Search results for: link availability
2528 Factors Affecting Adequate Utilisation of Ante-natal Health Care Services among Pregnant Women in Dutsin-Ma Local Government Area of Katsina State
Authors: Ilim Moses Msughter
Abstract:
The study was carried out to examine the availability of Ante-natal care services and the socio-cultural factors affecting the utilization of these services in Dutsin-Ma Local Government Area of Katsina State. Four specific objectives were outlined as thus to examine the availability of antenatal care services in Dutsin-Ma local government area, to identify the socio-cultural factors affecting the utilisation of ante-natal care services, to ascertain the challenges affecting utilisation of ante-natal care services and suggest strategies to improve efficiency in ante-natal service delivery and utilisation of same services. Data were collected from 110 respondents using a questionnaire and through the use of the interview. Data were analysed quantitatively and qualitatively. The findings revealed that ante-natal care services are available in the study area, but access to such services is hindered by several factors, which include religious and traditional beliefs, cost of services and poor attitudes of health care workers which has an adverse effect on people’s desire to visit ante-natal centres. The study recommended that Traditional Birth Attendants (TBA) need to be trained on how to handle pregnancy-related complications. It is also recommended that essential ante-natal drugs and services should be subsidised or made free by the government, and this must be closely monitored to ensure efficiency. Finally, human relation training should be organised for nurses and midwives to improve their attitudes towards patients during ante-natal visits.Keywords: utilisation, religion, traditional birth attendant, ante-natal
Procedia PDF Downloads 1672527 LTE Performance Analysis in the City of Bogota Northern Zone for Two Different Mobile Broadband Operators over Qualipoc
Authors: Víctor D. Rodríguez, Edith P. Estupiñán, Juan C. Martínez
Abstract:
The evolution in mobile broadband technologies has allowed to increase the download rates in users considering the current services. The evaluation of technical parameters at the link level is of vital importance to validate the quality and veracity of the connection, thus avoiding large losses of data, time and productivity. Some of these failures may occur between the eNodeB (Evolved Node B) and the user equipment (UE), so the link between the end device and the base station can be observed. LTE (Long Term Evolution) is considered one of the IP-oriented mobile broadband technologies that work stably for data and VoIP (Voice Over IP) for those devices that have that feature. This research presents a technical analysis of the connection and channeling processes between UE and eNodeB with the TAC (Tracking Area Code) variables, and analysis of performance variables (Throughput, Signal to Interference and Noise Ratio (SINR)). Three measurement scenarios were proposed in the city of Bogotá using QualiPoc, where two operators were evaluated (Operator 1 and Operator 2). Once the data were obtained, an analysis of the variables was performed determining that the data obtained in transmission modes vary depending on the parameters BLER (Block Error Rate), performance and SNR (Signal-to-Noise Ratio). In the case of both operators, differences in transmission modes are detected and this is reflected in the quality of the signal. In addition, due to the fact that both operators work in different frequencies, it can be seen that Operator 1, despite having spectrum in Band 7 (2600 MHz), together with Operator 2, is reassigning to another frequency, a lower band, which is AWS (1700 MHz), but the difference in signal quality with respect to the establishment with data by the provider Operator 2 and the difference found in the transmission modes determined by the eNodeB in Operator 1 is remarkable.Keywords: BLER, LTE, network, qualipoc, SNR.
Procedia PDF Downloads 1162526 Women in Violent Conflicts and the Challenges of Food Security in Northeast Nigeria: The Case of Boko Haram Insurgency
Authors: Grace Modupe Adebo, Ayodeji Oluwamuyiwa Adedapo
Abstract:
Women are key actors in ensuring food security in terms of food availability, food access, and food utilization in the developing economy, however, they suffer mostly during violent conflicts due to their feminist nature of rearing and caring for their children and relatives. The study was embarked upon to access the effects of violent conflicts posed by Boko Haram insurgency on women and food security in the Northeast of Nigeria. The study made use of secondary data. A time series data collected over a 22 years period were used. The data collected were subjected to descriptive statistics and t-test analysis. The findings of the study established a significant difference in food production (availability) before and after the Boko Haram insurgency at the 1% level of significance. The high level of Internally Displaced Person (IDP) with a high proportion of women depicts a very low level of food accessibility as the men and women has fled and uninhabited their place of abode for over a period of four to five years, thus diminishing their economic power, and the means of acquiring food which invariably endanger food stability and utilization. The study confirmed the abduction and changing roles of women as cooks, porters, spies, partners, and sex slaves to Boko Haram troop members, thus affecting their livelihoods and food security. The study recommends hands-on interventions by the governmental, non-governmental and international agencies to terminate the activities of Boko Haram in the area and restore the food production for enhanced food security.Keywords: Boko Haram insurgency, food accessibility, food production, food utilization, women’s livelihoods
Procedia PDF Downloads 1492525 Improving Fault Tolerance and Load Balancing in Heterogeneous Grid Computing Using Fractal Transform
Authors: Saad M. Darwish, Adel A. El-Zoghabi, Moustafa F. Ashry
Abstract:
The popularity of the Internet and the availability of powerful computers and high-speed networks as low-cost commodity components are changing the way we use computers today. These technical opportunities have led to the possibility of using geographically distributed and multi-owner resources to solve large-scale problems in science, engineering, and commerce. Recent research on these topics has led to the emergence of a new paradigm known as Grid computing. To achieve the promising potentials of tremendous distributed resources, effective and efficient load balancing algorithms are fundamentally important. Unfortunately, load balancing algorithms in traditional parallel and distributed systems, which usually run on homogeneous and dedicated resources, cannot work well in the new circumstances. In this paper, the concept of a fast fractal transform in heterogeneous grid computing based on R-tree and the domain-range entropy is proposed to improve fault tolerance and load balancing algorithm by improve connectivity, communication delay, network bandwidth, resource availability, and resource unpredictability. A novel two-dimension figure of merit is suggested to describe the network effects on load balance and fault tolerance estimation. Fault tolerance is enhanced by adaptively decrease replication time and message cost while load balance is enhanced by adaptively decrease mean job response time. Experimental results show that the proposed method yields superior performance over other methods.Keywords: Grid computing, load balancing, fault tolerance, R-tree, heterogeneous systems
Procedia PDF Downloads 4922524 Analyzing Oil Seeps Manifestations and Petroleum Impregnation in Northwestern Tunisia From Aliphatic Biomarkers and Statistical Data
Authors: Sawsen Jarray, Tahani Hallek, Mabrouk Montacer
Abstract:
The tectonically damaged terrain in Tunisia's Northwest is seen in the country's numerous oil leaks. Finding a genetic link between these oil seeps and the area's putative source rocks is the goal of this investigation. Here, we use aliphatic biomarkers assessed by GC-MS to describe the organic geochemical data of 18 oil seeps samples and 4 source rocks (M'Cherga, Fahdene, Bahloul, and BouDabbous). In order to establish correlations between oil and oil and oil and source rock, terpanes, hopanes, and steranes biomarkers were identified. The source rocks under study were deposited in a marine environment and were suboxic, with minor signs of continental input for the M'Cherga Formation. There is no connection between the Fahdene and Bahloul source rocks and the udied oil seeps. According to the biomarkers C27 18-22,29,30trisnorneohopane (Ts) and C27 17-22,29,30-trisnorhopane (Tm), these source rocks are mature and have reached the oil window. Regarding oil seeps, geochemical data indicate that, with the exception of four samples that showed some continental markings, the bulk of samples were deposited in an open marine environment. These most recent samples from oil seeps have a unique lithology (marl) that distinguishes them from the others (carbonate). There are two classes of oil seeps, according to statistical analysis of relationships between oil and oil and oil and source rocks. The first comprised samples that showed a positive connection with carbonate-lithological and marine-derived BouDabbous black shales. The second is a result of M'Cherga source rock and is made up of oil seeps with remnants of the terrestrial environment and a lithology with a marl trend. The Fahdene and Bahloul source rocks have no connection to the observed oil seeps. There are two different types of hydrocarbon spills depending on their link to tectonic deformations (oil seeps) and outcropping mature source rocks (oil impregnations), in addition to the existence of two generations of hydrocarbon spills in Northwest Tunisia (Lower Cretaceous/Ypresian).Keywords: petroleum seeps, source rocks, biomarkers, statistic, Northern Tunisia
Procedia PDF Downloads 692523 Design and Development of an Optimal Fault Tolerant 3 Degree of Freedom Robotic Manipulator
Authors: Ramish, Farhan Khalique Awan
Abstract:
Kinematic redundancy within the manipulators presents extended dexterity and manipulability to the manipulators. Redundant serial robotic manipulators are very popular in industries due to its competencies to keep away from singularities during normal operation and fault tolerance because of failure of one or more joints. Such fault tolerant manipulators are extraordinarily beneficial in applications where human interference for repair and overhaul is both impossible or tough; like in case of robotic arms for space programs, nuclear applications and so on. The design of this sort of fault tolerant serial 3 DoF manipulator is presented in this paper. This work was the extension of the author’s previous work of designing the simple 3R serial manipulator. This work is the realization of the previous design with optimizing the link lengths for incorporating the feature of fault tolerance. Various measures have been followed by the researchers to quantify the fault tolerance of such redundant manipulators. The fault tolerance in this work has been described in terms of the worst-case measure of relative manipulability that is, in fact, a local measure of optimization that works properly for certain configuration of the manipulators. An optimum fault tolerant Jacobian matrix has been determined first based on prescribed null space properties after which the link parameters have been described to meet the given Jacobian matrix. A solid model of the manipulator was then developed to realize the mathematically rigorous design. Further work was executed on determining the dynamic properties of the fault tolerant design and simulations of the movement for various trajectories have been carried out to evaluate the joint torques. The mathematical model of the system was derived via the Euler-Lagrange approach after which the same has been tested using the RoboAnalyzer© software. The results have been quite in agreement. From the CAD model and dynamic simulation data, the manipulator was fabricated in the workshop and Advanced Machining lab of NED University of Engineering and Technology.Keywords: fault tolerant, Graham matrix, Jacobian, kinematics, Lagrange-Euler
Procedia PDF Downloads 2222522 Evaluation of the Standard Practice of Availability of Anti-Tuberculosis Drugs in Community Pharmacies
Authors: Udaykumar R., M. S. Ganachari
Abstract:
In order to engage community pharmacies in Tuberculosis care, a survey has been conducted in Belgaum city, Karnataka state, India. After the survey divided into two groups one is control group and another one is intervention group. One is dispensing of anti-tuberculosis drugs, and another one is non-availability of anti-tuberculosis drugs. Those community pharmacists who are voluntarily interesting for becoming DOTS (Directly observed treatment short course) provider and RNTCP (Revised national tuberculosis control programme) objectives. Structured training is conducted for community pharmacist who are dispensing anti-tuberculosis drugs. The training module includes record maintaining, reporting to the RNTCP, Medication adherence etc. In case of non-availability of anti-tuberculosis drugs, the district RNTCP has been given training for community pharmacist by providing free of drugs to the community pharmacies. So, community pharmacies can dispense anti-tuberculosis drugs to the patients. The target of this study is Private community pharmacies. A simple random sampling method is used and 550 private community pharmacy shops has been involved in Belgaum city of Karnataka state, India. Significance of the Study: This study mainly focused on training of DOTS (Directly observed treatment short course) to the private community pharmacist. Indian Govt. Considers Private Providers as Assets for TB Control and Care to Achieve National Strategic Plan for TB Elimination 2017-2025. The Govt. has not fully tapped the Potential of Private Pharmacies to Fight TB. Providing DOTS as per patient’s convenience through community DOT Providers with periodic monitoring may reduce the treatment Default. We explore RNTCP objectives interventions that can have directly managed by private community pharmacy shop. Objectives: Survey of anti-tuberculosis drugs in Community pharmacy shop in Belgaum city. Interested community pharmacist who are willing to become DOTS (Directly observed treatment short course) Provider. Major Findings:Most of the community pharmacist are dispensing anti-tuberculosis drugs without having knowledge of DOTS therapy and RNTCP objectives. No community pharmacist is aware of RNTCP and Tuberculosis burden in India. Most of the Pharmacist agreed to come for RNTCP Training module for the community pharmacist. Some of the community pharmacist not dispensing anti-tuberculosis drugs and they agreed to become official DOTS provider. Concluding Statement: Awareness of role of community pharmacist on tuberculosis control and care has been neglected. More than 50% of tuberculosis patients seeking treatments from privatesector. In this study finds the major gap between government and private sector on tuberculosis treatment.Keywords: community pharmacist, directly observed treatment short course(DOTS), revised national tuberculosis control programme (RNTCP), private pharmacies, anti-tuberculosis drugs
Procedia PDF Downloads 1262521 Challenges Faced by the Visually Impaired Children and their Parents in Doing Homework Assignments Using Braille
Authors: Shazia Farooq Mirza
Abstract:
The purpose of this study was to explore the challenges faced by visually impaired children and their parents in doing homework assignments using Braille. This study had a quantitative approach and it was descriptive in nature. It took place in 6 public and special private schools of Lahore.177 visually impaired children of grades 4-10 and 153 parents of the visually impaired children were the volunteer participants of this study which were selected through a convenient sampling method. A survey method was adopted for the data collection. And for this purpose 2 self-developed validated questionnaires were used as instruments. The instruments were constructed by exploring the factors and sub-factors from the literature review. Thirty students with visual impairment and 30 parents of the students with visual impairment filled the questionnaires as a pilot study, and it ensured the reliability of the instruments. Data were analyzed using a statistical package of social sciences and it was completely interpreted. Findings revealed that the common challenges faced by the students with visual impairment were Physical Stress, Readiness, Braille Knowledge, Braille Skill and Communications. And the major challenges faced by the parents of the students with visual impairment were the Availability of the helping material, the Availability of the reading material, Braille Knowledge, Braille skills, School and family interactions, Behavior management and the Environment and equipment. Conclusions were drawn on the basis of the major findings. Future suggestions are given in light of the conclusions. This study will be beneficial for the children with visual impairment, the parents of the children with visual impairment, the special education teachers and for the policymakers of the special schools.Keywords: challenges, visually impaired children, homework, parents, braille
Procedia PDF Downloads 1232520 The Link between Anthropometry and Fat-Based Obesity Indices in Pediatric Morbid Obesity
Authors: Mustafa M. Donma, Orkide Donma
Abstract:
Anthropometric measurements are essential for obesity studies. Waist circumference (WC) is the most frequently used measure, and along with hip circumference (HC), it is used in most equations derived for the evaluation of obese individuals. Morbid obesity is the most severe clinical form of obesity, and such individuals may also exhibit some clinical findings leading to metabolic syndrome (MetS). Then, it becomes a requirement to discriminate morbid obese children with (MOMetS+) and without (MOMetS-) MetS. Almost all obesity indices can differentiate obese (OB) children from children with normal body mass index (N-BMI). However, not all of them are capable of making this distinction. A recently introduced anthropometric obesity index, waist circumference + hip circumference/2 ((WC+HC)/2), was confirmed to differ OB children from those with N-BMI, however it has not been tested whether it will find clinical usage for the differential diagnosis of MOMetS+ and MOMetS-. This study was designed to find out the availability of (WC+HC)/2 for the purpose and to compare the possible preponderance of it over some other anthropometric or fat-based obesity indices. Forty-five MOMetS+ and forty-five MOMetS- children were included in the study. Participants have submitted informed consent forms. The study protocol was approved by the Non-interventional Ethics Committee of Tekirdag Namik Kemal University. Anthropometric measurements were performed. Body mass index (BMI), waist-to-hip circumference (W/H), (WC+HC)/2, trunk-to-leg fat ratio (TLFR), trunk-to-appendicular fat ratio (TAFR), trunk fat+leg fat/2 ((trunk+leg fat)/2), diagnostic obesity notation model assessment index-2 (D2I) and fat mass index (FMI) were calculated for both groups. Study data was analyzed statistically, and 0.05 for p value was accepted as the statistical significance degree. Statistically higher BMI, WC, (WC+HC)/2, (trunk+leg fat)/2 values were found in MOMetS+ children than MOMetS- children. No statistically significant difference was detected for W/H, TLFR, TAFR, D2I, and FMI between two groups. The lack of difference between the groups in terms of FMI and D2I pointed out the fact that the recently developed fat-based index; (trunk+leg fat)/2 gives much more valuable information during the evaluation of MOMetS+ and MOMetS- children. Upon evaluation of the correlations, (WC+HC)/2 was strongly correlated with D2I and FMI in both MOMetS+ and MOMetS- groups. Neither D2I nor FMI was correlated with W/H. Strong correlations were calculated between (WC+HC)/2 and (trunk+leg fat)/2 in both MOMetS- (r=0.961; p<0.001) and MOMetS+ (r=0.936; p<0.001) groups. Partial correlations between (WC+HC)/2 and (trunk+leg fat)/2 after controlling the effect of basal metabolic rate were r=0.726; p<0.001 in MOMetS- group and r=0.932; p<0.001 in MOMetS+ group. The correlation in the latter group was higher than the first group. In conclusion, recently developed anthropometric obesity index (WC+HC)/2 and fat-based obesity index (trunk+leg fat)/2 were of preponderance over the previously introduced classical obesity indices such as W/H, D2I and FMI during the differential diagnosis of MOMetS+ and MOMetS- children.Keywords: children, hip circumference, metabolic syndrome, morbid obesity, waist circumference
Procedia PDF Downloads 2912519 Feasibility Study of MongoDB and Radio Frequency Identification Technology in Asset Tracking System
Authors: Mohd Noah A. Rahman, Afzaal H. Seyal, Sharul T. Tajuddin, Hartiny Md Azmi
Abstract:
Taking into consideration the real time situation specifically the higher academic institutions, small, medium to large companies, public to private sectors and the remaining sectors, do experience the inventory or asset shrinkages due to theft, loss or even inventory tracking errors. This happening is due to a zero or poor security systems and measures being taken and implemented in their organizations. Henceforth, implementing the Radio Frequency Identification (RFID) technology into any manual or existing web-based system or web application can simply deter and will eventually solve certain major issues to serve better data retrieval and data access. Having said, this manual or existing system can be enhanced into a mobile-based system or application. In addition to that, the availability of internet connections can aid better services of the system. Such involvement of various technologies resulting various privileges to individuals or organizations in terms of accessibility, availability, mobility, efficiency, effectiveness, real-time information and also security. This paper will look deeper into the integration of mobile devices with RFID technologies with the purpose of asset tracking and control. Next, it is to be followed by the development and utilization of MongoDB as the main database to store data and its association with RFID technology. Finally, the development of a web based system which can be viewed in a mobile based formation with the aid of Hypertext Preprocessor (PHP), MongoDB, Hyper-Text Markup Language 5 (HTML5), Android, JavaScript and AJAX programming language.Keywords: RFID, asset tracking system, MongoDB, NoSQL
Procedia PDF Downloads 3072518 Intrusion Detection in Cloud Computing Using Machine Learning
Authors: Faiza Babur Khan, Sohail Asghar
Abstract:
With an emergence of distributed environment, cloud computing is proving to be the most stimulating computing paradigm shift in computer technology, resulting in spectacular expansion in IT industry. Many companies have augmented their technical infrastructure by adopting cloud resource sharing architecture. Cloud computing has opened doors to unlimited opportunities from application to platform availability, expandable storage and provision of computing environment. However, from a security viewpoint, an added risk level is introduced from clouds, weakening the protection mechanisms, and hardening the availability of privacy, data security and on demand service. Issues of trust, confidentiality, and integrity are elevated due to multitenant resource sharing architecture of cloud. Trust or reliability of cloud refers to its capability of providing the needed services precisely and unfailingly. Confidentiality is the ability of the architecture to ensure authorization of the relevant party to access its private data. It also guarantees integrity to protect the data from being fabricated by an unauthorized user. So in order to assure provision of secured cloud, a roadmap or model is obligatory to analyze a security problem, design mitigation strategies, and evaluate solutions. The aim of the paper is twofold; first to enlighten the factors which make cloud security critical along with alleviation strategies and secondly to propose an intrusion detection model that identifies the attackers in a preventive way using machine learning Random Forest classifier with an accuracy of 99.8%. This model uses less number of features. A comparison with other classifiers is also presented.Keywords: cloud security, threats, machine learning, random forest, classification
Procedia PDF Downloads 3202517 Global Healthcare Village Based on Mobile Cloud Computing
Authors: Laleh Boroumand, Muhammad Shiraz, Abdullah Gani, Rashid Hafeez Khokhar
Abstract:
Cloud computing being the use of hardware and software that are delivered as a service over a network has its application in the area of health care. Due to the emergency cases reported in most of the medical centers, prompt for an efficient scheme to make health data available with less response time. To this end, we propose a mobile global healthcare village (MGHV) model that combines the components of three deployment model which include country, continent and global health cloud to help in solving the problem mentioned above. In the creation of continent model, two (2) data centers are created of which one is local and the other is global. The local replay the request of residence within the continent, whereas the global replay the requirements of others. With the methods adopted, there is an assurance of the availability of relevant medical data to patients, specialists, and emergency staffs regardless of locations and time. From our intensive experiment using the simulation approach, it was observed that, broker policy scheme with respect to optimized response time, yields a very good performance in terms of reduction in response time. Though, our results are comparable to others when there is an increase in the number of virtual machines (80-640 virtual machines). The proportionality in increase of response time is within 9%. The results gotten from our simulation experiments shows that utilizing MGHV leads to the reduction of health care expenditures and helps in solving the problems of unqualified medical staffs faced by both developed and developing countries.Keywords: cloud computing (MCC), e-healthcare, availability, response time, service broker policy
Procedia PDF Downloads 3772516 Training During Emergency Response to Build Resiliency in Water, Sanitation, and Hygiene
Authors: Lee Boudreau, Ash Kumar Khaitu, Laura A. S. MacDonald
Abstract:
In April 2015, a magnitude 7.8 earthquake struck Nepal, killing, injuring, and displacing thousands of people. The earthquake also damaged water and sanitation service networks, leading to a high risk of diarrheal disease and the associated negative health impacts. In response to the disaster, the Environment and Public Health Organization (ENPHO), a Kathmandu-based non-governmental organization, worked with the Centre for Affordable Water and Sanitation Technology (CAWST), a Canadian education, training and consulting organization, to develop two training programs to educate volunteers on water, sanitation, and hygiene (WASH) needs. The first training program was intended for acute response, with the second focusing on longer term recovery. A key focus was to equip the volunteers with the knowledge and skills to formulate useful WASH advice in the unanticipated circumstances they would encounter when working in affected areas. Within the first two weeks of the disaster, a two-day acute response training was developed, which focused on enabling volunteers to educate those affected by the disaster about local WASH issues, their link to health, and their increased importance immediately following emergency situations. Between March and October 2015, a total of 19 training events took place, with over 470 volunteers trained. The trained volunteers distributed hygiene kits and liquid chlorine for household water treatment. They also facilitated health messaging and WASH awareness activities in affected communities. A three-day recovery phase training was also developed and has been delivered to volunteers in Nepal since October 2015. This training focused on WASH issues during the recovery and reconstruction phases. The interventions and recommendations in the recovery phase training focus on long-term WASH solutions, and so form a link between emergency relief strategies and long-term development goals. ENPHO has trained 226 volunteers during the recovery phase, with training ongoing as of April 2016. In the aftermath of the earthquake, ENPHO found that its existing pool of volunteers were more than willing to help those in their communities who were more in need. By training these and new volunteers, ENPHO was able to reach many more communities in the immediate aftermath of the disaster; together they reached 11 of the 14 earthquake-affected districts. The collaboration between ENPHO and CAWST in developing the training materials was a highly collaborative and iterative process, which enabled the training materials to be developed within a short response time. By training volunteers on basic WASH topics during both the immediate response and the recovery phase, ENPHO and CAWST have been able to link immediate emergency relief to long-term developmental goals. While the recovery phase training continues in Nepal, CAWST is planning to decontextualize the training used in both phases so that it can be applied to other emergency situations in the future. The training materials will become part of the open content materials available on CAWST’s WASH Resources website.Keywords: water and sanitation, emergency response, education and training, building resilience
Procedia PDF Downloads 3072515 Prevalence and Associated Factors of Stunting among 6-59 Months Children in Pastoral Community of Korahay Zone, Somali Regional State, Ethiopia 2016
Authors: Sisay Shine, Frew Tadesse, Zemenu Shiferaw, Lema Mideksa
Abstract:
Background: Stunting is one of the most important public health problems in Ethiopia with an estimated 44.4% of children less than five years of age are stunted. Thus, this study aimed to assess prevalence and associated factors of stunting among 6-59 months children in pastoral community of Korahay Zone, Somali Regional State, Ethiopia. Objective of the study: To assess prevalence and associated factors of stunting among 6-59 months children in pastoral community of Korahay Zone, Somali Regional State, Ethiopia, 2016. Methods: Community based cross sectional study design was done among 770 children in pastoral community of Korahay Zone. Systematic sampling techniques were used to select households and took child mother pair from each selected households. Data was collected using pre-tested and structured questionnaire. Odds ratio with 95% confidence interval was used to assess level of significance. Result: Prevalence of stunting among 6-59 months age children was 31.9%. Sex (AOR: 1.47, 95%CI 1.02, 2.11), age (AOR: 2.10, 95%CI 1.16, 3.80), maternal education (AOR: 3.42, 95%CI 1.58, 7.41), maternal occupation (AOR: 3.10, 95%CI 1.85, 5.19), monthly income (AOR: 1.47, 95%CI 1.03, 2.09), PNC visits (AOR: 1.59, 95%CI 1.07, 2.37), source of water (AOR: 3.41, 95%CI 1.96, 5.93), toilet availability (AOR: 1.71, 95%CI 1.13, 2.58), first milk feeding (AOR: 3.37, 95%CI 2.27, 5.02) and bottle feeding (AOR: 2.07, 95%CI 1.34, 3.18) were significant predictors of stunting. Conclusion and recommendations: Prevalence of stunting among 6-59 months children was high 31.9%. Lack maternal education, not feeding first milk, unsafe water supply, absence toilet availability and bottle feeding can increase the risk of stunting. So, educating mothers on child feeding practice, sanitation and important of first milk can reduce stunting.Keywords: dietary, environmental, healthcare, socio-demographic, stunting
Procedia PDF Downloads 5792514 Anti-Forensic Countermeasure: An Examination and Analysis Extended Procedure for Information Hiding of Android SMS Encryption Applications
Authors: Ariq Bani Hardi
Abstract:
Empowerment of smartphone technology is growing very rapidly in various fields of science. One of the mobile operating systems that dominate the smartphone market today is Android by Google. Unfortunately, the expansion of mobile technology is misused by criminals to hide the information that they store or exchange with each other. It makes law enforcement more difficult to prove crimes committed in the judicial process (anti-forensic). One of technique that used to hide the information is encryption, such as the usages of SMS encryption applications. A Mobile Forensic Examiner or an investigator should prepare a countermeasure technique if he finds such things during the investigation process. This paper will discuss an extension procedure if the investigator found unreadable SMS in android evidence because of encryption. To define the extended procedure, we create and analyzing a dataset of android SMS encryption application. The dataset was grouped by application characteristics related to communication permissions, as well as the availability of source code and the documentation of encryption scheme. Permissions indicate the possibility of how applications exchange the data and keys. Availability of the source code and the encryption scheme documentation can show what the cryptographic algorithm specification is used, how long the key length, how the process of key generation, key exchanges, encryption/decryption is done, and other related information. The output of this paper is an extended or alternative procedure for examination and analysis process of android digital forensic. It can be used to help the investigators while they got a confused cause of SMS encryption during examining and analyzing. What steps should the investigator take, so they still have a chance to discover the encrypted SMS in android evidence?Keywords: anti-forensic countermeasure, SMS encryption android, examination and analysis, digital forensic
Procedia PDF Downloads 1282513 Local Availability Influences Choice of Radical Treatment for Prostate Cancer
Authors: Jemini Vyas, Oluwatobi Adeyoe, Jenny Branagan, Chandran Tanabalan, Aakash Pai
Abstract:
Introduction: Radical prostatectomy and radiotherapy are both viable options for the treatment of localised prostate cancer. Over the years medicine has evolved towards a patient-centred approach. Patient decision-making is not motivated by clinical outcomes alone. Geographical location and ease of access to treating clinician are contributory factors. With the development of robotic surgery, prostatectomy has been centralised into tertiary centres. This has impacted on the distances that patients and their families are expected to travel. Methods: A single centre retrospective study was undertaken over a five-year period. All patients with localised prostate cancer, undergoing radical radiotherapy or prostatectomy were collected pre-centralisation. This was compared to the total number undergoing these treatments post centralisation. Results: Pre-centralisation, both radiotherapy and prostatectomy groups had to travel a median of less than five miles for treatment. Post-centralisation of pelvic surgery, prostatectomy patients had to travel a median of more than 40 miles, whilst travel distance for the radiotherapy group was unchanged. In the post centralisation cohort, there was a 63% decline in the number of patients undergoing radical prostatectomy per month from a mean of 5.1 to 1.9. The radical radiotherapy group had a concurrent 41% increase in patient numbers with a mean increase from 13.3 to 18.8 patients per month. Conclusion: Choice of radical treatment in localised prostate cancer is based on multiple factors. This study infers that local availability can influence choice of radical treatment. It is imperative that efforts are made to maintain accessibility to all viable options for prostate cancer patients, so that patient choice is not compromised.Keywords: prostate, prostatectomy, radiotherapy, centralisation
Procedia PDF Downloads 962512 Optimization of Traffic Agent Allocation for Minimizing Bus Rapid Transit Cost on Simplified Jakarta Network
Authors: Gloria Patricia Manurung
Abstract:
Jakarta Bus Rapid Transit (BRT) system which was established in 2009 to reduce private vehicle usage and ease the rush hour gridlock throughout the Jakarta Greater area, has failed to achieve its purpose. With gradually increasing the number of private vehicles ownership and reduced road space by the BRT lane construction, private vehicle users intuitively invade the exclusive lane of BRT, creating local traffic along the BRT network. Invaded BRT lanes costs become the same with the road network, making BRT which is supposed to be the main public transportation in the city becoming unreliable. Efforts to guard critical lanes with preventing the invasion by allocating traffic agents at several intersections have been expended, lead to the improving congestion level along the lane. Given a set of number of traffic agents, this study uses an analytical approach to finding the best deployment strategy of traffic agent on a simplified Jakarta road network in minimizing the BRT link cost which is expected to lead to the improvement of BRT system time reliability. User-equilibrium model of traffic assignment is used to reproduce the origin-destination demand flow on the network and the optimum solution conventionally can be obtained with brute force algorithm. This method’s main constraint is that traffic assignment simulation time escalates exponentially with the increase of set of agent’s number and network size. Our proposed metaheuristic and heuristic algorithms perform linear simulation time increase and result in minimized BRT cost approaching to brute force algorithm optimization. Further analysis of the overall network link cost should be performed to see the impact of traffic agent deployment to the network system.Keywords: traffic assignment, user equilibrium, greedy algorithm, optimization
Procedia PDF Downloads 2322511 Food Security in the Middle East and North Africa
Authors: Sara D. Garduno-Diaz, Philippe Y. Garduno-Diaz
Abstract:
To date, one of the few comprehensive indicators for the measurement of food security is the Global Food Security Index. This index is a dynamic quantitative and qualitative bench marking model, constructed from 28 unique indicators, that measures drivers of food security across both developing and developed countries. Whereas the Global Food Security Index has been calculated across a set of 109 countries, in this paper we aim to present and compare, for the Middle East and North Africa (MENA), 1) the Food Security Index scores achieved and 2) the data available on affordability, availability, and quality of food. The data for this work was taken from the latest (2014) report published by the creators of the GFSI, which in turn used information from national and international statistical sources. According to the 2014 Global Food Security Index, MENA countries rank from place 17/109 (Israel, although with resent political turmoil this is likely to have changed) to place 91/109 (Yemen) with household expenditure spent in food ranging from 15.5% (Israel) to 60% (Egypt). Lower spending on food as a share of household consumption in most countries and better food safety net programs in the MENA have contributed to a notable increase in food affordability. The region has also however experienced a decline in food availability, owing to more limited food supplies and higher volatility of agricultural production. In terms of food quality and safety the MENA has the top ranking country (Israel). The most frequent challenges faced by the countries of the MENA include public expenditure on agricultural research and development as well as volatility of agricultural production. Food security is a complex phenomenon that interacts with many other indicators of a country’s well-being; in the MENA it is slowly but markedly improving.Keywords: diet, food insecurity, global food security index, nutrition, sustainability
Procedia PDF Downloads 3592510 Metabolic and Phylogenetic Profiling of Rhizobium leguminosarum Strains Isolated from NZ Soils of Varying pH
Authors: Anish Shah, Steve A. Wakelin, Derrick Moot, Aurélie Laugraud, Hayley J. Ridgway
Abstract:
A mixed pasture system of ryegrass-clover is used in New Zealand, where clovers are generally inoculated with commercially available strains of rhizobia. The community of rhizobia living in the soil and the way in which they interact with the plant are affected by different biotic and abiotic factors. In general, bacterial richness and diversity in soil varies by soil pH. pH also affects cell physiology and acts as a master variable that controls the wider soil physiochemical conditions such as P availability, Al release and micronutrient availability. As such, pH can have both primary and secondary effects on soil biology and processes. The aim of this work was to investigate the effect of soil pH on the genetic diversity and metabolic profile of Rhizobium leguminosarum strains nodulating clover. Soils were collected from 12 farms across New Zealand which had a pH(water) range of between 4.9 and 7.5, with four acidic (pH 4.9 – 5.5), four ‘neutral’ (5.8 – 6.1) and four alkaline (6.5 – 7.5) soils. Bacteria were recovered from nodules of Trifolium repens (white clover) and T. subterraneum (subterranean clover) grown in the soils. The strains were cultured and screened against a range of pH-amended media to demonstrate whether they were adapted to pH levels similar to their native soils. The strains which showed high relative growth at a given pH (~20% of those isolated) were selected for metabolic and taxonomic profiling. The Omnilog (Biolog Inc., Hayward, CA) phenotype array was used to perform assays on carbon (C) utilisation for selected strains. DNA was extracted from the strains which had differing C utilisation profiles and PCR products for both forward and reverse primers were sequenced for the following genes: 16S rRNA, recA, nodC, nodD and nifH (symbiotic).Keywords: bacterial diversity, clover, metabolic and taxonomic profiling, pH adaptation, rhizobia
Procedia PDF Downloads 2602509 Multi-Criteria Optimal Management Strategy for in-situ Bioremediation of LNAPL Contaminated Aquifer Using Particle Swarm Optimization
Authors: Deepak Kumar, Jahangeer, Brijesh Kumar Yadav, Shashi Mathur
Abstract:
In-situ remediation is a technique which can remediate either surface or groundwater at the site of contamination. In the present study, simulation optimization approach has been used to develop management strategy for remediating LNAPL (Light Non-Aqueous Phase Liquid) contaminated aquifers. Benzene, toluene, ethyl benzene and xylene are the main component of LNAPL contaminant. Collectively, these contaminants are known as BTEX. In in-situ bioremediation process, a set of injection and extraction wells are installed. Injection wells supply oxygen and other nutrient which convert BTEX into carbon dioxide and water with the help of indigenous soil bacteria. On the other hand, extraction wells check the movement of plume along downstream. In this study, optimal design of the system has been done using PSO (Particle Swarm Optimization) algorithm. A comprehensive management strategy for pumping of injection and extraction wells has been done to attain a maximum allowable concentration of 5 ppm and 4.5 ppm. The management strategy comprises determination of pumping rates, the total pumping volume and the total running cost incurred for each potential injection and extraction well. The results indicate a high pumping rate for injection wells during the initial management period since it facilitates the availability of oxygen and other nutrients necessary for biodegradation, however it is low during the third year on account of sufficient oxygen availability. This is because the contaminant is assumed to have biodegraded by the end of the third year when the concentration drops to a permissible level.Keywords: groundwater, in-situ bioremediation, light non-aqueous phase liquid, BTEX, particle swarm optimization
Procedia PDF Downloads 4452508 Software Architecture Implications on Development Productivity: A Case of Malawi Point of Care Electronic Medical Records
Authors: Emmanuel Mkambankhani, Tiwonge Manda
Abstract:
Software platform architecture includes system components, their relationships, and design, as well as evolution principles. Software architecture and documentation affect a platform's customizability and openness to external innovators, thus affecting developer productivity. Malawi Point of Care (POC) Electronic Medical Records System (EMRS) follows some architectural design standards, but it lacks third-party innovators and is difficult to customize as compared to CommCare and District Health Information System 2 (DHIS2). Improving software architecture and documentation for the Malawi POC will increase productivity and third-party contributions. A conceptual framework based on Generativity and Boundary Resource Model (BRM) was used to compare the three platforms. Interviews, observations, and document analysis were used to collect primary and secondary data. Themes were found by analyzing qualitative and quantitative data, which led to the following results. Configurable, flexible, and cross-platform software platforms and the availability of interfaces (Boundary Resources) that let internal and external developers interact with the platform's core functionality, hence boosting developer productivity. Furthermore, documentation increases developer productivity, while its absence inhibits the use of resources. The study suggests that the architecture and openness of the Malawi POC EMR software platform will be improved by standardizing web application program interfaces (APIs) and making interfaces that can be changed by the user. In addition, increasing the availability of documentation and training will improve the use of boundary resources, thus improving internal and third-party development productivity.Keywords: health systems, configurable platforms, software architecture, software documentation, software development productivity
Procedia PDF Downloads 882507 Economic Expansion and Land Use Change in Thailand: An Environmental Impact Analysis Using Computable General Equilibrium Model
Authors: Supakij Saisopon
Abstract:
The process of economic development incurs spatial transformation. This spatial alternation also causes environmental impacts, leading to higher pollution. In the case of Thailand, there is still a lack of price-endogenous quantitative analysis incorporating relationships among economic growth, land-use change, and environmental impact. Therefore, this paper aimed at developing the Computable General Equilibrium (CGE) model with the capability of stimulating such mutual effects. The developed CGE model has also incorporated the nested constant elasticity of transformation (CET) structure that describes the spatial redistribution mechanism between agricultural land and urban area. The simulation results showed that the 1% decrease in the availability of agricultural land lowers the value-added of agricultural by 0.036%. Similarly, the 1% reduction of availability of urban areas can decrease the value-added of manufacturing and service sectors by 0.05% and 0.047%, respectively. Moreover, the outcomes indicate that the increasing farming and urban areas induce higher volumes of solid waste, wastewater, and air pollution. Specifically, the 1% increase in the urban area can increase pollution as follows: (1) the solid waste increase by 0.049%, (2) water pollution ̶ indicated by biochemical oxygen demand (BOD) value ̶ increase by 0.051% and (3) air pollution ̶ indicated by the volumes of CO₂, N₂O, NOₓ, CH₄, and SO₂ ̶ increase within the range of 0.045%–0.051%. With the simulation for exploring the sustainable development path, a 1% increase in agricultural land use efficiency leads to the shrinking demand for agricultural land. But this is not happening in urban, a 1% scale increase in urban utilization results in still increasing demand for land. Therefore, advanced clean production technology is necessary to align the increasing land-use efficiency with the lowered pollution density.Keywords: CGE model, CET structure, environmental impact, land use
Procedia PDF Downloads 2332506 Evaluating the Impact of Future Scenarios on Water Availability and Demand Based on Stakeholders Prioritized Water Management Options in the Upper Awash Basin, Ethiopia
Authors: Adey Nigatu Mersha, Ilyas Masih, Charlotte de Fraiture, Tena Alamirew
Abstract:
Conflicts over water are increasing mainly as a result of water scarcity in response to higher water demand and climatic variability. There is often not enough water to meet all demands for different uses. Thus, decisions have to be made as to how the available resources can be managed and utilized. Correspondingly water allocation goals, practically national water policy goals, need to be revised accordingly as the pressure on water increases from time to time. A case study is conducted in the Upper Awash Basin, Ethiopia, to assess and evaluate prioritized comprehensive water demand management options based on the framework of integrated water resources management in account of stakeholders’ knowledge and preferences as well as practical prominence within the Upper Awash Basin. Two categories of alternative management options based on policy analysis and stakeholders' consultation were evaluated against the business-as-usual scenario by using WEAP21 model as an analytical tool. Strong effects on future (unmet) demands are observed with major socio-economic assumptions and forthcoming water development plans. Water management within the basin will get more complex with further abstraction which may lead to an irreversible damage to the ecosystem. It is further confirmed through this particular study that efforts to maintain users’ preferences alone cannot insure economically viable and environmentally sound development and vice versa. There is always a tradeoff between these factors. Hence, all of these facets must be analyzed separately, related with each other in equal footing, and ultimately taken up in decision making in order for the whole system to function properly.Keywords: water demand, water availability, WEAP21, scenarios
Procedia PDF Downloads 2812505 A Microsurgery-Specific End-Effector Equipped with a Bipolar Surgical Tool and Haptic Feedback
Authors: Hamidreza Hoshyarmanesh, Sanju Lama, Garnette R. Sutherland
Abstract:
In tele-operative robotic surgery, an ideal haptic device should be equipped with an intuitive and smooth end-effector to cover the surgeon’s hand/wrist degrees of freedom (DOF) and translate the hand joint motions to the end-effector of the remote manipulator with low effort and high level of comfort. This research introduces the design and development of a microsurgery-specific end-effector, a gimbal mechanism possessing 4 passive and 1 active DOFs, equipped with a bipolar forceps and haptic feedback. The robust gimbal structure is comprised of three light-weight links/joint, pitch, yaw, and roll, each consisting of low-friction support and a 2-channel accurate optical position sensor. The third link, which provides the tool roll, was specifically designed to grip the tool prongs and accommodate a low mass geared actuator together with a miniaturized capstan-rope mechanism. The actuator is able to generate delicate torques, using a threaded cylindrical capstan, to emulate the sense of pinch/coagulation during conventional microsurgery. While the tool left prong is fixed to the rolling link, the right prong bears a miniaturized drum sector with a large diameter to expand the force scale and resolution. The drum transmits the actuator output torque to the right prong and generates haptic force feedback at the tool level. The tool is also equipped with a hall-effect sensor and magnet bar installed vis-à-vis on the inner side of the two prongs to measure the tooltip distance and provide an analogue signal to the control system. We believe that such a haptic end-effector could significantly increase the accuracy of telerobotic surgery and help avoid high forces that are known to cause bleeding/injury.Keywords: end-effector, force generation, haptic interface, robotic surgery, surgical tool, tele-operation
Procedia PDF Downloads 1202504 Twisted Bilayer Crescent Chiral Metasurface
Authors: Semere Araya Asefa
Abstract:
I described twisted bilayer crescent metasurfaces that link optical properties between two layers and enhance circular dichroism. The interactions between the metasurface layers cause circular dichroism. And we evaluated the parameters that affect the chiroptical response of the crescentKeywords: chiroptical response, chiral metasurface, circular dichroism, chiral sensing
Procedia PDF Downloads 812503 Intervening into the World of a Cyber-Bully
Authors: Aanshika Puri, Sakshi Mehrotra
Abstract:
Technology has always been a double edged sword. The constant rut of updating oneself to a better and newer version is the new norm. ‘Being Online’ is the latest addition to one’s everyday routine. Availability of various social online platforms being served on a platter topped with easy and cheap access to the internet makes it simple and doable for people of all social backgrounds. Interestingly, in India, a recent development is the line of demarcation between people from varied backgrounds, doing the vanishing act. One finds everybody on at least one, if not more, social platforms in a desire to stay connected. For instance, this ranges from sending a ‘WhatsApp’ message to a vegetable vendor for ordering your daily needs to vendors and small entrepreneurs. Even a rickshaw puller now has access to a mobile phone, an internet connection and apps/ platforms to stay connected. Recent observations show the extent to which everyone is hooked on to their mobile phones/ tabs/ laptops/ etc. Young mothers use them to distract their children and keep them busy while they finish the task at hand. Exposure to this part of the technology at such a tender age requires responsible and careful handling. Talking of adolescents, their self- image depends on their online social image to a large extent. There is a desire to be liked and accepted by the peer group at all times. Cyber-bullying is a by-product of the 24/7 availability of these resources. There is enough research-based evidence to prove the psychosocial and emotional impact on the development and well-being of the victim. The present paper attempts to understand the dynamics of cyber bullying vis-à-vis the developmental and mental health issues faced by the bully.Keywords: Developmental Psychology, Empathy & Resilience Based Interventions, Mental Well-Being of Cyber Bully, Positive Psychology
Procedia PDF Downloads 2532502 Mitigating CO2 Emissions in Developing Countries: The Role of Foreign Aid
Authors: Mohamed Boly
Abstract:
This paper investigates the link between foreign aid and environmental protection, specifically CO2 emissions, in aid recipient countries. Conflicting results exist in the literature regarding the environmental impact of foreign aid. We come to reconcile them, using Project-Level Aid Data with environment codes, over the 1980- 2010 period. The disaggregation of aid according to the environmental codes, show why the results of previous literature remain very mixed. Moreover, we find that the effect of environmental aid is conditioned by some specific characteristics of the recipient country, independently of the donor.Keywords: foreign aid, green aid, interactive effects, pollution
Procedia PDF Downloads 3062501 Arms and Light Weapons Flow in Nigerian/Chad Border: A Reflection on the How Insurgents Had Access to Their Target
Authors: Lawan Ja’afar Tahir
Abstract:
This research work centered on the problem of free Arms flow around the Nigeria and Chad Border. The whole of the northeastern Nigerian region has been devastated by the crisis of insecurity facilitated by more than a decade of insurgency. One of the major issues of concern to security experts and personnel in the country is how the insurgents are getting access to weapons, which gave them more strength to fight the war for this long period, which has become so difficult to overcome. Among the possible avenues that continue to strengthen the enemies is the easy access to the arms flow from the neighboring countries, especially the Republic of Chad, which borders Nigeria to the east, where Boko Haram gained firm roots. This paper, therefore, looked at the nature of the waterway of the Nigeria/Chad Border, which has become a source of strength to the insurgents as the flow of weapons is one of the cheapest things on the Border. The availability of such arms flow has also led to the People abandoning their lands and economic and commercial activities, especially those settlements between the Border of these two countries. For more than eight years now, they have suspended their livelihood activities, roads were blocked and chances of survival in the rural areas were minimal due to the frequent attacks carried out by the insurgents. However, this research looks at the causes of the arms flow along the Border of these neighboring countries, the extent of damage done as a result of the availability of the weapons, and how far the Nigerian government has gone in curtailing the menace of the flow of dangerous weapons into the country. The research looked at the ways arm dealers are conniving with settlers along the border as well as the various ways they followed to reach their target. The work provided suggestion as to how the fragile Border should be managed with the view to reduce the influx of arms without control, which, according to this research, is the central factor that continues to unleash and give terror groups the opportunity to destroy people for more than a decade.Keywords: border, insecurity, weapons, management
Procedia PDF Downloads 692500 Psychological Capital and Intention for Self-Employment among Students in HEIs: A Multi-group Analysis Approach
Authors: Ugur Choban, Aruzhan Zhaksylyk, Assylbek Nurgabdeshov
Abstract:
In recent years, there has been an increasing understanding of the value of encouraging entrepreneurial attitudes in university students. This is motivated by the belief that stimulating entrepreneurship not only promotes economic growth but also fosters innovation. This study looks at the complex link and addresses critical gaps between psychological capital and entrepreneurial intention among university students, with a specific emphasis on how contextual factors like academic support and past business experience impact this dynamic. Using a quantitative research method, data were gathered from a broad sample of 300 university students drawn from several faculties. The study used a questionnaire that included the Psychological Capital Questionnaire (PCQ) to assess psychological capital and a validated scale for entrepreneurial intention, as well as binary measures of academic support and prior entrepreneurial experience. Statistical investigations, including multigroup analyses performed with SmartPLS software, provided interesting insights into the effect of contextual factors on the relationship between psychological capital and entrepreneurial intention. The findings highlight that psychological capital had a strong favorable influence on university students' entrepreneurial inclinations. Furthermore, the study found that academic support enhances the influence of psychological capital on entrepreneurial intentions, emphasizing the significance of institutional backing in fostering entrepreneurial mindsets. Furthermore, students with prior entrepreneurial experience had a stronger propensity for entrepreneurship, showing a synergistic link between psychological capital and entrepreneurial background. These findings have both theoretical and practical implications. By explaining the mechanisms by which psychological capital promotes entrepreneurial intentions, the study contributes to the establishment of focused entrepreneurship education programs and support activities that are suited to student requirements. Policymakers may use these findings to create policies that encourage student entrepreneurship, ultimately encouraging economic development and innovation.Keywords: academic support, entrepreneurial intentions, higher education institutions, psychological capital, prior entrepreneurial experience
Procedia PDF Downloads 582499 Behavior of Engineering Students in Kuwait University
Authors: Mohammed A. Al-Ajmi, Reem S. Al-Kandari
Abstract:
This study is concerned with the behavior of engineering students in Kuwait University which became a concern due to the global issues of education in all levels. A survey has been conducted to identify academic and societal issues that affect the engineering student performance through. The study is drawing major conclusions with regard to private tutoring and the online availability of textbooks’ solution manuals.Keywords: solution manual, engineering, textbook, ethics
Procedia PDF Downloads 492