221 research outputs found

    International Protection of Migrant Workers Rights and Migration Legislation

    Get PDF
    In the context of deepening international integration in the Eurasian space, the study of the legal protection of migrant workers is fundamental issue for both ensuring socio-economic fairness and gradual transformation of the state sovereignty into the institutional basis of supranational constitutionalism, which guarantees the protection of fundamental human rights and freedoms.Aim. Improving the legal regulation of labor migration at the international, supranational and state levels through the harmonization of migration legislation in the Eurasian region.Tasks. Identification of conflicts and inaccuracies in the legal regulation of labor migration, as well as the development of recommendations for implementation of international agreements on the organized recruitment of workers between the receiving countries and countries of origin of migrants.Methods. A comparative legal analysis of international, supranational and state migration law in the process of research is supplemented by a discursive analysis of scientific literature on labor migration issues.Results. Protecting the socio-economic rights of migrant workers is the main task of host states, where migrants can become ether a criminogenic factor or a constructive social element. It is rational to organize national regulation of labor migration in integration associations of states, such as the EAEU, on the principles of national treatment for migrant workers. International agreements on the organized recruitment of workers between receiving countries and countries of origin of migrants should ensure the adaptation of migrants to the legal regime of the host country, the participation of migrants in the functioning of civil society institutions, and the monitoring of migration processes.Conclusion. Labor migration strengthens integration unions, creating strong social ties and developing civil society institutions within the boundaries of integration associations. Since state sovereignty is inextricably linked with the protection of the interests of fellow citizens, insofar as in the process of regulating labor migration, all states participating in regional integration are called upon not only to protect the rights of migrant workers, but also to provide all conditions for migrants to fulfill their obligations to civil society

    Fuzzy model of air dust concentration in Kyiv for PM2.5 AND PM10

    Get PDF
    Authors presents the fuzzy model of air dust concentration. The dust model allows the application of algorithms and methods of artificial intelligence. The authors have made a brief overview of simulation of dust emission in different countries and regions. Previously, fuzzy logic models were not enough use in these studies. However, these models are widely used in medicine. The authors hope that their modest contribution to fuzzy modelling of environmental problems will attract the attention of other researchers. In this work, we used the results of measurements that carried out at the meteorological stations in Kyiv. The authors’ fuzzy model makes it possible to simulation into account two channels for measuring dust: PM2.5 and PM10. It was found that in the Mamdani algorithm it is necessary to apply the “or” logic. This makes it possible to increase the influence of each channel on the negative assessment of the environment. The Mamdani algorithm in the “and” logic does not give strict restrictions on the concentration of dust in the atmospheric air for each of the measuring channels (PM2.5 and PM10) separately

    Information support of problems of electric power systems control

    Get PDF
    Розглянуто особливості створення систем інформаційного забезпечення в електроенергетиці. Проведено аналіз вимог ENTSO-E, що стосуються моніторингу режимних параметрів. Досліджено проблему моніторингу низькочастотних коливань режимних параметрів при об’єднанні енергосистем на паралельну роботу. Визначені часові та ієрархічні обмеження задач керування. Представлено систему збору та обробки інформації, що реєструється комплексами «Регіна-Ч» на об’єктах ОЕС України. Наведені приклади реалізації.Features of information support systems creation in power engineering are considered. The analysis of requirements ENTSO-E, concerning monitoring of operating parameters is carried out. It is investigated a problem of monitoring of low-frequency oscillation of operating parameters at association of power systems for parallel operation. Time and hierarchical limitations of control problems are defined. System of gathering and processing of the information registered on objects of Ukrainian IPS by complexes "Regina-F" are presented. Examples are resulted.Рассмотрены особенности создания систем информационного обеспечения в электроэнергетике. Проведен анализ требований ENTSO-E, касающихся мониторинга режимных параметров. Исследовано проблему мониторинга низкочастотных колебаний режимных параметров при объединении энергосистем на параллельную работу. Определены временные и иерархические ограничения задач управления. Представлено систему сбора и обработки информации регистрируемой комплексами «Регина-Ч» на объектах ОЭС Украины. Приведены примеры

    Tunka Advanced Instrument for cosmic rays and Gamma Astronomy

    Full text link
    The paper is a script of a lecture given at the ISAPP-Baikal summer school in 2018. The lecture gives an overview of the Tunka Advanced Instrument for cosmic rays and Gamma Astronomy (TAIGA) facility including historical introduction, description of existing and future setups, and outreach and open data activities.Comment: Lectures given at the ISAPP-Baikal Summer School 2018: Exploring the Universe through multiple messengers, 12-21 July 2018, Bol'shie Koty, Russi

    Security of data science and data science for security

    Get PDF
    In this chapter, we present a brief overview of important topics regarding the connection of data science and security. In the first part, we focus on the security of data science and discuss a selection of security aspects that data scientists should consider to make their services and products more secure. In the second part about security for data science, we switch sides and present some applications where data science plays a critical role in pushing the state-of-the-art in securing information systems. This includes a detailed look at the potential and challenges of applying machine learning to the problem of detecting obfuscated JavaScripts

    On the concentration of large deviations for fat tailed distributions, with application to financial data

    Full text link
    Large deviations for fat tailed distributions, i.e. those that decay slower than exponential, are not only relatively likely, but they also occur in a rather peculiar way where a finite fraction of the whole sample deviation is concentrated on a single variable. The regime of large deviations is separated from the regime of typical fluctuations by a phase transition where the symmetry between the points in the sample is spontaneously broken. For stochastic processes with a fat tailed microscopic noise, this implies that while typical realizations are well described by a diffusion process with continuous sample paths, large deviation paths are typically discontinuous. For eigenvalues of random matrices with fat tailed distributed elements, a large deviation where the trace of the matrix is anomalously large concentrates on just a single eigenvalue, whereas in the thin tailed world the large deviation affects the whole distribution. These results find a natural application to finance. Since the price dynamics of financial stocks is characterized by fat tailed increments, large fluctuations of stock prices are expected to be realized by discrete jumps. Interestingly, we find that large excursions of prices are more likely realized by continuous drifts rather than by discontinuous jumps. Indeed, auto-correlations suppress the concentration of large deviations. Financial covariance matrices also exhibit an anomalously large eigenvalue, the market mode, as compared to the prediction of random matrix theory. We show that this is explained by a large deviation with excess covariance rather than by one with excess volatility.Comment: 38 pages, 12 figure

    Method of Separation Between Light and Heavy Groups of Primary CR Nuclei by LDF of Cherenkov Light in the Range 300–3000 TeV

    Get PDF
    The problem of chemical composition below the knee in the cosmic-ray energy spectrum has not yet been solved due to low statistics collected from direct experiments. In the HiSCORE experiment the lateral distribution functions (LDF) of Cherenkov light of EASs with energy greater than hundreds of TeV can be measured in detail for millions of individual events. A full steepness of LDF is sensitive to the depth of shower maximum and as a result to primary particle type. In this paper, we developed a parametric method of separation between heavy and light groups of nuclei using the ’knee-like’ approximation of LDF and taking into account measurement uncertainty

    The precision of the IACT mechanical mounts of the TAIGA observatory

    Get PDF
    The TAIGA (Tunka Advanced Instrument for cosmic ray physics and Gamma Astronomy) observatory is located in the Tunka valley (~50 km west from the southern shore of Lake Baikal) at an altitude of 675m a.s.l. The TAIGA observatory aims to address gamma-ray astronomy at energies from a few TeV to several PeV and CR physics from 100 TeV to several EeV. Its main feature is the complementary, hybrid approach to distinguish CR events from those of gamma rays. Currently TAIGA consists of ~80 wide-angle air Cherenkov detectors (HiSCORE stations), three ~4m diameter IACTs and several hundred surface and underground muon detectors, grouped in three jointly operating arrays. The exceptional feature of the TAIGA IACT array is it’s topology that allows one to aim for the optimal cost/performance by scanning the optimal inter-telescope distances from 300m up to 600m. The IACTs have alt-azimuth type mounts and 576-pixel imaging cameras in the foci, covering 9.6° aperture in the sky. The segmented reflectors of ~10m² area follow the Davis-Cotton design. The largest diameter of the hexagonal shape reflector is 4.3m and the focal length is 4.75m. The rigid telescope mount provides a maximum displacement of EAS image below 2mm (i.e. ≤ 0.024°) in the photodetector plane. The main parameters of IACTs are of a crucial importance for their efficient operation and is presented

    Geospatial data analysis in Russia’s geoweb

    Get PDF
    The chapter examines the role of geospatial data in Russia’s online ecosystem. Facilitated by the rise of geographic information systems and user-generated content, the distribution of geospatial data has blurred the line between physical spaces and their virtual representations. The chapter discusses different sources of these data available for Digital Russian Studies (e.g., social data and crowdsourced databases) together with the novel techniques for extracting geolocation from various data formats (e.g., textual documents and images). It also scrutinizes different ways of using these data, varying from mapping the spatial distribution of social and political phenomena to investigating the use of geotag data for cultural practices’ digitization to exploring the use of geoweb for narrating individual and collective identities online

    The learning styles neuromyth:when the same term means different things to different teachers

    Get PDF
    Alexia Barrable - ORCID: 0000-0002-5352-8330 https://orcid.org/0000-0002-5352-8330Although learning styles (LS) have been recognised as a neuromyth, they remain a virtual truism within education. A point of concern is that the term LS has been used within theories that describe them using completely different notions and categorisations. This is the first empirical study to investigate education professionals’ conceptualisation, as well as means of identifying and implementing LS in their classroom. A sample of 123 education professionals were administered a questionnaire consisting both closed- and open-ended questions. Responses were analysed using thematic analysis. LS were found to be mainly conceptualised within the Visual-Auditory-(Reading)-Kinaesthetic (VAK/VARK) framework, as well as Gardner’s multiple intelligences. Moreover, a lot of education professionals confused theories of learning (e.g., behavioural or cognitive theories) with LS. In terms of identifying LS, educators reported using a variety of methods, spanning from observation and everyday contact to the use of tests. The ways LS were implemented in the classroom were numerous, comprising various teaching aids, participatory techniques and motor activities. Overall, we argue that the extended use of the term LS gives the illusion of a consensus amongst educators, when a closer examination reveals that the term LS is conceptualised, identified and implemented idiosyncratically by different individuals. This study aims to be of use to pre-service and in-service teacher educators in their effort to debunk the neuromyth of LS and replace it with evidence-based practices.https://doi.org/10.1007/s10212-020-00485-236pubpub
    corecore