Search results for: telecommunication providers
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 881

Search results for: telecommunication providers

461 “Human Trafficking In Your Backyard: Know The Signs And How To Help”

Authors: Jessie Fazel, Kristen Smith

Abstract:

Human trafficking is a multi-billion-dollar criminal industry that affects 24.9 million people around the world. There are several different types of trafficking, the most common being sex trafficking, labor trafficking, and domestic servitude. Survival sex is common in the pediatric population, as they engage in sex for food, a place to sleep, or other basic needs. Statistics show that health care workers are at a unique advantage to help identify victims and get them the help they need, as 88% of trafficked victims encounter a health care worker while being trafficked. Unfortunately, victims don’t usually self-identify that they are being trafficked and the situations they face can vary dramatically. It is imperative to remember that traditional red flags are not always present in the pediatric population. Risk factors and red flags with their history and physical exam are one of the best indicators that health care providers need to be vigilant in looking at. There are numerous barriers for disclosure in the healthcare setting. Periods of time before and after disclosure are often emotionally difficult and could be dangerous for the victim. It is extremely important to have a plan in place for intervention if the victim does disclose trafficking. A trauma informed approach to medical and mental health interventions, that focus on safety, are vital in this population. This is happening where you live and you can make a difference in their lives.

Keywords: human trafficking, public health, emergency medicine, sexual health

Procedia PDF Downloads 15
460 An Overview of Privacy and Security Issues in Social Networks

Authors: Mohamad Ibrahim Al Ladan

Abstract:

Social networks, such as Facebook, Myspace, LinkedIn, Google+, and Twitter have experienced exponential growth and a remarkable adoption rate in recent years. They provide attractive means of online social interactions and communications with family, friends, and colleagues from around the corner or across the globe, and they have become an important part of daily digital interactions for more than one and a half billion users around the world. The various personal information sharing practices that social network providers encourage have led to their success as innovative social interaction platforms. However, these practices have resulted in ample concerns with respect to privacy and security from different stakeholders. Addressing these privacy and security concerns in social networks is a must for these networks to be sustainable. Existing security and privacy tools may not be enough to address existing concerns. Some guidelines should be followed to protect users from the existing risks. In this paper, we have investigated and discussed the various privacy and security issues and concerns pertaining to social networks. Moreover, we have classified these privacy and security issues and presented a thorough discussion of the implications of these issues and concerns on the future of the social networks. In addition, we have presented a set of guidelines as precaution measures that users can consider to address these issues and concerns.

Keywords: social networks privacy issues, social networks security issues, social networks privacy precautions measures, social networks security precautions measures

Procedia PDF Downloads 275
459 Motherhood Medicalization and Marketing: From Media Frames to Women's Decisions

Authors: Leila Mohammadi

Abstract:

This article discusses the technology of social egg freezing in the context of existing literature on medicalization, motherhood, and marketing. The social egg freezing technique offers to preserve some healthy eggs for age-related fertility decline in the future. The study draws on a qualitative analysis and participants observation of media publications, including text, images, or audio-visual about social egg freezing technology and postpone maternity, to identify and compare their communication strategies from a framing theory perspective. Using 442 surveys and 158 pieces of publications in Spanish media, this study demonstrated that the narratives used by these publications and their structures follow a marketing objective to medicalize motherhood. Within these frames, the market of preserving fertility is cast to show compassion and concern about women. In the opinion of participants, egg freezing technology liberates, empowers, and automates women from patriarchal control, and also gives them the responsibility of taking care of their body and reproductive system. This study showed this opinion is significantly influenced by media and their communication strategies supported by providers of this business.

Keywords: motherhood, social egg freezing, medicalization, marketing, media frames, fertility, assisted reproductive system

Procedia PDF Downloads 109
458 Investigation of Existing Guidelines for Four-Legged Angular Telecommunication Tower

Authors: Sankara Ganesh Dhoopam, Phaneendra Aduri

Abstract:

Lattice towers are light weight structures which are primarily governed by the effects of wind loading. Ensuring a precise assessment of wind loads on the tower structure, antennas, and associated equipment is vital for the safety and efficiency of tower design. Earlier, the Indian standards are not available for design of telecom towers. Instead, the industry conventionally relied on the general building wind loading standard for calculating loads on tower components and the transmission line tower design standard for designing the angular members of the towers. Subsequently, the Bureau of Indian Standards (BIS) revised these standards and angular member design standard. While the transmission line towers are designed using the above standard, a full-scale model test will be done to prove the design. Telecom angular towers are also designed using the same with overload factor/factor of safety without full scale tower model testing. General construction in steel design code is available with limit state design approach and is applicable to the design of general structures involving angles and tubes but not used for angle member design of towers. Recently, in response to the evolving industry needs, the Bureau of Indian Standards (BIS) introduced a new standard titled “Isolated Towers, Masts, and Poles using structural steel -Code of practice” for the design of telecom towers. This study focuses on a 40m four legged angular tower to compare loading calculations and member designs between old and new standards. Additionally, a comparative analysis aligning with the new code provisions with international loading and design standards with a specific focus on American standards has been carried out. This paper elaborates code-based provisions used for load and member design calculations, including the influence of "ka" area averaging factor introduced in new wind load case.

Keywords: telecom, angular tower, PLS tower, GSM antenna, microwave antenna, IS 875(Part-3):2015, IS 802(Part-1/sec-2):2016, IS 800:2007, IS 17740:2022, ANSI/TIA-222G, ANSI/TIA-222H.

Procedia PDF Downloads 53
457 Home-based Production of the Southern Dialect Dong Minority Women in Rural Hunan, China

Authors: Sze Wai Veera Fung, Peter W. Ferretto

Abstract:

Since the economic reform in 1980s, many men and women of the southern dialect Dong minority have migrated to coastal cities for employment. Responding to the outgoing providers of the families, women, especially those at the middle age, resort to the informal home-based services and goods production for income generation. Homework, therefore, becomes a key economic strategy in supporting the household expenses in rural China, where formal employment is often inadequate for local women. This paper seeks to examine the intersection between gender and household strategy in the broader economic context of rural China. Based on the interviews and site survey in Tongdao Dong Autonomous County, the study analyses the variety of the home-based production activities, the experience of women in the production process, and the impact on familial relation and gender division of labor at home. The objective of this research is to advance the understanding of the informal economic landscape in the contemporary rural China, through which an alternative and possibly a more appropriate mode of development can be investigated.

Keywords: gender relation, home-based production, household strategy, informal economy, rural China, dong minority

Procedia PDF Downloads 104
456 Ethnographic Exploration of Elderly Residents' Perceptions and Utilization of Health Care to Improve Their Quality of Life

Authors: Seyed Ziya Tabatabaei, Azimi Bin Hj Hamzah, Fatemeh Ebrahimi

Abstract:

The increase in proportion of older people in Malaysia has led to a significant growth of health care demands. The aim of this study is to explore how perceived health care needs influence on quality of life among elderly Malay residents who reside in a Malaysian residential home. This study employed a method known as ethnographic research from May 2011 to January 2012. Four data collection strategies were selected as the main data-collecting tools including participant observation, field notes, in-depth interviews, and review of related documents. The nine knowledgeable participants for the present study were selected using the purposive sampling method. Two themes were identified: (1) Medical concerns: Feeling secure, lack of information, inadequate medical staff; and (2) Health promotion: Body condition, health education, physiotherapy and rehabilitation. These results could evoke the attention of policy-makers and care providers to better meet elderly residents’ health care needs.

Keywords: ethnographic study, health care needs, Malay elderly people, Malaysia, Quality of life, Residential home

Procedia PDF Downloads 276
455 Enhance Customer Experience through Sustainable Development: The Case of a Natural Park

Authors: Lubica Hikkerova, Jean-Michel Sahut

Abstract:

This article aims to better understand how a natural park, with a touristic vocation, can benefit from its sustainable development approach to enhance the customer experience. For this aim, we analyze, on the one hand, the interactions between the different stakeholders in this sustainable tourism offer, their ways of cooperating to build this offer and, on the other hand, the perceptions of customers. To serve this purpose, two complementary qualitative methodologies have been conducted. As part of a systemic approach, a first study, through group discussions, was conducted with three categories of participants: (I) customers, (II) representatives of the park, communities, tourism offices and associations and 3-service providers in the park. For the second study, semi-directive interviews were realized with park managers and customers. Two levels of contributions have been found. First, we have demonstrated the value of a systemic approach to understanding sustainable tourism. Then, we developed, in the empirical part, a model of causal loops that allowed us to identify the various factors of the offer that decided potential tourists to visit the park and their impact on customer experience. The complementarity of this approach with semi-directive interviews with all the stakeholders enabled us to issue recommendations to improve the customer experience.

Keywords: sustainable tourism, systematic approach, price, park

Procedia PDF Downloads 177
454 Disequilibrium between the Demand and Supply of Teachers of English at the Junior Secondary Schools in Gashua, Yobe State: Options for 2015 and Beyond

Authors: Clifford Irikefe Gbeyonron

Abstract:

The Nigerian educational system, which has English language as a major medium of instruction, has been designed in such a way that the cognitive, psychomotor and affective endowments of the Nigerian learner could be explored. However, the human resources that would impart the desired knowledge, skills and values in the learners seem to be in short supply. This paucity is more manifest in the area of teachers of English. As a result, this research was conducted on the demand and supply of teachers of English at the junior secondary schools in Gashua, Yobe State. The results indicate that there was dearth of teachers of English the domain under review. This thus presents a challenge that should propel English language teacher education industries to produce more teachers of English. As a result, this paper recommends that the teacher production process should make use of qualified and enthusiastic teacher trainers that would be able to inculcate in-depth linguistic and communicative competence of English language and English language teaching skills in the potential teachers of English. In addition, English language education service providers should attract and retain the trained teachers of English in the business of English language teaching in such a way that all the states of Nigeria could experience educational development.

Keywords: demand, supply, teachers of English, Yobe State

Procedia PDF Downloads 352
453 The Strategy of Teaching Digital Art in Classroom as a Way of Enhancing Pupils’ Artistic Creativity

Authors: Aber Salem Aboalgasm, Rupert Ward

Abstract:

Teaching art by digital means is a big challenge for the majority of teachers of art and artistic design courses in primary education schools. These courses can clearly identify relationships between art, technology and creativity in the classroom .The aim of this article is to present a modern way of teaching art, using digital tools in the art classroom in order to improve creative ability in pupils aged between 9 and 11 years; it also presents a conceptual model for creativity based on digital art. The model could be useful for pupils interested in learning drawing and using an e-drawing package, and for teachers who are interested in teaching their students modern digital art, and improving children’s creativity. This model is designed to show the strategy of teaching art through technology, in order for children to learn how to be creative. This will also help education providers to make suitable choices about which technological approaches they should choose to teach students and enhance their creative ability. To define the digital art tools that can benefit children develop their technical skills. It is also expected that use of this model will help to develop social interactive qualities that may improve intellectual ability.

Keywords: digital tools, motivation, creative activity, technical skill

Procedia PDF Downloads 446
452 Evaluation of the Quality of Care for Premature Babies in the Neonatology Unit of the Centre Hospitalier Universitaire de Kamenge

Authors: Kankurize Josiane, Nizigama Mediatrice

Abstract:

Introduction: Burundi records a still high infant mortality rate. Despite efforts to reduce it, prematurity is still the leading cause of death in the neonatal period. The objective of this study was to assess the quality of care for premature babies hospitalized in the neonatology unit of the Centre Hospitalier Universitaire de Kamenge. Method: This was a descriptive and evaluative prospective carried out in the neonatology unit of the CHUK (Centre Hospitalier Universitaire de Kamenge) from December 1, 2016, to May 31, 2017, including 70 premature babies, 65 mothers of premature babies and 15 providers including a pediatrician and 14 nurses. Using a tool developed by the World Health Organization and adapted to the local context by national experts, the quality of care for premature babies was assessed. Results: Prematurity accounted for 44.05% of hospitalizations in neonatology at the University Hospital of Kamenge. The assessment of the quality of care for premature babies was of low quality, with an average global score of 2/5 (50%), indicating that there is a considerable need for improvement to reach the standards. Conclusion: Efforts must be made to have infrastructures, materials, and human resources sufficient in quality and quantity so that the neonatology unit of the CHUK can be efficient and optimize the care of premature babies.

Keywords: quality of care, evaluation, premature, standards

Procedia PDF Downloads 44
451 Exploring Error-Minimization Protocols for Upper-Limb Function During Activities of Daily Life in Chronic Stroke Patients

Authors: M. A. Riurean, S. Heijnen, C. A. Knott, J. Makinde, D. Gotti, J. VD. Kamp

Abstract:

Objectives: The current study is done in preparation for a randomized controlled study investigating the effects of an implicit motor learning protocol implemented using an extension-supporting glove. It will explore different protocols to find out which is preferred when studying motor learn-ing in the chronic stroke population that struggles with hand spasticity. Design: This exploratory study will follow 24 individuals who have a chronic stroke (> 6 months) during their usual care journey. We will record the results of two 9-Hole Peg Tests (9HPT) done during their therapy ses-sions with a physiotherapist or in their home before and after 4 weeks of them wearing an exten-sion-supporting glove used to employ the to-be-studied protocols. The participants will wear the glove 3 times/week for one hour while performing their activities of daily living and record the times they wore it in a diary. Their experience will be monitored through telecommunication once every week. Subjects: Individuals that have had a stroke at least 6 months prior to participation, hand spasticity measured on the modified Ashworth Scale of maximum 3, and finger flexion motor control measured on the Motricity Index of at least 19/33. Exclusion criteria: extreme hemi-neglect. Methods: The participants will be randomly divided into 3 groups: one group using the glove in a pre-set way of decreasing support (implicit motor learning), one group using the glove in a self-controlled way of decreasing support (autonomous motor learning), and the third using the glove with constant support (as control). Before and after the 4-week period, there will be an intake session and a post-assessment session. Analysis: We will compare the results of the two 9HPTs to check whether the protocols were effective. Furthermore, we will compare the results between the three groups to find the preferred one. A qualitative analysis will be run of the experience of participants throughout the 4-week period. Expected results: We expect that the group using the implicit learning protocol will show superior results.

Keywords: implicit learning, hand spasticity, stroke, error minimization, motor task

Procedia PDF Downloads 37
450 Survey of Access Controls in Cloud Computing

Authors: Monirah Alkathiry, Hanan Aljarwan

Abstract:

Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements.

Keywords: access controls, cloud computing, confidentiality, identity and access management

Procedia PDF Downloads 110
449 Risk Based Building Information Modeling (BIM) for Urban Infrastructure Transportation Project

Authors: Debasis Sarkar

Abstract:

Building Information Modeling (BIM) is a holistic documentation process for operational visualization, design coordination, estimation and project scheduling. BIM software defines objects parametrically and it is a tool for virtual reality. Primary advantage of implementing BIM is the visual coordination of the building structure and systems such as Mechanical, Electrical and Plumbing (MEP) and it also identifies the possible conflicts between the building systems. This paper is an attempt to develop a risk based BIM model which would highlight the primary advantages of application of BIM pertaining to urban infrastructure transportation project. It has been observed that about 40% of the Architecture, Engineering and Construction (AEC) companies use BIM but primarily for their outsourced projects. Also, 65% of the respondents agree that BIM would be used quiet strongly for future construction projects in India. The 3D models developed with Revit 2015 software would reduce co-ordination problems amongst the architects, structural engineers, contractors and building service providers (MEP). Integration of risk management along with BIM would provide enhanced co-ordination, collaboration and high probability of successful completion of the complex infrastructure transportation project within stipulated time and cost frame.

Keywords: building information modeling (BIM), infrastructure transportation, project risk management, underground metro rail

Procedia PDF Downloads 287
448 Regulating Information Asymmetries at Online Platforms for Short-Term Vacation Rental in European Union– Legal Conondrum Continues

Authors: Vesna Lukovic

Abstract:

Online platforms as new business models play an important role in today’s economy and the functioning of the EU’s internal market. In the travel industry, algorithms used by online platforms for short-stay accommodation provide suggestions and price information to travelers. Those suggestions and recommendations are displayed in search results via recommendation (ranking) systems. There has been a growing consensus that the current legal framework was not sufficient to resolve problems arising from platform practices. In order to enhance the potential of the EU’s Single Market, smaller businesses should be protected, and their rights strengthened vis-à-vis large online platforms. The Regulation (EU) 2019/1150 of the European Parliament and of the Council on promoting fairness and transparency for business users of online intermediation services aims to level the playing field in that respect. This research looks at Airbnb through the lenses of this regulation. The research explores key determinants and finds that although regulation is an important step in the right direction, it is not enough. It does not entail sufficient clarity obligations that would make online platforms an intermediary service which both accommodation providers and travelers could use with ease.

Keywords: algorithm, online platforms, ranking, consumers, EU regulation

Procedia PDF Downloads 110
447 Problems concerning Formation of Institutional Framework for Electronic Democracy in Georgia

Authors: Giorgi Katamadze

Abstract:

Open public service and accountability towards citizens is an important feature of democratic state based on rule of law. Effective use of electronic resources simplifies bureaucratic procedures, makes direct communications, helps exchange information, ensures government’s openness and in general helps develop electronic/digital democracy. Development of electronic democracy should be a strategic dimension of Georgian governance. Formation of electronic democracy, its functional improvement should become an important dimension of the state’s information policy. Electronic democracy is based on electronic governance and implies modern information and communication systems, their adaptation to universal standards. E-democracy needs involvement of governments, voters, political parties and social groups in an electronic form. In the last years the process of interaction between the citizen and the state becomes simpler. This process is achieved by the use of modern technological systems which gives to a citizen a possibility to use different public services online. For example, the website my.gov.ge makes interaction between the citizen, business and the state more simple, comfortable and secure. A higher standard of accountability and interaction is being established. Electronic democracy brings new forms of interactions between the state and the citizen: e-engagement – participation of society in state politics via electronic systems; e-consultation – electronic interaction among public officials, citizens and interested groups; e-controllership – electronic rule and control of public expenses and service. Public transparency is one of the milestones of electronic democracy as well as representative democracy as only on mutual trust and accountability can democracy be established. In Georgia, institutional changes concerning establishment and development of electronic democracy are not enough. Effective planning and implementation of a comprehensive and multi component e-democracy program (central, regional, local levels) requires telecommunication systems, institutional (public service, competencies, logical system) and informational (relevant conditions for public involvement) support. Therefore, a systematic project of formation of electronic governance should be developed which will include central, regional, municipal levels and certain aspects of development of instrumental basis for electronic governance.

Keywords: e-democracy, e-governance, e-services, information technology, public administration

Procedia PDF Downloads 310
446 The Role of Spiritual Experience, Gerotranscendence and Social Engagement on Successful Aging among Incarcerated Filipino Elderly: A Structural Equation Model

Authors: Les Paul Valdez, Rowena Manzarate, Joseph Carl Lunizo, Mary Thereze Mabaquiao, Mary Deo Luigi Mabunay

Abstract:

Background: Across the literature, varying definitions of successful aging can be found. As a result, several determinants have been associated with successful aging. However, there is a paucity of literature exploring the relationship between successful aging and factors such as spiritual experience, gerotranscendence, and social engagement. Objective: Thus, this study purports to ascertain the relationship between and among spiritual experience, gerotranscendence, social engagement and successful aging. Methods: The Daily Spiritual Experience Scale (DSES), Social Engagement Scale (SES), Gerotranscendence Scale Revised (GS-R) and Expectations Regarding Aging (ERA) were fielded to 349 incarcerated elderly to measure spiritual experience, social engagement, gerotranscendence and successful aging respectively. Data was analyzed using Structural Equation Modelling through AMOS 21. The hypothesized model was evaluated using the goodness of fit and parsimony indices. Results: Social engagement (β= .179, p=.128) and spiritual experience (β= .375, p=.262) contribute to successful aging through the mediating effect of gerotranscendence (β= .973, p=.718). Conclusion: Today more than ever, healthcare providers in penal institutions are challenged to ensure that incarcerated elderly are socially and spiritually engaged; and have high levels of gerotranscendence.

Keywords: elderly, Filipino, gerotranscendence, social engagement, spiritual experience, successful aging

Procedia PDF Downloads 491
445 Standard Resource Parameter Based Trust Model in Cloud Computing

Authors: Shyamlal Kumawat

Abstract:

Cloud computing is shifting the approach IT capital are utilized. Cloud computing dynamically delivers convenient, on-demand access to shared pools of software resources, platform and hardware as a service through internet. The cloud computing model—made promising by sophisticated automation, provisioning and virtualization technologies. Users want the ability to access these services including infrastructure resources, how and when they choose. To accommodate this shift in the consumption model technology has to deal with the security, compatibility and trust issues associated with delivering that convenience to application business owners, developers and users. Absent of these issues, trust has attracted extensive attention in Cloud computing as a solution to enhance the security. This paper proposes a trusted computing technology through Standard Resource parameter Based Trust Model in Cloud Computing to select the appropriate cloud service providers. The direct trust of cloud entities is computed on basis of the interaction evidences in past and sustained on its present performances. Various SLA parameters between consumer and provider are considered in trust computation and compliance process. The simulations are performed using CloudSim framework and experimental results show that the proposed model is effective and extensible.

Keywords: cloud, Iaas, Saas, Paas

Procedia PDF Downloads 314
444 Reverse Logistics Network Optimization for E-Commerce

Authors: Albert W. K. Tan

Abstract:

This research consolidates a comprehensive array of publications from peer-reviewed journals, case studies, and seminar reports focused on reverse logistics and network design. By synthesizing this secondary knowledge, our objective is to identify and articulate key decision factors crucial to reverse logistics network design for e-commerce. Through this exploration, we aim to present a refined mathematical model that offers valuable insights for companies seeking to optimize their reverse logistics operations. The primary goal of this research endeavor is to develop a comprehensive framework tailored to advising organizations and companies on crafting effective networks for their reverse logistics operations, thereby facilitating the achievement of their organizational goals. This involves a thorough examination of various network configurations, weighing their advantages and disadvantages to ensure alignment with specific business objectives. The key objectives of this research include: (i) Identifying pivotal factors pertinent to network design decisions within the realm of reverse logistics across diverse supply chains. (ii) Formulating a structured framework designed to offer informed recommendations for sound network design decisions applicable to relevant industries and scenarios. (iii) Propose a mathematical model to optimize its reverse logistics network. A conceptual framework for designing a reverse logistics network has been developed through a combination of insights from the literature review and information gathered from company websites. This framework encompasses four key stages in the selection of reverse logistics operations modes: (1) Collection, (2) Sorting and testing, (3) Processing, and (4) Storage. Key factors to consider in reverse logistics network design: I) Centralized vs. decentralized processing: Centralized processing, a long-standing practice in reverse logistics, has recently gained greater attention from manufacturing companies. In this system, all products within the reverse logistics pipeline are brought to a central facility for sorting, processing, and subsequent shipment to their next destinations. Centralization offers the advantage of efficiently managing the reverse logistics flow, potentially leading to increased revenues from returned items. Moreover, it aids in determining the most appropriate reverse channel for handling returns. On the contrary, a decentralized system is more suitable when products are returned directly from consumers to retailers. In this scenario, individual sales outlets serve as gatekeepers for processing returns. Considerations encompass the product lifecycle, product value and cost, return volume, and the geographic distribution of returns. II) In-house vs. third-party logistics providers: The decision between insourcing and outsourcing in reverse logistics network design is pivotal. In insourcing, a company handles the entire reverse logistics process, including material reuse. In contrast, outsourcing involves third-party providers taking on various aspects of reverse logistics. Companies may choose outsourcing due to resource constraints or lack of expertise, with the extent of outsourcing varying based on factors such as personnel skills and cost considerations. Based on the conceptual framework, the authors have constructed a mathematical model that optimizes reverse logistics network design decisions. The model will consider key factors identified in the framework, such as transportation costs, facility capacities, and lead times. The authors have employed mixed LP to find the optimal solutions that minimize costs while meeting organizational objectives.

Keywords: reverse logistics, supply chain management, optimization, e-commerce

Procedia PDF Downloads 16
443 Global City Typologies: 300 Cities and Over 100 Datasets

Authors: M. Novak, E. Munoz, A. Jana, M. Nelemans

Abstract:

Cities and local governments the world over are interested to employ circular strategies as a means to bring about food security, create employment and increase resilience. The selection and implementation of circular strategies is facilitated by modeling the effects of strategies locally and understanding the impacts such strategies have had in other (comparable) cities and how that would translate locally. Urban areas are heterogeneous because of their geographic, economic, social characteristics, governance, and culture. In order to better understand the effect of circular strategies on urban systems, we create a dataset for over 300 cities around the world designed to facilitate circular strategy scenario modeling. This new dataset integrates data from over 20 prominent global national and urban data sources, such as the Global Human Settlements layer and International Labour Organisation, as well as incorporating employment data from over 150 cities collected bottom up from local departments and data providers. The dataset is made to be reproducible. Various clustering techniques are explored in the paper. The result is sets of clusters of cities, which can be used for further research, analysis, and support comparative, regional, and national policy making on circular cities.

Keywords: data integration, urban innovation, cluster analysis, circular economy, city profiles, scenario modelling

Procedia PDF Downloads 162
442 A Risk Management Approach to the Diagnosis of Attention Deficit-Hyperactivity Disorder

Authors: Lloyd A. Taylor

Abstract:

An increase in the prevalence of Attention Deficit-Hyperactivity Disorder (ADHD) highlights the need to consider factors that may be exacerbating symptom presentation. Traditional diagnostic criteria provide a little framework for healthcare providers to consider as they attempt to diagnose and treat children with behavioral problems. In fact, aside from exclusion criteria, limited alternative considerations are available, and approaches fail to consider the impact of outside factors that could increase or decrease the likelihood of appropriate diagnosis and success of interventions. This paper will consider specific systems-based factors that influence behavior and intervention successes that, when not considered, could account for the upsurge of diagnoses. These include understanding (1) challenges in the healthcare system, (2) the influence and impact of educators and the educational system, (3) technology use, and (4) patient and parental attitudes about the diagnosis of ADHD. These factors must be considered both individually and as a whole when considering both the increase in diagnoses and the subsequent increases in prescriptions for psychostimulant medication. A theoretical model based on a risk management approach will be presented. Finally, data will be presented that demonstrates pediatric provider satisfaction with this approach to diagnoses and treatment of ADHD as it relates to practice trends.

Keywords: ADHD, diagnostic criteria, risk management model, pediatricians

Procedia PDF Downloads 77
441 Strengthening Factors of Family Living with Disabilities

Authors: Supranee Sittikan, Darunee Jongudomkarn, Rutja Phuphaibul

Abstract:

Thai’s families with disabilities are diverse, poor economy, low education disproportionately characterized their living that includes stress and suffering. This article reports a preliminary study using a qualitative case study with six disabilities (five physical and one mental problem) Their six family caregivers who perceived they were managing well with their conditions as well. Data were collected by in-depth interviews during November-December 2017 in North-East of Thailand. Preliminary results were found factors of moving in comprised of three themes as followings Karma: the families believe that the disability happened because of bad-karma which attached to them. From the reason, the members of families have to deserve and accept it. Family attachment: the families believe in the importance of being the family so they have to take good care in one another whether happy or suffering Community support: the families can get more to received helping hands from local health care providers and community health volunteers. These activities are very important to be representative in taking the families through health accessibility, which help them face with disabling problems. Nevertheless, the study needs further exploring on other families’ and health care team's perspective in larger scales leading to develop an appropriate health care service system which can support and promote the well-being of the families living with disabilities in the future.

Keywords: families with disabilities, Karma, family attachment, community support

Procedia PDF Downloads 142
440 Building Information Modeling-Based Approach for Automatic Quantity Take-off and Cost Estimation

Authors: Lo Kar Yin, Law Ka Mei

Abstract:

Architectural, engineering, construction and operations (AECO) industry practitioners have been well adapting to the dynamic construction market from the fundamental training of its discipline. As further triggered by the pandemic since 2019, great steps are taken in virtual environment and the best collaboration is strived with project teams without boundaries. With adoption of Building Information Modeling-based approach and qualitative analysis, this paper is to review quantity take-off and cost estimation process through modeling techniques in liaison with suppliers, fabricators, subcontractors, contractors, designers, consultants and services providers in the construction industry value chain for automatic project cost budgeting, project cost control and cost evaluation on design options of in-situ reinforced-concrete construction and Modular Integrated Construction (MiC) at design stage, variation of works and cash flow/spending analysis at construction stage as far as practicable, with a view to sharing the findings for enhancing mutual trust and co-operation among AECO industry practitioners. It is to foster development through a common prototype of design and build project delivery method in NEC Engineering and Construction Contract (ECC) Options A and C.

Keywords: building information modeling, cost estimation, quantity take-off, modeling techniques

Procedia PDF Downloads 156
439 Applying Different Stenography Techniques in Cloud Computing Technology to Improve Cloud Data Privacy and Security Issues

Authors: Muhammad Muhammad Suleiman

Abstract:

Cloud Computing is a versatile concept that refers to a service that allows users to outsource their data without having to worry about local storage issues. However, the most pressing issues to be addressed are maintaining a secure and reliable data repository rather than relying on untrustworthy service providers. In this study, we look at how stenography approaches and collaboration with Digital Watermarking can greatly improve the system's effectiveness and data security when used for Cloud Computing. The main requirement of such frameworks, where data is transferred or exchanged between servers and users, is safe data management in cloud environments. Steganography is the cloud is among the most effective methods for safe communication. Steganography is a method of writing coded messages in such a way that only the sender and recipient can safely interpret and display the information hidden in the communication channel. This study presents a new text steganography method for hiding a loaded hidden English text file in a cover English text file to ensure data protection in cloud computing. Data protection, data hiding capability, and time were all improved using the proposed technique.

Keywords: cloud computing, steganography, information hiding, cloud storage, security

Procedia PDF Downloads 169
438 [Keynote Talk]: The Emotional Life of Patients with Chronic Diseases: A Framework for Health Promotion Strategies

Authors: Leslie Beale

Abstract:

Being a patient with a chronic disease is both a physical and emotional experience. The ability to recognize a patient’s emotional health is an important part of a health care provider’s skills. For the purposes of this paper, emotional health is viewed as the way that we feel, and the way that our feelings affect us. Understanding the patient’s emotional health leads to improved provider-patient relationships and health outcomes. For example, when a patient first hears his or her diagnosis from a provider, they might find it difficult to cope with their emotions. Struggling to cope with emotions interferes with the patient’s ability to read, understand, and act on health information and services. As a result, the patient becomes more frustrated and confused, creating barriers to accessing healthcare services. These barriers are challenging for both the patient and their healthcare providers. There are five basic emotions that are part of who we are and are always with us: fear, anger, sadness, joy, and compassion. Living with a chronic disease however can cause a patient to experience and express these emotions in new and unique ways. Within the provider-patient relationship, there needs to be an understanding that each patient experiences these five emotions and, experiences them at different times. In response to this need, the paper highlights a health promotion framework for patients with chronic disease. This framework emphasizes the emotional health of patients.

Keywords: health promotion, emotional health, patients with chronic disease, patient-centered care

Procedia PDF Downloads 212
437 The Routes of Human Suffering: How Point-Source and Destination-Source Mapping Can Help Victim Services Providers and Law Enforcement Agencies Effectively Combat Human Trafficking

Authors: Benjamin Thomas Greer, Grace Cotulla, Mandy Johnson

Abstract:

Human trafficking is one of the fastest growing international crimes and human rights violations in the world. The United States Department of State (State Department) approximates some 800,000 to 900,000 people are annually trafficked across sovereign borders, with approximately 14,000 to 17,500 of these people coming into the United States. Today’s slavery is conducted by unscrupulous individuals who are often connected to organized criminal enterprises and transnational gangs, extracting huge monetary sums. According to the International Labour Organization (ILO), human traffickers collect approximately $32 billion worldwide annually. Surpassed only by narcotics dealing, trafficking of humans is tied with illegal arms sales as the second largest criminal industry in the world and is the fastest growing field in the 21st century. Perpetrators of this heinous crime abound. They are not limited to single or “sole practitioners” of human trafficking, but rather, often include Transnational Criminal Organizations (TCO), domestic street gangs, labor contractors, and otherwise seemingly ordinary citizens. Monetary gain is being elevated over territorial disputes and street gangs are increasingly operating in a collaborative effort with TCOs to further disguise their criminal activity; to utilizing their vast networks, in an attempt to avoid detection. Traffickers rely on a network of clandestine routes to sell their commodities with impunity. As law enforcement agencies seek to retard the expansion of transnational criminal organization’s entry into human trafficking, it is imperative that they develop reliable trafficking mapping of known exploitative routes. In a recent report given to the Mexican Congress, The Procuraduría General de la República (PGR) disclosed, from 2008 to 2010 they had identified at least 47 unique criminal networking routes used to traffic victims and that Mexico’s estimated domestic victims number between 800,000 adults and 20,000 children annually. Designing a reliable mapping system is a crucial step to effective law enforcement response and deploying a successful victim support system. Creating this mapping analytic is exceedingly difficult. Traffickers are constantly changing the way they traffic and exploit their victims. They swiftly adapt to local environmental factors and react remarkably well to market demands, exploiting limitations in the prevailing laws. This article will highlight how human trafficking has become one of the fastest growing and most high profile human rights violations in the world today; compile current efforts to map and illustrate trafficking routes; and will demonstrate how the proprietary analytical mapping analysis of point-source and destination-source mapping can help local law enforcement, governmental agencies and victim services providers effectively respond to the type and nature of trafficking to their specific geographical locale. Trafficking transcends state and international borders. It demands an effective and consistent cooperation between local, state, and federal authorities. Each region of the world has different impact factors which create distinct challenges for law enforcement and victim services. Our mapping system lays the groundwork for a targeted anti-trafficking response.

Keywords: human trafficking, mapping, routes, law enforcement intelligence

Procedia PDF Downloads 359
436 Traffic Congestions Modeling and Predictions by Social Networks

Authors: Bojan Najdenov, Danco Davcev

Abstract:

Reduction of traffic congestions and the effects of pollution and waste of resources that come with them has been a big challenge in the past decades. Having reliable systems to facilitate the process of modeling and prediction of traffic conditions would not only reduce the environmental pollution, but will also save people time and money. Social networks play big role of people’s lives nowadays providing them means of communicating and sharing thoughts and ideas, that way generating huge knowledge bases by crowdsourcing. In addition to that, crowdsourcing as a concept provides mechanisms for fast and relatively reliable data generation and also many services are being used on regular basis because they are mainly powered by the public as main content providers. In this paper we present the Social-NETS-Traffic-Control System (SNTCS) that should serve as a facilitator in the process of modeling and prediction of traffic congestions. The main contribution of our system is to integrate data from social networks as Twitter and also implements a custom created crowdsourcing subsystem with which users report traffic conditions using an android application. Our first experience of the usage of the system confirms that the integrated approach allows easy extension of the system with other social networks and represents a very useful tool for traffic control.

Keywords: traffic, congestion reduction, crowdsource, social networks, twitter, android

Procedia PDF Downloads 457
435 Enquiry into Psychological and Psychosocial Aspects in Cancer Care: Cancer Diseases Hospital, Zambia

Authors: Mubita Namuyamba

Abstract:

Despite an increase in the number of cancer programs and partnerships in cancer care provision, the burden of cancer in Zambia is increasingly having a significant impact on morbidity and mortality rates. The increase in cancer morbidity and mortality rates has given rise to psychological and psycho social implications (PPsI) in cancer care. Cancer patients, care givers and health care providers are faced with a multitude of PPsIs in cancer care that mainly impact negatively on the management of cancer patients. The study adopted a case study design and was purposively conducted at the Cancer Diseases Hospital in Lusaka (Zambia) after obtaining ethical clearance from the Ethics committee. The sample for this study included 70 cancer patients, 20 care givers and 5 hospital staff (4 nurses and 1 doctor). Data was collected using interviews guides, focus group discussion guides and questionnaires respectively. The qualitative data was analysed thematically. The various psychological and psychosocial challenges that conspire to deter the provision of effective cancer care nursing and improved methods of minimizing the psychological and psychosocial implications in cancer care are the products of this study.

Keywords: case study, enquiry, psychological and psycho social aspects, Zambia

Procedia PDF Downloads 312
434 Application Programming Interface Security in Embedded and Open Finance

Authors: Andrew John Zeller, Artjoms Formulevics

Abstract:

Banking and financial services are rapidly transitioning from being monolithic structures focusing merely on their own financial offerings to becoming integrated players in multiple customer journeys and supply chains. Banks themselves are refocusing on being liquidity providers and underwriters in these networks, while the general concept of ‘embeddedness’ builds on the market readily available API (Application Programming Interface) architectures to flexibly deliver services to various requestors, i.e., online retailers who need finance and insurance products to better serve their customers, respectively. With this new flexibility come new requirements for enhanced cybersecurity. API structures are more decentralized and inherently prone to change. Unfortunately, this has not been comprehensively addressed in the literature. This paper tries to fill this gap by looking at security approaches and technologies relevant to API architectures found in embedded finance. After presenting the research methodology applied and introducing the major bodies of knowledge involved, the paper will discuss six dominating technology trends shaping high-level financial services architectures. Subsequently, embedded finance and the respective usage of API strategies will be described. Building on this, security considerations for APIs in financial and insurance services will be elaborated on before concluding with some ideas for possible further research.

Keywords: embedded finance, embedded banking strategy, cybersecurity, API management, data security, cybersecurity, IT management

Procedia PDF Downloads 19
433 School Choice and Institutional or Familial Habitus: Reciprocity in Parents-School Relationships

Authors: Fatemeh Yazdani

Abstract:

This paper explores the student intake policies in high-performing private schools in Iran by studying both sides involved in the school choice processes, parents and the school leaders. It is based on in-depth interviews with 27 parents and private schools’ staff and principals supplemented by ethnographic observation in two private schools in Tehran. From the Bourdieusian point of view, this paper argues that the school leadership engineers the composition of private schools’ students via different gatekeeping strategies, and these strategies represent and reconstruct the school’s institutional habitus. It further explores the ways that parents who look for quality education among non-state education providers deal with the school's institutional habitus based on their familial habitus and possessed economic, social, and cultural capital. The conclusion highlights that investigating school choice as a reciprocal process between family and school leadership can shed more light on the ways that an exclusive environment has been created in some high-performing private schools for certain class strata maintaining a distance that needs to be kept from ‘others.’ In a broader sense, this paper engages into an exploration of social inequality reproduction through private education.

Keywords: institutional habitus, private education, school choice, social inequality, student intake

Procedia PDF Downloads 90
432 An Analytic Cross-Sectional Study on the Association between Social Determinants of Health, Maternal and Child Health-Related Knowledge and Attitudes, and Utilization of Maternal, Newborn, Child Health and Nutrition Strategy-Prescribed Services for M

Authors: Rafael Carlos C. Aniceto, Bryce Abraham M. Anos, Don Christian A. Cornel, Marjerie Brianna S. Go, Samantha Nicole U. Roque, Earl Christian C. Te

Abstract:

Indigenous peoples (IPs) in the Philippines are a vulnerable, marginalized group in terms of health and overall well-being due to social inequities and cultural differences. National standards regarding maternal healthcare are geared towards facility-based delivery with modern medicine, health services, and skilled birth attendants. Standards and procedures of care for pregnant mothers do not take into account cultural differences between indigenous people and the majority of the population. There do exist, however, numerous other factors that cause relatively poorer health outcomes among indigenous peoples (IPs). This analytic cross-sectional study sought to determine the association between social determinants of health (SDH), focusing on status as indigenous peoples, and maternal health-related knowledge and attitudes (KA), and health behavior of the Dumagat-Agta indigenous people of Barangay Catablingan and Barangay San Marcelino, General Nakar, Quezon Province, and their utilization of health facilities for antenatal care, facility-based delivery and postpartum care, which would affect their health outcomes (that were not within the scope of this study). To quantitatively measure the primary/secondary exposures and outcomes, a total of 90 face-to-face interviews with IP and non-IP mothers were done. For qualitative information, participant observation among 6 communities (5 IP and 1 non-IP), 11 key informant interviews (traditional and modern health providers) and 4 focused group discussions among IP mothers were conducted. Primary quantitative analyses included chi-squared, T-test and binary logistic regression, while secondary qualitative analyses involved thematic analysis and triangulation. The researchers spent a total of 15 days in the community to learn the culture and participate in the practices of the Dumagat-Agta more intensively and deeply. Overall, utilization of all MNCHN services measured in the study was lower for IP mothers compared to their non-IP counterparts. After controlling for confounders measured in the study, IP status (primary exposure) was found to be significantly correlated with utilization of and adherence to two MNCHN-prescribed services: number of antenatal care check-ups and place of delivery (secondary outcomes). Findings show that being an indigenous mother leads to unfavorable social determinants of health, and if compounded by a difference in knowledge and attitudes, would then lead to poor levels of utilization of MNCHN-prescribed services. Key themes from qualitative analyses show that factors that affected utilization were: culture, land alienation, social discrimination, socioeconomic status, and relations between IPs and non-IPs, specifically with non-IP healthcare providers. The findings of this study aim to be used to help and guide in policy-making, to provide healthcare that is not only adequate and of quality, but more importantly, that addresses inequities stemming from various social determinants, and which is socio-culturally acceptable to indigenous communities. To address the root causes of health problems of IPs, there must be full recognition and exercise of their collective rights to communal assets, specifically land, and self-determination. This would improve maternal and child health outcomes to one of the most vulnerable and neglected sectors in society today.

Keywords: child health, indigenous people, knowledge-attitudes-practices, maternal health, social determinants of health

Procedia PDF Downloads 167