Search results for: access to justice
3460 A Practice of Zero Trust Architecture in Financial Transactions
Authors: Liwen Wang, Yuting Chen, Tong Wu, Shaolei Hu
Abstract:
In order to enhance the security of critical financial infrastructure, this study carries out a transformation of the architecture of a financial trading terminal to a zero trust architecture (ZTA), constructs an active defense system for cybersecurity, improves the security level of trading services in the Internet environment, enhances the ability to prevent network attacks and unknown risks, and reduces the industry and security risks brought about by cybersecurity risks. This study introduces the SDP technology of ZTA, adapts and applies it to a financial trading terminal to achieve security optimization and fine-grained business grading control. The upgraded architecture of the trading terminal moves security protection forward to the user access layer, replaces VPN to optimize remote access, and significantly improves the security protection capability of Internet transactions. The study achieves 1. deep integration with the access control architecture of the transaction system; 2. no impact on the performance of terminals and gateways, and no perception of application system upgrades; 3. customized checklist and policy configuration; 4. introduction of industry-leading security technology such as single-packet authorization (SPA) and secondary authentication. This study carries out a successful application of ZTA in the field of financial trading and provides transformation ideas for other similar systems while improving the security level of financial transaction services in the Internet environment.Keywords: zero trust, trading terminal, architecture, network security, cybersecurity
Procedia PDF Downloads 1733459 How to Ensure Environmental Sustainability and Food Security through the Use of Payments for Environmental Services in Developing Countries
Authors: Carlos Alves
Abstract:
This research paper demonstrates how payments for environmental services (PES) can be an effective mechanism to combat food insecurity and reduce environmental degradation in developing countries. The paper begins by discussing how environmental services affect each one of the pillars of food security: availability, access, and utilization of food. However, due to numerous global environmental challenges, a new pillar of food security based on environmental sustainability is proposed and discussed. An argument is then made that PES can usefully combat food insecurity. It can provide an extra income to those who take on environmental service and help them to have a better access to food. In order to be successful in addressing food insecurity, PES schemes should target on the poor and redress issues that can prevent their effectiveness. Finally, the research presents a case study that discusses how several developing countries addressed problems and successfully developed PES programs.Keywords: environmental sustainability, food security, nutrition, payments for environmental services
Procedia PDF Downloads 3953458 Remote Monitoring and Control System of Potentiostat Based on the Internet of Things
Authors: Liang Zhao, Guangwen Wang, Guichang Liu
Abstract:
Constant potometer is an important component of pipeline anti-corrosion systems in the chemical industry. Based on Internet of Things (IoT) technology, Programmable Logic Controller (PLC) technology and database technology, this paper developed a set of a constant potometer remote monitoring management system. The remote monitoring and remote adjustment of the working status of the constant potometer are realized. The system has real-time data display, historical data query, alarm push management, user permission management, and supporting Web access and mobile client application (APP) access. The actual engineering project test results show the stability of the system, which can be widely used in cathodic protection systems.Keywords: internet of things, pipe corrosion protection, potentiostat, remote monitoring
Procedia PDF Downloads 1483457 A Case Study: Beginning Teacher's Experiences of Mentoring in Secondary Education
Authors: Abdul Rofiq Badril Rizal M. Z.
Abstract:
This case study examines the experiences of four beginning teachers currently working in New South Wales secondary schools. Data were collected from semi-structured interviews conducted one on one over the period of one month. The data were coded with findings reported through key areas of discovery, which linked to the research presented in the literature review. The participants involved in the case study all reported positive experiences with mentoring, though none were given the opportunity to take part in a formal mentoring program, and all the mentors offered their time voluntarily. The mentoring took different forms, but the support most valued by the participants was the emotional and curriculum related supported received. All participants wished they had greater access to mentoring and felt it would have benefits for most beginning teachers. The study highlights ongoing issues around the lack of access to mentoring, which could be due to factors such as funding, time and training.Keywords: mentor, mentee, pre-service teacher, beginning teacher
Procedia PDF Downloads 1093456 The Role of Smart-Taps in Improving Water Accessibility in Rural Ghana
Authors: Ernestina Ohenewaah Denchie, Kevin Lo
Abstract:
Access to clean water is a key element of sustainable development, yet many nations cannot provide reliable water supply to their inhabitants, particularly in rural areas. In Ghana, public smart taps with pre-paid tokens for public standpipe management have been introduced to enhance access to clean water in small towns and rural communities. This research article highlights the impact of pre-paid token systems on water accessibility in small towns and rural Ghana, focusing on their alignment with Sustainable Development Goal 6. We utilize the Technology Acceptance Model (TAM) with data obtained from both quantitative and qualitative responses to demonstrate the user’s acceptance and overall effectiveness of the pre-paid token system in improving access to clean water. We find that among the characteristics of the pre-paid token system, convenience of use, user satisfaction, proximity and accessibility impact smart tap usage positively. Further analyses reveal that providing token loading points at vantage points within communities would improve smart tap usage by about 96%. Finally, our thematic analyses reveal that the problems of the smart tap system can be improved through regular maintenance and technical support, system improvement such as developing an online app for credit loading, restoring lost or unused credits, and better tracking of lost tokens.Keywords: smart tap, pre-paid, technology acceptance model, water supply
Procedia PDF Downloads 103455 Women's Challenges in Access to Urban Spaces and Infrastructures: A Comparative Study of the Urban Infrastructures Conforming to Women's Needs in Tehran and Istanbul
Authors: Parastoo Kazemiyan
Abstract:
Over the past 80 years, in compliance with the advent of modernity in Iran and Turkey, the presence of women in economic and social arenas has creates serious challenges in the capacity of urban spaces to respond to their presence and transport because urban spaces up until then were based on masculine criteria and therefore, women could use such spaces in the company of their fathers or husbands. However, as modernity expanded by Reza Shah and Ataturk, women found the opportunity to work and be present in urban spaces alongside men and their presence in economic and social domains resulted in their presence in these spaces in the early and late hours of the day. Therefore, the city had to be transformed in structural, social, and environmental terms to accommodate women's activities and presence in various urban arenas, which was a huge step in transition from a masculine man-based culture to an all-inclusive human-based culture in these two countries. However, the optimization of urban space was subject to political changes in the two countries, leading to significant differences in designing urban spaces in Tehran and Istanbul. What shows the importance and novelty of the present study lie in the differences in urban planning and optimization in the two capital cities, which gave rise to different outcomes in desirability and quality of living in these two capital cities. Due to the importance of the topic, one of the most significant factors in desirability and acceptability of urban space for women was examined using a descriptive-analytic method based on qualitative methodology in Tehran and Istanbul. The results showed that the infrastructural factors in Istanbul, including safety of access, variety, and number of public transport modes, transparency, and supervision over public spaces have provided women with a safer and more constant presence compared to Tehran. It seems that challenges involved in providing access to urban spaces in Tehran in terms of infrastructure and function have made Tehran unable to respond to the most basic needs of its female citizens.Keywords: gender differences, urban space security, access to transportation systems, women's challenges
Procedia PDF Downloads 1273454 Performance Evaluation of One and Two Dimensional Prime Codes for Optical Code Division Multiple Access Systems
Authors: Gurjit Kaur, Neena Gupta
Abstract:
In this paper, we have analyzed and compared the performance of various coding schemes. The basic ID prime sequence codes are unique in only dimension, i.e. time slots, whereas 2D coding techniques are not unique by their time slots but with their wavelengths also. In this research, we have evaluated and compared the performance of 1D and 2D coding techniques constructed using prime sequence coding pattern for Optical Code Division Multiple Access (OCDMA) system on a single platform. Analysis shows that 2D prime code supports lesser number of active users than 1D codes, but they are having large code family and are the most secure codes compared to other codes. The performance of all these codes is analyzed on basis of number of active users supported at a Bit Error Rate (BER) of 10-9.Keywords: CDMA, OCDMA, BER, OOC, PC, EPC, MPC, 2-D PC/PC, λc, λa
Procedia PDF Downloads 3383453 A Knowledge-As-A-Service Support Framework for Ambient Learning in Kenya
Authors: Lucy W. Mburu, Richard Karanja, Simon N. Mwendia
Abstract:
Over recent years, learners have experienced a constant need to access on demand knowledge that is fully aligned with the paradigm of cloud computing. As motivated by the global sustainable development goal to ensure inclusive and equitable learning opportunities, this research has developed a framework hinged on the knowledge-as-a-service architecture that utilizes knowledge from ambient learning systems. Through statistical analysis and decision tree modeling, the study discovers influential variables for ambient learning among university students. The main aim is to generate a platform for disseminating and exploiting the available knowledge to aid the learning process and, thus, to improve educational support on the ambient learning system. The research further explores how collaborative effort can be used to form a knowledge network that allows access to heterogeneous sources of knowledge, which benefits knowledge consumers, such as the developers of ambient learning systems.Keywords: actionable knowledge, ambient learning, cloud computing, decision trees, knowledge as a service
Procedia PDF Downloads 1623452 Normative Reflections on the International Court of Justice's Jurisprudence on the Protection of Human Rights in Times of War
Authors: Roger-Claude Liwanga
Abstract:
This article reflects on the normative aspects of the jurisprudence on the protection of human rights in times of war that the International Court of Justice (ICJ) developed in 2005 in the Case Concerning Armed Activities on the Territory of the Congo (Democratic Republic of Congo v. Uganda). The article focuses on theories raised in connection with the Democratic Republic of Congo (DRC)'s claim of the violation of human rights of its populations by Uganda as opposed to the violation of its territorial integrity claims. The article begins with a re-visitation of the doctrine of state extraterritorial responsibility for violations of human rights by suggesting that a state's accountability for the breach of its international obligations is not territorially confined but rather transcends the State's national borders. The article highlights the criteria of assessing the State's extraterritorial responsibility, including the circumstances: (1) where the concerned State has effective control over the territory of another State in the context of belligerent occupation, and (2) when the unlawful actions committed by the State's organs on the occupied territory can be attributable to that State. The article also analyzes the ICJ's opinions articulated in DRC v. Uganda with reference to the relationship between human rights law and humanitarian law, and it contends that the ICJ had revised the traditional interaction between these two bodies of law to the extent that human rights law can no longer be excluded from applying in times of war as both branches are complementary rather than exclusive. The article correspondingly looks at the issue of reparations for victims of human rights violations. It posits that reparations for victims of human rights violations should be integral (including restitution, compensation, rehabilitation, satisfaction, and guarantees of non-repetition). Yet, the article concludes by emphasizing that reparations for victims were not integral in DRC v. Uganda because: (1) the ICJ failed to set a reasonable timeframe for the negotiations between the DRC and Uganda on the amount of compensation, resulting in Uganda paying no financial reparation to the DRC since 2005; and (2) the ICJ did not request Uganda to domestically prosecute the perpetrators of human rights abuses.Keywords: human rights law, humanitarian law, civilian protection, extraterritorial responsibility
Procedia PDF Downloads 1403451 Comparative Learning Challenges Experienced by Students in Universities of Developing Nations in Sub-Saharan Africa
Authors: Chinaza Uleanya, Martin Duma, Bongani Gamede
Abstract:
The study investigated learning challenges experienced by students in universities situated in developing sub-Saharan African countries using selected universities in South Africa and Nigeria. Questionnaires were administered to 2,335 randomly selected students from selected universities in South Africa and Nigeria. The outcome of the study shows that six common learning challenges are visible in developing sub-Sahara African universities. The causes of these learning challenges cut across the failure in responsibilities of the various stakeholders in the field of education and the effects are monumental both to the students and society. This paper suggests recommendations to university administrators, education policy makers and implementers on the need to take education more seriously, to review and implement appropriate policies, and to ensure provision of quality education through the supply of adequate amenities and other motivating factors.Keywords: learning, challenges, learning challenges, access with success, participatory access
Procedia PDF Downloads 3003450 Co-Design of Accessible Speech Recognition for Users with Dysarthric Speech
Authors: Elizabeth Howarth, Dawn Green, Sean Connolly, Geena Vabulas, Sara Smolley
Abstract:
Through the EU Horizon 2020 Nuvoic Project, the project team recruited 70 individuals in the UK and Ireland to test the Voiceitt speech recognition app and provide user feedback to developers. The app is designed for people with dysarthric speech, to support communication with unfamiliar people and access to speech-driven technologies such as smart home equipment and smart assistants. Participants with atypical speech, due to a range of conditions such as cerebral palsy, acquired brain injury, Down syndrome, stroke and hearing impairment, were recruited, primarily through organisations supporting disabled people. Most had physical or learning disabilities in addition to dysarthric speech. The project team worked with individuals, their families and local support teams, to provide access to the app, including through additional assistive technologies where needed. Testing was user-led, with participants asked to identify and test use cases most relevant to their daily lives over a period of three months or more. Ongoing technical support and training were provided remotely and in-person throughout the testing period. Structured interviews were used to collect feedback on users' experiences, with delivery adapted to individuals' needs and preferences. Informal feedback was collected through ongoing contact between participants, their families and support teams and the project team. Focus groups were held to collect feedback on specific design proposals. User feedback shared with developers has led to improvements to the user interface and functionality, including faster voice training, simplified navigation, the introduction of gamification elements and of switch access as an alternative to touchscreen access, with other feature requests from users still in development. This work offers a case-study in successful and inclusive co-design with the disabled community.Keywords: co-design, assistive technology, dysarthria, inclusive speech recognition
Procedia PDF Downloads 1133449 Boundary Crossings: Brahmanical Patriarchy, Power, and Sexual Violence in COVID-19 in Odisha, India
Authors: Saraswati Suna
Abstract:
The outbreak of the COVID-19 epidemic and the subsequent lockdown have significantly impacted India's political, structural, and economic systems and a rising gap between the rich and the disadvantaged, upper and lower caste. For Dalit women, such forms of subjugation were followed by socioeconomic uncertainty due to the pandemic's economic shutdown and labour oppressions. Dalit women have been the victims of the most oppression among the nation's underprivileged groups. Dalit women undergo systemic oppression at the hands of the state, caste, class, gender, and religious hegemons historically. Dalit women hold a subordinate position within the gender to their male counterparts and caste to their upper-caste counterparts. This paper examines how Brahminical patriarchy and state power severely affected Dalit/Adivasi women during COVID-19 in Odisha, India. In order to understand caste-based sexual violence, a total of five cases have been analysed from newspapers. Findings revealed that Covid-19 appears to have a significant physical, psychological, and economic impact on Dalit women. The intention of sexual harassment and rape perpetrated by upper caste men is to maintain power and patriarchal culture in society. Dalit women are economically, socially, and culturally marginalised, which effectively exacerbates the sense of impunity by perpetrators of violence against Dalit women. This issue requires special attention to end atrocities against Dalit women. Dalit women become the target of rape, sexual assault, and murder. Sexual violence against Dalit women cannot be fully explained without linkage to caste, gender, and power. Dominant caste comes through caste privilege-socio-economic and politically; these factors contribute to sexual violence against Dalit women. The findings revealed that state police manipulate sexual violence, and in so doing, they create and deny access to both services to get justice. This article has argued that understanding Brahminical culture and the legal impacts of state police on Dalit women's identity requires a nuanced analysis.Keywords: COVID-19, dalit women, sexual violence, brahminical patriarchy, power
Procedia PDF Downloads 1793448 Variance-Aware Routing and Authentication Scheme for Harvesting Data in Cloud-Centric Wireless Sensor Networks
Authors: Olakanmi Oladayo Olufemi, Bamifewe Olusegun James, Badmus Yaya Opeyemi, Adegoke Kayode
Abstract:
The wireless sensor network (WSN) has made a significant contribution to the emergence of various intelligent services or cloud-based applications. Most of the time, these data are stored on a cloud platform for efficient management and sharing among different services or users. However, the sensitivity of the data makes them prone to various confidentiality and performance-related attacks during and after harvesting. Various security schemes have been developed to ensure the integrity and confidentiality of the WSNs' data. However, their specificity towards particular attacks and the resource constraint and heterogeneity of WSNs make most of these schemes imperfect. In this paper, we propose a secure variance-aware routing and authentication scheme with two-tier verification to collect, share, and manage WSN data. The scheme is capable of classifying WSN into different subnets, detecting any attempt of wormhole and black hole attack during harvesting, and enforcing access control on the harvested data stored in the cloud. The results of the analysis showed that the proposed scheme has more security functionalities than other related schemes, solves most of the WSNs and cloud security issues, prevents wormhole and black hole attacks, identifies the attackers during data harvesting, and enforces access control on the harvested data stored in the cloud at low computational, storage, and communication overheads.Keywords: data block, heterogeneous IoT network, data harvesting, wormhole attack, blackhole attack access control
Procedia PDF Downloads 863447 Performance Evaluation of an Efficient Asynchronous Protocol for WDM Ring MANs
Authors: Baziana Peristera
Abstract:
The idea of the asynchronous transmission in wavelength division multiplexing (WDM) ring MANs is studied in this paper. Especially, we present an efficient access technique to coordinate the collisions-free transmission of the variable sizes of IP traffic in WDM ring core networks. Each node is equipped with a tunable transmitter and a tunable receiver. In this way, all the wavelengths are exploited for both transmission and reception. In order to evaluate the performance measures of average throughput, queuing delay and packet dropping probability at the buffers, a simulation model that assumes symmetric access rights among the nodes is developed based on Poisson statistics. Extensive numerical results show that the proposed protocol achieves apart from high bandwidth exploitation for a wide range of offered load, fairness of queuing delay and dropping events among the different packets size categories.Keywords: asynchronous transmission, collision avoidance, wavelength division multiplexing, WDM
Procedia PDF Downloads 3773446 SMEs Access to Finance in Croatia – Model Approach
Authors: Vinko Vidučić, Ljiljana Vidučić, Damir Boras
Abstract:
The goals of the research include the determination of the characteristics of SMEs finance in Croatia, as well as the determination of indirect growth rates of the information model of the entrepreneurs` perception of business environment. The research results show that cost of finance and access to finance are most important constraining factor in setting up and running the business of small entrepreneurs in Croatia. Furthermore, small entrepreneurs in Croatia are significantly dissatisfied with the administrative barriers although relatively to a lesser extent than was the case in the pre-crisis time. High collateral requirement represents the main characteristic of bank lending concerning SMEs followed by long credit elaboration process. Formulated information model has defined the individual impact of indirect growth rates of the remaining variables on the model’s specific variable.Keywords: business environment, information model, indirect growth rates, SME finance
Procedia PDF Downloads 3723445 Enhancing Water Purification with Angiosperm Xylem Filters
Authors: Yinan Zhou
Abstract:
One in four people in the world still lack access to clean drinking water, and there is a current lack of cost-effective ways for water-scarce regions to access it. This study seeks to investigate the solutions to water filtration in rural China as well as test the feasibility of using angiosperms as xylem candidates. Four angiosperms that are found in China and around Asia were subject to three tests to test their filtration capacity: ink water filtration, creek water filtration, and microparticle filtration. Analysis of the experiments demonstrated that Celtis Sinensis was able to produce one of the clearest solutions, filter out large debris and bacteria, and reject microparticles almost completely. Celtis Sinensis proves that angiosperm xylem filters are also competent filter candidates and, due to their availability in China, can be used as a nearby source of water filtration. Further research should be done on scaling production to a larger scale and also on the filtration of viruses.Keywords: xylem filter, water quality, China, angiosperms, bacteria
Procedia PDF Downloads 153444 Plasma-Induced Modification of Biomolecules: A Tool for Analysis of Protein Structures
Authors: Yuting Wu, Faraz Choudhury, Daniel Benjamin, James Whalin, Joshua Blatz, Leon Shohet, Michael Sussman, Mark Richards
Abstract:
Plasma-Induced Modification of Biomolecules (PLIMB) has been developed as a technology, which, together with mass spectrometry, measures three-dimensional structural characteristics of proteins. This technique uses hydroxyl radicals generated by atmospheric-pressure plasma discharge to react with the solvent-accessible side chains of protein in an aqueous solution. In this work, we investigate the three-dimensional structure of hemoglobin and myoglobin using PLIMB. Additional modifications to these proteins, such as oxidation, fragmentations, and conformational changes caused by PLIMB are also explored. These results show that PLIMB, coupled with mass spectrometry, is an effective way to determine solvent access to hemoproteins. Furthermore, we show that many factors, including pH and the electrical parameters used to generate the plasma, have a significant influence on solvent accessibility.Keywords: plasma, hemoglobin, myoglobin, solvent access
Procedia PDF Downloads 1983443 Using Podcasts as an Educational Medium to Deliver Education to Pre-Registered Mental Health Nursing Students
Authors: Jane Killough
Abstract:
A podcast series was developed to support learning amongst first-year undergraduate mental health nursing students. Many first-year students do not have any clinical experience and find it difficult to engage with theory, which can present as cumbersome. Further, it can be challenging to relate abstract concepts to everyday mental health practice. Mental health professionals and service users from practice were interviewed on a range of core topics that are key to year one learning. The podcasts were made available, and students could access these recordings at their convenience to fit in with busy daily routines. The aim was to enable meaningful learning by providing access to those who have lived experience and who can, in effect, bring to life the theory being taught in university and essentially bridge the theory and practice gap while fostering working relationships between practice and academics. The student experience will be evaluated using a logic model.Keywords: education, mental health nursing students, podcast, practice, undergraduate
Procedia PDF Downloads 1553442 Open Data for e-Governance: Case Study of Bangladesh
Authors: Sami Kabir, Sadek Hossain Khoka
Abstract:
Open Government Data (OGD) refers to all data produced by government which are accessible in reusable way by common people with access to Internet and at free of cost. In line with “Digital Bangladesh” vision of Bangladesh government, the concept of open data has been gaining momentum in the country. Opening all government data in digital and customizable format from single platform can enhance e-governance which will make government more transparent to the people. This paper presents a well-in-progress case study on OGD portal by Bangladesh Government in order to link decentralized data. The initiative is intended to facilitate e-service towards citizens through this one-stop web portal. The paper further discusses ways of collecting data in digital format from relevant agencies with a view to making it publicly available through this single point of access. Further, possible layout of this web portal is presented.Keywords: e-governance, one-stop web portal, open government data, reusable data, web of data
Procedia PDF Downloads 3573441 The Views of Health Care Professionals outside of the General Practice Setting on the Provision of Oral Contraception in Comparison to Long-Acting Reversible Contraception
Authors: Carri Welsby, Jessie Gunson, Pen Roe
Abstract:
Currently, there is limited research examining health care professionals (HCPs) views on long-acting reversible contraception (LARC) advice and prescription, particularly outside of the general practice (GP) setting. The aim of this study is to systematically review existing evidence around the barriers and enablers of oral contraception (OC) in comparison to LARC, as perceived by HCPs in non-GP settings. Five electronic databases were searched in April 2018 using terms related to LARC, OC, HCPs, and views, but not terms related to GPs. Studies were excluded if they concerned emergency oral contraception, male contraceptives, contraceptive use in conjunction with a health condition(s), developing countries, GPs and GP settings, were non-English or was not published before 2013. A total of six studies were included for systematic reviewing. Five key areas emerged, under which themes were categorised, including (1) understanding HCP attitudes and counselling practices towards contraceptive methods; (2) assessment of HCP attitudes and beliefs about contraceptive methods; (3) misconceptions and concerns towards contraceptive methods; and (4) influences on views, attitudes, and beliefs of contraceptive methods. Limited education and training of HCPs exists around LARC provision, particularly compared to OC. The most common misconception inhibiting HCPs contraceptive information delivery to women was the belief that LARC was inappropriate for nulliparous women. In turn, by not providing the correct information on a variety of contraceptive methods, HCP counselling practices were disempowering for women and restricted them from accessing reproductive justice. Educating HCPs to be able to provide accurate and factual information to women on all contraception is vital to encourage a woman-centered approach during contraceptive counselling and promote informed choices by women.Keywords: advice, contraceptives, health care professionals, long acting reversible contraception, oral contraception, reproductive justice
Procedia PDF Downloads 1623440 Using Photogrammetry to Survey the Côa Valley Iron Age Rock Art Motifs: Vermelhosa Panel 3 Case Study
Authors: Natália Botica, Luís Luís, Paulo Bernardes
Abstract:
The Côa Valley, listed World Heritage since 1998, presents more than 1300 open-air engraved rock panels. The Archaeological Park of the Côa Valley recorded the rock art motifs, testing various techniques based on direct tracing processes on the rock, using natural and artificial lighting. In this work, integrated in the "Open Access Rock Art Repository" (RARAA) project, we present the methodology adopted for the vectorial drawing of the rock art motifs based on orthophotos taken from the photogrammetric survey and 3D models of the rocks. We also present the information system designed to integrate the vector drawing and the characterization data of the motifs, as well as the open access sharing, in order to promote their reuse in multiple areas. The 3D models themselves constitute a very detailed record, ensuring the digital preservation of the rock and iconography. Thus, even if a rock or motif disappears, it can continue to be studied and even recreated.Keywords: rock art, archaeology, iron age, 3D models
Procedia PDF Downloads 853439 Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in Our Modern Threat Landscape
Authors: Sandesh Achar
Abstract:
Cloud computing security is a broad term that covers a variety of security concerns for organizations that use cloud services. Multi-cloud service providers must consider several factors when addressing security for their customers, including identity and access management, data at rest and in transit, egress and ingress traffic control, vulnerability and threat management, and auditing. This paper explores each of these aspects of cloud security in detail and provides recommendations for best practices for multi-cloud service providers. It also discusses the challenges inherent in securing a multi-cloud environment and offers solutions for overcoming these challenges. By the end of this paper, readers should have a good understanding of the various security concerns associated with multi-cloud environments in the context of today’s modern cyber threats and how to address them.Keywords: multi-cloud service, system organization control, data loss prevention, identity and access management
Procedia PDF Downloads 993438 Dynamic Bandwidth Allocation in Fiber-Wireless (FiWi) Networks
Authors: Eman I. Raslan, Haitham S. Hamza, Reda A. El-Khoribi
Abstract:
Fiber-Wireless (FiWi) networks are a promising candidate for future broadband access networks. These networks combine the optical network as the back end where different passive optical network (PON) technologies are realized and the wireless network as the front end where different wireless technologies are adopted, e.g. LTE, WiMAX, Wi-Fi, and Wireless Mesh Networks (WMNs). The convergence of both optical and wireless technologies requires designing architectures with robust efficient and effective bandwidth allocation schemes. Different bandwidth allocation algorithms have been proposed in FiWi networks aiming to enhance the different segments of FiWi networks including wireless and optical subnetworks. In this survey, we focus on the differentiating between the different bandwidth allocation algorithms according to their enhancement segment of FiWi networks. We classify these techniques into wireless, optical and Hybrid bandwidth allocation techniques.Keywords: fiber-wireless (FiWi), dynamic bandwidth allocation (DBA), passive optical networks (PON), media access control (MAC)
Procedia PDF Downloads 5333437 The Effect of Family SES (Income) On Children’s Socio-Emotional Development
Authors: Xiao Hu
Abstract:
Children’s social and emotional development is critical for developing their future relationships and behaviors, and poor social skills may result in serious emotional externalizations such as anxiety, distress and aggression. Recent research has emphasized the role of family socio-economic status on children’s emotional development, and this study contributes to this academic discussion by reviewing how socio-economic status affects children at three critical development stages: infancy (0-3months), pre-school (4 months-5 years) and school aged (6-10 years). Results show a consensus in the research literature on a positive relationship between family socio-economic status and children’s emotional development. Socialization, a crucial development milestone, is highly affected by a family’s socio-economic status, as families with higher incomes have access to improved social environments, healthier parenting styles and greater access to social capital and peer support. In contrast, families with lower income and SES (socio-economic status) have lower access to these benefits and are frequently ignored within social environments. This review concludes with a critical discussion on how family income affects children’s social environment, highlighting the important role that “permanent” income plays in children’s development. Consequently, the review suggests that future governments should provide temporary economic support for lower-income families, allowing children to be raised in a healthy social environment with limited economic fluctuation.Keywords: family socio-economic status, parenting style, children’s emotional development, family permanent income
Procedia PDF Downloads 1423436 A Study to Explore the Views of Students regarding E-Learning as an Instructional Tool at University Level
Authors: Zafar Iqbal
Abstract:
This study involved students of 6th semester enrolled in a Bachelor of Computer Science Program at university level. In this era of science and technology, e-learning can be helpful for grassroots in providing them access to education tenant in less developed areas. It is a potential substitute of face-to-face teaching being used in different countries. The purpose of the study was to explore the views of students about e-learning (Facebook) as an instructional tool. By using purposive sampling technique an intact class of 30 students included both male and female were selected where e-learning was used as an instructional tool. The views of students were explored through qualitative approach by using focus group interviews. The approach was helpful to develop comprehensive understanding of students’ views towards e- learning. In addition, probing questions were also asked and recorded. Data was transcribed, generated nodes and then coded text against these nodes. For this purpose and further analysis, NVivo 10 software was used. Themes were generated and tangibly presented through cluster analysis. Findings were interesting and provide sufficient evidence that face book is a subsequent e-learning source for students of higher education. Students acknowledged it as best source of learning and it was aligned with their academic and social behavior. It was not time specific and therefore, feasible for students who work day time and can get on line access to the material when they got free time. There were some distracters (time wasters) reported by the students but can be minimized by little effort. In short, e-learning is need of the day and potential learning source for every individual who have access to internet living at any part of the globe.Keywords: e-learning, facebook, instructional tool, higher education
Procedia PDF Downloads 3773435 Self-Image of Police Officers
Authors: Leo Carlo B. Rondina
Abstract:
Self-image is an important factor to improve the self-esteem of the personnel. The purpose of the study is to determine the self-image of the police. The respondents were the 503 policemen assigned in different Police Station in Davao City, and they were chosen with the used of random sampling. With the used of Exploratory Factor Analysis (EFA), latent construct variables of police image were identified as follows; professionalism, obedience, morality and justice and fairness. Further, ordinal regression indicates statistical characteristics on ages 21-40 which means the age of the respondent statistically improves self-image.Keywords: police image, exploratory factor analysis, ordinal regression, Galatea effect
Procedia PDF Downloads 2903434 Ethical Considerations for Conducting Research on Violence against Women with Disabilities: Discussing Issues of Reasonable Accommodation, Capacity and Equal Participation
Authors: Ingrid Van Der Heijden, Naeemah Abrahams, Jane Harries
Abstract:
Background: Women with disabilities are largely missing from global research on violence prevention, yet research shows that women with disabilities are a particularly marginalised group who experience heightened levels and unique forms of violence than men with disabilities, and women without disabilities. They face heightened stigma, discrimination, and violence due to their gender and their disability. Including women with disabilities in violence, research helps inform policy and prevention interventions that are relevant and inclusive. To ensure their inclusion in violence research, we need ethical guidelines that are sensitive to their heightened risk and vulnerability, that recognize the diversity in the disabled population, but that also promote disabled people’s agency in defining their own violence prevention needs and agendas. Objective: To highlight pertinent ethical issues around women with disabilities’ inclusion and participation in violence research. Methodology: Considering the lack of formalized guidelines for research of people with disabilities, we draw from the literature on international ethics guidelines for researching violence against women, and the Emancipatory Disability Research paradigm, as well as drawing from our own experiences from the field in applying the guidelines when doing research with disabled women. Findings: Following the guiding ethical principles of respect, benefit, justice, and do no harm, we argue that reasonable accommodation, capacity, and equal participation need to be considered in conceptualizing and conducting ethical violence research with women with disabilities. We conclude that disability research in the area of violence is highly politicized and must be carefully scrutinized to ensure justice and the contribution of women with disabilities to their own welfare. Implications: We suggest that these issues are practically applied in the field and tested and critiqued to enhance best practice for undertaking ethical research with this particular group. It is important that not only researchers and ethics committees, but also disabled women and disabled organizations, are involved in enhancing and formalizing ethical research guidelines for marginalized populations.Keywords: capacity, emancipatory disability research paradigm equal participation, reasonable accommodation, research ethics, violence against women with disabilities
Procedia PDF Downloads 3453433 Dry Season Rice Production along Hadejia Valley Irrigation Scheme in Auyo Local Government Area in Jigawa State
Authors: Saifullahi Umar, Baba Mamman Yarima, Mohammed Bello Usman, Hassan Mohammed
Abstract:
This study was conducted along with the Hadejia valley project irrigation under the Hadejia-Jama’are River Basin Development Authority (HRBDA) in Jigawa State. The multi-stage sampling procedure was used to select 72 rice farmers operating along with the Hadejia Valley Irrigation Project. Data for the study were collected using a structured questionnaire. The analytical tools employed for the study were descriptive statistics and Farm budget technique. The result shows that 55% of the farmers were between 31-40 years of age, 66.01% were male, and the result also revealed that the total cost of cultivation of an acre of land for rice production during the dry season was N73,900 with input cost accounting for 63.59% of the total cost of production. The gross return was N332,500, with a net return of N258,600 per acre. The estimated benefit-cost ratio of 3.449 indicates the strong performance of the dry season rice production. The leading constraints to dry season rice production were low access to quality extension services, low access to finance, poor quality fertilizers, and poor prices. The study, therefore, concludes that dry season rice production is a profitable enterprise in the study area hence, to productivity the farmers should be linked to effective extension service delivery institutions, expanding their access to productive sources of finances, the government should strengthen fertilizer quality control measures and comprehensive market linkages for the farmers.Keywords: Auyo, dry season, Hadejia Valley, rice
Procedia PDF Downloads 1723432 Digital Skepticism In A Legal Philosophical Approach
Authors: dr. Bendes Ákos
Abstract:
Digital skepticism, a critical stance towards digital technology and its pervasive influence on society, presents significant challenges when analyzed from a legal philosophical perspective. This abstract aims to explore the intersection of digital skepticism and legal philosophy, emphasizing the implications for justice, rights, and the rule of law in the digital age. Digital skepticism arises from concerns about privacy, security, and the ethical implications of digital technology. It questions the extent to which digital advancements enhance or undermine fundamental human values. Legal philosophy, which interrogates the foundations and purposes of law, provides a framework for examining these concerns critically. One key area where digital skepticism and legal philosophy intersect is in the realm of privacy. Digital technologies, particularly data collection and surveillance mechanisms, pose substantial threats to individual privacy. Legal philosophers must grapple with questions about the limits of state power and the protection of personal autonomy. They must consider how traditional legal principles, such as the right to privacy, can be adapted or reinterpreted in light of new technological realities. Security is another critical concern. Digital skepticism highlights vulnerabilities in cybersecurity and the potential for malicious activities, such as hacking and cybercrime, to disrupt legal systems and societal order. Legal philosophy must address how laws can evolve to protect against these new forms of threats while balancing security with civil liberties. Ethics plays a central role in this discourse. Digital technologies raise ethical dilemmas, such as the development and use of artificial intelligence and machine learning algorithms that may perpetuate biases or make decisions without human oversight. Legal philosophers must evaluate the moral responsibilities of those who design and implement these technologies and consider the implications for justice and fairness. Furthermore, digital skepticism prompts a reevaluation of the concept of the rule of law. In an increasingly digital world, maintaining transparency, accountability, and fairness becomes more complex. Legal philosophers must explore how legal frameworks can ensure that digital technologies serve the public good and do not entrench power imbalances or erode democratic principles. Finally, the intersection of digital skepticism and legal philosophy has practical implications for policy-making. Legal scholars and practitioners must work collaboratively to develop regulations and guidelines that address the challenges posed by digital technology. This includes crafting laws that protect individual rights, ensure security, and promote ethical standards in technology development and deployment. In conclusion, digital skepticism provides a crucial lens for examining the impact of digital technology on law and society. A legal philosophical approach offers valuable insights into how legal systems can adapt to protect fundamental values in the digital age. By addressing privacy, security, ethics, and the rule of law, legal philosophers can help shape a future where digital advancements enhance, rather than undermine, justice and human dignity.Keywords: legal philosophy, privacy, security, ethics, digital skepticism
Procedia PDF Downloads 463431 Effective, Affordable, and Accessible Treatment for Pregnancy’s Commonest Complication: Online Synchronous Interpersonal Psychotherapy for Mothers with Postpartum Depression
Authors: Vivian Polak, Lena Verdeli, Wendy Lou, Caroline Lovett
Abstract:
Postnatal depression (PND) is a common complication of childbirth that increases the risk of future depressive episodes in women, postpartum depression in partners, as well as social, emotional, behavioural, language, and cognitive problems in offspring. Although psychotherapy, and in particular Group Interpersonal Psychotherapy (IPT-G), has been proven effective in treating PND, it remains largely inaccessible. However, research has indicated that online synchronous group therapy can be equally as effective as in-person therapy and is a more affordable and accessible modality of treatment. This study aimed to ascertain whether delivering IPT-G virtually when compared to treatment as usual, could more effectively reduce depressive and anxiety symptoms, enhance mother-infant attachment, improve the couple relationship, augment social support, improve overall functioning, and enhance the quality of life for women in rural and northern Ontario who are suffering from PND. By bridging the gap in access to mental health services during the postpartum period, this study seeks to improve the well-being of mothers and their families in rural and northern Ontario, Canada. A randomized controlled trial was conducted to determine whether virtual IPT-G plus treatment as usual would be more effective than treatment as usual alone in treating women with PND in Ontario, Canada. Preliminary results indicate that women who received virtual IPT-G had a clinically and statistically significant decrease in overall depressive symptoms compared to their counterparts who received only the treatment as usual. As such, providing online synchronous IPT-G in the perinatal period not only has the potential to improve women's outcomes in the present but also to decrease future health costs, reduce the burden on the educational and justice systems, and decrease the number of disability life years lost to postnatal depression.Keywords: family wellbeing, group psychotherapy, interpersonal psychotherapy, postnatal depression, virtual psychotherapy
Procedia PDF Downloads 69