5,946 research outputs found

    Development of durable โ€œgreenโ€ concrete exposed to deicing chemicals via synergistic use of locally available recycled materials and multi-scale modifiers

    Get PDF
    From the economic and social perspectives, the use of waste materials would not be attractive until their costs and quality can satisfy the construction requirements. In this study, a pure fly ash paste (PFAP) was developed in place of ordinary Portland cement paste (OPCP). This PFAP was prepared at room temperature and without direct alkali activation. The samples were prepared using only the as-received class C coal fly ash, water, and a very small amount of borax (Na2B4O7). On average, the PFAP featured 28-d compressive strength of about 36 MPa, and micro-nano hardness and elastic modulus 29% and 5%, higher than the OPCP, respectively. These mechanical and other properties of the PFAP make it a viable โ€œgreenโ€ construction binder suitable for a host of structural and non-structural applications. Advanced characterization of the raw material and PFAP pastes was employed to elucidate the hydration mechanisms of this โ€œgreenโ€ binder. The obtained knowledge sheds light on the role of class C CFA in the hydration process and may benefit the expanded use of various CFAs in cementitious materials

    A Framework for Life Cycle Sustainability Assessment of Road Salt Used in Winter Maintenance Operations

    Get PDF
    It is important to assess from a holistic perspective the sustainability of road salt widely used in winter road maintenance (WRM) operations. The importance becomes increasingly apparent in light of competing priorities faced by roadway agencies, the need for collaborative decision-making, and growing concerns over the risks that road salt poses for motor vehicles, transportation infrastructure, and the natural environment. This project introduces the concept of Life Cycle Sustainability Assessment (LCSA), which combines Life Cycle Costing, Environmental Life Cycle Assessment, and Social Life Cycle Assessment. The combination captures the features of three pillars in sustainability: economic development, environmental preservation, and social progress. With this framework, it is possible to enable more informed and balanced decisions by considering the entire life cycle of road salt and accounting for the indirect impacts of applying road salt for snow and ice control. This project proposes a LCSA framework of road salt, which examines the three branches of LCSA, their relationships in the integrated framework, and the complexities and caveats in the LCSA. While this framework is a first step in the right direction, we envision that it will be improved and enriched by continued research and may serve as a template for the LCSA of other WRM products, technologies, and practices

    With special reference to GDPR

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (์„์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ๋ฒ•๊ณผ๋Œ€ํ•™ ๋ฒ•ํ•™๊ณผ(์ง€์‹์žฌ์‚ฐ์ „๊ณต), 2021. 2. ์ •์ƒ์กฐ.The prolonged exposure and retention of a massive amount of personal information on the Internet, as well as the frantic pursuit of data by companies and individuals in the age of big data, have created a new privacy crisis. As a legal response to the eternal memory of the Internet, the European Union has proposed The Right to Be Forgotten to tackle the privacy crisis by empowering individuals to take down ones information from the Internet in certain circumstances. Regarding such a right, what kind of attitude should the Chinese legal system adopt? Should it follow the European footsteps or maintain a more cautious stance on this right? As an emerging right originated from Europe, the study of the EUs attempts to construct and implement the right to be forgotten could provide a clear lens of the new right. Thus, the article will carefully study the EUs legislation in the General Data Protection Regulation (GDPR) and the implementation of the right to be forgotten. It attempts to analyze the connotation, the value conflict, and enforcement dilemmas of the new right. And on this basis, the article will explore whether there is room for localization of the right to be forgotten in China based on chinas national conditions. The paper consists of seven chapters: Chapter 1 examines the rationale of the right to be forgotten, revealing the foundation for the generation and growth of the right in Europe. Chapter 2 tracks back the legislative history of the right to be forgotten in the EU. It reveals how the right has been conceptualized over time and attempts to clarify the underlying values in the right to be forgotten. Chapter 3 attempts to delineate the scope of the right to be forgotten and explore what kinds of data are worth forgetting. Chapter 4 discusses the enforcement dilemma of the right to be forgotten, especially the role of search engines in the context of the right to be forgotten, and its ensuing obligations as a data controller. Chapter 5 turns the focus back to China. By sketching the framework of privacy and data protection law in china with a comparison to the right to be forgotten in the EU, it attempts to assess whether such legislative actions imply the right to be forgotten. Chapter 6 introduces the judicial practice of the right to be forgotten in China: Renjiayu v Baidu, which is called the First case of the right to be Forgotten in china. Through the interpretation of the judgments of the two trials, it can clarify the path of protecting the right to be forgotten under the existing Chinese law and the reject reasons, as well as the judges attitude to the right. The last Chapter 7 analyzes the possibility of Chinas introduction of the right to be forgotten from the perspective of necessity and the obstacles based on chinas national status.์ธํ„ฐ๋„ท์ƒ์—์„œ์˜ ์ˆ˜๋งŽ์€ ๊ฐœ์ธ์ •๋ณด์˜ ์žฅ๊ธฐ๊ฐ„ ๋…ธ์ถœ๊ณผ ๋ณด์œ , ๋˜ ๋น…๋ฐ์ดํ„ฐ ์‹œ๋Œ€์— ํšŒ์‚ฌ์™€ ๊ฐœ์ธ๋“ค์ด ๋ฐ์ดํ„ฐ์— ์—ด๊ด‘ํ•˜๋ฉด์„œ ์ƒˆ๋กœ์šด ํ”„๋ผ์ด๋ฒ„์‹œ ์œ„๊ธฐ๊ฐ€ ์ฐพ์•„์˜ค๊ณ  ์žˆ๋‹ค. ์œ ๋Ÿฝ ์—ฐํ•ฉ์€ ์ธํ„ฐ๋„ท์˜ ์˜์›ํ•œ ๊ธฐ์–ต์— ๋Œ€ํ•œ ๋ฒ•์  ๋Œ€์‘์œผ๋กœ '์žŠํ˜€์งˆ ๊ถŒ๋ฆฌ'๋ฅผ ๋‚ด์„ธ์› ๊ณ , ๊ฐœ์ธ์—๊ฒŒ ํŠน์ • ์ƒํ™ฉ์—์„œ ์ž์‹ ์˜ ์ •๋ณด๋ฅผ ์ธํ„ฐ๋„ท์—์„œ ์‚ญ์ œํ•˜๋„๋ก ๊ถŒํ•œ์„ ๋ถ€์—ฌํ•จ์œผ๋กœ์จ ์ด๋ฒˆ ํ”„๋ผ์ด๋ฒ„์‹œ ์œ„๊ธฐ๋ฅผ ํ•ด๊ฒฐํ•  ์ˆ˜ ์žˆ๋„๋ก ํ–ˆ๋‹ค. ์ด๋Ÿฌํ•œ ๊ถŒ๋ฆฌ์— ๋Œ€ํ•ด ์ค‘๊ตญ์˜ ๋ฒ• ์ œ๋„๋Š” ์–ด๋–ค ํƒœ๋„๋ฅผ ์ทจํ•ด์•ผ ํ•˜๋Š”๊ฐ€? ์œ ๋Ÿฝ์„ ๋”ฐ๋ผ์•ผ ํ•˜๋Š”๊ฐ€, ์•„๋‹ˆ๋ฉด ์ด ๋ฌธ์ œ์— ๋Œ€ํ•ด ์ข€ ๋” ์‹ ์ค‘ํ•œ ์ž…์žฅ์„ ์œ ์ง€ํ•ด์•ผ ํ•˜๋Š”๊ฐ€? ์žŠํ˜€์งˆ ๊ถŒ๋ฆฌ๋Š” ์œ ๋Ÿฝ์—์„œ ์ƒˆ๋กญ๊ฒŒ ์ƒ๊ฒจ๋‚œ ๊ถŒ๋ฆฌ์ด๋‹ค. ์žŠํ˜€์งˆ ๊ถŒ๋ฆฌ๋ฅผ ๊ตฌ์ถ•ํ•˜๊ณ  ์ •์ฐฉ ์‹œํ‚ค๋ ค๋Š” EU์˜ ์‹œ๋„๋ฅผ ์—ฐ๊ตฌํ•จ์œผ๋กœ์จ ์ด ์ƒˆ๋กœ์šด ๊ถŒ๋ฆฌ์— ๋Œ€ํ•ด ๋ช…ํ™•ํ•œ ์‹œ๊ฐ์—์„œ ์ดํ•ดํ•ด ๋ณผ ์ˆ˜ ์žˆ๋‹ค. ๋”ฐ๋ผ์„œ ๋ณธ ๋…ผ๋ฌธ์€ EU์˜ ๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ๊ทœ์ •(GDPR)์˜ ์ž…๋ฒ• ๋ฐ ์žŠํ˜€์งˆ ๊ถŒ๋ฆฌ ์‹คํ–‰์— ๋Œ€ํ•ด ๋ฉด๋ฐ€ํ•˜๊ฒŒ ํƒ๊ตฌํ•จ์œผ๋กœ์จ ์žŠํ˜€์งˆ ๊ถŒ๋ฆฌ์˜ ํ•จ์˜๋ฅผ ์ •์˜ํ•˜๊ณ , ๋ฒ•์˜ ๊ฐ€์น˜ ์ถฉ๋Œ ๋ฐ ํ˜„์‹ค์  ์ง‘ํ–‰ ๋”œ๋ ˆ๋งˆ์— ๋Œ€ํ•œ ๋ถ„์„์„ ์‹œ๋„ํ•˜์˜€๋‹ค. ๋˜ํ•œ ์ด๋ฅผ ๋ฐ”ํƒ•์œผ๋กœ ๋ณธ ๋…ผ๋ฌธ์€ ์ค‘๊ตญ์˜ ์‹ค์ •์— ๋งž์ถ”์–ด ์žŠํ˜€์งˆ ๊ถŒ๋ฆฌ์˜ ์ค‘๊ตญ์—์„œ์˜ ๋„์ž… ๊ฐ€๋Šฅ ์—ฌ๋ถ€๋ฅผ ๊ฒ€ํ† ํ•˜์˜€๋‹ค. ๋ณธ ๋…ผ๋ฌธ์€ ์ด 7์žฅ์œผ๋กœ ์ด๋ฃจ์–ด์ ธ ์žˆ๋‹ค. ์ œ1์žฅ์—์„œ๋Š” ์žŠํ˜€์งˆ ๊ถŒ๋ฆฌ์˜ ์›๋ฆฌ์— ๋Œ€ํ•ด ํƒ๊ตฌํ•˜๊ณ , ์œ ๋Ÿฝ์—์„œ์˜ ์žŠํ˜€์งˆ ๊ถŒ๋ฆฌ์˜ ํƒ„์ƒ๊ณผ ๋ฐœ์ „ ๊ธฐ๋ฐ˜์— ๋Œ€ํ•ด ์‚ดํŽด๋ณด์•˜๋‹ค. ์ œ2์žฅ์—์„œ๋Š” ์—ญ์‚ฌ ๋ถ„์„์„ ํ†ตํ•ด EU์˜ ์žŠํ˜€์งˆ ๊ถŒ๋ฆฌ ๊ด€๋ จ ์ž…๋ฒ• ๊ณผ์ •์„ ์‚ดํŽด๋ณด๊ณ , ์žŠํ˜€์งˆ ๊ถŒ๋ฆฌ์˜ ๊ธฐ๋ณธ ๊ฐ€์น˜๋ฅผ ๊ทœ๋ช…ํ•˜์˜€๋‹ค. ์ œ3์žฅ์—์„œ๋Š” ์žŠํ˜€์งˆ ๊ถŒ๋ฆฌ์˜ ๊ฐ€์น˜์˜ ๊ฐˆ๋“ฑ์— ๋Œ€ํ•ด ๋‹ค๋ฃจ๊ณ , ์–ด๋– ํ•œ ๋ฐ์ดํ„ฐ๊ฐ€ ์žŠํ˜€์งˆ ๋งŒ ํ•œ์ง€์— ๋Œ€ํ•ด ํƒ๊ตฌํ•˜์˜€๋‹ค. ์ œ4์žฅ์—์„œ๋Š” ์žŠํ˜€์งˆ ๊ถŒ๋ฆฌ์˜ ์‹คํ–‰ ๋”œ๋ ˆ๋งˆ, ํŠนํžˆ ๊ฒ€์ƒ‰์—”์ง„์˜ ์—ญํ• ๊ณผ ๋ฐ์ดํ„ฐ ํ†ต์ œ์ž๋กœ์„œ์˜ ์˜๋ฌด์— ๋Œ€ํ•ด ๋…ผํ•˜์˜€๋‹ค. ์ œ5์žฅ์—์„œ๋Š” ์ค‘๊ตญ์— ์ฃผ์•ˆ์ ์„ ๋‘์–ด, ์ค‘๊ตญ์˜ ํ”„๋ผ์ด๋ฒ„์‹œ์™€ ๋ฐ์ดํ„ฐ ๋ณดํ˜ธ๋ฒ•์˜ ํ‹€์„ ๊ฐœ๋žต์ ์œผ๋กœ ์„œ์ˆ ํ•˜์˜€๋‹ค. ๋˜ํ•œ EU์˜ ์žŠํ˜€์งˆ ๊ถŒ๋ฆฌ์™€์˜ ๋น„๊ต๋ฅผ ํ†ตํ•ด ์ž…๋ฒ• ๋™ํ–ฅ์— ์žŠํ˜€์งˆ ๊ถŒ๋ฆฌ๊ฐ€ ๋‚ด์žฌ๋˜์–ด ์žˆ๋Š”์ง€ ํ‰๊ฐ€ํ•˜์˜€๋‹ค. ์ œ6์žฅ์—์„œ๋Š” ์ค‘๊ตญ์˜ '์žŠํ˜€์งˆ ๊ถŒ๋ฆฌ ์ œ1 ์‚ฌ๊ฑด'์œผ๋กœ ๋ถˆ๋ฆฌ๋Š” '๋Ÿฐ์ง€์•„์œ„ ๋ฐ”์ด๋‘ ๊ณ ์†Œ ์‚ฌ๊ฑด'์— ๋Œ€ํ•ด ๋ถ„์„ํ•˜์˜€๋‹ค. ํŒ๊ฒฐ๋ฌธ ํ•ด์„์„ ํ†ตํ•ด ์ค‘๊ตญ ํ˜„ํ–‰๋ฒ•์˜ ์žŠํ˜€์งˆ ๊ถŒ๋ฆฌ ๋ณดํ˜ธ ๊ฒฝ๋กœ์™€ ๊ฑฐ๋ถ€ ์‚ฌ์œ , ๊ทธ๋ฆฌ๊ณ  ํŒ๊ฒฐ ๋ฐฐํ›„์˜ ๋ฒ•๊ด€ ๊ณ ๋ ค ์‚ฌํ•ญ๊ณผ ํƒœ๋„ ๋“ฑ์„ ์‚ดํŽด๋ณผ ์ˆ˜ ์žˆ์—ˆ๋‹ค. ๋งˆ์ง€๋ง‰์œผ๋กœ ์ œ7์žฅ์—์„œ๋Š” ์ค‘๊ตญ์˜ ์žŠํ˜€์งˆ ๊ถŒ๋ฆฌ ๋„์ž…์˜ ํ•„์š”์„ฑ๊ณผ ํ˜„์‹ค์ ์ธ ์žฅ๋ฒฝ ๋“ฑ์˜ ๊ด€์ ์—์„œ ์ค‘๊ตญ์˜ ์žŠํ˜€์งˆ ๊ถŒ๋ฆฌ ๋„์ž…์˜ ์‹คํ–‰ ๊ฐ€๋Šฅ์„ฑ์„ ๋ถ„์„ํ•˜์˜€๋‹ค.Introduction 1 1. Background: Perfect Memory of the Internet 1 2. Purpose and Research Question 1 3. Review of the Scholars' Opinions on the Localization of RTBF 3 3.1. Positive Attitude 3 3.2. Negative Attitude 5 3.3. Analysis of Above Opinions 7 4. Outline 8 5. Methodology 9 Chapter 1 The Rationale of the Right to Be Forgotten 11 1. The Right to Be Forgotten in Dignity: Forgetting and Forgive 11 1.1. The Right to Oblivion 12 1.2. Privacy Protection in Europe 13 2. The Right to Be Forgotten in Data Protection 15 2.1. Informational Self-determination: Control 15 2.2. The Fundamental Right to Protect Personal Information 16 3. Summary 18 Chapter 2 The Right to Be Forgotten in GDPR 19 1. Lack of uniformity in the conception of the right to be forgotten 19 1.1. Unique Meaning 20 1.2. Binary Meanings 20 1.3. Multiple Meanings 20 2. The Evolution of the Right to Be Forgotten in GDPR 22 2.1. Proposal of the Right to Be Forgotten: Withdraw Information Published by the Data Subject 22 2.2. Google Spain Case 25 2.2.1. Search Engines as a Data Controller 27 2.2.2. Expand to Information Legally Published by Third Parties 29 2.2.3. Delisting and Contextual Integrity 32 2.3. Integration in the GDPR: Article 17 33 3. Summary: Value of the Right to Be Forgotten 35 Chapter 3 Value Conflict: What is worth forgetting 39 1. Digital footprint and digital shadow 39 2. Conflicting interests and rights 41 2.1. Freedom of Expression 41 2.2. Public interest 43 3. Balancing mechanism 44 3.1. Principle of Proportionality in data protection 44 3.2. Specific criteria 45 3.2.1. Data Subject's role in public life 47 3.2.2. Nature of information 47 3.2.3. Source 49 3.2.4. Time 50 3.2.4.1. Time and Data Quality 51 3.2.4.2. Information value and the information lifecycle 52 3.2.5. Harm: A Level of Severity and Pervasiveness 53 4. Balancing scenario 54 4.1. Against Search engines: NT1 & NT2 54 4.2. Against Original Website: ML and WW v Germany 57 5. Summary 59 Chapter 4 Effectiveness: Enforcement Dilemma 61 1. Search Engines and ensuing obligations as data controller 61 1.1. Assess the validity of the request 61 1.2. Notification 62 1.2.1. To the Other Controllers 63 1.2.2. To the Original Website 63 1.2.3. To the Public 64 2. Issues: 65 2.1. Role of Google: A Data Controller or Neutral Intermediary 65 2.1.1. Passive role or Active role 66 2.1.2. Algorithm as Speech 68 2.2. Fair Balancing: An Illusion 68 2.2.1. Difficulty in Striking A Balancing 68 2.2.2. Over-Compliance: Uncertainty and Stick 69 2.2.3. Heavy Burden 69 2.2.4. Due Process 70 2.3. Limited Effect 70 3. Summary 72 Chapter 5 China's Privacy and Data Protection Framework 73 1. Online privacy protection 73 1.1. Cultural backdrop 73 1.2. Legislation on the right to privacy 75 1.2.1. Concept of the right to privacy 78 1.2.2. Comparison with the right to be forgotten 80 1.3. ISP Responsibility 83 2. Personal data protection in the PRC 85 2.1. Recent initiatives 86 2.2. Protection Approach: Growing Independent from Privacy 89 2.3. Principles and conditions for lawful processing 92 2.4. Public disclosure of personal information 98 2.5. Right to Erasure 104 3. Summary 109 Chapter 6 Judicial practice of The Right to Be Forgotten in China: Renjiayu vs Baidu 111 1. Fact 111 1.1. Claim of Mr. Ren: Substantial Damage 111 1.2. Defense of Baidu: No knowledge, No intent, No human intervene 113 2. Judgement 113 2.1. Trial at first instance 114 2.2. Trial at second instance 117 3. Comment 117 3.1. The legal basis of the "Right to Be Forgotten" in china: Comment on the general personality right approach 117 3.1.1. The approach is reasonable 118 3.1.2. Limitation of the approach 121 3.2. Worthy of Forgetting 124 3.2.1. Data quality and the effect of time 124 3.2.2. Ren Jiayu's role in society and the right to know 125 3.3. Baidu's liability: Safe card of "Technology Neutrality" 125 3.4. Judicial attitude to the right to be forgotten 128 Chapter 7 Reflection on the localization of the right to be forgotten in china 130 1. Basic attitude 130 1.1. Necessity: Fulfill the contemporary needs 130 1.1.1. The need to maintain digital personality 130 1.1.2. The need for the free development of personality 131 1.1.3. The need to manage online content 132 1.1.4. Public interest in published information does not always outweigh an individual's privacy interest 133 1.2. Obstacles of the localization of the right to be forgotten in china 133 1.2.1. The inherent Obstacle: impact on openness of public opinion 134 1.2.2. The external obstacle: challenges in implementation 135 1.2.2.1. Contradiction with the development of information industry 135 1.2.2.2. Potential litigation will occupy judicial resources 137 1.3. Summary 138 2. Insights from the European's right to be forgotten 140 2.1. Reflection of the informational self-determination: control 140 2.2. Reflection to the protection of published information: flexible balancing mechanism 143 2.3. Reflection of Obligations of search engines 144 2.4. Specific implementation method 147 2.4.1. Principle of proportionality 147 2.4.2. Differentiation should be made on the data subjects 147 2.4.2.1. Natural person and legal entities 148 2.4.2.2. Public figures and ordinary citizens 148 2.4.2.3. Special treatment of minors and victims 149 2.4.3. Coordinate Alternative manners other than erasure 150 3. Restore the virtue of forgetting beyond the law 150 3.1. Market 150 3.2. Technology 151 3.3. Culture 151 Conclusion 153 References 156 Korean Abstract (์š”์•ฝ๋ฌธ) 167Maste

    Dynamic Surgery Assignment of Multiple Operating Rooms With Planned Surgeon Arrival Times

    Get PDF
    International audienceThis paper addresses the dynamic assignment of a given set of surgeries to multiple identical operating rooms (ORs). Surgeries have random durations and planned surgeon arrival times. Surgeries are assigned dynamically to ORs at surgery completion events. The goal is to minimize the total expected cost incurred by surgeon waiting, OR idling, and OR overtime. We first formulate the problem as a multi-stage stochastic programming model. An efficient algorithm is then proposed by combining a two-stage stochastic programming approximation and some look-ahead strategies. A perfect information-based lower bound of the optimal expected cost is given to evaluate the optimality gap of the dynamic assignment strategy. Numerical results show that the dynamic scheduling and optimization with the proposed approach significantly improve the performance of static scheduling and First Come First Serve (FCFS) strategy

    Implementation strategies of a contract-based MRI examination reservation process for stroke patients

    Get PDF
    International audienceTimely imaging examinations are critical for stroke patients due to the potential life threat. We have proposed a contract-based Magnetic Resonance Imaging (MRI) reservation process [1] in order to reduce their waiting time for MRI examinations. Contracted time slots (CTS) are especially reserved for Neural Vascular Department (NVD) treating stroke patients. Patients either wait in a CTS queue for such time slots or are directed to Regular Time Slot (RTS) reservation. This strategy creates "unlucky" patients having to wait for lengthy RTS reservation. This paper proposes and analyzes other contract implementation strategies called RTS reservation strategies. These strategies reserve RTS for NVD but do not direct patients to regular reservations. Patients all wait in the same queue and are served by either CTS or RTS on a FIFO (First In First Out) basis. We prove that RTS reservation strategies are able to reduce the unused time slots and patient waiting time. Extensive numerical results are presented to show the benefits of RTS reservation and to compare various RTS reservation strategies
    • โ€ฆ
    corecore