Search results for: violations
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 174

Search results for: violations

84 The Effects of Sleep Deprivation on Vigilance, Fatigue, and Performance during Simulated Train Driving

Authors: Clara Theresia, Hardianto Iridiastadi

Abstract:

Drowsiness is one of the main factors that contribute to the occurrence of accidents, particularly in the transportation sector. While the effects of sleep deprivation on cognitive functions have been reported, the exact relationships remain a critical issue. This study aimed at quantifying the effects of extreme sleep deprivation on vigilance, fatigue, and performance during simulated train driving. A total of 12 participants were asked to drive a train simulator continuously for 4 hours, either in a sleep deprived condition (2-hr of sleep) or normal (8-hr of sleep) condition. Dependent variables obtained during the task included Psychomotor Vigilance Task (PVT) parameters, degree of fatigue (assessed via Visual Analogue Scale/VAS) and sleepiness (reported using Karolinska Sleepiness Scale/KSS), and driving performance (the number of speed limit violations). Findings from this study demonstrated substantial decrements in vigilance in the sleep-deprived condition. This condition also resulted in 75% increase in speed violation and a two-fold increase in the degree of fatigue and sleepiness. Extreme sleep deprivation was clearly associated with substantially poorer response. The exact effects, however, were dependent upon the types of responses.

Keywords: cognitive function, psychomotor vigilance task, sleep deprivation, train simulator

Procedia PDF Downloads 153
83 Solving the Refugee Problem in the Modern State System: The Philosophical Dilemma of Sovereignty and Human Right

Authors: Xiaoman Dong

Abstract:

The refugee problem has a long history, but the scale and severity of modern refugee crises demand us to consider if the progress of political history exacerbates the refugee problem. This paper argues that although sovereignty owes its legitimacy to the protection of human rights, the modern state system complicates the refugee problem by first introducing then blurring the line between human rights and civil rights, and making national identity indispensable to basic livelihood and dignity. This paper first explains the source of the modern state system’s legitimacy by putting it in the context of social contract theories and the politics of nation-building. It then discusses how states create the concept of statelessness, which leads to more violations on human rights. Using historical records of the League of Nations High Commission for Refugees and the United Nations High Commissioner for Refugees, this paper reveals that neither the refugee problem of the Cold-War period nor the current refugee crisis is collateral damage of war, but rather the consequence of intentional exclusionary policies produced out of political interests. Finally, it contends that if the modern state system is to sustain, it cannot prioritize the protection of civil rights of a particular group over the protection of basic human rights of all.

Keywords: burden sharing, human rights, legitimacy of state, positive externality, sovereignty

Procedia PDF Downloads 157
82 Reversing Community Relationship From the I-It to I-Thou as a Tool for Conflict Resolution and Peace Building in Ethiopia

Authors: Sisaye Tamrat Ayalew

Abstract:

The study focuses on the nature of community relationships in Ethiopia, specifically the I-Thou and I-It relationships, and how they contribute to conflict resolution and peacebuilding. It highlights the importance of genuine dialogue and mutual understanding in creating a unified and peaceful society. It analyzes the nature of community relationships in Ethiopia and evaluate how these relationships either contribute to conflict resolution or exacerbate conflicts. It aims to understand the role of genuine dialogue (I-Thou relationship) versus monologue (I-It relationship) in building lasting peace in the country. The study adopts a qualitative approach, specifically hermeneutics, to explore and understand the nature of community relationships in Ethiopia. It involves analyzing the characteristics of both I-Thou and I-It relationships and examining how the political elites shape these relationships within the community. The findings of the study indicate that the predominant type of relationship in Ethiopian society is the I-It relationship, referred to as "com-animation". This relationship is characterized by mutual mistrust, prejudice, hostility, and misunderstanding. As a result, conflicts, mass killings, displacement, and human rights violations have occurred. The study emphasizes the importance of shifting from com-animation to communication (I-Thou relationship) in order to address conflicts and establish lasting peace.

Keywords: dialogue, I-thou relationship, peace building, I-It relationship

Procedia PDF Downloads 45
81 Performance Analysis of Traffic Classification with Machine Learning

Authors: Htay Htay Yi, Zin May Aye

Abstract:

Network security is role of the ICT environment because malicious users are continually growing that realm of education, business, and then related with ICT. The network security contravention is typically described and examined centrally based on a security event management system. The firewalls, Intrusion Detection System (IDS), and Intrusion Prevention System are becoming essential to monitor or prevent of potential violations, incidents attack, and imminent threats. In this system, the firewall rules are set only for where the system policies are needed. Dataset deployed in this system are derived from the testbed environment. The traffic as in DoS and PortScan traffics are applied in the testbed with firewall and IDS implementation. The network traffics are classified as normal or attacks in the existing testbed environment based on six machine learning classification methods applied in the system. It is required to be tested to get datasets and applied for DoS and PortScan. The dataset is based on CICIDS2017 and some features have been added. This system tested 26 features from the applied dataset. The system is to reduce false positive rates and to improve accuracy in the implemented testbed design. The system also proves good performance by selecting important features and comparing existing a dataset by machine learning classifiers.

Keywords: false negative rate, intrusion detection system, machine learning methods, performance

Procedia PDF Downloads 94
80 An Analysis of the Efficacy of Criminal Sanctions in Combating Cartel Conduct: The Case of South Africa

Authors: S. Tavuyanago

Abstract:

Cartels within the international competition law framework have been dubbed the most egregious of competition law violations; this is because they entail a concerted effort by two or more competitor firms to knowingly ‘rob’ consumers of their welfare through their cooperation instead of competition. The net effect of cartel conduct is that the market is distorted as the colluding firms gain enough market power to constrain the supply of goods or services, ultimately driving up prices. As a result, consumers end up paying inflated prices for goods and services, which eventually affects their welfare. It is against this backdrop that competition authorities worldwide have mounted a robust fight against the proliferation of cartels. In South Africa, the fight against cartels saw an amendment to the Competition Act to allow for criminal prosecution of individuals who cause their firms to take part in cartels. The Competition Amendment Act 1 of 2009 introduced section 73A into the principal Competition Act, making it a criminal offence to engage in cartel conduct. This paper assesses the rationale for criminalisation of cartel conduct, discusses the challenges or potential challenges associated with criminalisation, and provides an evaluation of the efficacy of criminalisation of cartel conduct. It questions whether criminal sanctions for cartel conduct as a competition enforcement tool aimed at deterring such conduct are generally effective and whether they have been effective in South Africa specifically. It concludes by offering recommendations on how to effectively root out cartels.

Keywords: cartels, criminalisation, competition, deterrence, South Africa

Procedia PDF Downloads 69
79 An Ethnographic Study on How Namibian Sex Workers Experience Their Violation of Rights

Authors: Tessa Verhallen, Mama Africa

Abstract:

By co-constructing personal narratives of sex workers in Namibia this paper represents how sex workers experience their violation of rights in Namibia. It is written from an emic (as an advisor for a sex worker-led organization named Rights not Rescue Trust) and an etic (as an ethnographer) point of view, in collaboration with the staff of the organization Rights not Rescue Trust. This organization represents circa 3000 members. The paper describes the current deplorable situation of sex workers in Namibia, encompassing the stigma and discrimination they face, their struggle to have their work decriminalized and their urge to advocate for human rights and the end of violations. Based on a triangular research design (ethnography, narratives, literature study, human rights’ training and counseling sessions) the authors show that sex workers, particularly LGBTI sex workers, are extremely vulnerable to emotional, physical, and sexual violence in Namibia. The main perpetrators of violence turn out to be not only clients and intimate partners but also law enforcement officers and health care workers who are supposed to protect and support sex workers. The sex workers’ narratives voice their disgraceful circumstances regarding how their rights are violated. It also highlights their importance to fight for their rights and access to health care, legal services and education in order to improve the sexual reproductive health of sex workers.

Keywords: HIV/aids, LGBTI, methodological innovative, sex work

Procedia PDF Downloads 278
78 Managing the Architectural Heritage of Tripoli-Libya: The Red Castle as a Case Study

Authors: Eman Mohamed Ali Elalwani

Abstract:

The Libyan heritage buildings are currently facing a number of crises that pose a threat to their structural integrity, functionality, and overall performance. One of the challenges pertains to the loss of community identity, which has arisen due to the lack of awareness and unconscious behavior of the residents. An additional issue arises from inadequate site management practices, including the implementation of modern techniques and innovative building materials that are incompatible with structural elements, resulting in the deformation of certain sections of the buildings. The security concerns of the city, along with the ongoing civil conflict, fostered a conducive environment for violations, resulting in the vandalism of certain monuments in the city. However, the degradation of this valuable heritage is mainly attributed to the city's neglect and pollution. The elevated groundwater level resulting from pollution has led to erosion in the building's foundations. Mitigating these negative consequences through strategic interventions and rehabilitation is required to preserve this treasure. In order to assist the local community in recovering from those crises, this paper stated a viable strategy for promoting preservation efforts that aimed at safeguarding the heritage sites while also providing guidance to decision-makers and the local community on how to avoid these crises, preserve, enhance, and recognize the significance of the Libyan heritage.

Keywords: cultural heritage, historical buildings, Tripoli’s old city, Red Castle, crises, preservation

Procedia PDF Downloads 88
77 Investigating the Causes of Human Error-Induced Incidents in the Maintenance Operations of Petrochemical Industry by Using Human Factors Analysis and Classification System

Authors: Omid Kalatpour, Mohammadreza Ajdari

Abstract:

This article studied the possible causes of human error-induced incidents in the petrochemical industry maintenance activities by using Human Factors Analysis and Classification System (HFACS). The purpose of the study was anticipating and identifying these causes and proposing corrective and preventive actions. Maintenance department in a petrochemical company was selected for research. A checklist of human error-induced incidents was developed based on four HFACS main levels and nineteen sub-groups. Hierarchical task analysis (HTA) technique was used to identify maintenance activities and tasks. The main causes of possible incidents were identified by checklist and recorded. Corrective and preventive actions were defined depending on priority. Analyzing the worksheets of 444 activities in four levels of HFACS showed 37.6% of the causes were at the level of unsafe actions, 27.5% at the level of unsafe supervision, 20.9% at the level of preconditions for unsafe acts and 14% of the causes were at the level of organizational effects. The HFACS sub-groups showed errors (24.36%) inadequate supervision (14.89%) and violations (13.26%) with the most frequency. According to findings of this study, increasing the training effectiveness of operators and supervision improvement respectively are the most important measures in decreasing the human error-induced incidents in petrochemical industry maintenance.

Keywords: human error, petrochemical industry, maintenance, HFACS

Procedia PDF Downloads 201
76 The Urgency of ASEAN Human Rights Court Establishment to Protect Human Rights in Southeast Asia

Authors: Tareq M. Aziz Elven

Abstract:

The issue of Human Rights enforcement in Southeast Asia has become the serious problem and attract the attention of international community. Principally, Association of Southeast Asian Nations (ASEAN) has mentioned the Human Rights as one of the focus and be a part of the ASEAN Charter in 2008. It was followed by the establishment of ASEAN Inter-Governmental Commission on Human Rights (AICHR). AICHR is the commission of Human Rights enforcement in Southeast Asia which has a duty, function, and an authority to conduct dissemination and protection of Human Rights. In the end of 2016, however, the function of protection mandated to AICHR have not achieved yet. It can be proved by several cases of Human Rights violation which still exist and have not settled yet. One of case which attracts the public attention recently is human rights violation towards Rohingya in Myanmar. Using the juridical-normative method, the research aims to examine the urgency of Human Rights court establishment in Southeast Asia region which able to issue the decision that binds the ASEAN members or the violating parties. The data shows that ASEAN needs to establish a regional court which intended to settle the Human Rights violations in ASEAN region. Furthermore, the research also highlights three strong factors should be settled by ASEAN for establishing human rights court i.e. the significant distinction of democracy and human rights development among the members, the strong implementation of non-intervention principle, and the financial matter to sustain the court.

Keywords: AICHR, ASEAN, human rights, human rights court

Procedia PDF Downloads 317
75 Selection of Power System Variables for Binary-Class Support Vector Machine in Static Security Assessment of Power System

Authors: Jignesh H. Borisagar, Astik K. Dhandhia

Abstract:

Determining the correct decision for the current power system operating scenario is crucial for the operator to ensure a reliable and secure power system. The limitations of traditional power flow frameworks include higher memory requirements and longer computation times. Therefore, it is not a practical solution for applications that require static security assessments in real-time. Additionally, the composite security index was developed to prevent the masking issue resulting from performance indexes based on line loadings and bus voltage deviations for security assessment. As a result, the composite security index has a stronger ability to distinguish between contingency cases involving closer violations. Support vector machines have been used in the solution of the power system static security binary-class classification problem. The performance of the binary-class support vector machine classifier has been shown to be subject to several sets of power system variables. In order to achieve the best feature selections and the lowest rate of misclassification, sequential forward selection has been employed. Two IEEE standard test systems are used to validate the outcomes of the suggested methodology.

Keywords: composite security index, feature selection, static security assessment, support vector machine

Procedia PDF Downloads 8
74 Sri Lankan Contribution to Peace and Security in the World: Legal Perspective

Authors: Muthukuda Arachchige Dona Shiroma Jeeva Shirajanie Niriella

Abstract:

Suppressing terrorism and ensuring peace and security of the people is one of the topics which have gained serious attention of the world community. Commissions of terrorist activities, locally and internationally lead to an uncertainty of peace and security, violations of human rights of the people. Thereby it demands stringent security laws and strong criminal justice systems, both at domestic and international levels. This paper intends to evaluate security laws in Sri Lanka through the criminal justice perspective, including their efficacy in relation to combat terrorism. The paper further intends to discuss the importance of such laws in upholding the peace and security at both local and universal levels. The paper argues that the term ‘efficacy’ does not stand for, sending people to jail at large-scale, but the ability to combat terrorism crime without violating the rights of the innocent people. The qualitative research method is followed to conduct this research which contains an extensive examination of security laws available as counter-terrorism laws in Sri Lanka with the relevant international standards adopted by the UN treaties. Primary sources which are relevant to the research, including judicial pronouncements are also discussed in this regard. Secondary sources such as reports, research articles and textbooks on this topic and information available on the internet are also reviewed in this analysis.

Keywords: terrorism, security laws, criminal justice system, Sri Lanka, international treaty law

Procedia PDF Downloads 351
73 MLProxy: SLA-Aware Reverse Proxy for Machine Learning Inference Serving on Serverless Computing Platforms

Authors: Nima Mahmoudi, Hamzeh Khazaei

Abstract:

Serving machine learning inference workloads on the cloud is still a challenging task at the production level. The optimal configuration of the inference workload to meet SLA requirements while optimizing the infrastructure costs is highly complicated due to the complex interaction between batch configuration, resource configurations, and variable arrival process. Serverless computing has emerged in recent years to automate most infrastructure management tasks. Workload batching has revealed the potential to improve the response time and cost-effectiveness of machine learning serving workloads. However, it has not yet been supported out of the box by serverless computing platforms. Our experiments have shown that for various machine learning workloads, batching can hugely improve the system’s efficiency by reducing the processing overhead per request. In this work, we present MLProxy, an adaptive reverse proxy to support efficient machine learning serving workloads on serverless computing systems. MLProxy supports adaptive batching to ensure SLA compliance while optimizing serverless costs. We performed rigorous experiments on Knative to demonstrate the effectiveness of MLProxy. We showed that MLProxy could reduce the cost of serverless deployment by up to 92% while reducing SLA violations by up to 99% that can be generalized across state-of-the-art model serving frameworks.

Keywords: serverless computing, machine learning, inference serving, Knative, google cloud run, optimization

Procedia PDF Downloads 130
72 Employee Whistleblower Protection: An Analysis of Malaysian Law and Islamic Law

Authors: Ashgar Ali Ali Mohamed, Farheen Baig Sardar Baig

Abstract:

In Malaysia, the Whistle-blower Protection Act 2010 provides protection to a person in an organization who exposes misconduct, alleged dishonest or illegal activity that violates the existing laws, among others. For example, alleged fraud, health and safety violations, and corruption, to name but a few. Undeniable, most whistle-blowers are internal to an organisation who report misconduct of a fellow employee or superior within their company and they frequently face reprisal at the hands of the organisation which they have accused. In fact, many people do not consider blowing the whistle because of fear of retaliation and losing their relationships at workplace. Although whistle-blowers are protected under law from employer retaliation, there have been many cases where punishment for whistleblowing has occurred, such as suspension, demotion, termination, or harsh mistreatment by other employees. Hence, this paper will analyse the adequacy of the legal protection available to employees who whistle-blow on their employers with reference to the Whistle-blower Protection Act 2010. Reference will also be made to the approach taken in other selected jurisdiction with a view of highlighting the adequacy of the Malaysian legislation on this subject besides strengthen employee whistle-blower protection. Further, reference is also made to the Islamic approach on this subject with particular reference to the concept of amr-bil-Ma’roof (ordering for acknowledged virtues) and nahi anil munkar (forbidding from sin). Allah (SWT) says: “And there should be a group amongst you who invite towards good, order for acknowledged virtues, forbid from sin and these it is that are the successful ones” (Al Imran(Chp 3), verse 104).

Keywords: whistleblower protection, employee whistleblower, detrimental and reprisal, Malaysian law

Procedia PDF Downloads 524
71 Human Rights, Ethics, Medical Care and HIV/AIDS in Bangladesh: A Philosophical Investigation

Authors: Asm Habibullah Choudhury

Abstract:

Background: This study is an investigation into medical care, ethics, and human immunodeficiency virus/acquired immune deficiency syndrome (HIV/AIDS) in the context of Bangladesh. The low prevalence of HIV and high prevalence of STDs in Bangladesh, in common with the global experience of HIV epidemics, has been characterized by tremendous stigmatization of those affected. Stigmatization has resulted in an extraordinary degree of unjust discrimination and in numerous human rights violations of PLWHA. Methodology: This will be a cross-sectional descriptive study and will be conducted at different points of Bangladesh. Result: PLWHA will be identified as many as possible and will be interviewed. Medical care providers will be interviewed to assess their attitude and will be observed for stigma while providing medical services. Some of the religious leaders, local influential people will be interviewed to assess their attitude towards PLWHA. Conclusion: If effective responses to HIV/AIDS-related stigma and discrimination are to be promoted in the region, work has to occur simultaneously on several fronts: Legal challenge, where necessary, to bring to account governments, employers, institutions and individuals. To create enabling environment in which PLWHA and their families, women, boys, and girls are able to access prevention and care services. Access to quality and comprehensive care. The fundamental objective, however, is to strive for action based on this understanding—action that will promote egalitarian and gender-progressive role models, and that will help guide the manner in which we interact with one another.

Keywords: HIV, AIDS, Bangladesh, human rights

Procedia PDF Downloads 291
70 Deep Reinforcement Learning for Advanced Pressure Management in Water Distribution Networks

Authors: Ahmed Negm, George Aggidis, Xiandong Ma

Abstract:

With the diverse nature of urban cities, customer demand patterns, landscape topologies or even seasonal weather trends; managing our water distribution networks (WDNs) has proved a complex task. These unpredictable circumstances manifest as pipe failures, intermittent supply and burst events thus adding to water loss, energy waste and increased carbon emissions. Whilst these events are unavoidable, advanced pressure management has proved an effective tool to control and mitigate them. Henceforth, water utilities have struggled with developing a real-time control method that is resilient when confronting the challenges of water distribution. In this paper we use deep reinforcement learning (DRL) algorithms as a novel pressure control strategy to minimise pressure violations and leakage under both burst and background leakage conditions. Agents based on asynchronous actor critic (A2C) and recurrent proximal policy optimisation (Recurrent PPO) were trained and compared to benchmarked optimisation algorithms (differential evolution, particle swarm optimisation. A2C manages to minimise leakage by 32.48% under burst conditions and 67.17% under background conditions which was the highest performance in the DRL algorithms. A2C and Recurrent PPO performed well in comparison to the benchmarks with higher processing speed and lower computational effort.

Keywords: deep reinforcement learning, pressure management, water distribution networks, leakage management

Procedia PDF Downloads 36
69 Anti-Corruption in Adverse Contexts: A Strategic Approach

Authors: Mushtaq H. Khan, Antonio Andreoni, Pallavi Roy

Abstract:

Developing countries are characterized by political settlements where formal rules are generally weakly enforced and widely violated. Conventional anti-corruption strategies that focus on improving the general enforcement of a rule of law and raising the costs of corruption facing individual public officials have typically delivered poor results in these contexts. Our alternative approach is to identify anti-corruption strategies that have a high impact and that are feasible to implement in these contexts. Our alternative approach identifies anti-corruption strategies from the bottom up. This involves identifying the characteristics of the corruption constraining particular development outcomes. By drawing on theories of rents and rent seeking, and theories of political settlements, we can assess the developmental impact of particular anti-corruption strategies and the feasibility of implementing these strategies. We argue that feasible anti-corruption in these contexts cannot be solely based on conventional anti-corruption strategies. In societies that have widespread rule violations, high-impact anti-corruption is only likely to be feasible if the overall strategy succeeds in aligning the interests and capabilities of powerful organizations at the sectoral level to support the enforcement of particular sets of rules. We examine four related strategies for changing these incentives and capabilities of critical stakeholders at the local or sectoral level, and we argue that this can provide a framework for organizing research on the impact and feasibility of anti-corruption activities in different priority areas in particular countries.

Keywords: anti-corruption, development, political settlements analysis, rule of law

Procedia PDF Downloads 372
68 An Analytical Approach to Assess and Compare the Vulnerability Risk of Operating Systems

Authors: Pubudu K. Hitigala Kaluarachchilage, Champike Attanayake, Sasith Rajasooriya, Chris P. Tsokos

Abstract:

Operating system (OS) security is a key component of computer security. Assessing and improving OSs strength to resist against vulnerabilities and attacks is a mandatory requirement given the rate of new vulnerabilities discovered and attacks occurring. Frequency and the number of different kinds of vulnerabilities found in an OS can be considered an index of its information security level. In the present study five mostly used OSs, Microsoft Windows (windows 7, windows 8 and windows 10), Apple’s Mac and Linux are assessed for their discovered vulnerabilities and the risk associated with each. Each discovered and reported vulnerability has an exploitability score assigned in CVSS score of the national vulnerability database. In this study the risk from vulnerabilities in each of the five Operating Systems is compared. Risk Indexes used are developed based on the Markov model to evaluate the risk of each vulnerability. Statistical methodology and underlying mathematical approach is described. Initially, parametric procedures are conducted and measured. There were, however, violations of some statistical assumptions observed. Therefore the need for non-parametric approaches was recognized. 6838 vulnerabilities recorded were considered in the analysis. According to the risk associated with all the vulnerabilities considered, it was found that there is a statistically significant difference among average risk levels for some operating systems, indicating that according to our method some operating systems have been more risk vulnerable than others given the assumptions and limitations. Relevant test results revealing a statistically significant difference in the Risk levels of different OSs are presented.

Keywords: cybersecurity, Markov chain, non-parametric analysis, vulnerability, operating system

Procedia PDF Downloads 151
67 The Role of Online Social Networks in Social Movements: Social Polarization and Violations against Social Unity and Privacy of Individuals in Turkey

Authors: Tolga Yazıcı

Abstract:

As a matter of the fact that online social networks like Twitter, Facebook and MySpace have experienced an extensive growth in recent years. Social media offers individuals with a tool for communicating and interacting with one another. These social networks enable people to stay in touch with other people and express themselves. This process makes the users of online social networks active creators of content rather than being only consumers of traditional media. That’s why millions of people show strong desire to learn the methods and tools of digital content production and necessary communication skills. However, the booming interest in communication and interaction through online social networks and high level of eagerness to invent and implement the ways to participate in content production raise some privacy and security concerns. This presentation aims to open the assumed revolutionary, democratic and liberating nature of the online social media up for discussion by reviewing some recent political developments in Turkey. Firstly, the role of Internet and online social networks in mobilizing collective movements through social interactions and communications will be questioned. Secondly, some cases from Gezi and Okmeydanı Protests and also December 17-25 period will be presented in order to illustrate misinformation and manipulation in social media and violation of individual privacy through online social networks in order to damage social unity and stability contradictory to democratic nature of online social networking.

Keywords: online social media networks, democratic participation, social movements, social polarization, privacy of individuals, Turkey

Procedia PDF Downloads 311
66 Household Wealth and Portfolio Choice When Tail Events Are Salient

Authors: Carlson Murray, Ali Lazrak

Abstract:

Robust experimental evidence of systematic violations of expected utility (EU) establishes that individuals facing risk overweight utility from low probability gains and losses when making choices. These findings motivated development of models of preferences with probability weighting functions, such as rank dependent utility (RDU). We solve for the optimal investing strategy of an RDU investor in a dynamic binomial setting from which we derive implications for investing behavior. We show that relative to EU investors with constant relative risk aversion, commonly measured probability weighting functions produce optimal RDU terminal wealth with significant downside protection and upside exposure. We additionally find that in contrast to EU investors, RDU investors optimally choose a portfolio that contains fair bets that provide payo↵s that can be interpreted as lottery outcomes or exposure to idiosyncratic returns. In a calibrated version of the model, we calculate that RDU investors would be willing to pay 5% of their initial wealth for the freedom to trade away from an optimal EU wealth allocation. The dynamic trading strategy that supports the optimal wealth allocation implies portfolio weights that are independent of initial wealth but requires higher risky share after good stock return histories. Optimal trading also implies the possibility of non-participation when historical returns are poor. Our model fills a gap in the literature by providing new quantitative and qualitative predictions that can be tested experimentally or using data on household wealth and portfolio choice.

Keywords: behavioral finance, probability weighting, portfolio choice

Procedia PDF Downloads 396
65 The Impact of Artificial Intelligence on Digital Crime

Authors: Á. L. Bendes

Abstract:

By the end of the second decade of the 21st century, artificial intelligence (AI) has become an unavoidable part of everyday life and has necessarily aroused the interest of researchers in almost every field of science. This is no different in the case of jurisprudence, whose main task is not only to create its own theoretical paradigm related to AI. Perhaps the biggest impact on digital crime is artificial intelligence. In addition, the need to create legal frameworks suitable for the future application of the law has a similar importance. The prognosis according to which AI can reshape the practical application of law and, ultimately, the entire legal life is also of considerable importance. In the past, criminal law was basically created to sanction the criminal acts of a person, so the application of its concepts with original content to AI-related violations is not expected to be sufficient in the future. Taking this into account, it is necessary to rethink the basic elements of criminal law, such as the act and factuality, but also, in connection with criminality barriers and criminal sanctions, several new aspects have appeared that challenge both the criminal law researcher and the legislator. It is recommended to continuously monitor technological changes in the field of criminal law as well since it will be timely to re-create both the legal and scientific frameworks to correctly assess the events related to them, which may require a criminal law response. Artificial intelligence has completely reformed the world of digital crime. New crimes have appeared, which the legal systems of many countries do not or do not adequately regulate. It is considered important to investigate and sanction these digital crimes. The primary goal is prevention, for which we need a comprehensive picture of the intertwining of artificial intelligence and digital crimes. The goal is to explore these problems, present them, and create comprehensive proposals that support legal certainty.

Keywords: artificial intelligence, chat forums, defamation, international criminal cooperation, social networking, virtual sites

Procedia PDF Downloads 42
64 The Applicability of Just Satisfaction in Inter-State Cases: A Case Study of Cyprus versus Turkey

Authors: Congrui Chen

Abstract:

The European Court of Human Rights (hereinafter ECtHR) delivered its judgment of just satisfaction on the case of Cyprus v. Turkey, ordering a lump sum of 9,000,000 euros as the just compensation. It is the first time that the ECtHR applied the Article 41 of just compensation in an inter-state case, and it stands as the highest amount of just compensation awarded in the history of the ECtHR. The Cyprus v. Turkey case, which represents the most crucial contribution to European peace in the history of the court. This thesis uses the methodologies of textual research, comparison analysis, and case law study to go further on the following two questions specifically:(i) whether the just compensation is applicable in an inter-state case; (ii) whether such just compensation is of punitive nature. From the point of view of general international law, the essence of the case is the state's responsibility for the violation of individual rights. In other words, the state takes a similar diplomatic protection approach to seek relief. In the course of the development of international law today, especially with the development of international human rights law, States that have a duty to protect human rights should bear corresponding responsibilities for their violations of international human rights law. Under the specific system of the European Court of Human Rights, the just compensation for article 41 is one of the specific ways of assuming responsibility. At the regulatory level, the European Court of Human Rights makes it clear that the just satisfaction of article 41 of the Convention does not include punitive damages, as it relates to the issue of national sovereignty. Nevertheless, it is undeniable that the relief to the victim and the punishment to the responsible State are two closely integrated aspects of responsibility. In other words, compensatory compensation has inherent "punitive".

Keywords: European Court of Human Right, inter-state cases, just satisfaction, punitive damages

Procedia PDF Downloads 243
63 A Deep Learning Approach to Detect Complete Safety Equipment for Construction Workers Based on YOLOv7

Authors: Shariful Islam, Sharun Akter Khushbu, S. M. Shaqib, Shahriar Sultan Ramit

Abstract:

In the construction sector, ensuring worker safety is of the utmost significance. In this study, a deep learning-based technique is presented for identifying safety gear worn by construction workers, such as helmets, goggles, jackets, gloves, and footwear. The suggested method precisely locates these safety items by using the YOLO v7 (You Only Look Once) object detection algorithm. The dataset utilized in this work consists of labeled images split into training, testing and validation sets. Each image has bounding box labels that indicate where the safety equipment is located within the image. The model is trained to identify and categorize the safety equipment based on the labeled dataset through an iterative training approach. We used custom dataset to train this model. Our trained model performed admirably well, with good precision, recall, and F1-score for safety equipment recognition. Also, the model's evaluation produced encouraging results, with a [email protected] score of 87.7%. The model performs effectively, making it possible to quickly identify safety equipment violations on building sites. A thorough evaluation of the outcomes reveals the model's advantages and points up potential areas for development. By offering an automatic and trustworthy method for safety equipment detection, this research contributes to the fields of computer vision and workplace safety. The proposed deep learning-based approach will increase safety compliance and reduce the risk of accidents in the construction industry.

Keywords: deep learning, safety equipment detection, YOLOv7, computer vision, workplace safety

Procedia PDF Downloads 31
62 Beyond Juridical Approaches: The Role of Sociological Approach in Promoting Human Rights of Migrants

Authors: Ali Aghahosseini Dehaghani

Abstract:

Every year in this globalized world, thousands of migrants leave their countries hoping to find a better situation of life in other parts of the world. In this regard, many questions, from a human rights point of view, have been raised about how this phenomenon should be managed in the host countries. Although legal approaches such as legislation and litigation are inevitable in the way to respect the human rights of migrants, there is an increasing consensus about the fact that a strict juridical approach is inadequate to protect as well as to prevent violations of migrants’ rights. Indeed, given the multiplicity of factors that affect and shape the application of these rights and considering the fact that law is a social phenomenon, what is needed is an interdisciplinary approach, which combines both juridical approaches and perspectives from other disciplines. In this respect, a sociological approach is important because it shows the social processes through which human rights of migrants have been constructed or violated in particular social situations. Sociologists who study international migration ask the questions such as how many people migrate, who migrates, why people migrate, what happens to them once they arrive in the host country, how migration affects sending and receiving communities, the extent to which migrants help the economy, the effects of migration on crimes, and how migrants change the local communities. This paper is an attempt to show how sociology can promote human rights of migrants. To this end, the article first explores the usefulness and value of an interdisciplinary approach to realize how and to what extent sociology may improve and promote the human rights of migrants in the destination country. It then examines mechanisms which help to reach to a systematic integration of law and sociological discipline to advance migrants’ rights as well as to encourage legal scholars to consider the implications of societal structures in their works.

Keywords: human rights, migrants, sociological approach, interdisciplinary study

Procedia PDF Downloads 403
61 The Impact of Political Leadership on Cameroon’s Economic Development From 2000 to 2023

Authors: Okpu Enoh Ndip Nkongho

Abstract:

The type of political leadership in place impacts a state's economic development or underdevelopment directly and indirectly. One of the main challenges to Cameroon's economic development may be ineffective or misguided political leadership. The economy of the Cameroon state has declined significantly due to a number of factors, including a lack of effective and feasible economic policies, a reliance on crude oil that is excessive, tribal politics, the threat of insurgency, bribery, and corruption, violations of human rights, neglect of other sectors like science, technology, education, and transportation, and a careless attitude on the part of the administrators toward the general public. As a result, the standard of living has decreased, foreign exchange has decreased, and the value of the Cameroonian currency has depreciated. Therefore, from 2000 to 2023, this paper focused on the relationship between political leadership and economic development in Cameroon and offered suggestions for improving political leadership that will, in turn, lead to the country's economy getting back on track. The study employed a qualitative technique, with the framework for the investigation derived from the trait theory of leadership. According to the information provided above, the paper was able to conclude that there is a lack of cooperation between the three branches of government in Cameroon. This is shown in situations when one branch operates independently of the others and refuses to function as a backup when needed. The study recommended that the Executive collaborate closely with the National Assembly to speed action on some key legislation required to stimulate economic development. On the other hand, there is a need for more clarity and consistency in the government's policy orientation. There is no doubt that our current economic troubles are at least partially the result of a lack of economic policy leadership and confidence.

Keywords: politics, leadership, economic, development, Cameroon

Procedia PDF Downloads 15
60 The Impact of Work Stress on Professionals' Life and Health: The Usage of Instant Messaging Applications

Authors: Pui-Lai To, Chechen Liao, Ming-Chi Sung

Abstract:

Work and family life are the most important areas for men and women today. Every professional is required to meet and fulfill the responsibilities of work and family roles. Although the development and popularity of communication technology bring a lot of benefits, including effective and efficient communication, may also generate conflicts between work and family life. Since mobile devices and the applications of mobile devices, such as instant messages, are ubiquitous, the boundaries of work and family roles are increasingly blurred. Professionals may be in the risk of work over-loading and work-family conflict. This study examines the impact of work stress on professionals’ life and health in the context of instant messaging application of smart phone. This study uses a web-based questionnaire to collect samples. The questionnaires are sent via virtual community sites, instant messaging applications, and e-mail. The study develops and empirically validates a work-family conflict model by integrating the pressure theory and technostress factors. The causal relationship between variables in the research model is tested. In terms of data analysis, Partial Least Square (PLS) in Structural Equation Modeling (SEM) is used for sample analysis and research model testing. The results of this study are as follows. First, both the variables of work-related stress and technological violations positively affect the work-family conflict. Second, both the variables of work-loading and technology-overloading have no effect on work-family conflict. Third, work-family conflict has negative effect on job satisfaction, family satisfaction, physical health, and mental health.

Keywords: mental health, physical health, technostress, work-family conflict, work-related stress

Procedia PDF Downloads 257
59 Evaluation of the Causes of Exposure to Mobbing of Employees in the Public Sector in Turkey

Authors: Taner Cindik, Ferya Tas Ciftci

Abstract:

Mobbing in the public sector and specific issues (i.e., the demand for non-pecuniary damages) regarding mobbing have become very important in the light of the precedents constituted by the Turkish Council of State in 2010. The legal scope of mobbing is not able to be determined since the concept of mobbing is not defined in Turkish law system. This study aims to reveal three major problems caused by the lack of laws related to mobbing in the Turkish legal system. First, the absence of an arrangement for disciplinary penalties leads that general provisions in the disciplinary law are implemented. This situation, therefore, causes difficulties in practice. Second, not being drawn of the lines in the topic concerning mobbing in public sector leads confusions in being direction of hostility. Third, the fact that there is a legal gap on seeking non-pecuniary compensation when employees in public sector are exposed to mobbing might make it difficult to obtain non-pecuniary compensation. Within the context of these major problems, civil servants in Turkey do not have enough protection mechanism. However, some possible legal arrangements will help civil servants to protect against mobbing. This study may be considered important because of the fact that mobbing in the public sector is at a significant level and has not been evaluated in this context before. This research is mainly a study of Turkish legal system and evaluates critically law case to determine legal problems. As a result of this study, three main problems might be identified because there is legal gap regarding mobbing in the public sector. In conclusion, the introduction of the major problems related to mobbing in this study might shed light on making the proper regulations of this subject in Turkish law system. In this respect, the plaintiff will be provided convenience in the point of non-pecuniary damages and this study will guide the assessment of legal liability of those who implement mobbing.

Keywords: human rights violations, mobbing, public sector, direction of hostility, non-pecuniary compensation, disciplinary law

Procedia PDF Downloads 211
58 Hepatoprotective Assessment of L-Ascorbate 1-(2-Hydroxyethyl)-4,6-Dimethyl-1, 2-Dihydropyrimidine-2-On Exposure to Carbon Tetrachloride

Authors: Nail Nazarov, Alexandra Vyshtakalyuk, Vyacheslav Semenov, Irina Galyametdinova, Vladimir Zobov, Vladimir Reznik

Abstract:

Among hepatic pyrimidine used as a means of stimulating protein synthesis and recovery of liver cells in her damaged toxic and infectious etiology. When an experimental toxic hepatitis hepatoprotective activity detected some pyrimidine derivatives. There are literature data on oksimetiluratcila hepatoprotective effect. For analogs of pyrimidine nucleobases - drugs Methyluracilum pentoxy and hepatoprotective effect of weakly expressed. According to the American scientists broad spectrum of biological activity, including hepatoprotective properties, have a 2,4-dioxo-5-arilidenimino uracils. Influenced Xymedon medicinal preparation (1- (beta-hydroxyethyl) -4,6-dimethyl-1,2-dihydro-2-oksopirimidin) developed as a means of stimulating the regeneration of tissue revealed increased activity of microsomal oxidases human liver. In studies on the model of toxic liver damage in rats have shown hepatoprotective effect xymedon and stimulating its impact on the recovery of the liver tissue. Hepatoprotective properties of the new compound in the series of pyrimidine derivatives L-ascorbate 1-(2-hydroxyethyl)-4,6-dimethyl-1,2-dihydropirimidine-2-one synthesized on the basis Xymedon preparation were firstly investigated on rats under the carbon tetrachloride action. It was shown the differences of biochemical parameters from the reference value and severity of structural-morphological liver violations decreased in comparison with control group under the influence of the compound injected before exposure carbon tetrachloride. Hepatoprotective properties of the investigated compound were more pronounced in comparison with Xymedon.

Keywords: hepatoprotectors, pyrimidine derivatives, toxic liver damage, xymedon

Procedia PDF Downloads 388
57 Analysis of Factors Affecting the Number of Infant and Maternal Mortality in East Java with Geographically Weighted Bivariate Generalized Poisson Regression Method

Authors: Luh Eka Suryani, Purhadi

Abstract:

Poisson regression is a non-linear regression model with response variable in the form of count data that follows Poisson distribution. Modeling for a pair of count data that show high correlation can be analyzed by Poisson Bivariate Regression. Data, the number of infant mortality and maternal mortality, are count data that can be analyzed by Poisson Bivariate Regression. The Poisson regression assumption is an equidispersion where the mean and variance values are equal. However, the actual count data has a variance value which can be greater or less than the mean value (overdispersion and underdispersion). Violations of this assumption can be overcome by applying Generalized Poisson Regression. Characteristics of each regency can affect the number of cases occurred. This issue can be overcome by spatial analysis called geographically weighted regression. This study analyzes the number of infant mortality and maternal mortality based on conditions in East Java in 2016 using Geographically Weighted Bivariate Generalized Poisson Regression (GWBGPR) method. Modeling is done with adaptive bisquare Kernel weighting which produces 3 regency groups based on infant mortality rate and 5 regency groups based on maternal mortality rate. Variables that significantly influence the number of infant and maternal mortality are the percentages of pregnant women visit health workers at least 4 times during pregnancy, pregnant women get Fe3 tablets, obstetric complication handled, clean household and healthy behavior, and married women with the first marriage age under 18 years.

Keywords: adaptive bisquare kernel, GWBGPR, infant mortality, maternal mortality, overdispersion

Procedia PDF Downloads 129
56 Application of Single Tuned Passive Filters in Distribution Networks at the Point of Common Coupling

Authors: M. Almutairi, S. Hadjiloucas

Abstract:

The harmonic distortion of voltage is important in relation to power quality due to the interaction between the large diffusion of non-linear and time-varying single-phase and three-phase loads with power supply systems. However, harmonic distortion levels can be reduced by improving the design of polluting loads or by applying arrangements and adding filters. The application of passive filters is an effective solution that can be used to achieve harmonic mitigation mainly because filters offer high efficiency, simplicity, and are economical. Additionally, possible different frequency response characteristics can work to achieve certain required harmonic filtering targets. With these ideas in mind, the objective of this paper is to determine what size single tuned passive filters work in distribution networks best, in order to economically limit violations caused at a given point of common coupling (PCC). This article suggests that a single tuned passive filter could be employed in typical industrial power systems. Furthermore, constrained optimization can be used to find the optimal sizing of the passive filter in order to reduce both harmonic voltage and harmonic currents in the power system to an acceptable level, and, thus, improve the load power factor. The optimization technique works to minimize voltage total harmonic distortions (VTHD) and current total harmonic distortions (ITHD), where maintaining a given power factor at a specified range is desired. According to the IEEE Standard 519, both indices are viewed as constraints for the optimal passive filter design problem. The performance of this technique will be discussed using numerical examples taken from previous publications.

Keywords: harmonics, passive filter, power factor, power quality

Procedia PDF Downloads 276
55 Examining Postcolonial Corporate Power Structures through the Lens of Development Induced Projects in Africa

Authors: Omogboyega Abe

Abstract:

This paper examines the relationships between socio-economic inequalities of power, race, wealth engendered by corporate structure, and domination in postcolonial Africa. The paper further considers how land as an epitome of property and power for the locals paved the way for capitalist accumulation and control in the hands of transnational corporations. European colonization of Africa was contingent on settler colonialism, where properties, including land, were re-modified as extractive resources for primitive accumulation. In developing Africa's extractive resources, transnational corporations (TNCs) usurped states' structures and domination over native land. The usurpation/corporate capture that exists to date has led to remonstrations and arguably a counter-productive approach to development projects. In some communities, the mention of extractive companies triggers resentment. The paradigm of state capture and state autonomy is simply inadequate to either describe or resolve the play of forces or actors responsible for severe corporate-induced human rights violations in emerging markets. Moreover, even if the deadly working conditions are conceived as some regulatory failure, it is tough to tell whose failure. The analysis in this paper is that the complexity and ambiguity evidenced by the multiple regimes and political and economic forces shaping production, consumption, and distribution of socio-economic variables are not exceptional in emerging markets. Instead, the varied experience in developing countries provides a window for seeing what we face in understanding and theorizing the structure and operation of the global economic and regulatory order in general.

Keywords: colonial, emerging markets, business, human rights, corporation

Procedia PDF Downloads 38