Search results for: access network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7676

Search results for: access network

4616 Improving Fingerprinting-Based Localization System Using Generative AI

Authors: Getaneh Berie Tarekegn

Abstract:

A precise localization system is crucial for many artificial intelligence Internet of Things (AI-IoT) applications in the era of smart cities. Their applications include traffic monitoring, emergency alarming, environmental monitoring, location-based advertising, intelligent transportation, and smart health care. The most common method for providing continuous positioning services in outdoor environments is by using a global navigation satellite system (GNSS). Due to nonline-of-sight, multipath, and weather conditions, GNSS systems do not perform well in dense urban, urban, and suburban areas.This paper proposes a generative AI-based positioning scheme for large-scale wireless settings using fingerprinting techniques. In this article, we presented a semi-supervised deep convolutional generative adversarial network (S-DCGAN)-based radio map construction method for real-time device localization. It also employed a reliable signal fingerprint feature extraction method with t-distributed stochastic neighbor embedding (t-SNE), which extracts dominant features while eliminating noise from hybrid WLAN and long-term evolution (LTE) fingerprints. The proposed scheme reduced the workload of site surveying required to build the fingerprint database by up to 78.5% and significantly improved positioning accuracy. The results show that the average positioning error of GAILoc is less than 0.39 m, and more than 90% of the errors are less than 0.82 m. According to numerical results, SRCLoc improves positioning performance and reduces radio map construction costs significantly compared to traditional methods.

Keywords: location-aware services, feature extraction technique, generative adversarial network, long short-term memory, support vector machine

Procedia PDF Downloads 54
4615 Cross-Layer Design of Event-Triggered Adaptive OFDMA Resource Allocation Protocols with Application to Vehicle Clusters

Authors: Shaban Guma, Naim Bajcinca

Abstract:

We propose an event-triggered algorithm for the solution of a distributed optimization problem by means of the projected subgradient method. Thereby, we invoke an OFDMA resource allocation scheme by applying an event-triggered sensitivity analysis at the access point. The optimal resource assignment of the subcarriers to the involved wireless nodes is carried out by considering the sensitivity analysis of the overall objective function as defined by the control of vehicle clusters with respect to the information exchange between the nodes.

Keywords: consensus, cross-layer, distributed, event-triggered, multi-vehicle, protocol, resource, OFDMA, wireless

Procedia PDF Downloads 326
4614 Interactive IoT-Blockchain System for Big Data Processing

Authors: Abdallah Al-ZoubI, Mamoun Dmour

Abstract:

The spectrum of IoT devices is becoming widely diversified, entering almost all possible fields and finding applications in industry, health, finance, logistics, education, to name a few. The IoT active endpoint sensors and devices exceeded the 12 billion mark in 2021 and are expected to reach 27 billion in 2025, with over $34 billion in total market value. This sheer rise in numbers and use of IoT devices bring with it considerable concerns regarding data storage, analysis, manipulation and protection. IoT Blockchain-based systems have recently been proposed as a decentralized solution for large-scale data storage and protection. COVID-19 has actually accelerated the desire to utilize IoT devices as it impacted both demand and supply and significantly affected several regions due to logistic reasons such as supply chain interruptions, shortage of shipping containers and port congestion. An IoT-blockchain system is proposed to handle big data generated by a distributed network of sensors and controllers in an interactive manner. The system is designed using the Ethereum platform, which utilizes smart contracts, programmed in solidity to execute and manage data generated by IoT sensors and devices. such as Raspberry Pi 4, Rasbpian, and add-on hardware security modules. The proposed system will run a number of applications hosted by a local machine used to validate transactions. It then sends data to the rest of the network through InterPlanetary File System (IPFS) and Ethereum Swarm, forming a closed IoT ecosystem run by blockchain where a number of distributed IoT devices can communicate and interact, thus forming a closed, controlled environment. A prototype has been deployed with three IoT handling units distributed over a wide geographical space in order to examine its feasibility, performance and costs. Initial results indicated that big IoT data retrieval and storage is feasible and interactivity is possible, provided that certain conditions of cost, speed and thorough put are met.

Keywords: IoT devices, blockchain, Ethereum, big data

Procedia PDF Downloads 145
4613 Highly Accurate Tennis Ball Throwing Machine with Intelligent Control

Authors: Ferenc Kovács, Gábor Hosszú

Abstract:

The paper presents an advanced control system for tennis ball throwing machines to improve their accuracy according to the ball impact points. A further advantage of the system is the much easier calibration process involving the intelligent solution of the automatic adjustment of the stroking parameters according to the ball elasticity, the self-calibration, the use of the safety margin at very flat strokes and the possibility to placing the machine to any position of the half court. The system applies mathematical methods to determine the exact ball trajectories and special approximating processes to access all points on the aimed half court.

Keywords: control system, robot programming, robot control, sports equipment, throwing machine

Procedia PDF Downloads 392
4612 Secure Data Sharing of Electronic Health Records With Blockchain

Authors: Kenneth Harper

Abstract:

The secure sharing of Electronic Health Records (EHRs) is a critical challenge in modern healthcare, demanding solutions to enhance interoperability, privacy, and data integrity. Traditional standards like Health Information Exchange (HIE) and HL7 have made significant strides in facilitating data exchange between healthcare entities. However, these approaches rely on centralized architectures that are often vulnerable to data breaches, lack sufficient privacy measures, and have scalability issues. This paper proposes a framework for secure, decentralized sharing of EHRs using blockchain technology, cryptographic tokens, and Non-Fungible Tokens (NFTs). The blockchain's immutable ledger, decentralized control, and inherent security mechanisms are leveraged to improve transparency, accountability, and auditability in healthcare data exchanges. Furthermore, we introduce the concept of tokenizing patient data through NFTs, creating unique digital identifiers for each record, which allows for granular data access controls and proof of data ownership. These NFTs can also be employed to grant access to authorized parties, establishing a secure and transparent data sharing model that empowers both healthcare providers and patients. The proposed approach addresses common privacy concerns by employing privacy-preserving techniques such as zero-knowledge proofs (ZKPs) and homomorphic encryption to ensure that sensitive patient information can be shared without exposing the actual content of the data. This ensures compliance with regulations like HIPAA and GDPR. Additionally, the integration of Fast Healthcare Interoperability Resources (FHIR) with blockchain technology allows for enhanced interoperability, enabling healthcare organizations to exchange data seamlessly and securely across various systems while maintaining data governance and regulatory compliance. Through real-world case studies and simulations, this paper demonstrates how blockchain-based EHR sharing can reduce operational costs, improve patient outcomes, and enhance the security and privacy of healthcare data. This decentralized framework holds great potential for revolutionizing healthcare information exchange, providing a transparent, scalable, and secure method for managing patient data in a highly regulated environment.

Keywords: blockchain, electronic health records (ehrs), fast healthcare interoperability resources (fhir), health information exchange (hie), hl7, interoperability, non-fungible tokens (nfts), privacy-preserving techniques, tokens, secure data sharing,

Procedia PDF Downloads 14
4611 Enforceability of the Right to Education and Rights in Education for Refugees after the European Refugee Crisis

Authors: Kurt Willems

Abstract:

The right to education is a fundamental human right, which has been entrenched in many international and regional treaties and national constitutions. Nevertheless, practice shows that many obstacles impede easy access to quality education for refugees. Overall, the material effects of international human rights legislation on improving (irregular) migrants’ access to social rights in the European countries have remained limited due to the lack of guarantees on effective incorporation in the municipal legal order and due to the lack of effective enforcement mechanisms. After the recent refugee crisis in Europe, this issue has grown in importance. The presentation aims to give a brief overview of the most important issues impeding the effective enforceability of the right to education for refugees. I. Do refugees fall within the scope of application of the relevant human rights treaties and to which extent can they invoke human rights treaties in domestic courts to set aside domestic legislation? II. How is the justiciability of the right to education organized in those treaties? III. What is the legal answer to questions raised in practice when dealing with the influx of refugees in Europe: (i) can refugees be placed in separate schools or classes until they can follow the regular curriculum?; (ii) can higher school fees be asked from pupils without legal documents?; (iii) do refugees have a right to be taught in their own native language until they learn to speak the national language? To answer the above questions, the doctrinal and comparative legal method will be used. The normative framework, as interpreted within Europe, will be distilled from the recent and relevant international treaties and European law instruments (in particular the Convention on the Rights of the Child, the European Convention on human rights, the European Social Charter and the International Covenant on Economic, Social and Cultural Rights) and their underlying policy documents, the legal literature, the (limited) European jurisprudence, and the general comments to those treaties. The article is mainly descriptive in nature. Its aim is to serve as a summary of the legal provisions, case law and legal literature on the topic of the right to education for refugees. The research shows that the reasons for the delicate enforceability of the rights to and the rights in education are multifold. The research will categorize the different contributing factors under the following headings: (i) problems related to the justiciability of international law as such; (ii) problems specifically related to the educational field; (iii) problems related to policy issues in the refugee debate. By categorizing the reasons contributing to the difficult enforceability of the right to education and the rights in education for refugees, this research hopes to facilitate the search for solutions to this delicate problem.

Keywords: right to education, refugees, discrimination, enforceability of human rights

Procedia PDF Downloads 237
4610 Making the Choice: Educational Mobility Decisions of International Doctoral Students

Authors: Adel Pasztor

Abstract:

International doctoral mobility is a largely under-researched component of academic mobility and migration. This is in stark contrast to the case of student mobility where much research has been undertaken on Erasmus students; or the growing research on academic staff mobility which can be viewed as a key part of highly skilled migration. The aim of this paper is to remedy the situation by specifically focusing on international doctoral students studying at elite higher education institutions in the United Kingdom. In doing so, in-depth qualitative interviews with doctoral students and recent graduates were carried out in order to identify the signifiers of an internationally mobile doctoral student and unpack the decision-making processes leading onto the choice of higher education institution abroad. Overall, a diverse range of degree subjects from within the humanities and the social sciences were covered with a relatively large spread of nationalities which include the following countries: Italy, Germany, Hungary, Latvia, Bulgaria, Turkey, Lebanon, Israel, Australia, USA, China, and Chile. The interview questions were designed to probe the motivations, choices, educational trajectories and career plans of international doctoral students relative to their social class background, gender, nationality or funding. It was clear from the interviews that there were two main types of international doctoral students: those who ‘did not think anything else was ever a serious possibility’, contrasted with the other, more opportune type, to whom ‘it happened to be a PhD’. There were marked differences between the two types since initial access to university, mainly because educational decisions such as the doctorate do not happen in a vacuum, rather are built on the individual’s higher education aspirations and previous educational choices. The results were in line with existing literature suggesting that those with higher educated parents and from schools strongly supporting the choice process fared better as they were able to make well informed, well thought through as well as strategic decisions for their future involving the very best universities within the national boundaries. Being ‘at the right place’ often meant access to prestigious doctoral scholarships thus, the route of the PhD has been chosen even if it did not necessarily enhance career opportunities. At the same time, the initial higher education choices of those with limited capital were played out locally, although they did aim for the best universities within their geographically constrained landscape of choice. Here, the majority of students referred to some ‘turning points’ in their lives which lead them towards considering international doctoral opportunities but essentially their proactive, do-it-yourself attitude was behind the life-changing educational opportunities.

Keywords: choice, doctoral students, international mobility, PhD, UK

Procedia PDF Downloads 251
4609 Approaching Sexual Violence Against People with Disabilities in Colombia from a Qualitative Perspective

Authors: Mariana Calderón, Rocío Murad, Natalia Acevedo, Laura León, Juliana Fonseca, Maria de los Angeles Balaguera Villa

Abstract:

Recently, different countries and international organizations have put on their agenda the elimination of violence against people with disabilities. This research aims to evaluate the social dimensions of sexual violence against people with disabilities, particularly those with psychosocial and cognitive, in Colombia. Results reveal that 55% of people with disabilities that are survivors of sexual violence are younger than 29 years and 20,4 are people with cognitive and psychosocial disabilities. Colombian regions with better social positions presented more cases of sexual violence against people with disabilities. There were found access barriers for health, education and employment among this population, and there was also found poor data quality. Despite Colombia having an important normative framework aimed at preventing and attending to gender-based violence, it does not take into account people with disabilities specific needs. Additionally, it was found an insufficient implementation and appropriation of these norms, negative attitudes, and in general, a lack of service adaptation according to the needs, identities and circumstances of people with disabilities. Furthermore, among the factors that are exposing people with disabilities to sexual violence, it was found that family members tend to be the main aggressors, there are deep gaps in the sex education received by people with disabilities, imaginaries and perceptions about their sexuality are both hypersexualizing and presenting them as asexual. On the other hand, among protective factors, there were found body self-knowledge and conscience, acknowledgment of their sexuality and their sexual and reproductive rights and access to sex ed. Although during the last few years, there has occurred a positive change toward social inclusion of people with disabilities, specifically through their role in the political agenda and the recognition of their rights. More work is needed in order to guarantee their sexual and reproductive rights, particularly for persons with psychosocial and cognitive disabilities. This research results showed the importance of transforming persisting negative imaginaries about their sexuality and also enforcing and promoting their autonomy. In this sense, it is important to acknowledge gaps and barriers faced by them and create strategies to encourage their social inclusion through education, employment, and skill development. Nevertheless, it is necessary to keep contributing new evidence of the social determinants of health that are influencing the occurrence of sexual violence. This research understands sexual violence against people with disabilities in a multidimensional manner and offers the following recommendations: 1- To foment public sensitization and understanding of disabilities. 2- To increase parents, caregivers and officers’ commitment to the prevention and reduction of sexual violence. 3- To focus on the needs, identities and circumstances of people with disabilities.

Keywords: disabilities, sexual and reproductive rights, sexual violence, prevention

Procedia PDF Downloads 74
4608 Evaluation of the Cytotoxicity and Genotoxicity of Chemical Material in Filters PM2.5 of the Monitoring Stations of the Network of Air Quality in the Valle De Aburrá, Colombia

Authors: Alejandra Betancur Sánchez, Carmen Elena Zapata Sánchez, Juan Bautista López Ortiz

Abstract:

Adverse effects and increased air pollution has raised concerns about regulatory policies and has fostered the development of new air quality standards; this is due to the complexity of the composition and the poorly understood reactions in the atmospheric environment. Toxic compounds act as environmental agents having various effects, from irritation to death of cells and tissues. A toxic agent is defined an adverse response in a biological system. There is a particular class that produces some kind of alteration in the genetic material or associated components, so they are recognized as genotoxic agents. Within cells, they interact directly or indirectly with DNA, causing mutations or interfere with some enzymatic repair processes or in the genesis or polymerization of proteinaceous material involved in chromosome segregation. An air pollutant may cause or contribute to increased mortality or serious illness and even pose a potential danger to human health. The aim of this study was to evaluate the effect on the viability and the genotoxic potential on the cell lines CHO-K1 and Jurkat and peripheral blood of particulate matter PM T lymphocytes 2.5 obtained from filters collected three monitoring stations network air quality Aburrá Valley. Tests, reduction of MTT, trypan blue, NRU, comet assay, sister chromatid exchange (SCE) and chromosomal aberrations allowed evidence reduction in cell viability in cell lines CHO-K1 and Jurkat and damage to the DNA from cell line CHOK1, however, no significant effects were observed in the number of SCEs and chromosomal aberrations. The results suggest that PM2.5 material has genotoxic potential and can induce cancer development, as has been suggested in other studies.

Keywords: PM2.5, cell line Jurkat, cell line CHO-K1, cytotoxicity, genotoxicity

Procedia PDF Downloads 262
4607 Curricular Reforms for Inclusive Education: Equalization of Opportunities for the Physically Challenged Persons

Authors: Ede Jairus Adagba

Abstract:

The National Policy on Education has made elaborate and fascinating provisions for the education of the people with Special Needs. This category of people includes the physically challenged, the disadvantaged, the gifted and talented. However, the focus of this paper is people that are physically challenged. The paper reasons that in spite of the commendable provisions, the present curricular and learning conditions are not conducive enough to cater for the interest of the physically challenged persons. As a panacea, some curricular and physical condition reforms are proposed. These are hoped to facilitate access to inclusive education and equalization for opportunities of the physically challenged.

Keywords: curricular reforms, equalization, inclusive education, physically challenged persons

Procedia PDF Downloads 298
4606 New Result for Optical OFDM in Code Division Multiple Access Systems Using Direct Detection

Authors: Cherifi Abdelhamid

Abstract:

In optical communication systems, OFDM has received increased attention as a means to overcome various limitations of optical transmission systems such as modal dispersion, relative intensity noise, chromatic dispersion, polarization mode dispersion and self-phase modulation. The multipath dispersion limits the maximum transmission data rates. In this paper we investigate OFDM system where multipath induced intersymbol interference (ISI) is reduced and we increase the number of users by combining OFDM system with OCDMA system using direct detection Incorporate OOC (orthogonal optical code) for minimize a bit error rate.

Keywords: OFDM, OCDMA, OOC (orthogonal optical code), (ISI), prim codes (Pc)

Procedia PDF Downloads 649
4605 A Holistic Approach to Institutional Cyber Security

Authors: Mehmet Kargaci

Abstract:

It is more important to access information than to get the correct information and to transform it to the knowledge in a proper way. Every person, organizations or governments who have the knowledge now become the target. Cyber security involves the range of measures to be taken from individual to the national level. The National institutions refer to academic, military and major public and private institutions, which are very important for the national security. Thus they need further cyber security measures. It appears that the traditional cyber security measures in the national level are alone not sufficient, while the individual measures remain in a restricted level. It is evaluated that the most appropriate method for preventing the cyber vulnerabilities rather than existing measures are to develop institutional measures. This study examines the cyber security measures to be taken, especially in the national institutions.

Keywords: cyber defence, information, critical infrastructure, security

Procedia PDF Downloads 534
4604 Cryptosystems in Asymmetric Cryptography for Securing Data on Cloud at Various Critical Levels

Authors: Sartaj Singh, Amar Singh, Ashok Sharma, Sandeep Kaur

Abstract:

With upcoming threats in a digital world, we need to work continuously in the area of security in all aspects, from hardware to software as well as data modelling. The rise in social media activities and hunger for data by various entities leads to cybercrime and more attack on the privacy and security of persons. Cryptography has always been employed to avoid access to important data by using many processes. Symmetric key and asymmetric key cryptography have been used for keeping data secrets at rest as well in transmission mode. Various cryptosystems have evolved from time to time to make the data more secure. In this research article, we are studying various cryptosystems in asymmetric cryptography and their application with usefulness, and much emphasis is given to Elliptic curve cryptography involving algebraic mathematics.

Keywords: cryptography, symmetric key cryptography, asymmetric key cryptography

Procedia PDF Downloads 121
4603 Designing Sustainable and Energy-Efficient Urban Network: A Passive Architectural Approach with Solar Integration and Urban Building Energy Modeling (UBEM) Tools

Authors: A. Maghoul, A. Rostampouryasouri, MR. Maghami

Abstract:

The development of an urban design and power network planning has been gaining momentum in recent years. The integration of renewable energy with urban design has been widely regarded as an increasingly important solution leading to climate change and energy security. Through the use of passive strategies and solar integration with Urban Building Energy Modeling (UBEM) tools, architects and designers can create high-quality designs that meet the needs of clients and stakeholders. To determine the most effective ways of combining renewable energy with urban development, we analyze the relationship between urban form and renewable energy production. The procedure involved in this practice include passive solar gain (in building design and urban design), solar integration, location strategy, and 3D models with a case study conducted in Tehran, Iran. The study emphasizes the importance of spatial and temporal considerations in the development of sector coupling strategies for solar power establishment in arid and semi-arid regions. The substation considered in the research consists of two parallel transformers, 13 lines, and 38 connection points. Each urban load connection point is equipped with 500 kW of solar PV capacity and 1 kWh of battery Energy Storage (BES) to store excess power generated from solar, injecting it into the urban network during peak periods. The simulations and analyses have occurred in EnergyPlus software. Passive solar gain involves maximizing the amount of sunlight that enters a building to reduce the need for artificial lighting and heating. Solar integration involves integrating solar photovoltaic (PV) power into smart grids to reduce emissions and increase energy efficiency. Location strategy is crucial to maximize the utilization of solar PV in an urban distribution feeder. Additionally, 3D models are made in Revit, and they are keys component of decision-making in areas including climate change mitigation, urban planning, and infrastructure. we applied these strategies in this research, and the results show that it is possible to create sustainable and energy-efficient urban environments. Furthermore, demand response programs can be used in conjunction with solar integration to optimize energy usage and reduce the strain on the power grid. This study highlights the influence of ancient Persian architecture on Iran's urban planning system, as well as the potential for reducing pollutants in building construction. Additionally, the paper explores the advances in eco-city planning and development and the emerging practices and strategies for integrating sustainability goals.

Keywords: energy-efficient urban planning, sustainable architecture, solar energy, sustainable urban design

Procedia PDF Downloads 72
4602 Moving beyond Learner Outcomes: Culturally Responsive Recruitment, Training and Workforce Development

Authors: Tanya Greathosue, Adrianna Taylor, Lori Darnel, Eileen Starr, Susie Ryder, Julie Clockston, Dawn Matera Bassett, Jess Retrum

Abstract:

The United States has an identified need to improve the social work mental and behavioral health workforce shortage with a focus on culturally diverse and responsive mental and behavioral health practitioners to adequately serve its rapidly growing multicultural communities. The U.S. is experiencing rapid demographic changes. Ensuring that mental and behavioral health services are effective and accessible for diverse communities is essential for improving overall health outcomes. In response to this need, we developed a training program focused on interdisciplinary collaboration, evidence-based practices, and culturally responsive services. The success of the training program, funded by the Health Resource Service Administration (HRSA) Behavioral Health Workforce Education and Training (BHWET), has provided the foundation for stage two of our programming. In addition to HRSA/BHWET, we are receiving funding from Colorado Access, a state workforce development initiative, and Kaiser Permanente, a healthcare provider network in the United States. We have moved beyond improved learner outcomes to increasing recruitment of historically excluded, disproportionately mistreated learners, mentorship of students to improve retention, and successful, culturally responsive, diverse workforce development. These authors will utilize a pretest-posttest comparison group design and trend analysis to evaluate the success of the training program. Comparison groups will be matched based on age, gender identification, race, income, as well as prior experience in the field, and time in the degree program. This article describes our culturally responsive training program. Our goals are to increase the recruitment and retention of historically excluded, disproportionately mistreated learners. We achieve this by integrating cultural humility and sensitivity training into educational curricula for our scholars who participate in cohort classroom and seminar learning. Additionally, we provide our community partners who serve as internship sites with ongoing continuing education on how to promote and develop inclusive and supportive work environments for our learners. This work will be of value to mental and behavioral health care practitioners who serve historically excluded and mistreated populations. Participants will learn about culturally informed best practices to increase recruitment and retention of culturally diverse learners. Additionally, participants will hear how to create a culturally responsive training program that encourages an inclusive community for their learners through cohort learning, mentoring, community networking, and critical accountability.

Keywords: culturally diverse mental health practitioners, recruitment, mentorship, workforce development, underserved clinics, professional development

Procedia PDF Downloads 20
4601 An Assessment of Government Entrepreneurship Programs for Women in Sabah Malaysia

Authors: Imelda Albert Gisip, Tarsiah T. Z. Taman

Abstract:

In Asia, particularly in Malaysia women entrepreneurs contribute substantially to economic growth. This paper presents a review of women entrepreneurs’ program, focusing on Creating Millionaires among Young Women Entrepreneurs (CREAM@YWE) program in Sabah Malaysia which aims to accelerate the entrepreneurship among young women in Sabah Malaysia. Entrepreneurs is seen as essential for growth, job creation and social progress and the virtues of small business for Sabah Maju Jaya (SMJ), the Sabah state government Sabah State development plan for the year 2021-2025. SMJ guides the direction of the government's policies and programs, further guiding the implementation in a planned and strategic manner, to achieve targets and goals that coincide with the development needs of the state. One of the government’s agenda is to put its efforts more strongly to ensure that women entrepreneurs are well supported and enhanced. Thus, The CreaM@YWE Program was developed in 2018 with the main objective is to produce competitive young women entrepreneurs in Sabah and achieve "millionaire" status. CreaM@YWE Program is an innovation process which specifically developed to accelerate entrepreneurship sector particularly for women entrepreneurs in Sabah by incorporating strategic partnerships and collaborations with government agencies and industry players. Being the first of its kind in Sabah, the novelty of this project is providing a supportive ecosystem including six months intensive courses, guided through "hands-holding”, collaborations with strategic partners and easy access to government's assistance. Since its inception, the program has significantly impact society’s wellbeing particularly in empowering young women entrepreneurs in Sabah for the past six years and has produced many successful women entrepreneurs with “millionaire” status. Generally, improving women’s enterprise sector in Malaysia needs an overall enabling environment that allows development opportunities for women entrepreneurs including access to resources and support services. Since achieving the goal of women entrepreneurship policy requires effective partnerships and inclusiveness, Cream @YWE Program has managed to practice these in assisting small entrepreneurs among young women in Sabah in accessing public goods and business opportunities. This proves that achieving women’s economic empowerment requires sound policies, a holistic approach and long-term commitment. Thus, this paper presents how Cream@YWE Program has been supporting Sabah young women entrepreneurs by reforming the business environment to help create opportunities for women, while addressing the few existing gender-specific hurdles.

Keywords: entrepreneurship programs, women, Sabah, Malaysia

Procedia PDF Downloads 16
4600 Parental Education on Early Childhood Development Using Mobile App and Website in China

Authors: Margo O'Sullivan, Xuefeng Chen, Qi Zhao, J. Jiang, Ning Fu

Abstract:

Early childhood development, or ECD, is about the 'whole child' – the physical, social and emotional, cognitive thinking and language progression of each young individual. Overwhelming evidence is now available to support investment in Early Childhood Development internationally, attendance at ECD leads to: improved learning outcomes; improved completion and reduced less dropout rates; and most notably, Professor Heckman, Nobel Laureate’s, findings that for every dollar invested, there is an economic return of up to 17%. Notably, ECD has been included in the 2015-2030 Sustainable Development Goals. The Government of China (GOC) has embraced this research and in 2010, State Council, announced focus on ECD setting a target to provide access to ECD for 85% of 3-6 year olds by 2020; to date, the target has surpassed expectations and reached 70.4%. GoC is also increasingly focusing on the even more critical 0-3 age group, when the plasticity of the brain is at its peak and neurons form connections as fast as 1,000 per second. Key to ECD are parents and caregivers of young children, with parental education critical to fully exploiting the significant potential of the early years of children. In China, with such vast numbers, one in seven pre-school age children in the world live in China, the Ministry of Education (MoE) and the National Centre for Education Technology, explored how to best provide parental education and provide key child developmental related knowledge to parents and caregivers. In response, MoE and UNICEF created a resource for parenting information that began with a computer website in 2012, followed by piloting a kiosk service in 2013 for parents in remote areas without access to the internet, and then a mobile phone application in 2014. The resource includes 269 ECD messages and 200 micro-videos covering critical issues of early childhood development from birth to age 6 years: daily care, nutrition and feeding, disease prevention, immunization, development and education, and safety and protection. To date, there have been 397,599 unique views on the website, and data for the mobile app currently being analysed (Links: http://yuer.cbern.gov.cn/; App: https://appsto.re/cn/OiKPZ.i). This paper will explore the development of this resource, its use by parents and the public, efforts to assess the effectiveness in improving parenting and child development, and future plans to roll an updated version in 2016 to all parents.

Keywords: early childhood development, mobile apps for education, parental education, China

Procedia PDF Downloads 223
4599 Electronic Resources and Information Literacy in Higher Education Library

Authors: Nirmal Singh, Rajesh Kumar

Abstract:

Abstract- Information literacy aims to develop both critical understanding and active participation in scholars. It enables scholars to interpret and make informed judgments as users of information sources, and it also enables them to become producers of information in their own right, and thereby to become more powerful participants in society. Information literacy is about developing people‘s critical and creative abilities. Digital media – and particularly the Internet – significantly increase the potential for such active participation of the individual, provided scholars have the means and training to effectively access and use them. This paper provides definition, standards and importance of information literacy (IL). Keywords: Information literacy, Digital Media, Training, Communications Technologies.

Keywords: Information literacy, Digital Media, Training, , Communications Technologies

Procedia PDF Downloads 153
4598 The Impact of E-Commerce in Changing Shopping Lifestyle of Urban Communities in Jakarta

Authors: Juliana Kurniawati, Helen Diana Vida

Abstract:

Visiting mall is one of the Indonesian communities’ lifestyle who live in urban areas. Indonesian people, especially who live in Jakarta, use a shopping mall as one of the favourite places to get pleasure. This mall visitors come from various social classes. They use the shopping mall as a place to identify themselves as urban people. Jakarta has a number of great shopping malls such as Plaza Indonesia, Plaza Senayan, Pondok Indah Mall, etc. The shopping malls become one of the popular places since Jakarta's public sphere such as parks and playgrounds are very limited in number compared to that of shopping malls. In Jakarta, people do not come to a shopping mall only for shopping. Sometimes they go there to look around, meet up with some friends, or watch a movie. We can find everything in the shopping malls. The principle of one-stop shopping becomes an attractive offer for urban people. The items for selling are various, from the cheap goods to the expensive ones. A new era in consumer culture began with the advent of shopping was localized in France in the 19th century. Since the development of the online store and the easier way to access the internet, everyone can shop 24 hours anywhere they want. The emergence of online store indirectly has an impact on the viability of conventional stores. In October 2017, in Indonesia, two outlets branded goods namely Lotus and Debenhams were closed. This may a result of increasingly rampant online stores and shopping style urban society shift. The rising of technology gives some influence on the development of e-commerce in Indonesia. Everyone can access e-commerce. However, those who can do it are the middle up class to high class people. The development of e-commerce in Indonesia is quite fast, we can observe the emergence of various online shopping sites on various social media platforms such as Zalora, Berrybenka, Bukalapak, Lazada, and Tokopedia. E-commerce is increasingly affecting people's lives in line with the development of lifestyle and increasing revenue. This research aims to know the reasons of urban society choosing e-commerce as a medium for grocery shopping, how e-commerce is affecting their shopping styles, as well as why society provides confidence in the online store for shopping. This research uses theories of lifestyle by David Chaney. The subject of this research is urban society who actively shop online on Zalora, the communities based in Jakarta. Zalora site was chosen because the site is selling branded goods. This research is expected to explain in detail about the changing style of the urban community from the shopping mall to digital media by emphasizing the aspect of public confidence towards the online store.

Keywords: e-commerce, shopping, lifestyle, changing

Procedia PDF Downloads 294
4597 Literature Analysis of Nutrition in South Africa and How SA Harvest Aims to Improve Nutrition

Authors: Ali Conn, Kimberly Allen

Abstract:

Food and nutrition play a significant role in humans. It helps them function, grow, and develop into better individuals. However, as essential as food may seem to most people, it is not the case for everyone. South Africans, for example, have been suffering from hunger and poverty for the longest time now. With the spread of the COVID-19 virus, their situations have become worse. Millions of children and their families do not have access to food, hence no proper nutrition. They could barely make ends meet, so they make sure to make the most of what little they have for their household. Fortunately, organizations like SA Harvest aim to end hunger in South Africa. However, they still need to know more about how they can help South Africans with their current diet. Currently, most of the diets are composed of maize and rice. They do not have much to spend on fruits, so these commodities are seen as a luxury. With the help of organizations like SA Harvest, South Africans will be educated and more aware of what they need to eat.

Keywords: nutrition, public health, SA Harvest, food

Procedia PDF Downloads 122
4596 A Survey on Internet of Things and Fog Computing as a Platform for Internet of Things

Authors: Samira Kalantary, Sara Taghipour, Mansoure Ghias Abadi

Abstract:

The Internet of Things (IOT) is a technological revolution that represents the future of computing and communications. IOT is the convergence of Internet with RFID, NFC, Sensor, and smart objects. Fog Computing is the natural platform for IOT. At present, the IOT as a new network communication technology has rapidly shifted from concept to application under fog computing virtual storage computing platform. In this paper, we describe everything about IOT and difference between cloud computing and fog computing.

Keywords: cloud computing, fog computing, Internet of Things (IoT), IOT application

Procedia PDF Downloads 580
4595 Adaptive Auth - Adaptive Authentication Based on User Attributes for Web Application

Authors: Senthuran Manoharan, Rathesan Sivagananalingam

Abstract:

One of the main issues in system security is Authentication. Authentication can be defined as the process of recognizing the user's identity and it is the most important step in the access control process to safeguard data/resources from being accessed by unauthorized users. The static method of authentication cannot ensure the genuineness of the user. Due to this reason, more innovative authentication mechanisms came into play. At first two factor authentication was introduced and later, multi-factor authentication was introduced to enhance the security of the system. It also had some issues and later, adaptive authentication was introduced. In this research paper, the design of an adaptive authentication engine was put forward. The user risk profile was calculated based on the user parameters and then the user was challenged with a suitable authentication method.

Keywords: authentication, adaptive authentication, machine learning, security

Procedia PDF Downloads 241
4594 Selection of Optimal Reduced Feature Sets of Brain Signal Analysis Using Heuristically Optimized Deep Autoencoder

Authors: Souvik Phadikar, Nidul Sinha, Rajdeep Ghosh

Abstract:

In brainwaves research using electroencephalogram (EEG) signals, finding the most relevant and effective feature set for identification of activities in the human brain is a big challenge till today because of the random nature of the signals. The feature extraction method is a key issue to solve this problem. Finding those features that prove to give distinctive pictures for different activities and similar for the same activities is very difficult, especially for the number of activities. The performance of a classifier accuracy depends on this quality of feature set. Further, more number of features result in high computational complexity and less number of features compromise with the lower performance. In this paper, a novel idea of the selection of optimal feature set using a heuristically optimized deep autoencoder is presented. Using various feature extraction methods, a vast number of features are extracted from the EEG signals and fed to the autoencoder deep neural network. The autoencoder encodes the input features into a small set of codes. To avoid the gradient vanish problem and normalization of the dataset, a meta-heuristic search algorithm is used to minimize the mean square error (MSE) between encoder input and decoder output. To reduce the feature set into a smaller one, 4 hidden layers are considered in the autoencoder network; hence it is called Heuristically Optimized Deep Autoencoder (HO-DAE). In this method, no features are rejected; all the features are combined into the response of responses of the hidden layer. The results reveal that higher accuracy can be achieved using optimal reduced features. The proposed HO-DAE is also compared with the regular autoencoder to test the performance of both. The performance of the proposed method is validated and compared with the other two methods recently reported in the literature, which reveals that the proposed method is far better than the other two methods in terms of classification accuracy.

Keywords: autoencoder, brainwave signal analysis, electroencephalogram, feature extraction, feature selection, optimization

Procedia PDF Downloads 111
4593 Incidence of Vulval, Vaginal and Cervical Disease in Rapid Access Clinic in a London Tertiary Hospital Setting

Authors: Kieren Wilson, Gulnaz Majeed

Abstract:

NHS constitution gives rights to the patient with suspected cancer to be seen by a cancer specialist within 2 weeks of referral. Guys and St Thomas Hospital (GSTT) is one of the largest cancer centres in London. NICE guidelines have provided guidance for health professionals to refer patients appropriately to RAC. In GSTT suspected gynae cancer referrals are mostly by NHS e-Referral Service with some fax, emails as well as paper referrals. The objective of this study was to evaluate compliance with 2-week referral pathway with emphasis on one stop diagnostic service with supporting efficient pathways. A prospective evaluation over 3 months (1 Jan 2017 to 31 Mar 2017) was undertaken. There were 26 clinics, 761 patients were booked in the clinics with a DNA rate of 13% (n=101) hence 606 patients were seen. Majority of referrals were for post menopausal bleeding (PMB) 25% (n=194) followed by cervical, vaginal, vulval reasons 23% (n=179) (abnormal cytology excluded as patients directly referred to colposcopy unit in GSTT), ovarian 7% (n=54) and endometrial 5% (n=41). Women with new or previous established diagnosis of cancer were 24, cervical (n=17), vulva (n=6) and vagina (n=1). Multifocal preinvasive disease vulva (VIN), vagina (VAIN) and cervix (CIN) was confirmed in twenty-six patients 4% (high prevalence in HIV patients). Majority of cervical referrals: PCB (n=14), cervical erosion (n=7), polyps (n=9) and cervical cyst were benign. However, two women with PMB had cervical cancer. Only 2 out of 13 referrals with vaginal concerns had VAIN. One case with non-cervical glandular cytology was confirmed to have endometrial cancer. One stop service based on the diagnostic support of ultrasound, colposcopy and hysteroscopy was achieved in 54% (n=359). Patients were discharged to GP, benign gynaecology, endometriosis, combined vulval/dermatology clinic or gynae oncology. 33% (n=202) required a second visit, 12% (n=70) third visit, 3% (n=19) fourth visit, 1% (n=4) fifth visit and 1% (n=6) sixth visit. Main reasons for follow ups were the unavailability of diagnostic slots, patient choice, need for interpreters, the discussion following gynae MDM review for triage to benign gynae, delay in availability of diagnostic results like histology/MRI/CT. Recommendations following this study are multi disciplinary review of pathways with the availability of additional diagnostic procedure slots to aim for one stop service. Furthermore, establishment of virtual and telephone consultations to reduce follow ups.

Keywords: multifocal disease, post menopausal bleeding, preinvasive disease, rapid access clinic

Procedia PDF Downloads 185
4592 Understanding the Role of Social Entrepreneurship in Building Mobility of a Service Transportation Models

Authors: Liam Fassam, Pouria Liravi, Jacquie Bridgman

Abstract:

Introduction: The way we travel is rapidly changing, car ownership and use are declining among young people and those residents in urban areas. Also, the increasing role and popularity of sharing economy companies like Uber highlight a movement towards consuming transportation solutions as a service [Mobility of a Service]. This research looks to bridge the knowledge gap that exists between city mobility, smart cities, sharing economy and social entrepreneurship business models. Understanding of this subject is crucial for smart city design, as access to affordable transport has been identified as a contributing factor to social isolation leading to issues around health and wellbeing. Methodology: To explore the current fit vis-a-vis transportation business models and social impact this research undertook a comparative analysis between a systematic literature review and a Delphi study. The systematic literature review was undertaken to gain an appreciation of the current academic thinking on ‘social entrepreneurship and smart city mobility’. The second phase of the research initiated a Delphi study across a group of 22 participants to review future opinion on ‘how social entrepreneurship can assist city mobility sharing models?’. The Delphi delivered an initial 220 results, which once cross-checked for duplication resulted in 130. These 130 answers were sent back to participants to score importance against a 5-point LIKERT scale, enabling a top 10 listing of areas for shared user transports in society to be gleaned. One further round (4) identified no change in the coefficient of variant thus no further rounds were required. Findings: Initial results of the literature review returned 1,021 journals using the search criteria ‘social entrepreneurship and smart city mobility’. Filtering allied to ‘peer review’, ‘date’, ‘region’ and ‘Chartered associated of business school’ ranking proffered a resultant journal list of 75. Of these, 58 focused on smart city design, 9 on social enterprise in cityscapes, 6 relating to smart city network design and 3 on social impact, with no journals purporting the need for social entrepreneurship to be allied to city mobility. The future inclusion factors from the Delphi expert panel indicated that smart cities needed to include shared economy models in their strategies. Furthermore, social isolation born by costs of infrastructure needed addressing through holistic A-political social enterprise models, and a better understanding of social benefit measurement is needed. Conclusion: In investigating the collaboration between key public transportation stakeholders, a theoretical model of social enterprise transportation models that positively impact upon the smart city needs of reduced transport poverty and social isolation was formed. As such, the research has identified how a revised business model of Mobility of a Service allied to a social entrepreneurship can deliver impactful measured social benefits associated to smart city design existent research.

Keywords: social enterprise, collaborative transportation, new models of ownership, transport social impact

Procedia PDF Downloads 139
4591 Building User Behavioral Models by Processing Web Logs and Clustering Mechanisms

Authors: Madhuka G. P. D. Udantha, Gihan V. Dias, Surangika Ranathunga

Abstract:

Today Websites contain very interesting applications. But there are only few methodologies to analyze User navigations through the Websites and formulating if the Website is put to correct use. The web logs are only used if some major attack or malfunctioning occurs. Web Logs contain lot interesting dealings on users in the system. Analyzing web logs has become a challenge due to the huge log volume. Finding interesting patterns is not as easy as it is due to size, distribution and importance of minor details of each log. Web logs contain very important data of user and site which are not been put to good use. Retrieving interesting information from logs gives an idea of what the users need, group users according to their various needs and improve site to build an effective and efficient site. The model we built is able to detect attacks or malfunctioning of the system and anomaly detection. Logs will be more complex as volume of traffic and the size and complexity of web site grows. Unsupervised techniques are used in this solution which is fully automated. Expert knowledge is only used in validation. In our approach first clean and purify the logs to bring them to a common platform with a standard format and structure. After cleaning module web session builder is executed. It outputs two files, Web Sessions file and Indexed URLs file. The Indexed URLs file contains the list of URLs accessed and their indices. Web Sessions file lists down the indices of each web session. Then DBSCAN and EM Algorithms are used iteratively and recursively to get the best clustering results of the web sessions. Using homogeneity, completeness, V-measure, intra and inter cluster distance and silhouette coefficient as parameters these algorithms self-evaluate themselves to input better parametric values to run the algorithms. If a cluster is found to be too large then micro-clustering is used. Using Cluster Signature Module the clusters are annotated with a unique signature called finger-print. In this module each cluster is fed to Associative Rule Learning Module. If it outputs confidence and support as value 1 for an access sequence it would be a potential signature for the cluster. Then the access sequence occurrences are checked in other clusters. If it is found to be unique for the cluster considered then the cluster is annotated with the signature. These signatures are used in anomaly detection, prevent cyber attacks, real-time dashboards that visualize users, accessing web pages, predict actions of users and various other applications in Finance, University Websites, News and Media Websites etc.

Keywords: anomaly detection, clustering, pattern recognition, web sessions

Procedia PDF Downloads 282
4590 Retrospective Audit of Antibiotic Prophylaxis in Spinal Patient at Mater Private Network Cork 2019 vs 2021

Authors: Ciaran Smiddy, Fergus Nugent, Karen Fitzmaurice

Abstract:

A measure of prescribing and administration of Antimicrobial Prophylaxis before and during Covid-19(2019 vs. 2021) was desired to assess how these were affected by Covid-19. Antimicrobial Prophylaxis was assessed for 60 patients, under 3 Orthopaedic Consultants, against local guidelines. The study found that compliance with guidelines improved significantly, from 60% to 83%, but Appropriate use of Vancomycin reduced from 37% to 29%.

Keywords: antimicrobial stewardship, prescribing, spinal surgery, vancomycin

Procedia PDF Downloads 168
4589 A Deep Dive into the Multi-Pronged Nature of Student Engagement

Authors: Rosaline Govender, Shubnam Rambharos

Abstract:

Universities are, to a certain extent, the source of under-preparedness ideologically, structurally, and pedagogically, particularly since organizational cultures often alienate students by failing to enable epistemological access. This is evident in the unsustainably low graduation rates that characterize South African higher education, which indicate that under 30% graduate in minimum time, under two-thirds graduate within 6 years, and one-third have not graduated after 10 years. Although the statistics for the Faculty of Accounting and Informatics at the Durban University of Technology (DUT) in South Africa have improved significantly from 2019 to 2021, the graduation (32%), throughput (50%), and dropout rates (16%) are still a matter for concern as the graduation rates, in particular, are quite similar to the national statistics. For our students to succeed, higher education should take a multi-pronged approach to ensure student success, and student engagement is one of the ways to support our students. Student engagement depends not only on students’ teaching and learning experiences but, more importantly, on their social and academic integration, their sense of belonging, and their emotional connections in the institution. Such experiences need to challenge students academically and engage their intellect, grow their communication skills, build self-discipline, and promote confidence. The aim of this mixed methods study is to explore the multi-pronged nature of student success within the Faculty of Accounting and Informatics at DUT and focuses on the enabling and constraining factors of student success. The sources of data were the Mid-year student experience survey (N=60), the Hambisa Student Survey (N=85), and semi structured focus group interviews with first, second, and third year students of the Faculty of Accounting and Informatics Hambisa program. The Hambisa (“Moving forward”) focus area is part of the Siyaphumelela 2.0 project at DUT and seeks to understand the multiple challenges that are impacting student success which create a large “middle” cohort of students that are stuck in transition within academic programs. Using the lens of the sociocultural influences on student engagement framework, we conducted a thematic analysis of the two surveys and focus group interviews. Preliminary findings indicate that living conditions, choice of program, access to resources, motivation, institutional support, infrastructure, and pedagogical practices impact student engagement and, thus, student success. It is envisaged that the findings from this project will assist the university in being better prepared to enable student success.

Keywords: social and academic integration, socio-cultural influences, student engagement, student success

Procedia PDF Downloads 70
4588 Analysis and Comparison of Asymmetric H-Bridge Multilevel Inverter Topologies

Authors: Manel Hammami, Gabriele Grandi

Abstract:

In recent years, multilevel inverters have become more attractive for single-phase photovoltaic (PV) systems, due to their known advantages over conventional H-bridge pulse width-modulated (PWM) inverters. They offer improved output waveforms, smaller filter size, lower total harmonic distortion (THD), higher output voltages and others. The most common multilevel converter topologies, presented in literature, are the neutral-point-clamped (NPC), flying capacitor (FC) and Cascaded H-Bridge (CHB) converters. In both NPC and FC configurations, the number of components drastically increases with the number of levels what leads to complexity of the control strategy, high volume, and cost. Whereas, increasing the number of levels in case of the cascaded H-bridge configuration is a flexible solution. However, it needs isolated power sources for each stage, and it can be applied to PV systems only in case of PV sub-fields. In order to improve the ratio between the number of output voltage levels and the number of components, several hybrids and asymmetric topologies of multilevel inverters have been proposed in the literature such as the FC asymmetric H-bridge (FCAH) and the NPC asymmetric H-bridge (NPCAH) topologies. Another asymmetric multilevel inverter configuration that could have interesting applications is the cascaded asymmetric H-bridge (CAH), which is based on a modular half-bridge (two switches and one capacitor, also called level doubling network, LDN) cascaded to a full H-bridge in order to double the output voltage level. This solution has the same number of switches as the above mentioned AH configurations (i.e., six), and just one capacitor (as the FCAH). CAH is becoming popular, due to its simple, modular and reliable structure, and it can be considered as a retrofit which can be added in series to an existing H-Bridge configuration in order to double the output voltage levels. In this paper, an original and effective method for the analysis of the DC-link voltage ripple is given for single-phase asymmetric H-bridge multilevel inverters based on level doubling network (LDN). Different possible configurations of the asymmetric H-Bridge multilevel inverters have been considered and the analysis of input voltage and current are analytically determined and numerically verified by Matlab/Simulink for the case of cascaded asymmetric H-bridge multilevel inverters. A comparison between FCAH and the CAH configurations is done on the basis of the analysis of the DC and voltage ripple for the DC source (i.e., the PV system). The peak-to-peak DC and voltage ripple amplitudes are analytically calculated over the fundamental period as a function of the modulation index. On the basis of the maximum peak-to-peak values of low frequency and switching ripple voltage components, the DC capacitors can be designed. Reference is made to unity output power factor, as in case of most of the grid-connected PV generation systems. Simulation results will be presented in the full paper in order to prove the effectiveness of the proposed developments in all the operating conditions.

Keywords: asymmetric inverters, dc-link voltage, level doubling network, single-phase multilevel inverter

Procedia PDF Downloads 203
4587 Effect of Wettability Alteration on Production Performance in Unconventional Tight Oil Reservoirs

Authors: Rashid S. Mohammad, Shicheng Zhang, Xinzhe Zhao

Abstract:

In tight oil reservoirs, wettability alteration has generally been considered as an effective way to remove fracturing fluid retention on the surface of the fracture and consequently improved oil production. However, there is a lack of a reliable productivity prediction model to show the relationship between the wettability and oil production in tight oil well. In this paper, a new oil productivity prediction model of immiscible oil-water flow and miscible CO₂-oil flow accounting for wettability is developed. This mathematical model is established by considering two different length scales: nonporous network and propped fractures. CO₂ flow diffuses in the nonporous network and high velocity non-Darcy flow in propped fractures are considered by taking into account the effect of wettability alteration on capillary pressure and relative permeability. A laboratory experiment is also conducted here to validate this model. Laboratory experiments have been designed to compare the water saturation profiles for different contact angle, revealing the fluid retention in rock pores that affects capillary force and relative permeability. Four kinds of brines with different concentrations are selected here to create different contact angles. In water-wet porous media, as the system becomes more oil-wet, water saturation decreases. As a result, oil relative permeability increases. On the other hand, capillary pressure which is the resistance for the oil flow increases as well. The oil production change due to wettability alteration is the result of the comprehensive changes of oil relative permeability and capillary pressure. The results indicate that wettability is a key factor for fracturing fluid retention removal and oil enhancement in tight reservoirs. By incorporating laboratory test into a mathematical model, this work shows the relationship between wettability and oil production is not a simple linear pattern but a parabolic one. Additionally, it can be used for a better understanding of optimization design of fracturing fluids.

Keywords: wettability, relative permeability, fluid retention, oil production, unconventional and tight reservoirs

Procedia PDF Downloads 232