Search results for: covert police operations
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1944

Search results for: covert police operations

1734 Provide Adequate Protection to Avoid Secondary Victimization: Ensuring the Rights of the Child Victims in the Criminal Justice System

Authors: Muthukuda Arachchige Dona Shiroma Jeeva Shirajanie Niriella

Abstract:

The necessity of protection of the rights of victims of crime is a matter of concerns today. In the criminal justice system, child victims who are subjected to sexual abuse/violence are more vulnerable than the other crime victims. When they go to the police to lodge the complaint and until the end of the court proceedings, these victims are re-victimized in the criminal justice system. The rights of the suspects, accused and convicts are recognized and guaranteed by the constitution under fair trial norm, contemporary penal laws where crime is viewed as an offence against the State and existing criminal justice system in many jurisdictions including Sri Lanka. In this backdrop, a reasonable question arises as to whether the existing criminal justice system, especially which follow the adversarial mode of judicial trial protect the fair trial norm in the criminal justice process. Therefore, this paper intends to discuss the rights of the sexually abused child victims in the criminal justice system in order to restore imbalance between the rights of the wrongdoer and victim and suggest legal reforms to strengthen their rights in the criminal justice system which is essential to end secondary victimization. The paper considers Sri Lanka as a sample to discuss this issue. The paper looks at how the child victims are marginalized in the traditional adversarial model of the justice process, whether the contemporary penal laws adequately protect the right of these victims and whether the current laws set out the provisions to provide sufficient assistance and protection to them. The study further deals with the important principles adopted in international human rights law relating to the protection of the rights of the child victims in sexual offences cases. In this research paper, rights of the child victims in the investigation, trial and post-trial stages in the criminal justice process will be assessed. This research contains an extensive scrutiny of relevant international standards and local statutory provisions. Case law, books, journal articles, government publications such as commissions’ reports under this topic are rigorously reviewed as secondary resources. Further, randomly selected 25 child victims of sexual offences from the decided cases in last two years, police officers from 5 police divisions where the highest numbers of sexual offences were reported in last two years and the judicial officers both Magistrates and High Court Judges from the same judicial zones are interviewed. These data will be analyzed in order to find out the reasons for this specific sexual victimization, needs of these victims in various stages of the criminal justice system, relationship between victimization and offending and the difficulties and problems that these victims come across in criminal justice system. The author argues that the child victims are considerably neglected and their rights are not adequately protected in the adversarial model of the criminal justice process.

Keywords: child victims of sexual violence, criminal justice system, international standards, rights of child victims, Sri Lanka

Procedia PDF Downloads 341
1733 Arithmetic Operations in Deterministic P Systems Based on the Weak Rule Priority

Authors: Chinedu Peter, Dashrath Singh

Abstract:

Membrane computing is a computability model which abstracts its structures and functions from the biological cell. The main ingredient of membrane computing is the notion of a membrane structure, which consists of several cell-like membranes recurrently placed inside a unique skin membrane. The emergence of several variants of membrane computing gives rise to the notion of a P system. The paper presents a variant of P systems for arithmetic operations on non-negative integers based on the weak priorities for rule application. Consequently, we obtain deterministic P systems. Two membranes suffice. There are at most four objects for multiplication and five objects for division throughout the computation processes. The model is simple and has a potential for possible extension to non-negative integers and real numbers in general.

Keywords: P system, binary operation, determinism, weak rule priority

Procedia PDF Downloads 425
1732 Adaptive Data Approximations Codec (ADAC) for AI/ML-based Cyber-Physical Systems

Authors: Yong-Kyu Jung

Abstract:

The fast growth in information technology has led to de-mands to access/process data. CPSs heavily depend on the time of hardware/software operations and communication over the network (i.e., real-time/parallel operations in CPSs (e.g., autonomous vehicles). Since data processing is an im-portant means to overcome the issue confronting data management, reducing the gap between the technological-growth and the data-complexity and channel-bandwidth. An adaptive perpetual data approximation method is intro-duced to manage the actual entropy of the digital spectrum. An ADAC implemented as an accelerator and/or apps for servers/smart-connected devices adaptively rescales digital contents (avg.62.8%), data processing/access time/energy, encryption/decryption overheads in AI/ML applications (facial ID/recognition).

Keywords: adaptive codec, AI, ML, HPC, cyber-physical, cybersecurity

Procedia PDF Downloads 50
1731 Constructing Evaluation Indicators for the Supply of Urban-Friendly Shelters from the Perspective of the Needs of the Elderly People in Taiwan

Authors: Chuan-Ming Tung, Tzu-Chiao Yuan

Abstract:

This research aims to construct the supply indicators and weights of shelter space from a perspective of the needs of the elderly by virtue of literature review, a systematical compilation of related regulations, and the use of the Analytical Hierarchy Process method, the questionnaires regarding the indicators filled out by 16 experts and scholars. The researcher then used 3 schools and 2 activity centers in Banqiao District, New Taipei City, as study cases to evaluate the ‘friendliness’ degree/level for the supply of shelters meeting the needs of elderly people. The supply evaluation indicators of friendly shelters meeting the needs of the elderly include "Administrative Operations and Service Needs" and "Residence-related and Living Needs"; under the "Administrative Operations and Service Needs" are "Management Operations and Information Provision", "Shelter Space Preparedness and Logistics Support", "Medical Care and Social Support", and "Shelters and Medical Environment", a total of 17 assessment items in four indicators, while under the "Residence-related and Living Needs" are "Dietary Needs", "Sleep Needs", "Hygiene and Sanitation Needs", "Accessibility and Convenience Needs ", etc., a total of 18 assessment items in four indicators. The results show that "Residence-related and Living Needs" is the most important item in the main levels of the supply indicators of the needs for friendly shelters to elderly people (weigh value 0.5504), followed by "Administrative Operations and Service Needs" (0.4496). The order of importance of the supply indicators of friendly shelters for the needs of elderly people is as follows: "Hygiene and Sanitation Needs" (0.1721), "Dietary Needs" (0.1340), "Medical Care and Social Support" (0.1300), "Sleep Needs" (0.1277), "Accessibility and Convenience Needs" (0.1166), "Basic Environment of Shelters" (0.1145), "Shelter Space Preparedness and Logistics Support" (0.1115) and "Management Operations and Information Provision" (0.0936). In addition, it can be noticed from the results of the case evaluation that the provision of refuges and shelters, mainly from schools and activity centers, is extremely inadequate for the needs of the elderly. In a set of comprehensive comparisons and contrasts, the evaluation indicators of refuges and shelters that need to be improved are "Medical Care and Social Support", "Hygiene and Sanitation Needs", "Sleep Needs", "Dietary Needs", and "Shelter Space Preparedness and Logistics Support".

Keywords: needs of the elderly people, urban shelters, evaluation indicators/indices., taiwan

Procedia PDF Downloads 47
1730 Evaluation of the Performance of ACTIFLO® Clarifier in the Treatment of Mining Wastewaters: Case Study of Costerfield Mining Operations, Victoria, Australia

Authors: Seyed Mohsen Samaei, Shirley Gato-Trinidad

Abstract:

A pre-treatment stage prior to reverse osmosis (RO) is very important to ensure the long-term performance of the RO membranes in any wastewater treatment using RO. This study aims to evaluate the application of the Actiflo® clarifier as part of a pre-treatment unit in mining operations. It involves performing analytical testing on RO feed water before and after installation of Actiflo® unit. Water samples prior to RO plant stage were obtained on different dates from Costerfield mining operations in Victoria, Australia. Tests were conducted in an independent laboratory to determine the concentration of various compounds in RO feed water before and after installation of Actiflo® unit during the entire evaluated period from December 2015 to June 2018. Water quality analysis shows that the quality of RO feed water has remarkably improved since installation of Actiflo® clarifier. Suspended solids (SS) and turbidity removal efficiencies has been improved by 91 and 85 percent respectively in pre-treatment system since the installation of Actiflo®. The Actiflo® clarifier proved to be a valuable part of pre-treatment system prior to RO. It has the potential to conveniently condition the mining wastewater prior to RO unit, and reduce the risk of RO physical failure and irreversible fouling. Consequently, reliable and durable operation of RO unit with minimum requirement for RO membrane replacement is expected with Actiflo® in use.

Keywords: ACTIFLO ® clarifier, mining wastewater, reverse osmosis, water treatment

Procedia PDF Downloads 173
1729 Development of Precise Ephemeris Generation Module for Thaichote Satellite Operations

Authors: Manop Aorpimai, Ponthep Navakitkanok

Abstract:

In this paper, the development of the ephemeris generation module used for the Thaichote satellite operations is presented. It is a vital part of the flight dynamics system, which comprises, the orbit determination, orbit propagation, event prediction and station-keeping maneuver modules. In the generation of the spacecraft ephemeris data, the estimated orbital state vector from the orbit determination module is used as an initial condition. The equations of motion are then integrated forward in time to predict the satellite states. The higher geopotential harmonics, as well as other disturbing forces, are taken into account to resemble the environment in low-earth orbit. Using a highly accurate numerical integrator based on the Burlish-Stoer algorithm the ephemeris data can be generated for long-term predictions, by using a relatively small computation burden and short calculation time. Some events occurring during the prediction course that are related to the mission operations, such as the satellite’s rise/set viewed from the ground station, Earth and Moon eclipses, the drift in ground track as well as the drift in the local solar time of the orbital plane are all detected and reported. When combined with other modules to form a flight dynamics system, this application is aimed to be applied for the Thaichote satellite and successive Thailand’s Earth-observation missions.

Keywords: flight dynamics system, orbit propagation, satellite ephemeris, Thailand’s Earth Observation Satellite

Procedia PDF Downloads 348
1728 Civilian and Military Responses to Domestic Security Threats: A Cross-Case Analysis of Belgium, France, and the United Kingdom

Authors: John Hardy

Abstract:

The domestic security environment in Europe has changed dramatically in recent years. Since January 2015, a significant number of domestic security threats that emerged in Europe were located in Belgium, France and the United Kingdom. While some threats were detected in the planning phase, many also resulted in terrorist attacks. Authorities in all three countries instituted special or emergency measures to provide additional security to their populations. Each country combined an additional policing presence with a specific military operation to contribute to a comprehensive security response to domestic threats. This study presents a cross-case analysis of three countries’ civilian and military responses to domestic security threats in Europe. Each case study features a unique approach to combining civilian and military capabilities in similar domestic security operations during the same time period and threat environment. The research design focuses on five variables relevant to the relationship between civilian and military roles in each security response. These are the distinction between policing and military roles, the legal framework for the domestic deployment of military forces, prior experience in civil-military coordination, the institutional framework for threat assessments, and the level of public support for the domestic use of military forces. These variables examine the influence of domestic social, political, and legal factors on the design of combined civil-military operations in response to domestic security threats. Each case study focuses on a specific operation: Operation Vigilant Guard in Belgium, Operation Sentinel in France, and Operation Temperer in the United Kingdom. The results demonstrate that the level of distinction between policing and military roles and the existence of a clear and robust legal framework for the domestic use force by military personnel significantly influence the design and implementation of civilian and military roles in domestic security operations. The findings of this study indicate that Belgium, France and the United Kingdom experienced different design and implementation challenges for their domestic security operations. Belgium and France initially had less-developed legal frameworks for deploying the military in domestic security operations than the United Kingdom. This was offset by public support for enacting emergency measures and the strength of existing civil-military coordination mechanisms. The United Kingdom had a well-developed legal framework for integrating civilian and military capabilities in domestic security operations. However, its experiences in Ireland also made the government more sensitive to public perceptions regarding the domestic deployment of military forces.

Keywords: counter-terrorism, democracy, homeland security, intelligence, militarization, policing

Procedia PDF Downloads 108
1727 Advanced Data Visualization Techniques for Effective Decision-making in Oil and Gas Exploration and Production

Authors: Deepak Singh, Rail Kuliev

Abstract:

This research article explores the significance of advanced data visualization techniques in enhancing decision-making processes within the oil and gas exploration and production domain. With the oil and gas industry facing numerous challenges, effective interpretation and analysis of vast and diverse datasets are crucial for optimizing exploration strategies, production operations, and risk assessment. The article highlights the importance of data visualization in managing big data, aiding the decision-making process, and facilitating communication with stakeholders. Various advanced data visualization techniques, including 3D visualization, augmented reality (AR), virtual reality (VR), interactive dashboards, and geospatial visualization, are discussed in detail, showcasing their applications and benefits in the oil and gas sector. The article presents case studies demonstrating the successful use of these techniques in optimizing well placement, real-time operations monitoring, and virtual reality training. Additionally, the article addresses the challenges of data integration and scalability, emphasizing the need for future developments in AI-driven visualization. In conclusion, this research emphasizes the immense potential of advanced data visualization in revolutionizing decision-making processes, fostering data-driven strategies, and promoting sustainable growth and improved operational efficiency within the oil and gas exploration and production industry.

Keywords: augmented reality (AR), virtual reality (VR), interactive dashboards, real-time operations monitoring

Procedia PDF Downloads 48
1726 Study of Pottery And Glazed Canopic Vessels

Authors: Abdelrahman Mohamed

Abstract:

The ancient Egyptians used canopic vessels in embalming operations in order to preserve the guts of the mummified corpse. Canopic vessels were made of many materials, including pottery and glazed pottery. In this research, we study a pottery canopic vessel and a glazed pottery vessel. An analysis to find out the compounds and elements of the materials from which the container is made and the colors, and also to make some analysis for the organic materials present inside it, such as the Fourier Transform Infrared Spectroscopy analysis and the Gas chromatograph mass spectrometers analysis of the organic residue. Through the study and analysis, it was proved that some of the materials present in the pot were coniferous oil and animal fats. In the other pot, the analysis showed the presence of some plant resins (mastic) inside rolls of linen. Restoration operations were carried out, such as mechanical cleaning, strengthening, and completing the reinforcement of the pots.

Keywords: canopic jar, embalming, FTIR, GCMS, linen.

Procedia PDF Downloads 47
1725 A Critical Discourse Analysis of President Muhammad Buhari's Speeches

Authors: Joy Aworo-Okoroh

Abstract:

Politics is about trust and trust is challenged by the speaker’s ability to manipulate language before the electorate. Critical discourse analysis investigates the role of language in constructing social relationships between a political speaker and his audience. This paper explores the linguistic choices made by President Muhammad Buhari that enshrines his ideologies as well as the socio-political relations of power between him and Nigerians in his speeches. Two speeches of President Buhari –inaugural and Independence Day speeches are analyzed using Norman Fairclough’s perspective on Halliday’s Systemic functional grammar. The analysis is at two levels. The first level of analysis is the identification of transitivity and modality choices in the speeches and how they reveal the covert ideologies. The second analysis is premised on Normal Fairclough’s model, the clauses are analyzed to identify elements of power, hesistation, persuasion, threat and religious statement. It was discovered that Buhari is a dominant character who manipulates the material processes a lot.

Keywords: politics, critical discourse analysis, Norman Fairclough, systemic functional grammar

Procedia PDF Downloads 507
1724 High-Capacity Image Steganography using Wavelet-based Fusion on Deep Convolutional Neural Networks

Authors: Amal Khalifa, Nicolas Vana Santos

Abstract:

Steganography has been known for centuries as an efficient approach for covert communication. Due to its popularity and ease of access, image steganography has attracted researchers to find secure techniques for hiding information within an innocent looking cover image. In this research, we propose a novel deep-learning approach to digital image steganography. The proposed method, DeepWaveletFusion, uses convolutional neural networks (CNN) to hide a secret image into a cover image of the same size. Two CNNs are trained back-to-back to merge the Discrete Wavelet Transform (DWT) of both colored images and eventually be able to blindly extract the hidden image. Based on two different image similarity metrics, a weighted gain function is used to guide the learning process and maximize the quality of the retrieved secret image and yet maintaining acceptable imperceptibility. Experimental results verified the high recoverability of DeepWaveletFusion which outperformed similar deep-learning-based methods.

Keywords: deep learning, steganography, image, discrete wavelet transform, fusion

Procedia PDF Downloads 42
1723 Logistical Optimization of Nuclear Waste Flows during Decommissioning

Authors: G. Dottavio, M. F. Andrade, F. Renard, V. Cheutet, A.-L. Ladier, S. Vercraene, P. Hoang, S. Briet, R. Dachicourt, Y. Baizet

Abstract:

An important number of technological equipment and high-skilled workers over long periods of time have to be mobilized during nuclear decommissioning processes. The related operations generate complex flows of waste and high inventory levels, associated to information flows of heterogeneous types. Taking into account that more than 10 decommissioning operations are on-going in France and about 50 are expected toward 2025: A big challenge is addressed today. The management of decommissioning and dismantling of nuclear installations represents an important part of the nuclear-based energy lifecycle, since it has an environmental impact as well as an important influence on the electricity cost and therefore the price for end-users. Bringing new technologies and new solutions into decommissioning methodologies is thus mandatory to improve the quality, cost and delay efficiency of these operations. The purpose of our project is to improve decommissioning management efficiency by developing a decision-support framework dedicated to plan nuclear facility decommissioning operations and to optimize waste evacuation by means of a logistic approach. The target is to create an easy-to-handle tool capable of i) predicting waste flows and proposing the best decommissioning logistics scenario and ii) managing information during all the steps of the process and following the progress: planning, resources, delays, authorizations, saturation zones, waste volume, etc. In this article we present our results from waste nuclear flows simulation during decommissioning process, including discrete-event simulation supported by FLEXSIM 3-D software. This approach was successfully tested and our works confirms its ability to improve this type of industrial process by identifying the critical points of the chain and optimizing it by identifying improvement actions. This type of simulation, executed before the start of the process operations on the basis of a first conception, allow ‘what-if’ process evaluation and help to ensure quality of the process in an uncertain context. The simulation of nuclear waste flows before evacuation from the site will help reducing the cost and duration of the decommissioning process by optimizing the planning and the use of resources, transitional storage and expensive radioactive waste containers. Additional benefits are expected for the governance system of the waste evacuation since it will enable a shared responsibility of the waste flows.

Keywords: nuclear decommissioning, logistical optimization, decision-support framework, waste management

Procedia PDF Downloads 294
1722 Opportunities and Challenges of Omni Channel Retailing in the Emerging Market

Authors: Salma Ahmed, Anil Kumar

Abstract:

This paper develops and estimates a model for understanding the drivers and barriers for Omni-Channel retail. This study serves as one of the first attempt to empirically test the effect of various factors on Omni-channel retail. Omni-channel is relative new and evolving, we hypothesize three drivers: (1) Innovative sales and marketing opportunities, (2) channel migration, (3) Cross channel synergies; and three barriers: (1) Integrated sales and marketing operations, (2) Visibility and synchronization (3) Integration and Technology challenges. The findings from the study strongly support that Omni-channel effects exist between cross channel synergy and channel migration. However, it partially supports innovative sales and marketing operations. We also found the variables which we identified as barriers to Omni-channel retail have a strong impact on Omni-channel retail.

Keywords: retailing, multichannel, Omni-channel, emerging market

Procedia PDF Downloads 505
1721 Appraisal of Maintenance Practices in Selected Tourist Attraction in Bauchi State, Nigeria

Authors: Eldah Ephraim Buba, Amina Bata Zoaka, Aishatu Ibrahim

Abstract:

This study appraised maintenance practices in selected tourist attractions in Bauchi state, Nigeria. Four tourist attractions were used for the research. Checklists were used to assess operations and repairs maintenance practices in the different attractions. The study carried out personal assessment thrice in six months without prior knowledge of the staff in charge for operational maintenance. Records of repairs maintenance from the attractions maintenance unit for a period of ten years were assessed using the checklists. The findings of the study show that operations maintenance was not adequately carried out in the four tourists attractions. Repairs maintenance was carried out in Yankari game reserve and safari, but repairs maintenance was poor in the other three attractions. The study therefore, recommends that adequate maintenance should be practiced in tourist attractions to expand the lifespan of the facilities and also encourage tourist patronage.

Keywords: appraisal, maintenance, practices, tourist attraction

Procedia PDF Downloads 270
1720 CNC Milling-Drilling Machine Cutting Tool Holder

Authors: Hasan Al Dabbas

Abstract:

In this paper, it is addressed that the mechanical machinery captures a major share of innovation in drilling and milling chucks technology. Users demand higher speeds in milling because they are cutting more aluminum and are relying on higher speeds to eliminate secondary finishing operations. To meet that demand, milling-machine builders have enhanced their machine’s rigidity. Moreover, faster cutting has caught up with boring mills. Cooling these machine’s internal components is a challenge at high speeds. Another trend predicted that it is more use of controlled axes to let the machines do many more operations on 5 sides without having to move or re-fix the work. Advances of technology in mechanical engineering have helped to make high-speed machining equipment. To accompany these changes in milling and drilling machines chucks, the demand of easiest software is increased. An open architecture controller is being sought that would allow flexibility and information exchange.

Keywords: drilling, milling, chucks, cutting edges, tools, machines

Procedia PDF Downloads 549
1719 The Evolution of the Israel Defence Forces’ Information Operations: A Case Study of the Israel Defence Forces' Activities in the Information Domain 2006–2014

Authors: Teemu Saressalo

Abstract:

This article examines the evolution of the Israel Defence Forces’ information operation activities during an eight-year timespan from the 2006 war with Hezbollah to more recent operations such as Pillar of Defence and Protective Edge. To this end, the case study will show a change in the Israel Defence Forces’ activities in the information domain. In the 2006 war with Hezbollah in Lebanon, Israel inflicted enormous damage on the Lebanese infrastructure, leaving more than 1,200 people dead and 4,400 injured. Casualties among Hezbollah, Israel’s main adversary, were estimated to range from 250 to 700 fighters. Damage to the Lebanese infrastructure was estimated at over USD 2.5bn, with almost 2,000 houses and buildings damaged and destroyed. Even this amount of destruction did not force Hezbollah to yield and while both sides were claiming victory in the war, Israel paid a heavier price in political backlashes and loss of reputation, mainly due to failures in the media and the way in which the war was portrayed and perceived in Israel and abroad. Much of this can be credited to Hezbollah’s efficient use of the media, and Israel’s failure to do so. Israel managed the next conflict it was engaged in completely differently – it had learnt its lessons and built up new ways to counter its adversary’s propaganda and media operations. In Operation Cast Lead at the turn of 2009, Hamas, Israel’s adversary and Gaza’s dominating faction, was not able to utilize the media in the same way that Hezbollah had. By creating a virtual and physical barrier around the Gaza Strip, Israel almost totally denied its adversary access to the worldwide media, and by restricting the movement of journalists in the area, Israel could let its voice be heard above all. The operation Cast Lead began with a deception operation, which caught Hamas totally off guard. The 21-day campaign left the Gaza Strip devastated, but did not cause as much protest in Israel during the operation as the 2006 war did, mainly due to almost total Israeli dominance in the information dimension. The most important outcome from the Israeli perspective was the fact that Operation Cast Lead was assessed to be a success and the operation enjoyed domestic support along with support from many western nations, which had condemned Israeli actions in the 2006 war. Later conflicts have shown the same tendency towards virtually total dominance in the information domain, which has had an impact on target audiences across the world. Thus, it is clear that well-planned and conducted information operations are able to shape public opinion and influence decision-makers, although Israel might have been outpaced by its rivals.

Keywords: Hamas, Hezbollah, information operations, Israel Defence Forces

Procedia PDF Downloads 203
1718 Mainstreaming Willingness among Black Owned Informal Small Micro Micro Enterprises in South Africa

Authors: Harris Maduku, Irrshad Kaseeram

Abstract:

The objective of this paper is to understand the factors behind the formalisation willingness of South African black owned SMMEs. Cross-sectional data were collected using a questionnaire from 390 informal businesses in Johannesburg and Pretoria using stratified random sampling and clustered sampling. This study employed a multinomial logistic regression to quantitatively understand what encourages informal SMMEs to be willing to mainstreaming their operations. We find government support, corruption, employment compensation, family labour, success perception, education status, age and financing as key drivers on willingness of SMMEs to formalize their operations. The findings of our study points to government departments to invest more on both financial and non-financial strategies like capacity building and business education on informal SMMEs to cultivate their willingness to mainstream.

Keywords: mainstreaming, transition, informal, willingness, multinomial logit

Procedia PDF Downloads 122
1717 Boundary Crossings: Brahmanical Patriarchy, Power, and Sexual Violence in COVID-19 in Odisha, India

Authors: Saraswati Suna

Abstract:

The outbreak of the COVID-19 epidemic and the subsequent lockdown have significantly impacted India's political, structural, and economic systems and a rising gap between the rich and the disadvantaged, upper and lower caste. For Dalit women, such forms of subjugation were followed by socioeconomic uncertainty due to the pandemic's economic shutdown and labour oppressions. Dalit women have been the victims of the most oppression among the nation's underprivileged groups. Dalit women undergo systemic oppression at the hands of the state, caste, class, gender, and religious hegemons historically. Dalit women hold a subordinate position within the gender to their male counterparts and caste to their upper-caste counterparts. This paper examines how Brahminical patriarchy and state power severely affected Dalit/Adivasi women during COVID-19 in Odisha, India. In order to understand caste-based sexual violence, a total of five cases have been analysed from newspapers. Findings revealed that Covid-19 appears to have a significant physical, psychological, and economic impact on Dalit women. The intention of sexual harassment and rape perpetrated by upper caste men is to maintain power and patriarchal culture in society. Dalit women are economically, socially, and culturally marginalised, which effectively exacerbates the sense of impunity by perpetrators of violence against Dalit women. This issue requires special attention to end atrocities against Dalit women. Dalit women become the target of rape, sexual assault, and murder. Sexual violence against Dalit women cannot be fully explained without linkage to caste, gender, and power. Dominant caste comes through caste privilege-socio-economic and politically; these factors contribute to sexual violence against Dalit women. The findings revealed that state police manipulate sexual violence, and in so doing, they create and deny access to both services to get justice. This article has argued that understanding Brahminical culture and the legal impacts of state police on Dalit women's identity requires a nuanced analysis.

Keywords: COVID-19, dalit women, sexual violence, brahminical patriarchy, power

Procedia PDF Downloads 148
1716 Computational Fluid Dynamicsfd Simulations of Air Pollutant Dispersion: Validation of Fire Dynamic Simulator Against the Cute Experiments of the Cost ES1006 Action

Authors: Virginie Hergault, Siham Chebbah, Bertrand Frere

Abstract:

Following in-house objectives, Central laboratory of Paris police Prefecture conducted a general review on models and Computational Fluid Dynamics (CFD) codes used to simulate pollutant dispersion in the atmosphere. Starting from that review and considering main features of Large Eddy Simulation, Central Laboratory Of Paris Police Prefecture (LCPP) postulates that the Fire Dynamics Simulator (FDS) model, from National Institute of Standards and Technology (NIST), should be well suited for air pollutant dispersion modeling. This paper focuses on the implementation and the evaluation of FDS in the frame of the European COST ES1006 Action. This action aimed at quantifying the performance of modeling approaches. In this paper, the CUTE dataset carried out in the city of Hamburg, and its mock-up has been used. We have performed a comparison of FDS results with wind tunnel measurements from CUTE trials on the one hand, and, on the other, with the models results involved in the COST Action. The most time-consuming part of creating input data for simulations is the transfer of obstacle geometry information to the format required by SDS. Thus, we have developed Python codes to convert automatically building and topographic data to the FDS input file. In order to evaluate the predictions of FDS with observations, statistical performance measures have been used. These metrics include the fractional bias (FB), the normalized mean square error (NMSE) and the fraction of predictions within a factor of two of observations (FAC2). As well as the CFD models tested in the COST Action, FDS results demonstrate a good agreement with measured concentrations. Furthermore, the metrics assessment indicate that FB and NMSE meet the tolerance acceptable.

Keywords: numerical simulations, atmospheric dispersion, cost ES1006 action, CFD model, cute experiments, wind tunnel data, numerical results

Procedia PDF Downloads 106
1715 Study of Suezmax Shuttle Tanker Energy Efficiency for Operations at the Brazilian Pre-Salt Region

Authors: Rodrigo A. Schiller, Rubens C. Da Silva, Kazuo Nishimoto, Claudio M. P. Sampaio

Abstract:

The need to reduce fossil fuels consumption due to the current scenario of trying to restrain global warming effects and reduce air pollution is dictating a series of transformations in shipping. This study introduces, at first, the changes of the regulatory framework concerning gas emissions control and fuel consumption efficiency on merchant ships. Secondly, the main operational procedures with high potential reduction of fuel consumption are discussed, with focus on existing vessels, using ship speed reduction procedure. This procedure shows the positive impacts on both operating costs reduction and also on energy efficiency increase if correctly applied. Finally, a numerical analysis of the fuel consumption variation with the speed was carried out for a Suezmax class oil tanker, which has been adapted to oil offloading operations for FPSOs in Brazilian offshore oil production systems. In this analysis, the discussions about the variations of vessel energy efficiency from small speed rate reductions and the possible applications of this improvement, taking into account the typical operating profile of the vessel in such a way to have significant economic impacts on the operation. This analysis also evaluated the application of two different numerical methods: one based only on regression equations produced by existing data, semi-empirical method, and another using a CFD simulations for estimating the hull shape parameters that are most relevant for determining fuel consumption, analyzing inaccuracies and impact on the final results.

Keywords: energy efficiency, offloading operations, speed reduction, Suezmax oil tanker

Procedia PDF Downloads 503
1714 Exploring SSD Suitable Allocation Schemes Incompliance with Workload Patterns

Authors: Jae Young Park, Hwansu Jung, Jong Tae Kim

Abstract:

Whether the data has been well parallelized is an important factor in the Solid-State-Drive (SSD) performance. SSD parallelization is affected by allocation scheme and it is directly connected to SSD performance. There are dynamic allocation and static allocation in representative allocation schemes. Dynamic allocation is more adaptive in exploiting write operation parallelism, while static allocation is better in read operation parallelism. Therefore, it is hard to select the appropriate allocation scheme when the workload is mixed read and write operations. We simulated conditions on a few mixed data patterns and analyzed the results to help the right choice for better performance. As the results, if data arrival interval is long enough prior operations to be finished and continuous read intensive data environment static allocation is more suitable. Dynamic allocation performs the best on write performance and random data patterns.

Keywords: dynamic allocation, NAND flash based SSD, SSD parallelism, static allocation

Procedia PDF Downloads 302
1713 Control of a Stewart Platform for Minimizing Impact Energy in Simulating Spacecraft Docking Operations

Authors: Leonardo Herrera, Shield B. Lin, Stephen J. Montgomery-Smith, Ziraguen O. Williams

Abstract:

Three control algorithms: Proportional-Integral-Derivative, Linear-Quadratic-Gaussian, and Linear-Quadratic-Gaussian with the shift, were applied to the computer simulation of a one-directional dynamic model of a Stewart Platform. The goal was to compare the dynamic system responses under the three control algorithms and to minimize the impact energy when simulating spacecraft docking operations. Equations were derived for the control algorithms and the input and output of the feedback control system. Using MATLAB, Simulink diagrams were created to represent the three control schemes. A switch selector was used for the convenience of changing among different controllers. The simulation demonstrated the controller using the algorithm of Linear-Quadratic-Gaussian with the shift resulting in the lowest impact energy.

Keywords: controller, Stewart platform, docking operation, spacecraft

Procedia PDF Downloads 5
1712 Escalation of Commitment and Turnover in Top Management Teams

Authors: Dmitriy V. Chulkov

Abstract:

Escalation of commitment is defined as continuation of a project after receiving negative information about it. While literature in management and psychology identified various factors contributing to escalation behavior, this phenomenon has received little analysis in economics, potentially due to the apparent irrationality of escalation. In this study, we present an economic model of escalation with asymmetric information in a principal-agent setup where the agents are responsible for a project selection decision and discover the outcome of the project before the principal. Our theoretical model complements the existing literature on several accounts. First, we link the incentive to escalate commitment to a project with the turnover decision by the manager. When a manager learns the outcome of the project and stops it that reveals that a mistake was made. There is an incentive to continue failing projects and avoid admitting the mistake. This incentive is enhanced when the agent may voluntarily resign from the firm before the outcome of the failing project is revealed, and thus not bear the full extent of reputation damage due to project failure. As long as some successful managers leave the firm for extraneous reasons, outside firms find it difficult to link failing projects with certainty to managers that left a firm. Second, we demonstrate that non-CEO managers have reputation concerns separate from those of the CEO, and thus may escalate commitment to projects they oversee, when such escalation can attenuate damage to reputation from impending project failure. Such incentive for escalation will be present for non-CEO managers if the CEO delegates responsibility for a project to a non-CEO executive. If reputation matters for promotion to the CEO, the incentive for a rising executive to escalate in order to protect reputation is distinct from that of a CEO. Third, our theoretical model is supported by empirical analysis of changes in the firm’s operations measured by the presence of discontinued operations at the time of turnover among the top four members of the top management team. Discontinued operations are indicative of termination of failing projects at a firm. The empirical results demonstrate that in a large dataset of over three thousand publicly traded U.S. firms for a period from 1993 to 2014 turnover by top executives significantly increases the likelihood that the firm discontinues operations. Furthermore, the type of turnover matters as this effect is strongest when at least one non-CEO member of the top management team leaves the firm and when the CEO departure is due to a voluntary resignation and not to a retirement or illness. Empirical results are consistent with the predictions of the theoretical model and suggest that escalation of commitment is primarily observed in decisions by non-CEO members of the top management team.

Keywords: discontinued operations, escalation of commitment, executive turnover, top management teams

Procedia PDF Downloads 342
1711 Analysis of the Unmanned Aerial Vehicles’ Incidents and Accidents: The Role of Human Factors

Authors: Jacob J. Shila, Xiaoyu O. Wu

Abstract:

As the applications of unmanned aerial vehicles (UAV) continue to increase across the world, it is critical to understand the factors that contribute to incidents and accidents associated with these systems. Given the variety of daily applications that could utilize the operations of the UAV (e.g., medical, security operations, construction activities, landscape activities), the main discussion has been how to safely incorporate the UAV into the national airspace system. The types of UAV incidents being reported range from near sightings by other pilots to actual collisions with aircraft or UAV. These incidents have the potential to impact the rest of aviation operations in a variety of ways, including human lives, liability costs, and delay costs. One of the largest causes of these incidents cited is the human factor; other causes cited include maintenance, aircraft, and others. This work investigates the key human factors associated with UAV incidents. To that end, the data related to UAV incidents that have occurred in the United States is both reviewed and analyzed to identify key human factors related to UAV incidents. The data utilized in this work is gathered from the Federal Aviation Administration (FAA) drone database. This study adopts the human factor analysis and classification system (HFACS) to identify key human factors that have contributed to some of the UAV failures to date. The uniqueness of this work is the incorporation of UAV incident data from a variety of applications and not just military data. In addition, identifying the specific human factors is crucial towards developing safety operational models and human factor guidelines for the UAV. The findings of these common human factors are also compared to similar studies in other countries to determine whether these factors are common internationally.

Keywords: human factors, incidents and accidents, safety, UAS, UAV

Procedia PDF Downloads 209
1710 Re-Victimization of Sex Trafficking Victims in Canada: Literature Review

Authors: Adrianna D. Hendricks

Abstract:

This paper examines the factors that contribute to the re-traumatization of victims of sex trafficking within the Canadian context. Sex trafficking occurring domestically in Canada is severely under-researched, stigmatized, and under-prosecuted, leading to the re-traumatization of victims by various levels of government. This is in part due to the Canadian criminal justice system unethically utilizing prostitution laws in cases of sex trafficking and partially due to the unaddressed stigmatization victims face within the justice system itself. Utilizing evidence from a current literature review, personal correspondence, and personal life experiences, this paper will demonstrate the need for victim involvement in policy reform. The current literature review was done through an academic database search using the terms: “Sex Trafficking, Exploitation, Canada”, with the limitation of articles written within the last five years and written within the Canadian context. Overall, from the results, only eight articles precisely matched the criteria. The current literature argues strongly and unanimously for more research and education of professionals who have close contact with high-risk populations (doctors, police officers, social workers, etc.) to protect both minors and adults from being sexually trafficked. Additionally, for women and girls who do not have Canadian citizenship, the fear of deportation becomes a barrier to disclosing exploitation experiences to professionals. There is a desperate need for more research done in tandem with survivors and victims to inform policymaking in a meaningful way. The researcher is a survivor of sex trafficking both as a youth and as an adult, giving the researcher a unique insight into the realities of the criminal justice system for victims of sex trafficking. Congruent to the current research, the author calls for standardized professional training for people in healthcare, police officers, court officials, and victim services, with the additional layer of victim involvement. Justice for victims/survivors can only be obtained if they have been consulted and believed. Without meaningful consultation with survivors, victims who are both minors and adults will continue to fall through the cracks in policy.

Keywords: Canadian policy, re-traumatization, sex-trafficking, stigmatization

Procedia PDF Downloads 32
1709 Enhancing Sustainability Awareness through Social Learning Experiences on Campuses

Authors: Rashika Sharma

Abstract:

The campuses at tertiary institutes can act as a social environment for peer to peer connections. However, socialization is not the only aspect that campuses provide. The campus can act as a learning environment that has often been termed as the campus curriculum. Many tertiary institutes have taken steps to make their campus a ‘green campus’ whereby initiatives have been taken to reduce their impact on the environment. However, as visible as these initiatives are, it is debatable whether these have any effect on students’ and their understanding of sustainable campus operations. Therefore, research was conducted to evaluate the effectiveness of sustainable campus operations in raising students’ awareness of sustainability. Students at two vocational institutes participated in this interpretive research with data collected through surveys and focus groups. The findings indicated that majority of vocational education students remained oblivious of sustainability initiatives on campuses.

Keywords: campus learning, education for sustainability, social learning, vocational education

Procedia PDF Downloads 260
1708 Algorithms used in Spatial Data Mining GIS

Authors: Vahid Bairami Rad

Abstract:

Extracting knowledge from spatial data like GIS data is important to reduce the data and extract information. Therefore, the development of new techniques and tools that support the human in transforming data into useful knowledge has been the focus of the relatively new and interdisciplinary research area ‘knowledge discovery in databases’. Thus, we introduce a set of database primitives or basic operations for spatial data mining which are sufficient to express most of the spatial data mining algorithms from the literature. This approach has several advantages. Similar to the relational standard language SQL, the use of standard primitives will speed-up the development of new data mining algorithms and will also make them more portable. We introduced a database-oriented framework for spatial data mining which is based on the concepts of neighborhood graphs and paths. A small set of basic operations on these graphs and paths were defined as database primitives for spatial data mining. Furthermore, techniques to efficiently support the database primitives by a commercial DBMS were presented.

Keywords: spatial data base, knowledge discovery database, data mining, spatial relationship, predictive data mining

Procedia PDF Downloads 425
1707 Application of Soft Systems Methodology in Solving Disaster Emergency Logistics Problems

Authors: Alhasan Hakami, Arun Kumar, Sung J. Shim, Yousef Abu Nahleh

Abstract:

In recent years, many high intensity earthquakes have occurred around the world, such as the 2011 earthquake in Tohoku, Japan. These large-scale disasters caused huge casualties and losses. In addition, inefficient disaster response operations also caused the second wave of casualties and losses, and expanded the damage. Effective disaster management can be used to respond to the chaotic situation, and reduce the damage. However, some inefficient disaster response operations are still used. Therefore, this case study chose the 921 earthquakes for analysing disaster emergency logistics problems and proposed the Soft Systems Methodology (SSM) to solve disaster emergency logistics problems. Moreover, it analyses the effect of human factors on system operation, and suggests a solution to improve the system.

Keywords: soft systems methodology, emergency logistics, earthquakes, Japan, system operation

Procedia PDF Downloads 418
1706 Effectiveness of Qanun Number 14 of 2013 on Khalwat, Nasty in the Enforcement of Islamic Shari'a in Banda Aceh, Aceh Province

Authors: Muhadam Labolo, Mughny Ibtisyam Mukhlis, Zulkarnaen, Safira Maulida Rahman Soulisa

Abstract:

This research is motivated by one of the functions of government is a regulatory function. Aceh Province, especially in Banda Aceh City has special autonomy, one of them is in the application of Islamic law, but when the law implemented to the citizen, there are many problems happens. One of the problems faced by the Government and people of Banda Aceh was Seclusion. Seclusion/nasty silent act between two people mukallafor more of the opposite sex who is not mahram or without marriage. This study aims to determine and analyze how the effectiveness of the policy as well as enabling and inhibiting factors of Qanun Number 14 of 2003 On Khalwat (nasty) in sharia Islam Islamic law in the city of Banda Aceh. This type of research is qualitative research method is a descriptive and inductive approach. The source of data used is People, Problem, Phenomenon, and programs, while the data collection through field studies and literature such as interviews, observation, and documentation. The results of this study were analyzed by using data reduction, display data, conclusions, and verification. The results showed that the Qanun Number 14 of 2003 on Khalwat (nasty) in the establishment of Islamic law in Banda Aceh is still not effective. It is seen from the high number of violations seclusion committed by Banda Aceh citizen, especially among teenagers, lack of socialization, as well as a lack of budgetary support for the implementation of Islamic Law in Banda Aceh. The supporting factors are 1) Coordination and communication among agencies had been walking steadily. 2) Facilities and infrastructure Syar'iah Court of Banda Aceh and the Office of Sharia Islam Banda Aceh that very good. 3) The Cultural majority of the people of Banda Aceh that support. Inhibiting factors: 1) There are no written duties of each institution for the prosecution case Seclusion. 2) The lack of socialization programs. 3) Lack of facilities and infrastructure Municipal Police Unit and the WH less. 4) Lack of control by the family. 5) The absence of training for officials Municipal Police Units and the Wilayatul Hisbah Banda Aceh.

Keywords: effectiveness, Islamic Sharia, Khalwat, Qanun

Procedia PDF Downloads 201
1705 Impact of Risk Management Practices on Company Performance

Authors: Syed Atif Ali, Farzan Yahya

Abstract:

This research paper covers the issue of risk management impact on the company performance. Degree of financial leverage (DFL), degree of operating leverage (DOL) and the working capital ratio (WCR) are taken as independent variables which are the representative of risk and the earning price per share (EPS), return on assets (ROA), return on equity (ROE), Sales and Net profits which are the representative of performance. Last 10 years (2004-2013) of Cement sector of Pakistan data is chosen as sample for analyze their relations by multiple regression technique. Through analyses, it is found that WCR impact adequately on the company performance because if company has enough liquidity than it perform its operations smoothly and enhance its performance very well. DFL should be control moderately because enough DFL leads performance of company downward. On the other hand, the DOL should be less because it causes the less profitability for a company from its operations.

Keywords: degree of financial leverage (DFL), degree of operating leverage (DOL), working capital ratio (WCR), earning per share (EPS), return on equity (ROE), return on assets (ROA)

Procedia PDF Downloads 426