Search results for: private cloud
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2373

Search results for: private cloud

2013 "Good" Discretion Among Private Sector Street Level Bureaucrats

Authors: Anna K. Wood, Terri Friedline

Abstract:

In April and May 2020, the private banking industry approved over 1.7 million emergency small business loans, totaling over $650 billion in federal relief funds as part of the Paycheck Protection Program (PPP). Since the program’s rollout, the extensive evidence of discriminatory lending and misuse of funds has been revealed by investigative journalism and academic studies. This study is based on 41 interviews with frontline banking industry professionals conducted during the days and weeks of the PPP rollout, presenting a real-time narrative of the program rollout through the eyes of those in the role of a street-level bureaucrat. We present two themes from this data about the conditions under which these frontline workers experienced the PPP: Exigent Timelines and Defaulting to Existing Workplace Norms and Practices. We analyze these themes using literature on street-level organizations, bureaucratic discretion, and the differences between public and private sector logic. The results of this study present new directions for theorizing sector-level differences in street-level bureaucratic discretion in the context of mixed-sector collaboration on public service delivery, particularly under conditions of crisis and urgency.

Keywords: street level bureaucracy, social policy, bureaucratic discretion, public private partnerships

Procedia PDF Downloads 90
2012 Investment and Economic Growth: An Empirical Analysis for Tanzania

Authors: Manamba Epaphra

Abstract:

This paper analyzes the causal effect between domestic private investment, public investment, foreign direct investment and economic growth in Tanzania during the 1970-2014 period. The modified neo-classical growth model that includes control variables such as trade liberalization, life expectancy and macroeconomic stability proxied by inflation is used to estimate the impact of investment on economic growth. Also, the economic growth models based on Phetsavong and Ichihashi (2012), and Le and Suruga (2005) are used to estimate the crowding out effect of public investment on private domestic investment on one hand and foreign direct investment on the other hand. A correlation test is applied to check the correlation among independent variables, and the results show that there is very low correlation suggesting that multicollinearity is not a serious problem. Moreover, the diagnostic tests including RESET regression errors specification test, Breusch-Godfrey serial correlation LM test, Jacque-Bera-normality test and white heteroskedasticity test reveal that the model has no signs of misspecification and that, the residuals are serially uncorrelated, normally distributed and homoskedastic. Generally, the empirical results show that the domestic private investment plays an important role in economic growth in Tanzania. FDI also tends to affect growth positively, while control variables such as high population growth and inflation appear to harm economic growth. Results also reveal that control variables such as trade openness and life expectancy improvement tend to increase real GDP growth. Moreover, a revealed negative, albeit weak, association between public and private investment suggests that the positive effect of domestic private investment on economic growth reduces when public investment-to-GDP ratio exceeds 8-10 percent. Thus, there is a great need for promoting domestic saving so as to encourage domestic investment for economic growth.

Keywords: FDI, public investment, domestic private investment, crowding out effect, economic growth

Procedia PDF Downloads 272
2011 The Roles of the Provincial Government and Non-Government Organizations toward the Business Resources Management in Ranong Province

Authors: Poramet Saeng-On

Abstract:

The purpose of this study was to investigate the roles of provincial governments and private sectors in managing business resources of Ranong province, Thailand. The sample group of this study included 15 organizations and the tool of the research included interview questions, recording tape, and notes. This study employed a qualitative technique by utilizing in-depth interview and document research techniques. The findings revealed that government and private organizations did not have any direct roles in managing business resources of Ranong Province and did not have any knowledge of the plan to manage business resources. However, all agreed that there should be a plan to manage business resources effectively and efficiently. Moreover, both private and government organizations also agree to cooperate to manage business resources to benefits all stakeholders.

Keywords: business resources, provincial government, roles, non-government organizations

Procedia PDF Downloads 448
2010 Verifiable Secure Computation of Large Scale Two-Point Boundary Value Problems Using Certificate Validation

Authors: Yogita M. Ahire, Nedal M. Mohammed, Ahmed A. Hamoud

Abstract:

Scientific computation outsourcing is gaining popularity because it allows customers with limited computing resources and storage devices to outsource complex computation workloads to more powerful service providers. However, it raises some security and privacy concerns and challenges, such as customer input and output privacy, as well as cloud cheating behaviors. This study was motivated by these concerns and focused on privacy-preserving Two-Point Boundary Value Problems (BVP) as a common and realistic instance for verifiable safe multiparty computing. We'll look at the safe and verifiable schema with correctness guarantees by utilizing standard multiparty approaches to compute the result of a computation and then solely using verifiable ways to check that the result was right.

Keywords: verifiable computing, cloud computing, secure and privacy BVP, secure computation outsourcing

Procedia PDF Downloads 83
2009 Patterns of Private Transfers in the Philippines: An Analysis of Who Gives and Receives More

Authors: Rutcher M. Lacaza, Stephen Jun V. Villejo

Abstract:

This paper investigated the patterns of private transfers in the Philippines using the Family Income Expenditure Survey (FIES) 2009, conducted by the Philippine government’s National Statistics Office (NSO) every three years. The paper performed bivariate analysis on net transfers, using the identified determinants for a household to be either a net receiver or a net giver. The household characteristics considered are the following: age, sex, marital status, employment status and educational attainment of the household head, and also size, location, pre-transfer income and the number of employed members of the household. The variables net receiver and net giver are determined by computing the net transfer, subtracting total gifts from total receipts. The receipts are defined as the sum of cash received from abroad, cash received from domestic sources, total gifts received and inheritance. While gifts are defined as the sum of contributions and donations to church and other religious institutions, contributions and donations to other institutions, gifts and contributions to others, and gifts and assistance to private individuals outside the family. Both in kind and in cash transfers are considered in the analysis. It also performed a multiple regression analysis on transfers received and income including other household characteristics to examine the motives for giving transfers – whether altruism or exchanged. It also used the binary logistic regression to estimate the probability of being a net receiver or net giver given the household characteristics. The study revealed that receiving tends to be universal – both the non-poor and the poor benefit although the poor receive substantially less than the non-poor. Regardless of whether households are net receivers or net givers, households in the upper deciles generally give and receive more than those in the lower deciles. It also appears that private transfers may just flow within economic groups. Big amounts of transfers are, therefore, directed to the non-poor and the small amounts go to the poor. This was also supported by the increasing function of gross transfers received and the income of households – the poor receiving less and the non-poor receiving more. This is contrary to the theory that private transfers can help equalize the distribution of income. This suggested that private transfers in the Philippines are not altruistically motivated but exchanged. However, bilateral data on transfers received or given is needed to test this theory directly. The results showed that transfers are much needed by the poor and it is important to understand the nature of private transfers, to ensure that government transfer programs are properly designed and targeted so as to prevent the duplication of private safety nets already present among the non-poor.

Keywords: private transfers, net receiver, net giver, altruism, exchanged.

Procedia PDF Downloads 204
2008 Evaluating Effect of Business Process Reengineering Performance of Private Banks

Authors: Elham Fakhrpoor, Daryush Mohammadi Zanjirani, Maziyar Nojaba

Abstract:

Business process reengineering is one of the most important strategies in banks in recent years that not only it increases customers’ satisfaction, but also it increases performance of banks. The purpose of elementary (initial) business process reengineering is reinforcing banks abilities to obtain new customers and making long-term relationships with existed customers and increasing customers’ satisfaction among service quality in global level. Banks specially the private ones are the main streams of state, because cash flow is necessary to survive a state. What guarantees survival and permanency of financial institutes’ activities is providing favorite, certain, and proper services. Capital market being small and state financial system being bank-oriented needs optimum usage from banks. According to this fact and role and importance of developing banking system, the present study tried to offer a constructed model using Lisrel and also spss software to evaluate effects of business process reengineering on performance of private banks. We have one min hypothesis and four sub-hypotheses. The main hypothesis says reengineering factors have positive effects on bank performances (balanced- scores card aspects). These hypotheses were tested by structural equations modeling.

Keywords: effect, business, reengineering, private bank

Procedia PDF Downloads 268
2007 Develop a Conceptual Data Model of Geotechnical Risk Assessment in Underground Coal Mining Using a Cloud-Based Machine Learning Platform

Authors: Reza Mohammadzadeh

Abstract:

The major challenges in geotechnical engineering in underground spaces arise from uncertainties and different probabilities. The collection, collation, and collaboration of existing data to incorporate them in analysis and design for given prospect evaluation would be a reliable, practical problem solving method under uncertainty. Machine learning (ML) is a subfield of artificial intelligence in statistical science which applies different techniques (e.g., Regression, neural networks, support vector machines, decision trees, random forests, genetic programming, etc.) on data to automatically learn and improve from them without being explicitly programmed and make decisions and predictions. In this paper, a conceptual database schema of geotechnical risks in underground coal mining based on a cloud system architecture has been designed. A new approach of risk assessment using a three-dimensional risk matrix supported by the level of knowledge (LoK) has been proposed in this model. Subsequently, the model workflow methodology stages have been described. In order to train data and LoK models deployment, an ML platform has been implemented. IBM Watson Studio, as a leading data science tool and data-driven cloud integration ML platform, is employed in this study. As a Use case, a data set of geotechnical hazards and risk assessment in underground coal mining were prepared to demonstrate the performance of the model, and accordingly, the results have been outlined.

Keywords: data model, geotechnical risks, machine learning, underground coal mining

Procedia PDF Downloads 258
2006 A Study on Websites of Public and Private Hospitals in Konya

Authors: H. Nur Görkemli, Mehmet Fidan

Abstract:

After the first acquaintance with internet in April 1993, number of internet users increased rapidly in Turkey. According to Turkish Statistical Institute’s 2013 data, internet usage in Turkey between 16-74 age group is 48,9%. Hospitals are one of the areas where internet is being intensively used like many other businesses. As a part of public relations application, websites are important tools for hospitals to reach a wide range of target audience within and outside the organization. With their websites, hospitals have opportunities to give information about their organization, strengthen their image, compete with their rivals, interact with shareholders, reflect their transparency and meet with new audiences. This study examines web sites of totally 31 hospitals which are located in Konya. Institutions are categorized as public and private hospitals and then three main research categories are determined: content, visual and technical. Main and sub categories are examined by using content analysis method. Results are interpreted in terms of public and private institutions.

Keywords: websites, hospital, health communication, internet, webpages

Procedia PDF Downloads 363
2005 Performance Analysis with the Combination of Visualization and Classification Technique for Medical Chatbot

Authors: Shajida M., Sakthiyadharshini N. P., Kamalesh S., Aswitha B.

Abstract:

Natural Language Processing (NLP) continues to play a strategic part in complaint discovery and medicine discovery during the current epidemic. This abstract provides an overview of performance analysis with a combination of visualization and classification techniques of NLP for a medical chatbot. Sentiment analysis is an important aspect of NLP that is used to determine the emotional tone behind a piece of text. This technique has been applied to various domains, including medical chatbots. In this, we have compared the combination of the decision tree with heatmap and Naïve Bayes with Word Cloud. The performance of the chatbot was evaluated using accuracy, and the results indicate that the combination of visualization and classification techniques significantly improves the chatbot's performance.

Keywords: sentimental analysis, NLP, medical chatbot, decision tree, heatmap, naïve bayes, word cloud

Procedia PDF Downloads 60
2004 Density-based Denoising of Point Cloud

Authors: Faisal Zaman, Ya Ping Wong, Boon Yian Ng

Abstract:

Point cloud source data for surface reconstruction is usually contaminated with noise and outliers. To overcome this, we present a novel approach using modified kernel density estimation (KDE) technique with bilateral filtering to remove noisy points and outliers. First we present a method for estimating optimal bandwidth of multivariate KDE using particle swarm optimization technique which ensures the robust performance of density estimation. Then we use mean-shift algorithm to find the local maxima of the density estimation which gives the centroid of the clusters. Then we compute the distance of a certain point from the centroid. Points belong to outliers then removed by automatic thresholding scheme which yields an accurate and economical point surface. The experimental results show that our approach comparably robust and efficient.

Keywords: point preprocessing, outlier removal, surface reconstruction, kernel density estimation

Procedia PDF Downloads 334
2003 The Types of Collaboration Models Driven by Public Art Establishment–Case Study of Taichung City

Authors: Cheng-Lung Yu, Ying-His Liao

Abstract:

Some evidence show that public art accelerates local economic growth. Even local governments award the collaboration of public-private partnership to sustain the creation of public art for urban economic development. Through the public-private partnership of public art establishment it is obvious that public construction projects have been led by the governmental policy yet the private developers have played crucial roles to drive the innovative business models such as tourism investment, real estate value up and community participation. This study shows that the types of collaboration have been driven by Taichung city governmental policy from the regulation of public art establishment in the past three years. Through some cases empirical analyzes the authors discover the trends concerning the public art development to support local economic growth in Taiwan.

Keywords: public art, public art establishment regulation, construction management, urban governance

Procedia PDF Downloads 12
2002 Investigation of Effects of Geomagnetic Storms Produced by Different Solar Sources on the Total Electron Content (TEC)

Authors: P. K. Purohit, Azad A. Mansoori, Parvaiz A. Khan, Purushottam Bhawre, Sharad C. Tripathi, A. M. Aslam, Malik A. Waheed, Shivangi Bhardwaj, A. K. Gwal

Abstract:

The geomagnetic storm represents the most outstanding example of solar wind-magnetospheric interaction, which causes global disturbances in the geomagnetic field as well as the trigger ionospheric disturbances. We study the behaviour of ionospheric Total Electron Content (TEC) during the geomagnetic storms. For the present investigation we have selected 47 intense geomagnetic storms (Dst ≤ -100nT) that were observed during the solar cycle 23 i.e. during 1998-2006. We then categorized these storms into four categories depending upon their solar sources like Magnetic Cloud (MC), Co-rotating Interaction Region (CIR), SH+ICME and SH+MC. We then studied the behaviour of ionospheric TEC at a mid latitude station Usuda (36.13N, 138.36E), Japan during these storm events produced by four different solar sources. During our study we found that the smooth variations in TEC are replaced by rapid fluctuations and the value of TEC is strongly enhanced during the time of these storms belonging to all the four categories. However, the greatest enhancements in TEC are produced during those geomagnetic storms which are either caused by sheath driven magnetic cloud (SH+MC) or sheath driven ICME (SH+ICME). We also derived the correlation between the TEC enhancements produced during storms of each category with the minimum Dst. We found the strongest correlation exists for the SH+ICME category followed by SH+MC, MC and finally CIR. Since the most intense storms were either caused by SH+ICME or SH+MC while the least intense storms were caused by CIR, consequently the correlation was the strongest with SH+ICME and SH+MC and least with CIR.

Keywords: GPS, TEC, geomagnetic storm, sheath driven magnetic cloud

Procedia PDF Downloads 531
2001 Heat Transfer and Trajectory Models for a Cloud of Spray over a Marine Vessel

Authors: S. R. Dehghani, G. F. Naterer, Y. S. Muzychka

Abstract:

Wave-impact sea spray creates many droplets which form a spray cloud traveling over marine objects same as marine vessels and offshore structures. In cold climates such as Arctic reigns, sea spray icing, which is ice accretion on cold substrates, is strongly dependent on the wave-impact sea spray. The rate of cooling of droplets affects the process of icing that can yield to dry or wet ice accretion. Trajectories of droplets determine the potential places for ice accretion. Combining two models of trajectories and heat transfer for droplets can predict the risk of ice accretion reasonably. The majority of the cooling of droplets is because of droplet evaporations. In this study, a combined model using trajectory and heat transfer evaluate the situation of a cloud of spray from the generation to impingement. The model uses some known geometry and initial information from the previous case studies. The 3D model is solved numerically using a standard numerical scheme. Droplets are generated in various size ranges from 7 mm to 0.07 mm which is a suggested range for sea spray icing. The initial temperature of droplets is considered to be the sea water temperature. Wind velocities are assumed same as that of the field observations. Evaluations are conducted using some important heading angles and wind velocities. The characteristic of size-velocity dependence is used to establish a relation between initial sizes and velocities of droplets. Time intervals are chosen properly to maintain a stable and fast numerical solution. A statistical process is conducted to evaluate the probability of expected occurrences. The medium size droplets can reach the highest heights. Very small and very large droplets are limited to lower heights. Results show that higher initial velocities create the most expanded cloud of spray. Wind velocities affect the extent of the spray cloud. The rate of droplet cooling at the start of spray formation is higher than the rest of the process. This is because of higher relative velocities and also higher temperature differences. The amount of water delivery and overall temperature for some sample surfaces over a marine vessel are calculated. Comparing results and some field observations show that the model works accurately. This model is suggested as a primary model for ice accretion on marine vessels.

Keywords: evaporation, sea spray, marine icing, numerical solution, trajectory

Procedia PDF Downloads 211
2000 Double Encrypted Data Communication Using Cryptography and Steganography

Authors: Adine Barett, Jermel Watson, Anteneh Girma, Kacem Thabet

Abstract:

In information security, secure communication of data across networks has always been a problem at the forefront. Transfer of information across networks is susceptible to being exploited by attackers engaging in malicious activity. In this paper, we leverage steganography and cryptography to create a layered security solution to protect the information being transmitted. The first layer of security leverages crypto- graphic techniques to scramble the information so that it cannot be deciphered even if the steganography-based layer is compromised. The second layer of security relies on steganography to disguise the encrypted in- formation so that it cannot be seen. We consider three cryptographic cipher methods in the cryptography layer, namely, Playfair cipher, Blowfish cipher, and Hills cipher. Then, the encrypted message is passed through the least significant bit (LSB) to the steganography algorithm for further encryption. Both encryption approaches are combined efficiently to help secure information in transit over a network. This multi-layered encryption is a solution that will benefit cloud platforms, social media platforms and networks that regularly transfer private information such as banks and insurance companies.

Keywords: cryptography, steganography, layered security, Cipher, encryption

Procedia PDF Downloads 67
1999 Efficacy of Deep Learning for Below-Canopy Reconstruction of Satellite and Aerial Sensing Point Clouds through Fractal Tree Symmetry

Authors: Dhanuj M. Gandikota

Abstract:

Sensor-derived three-dimensional (3D) point clouds of trees are invaluable in remote sensing analysis for the accurate measurement of key structural metrics, bio-inventory values, spatial planning/visualization, and ecological modeling. Machine learning (ML) holds the potential in addressing the restrictive tradeoffs in cost, spatial coverage, resolution, and information gain that exist in current point cloud sensing methods. Terrestrial laser scanning (TLS) remains the highest fidelity source of both canopy and below-canopy structural features, but usage is limited in both coverage and cost, requiring manual deployment to map out large, forested areas. While aerial laser scanning (ALS) remains a reliable avenue of LIDAR active remote sensing, ALS is also cost-restrictive in deployment methods. Space-borne photogrammetry from high-resolution satellite constellations is an avenue of passive remote sensing with promising viability in research for the accurate construction of vegetation 3-D point clouds. It provides both the lowest comparative cost and the largest spatial coverage across remote sensing methods. However, both space-borne photogrammetry and ALS demonstrate technical limitations in the capture of valuable below-canopy point cloud data. Looking to minimize these tradeoffs, we explored a class of powerful ML algorithms called Deep Learning (DL) that show promise in recent research on 3-D point cloud reconstruction and interpolation. Our research details the efficacy of applying these DL techniques to reconstruct accurate below-canopy point clouds from space-borne and aerial remote sensing through learned patterns of tree species fractal symmetry properties and the supplementation of locally sourced bio-inventory metrics. From our dataset, consisting of tree point clouds obtained from TLS, we deconstructed the point clouds of each tree into those that would be obtained through ALS and satellite photogrammetry of varying resolutions. We fed this ALS/satellite point cloud dataset, along with the simulated local bio-inventory metrics, into the DL point cloud reconstruction architectures to generate the full 3-D tree point clouds (the truth values are denoted by the full TLS tree point clouds containing the below-canopy information). Point cloud reconstruction accuracy was validated both through the measurement of error from the original TLS point clouds as well as the error of extraction of key structural metrics, such as crown base height, diameter above root crown, and leaf/wood volume. The results of this research additionally demonstrate the supplemental performance gain of using minimum locally sourced bio-inventory metric information as an input in ML systems to reach specified accuracy thresholds of tree point cloud reconstruction. This research provides insight into methods for the rapid, cost-effective, and accurate construction of below-canopy tree 3-D point clouds, as well as the supported potential of ML and DL to learn complex, unmodeled patterns of fractal tree growth symmetry.

Keywords: deep learning, machine learning, satellite, photogrammetry, aerial laser scanning, terrestrial laser scanning, point cloud, fractal symmetry

Procedia PDF Downloads 88
1998 Teachers' and Learners' ICT-Readiness Assessment for Agricultural Science Instruction in Secondary Schools in Ogun State, Nigeria

Authors: A. Olusegun Egunjobi, Samson Sunday Adekunte

Abstract:

This study investigated the teachers’ and learners’ ICT-readiness assessment for agricultural science instruction in secondary schools in Ogun State, Nigeria. However, the sample population of 6 and 120 agricultural science teachers and learners were randomly selected respectively from 3 public and 3 private senior secondary schools in Ado-Odo/Ota Local Government Area of Ogun State, Nigeria. Descriptive survey design of ex post-facto type was adopted for the study. Two structured questionnaires tagged Teachers’ and Learners’ Questionnaires on ICT-Readiness for Agricultural Science Instruction TQICTRASI and LQICTRASI respectively were used for data collection. The two questionnaires were subjected to Cronbach alpha coefficient with the results 0.86 and 0.82 respectively. Five research hypotheses were tested at 0.05 level of significance. Findings revealed that teachers in private senior secondary school (SSS) were more ready and prepared than their counterparts in public SSS with the result t-value = 4.25 greater than t-critical = 2.77, df = 4 at p<0.05. Also, learners in private SSS were more prepared and ready for the utilisation of ICT-facilities for agricultural science instruction with the result t-value = 3.51 greater than t-critical = 1.98, df = 118 at p<0.05. However, male and female learners in both private and public SSS were equally prepared and ready for the ICT-facilities utilisation for agricultural science instruction, thus, there were no significant differences in their ICT-readiness. Therefore, the study proffered that, both male and female teachers and learners should be more ICT-compliant and always ready to upgrade their skills and knowledge in ICT-facilities, utilisation for agricultural science instruction and even for other school subjects particularly in Ogun State and in generally in Nigeria.

Keywords: ICT-readiness, teachers’ and learners’ assessment, private and public senior secondary schools, agricultural science instruction

Procedia PDF Downloads 356
1997 Perspectives of Saudi Students on Reasons for Seeking Private Tutors in English

Authors: Ghazi Alotaibi

Abstract:

The current study examined and described the views of secondary school students and their parents on their reasons for seeking private tutors in English. These views were obtained through two group interviews with the students and parents separately. Several causes were brought up during the two interviews. These causes included difficulty of the English language, weak teacher performance, the need to pass exams with high marks, lack of parents’ follow-up of student school performance, social pressure, variability in student comprehension levels at school, weak English foundation in previous school years, repeated student absence from school, large classes, as well as English teachers’ heavy teaching loads. The study started with a description of the EFL educational system in Saudi Arabia and concluded with recommendations for the improvement of the school learning environment.

Keywords: english, learning difficulty, private tutoring, Saudi, teaching practices, learning environment

Procedia PDF Downloads 441
1996 Meta Root ID Passwordless Authentication Using ZKP Bitcoin Protocol

Authors: Saransh Sharma, Atharv Dekhne

Abstract:

Passwords stored on central services and hashed are prone to cyberattacks and hacks. Hence, given all these nuisances, there’s a need to eliminate character-based authentication protocols, which would ultimately benefit all developers as well as end-users.To replace this conventional but antiquated protocol with a secure alternative would be Passwordless Authentication. The meta root.id system creates a public and private key, of which the user is only able to access the private key. Further, after signing the key, the user sends the information over the API to the server, which checks its validity with the public key and grants access accordingly.

Keywords: passwordless, OAuth, bitcoin, ZKP, SIN, BIP

Procedia PDF Downloads 82
1995 Use of Triclosan-Coated Sutures Led to Cost Saving in Public and Private Setting in India across Five Surgical Categories: An Economical Model Assessment

Authors: Anish Desai, Reshmi Pillai, Nilesh Mahajan, Hitesh Chopra, Vishal Mahajan, Ajay Grover, Ashish Kohli

Abstract:

Surgical Site Infection (SSI) is hospital acquired infection of growing concern. This study presents the efficacy and cost-effectiveness of triclosan-coated suture, in reducing the burden of SSI in India. Methodology: A systematic literature search was conducted for economic burden (1998-2018) of SSI and efficacy of triclosan-coated sutures (TCS) vs. non-coated sutures (NCS) (2000-2018). PubMed Medline and EMBASE indexed articles were searched using Mesh terms or Emtree. Decision tree analysis was used to calculate, the cost difference between TCS and NCS at private and public hospitals, respectively for 7 surgical procedures. Results: The SSI range from low to high for Caesarean section (C-section), Laparoscopic hysterectomy (L-hysterectomy), Open Hernia (O-Hernia), Laparoscopic Cholecystectomy (L-Cholecystectomy), Coronary artery bypass graft (CABG), Total knee replacement (TKR), and Mastectomy were (3.77 to 24.2%), (2.28 to 11.7%), (1.75 to 60%), (1.71 to 25.58%), (1.6 to 18.86%), (1.74 to 12.5%), and (5.56 to 25%), respectively. The incremental cost (%) of TCS ranged 0.1%-0.01% in private and from 0.9%-0.09% at public hospitals across all surgical procedures. Cost savings at median efficacy & SSI risk was 6.52%, 5.07 %, 11.39%, 9.63%, 3.62%, 2.71%, 9.41% for C-section, L-hysterectomy, O-Hernia, L-Cholecystectomy, CABG, TKR, and Mastectomy in private and 8.79%, 4.99%, 12.67%, 10.58%, 3.32%, 2.35%, 11.83% in public hospital, respectively. Efficacy of TCS and SSI incidence in a particular surgical procedure were important determinants of cost savings using one-way sensitivity analysis. Conclusion: TCS suture led to cost savings across all 7 surgeries in both private and public hospitals in India.

Keywords: cost Savings, non-coated sutures, surgical site infection, triclosan-coated sutures

Procedia PDF Downloads 383
1994 Hypothesis about the Origin of the Lighting

Authors: Igor Kuzminov

Abstract:

Till now, the nature of lightning is not established. A hypothesis of the origin of lightning is proposed. The lightning charge is formed by electromagnetic induction. The role of the conductor is performed by the air mass of the cloud. This conductor moves in the Earth's magnetic field. The upper and lower edges of the cloud are the plates of the capacitor. Lightning is a special case of electromagnetic processes in an atmosphere. The category of lightning occurs in the process of accumulation of a charge. The process of accumulation goes constantly, but the charge is not fixed. Naturally, the hypothesis demands the carrying out of additional experiments and official acknowledgement. As the proof of a hypothesis can serve that the maximal lighting activity in an equatorial zone where cosφ it is close to 1. An experiment conducted privately showed that there is a potential difference in the atmosphere at different levels. The probability of applied value development of power installation is great.

Keywords: electromagnetic induction, Earth's magnetic field, plates of the capacitors, charge accumulation

Procedia PDF Downloads 76
1993 Musical Diversity: The Differences between Public and Private Kindergartens in China

Authors: Kunyu Yan

Abstract:

Early childhood music education plays a significant role in an individual’s growth. Music can help children understand themselves and relate to others, and make connections between family, school, and society. In recent years, with the development of early childhood education in China, an increasing number of kindergartens have been established, and many of them pay more attention to music education. This research has two main aims. One is to discover how and why music is used in both public and private kindergartens. The second aim is to make recommendations for widening the use of music in kindergartens. In order to achieve these aims, the research uses two main methods. Firstly, it considers the historical background and cultural context of early childhood education in China; and secondly, it uses an approach that compares public and private kindergartens. In this research, six kindergartens were chosen from Qingdao city in Shandong Province as case studies, including 3 public kindergartens and 3 private kindergartens. This research was based on using three types of data collection methods: observation, semi-structured interviews with teachers, and questionnaires with parents. Participant and non-participant observational methods were used and included in daily routines at the kindergartens in order to experience the situation of music education first-hand. Interviews were associated with teachers’ views of teaching and learning music, the perceptions of the music context, and their strategies of using music. Lastly, the questionnaire was designed to obtain the views of current music education from the children’s parents in the respective kindergartens. The results are shown with three main themes: (1) distinct characteristics of public kindergartens (e.g., similar equipment, low tuition fee, qualified teachers, etc); (2) distinct characteristics of private kindergartens (e.g., various tuition fees, own teaching system, trained teachers, etc); and (3) differences between public and private kindergartens (e.g., funding, requirements for teachers, parents’ demands, etc). According to the results, we can see that the main purpose of using music in China is to develop the musical ability of children, and teachers focus on musical learning, such as singing in tune and playing instruments. However, as revealed in this research, there are many other uses and functions of music in these educational settings, including music used for non-musical learning (e.g., counting, learning language, etc.) or in supporting social routines.

Keywords: differences between private and public school, early childhood education, music education, uses and functions of music

Procedia PDF Downloads 209
1992 A Knowledge-As-A-Service Support Framework for Ambient Learning in Kenya

Authors: Lucy W. Mburu, Richard Karanja, Simon N. Mwendia

Abstract:

Over recent years, learners have experienced a constant need to access on demand knowledge that is fully aligned with the paradigm of cloud computing. As motivated by the global sustainable development goal to ensure inclusive and equitable learning opportunities, this research has developed a framework hinged on the knowledge-as-a-service architecture that utilizes knowledge from ambient learning systems. Through statistical analysis and decision tree modeling, the study discovers influential variables for ambient learning among university students. The main aim is to generate a platform for disseminating and exploiting the available knowledge to aid the learning process and, thus, to improve educational support on the ambient learning system. The research further explores how collaborative effort can be used to form a knowledge network that allows access to heterogeneous sources of knowledge, which benefits knowledge consumers, such as the developers of ambient learning systems.

Keywords: actionable knowledge, ambient learning, cloud computing, decision trees, knowledge as a service

Procedia PDF Downloads 144
1991 Non-Singular Gravitational Collapse of a Dust Cloud in Einstein-Cartan Theory

Authors: Amir Hadi Ziaie, Mostafa Hashemi, Shahram Jalalzadeh

Abstract:

It is now known that the end state of the collapse process of a dense star under its own gravity is the formation of a spacetime singularity. This is the spacetime event where the energy density and spacetime curvature diverge, and the classical general relativity breaks down. As we know, a realistic star is composed of fermions so that their spin effects could alter the final fate of the collapse scenario. The underlying theory within which the inclusion of spin effects can be worked out is the Einstein-Cartan theory. In this theory, the spacetime torsion which is defined as a geometrical quantity, is related to an intrinsic angular momentum of fermions (spin). In this work, we study the collapse process of a homogeneous spin fluid in such a framework and show that taking into account the spin effects of the collapsing cloud could prevent the formation of spacetime singularity.

Keywords: gravitational collapse, einstein-cartan theory, spacetime singularity, black hole physics

Procedia PDF Downloads 386
1990 Realizing the National Disaster Management Policy of Sri Lanka through Public Private Partnerships

Authors: K. W. A. M. Kokila, Matsui Kenichi

Abstract:

Sri Lanka’s disaster management policy aims to protect lives and developments in disaster affected areas by effectively using resources for disaster risk reduction, emergency management, and community awareness. However, funding for these action programs has posed a serious challenge to the country’s economy. This paper examines the extent to which private-public partnerships (PPPs) can facilitate and expedite disaster management works. In particular, it discusses the results of the questionnaire survey among policymakers, government administrators, NGOs, and private businesses. This questionnaire was conducted in 2017. All respondents were selected based on their experience in PPP projects in the past. The survey focused on clarifying the effectiveness of past PPP projects as well as their efficiency and transparency. The respondents also provided their own opinions and suggestions to improve the future PPP projects in Sri Lanka. The questionnaire was distributed to fifteen persons. The results show that almost all respondents think that PPP projects are beneficial and important for future disaster risk management in Sri Lanka. The respondents, however, showed some reservation about effectiveness and transparency of the PPP process. This paper also discusses the results on the respondents’ perceptions about their capacity regarding human resources and management. This paper, overall, sheds light on technological, financial and human resource management practices in developed countries as well as policy and legislation provisions regarding PPP projects.

Keywords: disaster management, policy, private public partnership, projects

Procedia PDF Downloads 147
1989 Assessment of Knowledge, Attitude, and Practice of Health Care Professionals and Factors Associated with Adverse Drug Reaction Reporting in Public and Private Hospitals of Islamabad

Authors: Zaka Nisa, Farooq Sher

Abstract:

Adverse drug reactions (ADRs) underreporting is a great challenge to Pharmacovigilance. Health care professionals have to consider ADR reporting as their professional obligation, an effective system of ADR reporting is important to improve patient health care and safety. The present study is designed to assess the knowledge, attitude, practice and factors associated with ADR reporting by health care professionals (physicians and pharmacists) in public and private hospitals of Pakistan. A pretested questionnaire was administered to 384 physicians and pharmacists in public and private hospitals. Respondents were evaluated for their knowledge, attitude, and practice related to ADR reporting. The data was analyzed using the SPSS statistical software, the factors which encourage and discourage respondents in reporting ADRs were determined. Most of the respondents have shown a positive attitude towards ADR reporting. The response rate was 95.32%. Of the 367 questionnaires, including 333 (86.5%) physicians and 34 (8.8%) pharmacists with the mean age 28.34 (SD= 6.69), most of the respondents showed poor ADR reporting knowledge (83.1%). The majority of respondents (78.2%) showed positive attitude towards ADR reporting and only (12.3%) hospitals have good ADR reporting practice. Knowledge of respondents in public hospitals (8.6%) was less as compare to those in the private hospitals (29.7%) (P < 0.001). Attitude of respondents in private hospitals was more positive (92.4%) than those in public hospitals (68.8%) (P < 0.001). No significant difference was observed in practicing of ADR reporting in public (11.8%) and private hospitals (13.1%) (P value 0.89). Seriousness of ADR, unusualness of reaction, new drug involvement and confidence in diagnosis of ADR were the factors which encourage respondents to report ADR, however, lack of knowledge regarding where and how to report ADR, lack of access to ADR reporting form, managing patients was more important than reporting ADR, legal liability issues were the factors which discourage respondents to report ADR. The study reveals poor knowledge and practice regarding ADR reporting. However positive attitude was seen regarding ADR reporting. There is a need of educational training for health care professionals as well as genuine and continuous efforts are required by Government and health authorities to ensure the proper implementation of ADR reporting system in all of the hospitals.

Keywords: adverse drugs reactions (ADR), pharmacovigilance, spontaneous ADR reporting, knowledge of ADR, attitude of health care profesionals, practice of ADR reporting

Procedia PDF Downloads 243
1988 Correlates of Modes of Transportation to Work among Working Adults in Ernakulam District, Kerala

Authors: Anjaly Joseph, Elezebeth Mathews

Abstract:

Transportation and urban planning is the least recognised area for physical activity promotion in India, unlike developed regions. Identifying the preferred transportation modalities and factors associated with it is essential to address these lacunae. The objective of the study was to assess the prevalence of modes of transportation to work, and its correlates among working adults in Ernakulam District, Kerala. A cross sectional study was conducted among 350 working individuals in the age group of 18-60 years, selected through multi-staged stratified random sampling in Ernakulam district of Kerala. The inclusion criteria were working individuals 18-60 years, workplace at a distance of more than 1 km from the home and who worked five or more days a week. Pregnant women/women on maternity leave and drivers (taxi drivers, autorickshaw drivers, and lorry drivers) were excluded. An interview schedule was used to capture the modes of transportation namely, public, private and active transportation, socio demographic details, travel behaviour, anthropometric measurements and health status. Nearly two-thirds (64 percent) of them used private transportation to work, while active commuters were only 6.6 percent. The correlates identified for active commuting compared to other modes were low socio-economic status (OR=0.22, CI=0.5-0.85) and presence of a driving license (OR=4.95, CI= 1.59-15.45). The correlates identified for public transportation compared to private transportation were female gender (OR= 17.79, CI= 6.26-50.31), low income (OR=0.33, CI= 0.11-0.93), being unmarried (OR=5.19, CI=1.46-8.37), presence of no or only one private vehicle in the house (OR=4.23, CI=1.24-20.54) and presence of convenient public transportation facility to workplace (OR=3.97, CI= 1.66-9.47). The association between body mass index (BMI) and public transportation were explored and found that public transport users had lesser BMI than private commuters (OR=2.30, CI=1.23-4.29). Policies that encourage active and public transportation needs to be introduced such as discouraging private vehicle through taxes, introduction of convenient and safe public transportation facility, walking/cycling paths, and paid parking facility.

Keywords: active transportation, correlates, India, public transportation, transportation modes

Procedia PDF Downloads 155
1987 Public and Private Domains: Contradictions and Covenants in Evolution of Game Policy

Authors: Mingzhu Lyu, Runlei Ren, Xinyu Dai, Jiaxuan Pi, Kanghua Li

Abstract:

The study of video game policy in China has been divided into two branches: "pedagogy" and "game industry". The binary perspective of policy reveals the "contradictory" side of policy performance. Based on this suspicion, this paper constructs a three-dimensional sequence of time, content and institutions of game policy, and establishes the "contradictory" aspects of policy performance between 1949 and 2019. A central-level database of game policies, clarifying that our game policies follow a shift from reactive response to proactive guidance, stigmatization and de-stigmatization, the evolutionary logic. The study found that the central government has always maintained a strict requirement and prudent guidance for game policy, and the deep contradictions in game policy stem from the essential conflict between the natural amusement of games and the seriousness of the educational system, and the Chinese government's use of the understanding of the public and private domains and the Managing of the conflict.

Keywords: game industry, gaming policy, public domain, private domain

Procedia PDF Downloads 132
1986 Trust Management for an Authentication System in Ubiquitous Computing

Authors: Malika Yaici, Anis Oussayah, Mohamed Ahmed Takerrabet

Abstract:

Security of context-aware ubiquitous systems is paramount, and authentication plays an important aspect in cloud computing and ubiquitous computing. Trust management has been identified as vital component for establishing and maintaining successful relational exchanges between trading partners in cloud and ubiquitous systems. Establishing trust is the way to build good relationship with both client and provider which positive activates will increase trust level, otherwise destroy trust immediately. We propose a new context-aware authentication system using a trust management system between client and server, and between servers, a trust which induces partnership, thus to a close cooperation between these servers. We defined the rules (algorithms), as well as the formulas to manage and calculate the trusting degrees depending on context, in order to uniquely authenticate a user, thus a single sign-on, and to provide him better services.

Keywords: ubiquitous computing, authentication, context-awareness, trust management

Procedia PDF Downloads 231
1985 The Victim as a Public Actor: Understanding the Victim’s Role as an Agent of Accountability

Authors: Marie Manikis

Abstract:

This paper argues that the scholarship to date on victims in the criminal process has mainly adopted a private conception of victims –as bearers of individual interests, rights, and remedies– rather than a conception of the victim as an actor with public functions and interests, who has historically and continuously taken on an active role in the common law tradition. This conception enables a greater understanding of the various developments around victim participation in common law criminal justice systems and provides a useful analytical tool to understand the different roles of victims in England and Wales and the United States. Indeed, the main focus on individual rights and the conception of the victim as a private entity undermines the distinctive and increasing role victims play in the wider criminal justice process as agents of accountability through administrative-based processes within and outside courts, including private prosecutions, internal review processes within prosecutorial agencies, judicial review, and ombudsmen processes.

Keywords: victims, participation, criminal justice, accountability

Procedia PDF Downloads 116
1984 Using A Blockchain-Based, End-to-End Encrypted Communication System Between Mobile Terminals to Improve Organizational Privacy

Authors: Andrei Bogdan Stanescu, Robert Stana

Abstract:

Creating private and secure communication channels between employees has become a critical aspect in order to ensure organizational integrity and avoid leaks of sensitive information. With the widespread use of modern methods of disrupting communication between users, real use-cases of advanced encryption mechanisms have emerged to avoid cyber-attackers that are willing to intercept private conversations between critical employees in an organization. This paper aims to present a custom implementation of a messaging application named “Whisper” that uses end-to-end encryption (E2EE) mechanisms and blockchain-related components to protect sensitive conversations and mitigate the risks of information breaches inside organizations. The results of this research paper aim to expand the areas of applicability of E2EE algorithms and integrations with private blockchains in chat applications as a viable method of enhancing intra-organizational communication privacy.

Keywords: end-to-end encryption, mobile communication, cryptography, communication security, data privacy

Procedia PDF Downloads 72