Search results for: access to finances
3339 Digital Repositories in Algerian Universities: Content and Search Possibilities
Authors: Hakim Benoumelghar
Abstract:
The launch in 1999 of the open access Initiative (OAI) and the protocol for sharing metadata, OAI-PMH, in parallel with the provision of deposit platforms, open-source software, such as DSpace in 2002, which allow libraries to develop digital repositories and play a leading role in the open access movement, and by building institutional open archives alongside the theme. This study focuses on Algerian universities and their projects and platforms for digital repositories of theses and scientific papers and the possibilities of access to the university community to develop research and access to archives of scientific digital content offered by the scientific community. This contribution attempts to compare Algerian and foreign institutional deposits in developed countries in order to have development and perspectives to facilitate scientific research and give more possibilities to the scientific community in documentary matters.Keywords: digital repository, repository software, university, algeria
Procedia PDF Downloads 803338 Public Wi-Fi Security Threat Evil Twin Attack Detection Based on Signal Variant and Hop Count
Authors: Said Abdul Ahad Ahadi, Elyas Baray, Nitin Rakesh, Sudeep Varshney
Abstract:
Wi-Fi is a widely used internet source that is used to provide internet access in many areas such as Stores, Cafes, University campuses, Restaurants and so on. This technology brought more facilities in communication and networking. On the other hand, due to the transmission of data over the air, which makes the network vulnerable, so it becomes prone to various threats such as Evil Twin and etc. The Evil Twin is a kind of adversary which impersonates a legitimate access point (LAP) as it can happen by spoofing the name (SSID) and MAC address (BSSID) of a legitimate access point (LAP). And this attack can cause many threats such as MITM, Service Interruption, Access point service blocking. Various Evil Twin Attack Detection Techniques are proposed, but they require additional hardware, or they require protocol modification. In this paper, we proposed a new technique based on Access Point’s two fingerprints, Received Signal Strength Indicator (RSSI) and Hop Count, that is hard to copy by an adversary. And we implemented the technique in a system called “ETDetector,” which can detect and prevent the attack.Keywords: evil twin, LAP, SSID, Wi-Fi security, signal variation, ETAD, kali linux, scapy, python
Procedia PDF Downloads 1433337 The Role of Ecotourism Development in the Financing of Conservation Initiatives in Cameroon’s Protected Areas: Lessons from the Campo Ma’an National Park
Authors: Nyong Princely Awazi, Gadinga Walter Forje, Barnabas Neba Nfornkah, Ndzifon Jude Kimengsi
Abstract:
Ecotourism is documented as a sustainable measure of bridging conservation goals and livelihood sustenance around protected areas, due to its ability of not just providing alternative livelihood, but also in providing the necessary resources that can help finance conservation initiatives. In Cameroon, all ecotourism activities around national parks are aimed at generating revenue through the conservation service while providing sustainable livelihood options to the local population. There exists an information lacuna regarding the contribution of ecotourism finances to conservation efforts in the country. This study was aimed at establishing the contribution of ecotourism finances to conservation initiatives in and around the Campo Ma’an National Park (CMNP). Data were collected through the administering of 120 structured questionnaires to ecotourism actors and 15 key/expert interviews with tourism and conservation actors in the Campo Ma’an landscape. Chi-square test, Spearman’s rank correlation and regressions were used for data analysis. The study revealed that the main sources of ecotourism financing to the park service are through entrance fees, cameras and vehicle fees paid by tourists as well as ecotourism project financing through NGOs. Calculations from the tourism register of the park showed that the park was able to raise as much as 1,576,000 FCFA (US$ 3,152) annually. It was further established that ecotourism revenue has not greatly supported conservation, with 54% of respondents perceiving ecotourism not contributing to biodiversity conservation. Chi Square test results highlighted poor ecotourism governance, low level of ecotourism development, corruption from park management staff, obsolete nature of the current finance law on the management of protected area revenue as key factors hindering ecotourism financing in conservation. For ecotourism financing to contribute to biodiversity conservation in the CMNP and in Cameroon’s protected areas, the government needs to revise the finance law on the management of revenue generated from protected areas, improve park governance to fight corruption and enhance transparency, invest in the development and marketing of the Campo Ma’an national park as a tourism destination in the country.Keywords: Cameroon, Campo Ma’an National Park, conservation, ecotourism, ecotourism financing
Procedia PDF Downloads 1103336 Streamlining .NET Data Access: Leveraging JSON for Data Operations in .NET
Authors: Tyler T. Procko, Steve Collins
Abstract:
New features in .NET (6 and above) permit streamlined access to information residing in JSON-capable relational databases, such as SQL Server (2016 and above). Traditional methods of data access now comparatively involve unnecessary steps which compromise system performance. This work posits that the established ORM (Object Relational Mapping) based methods of data access in applications and APIs result in common issues, e.g., object-relational impedance mismatch. Recent developments in C# and .NET Core combined with a framework of modern SQL Server coding conventions have allowed better technical solutions to the problem. As an amelioration, this work details the language features and coding conventions which enable this streamlined approach, resulting in an open-source .NET library implementation called Codeless Data Access (CODA). Canonical approaches rely on ad-hoc mapping code to perform type conversions between the client and back-end database; with CODA, no mapping code is needed, as JSON is freely mapped to SQL and vice versa. CODA streamlines API data access by improving on three aspects of immediate concern to web developers, database engineers and cybersecurity professionals: Simplicity, Speed and Security. Simplicity is engendered by cutting out the “middleman” steps, effectively making API data access a whitebox, whereas traditional methods are blackbox. Speed is improved because of the fewer translational steps taken, and security is improved as attack surfaces are minimized. An empirical evaluation of the speed of the CODA approach in comparison to ORM approaches ] is provided and demonstrates that the CODA approach is significantly faster. CODA presents substantial benefits for API developer workflows by simplifying data access, resulting in better speed and security and allowing developers to focus on productive development rather than being mired in data access code. Future considerations include a generalization of the CODA method and extension outside of the .NET ecosystem to other programming languages.Keywords: API data access, database, JSON, .NET core, SQL server
Procedia PDF Downloads 663335 The Food and Nutrition Security in Brazilian Quilombo: The Account of Experiences in Two Titled Territories
Authors: Dyego Ramos Henrique, Viviane Pimentel, Katia Souto, Ana Valéria Mendonça, Andrea Gallassi
Abstract:
Socioeconomic inequalities in Brazil have accentuated the aggravations of poverty among the most vulnerable populations, among which are the quilombola communities. The objective was to reflect on a situation of food and nutritional security in two Brazilian quilombola communities. The data were collected by means of reports of experience through the production of talk wheels in two quilombola communities (Itamatatiua and Mesquita), located in the cities of Alcântara and Cidade Ocidental. Access to health services and health promotion actions were still incipient in the quilombola communities visited. The perceptions of the participants of the quilombolas revealed that there are still repressed demands that have rendered the fulfillment of the principles of equity, universality and integrality, both for access to health and for access and availability of food. They recognize in governmental instances a socioeconomic-cultural valorization and nutritional qualities intrinsic to the foods produced by them. Although they have been used as communities of quilombolas live and their level of access to services and programs, dealing with quilombola communities does not mean dealing with 'isolated groups or a strictly homogeneous population.' It demands a great need of attention in relation to the access and availability of food, besides overcoming barriers that made it an unfeasible valuation of social, economic and cultural precepts, intrinsic to the thought about food and nutritional security in Brazilian quilombos.Keywords: access to services, food and nutrition security, health promotion, quilombo population
Procedia PDF Downloads 2273334 Access of Small and Medium Enterprises to Finance in Rural Areas: Case of Indonesia and Thailand
Authors: N. Ikasari, T. Sumransat, U. Eko, R. Kusumastuti
Abstract:
Small and medium enterprises (SMEs) are regarded as the engine for economic development, notwithstanding their continuous financing conundrum. In the case of developing countries, access to finance is a reflection of the effectiveness of government policy. The widely accepted perspective to assess small businesses’ access to finance is that of economic view. The existing body of literature presents access to finance in three dimensions; they are accessibility, eligibility and affordability. Within this perspective, the role of socio-cultural has not explored. This study is aimed at investigating the existence of any socio-cultural factors within access to finance issue in Asian countries where governance is enriched by countries’ values and beliefs. The significance of this study is the instigation of supplementary dimension to assess access to finance that eventually contributes to the development of micro-finance policy. Indonesia and Thailand are selected as cases in point, where distinction is drawn on the level of cultural diversity and micro-finance policy in respective country. A questionnaire is used to collect information related to the three dimensions of access to finance as well as to explore alternative financing reasoning to elaborate the issue from the demand side. Questionnaires are distributed to 60 small business owners operating in Indonesia and the same number in Thailand. In order to present a complete understanding on the matter at hand, interviews with banks are conducted to capture the perspective as presented by the supply side. Research findings show that small business owners and banks in Indonesia and Thailand are in agreement that access to finance is not deemed as an issue. However, trust issue that exists mutually between financing users and providers leads small business owners in Indonesia to look for alternative financing other than banks. The findings contribute to the refinement of micro-financing policy in Indonesia and Thailand.Keywords: access to finance, Indonesia, small and medium enterprises, Thailand
Procedia PDF Downloads 2903333 Exploratory Case Study: Judicial Discretion and Political Statements Transforming the Actions of the Commissioner for the South African Revenue Service
Authors: Werner Roux Uys
Abstract:
The Commissioner for the South African Revenue Service (SARS) holds a high position of trust in South African society and a lack of trust by taxpayers in the Commissioner’s actions or conduct could compromise SARS’ management of public finances. Tax morality – which is implicit in the social contract between taxpayers and the state – includes distinct phenomena that can cause a breakdown if there is a perceived lack of action on the part of the Commissioner to ensure public finances are kept safe. To promote tax morality, the Commissioner must support the judiciary in the exercise of its discretion to punish fraudulent tax activities and corrupt tax practices. For several years the political meddling in the Commissioner’s actions and conduct have caused perceived abuse of power at SARS, and taxpayers believed their hard-earned income paid over to SARS would be fruitless and wasteful expenditure. The purpose of this article is to identify and analyse previous decisions held by the South African judiciary regarding the Commissioner’s actions and conduct in tax matters, as well as consider important political statements and newspaper bulletins for the purpose of this research. The study applies a qualitative research approach and exploratory case study technique. Keywords were selected and inserted in the LexisNexis electronic database to systematically identify applicable case law where the ratio decidendi of the court referred to the actions and/or conduct of the Commissioner. Specific real-life statements, including political statements and newspaper bulletins, were selected to support the topic at hand. The purpose of the study is to educate the public about the perceptions that have transformed taxpayers’ behaviour towards the Commissioner for SARS since South Africa’s fledgling constitutional democracy was inaugurated in 1994. The study adds to the literature by identifying key characteristics or distinct phenomena regarding the actions and conduct of the Commissioner affecting taxpayers’ behaviour, including discretionary decision-making. From the findings, it emerged that SARS must abide by its (own) laws and that there is a need to educate not only South African taxpayers about tax morality, but also the public in general.Keywords: commissioner, SARS, action and conduct, judiciary, discretionry, decsion-making
Procedia PDF Downloads 683332 The Role of Access Control Techniques in Creating a Safe Cyberspace for Children
Authors: Sara Muslat Alsahali, Nout Mohammed Alqahtani
Abstract:
Digital technology has changed the world, and with the increasing number of children accessing the Internet, it has now become an integral part of children's lives from their early years. With the rapid development of digital technology, the risks children face on the internet also evolve from cyberbullying to misuse, sexual exploitation, and abuse of their private information over the Internet. Digital technology, with its advantages and disadvantages, is now a fact of our life. Therefore, knowledge of how to reduce its risks and maximize its benefits will help shape the growth and future of a new generation of digital citizens. This paper will discuss access control techniques that help to create secure cyberspace where children can be safe without depriving them of their rights and freedom to use the internet and preventing them from its benefits. Also, it sheds light on its challenges and problems by classifying the methods of parental controlling into two possibilities asynchronous and synchronous techniques and choosing YouTube as a case study of access control techniques.Keywords: access control, cyber security, kids, parental monitoring
Procedia PDF Downloads 1373331 Discovering User Behaviour Patterns from Web Log Analysis to Enhance the Accessibility and Usability of Website
Authors: Harpreet Singh
Abstract:
Finding relevant information on the World Wide Web is becoming highly challenging day by day. Web usage mining is used for the extraction of relevant and useful knowledge, such as user behaviour patterns, from web access log records. Web access log records all the requests for individual files that the users have requested from the website. Web usage mining is important for Customer Relationship Management (CRM), as it can ensure customer satisfaction as far as the interaction between the customer and the organization is concerned. Web usage mining is helpful in improving website structure or design as per the user’s requirement by analyzing the access log file of a website through a log analyzer tool. The focus of this paper is to enhance the accessibility and usability of a guitar selling web site by analyzing their access log through Deep Log Analyzer tool. The results show that the maximum number of users is from the United States and that they use Opera 9.8 web browser and the Windows XP operating system.Keywords: web usage mining, web mining, log file, data mining, deep log analyzer
Procedia PDF Downloads 2483330 Lifetime Improvement of IEEE.802.15.6 Sensors in Scheduled Access Mode
Authors: Latif Adnane, C. E. Ait Zaouiat, M. Eddabbah
Abstract:
In Wireless Body Area Networks, the issue of systems lifetime is a big challenge to complete. In this paper, we have tackled this subject to suggest some solutions. For this aim, we have studied some batteries characteristics related to human body temperature. Moreover, we have analyzed a mathematical model which defines sensors lifetime (battery lifetime). Based on this model, we note that the random access increases the energy consumption, because nodes are waking up during the whole superframe period. Results show that using scheduled mode access of IEEE 802.15.6 maximizes the lifetime function, by setting nodes in the sleep mode in the inactive period of transmission.Keywords: battery, energy consumption, IEEE 802.15.6, lifetime, polling
Procedia PDF Downloads 3453329 Digital Transformation, Financing Microstructures, and Impact on Well-Being and Income Inequality
Authors: Koffi Sodokin
Abstract:
Financing microstructures are increasingly seen as a means of financial inclusion and improving overall well-being in developing countries. In practice, digital transformation in finance can accelerate the optimal functioning of financing microstructures, such as access by households to microfinance and microinsurance. Large households' access to finance can lead to a reduction in income inequality and an overall improvement in well-being. This paper explores the impact of access to digital finance and financing microstructures on household well-being and the reduction of income inequality. To this end, we use the propensity score matching, the double difference, and the smooth instrumental quantile regression as estimation methods with two periods of survey data. The paper uses the FinScope consumer data (2016) and the Harmonized Living Standards Measurement Study (2018) from Togo in a comparative perspective. The results indicate that access to digital finance, as a cultural game changer, and to financing microstructures improves overall household well-being and contributes significantly to reducing income inequality.Keywords: financing microstructure, microinsurance, microfinance, digital finance, well-being, income inequality
Procedia PDF Downloads 893328 Full Disclosure Policy: Transparency in Fiscal Administration
Authors: Joyly Jill Apud
Abstract:
Corruption is an all-encompassing issue worldwide. Many attempts have been done to address such cases especially by the government through increasing transparency. The Philippine government increased the mechanism of transparency by opening to public its financial transactions through Full Disclosure Policy – mandating all local governments to post in their websites all financial transactions (Philippine Public Transparency Reporting Project, 2011). For transparency to be fully realized, the challenge lies in creating a mechanism where the constituents are encouraged to engage as social auditors. In line of the said challenge, the study focused in Davao City, Philippines measuring the respondent’s awareness, access and utilization of Full Disclosure Policy (FDP). Particularly, this study determined the significant difference on the awareness, access and utilization of respondents when grouped according to sector and the significant relationship between respondents’ awareness and in the access and utilization of FDP reports. The study used descriptive-correlation, Mean, Anova and Pearson R as statistical treatment. The 120 respondents are from the different sectors of Davao City. These are the Academe, Youth, LGUs, NGOs, Business, and Church groups. The awareness of the respondents was measured in three main categories: Existence of the Policy, Content of the Policy and the Manner of Publication. Access and Utilization of the FDP reports is divided into three: Budget Reports, Procurement Reports and Special Purpose Fund Reports. Results showed that the respondents are moderately aware of the Policy. Though it manifested that the respondents are aware of the disclosure, they are unaware of the Full Disclosure Policy and Full Disclosure Policy Portal. Moreover, the respondents seldom access and utilize all the FDP reports. Further results revealed that there is a significant difference in the awareness and the access and utilization of FDP when grouped according to sector. Moreover, significant relationship in the awareness and the access and utilization of the FDP is evident. It showed that the higher the awareness on FDP, the higher the level of access and utilization on the FDP reports.Keywords: corruption, e-governance, budget transparency, participation
Procedia PDF Downloads 3933327 Domestic and Foreign Terrorism: Evaluation of the Breeding Ground
Authors: T. K. Hung
Abstract:
Terrorism acts have occurred across both developed and developing states, with well-identified motivation and causes. For many years, terrorism eradication has become a major topic yet only passive actions were taken in response to acts. The linkage between the location of terrorism occurrence and breeding ground is not well-documented, resulting in the passive approach used in counter-terrorism nowadays. The evaluation investigates all post-9/11 terrorism affairs considering their state capacity, safety, ease of border access control, religion diversity, and technology access, to measure the level of breeding ground of the states. Those "weak" states with poor border access control, resources capacity and domestic safety are the best breeding ground for terrorists. Although many attacks were caused by religious motivation, religion diversity does not predict the breeding ground. States with censored technology access, particular computer-mediated communication, predict on the terrorism breeding ground, moderated by the level of breeding ground of neighboring states.Keywords: counter-terrorism, lethality, security, terrorism
Procedia PDF Downloads 3403326 Factors Affecting Access to Education: The Experiences of Parents of Children Who Are Deaf or Hard of Hearing
Authors: Hanh Thi My Nguyen
Abstract:
The purpose of this research is to examine the experiences of parents of children who are deaf or hard of hearing in supporting their children to access education in Vietnam. Parents play a crucial role in supporting their children to gain full access to education. It was widely reported that parents of those children confronted a range of problems to support their children to access education. To author’s best knowledge, there has been a lack of research exploring the experiences of those parents in literature. This research examines factors affecting those parents in supporting their children to access education. To conduct the study, qualitative approach using a phenomenological research design was chosen to explore the central phenomena. Ten parents of children who were diagnosed as deaf or hard of hearing and aged 6-9 years were recruited through the support of the Association of Parents of Children with Hearing Impairment. Participants were interviewed via telephone with a mix of open and closed questions; interviews were audio recorded, transcribed and thematically analysed. The research results show that there are nine main factors that affected the parents in this study in making decisions relating to education for their children including: lack of information resources, perspectives of those parents on communication approaches, the families’ financial capacity, the psychological impact on the participants after their children’ diagnosis, the attitude of family members, attitude of school administrators, lack of local schools and qualified teachers, and current education system for the deaf in Vietnam. Apart from those factors, the lack of knowledge of the participants’ partners about deaf education and the partners’ employment are barriers to educational access and successful communication with their child.Keywords: access to education, deaf, hard of hearing, parents experience
Procedia PDF Downloads 1363325 Spectrum Allocation Using Cognitive Radio in Wireless Mesh Networks
Authors: Ayoub Alsarhan, Ahmed Otoom, Yousef Kilani, Abdel-Rahman al-GHuwairi
Abstract:
Wireless mesh networks (WMNs) have emerged recently to improve internet access and other networking services. WMNs provide network access to the clients and other networking functions such as routing, and packet forwarding. Spectrum scarcity is the main challenge that limits the performance of WMNs. Cognitive radio is proposed to solve spectrum scarcity problem. In this paper, we consider a cognitive wireless mesh network where unlicensed users (secondary users, SUs) can access free spectrum that is allocated to spectrum owners (primary users, PUs). Although considerable research has been conducted on spectrum allocation, spectrum assignment is still considered an important challenging problem. This problem can be solved using cognitive radio technology that allows SUs to intelligently locate free bands and access them without interfering with PUs. Our scheme considers several heuristics for spectrum allocation. These heuristics include: channel error rate, PUs activities, channel capacity and channel switching time. Performance evaluation of the proposed scheme shows that the scheme is able to allocate the unused spectrum for SUs efficiently.Keywords: cognitive radio, dynamic spectrum access, spectrum management, spectrum sharing, wireless mesh networks
Procedia PDF Downloads 5293324 Improving Access to Palliative Care for Heart Failure Patients in England Using a Health Systems Approach
Authors: Alex Hughes
Abstract:
Patients with advanced heart failure develop specific palliative care needs due to the progressive symptom burden and unpredictable disease trajectory. NICE guidance advises that palliative care should be provided to patients with both cancer and non-cancer conditions as and when required. However, there is some way to go before this guidance is consistently and effectively implemented nationwide in conditions such as heart failure. The Ambitions for Palliative and End of Life Care: A national framework for local action in England provides a set of foundations and ambitions which outline a vision for what high-quality palliative and end-of-life care look like in England. This poster aims to critically consider how to improve access to palliative care for heart failure patients in England by analysing the foundations taken from this framework to generate specific recommendations using Soft Systems Methodology (SSM). The eight foundations analysed are: ‘Personalised care planning’, ‘Shared records’, ‘Evidence and information’, ‘Involving, supporting and caring for those important to the dying Person’, ‘Education and training’, ‘24/7 access’, ‘Co-design’ and ‘Leadership.’ A number of specific recommendations have been generated which highlight a need to close the evidence-policy gap and implement policy with sufficient evidence. These recommendations, alongside the creation of an evidence-based national strategy for palliative care and heart failure, should improve access to palliative care for heart failure patients in England. Once implemented, it will be necessary to evaluate the effect of these proposals to understand if access to palliative care for heart failure patients actually improves.Keywords: access, health systems, heart failure, palliative care
Procedia PDF Downloads 1283323 Performance Analysis of Multichannel OCDMA-FSO Network under Different Pervasive Conditions
Authors: Saru Arora, Anurag Sharma, Harsukhpreet Singh
Abstract:
To meet the growing need of high data rate and bandwidth, various efforts has been made nowadays for the efficient communication systems. Optical Code Division Multiple Access over Free space optics communication system seems an effective role for providing transmission at high data rate with low bit error rate and low amount of multiple access interference. This paper demonstrates the OCDMA over FSO communication system up to the range of 7000 m at a data rate of 5 Gbps. Initially, the 8 user OCDMA-FSO system is simulated and pseudo orthogonal codes are used for encoding. Also, the simulative analysis of various performance parameters like power and core effective area that are having an effect on the Bit error rate (BER) of the system is carried out. The simulative analysis reveals that the length of the transmission is limited by the multi-access interference (MAI) effect which arises when the number of users increases in the system.Keywords: FSO, PSO, bit error rate (BER), opti system simulation, multiple access interference (MAI), q-factor
Procedia PDF Downloads 3663322 Biodiversity and Biotechnology: Some Considerations about the International Regulation of Agriculture and the International Legal System on Access to Genetic Resources
Authors: Leandro Moura da Silva
Abstract:
The international community has strived to create legal mechanisms to protect their biodiversity, but this can represent, sometimes, particularly in the case of regulatory regime on access to genetic resources, an excessive nationalism which transforms itself into a significant obstacle to scientific progress causing damages to the country and to local farmers. Although it has been poorly publicized in the media, the international legal system was marked, in 2014, by the entry into force of the Nagoya Protocol, which regulates the access and benefit sharing of genetic resources of the States Party to that legal instrument. However, it’s not reasonable to think of regulating access to genetic resources without reflecting on the links of this important subject with other related issues, such as family farming and agribusiness, food safety, food security, intellectual property rights (on seeds, genetic material, new plant varieties, etc.), environmental sustainability, biodiversity, and biosafety.Keywords: international law, regulation on agriculture, agronomy techniques, sustainability, genetic resources and new crop varieties, CBD, Nagoya Protocol, ITPGRFA
Procedia PDF Downloads 5023321 Access to Sexual Reproductive Health (SRH) Education and Services to Deaf Adolescents in Wakiso, Uganda - The Ugandan Perspective
Authors: Racheal Ayanga, Nancy Katumba Muwangala, Jane Babirye, Harriet Kivumbi
Abstract:
Background: Deaf adolescents are vulnerable. Deafness limits their access to resources that are accessed by their hearing peers. There is minimal attention placed on the SRH needs of persons with disabilities, especially in developing countries. We sought to assess barriers to access of SRH education and services for deaf adolescents in Uganda. Methods: We performed a cross sectional study using a questionnaire on knowledge of and access to SRH education and services from a selected sample of deaf adolescents aged 13-19 years at Wakiso Secondary school for the deaf. A consecutive sample of eligible participants was asked to join the study after obtaining informed consent until the target sample size was reached. Results: From 01 Jul 2022 to 30 Jan 2023, 70 quantitative interviews were conducted. Participants’ mean age was 17 years, and 66% were female. 89% had heard about several components of SRH. 99% reported a need for education and services but had challenges with access 85% of the time. 54% reported receipt of education and services from government or private facilities, and the rest from friends, parents, siblings, teachers and the internet. Conclusion: Government needs to look into availing tailored, sustainable SRH education/services to deaf adolescents at health facilities and teach health workers sign language. SRH education to parents, teachers and communities of deaf adolescents improves access in hard-to-reach areas. Integration of services into routine health care is key in creating and improving models of access to wider communities of persons with disabilities to improve their mental health.Keywords: sexual and reproductive health, deaf, adolescents, education, services, disabilities, mental health, hard-to-reach areas
Procedia PDF Downloads 853320 Remote Wireless Communications Lab in Real Time
Authors: El Miloudi Djelloul
Abstract:
Technology nowadays enables the remote access to laboratory equipment and instruments via Internet. This is especially useful in engineering education, where students can conduct laboratory experiment remotely. Such remote laboratory access can enable student to use expensive laboratory equipment, which is not usually available to students. In this paper, we present a method of creating a Web-based Remote Laboratory Experimentation in the master degree course “Wireless Communications Systems” which is part of “ICS (Information and Communication Systems)” and “Investment Management in Telecommunications” curriculums. This is done within the RIPLECS Project and the NI2011 FF005 Research Project “Implementation of Project-Based Learning in an Interdisciplinary Master Program”.Keywords: remote access, remote laboratory, wireless telecommunications, external antenna-switching controller board (EASCB)
Procedia PDF Downloads 5153319 Improving Rural Access to Specialist Emergency Mental Health Care: Using a Time and Motion Study in the Evaluation of a Telepsychiatry Program
Authors: Emily Saurman, David Lyle
Abstract:
In Australia, a well serviced rural town might have a psychiatrist visit once-a-month with more frequent visits from a psychiatric nurse, but many have no resident access to mental health specialists. Access to specialist care, would not only reduce patient distress and benefit outcomes, but facilitate the effective use of limited resources. The Mental Health Emergency Care-Rural Access Program (MHEC-RAP) was developed to improve access to specialist emergency mental health care in rural and remote communities using telehealth technologies. However, there has been no current benchmark to gauge program efficiency or capacity; to determine whether the program activity is justifiably sufficient. The evaluation of MHEC-RAP used multiple methods and applied a modified theory of access to assess the program and its aim of improved access to emergency mental health care. This was the first evaluation of a telepsychiatry service to include a time and motion study design examining program time expenditure, efficiency, and capacity. The time and motion study analysis was combined with an observational study of the program structure and function to assess the balance between program responsiveness and efficiency. Previous program studies have demonstrated that MHEC-RAP has improved access and is used and effective. The findings from the time and motion study suggest that MHEC-RAP has the capacity to manage increased activity within the current model structure without loss to responsiveness or efficiency in the provision of care. Enhancing program responsiveness and efficiency will also support a claim of the program’s value for money. MHEC-RAP is a practical telehealth solution for improving access to specialist emergency mental health care. The findings from this evaluation have already attracted the attention of other regions in Australia interested in implementing emergency telepsychiatry programs and are now informing the progressive establishment of mental health resource centres in rural New South Wales. Like MHEC-RAP, these centres will provide rapid, safe, and contextually relevant assessments and advice to support local health professionals to manage mental health emergencies in the smaller rural emergency departments. Sharing the application of this methodology and research activity may help to improve access to and future evaluations of telehealth and telepsychiatry services for others around the globe.Keywords: access, emergency, mental health, rural, time and motion
Procedia PDF Downloads 2343318 Citizenship Education and Access to Information for Political Socialization and Unity in Nigeria
Authors: Alh Rauf Bello Bella
Abstract:
The main purpose of citizenship education if properly executed is to create awareness and enlightenment in the society to bring tolerance and political unity among the people. For the citizenry to have a meaningful participation for the achievement of this objective in a modern society where democracy thrives, all citizens should also have access to information on all matters affecting their lives and well-being. The paper therefore examines the scope of citizenship education and the complementary role of information providers in the quest for political socialization and national unity. It emphasizes some issues of national unity which should be addressed through proper enlightenment of the citizenry and access to relevant and timely information at the grassroots.Keywords: citizenship education, national unity, political socialization, Nigeria
Procedia PDF Downloads 4793317 Multicenter Evaluation of the ACCESS HBsAg and ACCESS HBsAg Confirmatory Assays on the DxI 9000 ACCESS Immunoassay Analyzer, for the Detection of Hepatitis B Surface Antigen
Authors: Vanessa Roulet, Marc Turini, Juliane Hey, Stéphanie Bord-Romeu, Emilie Bonzom, Mahmoud Badawi, Mohammed-Amine Chakir, Valérie Simon, Vanessa Viotti, Jérémie Gautier, Françoise Le Boulaire, Catherine Coignard, Claire Vincent, Sandrine Greaume, Isabelle Voisin
Abstract:
Background: Beckman Coulter, Inc. has recently developed fully automated assays for the detection of HBsAg on a new immunoassay platform. The objective of this European multicenter study was to evaluate the performance of the ACCESS HBsAg and ACCESS HBsAg Confirmatory assays† on the recently CE-marked DxI 9000 ACCESS Immunoassay Analyzer. Methods: The clinical specificity of the ACCESS HBsAg and HBsAg Confirmatory assays was determined using HBsAg-negative samples from blood donors and hospitalized patients. The clinical sensitivity was determined using presumed HBsAg-positive samples. Sample HBsAg status was determined using a CE-marked HBsAg assay (Abbott ARCHITECT HBsAg Qualitative II, Roche Elecsys HBsAg II, or Abbott PRISM HBsAg assay) and a CE-marked HBsAg confirmatory assay (Abbott ARCHITECT HBsAg Qualitative II Confirmatory or Abbott PRISM HBsAg Confirmatory assay) according to manufacturer package inserts and pre-determined testing algorithms. False initial reactive rate was determined on fresh hospitalized patient samples. The sensitivity for the early detection of HBV infection was assessed internally on thirty (30) seroconversion panels. Results: Clinical specificity was 99.95% (95% CI, 99.86 – 99.99%) on 6047 blood donors and 99.71% (95%CI, 99.15 – 99.94%) on 1023 hospitalized patient samples. A total of six (6) samples were found false positive with the ACCESS HBsAg assay. None were confirmed for the presence of HBsAg with the ACCESS HBsAg Confirmatory assay. Clinical sensitivity on 455 HBsAg-positive samples was 100.00% (95% CI, 99.19 – 100.00%) for the ACCESS HBsAg assay alone and for the ACCESS HBsAg Confirmatory assay. The false initial reactive rate on 821 fresh hospitalized patient samples was 0.24% (95% CI, 0.03 – 0.87%). Results obtained on 30 seroconversion panels demonstrated that the ACCESS HBsAg assay had equivalent sensitivity performances compared to the Abbott ARCHITECT HBsAg Qualitative II assay with an average bleed difference since first reactive bleed of 0.13. All bleeds found reactive in ACCESS HBsAg assay were confirmed in ACCESS HBsAg Confirmatory assay. Conclusion: The newly developed ACCESS HBsAg and ACCESS HBsAg Confirmatory assays from Beckman Coulter have demonstrated high clinical sensitivity and specificity, equivalent to currently marketed HBsAg assays, as well as a low false initial reactive rate. †Pending achievement of CE compliance; not yet available for in vitro diagnostic use. 2023-11317 Beckman Coulter and the Beckman Coulter product and service marks mentioned herein are trademarks or registered trademarks of Beckman Coulter, Inc. in the United States and other countries. All other trademarks are the property of their respective owners.Keywords: dxi 9000 access immunoassay analyzer, hbsag, hbv, hepatitis b surface antigen, hepatitis b virus, immunoassay
Procedia PDF Downloads 903316 River Catchment’s Demography and the Dynamics of Access to Clean Water in the Rural South Africa
Authors: Yiseyon Sunday Hosu, Motebang Dominic Vincent Nakin, Elphina N. Cishe
Abstract:
Universal access to clean and safe drinking water and basic sanitation is one of the targets of the 6th Sustainable Development Goals (SDGs). This paper explores the evidence-based indicators of Water Rights Acts (2013) among households in the rural communities in the Mthatha River catchment of OR Tambo District Municipality of South Africa. Daily access to minimum 25 litres/person and the factors influencing clean water access were investigated in the catchment. A total number of 420 households were surveyed in the upper, peri-urban, lower and coastal regions of Mthatha Rivier catchment. Descriptive and logistic regression analyses were conducted on the data collected from the households to elicit vital information on domestic water security among rural community dwellers. The results show that approximately 68 percent of total households surveyed have access to the required minimum 25 litre/person/day, with 66.3 percent in upper region, 76 per cent in the peri-urban, 1.1 percent in the lower and 2.3 percent in the coastal regions. Only 30 percent among the total surveyed households had access to piped water either in the house or public taps. The logistic regression showed that access to clean water was influenced by lack of water infrastructure, proximity to urban regions, daily flow of pipe-borne water, household size and distance to public taps. This paper recommends that viable integrated rural community-based water infrastructure provision strategies between NGOs and local authority and the promotion of point of use (POU) technologies to enhance better access to clean water.Keywords: domestic water, household technology, water security, rural community
Procedia PDF Downloads 3533315 Legal Theories Underpinning Access to Justice for Victims of Sexual Violence in Refugee Camps in Africa
Authors: O. E. Eberechi, G. P. Stevens
Abstract:
Legal theory has been referred to as the explanation of why things do or do not happen. It also describes situations and why they ensue. It provides a normative framework by which things are regulated and a foundation for the establishment of legal mechanisms/institutions that can bring about a desired change in a society. Furthermore, it offers recommendations in resolving practical problems and describes what the law is, what the law ought to be and defines the legal landscape generally. Some legal theories provide a universal standard, e.g. human rights, while others are capable of organizing and streamlining the collective use, and, by extension, bring order to society. Legal theory is used to explain how the world works and how it does not work. This paper will argue for the application of the principles of legal theory in the achievement of access to justice for female victims of sexual violence in refugee camps in Africa through the analysis of legal theories underpinning the access to justice for these women. It is a known fact that female refugees in camps in Africa often experience some form of sexual violation. The perpetrators of these incidents may never be apprehended, prosecuted, convicted or sentenced. Where prosecution does occur, the perpetrators are either acquitted as a result of poor investigation, inept prosecution, a lack of evidence, or the case may be dismissed owing to tardiness on the part of the prosecutor, which accounts for the culture of impunity in refugee camps. In other words, victims do not have access to the justice that could ameliorate the plight of the victims. There is, thus, a need for a legal framework that will facilitate access to justice for these victims. This paper will start with an introduction, and be followed by the definition of legal theory, its functions and its application in law. Secondly, it will provide a brief explanation of the problems faced by female refugees who are victims of sexual violence in refugee camps in Africa. Thirdly, it will embark on an analysis of theories which will be a help to an understanding of the precarious situation of female refugees, why they are violated, the need for access to justice for these victims, and the principles of legal theory in its usefulness in resolving access to justice for these victims.Keywords: access to justice, underpinning legal theory, refugee, sexual violence
Procedia PDF Downloads 4293314 Comparative Analysis of Yield before and after Access to Extension Services among Crop Farmers in Bauchi Local Government Area of Bauchi State, Nigeria
Authors: U. S. Babuga, A. H. Danwanka, A. Garba
Abstract:
The research was carried out to compare the yield of respondents before and after access to extension services on crop production technologies in the study area. Data were collected from the study area through questionnaires administered to seventy-five randomly selected respondents. Data were analyzed using descriptive statistics, t-test and regression models. The result disclosed that majority (97%) of the respondent attended one form of school or the other. The majority (78.67%) of the respondents had farm size ranging between 1-3 hectares. The majority of the respondent adopt improved variety of crops, plant spacing, herbicide, fertilizer application, land preparation, crop protection, crop processing and storage of farm produce. The result of the t-test between the yield of respondents before and after access to extension services shows that there was a significant (p<0.001) difference in yield before and after access to extension. It also indicated that farm size was significant (p<0.001) while household size, years of farming experience and extension contact were significant at (p<0.005). The major constraint to adoption of crop production technologies were shortage of extension agents, high cost of technology and lack of access to credit facility. The major pre-requisite for the improvement of extension service are employment of more extension agents or workers and adequate training. Adequate agricultural credit to farmers at low interest rates will enhance their adoption of crop production technologies.Keywords: comparative, analysis, yield, access, extension
Procedia PDF Downloads 3663313 Evaluation of Access to Finance for Local Oil Fields Companies in Ghana
Authors: Gordon Newlove Asamoah, Wendy Ama Oti
Abstract:
This study focused on evaluating access to finance for local oil field companies in Ghana. The study adopted a census survey design in evaluating access to finance for local oil field companies in Ghana. The respondents of this study were 30 management members of three oil field companies in Ghana. The data collected was analysed using Statistical Package for Social Scientists (SPSS) to generate tables and graphs for interpretation. The results show that most companies use equity financing in combination with other forms of financing to finance their business activities. This research has shown the various challenges bordering on the financing of local oil and gas projects, with emphasis on the challenges of raising funds by indigenous oil companies. Financing of the projects by indigenous oil field companies in Ghana is preferably achieved through equity finance mainly because it is the easiest to get compared to all the other forms of financing available. Other sources of financing available are debt financing, joint venture, and retained earnings from the profits generated from their operations. The study made recommendations to local oil field companies as to how they can make good use of the capital market to raise financing.Keywords: access, financing, oil fields, Ghana
Procedia PDF Downloads 1093312 Local Culture and Ability to Access Funding on Beef Cattle Farmer
Authors: Aslina Asnawi, A. Amidah Amrawaty, Nirwana
Abstract:
This article examines the relationship of local culture on the ability to access finance on beef cattle farmer. The local culture in this study associated with the values held by the farmer community so far and affect the character of farmers both in his personal life and his relationship with the surrounding environment. The data was collected by using interview and questionnaire instrument. Data were analyzed using descriptive analysis and correlation analysis. The result show that local culture identified in this study include: honesty, cleverness, decency, firmness, hard work, and shame. It’s important result that local culture has been associated with the ability to access financing for beef cattle farmers. The higher values are adopted and maintained by farmers will increase their ability to obtain loans from both informal and formal institutions. Strengthening the local culture is important because it affects the character of farmers who became one of the considerations for lenders other than collateral, capacity and capital is precisely the financing constraints for them.Keywords: access funding, beef cattle farmers, character, local culture
Procedia PDF Downloads 3293311 Design and Performance Improvement of Three-Dimensional Optical Code Division Multiple Access Networks with NAND Detection Technique
Authors: Satyasen Panda, Urmila Bhanja
Abstract:
In this paper, we have presented and analyzed three-dimensional (3-D) matrices of wavelength/time/space code for optical code division multiple access (OCDMA) networks with NAND subtraction detection technique. The 3-D codes are constructed by integrating a two-dimensional modified quadratic congruence (MQC) code with one-dimensional modified prime (MP) code. The respective encoders and decoders were designed using fiber Bragg gratings and optical delay lines to minimize the bit error rate (BER). The performance analysis of the 3D-OCDMA system is based on measurement of signal to noise ratio (SNR), BER and eye diagram for a different number of simultaneous users. Also, in the analysis, various types of noises and multiple access interference (MAI) effects were considered. The results obtained with NAND detection technique were compared with those obtained with OR and AND subtraction techniques. The comparison results proved that the NAND detection technique with 3-D MQC\MP code can accommodate more number of simultaneous users for longer distances of fiber with minimum BER as compared to OR and AND subtraction techniques. The received optical power is also measured at various levels of BER to analyze the effect of attenuation.Keywords: Cross Correlation (CC), Three dimensional Optical Code Division Multiple Access (3-D OCDMA), Spectral Amplitude Coding Optical Code Division Multiple Access (SAC-OCDMA), Multiple Access Interference (MAI), Phase Induced Intensity Noise (PIIN), Three Dimensional Modified Quadratic Congruence/Modified Prime (3-D MQC/MP) code
Procedia PDF Downloads 4123310 A Performance Analysis of Different Scheduling Schemes in WiMAX
Authors: A. Youseef
Abstract:
One of the most aims of IEEE 802.16 (WiMAX) is to present high-speed wireless access to cover wide range coverage. The base station (BS) and the subscriber station (SS) are the main parts of WiMAX. WiMAX uses either Point-to-Multipoint (PMP) or mesh topologies. In the PMP mode, the SSs connect to the BS to gain access to the network. However, in the mesh mode, the SSs connect to each other to gain access to the BS. The main components of QoS management in the 802.16 standard are the admission control, buffer management, and packet scheduling. There are several researches proposed to create an efficient packet scheduling schemes. Therefore, we use QualNet 5.0.2 to study the performance of different scheduling schemes, such as WFQ, SCFQ, RR, and SP when the numbers of SSs increase. We find that when the number of SSs increases, the average jitter and average end-to-end delay is increased and the throughput is reduced.Keywords: WiMAX, scheduling scheme, QoS, QualNet
Procedia PDF Downloads 456