Search results for: debtor protection laws
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3084

Search results for: debtor protection laws

1584 Machine Learning Approach for Anomaly Detection in the Simulated Iec-60870-5-104 Traffic

Authors: Stepan Grebeniuk, Ersi Hodo, Henri Ruotsalainen, Paul Tavolato

Abstract:

Substation security plays an important role in the power delivery system. During the past years, there has been an increase in number of attacks on automation networks of the substations. In spite of that, there hasn’t been enough focus dedicated to the protection of such networks. Aiming to design a specialized anomaly detection system based on machine learning, in this paper we will discuss the IEC 60870-5-104 protocol that is used for communication between substation and control station and focus on the simulation of the substation traffic. Firstly, we will simulate the communication between substation slave and server. Secondly, we will compare the system's normal behavior and its behavior under the attack, in order to extract the right features which will be needed for building an anomaly detection system. Lastly, based on the features we will suggest the anomaly detection system for the asynchronous protocol IEC 60870-5-104.

Keywords: Anomaly detection, IEC-60870-5-104, Machine learning, Man-in-the-Middle attacks, Substation security

Procedia PDF Downloads 371
1583 The Term of Intellectual Property and Artificial Intelligence

Authors: Yusuf Turan

Abstract:

Definition of Intellectual Property Rights according to the World Intellectual Property Organization: " Intellectual property (IP) refers to creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images used in commerce." It states as follows. There are 2 important points in the definition; we can say that it is the result of intellectual activities that occur by one or more than one PERSON and as INNOVATION. When the history and development of the relevant definitions are briefly examined, it is realized that these two points have remained constant and Intellectual Property law and rights have been shaped around these two points. With the expansion of the scope of the term Intellectual Property as a result of the development of technology, especially in the field of artificial intelligence, questions such as "Can "Artificial Intelligence" be an inventor?" need to be resolved within the expanding scope. In the past years, it was ruled that the artificial intelligence named DABUS seen in the USA did not meet the definition of "individual" and therefore would be an inventor/inventor. With the developing technology, it is obvious that we will encounter such situations much more frequently in the field of intellectual property. While expanding the scope, we should definitely determine the boundaries of how we should decide who performs the mental activity or creativity that we call indispensable on the inventor/inventor according to these problems. As a result of all these problems and innovative situations, it is clearly realized that not only Intellectual Property Law and Rights but also their definitions need to be updated and improved. Ignoring the situations that are outside the scope of the current Intellectual Property Term is not enough to solve the problem and brings uncertainty. The fact that laws and definitions that have been operating on the same theories for years exclude today's innovative technologies from the scope contradicts intellectual property, which is expressed as a new and innovative field. Today, as a result of the innovative creation of poetry, painting, animation, music and even theater works with artificial intelligence, it must be recognized that the definition of Intellectual Property must be revised.

Keywords: artificial intelligence, innovation, the term of intellectual property, right

Procedia PDF Downloads 74
1582 The Antecedents That Effect to the Adventure Tourism in Krabi, Thailand

Authors: Autjira Songjan, Vimolsri Sansuk

Abstract:

The research aim to study the possible negative environmental impact by adventure tourism in Krabi, Thailand, which is a popular destination for adventure tourism. The research is carried out through quantitative and qualitative methods. Questionnaires are distributed to 400 adventure tourists: 160 Thai and 240 international tourists. Questions involved experiences and opinions towards the environment and certain practices which influence a protection or degradation of environment from tour guides, tour operators and tourists. Furthermore, in-depth interviews were carried out with 21 adventure tour operators operating 5 main adventure tours. The finding shows the various types of adventure activities in Krabi involve different kinds of nature, therefore the characteristics of the different adventure activities are likely to affect the physical environment in different level. Kayaking tours are managed inside the mangrove forests, and may lead to negative impact on the ecosystem of mangroves, through loud noise, pulling out the mangrove population.

Keywords: adventure activities, Krabi province in Thailand, physical environment, adventure tourism

Procedia PDF Downloads 270
1581 3D-Mesh Robust Watermarking Technique for Ownership Protection and Authentication

Authors: Farhan A. Alenizi

Abstract:

Digital watermarking has evolved in the past years as an important means for data authentication and ownership protection. The images and video watermarking was well known in the field of multimedia processing; however, 3D objects' watermarking techniques have emerged as an important means for the same purposes, as 3D mesh models are in increasing use in different areas of scientific, industrial, and medical applications. Like the image watermarking techniques, 3D watermarking can take place in either space or transform domains. Unlike images and video watermarking, where the frames have regular structures in both space and temporal domains, 3D objects are represented in different ways as meshes that are basically irregular samplings of surfaces; moreover, meshes can undergo a large variety of alterations which may be hard to tackle. This makes the watermarking process more challenging. While the transform domain watermarking is preferable in images and videos, they are still difficult to implement in 3d meshes due to the huge number of vertices involved and the complicated topology and geometry, and hence the difficulty to perform the spectral decomposition, even though significant work was done in the field. Spatial domain watermarking has attracted significant attention in the past years; they can either act on the topology or on the geometry of the model. Exploiting the statistical characteristics in the 3D mesh models from both geometrical and topological aspects was useful in hiding data. However, doing that with minimal surface distortions to the mesh attracted significant research in the field. A 3D mesh blind watermarking technique is proposed in this research. The watermarking method depends on modifying the vertices' positions with respect to the center of the object. An optimal method will be developed to reduce the errors, minimizing the distortions that the 3d object may experience due to the watermarking process, and reducing the computational complexity due to the iterations and other factors. The technique relies on the displacement process of the vertices' locations depending on the modification of the variances of the vertices’ norms. Statistical analyses were performed to establish the proper distributions that best fit each mesh, and hence establishing the bins sizes. Several optimizing approaches were introduced in the realms of mesh local roughness, the statistical distributions of the norms, and the displacements in the mesh centers. To evaluate the algorithm's robustness against other common geometry and connectivity attacks, the watermarked objects were subjected to uniform noise, Laplacian smoothing, vertices quantization, simplification, and cropping. Experimental results showed that the approach is robust in terms of both perceptual and quantitative qualities. It was also robust against both geometry and connectivity attacks. Moreover, the probability of true positive detection versus the probability of false-positive detection was evaluated. To validate the accuracy of the test cases, the receiver operating characteristics (ROC) curves were drawn, and they’ve shown robustness from this aspect. 3D watermarking is still a new field but still a promising one.

Keywords: watermarking, mesh objects, local roughness, Laplacian Smoothing

Procedia PDF Downloads 162
1580 Seismic Perimeter Surveillance System (Virtual Fence) for Threat Detection and Characterization Using Multiple ML Based Trained Models in Weighted Ensemble Voting

Authors: Vivek Mahadev, Manoj Kumar, Neelu Mathur, Brahm Dutt Pandey

Abstract:

Perimeter guarding and protection of critical installations require prompt intrusion detection and assessment to take effective countermeasures. Currently, visual and electronic surveillance are the primary methods used for perimeter guarding. These methods can be costly and complicated, requiring careful planning according to the location and terrain. Moreover, these methods often struggle to detect stealthy and camouflaged insurgents. The object of the present work is to devise a surveillance technique using seismic sensors that overcomes the limitations of existing systems. The aim is to improve intrusion detection, assessment, and characterization by utilizing seismic sensors. Most of the similar systems have only two types of intrusion detection capability viz., human or vehicle. In our work we could even categorize further to identify types of intrusion activity such as walking, running, group walking, fence jumping, tunnel digging and vehicular movements. A virtual fence of 60 meters at GCNEP, Bahadurgarh, Haryana, India, was created by installing four underground geophones at a distance of 15 meters each. The signals received from these geophones are then processed to find unique seismic signatures called features. Various feature optimization and selection methodologies, such as LightGBM, Boruta, Random Forest, Logistics, Recursive Feature Elimination, Chi-2 and Pearson Ratio were used to identify the best features for training the machine learning models. The trained models were developed using algorithms such as supervised support vector machine (SVM) classifier, kNN, Decision Tree, Logistic Regression, Naïve Bayes, and Artificial Neural Networks. These models were then used to predict the category of events, employing weighted ensemble voting to analyze and combine their results. The models were trained with 1940 training events and results were evaluated with 831 test events. It was observed that using the weighted ensemble voting increased the efficiency of predictions. In this study we successfully developed and deployed the virtual fence using geophones. Since these sensors are passive, do not radiate any energy and are installed underground, it is impossible for intruders to locate and nullify them. Their flexibility, quick and easy installation, low costs, hidden deployment and unattended surveillance make such systems especially suitable for critical installations and remote facilities with difficult terrain. This work demonstrates the potential of utilizing seismic sensors for creating better perimeter guarding and protection systems using multiple machine learning models in weighted ensemble voting. In this study the virtual fence achieved an intruder detection efficiency of over 97%.

Keywords: geophone, seismic perimeter surveillance, machine learning, weighted ensemble method

Procedia PDF Downloads 82
1579 The Utility and the Consequences of Counter Terrorism Financing

Authors: Fatemah Alzubairi

Abstract:

Terrorism financing is a theme that dramatically evolved post-9/11. Supra-national bodies, above all UN Security Council and the Financial Action Task Form (FATF), have established an executive-like mechanism, which allows blacklisting individuals and groups, freezing their funds, and restricting their travel, all of which have become part of states’ anti-terrorism frameworks. A number of problems arise from building counter-terrorism measures on the foundation of a vague definition of terrorism. This paper examines the utility and consequences of counter-terrorism financing with considering the lack of an international definition of terrorism. The main problem with national and international anti-terrorism legislation is the lack of a clear objective definition of terrorism. Most, if not all, national laws are broad and vague. Determining what terrorism remains the crucial underpinning of any successful discussion of counter-terrorism, and of the future success of counter-terrorist measures. This paper focuses on the legal and political consequences of equalizing the treatment of violent terrorist crimes, such as bombing, with non-violent terrorism-related crimes, such as funding terrorist groups. While both sorts of acts requires criminalization, treating them equally risks wrongfully or unfairly condemning innocent people who have associated with “terrorists” but are not involved in terrorist activities. This paper examines whether global obligations to counter terrorism financing focus on controlling terrorist groups more than terrorist activities. It also examines the utility of the obligations adopted by the UN Security Council and FATF, and whether they serve global security; or whether the utility is largely restricted to Western security, with little attention paid to the unique needs and demands of other regions.

Keywords: counter-terrorism, definition of terrorism, FATF, security, terrorism financing, UN Security Council

Procedia PDF Downloads 326
1578 Assessment of the Effectiveness of the Anti-Debris Flow Engineering Constructed to Reduce the Risk of Expected Debris Flow in the River Mletiskhevi by Computer Program RAMMS

Authors: Sopio Gogilava, Goga Chakhaia, Levan Tsulukidze, Zurab Laoshvili, Irina Khubulava, Shalva Bosikashvili, Teimuraz Gugushvili

Abstract:

Geoinformatics systems (GIS) integrated computer program RAMMS is widely used for forecasting debris flows and accordingly for the determination of anticipating risks with 85% accuracy. In view of the above, the work introduces new capabilities of the computer program RAMMS, which evaluates the effectiveness of anti-debris flow engineering construction, namely: the possibility of decreasing the expected velocity, kinetic energy, and output cone volume in the Mletiskhevi River. As a result of research has been determined that the anti-debris flow engineering construction designed to reduce the expected debris flow risk in the Mletiskhevi River is an effective environmental protection technology, that's why its introduction is promising.

Keywords: construction, debris flow, geoinformatics systems, program RAMMS

Procedia PDF Downloads 149
1577 Fractal Nature of Granular Mixtures of Different Concretes Formulated with Different Methods of Formulation

Authors: Fatima Achouri, Kaddour Chouicha, Abdelwahab Khatir

Abstract:

It is clear that concrete of quality must be made with selected materials chosen in optimum proportions that remain after implementation, a minimum of voids in the material produced. The different methods of formulations what we use, are based for the most part on a granular curve which describes an ‘optimal granularity’. Many authors have engaged in fundamental research on granular arrangements. A comparison of mathematical models reproducing these granular arrangements with experimental measurements of compactness have to verify that the minimum porosity P according to the following extent granular exactly a power law. So the best compactness in the finite medium are obtained with power laws, such as Furnas, Fuller or Talbot, each preferring a particular setting between 0.20 and 0.50. These considerations converge on the assumption that the optimal granularity Caquot approximates by a power law. By analogy, it can then be analyzed as a granular structure of fractal-type since the properties that characterize the internal similarity fractal objects are reflected also by a power law. Optimized mixtures may be described as a series of installments falling granular stuff to better the tank on a regular hierarchical distribution which would give at different scales, by cascading effects, the same structure to the mix. Likely this model may be appropriate for the entire extent of the size distribution of the components, since the cement particles (and silica fume) correctly deflocculated, micrometric dimensions, to chippings sometimes several tens of millimeters. As part of this research, the aim is to give an illustration of the application of fractal analysis to characterize the granular concrete mixtures optimized for a so-called fractal dimension where different concretes were studying that we proved a fractal structure of their granular mixtures regardless of the method of formulation or the type of concrete.

Keywords: concrete formulation, fractal character, granular packing, method of formulation

Procedia PDF Downloads 260
1576 Social Influences on HIV Services Engagement among Sexual Minorities Experiencing Intersectional Stigma and Discrimination during COVID-19 Pandemic in Uganda

Authors: Simon Mwima, Evans Jennifer Mann, Agnes Nzomene, Edson Chipalo, Eusebius Small, Moses Okumu, Bosco Mukuba

Abstract:

Introduction: In Uganda, sexual minorities experience exacerbated intersectional stigma and discrimination that exposes them to elevated HIV infections and impedes access to HIV testing and PrEP with low treatment adherence. We contribute to the lack of information about sexual minorities living with HIV in Uganda by using modified social-ecological theory to explore social influences impacting HIV services engagement. Findings from focused group discussion (FGD) involving 31 sexual minorities, ages 18-25, recruited through urban HIV clinics in Kampala reveal the protective and promotive social influence within the individual and interpersonal relationships (sexual partners and peers). Further, inhibitive social influences were found within family, community, societal, and healthcare settings. During the COVID-19 pandemic, these adolescents strategically used promotive social influences to increase their engagement with HIV care services. Interviews were recorded in English, transcribed verbatim, and analyzed using Dedoose. Conclusions: The findings revealed that young people (identified as sexual minorities) strategically used promotive social influences and supported each other to improve engagement with HIV care in the context of restrictive laws in Uganda during the COVID-19-Pandemic. Future HIV prevention, treatment, and care responses could draw on how peers support each other to navigate the heavily criminalized and stigmatized settings to access healthcare services.

Keywords: HIV/AIDS services, intersectional stigma, discrimination, adolescents, sexual minorities, COVID-19 pandemic Uganda

Procedia PDF Downloads 122
1575 The Effect of Artificial Intelligence on Human Rights Legislations and Evolution

Authors: Nawal Yacoub Halim Abdelmasih

Abstract:

The link between terrorism and human rights has grown to be a chief challenge in the combat against terrorism around the sector. This is primarily based on the truth that terrorism and human rights are so closely related that after the former starts, the latter is violated. This direct connection is identified in the Vienna Declaration and program of movement adopted by way of the sector Convention on Human Rights in Vienna on June 25, 1993, which acknowledges that acts of terrorism in all their paperwork and manifestations intended to damage the human rights of people. Terrorism, therefore, represents an assault on our maximum fundamental human rights. To this stop, the first part of this article makes a specialty of the connections between terrorism and human rights and seeks to spotlight the interdependence between those two standards. The second part discusses the rising idea of cyberterrorism and its manifestations. An evaluation of the fight against cyberterrorism inside the context of human rights is likewise performed.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.

Procedia PDF Downloads 15
1574 The Effect of Corporate Governance on Financial Stability and Solvency Margin for Insurance Companies in Jordan

Authors: Ghadeer A.Al-Jabaree, Husam Aldeen Al-Khadash, M. Nassar

Abstract:

This study aimed at investigating the effect of well-designed corporate governance system on the financial stability of insurance companies listed in ASE. Further, this study provides a comprehensive model for evaluating and analyzing insurance companies' financial position and prospective for comparing the degree of corporate governance application provisions among Jordanian insurance companies. In order to achieve the goals of the study, a whole population that consist of (27) listed insurance companies was introduced through the variables of (board of director, audit committee, internal and external auditor, board and management ownership and block holder's identities). Statistical methods were used with alternative techniques by (SPSS); where descriptive statistical techniques such as means, standard deviations were used to describe the variables, while (F) test and ANOVA analysis of variance were used to test the hypotheses of the study. The study revealed the existence of significant effect of corporate governance variables except local companies that are not listed in ASE on financial stability within control variables especially debt ratio (leverage),where it's also showed that concentration in motor third party doesn't have significant effect on insurance companies' financial stability during study period. Moreover, the study concludes that Global financial crisis affect the investment side of insurance companies with insignificant effect on the technical side. Finally, some recommendations were presented such as enhancing the laws and regulation that help the appropriate application of corporate governance, and work on activating the transparency in the disclosures of the financial statements and focusing on supporting the technical provisions for the companies, rather than focusing only on profit side.

Keywords: corporate governance, financial stability and solvency margin, insurance companies, Jordan

Procedia PDF Downloads 491
1573 Noise Pollution: An Emerging Threat to Urban Health

Authors: M. Sirajul Islam Molla

Abstract:

Noise pollution has been a continuous and an increasing threat to human health in urban population all over the world. The situation in Bangladesh particularly in major cities has been dangerously aggravating. Despite the government of Bangladesh have laws in its hand to curb the noise pollution the authority’s reluctance in enforcing it, is making the situation worse. We do not see any difference in some other major cities of the South Asian Regional Countries like Delhi and Kathmandu, both of the cities are facing the same situation like Dhaka. With the expansion of technology-based township all over the world, the noise pollution has been an emerging threat to urban health. The information for this review has been derived from websites of GOs, NGOs, peer-reviewed papers, seminars and symposia. The worse situation of noise pollution results in people’s irritation and protest, but in many cases, the protesters are facing the wrath of the polluters. Two such consequences in Bangladesh have resulted in killing the protesters by the polluters – one happened in Dhaka city and the other in a rural town. The law-enforcing agencies proactively do not attempt to impose the law. Noise pollution has been increasing so rapidly that it has become a burden on human health in urban populations. Prolonged exposure to higher noise causes mental stress, sleeplessness, high blood pressure, cardiac failure, respiratory disorder, miscarriage and breaks attention of students to their studies and also irritates their behavior. The noise pollution-caused mortality has also been increasing all over the world. Recommendations from the international conferences such as ICUH should be forwarded to the United Nations. The UN then should pass it on to the concerned countries. The UN should also keenly monitor if the countries have appropriate plan to curb noise pollution to meet the sustainable development goals.

Keywords: decibel, environment, noise, pollution

Procedia PDF Downloads 246
1572 Facilitating Waste Management to Achieve Sustainable Residential Built Environments

Authors: Ingy Ibrahim El-Darwish, Neveen Youssef Azmy

Abstract:

The endowment of a healthy environment can be implemented by endorsing sustainable fundamentals. Design of sustainable buildings through recycling of waste, can reduce health problems, provide good environments and contribute to the aesthetically pleasing entourage. Such environments can help in providing energy-saving alternatives to consolidate the principles of sustainability. The poor community awareness and the absence of laws and legislation in Egypt for waste management specifically in residential areas have led to an inability to provide an integrated system for waste management in urban and rural areas. Many problems and environmental challenges face the Egyptian urban environments. From these problems, is the lack of a cohesive vision for waste collection and recycling for energy-saving. The second problem is the lack public awareness of the short term and long term vision of waste management. Bad practices have adversely affected the efficiency of environmental management systems due to lack of urban legislations that codify collection and recycling of residential communities in Egyptian urban environments. Hence, this research tries to address residents on waste management matters to facilitate legislative process on waste collection and classification within residential units and outside them in a preparation phase for recycling in the Egyptian urban environments. In order to achieve this goal, one of the Egyptian communities has been addressed, analyzed and studied. Waste collection, classification, separation and access to recycling places in the urban city are proposed in preparation for a legislation ruling and regulating the process. Hence, sustainable principles are to be achieved.

Keywords: recycling, residential buildings, sustainability, waste

Procedia PDF Downloads 328
1571 Mosquito Repellent Finishing of Cotton Using Pepper Tree (Schinus molle) Seed Oil Extract

Authors: Granch Berhe Tseghai, Tekalgn Gebremedhin Belay, Abrehaley Hagos Gebremariam

Abstract:

Mosquito repellent textiles are one of the most growing ways to advance the textile field by providing the needed characteristics of protecting against mosquitoes, especially in the tropical areas. These types of textiles ensure the protection of human beings from the mosquitoes and the mosquito-borne disease includes malaria, filariasis and dengue fever. In this work Schinus Molle oil (pepper tree oil) was used for mosquito repellent finish as a preformatted thing. This study focused on the penetration of mosquito repellent finish in textile applications as well as nature based alternatives to commercial chemical mosquito repellents in the market. Suitable techniques and materials to achieve mosquito repellency are discussed and pointed out according to our project. In this study textile, sample was treated with binder and schinus oil. The different property has been studied for effective mosquito repellency.

Keywords: cotton, Schinus molle seed oil, mosquito repellent, mosquito-borne diseases

Procedia PDF Downloads 288
1570 Algorithmic Obligations: Proactive Liability for AI-Generated Content and Copyright Compliance

Authors: Aleksandra Czubek

Abstract:

As AI systems increasingly shape content creation, existing copyright frameworks face significant challenges in determining liability for AI-generated outputs. Current legal discussions largely focus on who bears responsibility for infringing works, be it developers, users, or entities benefiting from AI outputs. This paper introduces a novel concept of algorithmic obligations, proposing that AI developers be subject to proactive duties that ensure their models prevent copyright infringement before it occurs. Building on principles of obligations law traditionally applied to human actors, the paper suggests a shift from reactive enforcement to proactive legal requirements. AI developers would be legally mandated to incorporate copyright-aware mechanisms within their systems, turning optional safeguards into enforceable standards. These obligations could vary in implementation across international, EU, UK, and U.S. legal frameworks, creating a multi-jurisdictional approach to copyright compliance. This paper explores how the EU’s existing copyright framework, exemplified by the Copyright Directive (2019/790), could evolve to impose a duty of foresight on AI developers, compelling them to embed mechanisms that prevent infringing outputs. By drawing parallels to GDPR’s “data protection by design,” a similar principle could be applied to copyright law, where AI models are designed to minimize copyright risks. In the UK, post-Brexit text and data mining exemptions are seen as pro-innovation but pose risks to copyright protections. This paper proposes a balanced approach, introducing algorithmic obligations to complement these exemptions. AI systems benefiting from text and data mining provisions should integrate safeguards that flag potential copyright violations in real time, ensuring both innovation and protection. In the U.S., where copyright law focuses on human-centric works, this paper suggests an evolution toward algorithmic due diligence. AI developers would have a duty similar to product liability, ensuring that their systems do not produce infringing outputs, even if the outputs themselves cannot be copyrighted. This framework introduces a shift from post-infringement remedies to preventive legal structures, where developers actively mitigate risks. The paper also breaks new ground by addressing obligations surrounding the training data of large language models (LLMs). Currently, training data is often treated under exceptions such as the EU’s text and data mining provisions or U.S. fair use. However, this paper proposes a proactive framework where developers are obligated to verify and document the legal status of their training data, ensuring it is licensed or otherwise cleared for use. In conclusion, this paper advocates for an obligations-centered model that shifts AI-related copyright law from reactive litigation to proactive design. By holding AI developers to a heightened standard of care, this approach aims to prevent infringement at its source, addressing both the outputs of AI systems and the training processes that underlie them.

Keywords: ip, technology, copyright, data, infringement, comparative analysis

Procedia PDF Downloads 21
1569 Acetylation of Peruvian Wood Species

Authors: A. Loayza

Abstract:

Wood acetilationhapens when woody cell wall is saturated with acetic anhydride, the free hydroxyl groups present on cellulosic structures are replaced. Thus, the capillary spaces are filled with acetyl groups, and this replacement avoids further reactions with water. But, there is no information about wood acetilation in peruvianamzonic Wood species (SchizolobiumExcelsumVoge and CalycophyllumSpruceanum). So, in this research, we test acetylation of this two peruvian species in order to assess its ability as a protection estrategy, like the artificially cultivated species common for this type of treatment. A know experimental methodology was applied, using a laboratory reactor, evaluating the time as a principal variable. In this research, we were able to evaluate weight gains. The acetylation was carriet out considering one immersion time of 3 and 6 hours on acetic anhydride, were could it be observed weight gains ranged between 14 and 20% and the improvement of mention properties such as: a) Dimensional stability and water absorption capacity improved as well as its compressive strength.

Keywords: acetylation, calycophyllum spruceanum benth. Hook. F., cedrelinga cateniformis, copaifera langsdorffii, dimensional stability, schizolobium parahybum

Procedia PDF Downloads 98
1568 The Three-Zone Composite Productivity Model of Multi-Fractured Horizontal Wells under Different Diffusion Coefficients in a Shale Gas Reservoir

Authors: Weiyao Zhu, Qian Qi, Ming Yue, Dongxu Ma

Abstract:

Due to the nano-micro pore structures and the massive multi-stage multi-cluster hydraulic fracturing in shale gas reservoirs, the multi-scale seepage flows are much more complicated than in most other conventional reservoirs, and are crucial for the economic development of shale gas. In this study, a new multi-scale non-linear flow model was established and simplified, based on different diffusion and slip correction coefficients. Due to the fact that different flow laws existed between the fracture network and matrix zone, a three-zone composite model was proposed. Then, according to the conformal transformation combined with the law of equivalent percolation resistance, the productivity equation of a horizontal fractured well, with consideration given to diffusion, slip, desorption, and absorption, was built. Also, an analytic solution was derived, and the interference of the multi-cluster fractures was analyzed. The results indicated that the diffusion of the shale gas was mainly in the transition and Fick diffusion regions. The matrix permeability was found to be influenced by slippage and diffusion, which was determined by the pore pressure and diameter according to the Knudsen number. It was determined that, with the increased half-lengths of the fracture clusters, flow conductivity of the fractures, and permeability of the fracture network, the productivity of the fractured well also increased. Meanwhile, with the increased number of fractures, the distance between the fractures decreased, and the productivity slowly increased due to the mutual interference of the fractures. In regard to the fractured horizontal wells, the free gas was found to majorly contribute to the productivity, while the contribution of the desorption increased with the increased pressure differences.

Keywords: multi-scale, fracture network, composite model, productivity

Procedia PDF Downloads 271
1567 Protective Approach of Mentha Piperita against Cadmium Induced Renotoxicity in Albino Rats

Authors: Baby Tabassum, Priya Bajaj

Abstract:

Cadmium is the second most hazardous heavy metal occurring in both elemental as well as compound forms. It is a highly toxic metal with a very high bio-concentration factor (BCF>100). WHO permitted groundwater cadmium concentration is 0.005 mg/L only, but reality is far away from this limit. A number of natural and anthropogenic industrial activities contribute to the spread of cadmium into the environment. The present study had been designated to find out the renal changes at functional level after cadmium intoxication and protection against these changes offered by Mentha piperata. For the purpose, albino rats were selected as the model organism. Cadmium significantly increases the serum level of serum proteins and nitrogenous wastes showing reduced filtration rate of kidneys. Pretreatment with Mentha piperata leaf extract causes significant retention of these levels to normalcy. These findings conclude that Cadmium exposure affects renal functioning but Mentha could prevent it, proving its nephro-protective potential against heavy metal toxicity.

Keywords: albino rat, cadmium, Mentha piperata, nephrotoxicity

Procedia PDF Downloads 399
1566 Assessment of the Simulation Programs Usable to Support Decision Making Processes of the Critical Infrastructure Emergency Management

Authors: Jiří Barta, Oldřich Svoboda

Abstract:

This article deals with the issue of practical training of the management staff during emergency events in the frame of critical infrastructure. Critical infrastructure represents one of the possible targets of destructive activities as well as operational accidents and incidents which can seriously influence the functioning of the system of ensuring the basic needs of the inhabitants. Therefore, protection of critical infrastructure and training of the staff in dealing with emergencies becomes a broadly discussed topic. Nowadays, the market offers a wide range of simulation tools which proclaim that they are suitable for practical training of management staff and completing their tasks. Another group of programs declares that they are not primarily designed for this type of simulations. However, after some minor adaptations, for example by adding or changing users‘ roles, they are able to fulfil the needs of practical training as well as the process of emergency simulation. This paper characterises and selects simulators and programs for simulating emergency events.

Keywords: computer simulation, Symos´97, simulation software, harmful substances, Konstruktivní simulace, SIMEX

Procedia PDF Downloads 259
1565 The International Legal Protection of Foreign Investment Through Bilateral Investment Treaties and Double Taxation Treaties in the Context of International Investment Law and International Tax Law

Authors: Abdulmajeed Abdullah Alqarni

Abstract:

This paper is devoted a study of the current frameworks applicable to foreign investments at the levels of domestic and international law, with a particular focus on the legitimate balance to be achieved between the rights of the host state and the legal protections owed to foreign investors. At the wider level of analysis, the paper attempts to map and critically examine the relationship between foreign investment and economic development. In doing so, the paper offers a study in how current discourses and practices on investment law can reconcile the competing interests of developing and developed countries. The study draws on the growing economic imperative for developing nations to create a favorable investment climate capable of attracting private foreign investment. It notes that that over the past decades, an abundance of legal standards that establish substantive and procedural protections for legal forms of foreign investments in the host countries have evolved and crystalized. The study then goes on to offer a substantive analysis of legal reforms at the domestic level in countries such as Saudi Arabia before going on to provide an in- depth and substantive examination of the most important instruments developed at the levels of international law: bilateral investment agreements and double taxation agreements. As to its methods, the study draws on case studies and from data assessing the link between double taxation and economic development. Drawing from the extant literature and doctrinal research, and international and comparative jurisprudence, the paper excavates and critically examines contemporary definitions and norms of international investment law, many of which have been given concrete form and specificity in an ever-expanding number of bilateral and multilateral investment treaties. By reconsidering the wider challenges of conflicts of law and jurisdiction, and the competing aims of the modern investment law regime, the study reflects on how bilateral investment treaties might succeed in achieving the dual aims of rights protection and economic sovereignty. Through its examination of the double taxation phenomena, the study goes on to identify key practical challenges raised by the implementation of bilateral treaties whilst also assessing the sufficiency of the domestic and international legal solutions that are proposed in response. In its final analysis, the study aims to contribute to existing scholarship by assessing contemporary legal and economic barriers to the free flow of investment with due regard for the legitimate concerns and diversity of developing nations. It does by situating its analysis of the domestic enforcement of international investment instrument in its wider historical and normative context. By focusing on the economic and legal dimensions of foreign investment, the paper also aims to offer an interdisciplinary and holistic perspective on contemporary issues and developments in investment law while offering practical reform proposals that can be used to be achieve a more equitable balance between the rights and interests of states and private entities in an increasingly trans nationalized sphere of investment regulation and treaty arbitration.

Keywords: foreign investment, bilateral investment treaties, international tax law, double taxation treaties

Procedia PDF Downloads 89
1564 The Contribution of the Lomé Charter to Combating Drugs Trafficking at Sea: Nigerian and South African Legal Perspectives

Authors: Obinna Emmanuel Nkomadu

Abstract:

The sea attracts many criminal activities including drug trafficking. The illicit traffic in narcotic drugs and psychotropic substances by sea poses a serious threat to maritime security globally. The seizure of drugs, particularly, on the African continent is on the raise. In terms of Southern Africa, South Africa is a major transit point for Latin American drugs and South Africa is the largest market for illicit drugs entering the Southern African region. Nigeria and South Africa have taken a number of steps to address this scourge, but, despite those steps, drugs trafficking at sea continues. For that reason and to combat a number of other threats to maritime security around the continent, a substantial number of AU members in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (“the Charter”). However, the Charter is yet to come into force due to the number of States required to accede or ratify the Charter. This paper set out the pre-existing international instruments on drugs, to ascertain the domestic laws of Nigeria and South Africa relating to drugs with the relevant provisions of the Lomé Charter in order to establish whether any legal steps are required to ensure that Nigeria and South Africa comply with its obligations under the Charter. Indeed, should Nigeria and South Africa decide to ratify it and should it come into force, both States must cooperate with other relevant States in establishing policies, as well as a regional and continental institutions, and ensure the implementation of such policies. The paper urged the States to urgently ratify the Charter as it is a step in the right direction in the prevention and repression of drugs trafficking on the African maritime domain.

Keywords: cooperation against drugs trafficking at sea, Lomé Charter, maritime security, Nigerian and South Africa legislation on drugs

Procedia PDF Downloads 98
1563 Involvement of Multi-Drug Resistance Protein (Mrp) 3 in Resveratrol Protection against Methotrexate-Induced Testicular Damage

Authors: Mohamed A. Morsy, Azza A. K. El-Sheikh, Abdulla Y. Al-Taher

Abstract:

The aim of the present study is to investigate the effect of resveratrol (RES) on methotrexate (MTX)-induced testicular damage. RES (10 mg/kg/day) was given for 8 days orally and MTX (20 mg/kg i.p.) was given at day 4 of experiment, with or without RES in rats. MTX decreased serum testosterone, induced histopathological testicular damage, increased testicular tumor necrosis factor-α level and expression of nuclear factor-κB and cyclooxygenase-2. In MTX/RES group, significant reversal of these parameters was noticed, compared to MTX group. Testicular expression of multidrug resistance protein (Mrp) 3 was three- and five-folds higher in RES- and MTX/RES-treated groups, respectively. In vitro, using prostate cancer cells, each of MTX and RES alone induced cytotoxicity with IC50 0.18 ± 0.08 and 20.5 ± 3.6 µM, respectively. RES also significantly enhanced cytotoxicity of MTX. In conclusion, RES appears to have dual beneficial effect, as it promotes MTX tumor cytotoxicity, while protecting the testes, probably via up-regulation of testicular Mrp3 as a novel mechanism.

Keywords: resveratrol, methotrexate, multidrug resistance protein 3, tumor necrosis factor-α, nuclear factor-κB, cyclooxygenase-2

Procedia PDF Downloads 455
1562 Disease Control of Rice Blast Caused by Pyricularia Oryzae Cavara Using Novel Chitosan-based Agronanofungicides

Authors: Abdulaziz Bashir Kutawa, Khairulmazmi Ahmad, Mohd Zobir Hussein, Asgar Ali, Mohd Aswad Abdul Wahab, Amara Rafi, Mahesh Tiran Gunasena, Muhammad Ziaur Rahman, Md. Imam Hossain, Syazwan Afif Mohd Zobir

Abstract:

Rice is a cereal crop and belongs to the family Poaceae, it was domesticated in southern China and North-Eastern India around 8000 years ago, and it’s the staple nourishment for over half of the total world’s population. Rice production worldwide is affected by different abiotic and biotic stresses. Diseases are important challenges for the production of rice, among all the diseases in rice plants, the most severe and common disease is the rice blast. Worldwide, it is one of the most damaging diseases affecting rice cultivation, the disease is caused by the non-obligate filamentous ascomycete fungus called Magnaporthe grisae or Pyricularia oryzae Cav. Nanotechnology is a new idea to improve agriculture by combating the diseases of plants, as nanoparticles were found to possess an inhibitory effect on different species of fungi. This work aimed to develop and determine the efficacy of agronanofungicides, and commercial fungicides (in-vitro and in-vivo). The agronanofungicides were developed using ionic gelation methods. In-vitro antifungal activity of the synthesized agronanofungicides was evaluated against P. oryzae using the poisoned medium technique. The potato dextrose agar (PDA) was amended in several concentrations; 0.001, 0.005, 0.01, 0.025, 0.05, 0.1, 0.15, 0.20, 0.25, 0.30, and 0.35 ppm for the agronanofungicides. Medium with the only solvent served as a control. Mycelial growth was recorded every day, and the percentage inhibition of radial growth (PIRG) was also calculated. Based on the results of the zone of inhibition, the chitosan-hexaconazole agronanofungicide (2g/mL) was the most effective fungicide to inhibit the growth of the fungus with 100% inhibition at 0.2, 0.25, 0.30, and 0.35 ppm, respectively. The least were found to be propiconazole and basamid fungicides with 100% inhibition only at 100 ppm. In terms of the glasshouse results, the chitosan-hexaconazole-dazomet agronanofungicide (CHDEN) treatment (2.5g/L) was found to be the most effective fungicide to reduce the intensity of the disease with a disease severity index (DSI) of 19.80%, protection index (PI) of 82.26%, lesion length of 1.63cm, disease reduction (DR) of 80.20%, and AUDPC (390.60 Unit2). The least effective fungicide was found to be ANV with a disease severity index (45.60%), protection index (45.24%), lesion length (3.83 cm), disease reduction (54.40%), and AUDPC (1205.75 Unit2). The negative control did not show any symptoms during the glasshouse assay, while the untreated control treatment exhibited severe symptoms of the disease with a DSI value of 64.38%, lesion length of 5.20 cm, and AUDPC value of 2201.85 Unit2, respectively. The treatments of agronanofungicides have enhanced the yield significantly with CHDEN having 239.00 while the healthy control had 113.67 for the number of grains per panicle. The use of CHEN and CHDEN will help immensely in reducing the severity of rice blast in the fields, and this will increase the yield and profit of the farmers that produced rice.

Keywords: chitosan, dazomet, disease severity, efficacy, and blast disease

Procedia PDF Downloads 91
1561 A Comparative Study of Criminal Liability for Art Forgery in Poland and Selected European Countries

Authors: Olivia Rybak-Karkosz

Abstract:

Art forgery is a serious problem present in the art market in every country despite its scale and experience. In the Polish art market, this problem has existed since its beginnings. The market expansion in recent years attracted new buyers, which led to growing prices of polish art. And that attracted deceitful sellers who supply the market with forgeries. Moreover, there are many new types of buyers, many of whom are art non-specialists. But even the most experienced collectors must be cautious when purchasing a piece of art. In this paper, the author would like to discuss legal acts in Polish law that criminalize the forgery of a piece of art and compare them with similar regulations from four European countries - the Italian Republic, Kingdom of the Netherlands, French Republic, and the Federal Republic of Germany. The author wants to verify if any solutions could inspire Polish legislators to implement them in domestic law to help reduce this crime and improve the criminal procedure of art forgery. The paper contains a concluding statement to implement a similar solution used in one of the presented countries.

Keywords: art forgery, comparative law, criminal law, criminal liability, protection of works of art

Procedia PDF Downloads 90
1560 Study on Ecological Water Demand Evaluation of Typical Mountainous Rivers in Zhejiang Province: Taking Kaihua River as an Example

Authors: Kaiping Xu, Aiju You, Lei Hua

Abstract:

In view of the ecological environmental problems and protection needs of mountainous rivers in Zhejiang province, a suitable ecological water demand evaluation system was established based on investigation and monitoring. Taking the Kaihua river as an example, the research on ecological water demand and the current situation evaluation were carried out. The main types of ecological water demand in Majin River are basic ecological flow and lake wetland outside the river, and instream flow and water demands for water quality in Zhongcun river. In the wet season, each ecological water demand is 18.05m3/s and 2.56m3 / s, and in the dry season is 3.00m3/s and 0.61m3/s. Three indexes of flow, duration and occurrence time are used to evaluate the ecological water demand. The degree of ecological water demand in the past three years is low level of satisfaction. Meanwhile, the existing problems are analyzed, and put forward reasonable and operable safeguards and suggestions.

Keywords: Zhejiang province, mountainous river, ecological water demand, Kaihua river, evaluation

Procedia PDF Downloads 245
1559 Exploiting JPEG2000 into Reversible Information

Authors: Te-Jen Chang, I-Hui Pan, Kuang-Hsiung Tan, Shan-Jen Cheng, Chien-Wu Lan, Chih-Chan Hu

Abstract:

With the event of multimedia age in order to protect data not to be tampered, damaged, and faked, information hiding technologies are proposed. Information hiding means important secret information is hidden into cover multimedia and then camouflaged media is produced. This camouflaged media has the characteristic of natural protection. Under the undoubted situation, important secret information is transmitted out.Reversible information hiding technologies for high capacity is proposed in this paper. The gray images are as cover media in this technology. We compress gray images and compare with the original image to produce the estimated differences. By using the estimated differences, expression information hiding is used, and higher information capacity can be achieved. According to experimental results, the proposed technology can be approved. For these experiments, the whole capacity of information payload and image quality can be satisfied.

Keywords: cover media, camouflaged media, reversible information hiding, gray image

Procedia PDF Downloads 330
1558 Long Wavelength Coherent Pulse of Sound Propagating in Granular Media

Authors: Rohit Kumar Shrivastava, Amalia Thomas, Nathalie Vriend, Stefan Luding

Abstract:

A mechanical wave or vibration propagating through granular media exhibits a specific signature in time. A coherent pulse or wavefront arrives first with multiply scattered waves (coda) arriving later. The coherent pulse is micro-structure independent i.e. it depends only on the bulk properties of the disordered granular sample, the sound wave velocity of the granular sample and hence bulk and shear moduli. The coherent wavefront attenuates (decreases in amplitude) and broadens with distance from its source. The pulse attenuation and broadening effects are affected by disorder (polydispersity; contrast in size of the granules) and have often been attributed to dispersion and scattering. To study the effect of disorder and initial amplitude (non-linearity) of the pulse imparted to the system on the coherent wavefront, numerical simulations have been carried out on one-dimensional sets of particles (granular chains). The interaction force between the particles is given by a Hertzian contact model. The sizes of particles have been selected randomly from a Gaussian distribution, where the standard deviation of this distribution is the relevant parameter that quantifies the effect of disorder on the coherent wavefront. Since, the coherent wavefront is system configuration independent, ensemble averaging has been used for improving the signal quality of the coherent pulse and removing the multiply scattered waves. The results concerning the width of the coherent wavefront have been formulated in terms of scaling laws. An experimental set-up of photoelastic particles constituting a granular chain is proposed to validate the numerical results.

Keywords: discrete elements, Hertzian contact, polydispersity, weakly nonlinear, wave propagation

Procedia PDF Downloads 206
1557 Temporal Conundrums: Navigating the Gravitational Time of Flow

Authors: Ogaeze Onyedikachukwu Francis

Abstract:

Let’s embark on a microcosmic exploration of the universe to delve into the gravitational time flow and its profound implications for manipulating temporal distances, ushering in the possibilities of time travel and inter-universe leaps with instantaneous teleportation. Envision the universe reduced to a minimalist scenario—two perfectly identical mass spheres intricately entwined in a manner where any alteration affecting one sphere instantaneously impacts the other. However, the complexity deepens: despite their indistinguishable nature, the gravitational pull between these spheres—coined the “gravitational Time of flow” in essence dynamics research—remains constant, ensuring universal stability. Consider now tampering with one of these spheres to test the veracity of their entanglement and sameness. Introducing a third body disrupts the equilibrium, complicating gravitational laws while maintaining their essence. This interference alters the gravitational time flow between the spheres, unraveling their initial entanglement as they diverge into distinct entities owing to the influence of the additional body. Yet, a reaffirmation of their initial entwined state becomes feasible by recalibrating the spatial arrangement and gravitational dynamics among the three bodies and beyond. This contemplation underscores the gravitational law as the linchpin connecting and anchoring the universe’s fabric, cocooning all within its omnipresent grasp. Our focal point—the gravitational time of flow—emerges as a gateway to unraveling the mysteries behind temporal distance manipulation, offering tantalizing prospects for traversing realms of time and space with unprecedented fluidity and expanding horizons in the realms of scientific inquiry and exploration.

Keywords: time, space, gravity, gravitational time flow, temporal leap, temporal-distance manipulation, multi-verse, teleportation, gravitational time flow device, time travel, distance

Procedia PDF Downloads 1
1556 Exploring the Experiences of Women Regarding Poor Birth Spacing at Bulanao, Tabuk City, Kalinga

Authors: Averill Reindle T. Camilo, Veena Jaye B. Cosme, Hazel Kaye a Mabborang, Johannah a Magayam, Julie May D. Magguiya, Trisha Irish W. Maique, Klein Van M. Maloc, Jaydee B. Masadao, Yvonne Mae P. Ματεο

Abstract:

The City of Tabuk had the highest number of registered births in the province of Kalinga, indicating the need to study birth spacing trends in Tabuk City further. The study investigates women's experiences with poor birth spacing in Bulanao, Tabuk City, Kalinga, focusing on their views, practices, challenges, and strategies to cope with these issues. A qualitative research approach was used, specifically the Descriptive Phenomenological Research Design with eight (8) participants from Bulanao, Tabuk City, Kalinga. The study found that women's views on poor birth spacing, including intense desire, wanting to have more children, and their perception of children as blessings and helpers, are prevalent and including side effects of contraceptives. The challenges faced by women due to poor birth spacing include financial constraints, sickness, lack of support, and time constraints. These issues can lead to increased living costs for stay-at-home parents, including food, clothing, transportation, medical care, housing, childcare, and budget modifications. The participants also face difficulties in handling sick children and adjusting to uneven birth spacing. To cope, they focus on earning money, patience, andcontraception, while seeking family support fromin-laws andmothers.

Keywords: birth spacing, contraception, coping strategies, maternal health, women experiences

Procedia PDF Downloads 32
1555 Strengthening the Security of the Thai-Myanmar Border Trade of the People in the Mae Sot Customs Checkpoint Area, Tak Province

Authors: Sakapas Saengchai

Abstract:

A Study on Strengthening the Security of the Thai-Myanmar Border Trade Area of the people in the Mae Sot customs checkpoint area, Tak province, was designed as a qualitative research study. Its objectives were to study the principles of strengthening border trade security and enhancing people's participation. To develop a border trade model that enhances the spatial economy and improves people's quality of life by collecting data using a participant observation method. In-depth interview group chats border checkpoint administrators, Mae Sot customs checkpoint, Tak province, private entrepreneurs, community leaders, and the opening of a community forum to exchange opinions with people in the area. The results of the study found that 1. Security development is to promote crime reduction. Reduce drug trafficking problems Smuggling and human trafficking have been reduced. Including planning and preparation to protect people from terrorism, epidemics, and communicable diseases, including cooperation with Burma on border rules for people and workers, 2. Wealth development is to promote investment. Transport links value chain logistics Cross-border goods and services on the Thai-Myanmar border Both amending regulations and laws to promote fair trade. Emphasis on convenient and fast service as well as promoting the Thai border area to be a tourist attraction that can create prosperity and income for the community in the area By using balanced natural resources, with production and consumption that are environmentally friendly, and emphasizes the participation of the public sector, the private sector, and people from all sectors in the sustainable development of the Thai border.

Keywords: security, border trade, customs, participation, people

Procedia PDF Downloads 183