Journal articles on the topic 'Protection'

To see the other types of publications on this topic, follow the link: Protection.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Protection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Lai, Jessica C., and Samuel I. Becher. "Protecting Consumer Protection." Victoria University of Wellington Law Review 49, no. 2 (August 1, 2018): 259. http://dx.doi.org/10.26686/vuwlr.v49i2.5324.

Full text
Abstract:
Recent consumer law cases are shaping consumer law in an unwarranted way. The courts have acknowledged the importance of advancing consumer law and protecting consumers, however, upon closer examination it is questionable whether courts are employing the right framework, tools and considerations. By analysing recent country of origin cases this article identifies some potentially worrying ways in which the courts have eroded consumer law rather than strengthening it. In particular, such cases allow the proprietary interest of goodwill to creep into the Fair Trading Act 1986 (FTA). Doing so, even if only at the stage of determining the penalty to be imposed, may shift the dial further towards the Fair Trading Act (FTA) being a means for protecting traders' interests. This, in turn, may lead to negative unintended consequences.
APA, Harvard, Vancouver, ISO, and other styles
2

Masson, Judith. "Police protection - protecting whom?" Journal of Social Welfare and Family Law 24, no. 2 (March 2002): 157–73. http://dx.doi.org/10.1080/09649060210136229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gauci, Jean-Pierre. "Protecting Trafficked Persons through Refugee Protection." Social Sciences 11, no. 7 (July 8, 2022): 294. http://dx.doi.org/10.3390/socsci11070294.

Full text
Abstract:
This paper critically engages with the long-term protection of trafficked persons. In particular, it assesses whether, and the conditions under which, trafficked persons can be considered as refugees under Article 1A of the Geneva Refugee Convention. The importance of international refugee law in this context is highlighted both by the number of trafficked persons seeking international protection and by its suitability to overcome the shortcomings of existing protection provisions in anti-trafficking instruments, which remain discretionary, conditional, and limited in scope. The paper begins by discussing the relevance of refugee protection for trafficked persons. It then applies the various components of the refugee definition to trafficked persons, focusing on the concepts of persecution and membership of a particular social group. Within these, it focuses on aspects of the debate that are currently missing from the broader literature. This includes the question of whether trafficking qua trafficking meets the threshold of persecution and the value of developments in international law in that regard, the merit of using race as a convention ground in cases of trafficked persons, and the contribution of legislative developments recognizing former victims of trafficked persons as members of a particular social group. It then concludes by highlighting the benefits of refugee protection for trafficked persons and indicating the challenges on the road to that protection.
APA, Harvard, Vancouver, ISO, and other styles
4

Pérez-Molina, M. J., P. Eguía, D. M. Larruskain, I. Aranzabal, and E. Torres. "Performance of a protection system for DC grids." Renewable Energy and Power Quality Journal 20 (September 2022): 18–23. http://dx.doi.org/10.24084/repqj20.209.

Full text
Abstract:
The development of High Voltage Direct Current (HVDC) transmission technology is still challenging due to unresolved technical issues, mostly in terms of protecting the system. The overcurrents and voltage drop produced by fault conditions are severely dangerous to the Voltage Source Converters’ (VSC) electronic components. Hence, fast protection systems are needed. This paper proposes a fullselective protection system in conjunction with hybrid HVDC circuit breakers. This protection system employs the rate-ofchange-of-voltage and the differential-current algorithms for primary and backup fault protections. This protection scheme is applied to a HVDC grid and an analysis of its performance is presented. This system is evaluated with several fault scenarios that include different fault characteristics. The rate-of-change-ofvoltage algorithm’s fast operation and the differential-current algorithm’s high selectivity are verified.
APA, Harvard, Vancouver, ISO, and other styles
5

Fick, Sarah, and Michel Vols. "Best Protection Against Eviction?" European Journal of Comparative Law and Governance 3, no. 1 (February 21, 2016): 40–69. http://dx.doi.org/10.1163/22134514-00301002.

Full text
Abstract:
This study focuses on two legal instruments that grant robust protection against eviction: the European Convention on Human Rights (echr) and the South African Constitution (sa Constitution). It compares the protection offered by these two instruments to ascertain which of these instruments offer the most comprehensive protection to unlawful occupiers. This is done so as to determine whether and to what extent these instruments should adopt the protections and approaches offered by the other. It is concluded that, although prima facie the instruments offer similar protection, the implementation of the protections under the sa Constitution offers greater protection. While this can be justified by the socio-economic realities in South Africa, some recommendations regarding the implementation of protections under the echr are made.
APA, Harvard, Vancouver, ISO, and other styles
6

Wrennall, Lynne. "Surveillance and Child Protection: De-mystifying the Trojan Horse." Surveillance & Society 7, no. 3/4 (July 6, 2010): 304–24. http://dx.doi.org/10.24908/ss.v7i3/4.4158.

Full text
Abstract:
This paper belongs to an embryonic body of scholarship that documents the camouflaging of political, economic and social agendas under the rhetoric of Child Protection. The Trojan Horse theory of Child Protection, as this scholarship may broadly be termed, alleges the misuse of Child Protection powers for ulterior motives. Years of struggle against the Law and Order, Psychiatric and other discourses have won a raft of Civil and Human Rights protections. Bypassing these protections, Child Protection provides a rhetoric that disguises surveillance and disarms opposition, because a justifiable and apparently benign pretext has been found in the ostensible and entirely laudable, aim of protecting children. The paper collates widespread evidence of how the pretext of Child Protection has been used to extend surveillance and disarm populations.Through the discourse of Child Protection, children are propelled through various constructions from ‘child in need’, to ‘child at risk’, to ‘potentially delinquent’, to ‘delinquent’, but in each case, transgressions of ever more restrictive and constantly morphing laws, regulations and expectations are used to infiltrate techniques of information gathering deeper into more intimate parts of the social body. Child Protection is now used to penetrate where orthodox policing can no longer go. Wherever they are placed in the process of criminalisation, as victim or transgressor, children are constructed as a pretext for expanding power and increasing profit. Transgression by, or against, children, is used to further the economic, political and commercial interests in surveillance. To fully understand the relationship between surveillance and Child Protection, it is necessary to interrogate the information-sharing model that is built into the major Child Protection frameworks. The paper explores the manner in which Child Protection has been structured by the information- sharing model, to benefit the sectional interests in surveillance and the detrimental consequences that this has for children and young people.
APA, Harvard, Vancouver, ISO, and other styles
7

Monika, Monika, and Jarosław Frydrych. "Olej ochronny o niskiej lepkości do czasowej ochrony elementów metalowych przed korozją." Nafta-Gaz 76, no. 11 (November 2020): 864–69. http://dx.doi.org/10.18668/ng.2020.11.12.

Full text
Abstract:
Corrosion of metals is the gradual destruction of metal under the impact of environmental factors. Chemical or electrochemical processes on the surface of the metal cause irreversible changes in the structure of the metal. To prevent this, during storage or transport, the surfaces of metal elements must be protected against environmental factors, which include: high air humidity, acid rain and variable temperature. These factors accelerate the corrosion process, which cannot be eliminated, but can be reduced by protecting metal elements with e.g. protective oils. Some metals have the ability to passivate, which is a natural protective agent that prevents corrosion. It consists in the formation of an oxide of this metal on the metal surface. Where there is no natural protection against corrosion, protective measures must be used. This paper presents the technology for the production of protective oil for temporary protection against corrosion. The innovation of this project is that the oil will form a thin, well adhering protective layer on the metal surface, which can be easily removed. It is characterised by very low viscosity and low dripping time. It is possible to achieve by using proper base oil with carefully selected anti-corrosion additives. Based on the standard PN-75/C-04154 Petroleum products. Rust protection by metal preservatives the humidity cabinet test method, corrosion tests were carried out. The paper presents the results of a humidity cabinet test for an oil mixture based on deeply refined base oil and properly selected refining additives. The test results confirmed very good anti-corrosive properties of the developed oil due to the use of a corrosion inhibitor and an oxidation inhibitor. The thickness of the protective layer formed on the metal surface was calculated based on a mathematical formula. The resulting layer forms a thin oil film, easy to remove and protecting the metal surface from corrosion.
APA, Harvard, Vancouver, ISO, and other styles
8

Luckock, Barry. "Protecting Powers: Emergency Intervention for Children's Protection." Child & Family Social Work 12, no. 4 (November 2007): 442–43. http://dx.doi.org/10.1111/j.1365-2206.2007.00522.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Scotuzzi, C. A. S., and J. M. Adam. "School Protection System: Protecting Who, from Whom?" Procedia - Social and Behavioral Sciences 55 (October 2012): 429–34. http://dx.doi.org/10.1016/j.sbspro.2012.09.521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Reichrath, Priv Doz Dr med Jörg. "Protecting against adverse effects of sun protection." Journal of the American Academy of Dermatology 49, no. 6 (December 2003): 1204–6. http://dx.doi.org/10.1016/s0190-9622(03)02142-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

WALENTYNOWICZ, Jerzy. "PROBLEMS CONNECTED WITH PASSIVE AND ACTIVE PROTECTION OF FIGHTING VEHICLES." Scientific Journal of the Military University of Land Forces 160, no. 2 (April 1, 2011): 218–36. http://dx.doi.org/10.5604/01.3001.0002.2989.

Full text
Abstract:
Basic problems relating to the passive and active protection of present fighting vehicles were introduced in this paper. The scripts of the working of armed strengths and threat what were self- characterized briefly they result from the applied at present armour-piercing guns, such armour-piercing grenade hand launcher, armour-piercing missiles, subcaliber bullets, kinetic bullets, ground mines and improvised explosive devices. Applied at present passive and reactive protections of fighting vehicles were introduced, protecting crews while hitting bullets in vehicles. The stages of detecting the threat and reaction on stepping out threats were analyzed, and this indispensable time on the effective answer of the system of the protection. The means of the counteraction were self- characterized the threats of vehicles, applied in the arrangements of the active protection. Proprieties some of worked out systems of the active protection of fighting vehicles and their basic tactical and technical parameters were introduced.
APA, Harvard, Vancouver, ISO, and other styles
12

Rakhimberdinova, Dilara, Aleksandr Novozhilov, Evgeniy Kolesnikov, Vladimir Goryunov, and Timofey Novozhilov. "Buildup of Fault Protection for High-Current Single-Phase Transformers in Ore Furnaces." Energies 17, no. 11 (May 29, 2024): 2630. http://dx.doi.org/10.3390/en17112630.

Full text
Abstract:
High-power ore furnaces mainly use single-phase transformers supplied by phase-to-phase voltage with the secondary winding made in the form of four to eight isolated splits and a high-voltage busbar assembly made of the same number of pairs of tube buses. Due to these design features, turn-to-turn faults are the main faults in the primary winding of the transformer, and flexible coupling breaks and arc faults in splitting circuits prevail in the high-voltage system. This is why current and gas protections are currently used to protect transformers against short circuits. However, current protections are insensitive to turn faults, and the gas protection response time can be long since it strongly depends on the oil temperature. High-current systems are protected from arc faults only by insulating tube buses. However, this insulation is gradually destroyed under the impact of abrasive dust in the air, and the presence of coal dust in the air creates conditions for arc faults. There is no protection against breaks in the circuits of pairs of tube buses. The extent of damage in a transformer and its high-current system due to the faults can be significantly reduced by using new protection devices based on the measurements of the longitudinal and transverse asymmetry of the stray magnetic fields of the protected transformer. To implement these protections, this article suggests a method for protecting a transformer and a high-current system using magnetic current transformers (MCTs). The number and points for MCT winding coils are determined through the analysis of their EMF values versus their positions relative to the windings of the transformer operating under different modes. The results serve as the basis for the protection circuit design; the protection response threshold is calculated, the protection operation is described, and the results of the experiment are given.
APA, Harvard, Vancouver, ISO, and other styles
13

Xie, Guangxu, Gaopan Hou, Qingqi Pei, and Haibo Huang. "Lightweight Privacy Protection via Adversarial Sample." Electronics 13, no. 7 (March 26, 2024): 1230. http://dx.doi.org/10.3390/electronics13071230.

Full text
Abstract:
Adversarial sample-based privacy protection has its own advantages compared to traditional privacy protections. Previous adversarial sample privacy protections have mostly been centralized or have not considered the issue of hardware device limitations when conducting privacy protection, especially on the user’s local device. This work attempts to reduce the requirements of adversarial sample privacy protections on devices, making the privacy protection more locally friendly. Adversarial sample-based privacy protections rely on deep learning models, which generally have a large number of parameters, posing challenges for deployment. Fortunately, the model structural pruning technique has been proposed, which can be employed to reduce the parameter count of deep learning models. Based on the model pruning technique Depgraph and existing adversarial sample privacy protections AttriGuard and MemGuard, we design two structural pruning-based adversarial sample privacy protections, in which the user obtains the perturbed data through the pruned deep learning model. Extensive experiments are conducted on four datasets, and the results demonstrate the effectiveness of our adversarial sample privacy protection based on structural pruning.
APA, Harvard, Vancouver, ISO, and other styles
14

Wang, Yuxue, Wei Liu, Shaolin Jiao, Zeya Fang, Yiquan Li, and Minghao Wen. "Substation-area Backup Protection Scheme for the Failure of 10kV Line Protection Device." Journal of Physics: Conference Series 2087, no. 1 (November 1, 2021): 012009. http://dx.doi.org/10.1088/1742-6596/2087/1/012009.

Full text
Abstract:
Abstract The research on wide-area backup protection for high-voltage transmission lines has made certain progress in recent years, but there are few reports published on substation-area backup protection for low-voltage 10kV transmission lines. Based on the characteristics of shared information in intelligent substation, a substation-area backup protection scheme to deal with the failure of 10kV line protection device is proposed in this paper. This scheme uses the device self-test information and heartbeat mechanism to monitor the operation status of 10kV line protection devices; to realize the substation-area backup protection for the 10kV transmission lines when any line protection device fails, the protection criterion is constructed by the action results of power directional elements of transformer protections and other 10kV line protections. The proposed scheme can greatly improve the speed of the fault isolation and has low requirements for data demand and synchronization. PSCAD simulation results show that the proposed method is with high correctness and feasibility.
APA, Harvard, Vancouver, ISO, and other styles
15

Azahra, Astrid Sulistya, Yaza Azzahara Ulyana, and Ahmad Riyansyah. "Legal Protection and Criminal Implications of Mistreatment of Minors: Analysis Based on Child Protection Law Number 35 of 2014." International Journal of Humanities, Law, and Politics 1, no. 3 (October 27, 2023): 31–35. http://dx.doi.org/10.46336/ijhlp.v1i3.35.

Full text
Abstract:
This study discusses the abuse of minors and the legal implications and protections afforded to victims. Child maltreatment is an act of violence involving minors under the age prescribed by law, including physical, emotional, and sexual abuse. The Child Protection Law regulates cases of child abuse and provides a strong legal basis for protecting children's rights. The criminal implications of child maltreatment include various legal consequences imposed on perpetrators, such as imprisonment and fines. The main purpose of these criminal implications is to ensure justice for victims, prevent the repetition of similar crimes, and give an unequivocal message that child maltreatment is unacceptable. Protection of victims of child abuse covers a wide range of aspects, including victims' rights to feel safe, privacy, physical and psychological recovery, uninterrupted education, justice in due process, fair compensation, and effective protection from authorities. Parents also have an important role in providing protection to children who are victims. Cooperation from various parties, including the state, government, community, and family, as well as the implementation of strong laws, are expected to prevent cases of abuse of minors, ensure the protection and recovery of victims, and realize justice.
APA, Harvard, Vancouver, ISO, and other styles
16

BARĆ, Marek. "Critical infrastructure protection." Scientific Bulletin of Flight Academy. Section: Economics, Management and Law 3;4 (February 25, 2021): 207–11. http://dx.doi.org/10.33251/2707-8620-2021-3-4-207-211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Aksatha, Mrs D. Seema Dev, and M. Blessing Marshal. "Software Piracy Protection." International Journal of Trend in Scientific Research and Development Volume-3, Issue-3 (April 30, 2019): 243–46. http://dx.doi.org/10.31142/ijtsrd21705.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Gilani, Syed Raza Shah, Zahid Ullah, and Aisha Nayab Qureshi. "LEGAL AND POLITICAL PERSPECTIVES ON CONSUMER PROTECTION LAWS IN POST-BREXIT BRITAIN: AN ANALYSIS." Pakistan Journal of Social Research 05, no. 02 (June 30, 2023): 386–92. http://dx.doi.org/10.52567/pjsr.v5i02.1093.

Full text
Abstract:
This article explores laws related to the protection of, and challenges to, consumer rights in the UK after its peoples’ decision to withdraw from the European Union (EU, henceforth) in 2016. Consumer protection laws are formulated and enacted to safeguard consumers from illegal and deceitful behavior of traders and salesmen, etc., and provide buyers with a range of legal guarantees and protections. These laws deal with a number of issues such as the safety of the products used by citizens, criminalize not only false advertising, but also excessive pricing, and breach of contract terms. In the UK, the main piece of consumer protection legislation is the Consumer Rights Act 2015. However, despite the existence of consumer protection laws and regulations, problems still occur, and consumers can still fall victim to fraudulent or unethical business practices. Therefore, it is important for consumers to be informed about their rights and to be vigilant in protecting themselves from scams and other forms of consumer fraud. Additionally, consumer protection is an issue that is constantly evolving as new technologies and business models emerge. For example, the rise of e-commerce and online marketplaces has created new challenges for consumer protection, as consumers may not always know who they are buying from or how to resolve disputes with online sellers. Keywords: Consumer Rights, UNO Guided Principles for consumer protection, Consumer rights and UK Legal System.
APA, Harvard, Vancouver, ISO, and other styles
19

Sirota, Eric. "The Rental Crisis Will Not Be Televised: The Case for Protecting Tenants Under Consumer Protection Regimes." University of Michigan Journal of Law Reform, no. 54.3 (2021): 667. http://dx.doi.org/10.36646/mjlr.54.3.rental.

Full text
Abstract:
The Foreclosure Crisis of the 2000s has likely hurt renters more than homeowners. Incongruously, however, consumer enforcement agencies have been far more zealous in protecting mortgagors than tenants. This Article explores the under-protection of tenants as a class of consumers, particularly in a “commoditized” rental market, and examines how consumer enforcement agencies can more zealously incorporate tenant-protection into their mandates. Much of the prior literature on the legal protections afforded tenants was published in the wake of the consumer rights revolution of the 1970s. This Article is the first to carefully reexamine, in the context of the modern rental market, whether tenants should be protected as consumers and whether tenants have truly reaped the benefits of consumer gains over the last half-century. The Article analyzes original interviews with state consumer protection agencies, engages in the first broad survey of state and federal tenant protection enforcement actions, and provides a new review of the caselaw addressing whether tenants are covered by consumer protection regimes. Concluding that achieving systemic change through broad-scale policing of the rental industry is both vital and often overlooked, the Article proposes specific reforms that consumer protection agencies can adopt to better protect tenants.
APA, Harvard, Vancouver, ISO, and other styles
20

Shabalin, Andrii. "Judicial procedural issues of choosing an effective method of legal protection in civil cases." Theory and Practice of Intellectual Property, no. 3 (September 7, 2021): 67–75. http://dx.doi.org/10.33731/32021.239585.

Full text
Abstract:
Keywords: civil procedural protection, court effective way of protection, civilprocess The article is devoted to the study of Civil Procedureaspects of the court's application of a proper and effective method of protecting aviolated right within the frame of its own judicial discretion. Attention is paid to thestudy of the legal nature of civil protection, existing doctrinal positions, as well as thelegal and regulatory environment. The features of the exercise of discretionary powersby the court regarding the use of an effective method of protecting violated privatelaw have been established. It is indicated that the court is empowered to choose an effectivemethod of legal protection exclusively within the limits of the statement ofclaim — claims are detailed. It is emphasized that when choosing an effective methodof protection, the principle of the rule of law must be observed, in accordance with theprovisions of Article 10 of the Civil Procedural Code of Ukraine (“CPCU”). This meansthat an effective method of legal protection must be correlated with the provisions ofthe Convention for the protection of human rights and fundamental freedoms and thecase law of the European Court of Human Rights. This universal provision applies toall cases of claim proceedings, namely the claim, which are decided by the rules ofcivil procedure. The peculiarity of the court's use of an effective method of protectionin civil cases is that it can choose an effective method of legal protection only in courtcases in which the claim is considered, as well as when the law or agreements do notdetermine the effective method of legal protection. On the basis of the conducted scientificresearch, the author has developed own gradation of legal criteria of choice bycourt of an effective way of legal protection at consideration of civil cases. Such a gradationis universal for all cases considered by the court under the rules of civil procedure.Exceptions to the above regarding the application of a specific method of protectionare cases related to compensation for damage caused to an individual as a resultof withdrawal of an insolvent bank from the market or liquidation of the bank.
APA, Harvard, Vancouver, ISO, and other styles
21

Yusypenko, O. "Methodical approaches of land registration formation of recreational land use of water protection zones and coastal protective strips." Zemleustrìj, kadastr ì monìtorìng zemelʹ, no. 3 (August 28, 2021): 10. http://dx.doi.org/10.31548/zemleustriy2021.03.10.

Full text
Abstract:
Today, in the conditions of transformational transformations, the recreational potential of reservoirs is used only partially, in connection with the priority of development of other branches of activity (health-improving). This is despite the fact that the value of water resources is involved in the processes of all areas of activity. That is why the issue of land management formation of recreational land use of water protection zones and coastal protection strips requires an integrated approach. Which is carried out through the assessment of recreational and tourist potential of territories and settlements to emphasize the characteristics and features that are important in the implementation of recreational activities and have a direct impact on the planning organization of land use. For the purpose of verifying the set of general intelligence, the author schematically presents the concept of "structural components that form the land use of cultural landscapes ". It has been established that in a city, the assessment of the attractiveness of land use of landscapes for recreational activities should determine the originality of recreational land use in accordance with regional and local specifics and landscape diversity. It has been seen that as a result of using various methodological approaches to assessing the recreational potential of land use of the water protection zone and the coastal protection strips, the following should be established: the recreational capacity of land use of the territory; permissible recreational load; recreational digression. In addition, according to the results of the assessment, it is proposed to divide the recreational land use of the territories of water protection zones and coastal protection strips by popularity rating, in particular, with high, medium and low potential values. As an example, the state of recreational potential in Kyiv was considered and it was established that the land management arrangement of the city needs an immediate solution for further development of recreational land use. Also, the author, due to the lack of established boundaries of water protection zones, presents a characteristic of acute social and environmental problems of land use of water bodies in Kyiv. It has been established that if there are restrictions on the use of land and other natural resources, but there is no information about them, then there is a possibility of the occurrence of various types of damage to the land use of water protection zones and coastal strips. That is why, it is proposed to allocate functional land use zones of the coastal protection strips by types of development, which will allow more efficient use of the existing potential of recreational land use of water protection zones and coastal protection strips within Kyiv and its greening and generally increase capitalization. Keywords: recreational land use, water protection zones, coastal protection strips, functional areas
APA, Harvard, Vancouver, ISO, and other styles
22

Burgund, Davorin, and Srete Nikolovski. "Improved Model of Thermal Rotor Protection Including Negative Sequence Protection." Energies 15, no. 7 (March 24, 2022): 2391. http://dx.doi.org/10.3390/en15072391.

Full text
Abstract:
The paper presents a new model of the thermal rotor protection 49R on synchronous generators with self-excitation with the influence of generator negative sequence protection 46I2. The purpose of the analysis is to solve the problem of simultaneous occurrence of rotor overload due to excitation current and rotor overload due to the inverse component of the stator current. The numerical protections are designed to operate independently of each other, and therefore the residual thermal capacity of the copper windings is not defined with higher precision. A mathematical model that integrates these two protections is given and described.
APA, Harvard, Vancouver, ISO, and other styles
23

Klavs, Dejan. "Radiation protection in pediatric radiography – Introducing some immobilization and protection equipment." Paediatrics Today 12, no. 1 (March 15, 2016): 81–86. http://dx.doi.org/10.5457/p2005-114.139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Nodirbekovna, Rakhmonova Mohichehra. "INTERNATIONAL LEGAL PROTECTION AND MECHANISM FOR THE PROTECTION OF TRADEMARK RIGHTS." American Journal of Applied Science and Technology 03, no. 02 (February 1, 2023): 44–64. http://dx.doi.org/10.37547/ajast/volume03issue02-06.

Full text
Abstract:
This article analyzes the procedure for resolving disputes in the field of intellectual property, in particular the mechanism for the protection of trademark rights at the national and international levels, identifies the main problems existing in the legislation and law enforcement practice on the issues of parallel import and introduction into civil circulation of counterfeit products in the Republic of Uzbekistan. The concept of terms such as counterfeit and parallel imports, which includes practices and international acts in the field of intellectual property, is also investigated
APA, Harvard, Vancouver, ISO, and other styles
25

Bertin, Joan E. "People Protection Not “Fetal Protection”." NEW SOLUTIONS: A Journal of Environmental and Occupational Health Policy 2, no. 1 (May 1992): 5–9. http://dx.doi.org/10.2190/ns2.1.b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Ineli-Ciger, Meltem. "Protection Gaps and Temporary Protection." Max Planck Yearbook of United Nations Law Online 20, no. 1 (August 29, 2017): 408–35. http://dx.doi.org/10.1163/13894633_02001013.

Full text
Abstract:
The Convention relating to the Status of Refugees (the 1951 Convention) does not address all the challenging questions posed by contemporary forced migration. The 1951 Convention does not deal with persons fleeing armed conflict, admission and large-scale movement of forced migrants in a clear and comprehensive manner. In addition to this, restrictive interpretation of the refugee definition provided in Art. 1 A (2) of the 1951 Convention by State authorities, popularity of non-entrée policies and the absence of solidarity in response to large-scale forced migration movements create protection gaps. A number of initiatives have been adopted at the national, regional and international level to remedy these gaps and one of them is temporary protection. This article focuses on protection gaps and temporary protection. The first part of the article explores the extent to which the 1951 Convention deals with persons fleeing armed conflict, admission and mass-influx situations, and it seeks to clarify the reason why there are protection gaps concerning these issues. Building on this analysis, the second part of the article defines temporary protection by reviewing temporary protection policies in Turkey, the United States and the European Union and it explores to what extent temporary protection regimes can remedy protection gaps and provide effective protection to forced migrants.
APA, Harvard, Vancouver, ISO, and other styles
27

Zi, Xie, Dong Liucan, and Zhang Yongxing. "Radiation protection and environmental protection." Progress in Nuclear Energy 28, no. 1 (January 1994): 75–89. http://dx.doi.org/10.1016/0149-1970(94)90018-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Okafor, Obiora Chinedu. "On the Legality Under International Law of the Criminalization or Suppression of the Expression of Solidarity to Refugees." Proceedings of the ASIL Annual Meeting 114 (2020): 102–13. http://dx.doi.org/10.1017/amp.2021.15.

Full text
Abstract:
As Professor Jastram has noted, in and of itself, international refugee law is not explicit enough on the issue at hand. It is not clear enough in protecting persons who come in aid of, or show solidarity to, refugees or asylum-seekers. That does not mean, however, that no protections exist for them at all in other, if you like, sub-bodies of international law. This presentation focuses on the nature and character of those already existing international legal protections, as well as on any protection gaps that remain and recommendations on how they can be closed. It should be noted though that although the bulk of the presentation focuses on the relevant international legal protection arguments, this presentation begins with a short examination of the nature of the acts of criminalization and suppression at issue.
APA, Harvard, Vancouver, ISO, and other styles
29

Mulhimmah, Baiq Ratna, and Ridwan Olagunju. "Effectiveness of Islamic Law in Protecting The Copyright of Indigenous Peoples of Indonesia in The Form of Traditional Knowledge & Traditional Cultural Expressions." Jurnal IUS Kajian Hukum dan Keadilan 10, no. 3 (December 26, 2022): 581–94. http://dx.doi.org/10.29303/ius.v10i3.1141.

Full text
Abstract:
Copyright Protection of Indonesian Indigenous Peoples in the form of Traditional Knowledge (TK) &Traditional Cultural Expression (TCE) currently does not meet the sense of justice. The state is obliged to provide comprehensive protections capable of guarding the rights of Indigenous peoples under an adequate legal umbrella. Because the existence of Indigenous peoples, along with copyrights in the form of TK & TCE is part of the wealth and identity of the nation, this research focuses on how the view of Islamic law (Legal Opinion of Indonesian Ulama Council No.1 of 2003 concerning Copyright and Legal Opinion Of Indonesian Ulama Council No.1 of 2005 concerning Intelectual Property Right) with the maqasid al Shari’ah approach in protecting the rights of indigenous peoples. Islamic law is one of the secondary legal materials in determining state law and is expected to strengthen in providing solutions to this problem. The research method is normative with a concept and case approach to conclude that Islamic law (legal Opinion Of Indonesian Ulama Council) with the Maqasid al Shari’ah approach in protecting Traditional Knowledge (TK) &Traditional Cultural Expression (TCE) is a must. This is based on an obligation order covering several matters, including; the protection of life and hifzul nafsi/hifzul ‘irdhi, protection of reason (hifzul aqli), and protection of property (hifzul maal).
APA, Harvard, Vancouver, ISO, and other styles
30

Lemchen, Marc S. "Sound protecting headset with proximity collision avoidance protection." Journal of the Acoustical Society of America 120, no. 3 (2006): 1169. http://dx.doi.org/10.1121/1.2355965.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Liu, Tao, Hao Yao, Tao Jiang, and Bing Da Zhang. "Digital Protection Test Platform Based on RTDS." Applied Mechanics and Materials 380-384 (August 2013): 3417–20. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.3417.

Full text
Abstract:
As IEC61850 has become the general international standard of substation communication, protections and the other secondary devices have new characteristics of digitization and network. The input signal is no longer the traditional analog alternating current component and the protection trip switch, SMV Message and Goose Message instead. The network performance is more and more important and normal relay protection test device is no longer suitable for digital protections. This paper has analyzed the transmission methods of the SMV message and GOOSE message, developed the digital protection test platform based on RTDS and put forward a digital protection test interface design based on FPGA.
APA, Harvard, Vancouver, ISO, and other styles
32

Alzumai, Fahad A., and Fahad N. Alshammari. "Balancing Business Objectives and Shareholders’ Rights in Voluntary Delisting: a Comparative Analysis of Selected Legal Jurisdictions." Comparative Law Review 29 (December 4, 2023): 45–71. http://dx.doi.org/10.12775/clr.2023.002.

Full text
Abstract:
Delisting a company from the stock market often negatively affects the interests of all related parties. For shareholders, the main detriment is their loss of the ability to trade and sell their shares on the open stock market. As voluntary delistings become a more prevalent market phenomenon worldwide, countries are seeking to implement regulatory protections during the process. The aim of this paper is to make a comparative analysis of the protection of shareholders during delisting across multiple jurisdictions including the United States, the UK, Germany, India, and Thailand that have adopted different regimes for protecting shareholders during a company’s voluntary delisting. The goal is to answer the question of which shareholder protection instruments in the covered jurisdictions have adopted to protect shareholder and company interests during delisting, and also to question the effectiveness of investor protection in voluntary delisting. The paper offers potential ways to better protect the rights of shareholders during the voluntary delisting process to achieve a balanced regulation of different corporate actors’ interests.
APA, Harvard, Vancouver, ISO, and other styles
33

Uspensky, M. I. "Dependability factors of microprocessor protection software." Dependability 23, no. 3 (August 22, 2023): 73–77. http://dx.doi.org/10.21683/1729-2646-2023-23-3-73-77.

Full text
Abstract:
Aim. An analysis of the distinctive features of the functional dependability of software that are common to critical real-time applications in respect to microprocessor protections. Dependability indicators are among the primary operational characteristics of relay protection. As such protections migrate to microprocessor technology, it became necessary to characterise their operation and dependability with software dependability along the hardware dependability. The importance of the tasks it solves in the process of operation puts it into the category of programs used in critical real-time applications. That, in turn, toughens the requirements for their dependability evaluation.Methods. The comparative analysis allowed evaluating the unity of the examined operational dependability factors of the software as part the examined applications, while identifying certain distinctive features that are common to relay protections that use microprocessors.Results. The paper provides an example of such estimation that shows that, given all the complexity of testing microprocessor protection programs, the contribution of software errors still is 2,5% from the overall contribution.Conclusion. It is shown that microprocessor protection programs fall into the category of critical real-time application programs, which allows using the experience and characteristics of such software as part of relay protection. Nevertheless, the paper cites certain distinctive features that are common only to microprocessor-based relay protection. Further tasks are specified.
APA, Harvard, Vancouver, ISO, and other styles
34

Twomey, Christina, and Katherine Ellinghaus. "Protection." Pacific Historical Review 87, no. 1 (2018): 2–9. http://dx.doi.org/10.1525/phr.2018.87.1.2.

Full text
Abstract:
This article is the guest editors’ introduction to a special volume of Pacific Historical Review entitled “Protection: Global Genealogies, Local Practices.” Guest editors Christina Twomey and Katherine Ellinghaus argue that the global discourse of protection had a strong presence beyond British humanitarian circles and a longer chronological and larger geographical reach than historians have previously noted. Articles in the special volume include Christina Twomey’s examination of protection as a concept with its origins in European, rather than British, colonialism, Trevor Burnard’s study of the Protectors of slaves in Berbice in the early to mid-nineteenth century, Goolam Vahed’s analysis of the Protectors appointed to lobby on behalf of immigrant Indian indentured labourers in late nineteenth century Natal, Rachel Standfield’s investigation of the use of language in Protectorates in Australia and New Zealand in the 1840s, Amanda Nettelbeck’s exploration of the concept of Aboriginal vagrancy in Australia in the 1840s, and Katherine Ellinghaus’s comparison of the discourse of protection in policies of exemption and competency utlised in Oklahoma and New South Wales in the 1940s and 1950s.
APA, Harvard, Vancouver, ISO, and other styles
35

Frank X Walker. "Protection." Appalachian Heritage 36, no. 3 (2008): 33. http://dx.doi.org/10.1353/aph.0.0077.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

DZUBOW, LEONARD M. "Protection." Journal of Dermatologic Surgery and Oncology 18, no. 10 (October 1992): 853. http://dx.doi.org/10.1111/j.1524-4725.1992.tb02915.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Lorenz, Susan G. "Protection." Holistic Nursing Practice 21, no. 3 (May 2007): 115–23. http://dx.doi.org/10.1097/01.hnp.0000269148.42861.62.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Bakkar, Mostafa, Santiago Bogarra, Felipe Córcoles, Ahmed Aboelhassan, Shuo Wang, and Javier Iglesias. "Artificial Intelligence-Based Protection for Smart Grids." Energies 15, no. 13 (July 5, 2022): 4933. http://dx.doi.org/10.3390/en15134933.

Full text
Abstract:
Lately, adequate protection strategies need to be developed when Microgrids (MGs) are connected to smart grids to prevent undesirable tripping. Conventional relay settings need to be adapted to changes in Distributed Generator (DG) penetrations or grid reconfigurations, which is a complicated task that can be solved efficiently using Artificial Intelligence (AI)-based protection. This paper compares and validates the difference between conventional protection (overcurrent and differential) strategies and a new strategy based on Artificial Neural Networks (ANNs), which have been shown as adequate protection, especially with reconfigurable smart grids. In addition, the limitations of the conventional protections are discussed. The AI protection is employed through the communication between all Protective Devices (PDs) in the grid, and a backup strategy that employs the communication among the PDs in the same line. This paper goes a step further to validate the protection strategies based on simulations using the MATLABTM platform and experimental results using a scaled grid. The AI-based protection method gave the best solution as it can be adapted for different grids with high accuracy and faster response than conventional protection, and without the need to change the protection settings. The scaled grid was designed for the smart grid to advocate the behavior of the protection strategies experimentally for both conventional and AI-based protections.
APA, Harvard, Vancouver, ISO, and other styles
39

Erdos, David. "EUROPEAN UNION DATA PROTECTION LAW AND MEDIA EXPRESSION: FUNDAMENTALLY OFF BALANCE." International and Comparative Law Quarterly 65, no. 1 (January 2016): 139–83. http://dx.doi.org/10.1017/s0020589315000512.

Full text
Abstract:
AbstractThe European Data Protection Directive 95/46/EC requires all European Economic Area (EEA) jurisdictions to provide an equivalent regime protecting the privacy and other fundamental rights and freedoms of natural persons in relation to personal data processing, whilst also shielding media expression from the default substantive requirements as necessary to ensure a balance between fundamental rights. Through a comprehensive coding of the derogations set out in each jurisdiction's data protection laws, this article provides the first systematic analysis of whether this has in fact been achieved. It is demonstrated that there is a total lack of even minimal harmonization in this area, with many laws providing for patently unbalanced results especially as regards the publication of sensitive information, which includes criminal convictions and political opinion, and the collection of information without notice direct from the data subject. This reality radically undermines European data protection's twin purposes of ensuring the free flow of personal data and protecting fundamental rights, an outcome which remains largely unaddressed by the proposed new Data Protection Regulation. Practical suggestions are put forward to ameliorate these troubling inconsistencies within the current process of reform.
APA, Harvard, Vancouver, ISO, and other styles
40

Lászó, Erika. "Protection Capacities and Local Environmental Protection." Hadtudományi Szemle 13, no. 3 (2020): 147–62. http://dx.doi.org/10.32563/hsz.2020.3.11.

Full text
Abstract:
One of the fundamental areas of safety and security is environmental safety/security. In addition to and in cooperation with governmental organisations, citizens and municipalities also have a role to play. Today’s events have proved that the capacities are finite, so, it is not incidental what municipalities can undertake in the field of environmental protection. It is timely to examine this issue, as in the epidemic period of 2020, all areas of the protection sector need to review their capacities and know what the municipalities currently involved in protection administration will be capable to perform in the field of environmental protection and in what fields they will be prompted to seek the help of protection organisations. In this article, the author uses a questionnaire survey to provide an overview of the topic in order to examine the extent to which the principle of subsidiarity can be applied to the protection sphere.
APA, Harvard, Vancouver, ISO, and other styles
41

Borgatta, Lynn, Michael Fisher, and Noah Robbins. "Hand Protection and Protection from Hands." Women & Health 15, no. 4 (January 8, 1990): 77–92. http://dx.doi.org/10.1300/j013v15n04_04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Imai, Susumu, Hajime Katayama, and Kala Krishna. "Protection for sale or surge protection?" European Economic Review 53, no. 6 (August 2009): 675–88. http://dx.doi.org/10.1016/j.euroecorev.2009.02.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Whiteford, Peter. "From Enterprise Protection to Social Protection." Global Social Policy: An Interdisciplinary Journal of Public Policy and Social Development 3, no. 1 (April 2003): 45–77. http://dx.doi.org/10.1177/1468018103003001011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

HARRYMAN, M. B. M. "Water Source Protection and Protection Zones." Water and Environment Journal 3, no. 6 (December 1989): 548–50. http://dx.doi.org/10.1111/j.1747-6593.1989.tb01433.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

de Pastors, Alice. "Plant protection product supplementary protection certificates." World Patent Information 22, no. 1-2 (March 2000): 59–61. http://dx.doi.org/10.1016/s0172-2190(00)00030-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Gama, Cruz. "Data protection and personal data protection." Brazilian Journal of Clinical Medicine and Review 1, Suppl.1 (April 15, 2023): 18. http://dx.doi.org/10.52600/2965-0968.bjcmr.2023.1.suppl.1.18.

Full text
Abstract:
In Angola, the right to privacy is one of the fundamental rights enshrined in the Constitution of the Republic. In addition to the Constitution, the legal framework on the protection of personal data is complemented by other laws, with regard to the Personal Data Protection Law, No. 22/11 of 17 June, which establishes legal rules for the processing of such data and establishes Data Protection (DPA), as the public authority responsible for monitoring compliance with those rules and exercising. The unequivocal and express consent of the data subject or his legal representative and prior notification to the APD are the general requirements for the processing of personal data, without prejudice to the principles and other specific requirements applicable to sensitive data. Only health professionals registered in the respective professional associations are qualified to process health data, and must observe professional secrecy. Data holders are assured the exercise of their rights to information, access, rectification, updating and deletion of their data. Security measures must be implemented to ensure confidentiality, integrity and availability of information. In conclusion, in Angola there is no prohibition on the processing of personal data, what the legislator imposes is that it be done with transparency and legality, aiming at protecting its holders from situations of vulnerability, including stigmatization, discrimination, observing dignity of the human person as one of the fundamental principles of ethics, especially in scientific research.
APA, Harvard, Vancouver, ISO, and other styles
47

Chamberlain, Johanna, and Andreas Kotsios. "Data protection beyond data protection regulation." Stiftelsen Juridisk Fakultetslitteratur, no. 2024 2 (January 17, 2024): 397–424. http://dx.doi.org/10.53292/bd1fa11c.282687ef.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Zhang, Hong-Yue, Yi Shi, Hai-Long Chen, and Li-Hu Feng. "Adaptability of protection principle of converter protection in different protection areas." IOP Conference Series: Earth and Environmental Science 186 (October 11, 2018): 012017. http://dx.doi.org/10.1088/1755-1315/186/3/012017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Cegła, Marcin. "SPECIAL CERAMICS IN MULTILAYER BALLISTIC PROTECTION SYSTEMS." PROBLEMY TECHNIKI UZBROJENIA 147, no. 3/2018 (January 4, 2019): 63–74. http://dx.doi.org/10.5604/01.3001.0012.8312.

Full text
Abstract:
The paper presents some questions of designing and testing for modern ballistic protecting screens and applied materials especially such as ceramics. Continuous development of present ballistic composite materials enforces the optimisation of existing solutions for ballistic protections in respect to the mass, thickness and costs of material. In times of technological arm race a reduction of armour weight by 5% is a success. It may be achieved by development of new solutions of armour systems applying the newest materials. Ballistic ceramics both enhances the resistance of the armour against armour piercing projectiles and reduces its areal dencity in relation to traditional steel armours due to high mechanical properties, low density, high hardness and dissipation of energy at the mechanism of breaking. The paper illustrates the development of ceramic based armours and the structure of a multilayer ballistic protection, and finally the meaning of its particular layers in fighting the projectile. Moreover the impact of mechanical properties of some ceramic materials used for designing a protection system into its ballistic resistance is discussed.
APA, Harvard, Vancouver, ISO, and other styles
50

Dragoi, Calin. ""CHILD SOCIAL PROTECTION" RECODED." Journal Plus Education 18, no. 2/2017 (November 8, 2017): 196–203. http://dx.doi.org/10.24250/jpe/2/2017/cd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography