Search results for: extension services
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4732

Search results for: extension services

4012 Factors Affecting U-Computing Use

Authors: Shui Lien Chen, Chen-Yin Kuo

Abstract:

U-computing use has brings many new services of commerce, which could provide a new experience for customer. Location Based Services (LBS) is one of U-computing service. With increase of the smartphone and mobile internet users, there are many small and medium-sized enterprises (SMEs) take LBS in marketing strategy in Taiwan. For example, they would provide Facebook check-in to get a benefit (e.g. discount, free dessert and coupon) to attract customers purchasing. Therefore, this study is to understand which factors would affect SMEs adoption of u-computing and the performances after adopt U-computing. This study collected 187 useful data that were analyzed by SmartPLS 2.0 software. The results of this study are as follows. First, entrepreneurial orientation and market orientation positively affects innovation. Second, business resources and innovation positively affect u-computing use. Finally, U-computing positively affects both business value and customer value.

Keywords: entrepreneurial orientation, market orientation, innovation, business resources, u-computing use, LBS

Procedia PDF Downloads 594
4011 The Iraqi Fibre-to-the-Home Networks, Problems, Challenges, and Solutions along with Less Expense

Authors: Hasanein Hasan, Mohammed Al-Taie, Basil Shanshool, Khalaf Abd-Ali

Abstract:

This approach aims to deal with establishing and operating Iraqi Fibre-To-The-Home (FTTH) projects. The problems they suffer from are organized sabotage, vandalism, accidental damage and poor planning. It provides practical solutions that deal with the aforementioned problems. These solutions consist of both technical and financial clarifications that ensure the achievement of the FTTH network’s stability for the purpose of equipping citizens, private sector companies, and governmental institutions with services, data transmission, the Internet, and other services. They aim to solve problems and obstacles accompanying the operation and maintenance of FTTH projects implemented by the Informatics and Telecommunications Public Company (ITPC)/ Iraqi Ministry of Communications (MoC). This approach takes the FTTH network of AlMaalif-AlMuaslat districts/ Baghdad-Iraq as a case study.

Keywords: CCTV, FTTH, ITPC, MoC, NVR, PTZ

Procedia PDF Downloads 84
4010 Mapping the Core Processes and Identifying Actors along with Their Roles, Functions and Linkages in Trout Value Chain in Kashmir, India

Authors: Stanzin Gawa, Nalini Ranjan Kumar, Gohar Bilal Wani, Vinay Maruti Hatte, A. Vinay

Abstract:

Rainbow trout (Oncorhynchus mykiss) and Brown trout (Salmo trutta fario) are the two species of trout which were once introduced by British in waters of Kashmir has well adapted to favorable climatic conditions. Cold water fisheries are one of the emerging sectors in Kashmir valley and trout holds an important place Jammu and Kashmir fisheries. Realizing the immense potential of trout culture in Kashmir region, the state fisheries department started privatizing trout culture under the centrally funded scheme of RKVY in which they provide 80 percent subsidy for raceway construction and supply of feed and seed for the first year since 2009-10 and at present there are 362 private trout farms. To cater the growing demand for trout in the valley, it is important to understand the bottlenecks faced in the propagation of trout culture. Value chain analysis provides a generic framework to understand the various activities and processes, mapping and studying linkages is first step that needs to be done in any value chain analysis. In Kashmir, it is found that trout hatcheries play a crucial role in insuring the continuous supply of trout seed in valley. Feed is most limiting factor in trout culture and the farmer has to incur high cost in payment and in the transportation of feed from the feed mill to farm. Lack of aqua clinic in the Kashmir valley needs to be addressed. Brood stock maintenance, breeding and seed production, technical assistance to private farmer, extension services have to be strengthened and there is need to development healthier environment for new entrepreneurs. It was found that trout farmers do not avail credit facility as there is no well define credit scheme for fisheries in the state. The study showed weak institutional linkages. Research and development should focus more on applied science rather than basic science.

Keywords: trout, Kashmir, value chain, linkages, culture

Procedia PDF Downloads 403
4009 The Application of Internet of Things in Healthcare: Building an Interconnected Health Environment

Authors: Quinn Au, Amedeo Carmine, Tauheed Khan Mohd

Abstract:

The Internet of Things (IoT) is emerging as a new development in information technology in recent years, with the potential to improve convenience and efficiency in life. Following the rise of IoT, the Social Internet of Things (SIoT) is another new development in which the benefits of connectivity and user-friendliness from social network services (SNS) are its main features. With the introduction of IoT, the world will be much more modernized, convenient, and industrialized. This paper will discuss the applications of IoT in different sectors such as healthcare services, education, and lifestyle. The privacy challenges that IoT still poses to user data will also be discussed. Finally, an empirical study to evaluate the number of active installed IoT connections in recent years demonstrates the increase in usage of IoT regardless of the privacy challenges. The study also examines some types of IoT devices that are being preferred in the market and predictions from researchers about IoT in the upcoming years.

Keywords: IoT, health care, robotics, social Internet of Things

Procedia PDF Downloads 151
4008 Study on the Factors that Causes the Malaysian Oil and Gas Equipment (OGSE) Companies being under-Developing

Authors: Low Khee Wai

Abstract:

Lossing of opportunity by Malaysian Oil and Gas Services Equipment (OGSE) companies can be a major issue in developing and sustain Malaysia’s own Oil & Gas Industry. Despite the rapid growth of Oil & Gas industry in Malaysia for the past 40 years, Malaysia still not developing sufficient OGSE companies in order to support its own Oil & Gas Industry. In examining the scenario, this study aims to identify the factors causing the under-developing of OGSE companies in Malaysia. Conceptual Review method were used to analyse the factors that cause the under-development of Malaysia OGSE. The 4 factors identified were Time, Cost, Human Resource and Stakeholder Management. This survey explained the phenomena and the challenge of the industry and translated into the factors that cause the under-developing of OGSE companies in Malaysia. Finally, it should bring awareness to the government, authorities, and stakeholder in order to improve the ecology of Oil & Gas Industry in Malaysia.

Keywords: oil & gas in Malaysia, Malaysia local oil & gas services equipment (OGSE), oil & gas project management, project performance

Procedia PDF Downloads 132
4007 Epidemiology of Private Prehospital Calls over the Last Decade in South Africa

Authors: Rhodine Hickman, Craig Wylie, Michael G. McCaul

Abstract:

Introduction: The World Health Organisation has called on governments around the world to recognise emergency conditions as a global public health problem and respond with appropriate steps for effective preventative strategies. However, to understand the magnitude of the problem, good quality epidemiological data is required. This is especially challenging in low and middle-income countries, where routine data is scarce, specifically within the prehospital setting. Methods: We conducted a retrospective cross-sectional study of a national prehospital private sector EMS database. The database being the property of ER24 (private Emergency Medical Services (EMS) company in South Africa) contains claims submitted by the majority of ambulance services in South Africa during the period between 1 January 2008 to 28 March 2017. We used descriptive statistics and control charts to describe the data using STATA 14. Results: 299,257 calls were included in the analysis. The top clinical conditions requiring ambulance transport were transport accidents (10% of total call volume) and ischaemic heart disease (4.4%). The number of transport accidents consistently increased between 2009 and 2014 and reached beyond the limit for normal variation in 2015. Victims of transport accidents required basic life support services 60% of the time with 80% of injuries being minor to moderate. The frequency of ischaemic heart disease had a steady incline from 2011 to 2016. Advanced life support services were required about 50% of the time, with 60% of patients needing urgent care. Conclusion: Transport accidents, followed by ischaemic heart disease, are the most prevalent conditions in South African private EMS. There is a potential to address these conditions by developing the capacity of low and mid-level providers in trauma and advanced EMS providers in ischaemic heart disease.

Keywords: emergency care, emergency medicine, prehospital providers, South Africa

Procedia PDF Downloads 177
4006 eTransformation Framework for the Cognitive Systems

Authors: Ana Hol

Abstract:

Digital systems are in the cognitive wave of the eTransformations and are now extensively aimed at meeting the individuals’ demands, both those of customers requiring services and those of service providers. It is also apparent that successful future systems will not just simply open doors to the traditional owners/users to offer and receive services such as Uber for example does today, but will in the future require more customized and cognitively enabled infrastructures that will be responsive to the system user’s needs. To be able to identify what is required for such systems, this research reviews the historical and the current effects of the eTransformation process by studying: 1. eTransitions of company websites and mobile applications, 2. Emergence of new sheared economy business models as Uber and, 3. New requirements for demand driven, cognitive systems capable of learning and just in time decision making. Based on the analysis, this study proposes a Cognitive eTransformation Framework capable of guiding implementations of new responsive and user aware systems.

Keywords: system implementations, AI supported systems, cognitive systems, eTransformation

Procedia PDF Downloads 238
4005 Acoustic Finite Element Analysis of a Slit Model with Consideration of Air Viscosity

Authors: M. Sasajima, M. Watanabe, T. Yamaguchi Y. Kurosawa, Y. Koike

Abstract:

In very narrow pathways, the speed of sound propagation and the phase of sound waves change due to the air viscosity. We have developed a new Finite Element Method (FEM) that includes the effects of air viscosity for modeling a narrow sound pathway. This method is developed as an extension of the existing FEM for porous sound-absorbing materials. The numerical calculation results for several three-dimensional slit models using the proposed FEM are validated against existing calculation methods.

Keywords: simulation, FEM, air viscosity, slit

Procedia PDF Downloads 369
4004 Ecosystem Services and Excess Water Management: Analysis of Ecosystem Services in Areas Exposed to Excess Water Inundation

Authors: Dalma Varga, Nora Hubayne H.

Abstract:

Nowadays, among the measures taken to offset the consequences of climate change, water resources management is one of the key tools, which can include excess water management. As a result of climate change’s effects and as a result of the frequent inappropriate landuse, more and more areas are affected by the excess water inundation. Hungary is located in the deepest part of the Pannonian Basin, which is exposed to water damage – especially lowland areas that are endangered by floods or excess waters. The periodical presence of excess water creates specific habitats in a given area, which have ecological, functional, and aesthetic values. Excess water inundation affects approximately 74% of Hungary’s lowland areas, of which about 46% is also under nature protection (such as national parks, protected landscape areas, nature conservation areas, Natura 2000 sites, etc.). These data prove that areas exposed to excess water inundation – which are predominantly characterized by agricultural land uses – have an important ecological role. Other research works have confirmed the presence of numerous rare and endangered plant species in drainage canals, on grasslands exposed to excess water, and on special agricultural fields with mud vegetation. The goal of this research is to define and analyze ecosystem services of areas exposed to excess water inundation. In addition to this, it is also important to determine the quantified indicators of these areas’ natural and landscape values besides the presence of protected species and the naturalness of habitats, so all in all, to analyze the various nature protections related to excess water. As a result, a practice-orientated assessment method has been developed that provides the ecological water demand, assimilates to ecological and habitat aspects, contributes to adaptive excess water management, and last but not least, increases or maintains the share of the green infrastructure network. In this way, it also contributes to reduce and mitigate the negative effects of climate change.

Keywords: ecosystem services, landscape architecture, excess water management, green infrastructure planning

Procedia PDF Downloads 314
4003 Strengthening Service Delivery to Improving Cervical Cancer Screening in Southwestern Nigeria: A Pilot Project

Authors: Afolabi K. Esther, Kuye Tolulope, Babafemi, L. Olayemi, Omikunle Yemisi

Abstract:

Background: Cervical cancer is a potentially preventable disease of public significance. All sexually active women are at risk of cervical cancer; however, the uptake and coverage are low in low-middle resource countries. Hence, the programme explored the feasibility of demonstrating an innovative and low-cost system approach to cervical cancer screening service delivery among reproductive-aged women in low–resource settings in Southwestern Nigeria. This was to promote the uptake and quality improvement of cervical cancer screening services. Methods: This study was an intervention project in three senatorial districts in Osun State that have primary, secondary and tertiary health facilities. The project was in three phases; Pre-intervention, Intervention, and Post-intervention. The study utilised the existing infrastructure, facilities and staff in project settings. The study population was nurse-midwives, community health workers and reproductive-aged women (30-49 years). The intervention phase entailed using innovative, culturally appropriate strategies to create awareness of cervical cancer and preventive health-seeking behaviour among women in the reproductive-aged group (30-49) years. Also, the service providers (community health workers, Nurses, and Midwives) were trained on screening methods and treatment of pre-cancerous lesions, and there was the provision of essential equipment and supplies for cervical cancer screening services at health facilities. Besides, advocacy and engagement were made with relevant stakeholders to integrate the cervical cancer screening services into related reproductive health services and greater allocation of resources. The expected results compared the pre and post-intervention using the baseline and process indicators and the effect of the intervention phase on screening coverage using a plausibility assessment design. The project lasted 12 months; visual Inspection with Acetic acid (VIA) screening for the women for six months and follow-up in 6 months for women receiving treatment. Results: The pre-intervention phase assessed baseline service delivery statistics in the previous 12 months drawn from the retrospective data collected as part of the routine monitoring and reporting systems. The uptake of cervical cancer screening services was low as the number of women screened in the previous 12 months was 156. Service personnel's competency level was fair (54%), and limited availability of essential equipment and supplies for cervical cancer screening services. At the post-intervention phase, the level of uptake had increased as the number of women screened was 1586 within six months in the study settings. This showed about a 100-%increase in the uptake of cervical cancer screening services compared with the baseline assessment. Also, the post-intervention level of competency of service delivery personnel had increased to 86.3%, which indicates quality improvement of the cervical cancer screening service delivery. Conclusion: the findings from the study have shown an effective approach to strengthening and improving cervical cancer screening service delivery in Southwestern Nigeria. Hence, the intervention promoted a positive attitude and health-seeking behaviour among the target population, significantly influencing the uptake of cervical cancer screening services.

Keywords: cervical cancer, screening, nigeria, health system strengthening

Procedia PDF Downloads 106
4002 Comparison of Security Challenges and Issues of Mobile Computing and Internet of Things

Authors: Aabiah Nayeem, Fariha Shafiq, Mustabshra Aftab, Rabia Saman Pirzada, Samia Ghazala

Abstract:

In this modern era of technology, the concept of Internet of Things is very popular in every domain. It is a widely distributed system of things in which the data collected from sensory devices is transmitted, analyzed locally/collectively then broadcasted to network where action can be taken remotely via mobile/web apps. Today’s mobile computing is also gaining importance as the services are provided during mobility. Through mobile computing, data are transmitted via computer without physically connected to a fixed point. The challenge is to provide services with high speed and security. Also, the data gathered from the mobiles must be processed in a secured way. Mobile computing is strongly influenced by internet of things. In this paper, we have discussed security issues and challenges of internet of things and mobile computing and we have compared both of them on the basis of similarities and dissimilarities.

Keywords: embedded computing, internet of things, mobile computing, wireless technologies

Procedia PDF Downloads 317
4001 On Panel Data Analysis of Factors on Economic Advances in Some African Countries

Authors: Ayoola Femi J., Kayode Balogun

Abstract:

In some African Countries, increase in Gross Domestic Products (GDP) has not translated to real development as expected by common-man in his household. For decades, a lot of contests on economic growth and development has been a nagging issues. The focus of this study is to analysing the effects of economic determinants/factors on economic advances in some African Countries by employing panel data analysis. The yearly (1990-2013) data were obtained from the world economic outlook database of the International Monetary Fund (IMF), for probing the effects of these variables on growth rate in some selected African countries which include: Nigeria, Algeria, Angola, Benin, Botswana, Burundi, Cape-Verde, Cameroun, Central African Republic, Chad, Republic Of Congo, Cote di’ Voire, Egypt, Equatorial-Guinea, Ethiopia, Gabon, Ghana, Guinea Bissau, Kenya, Lesotho, Madagascar, Mali, Mauritius, Morocco, Mozambique, Niger, Rwanda, Senegal, Seychelles, Sierra Leone, South Africa, Sudan, Swaziland, Tanzania, Togo, Tunisia, and Uganda. The effects of 6 macroeconomic variables on GDP were critically examined. We used 37 Countries GDP as our dependent variable and 6 independent variables used in this study include: Total Investment (totinv), Inflation (inf), Population (popl), current account balance (cab), volume of imports of goods and services (vimgs), and volume of exports of goods and services (vexgs). The results of our analysis shows that total investment, population and volume of exports of goods and services strongly affect the economic growth. We noticed that population of these selected countries positively affect the GDP while total investment and volume of exports negatively affect GDP. On the contrary, inflation, current account balance and volume of imports of goods and services’ contribution to the GDP are insignificant. The results of our analysis shows that total investment, population and volume of exports of goods and services strongly affect the economic growth. We noticed that population of these selected countries positively affect the GDP while total investment and volume of exports negatively affect GDP. On the contrary, inflation, current account balance and volume of imports of goods and services’ contribution to the GDP are insignificant. The results of this study would be useful for individual African governments for developing a suitable and appropriate economic policies and strategies. It will also help investors to understand the economic nature and viability of Africa as a continent as well as its individual countries.

Keywords: African countries, economic growth and development, gross domestic products, static panel data models

Procedia PDF Downloads 475
4000 Language Services as a Means of Language Repository for Tuition Support and Facilitation of Learning in Institution of Higher Learning

Authors: Mzamani Aaron Mabasa

Abstract:

The research study examines the reality that the Language Services Directorate can be considered a language repository hub. The study postulates that multilingual education guided by language policy implementation can improve student performance and pass rate. Various documents in the form of style guides, glossaries and tutorial letters may be used to enable students to understand complex words, sentences, phrases and paragraphs when technical vocabularies are used. This paper addresses the way in which quality assurance can transform South African official languages, including Sign Language, as mandated by the Language Policy for Higher Education. The paper further emphasizes that Language Services is unique in the sense that it involves all South African officials as tools for student support and facilitation of learning. This is in line with the Constitution of the Republic of South Africa (1996) and the Unisa Language Policy of 2023, which declares the status, parity and esteem of these official languages regarding usage in formal function domains, namely education, economy, social and politics. The aim of this paper is to ensure that quality assurance is ultimately accomplished in terms of teaching and learning standards. Eventually, all South African languages can be used for official domains to achieve functional multilingualism. This paper furthermore points out that content analysis as a research instrument as far as a qualitative approach is concerned may be used as a data collection technique.

Keywords: repository, multilingualism, policy, education

Procedia PDF Downloads 35
3999 Electronic Transparency in Georgia as a Basis for Development of Electronic Governance

Authors: Lasha Mskhaladze, Guram Burchuladze, Khvicha Datunashvili

Abstract:

Technological changes have an impact not only on economic but also on social elements of society which in turn has created new challenges for states’ political systems and their regimes. As a result of unprecedented growth of information technologies and communications digital democracy and electronic governance have emerged. Nowadays effective state functioning cannot be imagined without electronic governance. In Georgia, special attention is paid to the development of such new systems and establishment of electronic governance. Therefore, in parallel to intensive development of information technologies an important priority for public sector in Georgia is the development of electronic governance. In spite of the fact that today Georgia with its economic indicators satisfies the standards of western informational society, and major part of its gross domestic product comes from the service sector (59.6%), it still remains a backward country on the world map in terms of information technologies and electronic governance. E-transparency in Georgia should be based on such parameters as government accountability when the government provides citizens information about their activities; e-participation which involves government’s consideration of external expert assessments; cooperation between officials and citizens in order to solve national problems. In order to improve electronic systems the government should actively do the following: Fully develop electronic programs concerning HR and exchange of data between public organizations; develop all possible electronic services; improve existing electronic programs; make electronic services available on different mobile platforms (iPhone, Android, etc.).

Keywords: electronic transparency, electronic services, information technology, information society, electronic systems

Procedia PDF Downloads 280
3998 Sex Work Practice and Health Seeking Behavior among Hiv Positive Female Sex Workers in Rural Karnataka, India

Authors: Rajeshwari Biradar

Abstract:

Background: The anecdotal evidences indicate that utilization of HIV services especially in Government facilities is affected by stigma and discrimination among HIV positive female sex workers (FSWs) in Karnataka. To our knowledge, there is no quantitative study on this issue. In this study an attempt is made to examine these aspects among positive FSWs exposed to prevention programs. Methods: This is a cross‐ sectional quantitative survey of HIV positive FSWs in the 3 districts of northern Karnataka using a structured questionnaire. The list of HIV Positive FSWs was organized by stratification, and 607 positive FSWs were selected using a systematic random selection. The data were analyzed using both bivariate and multivariate statistical techniques. Results: Half of the sex workers (52%) are traditional (devadasi, dedicated to the temple), 22% are widowed and the mean age is 33 years. The FSWs practice sex work on an average 13 days a month with 2.3 clients per day and was in sex work for about 13 years. Almost all of them (97%) used condom with the clients they had on the last day of sex work. About 74% were ever registered in the ART center and 47% of them reported being ever on ART, of which 6% dropped out. Multivariate results support the hypothesis that the interventions addressing stigma and discrimination enabled accessing health services in the government facilities (AOR=1.37; p=0.17). Conclusions: Based on the results of the study, programs addressing stigma, discrimination and positive prevention can be implemented in places where government health services are not utilized by HIV positive FSWs. However, the study may be limited by the fact that majority of the FSWs entered into sex work through the traditional devadasi system, which may not be the case in other parts of India.

Keywords: sex work, HIV/AIDS, female sex workers, health

Procedia PDF Downloads 188
3997 The History Of Mental Health In The Middle East: Analytical Literature Review

Authors: Mohamad Musa

Abstract:

The history of mental health practices and services in the Middle East region has been deeply intertwined with its rich cultural, religious, and societal context. Tracing back to ancient times, mental health approaches were heavily influenced by the traditions of major monotheistic religions, with a strong emphasis on spiritual and traditional healing methods. As psychiatric institutions and Western medicine gradually gained a foothold in the region during the 20th century, a notable shift occurred. However, the integration of Western psychiatric practices faced significant challenges due to cultural barriers and deeply rooted beliefs. Families and communities often turned to traditional healers and religious practices as their initial recourse for mental health concerns, viewing Western interventions with skepticism and hesitation. Historically, mental health services in the Middle East have been overshadowed by a focus on physical health and the biomedical model. Mental illness carried substantial stigma, with individuals and families often reluctant to disclose mental health struggles due to fears of societal ostracization and discrimination. This stigma posed a significant barrier to accessing and accepting formal mental health support. Later in the 20th century, governments in the Middle East began recognizing the need for modernizing mental health services and integrating them into the broader healthcare system. However, this process was hindered by several factors, including limited resources, inadequate training for healthcare professionals, and ongoing conflicts and instability in certain regions, which disrupted the delivery of mental health services. As the 21st century progressed, several Middle Eastern nations, particularly those in the Arabian Gulf region, began implementing national mental health strategies and legislative reforms to address the growing need for comprehensive mental health care. These efforts aimed to destigmatize mental illness, protect the rights of individuals with mental health conditions, and promote public awareness and education. Despite these positive developments, the historical legacy of stigma, cultural barriers, and limited resources continues to pose challenges in the provision of accessible and culturally responsive mental health services across the diverse populations of the Middle East.

Keywords: mental health, history, middle east, literature review

Procedia PDF Downloads 33
3996 A Development of Practice Guidelines for Surgical Safety Management to Reduce Undesirable Incidents from Surgical Services in the Operating Room of Songkhla Hospital, Thailand

Authors: Thitima Plejai

Abstract:

The practice in the operating room has been continually performed according to standards of services; however, undesirable incidents from surgical services are found such as surgical complications in the operating room. This participation action research aimed to develop practice guidelines for surgical safety management to reduce undesirable incidents from surgical services in the operating room of Songkhla Hospital. The target population was all 84 members of the multidisciplinary team who were involved in surgical services in the operating room consisting of 28 surgeons from five branches of surgery, 27 anesthetists and nurse anesthetists, and 29 surgical nurses. The data were collected through in-depth interviews, and non-participatory observations. The research instrument was tested by three experts, and the steps of the development consisted of four cycles, each consisting of assessment, planning, practice, practice reflection, and improvement until every step is practicable. The data were validated through triangulation research method, analyzed through content analysis and statistical analysis with number and percentage. The results of the development of practice guidelines surgical safety management to reduce undesirable incidents from surgical services could be concluded as follows. 1) The multidisciplinary team in surgery participated in the needs assessment for development of practice guidelines for surgical patient safety, and agreed on adapting the WHO Surgical Safety Checklists for use. 2) The WHO Surgical Safety Checklists was implemented, and meetings were held for the multidisciplinary team in surgery and the organizational risk committee to improve the practice guidelines to make them more practicable. 3) The multidisciplinary team consisting of surgeons from five branches of surgery, anesthetists, nurse anesthetists, surgical nurses, and the organizational risk committee announced policy on safety for surgical patients; the organizational risk committee designated the Surgical Safety Checklist as an instrument for surgical patient safety. The results of the safety management found that the surgical team members who could follow 100 percent of the guidelines were: professional nurses who checked patient identity and information before taking the patient to the operating room and kept complete records of data on the patients; surgical nurses who checked readiness of the patient before surgery; nurse anesthetists who assessed readiness before administering anesthetic drugs, and confirmed correctness of the patient; and circulating perioperative nurses who gave confirmation to the surgical team after completion of the surgery. The rates of undesirable incidents (surgical complications rates) before and after the implementation of the surgical safety management were 1.60 percent and 0.66 percent, respectively. The satisfaction of the surgery-related teams towards the use of the guidelines was 89 percent. The practice guidelines for surgical safety management to reduce undesirable incidents were taken as guidelines for surgical safety that the multidisciplinary team involved in the surgical process implemented correctly and in the same direction and clearly reduced undesirable incidents in surgical patients.

Keywords: practice guidelines, surgical safety management, reduce undesirable incidents, operating Room

Procedia PDF Downloads 297
3995 Post-Experts in Polish Mainstream Media: Quantitative and Qualitative Analysis of Selected Information Programs

Authors: Aldona Guzik

Abstract:

Experts have always played a special role in society. Drawing on their opinions was and most certainly is one of the most important strategies that direct people when they make decisions; something often used with the aim of exerting influence and ensuring social conformism. Many factors decide on who becomes an expert. The most important of these have hitherto been: the possession of extensive knowledge, charisma, authority as well as experience. Increasingly, however, these factors are insufficient and may even be deemed unnecessary. This state of affairs has been brought about (among other things) by the development of the media and the media’s influence on our lives. The inspiration to write the present article has its grounding in the book by Tom Nichols The Death of Expertise. The Campaign Against Established Knowledge and Why it Matters, in which the author claims that in our present-day open society experts and their expertise count for increasingly less for everyone who has unlimited access to the Internet and education. This has, in turn, resulted in the creation of so-called ‘collective wisdom,’ which is placed higher than any of the specialist knowledge proclaimed by experts. However, this is an incomplete picture, because admittedly, access to knowledge is nowadays unlimited, but on the other hand, the ubiquitous risk causes that the expert is someone who allows them to minimize it. Therefore, a modern society so readily refers to their opinion; from the smallest matters, eg home appliance, to important political issues. Hence, many information services include numerous experts (scientists, journalists, specialists, celebrities), whose task is to explain to the viewers in a simple way the presented reality. However, more and more often their role is also to give credence to what they explain. Hence the questions arise: who are the experts, what is their typology and what roles they play in Polish information services? To answer them, quantitative and qualitative research was used, such as analysis of lists of 100 most influential experts, analysis of expert profiles and their statements in three differentiated information services (TVN - commercial, TVP1 - public, TV Trwam - non-commercial/religious). They will be the basis for answering the above-mentioned questions and, above all, determining their role in information services in Poland.

Keywords: experts, media, public discours, symbolic elites

Procedia PDF Downloads 130
3994 Fostering Social Challenges Within Entrepreneur University Systems: The Case of UPV

Authors: Cristobal Miralles Insa

Abstract:

The network of chairs of the "Valencian Public System of Social Services" (VPSSS) is sponsored by the Valencian Institute of Training, Research, and Quality in Social Services and aims to promote research, dissemination, and evaluation of the needs that arise in the field of the public system of social services. It also seeks to transfer knowledge to foster the development of public policies in this field. Given that it is an Interuniversity Chair among the five public universities in Valencia, there is coordination of complementary themes and roles for this objective, with Universitat Politènica de València focusing primarily on promoting innovation and social entrepreneurship to address multiple social challenges through its platform INSSPIRA. This approach is aimed at the entire university community and its various interest groups, carrying out research, teaching, and dissemination activities that promote social inclusion, personal development, and autonomy for groups in situations of vulnerability, lack of protection, dependence, or social urgency. Although it focuses on the Valencian context, both the issues in this context and the tools in process to address them, often have a universal and scalable character and has been inspiring for the innovation system of UPV. This entrepreneurial incubator goes along from early stages of students on the campus until the so-called “StartUPV” system, where students are challenged with social problems that require creative solutions. Therefore, the Chair is conceived with a holistic spirit and an inspiring vocation that engages the whole university community. In this communication, it is described the entities and individuals participating in this UPV Chair of VPSSS, followed by the presentation of different work lines and objectives for the chair. Subsequently, a description of various activities undertaken to promote innovation in social services are described, where support to teaching and extracurricular activities in this field are exposed. It must be noted that some awareness and dissemination of activities are carried out in a transversal mode as they contribute to different objectives simultaneously; with special focus on Learning-Service approaches that achieved very good results which are also summarized.

Keywords: social innovation, entrepeneurship, university, vulnerable sectors

Procedia PDF Downloads 58
3993 A Deforestation Dilemma: An Integrated Approach to Conservation and Development in Madagascar

Authors: Tara Moore

Abstract:

Madagascar is one of the regions of the world with the highest biodiversity, with more than 600 new species discovered in just the last decade. In parallel with its record-breaking biodiversity, Madagascar is also the tenth poorest country in the world. The resultant socio-economic pressures are leading to a highly threatened environment. In particular, deforestation is at the core of biodiversity and ecosystem loss, primarily from slash and burn agriculture and illegal rosewood tree harvesting. Effective policy response is imperative for improved conservation in Madagascar. However, these changes cannot come from the current, unstable government institutions. After a violent and politically turbulent coup in 2009, any effort to defend Madagascar's biodiversity has been eclipsed by the high corruption of government bodies. This paper presents three policy options designed for a private donor to invest in conservation in Madagascar. The first proposed policy consists of payments for ecosystem services model, which involves paying local Malagasy women to reforest nearby territories. The second option is a micro-irrigation system proposal involving relocating local Malagasy out of the threatened forest region. The final proposition is captive breeding funding for the Madagascar Fauna and Flora Group, which could then lead to new reintroductions in the threatened northeastern rainforests. In the end, all three options present feasible, impactful options for a conservation-minded major donor. Ideally, the policy change would involve a combination of all three options, as each provides necessary development and conservation re-structuring goals. Option one, payments for ecosystem services, would be the preferred choice if there were only enough funding for one project. The payments for ecosystem services project both support local populations and promotes sustainable development while reforesting the threatened Marojejy National Park. Regardless of the chosen policy solution, any support from a donor will make a huge impact if it supports both sustainable development and biodiversity conservation.

Keywords: captive breeding, cnservation policy, lemur conservation, Madagascar conservation, payments for ecosystem services

Procedia PDF Downloads 134
3992 An E-Government Implementation Model for Peruvian State Companies Based on COBIT 5.0: Definition and Goals of the Model

Authors: M. Bruzza, M. Tupia, F. Rodríguez

Abstract:

As part of the regulatory compliance process and the streamlining of public administration, the Peruvian government has implemented the National E-Government Plan in all state institutions with the aim of providing citizens with solid services based on the use of Information and Communications Technologies (ICT). As part of the regulations, the requisites to be met by public institutions have been submitted. However, the lack of an implementation model was detected, one that can serve as a guide to such institutions in order to materialize the organizational and technological structures needed, which allow them to provide the required digital services. This paper develops an implementation model of electronic government (e-government) for Peru’s state institutions, in compliance with current regulations based on a COBIT 5.0 framework. Furthermore, the paper introduces phase 1 of this model: business and IT goals, the goals cascade and the future model of processes.

Keywords: e-government, u-government, COBIT, implementation model

Procedia PDF Downloads 329
3991 Performance Comparison of Non-Binary RA and QC-LDPC Codes

Authors: Ni Wenli, He Jing

Abstract:

Repeat–Accumulate (RA) codes are subclass of LDPC codes with fast encoder structures. In this paper, we consider a nonbinary extension of binary LDPC codes over GF(q) and construct a non-binary RA code and a non-binary QC-LDPC code over GF(2^4), we construct non-binary RA codes with linear encoding method and non-binary QC-LDPC codes with algebraic constructions method. And the BER performance of RA and QC-LDPC codes over GF(q) are compared with BP decoding and by simulation over the Additive White Gaussian Noise (AWGN) channels.

Keywords: non-binary RA codes, QC-LDPC codes, performance comparison, BP algorithm

Procedia PDF Downloads 377
3990 Increased Availability and Accessibility of Family Planning Services: An Approach Leading to Improved Contraceptive Uptake and Reproductive Behavior of Women Living in Pakistan

Authors: Lutaf Ali, Haris Ahmed, Hina Najmi

Abstract:

Background: Access, better counseling and quality in the provision of family planning services remain big challenges. Sukh Initiative (a project of three different foundations) is a multi-pronged approach, working in one million underserved population residing peri urban slums in Karachi and providing door to door services by lady health workers (LHWs) and community health workers (CHWs) linked with quality family planning and reproductive (FP/RH) services both at public and private health care facilities. Objective: To assess the improvement in family planning and reproductive health behavior among MWRAs by improving access in peri-urban-underserved population of Karachi. Methodology: Using cross sectional study design 3866 married women with reproductive age (MWRAs) were interviewed in peri urban region of Karachi during November 2016 to January 2017. All face to face structured interviews were conducted with women aged 15-49 currently living with their husbands. Based on the project intervention question on reproductive health were developed and questions on contraceptive use were adopted from PDHS- Pakistan 2013. Descriptive and inferential analysis was performed on SPSS version 22. Results: 65% of population sample are literate, 51% women were in young age group- 15–29. On the poverty index, 6% of the population sample living at national poverty line 1.25$ and 52% at 2.50$. During the project years 79% women opted for facility based delivery; private facilities are the priority choice. 61.7% women initiated the contraceptive use in last two years (after the project).Use of family planning was increased irrespective of education level and poverty index- about 55.5% women with no formal education are using any form of contraception and trend of current modern contraceptives across poverty scores strata equally distributed amongst all groups. Age specific modern contraceptive prevalence rate (mCPR)(between 25-34) was found to be 43.8%. About 23% of this contraceptive ascertained from door to door services- short acting, (pills and condoms) are common, 29.5% from public facilities and 47.6% are from public facilities in which long acting and permanent method most received methods. Conclusion: Strategy of expanding access and choice in the form of providing family planning information and supplies at door step and availability of quality family planning services in the peripheries of underserved may improve the behavior of women regarding FP/RH.

Keywords: access, family planning, underserved population, socio-demographic facts

Procedia PDF Downloads 207
3989 Protective Custody in Child Protection: Reflection of Residential Care Workers in the Philippines

Authors: Hazel S. Cometa-Lamberte

Abstract:

This paper presents the residential care workers reflections in working with children who were under protective custody and placed in a residential care facility for children. Key informant interviews and focus group discussion were employed in this study to analyze the views of residential care workers on the programs and services and case management system in residential care for children. Results suggest that working in a residential care facility for children needs the interplay of both the worker’s personal and professional values, knowledge and skills in working with children. Analyzing the residential care workers experiences in handling children in residential care facilities is vital for the improvement of the policies, programs and services, the repertoire of techniques and facilitate the creation of a new social work practice framework/model in child protection specifically in residential care facilities.

Keywords: child protection, residential care, residential care workers, social workers

Procedia PDF Downloads 174
3988 Short and Long Term Effects of an Attachment-Based Intervention on Child Behaviors

Authors: Claire Baudry, Jessica Pearson, Laura-Emilie Savage, George Tarbulsy

Abstract:

Over the last fifty years, maternal sensitivity and child development among vulnerable families have been a priority for researchers. For this reason, attachment-based interventions have been implemented and been shown to be effective in enhancing child development. Most of the time, child outcomes are measured shortly after the intervention. Objectives: The goal of the study was to investigate the effects of an attachment-based intervention on child development shortly after the intervention ended and one-year post-intervention. Methods: Over the seventy-two mother-child dyads referred by Child Protective Services in the province of Québec, Canada, forty-two were included in this study: 24 dyads who received 6 to 8 intervention sessions and 18 dyads who did not. Intervention and none intervention dyads were matched for the following variables: duration of child protective services, the reason for involvement with child protection, age, sex, and family status. Internalizing and externalizing behaviors were measured 3 and 12 months after the end of the intervention when the average age of children were respectively 45 and 54 months old. Findings: Independent-sample t-tests were conducted to compare scores between the two groups and the two data collection times. In general, on differences observed between the two groups three months after the intervention ended, just a few of them were still present nine months later. Conclusions: This first set of analyses suggests that the effects of attachment-based intervention observed three months following the intervention are not lasting for most of them. Those results inform us of the importance of considering the possibility to offer more attachment-based intervention sessions for those highly vulnerable families.

Keywords: attachment-based intervention, child behaviors, child protective services, highly vulnerable families

Procedia PDF Downloads 136
3987 Secure Authentication Scheme Based on Numerical Series Cryptography for Internet of Things

Authors: Maha Aladdin, Khaled Nagaty, Abeer Hamdy

Abstract:

The rapid advancement cellular networks and wireless networks have laid a solid basis for the Internet of Things. IoT has evolved into a unique standard that allows diverse physical devices to collaborate with one another. A service provider gives a variety of services that may be accessed via smart apps anywhere, at any time, and from any location over the Internet. Because of the public environment of mobile communication and the Internet, these services are highly vulnerable to a several malicious attacks, such as unauthorized disclosure by hostile attackers. As a result, the best option for overcoming these vulnerabilities is a strong authentication method. In this paper, a lightweight authentication scheme that is based on numerical series cryptography is proposed for the IoT environments. It allows mutual authentication between IoT devices Parametric study and formal proofs are utilized to illustrate that the pro-posed approach is resistant to a variety of security threats.

Keywords: internet of things, authentication, cryptography, security protocol

Procedia PDF Downloads 123
3986 The Role of Muzara’ah Islamic Financing in Supporting Smallholder Farmers among Muslim Communities: An Empirical Experience of Yobe Microfinance Bank

Authors: Sheriff Muhammad Ibrahim

Abstract:

The contemporary world has seen many agents of market liberalization, globalization, and expansion in agribusiness, which pose a big threat to the existence of smallholder farmers in the farming business or, at most, being marginalized against government interventions, investors' partnerships and further stretched by government policies in an effort to promote subsistent farming that can generate profits and speedy growth through attracting foreign businesses. The consequence of these modern shifts ends basically at the expense of smallholder farmers. Many scholars believed that this shift was among the major causes of urban-rural drift facing almost all communities in the World. In an effort to address these glaring economic crises, various governments at different levels and development agencies have created different programs trying to identify other sources of income generation for rural farmers. However, despite the different approaches adopted by many communities and states, the mass rural exodus continues to increase as the rural farmers continue to lose due to a lack of reliable sources for cost-efficient inputs such as agricultural extension services, mechanization supports, quality, and improved seeds, soil matching fertilizers and access to credit facilities and profitable markets for rural farmers output. Unfortunately for them, they see these agricultural requirements provided by large-scale farmers making their farming activities cheaper and yields higher. These have further created other social problems between the smallholder farmers and the large-scale farmers in many areas. This study aims to suggest the Islamic mode of agricultural financing named Muzara’ah for smallholder farmers as a microfinance banking product adopted and practiced by Yobe Microfinance Bank as a model to promote agricultural financing to be adopted in other communities. The study adopts a comparative research method to conclude that the Muzara’ah model of financing can be adopted as a valid means of financing smallholder farmers and reducing food insecurity.

Keywords: Muzara'ah, Islamic finance, agricultural financing, microfinance, smallholder farmers

Procedia PDF Downloads 63
3985 Influence of Machine Resistance Training on Selected Strength Variables among Two Categories of Body Composition

Authors: Hassan Almoslim

Abstract:

Background: The machine resistance training is an exercise that uses the equipment as loads to strengthen and condition the musculoskeletal system and improving muscle tone. The machine resistance training is easy to use, allow the individual to train with heavier weights without assistance, useful for beginners and elderly populations and specific muscle groups. Purpose: The purpose of this study was to examine the impact of nine weeks of machine resistance training on maximum strength among lean and normal weight male college students. Method: Thirty-six male college students aged between 19 and 21 years from King Fahd University of petroleum & minerals participated in the study. The subjects were divided into two an equal groups called Lean Group (LG, n = 18) and Normal Weight Group (NWG, n = 18). The subjects whose body mass index (BMI) is less than 18.5 kg / m2 is considered lean and who is between 18.5 to 24.9 kg / m2 is normal weight. Both groups performed machine resistance training nine weeks, twice per week for 40 min per training session. The strength measurements, chest press, leg press and abdomen exercises were performed before and after the training period. 1RM test was used to determine the maximum strength of all subjects. The training program consisted of several resistance machines such as leg press, abdomen, chest press, pulldown, seated row, calf raises, leg extension, leg curls and back extension. The data were analyzed using independent t-test (to compare mean differences) and paired t-test. The level of significance was set at 0.05. Results: No change was (P ˃ 0.05) observed in all body composition variables between groups after training. In chest press, the NWG recorded a significantly greater mean different value than the LG (19.33 ± 7.78 vs. 13.88 ± 5.77 kg, respectively, P ˂ 0.023). In leg press and abdomen exercises, both groups revealed similar mean different values (P ˃ 0.05). When the post-test was compared with the pre-test, the NWG showed significant increases in the chest press by 47% (from 41.16 ± 12.41 to 60.49 ± 11.58 kg, P ˂ 001), abdomen by 34% (from 45.46 ± 6.97 to 61.06 ± 6.45 kg, P ˂ 0.001) and leg press by 23.6% (from 85.27 ± 15.94 to 105.48 ± 21.59 kg, P ˂ 0.001). The LG also illustrated significant increases by 42.6% in the chest press (from 32.58 ± 7.36 to 46.47 ± 8.93 kg, P ˂ 0.001), the abdomen by 28.5% (from 38.50 ± 7.84 to 49.50 ± 7.88 kg, P ˂ 0.001) and the leg press by 30.8% (from 70.2 ± 20.57 to 92.01 ± 22.83 kg, P ˂ 0.001). Conclusion: It was concluded that the lean and the normal weight male college students can benefit from the machine resistance-training program remarkably.

Keywords: body composition, lean, machine resistance training, normal weight

Procedia PDF Downloads 356
3984 The Impact of Information Communication Technology on Promoting Travel Trade Industry in a Developing Economy, Case Study Nigeria

Authors: Murtala Mohammed Alamai, Abdullahi Marshal Idris, Adama Idris

Abstract:

Today, marketing does not only involve selecting target markets, but it also involves communicating with the customers through various means to put across your selling point. Modern marketing involves driving new product development based on customer needs by getting feedback from them. Utilizing the latest technology for better communication with the customers is the latest advancement in Marketing in the 21st century. The survey approach was used where a sample of tourist destinations across the six geographical zones of the country at random was done to ascertain the use of information communication systems in promoting their products and or services, the findings revealed that only a few utilize these modern advanced means in marketing and promoting their products and a need to develop effective and up to date online services for marketing was proffered as solutions to the findings observed.

Keywords: information, communication, travel, trade, promotion

Procedia PDF Downloads 324
3983 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

Authors: N. Nalini, Bhanu Prakash Gopularam

Abstract:

The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.

Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping

Procedia PDF Downloads 385