Search results for: security laws
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3569

Search results for: security laws

1259 Sanction Influences and Reconstruction Strategies for Iran Oil Market in Post-Sanctions

Authors: Mehrdad HassanZadeh Dugoori, Iman Mohammadali Tajrishi

Abstract:

Since Iran's nuclear program became public in 2002, the International Atomic Energy Agency (IAEA) has been unable to confirm Tehran's assertions that its nuclear activities are exclusively for peaceful purposes and that it has not sought to develop nuclear weapons. The United Nations Security Council has adopted six resolutions since 2006 requiring Iran to stop enriching uranium - which can be used for civilian purposes, but also to build nuclear bombs, which Iran never follow this strategy- and co-operate with the IAEA. Four resolutions have included progressively expansive sanctions to persuade Tehran to comply. The US and EU have imposed additional sanctions on Iranian oil exports and banks since 2012. In this article we reassess the sanction dimensions of Iran and the influences. Then according to the last agreement between P5+1 and Iran in 15 July 2015, we mention reconstruction strategies for oil export markets of Iran and the operational program for one million barrel of crude oil sales per day. These strategies are the conclusion of focus group and brain storming with Iran's oil and gas managers during content analysis.

Keywords: post-sanction, oil market, reconstruction, marketing, strategy

Procedia PDF Downloads 456
1258 Necessity of Recognition of Same-Sex Marriages and Civil Partnerships Concluded Abroad from Civil Status Registry Point of View

Authors: Ewa Kamarad

Abstract:

Recent problems with adopting the EU Regulation on matrimonial property regimes have clearly proven that Member States are unable to agree on the scope of the Regulation and, therefore, on the definitions of matrimonial property and marriage itself. Taking into account that the Regulation on the law applicable to divorce and legal separation, as well as the Regulation on matrimonial property regimes, were adopted in the framework of enhanced cooperation, it is evident that lack of a unified definition of marriage has very wide-ranging consequences. The main problem with the unified definition of marriage is that the EU is not entitled to adopt measures in the domain of material family law, as this area remains under the exclusive competence of the Member States. Because of that, the legislation on marriage in domestic legal orders of the various Member States is very different. These differences concern not only issues such as form of marriage or capacity to enter into marriage, but also the most basic matter, namely the core of the institution of marriage itself. Within the 28 Member States, we have those that allow both different-sex and same-sex marriages, those that have adopted special, separate institutions for same-sex couples, and those that allow only marriage between a man and a woman (e.g. Hungary, Latvia, Lithuania, Poland, Slovakia). Because of the freedom of movement within the European Union, it seems necessary to somehow recognize the civil effects of a marriage that was concluded in another Member State. The most crucial issue is how far that recognition should go. The thesis presented in the presentation is that, at an absolute minimum, the authorities of all Member States must recognize the civil status of the persons who enter into marriage in another Member State. Lack of such recognition might cause serious problems, both for the spouses and for other individuals. The authorities of some Member States may treat the marriage as if it does not exist because it was concluded under foreign law that defines marriage differently. Because of that, it is possible for the spouse to obtain a certificate of civil status stating that he or she is single and thus eligible to enter into marriage – despite being legally married under the law of another Member State. Such certificate can then be used in another country to serve as a proof of civil status. Eventually the lack of recognition can lead to so-called “international bigamy”. The biggest obstacle to recognition of marriages concluded under the law of another Member State that defines marriage differently is the impossibility of transcription of a foreign civil certificate in the case of such a marriage. That is caused by the rule requiring that a civil certificate issued (or transcribed) under one country's law can contain only records of legal institutions recognized by that country's legal order. The presentation is going to provide possible solutions to this problem.

Keywords: civil status, recognition of marriage, conflict of laws, private international law

Procedia PDF Downloads 235
1257 The Third Islamic Defend Action: The Completeness Model of Islamic Peace Movement in Indonesia

Authors: Husnul Isa Harahap

Abstract:

On December 2, 2016 occurred mass movements in Indonesia, led by the National Movement of Fatwa Guard, Indonesian Ulema Council (GNPF MUI). This movement is named 212 in accordance with the date, and also called The Third Islamic Defend Action, a continued movement of Islamic defend earlier (November 4, 2016 and October 14, 2016). All three movements have raised the issue of the demand that Basuki Tjahaja Purnama (Jakarta governor) also known as Ahok put on trial for allegedly insulting the Quran. The interesting view of this movement is that: first, the great social movement could emerge from a small but sensitive issues. Second, although this movement followed by radical Islamic groups, that movement known as the largest and most peaceful Islamic Movement in Indonesia. Third, the movement succeeded in answer the doubts of many parties that the social movements with large masses can not maintain security, order, and even the cleanliness of the site action. What causes all this happen? First, the emphasis on the use of basic religious elements that Islam is love for peace. Second, the role of leadership that is trusted and based on religious relationship. Third, this movement is well organized and trying reflect Islamic values.

Keywords: Islamic values, social movement, peaceful group, sensitive issue

Procedia PDF Downloads 335
1256 The Impact of Social Protection Intervention on Alleviating Social Vulnerability (Evidence from Ethiopian Rural Households)

Authors: Tewelde Gebresslase Haile, S. P. Singh

Abstract:

To bridge the existing knowledge gap on public intervention implementations, this study estimates the impact of social protection intervention (SPI) on alleviating social vulnerability. Following a multi-stage sampling, primary information was gathered through a self-administered questionnaire, FGD, and interviews from the target households located at four systematically selected districts of Tigrai, Ethiopia. Factor analysis and Propensity Score Matching are applied to construct Social Vulnerability Index (SVI) and measuring the counterfactual impact of selected intervention. As a multidimensional challenge, social vulnerability is found as an important concept used to guide policy evaluation. Accessibility of basic services of Social Affairs, Agriculture, Health and Education sectors, and Food Security Program are commonly used as SPIs. Finally, this study discovers that the households who had access to SPI have scored 9.65% lower SVI than in the absence of the intervention. Finally, this study suggests the provision of integrated, proactive, productive, and evidence-based SPIs to alleviate social vulnerability.

Keywords: social protection, livelihood assets, social vulnerability, public policy SVI

Procedia PDF Downloads 89
1255 An Authentication Protocol for Quantum Enabled Mobile Devices

Authors: Natarajan Venkatachalam, Subrahmanya V. R. K. Rao, Vijay Karthikeyan Dhandapani, Swaminathan Saravanavel

Abstract:

The quantum communication technology is an evolving design which connects multiple quantum enabled devices to internet for secret communication or sensitive information exchange. In future, the number of these compact quantum enabled devices will increase immensely making them an integral part of present communication systems. Therefore, safety and security of such devices is also a major concern for us. To ensure the customer sensitive information will not be eavesdropped or deciphered, we need a strong authentications and encryption mechanism. In this paper, we propose a mutual authentication scheme between these smart quantum devices and server based on the secure exchange of information through quantum channel which gives better solutions for symmetric key exchange issues. An important part of this work is to propose a secure mutual authentication protocol over the quantum channel. We show that our approach offers robust authentication protocol and further our solution is lightweight, scalable, cost-effective with optimized computational processing overheads.

Keywords: quantum cryptography, quantum key distribution, wireless quantum communication, authentication protocol, quantum enabled device, trusted third party

Procedia PDF Downloads 174
1254 Information Technology Governance Implementation and Its Determinants in the Egyptian Market

Authors: Nariman O. Kandil, Ehab K. Abou-Elkheir, Amr M. Kotb

Abstract:

Effective IT governance guarantees the strategic alignment of IT and business goals, risk mitigation control, and better IT and business performance. This study seeks to examine empirically the extent of IT governance implementation within the firms listed on the Egyptian stock exchange (EGX30) and its determinants. Accordingly, 18 semi-structured interviews face to face, phone, and video-conferencing interviews using various tools (e.g., WebEx, Zoom, and Microsoft Teams) were undertaken at the interviewees’ offices in Egypt between the end of November 2019 and the end of August 2020. Results suggest that there are variances in the extent of IT Governance (ITG) implementation within the firms listed on the Egyptian stock exchange (EGX30), mainly caused by the industry type and internal and external triggers. The results also suggest that the organization size, the type of auditor, the criticality of the industry, the effective processes & KPIs, and the information intensity expertise of the CIO have a significant impact on IT governance implementation within the firms.

Keywords: effective IT governance, Egyptian market, information security, risk controls

Procedia PDF Downloads 167
1253 Infringement of Patent Rights with Doctrine of Equivalent for Turkey

Authors: Duru Helin Ozaner

Abstract:

Due to the doctrine of equivalent, the words in the claims' sentences are insufficient for the protection area provided by the patent registration. While this situation widens the boundaries of the protection area, it also obscures the boundaries of the protected area of patents. In addition, it creates distrust for third parties. Therefore, the doctrine of equivalent aims to establish a balance between the rights of patent owners and the legal security of third parties. The current legal system of Turkey has been tried to be created as a parallel judicial system to the widely applied regulations. Therefore, the regulations regarding the protection provided by patents in the current Turkish legal system are similar to many countries. However, infringement through equivalent is common by third parties. This study, it is aimed to explain that the protection provided by the patent is not only limited to the words of the claims but also the wide-ranging protection provided by the claims for the doctrine of equivalence. This study is important to determine the limits of the protection provided by the patent right holder and to indicate the importance of the equivalent elements of the protection granted to the patent right holder.

Keywords: patent, infringement, intellectual property, the doctrine of equivalent

Procedia PDF Downloads 214
1252 Appraisal of the Nutritional Potential and Safety of Wild Vegetables of South Africa

Authors: Thozama Kwinana-Mandindi

Abstract:

The contribution made by wild edible plants to the livelihoods, food baskets and diets of the indigenous people, particularly among the rural dwellers is invaluable. These wild vegetables are among the non-conventional crops which are widely distributed throughout the wild regions in South Africa, indigenous communities have always exploited for micro-nutrient supply. They also supply significant complex, recently discovered compounds, naturally occurring phytonutrients. In order to protect and promote sustainable use of these plants for household food security, there is a need to better understand them through studies and innovations. Assessment of the wild edible plants’ safety is very key to the promotion as an agricultural product which can be utilised during dry seasons and periods of food scarcity to alleviate nutrient insecurity. Through the use of Scanning Electron Microscope (SEM) and energy dispersive X-ray spectroscopy (EDXS), the study is seen as the vital step in taking a holistic view of the value of the four most consumed wild vegetables in the Eastern Cape Province of South Africa as they were analysed for safety and appraised for components that can influence utilisation. Results indicate that they can be relied upon and cultivation be promoted.

Keywords: nature’s resource, wild vegetables, appraisal for safety, SEM

Procedia PDF Downloads 441
1251 The Nature of Origin of New Criminal Occurrences in Gjakova Region: Cultural and Criminological “Intersection” in 1999-2009

Authors: Bekim Avdiaj

Abstract:

The transition period of Kosovo society brought fundamental changes in all the spheres of organizing life. This was the period when also in the cultural tradition the biggest movement and an emerging from ‘isolation’ or from the ‘shell’ occurred. Transformation of the traditional and embracing of the modern began here. The same was experienced and is currently being experienced also by Gjakova and its surrounding which is historically renowned for its great tradition and culture. The population of this region is actually facing a transition from the traditional system into the modern one and quite often with huge leaps. These ‘movements’ or ‘evolutions’ of the society of this region, besides the numerous positive things it ‘harvested’, also brought things that do not at all correspond with their tradition as well as new criminal occurrences which in the past were not present in this area. Furthermore, some of the ‘new’ behaviours that are embraced from other ‘cultures’ and ‘civilizations’, and which are often exceeded, are quite perturbing. The security situation is also worrying, particularly following the appearance of some new criminal occurrences. Therefore, with this research paper we will strive to analyse the new cultural “intersections” as well as the nature of the origin of some new very worrying criminal occurrences. We will present there also some factors inciting into these occurrences, which were confessed by the persons involved in these criminal occurrences and who come from this very region.

Keywords: crime, occurrence, culture, Gjakova Region

Procedia PDF Downloads 351
1250 A Small-Scale Flexible Test Bench for the Investigation of Fertigation Strategies in Soilless Culture

Authors: Giacomo Barbieri

Abstract:

In soilless culture, the management of the nutrient solution is the most important aspect for crop growing. Fertigation dose, frequency and nutrient concentration must be planned with the objective of reaching an optimal crop growth by limiting the utilized resources and the associated costs. The definition of efficient fertigation strategies is a complex problem since fertigation requirements vary on the basis of different factors, and crops are sensitive to small variations on fertigation parameters. To the best of author knowledge, a small-scale test bench that is flexible for both nutrient solution preparation and precise irrigation is currently missing, limiting the investigations in standard practices for soilless culture. Starting from the analysis of the state of the art, this paper proposes a small-scale system that is potentially able to concurrently test different fertigation strategies. The system will be designed and implemented throughout a three year project started on August 2018. However, due to the importance of the topic within current challenges as food security and climate change, this work is spread considering that may inspire other universities and organizations.

Keywords: soilless culture, fertigation, test bench, small-scale, automation

Procedia PDF Downloads 177
1249 Gendered Water Insecurity: a Structural Equation Approach for Female-Headed Households in South Africa

Authors: Saul Ngarava, Leocadia Zhou, Nomakhaya Monde

Abstract:

Water crises have the fourth most significant societal impact after weapons of mass destruction, climate change, and extreme weather conditions, ahead of natural disasters. Intricacies between women and water are central to achieving the 2030 Sustainable Development Goals (SDGs). The majority of the 1.2 billion poor people worldwide, with two-thirds being women, and mostly located in Sub Sahara Africa (SSA) and South Asia, do not have access to safe and reliable sources of water. There exist gendered differences in water security based on the division of labour associating women with water. Globally, women and girls are responsible for water collection in 80% of the households which have no water on their premises. Women spend 16 million hours a day collecting water, while men and children spend 6 million and 4 million per day, respectively, which is time foregone in the pursuit of other livelihood activities. Due to their proximity and activities concerning water, women are vulnerable to water insecurity through exposures to water-borne diseases, fatigue from physically carrying water, and exposure to sexual and physical harassment, amongst others. Proximity to treated water and their wellbeing also has an effect on their sensitivity and adaptive capacity to water insecurity. The great distances, difficult terrain and heavy lifting expose women to vulnerabilities of water insecurity. However, few studies have quantified the vulnerabilities and burdens on women, with a few taking a phenomenological qualitative approach. Vulnerability studies have also been scanty in the water security realm, with most studies taking linear forms of either quantifying exposures, sensitivities or adaptive capacities in climate change studies. The current study argues for the need for a water insecurity vulnerability assessment, especially for women into research agendas as well as policy interventions, monitoring, and evaluation. The study sought to identify and provide pathways through which female-headed households were water insecure in South Africa, the 30th driest country in the world. This was through linking the drinking water decision as well as the vulnerability frameworks. Secondary data collected during the 2016 General Household Survey (GHS) was utilised, with a sample of 5928 female-headed households. Principal Component Analysis and Structural Equation Modelling were used to analyse the data. The results show dynamic relationships between water characteristics and water treatment. There were also associations between water access and wealth status of the female-headed households. Association was also found between water access and water treatment as well as between wealth status and water treatment. The study concludes that there are dynamic relationships in water insecurity (exposure, sensitivity, and adaptive capacity) for female-headed households in South Africa. The study recommends that a multi-prong approach is required in tackling exposures, sensitivities, and adaptive capacities to water insecurity. This should include capacitating and empowering women for wealth generation, improve access to water treatment equipment as well as prioritising the improvement of infrastructure that brings piped and safe water to female-headed households.

Keywords: gender, principal component analysis, structural equation modelling, vulnerability, water insecurity

Procedia PDF Downloads 121
1248 Design of Strain Sensor Based on Cascaded Fiber Bragg Grating for Remote Sensing Monitoring Application

Authors: Arafat A. A. Shabaneh

Abstract:

Harsh environments demand a developed detection of an optical communication system to ensure a high level of security and safety. Fiber Bragg gratings (FBG) are emerging sensing instruments that respond to variations in strain and temperature via varying wavelengths. In this paper, cascaded uniform FBG as a strain sensor for 6 km length at 1550 nm wavelength with 30 oC is designed with analyzing of dynamic strain and wavelength shifts. FBG is placed in a small segment of optical fiber, which reflects light of a specific wavelength and passes the remaining wavelengths. This makes a periodic alteration in the refractive index within the fiber core. The alteration in the modal index of fiber produced due to strain consequences in a Bragg wavelength. When the developed sensor exposure to a strain of cascaded uniform FBG by 0.01, the wavelength is shifted to 0.0000144383 μm. The sensing accuracy of the developed sensor is 0.0012. Simulation results show reliable and effective strain monitoring sensors for remote sensing applications.

Keywords: Cascaded fiber Bragg gratings, Strain sensor, Remote sensing, Wavelength shift

Procedia PDF Downloads 201
1247 Influence of the Popularity of Opera during Risorgimento on Foreign Presence in Italy

Authors: Andrew Wee

Abstract:

As a result of the Italian Independence Wars starting in 1848, Italy began to change through unification. People gradually moved away from some of their traditional practices and values, such as the long-held belief that women were inferior to men, as part of the Risorgimento. Italians began to take interest in opera as a form of emotional release. As opera became more popular and prominent in their culture, it aided in the dissemination of ideas, especially stimulating the spread of imperialism, in the late 19th century, as Italy began extending its presence to other countries. In order to collect the information needed to analyze Italy’s foreign presence, it was necessary to consult texts concerning the culture of the Risorgimento. These texts included primary sources from operatic composers and contemporary recorded accounts. Letters from Giuseppe Verdi, a leader in opera during the Risorgimento, have been scrutinized for indications of popular attitudes of the time. The cultural context of the Risorgimento is essential to understanding the Italian motives and attitudes towards the outside world. On the more political side, research has also entailed the study of historical data of general laws, policies, and their purposes concerning geopolitical boundaries and foreign affairs, such as Edward Said’s thesis on Orientalism. By establishing these two characteristics of Italy, the paper will thoroughly illustrate Italy’s presence in foreign affairs. Texts have been searched with the intent of using information that reveals Italian attitudes toward exotic countries to determine whether their demeanor was positive or condescending. Motives behind sources have been interpreted in context in order to form a complete picture of the Italian sentiment towards foreigners. Additionally, research pertaining to Italian nationalism and imperialism such as song and literature has been used. The primary form of research has been the division of sources that are culturally based and those that are political in nature. Opera had always been developing since its creation in the 17th century, and in the 19th century, the bel canto movement revolutionized opera and its role in Italian society. This paper uses evidence that popular sentiment was influenced by opera to support the belief that the evolution of opera was as a result of the nationalist sentiment, and in turn fueled the cultural movement known as the Risorgimento. In this way, opera proceeded to affect Italian culture by spreading the idea of imperialism.

Keywords: opera, Italian unification, music history, imperialism

Procedia PDF Downloads 347
1246 Humanitarian Aid and National Sovereignty: The Case of Kosovo

Authors: Nick Papanikolaou

Abstract:

In modern world politics, International relations are very complex not only in their construction but also in their interpretation the ex-Yugoslavian(western Balkans) countries, due to the establishment of independent states, have also risen pending geopolitical and territorial issues such as the Kosovo dispute widely known as an active frozen conflict. Science of anthropology and its subfield of anthropology of conflict can suggest a sustainable plan of communities coexistence and abolishment of fondamentalism. The 1244 Security Council Resolution provides a framework of implementation of a transitional international joint international armed presence for ensuring control and stability in the territory. The changing international relations landscape and the rise of the integration of the Western Balkans in the European Union have brought the question of Kosovo and all the till now internationally controlled system of governance to a dead end. A new solution that will ensure a sustainable future needs to be applied in order to solve this case in a way that rights of both albanians and Serbians will be equally respected and both populations will coexist peacefully. What this presentation aims for is to present a plan for the peaceful coexistence and sovreignty of habitants of Kosovo in a whole new way of governance.

Keywords: sovereignty, Kosovo, Western Balkans, anthropology of conflict

Procedia PDF Downloads 70
1245 Change Detection of Water Bodies in Dhaka City: An Analysis Using Geographic Information System and Remote Sensing

Authors: M. Humayun Kabir, Mahamuda Afroze, K. Maudood Elahi

Abstract:

Since the late 1900s, unplanned and rapid urbanization processes have drastically altered the land, reduced water bodies, and decreased vegetation cover in the capital city of Bangladesh, Dhaka. The capitalist modes of urbanization results in the encroachment of the surface water bodies in this city. The main goal of this study is to investigate the change detection of water bodies in Dhaka city, analyzing spatial distribution of water bodies and calculating the changing rate of it. This effort aims to influence public policy for environmental justice initiatives around protecting water bodies for ensuring proper function of the urban ecosystem. This study accomplishes research goal by compiling satellite imageries into GIS software to understand the changes of water bodies in Dhaka city. The work focuses on the late 20th century to early 21st century to analyze this city before and after major infrastructural changes occurred in unplanned manner. The land use of the study area has been classified into four categories, and the areas of the different land use have been calculated using MS Excel and SPSS. The results reveal that the urbanization expanded from central to northern part and major encroachment occurred at the western and eastern part of the city. It has also been found that, in 1988, the total area of water bodies was 8935.38 hectares, and it gradually decreased, and in 1998, 2008, 2017, the total areas of water bodies reached 6065.73, 4853.32, 2077.56 hectares, respectively. Rapid population growth, unplanned urbanization, and industrialization have generated pressure to change the land use pattern in Dhaka city. These expansion processes are engulfing wetland, water bodies, and vegetation cover without considering environmental impact. In order to regain the wetland and surface water bodies, the concern authorities must implement laws and act as a legal instrument in this regard and take action against the violators of it. This research is the synthesis of time series data that provides a complete picture of the water body’s status of Dhaka city that might help to make plans and policies for water body conservation.

Keywords: ecosystem, GIS, industrialization, land use, remote sensing, urbanization

Procedia PDF Downloads 152
1244 Preserving Wetlands: Legal and Ecological Challenges in the Face of Degradation: The Case Study of Miankaleh, Iran

Authors: Setareh Orak

Abstract:

Wetlands are essential guardians of global ecosystems, yet they remain vulnerable to increasing human interference and environmental stress. The Miankaleh wetland in northern Iran, designated as a Ramsar Convention site, represents a critical habitat known for its rich biodiversity and essential ecological functions. Despite the existence of national and international environmental laws aimed at preserving such critical ecosystems, the regulatory frameworks in place often fall short in terms of enforcement, monitoring, and overall effectiveness. Unfortunately, this wetland is undergoing severe degradation due to overexploitation, industrial contamination, unsustainable tourism, and land-use alterations. This study aims to assess the strengths and limitations of these regulations and examine their practical impacts on Miankaleh’s ecological health. Adopting a multi-method research approach, this study relies on a combination of case study analysis, legal and literature reviews, environmental data examination, stakeholder interviews, and comparative assessments. Through these methodologies, we scrutinize current national policies, international conventions, and their enforcement mechanisms, revealing the primary areas where they fail to protect Miankaleh effectively. The analysis is supported by two satellite maps linked to our tables, offering detailed visual representations of changes in land use, vegetation, and pollution sources over recent years. By connecting these visual data with quantitative measures, the study provides a comprehensive perspective on how human activities and regulatory shortcomings are contributing to environmental degradation. In conclusion, this study’s insights into the limitations of current environmental legislation and its recommendations for enhancing both policy and public engagement underscore the urgent need for integrated, multi-level efforts in conserving the Miankaleh wetland. Through strengthened legal frameworks, better enforcement, increased public awareness, and international cooperation, the hope is to establish a model of conservation that not only preserves Miankaleh but also serves as a template for protecting similar ecologically sensitive areas worldwide.

Keywords: wetlands, tourism, industrial pollution, land use changes, Ramsar convention

Procedia PDF Downloads 12
1243 Biodiversity of Pathogenic and Toxigenic Fungi Associated with Maize Grains Sampled across Egypt

Authors: Yasser Shabana, Khaled Ghoneem, Nehal Arafat, Younes Rashad, Dalia Aseel, Bruce Fitt, Aiming Qi, Benjamine Richard

Abstract:

Providing food for more than 100 million people is one of Egypt's main challenges facing development. The overall goal is to formulate strategies to enhance food security in light of population growth. Two hundred samples of maize grains from 25 governates were collected. For the detection of seed-borne fungi, the deep-freezing blotter method (DFB) and washing method (ISTA 1999) were used. A total of 41 fungal species was recovered from maize seed samples. Weather data from 30 stations scattered all over Egypt and covering the major maize growing areas were obtained. Canonical correspondence analysis of data for the obtained fungal genera with temperature, relative humidity, precipitation, wind speed, or solar radiation revealed that relative humidity, temperature and wind speed were the most influential weather variables.

Keywords: biodiversity, climate change, maize, seed-borne fungi

Procedia PDF Downloads 162
1242 Failure Cases Analysis in Petrochemical Industry

Authors: S. W. Liu, J. H. Lv, W. Z. Wang

Abstract:

In recent years, the failure accidents in petrochemical industry have been frequent, and have posed great security problems in personnel and property. The improvement of petrochemical safety is highly requested in order to prevent re-occurrence of severe accident. This study focuses on surveying the failure cases occurred in petrochemical field, which were extracted from journals of engineering failure, including engineering failure analysis and case studies in engineering failure analysis. The relation of failure mode, failure mechanism, type of components, and type of materials was analyzed in this study. And the analytical results showed that failures occurred more frequently in vessels and piping among the petrochemical equipment. Moreover, equipment made of carbon steel and stainless steel accounts for the majority of failures compared to other materials. This may be related to the application of the equipment and the performance of the material. In addition, corrosion failures were the largest in number of occurrence in the failure of petrochemical equipment, in which stress corrosion cracking accounts for a large proportion. This may have a lot to do with the service environment of the petrochemical equipment. Therefore, it can be concluded that the corrosion prevention of petrochemical equipment is particularly important.

Keywords: cases analysis, corrosion, failure, petrochemical industry

Procedia PDF Downloads 307
1241 International Solar Alliance: A Case for Indian Solar Diplomacy

Authors: Swadha Singh

Abstract:

International Solar Alliance is the foremost treaty-based global organization concerned with tapping the potential of sun-abundant nations between the Tropics of Cancer and Capricorn and enables co-operation among them. As a founding member of the International Solar Alliance, India exhibits its positioning as an upcoming leader in clean energy. India has set ambitious goals and targets to expand the share of solar in its energy mix and is playing a proactive role both at the regional and global levels. ISA aims to serve multiple goals- bring about scale commercialization of solar power, boost domestic manufacturing, and leverage solar diplomacy in African countries, amongst others. Against this backdrop, this paper attempts to examine the ways in which ISA as an intergovernmental organization under Indian leadership can leverage the cause of clean energy (solar) diplomacy and effectively shape partnerships and collaborations with other developing countries in terms of sharing solar technology, capacity building, risk mitigation, mobilizing financial investment and providing an aggregate market. A more specific focus of ISA is on the developing countries, which in the absence of a collective, are constrained by technology and capital scarcity, despite being naturally endowed with solar resources. Solar rich but finance-constrained economies face political risk, foreign exchange risk, and off-taker risk. Scholars argue that aligning India’s climate change discourse and growth prospects in its engagements, collaborations, and partnerships at the bilateral, multilateral and regional level can help promote trade, attract investments, and promote resilient energy transition both in India and in partner countries. For developing countries, coming together in an action-oriented way on issues of climate and clean energy is particularly important since it is developing and underdeveloped countries that face multiple and coalescing challenges such as the adverse impact of climate change, uneven and low access to reliable energy, and pressing employment needs. Investing in green recovery is agreed to be an assured way to create resilient value chains, create sustainable livelihoods, and help mitigate climate threats. If India is able to ‘green its growth’ process, it holds the potential to emerge as a climate leader internationally. It can use its experience in the renewable sector to guide other developing countries in balancing multiple similar objectives of development, energy security, and sustainability. The challenges underlying solar expansion in India have lessons to offer other developing countries, giving India an opportunity to assume a leadership role in solar diplomacy and expand its geopolitical influence through inter-governmental organizations such as ISA. It is noted that India has limited capacity to directly provide financial funds and support and is not a leading manufacturer of cheap solar equipment, as does China; however, India can nonetheless leverage its large domestic market to scale up the commercialization of solar power and offer insights and learnings to similarly placed abundant solar countries. The paper examines the potential of and limits placed on India’s solar diplomacy.

Keywords: climate diplomacy, energy security, solar diplomacy, renewable energy

Procedia PDF Downloads 118
1240 Artificial Intelligence for Cloud Computing

Authors: Sandesh Achar

Abstract:

Artificial intelligence is being increasingly incorporated into many applications across various sectors such as health, education, security, and agriculture. Recently, there has been rapid development in cloud computing technology, resulting in AI’s implementation into cloud computing to enhance and optimize the technology service rendered. The deployment of AI in cloud-based applications has brought about autonomous computing, whereby systems achieve stated results without human intervention. Despite the amount of research into autonomous computing, work incorporating AI/ML into cloud computing to enhance its performance and resource allocation remain a fundamental challenge. This paper highlights different manifestations, roles, trends, and challenges related to AI-based cloud computing models. This work reviews and highlights excellent investigations and progress in the domain. Future directions are suggested for leveraging AI/ML in next-generation computing for emerging computing paradigms such as cloud environments. Adopting AI-based algorithms and techniques to increase operational efficiency, cost savings, automation, reducing energy consumption and solving complex cloud computing issues are the major findings outlined in this paper.

Keywords: artificial intelligence, cloud computing, deep learning, machine learning, internet of things

Procedia PDF Downloads 109
1239 Factors Influencing Consumer Adoption of Digital Banking Apps in the UK

Authors: Sevelina Ndlovu

Abstract:

Financial Technology (fintech) advancement is recognised as one of the most transformational innovations in the financial industry. Fintech has given rise to internet-only digital banking, a novel financial technology advancement, and innovation that allows banking services through internet applications with no need for physical branches. This technology is becoming a new banking normal among consumers for its ubiquitous and real-time access advantages. There is evident switching and migration from traditional banking towards these fintech facilities, which could possibly pose a systemic risk if not properly understood and monitored. Fintech advancement has also brought about the emergence and escalation of financial technology consumption themes such as trust, security, perceived risk, and sustainability within the banking industry, themes scarcely covered in existing theoretic literature. To that end, the objective of this research is to investigate factors that determine fintech adoption and propose an integrated adoption model. This study aims to establish what the significant drivers of adoption are and develop a conceptual model that integrates technological, behavioral, and environmental constructs by extending the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2). It proposes integrating constructs that influence financial consumption themes such as trust, perceived risk, security, financial incentives, micro-investing opportunities, and environmental consciousness to determine the impact of these factors on the adoption and intention to use digital banking apps. The main advantage of this conceptual model is the consolidation of a greater number of predictor variables that can provide a fuller explanation of the consumer's adoption of digital banking Apps. Moderating variables of age, gender, and income are incorporated. To the best of author’s knowledge, this study is the first that extends the UTAUT2 model with this combination of constructs to investigate user’s intention to adopt internet-only digital banking apps in the UK context. By investigating factors that are not included in the existing theories but are highly pertinent to the adoption of internet-only banking services, this research adds to existing knowledge and extends the generalisability of the UTAUT2 in a financial services adoption context. This is something that fills a gap in knowledge, as highlighted to needing further research on UTAUT2 after reviewing the theory in 2016 from its original version of 2003. To achieve the objectives of this study, this research assumes a quantitative research approach to empirically test the hypotheses derived from existing literature and pilot studies to give statistical support to generalise the research findings for further possible applications in theory and practice. This research is explanatory or casual in nature and uses cross-section primary data collected through a survey method. Convenient and purposive sampling using structured self-administered online questionnaires is used for data collection. The proposed model is tested using Structural Equation Modelling (SEM), and the analysis of primary data collected through an online survey is processed using Smart PLS software with a sample size of 386 digital bank users. The results are expected to establish if there are significant relationships between the dependent and independent variables and establish what the most influencing factors are.

Keywords: banking applications, digital banking, financial technology, technology adoption, UTAUT2

Procedia PDF Downloads 72
1238 The Comparative Analysis on Pre-Trial in Relation to the Reform of Pre-Trial in Indonesian Criminal Procedural Code

Authors: Muhammad Fatahillah Akbar

Abstract:

Criminal Procedural Law is established to protect the society from the abuse of authority. To achieve that purpose, the criminal procedural law shall be established in accordance with the laws of human right and the protection of the society. One of the mechanisms to protect human rights and to ensure the compliance of authorities in criminal procedural law is pre-trial mechanism. In many countries, there are various mechanisms of pre-trial. In the recent cases in Indonesia, pre-trial has been an interesting issue. The issue is also addressed by the Constitutional Court Decision Number 21/PUU-XII/2014 which enhance the competence of pre-trial which includes the suspect determination and the legality of seizure and search. Before that decision, some pre-trial decisions have made landmark decision by enhancing the competence of pre-trial, such as the suspect determination case in Budi Gunawan Case and legality of the investigation in Hadi Purnomo Case. These pre-trial cases occurred because the society needs protection even though it is not provided by written legislations, in this matter, The Indonesian Criminal Procedural Code (KUHAP). For instance, a person can be a suspect for unlimited time because the Criminal Procedural Code does not regulate the limit of investigation, so the suspect enactment shall be able to be challenged to protect human rights. Before the Constitutional Court Decision Suspect Determination cannot be challenged so that the society is not fully protected. The Constitutional Court Decision has provided more protections. Nowadays, investigators shall be more careful in conducting the investigation. However, those decisions, including the Constitutional Court Decision are not sufficient for society to be protected by abuse of authority. For example, on 7 March 2017, a single judge, in a Pre-Trial, at the Surabaya District Court, decided that the investigation was unlawful and shall be terminated. This is not regulated according to the Code and also any decisions in pre-trial. It can be seen that the reform of pre-trial is necessary. Hence, this paper aims to examine how pre-trial shall be developed in the future to provide wide access for society to have social justice in criminal justice system. The question will be answered by normative, historical, and comparative approaches. Firstly, the paper will examine the history of pre-trial in Indonesia and also landmark decisions on pre-trial. Then, the lessons learned from other countries regarding to the pre-trial mechanism will be elaborated to show how pre-trial shall be developed and what the competences of a pre-trial are. The focus of all discussions shall be on how the society is protected and provided access to legally complain to the authority. At the end of the paper, the recommendation to reform the pre-trial mechanism will be suggested.

Keywords: pre-trial, criminal procedural law, society

Procedia PDF Downloads 168
1237 An AHP Study on The Migrant and Refugee Employees Occupational Health and Safety Issues in Turkey

Authors: Cengiz Akyildiz, Ismail Ekmekci

Abstract:

In the past 15 years, many people have sought refuge and emigrated to developed countries due to the civil war in Syria, terrorism and turmoil in Iraq, Iran and Afghanistan, hunger problems in Africa and the purpose of work. Many of these people came to Turkey. By the end of the 2019, in Turkey, regular and irregular migrants, asylum seekers and foreigners under international protection are about 6 million people. The majority of these people are Syrians. Approximately 2 800 000 immigrants and refugees are in the workforce. Migrant workers in our country constitute the largest proportion among all countries in the world according to the local labor force. 2.5 million of these employees, with a high rate of about 90%, work informally and do not have legal records and valid employment contracts as a workforce; They cannot benefit from Occupational Health and Safety (OHS) services. Migrant workers generally receive less wages than local workers, working longer hours and worse conditions; they are often subjected to human rights violations, harassment, human trafficking and violence. Migrant workers face problems such as OHS practices, environmental and occupational exposures, language / cultural barriers, access to health services, and lack of documentation. Therefore, the OHS problems of these employees are becoming an increasingly problematic area. However, there is not enough research, analysis and academic studies in this field. The order of importance should be known for the radical solution of the problems, because of the problems with high severity are also at high risk. In this study, for the first time, a Search Conference was held with the participation of 45 stakeholders to reveal the OHS problems of regular and irregular migrant workers in our country. The problems arising from this workshop were compared with the problems in the literature and the problems in this field were determined and weighted for our country. Later, to determine the significance levels of these problems, AHP study, which is a Multi Criteria Decision Making Method in which 15 experts participated, was conducted and the significance levels of these problems were determined. When the data obtained are evaluated, it has been seen that the OSH risks of migrant workers arise from 58% laws and government policies, 29% from employers, 13% from personal faults of employees. An academic study has been carried out for the first time in this field regarding the OHS problems of migrant workers, and an academic study has been created to guide which of the problems should be prioritized.

Keywords: environmental conditions, migrant workers, OHS issues, workplace conditions

Procedia PDF Downloads 151
1236 Vulnerable Paths Assessment for Distributed Denial of Service Attacks in a Cloud Computing Environment

Authors: Manas Tripathi, Arunabha Mukhopadhyay

Abstract:

In Cloud computing environment, cloud servers, sometimes may crash after receiving huge amount of request and cloud services may stop which can create huge loss to users of that cloud services. This situation is called Denial of Service (DoS) attack. In Distributed Denial of Service (DDoS) attack, an attacker targets multiple network paths by compromising various vulnerable systems (zombies) and floods the victim with huge amount of request through these zombies. There are many solutions to mitigate this challenge but most of the methods allows the attack traffic to arrive at Cloud Service Provider (CSP) and then only takes actions against mitigation. Here in this paper we are rather focusing on preventive mechanism to deal with these attacks. We analyze network topology and find most vulnerable paths beforehand without waiting for the traffic to arrive at CSP. We have used Dijkstra's and Yen’s algorithm. Finally, risk assessment of these paths can be done by multiplying the probabilities of attack for these paths with the potential loss.

Keywords: cloud computing, DDoS, Dijkstra, Yen’s k-shortest path, network security

Procedia PDF Downloads 278
1235 An Efficient and Provably Secure Three-Factor Authentication Scheme with Key Agreement

Authors: Mohan Ramasundaram, Amutha Prabakar Muniyandi

Abstract:

Remote user authentication is one of the important tasks for any kind of remote server applications. Several remote authentication schemes are proposed by the researcher for Telecare Medicine Information System (TMIS). Most of the existing techniques have limitations, vulnerable to various kind attacks, lack of functionalities, information leakage, no perfect forward security and ineffectiveness. Authentication is a process of user verification mechanism for allows him to access the resources of a server. Nowadays, most of the remote authentication protocols are using two-factor authentications. We have made a survey of several remote authentication schemes using three factors and this survey shows that the most of the schemes are inefficient and subject to several attacks. We observed from the experimental evaluation; the proposed scheme is very secure against various known attacks that include replay attack, man-in-the-middle attack. Furthermore, the analysis based on the communication cost and computational cost estimation of the proposed scheme with related schemes shows that our proposed scheme is efficient.

Keywords: Telecare Medicine Information System, elliptic curve cryptography, three-factor, biometric, random oracle

Procedia PDF Downloads 219
1234 Classifying and Analysis 8-Bit to 8-Bit S-Boxes Characteristic Using S-Box Evaluation Characteristic

Authors: Muhammad Luqman, Yusuf Kurniawan

Abstract:

S-Boxes is one of the linear parts of the cryptographic algorithm. The existence of S-Box in the cryptographic algorithm is needed to maintain non-linearity of the algorithm. Nowadays, modern cryptographic algorithms use an S-Box as a part of algorithm process. Despite the fact that several cryptographic algorithms today reuse theoretically secure and carefully constructed S-Boxes, there is an evaluation characteristic that can measure security properties of S-Boxes and hence the corresponding primitives. Analysis of an S-Box usually is done using manual mathematics calculation. Several S-Boxes are presented as a Truth Table without any mathematical background algorithm. Then, it’s rather difficult to determine the strength of Truth Table S-Box without a mathematical algorithm. A comprehensive analysis should be applied to the Truth Table S-Box to determine the characteristic. Several important characteristics should be owned by the S-Boxes, they are Nonlinearity, Balancedness, Algebraic degree, LAT, DAT, differential delta uniformity, correlation immunity and global avalanche criterion. Then, a comprehensive tool will be present to automatically calculate the characteristics of S-Boxes and determine the strength of S-Box. Comprehensive analysis is done on a deterministic process to produce a sequence of S-Boxes characteristic and give advice for a better S-Box construction.

Keywords: cryptographic properties, Truth Table S-Boxes, S-Boxes characteristic, deterministic process

Procedia PDF Downloads 363
1233 Livelihood Security and Mitigating Climate Changes in the Barind Tract of Bangladesh through Agroforestry Systems

Authors: Md Shafiqul Bari, Md Shafiqul Islam Sikdar

Abstract:

This paper summarizes the current knowledge on Agroforestry practices in the Barind tract of Bangladesh. The part of greater Rajshahi, Dinajpur, Rangpur and Bogra district of Bangladesh is geographically identified as the Barind tract. The hard red soil of these areas is very significant in comparison to that of the other parts of the country. A typical dry climate with comparatively high temperature prevails in the Barind area. Scanty rainfall and excessive extraction of groundwater have created an alarming situation among the Barind people and others about irrigation to the rice field. In addition, the situation may cause an adverse impact on the people whose livelihood largely depends on agriculture. The groundwater table has been declined by at least 10 to 15 meters in some areas of the Barind tract during the last 20 years. Due to absent of forestland in the Barind tract, the soil organic carbon content can decrease more rapidly because of the higher rate of decomposition. The Barind soils are largely carbon depleted but can be brought back to carbon-carrying capacity by bringing under suitable Agroforestry systems. Agroforestry has tremendous potential for carbon sequestration not only in above C biomass but also root C biomass in deeper soil depths. Agroforestry systems habitually conserve soil organic carbon and maintain a great natural nutrient pool. Cultivation of trees with arable crops under Agroforestry systems help in improving soil organic carbon content and sequestration carbon, particularly in the highly degraded Barind lands. Agroforestry systems are a way of securing the growth of cash crops that may constitute an alternative source of income in moments of crisis. Besides being a source of fuel wood, a greater presence of trees in cropping system contributes to decreasing temperatures and to increasing rainfall, thus contrasting the negative environmental impact of climate changes. In order to fulfill the objectives of this study, two experiments were conducted. The first experiment was survey on the impact of existing agroforestry system on the livelihood security in the Barind tract of Bangladesh and the second one was the role of agroforestry system on the improvement of soil properties in a multilayered coconut orchard. Agroforestry systems have been generated a lot of employment opportunities in the Barind area. More crops mean involvement of more people in various activities like involvements in dairying, sericulture, apiculture and additional associated agro-based interventions. Successful adoption of Agroforestry practices in the Barind area has shown that the Agroforestry practitioners of this area were very sound positioned economically, and had added social status too. However, from the findings of the present study, it may be concluded that the majority rural farmers of the Barind tract of Bangladesh had a very good knowledge and medium extension contact related to agroforestry production system. It was also observed that 85 per cent farmers followed agroforestry production system and received benefits to a higher extent. Again, from the research study on orchard based mutistoried agroforestry cropping system, it was evident that there was an important effect of agroforestry cropping systems on the improvement of soil chemical properties. As a result, the agroforestry systems may be helpful to attain the development objectives and preserve the biosphere core.

Keywords: agroforestry systems, Barind tract, carbon sequestration, climate changes

Procedia PDF Downloads 200
1232 Optimal Protection Coordination in Distribution Systems with Distributed Generations

Authors: Abdorreza Rabiee, Shahla Mohammad Hoseini Mirzaei

Abstract:

The advantages of distributed generations (DGs) based on renewable energy sources (RESs) leads to high penetration level of DGs in distribution network. With incorporation of DGs in distribution systems, the system reliability and security, as well as voltage profile, is improved. However, the protection of such systems is still challenging. In this paper, at first, the related papers are reviewed and then a practical scheme is proposed for coordination of OCRs in distribution system with DGs. The coordination problem is formulated as a nonlinear programming (NLP) optimization problem with the object function of minimizing total operating time of OCRs. The proposed method is studied based on a simple test system. The optimization problem is solved by General Algebraic Modeling System (GAMS) to calculate the optimal time dial setting (TDS) and also pickup current setting of OCRs. The results show the effectiveness of the proposed method and its applicability.

Keywords: distributed generation, DG, distribution network, over current relay, OCR, protection coordination, pickup current, time dial setting, TDS

Procedia PDF Downloads 138
1231 Influence of the Location of Flood Embankments on the Condition of Oxbow Lakes and Riparian Forests: A Case Study of the Middle Odra River Beds on the Example of Dragonflies (Odonata), Ground Beetles (Coleoptera: Carabidae) and Plant Communities

Authors: Magda Gorczyca, Zofia Nocoń

Abstract:

Past and current studies from different countries showed that river engineering leads to environmental degradation and extinction of many species - often those protected by local and international wildlife conservation laws. Through the years, the main focus of rivers utilization has shifted from industrial applications to recreation and wildlife preservation with a focus on keeping the biodiversity which plays a significant role in preventing climate changes. Thus an opportunity appeared to recreate flooding areas and natural habitats, which are very rare in the scale of Europe. Additionally, river restoration helps to avoid floodings and periodic droughts, which are usually very damaging to the economy. In this research, the biodiversity of dragonflies and ground beetles was analyzed in the context of plant communities and forest stands structure. Results were enriched with data from past and current literature. A comparison was made between two parts of the Odra river. A part where oxbow lake and riparian forest were separated from the river bed by embankment and a part of the river with floodplains left intact. Validity assessment of embankments relocation was made based on the research results. In the period between May and September, insects were collected, phytosociological analysis were taken, and forest stand structure properties were specified. In the part of the river not separated by the embankments, rare and protected species of plants were spotted (e.g., Trapanatans, Salvinianatans) as well as greater species and quantitive diversity of dragonfly. Ground beetles fauna, though, was richer in the area separated by the embankment. Even though the research was done during only one season and in a limited area, the results can be a starting point for further extended research and may contribute to acquiring legal wildlife protection and restoration of the researched area. During the research, the presence of invasive species Impatiens parviflora, Echinocystislobata, and Procyonlotor were observed, which may lead to loss of the natural values of the researched areas.

Keywords: carabidae, floodplains, middle Odra river, Odonata, oxbow lakes, riparian forests

Procedia PDF Downloads 141
1230 Lived Experiences of Parents in Disciplining Their Children

Authors: Bernardino Vinoya, Cassandra D. Batton, Samantha Gayle M. Bonavente, Johnson O. Canoza, Lhea Flynn B. Capones, Camille S. Dispo, Johanna Neilvin T. Dontogan, Louise Angelica C. Lipana, Charlene Pearl P. Navalta, Rechelle Vhen W. Payo-os, Mary Reyna D. Ridao, Rushnol Jade P. Tupac, Pauline B. Sol

Abstract:

Parenting is preparing children for life as productive adults and discipline strategies are needed to achieve it like non-aggressive, psychologically aggressive and physical discipline. The effects of disciplinary strategies on children are well explored as evidenced by existing studies, local and international laws and active international organizations which are all brimmed towards child protection but status quo shows a profound scarcity of studies engaged in the effects of disciplining the child on the parent. To know the deeper unexplored reasons and untold stories of the parent, mainly the lived experiences of parents in disciplining their children. Design is descriptive phenomelogical. Participants were chosen using snowball purposive sampling. Data were collected through interview with the general question, “Ano ang mga karanasan ninyo sa pagdidisiplina ng inyong anak (What are your experiences when disciplining your child?)”, followed with unstructured questions. Collaizi method was used in analyzing data. Data collected was verified through focused group discussion. Results show three main themes: Reason, Disciplinary Strategy, and Aftermath. The use of disciplinary strategy is influenced by the experiences of the parent, the triggers like the child’s misbehavior and parental desires or wishes for the child. Disciplinary strategy can either be physical punishment or verbal. Parent’s generally used both when children disrespects or disobeys. Parents also experience both positive and negative effects on their physical, social, emotional aspects after disciplining their children. As a result, parents use coping mechanisms to maintain ego stability. Disciplining a child is a cyclical process. Parents, just like the child will also experience both positive and negative outcomes after using different disciplinary strategies. Future researchers can replicate study or use triangulation in multi-site qualitative and quantitative studies, professors can teach findings on parents in the concepts of pediatric nursing and apply the findings in the clinical area particularly when dealing with families.

Keywords: parents, disciplinary strategy, parental effects, pediatric nursing

Procedia PDF Downloads 455