Search results for: piped-water access
3222 A Secure System for Handling Information from Heterogeous Sources
Authors: Shoohira Aftab, Hammad Afzal
Abstract:
Information integration is a well known procedure to provide consolidated view on sets of heterogeneous information sources. It not only provides better statistical analysis of information but also facilitates users to query without any knowledge on the underlying heterogeneous information sources The problem of providing a consolidated view of information can be handled using Semantic data (information stored in such a way that is understandable by machines and integrate-able without manual human intervention). However, integrating information using semantic web technology without any access management enforced, will results in increase of privacy and confidentiality concerns. In this research we have designed and developed a framework that would allow information from heterogeneous formats to be consolidated, thus resolving the issue of interoperability. We have also devised an access control system for defining explicit privacy constraints. We designed and applied our framework on both semantic and non-semantic data from heterogeneous resources. Our approach is validated using scenario based testing.Keywords: information integration, semantic data, interoperability, security, access control system
Procedia PDF Downloads 3563221 Levels of Digital Health Literacy in Culturally and Linguistically Diverse Females in Regional Australia and its Association with Demographics
Authors: Usma Iftikhar, Khorshed Alam
Abstract:
Background: Digital health platforms and digital health interventions are gaining increasing importance with the shift to online health-seeking behaviour, especially post-Covid. Subsequently, the importance of digital health literacy is increasingly being recognized. With the surge in culturally and linguistically diverse populations in First World countries, especially females, the predictors of digital health access in this population remain elusive. Keeping in view the inadequate digital infrastructure in rural and remote Australia, with lack of specialist services, the determinants of digital access gain even more importance. Objectives: The objective of this research are to measure the digital health literacy levels in this population, including the predictors of digital health literacy like sociodemographics and the correlation between the predictors and digital health literacy levels. Methods: A population-based quantitative survey was carried out in Regional Queensland from Jan 2022- Dec 2023 on culturally and linguistically diverse adult females. Sociodemographics like age, literacy levels, socioeconomic status, access to digital devices were recorded after informed consent. Digital health literacy levels were measured by specially designed questionnaires. The relationship between sociodemographics and digital health literacy levels was estimated by Pearson correlation. Results: Mean DHL was 2.66 + 0.35. There was a negative significant relationship (p<0.005) between demographics like age and access to a digital device with digital health literacy levels. Also observed was a positive significant relationship between literacy levels and proficiency in English. Conclusion: Age, literacy levels and English proficiency are some of the highest predictors of digital health access. This is important because remote areas rely on digital health access due to less developed health infrastructure, including specialist services. Guide for Policy makers to focus on the populations most in need.Keywords: digital health literacy, eHealth literacy, culturally and linguistically diverse, ethnic minorities, regional areas, rural and remote areas
Procedia PDF Downloads 693220 Using Mobile Phones for M-Learning in Higher Education: A Comparative Study
Authors: Islam Elsayed Hussein Ali, Stefan M. Wagner
Abstract:
Smartphone and tablet computers, as well as other ultra portable devices, have already gained enough critical mass to be considered mainstream devices, being present in the daily lives of millions of higher education students. Many universities throughout the world have already adopted or are planning to adopt mobile technologies in many of their courses as a better way to connect students with the subjects they are studying. These new mobile platforms allow students to access content anywhere/anytime to immerse himself/herself into that content (alone or interacting with teachers or colleagues via web communication forms) and to interact with that content in ways that were not previously possible. This paper plans to provide a thorough overview of the possibilities and consequences of m-learning in higher education environments as a gateway to ubiquitous learning – perhaps the ultimate form of learner engagement, since it allows the student to learn, access and interact with important content in any way or at any time or place he might want so the objective of the study is to examine how the usage of mobile phones for m-learning differs between heavy and light mobile phone users at TU Braunschweig. Heavy mobile phone users are hypothesized to have access to/subscribe to one type of mobile content than light mobile phone users, to have less frequent access to, subscribe to or purchase mobile content within the last year than light mobile phone users, and to pay less money for mobile learning, its content and mobile games than light mobile phone users.Keywords: mobile learning, technologies, applications, higher education
Procedia PDF Downloads 4153219 Effect of CSL Tube Type on the Drilled Shaft Axial Load Carrying Capacity
Authors: Ali Motevalli, Shahin Nayyeri Amiri
Abstract:
Cross-Hole Sonic Logging (CSL) is a common type of Non-Destructive Testing (NDT) method, which is currently used to check the integrity of placed drilled shafts. CSL evaluates the integrity of the concrete inside the cage and between the access tubes based on propagation of ultrasonic waves between two or more access tubes. A number of access tubes are installed inside the reinforcing cage prior to concrete placement as guides for sensors. The access tubes can be PVC or steel galvanized based on ASTM6760. The type of the CSL tubes can affect the axial strength of the drilled shaft. The objective of this study is to compare the amount of axial load capacity of drilled shafts due to using a different type of CSL tubes inside the caging. To achieve this, three (3) large-scale drilled shaft samples were built and tested using a hydraulic actuator at the Florida International University’s (FIU) Titan America Structures and Construction Testing (TASCT) laboratory. During the static load test, load-displacement curves were recorded by the data acquisition system (MegaDAC). Three drilled shaft samples were built to evaluate the effect of the type of the CSL tube on the axial load capacity in drilled shaft foundations.Keywords: drilled shaft foundations, axial load capacity, cage, PVC, galvanized tube, CSL tube
Procedia PDF Downloads 4023218 Impact of Capture Effect on Receiver Initiated Collision Detection with Sequential Resolution in WLAN
Authors: Sethu Lekshmi, Shahanas, Prettha P.
Abstract:
All existing protocols in wireless networks are mainly based on Carrier Sense Multiple Access with Collision avoidance. By applying collision detection in wireless networks, the time spent on collision can be reduced and thus improves system throughput. However in a real WLAN scenario due to the use of nonlinear modulation techniques only receiver can decided whether a packet loss take place, even there are multiple transmissions. In this proposed method, the receiver or Access Point detects the collision when multiple data packets are transmitted from different wireless stations. Whenever the receiver detects a collision, it transmits a jamming signal to all the transmitting stations so that they can immediately stop their on-going transmissions. We also provide preferential access to all collided packet to reduce unfairness and to increase system throughput by reducing contention. However, this preferential access will not block the channel for the long time. Here, an in-band transmission is considered in which both the data frames and control frames are transmitted in the same channel. We also provide a simple mathematical model for the proposed protocol and give the simulation result of WLAN scenario under various capture thresholds.Keywords: 802.11, WLAN, capture effect, collision detection, collision resolution, receiver initiated
Procedia PDF Downloads 3593217 Parental Investment in Education: A Pathway for the Children's Access to Quality Education
Authors: Tukur Husaini Nahuche
Abstract:
The parent resources play a vital role in the life of the offspring. It help give children basic necessities of life like food, clothing, and housing. In a like manner financial assets allow parents to move into neighborhood with more affluent school systems, to pay school bills, purchase expensive technologies like personal computer, save money for tutoring books, magazines, journals, Newspapers etc. Making of proper provision in the home environment conducive for learning after school hours and creation of other outdoor activities for them are what necessitate in enhancing and accelerating children’s learning opportunities. Indeed, this paper intends to discuss parental investment in education, parent income resources, parental education, occupation, and income as relatively influencing children’s access to quality education. With the hope that families would provide equal opportunities for children irrespective of their sex, intelligence, subject choice,etc.Keywords: parental investment, children's access, quality education
Procedia PDF Downloads 5513216 A Collection of Voices on Higher Educational Access, Quality and Equity in Africa: A Systematic Review
Authors: Araba A. Z. Osei-Tutu, Ebenezer Odame, Joseph Bawa, Samuel Amponsah
Abstract:
Education is recognized as a fundamental human right and a catalyst for development. Despite progress in the provision of higher education on the African continent, there persist challenges with the tripartite areas of access, equity and quality. Therefore, this systematic review aimed at providing a comprehensive overview of conversations and voices of scholars on these three concepts in HE in Africa. The systematic review employed a thematic analysis approach, synthesizing findings from 38 selected sources. After a critical analysis of the sources included in the systematic review, deficits in access, quality, and equity were outlined, focusing on infrastructure, regional disparities, and privatization challenges. The review also revealed the weak enforcement of quality assurance measures. Strategies for improvement, proffered by the study, include expanding public sector HE, deregulating the educational sector, promoting open and distance learning, implementing preferential admission policies, and enhancing financial aid. This research contributes valuable insights for policymakers, educators, and stakeholders, fostering a collaborative approach to address challenges and promote holistic development in African higher education.Keywords: access, equity, quality, higher education, Africa, systematic review, strategies
Procedia PDF Downloads 703215 Access to Financial Services to Rural Poor in Nepal: Challenges and Way Forward
Authors: Krishna Prasad Sharma
Abstract:
Nepal’s financial sector has become deeper and wider, and the number and types of financial intermediaries have grown rapidly over the past two decades. However, access to financial services remains limited for many people in many parts of rural Nepal. While financial institutions have been expanding rapidly in an urban area in recent years, the access to the rural poor is excessively inadequate due to financial illiteracy and limited numbers of financial institutions that confined only to the district headquarters. Based on the focus group discussion, semi-structured interview of key people and literature review, this paper aims to examine the supply of and demand for financial services in Nepal and the constraints to increasing access to them, and offers way forward for making the financial sector work for all of Nepal’s people, especially the rural poor. While Nepal’s government has tried to increase access to formal financial services for small businesses and low-income households through directed lending programs for small businesses and low-income households, created specialized wholesale and retail institutions, and lowered market entry requirements, formal financial services are declining, and financial intermediation is stagnating. Supply and demand indicators show that, despite government efforts, formal financial institutions do not serve the needs of most of the Nepalese population. While access to and use of formal financial services are limited, in general, the problem is acute for small businesses and low-income households. Indeed, both access and use are closely correlated with business loan size and household income. This study concludes that banks and microfinance institutions with the use of mobile phones can connect hundreds of millions of unbanked and low-income people, especially rural poor to financial services at low costs. While there are many challenges ahead in expanding the service to rural areas, the mobile financial services will be beneficial that makes payments faster and cheaper, more convenient and accessible to a greater number of senders and recipients in rural areas. In rural areas, clients will benefit from money transfer and other mobile and online services.Keywords: financial inclusion, financial enabling environment, microfinance, branchless banking, rural poor
Procedia PDF Downloads 2903214 Access and Utilization of Family Planning Services among Women in a Rural Community of Enugu state Nigeria, using a Descriptive Cross-sectional Design
Authors: Chidiebere Joy Nwankwo, Benjamin S. C. Uzochukwu, Florence T. Sibeudu
Abstract:
Background: Family planning is one of the most cost-effective ways to prevent maternal, infant, and child mortality. It can decrease maternal mortality by reducing the number of unintended pregnancies, the number of abortions, and the proportion of births at high risk. It has been seen to improve the health and economic well-being of families and communities and ensures women’s planned childbearing in order to achieve education and career goals which could raise family income thereby reducing poverty. The choice and use of a particular family planning method and their sources vary globally. Rural Communities often face significant challenges in accessing and utilizing family planning services. Aim: This study set out to assess Access and Utilization of Family Planning Services among Women of Reproductive Age in a Rural Community of Enugu state, Nigeria. Rural communities were chosen for this study because past demographic surveys have shown that women in urban areas are more likely to accept and practice family planning compared to those in rural areas. Method: A Descriptive Cross-sectional Research design was employed to achieve the aim and objectives of the study. Data collected from 177 consenting participants using interviewer-administered questionnaires was analysed using Descriptive statistics to summarize the Socio-demographic characteristics of the participants and Access and Utilization of Family Planning Services among the participants including Reasons for using different Family Planning Methods and Barriers encountered in Access and Utilization of these services. A Cross-tabulation between Socio-demographic Characteristics of respondents and the use of Family Planning services was carried out. Result: The findings of this study revealed that majority of the participants (72.9%) have not utilized any family planning service. Out of those (27.1%) that have used any family planning service, majority of them are still currently using a form of family planning service and have access to them in health facilities, patent medicine vendors and others based on multiple responses. Male condoms were the most utilized modern family planning service. Based on multiple responses, inaccessibility, personal beliefs and partner’s objection were the most identified barriers encountered in accessing family planning services. Conclusion: Access and uptake of family planning services in rural communities is lower than the national average. Increasing access to family planning is an urgent priority for rural areas Interventions that will scale up Access and Utilization of family planning services in rural communities should be intensified.Keywords: access, family planning, rural community, utilization
Procedia PDF Downloads 453213 Impact of Out-Of-Pocket Payments on Health Care Finance and Access to Health Care Services: The Case of Health Transformation Program in Turkey
Authors: Bengi Demirci
Abstract:
Out-of-pocket payments have become one of the common models adopted by health care reforms all over the world, and they have serious implications for not only the financial set-up of the health care systems in question but also for the people involved in terms of their access to the health care services provided. On the one hand, out-of-pocket payments are used in raising resources for the finance of the health care system and in decreasing non-essential health care expenses by having a deterrent role on the patients. On the other hand, out-of-pocket payment model causes regressive distribution effect by putting more burdens on the lower income groups and making them refrain from using health care services. Being a relatively incipient country having adopted the out-of-pocket payment model within the context of its Health Transformation Program which has been ongoing since the early 2000s, Turkey provides a good case for re-evaluating the pros and cons of this model in order not to sacrifice equality in access to health care for raising revenue for health care finance and vice versa. Therefore this study aims at analyzing the impact of out-of-pocket payments on the health finance system itself and on the patients’ access to healthcare services in Turkey where out-of-pocket payment model has been in use for a while. In so doing, data showing the revenue obtained from out-of-pocket payments and their share in health care finance are analyzed. In addition to this, data showing the change in the amount of expenditure made by patients on health care services after the adoption of out-of-pocket payments and the change in the use of various health care services in the meanwhile are examined. It is important for the incipient countries like Turkey to be careful in striking the right balance between the objective of cost efficiency and that of equality in accessing health care services while adopting the out-of-pocket payment model.Keywords: health care access, health care finance, health reform, out-of-pocket payments
Procedia PDF Downloads 3723212 Towards a Secure Storage in Cloud Computing
Authors: Mohamed Elkholy, Ahmed Elfatatry
Abstract:
Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.Keywords: access control, data integrity, data confidentiality, Kerberos authentication, cloud security
Procedia PDF Downloads 3353211 Social Media Diffusion And Implications For Opinion Leadership In Northcentral Nigeria
Authors: Chuks Odiegwu-Enwerem
Abstract:
The classical notion of opinion leadership presupposes that the media is at the center of an effective and successful opinion leadership. Under this idea, an opinion leader is an active media user who consumes, understands, digests and interprets the messages for the understanding and acceptance/adoption by lower-end media users – whose access and understanding of media content are supposedly low. Because of their unique access to and presumed understanding of media functions and their content, opinion leaders are typically esteemed by those who look forward to and accept their opinions. Lazarsfeld and Katz’s two-step flow of communication theory is the basis of opinion leadership – propelled by limited access to the media. With the emergence and spread of social media and its unlimited access by all and sundry, however, the study interrogates the relevance and application of opinion leaders and, by implication, the two-step flow communication theory in Nigeria’s Northcentral region. It seeks to determine whether opinion leaders still exist in the picture and if they still exert considerable influence, especially in matters of political conversations and decision-making among the citizens of this area. It further explores whether the diffusion of social media is a reality and how the ‘low-end’ media users react to the new-found freedom of access to media, and how they are using it to inform their decisions on important matters as well as examines if they are still glued to their opinion leaders. This study explores the empirical dimensions of the two-step flow hypothesis in relation to the activities of social media to determine if a change has occurred and in what direction, using mixed methos of Survey and in-depth interviews. Our understanding and belief in some theoretical assumptions may be enhanced or challenged by the study outcome.Keywords: Opinion Leadership, Active Media User, Two-Step-Flow, Social media, Northcentral Nigeria
Procedia PDF Downloads 703210 Meta Root ID Passwordless Authentication Using ZKP Bitcoin Protocol
Authors: Saransh Sharma, Atharv Dekhne
Abstract:
Passwords stored on central services and hashed are prone to cyberattacks and hacks. Hence, given all these nuisances, there’s a need to eliminate character-based authentication protocols, which would ultimately benefit all developers as well as end-users.To replace this conventional but antiquated protocol with a secure alternative would be Passwordless Authentication. The meta root.id system creates a public and private key, of which the user is only able to access the private key. Further, after signing the key, the user sends the information over the API to the server, which checks its validity with the public key and grants access accordingly.Keywords: passwordless, OAuth, bitcoin, ZKP, SIN, BIP
Procedia PDF Downloads 953209 Market Access for Foreign Investment in Host States: Municipal Law and International Law
Authors: Qiang Ren
Abstract:
A growing number of states are improving domestic law to better protect and promote foreign investment by changing/upgrading the existing law. However, inconsistency occurs because the new law is different from the ‘old’ law. For example, China has issued an unprecedented Foreign Investment Law and several regulations allowing comprehensive market access for foreign investment in most energy sectors since 2020. However, some laws, rules, regulations, etc. enacted previously remain valid, and the provisions regulating foreign investment do not grant full market access to foreign investment as such. The inconsistency above makes it necessary to investigatehow the international investment treaty law and dispute settlement practice respond to the ‘inconsistency and conflict’ in municipal law andwhat remedy foreign investors can seek under international law if the investment is denied due to inconsistency. Ultimately, it aims to examine how international tribunals should balance the gradually developing legal system of host states and the protection of foreign investors and investments if the host states cannot provide consistency during such a transition period of law development. The research seeks to answer these questions by making a comparative analysis of domestic law on market access to foreign investment, international investment treaties, and dispute arbitral practice. The objective is to examine how international investment treaty law and international investment dispute settlement practice evaluate the conflicts in the municipal law of host states in the admission of foreign investment. It also explores the possibility of harmonisation among them.Keywords: municipal law, protect and promote foreign investment, international law, host states
Procedia PDF Downloads 943208 Enhancing Access to Microfinance for Housing Provision in the Informal Sector of North East Nigeria
Authors: Wilfred Emmannuel Dzasu, Sani Usman Kunya, Inuwa Yusuf Mohammed, Moses Jonathan Gambo
Abstract:
The research aimed at investigating and identifying the strategies for enhancing access to microfinance for housing provision in the informal sector of North East Nigeria, with a focus on addressing the critical issue of housing poverty and lack of access to affordable housing finance among low-income households in the informal sector. The study employed an exploratory sequential mixed method design, combining both qualitative and quantitative data collection and analysis techniques. In the qualitative phase, 12 participants from microfinance institutions (MFIs) in four selected states (Adamawa, Bauchi, Gombe, and Taraba) were interviewed. The interviews were conducted using an interview guide with open-ended questions and were recorded with the consent of the respondents. In the quantitative phase, a survey strategy was adopted to collect data from 500 questionnaires distributed to informal sector workers (ISWs) in the study area. A total of 350 questionnaires were returned, representing a 70.0% response rate. The most preferred strategy for improving access to housing microfinance among ISWs is aggressive awareness of housing financing options by MFIs, with a mean score of 4.213; the most important strategy for improving access to housing microfinance among MFIs is close monitoring and adequate supervision of housing loan beneficiaries by MFIs, with a mean score of 4.675. The study identified several government-related strategies that are necessary for enhancing access to housing microfinance, including the provision of grants and subsidized intervention funds for housing, improvement in infrastructures to aid housing developments, and adequate measures for checking inflation/price fluctuation of building materials. The study also identified several MFI-related strategies that are necessary for enhancing access to housing microfinance, including deliberate expansion in the capital bases of MFIs, adequate training and capacity development of MFIs staff on relevant skills in housing micro-financing, and introduction of loan products that suit the incremental building needs of informal sector workers. Overall, the study highlights the need for a combination of government-related and MFI-related strategies to enhance access to microfinance for housing provision in the informal sector of North East Nigeria.Keywords: finanace, microfinance, housing, North East Nigeria
Procedia PDF Downloads 253207 Nurse Practitioner Led Pediatric Primary Care Clinic in a Tertiary Care Setting: Improving Access and Health Outcomes
Authors: Minna K. Miller, Chantel. E. Canessa, Suzanna V. McRae, Susan Shumay, Alissa Collingridge
Abstract:
Primary care provides the first point of contact and access to health care services. For the pediatric population, the goal is to help healthy children stay healthy and to help those that are sick get better. Primary care facilitates regular well baby/child visits; health promotion and disease prevention; investigation, diagnosis and management of acute and chronic illnesses; health education; both consultation and collaboration with, and referral to other health care professionals. There is a protective association between regular well-child visit care and preventable hospitalization. Further, low adherence to well-child care and poor continuity of care are independently associated with increased risk of hospitalization. With a declining number of family physicians caring for children, and only a portion of pediatricians providing primary care services, it is becoming increasingly difficult for children and their families to access primary care. Nurse practitioners are in a unique position to improve access to primary care and improve health outcomes for children. Limited literature is available on the nurse practitioner role in primary care pediatrics. The purpose of this paper is to describe the development, implementation and evaluation of a Nurse Practitioner-led pediatric primary care clinic in a tertiary care setting. Utilizing the participatory, evidence-based, patient-focused process for advanced practice nursing (PEPPA framework), this paper highlights the results of the initial needs assessment/gap analysis, the new service delivery model, populations served, and outcome measures.Keywords: access, health outcomes, nurse practitioner, pediatric primary care, PEPPA framework
Procedia PDF Downloads 4943206 Exploring Data Stewardship in Fog Networking Using Blockchain Algorithm
Authors: Ruvaitha Banu, Amaladhithyan Krishnamoorthy
Abstract:
IoT networks today solve various consumer problems, from home automation systems to aiding in driving autonomous vehicles with the exploration of multiple devices. For example, in an autonomous vehicle environment, multiple sensors are available on roads to monitor weather and road conditions and interact with each other to aid the vehicle in reaching its destination safely and timely. IoT systems are predominantly dependent on the cloud environment for data storage, and computing needs that result in latency problems. With the advent of Fog networks, some of this storage and computing is pushed to the edge/fog nodes, saving the network bandwidth and reducing the latency proportionally. Managing the data stored in these fog nodes becomes crucial as it might also store sensitive information required for a certain application. Data management in fog nodes is strenuous because Fog networks are dynamic in terms of their availability and hardware capability. It becomes more challenging when the nodes in the network also live a short span, detaching and joining frequently. When an end-user or Fog Node wants to access, read, or write data stored in another Fog Node, then a new protocol becomes necessary to access/manage the data stored in the fog devices as a conventional static way of managing the data doesn’t work in Fog Networks. The proposed solution discusses a protocol that acts by defining sensitivity levels for the data being written and read. Additionally, a distinct data distribution and replication model among the Fog nodes is established to decentralize the access mechanism. In this paper, the proposed model implements stewardship towards the data stored in the Fog node using the application of Reinforcement Learning so that access to the data is determined dynamically based on the requests.Keywords: IoT, fog networks, data stewardship, dynamic access policy
Procedia PDF Downloads 593205 Bit Error Rate (BER) Performance of Coherent Homodyne BPSK-OCDMA Network for Multimedia Applications
Authors: Morsy Ahmed Morsy Ismail
Abstract:
In this paper, the structure of a coherent homodyne receiver for the Binary Phase Shift Keying (BPSK) Optical Code Division Multiple Access (OCDMA) network is introduced based on the Multi-Length Weighted Modified Prime Code (ML-WMPC) for multimedia applications. The Bit Error Rate (BER) of this homodyne detection is evaluated as a function of the number of active users and the signal to noise ratio for different code lengths according to the multimedia application such as audio, voice, and video. Besides, the Mach-Zehnder interferometer is used as an external phase modulator in homodyne detection. Furthermore, the Multiple Access Interference (MAI) and the receiver noise in a shot-noise limited regime are taken into consideration in the BER calculations.Keywords: OCDMA networks, bit error rate, multiple access interference, binary phase-shift keying, multimedia
Procedia PDF Downloads 1753204 Right to Information in Egypt and the Prospects of Renegotiating a New Social Order
Authors: Farida Ibrahim
Abstract:
Right to information is the public's right to know through having access to public information held by state bodies. Recognized as a cornerstone in transparent, participatory and open democracies, the right to information is increasingly perceived today as an emerging human right on the international level. While this right is conceptualized in a range of different contexts, the paper focuses on its conceptualization as a force for socio-economic change for disadvantaged groups. The paper's goal is study the instrumental capacity of this right in empowering the public to access state-held information pertinent to their socio-economic rights. In this regard, the paper views the right to information as an inclusionary tool that is capable of spurring inclusion for individuals excluded from the ambits of both: public participation and social justice. For exploring this, the paper examines the advocacy role played by civil society groups in furthering this instrumental capacity. In particular, the paper presents a focused account on the Egyptian case. While Egypt has recently adopted its constitutional provision on access to information, doubts arise on Egyptian citizens' genuine ability to access information held by state bodies. The politico-economic environment, long term culture of bureaucratic secrecy, and legal framework do not provide promising outcomes on access to public information. Within the particular context of the Egyptian case, this paper questions the extent to which civil society in Egypt is capable of instrumentally employing the political opportunity offered by the constitutional entitlement to information access for pressuring public authorities to disclose information. Through four lawsuits brought by civil society groups in Egypt, the paper argues that the right to information has instrumentally provided civil society actors with new domains of mobilization for furthering the realization of social and economic rights, and ultimately, for renegotiating a new social order lining the relationship between the Egyptian state and its citizens marginalized by socio-economic imbalances.Keywords: civil society, Egypt, right to information, socio-economic rights
Procedia PDF Downloads 2813203 Green Public Procurement in Open Access and Traditional Journals: A Comparative Bibliometric Analysis
Authors: Alonso-Cañadas J., Galán-Valdivieso F., Saraite-Sariene L., García-Tabuyo M., Alonso-Morales N.
Abstract:
Green Public Procurement (GPP) has recently gained attention in the academic and policy arenas since climate change has shown the need to be addressed by both private companies and public entities. Such growing interest motivates this article, aiming to explore the most influential journals, publishers, categories, and topics, as well as the recent trends and future research lines in GPP. Based on the Web of Science database, 578 articles from 2004 to February 2022 devoted to GPP are analyzed using Bibliometrix, an R-tool to perform bibliometric analysis, and Google’s Big Query and Data Studio. This article introduces a variety of findings. First, the most influential journals by far are “Journal of Cleaner Production” and “Sustainability,” differing in that the latter is open access while the former publishes via traditional subscription. This result also occurs regarding the main publishers (Elsevier and MDPI). These features lead us to split the sample into open-access journals and traditional journals to deepen into the similarities and differences between them, confirming that traditional journals exhibit a higher degree of influence in the literature than their open-access counterparts in terms of the number of documents, number of citations and impact (according to the H index). Second, this research also highlights the recent emergence of green-related terms (sustainable, environment) and, parallelly, the increase in categorizing GPP papers in “green” WoS categories, particularly since 2019. Finally, a number of related topics are emerging and will lead the research, such as food security, infrastructures, and implementation barriers of GPP.Keywords: bibliometric analysis, green public procurement, open access, traditional journals
Procedia PDF Downloads 1043202 A Comparative Analysis of Self-help Housing and Government Mass Housing Scheme in Addressing the Challenge of Housing Access in Mararaba Area of Karu Local Government Area, Nasarawa State, Nigeria
Authors: John Abubakar
Abstract:
Access to decent housing is a global challenge. An estimated one billion people currently live in slum settlements globally. About 80 percent of these slum dwellers are in Asia and Africa. Nigeria accounts for a significant percentage of African slum dwellers because of its size. Addressing the challenge of slum settlement in Nigeria can have far reaching positive implications in Africa. A major slum settlement in Nigeria is Mararaba slum in Karu local government of Nasarawa state. The importance of this slum settlement hinges on its proximity to Abuja, Nigeria’s capital city. This study is an attempt at identifying the impact of self-help housing and government mass housing scheme in addressing the problem of housing access in Mararaba area of Karu local government, Nasarawa state. The research method used is the content analysis of existing literature. After the review of existing literature, the paper argues that self-help house is more impactful in addressing housing access in Mararaba area of Karu local government. Therefore, self-help housing should be recognized and incorporated into the housing policy of Nasarawa state. Both self-help housing and government mass housing programs are reviewed comparatively, and their strengths and weaknesses analyses.Keywords: slum settlement, informal settlement, progressive improvement, holistic planning
Procedia PDF Downloads 783201 Impact of Saline Water and Water Restriction in Laying Hens
Authors: Reza Vakili
Abstract:
This experiment was conducted to investigate the effect of duration water restriction of drinking water and salinity level on production performance, egg quality and biochemical and hematological blood indices of laying hens. A total of 240 Hy-Line laying hens were used in a completely randomized design with a 2 × 2 factorial arrangement of treatments. Experimental treatments were: 1) free access to drinking water and a low level of salinity (TDS below 500 mg/L) (FAW+LS), 2) free access to water and a high level of salinity (TDS above 1500 mg/L), (FAW+HS), 3) 12 h nightly water restriction and a low level of salinity (LAW+LS), and 4) 12 h water restriction and a high level of salinity (LAW+HS). Intake of feed, percentage of egg production and egg weight and mass were not affected by water restriction or salinity level (P > 0.05), however, a trend (P < 0.01) for lower water consumption was detected in water-restricted hens, regardless of salinity level (213 vs 187). A tendency for lower eggshell and yolk weights was observed in hens that had limited access to water with high salinity compared to those had free access to high saline water (P = 0.08). Serum total protein and glucose concentrations significantly reduced (P < 0.05) in hens drank high salinity water, regardless of water restriction. Moreover, saline water increased the concentration of uric acid, creatinine, and cholesterol when compared to low salinity drank-hens (P < 0.05). The concentrations of ALT and AST increased with salinity level (P < 0.05) and water restriction caused an increment in AST content (P < 0.05). In conclusion, Hy-Line laying hens could withstand water restriction, whilst could not tolerate water salinity of about 1500 mg/L.Keywords: chemical pollutants, eggs, laying hens, salinity, water quality
Procedia PDF Downloads 233200 Design of an Ensemble Learning Behavior Anomaly Detection Framework
Authors: Abdoulaye Diop, Nahid Emad, Thierry Winter, Mohamed Hilia
Abstract:
Data assets protection is a crucial issue in the cybersecurity field. Companies use logical access control tools to vault their information assets and protect them against external threats, but they lack solutions to counter insider threats. Nowadays, insider threats are the most significant concern of security analysts. They are mainly individuals with legitimate access to companies information systems, which use their rights with malicious intents. In several fields, behavior anomaly detection is the method used by cyber specialists to counter the threats of user malicious activities effectively. In this paper, we present the step toward the construction of a user and entity behavior analysis framework by proposing a behavior anomaly detection model. This model combines machine learning classification techniques and graph-based methods, relying on linear algebra and parallel computing techniques. We show the utility of an ensemble learning approach in this context. We present some detection methods tests results on an representative access control dataset. The use of some explored classifiers gives results up to 99% of accuracy.Keywords: cybersecurity, data protection, access control, insider threat, user behavior analysis, ensemble learning, high performance computing
Procedia PDF Downloads 1283199 Small Micro and Medium Enterprises Perception-Based Framework to Access Financial Support
Authors: Melvin Mothoa
Abstract:
Small Micro and Medium Enterprises are very significant for the development of their market economies. They are the main creators of the new working places, and they present a vital core of the market economy in countries across the globe. Access to finance is identified as crucial for small, micro, and medium-sized enterprises for their growth and innovation. This paper is conceived to propose a perception-based SMME framework to aid in access to financial support. Furthermore, the study will address issues that impede SMMEs in South Africa from obtaining finance from financial institutions. The framework will be tested against data collected from 200 Small Micro & Medium Enterprises in the Gauteng province of South Africa. The study adopts a quantitative method, and the delivery of self-administered questionnaires to SMMEs will be the primary data collection tool. Structural equation modeling will be used to further analyse the data collected.Keywords: finance, small business, growth, development
Procedia PDF Downloads 1113198 Deep Reinforcement Learning-Based Computation Offloading for 5G Vehicle-Aware Multi-Access Edge Computing Network
Authors: Ziying Wu, Danfeng Yan
Abstract:
Multi-Access Edge Computing (MEC) is one of the key technologies of the future 5G network. By deploying edge computing centers at the edge of wireless access network, the computation tasks can be offloaded to edge servers rather than the remote cloud server to meet the requirements of 5G low-latency and high-reliability application scenarios. Meanwhile, with the development of IOV (Internet of Vehicles) technology, various delay-sensitive and compute-intensive in-vehicle applications continue to appear. Compared with traditional internet business, these computation tasks have higher processing priority and lower delay requirements. In this paper, we design a 5G-based Vehicle-Aware Multi-Access Edge Computing Network (VAMECN) and propose a joint optimization problem of minimizing total system cost. In view of the problem, a deep reinforcement learning-based joint computation offloading and task migration optimization (JCOTM) algorithm is proposed, considering the influences of multiple factors such as concurrent multiple computation tasks, system computing resources distribution, and network communication bandwidth. And, the mixed integer nonlinear programming problem is described as a Markov Decision Process. Experiments show that our proposed algorithm can effectively reduce task processing delay and equipment energy consumption, optimize computing offloading and resource allocation schemes, and improve system resource utilization, compared with other computing offloading policies.Keywords: multi-access edge computing, computation offloading, 5th generation, vehicle-aware, deep reinforcement learning, deep q-network
Procedia PDF Downloads 1173197 Exploring the Gap between Coverage, Access, Utilization of Long Lasting Insecticidal Nets (LLINs) among the People of Malaria Endemic Districts in Bangladesh
Authors: Fouzia Khanam, Tridib Chowdhury, Belal Hossain, Sajedur Rahman, Mahfuzar Rahman
Abstract:
Introduction: Over the last decades, the world has achieved a noticeable success in preventing malaria. Nevertheless, malaria, a vector-borne infectious disease, remains a major public health burden globally as well as in Bangladesh. To achieve the goal of eliminating malaria, BRAC, a leading organization of Bangladesh in collaboration with government, is distributing free LLIN to the 13 endemic districts of the country. The study was conducted with the aim of assessing the gap between coverage, access, and utilization of LLIN among the people of the 13 malaria endemic districts of Bangladesh. Methods: This baseline study employed a community cross-sectional design triangulated with qualitative methods to measure households’ ownership, access and use of 13 endemic districts. A multistage cluster random sampling was employed for the quantitative part and for qualitative part a purposive sampling strategy was done. Thus present analysis included 2640 households encompassing a total of 14475 populations. Data were collected using a pre-tested structured questionnaire through one on one face-to-face interview with respondents. All analyses were performed using STATA (Version 13.0). For the qualitative part participant observation, in-depth interview, focus group discussion, key informant interview and informal interview was done to gather the contextual data. Findings: According to our study, 99.8% of households possessed at least one-bed net in both study areas. 77.4% households possessed at least two LLIN and 43.2% households had access to LLIN for all the members. So the gap between coverage and access is 34%. 91.8% people in the 13 districts and 95.1% in Chittagong Hill Tracts areas reported having had slept under a bed net the night before interviewed. And despite the relatively low access, in 77.8% of households, all the members were used the LLIN the previous night. This higher utilization compared to access might be due to the increased awareness among the community people regarding LLIN uses. However, among those people with sufficient access to LLIN, 6% of them still did not use the LLIN which reflects the behavioral failure that needs to be addressed. The major reasons for not using LLIN, identified by both qualitative and quantitative findings, were insufficient access, sleeping or living outside the home, migration, perceived low efficacy of LLIN, fear of physical side effects or feeling uncomfortable. Conclusion: Given that LLIN access and use was a bit short of the targets, it conveys important messages to the malaria control program. Targeting specific population segments and groups for achieving expected LLIN coverage is very crucial. And also, addressing behavior failure by well-designed behavioral change interventions is mandatory.Keywords: long lasting insecticide net, malaria, malaria control programme, World Health Organisation
Procedia PDF Downloads 1873196 Towards Women Empowerment: An Examination of Gender Equity and Access to Tertiary Education in Nigeria
Authors: Funmilayo Florence Adegoke
Abstract:
The study looks into the issue of gender equity among the staff and students of tertiary institutions in Osun State, Nigeria, specifically the study examined the opinion of the staff and students concerning equity of gender and also examined access to tertiary Education and related courses vis-à-vis gender. A total of 800 subjects consisting of six hundred and forty students, eighty lecturers and eighty non-teaching staff were drawn from four tertiary institutions namely a University, a Polytechnic and two Colleges of Education in the State. The main research instruments used for the study are two sets of questionnaires (one for the students and one for the staff) and records of students’ analyzed for the purpose of testing the research questions that were raised. The result showed among others that the staff and the students opined that there are generally inequalities in the attributes of the two genders. It was also found that significantly more boys enrolled in science and related courses than girls. Based on the findings, useful recommendations that would enhance the contribution of both male and female to science education and the nation as a whole were made.Keywords: gender, access, tertiary, education, Nigeria
Procedia PDF Downloads 3933195 Providing Open Access for Scholarly Information in Libya
Authors: Mohamed Abolgasem Arteimi, Ahlam Al-Tajori
Abstract:
This paper describes an ongoing project at the Libyan Academy. The project aims to build digital library for thesis and dissertations (ETD). The researchers developed a system based on Greenstone open source systems for building ETD digital library. A metadata for theses and dissertations was developed. The paper addresses issues related to project design, development and user satisfaction. Conclusions highlighted some important lessons learned to date.Keywords: digital library, electronic theses and dissertations, open access, ETD, metadata
Procedia PDF Downloads 3163194 Water Access and Food Security: A Cross-Sectional Study of SSA Countries in 2017
Authors: Davod Ahmadi, Narges Ebadi, Ethan Wang, Hugo Melgar-Quiñonez
Abstract:
Compared to the other Least Developed Countries (LDCs), major countries in sub-Saharan Africa (SSA) have limited access to the clean water. People in this region, and more specifically females, suffer from acute water scarcity problems. They are compelled to spend too much of their time bringing water for domestic use like drinking and washing. Apart from domestic use, water through affecting agriculture and livestock contributes to the food security status of people in vulnerable regions like SSA. Livestock needs water to grow, and agriculture requires enormous quantities of water for irrigation. The main objective of this study is to explore the association between access to water and individuals’ food security status. Data from 2017 Gallup World Poll (GWP) for SSA were analyzed (n=35,000). The target population in GWP is the entire civilian, non-institutionalized, aged 15 and older population. All samples selection is probability based and nationally representative. The Gallup surveys an average of 1,000 samples of individuals per country. Three questions related to water (i.e., water quality, availability of water for crops and availability of water for livestock) were used as the exposure variables. Food Insecurity Experience Scale (FIES) was used as the outcome variable. FIES measures individuals’ food security status, and it is composed of eight questions with simple dichotomous responses (1=Yes and 0=No). Different statistical analyses such as descriptive, crosstabs and binary logistic regression, form the basis of this study. Results from descriptive analyses showed that more than 50% of the respondents had no access to enough water for crops and livestock. More than 85% of respondents were categorized as “food insecure”. Findings from cross-tabulation analyses showed that food security status was significantly associated with water quality (0.135; P=0.000), water for crops (0.106; P=0.000) and water for livestock (0.112; P=0.000). In regression analyses, the probability of being food insecure increased among people who expressed no satisfaction with water quality (OR=1.884 (OR=1.768-2.008)), not enough water for crops (OR=1.721 (1.616-1.834)) and not enough water for livestock (OR=1.706 (1.819)). In conclusion, it should note that water access affects food security status in SSA.Keywords: water access, agriculture, livestock, FIES
Procedia PDF Downloads 1503193 Implementing Zero-Trust Security with Passwordless Authentication Gateways for Privacy-Oriented Organizations Using Keycloak
Authors: Andrei Bogdan Stanescu, Laura Diaconescu
Abstract:
With the increasing concerns about data breaches and privacy violations, organizations seek robust security measures to protect sensitive information. This research paper highlights the importance of implementing the Zero-Trust Security methodology using Passwordless Authentication Gateways that leverage Keycloak, an open-source Identity and Access Management (IAM) software, as a solution to address the security challenges these organizations face. The paper presents the successful implementation and deployment of such a solution in a mid-size, privacy-oriented organization. The implementation resulted in significant security improvements, reducing the risk of unauthorized access and potential data breaches. Moreover, user feedback indicated enhanced convenience and streamlined authentication experiences. The results of this study bring solid contributions in the field of cybersecurity and provide practical insights for organizations aiming to strengthen their security practices.Keywords: identity and access management, passwordless authentication, privacy, zero-trust security
Procedia PDF Downloads 91