Search results for: health service access
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14174

Search results for: health service access

13634 An Agent-Service Oriented Framework for Online Contracts in Virtual Organizations

Authors: Zahra Raeisi, Reza Akbari

Abstract:

Contracting is known as one of the important tasks in virtual organization creation. Contracting is a costly process in terms of time and effort. One way to cut the time and effort is conducting contract electronically. The online contracting enable us to form virtual organization (VO) dynamically. This work presents an agent-service oriented framework for online contracting in virtual organizations. The proposed framework considers the main aspects and steps of traditional contracting process and uses the efficiency of service and agent based methodologies in order to provide a flexible and efficient way to establish contracts electronically in a VO.

Keywords: service oriented architecture, online contracts, agent-oriented architecture, virtual organization

Procedia PDF Downloads 504
13633 Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control

Authors: A: Asmawi, L. S. Affendey, N. I. Udzir, R. Mahmod

Abstract:

The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security.

Keywords: XML database, trust-based access control, severity-aware, trust values, log file

Procedia PDF Downloads 300
13632 A Coupling Study of Public Service Facilities and Land Price Based on Big Data Perspective in Wuxi City

Authors: Sisi Xia, Dezhuan Tao, Junyan Yang, Weiting Xiong

Abstract:

Under the background of Chinese urbanization changing from incremental development to stock development, the completion of urban public service facilities is essential to urban spatial quality. As public services facilities is a huge and complicated system, clarifying the various types of internal rules associated with the land market price is key to optimizing spatial layout. This paper takes Wuxi City as a representative sample location and establishes the digital analysis platform using urban price and several high-precision big data acquisition methods. On this basis, it analyzes the coupling relationship between different public service categories and land price, summarizing the coupling patterns of urban public facilities distribution and urban land price fluctuations. Finally, the internal mechanism within each of the two elements is explored, providing the reference of the optimum layout of urban planning and public service facilities.

Keywords: public service facilities, land price, urban spatial morphology, big data

Procedia PDF Downloads 215
13631 Relationship between Demographic Characteristics and Lifestyle among Indonesian Pregnant Women with Hypertension

Authors: Yosi Maria Wijaya, Florisma Arista Riti Tegu

Abstract:

Background: Hypertension in pregnancy can be prevented by controlling the lifestyle. However, the majority of research on this topic has been conducted on lifestyle in women with normal pregnancy. Few studies of lifestyle have focused on Indonesian pregnant women with hypertension. Aim: The purpose of this study is to determine the association of demographic characteristics and the lifestyle of pregnant women who have hypertension. Methods: In this cross-sectional study, 76 women with hypertension during pregnancy were recruited from primary health care, West Java, Indonesia. Inclusion criteria were gestational age ≥ 28 weeks with the blood pressure systole ≥ 140 mmHg and diastole ≥ 90 mmHg. Data were collected using two instruments: demographic data and Health Promoting Life Style Profile (HPLP II). Data were analyzed with descriptive statistic and linear regression analysis. Results: The majority of participants were married, mean age was 27.96 years old (SD=6.77) with the mean of gestational age 33.21 (SD=3.49), most of them unemployed (94.7%) and more than a half participants have an education less than twelve years (59.2%). The total score of lifestyle was 2.44 (SD=0.34), more than a half participants experience unhealthy lifestyle (59.2%). Lifestyle was predicted by income, education years, occupation, and access to health care services, accounting for 20.8% of the total variance. Conclusion: Pregnant women with hypertension with low income, low level of education, non-occupational and hard to access health care services were related to unhealthy lifestyle. Understanding the lifestyle and associated factors contributes to health care providers ability to design effective interventions intended to improve healthy lifestyle among pregnant women with hypertension.

Keywords: demographic characteristics, hypertension, lifestyle, pregnancy

Procedia PDF Downloads 191
13630 Ensuring Continuity in Subcutaneous Depot Medroxy Progesterone Acetate (DMPA-SC) Contraception Service Provision Using Effective Commodity Management Practices

Authors: Oluwaseun Adeleke, Samuel O. Ikani, Fidelis Edet, Anthony Nwala, Mopelola Raji, Simeon Christian Chukwu

Abstract:

Background: The Delivering Innovations in Selfcare (DISC) project aims to increase access to self-care options for women of reproductive age, starting with self-inject subcutaneous depot medroxyprogesterone acetate (DMPA-SC) contraception services. However, the project has faced challenges in ensuring the continuous availability of the commodity in health facilities. Although most states in the country rely on the federal ministry of Health for supplies, some are gradually funding the procurement of Family Planning (FP) commodities. This attempt is, however, often accompanied by procurement delays and purchases inadequate to meet demand. This dilemma was further exacerbated by the commencement of demand generation activities by the project in supported states which geometrically increased commodity utilization rates and resulted in receding stock and occasional service disruptions. Strategies: The project deployed various strategies were implemented to ensure the continuous availability of commodities. These include facilitating inter-facility transfer, monthly tracking of commodity utilization, and alerting relevant authorities when stock levels reach a minimum. And supporting state-level procurement of DMPA-SC commodities through catalytic interventions. Results: Effective monitoring of commodity inventory at the facility level and strategic engagement with federal and state-level logistics units have proven successful in mitigating stock-out of commodities. It has helped secure up to 13,000 units of DMPA-SC commodities from federal logistics units and enabled state units to prioritize supported sites. This has ensured the continuity of DMPA-SC services and an increasing trend in the practice of self-injection. Conclusion: A functional supply chain is crucial to achieving commodity security, and without it, health programs cannot succeed. Stakeholder engagement, stock management and catalytic interventions have provided both short- and long-term measures to mitigate stock-outs and ensured a consistent supply of commodities to clients.

Keywords: family planning, contraception, DMPA-SC, self-care, self-injection, commodities, stock-out

Procedia PDF Downloads 89
13629 A Review on Cloud Computing and Internet of Things

Authors: Sahar S. Tabrizi, Dogan Ibrahim

Abstract:

Cloud Computing is a convenient model for on-demand networks that uses shared pools of virtual configurable computing resources, such as servers, networks, storage devices, applications, etc. The cloud serves as an environment for companies and organizations to use infrastructure resources without making any purchases and they can access such resources wherever and whenever they need. Cloud computing is useful to overcome a number of problems in various Information Technology (IT) domains such as Geographical Information Systems (GIS), Scientific Research, e-Governance Systems, Decision Support Systems, ERP, Web Application Development, Mobile Technology, etc. Companies can use Cloud Computing services to store large amounts of data that can be accessed from anywhere on Earth and also at any time. Such services are rented by the client companies where the actual rent depends upon the amount of data stored on the cloud and also the amount of processing power used in a given time period. The resources offered by the cloud service companies are flexible in the sense that the user companies can increase or decrease their storage requirements or the processing power requirements at any time, thus minimizing the overall rental cost of the service they receive. In addition, the Cloud Computing service providers offer fast processors and applications software that can be shared by their clients. This is especially important for small companies with limited budgets which cannot afford to purchase their own expensive hardware and software. This paper is an overview of the Cloud Computing, giving its types, principles, advantages, and disadvantages. In addition, the paper gives some example engineering applications of Cloud Computing and makes suggestions for possible future applications in the field of engineering.

Keywords: cloud computing, cloud systems, cloud services, IaaS, PaaS, SaaS

Procedia PDF Downloads 233
13628 Data Security in Cloud Storage

Authors: Amir Rashid

Abstract:

Today is the world of innovation and Cloud Computing is becoming a day to day technology with every passing day offering remarkable services and features on the go with rapid elasticity. This platform took business computing into an innovative dimension where clients interact and operate through service provider web portals. Initially, the trust relationship between client and service provider remained a big question but with the invention of several cryptographic paradigms, it is becoming common in everyday business. This research work proposes a solution for building a cloud storage service with respect to Data Security addressing public cloud infrastructure where the trust relationship matters a lot between client and service provider. For the great satisfaction of client regarding high-end Data Security, this research paper propose a layer of cryptographic primitives combining several architectures in order to achieve the goal. A survey has been conducted to determine the benefits for such an architecture would provide to both clients/service providers and recent developments in cryptography specifically by cloud storage.

Keywords: data security in cloud computing, cloud storage architecture, cryptographic developments, token key

Procedia PDF Downloads 294
13627 Modelling Enablers of Service Using ISM: Implications for Quality Improvements in Healthcare Sector of UAE

Authors: Flevy Lasrado

Abstract:

Purpose: The purpose of this paper is to show the relationship between the service quality dimensions and model them to propose quality improvements using interpretive structural modelling (ISM). Methodology: This paper used an interpretive structural modelling (ISM). The data was collected from the expert opinions that included a questionnaire. The detailed method of using ISM is discussed in the paper. Findings: The present research work provides an ISM based model to understand the relationships among the service quality dimensions. Practical implications or Original Value: An ISM based model has been developed for healthcare facility for improving customer satisfaction and increasing market share. Although there is lot of research on SERVQUAL model adapted to healthcare sector, no study has been done to understand the interactions among these dimensions. So the major contribution of this research work is the development of contextual relationships among identified variables through a systematic framework. The present research work provides an ISM based model to understand the relationships among the service quality dimensions.

Keywords: SERQUAL, healthcare, quality, service quality

Procedia PDF Downloads 404
13626 A Framework for Designing Complex Product-Service Systems with a Multi-Domain Matrix

Authors: Yoonjung An, Yongtae Park

Abstract:

Offering a Product-Service System (PSS) is a well-accepted strategy that companies may adopt to provide a set of systemic solutions to customers. PSSs were initially provided in a simple form but now take diversified and complex forms involving multiple services, products and technologies. With the growing interest in the PSS, frameworks for the PSS development have been introduced by many researchers. However, most of the existing frameworks fail to examine various relations existing in a complex PSS. Since designing a complex PSS involves full integration of multiple products and services, it is essential to identify not only product-service relations but also product-product/ service-service relations. It is also equally important to specify how they are related for better understanding of the system. Moreover, as customers tend to view their purchase from a more holistic perspective, a PSS should be developed based on the whole system’s requirements, rather than focusing only on the product requirements or service requirements. Thus, we propose a framework to develop a complex PSS that is coordinated fully with the requirements of both worlds. Specifically, our approach adopts a multi-domain matrix (MDM). A MDM identifies not only inter-domain relations but also intra-domain relations so that it helps to design a PSS that includes highly desired and closely related core functions/ features. Also, various dependency types and rating schemes proposed in our approach would help the integration process.

Keywords: inter-domain relations, intra-domain relations, multi-domain matrix, product-service system design

Procedia PDF Downloads 641
13625 Innovations in International Trauma Education: An Evaluation of Learning Outcomes and Community Impact of a Guyanese trauma Training Graduate Program

Authors: Jeffrey Ansloos

Abstract:

International trauma education in low and emerging economies requires innovative methods for capacity building in existing social service infrastructures. This study details the findings of a program evaluation used to assess the learning outcomes and community impact of an international trauma-focused graduate degree program in Guyana. Through a collaborative partnership between Lesley University, the Government of Guyana, and UNICEF, a 2-year low-residency masters degree graduate program in trauma-focused assessment, intervention, and treatment was piloted with a cohort of Guyanese mental health professionals. Through an analytical review of the program development, as well as qualitative data analysis of participant interviews and focus-groups, this study will address the efficacy of the programming in terms of preparedness of professionals to understand, evaluate and implement trauma-informed practices across various child, youth, and family mental health service settings. Strengths and limitations of this international trauma-education delivery model will be discussed with particular emphasis on the role of capacity-building interventions, community-based participatory curriculum development, innovative technological delivery platforms, and interdisciplinary education. Implications for further research and subsequent program development will be discussed.

Keywords: mental health promotion, global health promotion, trauma education, innovations in education, child, youth, mental health education

Procedia PDF Downloads 367
13624 Qualitative Data Analysis for Health Care Services

Authors: Taner Ersoz, Filiz Ersoz

Abstract:

This study was designed enable application of multivariate technique in the interpretation of categorical data for measuring health care services satisfaction in Turkey. The data was collected from a total of 17726 respondents. The establishment of the sample group and collection of the data were carried out by a joint team from The Ministry of Health and Turkish Statistical Institute (Turk Stat) of Turkey. The multiple correspondence analysis (MCA) was used on the data of 2882 respondents who answered the questionnaire in full. The multiple correspondence analysis indicated that, in the evaluation of health services females, public employees, younger and more highly educated individuals were more concerned and complainant than males, private sector employees, older and less educated individuals. Overall 53 % of the respondents were pleased with the improvements in health care services in the past three years. This study demonstrates the public consciousness in health services and health care satisfaction in Turkey. It was found that most the respondents were pleased with the improvements in health care services over the past three years. Awareness of health service quality increases with education levels. Older individuals and males would appear to have lower expectancies in health services.

Keywords: multiple correspondence analysis, multivariate categorical data, health care services, health satisfaction survey

Procedia PDF Downloads 242
13623 Solving the Wireless Mesh Network Design Problem Using Genetic Algorithm and Simulated Annealing Optimization Methods

Authors: Moheb R. Girgis, Tarek M. Mahmoud, Bahgat A. Abdullatif, Ahmed M. Rabie

Abstract:

Mesh clients, mesh routers and gateways are components of Wireless Mesh Network (WMN). In WMN, gateways connect to Internet using wireline links and supply Internet access services for users. We usually need multiple gateways, which takes time and costs a lot of money set up, due to the limited wireless channel bit rate. WMN is a highly developed technology that offers to end users a wireless broadband access. It offers a high degree of flexibility contrasted to conventional networks; however, this attribute comes at the expense of a more complex construction. Therefore, a challenge is the planning and optimization of WMNs. In this paper, we concentrate on this challenge using a genetic algorithm and simulated annealing. The genetic algorithm and simulated annealing enable searching for a low-cost WMN configuration with constraints and determine the number of used gateways. Experimental results proved that the performance of the genetic algorithm and simulated annealing in minimizing WMN network costs while satisfying quality of service. The proposed models are presented to significantly outperform the existing solutions.

Keywords: wireless mesh networks, genetic algorithms, simulated annealing, topology design

Procedia PDF Downloads 458
13622 Curbing Cybercrime by Application of Internet Users’ Identification System (IUIS) in Nigeria

Authors: K. Alese Boniface, K. Adu Michael

Abstract:

Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.

Keywords: cybercrime, sign-up portal, internet service provider (ISP), internet protocol address (IP address)

Procedia PDF Downloads 279
13621 The Passive Recipient – How the Pupil Comes across in Local Swedish Health Policy Documents

Authors: Zofia Hammerin, Goran Basic, Disa Bergnehr

Abstract:

Ever since the Ottawa charter in 1986, health promotion through schools has been stressed across the globe. Both in the global and national discourse, schools are made responsible not only for providing education but also for working with pupil health and well-being. In Sweden, where the study is set, it is emphasized in national directives that promoting pupil health should be part of the school practice. Since the Swedish school system is decentralized, these directives need to be interpreted and recontextualized locally. This study aims to explore how the student comes across in Swedish local health policy documents. The data consists of 37 such documents called student health plans collected from different high schools throughout Sweden. The analysis was inspired by critical discourse analysis, and tentative results are divided into two main themes; the invisible actor and the passive recipient. The pupil is largely invisible in the documents, and the discourse instead focuses on school health service staff and, to some extent, the teachers. When the pupils are visible, they mainly come across as passive recipients of health promoting actions. Since participation, taking action, and feeling empowered are key aspects of health promotion, the findings could impact the pupils’ possibilities for health and well-being.

Keywords: health promotion, high school, student, sweden

Procedia PDF Downloads 101
13620 Development of a Sequential Multimodal Biometric System for Web-Based Physical Access Control into a Security Safe

Authors: Babatunde Olumide Olawale, Oyebode Olumide Oyediran

Abstract:

The security safe is a place or building where classified document and precious items are kept. To prevent unauthorised persons from gaining access to this safe a lot of technologies had been used. But frequent reports of an unauthorised person gaining access into security safes with the aim of removing document and items from the safes are pointers to the fact that there is still security gap in the recent technologies used as access control for the security safe. In this paper we try to solve this problem by developing a multimodal biometric system for physical access control into a security safe using face and voice recognition. The safe is accessed by the combination of face and speech pattern recognition and also in that sequential order. User authentication is achieved through the use of camera/sensor unit and a microphone unit both attached to the door of the safe. The user face was captured by the camera/sensor while the speech was captured by the use of the microphone unit. The Scale Invariance Feature Transform (SIFT) algorithm was used to train images to form templates for the face recognition system while the Mel-Frequency Cepitral Coefficients (MFCC) algorithm was used to train the speech recognition system to recognise authorise user’s speech. Both algorithms were hosted in two separate web based servers and for automatic analysis of our work; our developed system was simulated in a MATLAB environment. The results obtained shows that the developed system was able to give access to authorise users while declining unauthorised person access to the security safe.

Keywords: access control, multimodal biometrics, pattern recognition, security safe

Procedia PDF Downloads 334
13619 Mood Symptom Severity in Service Members with Posttraumatic Stress Symptoms after Service Dog Training

Authors: Tiffany Riggleman, Andrea Schultheis, Kalyn Jannace, Jerika Taylor, Michelle Nordstrom, Paul F. Pasquina

Abstract:

Introduction: Posttraumatic Stress (PTS) and Posttraumatic Stress Disorder (PTSD) remain significant problems for military and veteran communities. Symptoms of PTSD often include poor sleep, intrusive thoughts, difficulty concentrating, and trouble with emotional regulation. Unfortunately, despite its high prevalence, service members diagnosed with PTSD often do not seek help, usually because of the perceived stigma surrounding behavioral health care. To help address these challenges, non-pharmacological, therapeutic approaches are being developed to help improve care and enhance compliance. The Service Dog Training Program (SDTP), which involves teaching patients how to train puppies to become mobility service dogs, has been successfully implemented into PTS/PTSD care programs with anecdotal reports of improved outcomes. This study was designed to assess the biopsychosocial effects of SDTP from military beneficiaries with PTS symptoms. Methods: Individuals between the ages of 18 and 65 with PTS symptom were recruited to participate in this prospective study. Each subject completes 4 weeks of baseline testing, followed by 6 weeks of active service dog training (twice per week for one hour sessions) with a professional service dog trainer. Outcome measures included the Posttraumatic Stress Checklist for the DSM-5 (PCL-5), Generalized Anxiety Disorder questionnaire-7 (GAD-7), Patient Health Questionnaire-9 (PHQ-9), social support/interaction, anthropometrics, blood/serum biomarkers, and qualitative interviews. Preliminary analysis of 17 participants examined mean scores on the GAD-7, PCL-5, and PHQ-9, pre- and post-SDTP, and changes were assessed using Wilcoxon Signed-Rank tests. Results: Post-SDTP, there was a statistically significant mean decrease in PCL-5 scores of 13.5 on an 80-point scale (p=0.03) and a significant mean decrease of 2.2 in PHQ-9 scores on a 27 point scale (p=0.04), suggestive of decreased PTSD and depression symptoms. While there was a decrease in mean GAD-7 scores post-SDTP, the difference was not significant (p=0.20). Recurring themes among results from the qualitative interviews include decreased pain, forgetting about stressors, improved sense of calm, increased confidence, improved communication, and establishing a connection with the service dog. Conclusion: Preliminary results of the first 17 participants in this study suggest that individuals who received SDTP had a statistically significant decrease in PTS symptom, as measured by the PCL-5 and PHQ-9. This ongoing study seeks to enroll a total of 156 military beneficiaries with PTS symptoms. Future analyses will include additional psychological outcomes, pain scores, blood/serum biomarkers, and other measures of the social aspects of PTSD, such as relationship satisfaction and sleep hygiene.

Keywords: post-concussive syndrome, posttraumatic stress, service dog, service dog training program, traumatic brain injury

Procedia PDF Downloads 113
13618 Improving Infant Vaccination Rates Through Expanded Access to Care

Authors: Aidan Jacobsen, Morgan Motia, David Sam, Jonathan Mudge

Abstract:

Background: The Centers for Disease Control (CDC) lists vaccine requirements for children under two years old to correlate with development markers. CDC lists the coverage by age 24 months to be at least 90% nationally and 84% for Rhode Island Blackstone Valley Community Health Center (BVCHC) in Central Falls, Rhode Island, currently has a completed vaccination rate of 51% for children by the age of 24 months. Current barriers to care for up to date well child vaccinations include lack of transportation, parental work, childcare, and other social stressors. Objective: Increase the vaccination rate of children under the age of 24 months at BVCHC. Conduct a literature review to identify the common barriers preventing children under 24 months from receiving vaccinations. Reduce the barriers to expand access to vaccination care for infants Methods: Setting: Blackstone Valley Community Health Center, Pawtucket, RI Participants: (n=41), Patients between the age of 20-24 months, not up to date with the CDC vaccination recommendations and without a future appointment. QI Intervention: Patients were contacted via phone and offered an appointment during extra Saturday clinic hours in order to receive up to date vaccine care. A Saturday vaccine clinic was established specifically for patients in need of vaccines and having identified barriers to care. Conclusions: Expanding clinic hours and targeting non vaccine up –to-date patients can increase the current standard of childhood immunizations at BVCHC. Overcoming barriers preventing childhood immunization can improve access to providing up to date vaccinations. Other barriers still deter from reaching the national standard of immunizations rates.

Keywords: vaccinations, well child care, barriers to care, social determinants of health

Procedia PDF Downloads 74
13617 Existing Situation on Labour Use, Health Management and Problems of Buffalo Farming in Thailand

Authors: Chonlawit Yuwajitaa, Suttipong Pruangkab

Abstract:

Existing situation on labour use, health management and problems, and ancillary work done along with buffalo farming in Thailand was studied, There were 52 farms had been interviewed during August to September 2014. The study revealed that 100 percent of labor use was family labors themselves and all of farmers reared their buffaloes and grew rice simultaneously. The farmers valued veterinary service and advice as the most important problem (40.40%) and buffalo farming health problems was found 7.69% of dystocia, retain placenta and abortion. The major problem that should be taken into account was officials involved and buffalo farming should be continually promoted by government sectors to help solving economic problems as a whole.

Keywords: buffalo, labor use, health management, Thailand

Procedia PDF Downloads 460
13616 International Service Learning 3.0: Using Technology to Improve Outcomes and Sustainability

Authors: Anthony Vandarakis

Abstract:

Today’s International Service Learning practices require an update: modern technologies, fresh educational frameworks, and a new operating system to accountably prosper. This paper describes a model of International Service Learning (ISL), which combines current technological hardware, electronic platforms, and asynchronous communications that are grounded in inclusive pedagogy. This model builds on the work around collaborative field trip learning, extending the reach to international partnerships across continents. Mobile technology, 21st century skills and summit-basecamp modeling intersect to support novel forms of learning that tread lightly on fragile natural ecosystems, affirm local reciprocal partnership in projects, and protect traveling participants from common yet avoidable cultural pitfalls.

Keywords: International Service Learning, ISL, field experiences, mobile technology, out there in here, summit basecamp pedagogy

Procedia PDF Downloads 172
13615 Design, Implementation and Evaluation of Health and Social Justice Trainings in Nigeria

Authors: Juliet Sorensen, Anna Maitland

Abstract:

Introduction: Characterized by lack of water and sanitation, food insecurity, and low access to hospitals and clinics, informal urban settlements in Lagos, Nigeria have very poor health outcomes. With little education and a general inability to demand basic rights, these communities are often disempowered and isolated from understanding, claiming, or owning their health needs. Utilizing community-based participatory research characterized by interdisciplinary, cross-cultural partnerships, evidence-based assessments, and both primary and secondary source research, a holistic health education and advocacy program was developed in Lagos to address health barriers for targeted communities. This includes a first of its kind guide formulated to teach community-based health educators how to transmit health information to low-literacy Nigerian audiences while supporting behavior change models and social support mechanisms. This paper discusses the interdisciplinary contributions to developing a health education program while also looking at the need for greater beneficiary ownership and implementation of health justice and access. Methods: In March 2016, an interdisciplinary group of medical, legal, and business graduate students and faculty from Northwestern University conduced a Health Needs Assessment (HNA) in Lagos with a partner and a local non-governmental organization. The HNA revealed that members of informal urban communities in Lagos were lacking basic health literacy, but desired to remedy this lacuna. Further, the HNA revealed that even where the government mandates specific services, many vulnerable populations are unable to access these services. The HNA concluded that a program focused on education, advocacy, and organizing around anatomy, maternal and sexual health, infectious disease and malaria, HIV/AIDS, emergency care, and water and sanitation would respond to stated needs while also building capacity in communities to address health barriers. Results: Based on the HNA, including both primary and secondary source research on integrated health education approaches and behavior change models and responsive, adaptive material development, a holistic program was developed for the Lagos partners and first implemented in November 2016. This program trained community-nominated health educators in adult, low-literacy, knowledge exchange approaches, utilizing information identified by communities as a priority. After a second training in March 2017, these educators will teach community-based groups and will support and facilitate behavior change models and peer-support methods around basic issues like hand washing and disease transmission. They will be supported by community paralegals who will help ensure that newly trained community groups can act on education around access, such as receiving free vaccinations, maternal health care, and HIV/AIDS medicines. Materials will continue to be updated as needs and issues arise, with a focus on identifying best practices around health improvements that can be shared across these partner communities. Conclusion: These materials are the first of their kind, and address a void of health information and understanding pervasive in informal-urban Lagos communities. Initial feedback indicates high levels of commitment and interest, as well as investment by communities in these materials, largely because they are responsive, targeted, and build community capacity. This methodology is an important step in dignity-based health justice solutions, albeit in the process of refinement.

Keywords: community health educators, interdisciplinary and cross cultural partnerships, health justice and access, Nigeria

Procedia PDF Downloads 248
13614 Advanced Simulation and Enhancement for Distributed and Energy Efficient Scheduling for IEEE802.11s Wireless Enhanced Distributed Channel Access Networks

Authors: Fisayo G. Ojo, Shamala K. Subramaniam, Zuriati Ahmad Zukarnain

Abstract:

As technology is advancing and wireless applications are becoming dependable sources, while the physical layer of the applications are been embedded into tiny layer, so the more the problem on energy efficiency and consumption. This paper reviews works done in recent years in wireless applications and distributed computing, we discovered that applications are becoming dependable, and resource allocation sharing with other applications in distributed computing. Applications embedded in distributed system are suffering from power stability and efficiency. In the reviews, we also prove that discrete event simulation has been left behind untouched and not been adapted into distributed system as a simulation technique in scheduling of each event that took place in the development of distributed computing applications. We shed more lights on some researcher proposed techniques and results in our reviews to prove the unsatisfactory results, and to show that more work still have to be done on issues of energy efficiency in wireless applications, and congestion in distributed computing.

Keywords: discrete event simulation (DES), distributed computing, energy efficiency (EE), internet of things (IOT), quality of service (QOS), user equipment (UE), wireless mesh network (WMN), wireless sensor network (wsn), worldwide interoperability for microwave access x (WiMAX)

Procedia PDF Downloads 192
13613 Investigation of Delivery of Triple Play Services

Authors: Paramjit Mahey, Monica Sharma, Jasbinder Singh

Abstract:

Fiber based access networks can deliver performance that can support the increasing demands for high speed connections. One of the new technologies that have emerged in recent years is Passive Optical Networks. This paper is targeted to show the simultaneous delivery of triple play service (data, voice and video). The comparative investigation and suitability of various data rates is presented. It is demonstrated that as we increase the data rate, number of users to be accommodated decreases due to increase in bit error rate.

Keywords: BER, PON, TDMPON, GPON, CWDM, OLT, ONT

Procedia PDF Downloads 541
13612 Understanding Systemic Barriers (and Opportunities) to Increasing Uptake of Subcutaneous Medroxy Progesterone Acetate Self-Injection in Health Facilities in Nigeria

Authors: Oluwaseun Adeleke, Samuel O. Ikani, Fidelis Edet, Anthony Nwala, Mopelola Raji, Simeon Christian Chukwu

Abstract:

Background: The DISC project collaborated with partners to implement demand creation and service delivery interventions, including the MoT (Moment of Truth) innovation, in over 500 health facilities across 15 states. This has increased the voluntary conversion rate to self-injection among women who opt for injectable contraception. While some facilities recorded an increasing trend in key performance indicators, few others persistently performed sub-optimally due to provider and system-related barriers. Methodology: Twenty-two facilities performing sub-optimally were selected purposively from three Nigerian states. Low productivity was appraised using low reporting rates and poor SI conversion rates as indicators. Interviews were conducted with health providers across these health facilities using a rapid diagnosis tool. The project also conducted a data quality assessment that evaluated the veracity of data elements reported across the three major sources of family planning data in the facility. Findings: The inability and sometimes refusal of providers to support clients to self-inject effectively was associated with the misunderstanding of its value to their work experience. It was also observed that providers still held a strong influence over clients’ method choices. Furthermore, providers held biases and misconceptions about DMPA-SC that restricted the access of obese clients and new acceptors to services – a clear departure from the recommendations of the national guidelines. Additionally, quality of care standards was compromised because job aids were not used to inform service delivery. Facilities performing sub-optimally often under-reported DMPA-SC utilization data, and there were multiple uncoordinated responsibilities for recording and reporting. Additionally, data validation meetings were not regularly convened, and these meetings were ineffective in authenticating data received from health facilities. Other reasons for sub-optimal performance included poor documentation and tracking of stock inventory resulting in commodity stockouts, low client flow because of poor positioning of health facilities, and ineffective messaging. Some facilities lacked adequate human and material resources to provide services effectively and received very few supportive supervision visits. Supportive supervision visits and Data Quality Audits have been useful to address the aforementioned performance barriers. The project has deployed digital DMPA-SC self-injection checklists that have been aligned with nationally approved templates. During visits, each provider and community mobilizer is accorded special attention by the supervisor until he/she can perform procedures in line with best practice (protocol). Conclusion: This narrative provides a summary of a range of factors that identify health facilities performing sub-optimally in their provision of DMPA-SC services. Findings from this assessment will be useful during project design to inform effective strategies. As the project enters its final stages of implementation, it is transitioning high-impact activities to state institutions in the quest to sustain the quality of service beyond the tenure of the project. The project has flagged activities, as well as created protocols and tools aimed at placing state-level stakeholders at the forefront of improving productivity in health facilities.

Keywords: family planning, contraception, DMPA-SC, self-care, self-injection, barriers, opportunities, performance

Procedia PDF Downloads 79
13611 Carbon Pool Assessment in Two Community Forest in Nepal

Authors: Khemnath Kharel

Abstract:

Forest itself is a factory as well as product. It supplies tangible and intangible goods and services. It supplies timber, fuel wood, fodder, grass leaf litter as well as non timber edible goods and medicinal and aromatic products additionally provides environmental services. These environmental services are of local, national, or even global importance. In Nepal more than 19 thousands community forests are providing environmental service in less economic benefit than actual efficiency. There is a risk of cost of management of those forest exceeds benefits and forests get converted to open access resources in future. Most of the environmental goods and services don’t have markets which mean no prices at which they are available to the consumers therefore the valuation of these services goods and services establishment of paying mechanism for such services and insure the benefit to community is more relevant in local as well as global scale. There are few examples of carbon trading in domestic level to meet the country wide emission goal. In this contest the study aims to explore the public attitude towards carbon offsetting and their responsibility over service providers. This study helps in promotion of environment service awareness among general people and service provider; community forest. The research helps to unveil the carbon pool scenario in community forest and willingness to pay for carbon offsetting of people who are consuming more energy than general people and emitting relatively more carbon in atmosphere. The study has assessed the carbon pool status in two community forest. In the study in two community forests carbon pools were assessed following the guideline “Forest Carbon Inventory Guideline 2010” prescribed by Ministry of Forest and soil Conservation, Nepal. Final out comes of analysis in intensively managed area of Hokse CF recorded as 103.58 tons C /ha with 6173.30 tons carbon stock. Similarly in Hariyali CF carbon density was recorded 251.72 mg C /ha. The total carbon stock of intensively managed blocks in Hariyali CF is 35839.62 tons carbon.

Keywords: carbon, offsetting, sequestration, valuation

Procedia PDF Downloads 321
13610 Consumer Reactions to Hospitality Social Robots Across Cultures

Authors: Lisa C. Wan

Abstract:

To address customers’ safety concerns, more and more hospitality companies are using service robots to provide contactless services. For many companies, the switch from human employees to service robots to lower the contagion risk during and after the pandemic may be permanent. The market size for hospitality service robots is estimated to reach US$3,083 million by 2030, registering a CAGR of 25.5% from 2021 to 2030. While service robots may effectively reduce interpersonal contacts and health risk, it also eliminates the social interactions desired by customers. A recent survey revealed that more than 60% of Americans feel lonely during the pandemic. People who are traveling can also feel isolated when they are at a hotel far away from home. It is therefore important for the hospitality companies to understand whether and how social robots can remedy deprived social connection not only due to a pandemic but also for a trip away from home in the post-pandemic future. This study complements extant hospitality literature regarding service robots by examining how service robots can forge social connections with customers. The service robots we are concerned with are those that can interact and communicate with humans; we broadly refer to them as social robots. We define a social robot as one that is equipped with interaction capabilities – it can either be one that directly interacts with the consumer or one through which the consumer can interact with other humans. Drawing on the theories of mind perception, we propose that service robots can foster social connectedness and increase the perception of social competence of the robot, but these effects will vary across cultures. By applying theories of mind perception and cultural dimension to the hospitality setting, this study shows that service robots that are equipped with social connection function will receive a more favorable evaluation from the consumers and enhance their intention to visit a hotel. The more favorable reaction to social robots is stronger for collectivists (i.e., Asians) than individualists (i.e., Westerners). To our knowledge, this is among the first studies to investigate the impact of culture on consumer reactions to social robots in the hospitality and tourism context. Moreover, this research extends the literature by examining whether people imbue non-human entities (i.e., telepresence social robots) with social competence. Because social robots that foster social connection with humans are still rare in hospitality and tourism, this aspect is an underexplored research area. Our study is the first to propose that, just like their human counterparts that possess relevant social skills, social robots’ interaction capabilities (e.g., telepresence robots) are used to infer social competence. More studies will be conducted to examine consumer reactions to humanoid (vs. non-humanoid) robot in the hospitality settings to generalize our research findings.

Keywords: service robots, COVID-19, social connection, cultures

Procedia PDF Downloads 103
13609 From Within a Domestic Violence Shelter Identifying the Sociological and Psychological Impact of Refugee Muslim Women and Children in America

Authors: Asma Inge-Hanif, Ayyub Ansari Hanif

Abstract:

The impact of conflicts, the subsequent refugee migration to America and their attempted use of societal resources implicate the lack of further humanitarian aid as a consequence of the abrupt decrease in services and policy changes stemming from new governmental mandates and Executive Orders. Statistical research data indicates a substantial decline in access to standardized health services by refugee women creating a significant alteration in the management of their maternal health care in America, previously shown to result in decreased mortality and morbidity. Studying nursing at Howard University in Washington, D.C., observed doctors were not always sensitive to the needs and modesty concerns of immigrant Muslim women - often unintentionally. Among health care professionals, the prevailing belief should be that every man, woman and child has the right to quality care in a dignified manner and the achievement of optimal health and well-being, regardless of race, creed, socio-economic level or status. In 1987 Muslimat Al Nisaa Health and Social Services Center was established to care for underserved and uninsured women and children. This Center, plus the subsequent shelter, provided direct access to those homeless, refugees, human trafficking and women victims of domestic violence was established and provides the data for this study. Understanding specific culture, social, economic and religious nuances respects their diversity and addressing their basic human needs that they achieve optimal success. The ultimate goal being to facilitate the rescue and housing of those whom escaped from a country/communities where girls are devalued, brought, sold and abused.

Keywords: women, refugee, domestic violence, health care

Procedia PDF Downloads 89
13608 CSR Health Programs: A Supplementary Tool of a Government’s Role in a Developing Nation

Authors: Kristine Demilou Santiago

Abstract:

In a context of a developing nation, how important is the role of Corporate Social Responsibility health programs? Is there a possibility that this will render a large impact in a society where health benefits are insufficient? The Philippine government has been in an unceasing battle to provide its citizens competitive health benefits through launching various health programs. As the efforts are being claimed by the government, the numbers just show that all the health benefits being offered such as PhilHealth health cards, medical missions and other subsidized government health benefits are not effective and sufficient at the minimum level. This is a major characteristic of a developing nation which the Philippine government is focusing on addressing as it becomes a national concern under the effects of poverty. Industrial companies, through Corporate Social Responsibility, are playing an important role in the aspiration to resolve this problem on health programs as supposed to be basic services to citizens of the Philippine government. The rise of commitment by these industrial companies to render health programs to communities as part of their corporate citizenship has covered a large portion of the basic health services that the Filipino citizens are supposed to be receiving. This is the most salient subject that a developing nation should focus on determining the important contribution of industrial companies present in their country as part of the citizens’ access to basic health services. The use of survey forms containing quantitative and qualitative questions which aim to give numerical figures and support answers as to the role of CSR Health programs in helping the communities receive the basic health services they need was the methodological procedure followed in this research. A sample population in a community where the largest industrial company in a province of the Philippines was taken through simple random sampling. The assumption is that this sample population which represents the whole of the community has the highest opportunities to access both the government health services and the CSR health program services of the industrial company located in their community. Results of the research have shown a significant level of participation by industrial companies through their CSR health programs in the attainment of basic health services that should be rendered by the Philippine government to its citizens as part of the state’s health benefits. In a context of a developing nation such as the Philippines, the role of Corporate Social Responsibility is beyond the expectation of initiating to resolve environmental and social issues. It is moving deeper in the concept of the corporate industries being a pillar of the government in catering the support needed by the individuals in the community for its development. As such, the concept of the presence of an industrial company in a community is said to be a parallel progress: by which when an industrial company expands because it is becoming more profitable, so is the community gaining the same step of progress in terms of socioeconomic development.

Keywords: basic health services, CSR health program, health services in a developing nation, Philippines health benefits

Procedia PDF Downloads 207
13607 The Access to the City in the Medellín Urban Experience

Authors: Mansilla, Juan Camilo

Abstract:

According to many studies, public space in the cities of Global South is constantly morcellated and captured by a multiplicity of actors in a permanent struggle for power. This imposed public space restricts the access to services and political actions to many inhabitants. The author has conducted several focus group sessions using video in a reflective mode with low-income communities in Medellín, Colombia in order to study how people in this city are shift from a physical public space to a hybrid public space shaped by internet. Beyond the fragmented city and the violent urban context manifested by participants, these activities have highlighted how the access to the city is currently going through a dialectic movement between the physical and the digital space. The purpose of this article is to make explicit the link between this hybrid public space and the boundaries of exclusion in the city. Urban marginality is closely related with the idea of access and space. Low-income communities in Medellín assume the digital realm like a “not controlled space” of resistance, where alternative ways of expression like hip hop movement, graffiti, dance, video and virtual communities produce effective changes in the physical realm.

Keywords: access to the city, hybrid public space, low-income communities, Medellín, urban marginality

Procedia PDF Downloads 492
13606 Behavioral Pattern of 2G Mobile Internet Subscribers: A Study on an Operator of Bangladesh

Authors: Azfar Adib

Abstract:

Like many other countries of the world, mobile internet has been playing a key role in the growth of internet subscriber base in Bangladesh. This study has attempted to identify particular behavioral or usage patterns of 2G mobile internet subscribers who were using the service of the topmost internet service provider (as well as the top mobile operator) of Bangladesh prior to the launching of 3G services (when 2G was fully dominant). It contains some comprehensive analysis carried on different info regarding 2G mobile internet subscribers, obtained from the operator’s own network insights.This is accompanied by the results of a survey conducted among 40 high-frequency users of this service.

Keywords: mobile internet, Symbian, Android, iPhone

Procedia PDF Downloads 438
13605 Specification of Requirements to Ensure Proper Implementation of Security Policies in Cloud-Based Multi-Tenant Systems

Authors: Rebecca Zahra, Joseph G. Vella, Ernest Cachia

Abstract:

The notion of cloud computing is rapidly gaining ground in the IT industry and is appealing mostly due to making computing more adaptable and expedient whilst diminishing the total cost of ownership. This paper focuses on the software as a service (SaaS) architecture of cloud computing which is used for the outsourcing of databases with their associated business processes. One approach for offering SaaS is basing the system’s architecture on multi-tenancy. Multi-tenancy allows multiple tenants (users) to make use of the same single application instance. Their requests and configurations might then differ according to specific requirements met through tenant customisation through the software. Despite the known advantages, companies still feel uneasy to opt for the multi-tenancy with data security being a principle concern. The fact that multiple tenants, possibly competitors, would have their data located on the same server process and share the same database tables heighten the fear of unauthorised access. Security is a vital aspect which needs to be considered by application developers, database administrators, data owners and end users. This is further complicated in cloud-based multi-tenant system where boundaries must be established between tenants and additional access control models must be in place to prevent unauthorised cross-tenant access to data. Moreover, when altering the database state, the transactions need to strictly adhere to the tenant’s known business processes. This paper focuses on the fact that security in cloud databases should not be considered as an isolated issue. Rather it should be included in the initial phases of the database design and monitored continuously throughout the whole development process. This paper aims to identify a number of the most common security risks and threats specifically in the area of multi-tenant cloud systems. Issues and bottlenecks relating to security risks in cloud databases are surveyed. Some techniques which might be utilised to overcome them are then listed and evaluated. After a description and evaluation of the main security threats, this paper produces a list of software requirements to ensure that proper security policies are implemented by a software development team when designing and implementing a multi-tenant based SaaS. This would then assist the cloud service providers to define, implement, and manage security policies as per tenant customisation requirements whilst assuring security for the customers’ data.

Keywords: cloud computing, data management, multi-tenancy, requirements, security

Procedia PDF Downloads 156