Search results for: data protection laws
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 27332

Search results for: data protection laws

25802 Pension Policy and Police Retirement: An Exploratory Study Applied to Special Policy Enforcement in Taiwan

Authors: Yung-Ching Chou, Albert Shangpao Yeh, Luke H. C. Hsiao

Abstract:

Police used to be an honor job. However, the police are no longer concerned about the mission and public safety instead of the issue of retirement. The main reason is the amendment of 'Public Servants Retirement Act' in Taiwan was effective since January 2011. The purposes of change were to solve the problem of the financial crisis which caused by the Hugh deficit of the civil servants pension fund. The policy of the civil servants pension reform was not only seriously impact the motives of policy, but also negatively impact the workforce of police. This research conducted a secondary data of Baoanjingcha Fifth Police Corps during the period between 2011 and 2015. Secondly, the research interviewed six representatives from the retired police in order to explore the retirement motives. In short, there were several major findings and suggestions in the following: 1. The police won't choice to retire which the nature of task is simple. 2. The ranking level of positions positively correlated with the retired age of police. 3. The police officers who are categorized as 'hazardous work' first class personnel should decrease the standard of the retirement age and allow the option of a monthly pension. 4. The information of the retirees' rights, as well as protection, are correlated with the service as well professional of personnel officer. More findings, as well as suggestions, will be elaborated on the content of this paper.

Keywords: human resource management, pension policy change, police retirement rush, public servants retirement act

Procedia PDF Downloads 323
25801 Survival Data with Incomplete Missing Categorical Covariates

Authors: Madaki Umar Yusuf, Mohd Rizam B. Abubakar

Abstract:

The survival censored data with incomplete covariate data is a common occurrence in many studies in which the outcome is survival time. With model when the missing covariates are categorical, a useful technique for obtaining parameter estimates is the EM by the method of weights. The survival outcome for the class of generalized linear model is applied and this method requires the estimation of the parameters of the distribution of the covariates. In this paper, we propose some clinical trials with ve covariates, four of which have some missing values which clearly show that they were fully censored data.

Keywords: EM algorithm, incomplete categorical covariates, ignorable missing data, missing at random (MAR), Weibull Distribution

Procedia PDF Downloads 403
25800 Channel Characteristics and Morphometry of a Part of Umtrew River, Meghalaya

Authors: Pratyashi Phukan, Ranjan Saikia

Abstract:

Morphometry incorporates quantitative study of the area ,altitude,volume, slope profiles of a land and drainage basin characteristics of the area concerned.Fluvial geomorphology includes the consideration of linear,areal and relief aspects of a fluvially originated drainage basin. The linear aspect deals with the hierarchical orders of streams, numbers, and lenghts of stream segments and various relationship among them.The areal aspect includes the analysis of basin perimeters,basin shape, basin area, and related morphometric laws. The relief aspect incorporates besides hypsometric, climographic and altimetric analysis,the study of absolute and relative reliefs, relief ratios, average slope, etc. In this paper we have analysed the relationship among stream velocity, channel shape,sediment load,channel width,channel depth, etc.

Keywords: morphometry, hydraulic geometry, Umtrew river, Meghalaya

Procedia PDF Downloads 457
25799 Disinformation’s Threats to Democracy in Central Africa: Case Studies from Cameroon and Central African Republic

Authors: Simont Toussi

Abstract:

Cameroon and the Central African Republic arebound by the provisions of many regional and international charters, which condemn the manipulation of information, obstacles to access reliable information, or the limitation of freedoms of expression and opinion. These two countries also have constitutional guarantees for free speech and access to true and liable information. However, they are yet to define specific policies and regulations for access to information, disinformation, or misinformation. Yet, certain countries’ laws and regulations related to information and communication technologies, to criminal procedures, to terrorism, or intelligence services contain provisions that rather hider human rights by condemning false information. Like many other African countries, Cameroon and the Central African Republic face a profound democratic regression, and governments use multiple methods to stifle online discourse and digital rights. Despite the increased uptake of digital tools for political participation, there is a lack of interactivity and adoption of these tools. This enables a scarcity of information and creates room for the spreading of disinformation in the public space, hamperingdemocracy and the respect for human rights. This research aims to analyse the adequacy of stakeholders’ responses to disinformation in Cameroon and the Central African Republic in periods of political contestation, such as elections and anti-government protests, to highlight the nature, perpetrators, strategies, and channels of disinformation, as well as its effects on democratic actors, including civil society, bloggers, government critics, activists, and other human rights defenders. The study follows a qualitative method with literature review, content analysis, andkey informant’sinterviews with stakeholders’ representatives, emphasized crowdsourcing as a data and information collecting method in the two countries.

Keywords: disinformation, democracy, political manipulation, social media, media, fake news, central Africa, cameroon, misinformation, free speech

Procedia PDF Downloads 107
25798 A Study of Blockchain Oracles

Authors: Abdeljalil Beniiche

Abstract:

The limitation with smart contracts is that they cannot access external data that might be required to control the execution of business logic. Oracles can be used to provide external data to smart contracts. An oracle is an interface that delivers data from external data outside the blockchain to a smart contract to consume. Oracle can deliver different types of data depending on the industry and requirements. In this paper, we study and describe the widely used blockchain oracles. Then, we elaborate on his potential role, technical architecture, and design patterns. Finally, we discuss the human oracle and its key role in solving the truth problem by reaching a consensus about a certain inquiry and tasks.

Keywords: blockchain, oracles, oracles design, human oracles

Procedia PDF Downloads 134
25797 The Use of Geographic Information System for Selecting Landfill Sites in Osogbo

Authors: Nureni Amoo, Sunday Aroge, Oluranti Akintola, Hakeem Olujide, Ibrahim Alabi

Abstract:

This study investigated the optimum landfill site in Osogbo so as to identify suitable solid waste dumpsite for proper waste management in the capital city. Despite an increase in alternative techniques for disposing of waste, landfilling remains the primary means of waste disposal. These changes in attitudes in many parts of the world have been supported by changes in laws and policies regarding the environment and waste disposal. Selecting the most suitable site for landfill can avoid any ecological and socio-economic effects. The increase in industrial and economic development, along with the increase of population growth in Osogbo town, generates a tremendous amount of solid waste within the region. Factors such as the scarcity of land, the lifespan of the landfill, and environmental considerations warrant that the scientific and fundamental studies are carried out in determining the suitability of a landfill site. The analysis of spatial data and consideration of regulations and accepted criteria are part of the important elements in the site selection. This paper presents a multi-criteria decision-making method using geographic information system (GIS) with the integration of the fuzzy logic multi-criteria decision making (FMCDM) technique for landfill suitability site evaluation. By using the fuzzy logic method (classification of suitable areas in the range of 0 to 1 scale), the superposing of the information layers related to drainage, soil, land use/land cover, slope, land use, and geology maps were performed in the study. Based on the result obtained in this study, five (5) potential sites are suitable for the construction of a landfill are proposed, two of which belong to the most suitable zone, and the existing waste disposal site belonged to the unsuitable zone.

Keywords: fuzzy logic multi-criteria decision making, geographic information system, landfill, suitable site, waste disposal

Procedia PDF Downloads 140
25796 Multiphysic Coupling Between Hypersonc Reactive Flow and Thermal Structural Analysis with Ablation for TPS of Space Lunchers

Authors: Margarita Dufresne

Abstract:

This study devoted to development TPS for small space re-usable launchers. We have used SIRIUS design for S1 prototype. Multiphysics coupling for hypersonic reactive flow and thermos-structural analysis with and without ablation is provided by -CCM+ and COMSOL Multiphysics and FASTRAN and ACE+. Flow around hypersonic flight vehicles is the interaction of multiple shocks and the interaction of shocks with boundary layers. These interactions can have a very strong impact on the aeroheating experienced by the flight vehicle. A real gas implies the existence of a gas in equilibrium, non-equilibrium. Mach number ranged from 5 to 10 for first stage flight.The goals of this effort are to provide validation of the iterative coupling of hypersonic physics models in STAR-CCM+ and FASTRAN with COMSOL Multiphysics and ACE+. COMSOL Multiphysics and ACE+ are used for thermal structure analysis to simulate Conjugate Heat Transfer, with Conduction, Free Convection and Radiation to simulate Heat Flux from hypersonic flow. The reactive simulations involve an air chemical model of five species: N, N2, NO, O and O2. Seventeen chemical reactions, involving dissociation and recombination probabilities calculation include in the Dunn/Kang mechanism. Forward reaction rate coefficients based on a modified Arrhenius equation are computed for each reaction. The algorithms employed to solve the reactive equations used the second-order numerical scheme is obtained by a “MUSCL” (Monotone Upstream-cantered Schemes for Conservation Laws) extrapolation process in the structured case. Coupled inviscid flux: AUSM+ flux-vector splitting The MUSCL third-order scheme in STAR-CCM+ provides third-order spatial accuracy, except in the vicinity of strong shocks, where, due to limiting, the spatial accuracy is reduced to second-order and provides improved (i.e., reduced) dissipation compared to the second-order discretization scheme. initial unstructured mesh is refined made using this initial pressure gradient technique for the shock/shock interaction test case. The suggested by NASA turbulence models are the K-Omega SST with a1 = 0.355 and QCR (quadratic) as the constitutive option. Specified k and omega explicitly in initial conditions and in regions – k = 1E-6 *Uinf^2 and omega = 5*Uinf/ (mean aerodynamic chord or characteristic length). We put into practice modelling tips for hypersonic flow as automatic coupled solver, adaptative mesh refinement to capture and refine shock front, using advancing Layer Mesher and larger prism layer thickness to capture shock front on blunt surfaces. The temperature range from 300K to 30 000 K and pressure between 1e-4 and 100 atm. FASTRAN and ACE+ are coupled to provide high-fidelity solution for hot hypersonic reactive flow and Conjugate Heat Transfer. The results of both approaches meet the CIRCA wind tunnel results.

Keywords: hypersonic, first stage, high speed compressible flow, shock wave, aerodynamic heating, conugate heat transfer, conduction, free convection, radiation, fastran, ace+, comsol multiphysics, star-ccm+, thermal protection system (tps), space launcher, wind tunnel

Procedia PDF Downloads 68
25795 The Modified WBS Based on LEED Rating System in Decreasing Energy Consumption and Cost of Buildings

Authors: Mehrab Gholami Zangalani, Siavash Rajabpour

Abstract:

In compliance with the Statistical Centre of Iran (SCI)’s results, construction and housing section in Iran is consuming 40% of energy, which is 5 times more than the world average consumption. By considering the climate in Iran, the solutions in terms of design, construction and exploitation of the buildings by utilizing the LEED rating system (LRS) is presented, regarding to the reasons for the high levels of energy consumption during construction and housing in Iran. As a solution, innovative Work Break Structure (WBS) in accordance with LRS and Iranian construction’s methods is unveiled in this research. Also, by amending laws pertaining to the construction in Iran, the huge amount of energy and cost can be saved. Furthermore, with a scale-up of these results to the scale of big cities such as Tehran (one of the largest metropolitan areas in the middle east) in which the license to build more than two hundred and fifty units each day is issued, the amount of energy and cost that can be saved is estimated.

Keywords: costs reduction, energy statistics, leed rating system (LRS), work brake structure (WBS)

Procedia PDF Downloads 525
25794 Trends of Conservation and Development in Mexican Biosphere Reserves: Spatial Analysis and Linear Mixed Model

Authors: Cecilia Sosa, Fernanda Figueroa, Leonardo Calzada

Abstract:

Biosphere reserves (BR) are considered as the main strategy for biodiversity and ecosystems conservation. Mexican BR are mainly inhabited by rural communities who strongly depend on forests and their resources. Even though the dual objective of conservation and development has been sought in BR, land cover change is a common process in these areas, while most rural communities are highly marginalized, partly as a result of restrictions imposed by conservation to the access and use of resources. Achieving ecosystems conservation and social development face serious challenges. Factors such as financial support for development projects (public/private), environmental conditions, infrastructure and regional economic conditions might influence both land use change and wellbeing. Examining the temporal trends of conservation and development in BR is central for the evaluation of outcomes for these conservation strategies. In this study, we analyzed changes in primary vegetation cover (as a proxy for conservation) and the index of marginalization (as a proxy for development) in Mexican BR (2000-2015); we also explore the influence of various factors affecting these trends, such as conservation-development projects financial support (public or private), geographical distribution in ecoregions (as a proxy for shared environmental conditions) and in economic zones (as a proxy for regional economic conditions). We developed a spatial analysis at the municipal scale (2,458 municipalities nationwide) in ArcGIS, to obtain road densities, geographical distribution in ecoregions and economic zones, the financial support received, and the percent of municipality area under protection by protected areas and, particularly, by BR. Those municipalities with less than 25% of area under protection were regarded as part of the protected area. We obtained marginalization indexes for all municipalities and, using MODIS in Google Earth Engine, the number of pixels covered by primary vegetation. We used a linear mixed model in RStudio for the analysis. We found a positive correlation between the marginalization index and the percent of primary vegetation cover per year (r=0.49-0.5); i.e., municipalities with higher marginalization also show higher percent of primary vegetation cover. Also, those municipalities with higher area under protection have more development projects (r=0.46) and some environmental conditions were relevant for percent of vegetation cover. Time, economic zones and marginalization index were all important. Time was particularly, in 2005, when both marginalization and deforestation decreased. Road densities and financial support for conservation-development projects were irrelevant as factors in the general correlation. Marginalization is still being affected by the conservation strategies applied in BR, even though that this management category considers both conservation and development of local communities as its objectives. Our results suggest that roads densities and support for conservation-development projects have not been a factor of poverty alleviation. As better conservation is being attained in the most impoverished areas, we face the dilemma of how to improve wellbeing in rural communities under conservation, since current strategies have not been able to leave behind the conservation-development contraposition.

Keywords: deforestation, local development, marginalization, protected areas

Procedia PDF Downloads 134
25793 Multi Data Management Systems in a Cluster Randomized Trial in Poor Resource Setting: The Pneumococcal Vaccine Schedules Trial

Authors: Abdoullah Nyassi, Golam Sarwar, Sarra Baldeh, Mamadou S. K. Jallow, Bai Lamin Dondeh, Isaac Osei, Grant A. Mackenzie

Abstract:

A randomized controlled trial is the "gold standard" for evaluating the efficacy of an intervention. Large-scale, cluster-randomized trials are expensive and difficult to conduct, though. To guarantee the validity and generalizability of findings, high-quality, dependable, and accurate data management systems are necessary. Robust data management systems are crucial for optimizing and validating the quality, accuracy, and dependability of trial data. Regarding the difficulties of data gathering in clinical trials in low-resource areas, there is a scarcity of literature on this subject, which may raise concerns. Effective data management systems and implementation goals should be part of trial procedures. Publicizing the creative clinical data management techniques used in clinical trials should boost public confidence in the study's conclusions and encourage further replication. In the ongoing pneumococcal vaccine schedule study in rural Gambia, this report details the development and deployment of multi-data management systems and methodologies. We implemented six different data management, synchronization, and reporting systems using Microsoft Access, RedCap, SQL, Visual Basic, Ruby, and ASP.NET. Additionally, data synchronization tools were developed to integrate data from these systems into the central server for reporting systems. Clinician, lab, and field data validation systems and methodologies are the main topics of this report. Our process development efforts across all domains were driven by the complexity of research project data collected in real-time data, online reporting, data synchronization, and ways for cleaning and verifying data. Consequently, we effectively used multi-data management systems, demonstrating the value of creative approaches in enhancing the consistency, accuracy, and reporting of trial data in a poor resource setting.

Keywords: data management, data collection, data cleaning, cluster-randomized trial

Procedia PDF Downloads 24
25792 Identifying Characteristics of Slum in Palembang Riverbanks Area, Indonesia

Authors: Rhaptyalyani Herno Della, Nyimas Septi Rika Putri, Rika Nabila

Abstract:

The growth of population and economic activities in urban areas needs support economic development, needs to be balanced with adequate environmental infrastructure development. Settlement can avoid from rundown condition and uninhabitable if the development of urban area accordance with healthy development. Identifying database of slum in this study reference to the Review of the Spatial Plan Development of Palembang City, Laws of Public Works Department about Technical Guidelines on the Quality Improvement Housing and Slum and Urban Spatial Global Report on Human Settlements 2003. A case study for identifying in Palembang riverbanks area are located in two districts; Ilir Timur I and Ilir Timur II. This study do the identification of slum areas based on several variables about physical and non physical aspect, then the result of identification are used to define a policy that can be used to improve the area.

Keywords: slum, riverbanks area, urban area, infrastructure

Procedia PDF Downloads 346
25791 Sustainability through Resilience: How Emergency Responders Cope with Stressors

Authors: Sophie Kroeling, Agnetha Schuchardt

Abstract:

Striving for sustainability brings a lot of challenges for different fields of interest, e. g. security or health concerns. In Germany, civil protection is predominantly carried out by emergency responders who perform essential tasks of civil protection. Based on theoretical concepts of different psychological stress theories this contribution focuses on the question, how the resilience of emergency responders can be improved. The goal is to identify resources and successful coping strategies that help to prevent and reduce negative outcomes during or after stressful events. The paper will present results from a qualitative analysis of semi-structured qualitative interviews with 20 emergency responders. These results provide insights into the complexity of coping processes (e. g. controlling the situation, downplaying perceived personal threats through humor) and show the diversity of stressors (like complexity of the disastrous situation, intrusive press and media, or lack of social support within the organization). Self-efficacy expectation was a very important resource for coping with stressful situations. The results served as a starting point for a quantitative survey (that was conducted in March 2017), the development of education and training tools for emergency responders and the improvement of critical incident stress management processes. First results from the quantitative study with more than 700 participants show that, e. g., the emergency responders use social coping within their private social network and also within their aid organization and that both are correlated to resilience. Moreover, missing information, bureaucratic problems and social conflicts within the organization are events that the majority of the participants considered very onerous. Further results from regression analysis will be presented. The proposed paper will combine findings from the qualitative study with the quantitative results, illustrating figures and correlations with respective statements from the interviews. At the end, suggestions for the improvement of the emergency responder’s resilience are given and it is discussed how this can make a contribution to strive for civil security and furthermore a sustainable development.

Keywords: civil security, emergency responders, stress, resilience, resources

Procedia PDF Downloads 143
25790 Tools for Transparency: The Role of Civic Technology in Increasing the Transparency of the State

Authors: Rebecca Rumbul

Abstract:

The operation of the state can often appear opaque to citizens wishing to access official information, who have to negotiate a path through numerous levels of bureaucracy rationalized through institutional policy to acquire what information they want. Even where individual states have 'Right to Information' legislation guaranteeing citizen access to information, public sector conformity to such laws vary between states and between state organizations. In response to such difficulties in bringing citizens and information together, many NGO's around the world have begun designing and hosting digital portals to facilitate the requesting and receiving of official information. How then, are these 'civic technology' tools affecting the behavior of the state? Are they increasing the transparency of the state? This study looked at 5 Right to Information civic technology sites in Chile, Uruguay, Ukraine, Hungary and the UK, and found that such sites were providing a useful platform to publish official information, but that states were still reluctant to comply with all requests. It concludes that civic technology can be an important tool in increasing the transparency of the state, but that the state must have an institutional commitment to information rights for this to be fully effective.

Keywords: digital, ICT, transparency, civic technology

Procedia PDF Downloads 661
25789 Finding Bicluster on Gene Expression Data of Lymphoma Based on Singular Value Decomposition and Hierarchical Clustering

Authors: Alhadi Bustaman, Soeganda Formalidin, Titin Siswantining

Abstract:

DNA microarray technology is used to analyze thousand gene expression data simultaneously and a very important task for drug development and test, function annotation, and cancer diagnosis. Various clustering methods have been used for analyzing gene expression data. However, when analyzing very large and heterogeneous collections of gene expression data, conventional clustering methods often cannot produce a satisfactory solution. Biclustering algorithm has been used as an alternative approach to identifying structures from gene expression data. In this paper, we introduce a transform technique based on singular value decomposition to identify normalized matrix of gene expression data followed by Mixed-Clustering algorithm and the Lift algorithm, inspired in the node-deletion and node-addition phases proposed by Cheng and Church based on Agglomerative Hierarchical Clustering (AHC). Experimental study on standard datasets demonstrated the effectiveness of the algorithm in gene expression data.

Keywords: agglomerative hierarchical clustering (AHC), biclustering, gene expression data, lymphoma, singular value decomposition (SVD)

Procedia PDF Downloads 274
25788 An Efficient Traceability Mechanism in the Audited Cloud Data Storage

Authors: Ramya P, Lino Abraham Varghese, S. Bose

Abstract:

By cloud storage services, the data can be stored in the cloud, and can be shared across multiple users. Due to the unexpected hardware/software failures and human errors, which make the data stored in the cloud be lost or corrupted easily it affected the integrity of data in cloud. Some mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. But public auditing on the integrity of shared data with the existing mechanisms will unavoidably reveal confidential information such as identity of the person, to public verifiers. Here a privacy-preserving mechanism is proposed to support public auditing on shared data stored in the cloud. It uses group signatures to compute verification metadata needed to audit the correctness of shared data. The identity of the signer on each block in shared data is kept confidential from public verifiers, who are easily verifying shared data integrity without retrieving the entire file. But on demand, the signer of the each block is reveal to the owner alone. Group private key is generated once by the owner in the static group, where as in the dynamic group, the group private key is change when the users revoke from the group. When the users leave from the group the already signed blocks are resigned by cloud service provider instead of owner is efficiently handled by efficient proxy re-signature scheme.

Keywords: data integrity, dynamic group, group signature, public auditing

Procedia PDF Downloads 391
25787 Application of Stabilized Polyaniline Microparticles for Better Protective Ability of Zinc Coatings

Authors: N. Boshkova, K. Kamburova, N. Tabakova, N. Boshkov, Ts. Radeva

Abstract:

Coatings based on polyaniline (PANI) can improve the resistance of steel against corrosion. In this work, the preparation of stable suspensions of colloidal PANI-SiO2 particles, suitable for obtaining of composite anticorrosive coating on steel, is described. Electrokinetic data as a function of pH are presented, showing that the zeta potentials of the PANI-SiO2 particles are governed primarily by the charged groups at the silica oxide surface. Electrosteric stabilization of the PANI-SiO2 particles’ suspension against aggregation is realized at pH>5.5 (EB form of PANI) by adsorption of positively charged polyelectrolyte molecules onto negatively charged PANI-SiO2 particles. The PANI-SiO2 particles are incorporated by electrodeposition into the metal matrix of zinc in order to obtain composite (hybrid) coatings. The latter are aimed to ensure sacrificial protection of steel mainly in aggressive media leading to local corrosion damages. The surface morphology of the composite zinc coatings is investigated with SEM. The influence of PANI-SiO2 particles on the cathodic and anodic processes occurring in the starting electrolyte for obtaining of the coatings is followed with cyclic voltammetry. The electrochemical and corrosion behavior is evaluated with potentiodynamic polarization curves and polarization resistance measurements. The beneficial effect of the stabilized PANI-SiO2 particles for the increased protective ability of the composites is commented and discussed.

Keywords: corrosion, polyaniline-silica particles, zinc, protective ability

Procedia PDF Downloads 171
25786 European Standardization in Nanotechnologies and Relation with International Work: The Standardization Can Help Industry and Regulators in Developing Safe Products

Authors: Patrice Conner

Abstract:

Nanotechnologies have enormous potential to contribute to human flourishing in responsible and sustainable ways. They are rapidly developing field of science, technology and innovation. As enabling technologies, their full scope of applications is potentially very wide. Major implications are expected in many areas, e.g. healthcare, information and communication technologies, energy production and storage, materials science/chemical engineering, manufacturing, environmental protection, consumer products, etc. However, nanotechnologies are unlikely to realize their full potential unless their associated societal and ethical issues are adequately attended. Namely nanotechnologies and nanoparticles may expose humans and the environment to new health risks, possibly involving quite different mechanisms of interference with the physiology of human and environmental species. One of the building blocks of the ‘safe, integrated and responsible’ approach is standardization. Both the Economic and Social Committee and the European Parliament have highlighted the importance to be attached to standardization as a means to accompany the introduction on the market of nanotechnologies and nanomaterials, and a means to facilitate the implementation of regulation. ISO and CEN have respectively started in 2005 and 2006 to deal with selected topics related to this emerging and enabling technology. In the beginning of 2010, EC DG ‘Enterprise and Industry’ addressed the mandate M/461 to CEN, CENELEC and ETSI for standardization activities regarding nanotechnologies and nanomaterials. Thus CEN/TC 352 ‘Nanotechnologies’ has been asked to take the leadership for the coordination in the execution of M/461 (46 topics to be standardized) and to contact relevant European and International Technical committees and interested stakeholders as appropriate (56 structures have been identified). Prior requests from M/461 deal with characterization and exposure of nanomaterials and any matters related to Health, Safety and Environment. Answers will be given to: - What are the structures and how they work? - Where are we right now and how work is going from now onwards? - How CEN’s work and targets deal with and interact with global matters in this field?

Keywords: characterization, environmental protection, exposure, health risks, nanotechnologies, responsible and sustainable ways, safety

Procedia PDF Downloads 188
25785 Emotional and Embodied Knowledge and Responses

Authors: Salman Khokhar

Abstract:

The geopolitical landscape in Pakistan has become shrouded with suspicion between the state and the Ahmadiyya Muslim Community. The study argues that the social mobility of the community has become severely compromised, especially after the inception of the blasphemy laws and their subsequent enhancements in later years. The securitization of the community has ensured that the daily lives of Ahmadi Muslims have become severely restricted as their integration and assimilation into society become defined through their religious identity and beliefs. Consequently, performing congregational prayers or engaging in any other community activity is carried out secretly as the repercussions of such actions may lead to incarceration or, in some cases, even more extreme apprehension measures. The securitization of Ahmadis, and their daily lives are severely curtailed in Pakistan; however, due to transnational approaches, the community must implement specific measures to ensure the safety of its members, even in the West. The eyes of suspicion are always on the activities of the Ahmadiyya Muslim Community, and the community’s headquarters in Rabwah is always being viewed with suspicious lenses. The study considers how secrecy has enveloped the everyday life of the Ahmadi Muslim community and how it embodies characteristics which we thought had come to an end many years ago.

Keywords: freedom, ideology, Islam, persecution

Procedia PDF Downloads 122
25784 Resilient Machine Learning in the Nuclear Industry: Crack Detection as a Case Study

Authors: Anita Khadka, Gregory Epiphaniou, Carsten Maple

Abstract:

There is a dramatic surge in the adoption of machine learning (ML) techniques in many areas, including the nuclear industry (such as fault diagnosis and fuel management in nuclear power plants), autonomous systems (including self-driving vehicles), space systems (space debris recovery, for example), medical surgery, network intrusion detection, malware detection, to name a few. With the application of learning methods in such diverse domains, artificial intelligence (AI) has become a part of everyday modern human life. To date, the predominant focus has been on developing underpinning ML algorithms that can improve accuracy, while factors such as resiliency and robustness of algorithms have been largely overlooked. If an adversarial attack is able to compromise the learning method or data, the consequences can be fatal, especially but not exclusively in safety-critical applications. In this paper, we present an in-depth analysis of five adversarial attacks and three defence methods on a crack detection ML model. Our analysis shows that it can be dangerous to adopt machine learning techniques in security-critical areas such as the nuclear industry without rigorous testing since they may be vulnerable to adversarial attacks. While common defence methods can effectively defend against different attacks, none of the three considered can provide protection against all five adversarial attacks analysed.

Keywords: adversarial machine learning, attacks, defences, nuclear industry, crack detection

Procedia PDF Downloads 157
25783 Securing Health Monitoring in Internet of Things with Blockchain-Based Proxy Re-Encryption

Authors: Jerlin George, R. Chitra

Abstract:

The devices with sensors that can monitor your temperature, heart rate, and other vital signs and link to the internet, known as the Internet of Things (IoT), have completely transformed the way we control health. Providing real-time health data, these sensors improve diagnostics and treatment outcomes. Security and privacy matters when IoT comes into play in healthcare. Cyberattacks on centralized database systems are also a problem. To solve these challenges, the study uses blockchain technology coupled with proxy re-encryption to secure health data. ThingSpeak IoT cloud analyzes the collected data and turns them into blockchain transactions which are safely kept on the DriveHQ cloud. Transparency and data integrity are ensured by blockchain, and secure data sharing among authorized users is made possible by proxy re-encryption. This results in a health monitoring system that preserves the accuracy and confidentiality of data while reducing the safety risks of IoT-driven healthcare applications.

Keywords: internet of things, healthcare, sensors, electronic health records, blockchain, proxy re-encryption, data privacy, data security

Procedia PDF Downloads 13
25782 Exploring Legal Liabilities of Mining Companies for Human Rights Abuses: Case Study of Mongolian Mine

Authors: Azzaya Enkhjargal

Abstract:

Context: The mining industry has a long history of human rights abuses, including forced labor, environmental pollution, and displacement of communities. In recent years, there has been growing international pressure to hold mining companies accountable for these abuses. Research Aim: This study explores the legal liabilities of mining companies for human rights abuses. The study specifically examines the case of Erdenet Mining Corporation (EMC), a large mining company in Mongolia that has been accused of human rights abuses. Methodology: The study used a mixed-methods approach, which included a review of legal literature, interviews with community members and NGOs, and a case study of EMC. Findings: The study found that mining companies can be held liable for human rights abuses under a variety of regulatory frameworks, including soft law and self-regulatory instruments in the mining industry, international law, national law, and corporate law. The study also found that there are a number of challenges to holding mining companies accountable for human rights abuses, including the lack of effective enforcement mechanisms and the difficulty of proving causation. Theoretical Importance: The study contributes to the growing body of literature on the legal liabilities of mining companies for human rights abuses. The study also provides insights into the challenges of holding mining companies accountable for human rights abuses. Data Collection: The data for the study was collected through a variety of methods, including a review of legal literature, interviews with community members and NGOs, and a case study of EMC. Analysis Procedures: The data was analyzed using a variety of methods, including content analysis, thematic analysis, and case study analysis. Conclusion: The study concludes that mining companies can be held liable for human rights abuses under a variety of legal and regulatory frameworks. There are positive developments in ensuring greater accountability and protection of affected communities and the environment in countries with a strong economy. Regrettably, access to avenues of redress is reasonably low in less developed countries, where the governments have not implemented a robust mechanism to enforce liability requirements in the mining industry. The study recommends that governments and mining companies take more ambitious steps to enhance corporate accountability.

Keywords: human rights, human rights abuses, ESG, litigation, Erdenet Mining Corporation, corporate social responsibility, soft law, self-regulation, mining industry, parent company liability, sustainability, environment, UN

Procedia PDF Downloads 80
25781 Rodriguez Diego, Del Valle Martin, Hargreaves Matias, Riveros Jose Luis

Authors: Nathainail Bashir, Neil Anderson

Abstract:

The objective of this study site was to investigate the current state of the practice with regards to karst detection methods and recommend the best method and pattern of arrays to acquire the desire results. Proper site investigation in karst prone regions is extremely valuable in determining the location of possible voids. Two geophysical techniques were employed: multichannel analysis of surface waves (MASW) and electric resistivity tomography (ERT).The MASW data was acquired at each test location using different array lengths and different array orientations (to increase the probability of getting interpretable data in karst terrain). The ERT data were acquired using a dipole-dipole array consisting of 168 electrodes. The MASW data was interpreted (re: estimated depth to physical top of rock) and used to constrain and verify the interpretation of the ERT data. The ERT data indicates poorer quality MASW data were acquired in areas where there was significant local variation in the depth to top of rock.

Keywords: dipole-dipole, ERT, Karst terrains, MASW

Procedia PDF Downloads 314
25780 A Fuzzy Inference Tool for Assessing Cancer Risk from Radiation Exposure

Authors: Bouharati Lokman, Bouharati Imen, Bouharati Khaoula, Bouharati Oussama, Bouharati Saddek

Abstract:

Ionizing radiation exposure is an established cancer risk factor. Compared to other common environmental carcinogens, it is relatively easy to determine organ-specific radiation dose and, as a result, radiation dose-response relationships tend to be highly quantified. Nevertheless, there can be considerable uncertainty about questions of radiation-related cancer risk as they apply to risk protection and public policy, and the interpretations of interested parties can differ from one person to another. Examples of tools used in the analysis of the risk of developing cancer due to radiation are characterized by uncertainty. These uncertainties are related to the history of exposure and different assumptions involved in the calculation. We believe that the results of statistical calculations are characterized by uncertainty and imprecision. Having regard to the physiological variation from one person to another. In this study, we develop a tool based on fuzzy logic inference. As fuzzy logic deals with imprecise and uncertain, its application in this area is adequate. We propose a fuzzy system with three input variables (age, sex and body attainable cancer). The output variable expresses the risk of infringement rate of each organ. A base rule is established from recorded actual data. After successful simulation, this will instantly predict the risk of infringement rate of each body following chronic exposure to 0.1 Gy.

Keywords: radiation exposure, cancer, modeling, fuzzy logic

Procedia PDF Downloads 311
25779 Data Science in Military Decision-Making: A Semi-Systematic Literature Review

Authors: H. W. Meerveld, R. H. A. Lindelauf

Abstract:

In contemporary warfare, data science is crucial for the military in achieving information superiority. Yet, to the authors’ knowledge, no extensive literature survey on data science in military decision-making has been conducted so far. In this study, 156 peer-reviewed articles were analysed through an integrative, semi-systematic literature review to gain an overview of the topic. The study examined to what extent literature is focussed on the opportunities or risks of data science in military decision-making, differentiated per level of war (i.e. strategic, operational, and tactical level). A relatively large focus on the risks of data science was observed in social science literature, implying that political and military policymakers are disproportionally influenced by a pessimistic view on the application of data science in the military domain. The perceived risks of data science are, however, hardly addressed in formal science literature. This means that the concerns on the military application of data science are not addressed to the audience that can actually develop and enhance data science models and algorithms. Cross-disciplinary research on both the opportunities and risks of military data science can address the observed research gaps. Considering the levels of war, relatively low attention for the operational level compared to the other two levels was observed, suggesting a research gap with reference to military operational data science. Opportunities for military data science mostly arise at the tactical level. On the contrary, studies examining strategic issues mostly emphasise the risks of military data science. Consequently, domain-specific requirements for military strategic data science applications are hardly expressed. Lacking such applications may ultimately lead to a suboptimal strategic decision in today’s warfare.

Keywords: data science, decision-making, information superiority, literature review, military

Procedia PDF Downloads 165
25778 Ratification of the United Nations Convention for the Promotion and Protection of Their Human Rights and the Paradoxes of the Discriminatory Right to Acquire the Status of Persons with Disabilities in Cameroon

Authors: Dakeyi Athanase

Abstract:

The ratification of an international human rights legal instrument provides signatory States with an opportunity to assume a set of obligations and rights for the benefit of their citizens, offering increased possibilities, opportunities, and means to access an improved quality of life – to be, to appear, and to become. Developed nations typically experience cultural, political, social, economic, legal, and regulatory transformations in response to this transition. In a methodologically proactive approach, mechanisms undergo a visible and comprehensible process of qualitative and quantitative change. Conversely, in nations undergoing development, the response to such ratification varies. Some demonstrate positive policy changes, while others remain stagnant or regress. Cameroon falls into the second category, despite efforts, as it legally prohibits 50% of its population with disabilities from acquiring the status of a person with a disability. The overarching goal of this communication is to highlight these deficiencies and their detrimental effects on various aspects of life, fostering awareness among beneficiaries and advocating for more inclusive transformations in the country. Our project employs a popular and participatory methodological approach by involving beneficiaries and their organizations in its preparation. It is also inclusive, representing the diversity of disabilities and engaging natural and legal persons from various backgrounds. Active consultations occur at all levels of the activities. Anticipated outcomes include raising awareness globally among nations, international cooperation organizations, NGOs, and other inclusive development actors. We seek their support for local advocacy efforts to fully implement the United Nations Convention on the Rights of Persons with Disabilities (CRPD). Concurrently, we hope they express solidarity with the victims in Cameroon who have been left behind and recommend legal reforms to align domestic and international legislation with the promotion and protection of disability rights.

Keywords: droit, convention, handicap, discrimination, participation, inclusion

Procedia PDF Downloads 51
25777 Wavelets Contribution on Textual Data Analysis

Authors: Habiba Ben Abdessalem

Abstract:

The emergence of giant set of textual data was the push that has encouraged researchers to invest in this field. The purpose of textual data analysis methods is to facilitate access to such type of data by providing various graphic visualizations. Applying these methods requires a corpus pretreatment step, whose standards are set according to the objective of the problem studied. This step determines the forms list contained in contingency table by keeping only those information carriers. This step may, however, lead to noisy contingency tables, so the use of wavelet denoising function. The validity of the proposed approach is tested on a text database that offers economic and political events in Tunisia for a well definite period.

Keywords: textual data, wavelet, denoising, contingency table

Procedia PDF Downloads 276
25776 Customer Churn Analysis in Telecommunication Industry Using Data Mining Approach

Authors: Burcu Oralhan, Zeki Oralhan, Nilsun Sariyer, Kumru Uyar

Abstract:

Data mining has been becoming more and more important and a wide range of applications in recent years. Data mining is the process of find hidden and unknown patterns in big data. One of the applied fields of data mining is Customer Relationship Management. Understanding the relationships between products and customers is crucial for every business. Customer Relationship Management is an approach to focus on customer relationship development, retention and increase on customer satisfaction. In this study, we made an application of a data mining methods in telecommunication customer relationship management side. This study aims to determine the customers profile who likely to leave the system, develop marketing strategies, and customized campaigns for customers. Data are clustered by applying classification techniques for used to determine the churners. As a result of this study, we will obtain knowledge from international telecommunication industry. We will contribute to the understanding and development of this subject in Customer Relationship Management.

Keywords: customer churn analysis, customer relationship management, data mining, telecommunication industry

Procedia PDF Downloads 316
25775 Freight Forwarders’ Liability: A Need for Revival of Unidroit Draft Convention after Six Decades

Authors: Mojtaba Eshraghi Arani

Abstract:

The freight forwarders, who are known as the Architect of Transportation, play a vital role in the supply chain management. The package of various services which they provide has made the legal nature of freight forwarders very controversial, so that they might be qualified once as principal or carrier and, on other occasions, as agent of the shipper as the case may be. They could even be involved in the transportation process as the agent of shipping line, which makes the situation much more complicated. The courts in all countries have long had trouble in distinguishing the “forwarder as agent” from “forwarder as principal” (as it is outstanding in the prominent case of “Vastfame Camera Ltd v Birkart Globistics Ltd And Others” 2005, Hong Kong). It is not fully known that in the case of a claim against the forwarder, what particular parameter would be used by the judge among multiple, and sometimes contradictory, tests for determining the scope of the forwarder liability. In particular, every country has its own legal parameters for qualifying the freight forwarders that is completely different from others, as it is the case in France in comparison with Germany and England. The unpredictability of the courts’ decisions in this regard has provided the freight forwarders with the opportunity to impose any limitation or exception of liability while pretending to play the role of a principal, consequently making the cargo interests incur ever-increasing damage. The transportation industry needs to remove such uncertainty by unifying national laws governing freight forwarders liability. A long time ago, in 1967, The International Institute for Unification of Private Law (UNIDROIT) prepared a draft convention called “Draft Convention on Contract of Agency for Forwarding Agents Relating to International Carriage of Goods” (hereinafter called “UNIDROIT draft convention”). The UNIDROIT draft convention provided a clear and certain framework for the liability of freight forwarder in each capacity as agent or carrier, but it failed to transform to a convention, and eventually, it was consigned to oblivion. Today, after nearly 6 decades from that era, the necessity of such convention can be felt apparently. However, one might reason that the same grounds, in particular, the resistance by forwarders’ association, FIATA, exist yet, and thus it is not logical to revive a forgotten draft convention after such long period of time. It is argued in this article that the main reason for resisting the UNIDROIT draft convention in the past was pending efforts for developing the “1980 United Nation Convention on International Multimodal Transport of Goods”. However, the latter convention failed to become in force on due time in a way that there was no new accession since 1996, as a result of which the UNIDROIT draft convention must be revived strongly and immediately submitted to the relevant diplomatic conference. A qualitative method with the concept of interpretation of data collection has been used in this manuscript. The source of the data is the analysis of international conventions and cases.

Keywords: freight forwarder, revival, agent, principal, uidroit, draft convention

Procedia PDF Downloads 73
25774 On Pooling Different Levels of Data in Estimating Parameters of Continuous Meta-Analysis

Authors: N. R. N. Idris, S. Baharom

Abstract:

A meta-analysis may be performed using aggregate data (AD) or an individual patient data (IPD). In practice, studies may be available at both IPD and AD level. In this situation, both the IPD and AD should be utilised in order to maximize the available information. Statistical advantages of combining the studies from different level have not been fully explored. This study aims to quantify the statistical benefits of including available IPD when conducting a conventional summary-level meta-analysis. Simulated meta-analysis were used to assess the influence of the levels of data on overall meta-analysis estimates based on IPD-only, AD-only and the combination of IPD and AD (mixed data, MD), under different study scenario. The percentage relative bias (PRB), root mean-square-error (RMSE) and coverage probability were used to assess the efficiency of the overall estimates. The results demonstrate that available IPD should always be included in a conventional meta-analysis using summary level data as they would significantly increased the accuracy of the estimates. On the other hand, if more than 80% of the available data are at IPD level, including the AD does not provide significant differences in terms of accuracy of the estimates. Additionally, combining the IPD and AD has moderating effects on the biasness of the estimates of the treatment effects as the IPD tends to overestimate the treatment effects, while the AD has the tendency to produce underestimated effect estimates. These results may provide some guide in deciding if significant benefit is gained by pooling the two levels of data when conducting meta-analysis.

Keywords: aggregate data, combined-level data, individual patient data, meta-analysis

Procedia PDF Downloads 373
25773 Wearable System for Prolonged Cooling and Dehumidifying of PPE in Hot Environments

Authors: Lun Lou, Jintu Fan

Abstract:

While personal protective equipment (PPE) prevents the healthcare personnel from exposing to harmful surroundings, it creates a barrier to the dissipation of body heat and perspiration, leading to severe heat stress during prolonged exposure, especially in hot environments. It has been found that most of the existed personal cooling strategies have limitations in achieving effective cooling performance with long duration and lightweight. This work aimed to develop a lightweight (<1.0 kg) and less expensive wearable air cooling and dehumidifying system (WCDS) that can be applied underneath the protective clothing and provide 50W mean cooling power for more than 5 hours at 35°C environmental temperature without compromising the protection of PPE. For the WCDS, blowers will be used to activate an internal air circulation inside the clothing microclimate, which doesn't interfere with the protection of PPE. An air cooling and dehumidifying chamber (ACMR) with a specific design will be developed to reduce the air temperature and humidity inside the protective clothing. Then the cooled and dried air will be supplied to upper chest and back areas through a branching tubing system for personal cooling. A detachable ice cooling unit will be applied from the outside of the PPE to extract heat from the clothing microclimate. This combination allows for convenient replacement of the cooling unit to refresh the cooling effect, which can realize a continuous cooling function without taking off the PPE or adding too much weight. A preliminary thermal manikin test showed that the WCDS was able to reduce the microclimate temperature inside the PPE averagely by about 8°C for 60 minutes when the environmental temperature was 28.0 °C and 33.5 °C, respectively. Replacing the ice cooling unit every hour can maintain this cooling effect, while the longest operation duration is determined by the battery of the blowers, which can last for about 6 hours. This unique design is especially helpful for the PPE users, such as health care workers in infectious and hot environments when continuous cooling and dehumidifying are needed, but the change of protective clothing may increase the risk of infection. The new WCDS will not only improve the thermal comfort of PPE users but can also extend their safe working duration.

Keywords: personal thermal management, heat stress, ppe, health care workers, wearable device

Procedia PDF Downloads 77