Search results for: access authorization
3231 Signature Verification System for a Banking Business Process Management
Authors: A. Rahaf, S. Liyakathunsia
Abstract:
In today’s world, unprecedented operational pressure is faced by banks that test the efficiency, effectiveness, and agility of their business processes. In a typical banking process, a person’s authorization is usually based on his signature on most all of the transactions. Signature verification is considered as one of the highly significant information needed for any bank document processing. Banks usually use Signature Verification to authenticate the identity of individuals. In this paper, a business process model has been proposed in order to increase the quality of the verification process and to reduce time and needed resources. In order to understand the current process, a survey has been conducted and distributed among bank employees. After analyzing the survey, a process model has been created using Bizagi modeler which helps in simulating the process after assigning time and cost of it. The outcomes show that the automation of signature verification process is highly recommended for a banking business process.Keywords: business process management, process modeling, quality, Signature Verification
Procedia PDF Downloads 4253230 Meta Root ID Passwordless Authentication Using ZKP Bitcoin Protocol
Authors: Saransh Sharma, Atharv Dekhne
Abstract:
Passwords stored on central services and hashed are prone to cyberattacks and hacks. Hence, given all these nuisances, there’s a need to eliminate character-based authentication protocols, which would ultimately benefit all developers as well as end-users.To replace this conventional but antiquated protocol with a secure alternative would be Passwordless Authentication. The meta root.id system creates a public and private key, of which the user is only able to access the private key. Further, after signing the key, the user sends the information over the API to the server, which checks its validity with the public key and grants access accordingly.Keywords: passwordless, OAuth, bitcoin, ZKP, SIN, BIP
Procedia PDF Downloads 953229 Market Access for Foreign Investment in Host States: Municipal Law and International Law
Authors: Qiang Ren
Abstract:
A growing number of states are improving domestic law to better protect and promote foreign investment by changing/upgrading the existing law. However, inconsistency occurs because the new law is different from the ‘old’ law. For example, China has issued an unprecedented Foreign Investment Law and several regulations allowing comprehensive market access for foreign investment in most energy sectors since 2020. However, some laws, rules, regulations, etc. enacted previously remain valid, and the provisions regulating foreign investment do not grant full market access to foreign investment as such. The inconsistency above makes it necessary to investigatehow the international investment treaty law and dispute settlement practice respond to the ‘inconsistency and conflict’ in municipal law andwhat remedy foreign investors can seek under international law if the investment is denied due to inconsistency. Ultimately, it aims to examine how international tribunals should balance the gradually developing legal system of host states and the protection of foreign investors and investments if the host states cannot provide consistency during such a transition period of law development. The research seeks to answer these questions by making a comparative analysis of domestic law on market access to foreign investment, international investment treaties, and dispute arbitral practice. The objective is to examine how international investment treaty law and international investment dispute settlement practice evaluate the conflicts in the municipal law of host states in the admission of foreign investment. It also explores the possibility of harmonisation among them.Keywords: municipal law, protect and promote foreign investment, international law, host states
Procedia PDF Downloads 943228 Enhancing Access to Microfinance for Housing Provision in the Informal Sector of North East Nigeria
Authors: Wilfred Emmannuel Dzasu, Sani Usman Kunya, Inuwa Yusuf Mohammed, Moses Jonathan Gambo
Abstract:
The research aimed at investigating and identifying the strategies for enhancing access to microfinance for housing provision in the informal sector of North East Nigeria, with a focus on addressing the critical issue of housing poverty and lack of access to affordable housing finance among low-income households in the informal sector. The study employed an exploratory sequential mixed method design, combining both qualitative and quantitative data collection and analysis techniques. In the qualitative phase, 12 participants from microfinance institutions (MFIs) in four selected states (Adamawa, Bauchi, Gombe, and Taraba) were interviewed. The interviews were conducted using an interview guide with open-ended questions and were recorded with the consent of the respondents. In the quantitative phase, a survey strategy was adopted to collect data from 500 questionnaires distributed to informal sector workers (ISWs) in the study area. A total of 350 questionnaires were returned, representing a 70.0% response rate. The most preferred strategy for improving access to housing microfinance among ISWs is aggressive awareness of housing financing options by MFIs, with a mean score of 4.213; the most important strategy for improving access to housing microfinance among MFIs is close monitoring and adequate supervision of housing loan beneficiaries by MFIs, with a mean score of 4.675. The study identified several government-related strategies that are necessary for enhancing access to housing microfinance, including the provision of grants and subsidized intervention funds for housing, improvement in infrastructures to aid housing developments, and adequate measures for checking inflation/price fluctuation of building materials. The study also identified several MFI-related strategies that are necessary for enhancing access to housing microfinance, including deliberate expansion in the capital bases of MFIs, adequate training and capacity development of MFIs staff on relevant skills in housing micro-financing, and introduction of loan products that suit the incremental building needs of informal sector workers. Overall, the study highlights the need for a combination of government-related and MFI-related strategies to enhance access to microfinance for housing provision in the informal sector of North East Nigeria.Keywords: finanace, microfinance, housing, North East Nigeria
Procedia PDF Downloads 253227 Nurse Practitioner Led Pediatric Primary Care Clinic in a Tertiary Care Setting: Improving Access and Health Outcomes
Authors: Minna K. Miller, Chantel. E. Canessa, Suzanna V. McRae, Susan Shumay, Alissa Collingridge
Abstract:
Primary care provides the first point of contact and access to health care services. For the pediatric population, the goal is to help healthy children stay healthy and to help those that are sick get better. Primary care facilitates regular well baby/child visits; health promotion and disease prevention; investigation, diagnosis and management of acute and chronic illnesses; health education; both consultation and collaboration with, and referral to other health care professionals. There is a protective association between regular well-child visit care and preventable hospitalization. Further, low adherence to well-child care and poor continuity of care are independently associated with increased risk of hospitalization. With a declining number of family physicians caring for children, and only a portion of pediatricians providing primary care services, it is becoming increasingly difficult for children and their families to access primary care. Nurse practitioners are in a unique position to improve access to primary care and improve health outcomes for children. Limited literature is available on the nurse practitioner role in primary care pediatrics. The purpose of this paper is to describe the development, implementation and evaluation of a Nurse Practitioner-led pediatric primary care clinic in a tertiary care setting. Utilizing the participatory, evidence-based, patient-focused process for advanced practice nursing (PEPPA framework), this paper highlights the results of the initial needs assessment/gap analysis, the new service delivery model, populations served, and outcome measures.Keywords: access, health outcomes, nurse practitioner, pediatric primary care, PEPPA framework
Procedia PDF Downloads 4943226 Exploring Data Stewardship in Fog Networking Using Blockchain Algorithm
Authors: Ruvaitha Banu, Amaladhithyan Krishnamoorthy
Abstract:
IoT networks today solve various consumer problems, from home automation systems to aiding in driving autonomous vehicles with the exploration of multiple devices. For example, in an autonomous vehicle environment, multiple sensors are available on roads to monitor weather and road conditions and interact with each other to aid the vehicle in reaching its destination safely and timely. IoT systems are predominantly dependent on the cloud environment for data storage, and computing needs that result in latency problems. With the advent of Fog networks, some of this storage and computing is pushed to the edge/fog nodes, saving the network bandwidth and reducing the latency proportionally. Managing the data stored in these fog nodes becomes crucial as it might also store sensitive information required for a certain application. Data management in fog nodes is strenuous because Fog networks are dynamic in terms of their availability and hardware capability. It becomes more challenging when the nodes in the network also live a short span, detaching and joining frequently. When an end-user or Fog Node wants to access, read, or write data stored in another Fog Node, then a new protocol becomes necessary to access/manage the data stored in the fog devices as a conventional static way of managing the data doesn’t work in Fog Networks. The proposed solution discusses a protocol that acts by defining sensitivity levels for the data being written and read. Additionally, a distinct data distribution and replication model among the Fog nodes is established to decentralize the access mechanism. In this paper, the proposed model implements stewardship towards the data stored in the Fog node using the application of Reinforcement Learning so that access to the data is determined dynamically based on the requests.Keywords: IoT, fog networks, data stewardship, dynamic access policy
Procedia PDF Downloads 593225 Bit Error Rate (BER) Performance of Coherent Homodyne BPSK-OCDMA Network for Multimedia Applications
Authors: Morsy Ahmed Morsy Ismail
Abstract:
In this paper, the structure of a coherent homodyne receiver for the Binary Phase Shift Keying (BPSK) Optical Code Division Multiple Access (OCDMA) network is introduced based on the Multi-Length Weighted Modified Prime Code (ML-WMPC) for multimedia applications. The Bit Error Rate (BER) of this homodyne detection is evaluated as a function of the number of active users and the signal to noise ratio for different code lengths according to the multimedia application such as audio, voice, and video. Besides, the Mach-Zehnder interferometer is used as an external phase modulator in homodyne detection. Furthermore, the Multiple Access Interference (MAI) and the receiver noise in a shot-noise limited regime are taken into consideration in the BER calculations.Keywords: OCDMA networks, bit error rate, multiple access interference, binary phase-shift keying, multimedia
Procedia PDF Downloads 1753224 Right to Information in Egypt and the Prospects of Renegotiating a New Social Order
Authors: Farida Ibrahim
Abstract:
Right to information is the public's right to know through having access to public information held by state bodies. Recognized as a cornerstone in transparent, participatory and open democracies, the right to information is increasingly perceived today as an emerging human right on the international level. While this right is conceptualized in a range of different contexts, the paper focuses on its conceptualization as a force for socio-economic change for disadvantaged groups. The paper's goal is study the instrumental capacity of this right in empowering the public to access state-held information pertinent to their socio-economic rights. In this regard, the paper views the right to information as an inclusionary tool that is capable of spurring inclusion for individuals excluded from the ambits of both: public participation and social justice. For exploring this, the paper examines the advocacy role played by civil society groups in furthering this instrumental capacity. In particular, the paper presents a focused account on the Egyptian case. While Egypt has recently adopted its constitutional provision on access to information, doubts arise on Egyptian citizens' genuine ability to access information held by state bodies. The politico-economic environment, long term culture of bureaucratic secrecy, and legal framework do not provide promising outcomes on access to public information. Within the particular context of the Egyptian case, this paper questions the extent to which civil society in Egypt is capable of instrumentally employing the political opportunity offered by the constitutional entitlement to information access for pressuring public authorities to disclose information. Through four lawsuits brought by civil society groups in Egypt, the paper argues that the right to information has instrumentally provided civil society actors with new domains of mobilization for furthering the realization of social and economic rights, and ultimately, for renegotiating a new social order lining the relationship between the Egyptian state and its citizens marginalized by socio-economic imbalances.Keywords: civil society, Egypt, right to information, socio-economic rights
Procedia PDF Downloads 2813223 Green Public Procurement in Open Access and Traditional Journals: A Comparative Bibliometric Analysis
Authors: Alonso-Cañadas J., Galán-Valdivieso F., Saraite-Sariene L., García-Tabuyo M., Alonso-Morales N.
Abstract:
Green Public Procurement (GPP) has recently gained attention in the academic and policy arenas since climate change has shown the need to be addressed by both private companies and public entities. Such growing interest motivates this article, aiming to explore the most influential journals, publishers, categories, and topics, as well as the recent trends and future research lines in GPP. Based on the Web of Science database, 578 articles from 2004 to February 2022 devoted to GPP are analyzed using Bibliometrix, an R-tool to perform bibliometric analysis, and Google’s Big Query and Data Studio. This article introduces a variety of findings. First, the most influential journals by far are “Journal of Cleaner Production” and “Sustainability,” differing in that the latter is open access while the former publishes via traditional subscription. This result also occurs regarding the main publishers (Elsevier and MDPI). These features lead us to split the sample into open-access journals and traditional journals to deepen into the similarities and differences between them, confirming that traditional journals exhibit a higher degree of influence in the literature than their open-access counterparts in terms of the number of documents, number of citations and impact (according to the H index). Second, this research also highlights the recent emergence of green-related terms (sustainable, environment) and, parallelly, the increase in categorizing GPP papers in “green” WoS categories, particularly since 2019. Finally, a number of related topics are emerging and will lead the research, such as food security, infrastructures, and implementation barriers of GPP.Keywords: bibliometric analysis, green public procurement, open access, traditional journals
Procedia PDF Downloads 1043222 A Comparative Analysis of Self-help Housing and Government Mass Housing Scheme in Addressing the Challenge of Housing Access in Mararaba Area of Karu Local Government Area, Nasarawa State, Nigeria
Authors: John Abubakar
Abstract:
Access to decent housing is a global challenge. An estimated one billion people currently live in slum settlements globally. About 80 percent of these slum dwellers are in Asia and Africa. Nigeria accounts for a significant percentage of African slum dwellers because of its size. Addressing the challenge of slum settlement in Nigeria can have far reaching positive implications in Africa. A major slum settlement in Nigeria is Mararaba slum in Karu local government of Nasarawa state. The importance of this slum settlement hinges on its proximity to Abuja, Nigeria’s capital city. This study is an attempt at identifying the impact of self-help housing and government mass housing scheme in addressing the problem of housing access in Mararaba area of Karu local government, Nasarawa state. The research method used is the content analysis of existing literature. After the review of existing literature, the paper argues that self-help house is more impactful in addressing housing access in Mararaba area of Karu local government. Therefore, self-help housing should be recognized and incorporated into the housing policy of Nasarawa state. Both self-help housing and government mass housing programs are reviewed comparatively, and their strengths and weaknesses analyses.Keywords: slum settlement, informal settlement, progressive improvement, holistic planning
Procedia PDF Downloads 783221 Impact of Saline Water and Water Restriction in Laying Hens
Authors: Reza Vakili
Abstract:
This experiment was conducted to investigate the effect of duration water restriction of drinking water and salinity level on production performance, egg quality and biochemical and hematological blood indices of laying hens. A total of 240 Hy-Line laying hens were used in a completely randomized design with a 2 × 2 factorial arrangement of treatments. Experimental treatments were: 1) free access to drinking water and a low level of salinity (TDS below 500 mg/L) (FAW+LS), 2) free access to water and a high level of salinity (TDS above 1500 mg/L), (FAW+HS), 3) 12 h nightly water restriction and a low level of salinity (LAW+LS), and 4) 12 h water restriction and a high level of salinity (LAW+HS). Intake of feed, percentage of egg production and egg weight and mass were not affected by water restriction or salinity level (P > 0.05), however, a trend (P < 0.01) for lower water consumption was detected in water-restricted hens, regardless of salinity level (213 vs 187). A tendency for lower eggshell and yolk weights was observed in hens that had limited access to water with high salinity compared to those had free access to high saline water (P = 0.08). Serum total protein and glucose concentrations significantly reduced (P < 0.05) in hens drank high salinity water, regardless of water restriction. Moreover, saline water increased the concentration of uric acid, creatinine, and cholesterol when compared to low salinity drank-hens (P < 0.05). The concentrations of ALT and AST increased with salinity level (P < 0.05) and water restriction caused an increment in AST content (P < 0.05). In conclusion, Hy-Line laying hens could withstand water restriction, whilst could not tolerate water salinity of about 1500 mg/L.Keywords: chemical pollutants, eggs, laying hens, salinity, water quality
Procedia PDF Downloads 233220 Design of an Ensemble Learning Behavior Anomaly Detection Framework
Authors: Abdoulaye Diop, Nahid Emad, Thierry Winter, Mohamed Hilia
Abstract:
Data assets protection is a crucial issue in the cybersecurity field. Companies use logical access control tools to vault their information assets and protect them against external threats, but they lack solutions to counter insider threats. Nowadays, insider threats are the most significant concern of security analysts. They are mainly individuals with legitimate access to companies information systems, which use their rights with malicious intents. In several fields, behavior anomaly detection is the method used by cyber specialists to counter the threats of user malicious activities effectively. In this paper, we present the step toward the construction of a user and entity behavior analysis framework by proposing a behavior anomaly detection model. This model combines machine learning classification techniques and graph-based methods, relying on linear algebra and parallel computing techniques. We show the utility of an ensemble learning approach in this context. We present some detection methods tests results on an representative access control dataset. The use of some explored classifiers gives results up to 99% of accuracy.Keywords: cybersecurity, data protection, access control, insider threat, user behavior analysis, ensemble learning, high performance computing
Procedia PDF Downloads 1283219 Small Micro and Medium Enterprises Perception-Based Framework to Access Financial Support
Authors: Melvin Mothoa
Abstract:
Small Micro and Medium Enterprises are very significant for the development of their market economies. They are the main creators of the new working places, and they present a vital core of the market economy in countries across the globe. Access to finance is identified as crucial for small, micro, and medium-sized enterprises for their growth and innovation. This paper is conceived to propose a perception-based SMME framework to aid in access to financial support. Furthermore, the study will address issues that impede SMMEs in South Africa from obtaining finance from financial institutions. The framework will be tested against data collected from 200 Small Micro & Medium Enterprises in the Gauteng province of South Africa. The study adopts a quantitative method, and the delivery of self-administered questionnaires to SMMEs will be the primary data collection tool. Structural equation modeling will be used to further analyse the data collected.Keywords: finance, small business, growth, development
Procedia PDF Downloads 1113218 Knowledge Based Automated Software Engineering Platform Used for the Development of Bulgarian E-Customs
Authors: Ivan Stanev, Maria Koleva
Abstract:
Described are challenges to the Bulgarian e-Customs (BeC) related to low level of interoperability and standardization, inefficient use of available infrastructure, lack of centralized identification and authorization, extremely low level of software process automation, and insufficient quality of data stored in official registers. The technical requirements for BeC are prepared with a focus on domain independent common platform, specialized customs and excise components, high scalability, flexibility, and reusability. The Knowledge Based Automated Software Engineering (KBASE) Common Platform for Automated Programming (CPAP) is selected as an instrument covering BeC requirements for standardization, programming automation, knowledge interpretation and cloud computing. BeC stage 3 results are presented and analyzed. BeC.S3 development trends are identified.Keywords: service oriented architecture, cloud computing, knowledge based automated software engineering, common platform for automated programming, e-customs
Procedia PDF Downloads 3713217 Deep Reinforcement Learning-Based Computation Offloading for 5G Vehicle-Aware Multi-Access Edge Computing Network
Authors: Ziying Wu, Danfeng Yan
Abstract:
Multi-Access Edge Computing (MEC) is one of the key technologies of the future 5G network. By deploying edge computing centers at the edge of wireless access network, the computation tasks can be offloaded to edge servers rather than the remote cloud server to meet the requirements of 5G low-latency and high-reliability application scenarios. Meanwhile, with the development of IOV (Internet of Vehicles) technology, various delay-sensitive and compute-intensive in-vehicle applications continue to appear. Compared with traditional internet business, these computation tasks have higher processing priority and lower delay requirements. In this paper, we design a 5G-based Vehicle-Aware Multi-Access Edge Computing Network (VAMECN) and propose a joint optimization problem of minimizing total system cost. In view of the problem, a deep reinforcement learning-based joint computation offloading and task migration optimization (JCOTM) algorithm is proposed, considering the influences of multiple factors such as concurrent multiple computation tasks, system computing resources distribution, and network communication bandwidth. And, the mixed integer nonlinear programming problem is described as a Markov Decision Process. Experiments show that our proposed algorithm can effectively reduce task processing delay and equipment energy consumption, optimize computing offloading and resource allocation schemes, and improve system resource utilization, compared with other computing offloading policies.Keywords: multi-access edge computing, computation offloading, 5th generation, vehicle-aware, deep reinforcement learning, deep q-network
Procedia PDF Downloads 1173216 Exploring the Gap between Coverage, Access, Utilization of Long Lasting Insecticidal Nets (LLINs) among the People of Malaria Endemic Districts in Bangladesh
Authors: Fouzia Khanam, Tridib Chowdhury, Belal Hossain, Sajedur Rahman, Mahfuzar Rahman
Abstract:
Introduction: Over the last decades, the world has achieved a noticeable success in preventing malaria. Nevertheless, malaria, a vector-borne infectious disease, remains a major public health burden globally as well as in Bangladesh. To achieve the goal of eliminating malaria, BRAC, a leading organization of Bangladesh in collaboration with government, is distributing free LLIN to the 13 endemic districts of the country. The study was conducted with the aim of assessing the gap between coverage, access, and utilization of LLIN among the people of the 13 malaria endemic districts of Bangladesh. Methods: This baseline study employed a community cross-sectional design triangulated with qualitative methods to measure households’ ownership, access and use of 13 endemic districts. A multistage cluster random sampling was employed for the quantitative part and for qualitative part a purposive sampling strategy was done. Thus present analysis included 2640 households encompassing a total of 14475 populations. Data were collected using a pre-tested structured questionnaire through one on one face-to-face interview with respondents. All analyses were performed using STATA (Version 13.0). For the qualitative part participant observation, in-depth interview, focus group discussion, key informant interview and informal interview was done to gather the contextual data. Findings: According to our study, 99.8% of households possessed at least one-bed net in both study areas. 77.4% households possessed at least two LLIN and 43.2% households had access to LLIN for all the members. So the gap between coverage and access is 34%. 91.8% people in the 13 districts and 95.1% in Chittagong Hill Tracts areas reported having had slept under a bed net the night before interviewed. And despite the relatively low access, in 77.8% of households, all the members were used the LLIN the previous night. This higher utilization compared to access might be due to the increased awareness among the community people regarding LLIN uses. However, among those people with sufficient access to LLIN, 6% of them still did not use the LLIN which reflects the behavioral failure that needs to be addressed. The major reasons for not using LLIN, identified by both qualitative and quantitative findings, were insufficient access, sleeping or living outside the home, migration, perceived low efficacy of LLIN, fear of physical side effects or feeling uncomfortable. Conclusion: Given that LLIN access and use was a bit short of the targets, it conveys important messages to the malaria control program. Targeting specific population segments and groups for achieving expected LLIN coverage is very crucial. And also, addressing behavior failure by well-designed behavioral change interventions is mandatory.Keywords: long lasting insecticide net, malaria, malaria control programme, World Health Organisation
Procedia PDF Downloads 1873215 Towards Women Empowerment: An Examination of Gender Equity and Access to Tertiary Education in Nigeria
Authors: Funmilayo Florence Adegoke
Abstract:
The study looks into the issue of gender equity among the staff and students of tertiary institutions in Osun State, Nigeria, specifically the study examined the opinion of the staff and students concerning equity of gender and also examined access to tertiary Education and related courses vis-à-vis gender. A total of 800 subjects consisting of six hundred and forty students, eighty lecturers and eighty non-teaching staff were drawn from four tertiary institutions namely a University, a Polytechnic and two Colleges of Education in the State. The main research instruments used for the study are two sets of questionnaires (one for the students and one for the staff) and records of students’ analyzed for the purpose of testing the research questions that were raised. The result showed among others that the staff and the students opined that there are generally inequalities in the attributes of the two genders. It was also found that significantly more boys enrolled in science and related courses than girls. Based on the findings, useful recommendations that would enhance the contribution of both male and female to science education and the nation as a whole were made.Keywords: gender, access, tertiary, education, Nigeria
Procedia PDF Downloads 3933214 Providing Open Access for Scholarly Information in Libya
Authors: Mohamed Abolgasem Arteimi, Ahlam Al-Tajori
Abstract:
This paper describes an ongoing project at the Libyan Academy. The project aims to build digital library for thesis and dissertations (ETD). The researchers developed a system based on Greenstone open source systems for building ETD digital library. A metadata for theses and dissertations was developed. The paper addresses issues related to project design, development and user satisfaction. Conclusions highlighted some important lessons learned to date.Keywords: digital library, electronic theses and dissertations, open access, ETD, metadata
Procedia PDF Downloads 3163213 Water Access and Food Security: A Cross-Sectional Study of SSA Countries in 2017
Authors: Davod Ahmadi, Narges Ebadi, Ethan Wang, Hugo Melgar-Quiñonez
Abstract:
Compared to the other Least Developed Countries (LDCs), major countries in sub-Saharan Africa (SSA) have limited access to the clean water. People in this region, and more specifically females, suffer from acute water scarcity problems. They are compelled to spend too much of their time bringing water for domestic use like drinking and washing. Apart from domestic use, water through affecting agriculture and livestock contributes to the food security status of people in vulnerable regions like SSA. Livestock needs water to grow, and agriculture requires enormous quantities of water for irrigation. The main objective of this study is to explore the association between access to water and individuals’ food security status. Data from 2017 Gallup World Poll (GWP) for SSA were analyzed (n=35,000). The target population in GWP is the entire civilian, non-institutionalized, aged 15 and older population. All samples selection is probability based and nationally representative. The Gallup surveys an average of 1,000 samples of individuals per country. Three questions related to water (i.e., water quality, availability of water for crops and availability of water for livestock) were used as the exposure variables. Food Insecurity Experience Scale (FIES) was used as the outcome variable. FIES measures individuals’ food security status, and it is composed of eight questions with simple dichotomous responses (1=Yes and 0=No). Different statistical analyses such as descriptive, crosstabs and binary logistic regression, form the basis of this study. Results from descriptive analyses showed that more than 50% of the respondents had no access to enough water for crops and livestock. More than 85% of respondents were categorized as “food insecure”. Findings from cross-tabulation analyses showed that food security status was significantly associated with water quality (0.135; P=0.000), water for crops (0.106; P=0.000) and water for livestock (0.112; P=0.000). In regression analyses, the probability of being food insecure increased among people who expressed no satisfaction with water quality (OR=1.884 (OR=1.768-2.008)), not enough water for crops (OR=1.721 (1.616-1.834)) and not enough water for livestock (OR=1.706 (1.819)). In conclusion, it should note that water access affects food security status in SSA.Keywords: water access, agriculture, livestock, FIES
Procedia PDF Downloads 1503212 Implementing Zero-Trust Security with Passwordless Authentication Gateways for Privacy-Oriented Organizations Using Keycloak
Authors: Andrei Bogdan Stanescu, Laura Diaconescu
Abstract:
With the increasing concerns about data breaches and privacy violations, organizations seek robust security measures to protect sensitive information. This research paper highlights the importance of implementing the Zero-Trust Security methodology using Passwordless Authentication Gateways that leverage Keycloak, an open-source Identity and Access Management (IAM) software, as a solution to address the security challenges these organizations face. The paper presents the successful implementation and deployment of such a solution in a mid-size, privacy-oriented organization. The implementation resulted in significant security improvements, reducing the risk of unauthorized access and potential data breaches. Moreover, user feedback indicated enhanced convenience and streamlined authentication experiences. The results of this study bring solid contributions in the field of cybersecurity and provide practical insights for organizations aiming to strengthen their security practices.Keywords: identity and access management, passwordless authentication, privacy, zero-trust security
Procedia PDF Downloads 913211 Analysis of Delivery of Quad Play Services
Authors: Rahul Malhotra, Anurag Sharma
Abstract:
Fiber based access networks can deliver performance that can support the increasing demands for high speed connections. One of the new technologies that have emerged in recent years is Passive Optical Networks. This paper is targeted to show the simultaneous delivery of triple play service (data, voice, and video). The comparative investigation and suitability of various data rates is presented. It is demonstrated that as we increase the data rate, number of users to be accommodated decreases due to increase in bit error rate.Keywords: FTTH, quad play, play service, access networks, data rate
Procedia PDF Downloads 4143210 Racial and Ethnic Health Disparities: An Investigation of the Relationship between Race, Ethnicity, Health Care Access, and Health Status
Authors: Dorcas Matowe
Abstract:
Inequality in health care for racial and ethnic minorities continues to be a growing concern for many Americans. Some of the barriers hindering the elimination of health disparities include lack of insurance, socioeconomic status (SES), and racism. This study will specifically focus on the association between some of these factors- health care access, which includes insurance coverage and frequency of doctor visits, race, ethnicity, and health status. The purpose of this study will be to address the following questions: is having health insurance associated with increased doctor visits? Are racial and ethnic minorities with health insurance more or less likely to see a doctor? Is the association between having health insurance moderated by being an ethnic minority? Given the current implications of the 2010 Affordable Care Act, this study will highlight the need to prioritize health care access for minorities and confront institutional racism. Critical Race Theory (CRT) will demonstrate how racism has reinforced these health disparities. This quantitative study design will analyze secondary data from the 2015 Behavioral Risk Factor Surveillance System (BRFSS) questionnaire, a telephone survey conducted annually in all 50 states and three US territories by state health departments in conjunction with the Center for Disease Control (CDC). Non-identifying health-related data is gathered annually from over 400,000 adults 18 years and above about their health status and use of preventative services. Through Structural Equation Modeling (SEM), the relationship between the predictor variables of health care access, race, and ethnicity, the criterion variable of health status, and the latent variables of emotional support and life satisfaction will be examined. It is hypothesized that there will be an interaction between certain racial and ethnic minorities who went to see a doctor, had insurance coverage, experienced racism, and the quality of their health status, emotional support, and life satisfaction.Keywords: ethnic minorities, health disparities, health access, racism
Procedia PDF Downloads 2733209 Development of a Secured Telemedical System Using Biometric Feature
Authors: O. Iyare, A. H. Afolayan, O. T. Oluwadare, B. K. Alese
Abstract:
Access to advanced medical services has been one of the medical challenges faced by our present society especially in distant geographical locations which may be inaccessible. Then the need for telemedicine arises through which live videos of a doctor can be streamed to a patient located anywhere in the world at any time. Patients’ medical records contain very sensitive information which should not be made accessible to unauthorized people in order to protect privacy, integrity and confidentiality. This research work focuses on a more robust security measure which is biometric (fingerprint) as a form of access control to data of patients by the medical specialist/practitioner.Keywords: biometrics, telemedicine, privacy, patient information
Procedia PDF Downloads 2893208 Totally Implantable Venous Access Device for Long Term Parenteral Nutrition in a Patient with High Output Enterocutaneous Fistula Due to Advanced Malignancy
Authors: Puneet Goyal, Aarti Agarwal
Abstract:
Background and Objective: Nutritional support is an integral part of palliative care of advanced non-resectable abdominal malignancy patients, though is frequently neglected aspect. Non-Healing high output Entero-cutaneous fistulas sometimes require long term parenteral nutrition, to take care of catabolism and replacement of nutrients. We present a case of inoperable pancreatic malignancy with high output entero-cutaneous fistula, which was provided parenteral nutritional support with the use of Totally Implantable Venous Access Device (TIVAD). Method and Results: 55 year old man diagnosed with carcinoma pancreas had developed high entero-cutaneous fistula. His tumor was found to be inoperable and was on total parenteral nutrition through routine central line. This line was difficult to maintain as he required it for a long term TPN. He was planned to undergo Totally Implantable Venous Access Device (TIVAD) implantation. 8Fr single lumen catheter with Groshong non-return Valve (Bard Access Systems, Inc. USA) was inserted through right internal jugular vein, under fluoroscopic guidance. The catheter was tunneled subcutaneously and brought towards infraclavicular pocket, cut at appropriate length and connected to port and locked. Port was sutured in floor of pocket. Free flow of blood aspirated, flushed with heparinized saline. There was no kink observed in entire length of catheter under fluoroscopy. Skin over infraclavicular pocket was sutured. Long term catheter care and associated risks were explained to patient and relatives. Patient continued to receive total parenteral nutrition as well as other supportive therapy though TIVAD for next 6 weeks, till his demise. Conclusion: TIVADs are standard of care for long term venous access solutions in cancer patients requiring chemotherapy. In this case, we extended its use for providing parenteral nutrition and other supportive therapy. TIVADs can be implanted in advanced cancer patients for providing venous access solution required for various palliative treatments and medications. This will help in improving quality of life and satisfaction amongst terminally ill cancer patients.Keywords: parenteral nutrition, totally implantable venous access device, long term venous access, interventions in anesthesiology
Procedia PDF Downloads 2473207 Multicenter Evaluation of the ACCESS Anti-HCV Assay on the DxI 9000 ACCESS Immunoassay Analyzer, for the Detection of Hepatitis C Virus Antibody
Authors: Dan W. Rhodes, Juliane Hey, Magali Karagueuzian, Florianne Martinez, Yael Sandowski, Vanessa Roulet, Mahmoud Badawi, Mohammed-Amine Chakir, Valérie Simon, Jérémie Gautier, Françoise Le Boulaire, Catherine Coignard, Claire Vincent, Sandrine Greaume, Isabelle Voisin
Abstract:
Background: Beckman Coulter, Inc. (BEC) has recently developed a fully automated second-generation anti-HCV test on a new immunoassay platform. The objective of this multicenter study conducted in Europe was to evaluate the performance of the ACCESS anti-HCV assay on the recently CE-marked DxI 9000 ACCESS Immunoassay Analyzer as an aid in the diagnosis of HCV (Hepatitis C Virus) infection and as a screening test for blood and plasma donors. Methods: The clinical specificity of the ACCESS anti-HCV assay was determined using HCV antibody-negative samples from blood donors and hospitalized patients. Sample antibody status was determined by a CE-marked anti-HCV assay (Abbott ARCHITECTTM anti-HCV assay or Abbott PRISM HCV assay) with an additional confirmation method (Immunoblot testing with INNO-LIATM HCV Score - Fujirebio), if necessary, according to pre-determined testing algorithms. The clinical sensitivity was determined using known HCV antibody-positive samples, identified positive by Immunoblot testing with INNO-LIATM HCV Score - Fujirebio. HCV RNA PCR or genotyping was available on all Immunoblot positive samples for further characterization. The false initial reactive rate was determined on fresh samples from blood donors and hospitalized patients. Thirty (30) commercially available seroconversion panels were tested to assess the sensitivity for early detection of HCV infection. The study was conducted from November 2019 to March 2022. Three (3) external sites and one (1) internal site participated. Results: Clinical specificity (95% CI) was 99.7% (99.6 – 99.8%) on 5852 blood donors and 99.0% (98.4 – 99.4%) on 1527 hospitalized patient samples. There were 15 discrepant samples (positive on ACCESS anti-HCV assay and negative on both ARCHITECT and Immunoblot) observed with hospitalized patient samples, and of note, additional HCV RNA PCR results showed five (5) samples had positive HCV RNA PCR results despite the absence of HCV antibody detection by ARCHITECT and Immunoblot, suggesting a better sensitivity of the ACCESS anti-HCV assay with these five samples compared to the ARCHITECT and Immunoblot anti-HCV assays. Clinical sensitivity (95% CI) on 510 well-characterized, known HCV antibody-positive samples was 100.0% (99.3 – 100.0%), including 353 samples with known HCV genotypes (1 to 6). The overall false initial reactive rate (95% CI) on 6630 patient samples was 0.02% (0.00 – 0.09%). Results obtained on 30 seroconversion panels demonstrated that the ACCESS anti-HCV assay had equivalent sensitivity performances, with an average bleed difference since the first reactive bleed below one (1), compared to the ARCHITECTTM anti-HCV assay. Conclusion: The newly developed ACCESS anti-HCV assay from BEC for use on the DxI 9000 ACCESS Immunoassay Analyzer demonstrated high clinical sensitivity and specificity, equivalent to currently marketed anti-HCV assays, as well as a low false initial reactive rate.Keywords: DxI 9000 ACCESS Immunoassay Analyzer, HCV, HCV antibody, Hepatitis C virus, immunoassay
Procedia PDF Downloads 1003206 Pupil with Special Educational Needs Camouflaging and Teacher Training of University Teaching Staff: Practical Reflection
Authors: Ana Mercedes Vernia Carrasco
Abstract:
The objective of this work is to reflect through the theoretical framework on the access to the university for the formation of a degree in a teacher of primary education. The University Access Tests in Spain evaluate a series of skills and competencies in writing, which leave aside the sample of another set of skills and tools that this type of test cannot evaluate. In the last years, a very much diversified student body has arrived in the classrooms of the Universities. Nowadays, talking about special education means attending to the changes that are being experienced in this area. At present, the educational model focuses on the reinforcement by the educational institutions so that they form the students according to their personal characteristics and that it is not the students that must adapt to the system. A bibliographic review plus some years of experience in training for the future teacher allows us to make an initial assessment about the lack of rigor in the tests of access to the university. In conclusion, we can say that, although we are not a specialist in the type of Special Educational Needs that can manifest the students, therefore, we understand that teacher today needs training and support to develop their teaching with the best quality possible. These teacher and student needs also imply more institutional support.Keywords: training, special needs, didactics, music
Procedia PDF Downloads 973205 A Proposal of Ontology about Brazilian Government Transparency Portal
Authors: Estela Mayra de Moura Vianna, Thiago José Tavares Ávila, Bruno Morais Silva, Diego Henrique Bezerra, Paulo Henrique Gomes Silva, Alan Pedro da Silva
Abstract:
The Brazilian Federal Constitution defines the access to information as a crucial right of the citizen and the Law on Access to Public Information, which regulates this right. Accordingly, the Fiscal Responsibility Act, 2000, amended in 2009 by the “Law of Transparency”, began demanding a wider disclosure of public accounts for the society, including electronic media for public access. Thus, public entities began to create "Transparency Portals," which aim to gather a diversity of data and information. However, this information, in general, is still published in formats that do not simplify understanding of the data by citizens and that could be better especially available for audit purposes. In this context, a proposal of ontology about Brazilian Transparency Portal can play a key role in how these data will be better available. This study aims to identify and implement in ontology, the data model about Transparency Portal ecosystem, with emphasis in activities that use these data for some applications, like audits, press activities, social government control, and others.Keywords: audit, government transparency, ontology, public sector
Procedia PDF Downloads 5063204 Literature Review on the Barriers to Access Credit for Small Agricultural Producers and Policies to Mitigate Them in Developing Countries
Authors: Margarita Gáfaro, Karelys Guzmán, Paola Poveda
Abstract:
This paper establishes the theoretical aspects that explain the barriers to accessing credit for small agricultural producers in developing countries and identifies successful policy experiences to mitigate them. We will test two hypotheses. The first one is that information asymmetries, high transaction costs and high-risk exposure limit the supply of credit to small agricultural producers in developing countries. The second hypothesis is that low levels of financial education and productivity and high uncertainty about the returns of agricultural activity limit the demand for credit. To test these hypotheses, a review of the theoretical and empirical literature on access to rural credit in developing countries will be carried out. The first part of this review focuses on theoretical models that incorporate information asymmetries in the credit market and analyzes the interaction between these asymmetries and the characteristics of the agricultural sector in developing countries. Some of the characteristics we will focus on are the absence of collateral, the underdevelopment of the judicial systems and insurance markets, and the high dependence on climatic factors of production technologies. The second part of this review focuses on the determinants of credit demand by small agricultural producers, including the profitability of productive projects, security conditions, risk aversion or loss, financial education, and cognitive biases, among others. There are policies that focus on resolving these supply and demand constraints and managing to improve credit access. Therefore, another objective of this paper is to present a review of effective policies that have promoted access to credit for smallholders in the world. For this, information available in policy documents will be collected. This information will be complemented by interviews with officials in charge of the design and execution of these policies in a subset of selected countries. The information collected will be analyzed in light of the conceptual framework proposed in the first two parts of this section. The barriers to access to credit that each policy attempts to resolve and the factors that could explain its effectiveness will be identified.Keywords: agricultural economics, credit access, smallholder, developing countries
Procedia PDF Downloads 673203 Understanding ICT Behaviors among Health Workers in Sub-Saharan Africa: A Cross-Sectional Study for Laboratory Persons in Uganda
Authors: M. Kasusse, M. Rosette, E. Burke, C. Mwangi, R. Batamwita, N. Tumwesigye, S. Aisu
Abstract:
A cross-sectional survey to ascertain the capacity of laboratory persons in using ICTs was conducted in 15 Ugandan districts (July-August 2013). A self-administered questionnaire served as data collection tool, interview guide and observation checklist. 69 questionnaires were filled, 12 interviews conducted, 45 HC observed. SPSS statistics 17.0 and SAS 9.2 software were used for entry and analyses. 69.35% of participants find it difficult to access a computer at work. Of the 30.65% who find it easy to access a computer at work, a significant 21.05% spend 0 hours on a computer daily. 60% of the participants cannot access internet at work. Of the 40% who have internet at work, a significant 20% lack email address but 20% weekly read emails weekly and 48% daily. It is viable/feasible to pilot informatics projects as strategies to build bridges develop skills for e-health landscape in laboratory services with a bigger financial muscle.Keywords: ICT behavior, clinical laboratory persons, Sub-Saharan Africa, Uganda
Procedia PDF Downloads 2313202 Repositioning Nigerian University Libraries for Effective Information Provision and Delivery in This Age of Globalization
Authors: S. O. Uwaifo
Abstract:
The paper examines the pivotal role of the library in university education through the provision of a wide range of information materials (print and non- print) required for the teaching, learning and research activities of the university. However certain impediments to the effectiveness of Nigerian university libraries, such as financial constraints, high foreign exchange, global disparities in accessing the internet, lack of local area networks, erratic electric power supply, absence of ICT literacy, poor maintenance culture, etc., were identified. Also, the necessity of repositioning Nigerian university libraries for effective information provision and delivery was stressed by pointing out their dividends, such as users’ access to Directory of Open Access Journals (DOAJ), Online Public Access Catalogue (OPAC), Institutional Repositories, Electronic Document Delivery, Social Media Networks, etc. It therefore becomes necessary for the libraries to be repositioned by way of being adequately automated or digitized for effective service delivery, in this age of globalization. Based on the identified barriers by this paper, some recommendations were proffered.Keywords: repositioning, Nigerian university libraries, effective information provision and delivery, globalization
Procedia PDF Downloads 324