Search results for: access to resources and information
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 16466

Search results for: access to resources and information

16196 Advancing Equitable Healthcare for Trans and Gender-Diverse Students: A Community-Based Participatory Action Project

Authors: Al Huuskonen, Clio Lake, K. M. Naude, Polina Petlitsyna, Sorsha Henning, Julia Wimmers-Klick

Abstract:

This project presents the outcomes of a community-based participatory action initiative aimed at advocating for equitable healthcare and human rights for trans, two-spirit, and gender-diverse individuals, building upon the University of British Columbia (UBC) Trans Coalition's ongoing efforts. Participatory Action Research (PAR) was chosen as the research method with the goal of improving trans rights on the UBC campus, particularly regarding equitable access to healthcare. PAR involves active community contribution throughout the research process, which in this case was done by way of liaising with student resource groups and advocacy leaders. The goals of this project were as follows: a) identify gaps in gender-affirming healthcare for UBC students by consulting the community and collaborating with UBC services, b) develop an information package outlining provincial and university-based health insurance for gender-affirming care (including hormone therapy and surgeries), FAQs, and resources for UBC's trans students, c) make this package available to UBC students and other national transgender advocacy organizations. The initiative successfully expanded the UBC AMS Student Health and Dental Plan to include gender-affirming procedural coverage, developed a care access guide for students, and advocated for improved health records inclusivity, mechanisms for trans students to report negative care experiences, and increased access to gender-affirming primary care through the on-campus health clinic. Collaboration with other universities' pride organizations and Trans Care BC yielded positive outcomes through broader coalition building and resource sharing. Ongoing efforts are underway to update provincial policies, particularly through expanding coverage under fair pharma care and addressing the compounding effects of the primary care crisis for trans individuals. The project's tangible results include improved trans rights on campus, especially in terms of healthcare access. Expanding healthcare coverage through student care benefits thousands of students, making the ability to undergo important affirming procedures more affordable. Providing students with information on extended coverage options and communication with their doctors further removes barriers to care and positively impacts student wellbeing. This initiative demonstrates the effectiveness of community-based participatory action in advancing equitable healthcare for trans and gender-diverse individuals and serves as a model for other institutions and organizations striving to promote inclusivity and advocate for marginalized populations' rights.

Keywords: equitable healthcare, trans and gender-diverse individuals, inclusivity, participatory action research project

Procedia PDF Downloads 61
16195 Do Interventions for Increasing Minorities' Access to Higher Education Work? The Case of Ethiopians in Israel

Authors: F. Nasser-Abu Alhija

Abstract:

In many countries, much efforts and resources are devoted to empowering and integrating minorities within the mainstream population. Major ventures in this route are crafted in higher education institutions where different outreach programs and methods such as lenient entry requirements, monitory incentives, learning skills workshops, tutoring and mentoring, are utilized. Although there is some information regarding these programs, their effectiveness still needs to be thoroughly examined. The Ethiopian community In Israel is one of the minority groups that has been targeted by sponsoring foundations and higher education institutions with the aim to ease the access, persistence and success of its young people in higher education and later in the job market. The evaluation study we propose to present focuses on the implementation of a program designed for this purpose. This program offers relevant candidates for study at a prestigious university a variety of generous incentives that include tuitions, livening allowance, tutoring, mentoring, skills and empowerment workshops and cultural meetings. Ten students were selected for the program and they started their studies in different subject areas before three and half years. A longitudinal evaluation has been conducted since the implementation of the program. Data were collected from different sources: participating students, program coordinator, mentors, tutors, program documents and university records. Questionnaires and interviews were used for collecting data on the different components of the program and on participants' perception of their effectiveness. Participants indicate that the lenient entry requirements and the monitory incentives are critical for starting their studies. During the first year, skills and empowering workshops, torturing and mentoring were evaluated as very important for persistence and success in studies. Tutoring was perceived as very important also at the second year but less importance is attributed to mentoring. Mixed results regarding integration in the Israeli culture emerged. The results are discussed with reference to findings from different settings around the world.

Keywords: access to higher education, minority groups, monitory incentives, torturing, mentoring

Procedia PDF Downloads 354
16194 Implementing Zero-Trust Security with Passwordless Authentication Gateways for Privacy-Oriented Organizations Using Keycloak

Authors: Andrei Bogdan Stanescu, Laura Diaconescu

Abstract:

With the increasing concerns about data breaches and privacy violations, organizations seek robust security measures to protect sensitive information. This research paper highlights the importance of implementing the Zero-Trust Security methodology using Passwordless Authentication Gateways that leverage Keycloak, an open-source Identity and Access Management (IAM) software, as a solution to address the security challenges these organizations face. The paper presents the successful implementation and deployment of such a solution in a mid-size, privacy-oriented organization. The implementation resulted in significant security improvements, reducing the risk of unauthorized access and potential data breaches. Moreover, user feedback indicated enhanced convenience and streamlined authentication experiences. The results of this study bring solid contributions in the field of cybersecurity and provide practical insights for organizations aiming to strengthen their security practices.

Keywords: identity and access management, passwordless authentication, privacy, zero-trust security

Procedia PDF Downloads 64
16193 Financial and Human Resources of Terrorism

Authors: Abdurrahman Karacabey

Abstract:

Threat paradigm has shifted throughout the history. Considering conjuncture of our time, a major threat for humanity is terrorism. Although variety of reasons are influential, financial, and human resources are the vital needs for terrorist groups. It is known that terrorism is a significant term while taking decisions in diplomatic, politic, and military issues. Even though the methods to provide resources for terrorism are quite similar, there are still some differences for deterrent terrorist groups being active in various regions of the globe. Due to social and psychological reasons activists have generally similar excuses to join terrorist groups.At the same time, terrorists’ fiscal activities to secure permanence of terrorism, occupy the politics of the countries. Besides, preventive actions are expensive creating huge burdens in host nation’s economy. This paper elaborates on how ISIS is providing human and economic resources, course of actions to overcome ISIS is on the agenda of all countries.

Keywords: financial resources, human resources, isis, terrorism

Procedia PDF Downloads 385
16192 Telecom Infrastructure Outsourcing: An Innovative Approach

Authors: Irfan Zafar

Abstract:

Over the years the Telecom Industry in the country has shown a lot of progress in terms of infrastructure development coupled with the availability of telecom services. This has however led to the cut throat completion among various operators thus leading to reduced tariffs to the customers. The profit margins have seen a reduction thus leading the operators to think of other avenues by adopting new models while keeping the quality of service intact. The outsourcing of the network and the resources is one such model which has shown promising benefits which includes lower costs, less risk, higher levels of customer support and engagement, predictable expenses, access to the emerging technologies, benefiting from a highly skilled workforce, adaptability, focus on the core business while reducing capital costs. A lot of research has been done on outsourcing in terms of reasons of outsourcing and its benefits. However this study is an attempt to analyze the effects of the outsourcing on an organizations performance (Telecommunication Sector) considering the variables (1) Cost Reduction (2) Organizational Performance (3) Flexibility (4) Employee Performance (5) Access to Specialized Skills & Technology and the (6) Outsourcing Risks.

Keywords: outsourcing, ICT, telecommunication, IT, networking

Procedia PDF Downloads 375
16191 A Method for Automated Planning of Fiber to the Home Access Network Infrastructures

Authors: Hammad Khalid

Abstract:

In this paper, a strategy for computerized arranging of Fiber to the Home (FTTH) get to systems is proposed. We presented an efficient methodology for arranging access organize framework. The GIS information and a lot of calculations were utilized to make the arranging procedure increasingly programmed. The technique clarifies various strides of the arranging process. Considering various situations, various designs can be produced by utilizing the technique. It was likewise conceivable to produce the designs in an extremely brief temporal contrast with the conventional arranging. A contextual investigation is considered to delineate the utilization and abilities of the arranging technique. The technique, be that as it may, doesn't completely robotize the arranging however, make the arranging procedure fundamentally quick. The outcomes and dialog are displayed and end is given at last.

Keywords: FTTH, GIS, robotize, plan

Procedia PDF Downloads 125
16190 Rural Entrepreneurship as a Response to Climate Change and Resource Conservation

Authors: Omar Romero-Hernandez, Federico Castillo, Armando Sanchez, Sergio Romero, Andrea Romero, Michael Mitchell

Abstract:

Environmental policies for resource conservation in rural areas include subsidies on services and social programs to cover living expenses. Government's expectation is that rural communities who benefit from social programs, such as payment for ecosystem services, are provided with an incentive to conserve natural resources and preserve natural sinks for greenhouse gases. At the same time, global climate change has affected the lives of people worldwide. The capability to adapt to global warming depends on the available resources and the standard of living, putting rural communities at a disadvantage. This paper explores whether rural entrepreneurship can represent a solution to resource conservation and global warming adaptation in rural communities. The research focuses on a sample of two coffee communities in Oaxaca, Mexico. Researchers used geospatial information contained in aerial photographs of the geographical areas of interest. Households were identified in the photos via the roofs of households and georeferenced via coordinates. From the household population, a random selection of roofs was performed and received a visit. A total of 112 surveys were completed, including questions of socio-demographics, perception to climate change and adaptation activities. The population includes two groups of study: entrepreneurs and non-entrepreneurs. Data was sorted, filtered, and validated. Analysis includes descriptive statistics for exploratory purposes and a multi-regression analysis. Outcomes from the surveys indicate that coffee farmers, who demonstrate entrepreneurship skills and hire employees, are more eager to adapt to climate change despite the extreme adverse socioeconomic conditions of the region. We show that farmers with entrepreneurial tendencies are more creative in using innovative farm practices such as the planting of shade trees, the use of live fencing, instead of wires, and watershed protection techniques, among others. This result counters the notion that small farmers are at the mercy of climate change and have no possibility of being able to adapt to a changing climate. The study also points to roadblocks that farmers face when coping with climate change. Among those roadblocks are a lack of extension services, access to credit, and reliable internet, all of which reduces access to vital information needed in today’s constantly changing world. Results indicate that, under some circumstances, funding and supporting entrepreneurship programs may provide more benefit than traditional social programs.

Keywords: entrepreneurship, global warming, rural communities, climate change adaptation

Procedia PDF Downloads 206
16189 Forest Polices and Management in Nigeria: Are Households Willing to Pay for Forest Management?

Authors: A. O. Arowolo, M. U. Agbonlahor, P. A. Okuneye, A. E. Obayelu

Abstract:

Nigeria is rich with abundant resources with an immense contribution of the forest resource to her economic development and to the livelihood of the rural populace over the years. However, this important resource has continued to shrink because it is not sustainably used, managed or conserved. The loss of forest cover has far reaching consequences on regional, national and global economy as well as the environment. This paper reviewed the Nigeria forest management policies, the challenges and willingness to pay (WTP) for management of the community forests in Ogun State, Nigeria. Data for the empirical investigation were obtained using a cross-section survey of 160 rural households by multistage sampling technique. The WTP was assessed by the Dichotomous Choice Contingent Valuation. One major findings is that, the Nigerian forest reserves is established in order to conserve and manage forest resources but has since been neglected while the management plans are either non-existent or abandoned. Also, the free areas termed the community forests where people have unrestricted access to exploit are fast diminishing in both contents and scale. The mean WTP for sustainable management of community forests in the study area was positive with a value of ₦389.04/month. The study recommends policy measures aimed at participatory forest management plan which will include the rural communities in the management of community forests. This will help ensure sustainable management of forest resources as well as improve the welfare of the rural households.

Keywords: forests, management, WTP, Nigeria

Procedia PDF Downloads 361
16188 Securing Internet of Things Devices in Healthcare industry: An Investigation into Efficient and Effective Authorization Procedures

Authors: Maruf Farhan, Abdul Salih, Sikandar Ali Tahir

Abstract:

Protecting patient information's confidentiality is paramount considering the widespread use of Internet of Things (IoT) gadgets in medical settings. This study's subjects are decentralized identifiers (DIDs) and verifiable credentials (VCs) in conjunction with an OAuth-based authorization framework, as they are the key to protecting IoT healthcare devices. DIDs enable autonomous authentication and trust formation between IoT devices and other entities. To authorize users and enforce access controls based on verified claims, VCs offer a secure and adaptable solution. Through the proposed method, medical facilities can improve the privacy and security of their IoT devices while streamlining access control administration. A Smart pill dispenser in a hospital setting is used to illustrate the advantages of this method. The findings demonstrate the value of DIDs, VCs, and OAuth-based delegation in protecting the IoT devices. Improved processes for authorizing and controlling access to IoT devices are possible thanks to the research findings, which also help ensure patient confidentiality in the healthcare sector.

Keywords: Iot, DID, authorization, verifiable credentials

Procedia PDF Downloads 54
16187 Low Students' Access to University Education in Nigeria: Causes and Remedy

Authors: Robert Ogbanje Okwori

Abstract:

The paper explained the causes low students’ access to university education in Nigeria and how it can be remedied. It is discovered that low students’ access to university education in Nigeria is evident despite these number of universities in the country. In 2006/2007 academic session, 806,089 sat for Joint Unified Matriculation Board Examination (JAMB) into Nigerian universities and only 123,626 (15.3%) were admitted while 2011/2012 academic session, a total of 1,493,604 candidates sat for Joint Unified Matriculation Board Examination (JAMB) into Nigerian universities and only 65,073 (43.57%) were admitted. This necessitates for the research. Therefore, the study posed the following research questions. What are causes of low students’ access to university education in Nigeria? What are the challenges of students’ access to university education in Nigeria? How can students’ access to university education in Nigeria be improved? Sample survey research design was adopted for the study. A structured questionnaire was used to gather data for the study. Six hundred and eighty (680) respondents which comprised of 100 level university students; JAMB Officers and University administrators (Vice Chancellors, Registrars and Admission Officers) were used for the study. Stratified random sampling was applied for adequate representation of respondents from universities in the six geopolitical zones of Nigeria. Mean was used to answer research questions while Kuder-Richardson formula 20 was used to check the internal consistency of the instrument. The correlation coefficient of the instrument was 0.87. The major findings include the carrying capacity of each university contributes to low students’ access to university education and academic staff were inadequate. From the analysis of the study, it is concluded that the rate of access to university education is low, therefore, every university should establish distance learning programme to reduce university admission crisis. The training infrastructure in the universities should be improved upon by the owners to increase the carrying capacity of each university.

Keywords: access, causes, low, university

Procedia PDF Downloads 440
16186 Assessment of Water Availability and Quality in the Climate Change Context in Urban Areas

Authors: Rose-Michelle Smith, Musandji Fuamba, Salomon Salumu

Abstract:

Water is vital for life. Access to drinking water and sanitation for humans is one of the Sustainable Development Goals (specifically the sixth) approved by United Nations Member States in September 2015. There are various problems identified relating to water: insufficient fresh water, inequitable distribution of water resources, poor water management in certain places on the planet, detection of water-borne diseases due to poor water quality, and the negative impacts of climate change on water. One of the major challenges in the world is finding ways to ensure that people and the environment have enough water resources to sustain and support their existence. Thus, this research project aims to develop a tool to assess the availability, quality and needs of water in current and future situations with regard to climate change. This tool was tested using threshold values for three regions in three countries: the Metropolitan Community of Montreal (Canada), Normandie Region (France) and North Department (Haiti). The WEAP software was used to evaluate the available quantity of water resources. For water quality, two models were performed: the Canadian Council of Ministers of the Environment (CCME) and the Malaysian Water Quality Index (WQI). Preliminary results showed that the ratio of the needs could be estimated at 155, 308 and 644 m3/capita in 2023 for Normandie, Cap-Haitian and CMM, respectively. Then, the Water Quality Index (WQI) varied from one country to another. Other simulations regarding the water availability and quality are still in progress. This tool will be very useful in decision-making on projects relating to water use in the future; it will make it possible to estimate whether the available resources will be able to satisfy the needs.

Keywords: climate change, water needs, balance sheet, water quality

Procedia PDF Downloads 42
16185 Analysis of Performance of 3T1D Dynamic Random-Access Memory Cell

Authors: Nawang Chhunid, Gagnesh Kumar

Abstract:

On-chip memories consume a significant portion of the overall die space and power in modern microprocessors. On-chip caches depend on Static Random-Access Memory (SRAM) cells and scaling of technology occurring as per Moore’s law. Unfortunately, the scaling is affecting stability, performance, and leakage power which will become major problems for future SRAMs in aggressive nanoscale technologies due to increasing device mismatch and variations. 3T1D Dynamic Random-Access Memory (DRAM) cell is a non-destructive read DRAM cell with three transistors and a gated diode. In 3T1D DRAM cell gated diode (D1) acts as a storage device and also as an amplifier, which leads to fast read access. Due to its high tolerance to process variation, high density, and low cost of memory as compared to 6T SRAM cell, it is universally used by the advanced microprocessor for on chip data and program memory. In the present paper, it has been shown that 3T1D DRAM cell can perform better in terms of fast read access as compared to 6T, 4T, 3T SRAM cells, respectively.

Keywords: DRAM Cell, Read Access Time, Retention Time, Average Power dissipation

Procedia PDF Downloads 287
16184 Effect of Credit Use on Technical Efficiency of Cassava Farmers in Ondo State, Nigeria

Authors: Adewale Oladapo, Carolyn A. Afolami

Abstract:

Agricultural production should be the major financial contributor to the Nigerian economy; however, the petroleum sector had taken the importance attached to this sector. The situation tends to be more worsening unless necessary attention is given to adequate credit supply among food crop farmers. This research analyses the effect of credit use on the technical efficiency of cassava farmers in Ondo State, Nigeria. Primary data were collected from two hundred randomly selected cassava farmers through a multistage sampling procedure in the study area. Data were analysed using descriptive statistics and stochastic frontier analysis (SFA). Findings revealed that 95.0% of the farmers were male while 56.0% had no formal education and were married. The SFA showed that cassava farmer’s efficiency increased with farm size, herbicide and planting material at 5%,10% and 1% respectively but decreased with fertilizer application at 1% level while farmers’ age, education, household size, experience and access to credit increased technical inefficiency at 10%. The study concluded that cassava farmers are technically inefficient in the use of farm resources and recommended that adequate and workable agricultural policy measures that will ensure availability and efficient fertilizer distribution should be put in place to increase efficiency. Furthermore, the government should encourage youth participation in cassava production and ensure improvement in farmer’s access to credit to increase farmer’s technical efficiency.

Keywords: agriculture, access to credit, cassava farmers, technical efficiency

Procedia PDF Downloads 156
16183 A Survey on Countermeasures of Cache-Timing Attack on AES Systems

Authors: Settana M. Abdulh, Naila A. Sadalla, Yaseen H. Taha, Howaida Elshoush

Abstract:

Side channel attacks are based on side channel information, which is information that is leaked from encryption systems. This includes timing information, power consumption as well as electromagnetic or even sound leaking which can exploited by an attacker. Implementing side channel attacks are possible if and only if an attacker has access to a cryptosystem. In this case, the attacker can exploit bad implementation in software or hardware which is not controlled by encryption implementer. Thus, he/she will represent a real threat to the security system. Several countermeasures have been proposed to eliminate side channel information vulnerability.Cache timing attack is a special type of side channel attack. Here, timing information is collected and analyzed by an attacker to guess sensitive information such as encryption key or plaintext. This paper reviews the technique applied in this attack and surveys the countermeasures against it, evaluating the feasibility and usability of each. Based on this evaluation, finally we pose several recommendations about using these countermeasures.

Keywords: AES algorithm, side channel attack, cache timing attack, cache timing countermeasure

Procedia PDF Downloads 271
16182 Assessing the Accessibility to Primary Percutaneous Coronary Intervention

Authors: Tzu-Jung Tseng, Pei-Hsuen Han, Tsung-Hsueh Lu

Abstract:

Background: Ensuring patients with ST-elevation myocardial infarction (STEMI) access to hospitals that could perform percutaneous coronary intervention (PCI) in time is an important concern of healthcare managers. One commonly used the method to assess the coverage of population access to PCI hospital is the use GIS-estimated linear distance (crow's fly distance) between the district centroid and the nearest PCI hospital. If the distance is within a given distance (such as 20 km), the entire population of that district is considered to have appropriate access to PCI. The premise of using district centroid to estimate the coverage of population resident in that district is that the people live in the district are evenly distributed. In reality, the population density is not evenly distributed within the administrative district, especially in rural districts. Fortunately, the Taiwan government released basic statistical area (on average 450 population within the area) recently, which provide us an opportunity to estimate the coverage of population access to PCI services more accurate. Objectives: We aimed in this study to compare the population covered by a give PCI hospital according to traditional administrative district versus basic statistical area. We further examined if the differences between two geographic units used would be larger in a rural area than in urban area. Method: We selected two hospitals in Tainan City for this analysis. Hospital A is in urban area, hospital B is in rural area. The population in each traditional administrative district and basic statistical area are obtained from Taiwan National Geographic Information System, Ministry of Internal Affairs. Results: Estimated population live within 20 km of hospital A and B was 1,515,846 and 323,472 according to traditional administrative district and was 1,506,325 and 428,556 according to basic statistical area. Conclusion: In urban area, the estimated access population to PCI services was similar between two geographic units. However, in rural areas, the access population would be overestimated.

Keywords: accessibility, basic statistical area, modifiable areal unit problem (MAUP), percutaneous coronary intervention (PCI)

Procedia PDF Downloads 434
16181 Electronic Payment Recording with Payment History Retrieval Module: A System Software

Authors: Adrian Forca, Simeon Cainday III

Abstract:

The Electronic Payment Recording with Payment History Retrieval Module is developed intendedly for the College of Science and Technology. This system software innovates the manual process of recording the payments done in the department through the development of electronic payment recording system software shifting from the slow and time-consuming procedure to quick yet reliable and accurate way of recording payments because it immediately generates receipts for every transaction. As an added feature to its software process, generation of recorded payment report is integrated eliminating the manual reporting to a more easy and consolidated report. As an added feature to the system, all recorded payments of the students can be retrieved immediately making the system transparent and reliable payment recording software. Viewing the whole process, the system software will shift from the manual process to an organized software technology because the information will be stored in a logically correct and normalized database. Further, the software will be developed using the modern programming language and implement strict programming methods to validate all users accessing the system, evaluate all data passed into the system and information retrieved to ensure data accuracy and reliability. In addition, the system will identify the user and limit its access privilege to establish boundaries of the specific access to information allowed for the store, modify, and update making the information secure against unauthorized data manipulation. As a result, the System software will eliminate the manual procedure and replace with an innovative modern information technology resulting to the improvement of the whole process of payment recording fast, secure, accurate and reliable software innovations.

Keywords: collection, information system, manual procedure, payment

Procedia PDF Downloads 143
16180 Utilizing Google Earth for Internet GIS

Authors: Alireza Derambakhsh

Abstract:

The objective of this examination is to explore the capability of utilizing Google Earth for Internet GIS applications. The study particularly analyzes the utilization of vector and characteristic information and the capability of showing and preparing this information in new ways utilizing the Google Earth stage. It has progressively been perceived that future improvements in GIS will fixate on Internet GIS, and in three noteworthy territories: GIS information access, spatial data scattering and GIS displaying/preparing. Google Earth is one of the group of geobrowsers that offer a free and simple to utilize administration that empower information with a spatial part to be overlain on top of a 3-D model of the Earth. This examination makes a methodological structure to accomplish its objective that comprises of three noteworthy parts: A database level, an application level and a customer level. As verification of idea a web model has been produced, which incorporates a differing scope of datasets and lets clients direst inquiries and make perceptions of this custom information. The outcomes uncovered that both vector and property information can be successfully spoken to and imagined utilizing Google Earth. In addition, the usefulness to question custom information and envision results has been added to the Google Earth stage.

Keywords: Google earth, internet GIS, vector, characteristic information

Procedia PDF Downloads 278
16179 The Roles of Aesthetics and Information Quality on Intention to Continued Used of Digital Library within the Context of UTAUT2

Authors: Shahruhaida Adayu Mohd Paili, Abd Latif Abdul Rahman, Asmadi Mohammed Ghazali

Abstract:

Digital library was developed by many organizations, especially universities. The digital library can be considered as a new information system. Digital library brings many benefits to the users. There are many researches that have investigated the importance of the digital library, the acceptance, and continuance use of digital library. The investigation towards the digital library is important and it is crucial to understand the reason why users accept and continued use of digital library. Users can search the information and available resources through the digital library website. It is important to know the user’s perception towards the aesthetics of the digital library. Besides that, because of digital library provided information to the users, the researcher also needed to investigate the quality of information in digital library. This study used Extending the Unified Theory of Acceptance and Use of Technology (UTAUT2) in order to know the user’s intention to continued use of digital library.

Keywords: digital library, aesthetics, information quality, intention to continued use of digital library, UTAUT2

Procedia PDF Downloads 352
16178 Democratic Information Behavior of Social Scientists and Policy Makers in India

Authors: Mallikarjun Vaddenkeri, Suresh Jange

Abstract:

This research study reports results of information behaviour by members of faculty and research scholars of various departments of social sciences working at universities with a sample of 300 and Members of Legislative Assembly and Council with 216 samples in Karnataka State, India. The results reveal that 29.3% and 20.3% of Social Scientists indicated medium and high level of awareness of primary sources - Primary Journals are found to be at scale level 5 and 9. The usage of primary journals by social scientists is found to be 28% at level 4, 24% of the respondent’s opined use of primary Conference Proceedings at level 5 as medium level of use. Similarly, the use of Secondary Information Sources at scale 8 and 9 particularly in case of Dictionaries (31.0% and 5.0%), Encyclopaedias (22.3% and 6.3%), Indexing Periodicals (7.0% and 15.3%) and Abstracting Periodicals (5.7% and 20.7%). For searching information from Journals Literature available in CD-ROM version, Keywords (43.7%) followed by Keywords with logical operators (39.7%) have been used for finding the required information. Statistical inference reveals rejection of null hypothesis `there is no association between designation of the respondents and awareness of primary information resources’. On the other hand, educational qualification possessed by Legislative members, more than half of them possess graduate degree as their academic qualification (57.4%) and just 16.7% of the respondents possess graduate degree while only 26.8% of the respondents possess degree in law and just 1.8% possess post-graduate degree in law. About 42.6% indicated the importance of information required to discharge their duties and responsibilities as a Policy Maker in the scale 8, as a Scholar (27.8%) on a scale 6, as a politician (64.8%) on a scale 10 and as a Councillor (51.9%) on a scale 8. The most preferred information agencies/sources very often contacted for obtaining useful information are by means of contacting the people of Karnataka State Legislative Library, listening Radio programmes, viewing Television programmes and reading the newspapers. The methods adopted for obtaining needed information quite often by means of sending their assistants to libraries to gather information (35.2%) and personally visiting the information source (64.8%). The null hypotheses `There is no association between Members of Legislature and Opinion on the usefulness of the resources of the Karnataka State Legislature Library’ is accepted using F ANOVA test. The studies conclude with a note revamp the existing library system in its structure and adopt latest technologies and educate and train social scientists and Legislators in using these resources in the interest of academic, government policies and decision making of the country.

Keywords: information use behaviour, government information, searching behaviour, policy makers

Procedia PDF Downloads 113
16177 Digital Repository as a Service: Enhancing Access and Preservation of Cultural Heritage Artefacts

Authors: Lefteris Tsipis, Demosthenes Vouyioukas, George Loumos, Antonis Kargas, Dimitris Varoutas

Abstract:

The employment of technology and digitization is crucial for cultural organizations to establish and sustain digital repositories for their cultural heritage artefacts. This utilization is also essential in facilitating the presentation of cultural works and exhibits to a broader audience. Consequently, in this work, we propose a digital repository that functions as Software as a Service (SaaS), primarily promoting the safe storage, display, and sharing of cultural materials, enhancing accessibility, and fostering a deeper understanding and appreciation of cultural heritage. Moreover, the proposed digital repository service is designed as a multitenant architecture, which enables organizations to expand their reach, enhance accessibility, foster collaboration, and ensure the preservation of their content. Specifically, this project aims to assist each cultural institution in organizing its digital cultural assets into collections and feeding other digital platforms, including educational, museum, pedagogical, and games, through appropriate interfaces. Moreover, the creation of this digital repository offers a cutting-edge and effective open-access laboratory solution. It allows organizations to have a significant influence on their audiences by fostering cultural understanding and appreciation. Additionally, it facilitates the connection between different digital repositories and national/European aggregators, promoting collaboration and information sharing. By embracing this solution, cultural institutions can benefit from shared resources and features, such as system updates, backup and recovery services, and data analytics tools, that are provided by the platform.

Keywords: cultural technologies, gaming technologies, web sharing, digital repository

Procedia PDF Downloads 46
16176 Channels Splitting Strategy for Optical Local Area Networks of Passive Star Topology

Authors: Peristera Baziana

Abstract:

In this paper, we present a network configuration for a WDM LANs of passive star topology that assume that the set of data WDM channels is split into two separate sets of channels, with different access rights over them. Especially, a synchronous transmission WDMA access algorithm is adopted in order to increase the probability of successful transmission over the data channels and consequently to reduce the probability of data packets transmission cancellation in order to avoid the data channels collisions. Thus, a control pre-transmission access scheme is followed over a separate control channel. An analytical Markovian model is studied and the average throughput is mathematically derived. The performance is studied for several numbers of data channels and various values of control phase duration.

Keywords: access algorithm, channels division, collisions avoidance, wavelength division multiplexing

Procedia PDF Downloads 269
16175 Relevance in the Water-Energy-Food nexus: an Opportunity for Promoting Socio Economic Development in Algeria

Authors: Nadjib Drouiche

Abstract:

Water resources in Algeria are scarce, often low quality, fragile, and unevenly distributed in space and time. The pressure on water resources can be associated with industrial development, a steady population growth, and demanding land irrigation measures. These conditions createa tense competitionfor managing waterresourcesand sharing thembetween agricultural development, drinking water supply, industrial activities, etc. Moreover, the impact of climate change has placed in the forefront national policies focused on the water-energy-food nexus (WEF). In this context, desalination membrane technologies could play an increasing rolefor supporting segments of the Algerian economy that are heavily water-dependent. By implementing water reuse and desalination strategies together in the agricultural sector, there is an opportunity to expand the access to healthy food and clean water, thereby keeping the WEF nexus effects under control.

Keywords: desalination, mitigation, climate change, sustainable development goals

Procedia PDF Downloads 74
16174 Exploring Data Stewardship in Fog Networking Using Blockchain Algorithm

Authors: Ruvaitha Banu, Amaladhithyan Krishnamoorthy

Abstract:

IoT networks today solve various consumer problems, from home automation systems to aiding in driving autonomous vehicles with the exploration of multiple devices. For example, in an autonomous vehicle environment, multiple sensors are available on roads to monitor weather and road conditions and interact with each other to aid the vehicle in reaching its destination safely and timely. IoT systems are predominantly dependent on the cloud environment for data storage, and computing needs that result in latency problems. With the advent of Fog networks, some of this storage and computing is pushed to the edge/fog nodes, saving the network bandwidth and reducing the latency proportionally. Managing the data stored in these fog nodes becomes crucial as it might also store sensitive information required for a certain application. Data management in fog nodes is strenuous because Fog networks are dynamic in terms of their availability and hardware capability. It becomes more challenging when the nodes in the network also live a short span, detaching and joining frequently. When an end-user or Fog Node wants to access, read, or write data stored in another Fog Node, then a new protocol becomes necessary to access/manage the data stored in the fog devices as a conventional static way of managing the data doesn’t work in Fog Networks. The proposed solution discusses a protocol that acts by defining sensitivity levels for the data being written and read. Additionally, a distinct data distribution and replication model among the Fog nodes is established to decentralize the access mechanism. In this paper, the proposed model implements stewardship towards the data stored in the Fog node using the application of Reinforcement Learning so that access to the data is determined dynamically based on the requests.

Keywords: IoT, fog networks, data stewardship, dynamic access policy

Procedia PDF Downloads 32
16173 Resourcing for Post-Disaster Housing Reconstruction: The Case of Cyclone Sidr and Aila in Bangladesh

Authors: Zahidul Islam

Abstract:

This study investigates the effectiveness of resourcing in post-disaster housing reconstruction with reference to Cyclones Sidr and Aila in Bangladesh. Through evaluating three key theories- Build Back Better approach, Balance Scorecard approach and Dynamic Competency theories, the synthesis of literature, and empirical fieldwork, this research develops a dynamic theoretical framework that moves the trajectory of post-disaster housing reconstruction towards the reconstruction of more resilient houses. The ultimate goal of any post-disaster housing reconstruction project is to provide quality houses and to achieve high levels of satisfaction for beneficiaries. However, post-disaster reconstruction projects often fail in their stated objectives; only 10-20% housing needs are met, with most houses constructed on a temporary rather than permanent basis. A number of scholars have argued that access to resources can significantly increase the capacity and capability of disaster victims to rebuild their lives, including the construction of new homes. This study draws on structured interviews of 285 villagers affected by cyclones to investigate the effectiveness of resourcing in rebuilding houses after Cyclone Sidr in 2007 and Cyclone Aila in 2009. Furthermore, semi-structured interviews were conducted with 20 key stakeholders in UNDP, Oxfam, government officials, and national and international NGOs. The results of this study show that recovery rate of cyclone resilient houses that can withstand cyclone is very low and majority of the population are still vulnerable. Furthermore, hierarchical regression of survey data and thematic analyses of qualitative data indicate that access to resources, level of education, quality of building materials and income generating activities of the respondents are critical for effective post-disaster recovery. Conversely, resource availability, lack of coordination among participant organisations, corruption and lack of access to appropriate land constituted significant obstacles to livelihood recovery. Finally, this study makes significant theoretical contributions to theories of post-disaster recovery by introducing new variables and measures for evaluating the quality and effectiveness of post-disaster housing.

Keywords: disaster, resourcing, housing, resilience

Procedia PDF Downloads 116
16172 A Qualitative Exploration of How Brazilian Immigrant Mothers Living in the United States Obtain Information about Physical Activity and Screen-Viewing for Their Young Children

Authors: Ana Cristina Lindsay, Mary L. Greaney

Abstract:

Background: Racial/ethnic minority children of low-income immigrant families remain at increased risk of obesity. Consistent with high rates of childhood obesity among racial/ethnic minority children are high rates of physical inactivity and increased levels of sedentary behaviors (e.g., TV and other screen viewing). Brazilians comprise a fast-growing immigrant population group in the US, yet little research has focused on the health issues affecting Brazilian immigrant children. The purpose of this qualitative study was to explore how Brazilian-born immigrant mothers living in the United States obtain information about physical activity and screen-time for their young children. Methods: Qualitative research including focus groups with Brazilian immigrant mothers of preschool-age children living in the U.S. Results: Results revealed that Brazilian immigrant mothers obtain information on young children’s physical activity and screen-time from a variety of sources including interpersonal communication, television and magazines, government health care programs (WIC program) and professionals (e.g., nurses and pediatricians). A noteworthy finding is the significant role of foreign information sources (Brazilian TV shows and magazines) on mothers’ access to information about these early behaviors. Future research is needed to quantify and better understanding Brazilian parents’ access to accurate and sound information related to young children’s physical activity and screen-viewing behaviors. Conclusions: To our knowledge, no existing research has examined how Brazilian immigrant mothers living in the United States obtain information about these behaviors. This information is crucial for the design of culturally appropriate early childhood obesity prevention interventions tailored to the specific needs of this ethnic group.

Keywords: physical activity, scree-time, information, immigrant, mothers, Brazilian, United States

Procedia PDF Downloads 256
16171 Using GIS for Assessment and Modelling of Oil Spill Risk at Vulnerable Coastal Resources: Of Misratah Coast, Libya

Authors: Abduladim Maitieg

Abstract:

The oil manufacture is one of the main productive activities in Libya and has a massive infrastructure, including offshore drilling and exploration and wide oil export platform sites that located in coastal area. There is a threat to marine and coastal area of oil spills is greatest in those sites with a high spills comes from urban and industry, parallel to that, monitoring oil spills and risk emergency strategy is weakness, An approach for estimating a coastal resources vulnerability to oil spills is presented based on abundance, environmental and Scio-economic importance, distance to oil spill resources and oil risk likelihood. As many as 10 coastal resources were selected for oil spill assessment at the coast. This study aims to evaluate, determine and establish vulnerable coastal resource maps and estimating the rate of oil spill comes for different oil spill resources in Misratah marine environment. In the study area there are two type of oil spill resources, major oil resources come from offshore oil industries which are 96 km from the Coast and Loading/Uploading oil platform. However, the miner oil resources come from urban sewage pipes and fish ports. In order to analyse the collected database, the Geographic information system software has been used to identify oil spill location, to map oil tracks in front of study area, and developing seasonal vulnerable costal resources maps. This work shows that there is a differential distribution of the degree of vulnerability to oil spills along the coastline, with values ranging from high vulnerability and low vulnerability, and highlights the link between oil spill movement and coastal resources vulnerability. The results of assessment found most of costal freshwater spring sites are highly vulnerable to oil spill due to their location on the intertidal zone and their close to proximity to oil spills recourses such as Zreag coast. Furthermore, the Saltmarsh coastline is highly vulnerable to oil spill risk due to characterisation as it contains a nesting area of sea turtles and feeding places for migratory birds and the . Oil will reach the coast in winter season according to oil spill movement. Coastal tourist beaches in the north coast are considered as highly vulnerable to oil spill due to location and closeness to oil spill resources.

Keywords: coastal recourses vulnerability, oil spill trajectory, gnome software, Misratah coast- Libya, GIS

Procedia PDF Downloads 287
16170 Iraq Water Resources Planning: Perspectives and Prognoses

Authors: Nadhir Al-Ansari, Ammar A. Ali, Sven Knutsson

Abstract:

Iraq is located in the Middle East. It covers an area of 433,970 square kilometres populated by about 32 million inhabitants. Iraq greatly relies in its water resources on the Tigris and Euphrates Rivers. Recently, Iraq is suffering from water shortage problems. This is due to external and internal factors. The former includes global warming and water resources policies of neighbouring countries while the latter includes mismanagement of its water resources. The supply and demand are predicted to be 43 and 66.8 Billion Cubic Meters (BCM) respectively in 2015, while in 2025 it will be 17.61 and 77 BCM respectively. In addition, future prediction suggests that Tigris and Euphrates Rivers will be completely dry in 2040. To overcome this problem, prudent water management policies are to be adopted. This includes Strategic Water Management Vision, development of irrigation techniques, reduction of water losses, use of non-conventional water resources and research and development planning.

Keywords: Iraq, Tigris River, Euphrates River, water scarcity, water resources management

Procedia PDF Downloads 423
16169 Mineral Deposits in Spatial Planning Systems – Review of European Practices

Authors: Alicja Kot-Niewiadomska

Abstract:

Securing sustainable access to raw materials is vital for the growth of the European economy and for the goals laid down in Strategy Europe 2020. One of the most important sources of mineral raw materials are primary deposits. The efficient management of them, including extraction, will ensure competitiveness of the European economy. A critical element of this approach is mineral deposits safeguarding and the most important tool - spatial planning. The safeguarding of deposits should be understood as safeguarding of land access, and safeguarding of area against development, which may (potential) prevent the use of the deposit and the necessary mining activities. Many European Union countries successfully integrated their mineral policy and spatial policy, which has ensured the proper place of mineral deposits in their spatial planning systems. These, in turn, are widely recognized as the most important mineral deposit safeguarding tool, the essence of which is to ensure long-term access to its resources. The examples of Austria, Portugal, Slovakia, Czech Republic, Sweden, and the United Kingdom, discussed in the paper, are often mentioned as examples of good practices in this area. Although none of these countries managed to avoid cases of social and environmental conflicts related to mining activities, the solutions they implement certainly deserve special attention. And for many countries, including Poland, they can be a potential source of solutions aimed at improving the protection of mineral deposits.

Keywords: mineral deposits, land use planning, mineral deposit safeguarding, European practices

Procedia PDF Downloads 148
16168 An Intelligent Cloud Radio Access Network (RAN) Architecture for Future 5G Heterogeneous Wireless Network

Authors: Jin Xu

Abstract:

5G network developers need to satisfy the necessary requirements of additional capacity from massive users and spectrally efficient wireless technologies. Therefore, the significant amount of underutilized spectrum in network is motivating operators to combine long-term evolution (LTE) with intelligent spectrum management technology. This new LTE intelligent spectrum management in unlicensed band (LTE-U) has the physical layer topology to access spectrum, specifically the 5-GHz band. We proposed a new intelligent cloud RAN for 5G.

Keywords: cloud radio access network, wireless network, cloud computing, multi-agent

Procedia PDF Downloads 395
16167 When the Rubber Hits the Road: The Enactment of Well-Intentioned Language Policy in Digital vs. In Situ Spaces on Washington, DC Public Transportation

Authors: Austin Vander Wel, Katherin Vargas Henao

Abstract:

Washington, DC, is a city in which Spanish, along with several other minority languages, is prevalent not only among tourists but also those living within city limits. In response to this linguistic diversity and DC’s adoption of the Language Access Act in 2004, the Washington Metropolitan Area Transit Authority (WMATA) committed to addressing the need for equal linguistic representation and established a five-step plan to provide the best multilingual information possible for public transportation users. The current study, however, strongly suggests that this de jure policy does not align with the reality of Spanish’s representation on DC public transportation–although perhaps doing so in an unexpected way. In order to investigate Spanish’s de facto representation and how it contrasts with de jure policy, this study implements a linguistic landscapes methodology that takes critical language-policy as its theoretical framework (Tollefson, 2005). Specifically concerning de facto representation, it focuses on the discrepancies between digital spaces and the actual physical spaces through which users travel. These digital vs. in situ conditions are further analyzed by separately addressing aural and visual modalities. In digital spaces, data was collected from WMATA’s website (visual) and their bilingual hotline (aural). For in situ spaces, both bus and metro areas of DC public transportation were explored, with signs comprising the visual modality and recordings, driver announcements, and interactions with metro kiosk workers comprising the aural modality. While digital spaces were considered to successfully fulfill WMATA’s commitment to representing Spanish as outlined in the de jure policy, physical spaces show a large discrepancy between what is said and what is done, particularly regarding the bus system, in addition to the aural modality overall. These discrepancies in situ spaces place Spanish speakers at a clear disadvantage, demanding additional resources and knowledge on the part of residents with limited or no English proficiency in order to have equal access to this public good. Based on our critical language-policy analysis, while Spanish is represented as a right in the de jure policy, its implementation in situ clearly portrays Spanish as a problem since those seeking bilingual information can not expect it to be present when and where they need it most (Ruíz, 1984; Tollefson, 2005). This study concludes with practical, data-based steps to improve the current situation facing DC’s public transportation context and serves as a model for responding to inadequate enactment of de jure policy in other language policy settings.

Keywords: Urban landscape, language access, critical-language policy, spanish, public transportation

Procedia PDF Downloads 50