Search results for: remote file access
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4562

Search results for: remote file access

3872 Effect of Credit Use on Technical Efficiency of Cassava Farmers in Ondo State, Nigeria

Authors: Adewale Oladapo, Carolyn A. Afolami

Abstract:

Agricultural production should be the major financial contributor to the Nigerian economy; however, the petroleum sector had taken the importance attached to this sector. The situation tends to be more worsening unless necessary attention is given to adequate credit supply among food crop farmers. This research analyses the effect of credit use on the technical efficiency of cassava farmers in Ondo State, Nigeria. Primary data were collected from two hundred randomly selected cassava farmers through a multistage sampling procedure in the study area. Data were analysed using descriptive statistics and stochastic frontier analysis (SFA). Findings revealed that 95.0% of the farmers were male while 56.0% had no formal education and were married. The SFA showed that cassava farmer’s efficiency increased with farm size, herbicide and planting material at 5%,10% and 1% respectively but decreased with fertilizer application at 1% level while farmers’ age, education, household size, experience and access to credit increased technical inefficiency at 10%. The study concluded that cassava farmers are technically inefficient in the use of farm resources and recommended that adequate and workable agricultural policy measures that will ensure availability and efficient fertilizer distribution should be put in place to increase efficiency. Furthermore, the government should encourage youth participation in cassava production and ensure improvement in farmer’s access to credit to increase farmer’s technical efficiency.

Keywords: agriculture, access to credit, cassava farmers, technical efficiency

Procedia PDF Downloads 177
3871 Readiness of Estonian Working and Non-working Older Adults to Benefit from eHealth

Authors: Marianne Paimre

Abstract:

Estonia is heralded as the most successful digital country in the world with the highly acclaimed eHealth system. Yet 40% of the 65–74-year-olds do not use the Internet at all, and digital divide between young and elderly people's use of ICT is larger than in many advanced countries. Poor access to ICT resource and insufficient digital skills can lead to detachment from digital health resources, delayed diagnoses, and increased rates of hospitalization. To reveal digital divide within the elderly population itself, the presentation focuses on the health information behavior of Estonian seniors who either continue or have stopped working after retirement to use digital health applications. The author's main interest is on access, trust, and skills to use the Internet for medical purposes. Fifteen in-depth interviews with 65+ working persons, as well as 15 interviews with full-time retirees, were conducted. Also, six think-aloud protocols were conducted. The results indicate that older adults, who due to the nature of their work, have regular access to computers, often search for health-related information online. They exposed high source criticism and were successful in solving the given tasks. Conversely, most of the fully retired older adults claimed not using computers or other digital devices and cited lack of skills as the main reason for their inactivity. Thus, when developing health applications, it should be borne in mind that the ability and willingness of older adults to use e-solutions are very different.

Keywords: digital divide, digital healthcare, health information behavior, older adults

Procedia PDF Downloads 149
3870 Absence of Secured Bathing Spaces and Its Effect on Women: An Exploratory Qualitative Study of Rural Odisha, India

Authors: Minaj Ranjita Singh, Meghna Mukherjee, Abhijeet Jadhav

Abstract:

This is an exploratory qualitative study with an objective to understand the bathing practices followed by rural women and its consequences. Access to safe bathing spaces in rural India is a neglected issue due to which women are affected in various ways. Today, government policies are largely focused towards the building of toilets, but no importance has been given to the construction of bathrooms. Both qualitative and quantitative data were collected using in-depth interviews and focused group discussions with rural women in six villages of Odisha, India. The study was approved by an Institutional Research and Ethics Committee, and informed consent was taken from participants. For most of the participants, the access to water, bathing space and toilet was compromised posing various challenges in their daily lives. Women's daily schedule, hygiene practices, dignity, and health are greatly affected due to this lack. Since bathing in the open has been an ancient practice, the community's perception is benign towards the hardship of women. Lack of exposure to concealed bathing, necessary funds, and competing priorities are some of the household level factors which never let them think about having bathrooms and the lack of water supply, proper drainage system, subsidy or financial support are the governance and policy related factors which prevent their access to secured bathing spaces.

Keywords: bathrooms, dignity, exploratory, rural, qualitative, women's health, women

Procedia PDF Downloads 181
3869 Distributed Automation System Based Remote Monitoring of Power Quality Disturbance on LV Network

Authors: Emmanuel D. Buedi, K. O. Boateng, Griffith S. Klogo

Abstract:

Electrical distribution networks are prone to power quality disturbances originating from the complexity of the distribution network, mode of distribution (overhead or underground) and types of loads used by customers. Data on the types of disturbances present and frequency of occurrence is needed for economic evaluation and hence finding solution to the problem. Utility companies have resorted to using secondary power quality devices such as smart meters to help gather the required data. Even though this approach is easier to adopt, data gathered from these devices may not serve the required purpose, since the installation of these devices in the electrical network usually does not conform to available PQM placement methods. This paper presents a design of a PQM that is capable of integrating into an existing DAS infrastructure to take advantage of available placement methodologies. The monitoring component of the design is implemented and installed to monitor an existing LV network. Data from the monitor is analyzed and presented. A portion of the LV network of the Electricity Company of Ghana is modeled in MATLAB-Simulink and analyzed under various earth fault conditions. The results presented show the ability of the PQM to detect and analyze PQ disturbance such as voltage sag and overvoltage. By adopting a placement methodology and installing these nodes, utilities are assured of accurate and reliable information with respect to the quality of power delivered to consumers.

Keywords: power quality, remote monitoring, distributed automation system, economic evaluation, LV network

Procedia PDF Downloads 345
3868 Empowering Girls and Youth in Bangladesh: Importance of Creating Safe Digital Space for Online Learning and Education

Authors: Md. Rasel Mia, Ashik Billah

Abstract:

The empowerment of girls and youth in Bangladesh is a demanding issue in today's digital age, where online learning and education have become integral to personal and societal development. This abstract explores the critical importance of creating a secure online environment for girls and youth in Bangladesh, emphasizing the transformative impact it can have on their access to education and knowledge. Bangladesh, like many developing nations, faces gender inequalities in education and access to digital resources. The creation of a safe digital space not only mitigates the gender digital divide but also fosters an environment where girls and youth can thrive academically and professionally. This manuscript draws attention to the efforts through a mixed-method study to assess the current digital landscape in Bangladesh, revealing disparities in phone and internet access, online practices, and awareness of cyber security among diverse demographic groups. Moreover, the study unveils the varying levels of familial support and barriers encountered by girls and youth in their quest for digital literacy. It emphasizes the need for tailored training programs that address specific learning needs while also advocating for enhanced internet accessibility, safe online practices, and inclusive online platforms. The manuscript culminates in a call for collaborative efforts among stakeholders, including NGOs, government agencies, and telecommunications companies, to implement targeted interventions that bridge the gender digital divide and pave the way for a brighter, more equitable future for girls and youth in Bangladesh. In conclusion, this research highlights the undeniable significance of creating a safe digital space as a catalyst for the empowerment of girls and youth in Bangladesh, ensuring that they not only access but excel in the online space, thereby contributing to their personal growth and the advancement of society as a whole.

Keywords: collaboration, cyber security, digital literacy, digital resources, inclusiveness

Procedia PDF Downloads 55
3867 Utilities as Creditors: The Effect of Enforcement of Water Bill Payment in Zambia

Authors: Elizabeth Spink

Abstract:

Providing safe and affordable drinking water to low-income households in developing countries remains a challenge. Policy goals of increasing household piped-water access and cost recovery for utility providers are often at odds. Nonpayment of utility bills is frequently cited as a constraint to improving the quality of utility service. However, nonpayment is widely tolerated, and households often accumulate significant debt to the utility provider. This study examines the effect of enforcement of water bill payment through supply disconnections in Livingstone, Zambia. This research uses a dynamic model of household monthly payments and accumulation of arrears, which determine the probability of disconnection, and simulates the effect of exogenous changes in enforcement levels. This model is empirically tested using an event-study framework of exogenous increases in enforcement capacity that occur during administrative rezoning events, which reduce the number of households that one enforcement agent is responsible for. The results show that households are five percentage points more likely to make a payment in the months following a rezoning event, but disconnections for low-income households increase as well, resulting in little change in revenue collected by the water utility. The results suggest that high enforcement of water bill payments toward credit-constrained households may be ineffective and lead to reduced piped-water access.

Keywords: enforcement, nonpayment, piped-water access, water utilities

Procedia PDF Downloads 234
3866 Performance Analysis of Vertical Cavity Surface Emitting Laser and Distributed Feedback Laser for Community Access Television

Authors: Ashima Rai

Abstract:

CATV transmission systems have altered from old cable based one-way analog video transmission to two ways hybrid fiber transmission. The use of optical fiber reduces the RF amplifiers in the transmission, high transmission power or lower fiber transmission losses are required to increase system capability. This paper evaluates and compares Distributed Feedback (DFB) laser and Vertical Cavity Surface Emitting Laser (VCSEL) for CATV transmission. The simulation results exhibit the better performer among both lasers taking into consideration the parameters chosen for evaluation.

Keywords: Distributed Feedback (DFB), Vertical Cavity Surface Emitting Laser (VCSEL), Community Access Television (CATV), Composite Second Order (CSO), Composite Triple Beat (CTB), RF

Procedia PDF Downloads 355
3865 Zero Cross-Correlation Codes Based on Balanced Incomplete Block Design: Performance Analysis and Applications

Authors: Garadi Ahmed, Boubakar S. Bouazza

Abstract:

The Zero Cross-Correlation (C, w) code is a family of binary sequences of length C and constant Hamming-weight, the cross correlation between any two sequences equal zero. In this paper, we evaluate the performance of ZCC code based on Balanced Incomplete Block Design (BIBD) for Spectral Amplitude Coding Optical Code Division Multiple Access (SAC-OCDMA) system using direct detection. The BER obtained is better than 10-9 for five simultaneous users.

Keywords: spectral amplitude coding-optical code-division-multiple-access (SAC-OCDMA), phase induced intensity noise (PIIN), balanced incomplete block design (BIBD), zero cross-correlation (ZCC)

Procedia PDF Downloads 364
3864 Performance Analysis of 5G for Low Latency Transmission Based on Universal Filtered Multi-Carrier Technique and Interleave Division Multiple Access

Authors: A. Asgharzadeh, M. Maroufi

Abstract:

5G mobile communication system has drawn more and more attention. The 5G system needs to provide three different types of services, including enhanced Mobile BroadBand (eMBB), massive machine-type communication (mMTC), and ultra-reliable and low-latency communication (URLLC). Universal Filtered Multi-Carrier (UFMC), Filter Bank Multicarrier (FBMC), and Filtered Orthogonal Frequency Division Multiplexing (f-OFDM) are suggested as a well-known candidate waveform for the coming 5G system. Themachine-to-machine (M2M) communications are one of the essential applications in 5G, and it involves exchanging of concise messages with a very short latency. However, in UFMC systems, the subcarriers are grouped into subbands but f-OFDM only one subband covers the entire band. Furthermore, in FBMC, a subband includes only one subcarrier, and the number of subbands is the same as the number of subcarriers. This paper mainly discusses the performance of UFMC with different parameters for the UFMC system. Also, paper shows that UFMC is the best choice outperforming OFDM in any case and FBMC in case of very short packets while performing similarly for long sequences with channel estimation techniques for Interleave Division Multiple Access (IDMA) systems.

Keywords: universal filtered multi-carrier technique, UFMC, interleave division multiple access, IDMA, fifth-generation, subband

Procedia PDF Downloads 129
3863 Detecting Potential Geothermal Sites by Using Well Logging, Geophysical and Remote Sensing Data at Siwa Oasis, Western Desert, Egypt

Authors: Amr S. Fahil, Eman Ghoneim

Abstract:

Egypt made significant efforts during the past few years to discover significant renewable energy sources. Regions in Egypt that have been identified for geothermal potential investigation include the Gulf of Suez and the Western Desert. One of the most promising sites for the development of Egypt's Northern Western Desert is Siwa Oasis. The geological setting of the oasis, a tectonically generated depression situated in the northernmost region of the Western desert, supports the potential for substantial geothermal resources. Field data obtained from 27 deep oil wells along the Western Desert included bottom-hole temperature (BHT) depth to basement measurements, and geological maps; data were utilized in this study. The major lithological units, elevation, surface gradient, lineaments density, and remote sensing multispectral and topographic were mapped together to generate the related physiographic variables. Eleven thematic layers were integrated in a geographic information system (GIS) to create geothermal maps to aid in the detection of significant potential geothermal spots along the Siwa Oasis and its vicinity. The contribution of total magnetic intensity data with reduction to the pole (RTP) to the first investigation of the geothermal potential in Siwa Oasis is applied in this work. The integration of geospatial data with magnetic field measurements showed a clear correlation between areas of high heat flow and magnetic anomalies. Such anomalies can be interpreted as related to the existence of high geothermal energy and dense rock, which also have high magnetic susceptibility. The outcomes indicated that the study area has a geothermal gradient ranging from 18 to 42 °C/km, a heat flow ranging from 24.7 to 111.3 m.W. k−1, a thermal conductivity of 1.3–2.65 W.m−1.k−1 and a measured amplitude temperature maximum of 100.7 °C. The southeastern part of the Siwa Oasis, and some sporadic locations on the eastern section of the oasis were found to have significant geothermal potential; consequently, this location is suitable for future geothermal investigation. The adopted method might be applied to identify significant prospective geothermal energy locations in other regions of Egypt and East Africa.

Keywords: magnetic data, SRTM, depth to basement, remote sensing, GIS, geothermal gradient, heat flow, thermal conductivity

Procedia PDF Downloads 103
3862 Delimitation of the Perimeters of PR Otection of the Wellfield in the City of Adrar, Sahara of Algeria through the Used Wyssling’s Method

Authors: Ferhati Ahmed, Fillali Ahmed, Oulhadj Younsi

Abstract:

delimitation of the perimeters of protection in the catchment area of the city of Adrar, which are established around the sites for the collection of water intended for human consumption of drinking water, with the objective of ensuring the preservation and reducing the risks of point and accidental pollution of the resource (Continental Intercalar groundwater of the Northern Sahara of Algeria). This wellfield is located in the northeast of the city of Adrar, it covers an area of 132.56 km2 with 21 Drinking Water Supply wells (DWS), pumping a total flow of approximately 13 Hm3/year. The choice of this wellfield is based on the favorable hydrodynamic characteristics and their location in relation to the agglomeration. The vulnerability to pollution of this slick is very high because the slick is free and suffers from the absence of a protective layer. In recent years, several factors have been introduced around the field that can affect the quality of this precious resource, including the presence of a strong centre for domestic waste and agricultural and industrial activities. Thus, its sustainability requires the implementation of protection perimeters. The objective of this study is to set up three protection perimeters: immediate, close and remote. The application of the Wyssling method makes it possible to calculate the transfer time (t) of a drop of groundwater located at any point in the aquifer up to the abstraction and thus to define isochrones which in turn delimit each type of perimeter, 40 days for the nearer and 100 days for the farther away. Special restrictions are imposed for all activities depending on the distance of the catchment. The application of this method to the Adrar city catchment field showed that the close and remote protection perimeters successively occupy areas of 51.14 km2 and 92.9 km2. Perimeters are delimited by geolocated markers, 40 and 46 markers successively. These results show that the areas defined as "near protection perimeter" are free from activities likely to present a risk to the quality of the water used. On the other hand, on the areas defined as "remote protection perimeter," there is some agricultural and industrial activities that may present an imminent risk. A rigorous control of these activities and the restriction of the type of products applied in industrial and agricultural is imperative.

Keywords: continental intercalaire, drinking water supply, groundwater, perimeter of protection, wyssling method

Procedia PDF Downloads 92
3861 Inter-Generational Benefits of Improving Access to Justice for Women: Evidence from Peru

Authors: Iva Trako, Maris Micaela Sviatschi, Guadalupe Kavanaugh

Abstract:

Domestic violence is a major concern in developing countries, with important social, economic and health consequences. However, institutions do not usually address the problems facing women or ethnic and religious minorities. For example, the police do very little to stop domestic violence in rural areas of developing countries. This paper exploits the introduction of women’s justice centers (WJCs) in Peru to provide causal estimates on the effects of improving access to justice for women and children. These centers offer a new integrated public service model for women by including medical, psychological and legal support in cases of violence against women. Our empirical approach uses a difference in difference estimation exploiting variation over time and space in the opening of WJC together with province-by-year fixed effects. Exploiting administrative data from health providers and district attorney offices, we find that after the opening of these centers, there are important improvements on women's welfare: a large reduction in femicides and female hospitalizations for assault. Moreover, using geo-coded household surveys we find evidence that the existence of these services reduces domestic violence, improves women's health, increases women's threat points and, therefore, lead to household decisions that are more aligned with their interests. Using administrative data on the universe of schools, we find large gains on human capital for their children: affected children are more likely to enroll, attend school and have better grades in national exams, instead of working for the family. In sum, the evidence in this paper shows that providing access to justice for women can be a powerful tool to reduce domestic violence and increase education of children, suggesting a positive inter-generational benefit.

Keywords: access to justice, domestic violence, education, household bargaining

Procedia PDF Downloads 179
3860 Developing Soil Accumulation Effect Correction Factor for Solar Photovoltaic Module

Authors: Kelebaone Tsamaase, Rapelang Kemoabe, Japhet Sakala, Edward Rakgati, Ishmael Zibani

Abstract:

Increasing demand for energy, depletion of non-renewable energy, effects of climate change, the abundance of renewable energy such as solar energy have increased the interest in investing in renewable energies, in particular solar photovoltaic (PV) energy. Solar photovoltaic energy systems as part of clean technology are considered to be environmentally friendly, freely available, offer clean production systems, long term costs benefits as opposed to conventional sources, and are the attractive power source for a wide range of applications in remote areas where there is no easy access to the national grid. To get maximum electrical power, maximum solar power should penetrate the module and be converted accordingly. However, some environmental and other geographical related factors reduce the electrical power. One of them is dust which accumulates on the surface of the module and forming a dust layer and in the process obstructing the solar power from penetrating PV module. This study intends to improve the performance of solar photovoltaic (PV) energy modules by establishing soil accumulation effects correction factor from dust characteristics and properties, and also from dust accumulation and retention pattern on PV module surface. The non-urban dry deposition flux model was adapted to determine monthly and yearly dust accumulation pattern. Consideration was done on prevailing environmental and other geographical conditions. Preliminary results showed that cumulative dust settlement increased during the months of July to October leading to a higher drop in module electrical output power.

Keywords: dust, electrical power output, PV module, soil correction factor

Procedia PDF Downloads 128
3859 For Whom Is Legal Aid: A Critical Analysis of the State-Funded Legal Aid in Criminal Cases in Tajikistan

Authors: Umeda Junaydova

Abstract:

Legal aid is a key element of access to justice. According to UN Principles and Guidelines on Access to Legal Aid in Criminal Justice Systems, state members bear the obligation to put in place accessible, effective, sustainable, and credible legal aid systems. Regarding this obligation, developing countries, such as Tajikistan, faced challenges in terms of financing this system. Thus, many developed nations have launched rule-of-law programs to support these states and ensure access to justice for all. Following independence from the Soviet Union, Tajikistan committed to introducing the rule of law and providing access to justice. This newly established country was weak, and the sudden outbreak of civil war aggravated the situation even more. The country needed external support and opened its door to attract foreign donors to assist it in its way to development. In 2015, Tajikistan, with the financial support of development partners, was able to establish a state-funded legal aid system that provides legal assistance to vulnerable and marginalized populations, including in criminal cases. In the beginning, almost the whole system was financed from donor funds; by that time, the contribution of the government gradually increased, and currently, it covers 80% of the total budget. All these governments' actions toward ensuring access to criminal legal aid for disadvantaged groups look promising; however, the reality is completely different. Currently, not all disadvantaged people are covered by these services, and their cases are most of the time considered without appropriate defense, which leads to violation of fundamental human rights. This research presents a comprehensive exploration of the interplay between donor assistance and the effectiveness of legal aid services in Tajikistan, with a specific focus on criminal cases involving vulnerable groups, such as women and children. In the context of Tajikistan, this study addresses a pressing concern: despite substantial financial support from international donors, state-funded legal aid services often fall short of meeting the needs of poor and vulnerable populations. The study delves into the underlying complexities of this issue and examines the structural, operational, and systemic challenges faced by legal aid providers, shedding light on the factors contributing to the ineffectiveness of legal aid services. Furthermore, it seeks to identify the root causes of these issues, revealing the barriers that hinder the delivery of adequate legal aid services. The research adopts a socio-legal methodology to ensure an appropriate combination of multiple methodologies. The findings of this research hold significant implications for both policymakers and practitioners, offering insights into the enhancement of legal aid services and access to justice for disadvantaged and marginalized populations in Tajikistan. By addressing these pressing questions, this study aims to fill the gap in legal literature and contribute to the development of a more equitable and efficient legal aid system that better serves the needs of the most vulnerable members of society.

Keywords: access to justice, legal aid, rule of law, rights for council

Procedia PDF Downloads 45
3858 Quick Response(QR) Code for Vehicle Registration and Identification

Authors: S. Malarvizhi, S. Sadiq Basha, M. Santhosh Kumar, K. Saravanan, R. Sasikumar, R. Satheesh

Abstract:

This is a web based application which provides authorization for the vehicle identification and registration. It also provides mutual authentication between the police and users in order to avoid misusage. The QR code generation in this application overcomes the difficulty in the manual registration of the vehicle documents. This generated QR code is placed in the number plates of the vehicles. The QR code is scanned using the QR Reader installed in the smart devices. The police officials can check the vehicle details and file cases on accidents, theft and traffic rules violations using QR code. In addition to vehicle insurance payments and renewals, the renewal alert is sent to the vehicle owner about payment deadline. The non-permitted vehicles can be blocked in the next check-post by sending the alert messages.

Keywords: QR code, QR reader, registration, authentication, idenfication

Procedia PDF Downloads 487
3857 United Nations Sustainable Development Goals and Digital Exclusion: Reconsidering Sustainable Development and Digital Poverty in the Post-Pandemic World

Authors: Serena Clark, Katriona O'Sullivan, Kevin Marshall, Mac MacLachlan

Abstract:

This paper explores the United Nation's sustainable development goals (SDGs) alongside digital poverty and proposes that digital poverty should be a new SDG. The SDGs concentrate on 17 key areas, including economic growth, reducing inequalities, climate action, ending poverty, gender equality, and quality education. Many of the plans to fulfill these goals involve the creation and adaptation of new technologies. As we have seen with COVID-19, access to these technologies has determined communities and societies' ability to respond to these challenges in both developed and developing nations. For example, the transition to online education due to the lockdowns had a detrimental effect on children who did not have access to technology to provide continuity in their educational development. Digitalization and emerging technologies, especially information and communication technologies (ICTs), can help address each goal. Digital poverty and exclusion exacerbate the gap between rich and poor within our societies and internationally, and COVID-19 has further highlighted these issues. Closing this gap can support achieving the SDGs. If access to digital technologies measure society's response and resilience in addressing the challenges the SDGs seek to resolve, should reducing digital poverty be an SDG of its own? This paper will explore this question, arguing that digital poverty should be an independent SDG working alongside and supporting the achievement of the other 17 SDGs.

Keywords: digital poverty, digital exclusion, United Nations sustainable development goals, information and communication technologies

Procedia PDF Downloads 135
3856 Impact of Water Interventions under WASH Program in the South-west Coastal Region of Bangladesh

Authors: S. M. Ashikur Elahee, Md. Zahidur Rahman, Md. Shofiqur Rahman

Abstract:

This study evaluated the impact of different water interventions under WASH program on access of household's to safe drinking water. Following survey method, the study was carried out in two Upazila of South-west coastal region of Bangladesh namely Koyra from Khulna and Shymnagar from Satkhira district. Being an explanatory study, a total of 200 household's selected applying random sampling technique were interviewed using a structured interview schedule. The predicted probability suggests that around 62 percent household's are out of year-round access to safe drinking water whereby, only 25 percent household's have access at SPHERE standard (913 Liters/per person/per year). Besides, majority (78 percent) of the household's have not accessed at both indicators simultaneously. The distance from household residence to the water source varies from 0 to 25 kilometer with an average distance of 2.03 kilometers. The study also reveals that the increase in monthly income around BDT 1,000 leads to additional 11 liters (coefficient 0.01 at p < 0.1) consumption of safe drinking water for a person/year. As expected, lining up time has significant negative relationship with dependent variables i.e., for higher lining up time, the probability of getting access for both SPHERE standard and year round access variables becomes lower. According to ordinary least square (OLS) regression results, water consumption decreases at 93 liters for per person/year of a household if one member is added to that household. Regarding water consumption intensity, ordered logistic regression (OLR) model shows that one-minute increase of lining up time for water collection tends to reduce water consumption intensity. On the other hand, as per OLS regression results, for one-minute increase of lining up time, the water consumption decreases by around 8 liters. Considering access to Deep Tube Well (DTW) as a reference dummy, in OLR, the household under Pond Sand Filter (PSF), Shallow Tube Well (STW), Reverse Osmosis (RO) and Rainwater Harvester System (RWHS) are respectively 37 percent, 29 percent, 61 percent and 27 percent less likely to ensure year round access of water consumption. In line of health impact, different type of water born diseases like diarrhea, cholera, and typhoid are common among the coastal community caused by microbial impurities i.e., Bacteria, Protozoa. High turbidity and TDS in pond water caused by reduction of water depth, presence of suspended particle and inorganic salt stimulate the growth of bacteria, protozoa, and algae causes affecting health hazard. Meanwhile, excessive growth of Algae in pond water caused by excessive nitrate in drinking water adversely effects on child health. In lieu of ensuring access at SPHERE standard, we need to increase the number of water interventions at reasonable distance, preferably a half kilometer away from the dwelling place, ensuring community peoples involved with its installation process where collectively owned water intervention is found more effective than privately owned. In addition, a demand-responsive approach to supply of piped water should be adopted to allow consumer demand to guide investment in domestic water supply in future.

Keywords: access, impact, safe drinking water, Sphere standard, water interventions

Procedia PDF Downloads 217
3855 Testing of Electronic Control Unit Communication Interface

Authors: Petr Šimek, Kamil Kostruk

Abstract:

This paper deals with the problem of testing the Electronic Control Unit (ECU) for the specified function validation. Modern ECUs have many functions which need to be tested. This process requires tracking between the test and the specification. The technique discussed in this paper explores the system for automating this process. The paper focuses in its chapter IV on the introduction to the problem in general, then it describes the proposed test system concept and its principle. It looks at how the process of the ECU interface specification file for automated interface testing and test tracking works. In the end, the future possible development of the project is discussed.

Keywords: electronic control unit testing, embedded system, test generate, test automation, process automation, CAN bus, ethernet

Procedia PDF Downloads 107
3854 An Alternative Credit Scoring System in China’s Consumer Lendingmarket: A System Based on Digital Footprint Data

Authors: Minjuan Sun

Abstract:

Ever since the late 1990s, China has experienced explosive growth in consumer lending, especially in short-term consumer loans, among which, the growth rate of non-bank lending has surpassed bank lending due to the development in financial technology. On the other hand, China does not have a universal credit scoring and registration system that can guide lenders during the processes of credit evaluation and risk control, for example, an individual’s bank credit records are not available for online lenders to see and vice versa. Given this context, the purpose of this paper is three-fold. First, we explore if and how alternative digital footprint data can be utilized to assess borrower’s creditworthiness. Then, we perform a comparative analysis of machine learning methods for the canonical problem of credit default prediction. Finally, we analyze, from an institutional point of view, the necessity of establishing a viable and nationally universal credit registration and scoring system utilizing online digital footprints, so that more people in China can have better access to the consumption loan market. Two different types of digital footprint data are utilized to match with bank’s loan default records. Each separately captures distinct dimensions of a person’s characteristics, such as his shopping patterns and certain aspects of his personality or inferred demographics revealed by social media features like profile image and nickname. We find both datasets can generate either acceptable or excellent prediction results, and different types of data tend to complement each other to get better performances. Typically, the traditional types of data banks normally use like income, occupation, and credit history, update over longer cycles, hence they can’t reflect more immediate changes, like the financial status changes caused by the business crisis; whereas digital footprints can update daily, weekly, or monthly, thus capable of providing a more comprehensive profile of the borrower’s credit capabilities and risks. From the empirical and quantitative examination, we believe digital footprints can become an alternative information source for creditworthiness assessment, because of their near-universal data coverage, and because they can by and large resolve the "thin-file" issue, due to the fact that digital footprints come in much larger volume and higher frequency.

Keywords: credit score, digital footprint, Fintech, machine learning

Procedia PDF Downloads 157
3853 Indirect Environmental Benefits from Cloud Computing Information and Communications Technology Integration in Rural Agricultural Communities

Authors: Jeana Cadby, Kae Miyazawa

Abstract:

With rapidly expanding worldwide adoption of mobile technologies, Information and Communication Technology (ITC) is a major energy user and a contributor to global carbon emissions, due to infrastructure and operational energy consumption. The agricultural sector is also significantly responsible for contributing to global carbon emissions. However, ICT cloud computing using mobile technology can directly reduce environmental impacts in the agricultural sector through applications and mobile connectivity, such as precision fertilizer and pesticide applications, or access to weather data, for example. While direct impacts are easily calculated, indirect environmental impacts from ICT cloud computing usage have not been thoroughly investigated. For example, while women may be more poorly equipped for adaptation to environmentally sustainable agricultural practices due to resource constraints, this research concludes that indirect environmental benefits can be achieved by improving rural access to mobile technology for women. Women in advanced roles and secure land tenure are more likely to invest in long-term agricultural conservation strategies, which protect against environmental degradation. This study examines how ICT using mobile technology advances the role of women in rural agricultural systems and indirectly reduces environmental impacts from agricultural production, through literature examination from secondary sources. Increasing access for women to ICT mobile technology provides indirect environmental and social benefits in the rural agricultural sector.

Keywords: cloud computing, environmental benefits, mobile technology, women

Procedia PDF Downloads 164
3852 Implementation of Achterbahn-128 for Images Encryption and Decryption

Authors: Aissa Belmeguenai, Khaled Mansouri

Abstract:

In this work, an efficient implementation of Achterbahn-128 for images encryption and decryption was introduced. The implementation for this simulated project is written by MATLAB.7.5. At first two different original images are used for validate the proposed design. Then our developed program was used to transform the original images data into image digits file. Finally, we used our implemented program to encrypt and decrypt images data. Several tests are done for proving the design performance including visual tests and security analysis; we discuss the security analysis of the proposed image encryption scheme including some important ones like key sensitivity analysis, key space analysis, and statistical attacks.

Keywords: Achterbahn-128, stream cipher, image encryption, security analysis

Procedia PDF Downloads 527
3851 Time Synchronization between the eNBs in E-UTRAN under the Asymmetric IP Network

Authors: M. Kollar, A. Zieba

Abstract:

In this paper, we present a method for a time synchronization between the two eNodeBs (eNBs) in E-UTRAN (Evolved Universal Terrestrial Radio Access) network. The two eNBs are cooperating in so-called inter eNB CA (Carrier Aggregation) case and connected via asymmetrical IP network. We solve the problem by using broadcasting signals generated in E-UTRAN as synchronization signals. The results show that the time synchronization with the proposed method is possible with the error significantly less than 1 ms which is sufficient considering the time transmission interval is 1 ms in E-UTRAN. This makes this method (with low complexity) more suitable than Network Time Protocol (NTP) in the mobile applications with generated broadcasting signals where time synchronization in asymmetrical network is required.

Keywords: IP scheduled throughput, E-UTRAN, Evolved Universal Terrestrial Radio Access Network, NTP, Network Time Protocol, assymetric network, delay

Procedia PDF Downloads 357
3850 Adaptive Data Approximations Codec (ADAC) for AI/ML-based Cyber-Physical Systems

Authors: Yong-Kyu Jung

Abstract:

The fast growth in information technology has led to de-mands to access/process data. CPSs heavily depend on the time of hardware/software operations and communication over the network (i.e., real-time/parallel operations in CPSs (e.g., autonomous vehicles). Since data processing is an im-portant means to overcome the issue confronting data management, reducing the gap between the technological-growth and the data-complexity and channel-bandwidth. An adaptive perpetual data approximation method is intro-duced to manage the actual entropy of the digital spectrum. An ADAC implemented as an accelerator and/or apps for servers/smart-connected devices adaptively rescales digital contents (avg.62.8%), data processing/access time/energy, encryption/decryption overheads in AI/ML applications (facial ID/recognition).

Keywords: adaptive codec, AI, ML, HPC, cyber-physical, cybersecurity

Procedia PDF Downloads 75
3849 Art Beyond Borders: Virtual School Field Trips

Authors: Audrey Hudson

Abstract:

In 2020, educational field trips went virtual for all students. At the Art Gallery of Ontario (AGO) in Canada, our solution was to create a virtual school program that addressed three pillars of access—economic, geographic and cultural—with art at the center. Now, at the close of three years, we have reached 1.6 million students! Exponentially more than we have ever welcomed for onsite school visits. In 2022, we partnered with the Museum of Modern Art (MoMA), the Hong Kong University Museum and the National Gallery of Singapore, which has pushed the boundaries of art education into the expanse of the global community. Looking forward to our fourth year of the program, we are using the platform of technology to expand our program of art, access and learning to a global platform. In 2023/24, we intend to connect across more borders to expand the pedagogical benefits of art education for a global community. We invite you to listen to how you can join this journey.

Keywords: technology, museums, art education, pedagogy

Procedia PDF Downloads 57
3848 Insider Theft Detection in Organizations Using Keylogger and Machine Learning

Authors: Shamatha Shetty, Sakshi Dhabadi, Prerana M., Indushree B.

Abstract:

About 66% of firms claim that insider attacks are more likely to happen. The frequency of insider incidents has increased by 47% in the last two years. The goal of this work is to prevent dangerous employee behavior by using keyloggers and the Machine Learning (ML) model. Every keystroke that the user enters is recorded by the keylogging program, also known as keystroke logging. Keyloggers are used to stop improper use of the system. This enables us to collect all textual data, save it in a CSV file, and analyze it using an ML algorithm and the VirusTotal API. Many large companies use it to methodically monitor how their employees use computers, the internet, and email. We are utilizing the SVM algorithm and the VirusTotal API to improve overall efficiency and accuracy in identifying specific patterns and words to automate and offer the report for improved monitoring.

Keywords: cyber security, machine learning, cyclic process, email notification

Procedia PDF Downloads 51
3847 A Research on the Benefits of Drone Usage in Industry by Determining Companies Using Drone in the World

Authors: Ahmet Akdemir, Güzide Karakuş, Leyla Polat

Abstract:

Aviation that has been arisen in accordance with flying request that is existing inside of people, has not only made life easier by making a great contribution to humanity; it has also accelerated globalization by reducing distances between countries. It is seen that the growth rate of aviation industry has reached the undreamed level when it is looked back on. Today, the last point in aviation is unmanned aerial vehicles that are self-ventilating and move in desired coordinates without any onboard pilot. For those vehicles, there are two different control systems are developed. In the first type of control, an unmanned aerial vehicle (UAV) moves according to instructions of a remote control. UAV that moves with a remote control is named as drone; it can be used personally. In the second one, there is a flight plan that is programmed and placed inside of UAV before flight. Recently, drones have started to be used in unimagined areas and utilize specific, important benefits for any industry. Within this framework, this study answers the question that is drone usage would be beneficial for businesses or not. To answer this question, applied basic methodologies are determining businesses using drone in the world, their purposes to use drone, and then, comparing their economy as before drone and after drone. In the end of this study, it is seen that many companies in different business areas use drone in logistics support, and it makes their work easier than before. This paper has contributed to academic literature about this subject, and it has introduced the benefits of drone usage for businesses. In addition, it has encouraged businesses that they keep pace with this technological age by following the developments about drones.

Keywords: aviation, drone, drone in business, unmanned aerial vehicle

Procedia PDF Downloads 249
3846 Simulation Analysis of Wavelength/Time/Space Codes Using CSRZ and DPSK-RZ Formats for Fiber-Optic CDMA Systems

Authors: Jaswinder Singh

Abstract:

In this paper, comparative analysis is carried out to study the performance of wavelength/time/space optical CDMA codes using two well-known formats; those are CSRZ and DPSK-RZ using RSoft’s OptSIM. The analysis is carried out under the real-like scenario considering the presence of various non-linear effects such as XPM, SPM, SRS, SBS and FWM. Fiber dispersion and the multiple access interference are also considered. The codes used in this analysis are 3-D wavelength/time/space codes. These are converted into 2-D wavelength-time codes so that their requirement of space couplers and fiber ribbons is eliminated. Under the conditions simulated, this is found that CSRZ performs better than DPSK-RZ for fiber-optic CDMA applications.

Keywords: Optical CDMA, Multiple access interference (MAI), CSRZ, DPSK-RZ

Procedia PDF Downloads 643
3845 Learning Compression Techniques on Smart Phone

Authors: Farouk Lawan Gambo, Hamada Mohammad

Abstract:

Data compression shrinks files into fewer bits than their original presentation. It has more advantage on the internet because the smaller a file, the faster it can be transferred but learning most of the concepts in data compression are abstract in nature, therefore, making them difficult to digest by some students (engineers in particular). This paper studies the learning preference of engineering students who tend to have strong, active, sensing, visual and sequential learning preferences, the paper also studies the three shift of technology-aided that learning has experienced, which mobile learning has been considered to be the feature of learning that will integrate other form of the education process. Lastly, we propose a design and implementation of mobile learning application using software engineering methodology that will enhance the traditional teaching and learning of data compression techniques.

Keywords: data compression, learning preference, mobile learning, multimedia

Procedia PDF Downloads 442
3844 Flashsonar or Echolocation Education: Expanding the Function of Hearing and Changing the Meaning of Blindness

Authors: Thomas, Daniel Tajo, Kish

Abstract:

Sight is primarily associated with the function of gathering and processing near and extended spatial information which is largely used to support self-determined interaction with the environment through self-directed movement and navigation. By contrast, hearing is primarily associated with the function of gathering and processing sequential information which may typically be used to support self-determined communication through the self-directed use of music and language. Blindness or the lack of vision is traditionally characterized by a lack of capacity to access spatial information which, in turn, is presumed to result in a lack of capacity for self-determined interaction with the environment due to limitations in self-directed movement and navigation. However, through a specific protocol of FlashSonar education developed by World Access for the Blind, the function of hearing can be expanded in blind people to carry out some of the functions normally associated with sight, that is to access and process near and extended spatial information to construct three-dimensional acoustic images of the environment. This perceptual education protocol results in a significant restoration in blind people of self-determined environmental interaction, movement, and navigational capacities normally attributed to vision - a new way to see. Thus, by expanding the function of hearing to process spatial information to restore self-determined movement, we are not only changing the meaning of blindness, and what it means to be blind, but we are also recasting the meaning of vision and what it is to see.

Keywords: echolocation, changing, sensory, function

Procedia PDF Downloads 152
3843 Mineral Deposits in Spatial Planning Systems – Review of European Practices

Authors: Alicja Kot-Niewiadomska

Abstract:

Securing sustainable access to raw materials is vital for the growth of the European economy and for the goals laid down in Strategy Europe 2020. One of the most important sources of mineral raw materials are primary deposits. The efficient management of them, including extraction, will ensure competitiveness of the European economy. A critical element of this approach is mineral deposits safeguarding and the most important tool - spatial planning. The safeguarding of deposits should be understood as safeguarding of land access, and safeguarding of area against development, which may (potential) prevent the use of the deposit and the necessary mining activities. Many European Union countries successfully integrated their mineral policy and spatial policy, which has ensured the proper place of mineral deposits in their spatial planning systems. These, in turn, are widely recognized as the most important mineral deposit safeguarding tool, the essence of which is to ensure long-term access to its resources. The examples of Austria, Portugal, Slovakia, Czech Republic, Sweden, and the United Kingdom, discussed in the paper, are often mentioned as examples of good practices in this area. Although none of these countries managed to avoid cases of social and environmental conflicts related to mining activities, the solutions they implement certainly deserve special attention. And for many countries, including Poland, they can be a potential source of solutions aimed at improving the protection of mineral deposits.

Keywords: mineral deposits, land use planning, mineral deposit safeguarding, European practices

Procedia PDF Downloads 167