Search results for: access to services
6240 Public Wi-Fi Security Threat Evil Twin Attack Detection Based on Signal Variant and Hop Count
Authors: Said Abdul Ahad Ahadi, Elyas Baray, Nitin Rakesh, Sudeep Varshney
Abstract:
Wi-Fi is a widely used internet source that is used to provide internet access in many areas such as Stores, Cafes, University campuses, Restaurants and so on. This technology brought more facilities in communication and networking. On the other hand, due to the transmission of data over the air, which makes the network vulnerable, so it becomes prone to various threats such as Evil Twin and etc. The Evil Twin is a kind of adversary which impersonates a legitimate access point (LAP) as it can happen by spoofing the name (SSID) and MAC address (BSSID) of a legitimate access point (LAP). And this attack can cause many threats such as MITM, Service Interruption, Access point service blocking. Various Evil Twin Attack Detection Techniques are proposed, but they require additional hardware, or they require protocol modification. In this paper, we proposed a new technique based on Access Point’s two fingerprints, Received Signal Strength Indicator (RSSI) and Hop Count, that is hard to copy by an adversary. And we implemented the technique in a system called “ETDetector,” which can detect and prevent the attack.Keywords: evil twin, LAP, SSID, Wi-Fi security, signal variation, ETAD, kali linux, scapy, python
Procedia PDF Downloads 1446239 The Food and Nutritional Effects of Smallholders’ Participation in Milk Value Chain in Ethiopia
Authors: Geday Elias, Montaigne Etienne, Padilla Martine, Tollossa Degefa
Abstract:
Smallholder farmers’ participation in agricultural value chain identified as a pathway to get out of poverty trap in Ethiopia. The smallholder dairy activities have a huge potential in poverty reduction through enhancing income, achieving food and nutritional security in the country. However, much less is known about the effects of smallholder’s participation in milk value chain on household food security and nutrition. This paper therefore, aims at evaluating the effects of smallholders’ participation in milk value chain on household food security taking in to account the four pillars of food security measurements (availability, access, utilization and stability). Using a semi-structured interview, a cross sectional farm household data collected from a randomly selected sample of 333 households (170 in Amhara and 163 in Oromia regions).Binary logit and propensity score matching( PSM) models are employed to examine the mechanisms through which smallholder’s participation in the milk value chain affects household food security where crop production, per capita calorie intakes, diet diversity score, and food insecurity access scale are used to measure food availability, access, utilization and stability respectively. Our findings reveal from 333 households, only 34.5% of smallholder farmers are participated in the milk value chain. Limited access to inputs and services, limited access to inputs markets and high transaction costs are key constraints for smallholders’ limited access to the milk value chain. To estimate the true average participation effects of milk value chain for participated households, the outcome variables (food security) of farm households who participated in milk value chain are compared with the outcome variables if the farm households had not participated. The PSM analysis reveals smallholder’s participation in milk value chain has a significant positive effect on household income, food security and nutrition. Smallholder farmers who are participated in milk chain are better by 15 quintals crops production and 73 percent of per capita calorie intakes in food availability and access respectively than smallholder farmers who are not participated in the market. Similarly, the participated households are better in dietary quality by 112 percents than non-participated households. Finally, smallholders’ who are participated in milk value chain are better in reducing household vulnerability to food insecurity by an average of 130 percent than non participated households. The results also shows income earned from milk value chain participation contributed to reduce capital’s constraints of the participated households’ by higher farm income and total household income by 5164 ETB and 14265 ETB respectively. This study therefore, confirms the potential role of smallholders’ participation in food value chain to get out of poverty trap through improving rural household income, food security and nutrition. Therefore, identified the determinants of smallholder participation in milk value chain and the participation effects on food security in the study areas are worth considering as a positive knock for policymakers and development agents to tackle the poverty trap in the study area in particular and in the country in general.Keywords: effects, food security and nutrition, milk, participation, smallholders, value chain
Procedia PDF Downloads 3436238 Development of Intellectual Property Information Services in Zimbabwe’s University Libraries: Assessing the Current Status and Mapping the Future Direction
Authors: Jonathan Munyoro, Takawira Machimbidza, Stephen Mutula
Abstract:
The study investigates the current status of Intellectual Property (IP) information services in Zimbabwe's university libraries. Specifically, the study assesses the current IP information services offered in Zimbabwe’s university libraries, identifies challenges to the development of comprehensive IP information services in Zimbabwe’s university libraries, and suggests solutions for the development of IP information services in Zimbabwe’s university libraries. The study is born out of a realisation that research on IP information services in university libraries has received little attention, especially in developing country contexts, despite the fact that there are calls for heightened participation of university libraries in IP information services. In Zimbabwe, the launch of the National Intellectual Property Policy and Implementation Strategy 2018-2022 and the introduction of the Education 5.0 concept are set to significantly change the IP landscape in the country. Education 5.0 places more emphasis on innovation and industrialisation (in addition to teaching, community service, and research), and has the potential to shift the focus and level of IP output produced in higher and tertiary education institutions beyond copyrights and more towards commercially exploited patents, utility models, and industrial designs. The growing importance of IP commercialisation in universities creates a need for appropriate IP information services to assist students, academics, researchers, administrators, start-ups, entrepreneurs, and inventors. The critical challenge for university libraries is to reposition themselves and remain relevant in the new trajectory. Designing specialised information services to support increased IP generation and commercialisation appears to be an opportunity for university libraries to stay relevant in the knowledge economy. However, IP information services in Zimbabwe’s universities appear to be incomplete and focused mostly on assisting with research publications and copyright-related activities. Research on the existing status of IP services in university libraries in Zimbabwe is therefore necessary to help identify gaps and provide solutions in order to stimulate the growth of new forms of such services. The study employed a quantitative approach. An online questionnaire was administered to 57 academic librarians from 15 university libraries. Findings show that the current focus of the surveyed institutions is on providing scientific research support services (15); disseminating/sharing university research output (14); and copyright activities (12). More specialised IP information services such as IP education and training, patent information services, IP consulting services, IP online service platforms, and web-based IP information services are largely unavailable in Zimbabwean university libraries. Results reveal that the underlying challenge in the development of IP information services in Zimbabwe's university libraries is insufficient IP knowledge among academic librarians, which is exacerbated by inadequate IP management frameworks in university institutions. The study proposes a framework for the entrenchment of IP information services in Zimbabwe's university libraries.Keywords: academic libraries, information services, intellectual property, IP knowledge, university libraries, Zimbabwe
Procedia PDF Downloads 1586237 Performance Evaluation of Packet Scheduling with Channel Conditioning Aware Based on Wimax Networks
Authors: Elmabruk Laias, Abdalla M. Hanashi, Mohammed Alnas
Abstract:
Worldwide Interoperability for Microwave Access (WiMAX) became one of the most challenging issues, since it was responsible for distributing available resources of the network among all users this leaded to the demand of constructing and designing high efficient scheduling algorithms in order to improve the network utilization, to increase the network throughput, and to minimize the end-to-end delay. In this study, the proposed algorithm focuses on an efficient mechanism to serve non-real time traffic in congested networks by considering channel status.Keywords: WiMAX, Quality of Services (QoS), OPNE, Diff-Serv (DS).
Procedia PDF Downloads 2886236 Machine Learning Assisted Performance Optimization in Memory Tiering
Authors: Derssie Mebratu
Abstract:
As a large variety of micro services, web services, social graphic applications, and media applications are continuously developed, it is substantially vital to design and build a reliable, efficient, and faster memory tiering system. Despite limited design, implementation, and deployment in the last few years, several techniques are currently developed to improve a memory tiering system in a cloud. Some of these techniques are to develop an optimal scanning frequency; improve and track pages movement; identify pages that recently accessed; store pages across each tiering, and then identify pages as a hot, warm, and cold so that hot pages can store in the first tiering Dynamic Random Access Memory (DRAM) and warm pages store in the second tiering Compute Express Link(CXL) and cold pages store in the third tiering Non-Volatile Memory (NVM). Apart from the current proposal and implementation, we also develop a new technique based on a machine learning algorithm in that the throughput produced 25% improved performance compared to the performance produced by the baseline as well as the latency produced 95% improved performance compared to the performance produced by the baseline.Keywords: machine learning, bayesian optimization, memory tiering, CXL, DRAM
Procedia PDF Downloads 966235 Impact of ICT on Efficient Services Providing to Users by LIPs in NCR India
Authors: Mani Gupta
Abstract:
This study deals with question: i) Whether ICT plays a positive role in improvement of efficiency of LIPs in terms of providing efficient services to the Users in LICs? and ii) Role of finance in terms of required technological logistics and infrastructure for usage of ICT based services to comfort in accessing databases by Users in LICs. This is based on primary data which are collected from various libraries and Information Centers of NCR Delhi. The survey conducted during December 15 and 31, 2010 on 496 respondents across 96 libraries and information centers in NCR Delhi through electronic data collection method. There is positive and emphatic relationship between ICT and its effect on improving the level of efficient services providing by LIPs in LICs in NCR Delhi. This is divided into 6 sub-headings and finally the outcomes.Keywords: modern globalization, linear correlation, efficient service, internet revolution, logistics
Procedia PDF Downloads 3586234 Domestic Violence Against Iranian Deaf People
Authors: Laleh Golamrej Eliasi, Mahsa Tahzibi, Mohammad Torkashvand Moradabadi
Abstract:
TheIranian Ear, Throat, Nose, Head, and Neck Research Center has estimated that three to five percent of Iran’s population has moderate to profound hearing disorders. The prevalence of hearing loss in provincial centers is equal to 4.7 per thousand live births (362 cases). The deaf community has limited access to information and health services due to language and communication barriers. Communication and language limitations isolate and limit deaf people from social media, health services, and communication with caregivers and health providers.Limitedcommunicationwith the deaf has led to a lack of knowledge and information about domestic violence against the deaf (DVAD) in this target group in Iran. To fill this knowledge gap, deaf living in Iranwere selected as the target group to assess their views on DVAD. This study is implemented in the socio-ecological approach framework to assess the impacts of individual characteristics, interpersonal relationships, community, and society components on DVAD. Semi-structured interviews with the Iranian deaf and Content analysis are used to find the participants’ point of view on DVAD, its risk factors, and the reduction approach to DVAD. The main purpose is to obtain information about participants' views on the subject. The findings can be used to improve culturally safe social work knowledge and practices with a bottom-up approach to reduce DV and increase their well-being. Therefore, this research can have important effects on the sustainable development of services and supports the welfare and inclusion of the deaf.Keywords: domestic violence, Iranian deaf, social work, content analysis
Procedia PDF Downloads 1076233 Challenges of e-Service Adoption and Implementation in Nigeria: Lessons from Asia
Authors: Kazeem Oluwakemi Oseni, Kate Dingley
Abstract:
E-Service has moved from the usual manual and traditional way of rendering services to electronic service provision for the public and there are several reasons for implementing these services, Airline ticketing have gone from its manual traditional way to an intelligent web-driven service of purchasing. Many companies have seen their profits doubled through the use of online services in their operation and a typical example is Hewlett Packard (HP) which is rapidly transforming their after sales business into a profit generating e-service business unit. This paper will examine the various challenges confronting e-Service adoption and implementation in Nigeria and also analyse lessons learnt from e-Service adoption and implementation in Asia to see how it could be useful in Nigeria which is a lower middle income country. Based on the analysis of the online survey data. It has been identified that the public in Nigeria are much aware of e-Services but successful adoption and implementation have been the problems faced.Keywords: e-government service, adoption, implementation, Nigeria, Asia
Procedia PDF Downloads 4596232 Uneven Development: Structural Changes and Income Outcomes across States in Malaysia
Authors: Siti Aiysyah Tumin
Abstract:
This paper looks at the nature of structural changes—the transition of employment from agriculture, to manufacturing, then to different types of services—in different states in Malaysia and links it to income outcomes for households and workers. Specifically, this paper investigates the conditional association between the concentration of different economic activities and income outcomes (household incomes and employee wages) in almost four decades. Using publicly available state-level employment and income data, we found that significant wage premium was associated with “modern” services (finance, real estate, professional, information and communication), which are urban-based services sectors that employ a larger proportion of skilled and educated workers. However, employment in manufacturing and other services subsectors was significantly associated with a lower income dispersion and inequality, alluding to their importance in welfare improvements.Keywords: employment, labor market, structural change, wage
Procedia PDF Downloads 1716231 Effective Governance through Mobile Phones: Cases Supporting the Introduction and Implementation
Authors: Mohd Mudasir Shafi, Zafrul Hasan, Talat Saleem
Abstract:
Information and communication Technology (ICT) services have been defined as a route to good governance. Introduction of ICT into Governance has given rise to the idea of e-governance which helps in enhancing transparency, generating accountability and responsiveness in the system in order to provide faster and quality service to the citizen. Advancement in ICT has provided governments all over the world to speed up the delivery of information and services to citizens and businesses and increase their participation in governance. There has been varying degree of success over the past decade into providing services to the citizens using internet and different web services. These e-government initiatives have been extensively researched. Our research is aimed at the transition from electronic government to mobile government (m-government) initiatives implementing the mobile services and concerned to understand the major factors which will aid to adoption and distribution of these services. There must be some amount of research done in the integration process between e-government and m-government. There must also be enough amount of investigation done all the factors that could affect the transition process. Such factors differ between different places and the advancement in information and technology available there. In this paper, we have discussed why mobile communication system can be used for effective e-governance and the areas where m-governance can be implemented. The paper will examine some of the reasons as well as the main opportunities for improving effective governance through mobile phones.Keywords: e-governance, mobile phones, information technology, m-government
Procedia PDF Downloads 4436230 Jordan Water District Interactive Billing and Accounting Information System
Authors: Adrian J. Forca, Simeon J. Cainday III
Abstract:
The Jordan Water District Interactive Billing and Accounting Information Systems is designed for Jordan Water District to uplift the efficiency and effectiveness of its services to its customers. It is designed to process computations of water bills in accurate and fast way through automating the manual process and ensures that correct rates and fees are applied. In addition to billing process, a mobile app will be integrated into it to support rapid and accurate water bill generation. An interactive feature will be incorporated to support electronic billing to customers who wish to receive water bills through the use of electronic mail. The system will also improve, organize and avoid data inaccuracy in accounting processes because data will be stored in a database which is designed logically correct through normalization. Furthermore, strict programming constraints will be plunged to validate account access privilege based on job function and data being stored and retrieved to ensure data security, reliability, and accuracy. The system will be able to cater the billing and accounting services of Jordan Water District resulting in setting forth the manual process and adapt to the modern technological innovations.Keywords: accounting, bill, information system, interactive
Procedia PDF Downloads 2516229 Sustainability Study of Government Procurement of Public Services in Guangzhou: a Perspective Based on the Resources Dependence of Social Work
Authors: Li Pan
Abstract:
The recently prevalent government procurement of public services in China boasts a new form of government’s provision of public service through the purchasing of social work from social organizations, a new measure of the transformation in governmental functions as well as an unprecedented opportunity for the development of social organizations. For the past few years, the phenomenon of a surge in the number of social work organizations and social work staff emerged right with the initiatives of energetically carrying out the purchase of public services by the government. Such efforts have presented the strong determination of the Chinese government in building a small government by streamlining administration and delegating part of the governmental power to social organizations. This paper is based on the 2012-2014 performance appraisal project of the Guangzhou municipal government’s purchasing of public services and the project was carried out in the summer of 2015. During the process of the appraisal, several general problems hindering the sustainable development of government purchasing of public service have been observed. As Guangzhou is among the rank of pioneer cities in the conduct of the reform, it is representative and imperative to study the sustainability of government purchasing of public service. In 2012, Guangzhou local government started contracting out public service to the community social organizations to provide general family services and special services to community residents, since when integrated family service centers and special service centers were established as platforms to provide public social service in a city-wide range. Consequently, taking an example of the current rapid development of government purchase of the integrated family services and special services in Guangzhou, this paper puts up several proposals for the sustainable development of Guangzhou municipal government’s procurement of public services on the perspective of social work’s resource dependence.Keywords: government procurement of public services, Guangzhou, integrated family service center, social work, sustainability.
Procedia PDF Downloads 2706228 Heritage Preservation and Cultural Tourism; The 'Pueblos Mágicos' Program and Its Role in Preserving Traditional Architecture in Mexico
Authors: Claudia Rodríguez Espinosa, Erika Elizabeth Pérez Múzquiz
Abstract:
The Pueblos Mágicos federal program tries to preserve the traditional environment of small towns (under 20,000 inhabitants), through economic investments, legislation, and legal aid. To access the program, it’s important to cover 8 requirements; one of them is the fourth, which considers ‘Promotion of symbolic and differentiated touristic attractions, such as architecture, emblematic buildings, festivities and traditions, artisan production, traditional cuisine, and touristic services that guarantee their commercialization along with assistantship and security services’. With this objective in mind, the Federal government of Mexico had developed local programs to protect emblematic public buildings in each of the 83 towns included in the Pueblos Mágicos program that involved federal and local administrations as well as local civil associations, like Adopte una Obra de Arte. In this paper, we present 3 different intervention cases: first the restoration project (now concluded) of the 16th century monastery of Santa María Magdalena in Cuitzeo, an enormous building which took 6 years to be completely restored. Second case, the public spaces intervention in Pátzcuaro, included the Plaza Grande or Vasco de Quiroga square, and the access to the arts and crafts house known as Casa de los once patios or eleven backyards house. The third case is the recovery project of the 16th century atrium of the Tzintzuntzan monastery that included the original olive trees brought by Franciscans monks to this town in the middle 1500’s. This paper tries to present successful preservation projects in 3 different scales: building, urban spaces and landscape; and in 3 different towns with the objective to preserve public architecture, public spaces and cultural traditions. Learn from foreign experiences, different ways to manage preservation projects focused on public architecture and public spaces.Keywords: cultural tourism, heritage preservation, traditional architecture, public policies
Procedia PDF Downloads 2926227 Streamlining .NET Data Access: Leveraging JSON for Data Operations in .NET
Authors: Tyler T. Procko, Steve Collins
Abstract:
New features in .NET (6 and above) permit streamlined access to information residing in JSON-capable relational databases, such as SQL Server (2016 and above). Traditional methods of data access now comparatively involve unnecessary steps which compromise system performance. This work posits that the established ORM (Object Relational Mapping) based methods of data access in applications and APIs result in common issues, e.g., object-relational impedance mismatch. Recent developments in C# and .NET Core combined with a framework of modern SQL Server coding conventions have allowed better technical solutions to the problem. As an amelioration, this work details the language features and coding conventions which enable this streamlined approach, resulting in an open-source .NET library implementation called Codeless Data Access (CODA). Canonical approaches rely on ad-hoc mapping code to perform type conversions between the client and back-end database; with CODA, no mapping code is needed, as JSON is freely mapped to SQL and vice versa. CODA streamlines API data access by improving on three aspects of immediate concern to web developers, database engineers and cybersecurity professionals: Simplicity, Speed and Security. Simplicity is engendered by cutting out the “middleman” steps, effectively making API data access a whitebox, whereas traditional methods are blackbox. Speed is improved because of the fewer translational steps taken, and security is improved as attack surfaces are minimized. An empirical evaluation of the speed of the CODA approach in comparison to ORM approaches ] is provided and demonstrates that the CODA approach is significantly faster. CODA presents substantial benefits for API developer workflows by simplifying data access, resulting in better speed and security and allowing developers to focus on productive development rather than being mired in data access code. Future considerations include a generalization of the CODA method and extension outside of the .NET ecosystem to other programming languages.Keywords: API data access, database, JSON, .NET core, SQL server
Procedia PDF Downloads 676226 Access of Small and Medium Enterprises to Finance in Rural Areas: Case of Indonesia and Thailand
Authors: N. Ikasari, T. Sumransat, U. Eko, R. Kusumastuti
Abstract:
Small and medium enterprises (SMEs) are regarded as the engine for economic development, notwithstanding their continuous financing conundrum. In the case of developing countries, access to finance is a reflection of the effectiveness of government policy. The widely accepted perspective to assess small businesses’ access to finance is that of economic view. The existing body of literature presents access to finance in three dimensions; they are accessibility, eligibility and affordability. Within this perspective, the role of socio-cultural has not explored. This study is aimed at investigating the existence of any socio-cultural factors within access to finance issue in Asian countries where governance is enriched by countries’ values and beliefs. The significance of this study is the instigation of supplementary dimension to assess access to finance that eventually contributes to the development of micro-finance policy. Indonesia and Thailand are selected as cases in point, where distinction is drawn on the level of cultural diversity and micro-finance policy in respective country. A questionnaire is used to collect information related to the three dimensions of access to finance as well as to explore alternative financing reasoning to elaborate the issue from the demand side. Questionnaires are distributed to 60 small business owners operating in Indonesia and the same number in Thailand. In order to present a complete understanding on the matter at hand, interviews with banks are conducted to capture the perspective as presented by the supply side. Research findings show that small business owners and banks in Indonesia and Thailand are in agreement that access to finance is not deemed as an issue. However, trust issue that exists mutually between financing users and providers leads small business owners in Indonesia to look for alternative financing other than banks. The findings contribute to the refinement of micro-financing policy in Indonesia and Thailand.Keywords: access to finance, Indonesia, small and medium enterprises, Thailand
Procedia PDF Downloads 2926225 An Evaluation of the Impact of E-Banking on Operational Efficiency of Banks in Nigeria
Authors: Ibrahim Rabiu Darazo
Abstract:
The research has been conducted on the impact of E-banking on the operational efficiency of Banks in Nigeria, A case of some selected banks (Diamond Bank Plc, GTBankPlc, and Fidelity Bank Plc) in Nigeria. The research is a quantitative research which uses both primary and secondary sources of data collection. Questionnaire were used to obtained accurate data, where 150 Questionnaire were distributed among staff and customers of the three Banks , and the data collected where analysed using chi-square, whereas the secondary data where obtained from relevant text books, journals and relevant web sites. It is clear from the findings that, the use of e-banking by the banks has improved the efficiency of these banks, in terms of providing efficient services to customers electronically, using Internet Banking, Telephone Banking ATMs, reducing time taking to serve customers, e-banking allow new customers to open an account online, customers have access to their account at all the time 24/7.E-banking provide access to customers information from the data base and cost of check and postage were eliminated using e-banking. The recommendation at the end of the research include; the Banks should try to update their electronic gadgets, e-fraud(internal & external) should also be controlled, Banks shall employ qualified man power, Biometric ATMs shall be introduce to reduce fraud using ATM Cards, as it is use in other countries like USA.Keywords: banks, electronic banking, operational efficiency of banks, biometric ATMs
Procedia PDF Downloads 3346224 Perspectives on Educational Psychological Support Services in New Zealand and South African Schools
Authors: Johnnie Hay
Abstract:
New Zealand is well known for its natural beauty, diversity of people but also for its strong focus on mental health through the provision of a vast network of psycho-social support services. South African-trained psychologists often make New Zealand their new home when emigrating - as it is relatively simple to slot into the well-established mental health system. South Africa is bigger in size, population, GDP and probably people diversity than New Zealand but struggles to provide adequate educational and psychological support services to schools. This is mainly due to budgetary pressures brought about by the imperative to first ensure that the approximately 13 million learners all have a teacher in front of their classes and at an average ratio of not more than 40 learners per class. In this paper, perspectives on educational and psychological support in New Zealand and South African schools will be shared. Through basic qualitative research encompassing semi-structured interviews with two South African educational psychologists who returned from New Zealand, supplemented by document analysis, the New Zealand situation will be scrutinized. South African perspectives will be obtained through a number of semi-structured interviews and questionnaires administered by education support services specialists working in district-based support teams in three provinces of the country. This research is in process, but preliminary findings indicate large disparities between the two countries' emphasis, funding, post provisioning and structure regarding educational and psychological support services.Keywords: educational psychological support services, support for learners experiencing special needs, education support services, diverse learner population
Procedia PDF Downloads 736223 The Role of Access Control Techniques in Creating a Safe Cyberspace for Children
Authors: Sara Muslat Alsahali, Nout Mohammed Alqahtani
Abstract:
Digital technology has changed the world, and with the increasing number of children accessing the Internet, it has now become an integral part of children's lives from their early years. With the rapid development of digital technology, the risks children face on the internet also evolve from cyberbullying to misuse, sexual exploitation, and abuse of their private information over the Internet. Digital technology, with its advantages and disadvantages, is now a fact of our life. Therefore, knowledge of how to reduce its risks and maximize its benefits will help shape the growth and future of a new generation of digital citizens. This paper will discuss access control techniques that help to create secure cyberspace where children can be safe without depriving them of their rights and freedom to use the internet and preventing them from its benefits. Also, it sheds light on its challenges and problems by classifying the methods of parental controlling into two possibilities asynchronous and synchronous techniques and choosing YouTube as a case study of access control techniques.Keywords: access control, cyber security, kids, parental monitoring
Procedia PDF Downloads 1396222 A Study of Student Affairs Services across Baghdad Universities: Exploring Best Practices and Impact on Student Success
Authors: Jelena Zivkovic, Haidar Mohammed, Elaf Saeed
Abstract:
Student affairs services play a critical role in contributing to the wholistic development and success of students as they progress through their academic careers. The study encompasses a multifaceted examination of student affairs service offerings amongst 10 private and 3 public Baghdad universities. Student affairs administrators (13) were surveyed along with over 300 students to determine university-sponsored services and student satisfaction and awareness. The student affairs service research findings varied significantly between private and public institutions and those that followed a national and international curriculum. Universities need to persist to adapt to changing demographics and technological advancements to enhance students' personal and academic successes, and student affairs services are key to preparing graduates to thrive in a diverse global world.Keywords: student affairs, student success, higher education, Iraq, universities, Baghdad
Procedia PDF Downloads 1076221 Discovering User Behaviour Patterns from Web Log Analysis to Enhance the Accessibility and Usability of Website
Authors: Harpreet Singh
Abstract:
Finding relevant information on the World Wide Web is becoming highly challenging day by day. Web usage mining is used for the extraction of relevant and useful knowledge, such as user behaviour patterns, from web access log records. Web access log records all the requests for individual files that the users have requested from the website. Web usage mining is important for Customer Relationship Management (CRM), as it can ensure customer satisfaction as far as the interaction between the customer and the organization is concerned. Web usage mining is helpful in improving website structure or design as per the user’s requirement by analyzing the access log file of a website through a log analyzer tool. The focus of this paper is to enhance the accessibility and usability of a guitar selling web site by analyzing their access log through Deep Log Analyzer tool. The results show that the maximum number of users is from the United States and that they use Opera 9.8 web browser and the Windows XP operating system.Keywords: web usage mining, web mining, log file, data mining, deep log analyzer
Procedia PDF Downloads 2496220 Telehealth Ecosystem: Challenge and Opportunity
Authors: Rattakorn Poonsuph
Abstract:
Technological innovation plays a crucial role in virtual healthcare services. A growing number of telehealth platforms are concentrating on using digital tools to improve the quality and availability of care. As a result, telehealth represents an opportunity to redesign the way health services are delivered. The research objective is to discover a new business model for digital health services and related industries to participate with telehealth solutions. The business opportunity is valuable for healthcare investors as a startup company to further investigations or implement the telehealth platform. The paper presents a digital healthcare business model and business opportunities to related industries. These include digital healthcare services extending from a traditional business model and use cases of business opportunities to related industries. Although there are enormous business opportunities, telehealth is still challenging due to the patient adaption and digital transformation process within a healthcare organization.Keywords: telehealth, Internet hospital, HealthTech, InsurTech
Procedia PDF Downloads 1706219 E-Learning Network Support Services: A Comparative Case Study of Australian and United States Universities
Authors: Sayed Hadi Sadeghi
Abstract:
This research study examines the current state of support services for e-network practice in an Australian and an American university. It identifies information that will be of assistance to Australian and American universities to improve their existing online programs. The study investigated the two universities using a quantitative methodological approach. Participants were students, lecturers and admins of universities engaged with online courses and learning management systems. The support services for e-network practice variables, namely academic support services, administrative support and technical support, were investigated for e-practice. Evaluations of e-network support service and its sub factors were above average and excellent in both countries, although the American admins and lecturers tended to evaluate this factor higher than others did. Support practice was evaluated higher by all participants of an American university than by Australians. One explanation for the results may be that most suppliers of the Australian university e-learning system were from eastern Asian cultural backgrounds with a western networking support perspective about e-learning.Keywords: support services, e-Network practice, Australian universities, United States universities
Procedia PDF Downloads 1646218 Exploring the Treatment of Unmarried Female Adolescents (10-19 Years) at Health Facilities during the Maternity Period in Uganda
Authors: Peninah Agaba, Monica Magadi, Bev Orton
Abstract:
Uganda is one of the countries with high maternal mortality (336/100,000) where adolescents account for 24 percent of the total maternal deaths. Research shows that use of maternal health services may prevent some of these deaths and good provider attitudes attract adolescents to use the services. However, poor health provider’s attitudes discourage adolescents from seeking the services during the maternity period. This study explores the experiences of unmarried female adolescents at the health facilities during the maternity period. The study population is unmarried adolescent girls aged 10-19 years who were pregnant or had given birth within three years before the interview. This is a special interest group that requires attention throughout this period. Most of the pregnancies among unmarried adolescents are unwanted; as a result, many of them have been abused and neglected by parents and close family members including partners who deny fatherhood of the pregnancy/child. These adolescents hope to find comfort from health providers like being listened to during counseling, not abused and judged; unfortunately this is not the case always. The research was approved by the University of Hull, School of Education and Social Sciences ethics review committee, Mildmay Uganda Research Ethics Committee and Uganda National Council of Science and Technology. The study was carried out in Bushenyi and Kibale districts in Western Uganda. Fourteen in-depth interviews and seven focus group discussions were completed in the local languages and later transcribed to English language. Thematic analysis to identify the themes was done. Adolescents were aged 16-19 years, two had become pregnant before 15 years. Most had not completed secondary education; none had tertiary education and three of the 14 IDI adolescent participants wanted to get pregnant. Analysis shows varied experiences; most adolescents were abused verbally and physically by the health providers due to their young age of pregnancy, lack of essential items during this period (maternity dresses, children clothes, delivery kit) and fear of labour pains. Another cause for abuse was these adolescents coming for antenatal care with no partners yet the implementation of a policy on increasing male involvement in reproductive health in Uganda requires them to attend antenatal care with their partners and most of these unmarried adolescents have no partners to accompany them. Despite the above challenges, the study also identified the care some of these unmarried adolescents received during the maternity visits for example they were not abused, were provided with appropriate information and supported with child care. The study identified abuse and support the unmarried adolescents received during the maternity period. Efforts to provide adolescents with adequate information including what to expect during labour by providers and provision of basic needs are essential. Health providers should have trainings on client care especially how to embrace unmarried adolescents when they come to access maternity services. More so, the policy on improving male involvement in RH issues need to be considerate of unmarried adolescents who in most cases do not have the partners to go with to access maternity care.Keywords: abuse, maternity care, Uganda, unmarried, adolescents
Procedia PDF Downloads 1316217 Event Monitoring Based On Web Services for Heterogeneous Event Sources
Authors: Arne Koschel
Abstract:
This article discusses event monitoring options for heterogeneous event sources as they are given in nowadays heterogeneous distributed information systems. It follows the central assumption, that a fully generic event monitoring solution cannot provide complete support for event monitoring; instead, event source specific semantics such as certain event types or support for certain event monitoring techniques have to be taken into account. Following from this, the core result of the work presented here is the extension of a configurable event monitoring (Web) service for a variety of event sources. A service approach allows us to trade genericity for the exploitation of source specific characteristics. It thus delivers results for the areas of SOA, Web services, CEP and EDA.Keywords: event monitoring, ECA, CEP, SOA, web services
Procedia PDF Downloads 7466216 Lifetime Improvement of IEEE.802.15.6 Sensors in Scheduled Access Mode
Authors: Latif Adnane, C. E. Ait Zaouiat, M. Eddabbah
Abstract:
In Wireless Body Area Networks, the issue of systems lifetime is a big challenge to complete. In this paper, we have tackled this subject to suggest some solutions. For this aim, we have studied some batteries characteristics related to human body temperature. Moreover, we have analyzed a mathematical model which defines sensors lifetime (battery lifetime). Based on this model, we note that the random access increases the energy consumption, because nodes are waking up during the whole superframe period. Results show that using scheduled mode access of IEEE 802.15.6 maximizes the lifetime function, by setting nodes in the sleep mode in the inactive period of transmission.Keywords: battery, energy consumption, IEEE 802.15.6, lifetime, polling
Procedia PDF Downloads 3476215 Digital Transformation, Financing Microstructures, and Impact on Well-Being and Income Inequality
Authors: Koffi Sodokin
Abstract:
Financing microstructures are increasingly seen as a means of financial inclusion and improving overall well-being in developing countries. In practice, digital transformation in finance can accelerate the optimal functioning of financing microstructures, such as access by households to microfinance and microinsurance. Large households' access to finance can lead to a reduction in income inequality and an overall improvement in well-being. This paper explores the impact of access to digital finance and financing microstructures on household well-being and the reduction of income inequality. To this end, we use the propensity score matching, the double difference, and the smooth instrumental quantile regression as estimation methods with two periods of survey data. The paper uses the FinScope consumer data (2016) and the Harmonized Living Standards Measurement Study (2018) from Togo in a comparative perspective. The results indicate that access to digital finance, as a cultural game changer, and to financing microstructures improves overall household well-being and contributes significantly to reducing income inequality.Keywords: financing microstructure, microinsurance, microfinance, digital finance, well-being, income inequality
Procedia PDF Downloads 916214 Architecture for QoS Based Service Selection Using Local Approach
Authors: Gopinath Ganapathy, Chellammal Surianarayanan
Abstract:
Services are growing rapidly and generally they are aggregated into a composite service to accomplish complex business processes. There may be several services that offer the same required function of a particular task in a composite service. Hence a choice has to be made for selecting suitable services from alternative functionally similar services. Quality of Service (QoS)plays as a discriminating factor in selecting which component services should be selected to satisfy the quality requirements of a user during service composition. There are two categories of approaches for QoS based service selection, namely global and local approaches. Global approaches are known to be Non-Polynomial (NP) hard in time and offer poor scalability in large scale composition. As an alternative to global methods, local selection methods which reduce the search space by breaking up the large/complex problem of selecting services for the workflow into independent sub problems of selecting services for individual tasks are coming up. In this paper, distributed architecture for selecting services based on QoS using local selection is presented with an overview of local selection methodology. The architecture describes the core components, namely, selection manager and QoS manager needed to implement the local approach and their functions. Selection manager consists of two components namely constraint decomposer which decomposes the given global or workflow level constraints in local or task level constraints and service selector which selects appropriate service for each task with maximum utility, satisfying the corresponding local constraints. QoS manager manages the QoS information at two levels namely, service class level and individual service level. The architecture serves as an implementation model for local selection.Keywords: architecture of service selection, local method for service selection, QoS based service selection, approaches for QoS based service selection
Procedia PDF Downloads 4266213 Exploring the Carer Gender Support Gap: Results from Freedom of Information Requests to Adult Social Services in England
Authors: Stephen Bahooshy
Abstract:
Our understanding of gender inequality has advanced in recent years. Differences in pay and societal gendered behaviour expectations have been emphasized. It is acknowledged globally that gender shapes everyone’s experiences of health and social care, including access to care, use of services and products, and the interaction with care providers. NHS Digital in England collects data from local authorities on the number of carers and people with support needs and the services they access. This data does not provide a gender breakdown. Caring can have many positive and negative impacts on carers’ health and wellbeing. For example, caring can improve physical health, provide a sense of pride and purpose, and reduced stress levels for those who undertake a caring role by choice. Negatives of caring include financial concerns, social isolation, a reduction in earnings, and not being recognized as a carer or involved and consulted by health and social care professionals. Treating male and female carers differently is by definition unequitable and precludes one gender from receiving the benefits of caring whilst potentially overburdening the other with the negatives of caring. In order to explore the issue on a preliminary basis, five local authorities who provide statutory adult social care services in England were sent Freedom of Information requests in 2019. The authorities were selected to include county councils and London boroughs. The authorities were asked to provide data on the amount of money spent on care at home packages to people over 65 years, broken down by gender and carer gender for each financial year between 2013 and 2019. Results indicated that in each financial year, female carers supporting someone over 65 years received less financial support for care at home support packages than male carers. Over the six-year period, this difference equated to a £9.5k deficit in financial support received on average per female carer when compared to male carers. An example of a London borough with the highest disparity presented an average weekly spend on care at home for people over 65 with a carer of £261.35 for male carers and £165.46 for female carers. Consequently, female carers in this borough received on average £95.89 less per week in care at home support than male carers. This highlights a real and potentially detrimental disparity in the care support received to female carers in order to support them to continue to care in parts of England. More research should be undertaken in this area to better explore this issue and to understand if these findings are unique to these social care providers or part of a wider phenomenon. NHS Digital should request local authorities collect data on gender in the same way that large employers in the United Kingdom are required by law to provide data on staff salaries by gender. People who allocate social care packages of support should consider the impact of gender when allocating support packages to people with support needs and who have carers to reduce any potential impact of gender bias on their decision-making.Keywords: caregivers, carers, gender equality, social care
Procedia PDF Downloads 1666212 Full Disclosure Policy: Transparency in Fiscal Administration
Authors: Joyly Jill Apud
Abstract:
Corruption is an all-encompassing issue worldwide. Many attempts have been done to address such cases especially by the government through increasing transparency. The Philippine government increased the mechanism of transparency by opening to public its financial transactions through Full Disclosure Policy – mandating all local governments to post in their websites all financial transactions (Philippine Public Transparency Reporting Project, 2011). For transparency to be fully realized, the challenge lies in creating a mechanism where the constituents are encouraged to engage as social auditors. In line of the said challenge, the study focused in Davao City, Philippines measuring the respondent’s awareness, access and utilization of Full Disclosure Policy (FDP). Particularly, this study determined the significant difference on the awareness, access and utilization of respondents when grouped according to sector and the significant relationship between respondents’ awareness and in the access and utilization of FDP reports. The study used descriptive-correlation, Mean, Anova and Pearson R as statistical treatment. The 120 respondents are from the different sectors of Davao City. These are the Academe, Youth, LGUs, NGOs, Business, and Church groups. The awareness of the respondents was measured in three main categories: Existence of the Policy, Content of the Policy and the Manner of Publication. Access and Utilization of the FDP reports is divided into three: Budget Reports, Procurement Reports and Special Purpose Fund Reports. Results showed that the respondents are moderately aware of the Policy. Though it manifested that the respondents are aware of the disclosure, they are unaware of the Full Disclosure Policy and Full Disclosure Policy Portal. Moreover, the respondents seldom access and utilize all the FDP reports. Further results revealed that there is a significant difference in the awareness and the access and utilization of FDP when grouped according to sector. Moreover, significant relationship in the awareness and the access and utilization of the FDP is evident. It showed that the higher the awareness on FDP, the higher the level of access and utilization on the FDP reports.Keywords: corruption, e-governance, budget transparency, participation
Procedia PDF Downloads 3956211 Domestic and Foreign Terrorism: Evaluation of the Breeding Ground
Authors: T. K. Hung
Abstract:
Terrorism acts have occurred across both developed and developing states, with well-identified motivation and causes. For many years, terrorism eradication has become a major topic yet only passive actions were taken in response to acts. The linkage between the location of terrorism occurrence and breeding ground is not well-documented, resulting in the passive approach used in counter-terrorism nowadays. The evaluation investigates all post-9/11 terrorism affairs considering their state capacity, safety, ease of border access control, religion diversity, and technology access, to measure the level of breeding ground of the states. Those "weak" states with poor border access control, resources capacity and domestic safety are the best breeding ground for terrorists. Although many attacks were caused by religious motivation, religion diversity does not predict the breeding ground. States with censored technology access, particular computer-mediated communication, predict on the terrorism breeding ground, moderated by the level of breeding ground of neighboring states.Keywords: counter-terrorism, lethality, security, terrorism
Procedia PDF Downloads 340