Search results for: priority rules
412 Nature of the Prohibition of Discrimination on Grounds of Sexual Orientation in EU Law
Authors: Anna Pudlo
Abstract:
The EU law encompasses many supranational legal systems (EU law, ECHR, international public law and constitutional traditions common to the Member States) which guarantee the protection of fundamental rights, with partly overlapping scopes of applicability, various principles of interpretation of legal norms and a different hierarchy. In EU law, the prohibition of discrimination on grounds of sexual orientation originates from both the primary and secondary EU legislation. At present, the prohibition is considered to be a fundamental right in pursuance of Article 21 of the Charter, but the Court has not yet determined whether it is a right or a principle within the meaning of the Charter. Similarly, the Court has not deemed this criterion to be a general principle of EU law. The personal and materials scope of the prohibition of discrimination on grounds of sexual orientation based on Article 21 of the Charter requires each time to be specified in another legal act of the EU in accordance with Article 51 of the Charter. The effect of the prohibition of discrimination on grounds of sexual orientation understood as above will be two-fold, for the States and for the Union. On the one hand, one may refer to the legal instruments of review of EU law enforcement by a Member State laid down in the Treaties. On the other hand, EU law does not provide for the right to individual petition. Therefore, it is the duty of the domestic courts to protect the right of a person not to be discriminated on grounds of sexual orientation in line with the national procedural rules, within the limits and in accordance with the principles set out in EU law, in particular in Directive 2000/78. The development of the principle of non-discrimination in the Court’s case-law gives rise to certain doubts as to its applicability, namely whether the principle as the general principle of EU law may be granted an autonomous character, with respect to the applicability to matters not included in the personal or material scope of the Directives, although within the EU’s competence. Moreover, both the doctrine and the opinions of the Advocates-General have called for the general competence of CJEU with regard to fundamental rights which, however, might lead to a violation of the principle of separation of competence. The aim of this paper is to answer the question what is the nature of the prohibition of discrimination on grounds of sexual orientation in EU law (a general principle in EU law, or a principle or right under the Charter’s terminology). Therefore, the paper focuses on the nature of Article 21 of the Charter (a right or a principle) and the scope (personal and material) of the prohibition of discrimination based on sexual orientation in EU law as well as its effect (vertical or horizontal). The study has included the provisions of EU law together with the relevant CJEU case-law.Keywords: EU law, EU principles, non-discrimination in EU law, Charter of the Fundamental Rights
Procedia PDF Downloads 246411 Assessment of Intern Students' Attitudes towards Medical Errors
Authors: Nilgün Katrancı, Pınar Göv
Abstract:
With the acceleration and assessment of quality and patient safety works in healthcare services in the 21st century, activities to reduce errors have gained importance. The prevention and reduction of unintended consequences related to healthcare services and errors made during the delivery of healthcare services can be achieved by understanding the causes of the errors. Communication is the basic reason most frequently seen in such cases. Nurses who communicate with patients more closely and for longer time play a more critical role in ensuring patient safety compared to other healthcare professionals. To reduce the risk of medical errors and increase the quality of care, it is important to raise the awareness of nurses about patient safety in training period. This descriptive study was conducted between February 2017 and May 2017 to assess intern students' attitudes towards and knowledge of patient safety and medical errors. The target population of the study consists of intern students at the Faculty of Nursing in Gaziantep University (N=180). The study did not apply any sample selection method, and the research group consisted of 90 female and 37 male senior students who were available and accepted to take part in the study (N=127). The study used personal information form and medical error attitude scale to collect data. The medical error attitude scale consists of 16 items and 3 sub-dimensions. The most frequently seen medical error in the clinics the interns worked at was found as ‘Failure to comply with asepsis rules’ with a rate of 67,7%. The most frequent case among reasons for not disclosing an error is ‘noticing and correcting the error before affecting the patient’ with the rate of 70,9%. The most frequently expressed implications of disclosing a serious error for the intern students participating in the study are ‘harming patient trust (78%)’ and ‘possibility of overreaction by patient (62,2%)’. According to the results of the study, the awareness of the students about the importance of medical errors and error reporting was found high (3,48 ± 0,49). Consequently, it is important to assess and positively improve the attitudes of nurses and other healthcare professionals towards medical errors for the determination of causes of medical errors and their prevention.Keywords: healthcare service, intern student, medical error, patient safety
Procedia PDF Downloads 203410 Responsibility of International Financial Institutions for Harmful Environmental Consequences Arising from Their Development Interventions
Authors: Reham Barakat
Abstract:
Over the last few decades, the influence of International Financial Institutions (IFIs), especially the World Bank (WB), has significantly increased. Since the early 1980s, IFIs have assumed greater role, especially in developing countries; their total lending has dramatically increased, affecting billions of people in their Borrower States. Though the purpose of the development assistance provided by IFIs is to alleviate poverty and promote economic and social development in their member countries, IFIs have been subject to massive criticism by civil society institutions, international NGOs and local communities for the harmful environmental, social and economic impacts resulting from their development interventions in borrower countries, such as deforestation, displacement of indigenous peoples, and unemployment. While the role of IFIs has expanded over time, affecting billions of people, their accountability mechanisms remained behind and were criticized for lacking sufficient independency and enforceability. The serious adverse environmental impacts of the World Bank’s funded projects, along with their weak accountability mechanisms, raises the question of 'To what extent IFIs should be held internationally responsible for the harmful environmental consequences arising from their development interventions?'. This paper argues that IFIs are legally responsible for the harmful environmental consequences arising from their development interventions. The study (i) identifies the applicable laws and relevant primary rules from which the international environmental obligations of IFIs towards their borrower countries are derived (ii) assesses the World Bank’s compliance to the principles of the International Environmental Law including the precautionary principle, the polluter pays principle, and the principle of Good-Neighborliness, (iii) assesses the World Bank’s current internal accountability mechanisms for harmful environmental impacts resulting from the World Bank’s funded projects, and finally (iv) identifies the appropriate dispute settlement mechanisms to which states and non-state actors could raise their claims against IFIs for harmful environmental consequences arising from their interventions.Keywords: international environmental law, international financial institutions, international responsibility, world bank, environmental and social safeguards
Procedia PDF Downloads 171409 Reducing Unnecessary CT Aorta Scans in the Emergency Department
Authors: Ibrahim Abouelkhir
Abstract:
Background: Prior to this project, the number of CT aorta requests from our Emergency Department (ED) was reported by the radiology department to be high with a low positive event rate: only 1- 2% of CT aortas performed were positive for acute aortic syndrome. This trend raised concerns about the time required to process and report these scans, potentially impacting the timely reporting of other high-priority imaging, such as trauma-related scans. Other harms identified were unnecessary radiation, patients spending longer in ED contributing to overcrowding, and, most importantly, the patient not getting the right care the first time. The radiology department also raised the problem of reporting bias because they expected our CT aortas to be normal. Aim: The main aim of this project was to reduce the number of unnecessary CT aortas requested, which would be shown by 1. Number of CT aortas requested and 2. Positive event rate. Methodology: This was a quality improvement project carried out in the ED at Frimley Park Hospital, UK. Starting from 1 st January 2024, we recorded the number of days required to reach 35 CT aorta requests. We looked at all patients presenting to the ED over the age of 16 for whom a CT aorta was requested by the ED team. We looked at how many of these scans were positive for acute aortic syndrome. The intervention was a change in practice: all CT aortas should be approved by an ED consultant or ST4+ registrar (5th April 2024). We then reviewed the number of days it took to reach a total of 35 CT aorta requests following the intervention and again reviewed how many were positive. Results: Prior to the intervention, 35 CT Aorta scans were performed over a 20-day period. Following the implementation of the ED senior doctor vetting process, the same number of CT Aorta scan requests was observed over 50 days - more than twice the pre-intervention period. This indicates a significant reduction in the rate of CT Aorta scans being requested. During the pre-intervention phase, there were two positive cases of acute aortic syndrome. In the post-intervention period, there were zero. Conclusion: The mandatory review of CT Aorta scan requested by the ED consultant effectively reduced the number of scans requested. However, this intervention did not lead to an increase in positive scan results. We noted that post-intervention, approximately 50% of scans had been approved by registrar-grade doctors and, only 50% had been approved by ED consultants, and the majority were not in-person reviews. We wonder if restricting the approval to consultant grade only might improve the results, and furthermore, in person reviews should be the gold standard.Keywords: quality improvement project, CT aorta scans, emergency department, radiology department, aortic dissection, scan request vetting, clinical outcomes, imaging efficiency
Procedia PDF Downloads 10408 Ethical Framework in Organ Transplantation and the Priority Line between Law and Life
Authors: Abel Sichinava
Abstract:
The need for organ transplantation is vigorously increasing worldwide. The numbers on the waiting lists grow, but the number of donors is not keeping up with the demand even though there is a legal possibility of decreasing the gap between the demand and supply. Most countries around the globe are facing an organ donation problem (living or deceased); however, the extent of the problem differs based on how well developed a country is. The determining issues seem to be centered on how aware the society is about the concept of organ donation, as well as cultural and religious factors. Even if people are aware of the benefits of organ donation, they may still have fears that keep them from being in complete agreement with the idea. Some believe that in the case of deceased organ donation: “the brain dead human body may recover from its injuries” or “the sick might get less appropriate treatment if doctors know they are potential donors.” In the case of living organ donations, people sometimes fear that after the donation, “it might reduce work efficiency, cause health deterioration or even death.” Another major obstacle in the organ shortage is a lack of a well developed ethical framework. In reality, there are truly an immense number of people on the waiting list, and they have only two options in order to receive a suitable organ. First is the legal way, which is to wait until their turn. Sadly, numerous patients die while on the waiting list before an appropriate organ becomes available for transplant. The second option is an illegal way: seeking an organ in a country where they can possibly get. To tell the truth, in people’s desire to live, they may choose the second option if their resources are sufficient. This process automatically involves “organ brokers.” These are people who get organs from vulnerable poor people by force or betrayal. As mentioned earlier, the high demand and low supply leads to human trafficking. The subject of the study was the large number of society from different backgrounds of their belief, culture, nationality, level of education, socio-economic status. The great majority of them interviewed online used “Google Drive Survey” and others in person. All statistics and information gathered from trusted sources annotated in the reference list and above mentioned considerable testimonies shared by the respondents are the fundamental evidence of a lack of the well developed ethical framework. In conclusion, the continuously increasing number of people on the waiting list and an irrelevant ethical framework, lead people to commit to atrocious, dehumanizing crimes. Therefore, world society should be equally obligated to think carefully and make vital decisions together for the advancement of an organ donations and its ethical framework.Keywords: donation, ethical framwork, organ, transplant
Procedia PDF Downloads 150407 Computational Linguistic Implications of Gender Bias: Machines Reflect Misogyny in Society
Authors: Irene Yi
Abstract:
Machine learning, natural language processing, and neural network models of language are becoming more and more prevalent in the fields of technology and linguistics today. Training data for machines are at best, large corpora of human literature and at worst, a reflection of the ugliness in society. Computational linguistics is a growing field dealing with such issues of data collection for technological development. Machines have been trained on millions of human books, only to find that in the course of human history, derogatory and sexist adjectives are used significantly more frequently when describing females in history and literature than when describing males. This is extremely problematic, both as training data, and as the outcome of natural language processing. As machines start to handle more responsibilities, it is crucial to ensure that they do not take with them historical sexist and misogynistic notions. This paper gathers data and algorithms from neural network models of language having to deal with syntax, semantics, sociolinguistics, and text classification. Computational analysis on such linguistic data is used to find patterns of misogyny. Results are significant in showing the existing intentional and unintentional misogynistic notions used to train machines, as well as in developing better technologies that take into account the semantics and syntax of text to be more mindful and reflect gender equality. Further, this paper deals with the idea of non-binary gender pronouns and how machines can process these pronouns correctly, given its semantic and syntactic context. This paper also delves into the implications of gendered grammar and its effect, cross-linguistically, on natural language processing. Languages such as French or Spanish not only have rigid gendered grammar rules, but also historically patriarchal societies. The progression of society comes hand in hand with not only its language, but how machines process those natural languages. These ideas are all extremely vital to the development of natural language models in technology, and they must be taken into account immediately.Keywords: computational analysis, gendered grammar, misogynistic language, neural networks
Procedia PDF Downloads 119406 The Influence of Characteristics of Waste Water on Properties of Sewage Sludge
Authors: Catalina Iticescu, Lucian P. Georgescu, Mihaela Timofti, Gabriel Murariu, Catalina Topa
Abstract:
In the field of environmental protection in the EU and also in Romania, strict and clear rules are imposed that are respected. Among those, mandatory municipal wastewater treatment is included. Our study involved Municipal Wastewater Treatment Plant (MWWTP) of Galati. MWWTP began its activity by the end of 2011 and technology is one of the most modern used in the EU. Moreover, to our knowledge, it is the first technology of this kind used in the region. Until commissioning, municipal wastewater was discharged directly into the Danube without any treatment. Besides the benefits of depollution, a new problem has arisen: the accumulation of increasingly large sewage sludge. Therefore, it is extremely important to find economically feasible and environmentally friendly solutions. One of the most feasible methods of disposing of sewage sludge is their use on agricultural land. Sewage sludge can be used in agriculture if monitored in terms of physicochemical properties (pH, nutrients, heavy metals, etc.), in order not to contribute to pollution in soils and not to affect chemical and biological balances, which are relatively fragile. In this paper, 16 physico-chemical parameters were monitored. Experimental testings were realised on waste water samples, sewage sludge results and treated water samples. Testing was conducted with electrochemichal methods (pH, conductivity, TDS); parameters N-total (mg/L), P-total (mg/L), N-NH4 (mg/L), N-NO2 (mg/L), N-NO3 (mg/L), Fe-total (mg/L), Cr-total (mg/L), Cu (mg/L), Zn (mg/L), Cd (mg/L), Pb (mg/L), Ni (mg/L) were determined by spectrophotometric methods using a spectrophotometer NOVA 60 and specific kits. Analyzing the results, we concluded that Sewage sludges, although containing heavy metals, are in small quantities and will not affect the land on which they will be deposited. Also, the amount of nutrients contained are appreciable. These features indicate that the sludge can be safely used in agriculture, with the advantage that they represent a cheap fertilizer. Acknowledgement: This work was supported by a grant of the Romanian National Authority for Scientific Research and Innovation – UEFISCDI, PNCDI III project, 79BG/2017, Efficiency of the technological process for obtaining of sewage sludge usable in agriculture, Efficient.Keywords: municipal wastewater, physico-chemical properties, sewage sludge, technology
Procedia PDF Downloads 209405 Pareto Optimal Material Allocation Mechanism
Authors: Peter Egri, Tamas Kis
Abstract:
Scheduling problems have been studied by the algorithmic mechanism design research from the beginning. This paper is focusing on a practically important, but theoretically rather neglected field: the project scheduling problem where the jobs connected by precedence constraints compete for various nonrenewable resources, such as materials. Although the centralized problem can be solved in polynomial-time by applying the algorithm of Carlier and Rinnooy Kan from the Eighties, obtaining materials in a decentralized environment is usually far from optimal. It can be observed in practical production scheduling situations that project managers tend to cache the required materials as soon as possible in order to avoid later delays due to material shortages. This greedy practice usually leads both to excess stocks for some projects and materials, and simultaneously, to shortages for others. The aim of this study is to develop a model for the material allocation problem of a production plant, where a central decision maker—the inventory—should assign the resources arriving at different points in time to the jobs. Since the actual due dates are not known by the inventory, the mechanism design approach is applied with the projects as the self-interested agents. The goal of the mechanism is to elicit the required information and allocate the available materials such that it minimizes the maximal tardiness among the projects. It is assumed that except the due dates, the inventory is familiar with every other parameters of the problem. A further requirement is that due to practical considerations monetary transfer is not allowed. Therefore a mechanism without money is sought which excludes some widely applied solutions such as the Vickrey–Clarke–Groves scheme. In this work, a type of Serial Dictatorship Mechanism (SDM) is presented for the studied problem, including a polynomial-time algorithm for computing the material allocation. The resulted mechanism is both truthful and Pareto optimal. Thus the randomization over the possible priority orderings of the projects results in a universally truthful and Pareto optimal randomized mechanism. However, it is shown that in contrast to problems like the many-to-many matching market, not every Pareto optimal solution can be generated with an SDM. In addition, no performance guarantee can be given compared to the optimal solution, therefore this approximation characteristic is investigated with experimental study. All in all, the current work studies a practically relevant scheduling problem and presents a novel truthful material allocation mechanism which eliminates the potential benefit of the greedy behavior that negatively influences the outcome. The resulted allocation is also shown to be Pareto optimal, which is the most widely used criteria describing a necessary condition for a reasonable solution.Keywords: material allocation, mechanism without money, polynomial-time mechanism, project scheduling
Procedia PDF Downloads 333404 The Effect of Artificial Intelligence on Banking Development and Progress
Authors: Mina Malak Hanna Saad
Abstract:
New strategies for supplying banking services to the customer have been brought, which include online banking. Banks have begun to recall electronic banking (e-banking) as a manner to replace some conventional department features by means of the usage of the internet as a brand-new distribution channel. A few clients have at least one account at multiple banks and get admission to those debts through online banking. To test their present-day internet worth, customers need to log into each of their debts, get particular statistics, and paint closer to consolidation. Not only is it time-ingesting; however, but it is also a repeatable activity with a certain frequency. To solve this problem, the idea of account aggregation was delivered as a solution. Account consolidation in e-banking as a form of digital banking appears to build stronger dating with clients. An account linking service is usually known as a service that permits customers to manipulate their bank accounts held at exceptional institutions through a common online banking platform that places a high priority on safety and statistics protection. The object affords an outline of the account aggregation approach in e-banking as a distinct carrier in the area of e-banking. The advanced facts generation is becoming a vital thing in the improvement of financial services enterprise, specifically the banking enterprise. It has brought different ways of delivering banking to the purchaser, which includes net Banking. Banks began to study electronic banking (e-banking) as a means to update some of their traditional branch functions and the use of the net as a distribution channel. Some clients have at least multiple accounts throughout banks and get the right of entry to that money owed through the usage of e-banking offerings. To examine the contemporary internet's well-worth position, customers have to log in to each of their money owed, get the information and work on consolidation. This no longer takes sufficient time; however, it is a repetitive interest at a specified frequency. To address this point, an account aggregation idea is brought as an answer. E-banking account aggregation, as one of the e-banking kinds, appeared to construct a more potent dating with clients. Account Aggregation carrier usually refers to a service that allows clients to control their bank bills maintained in one-of-a-kind institutions via a common Internet banking working platform, with an excessive subject to protection and privateness. This paper offers an overview of an e-banking account aggregation technique as a new provider in the e-banking field.Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise developmente-banking, enterprise development
Procedia PDF Downloads 36403 A Study of the Frequency of Individual Support for the Pupils With Developmental Disabilities or Suspected Developmental Disabilities in Regular Japanese School Classes - From a Questionnaire Survey of Teachers
Authors: Maho Komura
Abstract:
The purpose of this study was to determine from a questionnaire survey of teachers the status of implementation of individualized support for the pupils with suspected developmental disabilities in regular elementary school classes in Japan. In inclusive education, the goal is for all pupils to learn in the same place as much as possible by receiving the individualized support they need. However, in the Japanese school culture, strong "homogeneity" sometimes surfaces, and it is pointed out that it is difficult to provide individualized support from the viewpoint of formal equality. Therefore, we decided to conduct this study in order to examine whether there is a difference in the frequency of implementation depending on the content of individualized support and to consider the direction of future individualized support. The subjects of the survey were 196 public elementary school teachers who had been in charge of regular classes within the past five years. In the survey, individualized support was defined as individualized consideration including rational consideration, and did not include support for the entire class or all pupils enrolled in the class (e.g., reducing the amount of homework for pupils who have trouble learning, changing classroom rules, etc.). (e.g., reducing the amount of homework for pupils with learning difficulties, allowing pupils with behavioral concerns to use the library or infirmary when they are unstable). The respondents were asked to choose one answer from four options, ranging from "very much" to "not at all," regarding the degree to which they implemented the nine individual support items that were set up with reference to previous studies. As a result, it became clear that the majority of teachers had pupils with developmental disabilities or pupils who require consideration in terms of learning and behavior, and that the majority of teachers had experience in providing individualized support to these pupils. Investigating the content of the individualized support that had been implemented, it became clear that the frequency with which it was implemented varied depending on the individualized support. Individualized support that allowed pupils to perform the same learning tasks was implemented more frequently, but individualized support that allowed different learning tasks or use of places other than the classroom was implemented less frequently. It was suggested that flexible support methods tailored to each pupil may not have been considered.Keywords: inclusive education, ndividualized support, regular class, elementary school
Procedia PDF Downloads 130402 Constructing a Semi-Supervised Model for Network Intrusion Detection
Authors: Tigabu Dagne Akal
Abstract:
While advances in computer and communications technology have made the network ubiquitous, they have also rendered networked systems vulnerable to malicious attacks devised from a distance. These attacks or intrusions start with attackers infiltrating a network through a vulnerable host and then launching further attacks on the local network or Intranet. Nowadays, system administrators and network professionals can attempt to prevent such attacks by developing intrusion detection tools and systems using data mining technology. In this study, the experiments were conducted following the Knowledge Discovery in Database Process Model. The Knowledge Discovery in Database Process Model starts from selection of the datasets. The dataset used in this study has been taken from Massachusetts Institute of Technology Lincoln Laboratory. After taking the data, it has been pre-processed. The major pre-processing activities include fill in missed values, remove outliers; resolve inconsistencies, integration of data that contains both labelled and unlabelled datasets, dimensionality reduction, size reduction and data transformation activity like discretization tasks were done for this study. A total of 21,533 intrusion records are used for training the models. For validating the performance of the selected model a separate 3,397 records are used as a testing set. For building a predictive model for intrusion detection J48 decision tree and the Naïve Bayes algorithms have been tested as a classification approach for both with and without feature selection approaches. The model that was created using 10-fold cross validation using the J48 decision tree algorithm with the default parameter values showed the best classification accuracy. The model has a prediction accuracy of 96.11% on the training datasets and 93.2% on the test dataset to classify the new instances as normal, DOS, U2R, R2L and probe classes. The findings of this study have shown that the data mining methods generates interesting rules that are crucial for intrusion detection and prevention in the networking industry. Future research directions are forwarded to come up an applicable system in the area of the study.Keywords: intrusion detection, data mining, computer science, data mining
Procedia PDF Downloads 296401 The Ongoing Impact of Secondary Stressors on Businesses in Northern Ireland Affected by Flood Events
Authors: Jill Stephenson, Marie Vaganay, Robert Cameron, Caoimhe McGurk, Neil Hewitt
Abstract:
Purpose: The key aim of the research was to identify the secondary stressors experienced by businesses affected by single or repeated flooding and to determine to what extent businesses were affected by these stressors, along with any resulting impact on health. Additionally, the research aimed to establish the likelihood of businesses being re-exposed to the secondary stressors through assessing awareness of flood risk, implementation of property protection measures and level of community resilience. Design/methodology/approach: The chosen research method involved the distribution of a questionnaire survey to businesses affected by either single or repeated flood events. The questionnaire included the Impact of Event Scale (a 15-item self-report measure which assesses subjective distress caused by traumatic events). Findings: 55 completed questionnaires were returned by flood impacted businesses. 89% of the businesses had sustained internal flooding while 11% had experienced external flooding. The results established that the key secondary stressors experienced by businesses, in order of priority, were: flood damage, fear of reoccurring flooding, prevention of access to the premise/closure, loss of income, repair works, length of closure and insurance issues. There was a lack of preparedness for potential future floods and consequent vulnerability to the emergence of secondary stressors among flood affected businesses, as flood resistance or flood resilience measures had only been implemented by 11% and 13% respectively. In relation to the psychological repercussions, the Impact of Event scores suggested that potential prevalence of post-traumatic stress disorder (PTSD) was noted among 8 out of 55 respondents (l5%). Originality/value: The results improve understanding of the enduring repercussions of flood events on businesses, indicating that not only residents may be susceptible to the detrimental health impacts of flood events and single flood events may be just as likely as reoccurring flooding to contribute to ongoing stress. Lack of financial resources is a possible explanation for the lack of implementation of property protection measures among businesses, despite 49% experiencing flooding on multiple occasions. Therefore it is recommended that policymakers should consider potential sources of financial support or grants towards flood defences for flood impacted businesses. Any form of assistance should be made available to businesses at the earliest opportunity as there was no significant association between the time of the last flood event and the likelihood of experiencing PTSD symptoms.Keywords: flood event, flood resilience, flood resistance, PTSD, secondary stressors
Procedia PDF Downloads 430400 From Industry 4.0 to Agriculture 4.0: A Framework to Manage Product Data in Agri-Food Supply Chain for Voluntary Traceability
Authors: Angelo Corallo, Maria Elena Latino, Marta Menegoli
Abstract:
Agri-food value chain involves various stakeholders with different roles. All of them abide by national and international rules and leverage marketing strategies to advance their products. Food products and related processing phases carry with it a big mole of data that are often not used to inform final customer. Some data, if fittingly identified and used, can enhance the single company, and/or the all supply chain creates a math between marketing techniques and voluntary traceability strategies. Moreover, as of late, the world has seen buying-models’ modification: customer is careful on wellbeing and food quality. Food citizenship and food democracy was born, leveraging on transparency, sustainability and food information needs. Internet of Things (IoT) and Analytics, some of the innovative technologies of Industry 4.0, have a significant impact on market and will act as a main thrust towards a genuine ‘4.0 change’ for agriculture. But, realizing a traceability system is not simple because of the complexity of agri-food supply chain, a lot of actors involved, different business models, environmental variations impacting products and/or processes, and extraordinary climate changes. In order to give support to the company involved in a traceability path, starting from business model analysis and related business process a Framework to Manage Product Data in Agri-Food Supply Chain for Voluntary Traceability was conceived. Studying each process task and leveraging on modeling techniques lead to individuate information held by different actors during agri-food supply chain. IoT technologies for data collection and Analytics techniques for data processing supply information useful to increase the efficiency intra-company and competitiveness in the market. The whole information recovered can be shown through IT solutions and mobile application to made accessible to the company, the entire supply chain and the consumer with the view to guaranteeing transparency and quality.Keywords: agriculture 4.0, agri-food suppy chain, industry 4.0, voluntary traceability
Procedia PDF Downloads 147399 Recent Legal Changes in Turkish Commercial Law to Be a Part of International Markets and Their Results
Authors: Ibrahim Arslan
Abstract:
Since 1984, Turkey has experienced a significant transformation in legal and economic matters. The most consequential examples of this transformation in recent years are the renewal of the Commercial Code and the Check Act. Nowadays, the commercial activity is not limited within the boundaries of the country; on the contrary, as required by the global economy, it has an international dimension. For this reason, unlike some other legal principles, the rules regulating the commercial life should be compatible with the international standards as much as possible. Otherwise the development possibility in the global markets will be limited. The Check Act has been adopted in 2009 and the Commercial Code has been adopted in 2011. The Commercial Code has been entered into force on 1 July 2012. The international dimension of check is in-disputable for it is based on the Geneva Convention. However, the Turkish business life has created a unique application of this legal tool. This application is called “post-date” checks. Indeed the majority of the checks being used in the market are post-dated checks. The holders of these checks have waited the date written on the check for presentation and collection. Thus, the actual situation has occurred. This actual situation has been legitimized via Check Act No. 5941 and post dated checks have gained a legal status. In the preparation of the new the Turkish Commercial Code one of the goals is "to ensure that the Turkish commercial law becomes a part of the international market". To achieve this goal, significant changes have been made especially concerning the independent external audition of the corporations, the board structure and public disclosure regulations. These changes aim to facilitate the internationalization of Turkish corporations as well as intensification of foreign direct investments through foreign capital. Although the target has been determined this way, after the adoption but five days before the entry into force of the Turkish Commercial Code No. 6102, a law made backward going alterations concerning independent external audition and public disclosure regulations. Turkish Commercial Code has been currently in force with its altered status. Both the regulations in the Check Act as well as the changes in the Commercial Code are not compatible with the goals introduced by rationale “to ensure Turkish commercial law to be a part of the international market” as such.Keywords: Turkish Commercial Code No. 6102, Turkish Check Act, “post-date” checks, legal changes
Procedia PDF Downloads 294398 Assessing the Impact of the Rome II Regulation's General Rule on Cross-Border Road Traffic Accidents: A Critique of Recent Case Law
Authors: Emma Roberts
Abstract:
The Rome II Regulation has established a uniform regime of conflict of law rules across the European Union (except for Denmark) which determines the law applicable in non-contractual obligations disputes. It marks a significant development towards the Europeanization of private international law and aims to provide the most appropriate connecting factors to achieve both legal certainty and justice in individual cases. Many non-contractual obligations are recognised to present such distinct factors that, to achieve these aims, a special rule is provided for determining the applicable law in cases in respect of product liability and environmental torts, for example. Throughout the legislative process, the European Parliament sought to establish a separate rule for road traffic accidents, recognising that these cases too present such novel situations that a blanket application of a lex loci damni approach would not provide an appropriate answer. Such attempts were rejected and, as a result, cases arising out of road traffic accidents are subject to the Regulation’s general lex loci damni rule along with its escape clause and limited exception. This paper offers a critique of the Regulation’s response to cross-border road traffic accident cases. In England and Wales, there have been few cases that have applied the Regulation’s provisions to date, but significantly the majority of such cases are in respect of road traffic accidents. This paper examines the decisions in those cases and challenges the legislators’ decision not to provide a special rule for such incidences. Owing to the diversity in compensation systems globally, applying the Regulation’s general rule to cases of road traffic accidents – given the breadth of matters that are to be subject to the lex cause – cannot ensure an outcome that provides ‘justice in individual cases’ as is assured by the Regulation's recitals. Not only does this paper suggest that the absence of a special rule for road traffic accidents means that the Regulation fails to achieve one of its principal aims, but it further makes out a compelling case for the legislative body of the European Union to implement a corrective instrument.Keywords: accidents abroad, applicable law, cross-border torts, non-contractual obligations, road traffic accidents
Procedia PDF Downloads 256397 Subtitling in the Classroom: Combining Language Mediation, ICT and Audiovisual Material
Authors: Rossella Resi
Abstract:
This paper describes a project carried out in an Italian school with English learning pupils combining three didactic tools which are attested to be relevant for the success of young learner’s language curriculum: the use of technology, the intralingual and interlingual mediation (according to CEFR) and the cultural dimension. Aim of this project was to test a technological hands-on translation activity like subtitling in a formal teaching context and to exploit its potential as motivational tool for developing listening and writing, translation and cross-cultural skills among language learners. The activities proposed involved the use of professional subtitling software called Aegisub and culture-specific films. The workshop was optional so motivation was entirely based on the pleasure of engaging in the use of a realistic subtitling program and on the challenge of meeting the constraints that a real life/work situation might involve. Twelve pupils in the age between 16 and 18 have attended the afternoon workshop. The workshop was organized in three parts: (i) An introduction where the learners were opened up to the concept and constraints of subtitling and provided with few basic rules on spotting and segmentation. During this session learners had also the time to familiarize with the main software features. (ii) The second part involved three subtitling activities in plenum or in groups. In the first activity the learners experienced the technical dimensions of subtitling. They were provided with a short video segment together with its transcription to be segmented and time-spotted. The second activity involved also oral comprehension. Learners had to understand and transcribe a video segment before subtitling it. The third activity embedded a translation activity of a provided transcription including segmentation and spotting of subtitles. (iii) The workshop ended with a small final project. At this point learners were able to master a short subtitling assignment (transcription, translation, segmenting and spotting) on their own with a similar video interview. The results of these assignments were above expectations since the learners were highly motivated by the authentic and original nature of the assignment. The subtitled videos were evaluated and watched in the regular classroom together with other students who did not take part to the workshop.Keywords: ICT, L2, language learning, language mediation, subtitling
Procedia PDF Downloads 416396 Site Specific Nutrient Management Need in India Now
Authors: A. H. Nanher, N. P. Singh, Shashidhar Yadav, Sachin Tyagi
Abstract:
Agricultural production system is an outcome of a complex interaction of seed, soil, water and agro-chemicals (including fertilizers). Therefore, judicious management of all the inputs is essential for the sustainability of such a complex system. Precision agriculture gives farmers the ability to use crop inputs more effectively including fertilizers, pesticides, tillage and irrigation water. More effective use of inputs means greater crop yield and/or quality, without polluting the environment the focus on enhancing the productivity during the Green Revolution coupled with total disregard of proper management of inputs and without considering the ecological impacts, has resulted into environmental degradation. To evaluate a new approach for site-specific nutrient management (SSNM). Large variation in initial soil fertility characteristics and indigenous supply of N, P, and K was observed among Field- and season-specific NPK applications were calculated by accounting for the indigenous nutrient supply, yield targets, and nutrient demand as a function of the interactions between N, P, and K. Nitrogen applications were fine-tuned based on season-specific rules and field-specific monitoring of crop N status. The performance of SSNM did not differ significantly between high-yielding and low-yielding climatic seasons, but improved over time with larger benefits observed in the second year Future, strategies for nutrient management in intensive rice systems must become more site-specific and dynamic to manage spatially and temporally variable resources based on a quantitative understanding of the congruence between nutrient supply and crop demand. The SSNM concept has demonstrated promising agronomic and economic potential. It can be used for managing plant nutrients at any scale, i.e., ranging from a general recommendation for homogenous management of a larger domain to true management of between-field variability. Assessment of pest profiles in FFP and SSNM plots suggests that SSNM may also reduce pest incidence, particularly diseases that are often associated with excessive N use or unbalanced plant nutrition.Keywords: nutrient, pesticide, crop, yield
Procedia PDF Downloads 430395 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection
Authors: Mahshid Arabi
Abstract:
With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.Keywords: data protection, digital technologies, information security, modern management
Procedia PDF Downloads 31394 Sovereign Debt Restructuring: A Study of the Inadequacies of the Contractual Approach
Authors: Salamah Ansari
Abstract:
In absence of a comprehensive international legal regime for sovereign debt restructuring, majority of the complications arising from sovereign debt restructuring are frequently left to the uncertain market forces. The resort to market forces for sovereign debt restructuring has led to a phenomenal increase in litigations targeting assets of defaulting sovereign nations, internationally across jurisdictions with the first major wave of lawsuits against sovereigns in the 1980s with the Latin American crisis. Recent experiences substantiate that majority of obstacles faced during sovereign debt restructuring process are caused by inefficient creditor coordination and collective action problems. Collective action problems manifest as grab race, rush to exits, holdouts, the free rider problem and the rush to the courthouse. On defaulting, for a nation to successfully restructure its debt, all the creditors involved must accept some reduction in the value of their claims. As a single holdout creditor has the potential to undermine the restructuring process, hold-out creditors are snowballing with the increasing probability of earning high returns through litigations. This necessitates a mechanism to avoid holdout litigations and reinforce collective action on the part of the creditor. This can be done either through a statutory reform or through market-based contractual approach. In absence of an international sovereign bankruptcy regime, the impetus is mostly on inclusion of collective action clauses in debt contracts. The preference to contractual mechanisms vis- a vis a statutory approach can be explained with numerous reasons, but that's only part of the puzzle in trying to understand the economics of the underlying system. The contractual approach proposals advocate the inclusion of certain clauses in the debt contract for an orderly debt restructuring. These include clauses such as majority voting clauses, sharing clauses, non- acceleration clauses, initiation clauses, aggregation clauses, temporary stay on litigation clauses, priority financing clauses, and complete revelation of relevant information. However, voluntary market based contractual approach to debt workouts has its own complexities. It is a herculean task to enshrine clauses in debt contracts that are detailed enough to create an orderly debt restructuring mechanism while remaining attractive enough for creditors. Introduction of collective action clauses into debt contracts can reduce the barriers in efficient debt restructuring and also have the potential to improve the terms on which sovereigns are able to borrow. However, it should be borne in mind that such clauses are not a panacea to the huge institutional inadequacy that persists and may lead to worse restructuring outcomes.Keywords: sovereign debt restructuring, collective action clauses, hold out creditors, litigations
Procedia PDF Downloads 156393 Evaluating the Service Quality and Customers’ Satisfaction for Lihpaoland in Taiwan
Authors: Wan-Yu Liu, Tiffany April Lin, Yu-Chieh Tang, Yi-Lin Wang, Chieh-Hui Li
Abstract:
As the national income in Taiwan has been raised, the life style of the public has also been changed, so that the tourism industry gradually moves from a service industry to an experience economy. The Lihpaoland is one of the most popular theme parks in Taiwan. However, the related works on performance of service quality of the park have been lacking since its re-operation in 2012. Therefore, this study investigates the quality of software/hardware facilities and services of the Lihpaoland, and aims to achieve the following three goals: 1) analyzing how various sample data of tourists leads to different results for service quality of LihpaoLand; 2) analyzing how tourists respond to the service tangibility, service reliability, service responsiveness, service guarantee, and service empathy of LihpaoLand; 3) according to the theoretical and empirical results, proposing how to improve the overall facilities and services of LihpaoLand, and hoping to provide suggestions to the LihpaoLand or other related businesses to make decision. The survey was conducted on the tourists to the LihpaoLand using convenience sampling, and 400 questionnaires were collected successfully. Analysis results show that tourists paid much attention to maintenance of amusement facilities and safety of the park, and were satisfied with them, which are great advantages of the park. However, transportation around the LihpaoLand was inadequate, and the price of the Fullon hotel (which is the hotel closest to the LihpaoLand) were not accepted by tourists – more promotion events are recommended. Additionally, the shows are not diversified, and should be improved with the highest priority. Tourists did not pay attention to service personnel’s clothing and the ticket price, but they were not satisfied with them. Hence, this study recommends to design more distinctive costumes and conduct ticket promotions. Accordingly, the suggestions made in this study for LihpaoLand are stated as follows: 1) Diversified amusement facilities should be provided to satisfy the needs at different ages. 2) Cheep but tasty catering and more distinctive souvenirs should be offered. 3) Diversified propaganda schemes should be strengthened to increase number of tourists. 4) Quality and professional of the service staff should be enhanced to acquire public praise and tourists revisiting. 5) Ticket promotions in peak seasons, low seasons, and special events should be conducted. 6) Proper traffic flows should be planned and combined with technologies to reduce waiting time of tourists. 7) The features of theme landscape in LihpaoLand should be strengthened to increase willingness of the tourists with special preferences to visit the park. 8) Ticket discounts or premier points card promotions should be adopted to reward the tourists with high loyalty.Keywords: service quality, customers’ satisfaction, theme park, Taiwan
Procedia PDF Downloads 471392 ESL Material Evaluation: The Missing Link in Nigerian Classrooms
Authors: Abdulkabir Abdullahi
Abstract:
The paper is a pre-use evaluation of grammar activities in three primary English course books (two of which are international primary English course books and the other a popular Nigerian primary English course book). The titles are - Cambridge Global English, Collins International Primary English, and Nigeria Primary English – Primary English. Grammar points and grammar activities in the three-course books were identified, grouped, and evaluated. The grammar activity which was most common in the course books, simple past tense, was chosen for evaluation, and the units which present simple past tense activities were selected to evaluate the extent to which the treatment of simple past tense in each of the course books help the young learners of English as a second language in Nigeria, aged 8 – 11, level A1 to A2, who lack the basic grammatical knowledge, to know grammar/communicate effectively. A bespoke checklist was devised, through the modification of existing checklists for the purpose of the evaluation, to evaluate the extent to which the grammar activities promote the communicative effectiveness of Nigerian learners of English as a second language. The results of the evaluation and the analysis of the data reveal that the treatment of grammar, especially the treatment of the simple past tense, is evidently insufficient. While Cambridge Global English’s, and Collins International Primary English’s treatment of grammar, the simple past tense, is underpinned by state-of-the-art theories of learning, language learning theories, second language learning principles, second language curriculum-syllabus design principles, grammar learning and teaching theories, the grammar load is insignificantly low, and the grammar tasks do not promote creative grammar practice sufficiently. Nigeria Primary English – Primary English, on the other hand, treats grammar, the simple past tense, in the old-fashioned direct way. The book does not favour the communicative language teaching approach; no opportunity for learners to notice and discover grammar rules for themselves, and the book lacks the potency to promote creative grammar practice. The research and its findings, therefore, underscore the need to improve grammar contents and increase grammar activity types which engage learners effectively and promote sufficient creative grammar practice in EFL and ESL material design and development.Keywords: evaluation, activity, second language, activity-types, creative grammar practice
Procedia PDF Downloads 81391 Standard Essential Patents for Artificial Intelligence Hardware and the Implications For Intellectual Property Rights
Authors: Wendy de Gomez
Abstract:
Standardization is a critical element in the ability of a society to reduce uncertainty, subjectivity, misrepresentation, and interpretation while simultaneously contributing to innovation. Technological standardization is critical to codify specific operationalization through legal instruments that provide rules of development, expectation, and use. In the current emerging technology landscape Artificial Intelligence (AI) hardware as a general use technology has seen incredible growth as evidenced from AI technology patents between 2012 and 2018 in the United States Patent Trademark Office (USPTO) AI dataset. However, as outlined in the 2023 United States Government National Standards Strategy for Critical and Emerging Technology the codification through standardization of emerging technologies such as AI has not kept pace with its actual technological proliferation. This gap has the potential to cause significant divergent possibilities for the downstream outcomes of AI in both the short and long term. This original empirical research provides an overview of the standardization efforts around AI in different geographies and provides a background to standardization law. It quantifies the longitudinal trend of Artificial Intelligence hardware patents through the USPTO AI dataset. It seeks evidence of existing Standard Essential Patents from these AI hardware patents through a text analysis of the Statement of patent history and the Field of the invention of these patents in Patent Vector and examines their determination as a Standard Essential Patent and their inclusion in existing AI technology standards across the four main AI standards bodies- European Telecommunications Standards Institute (ETSI); International Telecommunication Union (ITU)/ Telecommunication Standardization Sector (-T); Institute of Electrical and Electronics Engineers (IEEE); and the International Organization for Standardization (ISO). Once the analysis is complete the paper will discuss both the theoretical and operational implications of F/Rand Licensing Agreements for the owners of these Standard Essential Patents in the United States Court and Administrative system. It will conclude with an evaluation of how Standard Setting Organizations (SSOs) can work with SEP owners more effectively through various forms of Intellectual Property mechanisms such as patent pools.Keywords: patents, artifical intelligence, standards, F/Rand agreements
Procedia PDF Downloads 88390 Strengthening by Assessment: A Case Study of Rail Bridges
Authors: Evangelos G. Ilias, Panagiotis G. Ilias, Vasileios T. Popotas
Abstract:
The United Kingdom has one of the oldest railway networks in the world dating back to 1825 when the world’s first passenger railway was opened. The network has some 40,000 bridges of various construction types using a wide range of materials including masonry, steel, cast iron, wrought iron, concrete and timber. It is commonly accepted that the successful operation of the network is vital for the economy of the United Kingdom, consequently the cost effective maintenance of the existing infrastructure is a high priority to maintain the operability of the network, prevent deterioration and to extend the life of the assets. Every bridge on the railway network is required to be assessed every eighteen years and a structured approach to assessments is adopted with three main types of progressively more detailed assessments used. These assessment types include Level 0 (standardized spreadsheet assessment tools), Level 1 (analytical hand calculations) and Level 2 (generally finite element analyses). There is a degree of conservatism in the first two types of assessment dictated to some extent by the relevant standards which can lead to some structures not achieving the required load rating. In these situations, a Level 2 Assessment is often carried out using finite element analysis to uncover ‘latent strength’ and improve the load rating. If successful, the more sophisticated analysis can save on costly strengthening or replacement works and avoid disruption to the operational railway. This paper presents the ‘strengthening by assessment’ achieved by Level 2 analyses. The use of more accurate analysis assumptions and the implementation of non-linear modelling and functions (material, geometric and support) to better understand buckling modes and the structural behaviour of historic construction details that are not specifically covered by assessment codes are outlined. Metallic bridges which are susceptible to loss of section size through corrosion have largest scope for improvement by the Level 2 Assessment methodology. Three case studies are presented, demonstrating the effectiveness of the sophisticated Level 2 Assessment methodology using finite element analysis against the conservative approaches employed for Level 0 and Level 1 Assessments. One rail overbridge and two rail underbridges that did not achieve the required load rating by means of a Level 1 Assessment due to the inadequate restraint provided by U-Frame action are examined and the increase in assessed capacity given by the Level 2 Assessment is outlined.Keywords: assessment, bridges, buckling, finite element analysis, non-linear modelling, strengthening
Procedia PDF Downloads 309389 Revolutionizing Legal Drafting: Leveraging Artificial Intelligence for Efficient Legal Work
Authors: Shreya Poddar
Abstract:
Legal drafting and revising are recognized as highly demanding tasks for legal professionals. This paper introduces an approach to automate and refine these processes through the use of advanced Artificial Intelligence (AI). The method employs Large Language Models (LLMs), with a specific focus on 'Chain of Thoughts' (CoT) and knowledge injection via prompt engineering. This approach differs from conventional methods that depend on comprehensive training or fine-tuning of models with extensive legal knowledge bases, which are often expensive and time-consuming. The proposed method incorporates knowledge injection directly into prompts, thereby enabling the AI to generate more accurate and contextually appropriate legal texts. This approach substantially decreases the necessity for thorough model training while preserving high accuracy and relevance in drafting. Additionally, the concept of guardrails is introduced. These are predefined parameters or rules established within the AI system to ensure that the generated content adheres to legal standards and ethical guidelines. The practical implications of this method for legal work are considerable. It has the potential to markedly lessen the time lawyers allocate to document drafting and revision, freeing them to concentrate on more intricate and strategic facets of legal work. Furthermore, this method makes high-quality legal drafting more accessible, possibly reducing costs and expanding the availability of legal services. This paper will elucidate the methodology, providing specific examples and case studies to demonstrate the effectiveness of 'Chain of Thoughts' and knowledge injection in legal drafting. The potential challenges and limitations of this approach will also be discussed, along with future prospects and enhancements that could further advance legal work. The impact of this research on the legal industry is substantial. The adoption of AI-driven methods by legal professionals can lead to enhanced efficiency, precision, and consistency in legal drafting, thereby altering the landscape of legal work. This research adds to the expanding field of AI in law, introducing a method that could significantly alter the nature of legal drafting and practice.Keywords: AI-driven legal drafting, legal automation, futureoflegalwork, largelanguagemodels
Procedia PDF Downloads 65388 The Portuguese Legal Instruments to Combat the Improper Use of the Contract Service
Authors: Ana Lambelho
Abstract:
Nowadays is very common that an activity may be performed independently or dependently. In Portugal, the Labour Law exclusively protects the dependent labour relations. The independent work is regulated by civil law, where the autonomy of the will is the main principle. For companies is more advantageous to hire people under a service agreement since, in that case, the relation is not submitted to the limits established in Labour law and collective bargaining. This practice has nothing wrong, if the performance of work is, in fact, made autonomously. The problem is the increased frequency of the celebration of service agreements to hide a legal relation of subordination. Aware of this and regarding the huge difficulty to demonstrate the existence of subordinated work (that often runs against the employee), the Portuguese legislator devoted some legislative rules in order to facilitate the evidence of legal subordination and, on the other hand, to avoid the misuse of the provision of service agreements. This study focuses precisely on the analysis of this solution, namely the so-called presumption of ‘laboralidade’ and on the lawsuit to recognize the existence of a labour contract. The presumption of the existence of a labour contract is present in the Portuguese legal system since 2003, and received, with the 2009 Labour Code, a new redaction that, according to the doctrine and the jurisprudence, finally approached it to a legal presumption, with the consequent reversal of the burden of proof and, in consequence, made easier to proof the legal subordination, because the employee will just have to plead and prove the existence of two of the elements described in the law to use this presumption. Another change in the Portuguese legal framework is related with the competencies of the Authority for Working Conditions (AWC): now, if during an inspection, the Authority finds a situation that seems to be an undeclared employment situation, it may access the company and, if it does not regularize voluntarily the situation, AWC has a duty to communicate to the public prosecutor, who will begin the lawsuit for the recognition of the existence of an employment contract. To defend the public interest, the action to recognize the existence of an employment contract will follow its terms, even against the employee will. Although the existence of these mechanisms does not solve by itself the problem of evasion of labour law and false ‘green receipts’, it is undeniable that it is an important step in combating fraud in this field.Keywords: independent work, labour contract, Portugal, service agreement
Procedia PDF Downloads 326387 Applying Big Data Analysis to Efficiently Exploit the Vast Unconventional Tight Oil Reserves
Authors: Shengnan Chen, Shuhua Wang
Abstract:
Successful production of hydrocarbon from unconventional tight oil reserves has changed the energy landscape in North America. The oil contained within these reservoirs typically will not flow to the wellbore at economic rates without assistance from advanced horizontal well and multi-stage hydraulic fracturing. Efficient and economic development of these reserves is a priority of society, government, and industry, especially under the current low oil prices. Meanwhile, society needs technological and process innovations to enhance oil recovery while concurrently reducing environmental impacts. Recently, big data analysis and artificial intelligence become very popular, developing data-driven insights for better designs and decisions in various engineering disciplines. However, the application of data mining in petroleum engineering is still in its infancy. The objective of this research aims to apply intelligent data analysis and data-driven models to exploit unconventional oil reserves both efficiently and economically. More specifically, a comprehensive database including the reservoir geological data, reservoir geophysical data, well completion data and production data for thousands of wells is firstly established to discover the valuable insights and knowledge related to tight oil reserves development. Several data analysis methods are introduced to analysis such a huge dataset. For example, K-means clustering is used to partition all observations into clusters; principle component analysis is applied to emphasize the variation and bring out strong patterns in the dataset, making the big data easy to explore and visualize; exploratory factor analysis (EFA) is used to identify the complex interrelationships between well completion data and well production data. Different data mining techniques, such as artificial neural network, fuzzy logic, and machine learning technique are then summarized, and appropriate ones are selected to analyze the database based on the prediction accuracy, model robustness, and reproducibility. Advanced knowledge and patterned are finally recognized and integrated into a modified self-adaptive differential evolution optimization workflow to enhance the oil recovery and maximize the net present value (NPV) of the unconventional oil resources. This research will advance the knowledge in the development of unconventional oil reserves and bridge the gap between the big data and performance optimizations in these formations. The newly developed data-driven optimization workflow is a powerful approach to guide field operation, which leads to better designs, higher oil recovery and economic return of future wells in the unconventional oil reserves.Keywords: big data, artificial intelligence, enhance oil recovery, unconventional oil reserves
Procedia PDF Downloads 283386 Prediction of Terrorist Activities in Nigeria using Bayesian Neural Network with Heterogeneous Transfer Functions
Authors: Tayo P. Ogundunmade, Adedayo A. Adepoju
Abstract:
Terrorist attacks in liberal democracies bring about a few pessimistic results, for example, sabotaged public support in the governments they target, disturbing the peace of a protected environment underwritten by the state, and a limitation of individuals from adding to the advancement of the country, among others. Hence, seeking for techniques to understand the different factors involved in terrorism and how to deal with those factors in order to completely stop or reduce terrorist activities is the topmost priority of the government in every country. This research aim is to develop an efficient deep learning-based predictive model for the prediction of future terrorist activities in Nigeria, addressing low-quality prediction accuracy problems associated with the existing solution methods. The proposed predictive AI-based model as a counterterrorism tool will be useful by governments and law enforcement agencies to protect the lives of individuals in society and to improve the quality of life in general. A Heterogeneous Bayesian Neural Network (HETBNN) model was derived with Gaussian error normal distribution. Three primary transfer functions (HOTTFs), as well as two derived transfer functions (HETTFs) arising from the convolution of the HOTTFs, are namely; Symmetric Saturated Linear transfer function (SATLINS ), Hyperbolic Tangent transfer function (TANH), Hyperbolic Tangent sigmoid transfer function (TANSIG), Symmetric Saturated Linear and Hyperbolic Tangent transfer function (SATLINS-TANH) and Symmetric Saturated Linear and Hyperbolic Tangent Sigmoid transfer function (SATLINS-TANSIG). Data on the Terrorist activities in Nigeria gathered through questionnaires for the purpose of this study were used. Mean Square Error (MSE), Mean Absolute Error (MAE) and Test Error are the forecast prediction criteria. The results showed that the HETFs performed better in terms of prediction and factors associated with terrorist activities in Nigeria were determined. The proposed predictive deep learning-based model will be useful to governments and law enforcement agencies as an effective counterterrorism mechanism to understand the parameters of terrorism and to design strategies to deal with terrorism before an incident actually happens and potentially causes the loss of precious lives. The proposed predictive AI-based model will reduce the chances of terrorist activities and is particularly helpful for security agencies to predict future terrorist activities.Keywords: activation functions, Bayesian neural network, mean square error, test error, terrorism
Procedia PDF Downloads 165385 Portuguese Baila Verses and Anti-Colonial Subaltern Ideology in Ceylon Coast: A Case Study on Hugh Nevil Manuscripts
Authors: Achinthya Bandara
Abstract:
The Portuguese were the first known European Nation to colonize Ceylon during the early 16th century. When the Portuguese set sail in the late 15th century towards the East and West, they first landed in Pondicherry (Pondicherry), an eastern coastal location of early India and established their trade in the Indian Oceanic regions. Sri Lanka (Ceylon until 1972) made its first contact with the Portuguese just a few years after they anchored in India, the Luso-Sri Lankan contact was initiated and became prominent across the time, even during the later colonial rules, i.e., Dutch and British. Such connections created a Luso-Asian hybrid culture in Ceylon that shared both Sri Lankan and European identities. Portuguese Creole communities were prominent among them as an ethnic group with Portuguese descent interwoven with local traditions and customs, yet outcast by the mainstream Portuguese colonials. Hugh Nevil, a British Civil Servant who served Ceylon in the early 1800s, had collected a considerable amount of such Luso-Asian Literature belonging to Sri Lankan Portuguese creole communities, including 180 Portuguese creole verses sung by the creole communities in Eastern Sri Lanka. Though the collection was studied to uncover literature traits, few or no known studies focused on the anti-colonial subaltern discourse appearing in the shades of this work. It is evident that these verses contain local anti-colonial ideologies that create a platform to place them as elements of Luso-Asian subaltern literature. This research explores how the language and content of these verses contradict the mainstream colonial ideologies we intend to position within a regional anti-colonial subaltern context. As this is part of a long-term research project that translates the whole collection into Sinhalese and Tamil, this study will show evidence from early 1800s verses to suggest how Luso-Asian communities create a unique subaltern linguistic and literary discourse.Keywords: Luso Asian creoles, Luso Asian subalterns, anti-colonial ideologies, Sri Lanka Portuguese creole
Procedia PDF Downloads 34384 Submarines Unmanned Vehicle for Underwater Exploration and Monitoring System in Indonesia
Authors: Nabila Dwi Agustin, Ria Septitis Mentari, Nugroho Adi Sasongko
Abstract:
Indonesia is experiencing a crisis in the development of defense equipment. Most of Indonesia's defense equipment must import its parts from other countries. Moreover, the area of Indonesia is 2/3 of its territory is the sea areas. For the protection of marine areas, Indonesia relies solely on submarines in monitoring conditions and whether or not intruders enter their territory. In fact, we know the submarine has a large size so that the expenses are getting bigger, the time it takes longer and needs a big maneuver to operate the submarine. Indeed, the submarine can only be operated for deeper seas. Many other countries enter the underwater world of Indonesia but Indonesia could not do anything due to the limitations of underwater monitoring system. At the same time, reconnaissance and monitor for shallow seas cannot be done by submarine. Equipment that can be used for surveillance of shallow underwater areas shall be made. This study reviewed the current research and development initiative of the submarine unmanned vehicle (SUV) or unmanned undersea vehicle (UUV) in Indonesia. This can explore underwater without the need for an operator to operate in it, but we can monitor it from a long distance. UUV has several advantages that size can be reduced as we desired, rechargeable ship batteries, has a detection sonar commonly found on a submarine and agile movement to detect at shallow sea depth. In the sonar sensors consisted of MEMS (Micro Electro Mechanical System), the sonar system runs more efficiently and effectively to monitor the target. UUV that has been developed will be very useful if the equipment is used around the outlying islands and outer from Indonesia especially the island frequented by foreign submarines without us know. The impact of this may not be felt now but it will allow foreign countries to attack Indonesia from within for the future. In addition, UUV needs to be equipped with a anti-radar system so that submarines of other countries crossing borders cannot detect it and Indonesia anti-submarine vessels can take further security measures. As the recommendation, Indonesia should take decisive steps in the state border rules, especially submarines of other countries that deliberately cross the borders of the state. This decisive action not only by word alone but also action as well. Indonesia government should show the strength and sovereignty as the entire society unites and applies the principle of universal peace.Keywords: submarine unmanned vehicle, submarine, development of defense equipment, the border of Indonesia
Procedia PDF Downloads 147383 Healthcare Professional’s Well-Being: Case Study of Two Care Units in a Big Hospital in Canada
Authors: Zakia Hammouni
Abstract:
Healthcare professionals’ well-being is becoming a priority during this Covid-19 pandemic due to stress, fatigue, and workload. Well before this pandemic, contemporary hospitals are endowed with environmental attributes that contribute to achieving well-being within their environment with the emphasis on the patient. The patient-centered care approach has been followed by the patient-centered design approach. Studies that have focused on the physical environment in hospitals have dealt with the patient's recovery process and his well-being. Prior scientific literature has placed less emphasis on the healthcare professionals’ interactions within the physical environment and to guide hospital designers to make evidence-based design choices to meet the needs and expectations of hospital users by considering, in addition to patients, healthcare professionals. This paper examines these issues related to the daily stress of professionals who provide care in a hospital environment. In this exploratory study, the interest was to grasp the issues related to this environment and explores the current realities of newly built hospitals based on design approaches and what attributes of the physical setting support healthcare professional’s well-being. Within a constructivist approach, this study was conducted in two care units in a new hospital in a big city in Canada before the Covid-19 pandemic (august 2nd to November 2nd 2018). A spatial evaluation of these care units allowed us to understand the interaction of health professionals in their work environment, to understand the spatial behavior of these professionals, and the narratives from 44 interviews of various healthcare professionals. The mental images validated the salient components of the hospital environment as perceived by these healthcare professionals. Thematic analysis and triangulation of the data set were conducted. Among the key attributes promoting the healthcare professionals’ well-being as revealed by the healthcare professionals are the overall light-color atmosphere in the hospital and care unit, particularly in the corridors and public areas of the hospital, the maintenance and cleanliness. The presence of the art elements also brings well-being to the health professionals as well as panoramic views from the staff lounge and corridors of the care units or elevator lobbies. Despite the overall positive assessment of this environment, some attributes need to be improved to ensure the well-being of healthcare professionals and to provide them with a restructuring environment. These are the supply of natural light, softer colors, sufficient furniture, comfortable seating in the restroom, and views, which are important in allowing these healthcare professionals to recover from their work stress. Noise is another attribute that needs to be further improved in the hospital work environment, especially in the nursing workstations and consultant's room. In conclusion, this study highlights the importance of providing healthcare professionals with work and rest areas that allow them to resist the stress they face, particularly during periods of extreme stress and fatigue such as a Covid-19 pandemic.Keywords: healthcare facilities, healthcare professionals, physical environment, well-being
Procedia PDF Downloads 127