Search results for: dental access
2058 Spatial Analysis of Park and Ride Users’ Dynamic Accessibility to Train Station: A Case Study in Perth
Authors: Ting (Grace) Lin, Jianhong (Cecilia) Xia, Todd Robinson
Abstract:
Accessibility analysis, examining people’s ability to access facilities and destinations, is a fundamental assessment for transport planning, policy making, and social exclusion research. Dynamic accessibility which measures accessibility in real-time traffic environment has been an advanced accessibility indicator in transport research. It is also a useful indicator to help travelers to understand travel time daily variability, assists traffic engineers to monitor traffic congestions, and finally develop effective strategies in order to mitigate traffic congestions. This research involved real-time traffic information by collecting travel time data with 15-minute interval via the TomTom® API. A framework for measuring dynamic accessibility was then developed based on the gravity theory and accessibility dichotomy theory through space and time interpolation. Finally, the dynamic accessibility can be derived at any given time and location under dynamic accessibility spatial analysis framework.Keywords: dynamic accessibility, hot spot, transport research, TomTom® API
Procedia PDF Downloads 3882057 Role of Islamic Economic System for Sustainabe Development
Authors: Yahaya Sulaiman, Ibrahim Muhammad Yakuba, Abubakar Usman
Abstract:
In this paper, we discuss that Sustainable Development Goals are in consonance with Islamic ethos and philosophy. Islam made emphasize on human well-being from spiritual, physiological, intellectual and economic perspectives. Islamic worldview and values framework strengthens moral consciousness, urge pro-social behaviour and engender environmental ethics which can help in influencing our attitudes towards meeting sustainable development challenges. Islamic social finance institutions like Zakat and Waqf can contribute towards scaling up efforts in commercially non-viable, but socially vital projects and programs. There is much potential for Islamic finance to promote sustainable economic development through such approaches as widening access to finance, financing infrastructure projects, and expanding the reach of Takaful. Real sector based productive enterprise in Islamic finance has positive implications for the ecosystem. Risk-sharing shifts the emphasis from credit-worthiness of the borrower to be placed on the value creation and economic viability of investments that create new wealth. Islamic social finance package can cater to the financially excluded households.Keywords: assessment, Islamic, economic, sustainable, development
Procedia PDF Downloads 662056 Marketing Mixed Factors Affecting on Commercial Transactions Expectations through Social Networks
Authors: Ladaporn Pithuk
Abstract:
This study aims to investigate the marketing mixed factors that affecting on expectations about commercial transactions through social networks. The research method will using quantitative research, data was collected by questionnaires to person have experience access to trading over the internet for 400 sample by purposive sampling method. Data was analyzed by descriptive statistic including percentage, mean, standard deviation and using quality function deployment for hypothesis testing. Finding the most significant interrelationship between marketing mixed factors and commercial transactions expectations through social networks are product and place the relationship of five ties product and place (location) is involved in almost all will make the site a model that meets the needs of the user visit. In terms of price, the promotion, privacy, personalization and providing a process technical. This will make operations more efficient, reduce confusion, duplication, delays in data transmission, including the creation of different elements in products and services.Keywords: commercial transactions expectations, marketing mixed factors, social networks, consumer behavior
Procedia PDF Downloads 2372055 Economic and Social Well-Being for Migrant Workers: Asian Experiences
Authors: Mohsin Reza, Thirunaukarasu Subramaniam, M. Rezaul Islam
Abstract:
In Asia, economic and social well-being issues are rarely addressed. The major characteristics of the migrant workers in Asian countries are seriously exploited, marginalized, and infrequently looked from human rights perspective. This paper explored the opportunities and shortages of economic and social well-being for the migrant workers in Asia. A Qualitative Interpretative Meta-Synthesis (QIMS) was conducted to analyze the contextual socio-economic factors that characterized migrant workers’ economic and social well-being. It is perceived that in most of the recruiting countries, there are lacks of government commitments to the international protocols, conventions and laws that they ratified towards safeguarding migrant workers’ economic and social well-being. Results showed that the migrant workers had lack of job security, poor salary, long working hours, low access to the public services, poor health, poor living and working conditions, lack of legal rights, physical and mental threats. The finding would be important guideline to the governments, policy makers, legal rights practitioners, and human rights organizations.Keywords: Asia, economic well-being, social well-being, migrant workers, human rights
Procedia PDF Downloads 3232054 Restoring Sagging Neck with Minimal Scar Face Lifting
Authors: Alessandro Marano
Abstract:
The author describes the use of deep plane face lifting and platysmaplasty to treat sagging neck with minimal scars. Series of case study. The author uses a selective deep plane face lift with a minimal access scar that not extend behind the ear lobe, neck liposuction and platysmaplasty to restore the sagging neck; the scars are minimal and no require drainage post-op. The deep plane face lifting can achieve a good result restoring vertical vectors in aging and sagging face, neck district can be treated without cutting the skin behind the ear lobe combining the SMAS vertical suspension and platysmaplasty; surgery can be performed in local anesthesia with sedation in day surgery and fast recovery. Restoring neck sagging without extend scars behind ear lobe is possible in selected patients, procedure is fast, safe, no drainage required, patients are satisfied and healing time is fast and comfortable.Keywords: face lifting, aesthetic, face, neck, platysmaplasty, deep plane
Procedia PDF Downloads 1012053 Approximate-Based Estimation of Single Event Upset Effect on Statistic Random-Access Memory-Based Field-Programmable Gate Arrays
Authors: Mahsa Mousavi, Hamid Reza Pourshaghaghi, Mohammad Tahghighi, Henk Corporaal
Abstract:
Recently, Statistic Random-Access Memory-based (SRAM-based) Field-Programmable Gate Arrays (FPGAs) are widely used in aeronautics and space systems where high dependability is demanded and considered as a mandatory requirement. Since design’s circuit is stored in configuration memory in SRAM-based FPGAs; they are very sensitive to Single Event Upsets (SEUs). In addition, the adverse effects of SEUs on the electronics used in space are much higher than in the Earth. Thus, developing fault tolerant techniques play crucial roles for the use of SRAM-based FPGAs in space. However, fault tolerance techniques introduce additional penalties in system parameters, e.g., area, power, performance and design time. In this paper, an accurate estimation of configuration memory vulnerability to SEUs is proposed for approximate-tolerant applications. This vulnerability estimation is highly required for compromising between the overhead introduced by fault tolerance techniques and system robustness. In this paper, we study applications in which the exact final output value is not necessarily always a concern meaning that some of the SEU-induced changes in output values are negligible. We therefore define and propose Approximate-based Configuration Memory Vulnerability Factor (ACMVF) estimation to avoid overestimating configuration memory vulnerability to SEUs. In this paper, we assess the vulnerability of configuration memory by injecting SEUs in configuration memory bits and comparing the output values of a given circuit in presence of SEUs with expected correct output. In spite of conventional vulnerability factor calculation methods, which accounts any deviations from the expected value as failures, in our proposed method a threshold margin is considered depending on user-case applications. Given the proposed threshold margin in our model, a failure occurs only when the difference between the erroneous output value and the expected output value is more than this margin. The ACMVF is subsequently calculated by acquiring the ratio of failures with respect to the total number of SEU injections. In our paper, a test-bench for emulating SEUs and calculating ACMVF is implemented on Zynq-7000 FPGA platform. This system makes use of the Single Event Mitigation (SEM) IP core to inject SEUs into configuration memory bits of the target design implemented in Zynq-7000 FPGA. Experimental results for 32-bit adder show that, when 1% to 10% deviation from correct output is considered, the counted failures number is reduced 41% to 59% compared with the failures number counted by conventional vulnerability factor calculation. It means that estimation accuracy of the configuration memory vulnerability to SEUs is improved up to 58% in the case that 10% deviation is acceptable in output results. Note that less than 10% deviation in addition result is reasonably tolerable for many applications in approximate computing domain such as Convolutional Neural Network (CNN).Keywords: fault tolerance, FPGA, single event upset, approximate computing
Procedia PDF Downloads 1982052 Critical Evaluation of the Effects of Conditionalities and Structural Adjustments on the Poor and Developing Countries
Authors: Kazi Rafikoddin
Abstract:
Conditionality refers to a precondition for getting external funds from IMF or WB by giving consent for implementation of the program of economic or political reforms especially relating to open economies. These are put forth under the label of structural adjustment. It is a kind of challenge on the part of borrowing government to exercise balance between the domestic obligations and the expectations of external funding agencies. Countries have to take loans under certain criteria and regulations because better loans are often not readily available. Therefore taking loans and renewing them to pay the same with new interest rates and conditions makes the governments entangled in the circle of debt. They are forced to compete with well-established multinational companies. If their access to industrialized countries' markets is impaired through protectionism, the developed world will be condemning the indebted nations to perpetual financial crisis. On the other hand, the ability to sell their goods free in the world market is reduced through the introduction of Structural Adjustment Programmes. Although there are examples of positive effects on certain economies like India, some Third World, and poor countries have experienced the ire of these remedies. This paper tries to find out the effects of SAPs on some borrowing countries.Keywords: IMF, world bank, conditionalities, SAPs, Third World Countries
Procedia PDF Downloads 2012051 Awarness the Effect of Quality Food and Nutrition on Health Will Help Develop a Healthy Lifestyle
Authors: Hamnah Nisar
Abstract:
As food is something which is particularly important for survival, in fact, it improves the quality of life and promotes health. Quality food is a key to a healthy life. Consumption of food depends on the knowledge we have regarding the nutrients it contains. Moreover, the awareness and knowledge about something is an initial stage for its improvement. We cannot work on anything unless we have knowledge about it. The pros and cons, effects, causes, dos, and don'ts, especially for an important things like food, are a necessity to learn. That is why my research would be all about analyzing what difference awareness makes on people and how making people more aware about a certain thing can help them improve their lifestyles and bring a positive change for them. The research would be done through questionnaires and interviews among two classes, one would be the upper class and the other would-be lower class. Because the upper class can easily access learning facilities and can know about the new things than the lower class. The questions would be related to what kind of food do they consume, what health issues they face, or what health issues are common among their regions. The results of the research would be helpful to know firstly the effects of awareness and education regarding food on health, how a basic thing like knowledge can have a significant effect on health and can be the cause of several diseases.Keywords: nutrition, awareness, quality food, knowledge
Procedia PDF Downloads 772050 Ways for Improving Citation of the Cyrillic Publications
Authors: Victoria Y. Garnova, Vladimir G. Merzlikin, Denis G. Yakovlev, Andrei А. Amelenkov, Sergey V. Khudyakov
Abstract:
Assessment of novelty of studies submitted in Russian publications is given by the method citation analysis to identify scientific research with a high degree of innovation. This may be the basis of recommendations for subjects new joint projects setting of the RF and the EU. Apart from not the best rating of Russian publications (may even its lack) current IT ensure open access to the WEB-sites of these journals that make possible own expertise selective rapid assessment of the advanced developments in Russia by interested foreign investors. Cited foreign literature in Russian journals can become the subject of study to determine the innovative attractiveness of scientific research on the background a specific future-proof abroad. Authors introduced: (1) linguistic impact factor Li-f of journals for describing the share of publications in the majority language; (2) linguistic citation index Lact characterizing the significance of scientific research and linguistic top ones Ltop for evaluation of the spectral width of citing of foreign journals.Keywords: citation analysis, linguistic citation indexes, linguistic impact factor, innovative projects
Procedia PDF Downloads 3172049 Banking and Accounting Analysis Researches Effect on Environment
Authors: Marina Magdy Naguib Karas
Abstract:
New methods of providing banking services to the customer have been introduced, such as online banking. Banks have begun to consider electronic banking (e-banking) as a way to replace some traditional branch functions by using the Internet as a new distribution channel. Some consumers have at least one account at multiple banks and access these accounts through online banking. To check their current net worth, clients need to log into each of their accounts, get detailed information, and work toward consolidation. Not only is it time-consuming, but it is also a repeatable activity with a certain frequency. To solve this problem, the concept of account aggregation was added as a solution. Account consolidation in e-banking as a form of electronic banking appears to build a stronger relationship with customers. An account linking service is generally referred to as a service that allows customers to manage their bank accounts held at different institutions via a common online banking platform that places a high priority on security and data protection. The article provides an overview of the account aggregation approach in e-banking as a new service in the area of e-banking.Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise development
Procedia PDF Downloads 502048 The Impact of Cognitive Behavioral Therapy in the Management of Perinatal Anxiety
Authors: Kelsey Kimball
Abstract:
Generalized anxiety disorder (GAD) is a common mental health illness affecting approximately 10% of the perinatal population. Research examining cognitive behavioral therapy in this population has only recently become more prevalent though exploring this subject is long overdue. This research examines the impact of cognitive behavioral therapy (CBT) on GAD during the perinatal period. The aim of this project was to identify the most effective way to manage GAD during the perinatal period to provide clinicians with evidence-based methods of caring for this population’s mental health. The research was conducted using several databases to identify ten primary research articles involving anxiety management. A critique and a systematic review of the literature was done. The results of the systematic literature review suggested that CBT had a significant positive impact on perinatal anxiety. Three main themes were derived from the literature: CBT for managing GAD in the general population, CBT for managing GAD in the perinatal population, and CBT’s effect on worry and problematic behaviors in both populations. Nurse practitioners are central in improving access to and treatment of perinatal anxiety disorders.Keywords: anxiety, cognitive behavioral therapy, nurse practitioner, perinatal
Procedia PDF Downloads 972047 A 5G Architecture Based to Dynamic Vehicular Clustering Enhancing VoD Services Over Vehicular Ad hoc Networks
Authors: Lamaa Sellami, Bechir Alaya
Abstract:
Nowadays, video-on-demand (VoD) applications are becoming one of the tendencies driving vehicular network users. In this paper, considering the unpredictable vehicle density, the unexpected acceleration or deceleration of the different cars included in the vehicular traffic load, and the limited radio range of the employed communication scheme, we introduce the “Dynamic Vehicular Clustering” (DVC) algorithm as a new scheme for video streaming systems over VANET. The proposed algorithm takes advantage of the concept of small cells and the introduction of wireless backhauls, inspired by the different features and the performance of the Long Term Evolution (LTE)- Advanced network. The proposed clustering algorithm considers multiple characteristics such as the vehicle’s position and acceleration to reduce latency and packet loss. Therefore, each cluster is counted as a small cell containing vehicular nodes and an access point that is elected regarding some particular specifications.Keywords: video-on-demand, vehicular ad-hoc network, mobility, vehicular traffic load, small cell, wireless backhaul, LTE-advanced, latency, packet loss
Procedia PDF Downloads 1402046 Design and Implementation of a Hardened Cryptographic Coprocessor with 128-bit RISC-V Core
Authors: Yashas Bedre Raghavendra, Pim Vullers
Abstract:
This study presents the design and implementation of an abstract cryptographic coprocessor, leveraging AMBA(Advanced Microcontroller Bus Architecture) protocols - APB (Advanced Peripheral Bus) and AHB (Advanced High-performance Bus), to enable seamless integration with the main CPU(Central processing unit) and enhance the coprocessor’s algorithm flexibility. The primary objective is to create a versatile coprocessor that can execute various cryptographic algorithms, including ECC(Elliptic-curve cryptography), RSA(Rivest–Shamir–Adleman), and AES (Advanced Encryption Standard) while providing a robust and secure solution for modern secure embedded systems. To achieve this goal, the coprocessor is equipped with a tightly coupled memory (TCM) for rapid data access during cryptographic operations. The TCM is placed within the coprocessor, ensuring quick retrieval of critical data and optimizing overall performance. Additionally, the program memory is positioned outside the coprocessor, allowing for easy updates and reconfiguration, which enhances adaptability to future algorithm implementations. Direct links are employed instead of DMA(Direct memory access) for data transfer, ensuring faster communication and reducing complexity. The AMBA-based communication architecture facilitates seamless interaction between the coprocessor and the main CPU, streamlining data flow and ensuring efficient utilization of system resources. The abstract nature of the coprocessor allows for easy integration of new cryptographic algorithms in the future. As the security landscape continues to evolve, the coprocessor can adapt and incorporate emerging algorithms, making it a future-proof solution for cryptographic processing. Furthermore, this study explores the addition of custom instructions into RISC-V ISE (Instruction Set Extension) to enhance cryptographic operations. By incorporating custom instructions specifically tailored for cryptographic algorithms, the coprocessor achieves higher efficiency and reduced cycles per instruction (CPI) compared to traditional instruction sets. The adoption of RISC-V 128-bit architecture significantly reduces the total number of instructions required for complex cryptographic tasks, leading to faster execution times and improved overall performance. Comparisons are made with 32-bit and 64-bit architectures, highlighting the advantages of the 128-bit architecture in terms of reduced instruction count and CPI. In conclusion, the abstract cryptographic coprocessor presented in this study offers significant advantages in terms of algorithm flexibility, security, and integration with the main CPU. By leveraging AMBA protocols and employing direct links for data transfer, the coprocessor achieves high-performance cryptographic operations without compromising system efficiency. With its TCM and external program memory, the coprocessor is capable of securely executing a wide range of cryptographic algorithms. This versatility and adaptability, coupled with the benefits of custom instructions and the 128-bit architecture, make it an invaluable asset for secure embedded systems, meeting the demands of modern cryptographic applications.Keywords: abstract cryptographic coprocessor, AMBA protocols, ECC, RSA, AES, tightly coupled memory, secure embedded systems, RISC-V ISE, custom instructions, instruction count, cycles per instruction
Procedia PDF Downloads 702045 Perceived Influence of Information Communication Technology on Empowerment Amongst the College of Education Physical and Health Education Students in Oyo State
Authors: I. O. Oladipo, Olusegun Adewale Ajayi, Omoniyi Oladipupo Adigun
Abstract:
Information Communication Technology (ICT) have the potential to contribute to different facets of educational development and effective learning; expanding access, promoting efficiency, improve the quality of learning, enhancing the quality of teaching and provide important mechanism for the economic crisis. Considering the prevalence of unemployment among the higher institution graduates in this nation, in which much seems not to have been achieved in this direction. In view of this, the purpose of this study is to create an awareness and enlightenment of ICT for empowerment opportunities after school. A self-developed modified 4-likert scale questionnaire was used for data collection among Colleges of Education, Physical and Health Education students in Oyo State. Inferential statistical analysis of chi-square set at 0.05 alpha levels was used to analyze the stated hypotheses. The study concludes that awareness and enlightenment of ICT significantly influence empowerment opportunities and recommended that college of education students should be encouraged on the application of ICT for job opportunity after school.Keywords: employment, empowerment, information communication technology, physical education
Procedia PDF Downloads 3902044 An Investigation of the Effectiveness and Quality Service of Thai Labor Fund
Authors: Chutikarn Sriviboon
Abstract:
The objectives of this research were to study the operation of the Labor Fund and to investigate the needs for money and assistance from Thai laborers both from within the system and out of the system and to compare between the assistance from domestic and international funds. The population of this study included three labor groups: group one was laborer in the system who were the members of saving cooperative, group two was laborer in the system who were not the members of saving cooperative, and group three was laborer who were not in the system. This was a mixed research of quantitative and qualitative methods. The findings can be categorized into four parts. First, the labor fund was beneficial to Thai laborers by giving access to government funds but the weakness was found to be poor public relations. Second, the labor funds should extend their assistance to laborer in the system who was not the members of saving cooperative. Third, the comparison between domestic labor funds and international labor funds revealed that there were no international funds which provided assistance the same way as Thai labor funds. Finally, there was a need to improve the management of labor funds and to provide long term assistance to Thai labors.Keywords: effectiveness, quality, labor funds, service
Procedia PDF Downloads 3552043 Exploring Open Innovation Practice in Start-Ups within an Innovation Ecosystem
Authors: Yassine Mehros, Jean-Michel Degeorge, Abdelaziz Elabjani
Abstract:
Innovation has long been considered the key to the survival, development, and growth of companies. It is a process in which start-ups play a key role, but they suffer from a structural lack of resources, which hinders the development of new innovations and their commercialization. The use of alternative channels to access resources is therefore becoming a necessity to overcome this constraint and identify opportunities. This is why they can be part of large communities of interdependent actors, namely innovation ecosystems that are part of a logic of sharing and open innovation. This research aims to explore and better understand OI in start-ups within an innovation ecosystem. We offer an exploratory qualitative study with start-ups and other actors in the Saint-Étienne innovation ecosystem. Our paper explored the characteristics and main actors of the Saint-Etienne innovation ecosystem, focusing on start-ups. We have identified the motivations of start-up’s adopting OI, its difficulties, its risks, and its impact on their growth. Also, our results show the existence of strong links between the different actors in the ecosystem. In addition, a strong trust has been established between these actors thanks to the geographical proximity; the start-ups manage to get in touch with the different actors of their innovation ecosystem by practicing OI. The actors collaborate on projects involving companies and, in particular, start-ups.Keywords: open innovation, start-ups, Innovation ecosystem, actors
Procedia PDF Downloads 782042 Design and Development of Data Mining Application for Medical Centers in Remote Areas
Authors: Grace Omowunmi Soyebi
Abstract:
Data Mining is the extraction of information from a large database which helps in predicting a trend or behavior, thereby helping management make knowledge-driven decisions. One principal problem of most hospitals in rural areas is making use of the file management system for keeping records. A lot of time is wasted when a patient visits the hospital, probably in an emergency, and the nurse or attendant has to search through voluminous files before the patient's file can be retrieved; this may cause an unexpected to happen to the patient. This Data Mining application is to be designed using a Structured System Analysis and design method, which will help in a well-articulated analysis of the existing file management system, feasibility study, and proper documentation of the Design and Implementation of a Computerized medical record system. This Computerized system will replace the file management system and help to easily retrieve a patient's record with increased data security, access clinical records for decision-making, and reduce the time range at which a patient gets attended to.Keywords: data mining, medical record system, systems programming, computing
Procedia PDF Downloads 2092041 A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches
Authors: Loh Fu Quan, Fong Zi Heng, Burra Venkata Durga Kumar
Abstract:
Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users.Keywords: Cloud computing, Cloud security, Cloud security issues, Cloud security framework
Procedia PDF Downloads 1202040 Algerian Case Study of Age Effect and Cross Linguistic Influence in Third Language Phonology Acquisition
Authors: Zouleykha Belabbes
Abstract:
Learning foreign languages is sine qua non in the era of globalization, mobility, and communications, which grants access and connectedness to the world. This urgent need is highlighted in monolingual settings, however, in multilingual contexts the case is, to some extent, complicated. In effect, research on bilingualism and multilingualism lead to the issue of Cross Linguistic Influence (CLI) which seeks to explain how and under which conditions prior linguistic knowledge of first language (L1) and / or second language (L2) influences the production, comprehension and development of a third language (L3) or additional language (Ln). Moreover, the issue of age is also one of the persistent topics in the field of language acquisition. This paper aims to scrutinize the effect of age and two previously known languages: Arabic (L1) and French (L2) in acquiring English (L3) phonology in Algerian context. The study consisted of 20 participants of different age range who were presented with recorded samples of English (L3). The findings confirm the results of some previous studies on the issue of Critical Period Hypothesis (CPH) and demonstrate a tendency for the L2 phonological transfer in L3 production at the initial stages of acquisition within young and later learners that for some circumstances diminished as L3 proficiency develop.Keywords: acquisition, age effect, cross linguistic influence, L3 phonology
Procedia PDF Downloads 2362039 The Socio-Economic Impact of the English Leather Glove Industry from the 17th Century to Its Recent Decline
Authors: Frances Turner
Abstract:
Gloves are significant physical objects, being one of the oldest forms of dress. Glove culture is part of every facet of life; its extraordinary history encompasses practicality, and symbolism reflecting a wide range of social practices. The survival of not only the gloves but associated articles enables the possibility to analyse real lives, however so far this area has been largely neglected. Limited information is available to students, researchers, or those involved with the design and making of gloves. There are several museums and independent collectors in England that hold collections of gloves (some from as early as 16th century), machinery, tools, designs and patterns, marketing materials and significant archives which demonstrate the rich heritage of English glove design and manufacturing, being of national significance and worthy of international interest. Through a research glove network which now exists thanks to research grant funding, there is potential for the holders of glove collections to make connections and explore links between these resources to promote a stronger understanding of the significance, breadth and heritage of the English glove industry. The network takes an interdisciplinary approach to bring together interested parties from academia, museums and manufacturing, with expert knowledge of the production, collections, conservation and display of English leather gloves. Academics from diverse arts and humanities disciplines benefit from the opportunities to share research and discuss ideas with network members from non-academic contexts including museums and heritage organisations, industry, and contemporary designers. The fragmented collections when considered in entirety provide an overview of English glove making since earliest times and those who wore them. This paper makes connections and explores links between these resources to promote a stronger understanding of the significance, breadth and heritage of the English Glove industry. The following areas are explored: current content and status of the individual museum collections, potential links, sharing of information histories, social and cultural and relationship to history of fashion design, manufacturing and materials, approaches to maintenance and conservation, access to the collections and strategies for future understanding of their national significance. The facilitation of knowledge exchange and exploration of the collections through the network informs organisations’ future strategies for the maintenance, access and conservation of their collections. By involving industry in the network, it is possible to ensure a contemporary perspective on glove-making in addition to the input from heritage partners. The slow fashion movement and awareness of artisan craft and how these can be preserved and adopted for glove and accessory design is addressed. Artisan leather glove making was a skilled and significant industry in England that has now declined to the point where there is little production remaining utilising the specialist skills that have hardly changed since earliest times. This heritage will be identified and preserved for future generations of the rich cultural history of gloves may be lost.Keywords: artisan glove-making skills, English leather gloves, glove culture, the glove network
Procedia PDF Downloads 1292038 The Behavior of Self-Compacting Light Weight Concrete Produced by Magnetic Water
Authors: Moosa Mazloom, Hojjat Hatami
Abstract:
The aim of this article is to access the optimal mix design of self-compacting light weight concrete. The effects of magnetic water, superplasticizer based on polycarboxylic-ether, and silica fume on characteristics of this type of concrete are studied. The workability of fresh concrete and the compressive strength of hardened concrete are considered here. For this purpose, nine mix designs were studied. The percentages of superplasticizer were 0.5, 1, and 2% of the weight of cement, and the percentages of silica fume were 0, 6, and 10% of the weight of cement. The water to cementitious ratios were 0.28, 0.32, and 0.36. The workability of concrete samples was analyzed by the devices such as slump flow, V-funnel, L box, U box, and Urimet with J ring. Then, the compressive strengths of the mixes at the ages of 3, 7, 28, and 90 days were obtained. The results show that by using magnetic water, the compressive strengths are improved at all the ages. In the concrete samples with ordinary water, more superplasticizer dosages were needed. Moreover, the combination of superplasticizer and magnetic water had positive effects on the mixes containing silica fume and they could flow easily.Keywords: magnetic water, self-compacting light weight concrete, silica fume, superplasticizer
Procedia PDF Downloads 3682037 The Impact of Social Protection Intervention on Alleviating Social Vulnerability (Evidence from Ethiopian Rural Households)
Authors: Tewelde Gebresslase Haile, S. P. Singh
Abstract:
To bridge the existing knowledge gap on public intervention implementations, this study estimates the impact of social protection intervention (SPI) on alleviating social vulnerability. Following a multi-stage sampling, primary information was gathered through a self-administered questionnaire, FGD, and interviews from the target households located at four systematically selected districts of Tigrai, Ethiopia. Factor analysis and Propensity Score Matching are applied to construct Social Vulnerability Index (SVI) and measuring the counterfactual impact of selected intervention. As a multidimensional challenge, social vulnerability is found as an important concept used to guide policy evaluation. Accessibility of basic services of Social Affairs, Agriculture, Health and Education sectors, and Food Security Program are commonly used as SPIs. Finally, this study discovers that the households who had access to SPI have scored 9.65% lower SVI than in the absence of the intervention. Finally, this study suggests the provision of integrated, proactive, productive, and evidence-based SPIs to alleviate social vulnerability.Keywords: social protection, livelihood assets, social vulnerability, public policy SVI
Procedia PDF Downloads 892036 Clarifier Dialogue Interface to resolve linguistic ambiguities in E-Learning Environment
Authors: Dalila Souilem, Salma Boumiza, Abdelkarim Abdelkader
Abstract:
The Clarifier Dialogue Interface (CDI) is a part of an online teaching system based on human-machine communication in learning situation. This interface used in the system during the learning action specifically in the evaluation step, to clarify ambiguities in the learner's response. The CDI can generate patterns allowing access to an information system, using the selectors associated with lexical units. To instantiate these patterns, the user request (especially learner’s response), must be analyzed and interpreted to deduce the canonical form, the semantic form and the subject of the sentence. For the efficiency of this interface at the interpretation level, a set of substitution operators is carried out in order to extend the possibilities of manipulation with a natural language. A second approach that will be presented in this paper focuses on the object languages with new prospects such as combination of natural language with techniques of handling information system in the area of online education. So all operators, the CDI and other interfaces associated to the domain expertise and teaching strategies will be unified using FRAME representation form.Keywords: dialogue, e-learning, FRAME, information system, natural language
Procedia PDF Downloads 3772035 Wheat Cluster Farming Approach: Challenges and Prospects for Smallholder Farmers in Ethiopia
Authors: Hanna Mamo Ergando
Abstract:
Climate change is already having a severe influence on agriculture, affecting crop yields, the nutritional content of main grains, and livestock productivity. Significant adaptation investments will be necessary to sustain existing yields and enhance production and food quality to fulfill demand. Climate-smart agriculture (CSA) provides numerous potentials in this regard, combining a focus on enhancing agricultural output and incomes while also strengthening resilience and responding to climate change. To improve agriculture production and productivity, the Ethiopian government has adopted and implemented a series of strategies, including the recent agricultural cluster farming that is practiced as an effort to change, improve, and transform subsistence farming to modern, productive, market-oriented, and climate-smart approach through farmers production cluster. Besides, greater attention and focus have been given to wheat production and productivity by the government, and wheat is the major crop grown in cluster farming. Therefore, the objective of this assessment was to examine various opportunities and challenges farmers face in a cluster farming system. A qualitative research approach was used to generate primary and secondary data. Respondents were chosen using the purposeful sampling technique. Accordingly, experts from the Federal Ministry of Agriculture, the Ethiopian Agricultural Transformation Institute, the Ethiopian Agricultural Research Institute, and the Ethiopian Environment Protection Authority were interviewed. The assessment result revealed that farming in clusters is an economically viable technique for sustaining small, resource-limited, and socially disadvantaged farmers' agricultural businesses. The method assists farmers in consolidating their products and delivering them in bulk to save on transportation costs while increasing income. Smallholders' negotiating power has improved as a result of cluster membership, as has knowledge and information spillover. The key challenges, on the other hand, were identified as a lack of timely provision of modern inputs, insufficient access to credit services, conflict of interest in crop selection, and a lack of output market for agro-processing firms. Furthermore, farmers in the cluster farming approach grow wheat year after year without crop rotation or diversification techniques. Mono-cropping has disadvantages because it raises the likelihood of disease and insect outbreaks. This practice may result in long-term consequences, including soil degradation, reduced biodiversity, and economic risk for farmers. Therefore, the government must devote more resources to addressing the issue of environmental sustainability. Farmers' access to complementary services that promote production and marketing efficiencies through infrastructure and institutional services has to be improved. In general, the assessment begins with some hint that leads to a deeper study into the efficiency of the strategy implementation, upholding existing policy, and scaling up good practices in a sustainable and environmentally viable manner.Keywords: cluster farming, smallholder farmers, wheat, challenges, opportunities
Procedia PDF Downloads 2192034 The Impact of Social Enterprises on Women Empowerment in South Asia: A Systematic Review
Authors: Saba Aziz
Abstract:
Social enterprises are playing a growing role in transforming the lives of individuals and communities around the world, providing innovative solutions to critical social and environmental issues such as education, job creation, and health care. Women are increasingly utilising services of these enterprises to overcome socio-economic constraints and increase their access to business and market. This article systematically reviews the available literature on the role of social enterprises on women's empowerment in South Asia. Twelve key terms were specified and researched on five databases. Some of the literature was excluded based on the lack of evidence on the involvement of social enterprises. Remaining literature was rated according to the quality; due to methodological inconsistency, the findings are presented in a descriptive form. The relevant studies review the impact of social enterprises on women’s economic, social, relational, health, personal and political aspects of empowerment. In discussion, we outline areas for further research on social enterprises activity that impacts women’s overall empowerment specifically in South Asia.Keywords: social enterprise, women empowerment, systematic review, well-being, social impact, micro finance, South Asia, Pakistan
Procedia PDF Downloads 1722033 Meta-Review of Scholarly Publications on Biosensors: A Bibliometric Study
Authors: Nasrine Olson
Abstract:
With over 70,000 scholarly publications on the topic of biosensors, an overview of the field has become a challenge. To facilitate, there are currently over 700 expert-reviews of publications on biosensors and related topics. This study focuses on these review papers in order to provide a Meta-Review of the area. This paper provides a statistical analysis and overview of biosensor-related review papers. Comprehensive searches are conducted in the Web of Science, and PubMed databases and the resulting empirical material are analyzed using bibliometric methods and tools. The study finds that the biosensor-related review papers can be categorized in five related subgroups, broadly denoted by (i) properties of materials and particles, (ii) analysis and indicators, (iii) diagnostics, (iv) pollutant and analytical devices, and (v) treatment/ application. For an easy and clear access to the findings visualization of clusters and networks of connections are presented. The study includes a temporal dimension and identifies the trends over the years with an emphasis on the most recent developments. This paper provides useful insights for those who wish to form a better understanding of the research trends in the area of biosensors.Keywords: bibliometrics, biosensors, meta-review, statistical analysis, trends visualization
Procedia PDF Downloads 2172032 Banking and Accounting Analysis Researches Effect on Environment and Income
Authors: Gerges Samaan Henin Abdalla
Abstract:
New methods of providing banking services to the customer have been introduced, such as online banking. Banks have begun to consider electronic banking (e-banking) as a way to replace some traditional branch functions by using the Internet as a new distribution channel. Some consumers have at least one account at multiple banks and access these accounts through online banking. To check their current net worth, clients need to log into each of their accounts, get detailed information, and work toward consolidation. Not only is it time consuming, but it is also a repeatable activity with a certain frequency. To solve this problem, the concept of account aggregation was added as a solution. Account consolidation in e-banking as a form of electronic banking appears to build a stronger relationship with customers. An account linking service is generally referred to as a service that allows customers to manage their bank accounts held at different institutions via a common online banking platform that places a high priority on security and data protection. The article provides an overview of the account aggregation approach in e-banking as a new service in the area of e-banking.Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise development
Procedia PDF Downloads 572031 Hear My Voice: The Educational Experiences of Disabled Students
Authors: Karl Baker-Green, Ian Woolsey
Abstract:
Historically, a variety of methods have been used to access the student voice within higher education, including module evaluations and informal classroom feedback. However, currently, the views articulated in student-staff-committee meetings bear the most weight and can therefore have the most significant impact on departmental policy. Arguably, these forums are exclusionary as several students, including those who experience severe anxiety, might feel unable to participate in this face-to-face (large) group activities. Similarly, students who declare a disability, but are not in possession of a learning contract, are more likely to withdraw from their studies than those whose additional needs have been formally recognised. It is also worth noting that whilst the number of disabled students in Higher Education has increased in recent years, the percentage of those who have been issued a learning contract has decreased. These issues foreground the need to explore the educational experiences of students with or without a learning contract in order to identify their respective aspirations and needs and therefore help shape education policy. This is in keeping with the ‘Nothing about us without us’, agenda, which recognises that disabled individuals are best placed to understand their own requirements and the most effective strategies to meet these.Keywords: education, student voice, student experience, student retention
Procedia PDF Downloads 942030 Lessons Learned from Ransomware-as-a-Service (RaaS) Organized Campaigns
Authors: Vitali Kremez
Abstract:
The researcher monitored an organized ransomware campaign in order to gain significant visibility into the tactics, techniques, and procedures employed by a campaign boss operating a ransomware scheme out of Russia. As the Russian hacking community lowered the access requirements for unsophisticated Russian cybercriminals to engage in ransomware campaigns, corporations and individuals face a commensurately greater challenge of effectively protecting their data and operations from being held ransom. This report discusses two notorious ransomware campaigns. Though the loss of data can be devastating, the findings demonstrate that sending ransom payments does not always help obtain data. Key learnings: 1. From the ransomware affiliate perspective, such campaigns have significantly lowered the barriers for entry for low-tier cybercriminals. 2. Ransomware revenue amounts are not as glamorous and fruitful as they are often publicly reported. Average ransomware crime bosses make only $90K per year on average. 3. Data gathered indicates that sending ransom payments does not always help obtain data. 4. The talk provides the complete payout structure and Bitcoin laundering operation related to the ransomware-as-a-service campaign.Keywords: bitcoin, cybercrime, ransomware, Russia
Procedia PDF Downloads 1952029 Securing Healthcare IoT Devices and Enabling SIEM Integration: Addressing
Authors: Mubarak Saadu Nabunkari, Abdullahi Abdu Ibrahim, Muhammad Ilyas
Abstract:
This study looks at how Internet of Things (IoT) devices are used in healthcare to monitor and treat patients better. However, using these devices in healthcare comes with security problems. The research explores using Security Information and Event Management (SIEM) systems with healthcare IoT devices to solve these security challenges. Reviewing existing literature shows the current state of IoT security and emphasizes the need for better protection. The main worry is that healthcare IoT devices can be easily hacked, putting patient data and device functionality at risk. To address this, the research suggests a detailed security framework designed for these devices. This framework, based on literature and best practices, includes important security measures like authentication, data encryption, access controls, and anomaly detection. Adding SIEM systems to this framework helps detect threats in real time and respond quickly to incidents, making healthcare IoT devices more secure. The study highlights the importance of this integration and offers guidance for implementing healthcare IoT securely, efficiently, and effectively.Keywords: cyber security, threat intelligence, forensics, heath care
Procedia PDF Downloads 66