Search results for: technological protection measure
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7000

Search results for: technological protection measure

6760 #Push Mo Yan: A Study of the Influence of Facebook and Twitter to Adolescent Communication

Authors: Rebecca Cervantes, Elishah Maro Pangilinan

Abstract:

The current research used Uses and gratifications theory to further understand the motivations and satisfaction students get from Facebook and Twitter. The researchers relate the objectives in developing uses and gratifications theory 1) to explain how individuals use mass communication to gratify their needs, “what do people do with the media” many of these young adults use social media networks to communicate with family, friends, and even strangers. Social media sites have created new and non-personal ways for people to interact with others and young adults have taken advantage of this technological trend; 2) to discover underlying motives for individuals’ media use 3) to identify the positive and the negative consequences of individual media use. The researchers use survey questionnaires to gather information that is used in this study. A descriptive analysis was used to measure the answers to a 24-item questionnaire.

Keywords: adolescent, communication, social media, #Hashtag

Procedia PDF Downloads 267
6759 Study on Concentration and Temperature Measurement with 760 nm Diode Laser in Combustion System Using Tunable Diode Laser Absorption Spectroscopy

Authors: Miyeon Yoo, Sewon Kim, Changyeop Lee

Abstract:

It is important to measure the internal temperature or temperature distribution precisely in combustion system to increase energy efficiency and reduce the pollutants. Especially in case of large combustion systems such as power plant boiler and reheating furnace of steel making process, it is very difficult to measure those physical properties in detail. Tunable diode laser absorption spectroscopy measurement and analysis can be attractive method to overcome the difficulty. In this paper, TDLAS methods are used to measure the oxygen concentration and temperature distribution in various experimental conditions.

Keywords: tunable diode laser absorption Spectroscopy, temperature distribution, gas concentration

Procedia PDF Downloads 360
6758 Selected Technological Factors Influencing the Modulus of Elasticity of Concrete

Authors: Klara Krizova, Rudolf Hela

Abstract:

The topic of the article focuses on the evaluation of selected technological factors and their influence on resulting elasticity modulus of concrete. A series of various factors enter into the manufacturing process which, more or less, influences the elasticity modulus. This paper presents the results of concrete in which the influence of water coefficient and the size of maximum fraction of the aggregate on the static elasticity modulus were monitored. Part of selected results of the long-term programme was discussed in which a wide scope of various variants of proposals for the composition of concretes was evaluated.

Keywords: mix design, water-cement ratio, aggregate, modulus of elasticity

Procedia PDF Downloads 373
6757 Green Economy and Environmental Protection Economic Policy Challenges in Georgia

Authors: Gulnaz Erkomaishvili

Abstract:

Introduction. One of the most important issues of state economic policy in the 21st century is the problem of environmental protection. The Georgian government considers the green economy as one of the most important means of sustainable economic development and takes the initiative to implement voluntary measures to promote sustainable development. In this context, it is important to promote the development of ecosystem services, clean production, environmental education and green jobs.The development of the green economy significantly reduces the inefficient use of natural resources, waste generation, emissions into the atmosphere and the discharge of untreated water into bodies of water.It is, therefore, an important instrument in the environmental orientation of sustainable development. Objectives.The aim of the paper is to analyze the current status of the green economy in Georgia and identify effective ways to improve the environmental, economic policy of sustainable development. Methodologies: This paper uses general and specific methods, in particular, analysis, synthesis, induction, deduction, scientific abstraction, comparative and statistical methods, as well as experts’ evaluation. bibliographic research of scientific works and reports of organizations was conducted; Publications of the National Statistics Office of Georgia are used to determine the regularity between analytical and statistical estimations. Also, theoretical and applied research of international organizations and scientist-economists are used. Contributions: The country should implement such an economic policy that ensures the transition to a green economy, in particular, revising water, air and waste laws, strengthening existing environmental management tools and introcing new tools (including economic tools). Perfecting the regulatory legal framework of the environmental impact assessment system, which includes the harmonization of Georgian legislation with the requirements of the European Union. To ensure the protection and rational use of Georgia's forests, emphasis should be placed on sustainable forestry, protection and restoration of forests.

Keywords: green economy, environmental protection, environmental protection economic policy, environmental protection policy challanges

Procedia PDF Downloads 36
6756 Adaptive Envelope Protection Control for the below and above Rated Regions of Wind Turbines

Authors: Mustafa Sahin, İlkay Yavrucuk

Abstract:

This paper presents a wind turbine envelope protection control algorithm that protects Variable Speed Variable Pitch (VSVP) wind turbines from damage during operation throughout their below and above rated regions, i.e. from cut-in to cut-out wind speed. The proposed approach uses a neural network that can adapt to turbines and their operating points. An algorithm monitors instantaneous wind and turbine states, predicts a wind speed that would push the turbine to a pre-defined envelope limit and, when necessary, realizes an avoidance action. Simulations are realized using the MS Bladed Wind Turbine Simulation Model for the NREL 5 MW wind turbine equipped with baseline controllers. In all simulations, through the proposed algorithm, it is observed that the turbine operates safely within the allowable limit throughout the below and above rated regions. Two example cases, adaptations to turbine operating points for the below and above rated regions and protections are investigated in simulations to show the capability of the proposed envelope protection system (EPS) algorithm, which reduces excessive wind turbine loads and expectedly increases the turbine service life.

Keywords: adaptive envelope protection control, limit detection and avoidance, neural networks, ultimate load reduction, wind turbine power control

Procedia PDF Downloads 110
6755 Analyzing Current Transformers Saturation Characteristics for Different Connected Burden Using LabVIEW Data Acquisition Tool

Authors: D. Subedi, S. Pradhan

Abstract:

Current transformers are an integral part of power system because it provides a proportional safe amount of current for protection and measurement applications. However when the power system experiences an abnormal situation leading to huge current flow, then this huge current is proportionally injected to the protection and metering circuit. Since the protection and metering equipment’s are designed to withstand only certain amount of current with respect to time, these high currents pose a risk to man and equipment. Therefore during such instances, the CT saturation characteristics have a huge influence on the safety of both man and equipment and also on the reliability of the protection and metering system. This paper shows the effect of burden on the Accuracy Limiting factor/ Instrument security factor of current transformers and also the change in saturation characteristics of the CT’s. The response of the CT to varying levels of overcurrent at different connected burden will be captured using the data acquisition software LabVIEW. Analysis is done on the real time data gathered using LabVIEW. Variation of current transformer saturation characteristics with changes in burden will be discussed.

Keywords: accuracy limiting factor, burden, current transformer, instrument security factor, saturation characteristics

Procedia PDF Downloads 397
6754 Measure-Valued Solutions to a Class of Nonlinear Parabolic Equations with Degenerate Coercivity and Singular Initial Data

Authors: Flavia Smarrazzo

Abstract:

Initial-boundary value problems for nonlinear parabolic equations having a Radon measure as initial data have been widely investigated, looking for solutions which for positive times take values in some function space. On the other hand, if the diffusivity degenerates too fast at infinity, it is well known that function-valued solutions may not exist, singularities may persist, and it looks very natural to consider solutions which, roughly speaking, for positive times describe an orbit in the space of the finite Radon measures. In this general framework, our purpose is to introduce a concept of measure-valued solution which is consistent with respect to regularizing and smoothing approximations, in order to develop an existence theory which does not depend neither on the level of degeneracy of diffusivity at infinity nor on the choice of the initial measures. In more detail, we prove existence of suitably defined measure-valued solutions to the homogeneous Dirichlet initial-boundary value problem for a class of nonlinear parabolic equations without strong coerciveness. Moreover, we also discuss some qualitative properties of the constructed solutions concerning the evolution of their singular part, including conditions (depending both on the initial data and on the strength of degeneracy) under which the constructed solutions are in fact unction-valued or not.

Keywords: degenerate parabolic equations, measure-valued solutions, Radon measures, young measures

Procedia PDF Downloads 264
6753 Dosimetry in Interventional Radiology Examinations for Occupational Exposure Monitoring

Authors: Ava Zarif Sanayei, Sedigheh Sina

Abstract:

Interventional radiology (IR) uses imaging guidance, including X-rays and CT scans, to deliver therapy precisely. Most IR procedures are performed under local anesthesia and start with a small needle being inserted through the skin, which may be called pinhole surgery or image-guided surgery. There is increasing concern about radiation exposure during interventional radiology procedures due to procedure complexity. The basic aim of optimizing radiation protection as outlined in ICRP 139, is to strike a balance between image quality and radiation dose while maximizing benefits, ensuring that diagnostic interpretation is satisfactory. This study aims to estimate the equivalent doses to the main trunk of the body for the Interventional radiologist and Superintendent using LiF: Mg, Ti (TLD-100) chips at the IR department of a hospital in Shiraz, Iran. In the initial stage, the dosimeters were calibrated with the use of various phantoms. Afterward, a group of dosimeters was prepared, following which they were used for three months. To measure the personal equivalent dose to the body, three TLD chips were put in a tissue-equivalent batch and used under a protective lead apron. After the completion of the duration, TLDs were read out by a TLD reader. The results revealed that these individuals received equivalent doses of 387.39 and 145.11 µSv, respectively. The findings of this investigation revealed that the total radiation exposure to the staff was less than the annual limit of occupational exposure. However, it's imperative to implement appropriate radiation protection measures. Although the dose received by the interventional radiologist is a bit noticeable, it may be due to the reason for using conventional equipment with over-couch x-ray tubes for interventional procedures. It is therefore important to use dedicated equipment and protective means such as glasses and screens whenever compatible with the intervention when they are available or have them fitted to equipment if they are not present. Based on the results, the placement of staff in an appropriate location led to increasing the dose to the radiologist. Manufacturing and installation of moveable lead curtains with a thickness of 0.25 millimeters can effectively minimize the radiation dose to the body. Providing adequate training on radiation safety principles, particularly for technologists, can be an optimal approach to further decreasing exposure.

Keywords: interventional radiology, personal monitoring, radiation protection, thermoluminescence dosimetry

Procedia PDF Downloads 40
6752 The Use of AI to Measure Gross National Happiness

Authors: Riona Dighe

Abstract:

This research attempts to identify an alternative approach to the measurement of Gross National Happiness (GNH). It uses artificial intelligence (AI), incorporating natural language processing (NLP) and sentiment analysis to measure GNH. We use ‘off the shelf’ NLP models responsible for the sentiment analysis of a sentence as a building block for this research. We constructed an algorithm using NLP models to derive a sentiment analysis score against sentences. This was then tested against a sample of 20 respondents to derive a sentiment analysis score. The scores generated resembled human responses. By utilising the MLP classifier, decision tree, linear model, and K-nearest neighbors, we were able to obtain a test accuracy of 89.97%, 54.63%, 52.13%, and 47.9%, respectively. This gave us the confidence to use the NLP models against sentences in websites to measure the GNH of a country.

Keywords: artificial intelligence, NLP, sentiment analysis, gross national happiness

Procedia PDF Downloads 76
6751 Top Management Characteristics and Adoption of Internet Banking: Case Study of the Tunisian Banking Sector

Authors: Dorra Gherib

Abstract:

This article explores in depth the technological innovations by the Top Managements of banks in the Tunisian banking sector. The framework of this research is based on an amalgamation of four theories related to the decision of adopting technological innovations: The Theory of Reasoned Action (TRA), the Theory of Planned Behaviour (TPB), Technology Acceptance Model (TAM), and Diffusion of Innovation (DI). The result of our qualitative study highlights four variables which influence the attitude of the Top Managements towards the adoption of internet banking: Relative advantage, Perceived Ease of Use, compatibility and Perceived risk.

Keywords: top management, attitude, internet banking, TRA, TAM, TPB, DI

Procedia PDF Downloads 449
6750 A Biometric Template Security Approach to Fingerprints Based on Polynomial Transformations

Authors: Ramon Santana

Abstract:

The use of biometric identifiers in the field of information security, access control to resources, authentication in ATMs and banking among others, are of great concern because of the safety of biometric data. In the general architecture of a biometric system have been detected eight vulnerabilities, six of them allow obtaining minutiae template in plain text. The main consequence of obtaining minutia templates is the loss of biometric identifier for life. To mitigate these vulnerabilities several models to protect minutiae templates have been proposed. Several vulnerabilities in the cryptographic security of these models allow to obtain biometric data in plain text. In order to increase the cryptographic security and ease of reversibility, a minutiae templates protection model is proposed. The model aims to make the cryptographic protection and facilitate the reversibility of data using two levels of security. The first level of security is the data transformation level. In this level generates invariant data to rotation and translation, further transformation is irreversible. The second level of security is the evaluation level, where the encryption key is generated and data is evaluated using a defined evaluation function. The model is aimed at mitigating known vulnerabilities of the proposed models, basing its security on the impossibility of the polynomial reconstruction.

Keywords: fingerprint, template protection, bio-cryptography, minutiae protection

Procedia PDF Downloads 144
6749 A Multi-Layer Based Architecture for the Development of an Open Source CAD/CAM Integration Virtual Platform

Authors: Alvaro Aguinaga, Carlos Avila, Edgar Cando

Abstract:

This article proposes a n-layer architecture, with a web client as a front-end, for the development of a virtual platform for process simulation on CNC machines. This Open-Source platform includes a CAD-CAM interface drawing primitives, and then used to furnish a CNC program that triggers a touch-screen virtual simulator. The objectives of this project are twofold. First one is an educational component that fosters new alternatives for the CAD-CAM/CNC learning process in undergrad and grade schools and technical and technological institutes emphasizing in the development of critical skills, discussion and collaborative work. The second objective puts together a research and technological component that will take the state of the art in CAD-CAM integration to a new level with the development of optimal algorithms and virtual platforms, on-line availability, that will pave the way for the long-term goal of this project, that is, to have a visible and active graduate school in Ecuador and a world wide Open-Innovation community in the area of CAD-CAM integration and operation of CNC machinery. The virtual platform, developed as a part of this study: (1) delivers improved training process of students, (2) creates a multidisciplinary team and a collaborative work space that will push the new generation of students to face future technological challenges, (3) implements industry standards for CAD/CAM, (4) presents a platform for the development of industrial applications. A protoype of this system was developed and implemented in a network of universities and technological institutes in Ecuador.

Keywords: CAD-CAM integration, virtual platforms, CNC machines, multi-layer based architecture

Procedia PDF Downloads 397
6748 Quantitative, Qualitative, and Technological Challenges for Higher Education in Jordan Critical Analytical Study

Authors: Habes Moh’d Khalifeh Hatamleh, Shukri Refai Ibrahim Marashdh

Abstract:

The study came with the aim of identifying the most prominent quantitative, qualitative, and technological challenges facing the higher education system in Jordan as a dilemma in light of the technological revolution that had a radical contribution to changing the face of science and knowledge in various fields of higher education in Jordan. Human societies that require the adoption of scientific research and its basics as a clear entrance aimed at serving the community and upgrading it civilly. The number of private and public universities has increased, and many students have been accepted for all levels of study in the bachelor’s, higher diploma, master’s and doctoral programs, and the quantitative growth has been accompanied by many negatives, which requires renewal and development in the field of higher education, which led to the emergence of many challenges, and the qualitative challenge in terms of relevance, quality and goodness constitutes an important requirement for the improvement of teaching, scientific research and services in light of the social demand for higher education, in order to reach the quality. The real challenge facing our country is to enter the civilization of advanced technology, which has become the main factor and the starting point for preparing staff capable of accomplishing this transformation and creating an appropriate educational environment for the student to help him to use the sources of knowledge. This study can provide a set of recommendations and proposals that may contribute to addressing challenges and contributing to improving educational outcomes in light of the requirements of the labor market and the needs of society.

Keywords: quantitative, qualitative, technological, challenges, higher education

Procedia PDF Downloads 56
6747 Quantitative, Qualitative, and Technological Challenges for Higher Education in Jordan Critical Analytical Study

Authors: Habes Moh’d Khalifeh Hatamleh, Shukri Refai Ibrahim Marashdh

Abstract:

The study came with the aim of identifying the most prominent quantitative, qualitative, and technological challenges facing the higher education system in Jordan as a dilemma in light of the technological revolution that had a radical contribution to changing the face of science and knowledge in various fields of higher education in Jordan. Human societies that require the adoption of scientific research and its basics as a clear entrance aimed at serving the community and upgrading it civilly. The number of private and public universities has increased, and many students have been accepted for all levels of study in the bachelor’s, higher diploma, master’s and doctoral programs, and the quantitative growth has been accompanied by many negatives, which requires renewal and development in the field of higher education, which led to the emergence of many challenges, and the qualitative challenge in terms of relevance, quality and goodness constitutes an important requirement for the improvement of teaching, scientific research and services in light of the social demand for higher education, in order to reach the quality. The real challenge facing our country is to enter the civilization of advanced technology, which has become the main factor and the starting point for preparing staff capable of accomplishing this transformation and creating an appropriate educational environment for the student to help him to use the sources of knowledge. This study can provide a set of recommendations and proposals that may contribute to addressing challenges and contributing to improving educational outcomes in light of the requirements of the labor market and the needs of society.

Keywords: quantitative, qualitative, technological, challenges, higher education

Procedia PDF Downloads 57
6746 Analyzing the Risk Based Approach in General Data Protection Regulation: Basic Challenges Connected with Adapting the Regulation

Authors: Natalia Kalinowska

Abstract:

The adoption of the General Data Protection Regulation, (GDPR) finished the four-year work of the European Commission in this area in the European Union. Considering far-reaching changes, which will be applied by GDPR, the European legislator envisaged two-year transitional period. Member states and companies have to prepare for a new regulation until 25 of May 2018. The idea, which becomes a new look at an attitude to data protection in the European Union is risk-based approach. So far, as a result of implementation of Directive 95/46/WE, in many European countries (including Poland) there have been adopted very particular regulations, specifying technical and organisational security measures e.g. Polish implementing rules indicate even how long password should be. According to the new approach from May 2018, controllers and processors will be obliged to apply security measures adequate to level of risk associated with specific data processing. The risk in GDPR should be interpreted as the likelihood of a breach of the rights and freedoms of the data subject. According to Recital 76, the likelihood and severity of the risk to the rights and freedoms of the data subject should be determined by reference to the nature, scope, context and purposes of the processing. GDPR does not indicate security measures which should be applied – in recitals there are only examples such as anonymization or encryption. It depends on a controller’s decision what type of security measures controller considered as sufficient and he will be responsible if these measures are not sufficient or if his identification of risk level is incorrect. Data protection regulation indicates few levels of risk. Recital 76 indicates risk and high risk, but some lawyers think, that there is one more category – low risk/now risk. Low risk/now risk data processing is a situation when it is unlikely to result in a risk to the rights and freedoms of natural persons. GDPR mentions types of data processing when a controller does not have to evaluate level of risk because it has been classified as „high risk” processing e.g. processing on a large scale of special categories of data, processing with using new technologies. The methodology will include analysis of legal regulations e.g. GDPR, the Polish Act on the Protection of personal data. Moreover: ICO Guidelines and articles concerning risk based approach in GDPR. The main conclusion is that an appropriate risk assessment is a key to keeping data safe and avoiding financial penalties. On the one hand, this approach seems to be more equitable, not only for controllers or processors but also for data subjects, but on the other hand, it increases controllers’ uncertainties in the assessment which could have a direct impact on incorrect data protection and potential responsibility for infringement of regulation.

Keywords: general data protection regulation, personal data protection, privacy protection, risk based approach

Procedia PDF Downloads 227
6745 A Comparative Assessment of the FoodSupply Vulnerability to Large-Scale Disasters in OECD Countries

Authors: Karolin Bauer, Anna Brinkmann

Abstract:

Vulnerabilities in critical infrastructure can cause significant difficulties for the affected population during crises. Securing the food supply as part of the critical infrastructure in crisis situations is an essential part of public services and a ground stone for a successful concept of civil protection. In most industrialized countries, there are currently no comparative studies regarding the food supply of the population during crisis and disaster events. In order to mitigate the potential impact in case of major disasters in Germany, it is absolutely necessary to investigate how the food supply can be secured. The research project aims to provide in-depth research on the experiences gathered during past large-scale disasters in the 34 OECD member countries in order to discover alternatives for an updated civil protection system in Germany. The basic research question is: "Which international approaches and structures of civil protection have been proven and would be useful to modernize the German civil protection with regards to the critical infrastructure and food supply?" Research findings should be extracted from an extensive literature review covering the entire research period as well as from personal and online-based interviews with experts and responsible persons from involved institutions. The capability of the research project insists on the deliberate choice to investigate previous large-scale disasters to formulate important and practical approaches to modernize civil protection in Germany.

Keywords: food supply, vulnerabilty, critical infratstructure, large-scale disaster

Procedia PDF Downloads 315
6744 Protective Custody in Child Protection: Reflection of Residential Care Workers in the Philippines

Authors: Hazel S. Cometa-Lamberte

Abstract:

This paper presents the residential care workers reflections in working with children who were under protective custody and placed in a residential care facility for children. Key informant interviews and focus group discussion were employed in this study to analyze the views of residential care workers on the programs and services and case management system in residential care for children. Results suggest that working in a residential care facility for children needs the interplay of both the worker’s personal and professional values, knowledge and skills in working with children. Analyzing the residential care workers experiences in handling children in residential care facilities is vital for the improvement of the policies, programs and services, the repertoire of techniques and facilitate the creation of a new social work practice framework/model in child protection specifically in residential care facilities.

Keywords: child protection, residential care, residential care workers, social workers

Procedia PDF Downloads 144
6743 The Evolution of Online Hate: How Decades of Tactical and Technological Innovation Created a Hate Epidemic

Authors: Kashvi Jain, Adam Burston

Abstract:

Right-wing social movements are a dominant force in American politics, as evidenced by the January 6th Insurrection, the prevalence of extremist conspiracy theories, and a nationwide surge in hate crime. Despite an abundance of scholarship on contemporary right-wing extremism, there is little scholarship that explains their rise. This paper examines how the white power movement developed through tactical innovation and strategic use of increasingly powerful digital technologies. Using qualitative content analysis of archived digital bulletin boards and websites, we examine right-wing extremists’ digital communication during three consequential time periods of tactical and technological innovation: pre-internet (1980s), web 1.0 (1990s), and web 2.0 (2000s). Our analysis suggests that right-wing activists innovatively exploited the features and affordances of digital technologies and their knowledge of free speech rights to spread supremacist collective identity and ideology. Beyond our empirical contribution, we offer policy advice that school administrators can employ to limit hate.

Keywords: leaderless resistance, technological affordances, anti-defamation league, white power movement, tactical

Procedia PDF Downloads 40
6742 Gig Economy Development Trends in Georgia

Authors: Nino Grigolaia

Abstract:

The paper discusses the importance of the development of the gig economy in the economy of Georgia, analyzes the trends of the development of the gig economy, and identifies the main challenges in this field. Objective. The objective of the study is to assess the role of the gig economy, identify the main challenges and develop recommendations. Methodologies. Analysis, synthesis, comparison, induction and other methods are used; A desk study has been conducted. Findings. The advantages and disadvantages of the gig economy are identified, and the impact of the changes caused by the development of the gig economy on labor relations and employment is determined. It is argued that the ongoing technological changes have led to the emergence of new global trends in the labor market and increased the inequality of income distribution. Conclusions. Based on the analysis of the gig economy in the world and in Georgia, relevant recommendations are proposed, namely: establishing a new system of regulating the incomes of employees in this field, developing a real social protection mechanism, Development of political and legal instruments for regulation of gig economy and others.

Keywords: gig economy, economy of Georgia, digital platforms, labor relations

Procedia PDF Downloads 44
6741 Data Protection, Data Privacy, Research Ethics in Policy Process Towards Effective Urban Planning Practice for Smart Cities

Authors: Eugenio Ferrer Santiago

Abstract:

The growing complexities of the modern world on high-end gadgets, software applications, scams, identity theft, and Artificial Intelligence (AI) make the “uninformed” the weak and vulnerable to be victims of cybercrimes. Artificial Intelligence is not a new thing in our daily lives; the principles of database management, logical programming, and garbage in and garbage out are all connected to AI. The Philippines had in place legal safeguards against the abuse of cyberspace, but self-regulation of key industry players and self-protection by individuals are primordial to attain the success of these initiatives. Data protection, Data Privacy, and Research Ethics must work hand in hand during the policy process in the course of urban planning practice in different environments. This paper focuses on the interconnection of data protection, data privacy, and research ethics in coming up with clear-cut policies against perpetrators in the urban planning professional practice relevant in sustainable communities and smart cities. This paper shall use expository methodology under qualitative research using secondary data from related literature, interviews/blogs, and the World Wide Web resources. The claims and recommendations of this paper will help policymakers and implementers in the policy cycle. This paper shall contribute to the body of knowledge as a simple treatise and communication channel to the reading community and future researchers to validate the claims and start an intellectual discourse for better knowledge generation for the good of all in the near future.

Keywords: data privacy, data protection, urban planning, research ethics

Procedia PDF Downloads 31
6740 The Judiciary as Pacemaker? Considering the Role of Courts in an Expansion of Protection for War Refugees and People Fleeing Natural Disasters

Authors: Charlotte Lülf

Abstract:

Migration flows, resulting from war, climate change or economic crisis cannot be tackled by single states but need to be addressed as a transnational and international responsibility. The traditional architecture surrounding the work of the UNHCR and the 1951 Convention, however, is not equipped to deal with these challenges. Widely excluded from legal protection are people not individually persecuted for the statutory criteria, people that flee from the indiscriminate effects of an armed conflict as well as people fleeing natural disasters. With the lack of explicit legal protection and the political reluctance of nation states worldwide to extend their commitment in new asylum laws, the judiciary must be put in focus: it plays a unique role in interpreting and potentially expanding the application of existing regulations. This paper as part of an ongoing Ph.D. Project deals with the current and partly contradicting approaches to the protection of war- and climate refugees. Changing jurisprudential practice of national and regional courts will be assessed, as will be their dialogue to interpret the international obligations of human rights law, migration laws, and asylum laws in an interacting world. In recent judgments refoulment to an armed conflict as well as countries without adequate disaster relief or health care was argued as violating fundamental human and asylum law rights and therefore prohibited – even for applicants without refugee status: The first step towards access to subsidiary protection could herewith be established. Can one observe similar developments in other parts of the world? This paper will evaluate the role of the judiciary to define, redefine and potentially expand protection for people seeking refuge from armed conflicts and natural disasters.

Keywords: human rights law, asylum-seekers, displacement, migration

Procedia PDF Downloads 258
6739 Cybervetting and Online Privacy in Job Recruitment – Perspectives on the Current and Future Legislative Framework Within the EU

Authors: Nicole Christiansen, Hanne Marie Motzfeldt

Abstract:

In recent years, more and more HR professionals have been using cyber-vetting in job recruitment in an effort to find the perfect match for the company. These practices are growing rapidly, accessing a vast amount of data from social networks, some of which is privileged and protected information. Thus, there is a risk that the right to privacy is becoming a duty to manage your private data. This paper investigates to which degree a job applicant's fundamental rights are protected adequately in current and future legislation in the EU. This paper argues that current data protection regulations and forthcoming regulations on the use of AI ensure sufficient protection. However, even though the regulation on paper protects employees within the EU, the recruitment sector may not pay sufficient attention to the regulation as it not specifically targeting this area. Therefore, the lack of specific labor and employment regulation is a concern that the social partners should attend to.

Keywords: AI, cyber vetting, data protection, job recruitment, online privacy

Procedia PDF Downloads 53
6738 Analysis of Silicon Controlled Rectifier-Based Electrostatic Discharge Protection Circuits with Electrical Characteristics for the 5V Power Clamp

Authors: Jun-Geol Park, Kyoung-Il Do, Min-Ju Kwon, Kyung-Hyun Park, Yong-Seo Koo

Abstract:

This paper analyzed the SCR (Silicon Controlled Rectifier)-based ESD (Electrostatic Discharge) protection circuits with the turn-on time characteristics. The structures are the LVTSCR (Low Voltage Triggered SCR), the ZTSCR (Zener Triggered SCR) and the PTSCR (P-Substrate Triggered SCR). The three structures are for the 5V power clamp. In general, the structures with the low trigger voltage structure can have the fast turn-on characteristics than other structures. All the ESD protection circuits have the low trigger voltage by using the N+ bridge region of LVTSCR, by using the zener diode structure of ZTSCR, by increasing the trigger current of PTSCR. The simulation for the comparison with the turn-on time was conducted by the Synopsys TCAD simulator. As the simulation results, the LVTSCR has the turn-on time of 2.8 ns, ZTSCR of 2.1 ns and the PTSCR of 2.4 ns. The HBM simulation results, however, show that the PTSCR is the more robust structure of 430K in HBM 8kV standard than 450K of LVTSCR and 495K of ZTSCR. Therefore the PTSCR is the most effective ESD protection circuit for the 5V power clamp.

Keywords: ESD, SCR, turn-on time, trigger voltage, power clamp

Procedia PDF Downloads 324
6737 Factors Impacting Science and Mathematics Teachers’ Competencies in TPACK in STEM Context

Authors: Nasser Mansour, Ziad Said, Abdullah Abu-Tineh

Abstract:

STEM teachers face the challenge of possessing expertise not only in their subject disciplines but also in the pedagogical knowledge required for integrated STEM lessons. However, research reveals a lack of pedagogical competencies related to project-based learning (PBL) in the STEM context. To bridge this gap, the study examines teachers' competencies and self-efficacy in TPACK (Technological Pedagogical Content Knowledge) and its specific integration with PBL and STEM content. Data from 245 specialized science and math teachers were collected using a questionnaire. The study emphasizes the importance of addressing gender disparities, supporting formal teacher education, and recognizing the expertise and experiences of STEM teachers in effective technology integration. The findings indicate that gender plays a role in self-efficacy beliefs, with females exhibiting higher confidence in pedagogical knowledge and males demonstrating higher confidence in technological knowledge. Teaching experience and workload factors have a limited impact on teachers' Technological Pedagogical Content Knowledge (TPACK). These findings enhance our understanding of contextual factors impacting science and math teachers' self-efficacy in utilizing TPACK for STEM and PBL. They inform the development of targeted interventions, professional development programs, and support systems to enhance teachers' competencies and self-efficacy in TPACK for teaching science and Mathematics through STEM and PBL.

Keywords: technological pedagogical content knowledge, TPACK, STEM, project-based learning, PBL, self-efficacy, mathematics, science

Procedia PDF Downloads 37
6736 Research on the Protection and Development of Ancient Town Cultural Landscape Based on “Four State” Elements: Illustrated by the Example of Qikou

Authors: Bian ChengXiang, Wang Qian

Abstract:

With the deepening of the research on the connotation of cultural heritage and human geography, the cultural landscape takes landscape as a cultural product, integrates and blends cultural and natural heritage to explore the cultural value behind its material landscape. Qikou ancient town is a typical traditional settlement with a homomorphism of mountain and water veins. Its cultural accumulation and natural landscape play an important role in its development. Therefore, this paper will combine the material and cultural elements of Qikou ancient town to analyze the composition of the cultural landscape of the ancient town and explore the protection and utilization of the cultural landscape of Qikou ancient town from the four aspects of ecology, form, cultural form, and business form, so as to provide effective strategies for the development of the ancient town.

Keywords: four state, cultural landscape, ancient town, protection, development

Procedia PDF Downloads 109
6735 Just Child Protection Practice for Immigrant and Racialized Families in Multicultural Western Settings: Considerations for Context and Culture

Authors: Sarah Maiter

Abstract:

Heightened globalization, migration, displacement of citizens, and refugee needs is putting increasing demand for approaches to social services for diverse populations that responds to families to ensure the safety and protection of vulnerable members while providing supports and services. Along with this social works re-focus on socially just approaches to practice increasingly asks social workers to consider the challenging circumstances of families when providing services rather than a focus on individual shortcomings alone. Child protection workers then struggle to ensure safety of children while assessing the needs of families. This assessment can prove to be difficult when providing services to immigrant, refugee, and racially diverse families as understanding of and familiarity with these families is often limited. Furthermore, child protection intervention in western countries is state mandated having legal authority when intervening in the lives of families where child protection concerns have been identified. Within this context, racialized immigrant and refugee families are at risk of misunderstandings that can result in interventions that are overly intrusive, unhelpful, and harsh. Research shows disproportionality and overrepresentation of racial and ethnic minorities, and immigrant families in the child protection system. Reasons noted include: a) possibilities of racial bias in reporting and substantiating abuse, b) struggles on the part of workers when working with families from diverse ethno-racial backgrounds and who are immigrants and may have limited proficiency in the national language of the country, c) interventions during crisis and differential ongoing services for these families, d) diverse contexts of these families that poses additional challenges for families and children, and e) possible differential definitions of child maltreatment. While cultural and ethnic diversity in child rearing approaches have been cited as contributors to child protection concerns, this approach should be viewed cautiously as it can result in stereotyping and generalizing that then results in inappropriate assessment and intervention. However, poverty and the lack of social supports, both well-known contributors to child protection concerns, also impact these families disproportionately. Child protection systems, therefore, need to continue to examine policy and practice approaches with these families that ensures safety of children while balancing the needs of families. This presentation provides data from several research studies that examined definitions of child maltreatment among a sample of racialized immigrant families, experiences of a sample of immigrant families with the child protection system, concerns of a sample of child protection workers in the provision of services to these families, and struggles of families in the transitions to their new country. These studies, along with others provide insights into areas of consideration for practice that can contribute to safety for children while ensuring just and equitable responses that have greater potential for keeping families together rather than premature apprehension and removal of children to state care.

Keywords: child protection, child welfare services, immigrant families, racial and ethnic diversity

Procedia PDF Downloads 267
6734 Protection of Floating Roof Petroleum Storage Tanks against Lightning Strokes

Authors: F. M. Mohamed, A. Y. Abdelaziz

Abstract:

The subject of petroleum storage tank fires has gained a great deal of attention due to the high cost of petroleum, and the consequent disruption of petroleum production; therefore, much of the current research has focused on petroleum storage tank fires. Also, the number of petroleum tank fires is oscillating between 15 and 20 fires per year. About 33% of all tank fires are attributed to lightning. Floating roof tanks (FRT’s) are especially vulnerable to lightning. To minimize the likelihood of a fire, the API RP 545 recommends three major modifications to floating roof tanks. This paper was inspired by a stroke of lightning that ignited a fire in a crude oil storage tank belonging to an Egyptian oil company, and is aimed at providing an efficient lightning protection system to the tank under study, in order to avoid the occurrence of such phenomena in the future and also, to give valuable recommendations to be applied to floating roof tank projects.

Keywords: crude oil, fire, floating roof tank, lightning protection system

Procedia PDF Downloads 261
6733 A Case Study on the Census of Technological Capacities in Health Care in Rural Sanitary Institutions in South Cameroon

Authors: Doriane Micaela Andeme Bikoro, Samuel Fosso Wamba, Jean Robert Kala Kamdjoug

Abstract:

Currently one of the leading fields in the market of technological innovation is digital health. In developed countries, this booming innovation is experiencing an exponential speed. We understand that in developed countries, e-health could also revolutionize the practice of medicine and therefore fill the many failures observed in medical care. Everything leads to believe that future technology is oriented towards the medical sector. The aim of this work is to explore at the same time the technological resources and the potential of health care based on new technologies; it is a case study in a rural area of Southern Cameroon. Among other things, we will make a census of the shortcomings and problems encountered, and we will propose various appropriate solutions. The work methodology used here is essentially qualitative. We used two qualitative data collection techniques, direct observation, and interviews. In fact, we spent two weeks in the field observing and conducting some semi-directive interviews with some of those responsible for these health structures. This study was conducted in three health facilities in the south of the country; including two health centers and a rural hospital. Many technological failures have been identified in the day-to-day management of these health facilities and especially in the administration of health care to patients. We note major problems such as the digital divide, the lack of qualified personnel, the state of isolation of this area. This is why various proposals are made to improve the health sector in Cameroon both technologically and medically.

Keywords: Cameroon, capacities, census, digital health, qualitative method, rural area

Procedia PDF Downloads 127
6732 From Restraint to Obligation: The Protection of the Environment in Times of Armed Conflict

Authors: Aaron Walayat

Abstract:

Protection of the environment in international law has been one of the most developed in the context of international humanitarian law. This paper examines the history of the protection of the environment in times of armed conflict, beginning with the traditional notion of restraint observed in antiquity towards the obligation to protect the environment, examining the treaties and agreements, both binding and non-binding which have contributed to environmental protection in war. The paper begins with a discussion of the ancient concept of restraint. This section examines the social norms in favor of protection of the environment as observed in the Bible, Greco-Roman mythology, and even more contemporary literature. The study of the traditional rejection of total war establishes the social foundation on which the current legal regime has stemmed. The paper then studies the principle of restraint as codified in international humanitarian law. It mainly examines Additional Protocol I of the Geneva Convention of 1949 and existing international law concerning civilian objects and the principles of international humanitarian law in the classification between civilian objects and military objectives. The paper then explores the environment’s classification as both a military objective and as a civilian object as well as explores arguments in favor of the classification of the whole environment as a civilian object. The paper will then discuss the current legal regime surrounding the protection of the environment, discussing some declarations and conventions including the 1868 Declaration of St. Petersburg, the 1907 Hague Convention No. IV, the Geneva Conventions, and the 1976 Environmental Modification Convention. The paper concludes with the outline noting the movement from codification of the principles of restraint into the various treaties, agreements, and declarations of the current regime of international humanitarian law. This paper provides an analysis of the history and significance of the relationship between international humanitarian law as a major contributor to the growing field of international environmental law.

Keywords: armed conflict, environment, legal regime, restraint

Procedia PDF Downloads 170
6731 Optimization of the Measure of Compromise as a Version of Sorites Paradox

Authors: Aleksandar Hatzivelkos

Abstract:

The term ”compromise” is mostly used casually within the social choice theory. It is usually used as a mere result of the social choice function, and this omits its deeper meaning and ramifications. This paper is based on a mathematical model for the description of a compromise as a version of the Sorites paradox. It introduces a formal definition of d-measure of divergence from a compromise and models a notion of compromise that is often used only colloquially. Such a model for vagueness phenomenon, which lies at the core of the notion of compromise enables the introduction of new mathematical structures. In order to maximize compromise, different methods can be used. In this paper, we explore properties of a social welfare function TdM (from Total d-Measure), which is defined as a function which minimizes the total sum of d-measures of divergence over all possible linear orderings. We prove that TdM satisfy strict Pareto principle and behaves well asymptotically. Furthermore, we show that for certain domain restrictions, TdM satisfy positive responsiveness and IIIA (intense independence of irrelevant alternatives) thus being equivalent to Borda count on such domain restriction. This result gives new opportunities in social choice, especially when there is an emphasis on compromise in the decision-making process.

Keywords: borda count, compromise, measure of divergence, minimization

Procedia PDF Downloads 103