Search results for: access funding
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3824

Search results for: access funding

2594 SAFECARE: Integrated Cyber-Physical Security Solution for Healthcare Critical Infrastructure

Authors: Francesco Lubrano, Fabrizio Bertone, Federico Stirano

Abstract:

Modern societies strongly depend on Critical Infrastructures (CI). Hospitals, power supplies, water supplies, telecommunications are just few examples of CIs that provide vital functions to societies. CIs like hospitals are very complex environments, characterized by a huge number of cyber and physical systems that are becoming increasingly integrated. Ensuring a high level of security within such critical infrastructure requires a deep knowledge of vulnerabilities, threats, and potential attacks that may occur, as well as defence and prevention or mitigation strategies. The possibility to remotely monitor and control almost everything is pushing the adoption of network-connected devices. This implicitly introduces new threats and potential vulnerabilities, posing a risk, especially to those devices connected to the Internet. Modern medical devices used in hospitals are not an exception and are more and more being connected to enhance their functionalities and easing the management. Moreover, hospitals are environments with high flows of people, that are difficult to monitor and can somehow easily have access to the same places used by the staff, potentially creating damages. It is therefore clear that physical and cyber threats should be considered, analysed, and treated together as cyber-physical threats. This means that an integrated approach is required. SAFECARE, an integrated cyber-physical security solution, tries to respond to the presented issues within healthcare infrastructures. The challenge is to bring together the most advanced technologies from the physical and cyber security spheres, to achieve a global optimum for systemic security and for the management of combined cyber and physical threats and incidents and their interconnections. Moreover, potential impacts and cascading effects are evaluated through impact propagation models that rely on modular ontologies and a rule-based engine. Indeed, SAFECARE architecture foresees i) a macroblock related to cyber security field, where innovative tools are deployed to monitor network traffic, systems and medical devices; ii) a physical security macroblock, where video management systems are coupled with access control management, building management systems and innovative AI algorithms to detect behavior anomalies; iii) an integration system that collects all the incoming incidents, simulating their potential cascading effects, providing alerts and updated information regarding assets availability.

Keywords: cyber security, defence strategies, impact propagation, integrated security, physical security

Procedia PDF Downloads 165
2593 TeleEmergency Medicine: Transforming Acute Care through Virtual Technology

Authors: Ashley L. Freeman, Jessica D. Watkins

Abstract:

TeleEmergency Medicine (TeleEM) is an innovative approach leveraging virtual technology to deliver specialized emergency medical care across diverse healthcare settings, including internal acute care and critical access hospitals, remote patient monitoring, and nurse triage escalation, in addition to external emergency departments, skilled nursing facilities, and community health centers. TeleEM represents a significant advancement in the delivery of emergency medical care, providing healthcare professionals the capability to deliver expertise that closely mirrors in-person emergency medicine, exceeding geographical boundaries. Through qualitative research, the extension of timely, high-quality care has proven to address the critical needs of patients in remote and underserved areas. TeleEM’s service design allows for the expansion of existing services and the establishment of new ones in diverse geographic locations. This ensures that healthcare institutions can readily scale and adapt services to evolving community requirements by leveraging on-demand (non-scheduled) telemedicine visits through the deployment of multiple video solutions. In terms of financial management, TeleEM currently employs billing suppression and subscription models to enhance accessibility for a wide range of healthcare facilities. Plans are in motion to transition to a billing system routing charges through a third-party vendor, further enhancing financial management flexibility. To address state licensure concerns, a patient location verification process has been integrated through legal counsel and compliance authorities' guidance. The TeleEM workflow is designed to terminate if the patient is not physically located within licensed regions at the time of the virtual connection, alleviating legal uncertainties. A distinctive and pivotal feature of TeleEM is the introduction of the TeleEmergency Medicine Care Team Assistant (TeleCTA) role. TeleCTAs collaborate closely with TeleEM Physicians, leading to enhanced service activation, streamlined coordination, and workflow and data efficiencies. In the last year, more than 800 TeleEM sessions have been conducted, of which 680 were initiated by internal acute care and critical access hospitals, as evidenced by quantitative research. Without this service, many of these cases would have necessitated patient transfers. Barriers to success were examined through thorough medical record review and data analysis, which identified inaccuracies in documentation leading to activation delays, limitations in billing capabilities, and data distortion, as well as the intricacies of managing varying workflows and device setups. TeleEM represents a transformative advancement in emergency medical care that nurtures collaboration and innovation. Not only has advanced the delivery of emergency medicine care virtual technology through focus group participation with key stakeholders, rigorous attention to legal and financial considerations, and the implementation of robust documentation tools and the TeleCTA role, but it’s also set the stage for overcoming geographic limitations. TeleEM assumes a notable position in the field of telemedicine by enhancing patient outcomes and expanding access to emergency medical care while mitigating licensure risks and ensuring compliant billing.

Keywords: emergency medicine, TeleEM, rural healthcare, telemedicine

Procedia PDF Downloads 82
2592 Teenage Pregnancy: The Unmet Needs of Female Adolescents in Uganda

Authors: M. Weller Jones, J. Moffat, J. Taylor, J. Hartland, M. Natarajan

Abstract:

Background: Uganda’s teenage pregnancy rate remains a significant problem for female and maternal health in the country. Teenage pregnancy is linked to higher rates of maternal and neonatal mortality and morbidity, including preterm labour, obstructed labour, vesicovaginal fistulae, infections, and maternal mental health morbidity. In 2015, the National Strategy to End Child Marriage and Teenage Pregnancy was launched in Uganda. Research is needed so that the interventions in this Strategy can be effectively applied at a local level. This study at Kitovu and Villa Maria Hospitals, two local community hospitals near Masaka, Uganda, aimed to measure change in the local teenage pregnancy rate over the past 5 years; and to explore the awareness and attitudes of teenagers and healthcare professionals towards 1) teenage pregnancy and, 2) the challenges female adolescents still currently face. Method: Teenage delivery rate, type of delivery, incidence of complications in labour and neonatal and maternal outcomes were collected from the labour ward admission books, at both hospitals, for a six month time period in 2011 and 2016. At Kitovu Hospital, qualitative data regarding the experience of, and attitudes towards teenage pregnancy was collected from interviews conducted with 12 maternity staff members and with eight female teenagers, aged 16-19, who were pregnant or post-partum. Results: The proportion of total births to teenage mothers fell from 14% in 2011 to 7% in 2016 (Kitovu), but it remains higher in rural locations (19%, Villa Maria). Beliefs about exacerbating factors included: poor access to contraception; misconceptions that contraception is damaging to women’s health; failing sex education in schools; and poor awareness of national campaigns to reduce teenage pregnancy. Staff felt that the best way to tackle teenage pregnancy was to improve sex education in schools and to sensitise families to these issues. Six of the eight teenagers wanted more frequent sex education and easier, cheap access to contraception. Only one teenager saw positive consequences stating that teenage pregnancy would ‘avoid operations later in life.’ Discussion: Teenage pregnancy is a recognised problem and strategies in the Masaka region should focus on improving sex education in schools and initiating an organisation that educates and supplies free contraception to teenagers.

Keywords: adolescents, attitudes, teenage pregnancy, Uganda

Procedia PDF Downloads 186
2591 Lean Implementation in a Nurse Practitioner Led Pediatric Primary Care Clinic: A Case Study

Authors: Lily Farris, Chantel E. Canessa, Rena Heathcote, Susan Shumay, Suzanna V. McRae, Alissa Collingridge, Minna K. Miller

Abstract:

Objective: To describe how the Lean approach can be applied to improve access, quality and safety of care in an ambulatory pediatric primary care setting. Background: Lean was originally developed by Toyota manufacturing in Japan, and subsequently adapted for use in the healthcare sector. Lean is a systematic approach, focused on identifying and reducing waste within organizational processes, improving patient-centered care and efficiency. Limited literature is available on the implementation of the Lean methodologies in a pediatric ambulatory care setting. Methods: A strategic continuous improvement event or Rapid Process Improvement Workshop (RPIW) was launched with the aim evaluating and structurally supporting clinic workflow, capacity building, sustainability, and ultimately improving access to care and enhancing the patient experience. The Lean process consists of five specific activities: Current state/process assessment (value stream map); development of a future state map (value stream map after waste reduction); identification, quantification and prioritization of the process improvement opportunities; implementation and evaluation of process changes; and audits to sustain the gains. Staff engagement is a critical component of the Lean process. Results: Through the implementation of the RPIW and shifting workload among the administrative team, four hours of wasted time moving between desks and doing work was eliminated from the Administrative Clerks role. To streamline clinic flow, the Nursing Assistants completed patient measurements and vitals for Nurse Practitioners, reducing patient wait times and adding value to the patients visit with the Nurse Practitioners. Additionally, through the Nurse Practitioners engagement in the Lean processes a need was recognized to articulate clinic vision, mission and the alignment of NP role and scope of practice with the agency and Ministry of Health strategic plan. Conclusions: Continuous improvement work in the Pediatric Primary Care NP Clinic has provided a unique opportunity to improve the quality of care delivered and has facilitated further alignment of the daily continuous improvement work with the strategic priorities of the Ministry of Health.

Keywords: ambulatory care, lean, pediatric primary care, system efficiency

Procedia PDF Downloads 300
2590 Exhaust Gas Cleaning Systems on Board Ships and Impact on Crews’ Health: A Feasibility Study Protocol

Authors: Despoina Andrioti Bygvraa, Ida-Maja Hassellöv, George Charalambous

Abstract:

Exhaust gas cleaning systems, also known as scrubbers, are today widely used to allow for the use of High Sulphur Heavy Fuel Oil and still comply with the regulations limiting sulphur content in marine fuels. There are extensive concerns about environmental consequences, especially in the Baltic Sea, from the wide-scale use of scrubbers, as the wash water is acidic (ca pH 3) and contains high concentrations of toxic, carcinogenic, and mutagenic substances. The aim of this feasibility study is to investigate the potential adverse effects on seafarers’ health with the ultimate goal of raising awareness of chemical-related health and safety issues in the shipping environment. The project got funding from the Swedish Foundation. The team will extend previously compiled data on scrubber wash water concentrations of hazardous substances and pH to include the use of strong base in closed-loop scrubbers, and scoping assessment on handling and disposing practices. Based on the findings (a), a systematic review of risk assessment will follow to show the risk of exposures, the establishment of the hazardous levels for human health as well as the respective prevention practices. In addition, the researchers will perform (b) a systematic review to identify facilitators and barriers of the crew on compliance with the safe handling of chemicals. The study will run for 12 months, delivering (a) a risk assessment inventory with risk exposures and (b) a course description of safe handling practices. This feasibility study could provide valuable knowledge on how pollutants found in scrubbers should be considered from a human health perspective to facilitate evidence-based informed decisions in future technology- and policy development to make shipping a safer, healthier, and more attractive workplace.

Keywords: health and safety, seafarers, scrubbers, chemicals, risk exposures

Procedia PDF Downloads 58
2589 Cross-Layer Design of Event-Triggered Adaptive OFDMA Resource Allocation Protocols with Application to Vehicle Clusters

Authors: Shaban Guma, Naim Bajcinca

Abstract:

We propose an event-triggered algorithm for the solution of a distributed optimization problem by means of the projected subgradient method. Thereby, we invoke an OFDMA resource allocation scheme by applying an event-triggered sensitivity analysis at the access point. The optimal resource assignment of the subcarriers to the involved wireless nodes is carried out by considering the sensitivity analysis of the overall objective function as defined by the control of vehicle clusters with respect to the information exchange between the nodes.

Keywords: consensus, cross-layer, distributed, event-triggered, multi-vehicle, protocol, resource, OFDMA, wireless

Procedia PDF Downloads 331
2588 Highly Accurate Tennis Ball Throwing Machine with Intelligent Control

Authors: Ferenc Kovács, Gábor Hosszú

Abstract:

The paper presents an advanced control system for tennis ball throwing machines to improve their accuracy according to the ball impact points. A further advantage of the system is the much easier calibration process involving the intelligent solution of the automatic adjustment of the stroking parameters according to the ball elasticity, the self-calibration, the use of the safety margin at very flat strokes and the possibility to placing the machine to any position of the half court. The system applies mathematical methods to determine the exact ball trajectories and special approximating processes to access all points on the aimed half court.

Keywords: control system, robot programming, robot control, sports equipment, throwing machine

Procedia PDF Downloads 397
2587 Secure Data Sharing of Electronic Health Records With Blockchain

Authors: Kenneth Harper

Abstract:

The secure sharing of Electronic Health Records (EHRs) is a critical challenge in modern healthcare, demanding solutions to enhance interoperability, privacy, and data integrity. Traditional standards like Health Information Exchange (HIE) and HL7 have made significant strides in facilitating data exchange between healthcare entities. However, these approaches rely on centralized architectures that are often vulnerable to data breaches, lack sufficient privacy measures, and have scalability issues. This paper proposes a framework for secure, decentralized sharing of EHRs using blockchain technology, cryptographic tokens, and Non-Fungible Tokens (NFTs). The blockchain's immutable ledger, decentralized control, and inherent security mechanisms are leveraged to improve transparency, accountability, and auditability in healthcare data exchanges. Furthermore, we introduce the concept of tokenizing patient data through NFTs, creating unique digital identifiers for each record, which allows for granular data access controls and proof of data ownership. These NFTs can also be employed to grant access to authorized parties, establishing a secure and transparent data sharing model that empowers both healthcare providers and patients. The proposed approach addresses common privacy concerns by employing privacy-preserving techniques such as zero-knowledge proofs (ZKPs) and homomorphic encryption to ensure that sensitive patient information can be shared without exposing the actual content of the data. This ensures compliance with regulations like HIPAA and GDPR. Additionally, the integration of Fast Healthcare Interoperability Resources (FHIR) with blockchain technology allows for enhanced interoperability, enabling healthcare organizations to exchange data seamlessly and securely across various systems while maintaining data governance and regulatory compliance. Through real-world case studies and simulations, this paper demonstrates how blockchain-based EHR sharing can reduce operational costs, improve patient outcomes, and enhance the security and privacy of healthcare data. This decentralized framework holds great potential for revolutionizing healthcare information exchange, providing a transparent, scalable, and secure method for managing patient data in a highly regulated environment.

Keywords: blockchain, electronic health records (ehrs), fast healthcare interoperability resources (fhir), health information exchange (hie), hl7, interoperability, non-fungible tokens (nfts), privacy-preserving techniques, tokens, secure data sharing,

Procedia PDF Downloads 21
2586 Enforceability of the Right to Education and Rights in Education for Refugees after the European Refugee Crisis

Authors: Kurt Willems

Abstract:

The right to education is a fundamental human right, which has been entrenched in many international and regional treaties and national constitutions. Nevertheless, practice shows that many obstacles impede easy access to quality education for refugees. Overall, the material effects of international human rights legislation on improving (irregular) migrants’ access to social rights in the European countries have remained limited due to the lack of guarantees on effective incorporation in the municipal legal order and due to the lack of effective enforcement mechanisms. After the recent refugee crisis in Europe, this issue has grown in importance. The presentation aims to give a brief overview of the most important issues impeding the effective enforceability of the right to education for refugees. I. Do refugees fall within the scope of application of the relevant human rights treaties and to which extent can they invoke human rights treaties in domestic courts to set aside domestic legislation? II. How is the justiciability of the right to education organized in those treaties? III. What is the legal answer to questions raised in practice when dealing with the influx of refugees in Europe: (i) can refugees be placed in separate schools or classes until they can follow the regular curriculum?; (ii) can higher school fees be asked from pupils without legal documents?; (iii) do refugees have a right to be taught in their own native language until they learn to speak the national language? To answer the above questions, the doctrinal and comparative legal method will be used. The normative framework, as interpreted within Europe, will be distilled from the recent and relevant international treaties and European law instruments (in particular the Convention on the Rights of the Child, the European Convention on human rights, the European Social Charter and the International Covenant on Economic, Social and Cultural Rights) and their underlying policy documents, the legal literature, the (limited) European jurisprudence, and the general comments to those treaties. The article is mainly descriptive in nature. Its aim is to serve as a summary of the legal provisions, case law and legal literature on the topic of the right to education for refugees. The research shows that the reasons for the delicate enforceability of the rights to and the rights in education are multifold. The research will categorize the different contributing factors under the following headings: (i) problems related to the justiciability of international law as such; (ii) problems specifically related to the educational field; (iii) problems related to policy issues in the refugee debate. By categorizing the reasons contributing to the difficult enforceability of the right to education and the rights in education for refugees, this research hopes to facilitate the search for solutions to this delicate problem.

Keywords: right to education, refugees, discrimination, enforceability of human rights

Procedia PDF Downloads 240
2585 Approaching Sexual Violence Against People with Disabilities in Colombia from a Qualitative Perspective

Authors: Mariana Calderón, Rocío Murad, Natalia Acevedo, Laura León, Juliana Fonseca, Maria de los Angeles Balaguera Villa

Abstract:

Recently, different countries and international organizations have put on their agenda the elimination of violence against people with disabilities. This research aims to evaluate the social dimensions of sexual violence against people with disabilities, particularly those with psychosocial and cognitive, in Colombia. Results reveal that 55% of people with disabilities that are survivors of sexual violence are younger than 29 years and 20,4 are people with cognitive and psychosocial disabilities. Colombian regions with better social positions presented more cases of sexual violence against people with disabilities. There were found access barriers for health, education and employment among this population, and there was also found poor data quality. Despite Colombia having an important normative framework aimed at preventing and attending to gender-based violence, it does not take into account people with disabilities specific needs. Additionally, it was found an insufficient implementation and appropriation of these norms, negative attitudes, and in general, a lack of service adaptation according to the needs, identities and circumstances of people with disabilities. Furthermore, among the factors that are exposing people with disabilities to sexual violence, it was found that family members tend to be the main aggressors, there are deep gaps in the sex education received by people with disabilities, imaginaries and perceptions about their sexuality are both hypersexualizing and presenting them as asexual. On the other hand, among protective factors, there were found body self-knowledge and conscience, acknowledgment of their sexuality and their sexual and reproductive rights and access to sex ed. Although during the last few years, there has occurred a positive change toward social inclusion of people with disabilities, specifically through their role in the political agenda and the recognition of their rights. More work is needed in order to guarantee their sexual and reproductive rights, particularly for persons with psychosocial and cognitive disabilities. This research results showed the importance of transforming persisting negative imaginaries about their sexuality and also enforcing and promoting their autonomy. In this sense, it is important to acknowledge gaps and barriers faced by them and create strategies to encourage their social inclusion through education, employment, and skill development. Nevertheless, it is necessary to keep contributing new evidence of the social determinants of health that are influencing the occurrence of sexual violence. This research understands sexual violence against people with disabilities in a multidimensional manner and offers the following recommendations: 1- To foment public sensitization and understanding of disabilities. 2- To increase parents, caregivers and officers’ commitment to the prevention and reduction of sexual violence. 3- To focus on the needs, identities and circumstances of people with disabilities.

Keywords: disabilities, sexual and reproductive rights, sexual violence, prevention

Procedia PDF Downloads 77
2584 Estimating the Impact of Appliance Energy Efficiency Improvement on Residential Energy Demand in Tema City, Ghana

Authors: Marriette Sakah, Samuel Gyamfi, Morkporkpor Delight Sedzro, Christoph Kuhn

Abstract:

Ghana is experiencing rapid economic development and its cities command an increasingly dominant role as centers of both production and consumption. Cities run on energy and are extremely vulnerable to energy scarcity, energy price escalations and health impacts of very poor air quality. The overriding concern in Ghana and other West African states is bridging the gap between energy demand and supply. Energy efficiency presents a cost-effective solution for supply challenges by enabling more coverage with current power supply levels and reducing the need for investment in additional generation capacity and grid infrastructure. In Ghana, major issues for energy policy formulation in residential applications include lack of disaggregated electrical energy consumption data and lack of thorough understanding with regards to socio-economic influences on energy efficiency investment. This study uses a bottom up approach to estimate baseline electricity end-use as well as the energy consumption of best available technologies to enable estimation of energy-efficiency resource in terms of relative reduction in total energy use for Tema city, Ghana. A ground survey was conducted to assess the probable consumer behavior in response to energy efficiency initiatives to enable estimation of the amount of savings that would occur in response to specific policy interventions with regards to funding and incentives provision targeted at households. Results show that 16% - 54% reduction in annual electricity consumption is reasonably achievable depending on the level of incentives provision. The saved energy could supply 10000 - 34000 additional households if the added households use only best available technology. Political support and consumer awareness are necessary to translate energy efficiency resources into real energy savings.

Keywords: achievable energy savings, energy efficiency, Ghana, household appliances

Procedia PDF Downloads 214
2583 Curricular Reforms for Inclusive Education: Equalization of Opportunities for the Physically Challenged Persons

Authors: Ede Jairus Adagba

Abstract:

The National Policy on Education has made elaborate and fascinating provisions for the education of the people with Special Needs. This category of people includes the physically challenged, the disadvantaged, the gifted and talented. However, the focus of this paper is people that are physically challenged. The paper reasons that in spite of the commendable provisions, the present curricular and learning conditions are not conducive enough to cater for the interest of the physically challenged persons. As a panacea, some curricular and physical condition reforms are proposed. These are hoped to facilitate access to inclusive education and equalization for opportunities of the physically challenged.

Keywords: curricular reforms, equalization, inclusive education, physically challenged persons

Procedia PDF Downloads 304
2582 New Result for Optical OFDM in Code Division Multiple Access Systems Using Direct Detection

Authors: Cherifi Abdelhamid

Abstract:

In optical communication systems, OFDM has received increased attention as a means to overcome various limitations of optical transmission systems such as modal dispersion, relative intensity noise, chromatic dispersion, polarization mode dispersion and self-phase modulation. The multipath dispersion limits the maximum transmission data rates. In this paper we investigate OFDM system where multipath induced intersymbol interference (ISI) is reduced and we increase the number of users by combining OFDM system with OCDMA system using direct detection Incorporate OOC (orthogonal optical code) for minimize a bit error rate.

Keywords: OFDM, OCDMA, OOC (orthogonal optical code), (ISI), prim codes (Pc)

Procedia PDF Downloads 652
2581 A Holistic Approach to Institutional Cyber Security

Authors: Mehmet Kargaci

Abstract:

It is more important to access information than to get the correct information and to transform it to the knowledge in a proper way. Every person, organizations or governments who have the knowledge now become the target. Cyber security involves the range of measures to be taken from individual to the national level. The National institutions refer to academic, military and major public and private institutions, which are very important for the national security. Thus they need further cyber security measures. It appears that the traditional cyber security measures in the national level are alone not sufficient, while the individual measures remain in a restricted level. It is evaluated that the most appropriate method for preventing the cyber vulnerabilities rather than existing measures are to develop institutional measures. This study examines the cyber security measures to be taken, especially in the national institutions.

Keywords: cyber defence, information, critical infrastructure, security

Procedia PDF Downloads 537
2580 Cryptosystems in Asymmetric Cryptography for Securing Data on Cloud at Various Critical Levels

Authors: Sartaj Singh, Amar Singh, Ashok Sharma, Sandeep Kaur

Abstract:

With upcoming threats in a digital world, we need to work continuously in the area of security in all aspects, from hardware to software as well as data modelling. The rise in social media activities and hunger for data by various entities leads to cybercrime and more attack on the privacy and security of persons. Cryptography has always been employed to avoid access to important data by using many processes. Symmetric key and asymmetric key cryptography have been used for keeping data secrets at rest as well in transmission mode. Various cryptosystems have evolved from time to time to make the data more secure. In this research article, we are studying various cryptosystems in asymmetric cryptography and their application with usefulness, and much emphasis is given to Elliptic curve cryptography involving algebraic mathematics.

Keywords: cryptography, symmetric key cryptography, asymmetric key cryptography

Procedia PDF Downloads 124
2579 An Assessment of Government Entrepreneurship Programs for Women in Sabah Malaysia

Authors: Imelda Albert Gisip, Tarsiah T. Z. Taman

Abstract:

In Asia, particularly in Malaysia women entrepreneurs contribute substantially to economic growth. This paper presents a review of women entrepreneurs’ program, focusing on Creating Millionaires among Young Women Entrepreneurs (CREAM@YWE) program in Sabah Malaysia which aims to accelerate the entrepreneurship among young women in Sabah Malaysia. Entrepreneurs is seen as essential for growth, job creation and social progress and the virtues of small business for Sabah Maju Jaya (SMJ), the Sabah state government Sabah State development plan for the year 2021-2025. SMJ guides the direction of the government's policies and programs, further guiding the implementation in a planned and strategic manner, to achieve targets and goals that coincide with the development needs of the state. One of the government’s agenda is to put its efforts more strongly to ensure that women entrepreneurs are well supported and enhanced. Thus, The CreaM@YWE Program was developed in 2018 with the main objective is to produce competitive young women entrepreneurs in Sabah and achieve "millionaire" status. CreaM@YWE Program is an innovation process which specifically developed to accelerate entrepreneurship sector particularly for women entrepreneurs in Sabah by incorporating strategic partnerships and collaborations with government agencies and industry players. Being the first of its kind in Sabah, the novelty of this project is providing a supportive ecosystem including six months intensive courses, guided through "hands-holding”, collaborations with strategic partners and easy access to government's assistance. Since its inception, the program has significantly impact society’s wellbeing particularly in empowering young women entrepreneurs in Sabah for the past six years and has produced many successful women entrepreneurs with “millionaire” status. Generally, improving women’s enterprise sector in Malaysia needs an overall enabling environment that allows development opportunities for women entrepreneurs including access to resources and support services. Since achieving the goal of women entrepreneurship policy requires effective partnerships and inclusiveness, Cream @YWE Program has managed to practice these in assisting small entrepreneurs among young women in Sabah in accessing public goods and business opportunities. This proves that achieving women’s economic empowerment requires sound policies, a holistic approach and long-term commitment. Thus, this paper presents how Cream@YWE Program has been supporting Sabah young women entrepreneurs by reforming the business environment to help create opportunities for women, while addressing the few existing gender-specific hurdles.

Keywords: entrepreneurship programs, women, Sabah, Malaysia

Procedia PDF Downloads 23
2578 Parental Education on Early Childhood Development Using Mobile App and Website in China

Authors: Margo O'Sullivan, Xuefeng Chen, Qi Zhao, J. Jiang, Ning Fu

Abstract:

Early childhood development, or ECD, is about the 'whole child' – the physical, social and emotional, cognitive thinking and language progression of each young individual. Overwhelming evidence is now available to support investment in Early Childhood Development internationally, attendance at ECD leads to: improved learning outcomes; improved completion and reduced less dropout rates; and most notably, Professor Heckman, Nobel Laureate’s, findings that for every dollar invested, there is an economic return of up to 17%. Notably, ECD has been included in the 2015-2030 Sustainable Development Goals. The Government of China (GOC) has embraced this research and in 2010, State Council, announced focus on ECD setting a target to provide access to ECD for 85% of 3-6 year olds by 2020; to date, the target has surpassed expectations and reached 70.4%. GoC is also increasingly focusing on the even more critical 0-3 age group, when the plasticity of the brain is at its peak and neurons form connections as fast as 1,000 per second. Key to ECD are parents and caregivers of young children, with parental education critical to fully exploiting the significant potential of the early years of children. In China, with such vast numbers, one in seven pre-school age children in the world live in China, the Ministry of Education (MoE) and the National Centre for Education Technology, explored how to best provide parental education and provide key child developmental related knowledge to parents and caregivers. In response, MoE and UNICEF created a resource for parenting information that began with a computer website in 2012, followed by piloting a kiosk service in 2013 for parents in remote areas without access to the internet, and then a mobile phone application in 2014. The resource includes 269 ECD messages and 200 micro-videos covering critical issues of early childhood development from birth to age 6 years: daily care, nutrition and feeding, disease prevention, immunization, development and education, and safety and protection. To date, there have been 397,599 unique views on the website, and data for the mobile app currently being analysed (Links: http://yuer.cbern.gov.cn/; App: https://appsto.re/cn/OiKPZ.i). This paper will explore the development of this resource, its use by parents and the public, efforts to assess the effectiveness in improving parenting and child development, and future plans to roll an updated version in 2016 to all parents.

Keywords: early childhood development, mobile apps for education, parental education, China

Procedia PDF Downloads 226
2577 Electronic Resources and Information Literacy in Higher Education Library

Authors: Nirmal Singh, Rajesh Kumar

Abstract:

Abstract- Information literacy aims to develop both critical understanding and active participation in scholars. It enables scholars to interpret and make informed judgments as users of information sources, and it also enables them to become producers of information in their own right, and thereby to become more powerful participants in society. Information literacy is about developing people‘s critical and creative abilities. Digital media – and particularly the Internet – significantly increase the potential for such active participation of the individual, provided scholars have the means and training to effectively access and use them. This paper provides definition, standards and importance of information literacy (IL). Keywords: Information literacy, Digital Media, Training, Communications Technologies.

Keywords: Information literacy, Digital Media, Training, , Communications Technologies

Procedia PDF Downloads 158
2576 The Impact of E-Commerce in Changing Shopping Lifestyle of Urban Communities in Jakarta

Authors: Juliana Kurniawati, Helen Diana Vida

Abstract:

Visiting mall is one of the Indonesian communities’ lifestyle who live in urban areas. Indonesian people, especially who live in Jakarta, use a shopping mall as one of the favourite places to get pleasure. This mall visitors come from various social classes. They use the shopping mall as a place to identify themselves as urban people. Jakarta has a number of great shopping malls such as Plaza Indonesia, Plaza Senayan, Pondok Indah Mall, etc. The shopping malls become one of the popular places since Jakarta's public sphere such as parks and playgrounds are very limited in number compared to that of shopping malls. In Jakarta, people do not come to a shopping mall only for shopping. Sometimes they go there to look around, meet up with some friends, or watch a movie. We can find everything in the shopping malls. The principle of one-stop shopping becomes an attractive offer for urban people. The items for selling are various, from the cheap goods to the expensive ones. A new era in consumer culture began with the advent of shopping was localized in France in the 19th century. Since the development of the online store and the easier way to access the internet, everyone can shop 24 hours anywhere they want. The emergence of online store indirectly has an impact on the viability of conventional stores. In October 2017, in Indonesia, two outlets branded goods namely Lotus and Debenhams were closed. This may a result of increasingly rampant online stores and shopping style urban society shift. The rising of technology gives some influence on the development of e-commerce in Indonesia. Everyone can access e-commerce. However, those who can do it are the middle up class to high class people. The development of e-commerce in Indonesia is quite fast, we can observe the emergence of various online shopping sites on various social media platforms such as Zalora, Berrybenka, Bukalapak, Lazada, and Tokopedia. E-commerce is increasingly affecting people's lives in line with the development of lifestyle and increasing revenue. This research aims to know the reasons of urban society choosing e-commerce as a medium for grocery shopping, how e-commerce is affecting their shopping styles, as well as why society provides confidence in the online store for shopping. This research uses theories of lifestyle by David Chaney. The subject of this research is urban society who actively shop online on Zalora, the communities based in Jakarta. Zalora site was chosen because the site is selling branded goods. This research is expected to explain in detail about the changing style of the urban community from the shopping mall to digital media by emphasizing the aspect of public confidence towards the online store.

Keywords: e-commerce, shopping, lifestyle, changing

Procedia PDF Downloads 298
2575 Literature Analysis of Nutrition in South Africa and How SA Harvest Aims to Improve Nutrition

Authors: Ali Conn, Kimberly Allen

Abstract:

Food and nutrition play a significant role in humans. It helps them function, grow, and develop into better individuals. However, as essential as food may seem to most people, it is not the case for everyone. South Africans, for example, have been suffering from hunger and poverty for the longest time now. With the spread of the COVID-19 virus, their situations have become worse. Millions of children and their families do not have access to food, hence no proper nutrition. They could barely make ends meet, so they make sure to make the most of what little they have for their household. Fortunately, organizations like SA Harvest aim to end hunger in South Africa. However, they still need to know more about how they can help South Africans with their current diet. Currently, most of the diets are composed of maize and rice. They do not have much to spend on fruits, so these commodities are seen as a luxury. With the help of organizations like SA Harvest, South Africans will be educated and more aware of what they need to eat.

Keywords: nutrition, public health, SA Harvest, food

Procedia PDF Downloads 128
2574 Adaptive Auth - Adaptive Authentication Based on User Attributes for Web Application

Authors: Senthuran Manoharan, Rathesan Sivagananalingam

Abstract:

One of the main issues in system security is Authentication. Authentication can be defined as the process of recognizing the user's identity and it is the most important step in the access control process to safeguard data/resources from being accessed by unauthorized users. The static method of authentication cannot ensure the genuineness of the user. Due to this reason, more innovative authentication mechanisms came into play. At first two factor authentication was introduced and later, multi-factor authentication was introduced to enhance the security of the system. It also had some issues and later, adaptive authentication was introduced. In this research paper, the design of an adaptive authentication engine was put forward. The user risk profile was calculated based on the user parameters and then the user was challenged with a suitable authentication method.

Keywords: authentication, adaptive authentication, machine learning, security

Procedia PDF Downloads 248
2573 Effect of Serine/Threonine Kinases on Autophagy Mechanism

Authors: Ozlem Oral, Seval Kilic, Ozlem Yedier, Serap Dokmeci, Devrim Gozuacik

Abstract:

Autophagy is a degradation pathway, activating under stress conditions. It digests macromolecules, such as abnormal proteins and long-lived organelles by engulfing them and by subsequent delivery of the cargo to lysosomes. The members of the phospholipid-dependent serine/threonine kinases, involved in many signaling pathways, which are necessary for the regulation of cellular metabolic activation. Previous studies implicate that, serine/threonine kinases have crucial roles in the mechanism of many diseases depend on the activated and/or inactivated signaling pathway. Data indicates, the signaling pathways activated by serine/threonine kinases are also involved in activation of autophagy mechanism. However, the information about the effect of serine/threonine kinases on autophagy mechanism and the roles of these effects in disease formation is limited. In this study, we investigated the effect of activated serine/threonine kinases on autophagic pathway. We performed a commonly used autophagy technique, GFP-LC3 dot formation and by using microscopy analyses, we evaluated promotion and/or inhibition of autophagy in serine/threonine kinase-overexpressed fibroblasts as well as cancer cells. In addition, we carried out confocal microscopy analyses and examined autophagic flux by utilizing the differential pH sensitivities of RFP and GFP in mRFP-GFP-LC3 probe. Based on the shRNA-library based screening, we identified autophagy-related proteins affected by serine/threonine kinases. We further studied the involvement of serine/threonine kinases on the molecular mechanism of newly identified autophagy proteins and found that, autophagic pathway is indirectly controlled by serine/threonine kinases via specific autophagic proteins. Our data indicate the molecular connection between two critical cellular mechanisms, which have important roles in the formation of many disease pathologies, particularly cancer. This project is supported by TUBITAK-1001-Scientific and Technological Research Projects Funding Program, Project No: 114Z836.

Keywords: autophagy, GFP-LC3 dot formation assay, serine/threonine kinases, shRNA-library screening

Procedia PDF Downloads 292
2572 Incidence of Vulval, Vaginal and Cervical Disease in Rapid Access Clinic in a London Tertiary Hospital Setting

Authors: Kieren Wilson, Gulnaz Majeed

Abstract:

NHS constitution gives rights to the patient with suspected cancer to be seen by a cancer specialist within 2 weeks of referral. Guys and St Thomas Hospital (GSTT) is one of the largest cancer centres in London. NICE guidelines have provided guidance for health professionals to refer patients appropriately to RAC. In GSTT suspected gynae cancer referrals are mostly by NHS e-Referral Service with some fax, emails as well as paper referrals. The objective of this study was to evaluate compliance with 2-week referral pathway with emphasis on one stop diagnostic service with supporting efficient pathways. A prospective evaluation over 3 months (1 Jan 2017 to 31 Mar 2017) was undertaken. There were 26 clinics, 761 patients were booked in the clinics with a DNA rate of 13% (n=101) hence 606 patients were seen. Majority of referrals were for post menopausal bleeding (PMB) 25% (n=194) followed by cervical, vaginal, vulval reasons 23% (n=179) (abnormal cytology excluded as patients directly referred to colposcopy unit in GSTT), ovarian 7% (n=54) and endometrial 5% (n=41). Women with new or previous established diagnosis of cancer were 24, cervical (n=17), vulva (n=6) and vagina (n=1). Multifocal preinvasive disease vulva (VIN), vagina (VAIN) and cervix (CIN) was confirmed in twenty-six patients 4% (high prevalence in HIV patients). Majority of cervical referrals: PCB (n=14), cervical erosion (n=7), polyps (n=9) and cervical cyst were benign. However, two women with PMB had cervical cancer. Only 2 out of 13 referrals with vaginal concerns had VAIN. One case with non-cervical glandular cytology was confirmed to have endometrial cancer. One stop service based on the diagnostic support of ultrasound, colposcopy and hysteroscopy was achieved in 54% (n=359). Patients were discharged to GP, benign gynaecology, endometriosis, combined vulval/dermatology clinic or gynae oncology. 33% (n=202) required a second visit, 12% (n=70) third visit, 3% (n=19) fourth visit, 1% (n=4) fifth visit and 1% (n=6) sixth visit. Main reasons for follow ups were the unavailability of diagnostic slots, patient choice, need for interpreters, the discussion following gynae MDM review for triage to benign gynae, delay in availability of diagnostic results like histology/MRI/CT. Recommendations following this study are multi disciplinary review of pathways with the availability of additional diagnostic procedure slots to aim for one stop service. Furthermore, establishment of virtual and telephone consultations to reduce follow ups.

Keywords: multifocal disease, post menopausal bleeding, preinvasive disease, rapid access clinic

Procedia PDF Downloads 188
2571 Building User Behavioral Models by Processing Web Logs and Clustering Mechanisms

Authors: Madhuka G. P. D. Udantha, Gihan V. Dias, Surangika Ranathunga

Abstract:

Today Websites contain very interesting applications. But there are only few methodologies to analyze User navigations through the Websites and formulating if the Website is put to correct use. The web logs are only used if some major attack or malfunctioning occurs. Web Logs contain lot interesting dealings on users in the system. Analyzing web logs has become a challenge due to the huge log volume. Finding interesting patterns is not as easy as it is due to size, distribution and importance of minor details of each log. Web logs contain very important data of user and site which are not been put to good use. Retrieving interesting information from logs gives an idea of what the users need, group users according to their various needs and improve site to build an effective and efficient site. The model we built is able to detect attacks or malfunctioning of the system and anomaly detection. Logs will be more complex as volume of traffic and the size and complexity of web site grows. Unsupervised techniques are used in this solution which is fully automated. Expert knowledge is only used in validation. In our approach first clean and purify the logs to bring them to a common platform with a standard format and structure. After cleaning module web session builder is executed. It outputs two files, Web Sessions file and Indexed URLs file. The Indexed URLs file contains the list of URLs accessed and their indices. Web Sessions file lists down the indices of each web session. Then DBSCAN and EM Algorithms are used iteratively and recursively to get the best clustering results of the web sessions. Using homogeneity, completeness, V-measure, intra and inter cluster distance and silhouette coefficient as parameters these algorithms self-evaluate themselves to input better parametric values to run the algorithms. If a cluster is found to be too large then micro-clustering is used. Using Cluster Signature Module the clusters are annotated with a unique signature called finger-print. In this module each cluster is fed to Associative Rule Learning Module. If it outputs confidence and support as value 1 for an access sequence it would be a potential signature for the cluster. Then the access sequence occurrences are checked in other clusters. If it is found to be unique for the cluster considered then the cluster is annotated with the signature. These signatures are used in anomaly detection, prevent cyber attacks, real-time dashboards that visualize users, accessing web pages, predict actions of users and various other applications in Finance, University Websites, News and Media Websites etc.

Keywords: anomaly detection, clustering, pattern recognition, web sessions

Procedia PDF Downloads 288
2570 A Deep Dive into the Multi-Pronged Nature of Student Engagement

Authors: Rosaline Govender, Shubnam Rambharos

Abstract:

Universities are, to a certain extent, the source of under-preparedness ideologically, structurally, and pedagogically, particularly since organizational cultures often alienate students by failing to enable epistemological access. This is evident in the unsustainably low graduation rates that characterize South African higher education, which indicate that under 30% graduate in minimum time, under two-thirds graduate within 6 years, and one-third have not graduated after 10 years. Although the statistics for the Faculty of Accounting and Informatics at the Durban University of Technology (DUT) in South Africa have improved significantly from 2019 to 2021, the graduation (32%), throughput (50%), and dropout rates (16%) are still a matter for concern as the graduation rates, in particular, are quite similar to the national statistics. For our students to succeed, higher education should take a multi-pronged approach to ensure student success, and student engagement is one of the ways to support our students. Student engagement depends not only on students’ teaching and learning experiences but, more importantly, on their social and academic integration, their sense of belonging, and their emotional connections in the institution. Such experiences need to challenge students academically and engage their intellect, grow their communication skills, build self-discipline, and promote confidence. The aim of this mixed methods study is to explore the multi-pronged nature of student success within the Faculty of Accounting and Informatics at DUT and focuses on the enabling and constraining factors of student success. The sources of data were the Mid-year student experience survey (N=60), the Hambisa Student Survey (N=85), and semi structured focus group interviews with first, second, and third year students of the Faculty of Accounting and Informatics Hambisa program. The Hambisa (“Moving forward”) focus area is part of the Siyaphumelela 2.0 project at DUT and seeks to understand the multiple challenges that are impacting student success which create a large “middle” cohort of students that are stuck in transition within academic programs. Using the lens of the sociocultural influences on student engagement framework, we conducted a thematic analysis of the two surveys and focus group interviews. Preliminary findings indicate that living conditions, choice of program, access to resources, motivation, institutional support, infrastructure, and pedagogical practices impact student engagement and, thus, student success. It is envisaged that the findings from this project will assist the university in being better prepared to enable student success.

Keywords: social and academic integration, socio-cultural influences, student engagement, student success

Procedia PDF Downloads 73
2569 Performance Evaluation of DSR and OLSR Routing Protocols in MANET Using Varying Pause Time

Authors: Yassine Meraihi, Dalila Acheli, Rabah Meraihi

Abstract:

MANET for Mobile Ad hoc NETwork is a collection of wireless mobile nodes that communicates with each other without using any existing infrastructure, access point or centralized administration, due to the higher mobility and limited radio transmission range, routing is an important issue in ad hoc network, so in order to ensure reliable and efficient route between to communicating nodes quickly, an appropriate routing protocol is needed. In this paper, we present the performance analysis of two mobile ad hoc network routing protocols namely DSR and OLSR using NS2.34, the performance is determined on the basis of packet delivery ratio, throughput, average jitter and end to end delay with varying pause time.

Keywords: DSR, OLSR, quality of service, routing protocols, MANET

Procedia PDF Downloads 552
2568 Opportunities and Challenges in Midwifery Education: A Literature Review

Authors: Abeer M. Orabi

Abstract:

Midwives are being seen as a key factor in returning birth care to a normal physiologic process that is woman-centered. On the other hand, more needs to be done to increase access for every woman to professional midwifery care. Because of the nature of the midwifery specialty, the magnitude of the effect that can result from a lack of knowledge if midwives make a mistake in their care has the potential to affect a large number of the birthing population. So, the development, running, and management of midwifery educational programs should follow international standards and come after a thorough community needs assessment. At the same time, the number of accredited midwifery educational programs needs to be increased so that larger numbers of midwives will be educated and qualified, as well as access to skilled midwifery care will be increased. Indeed, the selection of promising midwives is important for the successful completion of an educational program, achievement of the program goals, and retention of graduates in the field. Further, the number of schooled midwives in midwifery education programs, their background, and their experience constitute some concerns in the higher education industry. Basically, preceptors and clinical sites are major contributors to the midwifery education process, as educational programs rely on them to provide clinical practice opportunities. In this regard, the selection of clinical training sites should be based on certain criteria to ensure their readiness for the intended training experiences. After that, communication, collaboration, and liaison between teaching faculty and field staff should be maintained. However, the shortage of clinical preceptors and the massive reduction in the number of practicing midwives, in addition to unmanageable workloads, act as significant barriers to midwifery education. Moreover, the medicalized approach inherent in the hospital setting makes it difficult to practice the midwifery model of care, such as watchful waiting, non-interference in normal processes, and judicious use of interventions. Furthermore, creating a motivating study environment is crucial for avoiding unnecessary withdrawal and retention in any educational program. It is well understood that research is an essential component of any profession for achieving its optimal goal and providing a foundation and evidence for its practices, and midwifery is no exception. Midwives have been playing an important role in generating their own research. However, the selection of novel, researchable, and sustainable topics considering community health needs is also a challenge. In conclusion, ongoing education and research are the lifeblood of the midwifery profession to offer a highly competent and qualified workforce. However, many challenges are being faced, and barriers are hindering their improvement.

Keywords: barriers, challenges, midwifery education, educational programs

Procedia PDF Downloads 115
2567 Comparison of Donor Motivations in National Collegiate Athletic Association Division I vs Division II

Authors: Soojin Kim, Yongjae Kim

Abstract:

Continuous economic downturn and ongoing budget cuts poses higher education with profound challenges which has a direct impact on the collegiate athletic programs. In response to the ever-changing landscape of the fiscal environment, universities seek to boost revenues, resorting to alternative sources of funding. In particular, athletic programs have become increasingly dependent on financial support from their alumni and boosters, which is how athletic departments attempt to offset budget shortfalls and make capital improvements. Although there currently exists three major divisions within National Collegiate Athletic Association (NCAA), the majority of the sport management studies on college sport tend to focus on Division I level. Particularly within the donor motivation literature, a plethora of donor motivation studies exist, but mainly on NCAA Division I athletic programs. Since each athletic department functions differently in a number of different dimensions, while institutional difference can also have a huge impact on athletic donor motivations, the current study attempts to fill this gap that exists in the literature. As such, the purpose of this study was to (I) reexamine the factor structure of the Athletic Donor motivation scale; and (II) identify the prominent athletic donor motives in a NCAA Division II athletic program. For the purpose of this study, a total of 232 actual donors were used for analysis. A confirmatory factor analysis (CFA) was employed to test construct validity, and the reliability of the scale was assessed using Composite Reliability. To identify the prominent motivational factors, the means and standard deviations were examined. Results of this study indicated that Vicarious Achievement, Philanthropy, and Commitment are the three primary motivational factors, while Tangible Benefits, was consistently found as an important motive in prior studies was found low. Such findings highlight the key difference and suggest different salient motivations exist that are specific to the context.

Keywords: college athletics, donor, motivation, NCAA

Procedia PDF Downloads 147
2566 Model of Application of Blockchain Technology in Public Finances

Authors: M. Vlahovic

Abstract:

This paper presents a model of public finances, which combines three concepts: participatory budgeting, crowdfunding and blockchain technology. Participatory budgeting is defined as a process in which community members decide how to spend a part of community’s budget. Crowdfunding is a practice of funding a project by collecting small monetary contributions from a large number of people via an Internet platform. Blockchain technology is a distributed ledger that enables efficient and reliable transactions that are secure and transparent. In this hypothetical model, the government or authorities on local/regional level would set up a platform where they would propose public projects to citizens. Citizens would browse through projects and support or vote for those which they consider justified and necessary. In return, they would be entitled to a tax relief in the amount of their monetary contribution. Since the blockchain technology enables tracking of transactions, it can be used to mitigate corruption, money laundering and lack of transparency in public finances. Models of its application have already been created for e-voting, health records or land registries. By presenting a model of application of blockchain technology in public finances, this paper takes into consideration the potential of blockchain technology to disrupt governments and make processes more democratic, secure, transparent and efficient. The framework for this paper consists of multiple streams of research, including key concepts of direct democracy, public finance (especially the voluntary theory of public finance), information and communication technology, especially blockchain technology and crowdfunding. The framework defines rules of the game, basic conditions for the implementation of the model, benefits, potential problems and development perspectives. As an oversimplified map of a new form of public finances, the proposed model identifies primary factors, that influence the possibility of implementation of the model, and that could be tracked, measured and controlled in case of experimentation with the model.

Keywords: blockchain technology, distributed ledger, participatory budgeting, crowdfunding, direct democracy, internet platform, e-government, public finance

Procedia PDF Downloads 149
2565 Molecular Dynamics Simulation on Nanoelectromechanical Graphene Nanoflake Shuttle Device

Authors: Eunae Lee, Oh-Kuen Kwon, Ki-Sub Kim, Jeong Won Kang

Abstract:

We investigated the dynamic properties of graphene-nanoribbon (GNR) memory encapsulating graphene-nanoflake (GNF) shuttle in the potential to be applicable as a non-volatile random access memory via molecular dynamics simulations. This work explicitly demonstrates that the GNR encapsulating the GNF shuttle can be applied to nonvolatile memory. The potential well was originated by the increase of the attractive vdW energy between the GNRs when the GNF approached the edges of the GNRs. So the bistable positions were located near the edges of the GNRs. Such a nanoelectromechanical non-volatile memory based on graphene is also applicable to the development of switches, sensors, and quantum computing.

Keywords: graphene nanoribbon, graphene nanoflake, shuttle memory, molecular dynamics

Procedia PDF Downloads 461