Search results for: credit access
2030 Personalized Intervention through Causal Inference in mHealth
Authors: Anna Guitart Atienza, Ana Fernández del Río, Madhav Nekkar, Jelena Ljubicic, África Periáñez, Eura Shin, Lauren Bellhouse
Abstract:
The use of digital devices in healthcare or mobile health (mHealth) has increased in recent years due to the advances in digital technology, making it possible to nudge healthy behaviors through individual interventions. In addition, mHealth is becoming essential in poor-resource settings due to the widespread use of smartphones in areas where access to professional healthcare is limited. In this work, we evaluate mHealth interventions in low-income countries with a focus on causal inference. Counterfactuals estimation and other causal computations are key to determining intervention success and assisting in empirical decision-making. Our main purpose is to personalize treatment recommendations and triage patients at the individual level in order to maximize the entire intervention's impact on the desired outcome. For this study, collected data includes mHealth individual logs from front-line healthcare workers, electronic health records (EHR), and external variables data such as environmental, demographic, and geolocation information.Keywords: causal inference, mHealth, intervention, personalization
Procedia PDF Downloads 1322029 A Supply Chain Traceability Improvement Using RFID
Authors: Yaser Miaji, Mohammad Sabbagh
Abstract:
Radio Frequency Identification (RFID) is a technology which shares a similar concept with bar code. With RFID, the electromagnetic or electrostatic coupling in the RF portion of the electromagnetic spectrum is used to transmit signals. Supply chain management is aimed to keep going long-term performance of individual companies and the overall supply chain by maximizing customer satisfaction with minimum costs. One of the major issues in the supply chain management is product loss or shrinkage. In order to overcome this problem, this system which uses Radio Frequency Identification (RFID) technology will be able to RFID track and identify where losses are occurring and enable effective traceability. RFID brings a new dimension to supply chain management by providing a more efficient way of being able to identify and track items at the various stages throughout the supply chain. This system has been developed and tested to prove that RFID technology can be used to improve traceability in supply chain at low cost. Due to its simplicity in interface program and database management system using Visual Basic and MS Excel or MS Access the system can be more affordable and implemented even by small and medium scale industries.Keywords: supply chain, RFID, tractability, radio frequency identification
Procedia PDF Downloads 4882028 Formation of Self Help Groups (SHGs) Protected Human Rights and Ensured Human Security of Female Sex Workers at Brothel in Bangladesh
Authors: Md. Nurul Alom Siddikqe
Abstract:
The purpose of this intervention was to describe how the marginalized people protect their rights and increase their self-dignity and self-esteem among brothel-based sex workers in 6 cities which are the victim of trafficked who came from different periphery areas Bangladesh. Eventually the sex workers are tortured by the pimp, clients, Msahi (so called guardian of bonded sex workers), Babu (So called husband) highly discriminated, vulnerable and stigmatized due to their occupation, movement, behavior and activities, which has got social disapproval. However, stigma, discrimination and violation of human rights not only bar them to access legal services, education of their kids, health, movement of outside of brothel, deprived of funeral after death, but also make them inaccessible due to their invisibility. Conducted an assessment among brothel-based sex workers setup to know their knowledge on human rights and find out their harassment and violence in their community. Inspired them to think about to be united and also assisted them to formation of self help group (SHG). Developed capacity of the SHG and developed leadership of its members through different trainings like administrative, financial management, public speaking and resource mobilization. Developed strategy to enhance the capacity of SHG so that they can collectively claim their rights and develop strategic partnership and network with the relevant service provider’s for restoring all sorts of rights. Conducted meeting with stakeholder including duty bearers, civil society organizations, media people and local government initiatives. Developed Networking with human rights commission, local elite, religious leaders and form human right watch committees at community level. Organized rally and observed national and international days along with government counterparts. By utilizing the project resources the members of SHG became capable to raise their collective voices against violence, discrimination and stigma as well as protected them from insecurity. The members of SHG have been participating in social program/event the SHG got membership of district level NGO coordination meeting through invitation from Deputy Commissioner, Civil Surgeon and Social welfare office of Government of Bangladesh. The Law Enforcement Agency is ensuring safety and security and the education department of government enrolled their children in primary level education. The Government provided land for grave yard after death for the Muslim sex workers and same for the other religious group. The SHGs are registered with government respective authorities. The SHGs are working with support from different development partners and implementing different projects sometime as consortium leaders. Opportunity created to take the vocational training from the government reputed department. The harassment by the clients reduced remarkably, babu, Mashi and other counterparts recognized the sex workers rights and ensure security with government counterpart access increased in legal, health and education. Indications are that the brothel based sex workers understood about their rights and became capable of ensuring their security through working under the self-help groups meaningfully.Keywords: brothel, discrimination, harassment, stigma
Procedia PDF Downloads 3582027 Leading Gifted Education in Saudi Rural Schools: Case Studies of Differently Performing Schools
Authors: Abdullah Almalky, Colin Evers
Abstract:
Gifted individuals in rural areas may lack access and opportunities compared with urban students. This case study research provides research-based evidence to identify the professional needs of principals running rural schools with gifted education (GE) programs. The data were obtained from diverse cases (high-performing [HP] and low-performing [LP] schools) by conducting interviews with principals and teachers, conducting focus groups with gifted students, and analyzing policy documents. The findings reveal a lack of knowledge among principals in relation to GE. However, HP schools were more concerned with the needs of gifted students compared with LP schools. In addition, principals of HP schools were mostly instructional leaders, whereas LP schools were mostly led by building managers. Therefore, the study recommends a revision of GE policy in Saudi Arabia and urges ministries of education and universities to consider including GE in principals’ and teachers’ preparation programs to better serve gifted students in schools.Keywords: gifted, Saudi Arabia, leadership, policy, rural education, case study, interview
Procedia PDF Downloads 1712026 Reliable and Error-Free Transmission through Multimode Polymer Optical Fibers in House Networks
Authors: Tariq Ahamad, Mohammed S. Al-Kahtani, Taisir Eldos
Abstract:
Optical communications technology has made enormous and steady progress for several decades, providing the key resource in our increasingly information-driven society and economy. Much of this progress has been in finding innovative ways to increase the data carrying capacity of a single optical fiber. In this research article we have explored basic issues in terms of security and reliability for secure and reliable information transfer through the fiber infrastructure. Conspicuously, one potentially enormous source of improvement has however been left untapped in these systems: fibers can easily support hundreds of spatial modes, but today’s commercial systems (single-mode or multi-mode) make no attempt to use these as parallel channels for independent signals. Bandwidth, performance, reliability, cost efficiency, resiliency, redundancy, and security are some of the demands placed on telecommunications today. Since its initial development, fiber optic systems have had the advantage of most of these requirements over copper-based and wireless telecommunications solutions. The largest obstacle preventing most businesses from implementing fiber optic systems was cost. With the recent advancements in fiber optic technology and the ever-growing demand for more bandwidth, the cost of installing and maintaining fiber optic systems has been reduced dramatically. With so many advantages, including cost efficiency, there will continue to be an increase of fiber optic systems replacing copper-based communications. This will also lead to an increase in the expertise and the technology needed to tap into fiber optic networks by intruders. As ever before, all technologies have been subject to hacking and criminal manipulation, fiber optics is no exception. Researching fiber optic security vulnerabilities suggests that not everyone who is responsible for their networks security is aware of the different methods that intruders use to hack virtually undetected into fiber optic cables. With millions of miles of fiber optic cables stretching across the globe and carrying information including but certainly not limited to government, military, and personal information, such as, medical records, banking information, driving records, and credit card information; being aware of fiber optic security vulnerabilities is essential and critical. Many articles and research still suggest that fiber optics is expensive, impractical and hard to tap. Others argue that it is not only easily done, but also inexpensive. This paper will briefly discuss the history of fiber optics, explain the basics of fiber optic technologies and then discuss the vulnerabilities in fiber optic systems and how they can be better protected. Knowing the security risks and knowing the options available may save a company a lot embarrassment, time, and most importantly money.Keywords: in-house networks, fiber optics, security risk, money
Procedia PDF Downloads 4202025 The Impact of International Student Mobility on Trade and Gross Domestic Product: The Case of China
Authors: Yasir Khan
Abstract:
The continued growth in international students coming to China for higher education had a significant positive impact on trade and GDP in China. Student mobility may expend trade with their country of origin, owing to superior knowledge, or preferential access to market opportunities. We test this hypothesis using Chinese trade data from 1999 to 2017. In fully-modify (OLS) and dynamic (OLS) testing estimation, we find that a 1.24 percent increase in student inward mobility is associated with a 1 percent increase in Chinese export trade. On the other hand, we find that a 1.18 percent increase in the student inward mobility to China is associated with a 1 percent increase in import trade. In addition, we find that a 1.13 percent increase in international student inward mobility is associated with a 1 percent increase in the GDP. The outcome suggests that international students have a strong influence on Gross Domestic Product (GDP), exports and imports trade. However, the study holds that the government should attach great attachment and importance to the role of international students in the export and import trade.Keywords: international student mobility, China, export, import, GDP, FMOLS, DOLS
Procedia PDF Downloads 2182024 Spatial Analysis of Park and Ride Users’ Dynamic Accessibility to Train Station: A Case Study in Perth
Authors: Ting (Grace) Lin, Jianhong (Cecilia) Xia, Todd Robinson
Abstract:
Accessibility analysis, examining people’s ability to access facilities and destinations, is a fundamental assessment for transport planning, policy making, and social exclusion research. Dynamic accessibility which measures accessibility in real-time traffic environment has been an advanced accessibility indicator in transport research. It is also a useful indicator to help travelers to understand travel time daily variability, assists traffic engineers to monitor traffic congestions, and finally develop effective strategies in order to mitigate traffic congestions. This research involved real-time traffic information by collecting travel time data with 15-minute interval via the TomTom® API. A framework for measuring dynamic accessibility was then developed based on the gravity theory and accessibility dichotomy theory through space and time interpolation. Finally, the dynamic accessibility can be derived at any given time and location under dynamic accessibility spatial analysis framework.Keywords: dynamic accessibility, hot spot, transport research, TomTom® API
Procedia PDF Downloads 3882023 Marketing Mixed Factors Affecting on Commercial Transactions Expectations through Social Networks
Authors: Ladaporn Pithuk
Abstract:
This study aims to investigate the marketing mixed factors that affecting on expectations about commercial transactions through social networks. The research method will using quantitative research, data was collected by questionnaires to person have experience access to trading over the internet for 400 sample by purposive sampling method. Data was analyzed by descriptive statistic including percentage, mean, standard deviation and using quality function deployment for hypothesis testing. Finding the most significant interrelationship between marketing mixed factors and commercial transactions expectations through social networks are product and place the relationship of five ties product and place (location) is involved in almost all will make the site a model that meets the needs of the user visit. In terms of price, the promotion, privacy, personalization and providing a process technical. This will make operations more efficient, reduce confusion, duplication, delays in data transmission, including the creation of different elements in products and services.Keywords: commercial transactions expectations, marketing mixed factors, social networks, consumer behavior
Procedia PDF Downloads 2372022 Economic and Social Well-Being for Migrant Workers: Asian Experiences
Authors: Mohsin Reza, Thirunaukarasu Subramaniam, M. Rezaul Islam
Abstract:
In Asia, economic and social well-being issues are rarely addressed. The major characteristics of the migrant workers in Asian countries are seriously exploited, marginalized, and infrequently looked from human rights perspective. This paper explored the opportunities and shortages of economic and social well-being for the migrant workers in Asia. A Qualitative Interpretative Meta-Synthesis (QIMS) was conducted to analyze the contextual socio-economic factors that characterized migrant workers’ economic and social well-being. It is perceived that in most of the recruiting countries, there are lacks of government commitments to the international protocols, conventions and laws that they ratified towards safeguarding migrant workers’ economic and social well-being. Results showed that the migrant workers had lack of job security, poor salary, long working hours, low access to the public services, poor health, poor living and working conditions, lack of legal rights, physical and mental threats. The finding would be important guideline to the governments, policy makers, legal rights practitioners, and human rights organizations.Keywords: Asia, economic well-being, social well-being, migrant workers, human rights
Procedia PDF Downloads 3232021 Restoring Sagging Neck with Minimal Scar Face Lifting
Authors: Alessandro Marano
Abstract:
The author describes the use of deep plane face lifting and platysmaplasty to treat sagging neck with minimal scars. Series of case study. The author uses a selective deep plane face lift with a minimal access scar that not extend behind the ear lobe, neck liposuction and platysmaplasty to restore the sagging neck; the scars are minimal and no require drainage post-op. The deep plane face lifting can achieve a good result restoring vertical vectors in aging and sagging face, neck district can be treated without cutting the skin behind the ear lobe combining the SMAS vertical suspension and platysmaplasty; surgery can be performed in local anesthesia with sedation in day surgery and fast recovery. Restoring neck sagging without extend scars behind ear lobe is possible in selected patients, procedure is fast, safe, no drainage required, patients are satisfied and healing time is fast and comfortable.Keywords: face lifting, aesthetic, face, neck, platysmaplasty, deep plane
Procedia PDF Downloads 1012020 Approximate-Based Estimation of Single Event Upset Effect on Statistic Random-Access Memory-Based Field-Programmable Gate Arrays
Authors: Mahsa Mousavi, Hamid Reza Pourshaghaghi, Mohammad Tahghighi, Henk Corporaal
Abstract:
Recently, Statistic Random-Access Memory-based (SRAM-based) Field-Programmable Gate Arrays (FPGAs) are widely used in aeronautics and space systems where high dependability is demanded and considered as a mandatory requirement. Since design’s circuit is stored in configuration memory in SRAM-based FPGAs; they are very sensitive to Single Event Upsets (SEUs). In addition, the adverse effects of SEUs on the electronics used in space are much higher than in the Earth. Thus, developing fault tolerant techniques play crucial roles for the use of SRAM-based FPGAs in space. However, fault tolerance techniques introduce additional penalties in system parameters, e.g., area, power, performance and design time. In this paper, an accurate estimation of configuration memory vulnerability to SEUs is proposed for approximate-tolerant applications. This vulnerability estimation is highly required for compromising between the overhead introduced by fault tolerance techniques and system robustness. In this paper, we study applications in which the exact final output value is not necessarily always a concern meaning that some of the SEU-induced changes in output values are negligible. We therefore define and propose Approximate-based Configuration Memory Vulnerability Factor (ACMVF) estimation to avoid overestimating configuration memory vulnerability to SEUs. In this paper, we assess the vulnerability of configuration memory by injecting SEUs in configuration memory bits and comparing the output values of a given circuit in presence of SEUs with expected correct output. In spite of conventional vulnerability factor calculation methods, which accounts any deviations from the expected value as failures, in our proposed method a threshold margin is considered depending on user-case applications. Given the proposed threshold margin in our model, a failure occurs only when the difference between the erroneous output value and the expected output value is more than this margin. The ACMVF is subsequently calculated by acquiring the ratio of failures with respect to the total number of SEU injections. In our paper, a test-bench for emulating SEUs and calculating ACMVF is implemented on Zynq-7000 FPGA platform. This system makes use of the Single Event Mitigation (SEM) IP core to inject SEUs into configuration memory bits of the target design implemented in Zynq-7000 FPGA. Experimental results for 32-bit adder show that, when 1% to 10% deviation from correct output is considered, the counted failures number is reduced 41% to 59% compared with the failures number counted by conventional vulnerability factor calculation. It means that estimation accuracy of the configuration memory vulnerability to SEUs is improved up to 58% in the case that 10% deviation is acceptable in output results. Note that less than 10% deviation in addition result is reasonably tolerable for many applications in approximate computing domain such as Convolutional Neural Network (CNN).Keywords: fault tolerance, FPGA, single event upset, approximate computing
Procedia PDF Downloads 1982019 Critical Evaluation of the Effects of Conditionalities and Structural Adjustments on the Poor and Developing Countries
Authors: Kazi Rafikoddin
Abstract:
Conditionality refers to a precondition for getting external funds from IMF or WB by giving consent for implementation of the program of economic or political reforms especially relating to open economies. These are put forth under the label of structural adjustment. It is a kind of challenge on the part of borrowing government to exercise balance between the domestic obligations and the expectations of external funding agencies. Countries have to take loans under certain criteria and regulations because better loans are often not readily available. Therefore taking loans and renewing them to pay the same with new interest rates and conditions makes the governments entangled in the circle of debt. They are forced to compete with well-established multinational companies. If their access to industrialized countries' markets is impaired through protectionism, the developed world will be condemning the indebted nations to perpetual financial crisis. On the other hand, the ability to sell their goods free in the world market is reduced through the introduction of Structural Adjustment Programmes. Although there are examples of positive effects on certain economies like India, some Third World, and poor countries have experienced the ire of these remedies. This paper tries to find out the effects of SAPs on some borrowing countries.Keywords: IMF, world bank, conditionalities, SAPs, Third World Countries
Procedia PDF Downloads 2012018 Awarness the Effect of Quality Food and Nutrition on Health Will Help Develop a Healthy Lifestyle
Authors: Hamnah Nisar
Abstract:
As food is something which is particularly important for survival, in fact, it improves the quality of life and promotes health. Quality food is a key to a healthy life. Consumption of food depends on the knowledge we have regarding the nutrients it contains. Moreover, the awareness and knowledge about something is an initial stage for its improvement. We cannot work on anything unless we have knowledge about it. The pros and cons, effects, causes, dos, and don'ts, especially for an important things like food, are a necessity to learn. That is why my research would be all about analyzing what difference awareness makes on people and how making people more aware about a certain thing can help them improve their lifestyles and bring a positive change for them. The research would be done through questionnaires and interviews among two classes, one would be the upper class and the other would-be lower class. Because the upper class can easily access learning facilities and can know about the new things than the lower class. The questions would be related to what kind of food do they consume, what health issues they face, or what health issues are common among their regions. The results of the research would be helpful to know firstly the effects of awareness and education regarding food on health, how a basic thing like knowledge can have a significant effect on health and can be the cause of several diseases.Keywords: nutrition, awareness, quality food, knowledge
Procedia PDF Downloads 772017 Ways for Improving Citation of the Cyrillic Publications
Authors: Victoria Y. Garnova, Vladimir G. Merzlikin, Denis G. Yakovlev, Andrei А. Amelenkov, Sergey V. Khudyakov
Abstract:
Assessment of novelty of studies submitted in Russian publications is given by the method citation analysis to identify scientific research with a high degree of innovation. This may be the basis of recommendations for subjects new joint projects setting of the RF and the EU. Apart from not the best rating of Russian publications (may even its lack) current IT ensure open access to the WEB-sites of these journals that make possible own expertise selective rapid assessment of the advanced developments in Russia by interested foreign investors. Cited foreign literature in Russian journals can become the subject of study to determine the innovative attractiveness of scientific research on the background a specific future-proof abroad. Authors introduced: (1) linguistic impact factor Li-f of journals for describing the share of publications in the majority language; (2) linguistic citation index Lact characterizing the significance of scientific research and linguistic top ones Ltop for evaluation of the spectral width of citing of foreign journals.Keywords: citation analysis, linguistic citation indexes, linguistic impact factor, innovative projects
Procedia PDF Downloads 3172016 Banking and Accounting Analysis Researches Effect on Environment
Authors: Marina Magdy Naguib Karas
Abstract:
New methods of providing banking services to the customer have been introduced, such as online banking. Banks have begun to consider electronic banking (e-banking) as a way to replace some traditional branch functions by using the Internet as a new distribution channel. Some consumers have at least one account at multiple banks and access these accounts through online banking. To check their current net worth, clients need to log into each of their accounts, get detailed information, and work toward consolidation. Not only is it time-consuming, but it is also a repeatable activity with a certain frequency. To solve this problem, the concept of account aggregation was added as a solution. Account consolidation in e-banking as a form of electronic banking appears to build a stronger relationship with customers. An account linking service is generally referred to as a service that allows customers to manage their bank accounts held at different institutions via a common online banking platform that places a high priority on security and data protection. The article provides an overview of the account aggregation approach in e-banking as a new service in the area of e-banking.Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise development
Procedia PDF Downloads 502015 The Impact of Cognitive Behavioral Therapy in the Management of Perinatal Anxiety
Authors: Kelsey Kimball
Abstract:
Generalized anxiety disorder (GAD) is a common mental health illness affecting approximately 10% of the perinatal population. Research examining cognitive behavioral therapy in this population has only recently become more prevalent though exploring this subject is long overdue. This research examines the impact of cognitive behavioral therapy (CBT) on GAD during the perinatal period. The aim of this project was to identify the most effective way to manage GAD during the perinatal period to provide clinicians with evidence-based methods of caring for this population’s mental health. The research was conducted using several databases to identify ten primary research articles involving anxiety management. A critique and a systematic review of the literature was done. The results of the systematic literature review suggested that CBT had a significant positive impact on perinatal anxiety. Three main themes were derived from the literature: CBT for managing GAD in the general population, CBT for managing GAD in the perinatal population, and CBT’s effect on worry and problematic behaviors in both populations. Nurse practitioners are central in improving access to and treatment of perinatal anxiety disorders.Keywords: anxiety, cognitive behavioral therapy, nurse practitioner, perinatal
Procedia PDF Downloads 972014 A 5G Architecture Based to Dynamic Vehicular Clustering Enhancing VoD Services Over Vehicular Ad hoc Networks
Authors: Lamaa Sellami, Bechir Alaya
Abstract:
Nowadays, video-on-demand (VoD) applications are becoming one of the tendencies driving vehicular network users. In this paper, considering the unpredictable vehicle density, the unexpected acceleration or deceleration of the different cars included in the vehicular traffic load, and the limited radio range of the employed communication scheme, we introduce the “Dynamic Vehicular Clustering” (DVC) algorithm as a new scheme for video streaming systems over VANET. The proposed algorithm takes advantage of the concept of small cells and the introduction of wireless backhauls, inspired by the different features and the performance of the Long Term Evolution (LTE)- Advanced network. The proposed clustering algorithm considers multiple characteristics such as the vehicle’s position and acceleration to reduce latency and packet loss. Therefore, each cluster is counted as a small cell containing vehicular nodes and an access point that is elected regarding some particular specifications.Keywords: video-on-demand, vehicular ad-hoc network, mobility, vehicular traffic load, small cell, wireless backhaul, LTE-advanced, latency, packet loss
Procedia PDF Downloads 1402013 Design and Implementation of a Hardened Cryptographic Coprocessor with 128-bit RISC-V Core
Authors: Yashas Bedre Raghavendra, Pim Vullers
Abstract:
This study presents the design and implementation of an abstract cryptographic coprocessor, leveraging AMBA(Advanced Microcontroller Bus Architecture) protocols - APB (Advanced Peripheral Bus) and AHB (Advanced High-performance Bus), to enable seamless integration with the main CPU(Central processing unit) and enhance the coprocessor’s algorithm flexibility. The primary objective is to create a versatile coprocessor that can execute various cryptographic algorithms, including ECC(Elliptic-curve cryptography), RSA(Rivest–Shamir–Adleman), and AES (Advanced Encryption Standard) while providing a robust and secure solution for modern secure embedded systems. To achieve this goal, the coprocessor is equipped with a tightly coupled memory (TCM) for rapid data access during cryptographic operations. The TCM is placed within the coprocessor, ensuring quick retrieval of critical data and optimizing overall performance. Additionally, the program memory is positioned outside the coprocessor, allowing for easy updates and reconfiguration, which enhances adaptability to future algorithm implementations. Direct links are employed instead of DMA(Direct memory access) for data transfer, ensuring faster communication and reducing complexity. The AMBA-based communication architecture facilitates seamless interaction between the coprocessor and the main CPU, streamlining data flow and ensuring efficient utilization of system resources. The abstract nature of the coprocessor allows for easy integration of new cryptographic algorithms in the future. As the security landscape continues to evolve, the coprocessor can adapt and incorporate emerging algorithms, making it a future-proof solution for cryptographic processing. Furthermore, this study explores the addition of custom instructions into RISC-V ISE (Instruction Set Extension) to enhance cryptographic operations. By incorporating custom instructions specifically tailored for cryptographic algorithms, the coprocessor achieves higher efficiency and reduced cycles per instruction (CPI) compared to traditional instruction sets. The adoption of RISC-V 128-bit architecture significantly reduces the total number of instructions required for complex cryptographic tasks, leading to faster execution times and improved overall performance. Comparisons are made with 32-bit and 64-bit architectures, highlighting the advantages of the 128-bit architecture in terms of reduced instruction count and CPI. In conclusion, the abstract cryptographic coprocessor presented in this study offers significant advantages in terms of algorithm flexibility, security, and integration with the main CPU. By leveraging AMBA protocols and employing direct links for data transfer, the coprocessor achieves high-performance cryptographic operations without compromising system efficiency. With its TCM and external program memory, the coprocessor is capable of securely executing a wide range of cryptographic algorithms. This versatility and adaptability, coupled with the benefits of custom instructions and the 128-bit architecture, make it an invaluable asset for secure embedded systems, meeting the demands of modern cryptographic applications.Keywords: abstract cryptographic coprocessor, AMBA protocols, ECC, RSA, AES, tightly coupled memory, secure embedded systems, RISC-V ISE, custom instructions, instruction count, cycles per instruction
Procedia PDF Downloads 702012 Perceived Influence of Information Communication Technology on Empowerment Amongst the College of Education Physical and Health Education Students in Oyo State
Authors: I. O. Oladipo, Olusegun Adewale Ajayi, Omoniyi Oladipupo Adigun
Abstract:
Information Communication Technology (ICT) have the potential to contribute to different facets of educational development and effective learning; expanding access, promoting efficiency, improve the quality of learning, enhancing the quality of teaching and provide important mechanism for the economic crisis. Considering the prevalence of unemployment among the higher institution graduates in this nation, in which much seems not to have been achieved in this direction. In view of this, the purpose of this study is to create an awareness and enlightenment of ICT for empowerment opportunities after school. A self-developed modified 4-likert scale questionnaire was used for data collection among Colleges of Education, Physical and Health Education students in Oyo State. Inferential statistical analysis of chi-square set at 0.05 alpha levels was used to analyze the stated hypotheses. The study concludes that awareness and enlightenment of ICT significantly influence empowerment opportunities and recommended that college of education students should be encouraged on the application of ICT for job opportunity after school.Keywords: employment, empowerment, information communication technology, physical education
Procedia PDF Downloads 3902011 An Investigation of the Effectiveness and Quality Service of Thai Labor Fund
Authors: Chutikarn Sriviboon
Abstract:
The objectives of this research were to study the operation of the Labor Fund and to investigate the needs for money and assistance from Thai laborers both from within the system and out of the system and to compare between the assistance from domestic and international funds. The population of this study included three labor groups: group one was laborer in the system who were the members of saving cooperative, group two was laborer in the system who were not the members of saving cooperative, and group three was laborer who were not in the system. This was a mixed research of quantitative and qualitative methods. The findings can be categorized into four parts. First, the labor fund was beneficial to Thai laborers by giving access to government funds but the weakness was found to be poor public relations. Second, the labor funds should extend their assistance to laborer in the system who was not the members of saving cooperative. Third, the comparison between domestic labor funds and international labor funds revealed that there were no international funds which provided assistance the same way as Thai labor funds. Finally, there was a need to improve the management of labor funds and to provide long term assistance to Thai labors.Keywords: effectiveness, quality, labor funds, service
Procedia PDF Downloads 3552010 Exploring Open Innovation Practice in Start-Ups within an Innovation Ecosystem
Authors: Yassine Mehros, Jean-Michel Degeorge, Abdelaziz Elabjani
Abstract:
Innovation has long been considered the key to the survival, development, and growth of companies. It is a process in which start-ups play a key role, but they suffer from a structural lack of resources, which hinders the development of new innovations and their commercialization. The use of alternative channels to access resources is therefore becoming a necessity to overcome this constraint and identify opportunities. This is why they can be part of large communities of interdependent actors, namely innovation ecosystems that are part of a logic of sharing and open innovation. This research aims to explore and better understand OI in start-ups within an innovation ecosystem. We offer an exploratory qualitative study with start-ups and other actors in the Saint-Étienne innovation ecosystem. Our paper explored the characteristics and main actors of the Saint-Etienne innovation ecosystem, focusing on start-ups. We have identified the motivations of start-up’s adopting OI, its difficulties, its risks, and its impact on their growth. Also, our results show the existence of strong links between the different actors in the ecosystem. In addition, a strong trust has been established between these actors thanks to the geographical proximity; the start-ups manage to get in touch with the different actors of their innovation ecosystem by practicing OI. The actors collaborate on projects involving companies and, in particular, start-ups.Keywords: open innovation, start-ups, Innovation ecosystem, actors
Procedia PDF Downloads 782009 Design and Development of Data Mining Application for Medical Centers in Remote Areas
Authors: Grace Omowunmi Soyebi
Abstract:
Data Mining is the extraction of information from a large database which helps in predicting a trend or behavior, thereby helping management make knowledge-driven decisions. One principal problem of most hospitals in rural areas is making use of the file management system for keeping records. A lot of time is wasted when a patient visits the hospital, probably in an emergency, and the nurse or attendant has to search through voluminous files before the patient's file can be retrieved; this may cause an unexpected to happen to the patient. This Data Mining application is to be designed using a Structured System Analysis and design method, which will help in a well-articulated analysis of the existing file management system, feasibility study, and proper documentation of the Design and Implementation of a Computerized medical record system. This Computerized system will replace the file management system and help to easily retrieve a patient's record with increased data security, access clinical records for decision-making, and reduce the time range at which a patient gets attended to.Keywords: data mining, medical record system, systems programming, computing
Procedia PDF Downloads 2092008 A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches
Authors: Loh Fu Quan, Fong Zi Heng, Burra Venkata Durga Kumar
Abstract:
Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users.Keywords: Cloud computing, Cloud security, Cloud security issues, Cloud security framework
Procedia PDF Downloads 1202007 Algerian Case Study of Age Effect and Cross Linguistic Influence in Third Language Phonology Acquisition
Authors: Zouleykha Belabbes
Abstract:
Learning foreign languages is sine qua non in the era of globalization, mobility, and communications, which grants access and connectedness to the world. This urgent need is highlighted in monolingual settings, however, in multilingual contexts the case is, to some extent, complicated. In effect, research on bilingualism and multilingualism lead to the issue of Cross Linguistic Influence (CLI) which seeks to explain how and under which conditions prior linguistic knowledge of first language (L1) and / or second language (L2) influences the production, comprehension and development of a third language (L3) or additional language (Ln). Moreover, the issue of age is also one of the persistent topics in the field of language acquisition. This paper aims to scrutinize the effect of age and two previously known languages: Arabic (L1) and French (L2) in acquiring English (L3) phonology in Algerian context. The study consisted of 20 participants of different age range who were presented with recorded samples of English (L3). The findings confirm the results of some previous studies on the issue of Critical Period Hypothesis (CPH) and demonstrate a tendency for the L2 phonological transfer in L3 production at the initial stages of acquisition within young and later learners that for some circumstances diminished as L3 proficiency develop.Keywords: acquisition, age effect, cross linguistic influence, L3 phonology
Procedia PDF Downloads 2362006 The Socio-Economic Impact of the English Leather Glove Industry from the 17th Century to Its Recent Decline
Authors: Frances Turner
Abstract:
Gloves are significant physical objects, being one of the oldest forms of dress. Glove culture is part of every facet of life; its extraordinary history encompasses practicality, and symbolism reflecting a wide range of social practices. The survival of not only the gloves but associated articles enables the possibility to analyse real lives, however so far this area has been largely neglected. Limited information is available to students, researchers, or those involved with the design and making of gloves. There are several museums and independent collectors in England that hold collections of gloves (some from as early as 16th century), machinery, tools, designs and patterns, marketing materials and significant archives which demonstrate the rich heritage of English glove design and manufacturing, being of national significance and worthy of international interest. Through a research glove network which now exists thanks to research grant funding, there is potential for the holders of glove collections to make connections and explore links between these resources to promote a stronger understanding of the significance, breadth and heritage of the English glove industry. The network takes an interdisciplinary approach to bring together interested parties from academia, museums and manufacturing, with expert knowledge of the production, collections, conservation and display of English leather gloves. Academics from diverse arts and humanities disciplines benefit from the opportunities to share research and discuss ideas with network members from non-academic contexts including museums and heritage organisations, industry, and contemporary designers. The fragmented collections when considered in entirety provide an overview of English glove making since earliest times and those who wore them. This paper makes connections and explores links between these resources to promote a stronger understanding of the significance, breadth and heritage of the English Glove industry. The following areas are explored: current content and status of the individual museum collections, potential links, sharing of information histories, social and cultural and relationship to history of fashion design, manufacturing and materials, approaches to maintenance and conservation, access to the collections and strategies for future understanding of their national significance. The facilitation of knowledge exchange and exploration of the collections through the network informs organisations’ future strategies for the maintenance, access and conservation of their collections. By involving industry in the network, it is possible to ensure a contemporary perspective on glove-making in addition to the input from heritage partners. The slow fashion movement and awareness of artisan craft and how these can be preserved and adopted for glove and accessory design is addressed. Artisan leather glove making was a skilled and significant industry in England that has now declined to the point where there is little production remaining utilising the specialist skills that have hardly changed since earliest times. This heritage will be identified and preserved for future generations of the rich cultural history of gloves may be lost.Keywords: artisan glove-making skills, English leather gloves, glove culture, the glove network
Procedia PDF Downloads 1292005 The Behavior of Self-Compacting Light Weight Concrete Produced by Magnetic Water
Authors: Moosa Mazloom, Hojjat Hatami
Abstract:
The aim of this article is to access the optimal mix design of self-compacting light weight concrete. The effects of magnetic water, superplasticizer based on polycarboxylic-ether, and silica fume on characteristics of this type of concrete are studied. The workability of fresh concrete and the compressive strength of hardened concrete are considered here. For this purpose, nine mix designs were studied. The percentages of superplasticizer were 0.5, 1, and 2% of the weight of cement, and the percentages of silica fume were 0, 6, and 10% of the weight of cement. The water to cementitious ratios were 0.28, 0.32, and 0.36. The workability of concrete samples was analyzed by the devices such as slump flow, V-funnel, L box, U box, and Urimet with J ring. Then, the compressive strengths of the mixes at the ages of 3, 7, 28, and 90 days were obtained. The results show that by using magnetic water, the compressive strengths are improved at all the ages. In the concrete samples with ordinary water, more superplasticizer dosages were needed. Moreover, the combination of superplasticizer and magnetic water had positive effects on the mixes containing silica fume and they could flow easily.Keywords: magnetic water, self-compacting light weight concrete, silica fume, superplasticizer
Procedia PDF Downloads 3682004 The Impact of Social Protection Intervention on Alleviating Social Vulnerability (Evidence from Ethiopian Rural Households)
Authors: Tewelde Gebresslase Haile, S. P. Singh
Abstract:
To bridge the existing knowledge gap on public intervention implementations, this study estimates the impact of social protection intervention (SPI) on alleviating social vulnerability. Following a multi-stage sampling, primary information was gathered through a self-administered questionnaire, FGD, and interviews from the target households located at four systematically selected districts of Tigrai, Ethiopia. Factor analysis and Propensity Score Matching are applied to construct Social Vulnerability Index (SVI) and measuring the counterfactual impact of selected intervention. As a multidimensional challenge, social vulnerability is found as an important concept used to guide policy evaluation. Accessibility of basic services of Social Affairs, Agriculture, Health and Education sectors, and Food Security Program are commonly used as SPIs. Finally, this study discovers that the households who had access to SPI have scored 9.65% lower SVI than in the absence of the intervention. Finally, this study suggests the provision of integrated, proactive, productive, and evidence-based SPIs to alleviate social vulnerability.Keywords: social protection, livelihood assets, social vulnerability, public policy SVI
Procedia PDF Downloads 892003 Clarifier Dialogue Interface to resolve linguistic ambiguities in E-Learning Environment
Authors: Dalila Souilem, Salma Boumiza, Abdelkarim Abdelkader
Abstract:
The Clarifier Dialogue Interface (CDI) is a part of an online teaching system based on human-machine communication in learning situation. This interface used in the system during the learning action specifically in the evaluation step, to clarify ambiguities in the learner's response. The CDI can generate patterns allowing access to an information system, using the selectors associated with lexical units. To instantiate these patterns, the user request (especially learner’s response), must be analyzed and interpreted to deduce the canonical form, the semantic form and the subject of the sentence. For the efficiency of this interface at the interpretation level, a set of substitution operators is carried out in order to extend the possibilities of manipulation with a natural language. A second approach that will be presented in this paper focuses on the object languages with new prospects such as combination of natural language with techniques of handling information system in the area of online education. So all operators, the CDI and other interfaces associated to the domain expertise and teaching strategies will be unified using FRAME representation form.Keywords: dialogue, e-learning, FRAME, information system, natural language
Procedia PDF Downloads 3772002 The Impact of Social Enterprises on Women Empowerment in South Asia: A Systematic Review
Authors: Saba Aziz
Abstract:
Social enterprises are playing a growing role in transforming the lives of individuals and communities around the world, providing innovative solutions to critical social and environmental issues such as education, job creation, and health care. Women are increasingly utilising services of these enterprises to overcome socio-economic constraints and increase their access to business and market. This article systematically reviews the available literature on the role of social enterprises on women's empowerment in South Asia. Twelve key terms were specified and researched on five databases. Some of the literature was excluded based on the lack of evidence on the involvement of social enterprises. Remaining literature was rated according to the quality; due to methodological inconsistency, the findings are presented in a descriptive form. The relevant studies review the impact of social enterprises on women’s economic, social, relational, health, personal and political aspects of empowerment. In discussion, we outline areas for further research on social enterprises activity that impacts women’s overall empowerment specifically in South Asia.Keywords: social enterprise, women empowerment, systematic review, well-being, social impact, micro finance, South Asia, Pakistan
Procedia PDF Downloads 1722001 Meta-Review of Scholarly Publications on Biosensors: A Bibliometric Study
Authors: Nasrine Olson
Abstract:
With over 70,000 scholarly publications on the topic of biosensors, an overview of the field has become a challenge. To facilitate, there are currently over 700 expert-reviews of publications on biosensors and related topics. This study focuses on these review papers in order to provide a Meta-Review of the area. This paper provides a statistical analysis and overview of biosensor-related review papers. Comprehensive searches are conducted in the Web of Science, and PubMed databases and the resulting empirical material are analyzed using bibliometric methods and tools. The study finds that the biosensor-related review papers can be categorized in five related subgroups, broadly denoted by (i) properties of materials and particles, (ii) analysis and indicators, (iii) diagnostics, (iv) pollutant and analytical devices, and (v) treatment/ application. For an easy and clear access to the findings visualization of clusters and networks of connections are presented. The study includes a temporal dimension and identifies the trends over the years with an emphasis on the most recent developments. This paper provides useful insights for those who wish to form a better understanding of the research trends in the area of biosensors.Keywords: bibliometrics, biosensors, meta-review, statistical analysis, trends visualization
Procedia PDF Downloads 217