Search results for: common property
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6951

Search results for: common property

6801 Preparation and Characterization of Organic Silver Precursors for Conductive Ink

Authors: Wendong Yang, Changhai Wang, Valeria Arrighi

Abstract:

Low ink sintering temperature is desired for flexible electronics, as it would widen the application of the ink on temperature-sensitive substrates where the selection of silver precursor is very critical. In this paper, four types of organic silver precursors, silver carbonate, silver oxalate, silver tartrate and silver itaconate, were synthesized using an ion exchange method, firstly. Various characterization methods were employed to investigate their physical phase, chemical composition, morphologies and thermal decomposition behavior. It was found that silver oxalate had the ideal thermal property and showed the lowest decomposition temperature. An ink was then formulated by complexing the as-prepared silver oxalate with ethylenediamine in organic solvents. Results show that a favorable conductive film with a uniform surface structure consisting of silver nanoparticles and few voids could be produced from the ink at a sintering temperature of 150 °C.

Keywords: conductive ink, electrical property, film, organic silver

Procedia PDF Downloads 319
6800 A Change in Property-Rights Regime and the Proliferation of Fenced Plots, Investigating Its Implication on the Livelihoods of the Locals: A Case Study of the Guji Highlands of South Ethiopia

Authors: Tingirtu Gebretsadik

Abstract:

This study aimed at explaining factors behind the ever increasing individualization over pastoral commons land and assesses the implication of the current change in property-ownership and land use system on the livelihoods of the Guji agro-pastoral system. Thus, three kebeles of Ana Sora woreda were selected for they conventionally appear to accommodate farming, pastoral and agro-pastoral systems. The survey method was employed to gather information on the major socio-economic condition of households. In-depth interviews and focus group discussions were also held in all the three kebele. The empirical results were interpreted by integrating institutional, livelihood and adaptation frameworks. In this study individualization of ownership of pastoral commons manifested in the form of fenced closures is on the rise among the Guji and it has been adopted as the outcome of a long run process. Factors related to ecology and rangeland degradation, socio-economic changes, land registration and certification has allowed the increasing engagement in fencing commons grazing land for individual use. Consequently, the Guji pastoral system of production demonstrated a declining trend, and are adapting to alternative livelihood strategies. Moreover, farming and other developments have facilitated pastoral land losses and land use claims and tenure ambiguities.

Keywords: land tenure, traditional institutions, property rights, fenced plots

Procedia PDF Downloads 198
6799 Notice and Block?

Authors: Althaf Marsoof

Abstract:

The blocking injunction, giving rise to a ‘notice and block’ regime, has become the new approach to curtail the infringement of Intellectual Property rights on the Internet. As such, the blocking injunction is an addition to the arsenal of copyright owners, and more recently has also benefited trademark owners, in their battle against piracy and counterfeiting. Yet, the blocking injunction, notwithstanding the usefulness of its ‘notice and block’ outcome, is not without limitations. In the circumstances, it is argued that ‘notice and takedown’, the approach that has been adopted by right-holders for some years, is still an important remedy against the proliferation of online content that infringe the rights of copyright and trademark owners, which is both viable and effective. Thus, it is suggested that the battle against online piracy and counterfeiting could be won only if both the blocking injunction and the practice of ‘notice and takedown’ are utilised by right-holders as complementary and simultaneous remedies.

Keywords: blocking injunctions, internet intermediaries, notice and takedown, intellectual property

Procedia PDF Downloads 401
6798 Investigating the Post-Liver Transplant Complications and Their Management in Children Referred to the Children’s Medical Center

Authors: Hosein Alimadadi, Fatemeh Farahmand, Ali Jafarian, Nasir Fakhar, Mohammad Hassan Sohouli, Neda Raeesi

Abstract:

Backgroundsː Regarding the important role of liver transplantation as the only treatment in many cases of end-stage liver disease in children, the aim of this study is to investigate the complications of liver transplantation and their management in children referred to the Children's Medical Center. Methods: This study is a cross-sectional study on pediatric patients who have undergone liver transplants in the years 2016 to 2021. The indication for liver transplantation in this population was confirmed by a pediatric gastroenterologist, and a liver transplant was performed by a transplant surgeon. Finally, information about the patient before and after the transplantation was collected and recorded. Results: A total of 53 patients participated in this study, including 25 (47.2%) boys and 28 (52.8%) girls. The most common causes of liver transplantation were cholestatic and metabolic diseases. The most common early complication of liver transplantation in children was acute cellular rejection (ACR) and anastomotic biliary stricture. The most common late complication in these patients was an infection which was observed in 56.6% of patients. Among the drug side effects, neurotoxicity (convulsions) was seen more in patients, and 15.1% of the transplanted patients died. Conclusion: In this study, the most common early complication of liver transplantation in children was ACR and biliary stricture, and the most common late complication was infection. Neurotoxicity (convulsions) was the most common side effect of drugs.

Keywords: liver transplantation, complication, infection, survival rate

Procedia PDF Downloads 63
6797 An Exemption for Vertical Restraint Regarding Intellectual Property Licensing: Case Study of Thailand

Authors: Sanpetchuda Krutkrua, Suphawatchara Malanond

Abstract:

Throughout the history of Antitrust regimes in Thailand, Thailand has been trying to prevent collusive practices in the market through the amendments of the Trade Competition Act, and Thailand just passed the current Trade Competition Act of B.E. 2560 in 2017 of which several aspects of the law were amended in order to enhance the prevention of collusive outcome through both vertical trade restraints and horizontal trade restraints. An agreement is vertical when it involves arrangements that are in a complementary relationship. In Section 55 of the Act, any agreements to reduce the price, quantity, or quality of the goods, agreements to assign a sole retailer for the goods, and the agreement to impose conditions on the retailers are not allowed. However, Section 56 provides exemptions for the vertical relationship between the business operators, the franchise agreement, and the licensing agreement as long as such agreements do not surpass the necessity to do so, create monopolization, or affect the consumers in terms of price, quality, quantity, or options. The paper aims to explore the extent of the exemption under Section 56 and sequential regulations in terms of the vertical trade restraints regarding intellectual property licensing, and, at the same time, compare with the exemptions under the European Union competition law, and Singapore competition law. Comparative legal analysis with leading jurisdiction will illustrate the application of the newly enacted Thai Competition Act in terms of its enforcement in the global impact of IP rights, which, by nature are de jure or de facto international protection.

Keywords: antitrust, competition law, vertical restraint, intellectual property, IP licensing

Procedia PDF Downloads 142
6796 The Case of Plagiarism and Its Presence in Classical Arabic Poetry

Authors: Yusuf Seller

Abstract:

Classical Arabic poetry was narrated by the followers of poets, who were memorizing and repeating all the couplets of their master constantly. Although the students established their own styles, it was very natural for them to reflect the style and expression of their masters. This reflection was discussed in classical Arabic literary criticism and rhetoric (al-‘ilm al-balagha), as “al-Sariqah al-shiriyyah”, plagiarism in poetry. This study tests the claim that the reflection of the master's style and expressions in the student's poetry cannot be considered plagiarism. In addition, one of the goals of this essay is also to investigate the methodological emergence of plagiarism phenomena in classical Arabic poetry. The investigation of the methodological origins of plagiarism helps us see the relationship of plagiarism with literary property and the extent of the property`s authenticity. Therefore, the focus is directed towards uncovering the underlying ethical principles governing literary works and academic research in classical Arabic poetry.

Keywords: Arabic literary criticism, classical Arabic poetry, plagiarism, al-Sariqah al-shiriyyah

Procedia PDF Downloads 31
6795 Multiple Variations of the Nerves of Gluteal Region and Their Clinical Implications, a Case Report

Authors: A. M. Prasad

Abstract:

Knowledge of variations of nerves of gluteal region is important for clinicians administering intramuscular injections, for orthopedic surgeons dealing with the hip surgeries, possibly for physiotherapists managing the painful conditions and paralysis of this region. Herein, we report multiple variations of the nerves of gluteal region. In the current case, the sciatic nerve was absent. The common peroneal and tibial nerves arose from sacral plexus and reached the gluteal region through greater sciatic foramen above and below piriformis respectively. The common peroneal nerve gave a muscular branch to the gluteus maximus. The inferior gluteal nerve and posterior cutaneous nerve of the thigh arose from a common trunk. The common trunk was formed by three roots. Upper and middle roots arose from sacral plexus and entered gluteal region through greater sciatic foramen respectively above and below piriformis. The lower root arose from the pudendal nerve and joined the common trunk. These variations were seen in the right gluteal region of an adult male cadaver aged approximately 70 years. Innervation of gluteus maximus by common peroneal nerve and presence of a common trunk of inferior gluteal nerve and posterior cutaneous nerve of the thigh make this case unique. The variant nerves may be subjected to iatrogenic injuries during surgical approach to the hip. They may also get compressed if there is a hypertrophy of the piriformis syndrome. Hence, the knowledge of these variations is of importance to clinicians, orthopedic surgeons and possibly for physiotherapists.

Keywords: gluteal region, multiple variations, nerve injury, sciatic nerve

Procedia PDF Downloads 333
6794 Application of Blockchain Technology in Geological Field

Authors: Mengdi Zhang, Zhenji Gao, Ning Kang, Rongmei Liu

Abstract:

Management and application of geological big data is an important part of China's national big data strategy. With the implementation of a national big data strategy, geological big data management becomes more and more critical. At present, there are still a lot of technology barriers as well as cognition chaos in many aspects of geological big data management and application, such as data sharing, intellectual property protection, and application technology. Therefore, it’s a key task to make better use of new technologies for deeper delving and wider application of geological big data. In this paper, we briefly introduce the basic principle of blockchain technology at the beginning and then make an analysis of the application dilemma of geological data. Based on the current analysis, we bring forward some feasible patterns and scenarios for the blockchain application in geological big data and put forward serval suggestions for future work in geological big data management.

Keywords: blockchain, intellectual property protection, geological data, big data management

Procedia PDF Downloads 70
6793 Effect of Zinc Oxide Nanoparticles along with Sodium Hydroxide on Self-Cleaning and Antibacterial Properties of Polyethylene Terephthalate

Authors: Mohammad Mirjalili, Maryam Mohammdi, Loghman Karimi

Abstract:

In this study, synthesis of zinc oxide nanoparticles was carried out along with the hydrolysis of Polyethylene terephthalate using sodium hydroxide to increase the surface activity and enhance the nanoparticles adsorption. The polyester fabrics were treated with zinc acetate and sodium hydroxide at ultrasound bath, resulting in the formation of ZnO nanospheres. The presence of zinc oxide on the surface of the polyethylene terephthalate was confirmed by scanning electron microscopy (SEM) and energy dispersive X-ray spectroscopy (EDS). The self-cleaning property of treated polyethylene terephthalate was evaluated through discoloring methylene blue stain under sunlight irradiation. The antibacterial activities of the samples against two common pathogenic bacteria including Escherichia coli and Staphylococcus aureus were also assessed. The results indicated that the photocatalytic and antibacterial activities of the ultrasound treated polyethylene terephthalate improved significantly.

Keywords: zinc oxide, polyethylene terephthalate, self-cleaning, antibacterial

Procedia PDF Downloads 313
6792 Efficient Elimination of Common Allergens through the Application of Dry Microfine Steam on Innate Surfaces

Authors: O. Rachinel, C. Recchia, M. Bourel, B. Recchia

Abstract:

Dry microfine steam (DMS) technology, developed by Laurastar, was shown to effectively eliminate a range of pathogens such as Sars-CoV-2, E. coli, S. aureus and C. Albicans. The aim of this study was to investigate the effect of DMS technology on allergens. Therefore, the application of the DMS technology was tested on two common allergens (Dermatophagoides pteronyssinus and cat allergen Fel d 1), on different inert surfaces (e.g., cotton), during 2 to 3 seconds. Quantification of the remaining allergens was performed and the reduction rates reached 100% in 3 seconds for D. pteronyssinus and 97,74% in 2 seconds for cat allergens. In conclusion, DMS showed high efficacy in the elimination of common allergens and could be seen as a natural solution to improve domestic hygiene and reduce allergies.

Keywords: steam, allergens, dust mites, pollens

Procedia PDF Downloads 125
6791 A Novel Unconditionally Secure and Lightweight Bipartite Key Agreement Protocol

Authors: Jun Liu

Abstract:

This paper introduces a new bipartite key agreement (2PKA) protocol which provides unconditionally security and lightweight. The unconditional security is stemmed from the known impossibility of distinguishing a particular solution from all possible solutions of an underdetermined system of equations. The indistinguishability prevents an adversary from inferring to the common secret-key even with the access to an unlimited amount of computing capability. This new 2PKA protocol is also lightweight because that the calculation of a common secret-key only makes use of simple modular arithmetic. This information-theoretic 2PKA scheme provides the desired features of Key Confirmation (KC), Session Key (SK) security, Know-Key (KK) security, protection of individual privacy, and uniformly distributed value of a common key under prime modulus.

Keywords: bipartite key agreement, information-theoretic cryptography, perfect security, lightweight

Procedia PDF Downloads 50
6790 Evaluation of Botanical Plant Powders against Zabrotes subfasciatus (Boheman) (Coleoptera: Bruchidae) in Stored Local Common Bean Varieties

Authors: Fikadu Kifle Hailegeorgis

Abstract:

Common bean is one of the most important sources of protein in Ethiopia and other developing countries. However, the Mexican bean weevil, Zabrotes subfasciatus (Boheman), is a major factor in the storage of common beans that causes losses. Studies were conducted to evaluate the efficacy of botanical powders of Jatropha curcas (L.), Neem/Azadrachta indica, and Parthenium hysterophorus (L) on local common bean varieties against Z subfasciatus at Melkassa Agriculture Research Center. Twenty local common bean varieties were evaluated twice against Z. Subfasciatus in a completely randomized design in three replications at the rate of 0.2g/250g of seed for each experiment. Malathion and untreated were used as standard checks. The result indicated that RAZ White and Round Yellow showed high resistance variety in experiments while Batu and Black showed high susceptible variety in experiments. Jatropha seed powder was the most effective against Z. subfasciatus. Parthenium seed powders and neem leaf powders also indicate promising results. Common beans treated with botanicals significantly (p<0.05) had a higher germination percentage than that of the untreated seed. In general, the results obtained indicated that using bean varieties (RAZ white and Round yellow) and botanicals (Jatropha) seed powder gave the best control of Z. subfasciatus.

Keywords: botanicals, malathion, resistant varieties, Z. subfasciatus

Procedia PDF Downloads 47
6789 Reducing Flood Risk through Value Capture and Risk Communication: A Case Study in Cocody-Abidjan

Authors: Dedjo Yao Simon, Takahiro Saito, Norikazu Inuzuka, Ikuo Sugiyama

Abstract:

Abidjan city (Republic of Ivory Coast) is an emerging megacity and an urban coastal area where the number of floods reported is on a rapid increase due to climate change and unplanned urbanization. However, comprehensive disaster mitigation plans, policies, and financial resources are still lacking as the population ignores the extent and location of the flood zones; making them unprepared to mitigate the damages. Considering the existing condition, this paper aims to discuss an approach for flood risk reduction in Cocody Commune through value capture strategy and flood risk communication. Using geospatial techniques and hydrological simulation, we start our study by delineating flood zones and depths under several return periods in the study area. Then, through a questionnaire a field survey is conducted in order to validate the flood maps, to estimate the flood risk and to collect some sample of the opinion of residents on how the flood risk information disclosure could affect the values of property located inside and outside the flood zones. The results indicate that the study area is highly vulnerable to 5-year floods and more, which can cause serious harm to human lives and to properties as demonstrated by the extent of the 5-year flood of 2014. Also, it is revealed there is a high probability that the values of property located within flood zones could decline, and the values of surrounding property in the safe area could increase when risk information disclosure commences. However in order to raise public awareness of flood disaster and to prevent future housing promotion in high-risk prospective areas, flood risk information should be disseminated through the establishment of an early warning system. In order to reduce the effect of risk information disclosure and to protect the values of property within the high-risk zone, we propose that property tax increments in flood free zones should be captured and be utilized for infrastructure development and to maintain the early warning system that will benefit people living in flood prone areas. Through this case study, it is shown that combination of value capture strategy and risk communication could be an effective tool to educate citizen and to invest in flood risk reduction in emerging countries.

Keywords: Cocody-Abidjan, flood, geospatial techniques, risk communication, value capture

Procedia PDF Downloads 250
6788 The Economic Limitations of Defining Data Ownership Rights

Authors: Kacper Tomasz Kröber-Mulawa

Abstract:

This paper will address the topic of data ownership from an economic perspective, and examples of economic limitations of data property rights will be provided, which have been identified using methods and approaches of economic analysis of law. To properly build a background for the economic focus, in the beginning a short perspective of data and data ownership in the EU’s legal system will be provided. It will include a short introduction to its political and social importance and highlight relevant viewpoints. This will stress the importance of a Single Market for data but also far-reaching regulations of data governance and privacy (including the distinction of personal and non-personal data, data held by public bodies and private businesses). The main discussion of this paper will build upon the briefly referred to legal basis as well as methods and approaches of economic analysis of law.

Keywords: antitrust, data, data ownership, digital economy, property rights

Procedia PDF Downloads 63
6787 Heat Forging Analysis Method on Blank Consist of Two Metals

Authors: Takashi Ueda, Shinichi Enoki

Abstract:

Forging parts is used to automobiles. Because they have high strength and it is possible to press them into complicated shape. When it is possible to manufacture hollow forging parts, it leads to reduce weight of the automobiles. But, hollow forging parts are confined to axisymmetrical shape. Hollow forging parts that were pressed to complicated shape are expected. Therefore, we forge a blank that aluminum alloy was inserted in stainless steel. After that, we can provide complex forging parts that are reduced weight, if it is possible to be melted the aluminum alloy away by using different of melting points. It is necessary to establish heat forging analysis method on blank consist of stainless steel and aluminum alloy. Because, this forging is different from conventional forging and this technology is not confirmed. In this study, we compared forging experiment with numerical analysis on the view point of forming load and shape after forming and establish how to set the material temperatures of two metals and material property of stainless steel on the analysis method. Consequently, temperature difference of stainless steel and aluminum alloy was obtained by experiment. We got material property of stainless steel on forging experimental by compression tests. We had compared numerical analysis that was used the temperature difference of two metals and the material property of stainless steel on forging experimental with forging experiment. Forging analysis method on blank consist of two metals was established by result of numerical analysis having agreed with result of forging experiment.

Keywords: forging, lightweight, analysis, hollow

Procedia PDF Downloads 399
6786 Intellectual Property Rights as a Tool to Enhance and Sustain Museums

Authors: Nayira Ahmed Galal Elden Hassan

Abstract:

The management of Intellectual Property (IP) in museums can be complex and challenging, as it requires balancing access and control. On the one hand, museums must ensure that they have balanced permissions to display works in their collections and make them accessible to the public. On the other hand, they must also protect the rights of creators and owners of works and ensure that they are not infringing on IP rights. Intellectual property has become an increasingly important aspect of museum operations in the digital age. Museums hold a vast array of cultural assets in their collections, many of which have significant value as IP assets. The balanced management of IP in museums can help generate additional revenue and promote cultural heritage while also protecting the rights of the museum and its collections. Digital technologies have greatly impacted the way museums manage IP, providing new opportunities for revenue generation through e-commerce and licensing while also presenting new challenges related to IP protection and management. Museums must take a comprehensive approach to IP management, leveraging digital technologies, protecting IP rights, and engaging in licensing and e-commerce activities to maximize income and the economy of countries through the strong management of cultural institutions. Overall, the balanced management of IP in museums is crucial for ensuring the sustainability of museum operations and for preserving cultural heritage for future generations. By taking a balanced approach to identifying museum IP assets, museums can generate revenues and secure their financial sustainability to ensure the long-term preservation of their cultural heritage. We can divide IP assets in museums into two kinds: collection IP and museum-generated IP. Certain museums become confused and lose sight of their mission when trying to leverage collections-based IP. This was the case at the German State Museum in Berlin when the museum made 100 replicas from the Nefertiti bust and wrote under the replicas all rights reserved to the Berlin Museum and issued a certificate to prevent any person or Institution from reproducing any replica from this bust. The implications of IP in museums are far-reaching and can have significant impacts on the preservation of cultural heritage, the dissemination of information, and the development of educational programs. As such, it is important for museums to have a comprehensive understanding of IP laws and regulations and to properly manage IP to avoid legal liability, damage to reputation, and loss of revenue. The research aims to highlight the importance and role of intellectual property in museums and provide some illustrative examples of this.

Keywords: intellectual property, museum, cultural assets, sustainability, IP management

Procedia PDF Downloads 19
6785 The Concepts of Ibn Taymiyyah in Halal and Haram and Their Relevance to Contemporary Issues

Authors: Muhammad Fakhrul Arrazi

Abstract:

Ibn Taymiyyah is a great figure in Islam. His works have become the reference for many Muslims in implementing the fiqh of Ibadah and Muamalat. This article reviews the concepts that Ibn Taymiyyah has initiated in Halal and Haram, long before the books on Halal and Haram are written by contemporary scholars. There are at least four concepts of Halal and Haram ever spawned by Ibn Taymiyyah. First, the belief of a jurist (Faqih) in a matter that is Haram does not necessarily make the matter Haram. Haram arises from the Quran, Sunnah, Ijma’ and Qiyas as the tarjih. Due to the different opinions among the ulama, we should revisit this concept. Second, if a Muslim involves in a transaction (Muamalat), believes it permissible and gets money from such transaction, then it is legal for other Muslims to transact with the property of this Muslim brother, even if he does not believe that the transactions made by his Muslims brother are permissible. Third, Haram is divided into two; first is Haram because of the nature of an object, such as carrion, blood, and pork. If it is mixed with water or food and alters their taste, color, and smell, the food and water become Haram. Second is Haram because of the way it is obtained such as a stolen item and a broken aqad. If it is mixed with the halal property, the property does not automatically become Haram. Fourth, a treasure whose owners cannot be traced back then it is used for the benefit of the ummah. This study used the secondary data from the classics books by Ibn Taymiyyah, particularly those entailing his views on Halal and Haram. The data were then analyzed by using thematic and comparative approach. It is found that most of the concepts proposed by Ibn Taymiyyah in Halal and Haram correspond the majority’s views in the schools. However, some of his concepts are also in contrary to other scholars. His concepts will benefit the ummah, should it be applied to the contemporary issues.

Keywords: fiqh Muamalat, halal, haram, Ibn Taymiyyah

Procedia PDF Downloads 172
6784 Hybrid Obfuscation Technique for Reverse Engineering Problem

Authors: Asma’a Mahfoud, Abu Bakar Md. Sultan, Abdul Azim Abd, Norhayati Mohd Ali, Novia Admodisastro

Abstract:

Obfuscation is a practice to make something difficult and complicated. Programming code is ordinarily obfuscated to protect the intellectual property (IP) and prevent the attacker from reverse engineering (RE) a copyrighted software program. Obfuscation may involve encrypting some or all the code, transforming out potentially revealing data, renaming useful classes and variables (identifiers) names to meaningless labels, or adding unused or meaningless code to an application binary. Obfuscation techniques were not performing effectively recently as the reversing tools are able to break the obfuscated code. We propose in this paper a hybrid obfuscation technique that contains three approaches of renaming. Experimentation was conducted to test the effectiveness of the proposed technique. The experimentation has presented a promising result, where the reversing tools were not able to read the code.

Keywords: intellectual property, obfuscation, software security, reverse engineering

Procedia PDF Downloads 136
6783 People's Perspective on Water Commons in Trans-Boundary Water Governance: A Case Study from Nepal

Authors: Sristi Silwal

Abstract:

South Asian rivers support ecosystems and sustain well-being of thousands of riparian communities. Rivers however are also sources of conflict between countries and one of the contested issues between governments of the region. Governments have signed treaties to harness some of the rivers but their provisions have not been successful in improving the quality of life of those who depend on water as common property resources. This paper will present a case of the study of the status of the water commons along the lower command areas of Koshi, Gandka and Mahakali rivers. Nepal and India have signed treaties for development and management of these rivers in 1928, 1954 and 1966. The study investigated perceptions of the local community on climate-induced disasters, provision of the treaties such as water for irrigation, participation in decision-making and specific impact of women. It looked at how the local community coped with adversities. The study showed that the common pool resources are gradually getting degraded, flood events increasing while community blame ‘other state’ and state administration for exacerbating these ills. The level of awareness about provisions of existing treatise is poor. Ongoing approach to trans-boundary water management has taken inadequate cognizance of these realities as the dominant narrative perpetuates cooperation between the governments. The paper argues that on-going discourses on trans-boundary water development and management need to use a new metrics of taking cognizance of the condition of the commons and that of the people depended on them for sustenance. In absence of such narratives, the scale of degradation would increase making those already marginalized more vulnerable to impacts of global climate change.

Keywords: climate change vulnerability, conflict, cooperation, water commons

Procedia PDF Downloads 217
6782 Racial Bias by Prosecutors: Evidence from Random Assignment

Authors: CarlyWill Sloan

Abstract:

Racial disparities in criminal justice outcomes are well-documented. However, there is little evidence on the extent to which racial bias by prosecutors is responsible for these disparities. This paper tests for racial bias in conviction by prosecutors. To identify effects, this paper leverages as good as random variation in prosecutor race using detailed administrative data on the case assignment process and case outcomes in New York County, New York. This paper shows that the assignment of an opposite-race prosecutor leads to a 5 percentage point (~ 8 percent) increase in the likelihood of conviction for property crimes. There is no evidence of effects for other types of crimes. Additional results indicate decreased dismissals by opposite-race prosecutors likely drive my property crime estimates.

Keywords: criminal justice, discrimination, prosecutors, racial disparities

Procedia PDF Downloads 179
6781 Identification of Common Indicators of Family Environment of Pupils of Alternative Schools

Authors: Yveta Pohnětalová, Veronika Nováková, Lucie Hrašová

Abstract:

The paper presents the results of research in which we were looking for common characteristics of the family environment of students alternative and innovative education systems. Topicality comes from the fact that nowadays in the Czech Republic there are several civic and parental initiatives held with the aim to establish schools for their children. The goal of our research was to reveal key aspects of these families and to identify their common indicators. Among other things, we were interested what reasons lead parents to decide to enroll their child into different education than standard (common). The survey was qualitative and there were eighteen respondents of parents of alternative schools´ pupils. The reason to implement qualitative design was the opportunity to gain deeper insight into the essence of phenomena and to obtain detailed information, which would become the basis for subsequent quantitative research. There have been semi structured interviews done with the respondents which had been recorded and transcribed. By an analysis of gained data (categorization and by coding), we found out that common indicator of our respondents is higher education and higher economic level. This issue should be at the forefront of the researches because there is lack of analysis which would provide a comparison of common and alternative schools in the Czech Republic especially with regard to quality of education. Based on results, we consider questions whether approaches of these parents towards standard education come from their own experience or from the lack of knowledge of current goals and objectives of education policy of the Czech Republic.

Keywords: alternative schools, family environment, quality of education, parents´ approach

Procedia PDF Downloads 340
6780 Morphological Comparison of the Total Skeletal of (Common Bottlenose Dolphin) Tursiops truncatus and (Harbour Porpoise) Phocoena phocoena

Authors: Onur Yaşar, Okan Bilge, Ortaç Onmuş

Abstract:

The aim of this study is to investigate and compare the locomotion structures, especially the bone structures, of two different dolphin species, the Common bottlenose dolphin Tursiops truncatus and the Harbor porpoise Phocoena phocoena, and to provide a more detailed and descriptive comparison. To compare the structures of bones of two study species; first, the Spinous Process (SP), Inferior Articular Process (IAP), Laminae Vertebrae (LA), Foramen Vertebrae (FV), Corpus Vertebrae (CV), Transverse Process (TP) were determined and then the length of the Spinous Process (LSP), length of the Foramen Vertebrae (LFV), area of the Corpus Vertebrae (ACV), and length of the Transverse Process (LTP) were measured from the caudal view. The spine consists of a total of 61 vertebrae (7 cervical, 13 thoracic, 14 lumbar, and 27 caudal vertebrae) in the Common bottlenose dolphin, while the Harbor Porpoise has 63 vertebrae (7 cervical, 12 thoracic, 14 lumbar, 30 caudal. In the Common bottlenose dolphin, epiphyseal ossification was between the 21st caudal vertebra and the 27th caudal vertebra, while in the Harbor porpoise, it was observed in all vertebrae. Ankylosing spondylitis was observed in the C1 and C2 vertebrae in the Common bottlenose dolphin and in all cervical vertebrae between C1 and C6 in the Harbor porpoise. We argue that this difference in fused cervical vertebrae between the two species may be due to the fact that the neck movements of the Harbor porpoise in the vertical and horizontal axes are more limited than those of the Common bottlenose dolphin. We also think that as the number of fused cervical vertebrae increases, underwater maneuvers are performed at a wider angle, but to test this idea, we think that different species of dolphins should be compared and the different age groups should be investigated.

Keywords: anatomy, morphometry, vertebrae, common bottlenose dolphin, Tursiops truncatus, harbour porpoise, Phocoena phocoena

Procedia PDF Downloads 20
6779 Foreign Policy and National Security Dilemma: Examining Nigerian Experience

Authors: Shuaibu Umar Abdul

Abstract:

The essence of any state as well as government is to ensure and advance the security of lives and property of its citizens. As a result, providing security in all spheres ranging from safeguarding the territorial integrity, security of lives and property of the citizens as well as economic emancipation have constitute the core objectives cum national interest of virtually all country’s foreign policy in the world. In view of this imperative above, Nigeria has enshrined in the early part of her 1999 constitution as amended, as its duty and responsibility as a state, to ensure security of lives and property of its citizens. Yet, it does not make any significant shift as it relates to the country’s fundamental security needs as exemplified by the current enormous security challenges that reduced the country’s fortune to the background in all ramifications. The study chooses realist paradigm as theoretical underpinning which emphasizes that exigency of the moment should always take priority in the pursuit of foreign policy. The study is historical, descriptive and narrative in method and character. Data for the study was sourced from secondary sources and analysed via content analysis. The study found out that it is lack of political will on the side of the government to guarantee a just and egalitarian society that will be of benefit to all citizens. This could be more appreciated when looking at the gaps between the theory in Nigerian foreign policy and the practice as exemplified by the action or inaction of the government to ensure security in the state. On this account, the study recommends that until the leaderships in Nigerian foreign policy recognized the need for political will and respect for constitutionalism to ensure security of its citizens and territory, otherwise achieving great Nigeria will remain an illusion.

Keywords: foreign policy, nation, national security, Nigeria, security

Procedia PDF Downloads 495
6778 Common Fixed Point Results and Stability of a Modified Jungck Iterative Scheme

Authors: Hudson Akewe

Abstract:

In this study, we introduce a modified Jungck (Dual Jungck) iterative scheme and use the scheme to approximate the unique common fixed point of a pair of generalized contractive-like operators in a Banach space. The iterative scheme is also shown to be stable with respect to the maps (S,T). An example is taken to justify the convergence of the scheme. Our result is a generalization and improvement of several results in the literature on single map T.

Keywords: generalized contractive-like operators, modified Jungck iterative scheme, stability results, weakly compatible maps, unique common fixed point

Procedia PDF Downloads 330
6777 Organic Waste Valorization for Biodiesel Production: Chemical and Biological Approach

Authors: Meha Alouini, Wissem Mnif, Yasmine Souissi

Abstract:

This work will be conducted within the framework of the environmental sustainable development. It involves waste recovering into biodiesel fuel. Low cost feedstocks such as waste of frying oil and animal fats have been utilized to replace refined vegetable oil for biodiesel production. Biodiesel which refers to fatty acid methyl esters (FAME) was carried out by both chemical and enzymatic reaction of transesterification. In order to compare the two studied reactions the obtained biodiesel was characterized by determining its esters content and its fuel properties according to the European standard EN 14214. It was noted that the chemical method gave the product with the best physical property. But the biological one was found more effective for obtaining important ester content. Thus it would be interesting to optimize the enzymatic pathway of production of biodiesel to obtain a better property of biodiesel.

Keywords: biodiesel, fatty acid methyl esters, transesterification, waste frying oil, waste beef fat

Procedia PDF Downloads 484
6776 A Hybrid Model Tree and Logistic Regression Model for Prediction of Soil Shear Strength in Clay

Authors: Ehsan Mehryaar, Seyed Armin Motahari Tabari

Abstract:

Without a doubt, soil shear strength is the most important property of the soil. The majority of fatal and catastrophic geological accidents are related to shear strength failure of the soil. Therefore, its prediction is a matter of high importance. However, acquiring the shear strength is usually a cumbersome task that might need complicated laboratory testing. Therefore, prediction of it based on common and easy to get soil properties can simplify the projects substantially. In this paper, A hybrid model based on the classification and regression tree algorithm and logistic regression is proposed where each leaf of the tree is an independent regression model. A database of 189 points for clay soil, including Moisture content, liquid limit, plastic limit, clay content, and shear strength, is collected. The performance of the developed model compared to the existing models and equations using root mean squared error and coefficient of correlation.

Keywords: model tree, CART, logistic regression, soil shear strength

Procedia PDF Downloads 178
6775 Detection of Pharmaceutical Personal Protective Equipment in Video Stream

Authors: Michael Leontiev, Danil Zhilikov, Dmitry Lobanov, Lenar Klimov, Vyacheslav Chertan, Daniel Bobrov, Vladislav Maslov, Vasilii Vologdin, Ksenia Balabaeva

Abstract:

Pharmaceutical manufacturing is a complex process, where each stage requires a high level of safety and sterility. Personal Protective Equipment (PPE) is used for this purpose. Despite all the measures of control, the human factor (improper PPE wearing) causes numerous losses to human health and material property. This research proposes a solid computer vision system for ensuring safety in pharmaceutical laboratories. For this, we have tested a wide range of state-of-the-art object detection methods. Composing previously obtained results in this sphere with our own approach to this problem, we have reached a high accuracy ([email protected]) ranging from 0.77 up to 0.98 in detecting all the elements of a common set of PPE used in pharmaceutical laboratories. Our system is a step towards safe medicine production.

Keywords: sterility and safety in pharmaceutical development, personal protective equipment, computer vision, object detection, monitoring in pharmaceutical development, PPE

Procedia PDF Downloads 59
6774 A Modified Nonlinear Conjugate Gradient Algorithm for Large Scale Unconstrained Optimization Problems

Authors: Tsegay Giday Woldu, Haibin Zhang, Xin Zhang, Yemane Hailu Fissuh

Abstract:

It is well known that nonlinear conjugate gradient method is one of the widely used first order methods to solve large scale unconstrained smooth optimization problems. Because of the low memory requirement, attractive theoretical features, practical computational efficiency and nice convergence properties, nonlinear conjugate gradient methods have a special role for solving large scale unconstrained optimization problems. Large scale optimization problems are with important applications in practical and scientific world. However, nonlinear conjugate gradient methods have restricted information about the curvature of the objective function and they are likely less efficient and robust compared to some second order algorithms. To overcome these drawbacks, the new modified nonlinear conjugate gradient method is presented. The noticeable features of our work are that the new search direction possesses the sufficient descent property independent of any line search and it belongs to a trust region. Under mild assumptions and standard Wolfe line search technique, the global convergence property of the proposed algorithm is established. Furthermore, to test the practical computational performance of our new algorithm, numerical experiments are provided and implemented on the set of some large dimensional unconstrained problems. The numerical results show that the proposed algorithm is an efficient and robust compared with other similar algorithms.

Keywords: conjugate gradient method, global convergence, large scale optimization, sufficient descent property

Procedia PDF Downloads 184
6773 Removal of Perchloroethylene, a Common Pollutant, in Groundwater Using Activated Carbon

Authors: Marianne Miguet, Gaël Plantard, Yves Jaeger, Vincent Goetz

Abstract:

The contamination of groundwater is a major concern. A common pollutant, the perchloroethylene, is the target contaminant. Water treatment process as Granular Activated Carbons are very efficient but requires pilot-scale testing to determine the full-scale GAC performance. First, the batch mode was used to get a reliable experimental method to estimate the adsorption capacity of a common volatile compound is settled. The Langmuir model is acceptable to fit the isotherms. Dynamic tests were performed with three columns and different operating conditions. A database of concentration profiles and breakthroughs were obtained. The resolution of the set of differential equations is acceptable to fit the dynamics tests and could be used for a full-scale adsorber.

Keywords: activated carbon, groundwater, perchloroethylene, full-scale

Procedia PDF Downloads 412
6772 Managing Human-Wildlife Conflicts Compensation Claims Data Collection and Payments Using a Scheme Administrator

Authors: Eric Mwenda, Shadrack Ngene

Abstract:

Human-wildlife conflicts (HWCs) are the main threat to conservation in Africa. This is because wildlife needs overlap with those of humans. In Kenya, about 70% of wildlife occurs outside protected areas. As a result, wildlife and human range overlap, causing HWCs. The HWCs in Kenya occur in the drylands adjacent to protected areas. The top five counties with the highest incidences of HWC are Taita Taveta, Narok, Lamu, Kajiado, and Laikipia. The common wildlife species responsible for HWCs are elephants, buffaloes, hyenas, hippos, leopards, baboons, monkeys, snakes, and crocodiles. To ensure individuals affected by the conflicts are compensated, Kenya has developed a model of HWC compensation claims data collection and payment. We collected data on HWC from all eight Kenya Wildlife Service (KWS) Conservation Areas from 2009 to 2019. Additional data was collected from stakeholders' consultative workshops held in the Conservation Areas and a literature review regarding payment of injuries and ongoing insurance schemes being practiced in areas. This was followed by the description of the claims administration process and calculation of the pricing of the compensation claims. We further developed a digital platform for data capture and processing of all reported conflict cases and payments. Our product recognized four categories of HWC (i.e., human death and injury, property damage, crop destruction, and livestock predation). Personal bodily injury and human death were provided based on the Continental Scale of Benefits. We proposed a maximum of Kenya Shillings (KES) 3,000,000 for death. Medical, pharmaceutical, and hospital expenses were capped at a maximum of KES 150,000, as well as funeral costs at KES 50,000. Pain and suffering were proposed to be paid for 12 months at the rate of KES 13,500 per month. Crop damage was to be based on farm input costs at a maximum of KES 150,000 per claim. Livestock predation leading to death was based on Tropical Livestock Unit (TLU), which is equivalent to KES 30,000, whick includes Cattle (1 TLU = KES 30,000), Camel (1.4 TLU = KES 42,000), Goat (0.15 TLU = 4,500), Sheep (0.15 TLU = 4,500), and Donkey (0.5 TLU = KES 15,000). Property destruction (buildings, outside structures and harvested crops) was capped at KES 150,000 per any one claim. We conclude that it is possible to use an administrator to collect data on HWC compensation claims and make payments using technology. The success of the new approach will depend on a piloting program. We recommended that a pilot scheme be initiated for eight months in Taita Taveta, Kajiado, Baringo, Laikipia, Narok, and Meru Counties. This will test the claims administration process as well as harmonize data collection methods. The results of this pilot will be crucial in adjusting the scheme before country-wide roll out.

Keywords: human-wildlife conflicts, compensation, human death and injury, crop destruction, predation, property destruction

Procedia PDF Downloads 42