Search results for: licensed shared access
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4256

Search results for: licensed shared access

3806 Mineral Deposits in Spatial Planning Systems – Review of European Practices

Authors: Alicja Kot-Niewiadomska

Abstract:

Securing sustainable access to raw materials is vital for the growth of the European economy and for the goals laid down in Strategy Europe 2020. One of the most important sources of mineral raw materials are primary deposits. The efficient management of them, including extraction, will ensure competitiveness of the European economy. A critical element of this approach is mineral deposits safeguarding and the most important tool - spatial planning. The safeguarding of deposits should be understood as safeguarding of land access, and safeguarding of area against development, which may (potential) prevent the use of the deposit and the necessary mining activities. Many European Union countries successfully integrated their mineral policy and spatial policy, which has ensured the proper place of mineral deposits in their spatial planning systems. These, in turn, are widely recognized as the most important mineral deposit safeguarding tool, the essence of which is to ensure long-term access to its resources. The examples of Austria, Portugal, Slovakia, Czech Republic, Sweden, and the United Kingdom, discussed in the paper, are often mentioned as examples of good practices in this area. Although none of these countries managed to avoid cases of social and environmental conflicts related to mining activities, the solutions they implement certainly deserve special attention. And for many countries, including Poland, they can be a potential source of solutions aimed at improving the protection of mineral deposits.

Keywords: mineral deposits, land use planning, mineral deposit safeguarding, European practices

Procedia PDF Downloads 167
3805 ‘Call Before, Save Lives’: Reducing Emergency Department Visits through Effective Communication

Authors: Sandra Cardoso, Gaspar Pais, Judite Neves, Sandra Cavaca, Fernando Araújo

Abstract:

In 2021, Portugal has 63 emergency department (ED) visits per 100 people annually, the highest numbers in Europe. While EDs provide a critical service, high use is indicative of inappropriate and inefficient healthcare. In Portugal, all ED have the Manchester Triage System (MTS), a clinical risk management tool to enable that patients are seen in order of clinical priority. In 2023, more than 40% of the ED visits were of non-urgent conditions (blue and green), that could be better managed in primary health care (PHC), meaning wrong use of resources and lack of health literacy. From 2017, the country has a phone line, SNS24 (Contact Centre of the National Health Service), for triage, counseling, and referral service, 24 hours/7 days a week. The pilot project ‘Call before, save lives’ was implemented in the municipalities of Póvoa de Varzim and Vila do Conde (around 150.000 residents), in May 2023, by the executive board of the Portuguese Health Service, with the support of the Shared Services of the Ministry of Health, and local authorities. This geographical area has short travel times, 99% of the population a family doctor and the region is organized in a health local unit (HLU), integrating PHC and the local hospital. The purposes of this project included to increase awareness to contact SNS 24, before going to an ED, and non-urgent conditions oriented to a family doctor, reducing ED visits. The implementation of the project involved two phases, beginning with: i) development of campaigns using local influencers (fishmonger, model, fireman) through local institutions and media; ii) provision of telephone installed on site to contact SNS24; iii) establishment of open consultation in PHC; iv) promotion of the use of SNS24; v) creation of acute consultations at the hospital for complex chronic patients; and vi) direct referral for home hospitalization by PHC. The results of this project showed an excellent level of access to SNS24, an increase in the number of users referred to ED, with great satisfaction of users and professionals. The second phase, initiated in January 2024, for access to the ED, the need for prior referral was established as an admission rule, except for certain situations, as trauma patients. If the patient refuses, their registration in the ED and subsequent screening in accordance with the MTS must be ensured. When the patient is non-urgent, shall not be observed in the ED, provided that, according to his clinical condition, is guaranteed to be referred to PHC or to consultation/day hospital, through effective scheduling of an appointment for the same or the following day. In terms of results, 8 weeks after beginning of phase 2, we assist of a decrease in self-reported patients to ED from 59% to 15%, and a reduction of around 7% of ED visits. The key for this success was an effective public campaign that increases the knowledge of the right use of the health system, and capable of changing behaviors.

Keywords: contact centre of the national health service, emergency department visits, public campaign, health literacy, SNS24

Procedia PDF Downloads 57
3804 Fast-Tracking University Education for Youth Employment: Empirical Evidence from University Graduates in Rwanda

Authors: Fred Alinda, Marjorie Negesa, Gerald Karyeija

Abstract:

Like elsewhere in the world, youth unemployment remains a big problem more so to the most educated youth and female. In Rwanda, unemployment is estimated at 13.2% among youth graduates compared to 10.9% and 2.6 among secondary and primary graduates respectively. Though empirical evidence elsewhere associate youth unemployment with education level, relevance of skills and access to business support opportunities, mixed evidence still exist on the significance of these factors to youth employment. As youth employment strategies in countries like Rwanda continue to recognize the potential role university education can play to enhance employment, there is a need to understand the catalysts or barriers. This paper, therefore, draws empirical evidence from a survey on the influence of education qualification, skills relevance and access to business support opportunities on employment of the youth university graduates in Masaka sector, Rwanda. The analysis tested four hypotheses; access to university education significantly affects youth employment, Relevance of university education significantly contributes to youth employment; access to business support opportunities significantly contributes to youth employment, and significant gender differences exist in the employment of youth university graduates. A cross-section survey was used in lieu of the need to explore the prevailing status of youth employment and contributing factors across the sector. A questionnaire was used to collect data on a large sample of 269 youth to allow statistical analysis. This was beefed up with qualitative views of leaders and technical officials in the sector. The youth University graduates were selected using simple random sampling while the leaders and technical officials were selected purposively. Percentages were used to describe respondents in line with the variables under while a regression model for youth employment was fitted to determine the significant factors. The model results indicated a significant influence (p<0.05) of gender, education level and access to business support opportunities on employment of youth university graduates. This finding was also affirmed by the qualitative views of key informants. Qualitative views pointed to the fact that university education generally equipped the youth with skills that enabled their transition into employment mainly for a salary or wage. The skills were, however, deficient in technical and practical aspects. In addition, the youth generally lacked limited access to business support opportunities particularly guarantees for loans, business advisory, and grants for business as well as training in business skills that would help them gain salaried employment or transit into self-employment. The study findings bear an implication on the strategy for catalyzing youth employment through university education. The findings imply that university education should be embraced but with greater emphasis on or supplementation with specialized training in practical and technical skills as well as extending business support opportunities to the youth. This will accelerate the contribution of university education to youth employment.

Keywords: education, employment, self-employment, youth

Procedia PDF Downloads 252
3803 Copyright Infringement for Academic Authorship in Uganda: Implications on Exemptions of Fair Use for Educational Purposes in Universities

Authors: Elisam Magara

Abstract:

Like any other property, Intellectual Property (IP) must be regarded, respected, and remunerated to address the historical, ethical, economical and informational needs of society. Article 26 of the Constitution of the Republic of Uganda 1995, the Copyright and Neighbouring Rights (CNR) Act 2006 and CNR Regulations 2010 guide copyright protection in Uganda. However, an unpredictable environment has negatively impact on certain author/intellectual freedoms; and the infringements on academic works that affect the economic rights of authors that limit authors from fully enjoying the benefits of authorship. Notwithstanding the different licensing systems and copyright protection avenues, educational institutions and custodians of copyright works (libraries, archives) have continued to advocate for open access to information resources, under the legal exceptions of fair use for educational purposes. Thus, a study was conducted in educational institutions, libraries and archives in Uganda to assess the state of copyright infringement in Uganda in an increased use of academic authored works. The study attempted to establish the nature and forms of Copyright Infringement, the circumstances for copyright infringement, assessed the opinions from the custodians on strategies for balancing copyright protection for economic and moral gains by authors and increased access to information for educational purposes and fair-use. Through a survey, using a self-administered questionnaire, interviews and physical visits, the study was conducted in higher education institutions, libraries and archives among the officers that manage and keep copyright works. It established that the uncontrolled reproduction of copyright works in educational institutions and information institutions, have contributed copyright infringement robbing authors of their potential economic earnings and limiting their academic innovativeness and creativity. The study also established that lack of consciousness and awareness on copyright issues by lecturers, universities and libraries has made copyright works in Universities highly susceptible to copyright infringement. Thus the increased access to materials without restrictions has resulted in copyright infringement among the educational institutions, libraries and archives. A strategic alliance by the collecting Society (Uganda Reproduction Rights Organisation (URRO), government, Universities and right holders organisations (UTANA) to work together and institute a programme to address copyright protection and access to information is pertinently required.

Keywords: access to information, academic Writing, copyright, copyright infringement, copyright protection, exemptions of fair use, intellectual property rights

Procedia PDF Downloads 449
3802 Multi-Criteria Geographic Information System Analysis of the Costs and Environmental Impacts of Improved Overland Tourist Access to Kaieteur National Park, Guyana

Authors: Mark R. Leipnik, Dahlia Durga, Linda Johnson-Bhola

Abstract:

Kaieteur is the most iconic National Park in the rainforest-clad nation of Guyana in South America. However, the magnificent 226-meter-high waterfall at its center is virtually inaccessible by surface transportation, and the occasional charter flights to the small airstrip in the park are too expensive for many tourists and residents. Thus, the largest waterfall in all of Amazonia, where the Potaro River plunges over a single free drop twice as high as Victoria Falls, remains preserved in splendid isolation inside a 57,000-hectare National Park established by the British in 1929, in the deepest recesses of a remote jungle canyon. Kaieteur Falls are largely unseen firsthand, but images of the falls are depicted on the Guyanese twenty dollar note, in every Guyanese tourist promotion, and on many items in the national capital of Georgetown. Georgetown is only 223-241 kilometers away from the falls. The lack of a single mileage figure demonstrates there is no single overland route. Any journey, except by air, involves changes of vehicles, a ferry ride, and a boat ride up a jungle river. It also entails hiking for many hours to view the falls. Surface access from Georgetown (or any city) is thus a 3-5 day-long adventure; even in the dry season, during the two wet seasons, travel is a particularly sticky proposition. This journey was made overland by the paper's co-author Dahlia Durga. This paper focuses on potential ways to improve overland tourist access to Kaieteur National Park from Georgetown. This is primarily a GIS-based analysis, using multiple criteria to determine the least cost means of creating all-weather road access to the area near the base of the falls while minimizing distance and elevation changes. Critically, it also involves minimizing the number of new bridges required to be built while utilizing the one existing ferry crossings of a major river. Cost estimates are based on data from road and bridge construction engineers operating currently in the interior of Guyana. The paper contains original maps generated with ArcGIS of the potential routes for such an overland connection, including the one deemed optimal. Other factors, such as the impact on endangered species habitats and Indigenous populations, are considered. This proposed infrastructure development is taking place at a time when Guyana is undergoing the largest boom in its history due to revenues from offshore oil and gas development. Thus, better access to the most important tourist attraction in the country is likely to happen eventually in some manner. But the questions of the most environmentally sustainable and least costly alternatives for such access remain. This paper addresses those questions and others related to access to this magnificent natural treasure and the tradeoffs such access will have on the preservation of the currently pristine natural environment of Kaieteur Falls.

Keywords: nature tourism, GIS, Amazonia, national parks

Procedia PDF Downloads 162
3801 Fast Bayesian Inference of Multivariate Block-Nearest Neighbor Gaussian Process (NNGP) Models for Large Data

Authors: Carlos Gonzales, Zaida Quiroz, Marcos Prates

Abstract:

Several spatial variables collected at the same location that share a common spatial distribution can be modeled simultaneously through a multivariate geostatistical model that takes into account the correlation between these variables and the spatial autocorrelation. The main goal of this model is to perform spatial prediction of these variables in the region of study. Here we focus on a geostatistical multivariate formulation that relies on sharing common spatial random effect terms. In particular, the first response variable can be modeled by a mean that incorporates a shared random spatial effect, while the other response variables depend on this shared spatial term, in addition to specific random spatial effects. Each spatial random effect is defined through a Gaussian process with a valid covariance function, but in order to improve the computational efficiency when the data are large, each Gaussian process is approximated to a Gaussian random Markov field (GRMF), specifically to the block nearest neighbor Gaussian process (Block-NNGP). This approach involves dividing the spatial domain into several dependent blocks under certain constraints, where the cross blocks allow capturing the spatial dependence on a large scale, while each individual block captures the spatial dependence on a smaller scale. The multivariate geostatistical model belongs to the class of Latent Gaussian Models; thus, to achieve fast Bayesian inference, it is used the integrated nested Laplace approximation (INLA) method. The good performance of the proposed model is shown through simulations and applications for massive data.

Keywords: Block-NNGP, geostatistics, gaussian process, GRMF, INLA, multivariate models.

Procedia PDF Downloads 92
3800 Study Variation of Blade Angle on the Performance of the Undershot Waterwheel on the Pico Scale

Authors: Warjito, Kevin Geraldo, Budiarso, Muhammad Mizan, Rafi Adhi Pranata, Farhan Rizqi Syahnakri

Abstract:

According to data from 2021, the number of households in Indonesia that have access to on-grid electricity is claimed to have reached 99.28%, which means that around 0.7% of Indonesia's population (1.95 million people) still have no proper access to electricity and 38.1% of it comes from remote areas in Nusa Tenggara Timur. Remote areas are classified as areas with a small population of 30 to 60 families, have limited infrastructure, have scarce access to electricity and clean water, have a relatively weak economy, are behind in access to technological innovation, and earn a living mostly as farmers or fishermen. These people still need electricity but can’t afford the high cost of electricity from national on-grid sources. To overcome this, it is proposed that a hydroelectric power plant driven by a pico-hydro turbine with an undershot water wheel will be a suitable pico-hydro turbine technology because of the design, materials and installation of the turbine that is believed to be easier (i.e., operational and maintenance) and cheaper (i.e., investment and operating costs) than any other type. The comparative study of the angle of the undershot water wheel blades will be discussed comprehensively. This study will look into the best variation of curved blades on an undershot water wheel that produces maximum hydraulic efficiency. In this study, the blade angles were varied by 180 ̊, 160 ̊, and 140 ̊. Two methods of analysis will be used, which are analytical and numerical methods. The analytical method will be based on calculations of the amount of torque and rotational speed of the turbine, which is used to obtain the input and output power of the turbine. Whereas the numerical method will use the ANSYS application to simulate the flow during the collision with the designed turbine blades. It can be concluded, based on the analytical and numerical methods, that the best angle for the blade is 140 ̊, with an efficiency of 43.52% for the analytical method and 37.15% for the numerical method.

Keywords: pico hydro, undershot waterwheel, blade angle, computational fluid dynamics

Procedia PDF Downloads 73
3799 Urban Retrofitting Application Based on Social-Media to Model the Malioboro Smart Central Business Design through Statistical Regression Approach

Authors: Muhammad Hardyan Prastyanto, Aisah Azhari Marwangi, Yulinda Rizky Pratiwi

Abstract:

Globalization has become a driving force for the current technological developments. The presence of the Virtual Space provides opportunities for people to self-actualization through access to a wider world, quickly and easily. Cities that are part of the existence of life, witness the history of civilization over time, also has been the major object to upgrading on technological sector. A smart city is one where the government and citizenry are using the best available means, including ICT, to achieve their shared goals. This often includes economic development, environmental sustainability, and improved quality of life for citizens. Thus theory is the basis for research of this study. This study aimed to know the implementation of the Urban Retrofitting at Malioboro area based on Information and Communication Technologies. The method of this study is by reviewing the effectiveness of the E-commerce uses as a major system to identification the Malioboro Smart Central Business District. By using a significance level of 5 %, it can be concluded that addresses have a significant influence on the ratings obtained, namely regarding the location of the hotel establishment. But despite the use of the website does not have a significant influence on the rating of the hotel, using the website still has influence significantly on the rating, because the p -value (Sig.) of the variable website is not so much different from the significance level determined by the researcher. In the interpretation, if a hotel is located on the Pasar Kembang streets and not to use the website, so the hotel is likely to have a rating of the constant value which is 3.183. However, if a hotel located on the Sosrowijayan streets, so the hotel rating will be increased by 0,302. Then if a hotel has been using a website, so the hotel rating will increase by 0,264. It is possible to conclude the effectiveness of ICT’s (Website) uses and location to identification the urban retrofitting through increasing of building rating in Malioboro Central Business District.

Keywords: urban retrofitting, e-commerce, information and communication technology, statistic regression, SCBD, Malioboro

Procedia PDF Downloads 296
3798 Short Teaching Sessions for Emergency Front of Neck Access

Authors: S. M. C. Kelly, A. Hargreaves, S. Hargreaves

Abstract:

Introduction: The Can’t intubate, Can’t ventilate emergency scenario is one which has been shown to be managed badly in the past. Reasons identified included gaps in knowledge of the procedure and the emergency equipment used. We aimed to show an increase in confidence amongst anesthetists and operating department practitioners in the technique following a short tea trolley style teaching intervention. Methods: We carried out the teaching on a one-to-one basis. Two Anaesthetists visited each operating theatre during normal working days. One carried out the teaching session and one took over the intra‐operative care of the patient, releasing the listed anaesthetist for a short teaching session. The teaching was delivered to mixture of students and healthcare professionals, both anaesthetists and anaesthetic practitioners. The equipment includes a trolley, an airway manikin, size 10 scalpel, bougie and size 6.0 tracheal tube. The educator discussed the equipment, performed a demonstration and observed the participants performing the procedure. We asked each person to fill out a pre and post teaching questionnaire, stating their confidence with the procedure. Results: The teaching was delivered to 63 participants in total, which included 21 consultant anaesthetists, 23 trainee doctors and 19 anaesthetic practitioners. The teaching sessions lasted on average 9 minutes (range 5– 15 minutes). All participants reported an increase in confidence in both the equipment and technique in front of neck access. Anaesthetic practitioners reported the greatest increase in confidence (53%), with trainee anaesthetists reporting 27% increase and consultant anaesthetists 22%. Overall, confidence in the performance of emergency front of neck access increased by 31% after the teaching session. Discussion: Short ‘Trolley style’ teaching improves confidence in the equipment and technique used for the emergency front of neck access. This is true for students and for consultant anaesthetists. This teaching style is quick with minimal running costs and is relevant for all anesthetic departments.

Keywords: airway teaching, can't intubate can't ventilate, cricothyroidotomy, front-of-neck

Procedia PDF Downloads 146
3797 Resources-Based Ontology Matching to Access Learning Resources

Authors: A. Elbyed

Abstract:

Nowadays, ontologies are used for achieving a common understanding within a user community and for sharing domain knowledge. However, the de-centralized nature of the web makes indeed inevitable that small communities will use their own ontologies to describe their data and to index their own resources. Certainly, accessing to resources from various ontologies created independently is an important challenge for answering end user queries. Ontology mapping is thus required for combining ontologies. However, mapping complete ontologies at run time is a computationally expensive task. This paper proposes a system in which mappings between concepts may be generated dynamically as the concepts are encountered during user queries. In this way, the interaction itself defines the context in which small and relevant portions of ontologies are mapped. We illustrate application of the proposed system in the context of Technology Enhanced Learning (TEL) where learners need to access to learning resources covering specific concepts.

Keywords: resources query, ontologies, ontology mapping, similarity measures, semantic web, e-learning

Procedia PDF Downloads 309
3796 An Analysis of a Canadian Personalized Learning Curriculum

Authors: Ruthanne Tobin

Abstract:

The shift to a personalized learning (PL) curriculum in Canada represents an innovative approach to teaching and learning that is also evident in various initiatives across the 32-nation OECD. The premise behind PL is that empowering individual learners to have more input into how they access and construct knowledge, and express their understanding of it, will result in more meaningful school experiences and academic success. In this paper presentation, the author reports on a document analysis of the new curriculum in the province of British Columbia. Three theoretical frameworks are used to analyze the new curriculum. Framework 1 focuses on five dominant aspects (FDA) of PL at the classroom level. Framework 2 focuses on conceptualizing and enacting personalized learning (CEPL) within three spheres of influence. Framework 3 focuses on the integration of three types of knowledge (content, technological, and pedagogical). Analysis is ongoing, but preliminary findings suggest that the new curriculum addresses framework 1 quite well, which identifies five areas of personalized learning: 1) assessment for learning; 2) effective teaching and learning; 3) curriculum entitlement (choice); 4) school organization; and 5) “beyond the classroom walls” (learning in the community). Framework 2 appears to be less well developed in the new curriculum. This framework speaks to the dynamics of PL within three spheres of interaction: 1) nested agency, comprised of overarching constraints [and enablers] from policy makers, school administrators and community; 2) relational agency, which refers to a capacity for professionals to develop a network of expertise to serve shared goals; and 3) students’ personalized learning experience, which integrates differentiation with self-regulation strategies. Framework 3 appears to be well executed in the new PL curriculum, as it employs the theoretical model of technological, pedagogical content knowledge (TPACK) in which there are three interdependent bodies of knowledge. Notable within this framework is the emphasis on the pairing of technologies with excellent pedagogies to significantly assist students and teachers. This work will be of high relevance to educators interested in innovative school reform.

Keywords: curriculum reform, K-12 school change, innovations in education, personalized learning

Procedia PDF Downloads 277
3795 Managers’ Mobile Information Behavior in an Openness Paradigm Era

Authors: Abd Latif Abdul Rahman, Zuraidah Arif, Muhammad Faizal Iylia, Mohd Ghazali, Asmadi Mohammed Ghazali

Abstract:

Mobile information is a significant access point for human information activities. Theories and models of human information behavior have developed over several decades but have not yet considered the role of the user’s computing device in digital information interactions. This paper reviews the literature that leads to developing a conceptual framework of a study on the managers mobile information behavior. Based on the literature review, dimensions of mobile information behavior are identified, namely, dimension information needs, dimension information access, information retrieval and dimension of information use. The study is significant to understand the nature of librarians’ behavior in searching, retrieving and using information via the mobile device. Secondly, the study would provide suggestions about various kinds of mobile applications which organization can provide for their staff to improve their services.

Keywords: mobile information behavior, information behavior, mobile information, mobile devices

Procedia PDF Downloads 343
3794 Synthetic Access to Complex Metal Carbonates and Hydroxycarbonates via Sol-Gel Chemistry

Authors: Schirin Hanf, Carlos Lizandara-Pueyo, Timmo P. Emmert, Ivana Jevtovikj, Roger Gläser, Stephan A. Schunk

Abstract:

Metal alkoxides are very versatile precursors for a broad array of complex functional materials. However, metal alkoxides, especially transition metal alkoxides, tend to form oligomeric structures due to the very strong M–O–M binding motif. This fact hinders their facile application in sol-gel-processes and complicates access to complex carbonate or oxidic compounds after hydrolysis of the precursors. Therefore, the development of a synthetic alternative with the aim to grant access to carbonates and hydroxycarbonates from simple metal alkoxide precursors via hydrolysis is key to this project. Our approach involves the reaction of metal alkoxides with unsaturated isoelectronic molecules, such as carbon dioxide. Subsequently, a stoichiometric insertion of the CO₂ into the alkoxide M–O bond takes place and leads to the formation of soluble metal alkyl carbonates. This strategy is a very elegant approach to solubilize metal alkoxide precursors to make them accessible for sol-gel chemistry. After hydrolysis of the metal alkyl carbonates, crystalline metal carbonates, and hydroxycarbonates can be obtained, which were then utilized for the synthesis of Cu/Zn based bulk catalysts for methanol synthesis. Using these catalysts, a comparable catalytic activity to commercially available MeOH catalysts could be reached. Based on these results, a complement for traditional precipitation techniques, which are usually utilized for the synthesis of bulk methanol catalysts, have been found based on an alternative solubilization strategy.

Keywords: metal alkoxides, metal carbonates, metal hydroxycarbonates, CO₂ insertion, solubilization

Procedia PDF Downloads 182
3793 A Review of Farmer Participation in Information and Communication Technology through Mobile Banking and Mobile Marketing in Rural Agricultural Systems

Authors: J. Cadby, K. Miyazawa

Abstract:

Information and Communication Technology (ICT) has been widely adopted into the agricultural landscape with advancements of mobile connectivity and data accessibility. In developed nations, mobile-technology is well integrated into marketing transactions, and also plays a crucial role in making data-driven decisions on-farm. In developing nations, mobile banking and access to agricultural extension services allow for informed decision-making and smoother transactions. In addition, the availability of updated and readily available market and climate data provides a negotiation platform, reducing economic risks for farmers worldwide. The total usage of mobile technology has risen over the past 20 years, and almost three-quarters of the world’s population subscribes to mobile technology. This study reviewed mobile technology integration into agricultural systems in developing and developed nations. Data from secondary sources were collected and investigated. The objectives of the study include a review of the success of mobile banking transactions in developing nations, and a review of application and SMS based services for direct marketing in both developed and developing nations. Rural farmers in developing countries with access to diverse m-banking options experienced increased access to farm investment resources with the use of mobile banking technology. Rural farmers involved in perishable crop production were also more likely to benefit from mobile platform sales participation. ICT programs reached through mobile application and SMS increased access to agricultural extension materials and marketing tools for demographics that faced literacy-challenges and isolated markets. As mobile technology becomes more ubiquitous in the global agricultural system, training and market opportunities to facilitate mobile usage in developing agricultural systems are necessary. Digital skills training programs are necessary in order to improve equal global adoption of ICT in agriculture.

Keywords: market participation, mobile banking, mobile technology, rural farming

Procedia PDF Downloads 251
3792 Redesigning Clinical and Nursing Informatics Capstones

Authors: Sue S. Feldman

Abstract:

As clinical and nursing informatics mature, an area that has gotten a lot of attention is the value capstone projects. Capstones are meant to address authentic and complex domain-specific problems. While capstone projects have not always been essential in graduate clinical and nursing informatics education, employers are wanting to see evidence of the prospective employee's knowledge and skills as an indication of employability. Capstones can be organized in many ways: a single course over a single semester, multiple courses over multiple semesters, as a targeted demonstration of skills, as a synthesis of prior knowledge and skills, mentored by one single person or mentored by various people, submitted as an assignment or presented in front of a panel. Because of the potential for capstones to enhance the educational experience, and as a mechanism for application of knowledge and demonstration of skills, a rigorous capstone can accelerate a graduate's potential in the workforce. In 2016, the capstone at the University of Alabama at Birmingham (UAB) could feel the external forces of a maturing Clinical and Nursing Informatics discipline. While the program had a capstone course for many years, it was lacking the depth of knowledge and demonstration of skills being asked for by those hiring in a maturing Informatics field. Since the program is online, all capstones were always in the online environment. While this modality did not change, other contributors to instruction modality changed. Pre-2016, the instruction modality was self-guided. Students checked in with a single instructor, and that instructor monitored progress across all capstones toward a PowerPoint and written paper deliverable. At the time, the enrollment was few, and the maturity had not yet pushed hard enough. By 2017, doubling enrollment and the increased demand of a more rigorously trained workforce led to restructuring the capstone so that graduates would have and retain the skills learned in the capstone process. There were three major changes: the capstone was broken up into a 3-course sequence (meaning it lasted about 10 months instead of 14 weeks), there were many chunks of deliverables, and each faculty had a cadre of about 5 students to advise through the capstone process. Literature suggests that the chunking, breaking up complex projects (i.e., the capstone in one summer) into smaller, more manageable chunks (i.e., chunks of the capstone across 3 semesters), can increase and sustain learning while allowing for increased rigor. By doing this, the teaching responsibility was shared across faculty with each semester course being taught by a different faculty member. This change facilitated delving much deeper in instruction and produced a significantly more rigorous final deliverable. Having students advised across the faculty seemed like the right thing to do. It not only shared the load, but also shared the success of students. Furthermore, it meant that students could be placed with an academic advisor who had expertise in their capstone area, further increasing the rigor of the entire capstone process and project and increasing student knowledge and skills.

Keywords: capstones, clinical informatics, health informatics, informatics

Procedia PDF Downloads 126
3791 New Media and Social Media Laws and Ethics in United Arab Emirates

Authors: Ahmed Farouk Radwan, Sheren Mousa

Abstract:

There are many laws and regulations governing the use of new and social media in the United Arab Emirates. During the past few years, the importance of using these platforms in the fields of media and government communication has increased, as well as at the level of individual use. In 2016, the National Media Council Law was issued to regulate traditional and new media field, and gave the council the power to oversee and undertake the media affairs in the state. NMC is mandated to: Develop the UAE’s media policy, Draft media legislation and ensure its execution and Prohibited media content ,Co-ordinate the media policy between the emirates in line with the UAE’s domestic and foreign policy, Ensure support for the federation and project national unity. All media organizations in the UAE must comply with the regulations and rules issued by council. Social media influencers have to be licensed by NMC if they accept paid ads to be published on their accounts. The study explores other laws concerning of new media and social media regulations and ethics including Combatting Cybercrimes law, Combating Discrimination and Hatred law, The Government Guidelines for social media users in the UAE, The Guidelines for the practices of electronic participation and social networking, Copyright Law, and Child Rights Law. The study clarifies the legal articles, items and standards in all these laws which related with the new media and social platforms and also determines the prohibited digital practices and the cultural norms governing it.

Keywords: media laws, media ethics, new media , UAE

Procedia PDF Downloads 162
3790 The Women Entrepreneur Support Fund in Bangladesh: Challenges and Prospects

Authors: Chowdhury Dilruba Shoma

Abstract:

Gender is about equal rights that both males and females having access to responsibilities and opportunities in decision making is a fundamental human right. It is also a precondition for, and a mark of, sustainable people-oriented development. In Bangladesh, women have fewer opportunities than men do to access credit from banks and financial institutions. Entrenched patriarchal attitudes, unequal inheritance rights, and male-dominated hierarchies in the financial system, plus high interest rates and a lack of security/collateral, make it harder for women to obtain bank loans. Limited access to institutional credit is a serious restraint on the productivity and income of women entrepreneurs, (and the wider economy). These gender-biased and structural barriers inhibit women’s access to fundamental economic rights. Using a liberal feminist theoretical lens, this study provides some useful insights into the relationship between gender inequality and entrepreneurship, leading to a better understanding of women’s entrepreneurship development in Bangladesh. Recently, the Bangladesh Government, the United Nations Capital Development Fund, and Bangladesh Bank opened up the Women Entrepreneur Support Fund (WESF) ‒ Credit Guarantee Scheme (CGS) pilot project to cover collateral shortfalls for women entrepreneurs in the small and medium enterprise sector. The aim is to improve gender equality and advance women’s rights in relation to receiving credit. This article examines the challenges and prospects of the WESF-CGS, and suggests that implementation of measures in WESF-CGS policymaking, coupled with a combination of legislatory and regulatory reforms that implement the fundamental tenets of liberal feminism, can lead to a comprehensive and effective credit policy to boost women’s agency and economic empowerment. This may ultimately lead to more sustainable development in Bangladesh.

Keywords: Bangladesh, credit guarantee scheme, liberal feminist theory, women entrepreneur support fund

Procedia PDF Downloads 138
3789 Exploring the Types of Infants and Toddlers' Reading Responses in Nursery Centers: A Qualitative Study

Authors: Ming Fang Hsieh

Abstract:

The purpose of this study was to investigate the reading responses of infants and toddlers across different contexts in nursery centers. The study adopted Sipe’s framework for children’s literacy education to explore the reading behavior of infants and toddlers. The study was conducted at two nurseries. The sample comprised 46 infants and toddlers and 6 caregivers. The methods of data collection included observation of various reading activities, including shared reading in a group, one-on-one reading, and unstructured reading activities, as well as interviews with caregivers. The data obtained through observations and interviews were transcribed and analyzed. The caregivers and the children’s parents signed an informed consent form before the start of the study. There was no risk anticipated during the course of the study. The analysis revealed five types of reading responses exhibited by the infants and toddlers: (1) linguistic- verbally responding to reading, repeating vocabulary, and answering questions; (2) affective- concentrating on reading or requesting for repeated reading, leaning on books, and gazing at caregivers; (3) explosive- children under 18 months were observed manipulating books through their bodies or different movements like flipping, rotating, or tapping on books; (4) social- during unstructured reading context, children were seen interacting with peers or following the rules of reading, sitting properly, and choosing one book at a time; and (5) distracted responses- paying attention to something else instead of reading, walking around, and playing, which was usually observed during shared reading in a group. The study concluded that children’s distraction and explosive reading behaviors may be a part of the process of their emergent reading behavior. As children develop, they demonstrate an increase in verbal responses, improved concentration, and better behavior. The study suggests that adults should continue to provide appropriate reading opportunities beginning from infancy to nurture children’s reading behaviors.

Keywords: reading response, infants and toddlers, early reading, picture books

Procedia PDF Downloads 102
3788 The Universal Cultural Associations in the Conceptual Metaphors Used in the Headlines of Arab News and Saudi Gazette Newspapers: A Critical Cognitive Study

Authors: Hind Hassan Arruwaite

Abstract:

Conceptual metaphor is a cognitive semantic tool that provides access to people's conceptual systems. The correlation in the human conceptual system surpasses limited time and specific cultures. The universal associations provide universal schemas that organize people's conceptualization of the world. The study aims to explore how the cultural associations used in conceptual metaphors create commonalities and harmony between people of the world. In the research methodology, the researcher implemented Critical Metaphor Analysis, Metaphor Candidate Identification and Metaphor Identification Procedure models to deliver qualitative and descriptive findings. The semantic tension was the key criterion in identifying metaphorically used words in the headlines. The research materials are the oil trade conceptual metaphors used in the headlines of Arab News and Saudi Gazette Newspapers. The data will be uploaded to the self-constructed corpus to examine electronic lists for identifying conceptual metaphors. The study investigates the types of conceptual metaphors used in the headlines of the newspapers, the cultural associations identified in the conceptual metaphors, and whether the identified cultural associations in conceptual metaphors create universal conceptual schemas. The study aligned with previous seminal works on conceptual metaphor theory in emphasizing the distinctive power of conceptual metaphors in exposing the cultural associations that unify people's perceptions. The correlation of people conceptualization provides universal schemas that involve elements of human sensorimotor experiences. The study contributes to exposing the shared cultural associations that ensure the commonality of all humankind's thinking mechanism.

Keywords: critical discourse analysis, critical metaphor analysis, conceptual metaphor theory, primary and specific metaphors, corpus-driven approach, universal associations, image schema, sensorimotor experience, oil trade

Procedia PDF Downloads 198
3787 Puerto Rico and Pittsburg: A Social Psychology Perspective on How Perceived Infringement on Job and Cultural Identity Unite Racially Different Working-Class Groups

Authors: Reagan Rodriguez

Abstract:

With a growing divide between political echo chambers in the United States, exacerbated by race and income inequality, it might seem to be unfathomable to draw connections that tie working class in an industrial city and a U.S. territory. Yet, in regions where either the economy has been hit due to dwindling job infrastructure or natural disasters have left indelible marks on an island already once marked by colonial imperialism, a larger social shared identity is at play. Fracking has long been an intergenerational and stable work opportunity for many in the Pittsburg PA, yet the rising severity of global climate change may soon impact the policy and even presidential elections which could result in the reduction of jobs in the industry. Cock-fighting, considered a cultural mainstay within the island of Puerto Rico, has already had legislation banning activity and thus cutting out one of the most lucrative aspects of a severely injured economy. Insecurity, infringement, and isolation while being tied to a working-class bracket with no other opportunities in proximity have left both groups expressing similar frustration and while another larger shared identity politic is giving little other options to develop social mobility. This paper utilizes a thematic analysis and compares convergent and divergent themes on internet forums amongst unionized fracking workers in Pittsburg and cockfighters in Puerto Rico. This research examines how group identity in relation to job and cultural identity is most strong and at which points its most malleable; when intergenerational job identity becomes a part of one’s cultural identity, its override may be strongest when it is perceived as threatened. Final findings and limitations were comprehensively outlined.

Keywords: identity threat, social psychology, group identity, culture and social mobility

Procedia PDF Downloads 145
3786 Examining the Market Challenges That Constrain the Proper Sales of Farming Produces Amongst the Small-Scale Farms

Authors: Simiso Fisokuhle Nyandeni

Abstract:

Climate change has turned out to be a pandemic that has drawn the attention of many countries’ households around the globe, especially those whose livelihood and economic status depend on agricultural productivity. Hence, the agricultural sector is regarded as the sector that is most dependent on climate conditions for its productivity/harvest, yet in recent years this sector has been experiencing drought. However, adaptation seems to be a tool that every farmer looks upon as a solution to their challenges as their productivity keeps on being vulnerable to climate effects. Thus, exposure/access to the market seems to be a major challenge that faces especially small-scale farmers. We, therefore, examine the small-scale farmers’ constraints or challenges towards getting access to the market for them to get proper sales of their farming products. As a result, the adaptation capacity of every farm household varies on the financial status.

Keywords: climate change, small-scale farming, agriculture sector, adaptation

Procedia PDF Downloads 79
3785 Efficient Position Based Operation Code Authentication

Authors: Hashim Ali, Sheheryar Khan

Abstract:

Security for applications is always been a keen issue of concern. In general, security is to allow access of grant to legal user or to deny non-authorized access to the system. Shoulder surfing is an observation technique to hack an account or to enter into a system. When a malicious observer is capturing or recording the fingers of a user while he is entering sensitive inputs (PIN, Passwords etc.) and may be able to observe user’s password credential. It is very rigorous for a novice user to prevent himself from shoulder surfing or unaided observer in a public place while accessing his account. In order to secure the user account, there are five factors of authentication; they are: “(i) something you have, (ii) something you are, (iii) something you know, (iv) somebody you know, (v) something you process”. A technique has been developed of fifth-factor authentication “something you process” to provide novel approach to the user. In this paper, we have applied position based operational code authentication in such a way to more easy and user friendly to the user.

Keywords: shoulder surfing, malicious observer, sensitive inputs, authentication

Procedia PDF Downloads 265
3784 MMSE-Based Beamforming for Chip Interleaved CDMA in Aeronautical Mobile Radio Channel

Authors: Sherif K. El Dyasti, Esam A. Hagras, Adel E. El-Hennawy

Abstract:

This paper addresses the performance of antenna array beam-forming on Chip-Interleaved Code Division Multiple Access (CI_CDMA) system based on Minimum Mean Square Error (MMSE) detector in aeronautical mobile radio channel. Multipath fading, Doppler shifts caused by the speed of the aircraft, and Multiple Access Interference (MAI) are the most important reasons that affect and reduce the performance of aeronautical system. In this paper, we suggested the CI-CDMA with antenna array to combat this fading and improve the bit error rate (BER) performance. We further evaluate the performance of the proposed system in the four standard scenarios in aeronautical mobile radio channel.

Keywords: aeronautical channel, CI-CDMA, beamforming, communication, information

Procedia PDF Downloads 413
3783 A Practice of Zero Trust Architecture in Financial Transactions

Authors: Liwen Wang, Yuting Chen, Tong Wu, Shaolei Hu

Abstract:

In order to enhance the security of critical financial infrastructure, this study carries out a transformation of the architecture of a financial trading terminal to a zero trust architecture (ZTA), constructs an active defense system for cybersecurity, improves the security level of trading services in the Internet environment, enhances the ability to prevent network attacks and unknown risks, and reduces the industry and security risks brought about by cybersecurity risks. This study introduces the SDP technology of ZTA, adapts and applies it to a financial trading terminal to achieve security optimization and fine-grained business grading control. The upgraded architecture of the trading terminal moves security protection forward to the user access layer, replaces VPN to optimize remote access, and significantly improves the security protection capability of Internet transactions. The study achieves 1. deep integration with the access control architecture of the transaction system; 2. no impact on the performance of terminals and gateways, and no perception of application system upgrades; 3. customized checklist and policy configuration; 4. introduction of industry-leading security technology such as single-packet authorization (SPA) and secondary authentication. This study carries out a successful application of ZTA in the field of financial trading and provides transformation ideas for other similar systems while improving the security level of financial transaction services in the Internet environment.

Keywords: zero trust, trading terminal, architecture, network security, cybersecurity

Procedia PDF Downloads 160
3782 How to Ensure Environmental Sustainability and Food Security through the Use of Payments for Environmental Services in Developing Countries

Authors: Carlos Alves

Abstract:

This research paper demonstrates how payments for environmental services (PES) can be an effective mechanism to combat food insecurity and reduce environmental degradation in developing countries. The paper begins by discussing how environmental services affect each one of the pillars of food security: availability, access, and utilization of food. However, due to numerous global environmental challenges, a new pillar of food security based on environmental sustainability is proposed and discussed. An argument is then made that PES can usefully combat food insecurity. It can provide an extra income to those who take on environmental service and help them to have a better access to food. In order to be successful in addressing food insecurity, PES schemes should target on the poor and redress issues that can prevent their effectiveness. Finally, the research presents a case study that discusses how several developing countries addressed problems and successfully developed PES programs.

Keywords: environmental sustainability, food security, nutrition, payments for environmental services

Procedia PDF Downloads 389
3781 A Cross-Sectional Study Assessing Communication Practices among Doctors at a University Hospital in Pakistan

Authors: Muhammad Waqas Baqai, Noman Shahzad, Rehman Alvi

Abstract:

Communication among health care givers is the essence of quality patient care and any compromise results in errors and inefficiency leading to cumbersome outcomes. The use of smartphone among health professionals has increased tremendously. Almost every health professional carries it and majority of them uses a third party communication software called whatsApp for work related communications. It gives instant access to the person responsible for any particular query and therefore helps in efficient and timely decision making. It is also an easy way of sharing medical documents, multimedia and provides platform for consensual decision making through group discussions. However clinical communication through whatsApp has some demerits too including reduction in verbal communication, worsening professional relations, unprofessional behavior, risk of confidentiality breach and threats from cyber-attacks. On the other hand the traditional pager device being used in many health care systems is a unidirectional communication that lacks the ability to convey any information other than the number to which the receiver has to respond. Our study focused on these two widely used modalities of communication among doctors of the largest tertiary care center of Pakistan i.e. The Aga Khan University Hospital. Our aim was to note which modality is considered better and has fewer threats to medical data. Approval from ethical review committee of the institute was taken prior to conduction of this study. We submitted an online survey form to all the interns and residents working at our institute and collected their response in a month’s time. 162 submissions were recorded and analyzed using descriptive statistics. Only 20% of them were comfortable with using pagers exclusively, 52% with whatsApp and 28% with both. 65% think that whatsApp is time-saving and quicker than pager. 54% of them considered whatsApp to be causing nuisance from work related notifications in their off-work hours. 60% think that they are more likely to miss information through pager system because of the unidirectional nature. Almost all (96%) of residents and interns found whatsApp to be useful in terms of saving information for future reference. For urgent issues, majority (70%) preferred pager over whatsApp and also pager was considered more valid in terms of hospital policies and legal issues. Among major advantages of whatsApp as listed by them were; easy mass communication, sharing of clinical pictures, universal access and no need of carrying additional device. However the major drawback of using whatsApp for clinical communication that everyone shared was threat to patients’ confidentiality as clinicians usually share pictures of wounds, clinical documents etc. Lastly we asked them if they think there is a need of a separate application for instant communication dedicated to clinical communication only and 90% responded positively. Therefore, we concluded that both modalities have their merits and demerits but the greatest drawback with whatsApp is the risk of breach in patients’ confidentiality and off-work disturbance. Hence, we recommend a more secure, institute-run application for all intra hospital communications where they can share documents, pictures etc. easily under a controlled environment.

Keywords: WhatsApp, pager, clinical communication, confidentiality

Procedia PDF Downloads 141
3780 Remote Monitoring and Control System of Potentiostat Based on the Internet of Things

Authors: Liang Zhao, Guangwen Wang, Guichang Liu

Abstract:

Constant potometer is an important component of pipeline anti-corrosion systems in the chemical industry. Based on Internet of Things (IoT) technology, Programmable Logic Controller (PLC) technology and database technology, this paper developed a set of a constant potometer remote monitoring management system. The remote monitoring and remote adjustment of the working status of the constant potometer are realized. The system has real-time data display, historical data query, alarm push management, user permission management, and supporting Web access and mobile client application (APP) access. The actual engineering project test results show the stability of the system, which can be widely used in cathodic protection systems.

Keywords: internet of things, pipe corrosion protection, potentiostat, remote monitoring

Procedia PDF Downloads 142
3779 A Case Study: Beginning Teacher's Experiences of Mentoring in Secondary Education

Authors: Abdul Rofiq Badril Rizal M. Z.

Abstract:

This case study examines the experiences of four beginning teachers currently working in New South Wales secondary schools. Data were collected from semi-structured interviews conducted one on one over the period of one month. The data were coded with findings reported through key areas of discovery, which linked to the research presented in the literature review. The participants involved in the case study all reported positive experiences with mentoring, though none were given the opportunity to take part in a formal mentoring program, and all the mentors offered their time voluntarily. The mentoring took different forms, but the support most valued by the participants was the emotional and curriculum related supported received. All participants wished they had greater access to mentoring and felt it would have benefits for most beginning teachers. The study highlights ongoing issues around the lack of access to mentoring, which could be due to factors such as funding, time and training.

Keywords: mentor, mentee, pre-service teacher, beginning teacher

Procedia PDF Downloads 105
3778 Digital Renaissance of African Heritage: Navigating Ownership, Representation, and Equitable Access in the Virtual Realm

Authors: Okechukwu Joshua Mba

Abstract:

The increased worldwide spending on digital transformation has changed the way audiences engage with cultural heritage. Technological capabilities are encouraging institutions and practitioners to prioritize the digitization of cultural heritage assets. Museums and educational institutions, among others, are creating engaging and sustainable digitization solutions that foster their historical legacies. However, in Africa, there are impediments to these digitization efforts. The advent of digital technologies presents unprecedented opportunities for the preservation and dissemination of African heritage, yet it also raises critical questions about ownership, representation, and access. Disputed ownership rights of cultural artifacts, inability to achieve the right representation in the digitization process, and lack of accessibility hamper the digitization of cultural heritage assets. Therefore, this study examines the ethical dimensions of digital custodianship of African heritage to ensure Indigenous rights are upheld. The representation of African heritage is scrutinized through a decolonial lens to rectify historical misrepresentations. Furthermore, we propose innovative solutions to bridge the digital divide and facilitate inclusive global engagement with digitized heritage. To advance the digital renaissance of African heritage, it is crucial to develop ethical digitization practices, foster collaboration between international and local stakeholders, and create frameworks that guarantee both the preservation of cultural integrity and broad accessibility.

Keywords: digital transformation, cultural heritage, digitization, African heritage, ownership, representation, equitable access. historical misrepresentations, inclusive engagement, local communities

Procedia PDF Downloads 26
3777 Women's Challenges in Access to Urban Spaces and Infrastructures: A Comparative Study of the Urban Infrastructures Conforming to Women's Needs in Tehran and Istanbul

Authors: Parastoo Kazemiyan

Abstract:

Over the past 80 years, in compliance with the advent of modernity in Iran and Turkey, the presence of women in economic and social arenas has creates serious challenges in the capacity of urban spaces to respond to their presence and transport because urban spaces up until then were based on masculine criteria and therefore, women could use such spaces in the company of their fathers or husbands. However, as modernity expanded by Reza Shah and Ataturk, women found the opportunity to work and be present in urban spaces alongside men and their presence in economic and social domains resulted in their presence in these spaces in the early and late hours of the day. Therefore, the city had to be transformed in structural, social, and environmental terms to accommodate women's activities and presence in various urban arenas, which was a huge step in transition from a masculine man-based culture to an all-inclusive human-based culture in these two countries. However, the optimization of urban space was subject to political changes in the two countries, leading to significant differences in designing urban spaces in Tehran and Istanbul. What shows the importance and novelty of the present study lie in the differences in urban planning and optimization in the two capital cities, which gave rise to different outcomes in desirability and quality of living in these two capital cities. Due to the importance of the topic, one of the most significant factors in desirability and acceptability of urban space for women was examined using a descriptive-analytic method based on qualitative methodology in Tehran and Istanbul. The results showed that the infrastructural factors in Istanbul, including safety of access, variety, and number of public transport modes, transparency, and supervision over public spaces have provided women with a safer and more constant presence compared to Tehran. It seems that challenges involved in providing access to urban spaces in Tehran in terms of infrastructure and function have made Tehran unable to respond to the most basic needs of its female citizens.

Keywords: gender differences, urban space security, access to transportation systems, women's challenges

Procedia PDF Downloads 123