelling Using Topic Modelling

Authors: Daniel Pinheiro Da Silva Junior, Aline Paes, Daniel De Oliveira, Christiano Lacerda Ghuerren, Marcio Duran

Abstract:

The Courts of Accounts are institutions responsible for overseeing and point out irregularities of Public Administration expenses. They have a high demand for processes to be analyzed, whose decisions must be grounded on severity laws. Despite the existing large amount of processes, there are several cases reporting similar subjects. Thus, previous decisions on already analyzed processes can be a precedent for current processes that refer to similar topics. Identifying similar topics is an open, yet essential task for identifying similarities between several processes. Since the actual amount of topics is considerably large, it is tedious and error-prone to identify topics using a pure manual approach. This paper presents a tool based on Machine Learning and Natural Language Processing to assists in building a labeled dataset. The tool relies on Topic Modelling with Latent Dirichlet Allocation to find the topics underlying a document followed by Jensen Shannon distance metric to generate a probability of similarity between documents pairs. Furthermore, in a case study with a corpus of decisions of the Rio de Janeiro State Court of Accounts, it was noted that data pre-processing plays an essential role in modeling relevant topics. Also, the combination of topic modeling and a calculated distance metric over document represented among generated topics has been proved useful in helping to construct a labeled base of similar and non-similar document pairs.

Keywords: courts of accounts, data labelling, document similarity, topic modeling

Procedia PDF Downloads 182
1608 Eco-Infrastructures: A Multidimensional System Approach for Urban Ecology

Authors: T. A. Mona M. Salem, Ali F. Bakr

Abstract:

Given the potential devastation associated with future climate change related disasters, it is vital to change the way we build and manage our cities, through new strategies to reconfigure them and their infrastructures in ways that help secure their reproduction. This leads to a kaleidoscopic view of the city that recognizes the interrelationships of energy, water, transportation, and solid waste. These interrelationships apply across sectors and with respect to the built form of the city. The paper aims at a long-term climate resilience of cities and their critical infrastructures, and sets out an argument for including an eco-infrastructure-based approach in strategies to address climate change. As these ecosystems have a critical role to play in building resilience and reducing vulnerabilities in cities, communities and economies at risk, the enhanced protection and management of ecosystems, biological resources and habitats can mitigate impacts and contribute to solutions as nations and cities strive to adapt to climate change.

Keywords: ecology, ecosystem, infrastructure, climate change, urban

Procedia PDF Downloads 310
1607 Study on Corporate Social Responsibility in Ateneo

Authors: Katherine Denise Queri

Abstract:

Around the world, there are many corporations and other business organizations who promote the welfare of the society. They are found inside the communities where they naturally perform work. Their aim is to maximize their respective returns on investment while measuring the impact of their activities on the environment. The Senate in the Philippines formed a bill that seeks to foster sustainable economic and environment development and environment protection, among other things, by institutionalizing the corporate responsibility of corporations, whether domestic and foreign, partnership and other establishment performing business in the country. Under the Senate Bill 1239 or an act institutionalizing corporate social responsibility, providing incentives therefor, and for other purposes, all business organizations are mandated to consider the interest of society by taking responsibility for the impact of their activities on customers, employees, shareholders communities and environment. In return, businesses shall comply with the mandate of this proposed measure shall be entitled to full deductions of the expenses incurred in connection thereto.

Keywords: ateneo, corporate social responsibility (CSR), industrial relations, marketing, up

Procedia PDF Downloads 375
1606 Numerical Modeling of Waves and Currents by Using a Hydro-Sedimentary Model

Authors: Mustapha Kamel Mihoubi, Hocine Dahmani

Abstract:

Over recent years much progress has been achieved in the fields of numerical modeling shoreline processes: waves, currents, waves and current. However, there are still some problems in the existing models to link the on the first, the hydrodynamics of waves and currents and secondly, the sediment transport processes and due to the variability in time, space and interaction and the simultaneous action of wave-current near the shore. This paper is the establishment of a numerical modeling to forecast the sediment transport from development scenarios of harbor structure. It is established on the basis of a numerical simulation of a water-sediment model via a 2D model using a set of codes calculation MIKE 21-DHI software. This is to examine the effect of the sediment transport drivers following the dominant incident wave in the direction to pass input harbor work under different variants planning studies to find the technical and economic limitations to the sediment transport and protection of the harbor structure optimum solution.

Keywords: swell, current, radiation, stress, mesh, mike21, sediment

Procedia PDF Downloads 469
1605 The Domino Principle of Dobbs v Jackson Women’s Health Organization: The Gays Are Next!

Authors: Alan Berman, Mark Brady

Abstract:

The phenomenon of homophobia and transphobia in the United States detrimentally impacts the health, wellbeing, and dignity of school students who identify with the LGBTQ+ community. These negative impacts also compromise the participation of LGBTQ+ individuals in the wider life of educational domains and endanger the potential economic, social and cultural contribution this community can make to American society. The recent 6:3 majority decision of the US Supreme Court in Dobbs v Jackson Women’s Health Organization expressly overruled the 1973 decision in Roe v Wade and the 1992 Planned Parenthood v Casey decision. This study will canvass the bases upon which the court in Dobbs overruled longstanding precedent established in Roe and Casey. It will examine the potential implications for the LGBTQ community of the result in Dobbs. The potential far-reaching consequences of this case are foreshadowed in a concurring opinion by Justice Clarence Thomas, suggesting the Court should revisit all substantive due process cases. This includes notably the Lawrence v Texas case (invalidating sodomy laws criminalizing same-sex relations) and the Obergefellcase (upholding same-sex marriage). Finally, the study will examine the likely impact of the uncertainty brought about by the decision in Doddsfor LGBTQ students in US educational institutions. The actions of several states post-Dobbs, reflects and exacerbates the problems facing LGBTQ+ students and uncovers and highlights societal homophobia and transphobia.

Keywords: human rights, LGBT rights, right to personal dignity and autonomy, substantive due process rights

Procedia PDF Downloads 105
1604 Perpetrators of Ableist Sexual Violence: Understanding Who They Are and Why They Target People with Intellectual Disabilities in Australia

Authors: Michael Rahme

Abstract:

Over the past decade, there is an overwhelming consensus spanning across academia, government commissions, and civil societies that concede that individuals with disabilities (IWDs), particularly those with intellectual differences, are a demographic most ‘vulnerable’ to experiences of sexual violence. From this global accord, numerous policies have sprouted in the protection of this ‘pregnable’ sector of society, primarily framed around liberal obligations of stewardship over the ‘defenceless.’ As such, these initiatives mainly target post-incident or victim-based factors of sexual violence, which is apparent in proposals for more inclusive sexual education and accessible contact lines for IWDs. Yet despite the necessity of these initiatives, sexual incidents among this demographic persist and, in nations such as Australia, continue to rise. Culture of Violence theory reveals that such discrepancies in theory and practice stem from societal structures that frame individuals as ‘vulnerable’, ‘impregnable’, or ‘defenceless’ because of their disability, thus propagating their own likelihood of abuse. These structures, as embodied by the Australian experience, allow these sexual violences to endure through cultural ideologies that place the IWDs ‘failures’ at fault while sidelining the institutions that permit this abuse. Such is representative of the initiatives of preventative organizations like People with Disabilities Australia, which have singularly strengthened victim protection networks, despite abuse continuing to rise dramatically among individuals with intellectual disabilities alone. Yet regardless of this rise, screenings of families and workers remain inadequate and practically untouched, a reflection of a tremendous societal warp in understanding surrounding the lived experiences of IWDs. This theory is also representative of broader literature, where the study of the perpetrators of disability rights, particularly sexual rights, is almost unapparent in a field that is already seldom studied. Therefore, placing power on the abuser via stripping that of the victims. As such, the Culture of Violence theory (CVT) sheds light on the institutions that allow these perpetrators to prosper. This paper, taking a CVT approach, aims to dissipate this discrepancy in the Australian experience by way of a qualitative analysis of all available court proceedings and tribunals between 2020-2022. Through an analysis of the perpetrator, their relation to the IWD, and the motives for their actions granted by court and tribunal transcripts and the psychological, and behavioural reports, among other material, that have been presented and consulted during these proceedings. All of which would be made available under the 1982 Freedom of Information Act. The findings from this study, through the incorporation of CVT, determine the institutions in which these abusers function and the ideologies which motivate such behaviour; while being conscious of the issue of re-traumatization and language barriers of the abusees. Henceforth, this study aims to be a potential policy guide on strengthening support institutions that provide IWDs with their basic rights. In turn, undermining sexual violence among individuals with intellectual disabilities at its roots.

Keywords: criminal profiling, intellectual disabilities, prevention, sexual violence

Procedia PDF Downloads 94
1603 The Convention Refugee Definition-from Universal to Regional: A Systematic Review

Authors: Wen Jiayuan

Abstract:

This article traces the broadening of the refugee definition from the early 1970s onwards. It first discusses Article 1A(1), the core universal legal definition of ‘refugee’ provided by the 1951 Geneva Convention. It then focuses on Article 1A(2), read together with the 1967 Protocol, which without time or geographical limits, offers a general definition of the refugee as including any person who is outside their country or origin and unable or unwilling to return there or to avail themselves of its protection, owing to a well-founded fear of persecution for reasons of race, religion, nationality, social group or political opinion. It then shifts to the contemporary alternative refugee definitions adopted in regional areas, namely Africa, Latin America, and Europe. By looking deeply into the 1969 OAU Convention, the 1984 Cartagena Declaration, and ECtHR, the assertation is that while the appearance of new definitions may lead to a more responsive international environment, it may also undermine the consistency of the international refugee regime.

Keywords: refugee definition, 1951 Geneva Convention, 1969 OAU Convention, 1984 Cartagena Declaration

Procedia PDF Downloads 134
1602 Generating a Functional Grammar for Architectural Design from Structural Hierarchy in Combination of Square and Equal Triangle

Authors: Sanaz Ahmadzadeh Siyahrood, Arghavan Ebrahimi, Mohammadjavad Mahdavinejad

Abstract:

Islamic culture was accountable for a plethora of development in astronomy and science in the medieval term, and in geometry likewise. Geometric patterns are reputable in a considerable number of cultures, but in the Islamic culture the patterns have specific features that connect the Islamic faith to mathematics. In Islamic art, three fundamental shapes are generated from the circle shape: triangle, square and hexagon. Originating from their quiddity, each of these geometric shapes has its own specific structure. Even though the geometric patterns were generated from such simple forms as the circle and the square, they can be combined, duplicated, interlaced, and arranged in intricate combinations. So in order to explain geometrical interaction principles between square and equal triangle, in the first definition step, all types of their linear forces individually and in the second step, between them, would be illustrated. In this analysis, some angles will be created from intersection of their directions. All angles are categorized to some groups and the mathematical expressions among them are analyzed. Since the most geometric patterns in Islamic art and architecture are based on the repetition of a single motif, the evaluation results which are obtained from a small portion, is attributable to a large-scale domain while the development of infinitely repeating patterns can represent the unchanging laws. Geometric ornamentation in Islamic art offers the possibility of infinite growth and can accommodate the incorporation of other types of architectural layout as well, so the logic and mathematical relationships which have been obtained from this analysis are applicable in designing some architecture layers and developing the plan design.

Keywords: angle, equal triangle, square, structural hierarchy

Procedia PDF Downloads 197
1601 My Dress, My Body and My Choice Politics in Kenya

Authors: Emmy Kipsoi

Abstract:

Kenya legalized the Sexual offence bill (2001), after vigorous campaigning and lobbying by feminist both in and out of parliament to ensure that the bill passed with minimal amendments. The sexual offense act provides for a good description on what constitutes sexual offences and the penalties that follow. It is from this context that the paper explores and interrogated the lived experiences of women living and working in Kenyan urban towns, who had experienced some form of sexual harassment. The study employed phenomenology to interpret the experiences of twenty (20) women in an urban town between the ages of 20 to 65 years women who had received at least some formal education and where engaged in some formal form of employment. The findings indicated that various forms of sexual harassment were experienced in the Kenyan town. Secondly, the knowledge about the contents of the bill wanting most of the women interviews were not aware of the protection accorded by law. The number of reported cases of sexual harassment shed light on the isolation, frustration and fear that women live despite a progressive law in print

Keywords: Kenya, phenomenology, sexual harassment, women

Procedia PDF Downloads 310
1600 Times Series Analysis of Depositing in Industrial Design in Brazil between 1996 and 2013

Authors: Jonas Pedro Fabris, Alberth Almeida Amorim Souza, Maria Emilia Camargo, Suzana Leitão Russo

Abstract:

With the law Nº. 9279, of May 14, 1996, the Brazilian government regulates rights and obligations relating to industrial property considering the economic development of the country as granting patents, trademark registration, registration of industrial designs and other forms of protection copyright. In this study, we show the application of the methodology of Box and Jenkins in the series of deposits of industrial design at the National Institute of Industrial Property for the period from May 1996 to April 2013. First, a graphical analysis of the data was done by observing the behavior of the data and the autocorrelation function. The best model found, based on the analysis of charts and statistical tests suggested by Box and Jenkins methodology, it was possible to determine the model number for the deposit of industrial design, SARIMA (2,1,0)(2,0,0), with an equal to 9.88% MAPE.

Keywords: ARIMA models, autocorrelation, Box and Jenkins Models, industrial design, MAPE, time series

Procedia PDF Downloads 546
1599 Green Prossesing of PS/Nanoparticle Fibers and Studying Morphology and Properties

Authors: M. Kheirandish, S. Borhani

Abstract:

In this experiment Polystyrene/Zinc-oxide (PS/ZnO) nanocomposite fibers were produced by electrospinning technique using limonene as a green solvent. First, the morphology of electrospun pure polystyrene (PS) and PS/ZnO nanocomposite fibers investigated by SEM. Results showed the PS fiber diameter decreased by increasing concentration of Zinc Oxide nanoparticles (ZnO NPs). Thermo Gravimetric Analysis (TGA) results showed thermal stability of nanocomposites increased by increasing ZnO NPs in PS electrospun fibers. Considering Differential Scanning Calorimeter (DSC) thermograms for electrospun PS fibers indicated that introduction of ZnO NPs into fibers affects the glass transition temperature (Tg) by reducing it. Also, UV protection properties of nanocomposite fibers were increased by increasing ZnO concentration. Evaluating the effect of metal oxide NPs amount on mechanical properties of electrospun layer showed that tensile strength and elasticity modulus of the electrospun layer of PS increased by addition of ZnO NPs. X-ray diffraction (XRD) pattern of nanopcomposite fibers confirmed the presence of NPs in the samples.

Keywords: electrospininng, nanoparticle, polystyrene, ZnO

Procedia PDF Downloads 241
1598 Pollution Challenges in the Akaki Catchment, Upper Awash Basin, Ethiopia: Potential Health Implications for Vegetables

Authors: Minbale Aschale, Bitew K. Dessie, Endaweke Assegide, Yosef Abebe, Tena Alamirew, Claire L. Walsh, Gete Zeleke

Abstract:

The upper Awash Basin faces pollution challenges due to urbanization, population growth, and expanding industries. It receives various pollutants from its catchments. The study aimed to assess the impact of wastewater irrigation on vegetables and inform stakeholders about pollution challenges and consequences. Eighty-two composite samples of matured vegetables were randomly collected from twenty-one agricultural farm sites. These samples were analyzed for potentially toxic elements, including Cd, Pb, Cr, Hg, As, Ni, Sr, B, Co, Cu, Mn, Fe, Zn, and Se. The results indicated significant variations in concentrations across different sites, with localized contributions from various contaminants. Cr, Cd, and Pb concentrations in most vegetables exceeded recommended levels. Pollution levels varied with metals and vegetable types. Different vegetables contribute differently to health risks. The relative contributions of Ethiopian kale, cabbage, red beet, lettuce, Swiss chard, Gurage cabbage, tomato, zucchini, carrot, onion, watermelon, and potato to the aggregated risk were 12.69%, 12.25%, 11.83%, 11.20%, 10.21%, 9.91%, 8.49%, 5.66%, 3.96%, 3.35%, 3.10%, and 2.72%, respectively. Comparison with permissible standards revealed inadequate environmental management by relevant regulatory bodies and industries. Despite good laws and standards at the federal and regional levels, they are ineffectively implemented or enforced to prevent environmental pollution. Mitigation measures are urgently recommended to address the potential health implications of toxic substances.

Keywords: pollution, upper Awash Basin, health risk, Ethiopia

Procedia PDF Downloads 54
1597 Analyzing Essential Patents of Mobile Communication Based on Patent Portfolio: Case Study of Long Term Evolution-Advanced

Authors: Kujhin Jeong, Sungjoo Lee

Abstract:

In the past, cross-licensing was made up of various application or commercial patents. Today, cross-licensing is restricted to essential patents, which has emphasized their importance significantly. Literature has shown that patent portfolio provides information for patent protection or strategy decision-making, but little empirical research has found strategic tool of essential patents. This paper will highlight four types of essential patent portfolio and analysis about each strategy in the field of LTE-A. Specifically we collected essential patents of mobile communication company through ETSI (European Telecommunication Standards Institute) and build-up portfolio activity, concentration, diversity, and quality. Using these portfolios, we can understand each company’s strategic character about the technology of LTE-A and comparison analysis of financial results. Essential patents portfolio displays a mobile communication company’s strategy and its strategy’s impact on the performance of a company.

Keywords: essential patent, portfolio, patent portfolio, essential patent portfolio

Procedia PDF Downloads 396
1596 A Practical Protection Method for Parallel Transmission-Lines Based on the Fault Travelling-Waves

Authors: Mohammad Reza Ebrahimi

Abstract:

In new restructured power systems, swift fault detection is very important. The parallel transmission-lines are vastly used in this kind of power systems because of high amount of energy transferring. In this paper, a method based on the comparison of two schemes, i.e., i) maximum magnitude of travelling-wave (TW) energy ii) the instants of maximum energy occurrence at the circuits of parallel transmission-line is proposed. Using the travelling-wave of fault in order to faulted line identification this method has noticeable operation time. Moreover, the algorithm can cover for identification of faults as external or internal faults. For an internal fault, the exact location of the fault can be estimated confidently. A lot of simulations have been done with PSCAD/EMTDC to verify the performance of the proposed algorithm.

Keywords: travelling-wave, maximum energy, parallel transmission-line, fault location

Procedia PDF Downloads 187
1595 National Defense and Armed Forces Development in the Member States of the Visegrad Group

Authors: E. Hronyecz

Abstract:

Guaranteeing the independence of the V4 Member States, the protection of their national values and their citizens, and the security of the Central and Eastern European region requires the development of military capabilities in terms of the capabilities of nations. As a result, European countries have begun developing capabilities and forces, within which nations are seeking to strengthen the capabilities of their armies and make their interoperability more effective. One aspect of this is the upgrading of military equipment, personnel equipment, and other human resources. Based on the author's preliminary researches - analyzing the scientific literature, the relevant statistical data and conducting of professional consultations with the experts of the research field – it can clearly claimed for all four states of Visegrad Group that a change of direction in the field of defense has been noticeable since the second half of the last decade. Collective defense came to the forefront again; the military training, professionalism, and radical modernization of technical equipment becoming crucial.

Keywords: armed forces, cooperation, development, Visegrad Group

Procedia PDF Downloads 135
1594 Effect of Solid Waste on the Sustainability of the Water Resource Quality in the Gbarain Catchment of the Niger Delta Region of Nigeria

Authors: Davidson E. Egirani, Nanfe R. Poyi, Napoleon Wessey

Abstract:

This paper would report on the effect of solid waste on water resource quality in the Gbarain catchment of the Niger Delta Region of Nigeria. The Gbarain catchment presently hosts two waste-dump sites located along the flanks of a seasonal flow stream and perennially waterlogged terrain. The anthropogenic activity has significantly affected the quality of surface and groundwater in the Gbarain catchment. These wastes have made the water resource environment toxic leading to the poisoning of aquatic life. The contaminated water resources could lead to serious environmental and human health challenges such as low agricultural yields to loss of vital human organs. The contamination is via geological processes such as seepage and direct infiltration of contaminants into watercourses. The results obtained from field and experimental investigations followed by modeling, and graphical interpretation indicate heavy metal load and fecal pollution in some of the groundwater. The metal load, Escherichia coli, and total coliforms counts exceed the international and regional recommended limits. The contaminate values include Lead (> 0.01 mg/L), Mercury (> 0.006 mg/L), Manganese (> 0.4 mg/L and Escherichia coli (> 0 per 100ml) of the samples. Land use planning, enactment, and implementation of environmental laws are necessary for this region, for effective surface water and groundwater resource management.

Keywords: aquatic life, solid waste, environmental health, human health, waste-dump site, water-resource environment

Procedia PDF Downloads 145
1593 The Nexus between Counter Terrorism and Human Rights with a Perspective on Cyber Terrorism

Authors: Allan Munyao Mukuki

Abstract:

The nexus between terrorism and human rights has become a big challenge in the fight against terrorism globally. This is hinged on the fact that terrorism and human rights are interrelated to the extent that, when the former starts, the latter is violated. This direct linkage was recognised in the Vienna Declaration and Programme of Action as adopted by the World Conference on Human Rights in Vienna on 25 June 1993 which agreed that acts of terrorism in all its forms and manifestations are aimed at the destruction of human rights. Hence, terrorism constitutes an assault on our most basic human rights. To this end, the first part of this paper will focus on the nexus between terrorism and human rights and endeavors to draw a co-relation between these two concepts. The second part thereafter will analyse the emerging concept of cyber-terrorism and how it takes place. Further, an analysis of cyber counter-terrorism balanced as against human rights will also be undertaken. This will be done through the analysis of the concept of ‘securitisation’ of human rights as well as the need to create a balance between counterterrorism efforts as against the protection of human rights at all costs. The paper will then concludes with recommendations on how to balance counter-terrorism and human rights in the modern age.

Keywords: balance, counter-terrorism, cyber-terrorism, human rights, security, violation

Procedia PDF Downloads 404
1592 Management of Intellectual Property Rights: Strategic Patenting

Authors: Waheed Oseni

Abstract:

This article reviews emergent global trends in intellectual property protection and identifies patenting as a strategic initiative. Recent developments in software and method of doing business patenting are fast transforming the e‐business landscape. The article discusses the emergent global regulatory framework concerning intellectual property rights and the strategic value of patenting. Important features of a corporate patenting portfolio are described. Superficially, the e‐commerce landscape appears to be dominated by dotcom start-ups or the “dotcomization” of existing brick and mortar companies. But, in reality, at its very bedrock is intellectual property (IP). In this connection, the recent avalanche of patenting of software and method‐of‐doing‐business (MDB) in the USA is a very significant development with regard to rules governing IP rights and, therefore, e‐commerce. Together with the World Trade Organization’s (WTO) IP rules, there is an emerging global regulatory framework for IP rights, an understanding of which is necessary for designing effective e‐commerce strategies.

Keywords: intellectual property, patents, methods, computer software

Procedia PDF Downloads 527
1591 Human Security Providers in Fragile State under Asymmetric War Conditions

Authors: Luna Shamieh

Abstract:

Various players are part of the game in an asymmetric war, all making efforts to provide human security to their own adherents. Although a fragile state is not able to provide sufficient and comprehensive services, it still provides special services and security to the elite; the insurgents as well provide services and security to their associates. The humanitarian organisations, on the other hand, provide some fundamental elements of human security, but only in the regions, they are able to access when possible (if possible). The counterinsurgents (security forces of the state and intervention forces) operate within a narrow band defined by the vision of the responsibility to protect and the perspective of the resolution of the conflict through combat; hence, the possibility to provide human security is shaken at this end. This article examines how each player provides human security from the perspective of freedom from want in order to secure basic and strategic needs, freedom from fear through providing protection against all kinds of violence, and the freedom to live in dignity. It identifies a vicious cycle caused by the intervention of the different players causing a centrifugal force that may lead to disintegration of the nation under war.

Keywords: asymmetric war, counterinsurgency, fragile state, human security, insurgency

Procedia PDF Downloads 336
1590 Assessment of Compost Usage Quality and Quality for Agricultural Use: A Case Study of Hebron District, Palestine

Authors: Mohammed A. A. Sarhan, Issam A. Al-Khatib

Abstract:

Complying with the technical specifications of compost production is of high importance not only for environmental protection but also for increasing the productivity and promotion of compost use by farmers in agriculture. This study focuses on the compost quality of the Palestinian market and farmers’ attitudes toward agricultural use of compost. The quality is assessed through selection of 20 compost samples of different suppliers and producers and lab testing for quality parameters, while the farmers’ attitudes to compost use for agriculture are evaluated through survey questionnaire of 321 farmers in the Hebron area. The results showed that the compost in the Palestinian markets is of medium quality due to partial or non-compliance with the quality standards and guidelines. The Palestinian farmers showed a positive attitude since 91.2% of them have the desire to use compost in agriculture. The results also showed that knowledge of difference between compost and chemical fertilizers, perception of compost benefits and previously experiencing problems in compost use, are significant factors affecting the farmers’ attitude toward the use of compost as an organic fertilizer.

Keywords: attitude, compost, compost quality, organic fertilizer, manure

Procedia PDF Downloads 168
1589 A Review Paper on Data Security in Precision Agriculture Using Internet of Things

Authors: Tonderai Muchenje, Xolani Mkhwanazi

Abstract:

Precision agriculture uses a number of technologies, devices, protocols, and computing paradigms to optimize agricultural processes. Big data, artificial intelligence, cloud computing, and edge computing are all used to handle the huge amounts of data generated by precision agriculture. However, precision agriculture is still emerging and has a low level of security features. Furthermore, future solutions will demand data availability and accuracy as key points to help farmers, and security is important to build robust and efficient systems. Since precision agriculture comprises a wide variety and quantity of resources, security addresses issues such as compatibility, constrained resources, and massive data. Moreover, conventional protection schemes used in the traditional internet may not be useful for agricultural systems, creating extra demands and opportunities. Therefore, this paper aims at reviewing state of the art of precision agriculture security, particularly in open field agriculture, discussing its architecture, describing security issues, and presenting the major challenges and future directions.

Keywords: precision agriculture, security, IoT, EIDE

Procedia PDF Downloads 92
1588 Official Secrecy and Confidentiality in Tax Administration and Its Impact on Right to Access Information: Nigerian Perspectives

Authors: Kareem Adedokun

Abstract:

Official secrecy is one of the colonial vestiges which upholds non – disclosure of essential information for public consumption. Information, though an indispensable tool in tax administration, is not to be divulged by any person in an official duty of the revenue agency. As a matter o fact, the Federal Inland Revenue Service (Establishment) Act, 2007 emphasizes secrecy and confidentiality in dealing with tax payer’s document, information, returns and assessment in a manner reminiscent of protecting tax payer’s privacy in all situations. It is so serious that any violation attracts criminal sanction. However, Nigeria, being a democratic and egalitarian state recently enacted Freedom of Information Act which heralded in openness in governance and takes away the confidentialities associated with official secrets Laws. Official secrecy no doubts contradicts the philosophy of freedom of information but maintaining a proper balance between protected rights of tax payers and public interest which revenue agency upholds is an uphill task. Adopting the Doctrinal method, therefore, the author of this paper probes into the real nature of the relationship between taxpayers and Revenue Agencies. It also interfaces official secrecy with the doctrine of Freedom of Information and consequently queries the retention of non – disclosure clause under Federal Inland Revenue Service (Establishment) Act (FIRSEA) 2007. The paper finds among others that non – disclosure provision in tax statutes particularly as provided for in FIRSEA is not absolute; so also is the constitutional rights and freedom of information and unless the non – disclosure clause finds justification under any recognized exemption provided under the Freedom of Information Act, its retention is antithesis to democratic ethos and beliefs as it may hinder public interest and public order.

Keywords: confidentiality, information, official secrecy, tax administration

Procedia PDF Downloads 344
1587 The Effect of Work Site Dangers on the Management of Construction Projects in Syria

Authors: Mohammed Aljoma, Eblal Zakzok

Abstract:

Safety is a science that seeks to protect and avoid humans from risks in any field and prevent losses in properties and lives as much as possible. On the other hand, occupational safety goals aim to protect workers from risks which can occur during work execution. The main purpose of occupational safety is to ultimately protect people, properties and the environment by reducing accidents and injuries that may cause losses and damages. To achieve this goal, we must remove the direct and indirect reasons which cause accidents and injuries; some of the reasons of accidents are the unsafe cases and inept behavior or both of them. This research focuses on the manner of providing instant protection from the very first beginning to people, properties and the environment by: -Inserting safety demands in the planning and designing works by identifying risk levels in every task of the project, -Using a new risk managing system or modifying or changing a previously-used one.

Keywords: planning, scheduling, risk management, project duration, site safety

Procedia PDF Downloads 299
1586 Challenge Response-Based Authentication for a Mobile Voting System

Authors: Tohari Ahmad, Hudan Studiawan, Iwang Aryadinata, Royyana M. Ijtihadie, Waskitho Wibisono

Abstract:

A manual voting system has been implemented worldwide. It has some weaknesses which may decrease the legitimacy of the voting result. An electronic voting system is introduced to minimize this weakness. It has been able to provide a better result, in terms of the total time taken in the voting process and accuracy. Nevertheless, people may be reluctant to go to the polling location because of some reasons, such as distance and time. In order to solve this problem, mobile voting is implemented by utilizing mobile devices. There are many mobile voting architectures available. Overall, authenticity of the users is the common problem of all voting systems. There must be a mechanism which can verify the users’ authenticity such that only verified users can give their vote once; others cannot vote. In this paper, a challenge response-based authentication is proposed by utilizing properties of the users, for example, something they have and know. In terms of speed, the proposed system provides good result, in addition to other capabilities offered by the system.

Keywords: authentication, data protection, mobile voting, security

Procedia PDF Downloads 421
1585 Arisarum Vulgare: Bridging Tradition and Science through Phytochemical Characterization and Exploring Therapeutic Potential via in vitro and in vivo Biological Activities

Authors: Boudjelal Amel

Abstract:

Arisarum vulgare, a member of the Araceae family, is an herbaceous perennial widely distributed in the Mediterranean region. A. vulgare is recognized for its medicinal properties and holds significant traditional importance in Algeria for the treatment of various human ailments, including pain, infections, inflammation, digestive disorders, skin problems, eczema, cancer, wounds, burns and gynecological diseases. Despite its extensive traditional use, scientific exploration of A. vulgare remains limited. The study aims to investigate for the first time the therapeutic potential of A. vulgare ethanolic extract obtained by ultrasound-assisted extraction. The chemical composition of the extract was determined by LC-MS/MS analysis. For in vitro phytopharmacological evaluation, several assays, including DPPH, ABTS, FRAP and reducing power, were employed to evaluate the antioxidant activity. The antibacterial activity was assessed againt Escherichia coli, Salmonella typhimurium, Staphylococus aureus, Enterococcus feacium by disk diffusion and microdilution methods. The possible inhibitory activity of ethanolic extract was analyzed against the cholinesterases enzymes (AChE and BChE). The DNA protection activity of A. vulgare ethanolic extract was estimated using the agarose gel electrophoresis method. The capacities of the extract to protect plasmid DNA (pBR322) from the oxidizing effects of H2O2 and UV treatment were evaluated by their DNA-breaking forms. The in vivo wound healing potential of a traditional ointment containing 5% of A. vulgare ethanolic extract was also investigated. The LC-MS/MS profiling of the extract revealed the presence of various bioactive compounds, including naringenin, chlorogenic, vanillic, cafeic, coumaric acids, trans-cinnamic and trans ferrulic acids. The plant extract presented considerable antioxidant potential, being the most active for Reducing power (0,07326±0.001 mg/ml) and DPPH (0.14±0.004 mg/ml). The extract showed the highest inhibition zone diameter against Enterococcus feacium (36±0.1 mm). The ethanolic extract of A. vulgare suppressed the growth of Staphylococus aureus, Escherichia coli and Salmonella typhimurium according to the MIC values. The extract of the plant significantly inhibited both AChE and BChE enzymes. DNA protection activity of the A. vulgare extract was determined as 90.41% for form I and 51.92% for form II. The in vivo experiments showed that 5% ethanolic extract ointment accelerated the wound healing process. The topical application of the traditional formulation enhanced wound closure (95,36±0,6 %) and improved histological parameters in the treated group compared to the control groups. The promising biological properties of Arisarum vulgare revealed that the plant could be appraised as a potential origin of bioactive molecules having multifunctional medicinal uses.

Keywords: arisarum vulgare, LC-MS/MS, antioxidant activity, antimicrobial activity, cholinesterases enzymes inhibition, dna-damage activity, in vivo wound healing

Procedia PDF Downloads 69