Search results for: access structure
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10531

Search results for: access structure

10471 CompPSA: A Component-Based Pairwise RNA Secondary Structure Alignment Algorithm

Authors: Ghada Badr, Arwa Alturki

Abstract:

The biological function of an RNA molecule depends on its structure. The objective of the alignment is finding the homology between two or more RNA secondary structures. Knowing the common functionalities between two RNA structures allows a better understanding and a discovery of other relationships between them. Besides, identifying non-coding RNAs -that is not translated into a protein- is a popular application in which RNA structural alignment is the first step A few methods for RNA structure-to-structure alignment have been developed. Most of these methods are partial structure-to-structure, sequence-to-structure, or structure-to-sequence alignment. Less attention is given in the literature to the use of efficient RNA structure representation and the structure-to-structure alignment methods are lacking. In this paper, we introduce an O(N2) Component-based Pairwise RNA Structure Alignment (CompPSA) algorithm, where structures are given as a component-based representation and where N is the maximum number of components in the two structures. The proposed algorithm compares the two RNA secondary structures based on their weighted component features rather than on their base-pair details. Extensive experiments are conducted illustrating the efficiency of the CompPSA algorithm when compared to other approaches and on different real and simulated datasets. The CompPSA algorithm shows an accurate similarity measure between components. The algorithm gives the flexibility for the user to align the two RNA structures based on their weighted features (position, full length, and/or stem length). Moreover, the algorithm proves scalability and efficiency in time and memory performance.

Keywords: alignment, RNA secondary structure, pairwise, component-based, data mining

Procedia PDF Downloads 434
10470 Green Design Study of Prefabricated Community Control Measures in Response to Public Health Emergencies

Authors: Enjia Zhang

Abstract:

During the prevention and control of the COVID-19 pandemic, all communities in China were gated and under strict management, which was highly effective in preventing the spread of the epidemic from spreading. Based on the TRIZ theory, this paper intends to propose green design strategies of community control in response to public health emergencies and to optimize community control facilities according to the principle of minimum transformation. Through the questionnaire method, this paper investigates and summarizes the situation and problems of community control during the COVID-19 pandemic. Based on these problems, the TRIZ theory is introduced to figure out the problems and associates them with prefabricated facilities. Afterward, the innovation points and solutions of prefabricated community control measures are proposed by using the contradiction matrix. This paper summarizes the current situation of community control under public health emergencies and concludes the problems such as simple forms of temporary roadblocks, sudden increase of community traffic pressure, and difficulties to access public spaces. The importance of entrance and exit control in community control is emphasized. Therefore, the community control measures are supposed to focus on traffic control, and the external access control measures, including motor vehicles, non-motor vehicles, residents and non-residents access control, and internal public space access control measures, including public space control shared with the society or adjacent communities, are proposed in order to make the community keep the open characteristics and have the flexibility to deal with sudden public health emergencies in the future.

Keywords: green design, community control, prefabricated structure, public health emergency

Procedia PDF Downloads 99
10469 Digital Demands: Addressing the Digital Divide in Basic Education and Its Relation to Academic Performance and Aspirations

Authors: Jose Rodrigo Zubiri, Sofia Carmen Tomacruz

Abstract:

Amidst an increasingly digitalized society, information and communication technologies have been seamlessly integrated into the economic, social, and political life of individuals. Information has been regarded as a primary good, essential to the wellbeing and self-respect of individuals in society. The digital engagements of an individual play a key role in a variety of life outcomes ranging from academic performance to entrepreneurial success to health service uptake. As a result of varying degrees of access to the Internet and ICTs across populations and individuals, a digital divide emerges. Education, a sector pivotal to directing individual life trajectories, has been radically transformed with regards to the learning process and access to information and thus faces the implications of the digital divide, as new waves of inequalities are introduced in the classroom. As the period of basic education is critical to transitioning into civic life or higher education, digital inequalities are capable of aggravating pre-existing social inequalities. Through survey-questionnaires, conducted on 152 high school students from a Philippine public school, the study reveals the correlation of academic performance and aspirations (for their highest academic qualification) to access to digital technologies and the Internet, according to Van Dijk’s four measurements of digital poverty, namely: motivational access, material access, skills access, and usage access. The findings reveal a positive correlation for academic performance whereas no correlation was found between aspirations and digital access. In the study, significant correlational differences were also found between genders, specifically, in terms of skills access and academic performance.

Keywords: digital divide, ICTs, inequality, education, life trajectories

Procedia PDF Downloads 244
10468 An Intelligent Cloud Radio Access Network (RAN) Architecture for Future 5G Heterogeneous Wireless Network

Authors: Jin Xu

Abstract:

5G network developers need to satisfy the necessary requirements of additional capacity from massive users and spectrally efficient wireless technologies. Therefore, the significant amount of underutilized spectrum in network is motivating operators to combine long-term evolution (LTE) with intelligent spectrum management technology. This new LTE intelligent spectrum management in unlicensed band (LTE-U) has the physical layer topology to access spectrum, specifically the 5-GHz band. We proposed a new intelligent cloud RAN for 5G.

Keywords: cloud radio access network, wireless network, cloud computing, multi-agent

Procedia PDF Downloads 395
10467 Identify Users Behavior from Mobile Web Access Logs Using Automated Log Analyzer

Authors: Bharat P. Modi, Jayesh M. Patel

Abstract:

Mobile Internet is acting as a major source of data. As the number of web pages continues to grow the Mobile web provides the data miners with just the right ingredients for extracting information. In order to cater to this growing need, a special term called Mobile Web mining was coined. Mobile Web mining makes use of data mining techniques and deciphers potentially useful information from web data. Web Usage mining deals with understanding the behavior of users by making use of Mobile Web Access Logs that are generated on the server while the user is accessing the website. A Web access log comprises of various entries like the name of the user, his IP address, a number of bytes transferred time-stamp etc. A variety of Log Analyzer tools exists which help in analyzing various things like users navigational pattern, the part of the website the users are mostly interested in etc. The present paper makes use of such log analyzer tool called Mobile Web Log Expert for ascertaining the behavior of users who access an astrology website. It also provides a comparative study between a few log analyzer tools available.

Keywords: mobile web access logs, web usage mining, web server, log analyzer

Procedia PDF Downloads 340
10466 Walls, Barriers, and Fences to Informal Political Economy of Land Resource Accesses: A Case of Banyabunagana Along with Uganda–Congo Border, South Western Uganda, Kisoro District

Authors: Niringiye Fred

Abstract:

Banyabunagana has always had access to land resources for grazing animals, sand mining, and farmland across the border in the Democratic Republic of Congo during the pre-colonial and colonial times, usually on an informal arrangement facilitated by kinship ties and rent transactions for these resources. However, in recent periods, the government of the Democratic Republic of the Congo (DRC) has been pursuing a policy of constructing barriers such as walls and fences so that Banyabunagana communities do not access the land on the DRC side of the border. This is happening in the background of increased and intensified demand for land use on the side of the Ugandan community. This paper will attempt to discuss the reasons behind the construction of walls, fences, and other barriers which deny access to land for Banyabunagana communities in Bunagana Parish, Muramba Sub-county- Kisoro district, Uganda. The research will attempt to answer the following main questions, among others, whether there are the factors that explain the construction of walls and fences which could limit or deny access to the informal use of land and other resources and whether policy options to ensure continued access to land and other resources for local communities.

Keywords: border, walls, fences, land resource access

Procedia PDF Downloads 84
10465 Family Support in Combating Extreme Stress: The Experience of Entrance Examinations Candidates in Greek Universities

Authors: Marianna De Almeida

Abstract:

Greek secondary education is a highly selective system with regard to the access of students to Greek universities. Since access from elementary to lower secondary education and afterward to upper secondary education is rather liberal and almost free of selective mechanisms, the basic selection process comes after graduating from upper secondary school into play when students go through a highly selective process for university entry. This structure is responsible for the experience of extreme stress on the part of the candidates during a period of at least two years before the entrance examination leading to a radical change in students' everyday life routines. Instead of the school being an important agent for academic and psychological support, it seems that other agents, such as the informal private preparatory school and the student's families, take on the supportive role.

Keywords: stress, entrance examinations, family support, secondary education

Procedia PDF Downloads 49
10464 Identity Management in Virtual Worlds Based on Biometrics Watermarking

Authors: S. Bader, N. Essoukri Ben Amara

Abstract:

With the technological development and rise of virtual worlds, these spaces are becoming more and more attractive for cybercriminals, hidden behind avatars and fictitious identities. Since access to these spaces is not restricted or controlled, some impostors take advantage of gaining unauthorized access and practicing cyber criminality. This paper proposes an identity management approach for securing access to virtual worlds. The major purpose of the suggested solution is to install a strong security mechanism to protect virtual identities represented by avatars. Thus, only legitimate users, through their corresponding avatars, are allowed to access the platform resources. Access is controlled by integrating an authentication process based on biometrics. In the request process for registration, a user fingerprint is enrolled and then encrypted into a watermark utilizing a cancelable and non-invertible algorithm for its protection. After a user personalizes their representative character, the biometric mark is embedded into the avatar through a watermarking procedure. The authenticity of the avatar identity is verified when it requests authorization for access. We have evaluated the proposed approach on a dataset of avatars from various virtual worlds, and we have registered promising performance results in terms of authentication accuracy, acceptation and rejection rates.

Keywords: identity management, security, biometrics authentication and authorization, avatar, virtual world

Procedia PDF Downloads 245
10463 The Probability of Smallholder Broiler Chicken Farmers' Participation in the Mainstream Market within Maseru District in Lesotho

Authors: L. E. Mphahama, A. Mushunje, A. Taruvinga

Abstract:

Although broiler production does not generate any large incomes among the smallholder community, it represents the main source of livelihood and part of nutritional requirement. As a result, market for broiler meat is growing faster than that of any other meat products and is projected to continue growing in the coming decades. However, the implication is that a multitude of factors manipulates transformation of smallholder broiler farmers participating in the mainstream markets. From 217 smallholder broiler farmers, socio-economic and institutional factors in broiler farming were incorporated into Binary model to estimate the probability of broiler farmers’ participation in the mainstream markets within the Maseru district in Lesotho. Of the thirteen (13) predictor variables fitted into the model, six (6) variables (household size, number of years in broiler business, stock size, access to transport, access to extension services and access to market information) had significant coefficients while seven (7) variables (level of education, marital status, price of broilers, poultry association, access to contract, access to credit and access to storage) did not have a significant impact. It is recommended that smallholder broiler farmers organize themselves into cooperatives which will act as a vehicle through which they can access contracts and formal markets. These cooperatives will also enable easy training and workshops for broiler rearing and marketing/markets through extension visits.

Keywords: broiler chicken, mainstream market, Maseru district, participation, smallholder farmers

Procedia PDF Downloads 121
10462 Design and Optimization of Composite Canopy Structure

Authors: Prakash Kattire, Rahul Pathare, Nilesh Tawde

Abstract:

A canopy is an overhead roof structure generally used at the entrance of a building to provide shelter from rain and sun and may also be used for decorative purposes. In this paper, the canopy structure to cover the conveyor line has been studied. Existing most of the canopy structures are made of steel and glass, which makes a heavier structure, so the purpose of this study is to weight and cost optimization of the canopy. To achieve this goal, the materials of construction considered are Polyvinyl chloride (PVC) natural composite, Fiber Reinforced Plastic (FRP), and Structural steel Fe250. Designing and modeling were done in Solid works, whereas Altair Inspire software was used for the optimization of the structure. Through this study, it was found that there is a total 10% weight reduction in the structure with sufficient reserve for structural strength.

Keywords: canopy, composite, FRP, PVC

Procedia PDF Downloads 117
10461 Facial Recognition Technology in Institutions of Higher Learning: Exploring the Use in Kenya

Authors: Samuel Mwangi, Josephine K. Mule

Abstract:

Access control as a security technique regulates who or what can access resources. It is a fundamental concept in security that minimizes risks to the institutions that use access control. Regulating access to institutions of higher learning is key to ensure only authorized personnel and students are allowed into the institutions. The use of biometrics has been criticized due to the setup and maintenance costs, hygiene concerns, and trepidations regarding data privacy, among other apprehensions. Facial recognition is arguably a fast and accurate way of validating identity in order to guard protected areas. It guarantees that only authorized individuals gain access to secure locations while requiring far less personal information whilst providing an additional layer of security beyond keys, fobs, or identity cards. This exploratory study sought to investigate the use of facial recognition in controlling access in institutions of higher learning in Kenya. The sample population was drawn from both private and public higher learning institutions. The data is based on responses from staff and students. Questionnaires were used for data collection and follow up interviews conducted to understand responses from the questionnaires. 80% of the sampled population indicated that there were many security breaches by unauthorized people, with some resulting in terror attacks. These security breaches were attributed to stolen identity cases, where staff or student identity cards were stolen and used by criminals to access the institutions. These unauthorized accesses have resulted in losses to the institutions, including reputational damages. The findings indicate that security breaches are a major problem in institutions of higher learning in Kenya. Consequently, access control would be beneficial if employed to curb security breaches. We suggest the use of facial recognition technology, given its uniqueness in identifying users and its non-repudiation capabilities.

Keywords: facial recognition, access control, technology, learning

Procedia PDF Downloads 101
10460 Programming Language Extension Using Structured Query Language for Database Access

Authors: Chapman Eze Nnadozie

Abstract:

Relational databases constitute a very vital tool for the effective management and administration of both personal and organizational data. Data access ranges from a single user database management software to a more complex distributed server system. This paper intends to appraise the use a programming language extension like structured query language (SQL) to establish links to a relational database (Microsoft Access 2013) using Visual C++ 9 programming language environment. The methodology used involves the creation of tables to form a database using Microsoft Access 2013, which is Object Linking and Embedding (OLE) database compliant. The SQL command is used to query the tables in the database for easy extraction of expected records inside the visual C++ environment. The findings of this paper reveal that records can easily be accessed and manipulated to filter exactly what the user wants, such as retrieval of records with specified criteria, updating of records, and deletion of part or the whole records in a table.

Keywords: data access, database, database management system, OLE, programming language, records, relational database, software, SQL, table

Procedia PDF Downloads 161
10459 Static and Dynamic Analysis on a Buddhism Goddess Guanyin in Shuangyashan

Authors: Gong Kangming, Zhao Caiqi

Abstract:

High-rise special-shaped structure, such as main frame structure of the statues, is one of the structure forms in irregular structure widely used. Due to the complex shape of the statue structure, with a large aspect ratio, its wind load value and the overall mechanical properties are very different from the high-rise buildings with the general rules. The paper taking a certain 48 meters high main frame structure of the statue located in Shuangyashan City, Heilongjiang Province, static and dynamic properties are analyzed by the finite element software. Through static and dynamic analysis, it got a number of useful conclusions that have a certain reference value for the analysis and design of the future similar structure.

Keywords: a Buddhism goddess Guanyin body, wind load, dynamic analysis, bolster, node design

Procedia PDF Downloads 445
10458 Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control

Authors: A: Asmawi, L. S. Affendey, N. I. Udzir, R. Mahmod

Abstract:

The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security.

Keywords: XML database, trust-based access control, severity-aware, trust values, log file

Procedia PDF Downloads 274
10457 Modification of Four Layer through the Thickness Woven Structure for Improved Impact Resistance

Authors: Muhammad Liaqat, Hafiz Abdul Samad, Syed Talha Ali Hamdani, Yasir Nawab

Abstract:

In the current research, the four layers, orthogonal through the thickness, 2D woven, 3D fabric structure was modified to improve the impact resistance of 3D fabric reinforced composites. This was achieved by imparting the auxeticity into four layers through the thickness woven structure. A comparison was made between the standard and modified four layers through the thickness woven structure in terms of auxeticity, penetration and impact resistance. It was found that the modified structure showed auxeticity in both warp and weft direction. It was also found that the penetration resistance of modified sample was less as compared to the standard structure, but impact resistance was improved up to 6.7% of modified four layers through the thickness woven structure.

Keywords: 2D woven, 3D fabrics, auxetic, impact resistance, orthogonal through the thickness

Procedia PDF Downloads 307
10456 Development of a Sequential Multimodal Biometric System for Web-Based Physical Access Control into a Security Safe

Authors: Babatunde Olumide Olawale, Oyebode Olumide Oyediran

Abstract:

The security safe is a place or building where classified document and precious items are kept. To prevent unauthorised persons from gaining access to this safe a lot of technologies had been used. But frequent reports of an unauthorised person gaining access into security safes with the aim of removing document and items from the safes are pointers to the fact that there is still security gap in the recent technologies used as access control for the security safe. In this paper we try to solve this problem by developing a multimodal biometric system for physical access control into a security safe using face and voice recognition. The safe is accessed by the combination of face and speech pattern recognition and also in that sequential order. User authentication is achieved through the use of camera/sensor unit and a microphone unit both attached to the door of the safe. The user face was captured by the camera/sensor while the speech was captured by the use of the microphone unit. The Scale Invariance Feature Transform (SIFT) algorithm was used to train images to form templates for the face recognition system while the Mel-Frequency Cepitral Coefficients (MFCC) algorithm was used to train the speech recognition system to recognise authorise user’s speech. Both algorithms were hosted in two separate web based servers and for automatic analysis of our work; our developed system was simulated in a MATLAB environment. The results obtained shows that the developed system was able to give access to authorise users while declining unauthorised person access to the security safe.

Keywords: access control, multimodal biometrics, pattern recognition, security safe

Procedia PDF Downloads 303
10455 The Access to the City in the Medellín Urban Experience

Authors: Mansilla, Juan Camilo

Abstract:

According to many studies, public space in the cities of Global South is constantly morcellated and captured by a multiplicity of actors in a permanent struggle for power. This imposed public space restricts the access to services and political actions to many inhabitants. The author has conducted several focus group sessions using video in a reflective mode with low-income communities in Medellín, Colombia in order to study how people in this city are shift from a physical public space to a hybrid public space shaped by internet. Beyond the fragmented city and the violent urban context manifested by participants, these activities have highlighted how the access to the city is currently going through a dialectic movement between the physical and the digital space. The purpose of this article is to make explicit the link between this hybrid public space and the boundaries of exclusion in the city. Urban marginality is closely related with the idea of access and space. Low-income communities in Medellín assume the digital realm like a “not controlled space” of resistance, where alternative ways of expression like hip hop movement, graffiti, dance, video and virtual communities produce effective changes in the physical realm.

Keywords: access to the city, hybrid public space, low-income communities, Medellín, urban marginality

Procedia PDF Downloads 458
10454 Life Cycle Cost Evaluation of Structures Retrofitted with Damped Cable System

Authors: Asad Naeem, Mohamed Nour Eldin, Jinkoo Kim

Abstract:

In this study, the seismic performance and life cycle cost (LCC) are evaluated of the structure retrofitted with the damped cable system (DCS). The DCS is a seismic retrofit system composed of a high-strength steel cable and pressurized viscous dampers. The analysis model of the system is first derived using various link elements in SAP2000, and fragility curves of the structure retrofitted with the DCS and viscous dampers are obtained using incremental dynamic analyses. The analysis results show that the residual displacements of the structure equipped with the DCS are smaller than those of the structure with retrofitted with only conventional viscous dampers, due to the enhanced stiffness/strength and self-centering capability of the damped cable system. The fragility analysis shows that the structure retrofitted with the DCS has the least probability of reaching the specific limit states compared to the bare structure and the structure with viscous damper. It is also observed that the initial cost of the DCS method required for the seismic retrofit is smaller than that of the structure with viscous dampers and that the LCC of the structure equipped with the DCS is smaller than that of the structure with viscous dampers.

Keywords: damped cable system, fragility curve, life cycle cost, seismic retrofit, self-centering

Procedia PDF Downloads 523
10453 People Experiencing Economic Disadvantages and Access to Justice System: The Case of Unemployed People in Australia

Authors: M. Shahadat Hossain

Abstract:

People experiencing economic disadvantages have limited access to justice system. Employment status is a key indicator of economic disadvantage. There is a link between employment status and vulnerability to legal problems. This paper addresses the obstacles unemployed people experience to secure justice in Australia. This paper further explores exiting services for economically disadvantaged people to secure justice where these unemployment people can get access. It reveals that unemployed people are vulnerable to multifaced crime and violence. Due to high cost of legal services, these unemployed people are unable to afford legal services to access justice. They are often found higher levels of nonactions in terms of access to justice also due to lack of their initiatives. This paper further reveals that legal aid commissions are state and territory statutory agencies in Australia which provide free legal information, advice, duty lawyers, and legal representation services. Community legal centres are independent, non-profit government organizations with a focus of early advice, problem solving, and working with other agencies to address connected, financial, and health problems. Moreover, the private profession helps people who cannot afford to pay for a lawyer in several ways. But there are problems of shortage of funding for these legal services and making available to economically disadvantaged people. However, this paper argues that people experiencing long-term unemployment face barriers to secure justice due to their economic disadvantages. It further argues that services available for them to access to justice is inadequate.

Keywords: economic disadvantages, unemployment, access to justice, Australia

Procedia PDF Downloads 110
10452 Analysis of Hydraulic Velocity in Fishway Using CCHE2D Model

Authors: Amir Abbas Kamanbedast, Masood Mohammad Shafipor, Amir Ghotboddin

Abstract:

Fish way is a structure that in generally using to migrate to the place where they are spawned and is made near the spillway. Preventing fish spawning or migrating to their original place by fishway structures can affect their lives in the river or even erase one access to intended environment. The main objective of these structures is establishing a safe path for fish migration. In the present study first the hydraulic specifications of Hamidieh diversion dam were assessed and then it is problems were evaluated. In this study the dimensions of the fish way, including velocity of pools, were evaluated by CCHE2D software. Then by change slope in this structure streamlines like velocity in the pools were measured. For calibration can be use measuring local velocities in some pools. The information can be seen the fishway width of 0.3 m has minimum rate of descent in the total number of structures (pools and overflow).

Keywords: fishway, velocity, Hamidieh-Diversion Dam, CCHE2D model

Procedia PDF Downloads 460
10451 Bridge Healthcare Access Gap with Artifical Intelligence

Authors: Moshmi Sangavarapu

Abstract:

The US healthcare industry has undergone tremendous digital transformation in recent years, but critical care access to lower-income ethnicities is still in its nascency. This population has historically showcased substantial hesitation to seek any medical assistance. While the lack of sufficient financial resources plays a critical role, the existing cultural and knowledge barriers also contribute significantly to widening the access gap. It is imperative to break these barriers to ensure timely access to therapeutic procedures that can save important lives! Based on ongoing research, healthcare access barriers can be best addressed by tapping the untapped potential of caregiver communities first. They play a critical role in patients’ diagnoses, building healthcare knowledge and instilling confidence in required therapeutic procedures. Recent technological advancements have opened many avenues by developing smart ways of reaching the large caregiver community. A digitized go-to-market strategy featuring connected media coupled with smart IoT devices and geo-location targeting can be collectively leveraged to reach this key audience group. AI/ML algorithms can be thoroughly trained to identify relevant data signals from users' location and browsing behavior and determine useful marketing touchpoints. The web behavior can be further assimilated with natural language processing to identify contextually relevant interest topics and decipher potential caregivers on digital avenues to serve that brand message. In conclusion, grasping the true health access journey of any lower-income ethnic group is important to design beneficial touchpoints that can alleviate patients’ concerns and allow them to break their own access barriers and opt for timely and quality healthcare.

Keywords: healthcare access, market access, diversity barriers, patient journey

Procedia PDF Downloads 27
10450 Introduction of the Fluid-Structure Coupling into the Force Analysis Technique

Authors: Océane Grosset, Charles Pézerat, Jean-Hugh Thomas, Frédéric Ablitzer

Abstract:

This paper presents a method to take into account the fluid-structure coupling into an inverse method, the Force Analysis Technique (FAT). The FAT method, also called RIFF method (Filtered Windowed Inverse Resolution), allows to identify the force distribution from local vibration field. In order to only identify the external force applied on a structure, it is necessary to quantify the fluid-structure coupling, especially in naval application, where the fluid is heavy. This method can be decomposed in two parts, the first one consists in identifying the fluid-structure coupling and the second one to introduced it in the FAT method to reconstruct the external force. Results of simulations on a plate coupled with a cavity filled with water are presented.

Keywords: aeroacoustics, fluid-structure coupling, inverse methods, naval, turbulent flow

Procedia PDF Downloads 488
10449 Factors Affecting Households' Decision to Allocate Credit for Livestock Production: Evidence from Ethiopia

Authors: Kaleb Shiferaw, Berhanu Geberemedhin, Dereje Legesse

Abstract:

Access to credit is often viewed as a key to transform semi-subsistence smallholders into market oriented producers. However, only a few studies have examined factors that affect farmers’ decision to allocate credit on farm activities in general and livestock production in particular. A trivariate probit model with double selection is employed to identify factors that affect farmers’ decision to allocate credit on livestock production using data collected from smallholder farmers in Ethiopia. After controlling for two sample selection bias – taking credit for the production season and decision to allocate credit on farm activities – land ownership and access to a livestock centered extension service are found to have a significant (p<0.001) effect on farmers decision to use credit for livestock production. The result showed farmers with large land holding, and access to a livestock centered extension services are more likely to utilize credit for livestock production. However since the effect of land ownership squared is negative the effect of land ownership for those who own a large plot of land lessens. The study highlights the fact that improving access to credit does not automatically translate into more productive households. Improving farmers’ access to credit should be followed by a focused extension services.

Keywords: livestock production, credit access, credit allocation, household decision, double sample selection

Procedia PDF Downloads 297
10448 The Impact of Access to Finances on Survival of Small and Medium Enterprises: The South African Perspective in an Covid-19 Era

Authors: Thabiso Sthembiso Msomi

Abstract:

SMEs are the main engine of growth in most developing economies. One of the main factors that hinder the development of SME is access to finance. In this study, we explored the factors that hinder the growth and survival of SMEs in South Africa. The capital structure theory formed the theoretical underpinning for the study. The quantitative research design was adopted and data was collected from retail, construction, manufacturing and agriculture sectors of SMEs within the KwaZulu-Natal province of South Africa. The modified version of the Cochran formula was used to determine the sample size as 321 SMEs and analysed using the five-point Likert scale. The purposive sampling technique was used to select owners of SME. Statistical Package for the Social Sciences (SPSS) was used for the data analysis through Exploratory Factor Analysis (EFA) to determine the factor structures of items employed to measure each of the constructs in this study. Then, the Cronbach’s alpha test was conducted to determine the reliability of each construct. Kaiser-Meyer-Olkin (KMO) was used to determine the adequacy of the sample size. Linear regression was done to determine the effect of the independent variables on the dependent variable. The findings suggest that the main constraints facing South African SMEs were the lack of experienced management. Furthermore, the SMEs would fail to raise customer awareness of their products and services, which in turn affects their market access and monthly turnover. The study recommends that SMEs keep up-to-date records of business transactions to enable the business to keep track of its operations. The study recommends that South African banks adopt an SME accounting and bookkeeping program. The finding of this study benefits policymakers in both the private and public sectors.

Keywords: small businesses, access to finances, COVID-19, SMEs survival

Procedia PDF Downloads 149
10447 Digital Repositories in Algerian Universities: Content and Search Possibilities

Authors: Hakim Benoumelghar

Abstract:

The launch in 1999 of the open access Initiative (OAI) and the protocol for sharing metadata, OAI-PMH, in parallel with the provision of deposit platforms, open-source software, such as DSpace in 2002, which allow libraries to develop digital repositories and play a leading role in the open access movement, and by building institutional open archives alongside the theme. This study focuses on Algerian universities and their projects and platforms for digital repositories of theses and scientific papers and the possibilities of access to the university community to develop research and access to archives of scientific digital content offered by the scientific community. This contribution attempts to compare Algerian and foreign institutional deposits in developed countries in order to have development and perspectives to facilitate scientific research and give more possibilities to the scientific community in documentary matters.

Keywords: digital repository, repository software, university, algeria

Procedia PDF Downloads 47
10446 Public Wi-Fi Security Threat Evil Twin Attack Detection Based on Signal Variant and Hop Count

Authors: Said Abdul Ahad Ahadi, Elyas Baray, Nitin Rakesh, Sudeep Varshney

Abstract:

Wi-Fi is a widely used internet source that is used to provide internet access in many areas such as Stores, Cafes, University campuses, Restaurants and so on. This technology brought more facilities in communication and networking. On the other hand, due to the transmission of data over the air, which makes the network vulnerable, so it becomes prone to various threats such as Evil Twin and etc. The Evil Twin is a kind of adversary which impersonates a legitimate access point (LAP) as it can happen by spoofing the name (SSID) and MAC address (BSSID) of a legitimate access point (LAP). And this attack can cause many threats such as MITM, Service Interruption, Access point service blocking. Various Evil Twin Attack Detection Techniques are proposed, but they require additional hardware, or they require protocol modification. In this paper, we proposed a new technique based on Access Point’s two fingerprints, Received Signal Strength Indicator (RSSI) and Hop Count, that is hard to copy by an adversary. And we implemented the technique in a system called “ETDetector,” which can detect and prevent the attack.

Keywords: evil twin, LAP, SSID, Wi-Fi security, signal variation, ETAD, kali linux, scapy, python

Procedia PDF Downloads 121
10445 Assessment of the Two-Way Relationship between Capital Structure and Operation Performance of Listed Companies on Vietnam’s Stock

Authors: Uyen Tran Tu

Abstract:

The decision on capital structure is one of the most important and sophisticated decisions in financial management in order to improve firm performance. This article would study the two-way impact between capital structure and firm performance. The study use EVIEWS 6.0 software to determine a two-way relationship between the capital structure and firm performance based on two-stage regression (2SLS - Two-Stage Least Squares). The findings are: capital structure has the opposite effect on the business efficiency and vice versa, factors that effect on business efficiency include Size and Opportunities. Factors effects on the capital structure are size; liquidity. These factors also affect the ratio of capital structure (total debt/ total asset) of companies. In particular, liquidity has the opposite effect; and the size of the business has the same impact. The results of the study are in line with the theory and empirical studies presented, and the results of the study are unchanged for all three years 2015-2017.

Keywords: capital structure, firm performance, factors, two-way relationship

Procedia PDF Downloads 123
10444 Evaluation of a Staffing to Workload Tool in a Multispecialty Clinic Setting

Authors: Kristin Thooft

Abstract:

— Increasing pressure to manage healthcare costs has resulted in shifting care towards ambulatory settings and is driving a focus on cost transparency. There are few nurse staffing to workload models developed for ambulatory settings, less for multi-specialty clinics. Of the existing models, few have been evaluated against outcomes to understand any impact. This evaluation took place after the AWARD model for nurse staffing to workload was implemented in a multi-specialty clinic at a regional healthcare system in the Midwest. The multi-specialty clinic houses 26 medical and surgical specialty practices. The AWARD model was implemented in two specialty practices in October 2020. Donabedian’s Structure-Process-Outcome (SPO) model was used to evaluate outcomes based on changes to the structure and processes of care provided. The AWARD model defined and quantified the processes, recommended changes in the structure of day-to-day nurse staffing. Cost of care per patient visit, total visits, a total nurse performed visits used as structural and process measures, influencing the outcomes of cost of care and access to care. Independent t-tests were used to compare the difference in variables pre-and post-implementation. The SPO model was useful as an evaluation tool, providing a simple framework that is understood by a diverse care team. No statistically significant changes in the cost of care, total visits, or nurse visits were observed, but there were differences. Cost of care increased and access to care decreased. Two weeks into the post-implementation period, the multi-specialty clinic paused all non-critical patient visits due to a second surge of the COVID-19 pandemic. Clinic nursing staff was re-allocated to support the inpatient areas. This negatively impacted the ability of the Nurse Manager to utilize the AWARD model to plan daily staffing fully. The SPO framework could be used for the ongoing assessment of nurse staffing performance. Additional variables could be measured, giving a complete picture of the impact of nurse staffing. Going forward, there must be a continued focus on the outcomes of care and the value of nursing

Keywords: ambulatory, clinic, evaluation, outcomes, staffing, staffing model, staffing to workload

Procedia PDF Downloads 155
10443 Analyzing the Relationship between the Spatial Characteristics of Cultural Structure, Activities, and the Tourism Demand

Authors: Deniz Karagöz

Abstract:

This study is attempt to comprehend the relationship between the spatial characteristics of cultural structure, activities and the tourism demand in Turkey. The analysis divided into four parts. The first part consisted of a cultural structure and cultural activity (CSCA) index provided by principal component analysis. The analysis determined four distinct dimensions, namely, cultural activity/structure, accessing culture, consumption, and cultural management. The exploratory spatial data analysis employed to determine the spatial models of cultural structure and cultural activities in 81 provinces in Turkey. Global Moran I indices is used to ascertain the cultural activities and the structural clusters. Finally, the relationship between the cultural activities/cultural structure and tourism demand was analyzed. The raw/original data of the study official databases. The data on the cultural structure and activities gathered from the Turkish Statistical Institute and the data related to the tourism demand was provided by the Republic of Turkey Ministry of Culture and Tourism.

Keywords: cultural activities, cultural structure, spatial characteristics, tourism demand, Turkey

Procedia PDF Downloads 524
10442 Fragility Analysis of Weir Structure Subjected to Flooding Water Damage

Authors: Oh Hyeon Jeon, WooYoung Jung

Abstract:

In this study, seepage analysis was performed by the level difference between upstream and downstream of weir structure for safety evaluation of weir structure against flooding. Monte Carlo Simulation method was employed by considering the probability distribution of the adjacent ground parameter, i.e., permeability coefficient of weir structure. Moreover, by using a commercially available finite element program (ABAQUS), modeling of the weir structure is carried out. Based on this model, the characteristic of water seepage during flooding was determined at each water level with consideration of the uncertainty of their corresponding permeability coefficient. Subsequently, fragility function could be constructed based on this response from numerical analysis; this fragility function results could be used to determine the weakness of weir structure subjected to flooding disaster. They can also be used as a reference data that can comprehensively predict the probability of failur,e and the degree of damage of a weir structure.

Keywords: weir structure, seepage, flood disaster fragility, probabilistic risk assessment, Monte-Carlo simulation, permeability coefficient

Procedia PDF Downloads 324