Search results for: universal access
3581 Development of Web-Based Remote Desktop to Provide Adaptive User Interfaces in Cloud Platform
Authors: Shuen-Tai Wang, Hsi-Ya Chang
Abstract:
Cloud virtualization technologies are becoming more and more prevalent, cloud users usually encounter the problem of how to access to the virtualized remote desktops easily over the web without requiring the installation of special clients. To resolve this issue, we took advantage of the HTML5 technology and developed web-based remote desktop. It permits users to access the terminal which running in our cloud platform from anywhere. We implemented a sketch of web interface following the cloud computing concept that seeks to enable collaboration and communication among users for high performance computing. Given the development of remote desktop virtualization, it allows to shift the user’s desktop from the traditional PC environment to the cloud platform, which is stored on a remote virtual machine rather than locally. This proposed effort has the potential to positively provide an efficient, resilience and elastic environment for online cloud service. This is also made possible by the low administrative costs as well as relatively inexpensive end-user terminals and reduced energy expenses.Keywords: virtualization, remote desktop, HTML5, cloud computing
Procedia PDF Downloads 3393580 Trashing Customary International Law Comprehensive Evaluation
Authors: Hamid Vahidkia
Abstract:
Central to the World Court’s mission is the assurance of universal custom “as prove of a common hone acknowledged as law.” Understudies of the Court’s law have long been mindful that the Court has been superior at applying standard law than characterizing it. However until Nicaragua v. Joined together States, small hurt was done. For within the strongly challenged cases earlier to Nicaragua, the Court overseen to inspire commonalities in factious structure that floated its decisions toward the standard standards certain in state hone. The Court’s need of hypothetical unequivocality basically implied that a career opportunity emerged for a few eyewitnesses like me to endeavor to supply the lost hypothesis of custom.Keywords: law, international law, jurisdication, customary
Procedia PDF Downloads 623579 Causes and Consequences of Unauthorized Use of Books: Readers, Authors, and Publishers' Perspective
Authors: Arūnas Gudinavičius, Vincas Grigas
Abstract:
Purpose: The current study aims to identify and explore causes and consequences of unauthorized use of books from readers’, publishers’, and authors’ points of view. The case of Lithuania also assessed, especially historical background (banned alphabet, book smuggling, theft as the social norm in Soviet times) of the country. Design/methodology/approach: Aiming for more understanding why readers, authors and publishers are using or not using technology for unauthorized access of books, technology acceptance model approach was used, a total of 30 respondents (publishers, authors and readers) were interviewed in semi-structured face-to-face interviews and thematic analysis of collected qualitative data was conducted. Interviews were coded in English with coding software for further analysis. Findings: Findings indicate that the main cause for the unauthorized use of books is a lack of legal e-book titles and acquisition options. This mainly points at publishers, however, instead of using unauthorized sources as opportunities for author promotion or marketing, they rather concentrate on the causes of unauthorized use of books which they are not in control of, including access to unauthorized sources, habits, and economic causes. Some publishers believe that the lack of legal e-book titles is the consequence of unauthorized use of book rather than its cause. Originality: This research contributed to the body of knowledge by investigating unauthorized use of books from readers’, publishers’, and authors’ points of view which renders to have a better understanding of the causes and consequences of such behavior, as well as differences between these roles. We suggest that these causes lead to the intention to use and actual use of technology which is easier to use and which gives more perceived advantages – technology for unauthorized downloading and reading of books vs legal e-book acquisition options.Keywords: digital piracy, unauthorized access, publishing industry, book reader, intellectual property rights
Procedia PDF Downloads 1733578 Top-Down Approach for Fabricating Hematite Nanowire Arrays
Authors: Seungmin Shin, Jin-Baek Kim
Abstract:
Hematite (α-Fe2O3) has very good semiconducting properties with a band gap of 2.1 eV and is antiferromagnetic. Due to its electrochemical stability, low toxicity, wide abundance, and low-cost, hematite, it is a particularly attractive material for photoelectrochemical cells. Additionally, hematite has also found applications in gas sensing, field emission, heterogeneous catalysis, and lithium-ion battery electrodes. Here, we discovered a new universal top-down method for the synthesis of one-dimensional hematite nanowire arrays. Various shapes and lengths of hematite nanowire have been easily fabricated over large areas by sequential processes. The obtained hematite nanowire arrays are promising candidates as photoanodes in photoelectrochemical solar cells.Keywords: hematite, lithography, nanowire, top-down process
Procedia PDF Downloads 2493577 Parallel Vector Processing Using Multi Level Orbital DATA
Authors: Nagi Mekhiel
Abstract:
Many applications use vector operations by applying single instruction to multiple data that map to different locations in conventional memory. Transferring data from memory is limited by access latency and bandwidth affecting the performance gain of vector processing. We present a memory system that makes all of its content available to processors in time so that processors need not to access the memory, we force each location to be available to all processors at a specific time. The data move in different orbits to become available to other processors in higher orbits at different time. We use this memory to apply parallel vector operations to data streams at first orbit level. Data processed in the first level move to upper orbit one data element at a time, allowing a processor in that orbit to apply another vector operation to deal with serial code limitations inherited in all parallel applications and interleaved it with lower level vector operations.Keywords: Memory Organization, Parallel Processors, Serial Code, Vector Processing
Procedia PDF Downloads 2713576 Promoting Open Educational Resources (OER) in Theological/Religious Education in Nigeria
Authors: Miracle Ajah
Abstract:
One of the biggest challenges facing Theological/Religious Education in Nigeria is access to quality learning materials. For instance at the Trinity (Union) Theological College, Umuahia, it was difficult for lecturers to access suitable and qualitative materials for instruction especially the ones that would suit the African context and stimulate a deep rooted interest among the students. Some textbooks written by foreign authors were readily available in the School Library, but were lacking in the College bookshops for students to own copies. Even when the College was able to order some of the books from abroad, it did not usher in the needed enthusiasm expected from the students because they were either very expensive or very difficult to understand during private studies. So it became necessary to develop contextual materials which were affordable and understandable, though with little success. The National Open University of Nigeria (NOUN)’s innovation in the development and sharing of learning resources through its Open Course ware is a welcome development and of great assistance to students. Apart from NOUN students who could easily access the materials, many others from various theological/religious institutes across the nation have benefited immensely. So, the thesis of this paper is that the promotion of open educational resources in theological/religious education in Nigeria would facilitate a better informed/equipped religious leadership, which would in turn impact its adherents for a healthier society and national development. Adopting a narrative and historical approach within the context of Nigeria’s educational system, the paper discusses: educational traditions in Nigeria; challenges facing theological/religious education in Nigeria; and benefits of open educational resources. The study goes further to making recommendations on how OER could positively influence theological/religious education in Nigeria. It is expected that theologians, religious educators, and ODL practitioners would find this work very useful.Keywords: OER, theological education, religious education, Nigeria
Procedia PDF Downloads 3463575 In Vitro Studies on Antimicrobial Activities of Lactic Acid Bacteria Isolated from Fresh Fruits for Biocontrol of Pathogens
Authors: Okolie Pius Ifeanyi, Emerenini Emilymary Chima
Abstract:
Aims: The study investigated the diversity and identities of Lactic Acid Bacteria (LAB) isolated from different fresh fruits using Molecular Nested PCR analysis and the efficacy of cell free supernatants from Lactic Acid Bacteria (LAB) isolated from fresh fruits for in vitro control of some tomato pathogens. Study Design: Nested PCR approach was used in this study employing universal 16S rRNA gene primers in the first round PCR and LAB specific Primers in the second round PCR with the view of generating specific Nested PCR products for the LAB diversity present in the samples. The inhibitory potentials of supernatant obtained from LAB isolates of fruits origin that were molecularly characterized were investigated against some tomato phytopathogens using agar-well method with the view to develop biological agents for some tomato disease causing organisms. Methodology: Gram positive, catalase negative strains of LAB were isolated from fresh fruits on Man Rogosa and Sharpe agar (Lab M) using streaking method. Isolates obtained were molecularly characterized by means of genomic DNA extraction kit (Norgen Biotek, Canada) method. Standard methods were used for Nested Polymerase Chain Reaction (PCR) amplification targeting the 16S rRNA gene using universal 16S rRNA gene and LAB specific primers, agarose gel electrophoresis, purification and sequencing of generated Nested PCR products (Macrogen Inc., USA). The partial sequences obtained were identified by blasting in the non-redundant nucleotide database of National Center for Biotechnology Information (NCBI). The antimicrobial activities of characterized LAB against some tomato phytopathogenic bacteria which include (Xanthomonas campestries, Erwinia caratovora, and Pseudomonas syringae) were obtained by using the agar well diffusion method. Results: The partial sequences obtained were deposited in the database of National Centre for Biotechnology Information (NCBI). Isolates were identified based upon the sequences as Weissella cibaria (4, 18.18%), Weissella confusa (3, 13.64%), Leuconostoc paramensenteroides (1, 4.55%), Lactobacillus plantarum (8, 36.36%), Lactobacillus paraplantarum (1, 4.55%) and Lactobacillus pentosus (1, 4.55%). The cell free supernatants of LAB from fresh fruits origin (Weissella cibaria, Weissella confusa, Leuconostoc paramensenteroides, Lactobacillus plantarum, Lactobacillus paraplantarum and Lactobacillus pentosus) can inhibits these bacteria by creating clear zones of inhibition around the wells containing cell free supernatants of the above mentioned strains of lactic acid bacteria. Conclusion: This study shows that potentially LAB can be quickly characterized by molecular methods to specie level by nested PCR analysis of the bacteria isolate genomic DNA using universal 16S rRNA primers and LAB specific primer. Tomato disease causing organisms can be most likely biologically controlled by using extracts from LAB. This finding will reduce the potential hazard from the use of chemical herbicides on plant.Keywords: nested pcr, molecular characterization, 16s rRNA gene, lactic acid bacteria
Procedia PDF Downloads 4143574 Enhancing Accessibility to Sexual and Reproductive Health Services and Rights: Inclusive Access Among Teen Mothers in Rwamagana District, Rwanda
Authors: Bagweneza Vedaste, Rugema Joselyne, Twagirayezu Innocent, Nikuze Bellancille, Nyirazigama Alice, Ishimwe Bazakare Marie Laetitia, Kaberuka Gerard, Mukeshimana Madeleine
Abstract:
Background: Teen pregnancies have dramatically increased across the country in the past few years. Teen mothers usually face difficulties accessing the reproductive health (RH) services due to different reasons that include fear of getting discriminated or seen by other people. Some teen mothers do not also know their rights regarding the RH services, and they sometimes get discriminated. Little is known in Rwanda regarding how these teen mothers access the RH services compared to the general population, and views of teen mothers on their rights to access these services have not been clearly documented in the country. Specific Aims: To explore baseline information about SRH services among teen mothers; to explore factors that contribute to the use of SRH services among teen mothers; to identify strategies to increase awareness on SRHR (Sexual and Reproductive Health and Rights) among teen mothers in targeted area; and to explore views of teen mothers on rights for SRH services. Research design/Methodology: The qualitative exploratory descriptive research will be used among the teen mothers in five selected health centers of Rwamagana district. The study will use the qualitative descriptive study design. Setting: The study will be conducted in five selected health centers of Rwamagana district, which has been chosen due to a higher number of adolescent pregnancies in Eastern Province according to the DHS 2019-2020. Participants: The participants in this study will be teenage mothers who conceived after turning 11 but have delivered before turning 19. As the upper age for teenage is 19 years, this means that the researchers anticipated that those conceiving at 19 years may deliver in their twenties, which was the upper age limit in this study. Data collection measures: A semi-structured interview guide will be used to gather information from the respondents in focus group discussions. Significance: The findings of this study will provide a picture regarding the access of teen mothers to SRHS and their rights to SRH services. They will increase their awareness regarding SRH services and rights. Finally, the findings may help to address barriers faced by teen mothers to reach, pay and utilize SRHS.Keywords: sexual and reproductive health services, inclusiveness, qualitative study, adolescent mothers
Procedia PDF Downloads 633573 Telecom Infrastructure Outsourcing: An Innovative Approach
Authors: Irfan Zafar
Abstract:
Over the years the Telecom Industry in the country has shown a lot of progress in terms of infrastructure development coupled with the availability of telecom services. This has however led to the cut throat completion among various operators thus leading to reduced tariffs to the customers. The profit margins have seen a reduction thus leading the operators to think of other avenues by adopting new models while keeping the quality of service intact. The outsourcing of the network and the resources is one such model which has shown promising benefits which includes lower costs, less risk, higher levels of customer support and engagement, predictable expenses, access to the emerging technologies, benefiting from a highly skilled workforce, adaptability, focus on the core business while reducing capital costs. A lot of research has been done on outsourcing in terms of reasons of outsourcing and its benefits. However this study is an attempt to analyze the effects of the outsourcing on an organizations performance (Telecommunication Sector) considering the variables (1) Cost Reduction (2) Organizational Performance (3) Flexibility (4) Employee Performance (5) Access to Specialized Skills & Technology and the (6) Outsourcing Risks.Keywords: outsourcing, ICT, telecommunication, IT, networking
Procedia PDF Downloads 3993572 Disability and Sexuality: A Human Right Approach to Sexual and Reproductive Health of the Hearing Impaired Adolescents In Developing Countries
Authors: Doctor Akanle Florence Foluso
Abstract:
Access to health care and people’s ability to having a responsible, satisfying and safe sexual life is clearly a defined human right of people with hearing impairment and others with disabilities this paper looks at disability and sexuality: a human right approach to sexual and reproductive health of the hearing impaired adolescents in developing countries. This paper investigates the extent to which the hearing impaired has a satisfying, safe sexual life and whether their human right in regards to information education is violated. The study population consists of all hearing impaired adolescents and young adults aged 10-24 years who are currently enrolled in the primary and secondary schools in Nigeria. A sample of 389 hearing impaired adolescents was selected, an adapted version of the illustrative questionnaire for interview – survey by Johncleland was used to collect the data. A correlation of 0.80 was obtained at p<0.05 level of significance. Teachers in the schools of the deaf who used sign language were used in the administration of the questionnaire. The data generated were analyzed using Frequency Counts, Percentages, Means and Standard Deviation to give a Summary on responses on access to information, education, voluntary testing and counselling and other reproductive services. This is to investigate if the sexual and reproductive right violated or protected. Findings show that a gap exists in the level of knowledge of SRH services, voluntary counselling because more than half the respondents are not aware of these services in their community. Access to information, education and health services are rights denied the hearing impaired. So their SRH rights are violated.Keywords: sexual right diability, family planning, pregnancy, diability
Procedia PDF Downloads 673571 The Concept of Birthday: A Theoretical, Historical, and Social Overview, in Judaism and Other Cultures
Authors: Orly Redlich
Abstract:
In the age of social distance, which has been added to an individual and competitive worldview, it has become important to find a way to promote closeness and personal touch. The sense of social belonging and the existence of positive interaction with others have recently become a considerable necessity. Therefore, this theoretical paper will review one of the familiar and common concepts among different cultures around the world – birthday. This paper has a theoretical contribution that deepens the understanding of the birthday concept. Birthday rituals are historical and universal events, which noted since the prehistoric eras. In ancient history, birthday rituals were solely reserved for kings and nobility members, but over the years, birthday celebrations have evolved into a worldwide tradition. Some of the familiar birthday customs and symbols are currently common among most cultures, while some cultures have adopted for themselves unique birthday customs, which characterized their values and traditions. The birthday concept has a unique significance in Judaism as well, historically, religiously, and socially: It is considered as a lucky day and a private holiday for the celebrant. Therefore, the present paper reviews diverse birthday customs around the world in different cultures, including Judaism, and marks important birthdays throughout history. The paper also describes how the concept of birthday appears over the years in songs, novels, and art, and presents quotes from distinguished sages. The theoretical review suggests that birthday has a special meaning as a time-mark in the cycle of life, and as a socialization means in human development. Moreover, the birthday serves as a symbol of belonging and group cohesiveness, a day in which the celebrant's sense of belonging and sense of importance are strengthened and nurtured. Thus, the reappearance of these elements in a family or group interaction during the birthday ceremony allows the celebrant to absorb positive impressions about himself. In view of the extensive theoretical review, it seems that the unique importance of birthdays can serve as the foundation for intervention programs that may affect the participants’ sense of belonging and empowerment. In the group aspect, perhaps it can also yield therapeutic factors within a group. Concrete recommendations are presented at the end of the paper.Keywords: birthday, universal events, positive interaction, group cohesiveness, rituals
Procedia PDF Downloads 1433570 The Lexical Eidos as an Invariant of a Polysemantic Word
Authors: S. Pesina, T. Solonchak
Abstract:
Phenomenological analysis is not based on natural language, but ideal language which is able to be a carrier of ideal meanings – eidos representing typical structures or essences. For this purpose, it’s necessary to release from the spatio-temporal definiteness of a subject and then state its noetic essence (eidos) by means of free fantasy generation. Herewith, as if a totally new objectness is created - the universal, confirming the thesis that thinking process takes place in generalizations passing by numerous means through the specific to the general and from the general through the specific to the singular.Keywords: lexical eidos, phenomenology, noema, polysemantic word, semantic core
Procedia PDF Downloads 2773569 The Impact of Resettlement Challenges in Seeking Employment on the Mental Health and Well-Being of African Refugee Youth in South Australia
Authors: Elvis Munyoka
Abstract:
While the number of African refugees settling in Australia has significantly increased since the mid-1990s, the marginalisation and exclusion of young people from refugee backgrounds in employment remain a critical challenge. Unemployment or underemployment can negatively impact refugees in multiple areas, such as income, housing, life satisfaction, and social status. Higher rates of unemployment among refugees are linked in part to the intersection of pre-migration and daily challenges like trauma, racism, gender identity, and English language competency, all of which generate multiple employability disadvantages. However, the intersection of gender, race, social class, and age in impacting African refugee youth’s access to employment has received less attention. Using a qualitative case study approach, the presentation will explore how gender, race, social class, and age influence African refugee youth graduates’ access to employment in South Australia. The intersectionality theory and capability approach to social justice is used to explore intersecting factors impacting African refugee youth’s access to employment in South Australia. Participants were 16 African refugee graduates aged 18-30 living in South Australia who took part in the study for one year. Based on the trends in the data, the results suggest that long-term unemployment and underemployment, coupled with ongoing racism and marginalisation, have the potential to make refugees more vulnerable to several mental disorders such as depression, hopelessness, and suicidal thoughts. The analysis also reveals that resettlement challenges may limit refugees’ ability to recover from pre-migration trauma. The impact of resettlement challenges on refugee mental health highlights the need for comprehensive policy interventions to address the barriers refugees face in finding employment in resettlement communities. With African refugees constituting such an important part of Australian society, they should have equal access to meaningful employment, as decent work promotes good mental health, successful resettlement, hope, and self-sufficiency.Keywords: African refugees, employment, mental health, Australia, underemployment
Procedia PDF Downloads 1033568 Literacy Practices in Immigrant Detention Centers: A Conceptual Exploration of Access, Resistance, and Connection
Authors: Mikel W. Cole, Stephanie M. Madison, Adam Henze
Abstract:
Since 2004, the U.S. immigrant detention system has imprisoned more than five million people. President John F. Kennedy famously dubbed this country a “Nation of Immigrants.” Like many of the nation’s imagined ideals, the historical record finds its practices have never lived up to the tenets championed as defining qualities.The United Nations High Commission on Refugees argues the educational needs of people in carceral spaces, especially those in immigrant detention centers, are urgent and supported by human rights guarantees. However, there is a genuine dearth of literacy research in immigrant detention centers, compounded by a general lack of access to these spaces. Denying access to literacy education in detention centers is one way the history of xenophobic immigration policy persists. In this conceptual exploration, first-hand accounts from detained individuals, their families, and the organizations that work with them have been shared with the authors. In this paper, the authors draw on experiences, reflections, and observations from serving as volunteers to develop a conceptual framework for the ways in which literacy practices are enacted in detention centers. Literacy is an essential tool for accessing those detained in immigrant detention centers and a critical tool for those being detained to access legal and other services. One of the most striking things about the detention center is how to behave; gaining access for a visit is neither intuitive nor straightforward. The men experiencing detention are also at a disadvantage. The lack of access to their own documents is a profound barrier to men navigating the complex immigration process. Literacy is much more than a skill for gathering knowledge or accessing carceral spaces; literacy is fundamentally a source of personal empowerment. Frequently men find a way to reclaim their sense of dignity through work on their own terms by exchanging their literacy services for products or credits at the commissary. They write cards and letters for fellow detainees, read mail, and manage the exchange of information between the men and their families. In return, the men who have jobs trade items from the commissary or transfer money to the accounts of the men doing the reading, writing, and drawing. Literacy serves as a form of resistance by providing an outlet for productive work. At its core, literacy is the exchange of ideas between an author and a reader and is a primary source of human connection for individuals in carceral spaces. Father’s Day and Christmas are particularly difficult at detention centers. Men weep when speaking about their children and the overwhelming hopelessness they feel by being separated from them. Yet card-writing campaigns have provided these men with words of encouragement as thousands of hand-written cards make their way to the detention center. There are undoubtedly more literacies being practiced in the immigrant detention center where we work and at other detention centers across the country, and these categories are early conceptions with which we are still wrestling.Keywords: detention centers, education, immigration, literacy
Procedia PDF Downloads 1283567 Cross-Sectional Study Investigating the Prevalence of Uncorrected Refractive Error and Visual Acuity through Mobile Vision Screening in the Homeless in Wales
Authors: Pakinee Pooprasert, Wanxin Wang, Tina Parmar, Dana Ahnood, Tafadzwa Young-Zvandasara, James Morgan
Abstract:
Homelessness has been shown to be correlated to poor health outcomes, including increased visual health morbidity. Despite this, there are relatively few studies regarding visual health in the homeless population, especially in the UK. This research aims to investigate visual disability and access barriers prevalent in the homeless population in Cardiff, South Wales. Data was collected from 100 homeless participants in three different shelters. Visual outcomes included near and distance visual acuity as well as non-cycloplegic refraction. Qualitative data was collected via a questionnaire and included socio-demographic profile, ocular history, subjective visual acuity and level of access to healthcare facilities. Based on the participants’ presenting visual acuity, the total prevalence of myopia and hyperopia was 17.0% and 19.0% respectively based on spherical equivalent from the eye with the greatest absolute value. The prevalence of astigmatism was 8.0%. The mean absolute spherical equivalent was 0.841D and 0.853D for right and left eye respectively. The number of participants with sight loss (as defined by VA= 6/12-6/60 in the better-seeing eye) was 27.0% in comparison to 0.89% and 1.1% in the general Cardiff and Wales population respectively (p-value is < 0.05). Additionally, 1.0% of the homeless subjects were registered blind (VA less than 3/60), in comparison to 0.17% for the national consensus after age standardization. Most participants had good knowledge regarding access to prescription glasses and eye examination services. Despite this, 85.0% never had their eyes examined by a doctor and 73.0% had their last optometrist appointment in more than 5 years. These findings suggested that there was a significant disparity in ocular health, including visual acuity and refractive error amongst the homeless in comparison to the general population. Further, the homeless were less likely to receive the same level of support and continued care in the community due to access barriers. These included a number of socio-economic factors such as travel expenses and regional availability of services, as well as administrative shortcomings. In conclusion, this research demonstrated unmet visual health needs within the homeless, and that inclusive policy changes may need to be implemented for better healthcare outcomes within this marginalized community.Keywords: homelessness, refractive error, visual disability, Wales
Procedia PDF Downloads 1723566 The Cloud Systems Used in Education: Properties and Overview
Authors: Agah Tuğrul Korucu, Handan Atun
Abstract:
Diversity and usefulness of information that used in education are have increased due to development of technology. Web technologies have made enormous contributions to the distance learning system especially. Mobile systems, one of the most widely used technology in distance education, made much easier to access web technologies. Not bounding by space and time, individuals have had the opportunity to access the information on web. In addition to this, the storage of educational information and resources and accessing these information and resources is crucial for both students and teachers. Because of this importance, development and dissemination of web technologies supply ease of access to information and resources are provided by web technologies. Dynamic web technologies introduced as new technologies that enable sharing and reuse of information, resource or applications via the Internet and bring websites into expandable platforms are commonly known as Web 2.0 technologies. Cloud systems are one of the dynamic web technologies that defined as a model provides approaching the demanded information independent from time and space in appropriate circumstances and developed by NIST. One of the most important advantages of cloud systems is meeting the requirements of users directly on the web regardless of hardware, software, and dealing with install. Hence, this study aims at using cloud services in education and investigating the services provided by the cloud computing. Survey method has been used as research method. In the findings of this research the fact that cloud systems are used such studies as resource sharing, collaborative work, assignment submission and feedback, developing project in the field of education, and also, it is revealed that cloud systems have plenty of significant advantages in terms of facilitating teaching activities and the interaction between teacher, student and environment.Keywords: cloud systems, cloud systems in education, online learning environment, integration of information technologies, e-learning, distance learning
Procedia PDF Downloads 3493565 From Madrassah to Elite Schools; The Political Economy of Pluralistic Educational Systems in Pakistan
Authors: Ahmad Zia
Abstract:
This study problematizes the notion that the pluralistic educational system in Pakistan fosters equality. Instead, it argues that this system not only reflects but also sustains existing class divisions, with implications for the future economic and social mobility of children. The primary goal of this study is to explore unequal access to educational opportunities in Pakistan. By examining the intersection between education and socioeconomic status, it attempts to explore the implications of key disparities in different tiers of education systems in Pakistan like between madrassahs, public schools and private schools, with an emphasis on how these institutions contribute to the maintenance of class hierarchies. This is a primary data based case study and the most recent data has been directly gathered Qualitative methods have been used to collect data from the units of data collection (UDCs). it have used Bourdieu’s theory as a leading framework. Its application in the context of country like Pakistan is very productive. it choose the thematic analysis method to analyse the data. This process helped me to identify relevant main themes and subthemes emerging from my data, which could comprise my analysis. Findings reveal that the educational landscape in Pakistan is deeply divided having far-reaching implications for social mobility and access to opportunities. This study found profound disparities among various educational institutions with respect to widening socioeconomic divides. Every kind of educational institution operates in a distinct socio-cultural and economic environment. Therefore, access to quality education is highly stratified and remains a privilege for only those who can afford it. This widens the socioeconomic gap that already exists. There has not been an extensive investigation of the relationship between pluralistic educations with class stratification in the literature so far. This study adds to a multifaceted understanding of educational disparities in Pakistan by analysing the intersections between socioeconomic divisions and educational access. It offers valuable theoretical and practical insights into the subject. This study provides theoretical concepts and empirical data to enhance scholars' understanding of socioeconomic inequality, specifically in relation to education systems.Keywords: social inequality, pluralism, class divide, capitalism, globalisation, elitism, education
Procedia PDF Downloads 163564 The Impact of Resettlement Challenges in Seeking Employment on the Mental Health and Well-Being of African Refugee Youth in South Australia
Authors: Elvis Munyoka
Abstract:
While the number of African refugees settling in Australia has significantly increased since the mid-1990s, the marginalisation and exclusion of young people from refugee backgrounds in employment remain a critical challenge. Unemployment or underemployment can negatively impact refugees in multiple areas, such as income, housing, life satisfaction, and social status. Higher rates of unemployment among refugees are linked in part to the intersection of pre-migration and daily challenges like trauma, racism, gender identity, and English language competency, all of which generate multiple employability disadvantages. However, the intersection of gender, race, social class, and age in impacting African refugee youth’s access to employment has received less attention. Using a qualitative case study approach, the paper will explore how gender, race, social class, and age influence African refugee youth graduates’ access to employment in South Australia. The intersectionality theory and capability approach to social justice is used to explore intersecting factors impacting African refugee youth’s access to employment in South Australia. Participants were 16 African refugee graduates aged 18-30 living in South Australia who took part in the study for one year. Based on the trends in the data, the results suggest that long-term unemployment and underemployment, coupled with ongoing racism and marginalisation, have the potential to make refugees more vulnerable to several mental disorders such as depression, hopelessness, and suicidal thoughts. The analysis also reveals that resettlement challenges may limit refugees’ ability to recover from pre-migration trauma. The impact of resettlement challenges on refugee mental health highlights the need for comprehensive policy interventions to address the barriers refugees face in finding employment in resettlement communities. With African refugees constituting such an important part of Australian society, they should have equal access to meaningful employment, as decent work promotes good mental health, successful resettlement, hope, and self-sufficiency.Keywords: African refugee youth, mental health, employment, resettlement, racism
Procedia PDF Downloads 713563 Analysis of Effect of Microfinance on the Profit Level of Small and Medium Scale Enterprises in Lagos State, Nigeria
Authors: Saheed Olakunle Sanusi, Israel Ajibade Adedeji
Abstract:
The study analysed the effect of microfinance on the profit level of small and medium scale enterprises in Lagos. The data for the study were obtained by simple random sampling, and total of one hundred and fifty (150) small and medium scale enterprises (SMEs) were sampled for the study. Seventy-five (75) each are microfinance users and non-users. Data were analysed using descriptive statistics, logit model, t-test and ordinary least square (OLS) regression. The mean profit of the enterprises using microfinance is ₦16.8m, while for the non-users of microfinance is ₦5.9m. The mean profit of microfinance users is statistically different from the non-users. The result of the logit model specified for the determinant of access to microfinance showed that three of specified variables- educational status of the enterprise head, credit utilisation and volume of business investment are significant at P < 0.01. Enterprises with many years of experience, highly educated enterprise heads and high volume of business investment have more potential access to microfinance. The OLS regression model indicated that three parameters namely number of school years, the volume of business investment and (dummy) participation in microfinance were found to be significant at P < 0.05. These variables are therefore significant determinants of impacts of microfinance on profit level in the study area. The study, therefore, concludes and recommends that to improve the status of small and medium scale enterprises for an increase in profit, the full benefit of access to microfinance can be enhanced through investment in social infrastructure and human capital development. Also, concerted efforts should be made to encouraged non-users of microfinance among SMEs to use it in order to boost their profit.Keywords: credit utilisation, logit model, microfinance, small and medium enterprises
Procedia PDF Downloads 2083562 Identifying the Knowledge Management and its Capabilities in Universities: A Case Study of Public Universities in Nigeria
Authors: Hilary Joseph Watsilla
Abstract:
Research work is a vital part of the university system; in Nigeria public universities, research is used in measuring the development of individuals and departments within the academic system. Information technology has impacted the way research is carried out by providing easy access to information and improved collaboration between research and other instruments necessary for research activities. However, access to some of these IT facilities is not readily available in most of the public institutions in Nigeria. Research activities are usually tedious and rigorous and any inadequacy in research resources might affect the quality of research outcome. This study aims to identify the IT capability and knowledge management capabilities necessary for academic researchers in public universities in Nigeria, as it will provide more incite to the knowledge creation processes of research. The research will be conducted using an interpretive lens, which will provide a more qualitative understanding of the subject matter. The outcome of the research will provide an empirical understanding of the IT capabilities, which help in the optimization of the knowledge management capabilities of the university.Keywords: IT capabilities, KM capabilities, universities, academic research
Procedia PDF Downloads 283561 Challenges to Reaching Higher Education in Developing Countries
Authors: Suhail Shersad
Abstract:
Introduction In developing countries, the access to higher education for the lower socioeconomic strata is very poor at less than 0.05%. The challenges faced by prospective students in these circumstances to pursue higher education have been explored through direct interaction with them and their families in urban slums of New Delhi. This study included evaluation of the demographics, social indices, expectations and perceptions of selected communities. Results The results show that the poor life expectancy, low exposure to technology, lack of social infrastructure and poor sanitary conditions have reduced their drive for academic achievements. This is despite a good level of intelligence and critical thinking skills among these students. The perception of the community including parents shows that despite their desire to excel, there are too may roadblocks to achieving a fruitful professional life for the next generation. Discussion The prerequisites of higher education may have to be revisited to be more inclusive of socially handicapped students. The knowledge, skills and attributes required for higher education system should form the baseline for creating a roadmap for higher secondary education suited for local needs. Conventional parameters like marks and grading have to be re-looked so that life skills and vocational training form part of the core curriculum. Essential skills should be incorporated at an earlier age, providing an alternative pathway for such students to join higher education. Conclusion: There is a need to bridge the disconnect that exists between higher education planning, the needs of the concerned cohorts and the existing higher secondary education. The variables that contribute to making such a decision have to be examined further. Keywords: prerequisites of higher education, social mobility, society expectations, access to higher educationKeywords: access to higher education, prerequisites of higher education, society expectations, social mobility
Procedia PDF Downloads 3873560 Identifying the Effects of the COVID-19 Pandemic on Syrian and Congolese Refugees’ Health and Economic Access in Central Pennsylvania
Authors: Mariam Shalaby, Kayla Krause, Raisha Ismail, Daniel George
Abstract:
Introduction: The Pennsylvania State College of Medicine Refugee Initiative is a student-run organization that works with eleven Syrian and Congolese refugee families. Since 2016, it has used grant funding to make weekly produce purchases at a local market, provide tutoring services, and develop trusting relationships. This case study explains how the Refugee Initiative shifted focus to face new challenges due to the COVID-19 pandemic in 2020. Methodology: When refugees who had previously attained stability found themselves unable to pay the bills, the organization shifted focus from food security to direct assistance such as applying for unemployment compensation since many had recently lost jobs. When refugee families additionally struggled to access hygiene supplies, funding was redirected to purchase them. Funds were also raised from the community to provide financial relief from unpaid rent and bills. Findings: Systemic challenges were encountered in navigating federal/state unemployment and social welfare systems, and there was a conspicuous absence of affordable, language-accessible assistance that could help refugees. Finally, as struggling public schools failed to maintain adequate English as a Second Language (ESL) education, the group’s tutoring services were hindered by social distancing and inconsistent access to distance-learning platforms. Conclusion: Ultimately, the pandemic highlighted that a charity-based arrangement is helpful but not sustainable, and challenges persist for refugee families. Based on the Refugee Initiative's experiences over the past year of the COVID-19 pandemic, several needs must be addressed to aid refugee families at this time, including: increased access to affordable and language-accessible social services, educational resources, and simpler options for grant-based financial assistance. Interventions to increase these resources will aid refugee families in need in Central Pennsylvania and internationallyKeywords: COVID-19, health, pandemic, refugees
Procedia PDF Downloads 1303559 Pediatric Hearing Aid Use: A Study Based on Data Logging Information
Authors: Mina Salamatmanesh, Elizabeth Fitzpatrick, Tim Ramsay, Josee Lagacé, Lindsey Sikora, JoAnne Whittingham
Abstract:
Introduction: Hearing loss (HL) is one of the most common disorders that presents at birth and in early childhood. Universal newborn hearing screening (UNHS) has been adopted based on the assumption that with early identification of HL, children will have access to optimal amplification and intervention at younger ages, therefore, taking advantage of the brain’s maximal plasticity. One particular challenge for parents in the early years is achieving consistent hearing aid (HA) use which is critical to the child’s development and constitutes the first step in the rehabilitation process. This study examined the consistency of hearing aid use in young children based on data logging information documented during audiology sessions in the first three years after hearing aid fitting. Methodology: The first 100 children who were diagnosed with bilateral HL before 72 months of age since 2003 to 2015 in a pediatric audiology clinic and who had at least two hearing aid follow-up sessions with available data logging information were included in the study. Data from each audiology session (age of child at the session, average hours of use per day (for each ear) in the first three years after HA fitting) were collected. Clinical characteristics (degree of hearing loss, age of HA fitting) were also documented to further understanding of factors that impact HA use. Results: Preliminary analysis of the results of the first 20 children shows that all of them (100%) have at least one data logging session recorded in the clinical audiology system (Noah). Of the 20 children, 17(85%) have three data logging events recorded in the first three years after HA fitting. Based on the statistical analysis of the first 20 cases, the median hours of use in the first follow-up session after the hearing aid fitting in the right ear is 3.9 hours with an interquartile range (IQR) of 10.2h. For the left ear the median is 4.4 and the IQR is 9.7h. In the first session 47% of the children use their hearing aids ≤5 hours, 12% use them between 5 to 10 hours and 22% use them ≥10 hours a day. However, these children showed increased use by the third follow-up session with a median (IQR) of 9.1 hours for the right ear and 2.5, and of 8.2 hours for left ear (IQR) IQR is 5.6 By the third follow-up session, 14% of children used hearing aids ≤5 hours, while 38% of children used them ≥10 hours. Based on the primary results, factors like age and level of HL significantly impact the hours of use. Conclusion: The use of data logging information to assess the actual hours of HA provides an opportunity to examine the: a) challenges of families of young children with HAs, b) factors that impact use in very young children. Data logging when used collaboratively with parents, can be a powerful tool to identify problems and to encourage and assist families in maximizing their child’s hearing potential.Keywords: hearing loss, hearing aid, data logging, hours of use
Procedia PDF Downloads 2303558 Tools for Transparency: The Role of Civic Technology in Increasing the Transparency of the State
Authors: Rebecca Rumbul
Abstract:
The operation of the state can often appear opaque to citizens wishing to access official information, who have to negotiate a path through numerous levels of bureaucracy rationalized through institutional policy to acquire what information they want. Even where individual states have 'Right to Information' legislation guaranteeing citizen access to information, public sector conformity to such laws vary between states and between state organizations. In response to such difficulties in bringing citizens and information together, many NGO's around the world have begun designing and hosting digital portals to facilitate the requesting and receiving of official information. How then, are these 'civic technology' tools affecting the behavior of the state? Are they increasing the transparency of the state? This study looked at 5 Right to Information civic technology sites in Chile, Uruguay, Ukraine, Hungary and the UK, and found that such sites were providing a useful platform to publish official information, but that states were still reluctant to comply with all requests. It concludes that civic technology can be an important tool in increasing the transparency of the state, but that the state must have an institutional commitment to information rights for this to be fully effective.Keywords: digital, ICT, transparency, civic technology
Procedia PDF Downloads 6633557 Food Sharing App and the Ubuntu Ssharing Economy: Accessing the Impact of Technology of Food Waste Reduction
Authors: Gabriel Sunday Ayayia
Abstract:
Food waste remains a critical global challenge with significant environmental, economic, and ethical implications. In an era where food waste and food insecurity coexist, innovative technology-driven solutions have emerged, aiming to bridge the gap between surplus food and those in need. Simultaneously, disparities in food access persist, exacerbating issues of hunger and malnutrition. Emerging food-sharing apps offer a promising avenue to mitigate these problems but require further examination within the context of the Ubuntu sharing economy. This study seeks to understand the impact of food-sharing apps, guided by the principles of Ubuntu, on reducing food waste and enhancing food access. The study examines how specific food-sharing apps within the Ubuntu sharing economy could contribute to fostering community resilience and reducing food waste. Ubuntu underscores the idea that we are all responsible for the well-being of our community members. In the context of food waste, this means that individuals and businesses have a collective responsibility to ensure that surplus food is shared rather than wasted. Food-sharing apps align with this principle by facilitating the sharing of excess food with those in need, transforming waste into a communal resource. This research employs a mixed-methods approach of both quantitative analysis and qualitative inquiry. Large-scale surveys will be conducted to assess user behavior, attitudes, and experiences with food-sharing apps, focusing on the frequency of use, motivations, and perceived impacts. Qualitative interviews with app users, community organizers, and stakeholders will explore the Ubuntu-inspired aspects of food-sharing apps and their influence on reducing food waste and improving food access. Quantitative data will be analyzed using statistical techniques, while qualitative data will undergo thematic analysis to identify key patterns and insights. This research addresses a critical gap in the literature by examining the role of food-sharing apps in reducing food waste and enhancing food access, particularly within the Ubuntu sharing economy framework. Findings will offer valuable insights for policymakers, technology developers, and communities seeking to leverage technology to create a more just and sustainable food system.Keywords: sharing economy, food waste reduction, technology, community- based approach
Procedia PDF Downloads 693556 Open Source Cloud Managed Enterprise WiFi
Authors: James Skon, Irina Beshentseva, Michelle Polak
Abstract:
Wifi solutions come in two major classes. Small Office/Home Office (SOHO) WiFi, characterized by inexpensive WiFi routers, with one or two service set identifiers (SSIDs), and a single shared passphrase. These access points provide no significant user management or monitoring, and no aggregation of monitoring and control for multiple routers. The other solution class is managed enterprise WiFi solutions, which involve expensive Access Points (APs), along with (also costly) local or cloud based management components. These solutions typically provide portal based login, per user virtual local area networks (VLANs), and sophisticated monitoring and control across a large group of APs. The cost for deploying and managing such managed enterprise solutions is typically about 10 fold that of inexpensive consumer APs. Low revenue organizations, such as schools, non-profits, non-government organizations (NGO's), small businesses, and even homes cannot easily afford quality enterprise WiFi solutions, though they may need to provide quality WiFi access to their population. Using available lower cost Wifi solutions can significantly reduce their ability to provide reliable, secure network access. This project explored and created a new approach for providing secured managed enterprise WiFi based on low cost hardware combined with both new and existing (but modified) open source software. The solution provides a cloud based management interface which allows organizations to aggregate the configuration and management of small, medium and large WiFi solutions. It utilizes a novel approach for user management, giving each user a unique passphrase. It provides unlimited SSID's across an unlimited number of WiFI zones, and the ability to place each user (and all their devices) on their own VLAN. With proper configuration it can even provide user local services. It also allows for users' usage and quality of service to be monitored, and for users to be added, enabled, and disabled at will. As inferred above, the ultimate goal is to free organizations with limited resources from the expense of a commercial enterprise WiFi, while providing them with most of the qualities of such a more expensive managed solution at a fraction of the cost.Keywords: wifi, enterprise, cloud, managed
Procedia PDF Downloads 993555 Development of a One-Window Services Model for Accessing Cancer Immunotherapies
Authors: Rizwan Arshad, Alessio Panza, Nimra Inayat, Syeda Mariam Batool Kazmi, Shawana Azmat
Abstract:
The rapidly expanding use of immunotherapy for a wide range of cancers from late to early stages has, predictably, been accompanied by evidence of inequities in access to these highly effective but costly treatments. In this survey-based case study, we aimed to develop a One-window services model (OWSM) based on Anderson’s behavioral model to enhance competence in accessing cancer medications, particularly immunotherapies, through the analysis of 20 patient surveys conducted in the Armed forces bone marrow transplant center of the district, Rawalpindi from November to December 2022. The purposive sampling technique was used. Cronbach’s alpha coefficient was found to be 0.71. It was analyzed using SPSS version 26 with descriptive analysis, and results showed that the majority of the cancer patients were non-competent to access their prescribed cancer immunotherapy because of individual-level, socioeconomic, and organizational barriers.Keywords: cancer immunotherapy, one-window services model, accessibility, competence
Procedia PDF Downloads 763554 Access to Education and Adopted Identity of the Rohingya Amid Government Restrictions in Bangladesh
Authors: Ishrat Zakia Sultana
Abstract:
The consistent persecution, ethnic cleansing, and genocide against the Rohingya in Burma resulted four major influxes of the Rohingya people to the neighboring country Bangladesh. After the latest influx of October 2016 and August 2017, the total number of Rohingya in Bangladesh stands somewhere between 900,000 to over one million, placing Bangladesh much ahead with the number of refugees compared to Dadaab and Kakuma in Kenya, Bidibidi in Uganda and Zaatari in Jordan. While Bangladesh received recognition and appreciation for receiving a huge number of the Rohingya, one of the fundamental human rights of the Rohingya – education – has never been fulfilled in Bangladesh. The Ministry of Disaster Management and Relief of the government of Bangladesh has been looking after the Rohingya and managing various programs for the Rohingya. On its website, the Ministry claims that it provides the basic supports/services to the Rohingya, including providing education. In practice, however, education for the Rohingya include only the provisions for registered Rohingya refugees – who are a very small number of populations among the entire Rohingya hosted in Bangladesh – and that is only up to grade 7 within the registered camps at Teknaf and Ukhia of Cox’s Bazar district of the country. There is no answer of the question, ‘What’s next’? Although refugees in Canada, Sudan, Turkey and other countries have been allowed to go to mainstream schools, Rohingya refugees in Bangladesh are not allowed to do so legally. Due to the lack of proof of nationality of the Rohingya, the government of Bangladesh imposes restrictions on their access to Bangladeshi schools. However, despite their vulnerability and statelessness, many Rohingyas are desperate to pursue education outside the camps and find their own way not only within Cox’s Bazar but also even in the capital city of the country. But they must hide their refugee identity to accomplish this. My research aims to explore how they manage to get admission amid government restrictions on their access to education in the mainstream institutions in Bangladesh. It will reveal how Rohingya people use adopted identity to get access to education in Bangladesh, and how they apply their own techniques to achieve their goals without having government approved identity. This research examined the strategies the Rohingya applied to manage documents related to their identity to ensure their admission to Bangladeshi education institutions – in schools, colleges, and universities. The research employed a qualitative approach. It used semi structured individual interviews and Focused Group Discussions (FGDs) with 20 male and female Rohingya refugees who are 18 years old and above, and have enrolled in Bangladeshi education institutions with adopted identity. Also I interviewed 5 local community members and policy makers to understand their perceptions and roles in this process. The findings of this research will allow the policy makers to rethink the outcomes of the restrictions on Rohingya’s education in Bangladesh, the ramifications of the denial of Rohingya’s access to education, and initiate policy dialogues on how to allow Rohingya refugees to pursue education in Bangladesh in legal way.Keywords: Rohingya, Refugee, Bangladesh, Education
Procedia PDF Downloads 643553 Controlled Digital Lending, Equitable Access to Knowledge and Future Library Services
Authors: Xuan Pang, Alvin L. Lee, Peggy Glatthaar
Abstract:
Libraries across the world have been an innovation engine of creativity and opportunityin many decades. The on-going global epidemiology outbreak and health crisis experience illuminates potential reforms, rethinking beyond traditional library operations and services. Controlled Digital Lending (CDL) is one of the emerging technologies libraries used to deliver information digitally in support of online learning and teachingand make educational materials more affordable and more accessible. CDL became a popular term in the United States of America (USA) as a result of a white paper authored by Kyle K. Courtney (Harvard University) and David Hansen (Duke University). The paper gave the legal groundwork to explore CDL: Fair Use, First Sale Doctrine, and Supreme Court rulings. Library professionals implemented this new technology to fulfill their users’ needs. Three libraries in the state of Florida (University of Florida, Florida Gulf Coast University, and Florida A&M University) started a conversation about how to develop strategies to make CDL work possible at each institution. This paper shares the stories of piloting and initiating a CDL program to ensure students have reliable, affordable access to course materials they need to be successful. Additionally, this paper offers an overview of the emerging trends of Controlled Digital Lending in the USA and demonstrates the development of the CDL platforms, policies, and implementation plans. The paper further discusses challenges and lessons learned and how each institution plans to sustain the program into future library services. The fundamental mission of the library is providing users unrestricted access to library resources regardless of their physical location, disability, health status, or other circumstances. The professional due diligence of librarians, as information professionals, is to makeeducational resources more affordable and accessible.CDL opens a new frontier of library services as a mechanism for library practice to enhance user’s experience of using libraries’ services. Libraries should consider exploring this tool to distribute library resources in an effective and equitable way. This new methodology has potential benefits to libraries and end users.Keywords: controlled digital lending, emerging technologies, equitable access, collaborations
Procedia PDF Downloads 1373552 Democracy Bytes: Interrogating the Exploitation of Data Democracy by Radical Terrorist Organizations
Authors: Nirmala Gopal, Sheetal Bhoola, Audecious Mugwagwa
Abstract:
This paper discusses the continued infringement and exploitation of data by non-state actors for destructive purposes, emphasizing radical terrorist organizations. It will discuss how terrorist organizations access and use data to foster their nefarious agendas. It further examines how cybersecurity, designed as a tool to curb data exploitation, is ineffective in raising global citizens' concerns about how their data can be kept safe and used for its acquired purpose. The study interrogates several policies and data protection instruments, such as the Data Protection Act, Cyber Security Policies, Protection of Personal Information(PPI) and General Data Protection Regulations (GDPR), to understand data use and storage in democratic states. The study outcomes point to the fact that international cybersecurity and cybercrime legislation, policies, and conventions have not curbed violations of data access and use by radical terrorist groups. The study recommends ways to enhance cybersecurity and reduce cyber risks using democratic principles.Keywords: cybersecurity, data exploitation, terrorist organizations, data democracy
Procedia PDF Downloads 205