Search results for: abortion access
3387 Survey of Access Controls in Cloud Computing
Authors: Monirah Alkathiry, Hanan Aljarwan
Abstract:
Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements.Keywords: access controls, cloud computing, confidentiality, identity and access management
Procedia PDF Downloads 1293386 Analyzing the Impact of DCF and PCF on WLAN Network Standards 802.11a, 802.11b, and 802.11g
Authors: Amandeep Singh Dhaliwal
Abstract:
Networking solutions, particularly wireless local area networks have revolutionized the technological advancement. Wireless Local Area Networks (WLANs) have gained a lot of popularity as they provide location-independent network access between computing devices. There are a number of access methods used in Wireless Networks among which DCF and PCF are the fundamental access methods. This paper emphasizes on the impact of DCF and PCF access mechanisms on the performance of the IEEE 802.11a, 802.11b and 802.11g standards. On the basis of various parameters viz. throughput, delay, load etc performance is evaluated between these three standards using above mentioned access mechanisms. Analysis revealed a superior throughput performance with low delays for 802.11g standard as compared to 802.11 a/b standard using both DCF and PCF access methods.Keywords: DCF, IEEE, PCF, WLAN
Procedia PDF Downloads 4243385 Enacting Educational Technology Affordances as Mechanisms Responsible for Gaining Epistemological Access: A Case of Underprivileged Students at Higher Institutions in Northern Nigeria
Authors: Bukhari Badamasi, Chidi G. Ononiwu
Abstract:
Globally, educational technology (EdTech) has become a known catalyst for gaining access to education, job creation, and national development of a nation. Howbeit, it is common understanding that higher institutions continue to deploy digital technologies, to help provide access to education, but in most case, it is somehow institutional access not epistemological access especially in sub Saharan African higher institutions. Some scholars, however, lament the fact that studies on educational technology affordances are mostly fragmented because they focus on specific theme or sub aspect of access (i.e., institutional access). Thus, drawing from the Archer Morphogenetic approach, and Gibson Affordance theory, and applying critical realist based Danermark model for explanatory research, the study seeks to conduct a realist case study on underprivileged students in Higher institutions on how they gain epistemological access by enacting educational technology (EdTech) affordances.Keywords: affordance, epistemological access, educational technology, underprivileged students
Procedia PDF Downloads 833384 Digital Divide and Its Impact on the Students’ Performance
Authors: Aissa Hanifi
Abstract:
People across different world societies are using information and communication technology (ICT) for different purposes. Unfortunately, in contemporary societies, some people have little access to ICT and thus cannot have effective participation in society compared with those who have better access. The purpose of this study is to test the impact of ICTs on university life in general and students' performance in particular. The study relied on an online survey questionnaire that was administered to 30 undergraduate students at Chef University. The findings of the survey revealed that there is still an important number of students who do not have easy access to ICT. Such limited access to ICTs is attributed to varied factors. Some students live in rural areas, where due to the poor internet coverage, they face difficulties in competing with students who live in urban areas with better ICT access. The lack of ICT access has hindered the students' university performance in general and their language skills, and the exchange of information with teachers and classmates.Keywords: access, communication, ICT, performance, technology
Procedia PDF Downloads 1253383 The Evaluation of Sexual Literacy Teacher Training Program in Thai Teachers
Authors: Chitraporn Boonthanom, Pailin Sisookho
Abstract:
The Sexual Literacy Training Teachers Program (SLTTP) based on sexual health problems in Thai students includes sexual development, sexual hygiene, high-risk behaviors, Sexual Transmitter Infections and HIV/AIDS, unwanted pregnancy, unsafe abortion, and sexual abuse that increase among Thai students. The training aimed at providing teachers with the sexuality knowledge, sexuality information access skills, communication skill to effectively teach in their class. 28 teachers were participated from schools in Bangkok metropolitan and Nakorn Patom province. The result show the mean score of the pre-test was 8.46 (SD=1.77) and the post-test was 10.13 (SD=2.34). The post-training results were found to be higher than pre–training results but not significant. As teachers are increasing the sexual literacy is very important for Thai students.Keywords: sexual literacy, teachers, training, sexuality education
Procedia PDF Downloads 3573382 Legal Means for Access to Information Management
Authors: Sameut Bouhaik Mostafa
Abstract:
Information Act is the Canadian law gives the right of access to information for the institution of government. It declares the availability of government information to the public, but that exceptions should be limited and the necessary right of access to be specific, and also states the need to constantly re-examine the decisions on the disclosure of any government information independently from the government. By 1982, it enacted a dozen countries, including France, Denmark, Finland, Sweden, the Netherlands and the United States (1966) newly legally to access the information. It entered access to Canadian information into force of the Act of 1983, under the government of Pierre Trudeau, allowing Canadians to recover information from government files, and the development of what can be accessed from the information, and the imposition of timetables to respond. It has been applied by the Information Commissioner in Canada.Keywords: law, information, management, legal
Procedia PDF Downloads 4143381 A Robust Implementation of a Building Resources Access Rights Management System
Authors: Eugen Neagoe, Victor Balanica
Abstract:
A Smart Building Controller (SBC) is a server software that offers secured access to a pool of building specific resources, executes monitoring tasks and performs automatic administration of a building, thus optimizing the exploitation cost and maximizing comfort. This paper brings to discussion the issues that arise with the secure exploitation of the SBC administered resources and proposes a technical solution to implement a robust secure access system based on roles, individual rights and privileges (special rights).Keywords: smart building controller, software security, access rights, access authorization
Procedia PDF Downloads 4383380 Air Access Liberalisation and Tourism Trade Evidence from a Sids
Authors: Seetanah Boopen, R. V. Sannassee
Abstract:
The objective of the present study is two-fold. Firstly, to assess the impact of air access liberalization on tourism demand for Mauritius and secondly to analyses the dual impact of the interplay between air access liberalization and marketing promotion efforts on tourism demand. Using an Autoregressive Distributed Lag model, the results suggest that air access liberalization is an important ingredient, albeit to a lesser extent as compared to other classical explanatory variables, of tourism demand. The results also highlight the fact that Mauritius is perceived as a luxurious destination and tourists are deemed price sensitive. Moreover, our dynamic approach interestingly confirms the presence of repeat tourism in the island. Finally, the findings also uncover the positive impact of the interplay between air access liberalization and marketing promotion efforts on fostering tourism demand.Keywords: air access liberalization, ARDL, SIDS, time series
Procedia PDF Downloads 3083379 SPBAC: A Semantic Policy-Based Access Control for Database Query
Authors: Aaron Zhang, Alimire Kahaer, Gerald Weber, Nalin Arachchilage
Abstract:
Access control is an essential safeguard for the security of enterprise data, which controls users’ access to information resources and ensures the confidentiality and integrity of information resources [1]. Research shows that the more common types of access control now have shortcomings [2]. In this direction, to improve the existing access control, we have studied the current technologies in the field of data security, deeply investigated the previous data access control policies and their problems, identified the existing deficiencies, and proposed a new extension structure of SPBAC. SPBAC extension proposed in this paper aims to combine Policy-Based Access Control (PBAC) with semantics to provide logically connected, real-time data access functionality by establishing associations between enterprise data through semantics. Our design combines policies with linked data through semantics to create a "Semantic link" so that access control is no longer per-database and determines that users in each role should be granted access based on the instance policy, and improves the SPBAC implementation by constructing policies and defined attributes through the XACML specification, which is designed to extend on the original XACML model. While providing relevant design solutions, this paper hopes to continue to study the feasibility and subsequent implementation of related work at a later stage.Keywords: access control, semantic policy-based access control, semantic link, access control model, instance policy, XACML
Procedia PDF Downloads 873378 Access to the Forest Ecosystem Services: Understanding the Interaction between Livelihood Capitals and Access
Authors: Abu S. M. G. Kibria, Alison M. Behie, Robert Costanza, Colin Groves, Tracy Farrell
Abstract:
This study is aimed to understand the level of access and the influence of livelihood capitals in maintaining access and control of ecosystem services (ESS) in the Sundarbans, Bangladesh. Besides the villagers, we consider other stakeholders including the forest department, coast guard, police, merchants, pirates and villagers who ‘controlled’ or ‘maintained’ access to ESS (crab catching, shrimp fry, honey, shrimp, mixed fish, fuel wood) in this region. Villagers used human, physical, natural and social capitals to gain access to ESS. The highest level of access was observed in crab catching and the lowest was found in honey collection, both of which were done when balancing the costs and benefits of accessing one ESS against another. The outcomes of these ongoing access negotiations were determined by livelihood capitals of the households. In addition, it was often found that the certain variables could have a positive effect on one ESS and a negative effect on another. For instance, human, social and natural capitals (eldest daughter’s education and No. of livelihood group membership and) had significant positive effects on honey collection while two components of human and social capitals including ‘eldest son’s education’ and ‘severity of pirate problem’ had exactly the opposite impact. These complex interactions were also observed in access to other ESS. It thus seems that access to ESS is not anything which is provided, but rather it is achieved by using livelihood capitals. Protecting any ecosystem from over exploitation and improve wellbeing can be achieved by properly balancing the livelihood capital-access nexus.Keywords: provisioning services, access level, livelihood capital, interaction, access gain
Procedia PDF Downloads 2813377 Component Lifecycle and Concurrency Model in Usage Control (UCON) System
Authors: P. Ghann, J. Shiguang, C. Zhou
Abstract:
Access control is one of the most challenging issues facing information security. Access control is defined as, the ability to permit or deny access to a particular computational resource or digital information by an unauthorized user or subject. The concept of usage control (UCON) has been introduced as a unified approach to capture a number of extensions for access control models and systems. In UCON, an access decision is determined by three factors: Authorizations, obligations and conditions. Attribute mutability and decision continuity are two distinct characteristics introduced by UCON for the first time. An observation of UCON components indicates that, the components are predefined and static. In this paper, we propose a new and flexible model of usage control for the creation and elimination of some of these components; for example new objects, subjects, attributes and integrate these with the original UCON model. We also propose a model for concurrent usage scenarios in UCON.Keywords: access control, concurrency, digital container, usage control
Procedia PDF Downloads 3193376 Analysis of Strategies to Reduce Patients’ Disposition Holding Time from Emergency Department to Ward
Authors: Kamonwat Suksumek, Seeronk Prichanont
Abstract:
Access block refers to the situation where Emergency Department (ED) patients requiring hospital admission spend an unreasonable holding time in an ED because their access to a ward is blocked by the full utilization of the ward’s beds. Not only it delays the proper treatments required by the patients, but access block is also the cause of ED’s overcrowding. Clearly, access block is an inter-departmental problem that needs to be brought to management’s attention. This paper focuses on the analysis of strategies to address the access block problem, both in the operational and intermediate levels. These strategies were analyzed through a simulation model with a real data set from a university hospital in Thailand. The paper suggests suitable variable levels for each strategy so that the management will make the final decisions.Keywords: access block, emergency department, health system analysis, simulation
Procedia PDF Downloads 4093375 Black Protests in Poland: Analysis of Women's Movement in Poland, 2016-2018
Authors: Aneta Ostaszewska
Abstract:
The purpose of this research is to reflect on 'black protests' of women in Poland. 'Black protests' have been organized nationwide since October 2016 as a sign of opposition and resistance to anti-women government’s policy and its attempts to exacerbate abortion law. Women protest not only in the biggest cities (Warsaw, Cracow or Wroclaw) but in over 140 towns and villages all over Poland. The research represents qualitative methodological approach – an active research method. It has involved the observation, description, and analysis of 'black protests' carried out mainly in Warsaw (the capital of Poland). The focus has been on behavior and attitudes of protesting women: protesters’ slogans, statements, and views, the ways of dressing up, ways of participating and involvement in protests. Research also involves the analysis of social media discourse: the analysis of content published by women on social media. Black protests are an example of a grassroots social initiative of women in Poland. What unites women is opposition to government policy. The primary space of communication has become the Internet – especially social media (Facebook). A new social movement 'Dziewuchy dziewuchom' (Girls for girls) has been born as well as organization of 'Ogolnopolski Strajk Kobiet' (Nationwide women's strike) as a result of 'black protest'. These protests and marches became a way of emphasizing women’s subjectivity as well as political and civic activity.Keywords: women, black protests, communitas, experience, Poland, abortion law
Procedia PDF Downloads 3743374 Evaluation of Associated Risk Factors and Determinants of near Miss Obstetric Cases at B.P. Koirala Institute of Health Sciences, Dharan
Authors: Madan Khadka, Dhruba Uprety, Rubina Rai
Abstract:
Background and objective: In 2011, around 273,465 women died worldwide during pregnancy, childbirth or within 42 days after childbirth. Near-miss is recognized as the predictor of the level of care and maternal death. The objective of the study was to evaluate the associated risk factors of near-miss obstetric cases and maternal death. Material and Methods A Prospective Observational Study was done from August 1, 2014, to June 30, 2015, in Department of Obstetrics and Gynecology at BPKIHS hospital, tertiary care hospital in Eastern Nepal, Dharan. Case eligible by the 5-factor scoring system and WHO near miss criteria were evaluated. Risk factors included severe hemorrhage, hypertensive disorders, and a complication of abortion, ruptured uterus, medical/surgical condition and sepsis. Results: A total of 9,727 delivery were attended during the study period from August 2014 to June 2014. There were 6307 (71.5%) vaginal delivery and 2777(28.5%) caesarean section and 181 perinatal death with a total of 9,546 live birth. A total of 162 near miss was identified, and 16 maternal death occurred during the study. Maternal near miss rate of 16.6 per 1000 live birth, Women with life-threatening conditions (WLTC) of 172, Severe maternal outcome ratio of 18.64 per 1000 live birth, Maternal near-miss mortality ratio (MNM: 1 MD) 10.1:1, Mortality index (MI) of 8.98%. Risk factors were obstetric hemorrhage 27.8%, abortion/ectopic 27.2%, eclampsia 16%, medical/surgical condition 14.8%, sepsis 13.6%, severe preeclamsia 11.1%, ruptured uterus 3.1%, and molar pregnancy 1.9%. 19.75% were prim gravidae, with mean age 25.66 yrs, and cardiovascular and coagulation dysfunction as a major life threatening condition and sepsis (25%) was the major cause of mortality. Conclusion: Hemorrhage and hypertensive disorders are the leading causes of near miss event and sepsis as a leading cause of mortality. As near miss analysis indicates the quality of health care, it is worth presenting in national indices.Keywords: abortion, eclampsia, hemorrhage, maternal mortility, near miss
Procedia PDF Downloads 1953373 Functional Variants Detection by RNAseq
Authors: Raffaele A. Calogero
Abstract:
RNAseq represents an attractive methodology for the detection of functional genomic variants. RNAseq results obtained from polyA+ RNA selection protocol (POLYA) and from exonic regions capturing protocol (ACCESS) indicate that ACCESS detects 10% more coding SNV/INDELs with respect to POLYA. ACCESS requires less reads for coding SNV detection with respect to POLYA. However, if the analysis aims at identifying SNV/INDELs also in the 5’ and 3’ UTRs, POLYA is definitively the preferred method. No particular advantage comes from ACCESS or POLYA in the detection of fusion transcripts.Keywords: fusion transcripts, INDEL, RNA-seq, WES, SNV
Procedia PDF Downloads 2843372 The Effect of Visual Fluency and Cognitive Fluency on Access Rates of Web Pages
Authors: Xiaoying Guo, Xiangyun Wang
Abstract:
Access rates is a key indicator of reflecting the popularity of web pages. Having high access rates are very important for web pages, especially for news web pages, online shopping sites and searching engines. In this paper, we analyzed the influences of visual fluency and cognitive fluency on access rates of Chinese web pages. Firstly, we conducted an experiment of scoring the web pages. Twenty-five subjects were invited to view top 50 web pages of China, and they were asked to give a score in a 5-point Likert-scale from four aspects, including complexity, comfortability, familiarity and usability. Secondly, the obtained results was analyzed by correlation analysis and factor analysis in R. By factor analysis; we analyzed the contributions of visual fluency and cognitive fluency to the access rates. The results showed that both visual fluency and cognitive fluency affect the access rate of web pages. Compared to cognitive fluency, visual fluency play a more important role in user’s accessing of web pages.Keywords: visual fluency, cognitive fluency, visual complexity, usability
Procedia PDF Downloads 3763371 Polish Catholic Discourse on Gender Equality in the Face of Social and Cultural Changes in Poland
Authors: Anna Jagielska
Abstract:
Five years ago, the word ‘gender’ was discussed in Poland exclusively in academic contexts. One year later, it was chosen as the word of the year and omnipresent in the Polish media. The rapid career of this word is due to the involvement of the Polish church hierarchy who strategically brought this term into relation with abortion, pornography and paedophilia. ‘Gender’ is more than a political slogan. It is a symbol of social anxiety and moral panic in Poland which need to be historically considered. The aim of this paper is to present selected rhetorical strategies used by the Polish Catholic clergy who strive to have an impact on the current gender discourse in Poland. In particular, the gender debate, culminated in the pastoral letter of the Bishops' Conference of Poland, will be discussed. The church’s protest against the Council of Europe’s Convention on Preventing and Combating Violence against Women and Domestic Violence will be analyzed and the recent heated debates in Poland on contraception, abortion, in vitro fertilization, and sex education will be mentioned. To provide explanations on the specificity of Polish gender debates the role of the Catholic Church in the fall of communism in Poland as well as the charismatisation of Polish society by Pope John Paul II will be explained. The social constructions of communism and feminism which are manifested in both written and symbolic contracts on gender equality between the Church and the State will be demonstrated. At the end of the paper, theories about the changing role of religion in society will be applied.Keywords: gender, Poland, religion, catholicism, feminism
Procedia PDF Downloads 2893370 A Review: Artificial Intelligence (AI) Driven User Access Management and Identity Governance
Authors: Rupan Preet Kaur
Abstract:
This article reviewed the potential of artificial intelligence in the field of identity and access management (IAM) and identity governance and administration (IGA), the most critical pillars of any organization. The power of leveraging AI in the most complex and huge user base environment was outlined by simplifying and streamlining the user access approvals and re-certifications without any impact on the user productivity and at the same time strengthening the overall compliance of IAM landscape. Certain challenges encountered in the current state were detailed where majority of organizations are still lacking maturity in the data integrity aspect. Finally, this paper concluded that within the realm of possibility, users and application owners can reap the benefits of unified approach provided by AI to improve the user experience, improve overall efficiency, and strengthen the risk posture.Keywords: artificial intelligence, machine learning, user access review, access approval
Procedia PDF Downloads 913369 Remittances and Water Access: A Cross-Sectional Study of Sub Saharan Africa Countries
Authors: Narges Ebadi, Davod Ahmadi, Hiliary Monteith, Hugo Melgar-Quinonez
Abstract:
Migration cannot necessarily relieve pressure on water resources in origin communities, and male out-migration can increase the water management burden of women. However, inflows of financial remittances seem to offer possibilities of investing in improving drinking-water access. Therefore, remittances may be an important pathway for migrants to support water security. This paper explores the association between water access and the receipt of remittances in households in sub-Saharan Africa. Data from round 6 of the 'Afrobarometer' surveys in 2016 were used (n= 49,137). Descriptive, bivariate and multivariate statistical analyses were carried out in this study. Regardless of country, findings from descriptive analyses showed that approximately 80% of the respondents never received remittance, and 52% had enough clean water. Only one-fifth of the respondents had piped water supply inside the house (19.9%), and approximately 25% had access to a toilet inside the house. Bivariate analyses revealed that even though receiving remittances was significantly associated with water supply, the strength of association was very weak. However, other factors such as the area of residence (rural vs. urban), cash income frequencies, electricity access, and asset ownership were strongly associated with water access. Results from unadjusted multinomial logistic regression revealed that the probability of having no access to piped water increased among remittance recipients who received financial support at least once a month (OR=1.324) (p < 0.001). In contrast, those not receiving remittances were more likely to regularly have a water access concern (OR=1.294) (p < 0.001), and not have access to a latrine (OR=1.665) (p < 0.001). In conclusion, receiving remittances is significantly related to water access as the strength of odds ratios for socio-demographic factors was stronger.Keywords: remittances, water access, SSA, migration
Procedia PDF Downloads 1773368 Students Awareness on Reproductive Health Education in Sri Lanka
Authors: Ayomi Indika Irugalbandara
Abstract:
Reproductive Health (RE) education among Sri Lankan Adolescents (comprising one fifth inner population) remains unsatisfactory despite 91.8% of them completing primary education & 56.2 % receiving post secondary level education. The main reason for this large population not receiving satisfactory RH education is traditional values and longstanding taboos surrounding sexuality. The current study was undertaken with there objectives. The relevance of achieving them being to formulate RH educational policies and programs that address a sizable and sensitive chunk of the population thereby achieving the goal of mental and social well being and not merely the absence of reproductive disease or infirmity. This research was a descriptive study, using random sampling technique, sample of the study consisting of 160 adolescent in the age group of 16-19, studying in government schools in Sri Lanka. Questionnaire was the main instrument of data collection, qualitative and quantitative techniques were used in data analysis. According to the data it was revealed that a majority has some idea about RH education. While this awareness had been provided by the school, the source of information had been Health and Physical Education. The entire sample mentioned that more RH information, than was provided, should be given and everybody wanted further knowledge regarding sexuality, and in depth information on it was essential. About 96 adolescents were of the opinion that their behavior was respectful to elders and 64 felt embarrassed while communicating with elders regarding RH issues. About their preferred sources of information, both genders named health providers as their first choice, followed by family members and friends. The internet was cited by a few boys; less than 5 percent cited religious figures. More than 50% of respondents had no knowledge about abortion and they were unaware of dangerous abortion. The practice of abortion was reported among zero percent. Although every member of the sample did not possess knowledge of the scientific process involved in abortion, all of them totally rejected the idea of destroying a foetus. Adolescence is a critical period in the life of girls and boys and sexuality education empowers young people to protect their health and well-being. Schools have the proper staff, and environment for learning. It might be stated that the greater segment of individuals entering adolescents and going through their adolescence are still in the school. This becomes the reason why it is mandatory that the school should be geared to handle this critical stage of the students. Adolescents or those approaching adolescence are best educated by the relevant parents, but this being quite a sensitive issue in the socio cultural context, it is somewhat doubtful whether all parents are prepared to handle this candidly, due either to lack of knowledge or absence of the appropriate state of mind. As such it is best that seminars/workshops be conducted to enlighten parents on handling HR issues related to their adolescent children. Apart from the awareness on HR provided through the school curriculum a greater impact can be brought about through street dramas, exhibitions etc. specific to HR. Finally the researcher would like to suggest that Sunday schools be harnessed for the provision of HR education linked with cultural values, ethics, and social well-being.Keywords: reproductive health, awareness, perception, school curriculum
Procedia PDF Downloads 5443367 Protection against Sodium Arsenate Induced Fetal Toxicity in Albino Mice by Vitamin C and E
Authors: Fariha Qureshi, Mohammad Tahir
Abstract:
Epidemiological evidences indicated that arsenic contamination in drinking water increased the incidence of spontaneous abortion, stillbirth and premature babies in pregnant women. This study was designed to investigate the protective role of vitamin C&E against sodium arsenate induced fetal toxicity in albino mice. Twenty-four pregnant albino mice of BALB/c strain were randomly divided into 4 groups having 6 animals in each. Group A1 served as control and was injected with 0.1ml/kg/day distilled water I/P for 18 days. Groups A2,A3 & A4 received single I/P injection of sodium arsenate 35mg/kg on 8th gestational day, whereas groups A3 and A4 were also given Vitamin C and E by I/P injection, 9 mg/kg/day and 15 mg/kg/day respectively, starting from 8th GD and continued for the rest of the pregnancy period. The early implantation sites, fetal resorptions, weight of live fetuses and crown rump length were recorded. Gross morphological examination was carried out for malformations. Fetal kidneys were extracted for histological and micrometric analysis. Group A2 exhibited an increased incidence of abortion, fetal resorptions, significant decrease in number of litter and fetal weight; the difference of means was statistically significant among the groups (p<0.000). In group A2 fetal kidneys presented glomerulonephritis with acute tubular necrotic changes and interstitial fibrosis. Groups A3&A4 showed statistically significant improvement in these parameters. The results revealed the antioxidant potential of Vitamin C and E in protecting against arsenic induced fetal toxicity in mice.Keywords: fetal toxicity, fetal resorptions, interstitial fibrosis, tocopherol
Procedia PDF Downloads 2713366 Access to Higher Education in Nigeria: The University of Calabar Pre-Degree Programme Experience
Authors: Eni I. Eni, James Okon, Ashang J. Ashang
Abstract:
The pre-degree programme of the University of Calabar was introduced to help increase access to tertiary Education in science related courses. This has become necessary due to population increase and public awareness. Its main objective was to provide access to candidates from educationally less developed states (ELDS) and states within its catchment area. To find out if this objective of the programme has been achieved, an impact evaluation of the programme was conducted, from where the aspect of providing access to University Education was reported here. It was reasoned that if this objective of the programme was properly implemented, there should be an evidence of increase in the access to University Education. To achieve the purpose of this study, two research questions were formulated; expost-facto research design and purposive sampling technique were adopted for the study. Data was collected from the Faculty of Science and analyzed using descriptive statistics in terms of frequencies and percentages. The result of data analysis showed that the pre-degree programme of the University of Calabar has provided educational access to Nigerians especially those from educationally less developed states in science related courses. It was therefore recommended that the programme be sustained and further be improved upon to facilitate its continued provision of access to University Education in Nigeria.Keywords: higher education, pre-degree programme, University of Calabar, educationally less developed states
Procedia PDF Downloads 3333365 An Attribute Based Access Control Model with POL Module for Dynamically Granting and Revoking Authorizations
Authors: Gang Liu, Huimin Song, Can Wang, Runnan Zhang, Lu Fang
Abstract:
Currently, resource sharing and system security are critical issues. This paper proposes a POL module composed of PRIV ILEGE attribute (PA), obligation and log which improves attribute based access control (ABAC) model in dynamically granting authorizations and revoking authorizations. The following describes the new model termed PABAC in terms of the POL module structure, attribute definitions, policy formulation and authorization architecture, which demonstrate the advantages of it. The POL module addresses the problems which are not predicted before and not described by access control policy. It can be one of the subject attributes or resource attributes according to the practical application, which enhances the flexibility of the model compared with ABAC. A scenario that illustrates how this model is applied to the real world is provided.Keywords: access control, attribute based access control, granting authorizations, privilege, revoking authorizations, system security
Procedia PDF Downloads 3573364 Analyzing the Technology Affecting on the Social Integration of Students at University
Authors: Sujit K. Basak, Simon Collin
Abstract:
The aim of this paper is to examine the technology access and use on the affecting social integration of local students at university. This aim is achieved by designing a structural equation modeling (SEM) in terms of integration with peers, integration with faculty, faculty support and on the other hand, examining the socio demographic impact on the technology access and use. The collected data were analyzed using the WarpPLS 5.0 software. This study was survey based and it was conducted at a public university in Canada. The results of the study indicated that technology has a strong impact on integration with faculty, faculty support, but technology does not have an impact on integration with peers. However, the social demographic has also an impact on the technology access and use.Keywords: faculty, integration, peer, technology access and use
Procedia PDF Downloads 5093363 Factors Associated with Unintended Pregnancy amongst Currently Married Pregnant Women in Ilesa Osun State, Nigeria
Authors: O. S. Asaolu, A. Bolorunduro
Abstract:
Background: Unwanted, mistimed and unintended pregnancy is an important public health issue and the most common cause of maternal mortality in developing countries. Unintended pregnancy is a potential hazard for every sexually active woman as it most times ends in unsafe abortion. The study aimed at assessing the pre-conception contraceptive use, prevalence of unintended pregnancies and the non-contraceptive factors associated with unintended pregnancy amongst currently married women in Osun state. Methodology: A descriptive cross-sectional study among randomly selected 341 currently married pregnant women attending antenatal clinics in Ilesa town of Osun state was conducted in 5 health facilities. A random selection of 5 of the 22 health facilities in the state was done. Data was collected through a self-administered questionnaire and all completed questionnaires were analyzed with SPSS. Result: About two-fifth of the currently pregnant women (40%) who has never used an FP method reported that their current pregnancy was unintended. The results indicate that age of women, age at first sex, substance use, total children ever born of children, religion, and extramarital affairs were key predictors of unintended pregnancy. Women who have higher parity are more likely to experience unintended pregnancy compared to women with lower parity (odds ratio, 0.25). Furthermore, those women who don’t engage in extra marital affairs were less likely to experience unintended pregnancy (odds ratio, 0.3) compared to those who do not. Contribution to knowledge: The predicted probability, using logistic regression, has shown that women who engage in extramarital affairs and women with high parity are more likely to have unintended pregnancy. Conclusion: Behaviour change programs should aim to reduce unintended pregnancy by focusing mostly on identified factors so that the need for abortion is decreased and the overall well-being of the family is maintained and enhanced.Keywords: unintended pregnancy, factors, pregnant women, Nigeria
Procedia PDF Downloads 3883362 Access to Health Data in Medical Records in Indonesia in Terms of Personal Data Protection Principles: The Limitation and Its Implication
Authors: Anny Retnowati, Elisabeth Sundari
Abstract:
This research aims to elaborate the meaning of personal data protection principles on patient access to health data in medical records in Indonesia and its implications. The method uses normative legal research by examining health law in Indonesia regarding the patient's right to access their health data in medical records. The data will be analysed qualitatively using the interpretation method to elaborate on the limitation of the meaning of personal data protection principles on patients' access to their data in medical records. The results show that patients only have the right to obtain copies of their health data in medical records. There is no right to inspect directly at any time. Indonesian health law limits the principle of patients' right to broad access to their health data in medical records. This restriction has implications for the reduction of personal data protection as part of human rights. This research contribute to show that a limitaion of personal data protection may abuse the human rights.Keywords: access, health data, medical records, personal data, protection
Procedia PDF Downloads 903361 Efficacy of Preimplantation Genetic Screening in Women with a Spontaneous Abortion History with Eukaryotic or Aneuploidy Abortus
Authors: Jayeon Kim, Eunjung Yu, Taeki Yoon
Abstract:
Most spontaneous miscarriage is believed to be a consequence of embryo aneuploidies. Transferring eukaryotic embryos selected by PGS is expected to decrease the miscarriage rate. Current PGS indications include advanced maternal age, recurrent pregnancy loss, repeated implantation failure. Recently, use of PGS for healthy women without above indications for the purpose of improving in vitro fertilization (IVF) outcomes is on the rise. However, it is still controversy about the beneficial effect of PGS in this population, especially, in women with a history of no more than 2 miscarriages or miscarriage of eukaryotic abortus. This study aimed to investigate if karyotyping result of abortus is a good indicator of preimplantation genetic screening (PGS) in subsequent IVF cycle in women with a history of spontaneous abortion. A single-center retrospective cohort study was performed. Women who had spontaneous abortion(s) (less than 3) and dilatation and evacuation, and subsequent IVF from January 2016 to November 2016 were included. Their medical information was extracted from the charts. Clinical pregnancy was defined as presence of a gestational sac with fetal heart beat detected on ultrasound in week 7. Statistical analysis was performed using SPSS software. Total 234 women were included. 121 out of 234 (51.7%) underwent karyotyping of the abortus, and 113 did not have the abortus karyotyped. Embryo biopsy was performed on 3 or 5 days after oocyte retrieval, followed by embryo transfer (ET) on a fresh or frozen cycle. The biopsied materials were subjected to microarray comparative genomic hybridization. Clinical pregnancy rate per ET was compared between PGS and non-PGS group in each study group. Patients were grouped by two criteria: karyotype of the abortus from previous miscarriage (unknown fetal karyotype (n=89, Group 1), eukaryotic abortus (n=36, Group 2) or aneuploidy abortus (n=67, Group 3)), and pursuing PGS in subsequent IVF cycle (pursuing PGS (PGS group, n=105) or not pursuing PGS (non-PGS group, n=87)). The PGS group was significantly older and had higher number of retrieved oocytes and prior miscarriages compared to non-PGS group. There were no differences in BMI and AMH level between those two groups. In PGS group, the mean number of transferable embryos (eukaryotic embryo) was 1.3 ± 0.7, 1.5 ± 0.5 and 1.4 ± 0.5, respectively (p = 0.049). In 42 cases, ET was cancelled because all embryos biopsied turned out to be abnormal. In all three groups (group 1, 2, and 3), clinical pregnancy rates were not statistically different between PGS and non-PGS group (Group 1: 48.8% vs. 52.2% (p=0.858), Group 2: 70% vs. 73.1% (p=0.730), Group 3: 42.3% vs. 46.7% (p=0.640), in PGS and non-PGS group, respectively). In both groups who had miscarriage with eukaryotic and aneuploidy abortus, the clinical pregnancy rate between IVF cycles with and without PGS was not different. When we compare miscarriage and ongoing pregnancy rate, there were no significant differences between PGS and non-PGS group in all three groups. Our results show that the routine application of PGS in women who had less than 3 miscarriages would not be beneficial, even in cases that previous miscarriage had been caused by fetal aneuploidy.Keywords: preimplantation genetic diagnosis, miscarriage, kpryotyping, in vitro fertilization
Procedia PDF Downloads 1803360 Low Students' Access to University Education in Nigeria: Causes and Remedy
Authors: Robert Ogbanje Okwori
Abstract:
The paper explained the causes low students’ access to university education in Nigeria and how it can be remedied. It is discovered that low students’ access to university education in Nigeria is evident despite these number of universities in the country. In 2006/2007 academic session, 806,089 sat for Joint Unified Matriculation Board Examination (JAMB) into Nigerian universities and only 123,626 (15.3%) were admitted while 2011/2012 academic session, a total of 1,493,604 candidates sat for Joint Unified Matriculation Board Examination (JAMB) into Nigerian universities and only 65,073 (43.57%) were admitted. This necessitates for the research. Therefore, the study posed the following research questions. What are causes of low students’ access to university education in Nigeria? What are the challenges of students’ access to university education in Nigeria? How can students’ access to university education in Nigeria be improved? Sample survey research design was adopted for the study. A structured questionnaire was used to gather data for the study. Six hundred and eighty (680) respondents which comprised of 100 level university students; JAMB Officers and University administrators (Vice Chancellors, Registrars and Admission Officers) were used for the study. Stratified random sampling was applied for adequate representation of respondents from universities in the six geopolitical zones of Nigeria. Mean was used to answer research questions while Kuder-Richardson formula 20 was used to check the internal consistency of the instrument. The correlation coefficient of the instrument was 0.87. The major findings include the carrying capacity of each university contributes to low students’ access to university education and academic staff were inadequate. From the analysis of the study, it is concluded that the rate of access to university education is low, therefore, every university should establish distance learning programme to reduce university admission crisis. The training infrastructure in the universities should be improved upon by the owners to increase the carrying capacity of each university.Keywords: access, causes, low, university
Procedia PDF Downloads 4673359 Analysis of Performance of 3T1D Dynamic Random-Access Memory Cell
Authors: Nawang Chhunid, Gagnesh Kumar
Abstract:
On-chip memories consume a significant portion of the overall die space and power in modern microprocessors. On-chip caches depend on Static Random-Access Memory (SRAM) cells and scaling of technology occurring as per Moore’s law. Unfortunately, the scaling is affecting stability, performance, and leakage power which will become major problems for future SRAMs in aggressive nanoscale technologies due to increasing device mismatch and variations. 3T1D Dynamic Random-Access Memory (DRAM) cell is a non-destructive read DRAM cell with three transistors and a gated diode. In 3T1D DRAM cell gated diode (D1) acts as a storage device and also as an amplifier, which leads to fast read access. Due to its high tolerance to process variation, high density, and low cost of memory as compared to 6T SRAM cell, it is universally used by the advanced microprocessor for on chip data and program memory. In the present paper, it has been shown that 3T1D DRAM cell can perform better in terms of fast read access as compared to 6T, 4T, 3T SRAM cells, respectively.Keywords: DRAM Cell, Read Access Time, Retention Time, Average Power dissipation
Procedia PDF Downloads 3113358 BTG-BIBA: A Flexibility-Enhanced Biba Model Using BTG Strategies for Operating System
Authors: Gang Liu, Can Wang, Runnan Zhang, Quan Wang, Huimin Song, Shaomin Ji
Abstract:
Biba model can protect information integrity but might deny various non-malicious access requests of the subjects, thereby decreasing the availability in the system. Therefore, a mechanism that allows exceptional access control is needed. Break the Glass (BTG) strategies refer an efficient means for extending the access rights of users in exceptional cases. These strategies help to prevent a system from stagnation. An approach is presented in this work for integrating Break the Glass strategies into the Biba model. This research proposes a model, BTG-Biba, which provides both an original Biba model used in normal situations and a mechanism used in emergency situations. The proposed model is context aware, can implement a fine-grained type of access control and primarily solves cross-domain access problems. Finally, the flexibility and availability improvement with the use of the proposed model is illustrated.Keywords: Biba model, break the glass, context, cross-domain, fine-grained
Procedia PDF Downloads 539