Search results for: system protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 18736

Search results for: system protection

18616 Green Economy and Environmental Protection Economic Policy Challenges in Georgia

Authors: Gulnaz Erkomaishvili

Abstract:

Introduction. One of the most important issues of state economic policy in the 21st century is the problem of environmental protection. The Georgian government considers the green economy as one of the most important means of sustainable economic development and takes the initiative to implement voluntary measures to promote sustainable development. In this context, it is important to promote the development of ecosystem services, clean production, environmental education and green jobs.The development of the green economy significantly reduces the inefficient use of natural resources, waste generation, emissions into the atmosphere and the discharge of untreated water into bodies of water.It is, therefore, an important instrument in the environmental orientation of sustainable development. Objectives.The aim of the paper is to analyze the current status of the green economy in Georgia and identify effective ways to improve the environmental, economic policy of sustainable development. Methodologies: This paper uses general and specific methods, in particular, analysis, synthesis, induction, deduction, scientific abstraction, comparative and statistical methods, as well as experts’ evaluation. bibliographic research of scientific works and reports of organizations was conducted; Publications of the National Statistics Office of Georgia are used to determine the regularity between analytical and statistical estimations. Also, theoretical and applied research of international organizations and scientist-economists are used. Contributions: The country should implement such an economic policy that ensures the transition to a green economy, in particular, revising water, air and waste laws, strengthening existing environmental management tools and introcing new tools (including economic tools). Perfecting the regulatory legal framework of the environmental impact assessment system, which includes the harmonization of Georgian legislation with the requirements of the European Union. To ensure the protection and rational use of Georgia's forests, emphasis should be placed on sustainable forestry, protection and restoration of forests.

Keywords: green economy, environmental protection, environmental protection economic policy, environmental protection policy challanges

Procedia PDF Downloads 25
18615 Ontology-Driven Generation of Radiation Protection Procedures

Authors: Chamseddine Barki, Salam Labidi, Hanen Boussi Rahmouni

Abstract:

In this article, we present the principle and suitable methodology for the design of a medical ontology that highlights the radiological and dosimetric knowledge, applied in diagnostic radiology and radiation-therapy. Our ontology, which we named «Onto.Rap», is the subject of radiation protection in medical and radiology centers by providing a standardized regulatory oversight. Thanks to its added values of knowledge-sharing, reuse and the ease of maintenance, this ontology tends to solve many problems. Of which we name the confusion between radiological procedures a practitioner might face while performing a patient radiological exam. Adding to it, the difficulties they might have in interpreting applicable patient radioprotection standards. Here, the ontology, thanks to its concepts simplification and expressiveness capabilities, can ensure an efficient classification of radiological procedures. It also provides an explicit representation of the relations between the different components of the studied concept. In fact, an ontology based-radioprotection expert system, when used in radiological center, could implement systematic radioprotection best practices during patient exam and a regulatory compliance service auditing afterwards.

Keywords: knowledge, ontology, radiation protection, radiology

Procedia PDF Downloads 276
18614 Preliminary Design of an Aerodynamic Protection for the Scramjet Engine Inlet of the Brazilian Technological Demonstrator Scramjet 14-X S

Authors: Gustavo J. Costa, Felipe J. Costa, Bruno L. Coelho, Ronaldo L. Cardoso, Rafael O. Santos, Israel S. Rêgo, Marco A. S. Minucci, Antonio C. Oliveira, Paulo G. P. Toro

Abstract:

The Prof. Henry T. Nagamatsu Aerothermodynamics and Hipersonics Laboratory, of the Institute for Advanced Studies (IEAv) conducts research and development (R&D) of the Technological Demonstrator scramjet 14-X S, aiming atmospheric flight at 30 km altitude with the speed correspondent to Mach number 7, using scramjet technology providing hypersonic propulsion system based on supersonic combustion. Hypersonic aerospace vehicles with air-breathing supersonic propulsion system face extremal environments for super/hypersonic flights in terms of thermal and aerodynamic loads. Thus, it is necessary to use aerodynamic protection at the scramjet engine inlet to face the thermal and aerodynamic loads without compromising the efficiency of scramjet engine, taking into account: i) inlet design (boundary layer, oblique shockwave and reflected oblique shockwave); ii) wall temperature of the cowl and of the compression ramp; iii) supersonic flow into the combustion chamber. The aerodynamic protection of the scramjet engine inlet will act to prevent the engine unstart and match the predictions made by theoretical-analytical, numerical analysis and experimental research, during the atmospheric flight of the Technological Demonstrator scramjet 14-X S.

Keywords: 14-X, hypersonic, scramjet, supersonic combustion

Procedia PDF Downloads 386
18613 The Feminism of Data Privacy and Protection in Africa

Authors: Olayinka Adeniyi, Melissa Omino

Abstract:

The field of data privacy and data protection in Africa is still an evolving area, with many African countries yet to enact legislation on the subject. While African Governments are bringing their legislation to speed in this field, how patriarchy pervades every sector of African thought and manifests in society needs to be considered. Moreover, the laws enacted ought to be inclusive, especially towards women. This, in a nutshell, is the essence of data feminism. Data feminism is a new way of thinking about data science and data ethics that is informed by the ideas of intersectional feminism. Feminising data privacy and protection will involve thinking women, considering women in the issues of data privacy and protection, particularly in legislation, as is the case in this paper. The line of thought of women inclusion is not uncommon when even international and regional human rights specific for women only came long after the general human rights. The consideration is that these should have been inserted or rather included in the original general instruments in the first instance. Since legislation on data privacy is coming in this century, having seen the rights and shortcomings of earlier instruments, then the cue should be taken to ensure inclusive wholistic legislation for data privacy and protection in the first instance. Data feminism is arguably an area that has been scantily researched, albeit a needful one. With the spate of increase in the violence against women spiraling in the cyber world, compounding the issue of COVID-19 and the needful response of governments, and the effect of these on women and their rights, fast forward, the research on the feminism of data privacy and protection in Africa becomes inevitable. This paper seeks to answer the questions, what is data feminism in the African context, why is it important in the issue of data privacy and protection legislation; what are the laws, if any, existing on data privacy and protection in Africa, are they women inclusive, if not, why; what are the measures put in place for the privacy and protection of women in Africa, and how can this be made possible. The paper aims to investigate the issue of data privacy and protection in Africa, the legal framework, and the protection or provision that it has for women if any. It further aims to research the importance and necessity of feminizing data privacy and protection, the effect of lack of it, the challenges or bottlenecks in attaining this feat and the possibilities of accessing data privacy and protection for African women. The paper also researches the emerging practices of data privacy and protection of women in other jurisprudences. It approaches the research through the methodology of review of papers, analysis of laws, and reports. It seeks to contribute to the existing literature in the field and is explorative in its suggestion. It suggests a draft of some clauses to make any data privacy and protection legislation women inclusive. It would be useful for policymaking, academic, and public enlightenment.

Keywords: feminism, women, law, data, Africa

Procedia PDF Downloads 153
18612 Seismic Protection of Automated Stocker System by Customized Viscous Fluid Dampers

Authors: Y. P. Wang, J. K. Chen, C. H. Lee, G. H. Huang, M. C. Wang, S. W. Chen, Y. T. Kuan, H. C. Lin, C. Y. Huang, W. H. Liang, W. C. Lin, H. C. Yu

Abstract:

The hi-tech industries in the Science Park at southern Taiwan were heavily damaged by a strong earthquake early 2016. The financial loss in this event was attributed primarily to the automated stocker system handling fully processed products, and recovery of the automated stocker system from the aftermath proved to contribute major lead time. Therefore, development of effective means for protection of stockers against earthquakes has become the highest priority for risk minimization and business continuity. This study proposes to mitigate the seismic response of the stockers by introducing viscous fluid dampers in between the ceiling and the top of the stockers. The stocker is expected to vibrate less violently with a passive control force on top. Linear damper is considered in this application with an optimal damping coefficient determined from a preliminary parametric study. The damper is small in size in comparison with those adopted for building or bridge applications. Component test of the dampers has been carried out to make sure they meet the design requirement. Shake table tests have been further conducted to verify the proposed scheme under realistic earthquake conditions. Encouraging results have been achieved by effectively reducing the seismic responses of up to 60% and preventing the FOUPs from falling off the shelves that would otherwise be the case if left unprotected. Effectiveness of adopting a viscous fluid damper for seismic control of the stocker on top against the ceiling has been confirmed. This technique has been adopted by Macronix International Co., LTD for seismic retrofit of existing stockers. Demonstrative projects on the application of the proposed technique are planned underway for other companies in the display industry as well.

Keywords: hi-tech industries, seismic protection, automated stocker system, viscous fluid damper

Procedia PDF Downloads 325
18611 A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted Techniques

Authors: Zhang Xingnan, Huang Jingjia, Feng Yue, Burra Venkata Durga Kumar

Abstract:

This paper proposes a comprehensive approach to mitigate ROP (Return-Oriented Programming) attacks by combining internal operating system protection mechanisms and hardware-assisted techniques. Through extensive literature review, we identify the effectiveness of ASLR (Address Space Layout Randomization) and LBR (Last Branch Record) in preventing ROP attacks. We present a process involving buffer overflow detection, hardware-assisted ROP attack detection, and the use of Turing detection technology to monitor control flow behavior. We envision a specialized tool that views and analyzes the last branch record, compares control flow with a baseline, and outputs differences in natural language. This tool offers a graphical interface, facilitating the prevention and detection of ROP attacks. The proposed approach and tool provide practical solutions for enhancing software security.

Keywords: operating system, ROP attacks, returning-oriented programming attacks, ASLR, LBR, CFI, DEP, code randomization, hardware-assisted CFI

Procedia PDF Downloads 50
18610 Alternative Dispute Resolution Procedures for International Conflicts about Industrial Design

Authors: Moreno Liso Lourdes

Abstract:

The industrial design protects the appearance of part or all of a product resulting from the features of, in particular, the lines, contours, colors, shape, texture or materials of the product itself or its ornamentation. The industrial property offers a different answer depending on the characteristics of the shape object of protection possible, including the trademark and industrial design. There are certain cases where the trademark right invalidate the exclusive right of the industrial design. This can occur in the following situations: 1st) collected as a sign design and trademarked; and 2nd) you want to trademark and protected as a form design (either registered or unregistered). You can either get a trade mark or design right in the same sign or form, provided it meets the legal definition of brand and design and meets the requirements imposed for the protection of each of them, even able to produce an overlap of protection. However, this double protection does not have many advantages. It is, therefore, necessary to choose the best form of legal protection according to the most adequate ratios. The diversity of rights that can use the creator of an industrial design to protect your job requires you to make a proper selection to prevent others, especially their competitors, taking advantage of the exclusivity that guarantees the law. It is necessary to choose between defending the interests of the parties through a judicial or extrajudicial procedure when the conflict arises. In this paper, we opted for the defense through mediation.

Keywords: industrial design, ADR, Law, EUIPO

Procedia PDF Downloads 208
18609 Employee Whistleblower Protection: An Analysis of Malaysian Law and Islamic Law

Authors: Ashgar Ali Ali Mohamed, Farheen Baig Sardar Baig

Abstract:

In Malaysia, the Whistle-blower Protection Act 2010 provides protection to a person in an organization who exposes misconduct, alleged dishonest or illegal activity that violates the existing laws, among others. For example, alleged fraud, health and safety violations, and corruption, to name but a few. Undeniable, most whistle-blowers are internal to an organisation who report misconduct of a fellow employee or superior within their company and they frequently face reprisal at the hands of the organisation which they have accused. In fact, many people do not consider blowing the whistle because of fear of retaliation and losing their relationships at workplace. Although whistle-blowers are protected under law from employer retaliation, there have been many cases where punishment for whistleblowing has occurred, such as suspension, demotion, termination, or harsh mistreatment by other employees. Hence, this paper will analyse the adequacy of the legal protection available to employees who whistle-blow on their employers with reference to the Whistle-blower Protection Act 2010. Reference will also be made to the approach taken in other selected jurisdiction with a view of highlighting the adequacy of the Malaysian legislation on this subject besides strengthen employee whistle-blower protection. Further, reference is also made to the Islamic approach on this subject with particular reference to the concept of amr-bil-Ma’roof (ordering for acknowledged virtues) and nahi anil munkar (forbidding from sin). Allah (SWT) says: “And there should be a group amongst you who invite towards good, order for acknowledged virtues, forbid from sin and these it is that are the successful ones” (Al Imran(Chp 3), verse 104).

Keywords: whistleblower protection, employee whistleblower, detrimental and reprisal, Malaysian law

Procedia PDF Downloads 523
18608 A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform

Authors: Nidal F. Shilbayeh, Belal AbuHaija, Zainab N. Al-Qudsy

Abstract:

In this paper, a hybrid blind digital watermarking system using Discrete Wavelet Transform (DWT) and Contourlet Transform (CT) has been implemented and tested. The implemented combined digital watermarking system has been tested against five common types of image attacks. The performance evaluation shows improved results in terms of imperceptibility, robustness, and high tolerance against these attacks; accordingly, the system is very effective and applicable.

Keywords: discrete wavelet transform (DWT), contourlet transform (CT), digital image watermarking, copyright protection, geometric attack

Procedia PDF Downloads 357
18607 Vibration-Based Structural Health Monitoring of a 21-Story Building with Tuned Mass Damper in Seismic Zone

Authors: David Ugalde, Arturo Castillo, Leopoldo Breschi

Abstract:

The Tuned Mass Dampers (TMDs) are an effective system for mitigating vibrations in building structures. These dampers have traditionally focused on the protection of high-rise buildings against earthquakes and wind loads. The Camara Chilena de la Construction (CChC) building, built in 2018 in Santiago, Chile, is a 21-story RC wall building equipped with a 150-ton TMD and instrumented with six permanent accelerometers, offering an opportunity to monitor the dynamic response of this damped structure. This paper presents the system identification of the CChC building using power spectral density plots of ambient vibration and two seismic events (5.5 Mw and 6.7 Mw). Linear models of the building with and without the TMD are used to compute the theoretical natural periods through modal analysis and simulate the response of the building through response history analysis. Results show that natural periods obtained from both ambient vibrations and earthquake records are quite similar to the theoretical periods given by the modal analysis of the building model. Some of the experimental periods are noticeable by simple inspection of the earthquake records. The accelerometers in the first story better captured the modes related to the building podium while the upper accelerometers clearly captured the modes related to the tower. The earthquake simulation showed smaller accelerations in the model with TMD that are similar to that measured by the accelerometers. It is concluded that the system identification through power spectral density shows consistency with the expected dynamic properties. The structural health monitoring of the CChC building confirms the advantages of seismic protection technologies such as TMDs in seismic prone areas.

Keywords: system identification, tuned mass damper, wall buildings, seismic protection

Procedia PDF Downloads 91
18606 Provide Adequate Protection to Avoid Secondary Victimization: Ensuring the Rights of the Child Victims in the Criminal Justice System

Authors: Muthukuda Arachchige Dona Shiroma Jeeva Shirajanie Niriella

Abstract:

The necessity of protection of the rights of victims of crime is a matter of concerns today. In the criminal justice system, child victims who are subjected to sexual abuse/violence are more vulnerable than the other crime victims. When they go to the police to lodge the complaint and until the end of the court proceedings, these victims are re-victimized in the criminal justice system. The rights of the suspects, accused and convicts are recognized and guaranteed by the constitution under fair trial norm, contemporary penal laws where crime is viewed as an offence against the State and existing criminal justice system in many jurisdictions including Sri Lanka. In this backdrop, a reasonable question arises as to whether the existing criminal justice system, especially which follow the adversarial mode of judicial trial protect the fair trial norm in the criminal justice process. Therefore, this paper intends to discuss the rights of the sexually abused child victims in the criminal justice system in order to restore imbalance between the rights of the wrongdoer and victim and suggest legal reforms to strengthen their rights in the criminal justice system which is essential to end secondary victimization. The paper considers Sri Lanka as a sample to discuss this issue. The paper looks at how the child victims are marginalized in the traditional adversarial model of the justice process, whether the contemporary penal laws adequately protect the right of these victims and whether the current laws set out the provisions to provide sufficient assistance and protection to them. The study further deals with the important principles adopted in international human rights law relating to the protection of the rights of the child victims in sexual offences cases. In this research paper, rights of the child victims in the investigation, trial and post-trial stages in the criminal justice process will be assessed. This research contains an extensive scrutiny of relevant international standards and local statutory provisions. Case law, books, journal articles, government publications such as commissions’ reports under this topic are rigorously reviewed as secondary resources. Further, randomly selected 25 child victims of sexual offences from the decided cases in last two years, police officers from 5 police divisions where the highest numbers of sexual offences were reported in last two years and the judicial officers both Magistrates and High Court Judges from the same judicial zones are interviewed. These data will be analyzed in order to find out the reasons for this specific sexual victimization, needs of these victims in various stages of the criminal justice system, relationship between victimization and offending and the difficulties and problems that these victims come across in criminal justice system. The author argues that the child victims are considerably neglected and their rights are not adequately protected in the adversarial model of the criminal justice process.

Keywords: child victims of sexual violence, criminal justice system, international standards, rights of child victims, Sri Lanka

Procedia PDF Downloads 336
18605 The Effectiveness of Cathodic Protection on Microbiologically Influenced Corrosion Control

Authors: S. Taghavi Kalajahi, A. Koerdt, T. Lund Skovhus

Abstract:

Cathodic protection (CP) is an electrochemical method to control and manage corrosion in different industries and environments. CP which is widely used, especially in buried and sub-merged environments, which both environments are susceptible to microbiologically influenced corrosion (MIC). Most of the standards recommend performing CP using -800 mV, however, if MIC threats are high or sulfate reducing bacteria (SRB) is present, the recommendation is to use more negative potentials for adequate protection of the metal. Due to the lack of knowledge and research on the effectiveness of CP on MIC, to the author’s best knowledge, there is no information about what MIC threat is and how much more negative potentials should be used enabling adequate protection and not overprotection (due to hydrogen embrittlement risk). Recently, the development and cheaper price of molecular microbial methods (MMMs) open the door for more effective investigations on the corrosion in the presence of microorganisms, along with other electrochemical methods and surface analysis. In this work, using MMMs, the gene expression of SRB biofilm under different potentials of CP will be investigated. The specific genes, such as pH buffering, metal oxidizing, etc., will be compared at different potentials, enabling to determine the precise potential that protect the metal effectively from SRB. This work is the initial step to be able to standardize the recommended potential under MIC condition, resulting better protection for the infrastructures.

Keywords: cathodic protection, microbiologically influenced corrosion, molecular microbial methods, sulfate reducing bacteria

Procedia PDF Downloads 62
18604 The Protection of Assets in the Crisis Management Processes

Authors: Jiri Barta

Abstract:

This paper deals with the prevention and management of emergencies. It focuses on the protection of assets of the critical infrastructure entities that are important to preventing, preparing for and management of emergencies and crisis situations. The paper defines assets and specifies their use and place in the process of crisis management and planning. Critical assets that are protected from the negative effects of emergency or crisis situation we can use in crisis management and response. This basic rule applies mainly to the substantial assets used in the protection of critical infrastructure processes.

Keywords: asset, continuity, critical infrastructure, crisis management process

Procedia PDF Downloads 488
18603 Influence of Cathodic Protection on High Strength, Pre-Stressed Corroded Tendons

Authors: Ibrahim R. Elomari, Fin O'Flaherty, Ibrahim R. Elomari, Paul Lambert

Abstract:

Cathodic protection (CP) is a technique commonly used to arrest corrosion of steel in infrastructure. However, it is not generally used on high strength, pre-stressed tendons due to the risk of hydrogen generation, leading to possible embrittlement. This paper investigates its use in such circumstances where the applied protection potential is varied to determine if CP can be safely employed on pre-stressed tendons. Plain steel tendons measuring 5.4 mm diameter were pre-stressed in timber moulds and embedded in sand/cement mortar, formulated to represent gunite. Two levels of pre-stressing were investigated (400MPa and 1200MPa). Pre-corrosion of 0% (control), 3% and 6% target loss of cross-sectional area was applied to replicate service conditions. Impressed current cathodic protection (ICCP) was then applied to the tendons at two levels of potential to identify any effect on strength. Instant-off values up to -950mV were used for normal protection with values of -1100mV or more negative to achieve overprotection. Following the ICCP phase, the tendons were removed from the mortar, cleaned and weighed to confirm actual percentage of corrosion. Tensile tests were then conducted on the tendons. The preliminary results show the influence of normal levels and overprotection of CP on the ultimate strength of the tendons.

Keywords: pre-stressed concrete, corrosion, cathodic protection, hydrogen embrittlement

Procedia PDF Downloads 228
18602 Protection of Human Rights in Polish Centres for Foreigners – in the Context of the European Human Rights System

Authors: Oktawia Braniewicz

Abstract:

The phenomenon of emigration and migration increasingly affects Poland's borders as well. For this reason, it is necessary to examine the level of protection of Human Rights in Polish Centres for Foreigners. The field study covered 11 centers for Foreigners in the provinces Kujawsko-Pomorskie Region, Lubelskie Region, Lodzkie Region, Mazowieckie Region and Podlaskie Region. Photographic documentation of living and social conditions, conversations with center employees and refugees allow to show a comprehensive picture of the situation prevailing in Centres for Foreigners. The object of reflection will be, in particular, the standards resulting from art. 8 and 13 of the Convention for the Protection of Human Rights and Fundamental Freedoms and article 2 of Protocol No. 1 to the Convention for the Protection of Human Rights and Fundamental Freedoms. The degree of realization of the right to education and the right to respect for family and private life will be shown. Issues related to learning the Polish language, access to a professional translator and psychological help will also be approximated. Learning Polish is not obligatory, which causes problems with assimilation and integration with other members of the new community. In centers for foreigners, there are no translators - a translator from an external company is rented if necessary. The waiting time for an interpreter makes the refugees feel anxious, unable to communicate with the employees of the centers (this is a situation in which the refugees do not know either English, Polish or Russian). Psychologist's help is available on designated days of the week. There is no separate specialist in child psychology, which is a serious problem.

Keywords: human rights, Polish centres, foreigners, fundamental freedoms

Procedia PDF Downloads 97
18601 The Research on Decentralization Supervision Mechanism of Town and Village Culture Based On Authenticity Evaluation

Authors: Chao Ma

Abstract:

In this paper, the evaluation criteria of authenticity evaluation system model are taken as the foundation so as to discuss the establishment problems about decentralization supervision system and mechanism of historical cultural town and village. The filtration of fitting towns and village's authenticity is conducted from the level, characteristic index and authentic assessment of evaluation model, thereby, supervising subject -interest related- coordinate organization can be taken as the venation in the management level, thus supervision mechanism of town and village's cultural inheritance can be combed, and the cultural inheritance management system and mechanism which is suitable to historical and cultural Chinese town and village will be provided. As the settlement with strong self-organizing characteristic, town and village don't recognize the management system as deeply as city. Therefore, it is necessary to establish town and village cultural evaluation system based on authenticity evaluation criteria. In this paper, authenticity evaluation system is established by taking this village's value evaluation criteria and protection as the cores, and the classification of participating options is beneficial to distribute local limited resources, protect hierarchically and accord with the local characters of town and village, build the evaluation system to run through the whole process of cultural inheritance, moreover, provide abundant information resources and make sure the value judgment criteria, thus supervision and management can be strengthened to effectively guard risk. By the above judgement and filtration of participating options, the management object with clear functions and supervision and coordination organization are established, thereby, the managerial logic of interest-related persons' decentralization can be clarified, evaluation system can be established, and the more targeted decentralization supervision system and mechanism of historical and cultural village will be built ultimately. Taking this method as a fundamental in cultural protection of town and village, not only can it be carried forward in the mass media, but also can cultivate the identity sense of indigenous people to come back historical and cultural villages, and resist the replacement of city culture.

Keywords: authenticity, rural culture, inheritance, supervision

Procedia PDF Downloads 312
18600 Forum Shopping in Biotechnology Law: Understanding Conflict of Laws in Protecting GMO-Based Inventions as Part of a Patent Portfolio in the Greater China Region

Authors: Eugene C. Lim

Abstract:

This paper seeks to examine the extent to which ‘forum shopping’ is available to patent filers seeking protection of GMO (genetically modified organisms)-based inventions in Hong Kong. Under Hong Kong’s current re-registration system for standard patents, an inventor must first seek patent protection from one of three Designated Patent Offices (DPO) – those of the People’s Republic of China (PRC), the Europe Union (EU) (designating the UK), or the United Kingdom (UK). The ‘designated patent’ can then be re-registered by the successful patentee in Hong Kong. Interestingly, however, the EU and the PRC do not adopt a harmonized approach toward the patenting of GMOs, and there are discrepancies in their interpretation of the phrase ‘animal or plant variety’. In view of these divergences, the ability to effectively manage ‘conflict of law’ issues is an important priority for multinational biotechnology firms with a patent portfolio in the Greater China region. Generally speaking, both the EU and the PRC exclude ‘animal and plant varieties’ from the scope of patentable subject matter. However, in the EU, Article 4(2) of the Biotechnology Directive allows a genetically modified plant or animal to be patented if its ‘technical feasibility is not limited to a specific variety’. This principle has allowed for certain ‘transgenic’ mammals, such as the ‘Harvard Oncomouse’, to be the subject of a successful patent grant in the EU. There is no corresponding provision on ‘technical feasibility’ in the patent legislation of the PRC. Although the PRC has a sui generis system for protecting plant varieties, its patent legislation allows the patenting of non-biological methods for producing transgenic organisms, not the ‘organisms’ themselves. This might lead to a situation where an inventor can obtain patent protection in Hong Kong over transgenic life forms through the re-registration of a patent from a more ‘biotech-friendly’ DPO, even though the subject matter in question might not be patentable per se in the PRC. Through a comparative doctrinal analysis of legislative provisions, cases and court interpretations, this paper argues that differences in the protection afforded to GMOs do not generally prejudice the ability of global MNCs to obtain patent protection in Hong Kong. Corporations which are able to first obtain patents for GMO-based inventions in Europe can generally use their European patent as the basis for re-registration in Hong Kong, even if such protection might not be available in the PRC itself. However, the more restrictive approach to GMO-based patents adopted in the PRC would be more acutely felt by enterprises and inventors based in mainland China. The broader scope of protection offered to GMO-based patents in Europe might not be available in Hong Kong to mainland Chinese patentees under the current re-registration model for standard patents, unless they have the resources to apply for patent protection as well from another (European) DPO as the basis for re-registration.

Keywords: biotechnology, forum shopping, genetically modified organisms (GMOs), greater China region, patent portfolio

Procedia PDF Downloads 294
18599 Water Education in the Middle East: Case Study of Iran and Turkey

Authors: Seyedeh Zahra Seyed Sharifi, M. R. M. Tabatabaei

Abstract:

Due to increase of population and healthy food demand, management and conservation of water resources have become one of the main concerns of governments, scientists and economists. In recent years, Iran has exposed to water scarcity as a result of which its rivers, lakes and wetlands have dried up or are in the drying process. Therefore, water crisis has become the most important environmental issue in the country. Under these circumstances, increasing public awareness by promoting their culture as well as public collaboration to protect water resources could only be possible by making courses to reflect water importance. This could be approached by school and high-school students to learn optimum use of water resources. This study initially focuses on the current position of water courses in levels of school and high-school educations in Iran and Turkey and then deals with the challenges to be faced for the promotion of the system. The course titles and number of pages related to water in all primary and secondary textbooks of the education system of Iran and Turkey were determined using content analysis method and the results were presented. The results indicate that primary and secondary textbooks in both countries must focus on water shortage and water protection and teach children the optimum use of water in order to promote water protection.

Keywords: educational system, environmental awareness, Iran, Turkey, water crisis

Procedia PDF Downloads 270
18598 A Mixed-method Study of Psychological Empowerment in Child Protection Practitioners

Authors: Amy Bromley

Abstract:

Child protection practitioners are a vital part of systems designed to protect children from abuse and neglect. Reforms in Anglo-American systems have shown a trend towards compliance-culture that reduces practitioner autonomy and empowerment, increasing staff turnover and negatively impacting outcomes for children. This explanatory mixed-methods study examined psychological empowerment in a national sample of child protection practitioners in Australia (n=109) using the Psychological Empowerment Instrument followed by semi-structured interviews (n=19). The results show that practitioners experience the sub-dimensions of psychological empowerment differently, perceiving themselves to have high levels of competence and satisfaction in their work but limited opportunities for self-determination and low levels of impact on decision-making in their organizations. The qualitative data revealed that practitioners do not trust systemic reforms and have experienced them as ineffective, politically driven, and bureaucratic. The increased compliance demanded from these reforms has left practitioners feeling that their expertise is not valued, leading many to leave their organizations. The practitioners who remain employed in child protection identified their use of advocacy, curiosity, and child-centered values as ways of protecting their psychological empowerment. The findings highlight the ways psychological empowerment can be promoted within child protection systems, improving staff retention and building expertise.

Keywords: child protection, implementation, psychological empowerment, systems theory

Procedia PDF Downloads 150
18597 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: root of trust, secure boot, memory protection, hardware security

Procedia PDF Downloads 138
18596 Status of Radiation Protection at Radiation Oncology, BPKM Cancer Hospital, Nepal

Authors: Surendra B. Chand, P. P. Chaurasia, M. P. Adhikari, R. N. Yadav

Abstract:

Objective: The objective of this work was to evaluate all the safety procedures toward the radiation protection for workers in the radiation oncology department. Materials and Methods: The annual thermoluminescent dosimeters (TLDs) reports for five years of the staffs were evaluated, radiation surveys were done in the control consoles, radiotherapy machines room and waiting areas of all machines using Aloka survey meter. Results: The five years TLD reports shows that the whole body dose of the individual staffs is found within the annual dose limit except the accidental exposures. Radiation exposures in the working areas are also safe limits. Conclusion: The radiation safety practices for radiation protection are satisfactory and the radiation workers of the departments are found working within the safe limit.

Keywords: radiation protection, safety, ICRP, dose limits, TLD, radiation devices

Procedia PDF Downloads 537
18595 The Iranian Law and Refugee Survivors of Sexual and Gender-Based Violence

Authors: Aminreza Koohestani

Abstract:

This paper intends to explore the existing safeguards available within the Iranian law in protecting refugees affected by Sexual and Gender-Based Violence (SGBV). The Iranian law afforded protection for women and girls against SGBV is scattered across various bodies of law. Moreover, the degree of protection provided by the law varies greatly from one type of SGBV to another. The paper discusses the scope of applicability of Iranian laws to refugees affected by SGBV as well as substantive and procedural laws afforded protection for survivors of SGBV.

Keywords: Iran, law, violence, women

Procedia PDF Downloads 193
18594 Consumer Protection: An Exploration of the Role of the State in Protecting Consumers Before and During Inflation

Authors: Fatimah Opebiyi

Abstract:

Economic growth promotion, inflation reduction and consumer protection are among the core public interest aims of governments. Nevertheless, higher rates of default by consumers in relation to credit card loans and mortgages in recent times illustrate that government’s performance in balancing the protection of the economy and consumer is subpar. This thereby raises an important question on the role of government in protecting consumers during prolonged spells of inflation, particularly when such inflationary trends may be traceable to the acts of the government. Adopting a doctrinal research methodology, this article investigates the evolution of the concept of consumer protection in the United Kingdom and also brings to the fore the tensions and conflicts of interests in the aims and practices of the main regulators within the financial services industry. Relying on public interest theories of regulation and responsive regulatory theory, the article explores the limitations in the state’s ability to strike the right balance in meeting regulatory aims of the regulatory agencies at the opposite ends of the spectrum.

Keywords: financial regulation, consumer protection, prudential regulation, public interest theories of regulation, central bank

Procedia PDF Downloads 32
18593 Improving Communication System through Router Configuration: The Nigerian Navy Experience

Authors: Saidu I. Rambo, Emmanuel O. Ibam, Sunday O. Adewale

Abstract:

The configuration of routers for effective communication in the Nigerian Navy (NN) enables the navy to improve on the current communication systems. The current system is faced with challenges that make the systems partially effective. The major implementation of the system is to configure routers using hierarchical model and obtaining a VSAT option on C-band platform. These routers will act as a link between Naval Headquarters and the Commands under it. The routers main responsibilities are to forward packets from source location to destination using a Link State Routing Protocol (LSRP). Also using the Point to Point Protocol (PPP), creates a strong encrypted password using Challenge Handshake Authentication Protocol (CHAP) which uses one-way hash function of Message Digest 5 (MD5) to provide complete protection against hackers/intruders. Routers can be configured using a Linux operating system or internet work operating system in the Microsoft platform. With this, system packets can be forwarded to various locations more effectively than the present system being used.

Keywords: C-band, communication, router, VSAT

Procedia PDF Downloads 335
18592 Evaluation of the UV Stability of Unidirectional Crossply Ultrahigh-Molecular-Weight-Polyethylene Composite

Authors: Jonmichael Weaver, David Miller

Abstract:

Dyneema is an ultra-high molecular weight polyethylene (UHMWPE) fiber created by DSM. This fiber has many applications due to the high tensile strength, low weight, and inability to absorb water. DSM manufactures a non-woven unidirectional cross-ply [0,90]2 lamina, using the Dyneema fiber. Using this lamina system, various thickness panels are created for a 40% lighter weight alternative to Kevlar for the same ballistics protection. Environmental effects on the ply/laminate system alter the material properties, resulting in diminished ultimate performance. Understanding the specific environmental parameters and characterizing the resulting material property degradation is essential for determining the safety and reliability of Dyneema in service. Two laminas were contrasted for their response to accelerated aging by UV, humidity, and temperature cycling. Both lamina contain the same fiber, SK-99, but differ in matrix composition, Dyneema HB-210 employs a polyurethane (PUR) based matrix, and HB-212 contains a rubber-based matrix. Each system was inspected using a scanning electron microscope (SEM) and evaluated by dynamic mechanical analysis (DMA) to characterize the material property changes alongside the corresponding composite damage and matrix failure mode over the aging parameters. Overall, resulting in the HB-212 degrading faster compared with the HB-210.

Keywords: dyneema, accelerated aging, polymers, ballistics protection, armor, DSM, kevlar, composites

Procedia PDF Downloads 119
18591 Realising the Socio-Economic Rights of Refugees Under Human Rights Law: A Case Study of South Africa

Authors: Taguekou Kenfack Alexie

Abstract:

For a long time, refugee protection has constituted one of the main concerns of the international community as a whole and for the South African government in particular.The focus of this paper is on the challenges refugees face in accessing their rights in South Africa. In particular, it analyses the legal framework for the protection of the socio economic rights of refugees under international law, regional and domestic law and the extent to which the rights have been realized. The main hypothesis of the study centered on the fact that the social protection of refugees in South Africa is in conformity with international standards. To test this hypothesis, the qualitative research method was applied. Refugee related legal instruments were analyzed as well as academic publications, organizational reports and internet sources. The data analyzed revealed that there has been enormous progress in meeting international standards in the areas of education, emergency relief and assistance, protection of women and refugee children. The results also indicated that much remain to be desired in such areas as nutrition, shelter, health care, freedom of movement and very importantly, employment and social security. The paper also seeks to address the obstacles which prevent the proper treatment of refugees and to make recommendations as how the South African government can better regulate the treatment of refugees living in its territory.Recommendations include the amendment of the legal instruments that provide the normative framework for protection and improvement of protection policies to reflect the changing dynamics.

Keywords: international community, refugee, socioeconomic rights, social protection

Procedia PDF Downloads 252
18590 Financial Capacity, Governance, and Corporate Engagement in Environmental Protection

Authors: Lubica Hikkerova, Jean-Michel Sahut

Abstract:

Environmental protection remains a global challenge but, since 2012, there has been a progressive decline in corporate engagement in environmental protection issues. This study seeks to investigate the role of financial capacity and governance in improving the level of environmental engagement of companies. The regression technique is applied to data on 351 large European companies from the ASSET4-ESG database for the 2007-2015 period. Firstly, the results show that the companies in the sample are fairly engaged in environmental protection, with a strong dispersion representing nearly four times the average. This means that the companies in the sample do not share the same level of engagement in matters of environmental protection, some being more committed than others. Secondly, the results reveal that the financial capacity of the company, as assessed through its indicators, has a significant effect on its level of environmental protection engagement in the present sample. This effect is more positive the higher the profits the company makes, and more negative the more heavily indebted or, the higher the rates of dividends it pays per share. Lastly, the results also show that a better quality of governance plays an important role in the decision to undertake actions leading to environmental protection. More specifically, the degree of management implication in the running of the business, the respect of the rights of the shareholders, the effectiveness of the control exerted by the board of directors, and, to a lesser extent, the independence of the audit committee, are variables which have a positive and significant influence on the level of environmental engagement of companies.

Keywords: financial capacity, corporate governance, environmental engagement, stakeholder theory, theory of organizational legitimacy, theory of resources and capabilities

Procedia PDF Downloads 159
18589 Analyzing the Prospects and Challenges in Implementing the Legal Framework for Competition Regulation in Nigeria

Authors: Oluchukwu P. Obioma, Amarachi R. Dike

Abstract:

Competition law promotes market competition by regulating anti-competitive conduct by undertakings. There is a need for a third party to regulate the market for efficiency and supervision, since, if the market is left unchecked, it may be skewed against the consumers and the economy. Competition law is geared towards the protection of consumers from economic exploitation. It is the duty of every rational government to optimally manage its economic system by employing the best regulatory practices over the market to ensure it functions effectively and efficiently. The Nigerian government has done this by enacting the Federal Competition and Consumer Protection Act, 2018 (FCCPA). This is a comprehensive legal framework with the objective of governing competition issues in Nigeria. Prior to its enactment, the competition law regime in Nigeria was grossly inadequate despite Nigeria being the biggest economy in Africa. This latest legislation has become a bold step in the right direction. This study will use the doctrinal methodology in analyzing the FCCPA, 2018 in order to discover the extent to which the Act will guard against anti-competitive practices and promote competitive markets for the benefit of the Nigerian economy and consumers. The study finds that although the FCCPA, 2018 provides for the regulation of competition in Nigeria, there is a need to effectively tackle the challenges to the implementation of the Act and the development of anti-trust jurisprudence in Nigeria. This study concludes that incisive implementation of competition law in Nigeria will help protect consumers and create a conducive environment for economic growth, development, and protection of consumers from obnoxious competition practices.

Keywords: anti-competitive practices, competition law, competition regulation, consumer protection.

Procedia PDF Downloads 134
18588 Modeling Intelligent Threats: Case of Continuous Attacks on a Specific Target

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

In this paper, we treat a model that falls in the area of protecting targeted systems from intelligent threats including terrorism. We introduce the concept of system survivability, in the context of continuous attacks, as the probability that a system under attack will continue operation up to some fixed time t. We define a constant attack rate (CAR) process as an attack on a targeted system that follows an exponential distribution. We consider the superposition of several CAR processes. From the attacker side, we determine the optimal attack strategy that minimizes the system survivability. We also determine the optimal strengthening strategy that maximizes the system survivability under limited defensive resources. We use operations research techniques to identify optimal strategies of each antagonist. Our results may be used as interesting starting points to develop realistic protection strategies against intentional attacks.

Keywords: CAR processes, defense/attack strategies, exponential failure, survivability

Procedia PDF Downloads 354
18587 Positive Obligations of the State Concerning the Protection of Human Rights

Authors: Monika Florczak-Wator

Abstract:

The model of positive obligations of the state concerning the protection of the rights of an individual was created within the jurisdiction of the German Federal Constitutional Court in the 1970s. That model assumes that the state should protect an individual against infringement of their fundamental rights by another individual. It is based on the idea concerning the modification of the function and duties of the state towards an individual and society. Initially the state was perceived as the main infringer of the fundamental rights of an individual formulating the individual’s obligations of negative nature (obligation of noninterference), however, at present the state is perceived as a guarantor and protector of the fundamental rights of an individual of positive nature (obligation of protection). Examination of the chosen judicial decisions of that court will enable us to determine what the obligation of protection is specifically about, when it is updated and whether it is accompanied by claims of an individual requesting the state to take actions protecting their fundamental rights against infringement by the private entities. The comparative perspective for the German model of positive obligations of the state will be an analogous model present in the jurisdiction of the European Court of Human Rights. It is justified to include it in the research as the Convention, similarly to the constitution, focuses on the protection of an individual against the infringement of their rights by the state and both models have been developed within the jurisdiction for several dozens of years. Analysis of the provisions of the Constitution of the Republic of Poland as well as judgements of the Polish Constitutional Tribunal will allow for the presentation of the application the model of the protective duties of the state in Poland.

Keywords: human rights, horizontal relationships, constitution, state protection

Procedia PDF Downloads 449