CINXE.COM
Search results for: violation of individuality
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: violation of individuality</title> <meta name="description" content="Search results for: violation of individuality"> <meta name="keywords" content="violation of individuality"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="violation of individuality" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="violation of individuality"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 241</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: violation of individuality</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">241</span> Cultivating Individuality and Equality in Education: A Literature Review on Respecting Dimensions of Diversity within the Classroom</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Melissa%20C.%20Ingram">Melissa C. Ingram</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This literature review sought to explore the dimensions of diversity that can affect classroom learning. This review is significant as it can aid educators in reaching more of their diverse student population and creating supportive classrooms for teachers and students. For this study, peer-reviewed articles were found and compiled using Google Scholar. Key terms used in the search include student individuality, classroom equality, student development, teacher development, and teacher individuality. Relevant educational standards such as Common Core and Partnership for the 21st Century were also included as part of this review. Student and teacher individuality and equality is discussed as well as methods to grow both within educational settings. Embracing student and teacher individuality was found to be key as it may affect how each person interacts with given information. One method to grow individuality and equality in educational settings included drafting and employing revised teaching standards which include various Common Core and U.S. State standards. Another was to use educational theories such as constructivism, cognitive learning, and Experiential Learning Theory. However, barriers to growing individuality, such as not acknowledging differences in a population’s dimensions of diversity, still exist. Studies found preserving the dimensions of diversity owned by both teachers and students yielded more positive and beneficial classroom experiences. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=classroom%20equality" title="classroom equality">classroom equality</a>, <a href="https://publications.waset.org/abstracts/search?q=student%20development" title=" student development"> student development</a>, <a href="https://publications.waset.org/abstracts/search?q=student%20individuality" title=" student individuality"> student individuality</a>, <a href="https://publications.waset.org/abstracts/search?q=teacher%20development" title=" teacher development"> teacher development</a>, <a href="https://publications.waset.org/abstracts/search?q=teacher%20individuality" title=" teacher individuality"> teacher individuality</a> </p> <a href="https://publications.waset.org/abstracts/133191/cultivating-individuality-and-equality-in-education-a-literature-review-on-respecting-dimensions-of-diversity-within-the-classroom" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/133191.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">188</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">240</span> Psychological Contract Breach and Violation Relationships with Stress and Wellbeing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fazeelat%20Duran">Fazeelat Duran</a>, <a href="https://publications.waset.org/abstracts/search?q=Darren%20Bishopp"> Darren Bishopp</a>, <a href="https://publications.waset.org/abstracts/search?q=Jessica%20Woodhams"> Jessica Woodhams</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Negative emotions resulting from the breach of perceived obligations by an employer is called the psychological contract violation. Employees perceiving breach and feelings of negative emotions result in adverse outcomes for both the employee and employer. This paper aims to identify the relationships between contract breach, violation, stress and wellbeing and investigate whether fairness and self-efficacy mediate the relationships. A mixed method approach was used to analyze the online-surveys and semi-structured interviews with the police officers. It was identified that the psychological contract violation predicts stress and job-related well-being. Fairness and self-efficacy were identified as significant mediators to understand the underlying mechanisms of association. Whilst, in the interviews social support was identified as a popular mediator. Practical implications for employers are discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=psychological%20contract%20violation%20and%20breach" title="psychological contract violation and breach">psychological contract violation and breach</a>, <a href="https://publications.waset.org/abstracts/search?q=stressors" title=" stressors"> stressors</a>, <a href="https://publications.waset.org/abstracts/search?q=depression" title=" depression"> depression</a>, <a href="https://publications.waset.org/abstracts/search?q=anxiety" title=" anxiety"> anxiety</a> </p> <a href="https://publications.waset.org/abstracts/95975/psychological-contract-breach-and-violation-relationships-with-stress-and-wellbeing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/95975.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">246</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">239</span> Structure Function and Violation of Scale Invariance in NCSM: Theory and Numerical Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20R.%20Bekli">M. R. Bekli</a>, <a href="https://publications.waset.org/abstracts/search?q=N.%20Mebarki"> N. Mebarki</a>, <a href="https://publications.waset.org/abstracts/search?q=I.%20Chadou"> I. Chadou</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this study, we focus on the structure functions and violation of scale invariance in the context of non-commutative standard model (NCSM). We find that this violation appears in the first order of perturbation theory and a non-commutative version of the DGLAP evolution equation is deduced. Numerical analysis and comparison with experimental data imposes a new bound on the non-commutative parameter. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=NCSM" title="NCSM">NCSM</a>, <a href="https://publications.waset.org/abstracts/search?q=structure%20function" title=" structure function"> structure function</a>, <a href="https://publications.waset.org/abstracts/search?q=DGLAP%20equation" title=" DGLAP equation"> DGLAP equation</a>, <a href="https://publications.waset.org/abstracts/search?q=standard%20model" title=" standard model"> standard model</a> </p> <a href="https://publications.waset.org/abstracts/16515/structure-function-and-violation-of-scale-invariance-in-ncsm-theory-and-numerical-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16515.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">611</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">238</span> Testing a Moderated Mediation Model of Person–Organization Fit, Organizational Support, and Feelings of Violation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chi-Tai%20Shen">Chi-Tai Shen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study aims to examine whether perceived organizational support moderates the relationship between person–former organization fit and person–organization fit after the mediating effect of feelings of violation. A two-stage data collection method was used. Based on our research requirements, we only approached participants who were involuntary turnover from their former organizations and looking for a new job. Our final usable sample was comprised of a total of 264 participants from Taiwan. We followed Muller, Judd, and Yzerbyt, and Preacher, Rucker, and Hayes’s suggestions to test our moderated mediation model. This study found that employee perceived organizational support moderated the indirect effect of person–former organization fit on person–organization fit (through feelings of violation). Our study ends with a discussion of the main research findings and their limitations and presents suggestions regarding the direction of future studies and the empirical implications of the results. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=person%E2%80%93organization%20fit" title="person–organization fit">person–organization fit</a>, <a href="https://publications.waset.org/abstracts/search?q=feelings%20of%20violation" title=" feelings of violation"> feelings of violation</a>, <a href="https://publications.waset.org/abstracts/search?q=organizational%20support" title=" organizational support"> organizational support</a>, <a href="https://publications.waset.org/abstracts/search?q=moderated%20mediation" title=" moderated mediation"> moderated mediation</a> </p> <a href="https://publications.waset.org/abstracts/64313/testing-a-moderated-mediation-model-of-person-organization-fit-organizational-support-and-feelings-of-violation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/64313.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">265</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">237</span> Direct CP Violation in Baryonic B-Hadron Decays</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=C.%20Q.%20Geng">C. Q. Geng</a>, <a href="https://publications.waset.org/abstracts/search?q=Y.%20K.%20Hsiao"> Y. K. Hsiao</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We study direct CP-violating asymmetries (CPAs) in the baryonic B decays of B- -> p\bar{p}M and Λb decays of Λb ®pM andΛb -> J/ΨpM with M=π-, K-,ρ-,K*- based on the generalized factorization method in the standard model (SM). In particular, we show that the CPAs in the vector modes of B-®p\bar{p}K* and Λb -> p K*- can be as large as 20%. We also discuss the simplest purely baryonic decays of Λb-> p\bar{p}n, p\bar{p}Λ, Λ\bar{p}Λ, and Λ\bar{Λ}Λ. We point out that some of CPAs are promising to be measured by the current as well as future B facilities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CP%20violation" title="CP violation">CP violation</a>, <a href="https://publications.waset.org/abstracts/search?q=B%20decays" title=" B decays"> B decays</a>, <a href="https://publications.waset.org/abstracts/search?q=baryonic%20decays" title=" baryonic decays"> baryonic decays</a>, <a href="https://publications.waset.org/abstracts/search?q=%CE%9Bb%20decays" title=" Λb decays"> Λb decays</a> </p> <a href="https://publications.waset.org/abstracts/51614/direct-cp-violation-in-baryonic-b-hadron-decays" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/51614.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">256</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">236</span> Updating Stochastic Hosting Capacity Algorithm for Voltage Optimization Programs and Interconnect Standards</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nicholas%20Burica">Nicholas Burica</a>, <a href="https://publications.waset.org/abstracts/search?q=Nina%20Selak"> Nina Selak </a> </p> <p class="card-text"><strong>Abstract:</strong></p> The ADHCAT (Automated Distribution Hosting Capacity Assessment Tool) was designed to run Hosting Capacity Analysis on the ComEd system via a stochastic DER (Distributed Energy Resource) placement on multiple power flow simulations against a set of violation criteria. The violation criteria in the initial version of the tool captured a limited amount of issues that individual departments design against for DER interconnections. Enhancements were made to the tool to further align with individual department violation and operation criteria, as well as the addition of new modules for use for future load profile analysis. A reporting engine was created for future analytical use based on the simulations and observations in the tool. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=distributed%20energy%20resources" title="distributed energy resources">distributed energy resources</a>, <a href="https://publications.waset.org/abstracts/search?q=hosting%20capacity" title=" hosting capacity"> hosting capacity</a>, <a href="https://publications.waset.org/abstracts/search?q=interconnect" title=" interconnect"> interconnect</a>, <a href="https://publications.waset.org/abstracts/search?q=voltage%20optimization" title=" voltage optimization"> voltage optimization</a> </p> <a href="https://publications.waset.org/abstracts/127789/updating-stochastic-hosting-capacity-algorithm-for-voltage-optimization-programs-and-interconnect-standards" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/127789.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">190</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">235</span> Psycholgical Contract Violation and Its Impact on Job Satisfaction Level: A Study on Subordinate Employees in Enterprises of Hanoi, Vietnam</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Quangyen%20Tran">Quangyen Tran</a>, <a href="https://publications.waset.org/abstracts/search?q=YeZhuang%20Tian"> YeZhuang Tian</a>, <a href="https://publications.waset.org/abstracts/search?q=Chengfeng%20Li"> Chengfeng Li</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Psychological contract violations may lead to damaging an organization through losing its potential employees; it is a very significant concept in understanding the employment relationships. The authors selected contents of psychological contract violation scale based on the nine areas of violation most relevant to managerial samples (High pay, training, job security, career development, pay based on performance, promotion, feedback, expertise and quality of co-workers and support with personal problems), using regression analysis, the degree of psychological contract violations was measured by an adaptation of a multiplicative scale with Cronbach’s alpha as a measure of reliability. Through the regression analysis, psychological contract violations was found have a positive impact on employees’ job satisfaction, the frequency of psychological contract violations was more intense among male employees particularly in terms of training, job security and pay based on performance. Job dissatisfaction will lead to a lowering of employee commitment in the job, enterprises in Hanoi, Vietnam should therefore offer lucrative jobs in terms of salary and other emoluments to their employees. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=psychological%20contract" title="psychological contract">psychological contract</a>, <a href="https://publications.waset.org/abstracts/search?q=psychological%20contract%20violation" title=" psychological contract violation"> psychological contract violation</a>, <a href="https://publications.waset.org/abstracts/search?q=job%20satisfaction" title=" job satisfaction"> job satisfaction</a>, <a href="https://publications.waset.org/abstracts/search?q=subordinate%20employees" title=" subordinate employees"> subordinate employees</a>, <a href="https://publications.waset.org/abstracts/search?q=employers%E2%80%99%20obligation" title=" employers’ obligation"> employers’ obligation</a> </p> <a href="https://publications.waset.org/abstracts/3227/psycholgical-contract-violation-and-its-impact-on-job-satisfaction-level-a-study-on-subordinate-employees-in-enterprises-of-hanoi-vietnam" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/3227.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">325</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">234</span> Psychological Contract Violation and Occupational Stressors amongst UK Police Officers</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fazeelat%20Duran">Fazeelat Duran</a>, <a href="https://publications.waset.org/abstracts/search?q=Darren%20Bishopp"> Darren Bishopp</a>, <a href="https://publications.waset.org/abstracts/search?q=Jessica%20%20Woodhams"> Jessica Woodhams</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Psychological contract refers to the perceptions of an employee and their employer regarding their mutual obligations towards each other. The rationale for applying the psychological contract theory in UK policing was to investigate its impact on their wellbeing because the psychological contract is a useful tool in identifying factors having a negative effect on the wellbeing of employees. The paper will report on a study, which examined how occupational stressors and psychological contract violation may influence the wellbeing (e.g. Physical Stress and General Health) of a sample of police officers (N=127). The design of the study was cross-sectional and based on data collected through a self-report survey. The results of hierarchical regression analyses and structural equation model, suggest that occupational stressors and psychological contract violation play a critical role in both physical and psychological health. The implications of these findings and the utility of considering the psychological contract will be discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=police%20officers" title="police officers">police officers</a>, <a href="https://publications.waset.org/abstracts/search?q=psychological%20contract" title=" psychological contract"> psychological contract</a>, <a href="https://publications.waset.org/abstracts/search?q=occupational%20stressors" title=" occupational stressors"> occupational stressors</a>, <a href="https://publications.waset.org/abstracts/search?q=wellbeing" title=" wellbeing"> wellbeing</a> </p> <a href="https://publications.waset.org/abstracts/60743/psychological-contract-violation-and-occupational-stressors-amongst-uk-police-officers" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/60743.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">433</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">233</span> Protected Status: Violation of the Provisions of Protected Status under International Humanitarian Law during the Liberation War of Bangladesh </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sabera%20Sultana">Sabera Sultana</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In today's war-torn world, it is crucial to identify, understand, and apply the laws aimed at minimizing civilian casualty during wartime. The purpose of this paper is to analyze the provisions of protected status under international humanitarian law and evaluate the historical facts and shreds of evidences of violation of protected status during the Liberation War of Bangladesh. This legal research paper evaluates the international humanitarian laws and case laws regarding protected status of people during wartime and evaluates them against the historical facts and well-documented evidences of violation of protected status during the Liberation War of Bangladesh. This paper will help to create a brief guideline on Protected Status under international humanitarian law, which will help to protect our civilians during wartime if ever required. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=civilian%20protection" title="civilian protection">civilian protection</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20humanitarian%20laws" title=" international humanitarian laws"> international humanitarian laws</a>, <a href="https://publications.waset.org/abstracts/search?q=liberation%20war%20of%20Bangladesh" title=" liberation war of Bangladesh"> liberation war of Bangladesh</a>, <a href="https://publications.waset.org/abstracts/search?q=protected%20status" title=" protected status"> protected status</a> </p> <a href="https://publications.waset.org/abstracts/119719/protected-status-violation-of-the-provisions-of-protected-status-under-international-humanitarian-law-during-the-liberation-war-of-bangladesh" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/119719.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">219</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">232</span> An Anthropological Perspective: Interaction with Extended Kinship in Saudi Arabia in the 21st Century</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alaa%20Alshehri">Alaa Alshehri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It has been thought that kinship in modernization is moving in a linear Western model; however, the literature shows that different cultures adjust to modernization by preserving its norms and values. Saudi Arabia is a young country experiencing rapid expansion from oil discovery until economic diversification. By conducting 10 interviews from different provinces of the country from the age of 27-47, these anthropological studies suggest that Saudi people adapted to modernization and globalization through unique interactions with extended families by asking the participants to give detailed descriptions of their interactions with their kinship. With almost all the participants noticing the changes within the last few years, this interaction is rooted in their religious beliefs, which they stressed, even with the free choice of life opportunities. They tried to find a balance between individuality and collectivity and connect the gap between the older and younger generations. This study adds to the anthropological debate on kinship definition and ties in modernization and provides a perspective on the social reality of one of the major Middle Eastern countries, Saudi Arabia. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=collectivity" title="collectivity">collectivity</a>, <a href="https://publications.waset.org/abstracts/search?q=economic%20diversification" title=" economic diversification"> economic diversification</a>, <a href="https://publications.waset.org/abstracts/search?q=kinship" title=" kinship"> kinship</a>, <a href="https://publications.waset.org/abstracts/search?q=modernization%20theory" title=" modernization theory"> modernization theory</a>, <a href="https://publications.waset.org/abstracts/search?q=individuality" title=" individuality"> individuality</a> </p> <a href="https://publications.waset.org/abstracts/169471/an-anthropological-perspective-interaction-with-extended-kinship-in-saudi-arabia-in-the-21st-century" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/169471.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">101</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">231</span> The Standard of Reasonableness in Fundamental Rights Adjudication under the Indian Constitution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nandita%20Narayan">Nandita Narayan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In most constitutional democracies, courts have been the gatekeepers of fundamental rights. The task of determining whether a violation is in fact justified, therefore, is judicial. Any state action, legislative or administrative, has to be tested by the application of two standards – first, the action must be within the scope of the authority conferred by law and, second, it must be reasonable. If any action, within the scope of the authority conferred by law is found to be unreasonable, it will be struck down as unconstitutional or ultra vires. This paper seeks to analyse the varying standards of reasonableness adopted by the Supreme Court of India where there is a violation of fundamental rights by state action. This is sought to be done by scrutinising case laws and classifying the legality of the violation under one of three levels of judicial scrutiny—strict, intermediate, or weak. The paper concludes by proving that there is an irregularity in the standards adopted, thus resulting in undue discretionary power of the judiciary which strikes at the very concept of reasonableness and ultimately becomes arbitrary in nature. This conclusion is reached by the comparison of reasonableness review of fundamental rights in other jurisdictions such as the USA and Canada. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=constitutional%20law" title="constitutional law">constitutional law</a>, <a href="https://publications.waset.org/abstracts/search?q=judicial%20review" title=" judicial review"> judicial review</a>, <a href="https://publications.waset.org/abstracts/search?q=fundamental%20rights" title=" fundamental rights"> fundamental rights</a>, <a href="https://publications.waset.org/abstracts/search?q=reasonableness" title=" reasonableness"> reasonableness</a>, <a href="https://publications.waset.org/abstracts/search?q=India" title=" India"> India</a> </p> <a href="https://publications.waset.org/abstracts/86499/the-standard-of-reasonableness-in-fundamental-rights-adjudication-under-the-indian-constitution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/86499.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">150</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">230</span> Research of Data Cleaning Methods Based on Dependency Rules</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yang%20Bao">Yang Bao</a>, <a href="https://publications.waset.org/abstracts/search?q=Shi%20Wei%20Deng"> Shi Wei Deng</a>, <a href="https://publications.waset.org/abstracts/search?q=WangQun%20Lin"> WangQun Lin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper introduces the concept and principle of data cleaning, analyzes the types and causes of dirty data, and proposes several key steps of typical cleaning process, puts forward a well scalability and versatility data cleaning framework, in view of data with attribute dependency relation, designs several of violation data discovery algorithms by formal formula, which can obtain inconsistent data to all target columns with condition attribute dependent no matter data is structured (SQL) or unstructured (NoSQL), and gives 6 data cleaning methods based on these algorithms. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20cleaning" title="data cleaning">data cleaning</a>, <a href="https://publications.waset.org/abstracts/search?q=dependency%20rules" title=" dependency rules"> dependency rules</a>, <a href="https://publications.waset.org/abstracts/search?q=violation%20data%20discovery" title=" violation data discovery"> violation data discovery</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20repair" title=" data repair"> data repair</a> </p> <a href="https://publications.waset.org/abstracts/31348/research-of-data-cleaning-methods-based-on-dependency-rules" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31348.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">564</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">229</span> Non−zero θ_13 and δ_CP phase with A_4 Flavor Symmetry and Deviations to Tri−Bi−Maximal mixing via Z_2 × Z_2 invariant perturbations in the Neutrino sector.</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gayatri%20Ghosh">Gayatri Ghosh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this work, a flavour theory of a neutrino mass model based on A_4 symmetry is considered to explain the phenomenology of neutrino mixing. The spontaneous symmetry breaking of A_4 symmetry in this model leads to tribimaximal mixing in the neutrino sector at a leading order. We consider the effect of Z_2 × Z_2 invariant perturbations in neutrino sector and find the allowed region of correction terms in the perturbation matrix that is consistent with 3σ ranges of the experimental values of the mixing angles. We study the entanglement of this formalism on the other phenomenological observables, such as δ_CP phase, the neutrino oscillation probability P(νµ → νe), the effective Majorana mass |mee| and |meff νe |. A Z_2 × Z_2 invariant perturbations in this model is introduced in the neutrino sector which leads to testable predictions of θ_13 and CP violation. By changing the magnitudes of perturbations in neutrino sector, one can generate viable values of δ_CP and neutrino oscillation parameters. Next we investigate the feasibility of charged lepton flavour violation in type-I seesaw models with leptonic flavour symmetries at high energy that leads to tribimaximal neutrino mixing. We consider an effective theory with an A_4 × Z_2 × Z_2 symmetry, which after spontaneous symmetry breaking at high scale which is much higher than the electroweak scale leads to charged lepton flavour violation processes once the heavy Majorana neutrino mass degeneracy is lifted either by renormalization group effects or by a soft breaking of the A_4 symmetry. In this context the implications for charged lepton flavour violation processes like µ → eγ, τ → eγ, τ → µγ are discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Z2%20%C3%97%20Z2%20invariant%20perturbations" title="Z2 × Z2 invariant perturbations">Z2 × Z2 invariant perturbations</a>, <a href="https://publications.waset.org/abstracts/search?q=CLFV" title=" CLFV"> CLFV</a>, <a href="https://publications.waset.org/abstracts/search?q=delta%20CP%20phase" title=" delta CP phase"> delta CP phase</a>, <a href="https://publications.waset.org/abstracts/search?q=tribimaximal%20neutrino%20mixing" title=" tribimaximal neutrino mixing"> tribimaximal neutrino mixing</a> </p> <a href="https://publications.waset.org/abstracts/153638/nonzero-th-13-and-d-cp-phase-with-a-4-flavor-symmetry-and-deviations-to-tribimaximal-mixing-via-z-2-z-2-invariant-perturbations-in-the-neutrino-sector" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153638.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">79</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">228</span> Comparative Study of Case Files in the Context of H. P. Grice’s Pragmatic Theory</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tugce%20Arslan">Tugce Arslan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> For a communicative act to be carried out successfully, the speaker and the listener must consider certain principles in line with the intention–centered “Cooperative Principle” expressed by H. P. Grice. Violation of a communication principle causes the listener to make new inferences called “implicatures”. In this study, focusing on the linguistic use of H. P. Grice’s principles, we aim to find out which principles of conversation are generally followed in case files from different fields and which principles are frequently violated. Three case files were examined, and the violating and the abiding cases of the maxims were classified in terms of four categories (Quality, Quantity, Relevance and Manner). The results of this investigation is reported below (V: Violating, A: Abiding): Quality Quantity Relevance Manner V A V A V A V A Case 1 10 8 5 9 3 15 16 6 Case 2 4 5 11 6 2 11 7 14 Case 3 21 13 7 12 9 14 15 9 Total 35 26 23 27 14 40 38 29 The excerpts were selected from files covering three different areas: the Assize Court, the Family Court and the Commercial Court of First Instance. In this way, the relations between the types of violations and the types of courts are examined. Our main finding is that in the 1st and the 3rd file, as the cases of violation in “Quality” and “Manner” increase, the cases of violation in “Quantity” and “Relevance” decrease. In the second file, on the other hand, as the cases of violation in “Quantity” increase, the cases of violation in “Quality”, “Relevance” and “Manner” decrease. In the talk, we shall compare these results with the results obtained in the study of Tajabadi, Dowlatabadi, and Mehric (2014), which examined various case files in Iran. Our main finding is that in the study conducted in Iran, violations were found only on the principles of “Quantity” and “Relevance”, while violations were found on the principles of “Quality”, “Quantity” and “Manner” in this study. In this case, it shows us that there is a connection between at least two maxims. In both cases, it has been noticed that the “Quantity” maxim is a common denominator. Studies in this field can be enlightening for many areas such as discourse analysis, legal studies, etc. Accordingly, comments will be made about the nature of the violations mentioned in H. P. Grice’s “Cooperation Principle”. We shall also discuss various conversational practices that cannot be analysed with these maxims. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=comparative%20analysis" title="comparative analysis">comparative analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=cooperation%20principle" title=" cooperation principle"> cooperation principle</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20linguistics" title=" forensic linguistics"> forensic linguistics</a>, <a href="https://publications.waset.org/abstracts/search?q=pragmatic." title=" pragmatic."> pragmatic.</a> </p> <a href="https://publications.waset.org/abstracts/138549/comparative-study-of-case-files-in-the-context-of-h-p-grices-pragmatic-theory" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/138549.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">221</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">227</span> The Consequences of Complaint Offenses against Copyright Protection</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chryssantus%20Kastowo">Chryssantus Kastowo</a>, <a href="https://publications.waset.org/abstracts/search?q=Theresia%20Anita%20Christiani"> Theresia Anita Christiani</a>, <a href="https://publications.waset.org/abstracts/search?q=Anny%20Retnowati"> Anny Retnowati</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Copyright infringement as a form of infringement does not always mean causing harm to the creator. This can be proven with so many copyright violations in society and there is no significant law enforcement effort when compared with the violations that occurred. Copyright law as a form of appreciation from the state to the creator becomes counter productive if there is omission of violations. The problem raised in this article is how is the model of copyright regulation in accordance with the purpose of the law of copyright protection. This article is based on normative legal research focusing on secondary data. The analysis used is a conceptual approach. The analysis shows that the regulation of copyright emphasizes as a subjective right that is wholly within the author's power. This perspective will affect the claim of rights by the creator or allow violations. The creator is obliged to maintain the overall performance of copyright protection, especially in the event of a violation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=copyright" title="copyright">copyright</a>, <a href="https://publications.waset.org/abstracts/search?q=enforcement" title=" enforcement"> enforcement</a>, <a href="https://publications.waset.org/abstracts/search?q=law" title=" law"> law</a>, <a href="https://publications.waset.org/abstracts/search?q=violation" title=" violation"> violation</a> </p> <a href="https://publications.waset.org/abstracts/116167/the-consequences-of-complaint-offenses-against-copyright-protection" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/116167.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">135</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">226</span> Contingency Screening Using Risk Factor Considering Transmission Line Outage</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Marsadek">M. Marsadek</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Mohamed"> A. Mohamed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Power system security analysis is the most time demanding process due to large number of possible contingencies that need to be analyzed. In a power system, any contingency resulting in security violation such as line overload or low voltage may occur for a number of reasons at any time. To efficiently rank a contingency, both probability and the extent of security violation must be considered so as not to underestimate the risk associated with the contingency. This paper proposed a contingency ranking method that take into account the probabilistic nature of power system and the severity of contingency by using a newly developed method based on risk factor. The proposed technique is implemented on IEEE 24-bus system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=line%20overload" title="line overload">line overload</a>, <a href="https://publications.waset.org/abstracts/search?q=low%20voltage" title=" low voltage"> low voltage</a>, <a href="https://publications.waset.org/abstracts/search?q=probability" title=" probability"> probability</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20factor" title=" risk factor"> risk factor</a>, <a href="https://publications.waset.org/abstracts/search?q=severity" title=" severity"> severity</a> </p> <a href="https://publications.waset.org/abstracts/32664/contingency-screening-using-risk-factor-considering-transmission-line-outage" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/32664.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">545</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">225</span> A Cultural-Sensitive Approach to Counseling a Samoan Sex Offender</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Byron%20Malaela%20Sotiata%20Seiuli">Byron Malaela Sotiata Seiuli</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Sexual violation is any form of sexual violence, including rape, child molestation, incest, and similar forms of non-consensual sexual contact. Much of these acts of violation are perpetuated, but not entirely, by men against women and children. <em>Moetolo</em> is a Samoan term that is used to describe a person who sexually violates another while they or their family are asleep. This paper presents and discusses sexual abuse from a Samoan viewpoint. Insights are drawn from the authors’ counseling engagement with a Samoan sex offender as part of his probation review process. Relevant literature is also engaged to inform and provide interpretation to the therapeutic work carried out. This article seeks to contribute new understanding to patterned responses of some Samoan people to sexual abuse behaviors, and steps to remedy arising concerns with perpetrators seeking reintegration back into their communities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fa%27asamoa" title="Fa'asamoa">Fa'asamoa</a>, <a href="https://publications.waset.org/abstracts/search?q=Samoan%20identity" title=" Samoan identity"> Samoan identity</a>, <a href="https://publications.waset.org/abstracts/search?q=sexual%20abuse%20counseling" title=" sexual abuse counseling"> sexual abuse counseling</a>, <a href="https://publications.waset.org/abstracts/search?q=Uputaua%20therapeutic%20approach" title=" Uputaua therapeutic approach"> Uputaua therapeutic approach</a> </p> <a href="https://publications.waset.org/abstracts/60889/a-cultural-sensitive-approach-to-counseling-a-samoan-sex-offender" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/60889.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">301</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">224</span> Classification of Cosmological Wormhole Solutions in the Framework of General Relativity</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Usamah%20Al-Ali">Usamah Al-Ali</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We explore the effect of expanding space on the exoticity of the matter supporting a traversable Lorentzian wormhole of zero radial tide whose line element is given by ds2 = dt^2 − a^2(t)[ dr^2/(1 − kr2 −b(r)/r)+ r2dΩ^2 in the context of General Relativity. This task is achieved by deriving the Einstein field equations for anisotropic matter field corresponding to the considered cosmological wormhole metric and performing a classification of their solutions on the basis of a variable equations of state (EoS) of the form p = ω(r)ρ. Explicit forms of the shape function b(r) and the scale factor a(t) arising in the classification are utilized to construct the corresponding energy-momentum tensor where the energy conditions for each case is investigated. While the violation of energy conditions is inevitable in case of static wormholes, the classification we performed leads to interesting solutions in which this violation is either reduced or eliminated. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=general%20relativity" title="general relativity">general relativity</a>, <a href="https://publications.waset.org/abstracts/search?q=Einstein%20field%20equations" title=" Einstein field equations"> Einstein field equations</a>, <a href="https://publications.waset.org/abstracts/search?q=energy%20conditions" title=" energy conditions"> energy conditions</a>, <a href="https://publications.waset.org/abstracts/search?q=cosmological%20wormhole" title=" cosmological wormhole"> cosmological wormhole</a> </p> <a href="https://publications.waset.org/abstracts/150239/classification-of-cosmological-wormhole-solutions-in-the-framework-of-general-relativity" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/150239.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">63</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">223</span> Oakes Test and Proportionality Test: Balance between the Practical Costs of Limiting Rights and the Benefits Arising from the Law</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rafael%20Tedrus%20Bento">Rafael Tedrus Bento</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The analysis of proportionality as a test is raised as a basic foundation for the achievement of Fundamental Rights. We used legal dogmatics and empirical analysis to seek the expected results, from the reading of the RV Oakes trial by the Supreme Court of Canada. In cases involving freedom of expression, two tests are used to resolve disputes. The first examines whether, in fact, the case can be characterized as a violation of freedom of expression; the second assesses whether this violation can be justified by the reasonable limit clause. This test was defined in the RV Oakes trial by the Supreme Court of Canada, concluding with the Oakes Test, used worldwide as a proportionality test. Resulting is a proportionality between the effects of the limiting measure and the objective - the more serious the harmful effects of a measure, the more important the objective must be. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Oakes" title="Oakes">Oakes</a>, <a href="https://publications.waset.org/abstracts/search?q=proportionality" title=" proportionality"> proportionality</a>, <a href="https://publications.waset.org/abstracts/search?q=fundamental%20rights" title=" fundamental rights"> fundamental rights</a>, <a href="https://publications.waset.org/abstracts/search?q=Supreme%20Court%20of%20Canada" title=" Supreme Court of Canada"> Supreme Court of Canada</a> </p> <a href="https://publications.waset.org/abstracts/135650/oakes-test-and-proportionality-test-balance-between-the-practical-costs-of-limiting-rights-and-the-benefits-arising-from-the-law" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/135650.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">146</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">222</span> Animal Welfare Violations during Treatment at Different Level of Veterinary Hospitals</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aparna%20Datta">Aparna Datta</a>, <a href="https://publications.waset.org/abstracts/search?q=Mahabub%20Alam"> Mahabub Alam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Animal welfare is comparatively new area of research in Bangladesh and welfare concern for animal is increasing day by day. The study was conducted to investigate the animal welfare violations during treatment at different level of hospitals in Bangladesh and India. This study was conducted between January and May, 2017. The recorded data (N=180) were categorized into eight major types of violation like - delay in starting treatment, non-specific treatment, surgery without anesthesia, use of unsterilized needle, rough and painful handling, fearful approach, multiple pricking during injection and use of blunt needle. Categorized groups were analyzed according to different hospitals like Upazila Veterinary Hospitals, Bangladesh (UVHs), SAQ-Teaching Veterinary Hospital, Bangladesh (SAQTVH) and Veterinary College and Research Institute, India (VCRI). Among all hospitals, violation during treatment more frequently occurred in UVH. Among all violations, surgery without anesthesia was only found in UVH (80%) and it was belong to considerable number of cases (80%). In the view of other major violations like - non-specific treatment was 69% in UVHs, 13% in SAQTVH and 5% in VCRI. Use of unsterilized instruments during treatment was also higher in UVHs (65%) than SAQTVH (5%) and VCRI (1%). But delay in starting treatment varied insignificantly and it was 26-42% across the different levels of hospitals. Although multiple pricking during injection was found 30% cases in UVH, but statistical variations with other level of hospitals were unnoticed (p>0.05). The findings of this study will help to take necessary steps to control violation against animal welfare during treatment. A comprehensive study considering all levels of hospitals including field treatment is also recommended to find out the welfare violations during treatment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=animal%20welfare" title="animal welfare">animal welfare</a>, <a href="https://publications.waset.org/abstracts/search?q=treatment" title=" treatment"> treatment</a>, <a href="https://publications.waset.org/abstracts/search?q=veterinary%20hospitals" title=" veterinary hospitals"> veterinary hospitals</a>, <a href="https://publications.waset.org/abstracts/search?q=violations" title=" violations"> violations</a> </p> <a href="https://publications.waset.org/abstracts/86065/animal-welfare-violations-during-treatment-at-different-level-of-veterinary-hospitals" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/86065.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">156</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">221</span> Sexual Consent and Persons with Psychosocial Disabilities: Exploring Sexual Rights under Indian Laws</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sachin%20Sharma">Sachin Sharma</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Sexual consent is integral to every sexual relationship. It is a process to facilitate sexual autonomy and bodily integrity. It assures complete sexual personhood and allows an individual to explore her sexual expressions independently. But the said proposition is not true for people with psychosocial disabilities. Generally, they are considered seraphic or mephistophelic and denied access to sexual autonomy. This result in institutionalizing the sexuality of disabled persons, where the eugenics-ableist narrative defines assessment and access to consent. This way, sexuality and disability are distanced apart. It is primarily due to the stigmatized socio-cultural constructs of sexuality that define sex within a “standard” and “charmed” circle. Such stigmatized expression influences the law, as it considers people with psychosocial disabilities incapable of sexual consent. The approach of legal institutions is very narrow towards interpreting their sexual rights. It echoes the modernist-ableism and strangulates the sexual choices. This way, it reflects the repressive model of sex and denies space to people with psychosocial disabilities. Moreover, judicial courts follow old and conservative methods while dealing with sexual issues. For instance, courts still practice the “standardized” norm of intelligence quotient (IQ) for determining the credibility of persons with psychosocial disabilities. Further, there is still doubt about assistive communicative techniques. This paper will try to question the normative structure of sexual consent and related laws while specifically addressing the issues of sex as desire and abuse. Considering the commitment to the United Nations Convention on the Rights of Persons with Disabilities (herein referred to as UNCRPD) and common law experience, the paper will draw a comparative study on the legal position of sexual rights in India. The paper will also analyze the role of UNCRPD in addressing sexual rights. The author will examine the position of sexual rights of people with psychosocial disabilities after the drafting of UNCRPD and specific state laws. The paper primarily follows the doctrinal method. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=sexual%20autonomy" title="sexual autonomy">sexual autonomy</a>, <a href="https://publications.waset.org/abstracts/search?q=institutionalized%20choices" title=" institutionalized choices"> institutionalized choices</a>, <a href="https://publications.waset.org/abstracts/search?q=overregulated%20laws" title=" overregulated laws"> overregulated laws</a>, <a href="https://publications.waset.org/abstracts/search?q=violation%20of%20individuality" title=" violation of individuality"> violation of individuality</a> </p> <a href="https://publications.waset.org/abstracts/157553/sexual-consent-and-persons-with-psychosocial-disabilities-exploring-sexual-rights-under-indian-laws" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/157553.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">118</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">220</span> The Difference Between Islamic Terrorism and Tha Human Rights In The Middle East</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mina%20Latif%20Ghaly%20Sawiras">Mina Latif Ghaly Sawiras</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The difference between Islamic terrorism and human-rights has become a big question in the fight against Islamic terrorism globally. This is was raised on the fact that terrorism and human rights are interrelated to the extent that, when the former starts, the latter is violated. This direct linkage was recognized in the Vienna Declaration and Program of Action as adopted by the World Conference on Human Rights in Vienna on 25 June 1993 which agreed that acts of terrorism in all its forms and manifestations are aimed at the destruction of human rights. Hence, Islamic-terrorism constitutes a violation on our most basic human rights. To this end, the first part of this paper will focus on the nexus between terrorism and human rights and endeavors to draw a co-relation between these two concepts. The second part thereafter will analyse the emerging concept of cyber-terrorism and how it takes place. Further, an analysis of cyber counter-terrorism balanced as against human rights will also be undertaken. This will be done through the analysis of the concept of ‘securitization’ of human rights as well as the need to create a balance between counterterrorism efforts as against the protection of human rights at all costs. The paper will then conclude with recommendations on how to balance counter-terrorism and human rights in the modern age. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=balance" title="balance">balance</a>, <a href="https://publications.waset.org/abstracts/search?q=counter-terrorism" title=" counter-terrorism"> counter-terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-terrorism" title=" cyber-terrorism"> cyber-terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20rights" title=" human rights"> human rights</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=violation" title=" violation"> violation</a> </p> <a href="https://publications.waset.org/abstracts/182406/the-difference-between-islamic-terrorism-and-tha-human-rights-in-the-middle-east" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/182406.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">64</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">219</span> The Incesant Subversion of Judiciary by African Political Leaders</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Joy%20Olayemi%20Gbala">Joy Olayemi Gbala</a>, <a href="https://publications.waset.org/abstracts/search?q=Fatai%20Olatokunbo"> Fatai Olatokunbo</a>, <a href="https://publications.waset.org/abstracts/search?q=Philip%20%20Cloud"> Philip Cloud </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Catastrophic dictatorship has been discovered to be the major leadership challenge that orchestrates stagnated and contrasted economy with dysfunctional democracy in Africa through willful misappropriation of resources and egregious subversion of the rule of law. Almost invariably, most African leaders inexplicably often become power drunk and addicted which usually leads to abuse of state power, abdication of constitutional duties, unjustly withdrawal of business license of operation, human right violation, election malpractices, financial corruption, disruptions of policies of democratic government transition, annulment of free and fair election, and disruptions of legal electoral procedures and unachievable dividends of democracy and many more. Owing to this, most African nations have gone and still go through political unrest and insurgencies leading to loss of lives and property, violent protests, detention of detractors and political activists and massive human displacement. This research work is concerned with, and investigates the causes, menace, consequences and impacts of subverting the rule of law in Africa on the economy and the development of the continent with a suggested practical solution to the plights. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=corruption" title="corruption">corruption</a>, <a href="https://publications.waset.org/abstracts/search?q=law" title=" law"> law</a>, <a href="https://publications.waset.org/abstracts/search?q=leadership" title=" leadership"> leadership</a>, <a href="https://publications.waset.org/abstracts/search?q=violation" title=" violation"> violation</a> </p> <a href="https://publications.waset.org/abstracts/106732/the-incesant-subversion-of-judiciary-by-african-political-leaders" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/106732.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">155</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">218</span> Nano-Sensors: Search for New Features</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=I.%20Filikhin">I. Filikhin</a>, <a href="https://publications.waset.org/abstracts/search?q=B.%20Vlahovic"> B. Vlahovic</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We focus on a novel type of detection based on electron tunneling properties of double nanoscale structures in semiconductor materials. Semiconductor heterostructures as quantum wells (QWs), quantum dots (QDs), and quantum rings (QRs) may have energy level structure of several hundred of electron confinement states. The single electron spectra of the double quantum objects (DQW, DQD, and DQR) were studied in our previous works with relation to the electron localization and tunneling between the objects. The wave function of electron may be localized in one of the QDs or be delocalized when it is spread over the whole system. The localizing-delocalizing tunneling occurs when an electron transition between both states is possible. The tunneling properties of spectra differ strongly for “regular” and “chaotic” systems. We have shown that a small violation of the geometry drastically affects localization of electron. In particular, such violations lead to the elimination of the delocalized states of the system. The same symmetry violation effect happens if electrical or magnetic fields are applied. These phenomena could be used to propose a new type of detection based on the high sensitivity of charge transport between double nanostructures and small violations of the shapes. It may have significant technological implications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=double%20quantum%20dots" title="double quantum dots">double quantum dots</a>, <a href="https://publications.waset.org/abstracts/search?q=single%20electron%20levels" title=" single electron levels"> single electron levels</a>, <a href="https://publications.waset.org/abstracts/search?q=tunneling" title=" tunneling"> tunneling</a>, <a href="https://publications.waset.org/abstracts/search?q=electron%20localizations" title=" electron localizations"> electron localizations</a> </p> <a href="https://publications.waset.org/abstracts/24024/nano-sensors-search-for-new-features" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24024.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">505</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">217</span> Patients’ Rights: An Enquiry into the Activities of Local Psychiatric Centers Managed by Muslims in South-West Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shaykh-Luqman%20Jimoh">Shaykh-Luqman Jimoh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In Nigeria, aside the eight Government hospitals designated Psychiatric hospitals, there are also many local psychiatric centers managed by muslims and non-muslim individuals. These centers have been heavily criticized for human right abuses. This study is an inquiry into the truth or otherwise of the criticism. The study focuses on the activities of local centers managed by muslim individuals in South-West Nigeria with a view to determining the extent they uphold or violate their patients’ fundamental human rights as guaranteed by Islam. Information about the activities of the centers were collected through oral interviews. Both descriptive and analytical methods were used in the study. The study revealed that while there are some activities of the local centers managed by muslims in the study area that could be regarded as outright violation of patients’ fundamental human rights, some others, in view of the rationale behind them, may not necessarily constitute outright violation of the patients’ fundamental human rights as hitherto painted except where excesses are committed. The study therefore, using Islamic paradigm, suggests general measures that could be taken to improve on the activities of the centers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=local%20psychiatric%20centers" title="local psychiatric centers">local psychiatric centers</a>, <a href="https://publications.waset.org/abstracts/search?q=muslim%20exorcists" title=" muslim exorcists"> muslim exorcists</a>, <a href="https://publications.waset.org/abstracts/search?q=patients%E2%80%99%20rights" title=" patients’ rights"> patients’ rights</a>, <a href="https://publications.waset.org/abstracts/search?q=South-West%20Nigeria" title=" South-West Nigeria "> South-West Nigeria </a> </p> <a href="https://publications.waset.org/abstracts/34915/patients-rights-an-enquiry-into-the-activities-of-local-psychiatric-centers-managed-by-muslims-in-south-west-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/34915.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">502</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">216</span> On Unification of the Electromagnetic, Strong and Weak Interactions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hassan%20Youssef%20Mohamed">Hassan Youssef Mohamed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we show new wave equations, and by using the equations, we concluded that the strong force and the weak force are not fundamental, but they are quantum effects for electromagnetism. This result is different from the current scientific understanding about strong and weak interactions at all. So, we introduce three evidences for our theory. First, we prove the asymptotic freedom phenomenon in the strong force by using our model. Second, we derive the nuclear shell model as an approximation of our model. Third, we prove that the leptons do not participate in the strong interactions, and we prove the short ranges of weak and strong interactions. So, our model is consistent with the current understanding of physics. Finally, we introduce the electron-positron model as the basic ingredients for protons, neutrons, and all matters, so we can study all particles interactions and nuclear interaction as many-body problems of electrons and positrons. Also, we prove the violation of parity conservation in weak interaction as evidence of our theory in the weak interaction. Also, we calculate the average of the binding energy per nucleon. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=new%20wave%20equations" title="new wave equations">new wave equations</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20strong%20force" title=" the strong force"> the strong force</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20grand%20unification%20theory" title=" the grand unification theory"> the grand unification theory</a>, <a href="https://publications.waset.org/abstracts/search?q=hydrogen%20atom" title=" hydrogen atom"> hydrogen atom</a>, <a href="https://publications.waset.org/abstracts/search?q=weak%20force" title=" weak force"> weak force</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20nuclear%20shell%20model" title=" the nuclear shell model"> the nuclear shell model</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20asymptotic%20freedom" title=" the asymptotic freedom"> the asymptotic freedom</a>, <a href="https://publications.waset.org/abstracts/search?q=electron-positron%20model" title=" electron-positron model"> electron-positron model</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20violation%20of%20parity%20conservation" title=" the violation of parity conservation"> the violation of parity conservation</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20binding%20energy" title=" the binding energy"> the binding energy</a> </p> <a href="https://publications.waset.org/abstracts/146460/on-unification-of-the-electromagnetic-strong-and-weak-interactions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/146460.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">185</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">215</span> An Exploration of The Patterns of Transcendence in Indian and Hopkins’s Aesthetics </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lima%20Antony">Lima Antony</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In G. M. Hopkins’s poetics and aesthetics there is scope for a comparative study with Indian discourses on aesthetics, an area not adequately explored so far. This exploration will enrich the field of comparative study of diverse cultural expressions and their areas of similarity. A comparative study of aesthetic and religious experiences in diverse cultures will open up avenues for the discovery of similarities in self-experiences and their transcendence. Such explorations will reveal similar patterns in aesthetic and religious experiences. The present paper intends to prove this in the theories of Hopkins and Indian aesthetics. From the time of the Vedas Indian sages have believed that aesthetic enjoyment could develop into a spiritual realm. From the Natyasastra of Bharata, Indian aesthetics develops and reaches its culmination in later centuries into a consciousness of union with the mystery of the Ultimate Being, especially in Dhvanaāloka of Anandavardhana and Locana of Abhinavagupta. Dhvanyaloka elaborates the original ideas of rasa (mood or flavor) and dhvani (power of suggestion) in Indian literary theory and aesthetics. Hopkins was successful, like the ancient Indian alankarikas, in creating aesthetically superb patterns at various levels of sound and sense for which he coined the term ‘inscape’. So Hopkins’s aesthetic theory becomes suitable for transcultural comparative study with Indian aesthetics especially the dhvani theories of Anandavardhana and Abhinavagupta. Hopkins’s innovative approach to poetics and his selection of themes are quite suitable for analysis in the light of Indian literary theories. Indian philosophy views the ultimate reality called Brahman, as the 'soul,' or inner essence, of all reality. We see in Hopkins also a search for the essence of things and the chiming of their individuality with the Ultimate Being in multidimensional patterns of sound, sense and ecstatic experience. This search culminates in the realization of a synthesis of the individual self with the Ultimate Being. This is achieved through an act of surrender of the individuality of the self before the Supreme Being. Attempts to reconcile the immanent and transcendent aspects of the Ultimate Being can be traced in the Indian as well as Hopkins’s aesthetics which can contribute to greater understanding and harmony between cultures. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dhvani" title="Dhvani">Dhvani</a>, <a href="https://publications.waset.org/abstracts/search?q=Indian%20aesthetics" title=" Indian aesthetics"> Indian aesthetics</a>, <a href="https://publications.waset.org/abstracts/search?q=transcultural%20studies" title=" transcultural studies"> transcultural studies</a>, <a href="https://publications.waset.org/abstracts/search?q=Rasa" title=" Rasa"> Rasa</a> </p> <a href="https://publications.waset.org/abstracts/96823/an-exploration-of-the-patterns-of-transcendence-in-indian-and-hopkinss-aesthetics" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/96823.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">148</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">214</span> Protection of Minor's Privacy in Bosnian Herzegovinian Media (Legal Regulation and Current Media Reporting)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ilija%20Musa">Ilija Musa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Positive legal regulation of juvenile privacy protection, current state of showing a child in BH media and possibilities of a child’s privacy protection by more adequate media legislature which should be arranged in accordance to recommendations of the UN Committee on the Rights of the Child for Bosnia and Herzegovina. Privacy of the minors in Bosnian-Herzegovinian media is insufficiently legally arranged. Due to the fact that there is no law on media area arrangement at the state level, electronic media are under jurisdiction of Communications regulatory agency, which at least partially, regulated the sector of radio and television broadcasting by adequate protection of child’s privacy. However, print and online media are under jurisdiction of non-governmental association Print and online media council in B&H which is not authorized to punish violators of this body’s Codex, what points out the necessity of passing the unique media law which would enable sanctioning the child’s privacy violation. The analysis of media content, which is a common violation of the child's privacy, analysis of positive legislation which regulates the media, confirmed the working hypothesis by which the minor’s protection policy in BH media is not protected at the appropriate level. Taking this into consideration, in the conclusion of this article the author gives recommendations for the regulation of legal protection of minor’s privacy in BH media. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=children" title="children">children</a>, <a href="https://publications.waset.org/abstracts/search?q=media" title=" media"> media</a>, <a href="https://publications.waset.org/abstracts/search?q=legislation" title=" legislation"> legislation</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20protection" title=" privacy protection"> privacy protection</a>, <a href="https://publications.waset.org/abstracts/search?q=Bosnia%20Herzegovina" title=" Bosnia Herzegovina"> Bosnia Herzegovina</a> </p> <a href="https://publications.waset.org/abstracts/31179/protection-of-minors-privacy-in-bosnian-herzegovinian-media-legal-regulation-and-current-media-reporting" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31179.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">492</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">213</span> Improving the Social Interactions of Students with Conduct Disorder in Dil Betigil Primary School </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dawit%20Thomas%20Lambamo">Dawit Thomas Lambamo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Conduct disorder has become a major health and social problem; it is the most common psychiatric problem diagnosed among students which affect the academic and social interaction of students. This intervention was conducted in Dil Betigil primary school. After identifying six students with conduct disorder in Dil Betigil primary school, the intervention was conducted using a true experimental research design specifically pretest and posttest control group design. Data from teachers and parents of the students with conduct disorder were collected using adapted conduct disorder scale and semi-structured interview. The independent sample t-test of Pretest results of both experimental and control group indicated that there is no statistically significant difference between experimental and control groups. Intervention is carried out to enhance their social interaction and to decrees aggressive, a serious violation of rules and theft behavior of students in collaboration with teachers and parents. After six intervention weeks the post-test result showed that there was statistically significant difference in aggression and serious violation between the experimental and control groups, but there was no statistically significant mean difference regarding deceitful or theft between the experimental and control group. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=conduct" title="conduct">conduct</a>, <a href="https://publications.waset.org/abstracts/search?q=disorder" title=" disorder"> disorder</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20interaction" title=" social interaction"> social interaction</a>, <a href="https://publications.waset.org/abstracts/search?q=interaction" title=" interaction"> interaction</a> </p> <a href="https://publications.waset.org/abstracts/81254/improving-the-social-interactions-of-students-with-conduct-disorder-in-dil-betigil-primary-school" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/81254.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">316</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">212</span> The Association of Southeast Asian Nations (ASEAN) and the Dynamics of Resistance to Sovereignty Violation: The Case of East Timor (1975-1999)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Laura%20Southgate">Laura Southgate</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Association of Southeast Asian Nations (ASEAN), as well as much of the scholarship on the organisation, celebrates its ability to uphold the principle of regional autonomy, understood as upholding the norm of non-intervention by external powers in regional affairs. Yet, in practice, this has been repeatedly violated. This dichotomy between rhetoric and practice suggests an interesting avenue for further study. The East Timor crisis (1975-1999) has been selected as a case-study to test the dynamics of ASEAN state resistance to sovereignty violation in two distinct timeframes: Indonesia’s initial invasion of the territory in 1975, and the ensuing humanitarian crisis in 1999 which resulted in a UN-mandated, Australian-led peacekeeping intervention force. These time-periods demonstrate variation on the dependent variable. It is necessary to observe covariation in order to derive observations in support of a causal theory. To establish covariation, my independent variable is therefore a continuous variable characterised by variation in convergence of interest. Change of this variable should change the value of the dependent variable, thus establishing causal direction. This paper investigates the history of ASEAN’s relationship to the norm of non-intervention. It offers an alternative understanding of ASEAN’s history, written in terms of the relationship between a key ASEAN state, which I call a ‘vanguard state’, and selected external powers. This paper will consider when ASEAN resistance to sovereignty violation has succeeded, and when it has failed. It will contend that variation in outcomes associated with vanguard state resistance to sovereignty violation can be best explained by levels of interest convergence between the ASEAN vanguard state and designated external actors. Evidence will be provided to support the hypothesis that in 1999, ASEAN’s failure to resist violations to the sovereignty of Indonesia was a consequence of low interest convergence between Indonesia and the external powers. Conversely, in 1975, ASEAN’s ability to resist violations to the sovereignty of Indonesia was a consequence of high interest convergence between Indonesia and the external powers. As the vanguard state, Indonesia was able to apply pressure on the ASEAN states and obtain unanimous support for Indonesia’s East Timor policy in 1975 and 1999. However, the key factor explaining the variance in outcomes in both time periods resides in the critical role played by external actors. This view represents a serious challenge to much of the existing scholarship that emphasises ASEAN’s ability to defend regional autonomy. As these cases attempt to show, ASEAN autonomy is much more contingent than portrayed in the existing literature. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ASEAN" title="ASEAN">ASEAN</a>, <a href="https://publications.waset.org/abstracts/search?q=east%20timor" title=" east timor"> east timor</a>, <a href="https://publications.waset.org/abstracts/search?q=intervention" title=" intervention"> intervention</a>, <a href="https://publications.waset.org/abstracts/search?q=sovereignty" title=" sovereignty"> sovereignty</a> </p> <a href="https://publications.waset.org/abstracts/25387/the-association-of-southeast-asian-nations-asean-and-the-dynamics-of-resistance-to-sovereignty-violation-the-case-of-east-timor-1975-1999" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25387.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">358</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=violation%20of%20individuality&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=violation%20of%20individuality&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=violation%20of%20individuality&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=violation%20of%20individuality&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=violation%20of%20individuality&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=violation%20of%20individuality&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=violation%20of%20individuality&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=violation%20of%20individuality&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=violation%20of%20individuality&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>