Search results for: access funding
3674 A Performance Analysis of Different Scheduling Schemes in WiMAX
Authors: A. Youseef
Abstract:
One of the most aims of IEEE 802.16 (WiMAX) is to present high-speed wireless access to cover wide range coverage. The base station (BS) and the subscriber station (SS) are the main parts of WiMAX. WiMAX uses either Point-to-Multipoint (PMP) or mesh topologies. In the PMP mode, the SSs connect to the BS to gain access to the network. However, in the mesh mode, the SSs connect to each other to gain access to the BS. The main components of QoS management in the 802.16 standard are the admission control, buffer management, and packet scheduling. There are several researches proposed to create an efficient packet scheduling schemes. Therefore, we use QualNet 5.0.2 to study the performance of different scheduling schemes, such as WFQ, SCFQ, RR, and SP when the numbers of SSs increase. We find that when the number of SSs increases, the average jitter and average end-to-end delay is increased and the throughput is reduced.Keywords: WiMAX, scheduling scheme, QoS, QualNet
Procedia PDF Downloads 4563673 Advancement of Computer Science Research in Nigeria: A Bibliometric Analysis of the Past Three Decades
Authors: Temidayo O. Omotehinwa, David O. Oyewola, Friday J. Agbo
Abstract:
This study aims to gather a proper perspective of the development landscape of Computer Science research in Nigeria. Therefore, a bibliometric analysis of 4,333 bibliographic records of Computer Science research in Nigeria in the last 31 years (1991-2021) was carried out. The bibliographic data were extracted from the Scopus database and analyzed using VOSviewer and the bibliometrix R package through the biblioshiny web interface. The findings of this study revealed that Computer Science research in Nigeria has a growth rate of 24.19%. The most developed and well-studied research areas in the Computer Science field in Nigeria are machine learning, data mining, and deep learning. The social structure analysis result revealed that there is a need for improved international collaborations. Sparsely established collaborations are largely influenced by geographic proximity. The funding analysis result showed that Computer Science research in Nigeria is under-funded. The findings of this study will be useful for researchers conducting Computer Science related research. Experts can gain insights into how to develop a strategic framework that will advance the field in a more impactful manner. Government agencies and policymakers can also utilize the outcome of this research to develop strategies for improved funding for Computer Science research.Keywords: bibliometric analysis, biblioshiny, computer science, Nigeria, science mapping
Procedia PDF Downloads 1123672 Library on the Cloud: Universalizing Libraries Based on Virtual Space
Authors: S. Vanaja, P. Panneerselvam, S. Santhanakarthikeyan
Abstract:
Cloud Computing is a latest trend in Libraries. Entering in to cloud services, Librarians can suit the present information handling and they are able to satisfy needs of the knowledge society. Libraries are now in the platform of universalizing all its information to users and they focus towards clouds which gives easiest access to data and application. Cloud computing is a highly scalable platform promising quick access to hardware and software over the internet, in addition to easy management and access by non-expert users. In this paper, we discuss the cloud’s features and its potential applications in the library and information centers, how cloud computing actually works is illustrated in this communication and how it will be implemented. It discuss about what are the needs to move to cloud, process of migration to cloud. In addition to that this paper assessed the practical problems during migration in libraries, advantages of migration process and what are the measures that Libraries should follow during migration in to cloud. This paper highlights the benefits and some concerns regarding data ownership and data security on the cloud computing.Keywords: cloud computing, cloud-service, cloud based-ILS, cloud-providers, discovery service, IaaS, PaaS, SaaS, virtualization, Web scale access
Procedia PDF Downloads 6613671 A Cloud-Based Spectrum Database Approach for Licensed Shared Spectrum Access
Authors: Hazem Abd El Megeed, Mohamed El-Refaay, Norhan Magdi Osman
Abstract:
Spectrum scarcity is a challenging obstacle in wireless communications systems. It hinders the introduction of innovative wireless services and technologies that require larger bandwidth comparing to legacy technologies. In addition, the current worldwide allocation of radio spectrum bands is already congested and can not afford additional squeezing or optimization to accommodate new wireless technologies. This challenge is a result of accumulative contributions from different factors that will be discussed later in this paper. One of these factors is the radio spectrum allocation policy governed by national regulatory authorities nowadays. The framework for this policy allocates specified portion of radio spectrum to a particular wireless service provider on exclusive utilization basis. This allocation is executed according to technical specification determined by the standard bodies of each Radio Access Technology (RAT). Dynamic access of spectrum is a framework for flexible utilization of radio spectrum resources. In this framework there is no exclusive allocation of radio spectrum and even the public safety agencies can share their spectrum bands according to a governing policy and service level agreements. In this paper, we explore different methods for accessing the spectrum dynamically and its associated implementation challenges.Keywords: licensed shared access, cognitive radio, spectrum sharing, spectrum congestion, dynamic spectrum access, spectrum database, spectrum trading, reconfigurable radio systems, opportunistic spectrum allocation (OSA)
Procedia PDF Downloads 4323670 Farmers’ Access to Agricultural Extension Services Delivery Systems: Evidence from a Field Study in India
Authors: Ankit Nagar, Dinesh Kumar Nauriyal, Sukhpal Singh
Abstract:
This paper examines the key determinants of farmers’ access to agricultural extension services, sources of agricultural extension services preferred and accessed by the farmers. An ordered logistic regression model was used to analyse the data of the 360 sample households based on a primary survey conducted in western Uttar Pradesh, India. The study finds that farmers' decision to engage in the agricultural extension programme is significantly influenced by factors such as education level, gender, farming experience, social group, group membership, farm size, credit access, awareness about the extension scheme, farmers' perception, and distance from extension sources. The most intriguing finding of this study is that the progressive farmers, which have long been regarded as a major source of knowledge diffusion, are the most distrusted sources of information as they are suspected of withholding vital information from potential beneficiaries. The positive relationship between farm size and ‘Access’ underlines that the extension services should revisit their strategies for targeting more marginal and small farmers constituting over 85 percent of the agricultural households by incorporating their priorities in their outreach programs. The study suggests that marginal and small farmers' productive potential could still be greatly augmented by the appropriate technology, advisory services, guidance, and improved market access. Also, the perception of poor quality of the public extension services can be corrected by initiatives aimed at building up extension workers' capacity.Keywords: agriculture, access, extension services, ordered logistic regression
Procedia PDF Downloads 2143669 English and Information and Communication Technology: Zones of Exclusion in Education in Low-Income Countries
Authors: Ram A. Giri, Amna Bedri, Abdou Niane
Abstract:
Exclusion in education on the basis of language in multilingual contexts operates at multiple levels. Learners of diverse ethnolinguistic backgrounds are often expected to learn through English and are pushed further down the learning ladder if they also have to access education through Information and Communication Technology (ICT). The paper explores marginalized children’s lived experiences in accessing technology and English in four low-income countries in Africa and Asia. Based on the findings of the first phase of a multinational qualitative research study, we report on the factors or barriers that affect children’s access, opportunities and motivation for learning through technology and English. ICT and English - the language of ICT and education - can enhance learning and can even be essential. However, these two important keys to education can also function as barriers to accessing quality education, and therefore as zones of exclusion. This paper looks into how marginalized children (aged 13-15) engage in learning through ICT and English and to what extent the restrictive access and opportunities contribute to the widening of the already existing gap in education. By applying the conceptual frameworks of “access and accessibility of learning” and “zones of exclusion,” the paper elucidates how the barriers prevent children’s effective engagement with learning and addresses such questions as to how marginalized children access technology and English for learning; whether the children value English, and what their motivation and opportunity to learn it are. In addition, the paper will point out policy and pedagogic implications.Keywords: exclusion, inclusion, inclusive education, marginalization
Procedia PDF Downloads 2303668 New Security Approach of Confidential Resources in Hybrid Clouds
Authors: Haythem Yahyaoui, Samir Moalla, Mounir Bouden, Skander ghorbel
Abstract:
Nowadays, Cloud environments are becoming a need for companies, this new technology gives the opportunities to access to the data anywhere and anytime, also an optimized and secured access to the resources and gives more security for the data which stored in the platform, however, some companies do not trust Cloud providers, in their point of view, providers can access and modify some confidential data such as bank accounts, many works have been done in this context, they conclude that encryption methods realized by providers ensure the confidentiality, although, they forgot that Cloud providers can decrypt the confidential resources. The best solution here is to apply some modifications on the data before sending them to the Cloud in the objective to make them unreadable. This work aims on enhancing the quality of service of providers and improving the trust of the customers.Keywords: cloud, confidentiality, cryptography, security issues, trust issues
Procedia PDF Downloads 3783667 Students’ Perceptions of Communication Design in Media: Case Study of Portuguese and Spanish Communication Students
Authors: Fátima Gonçalves, Joaquim Brigas, Jorge Gonçalves
Abstract:
The proliferation of mobile devices in society enables the media to disseminate information and knowledge more rapidly. Higher education students access these contents and share them with each other, in the most diverse platforms, allowing the ubiquity in access to information. This article presents the results and respective quantitative analysis of a survey applied to communication students of two higher education institutions: one in Portugal and another in Spain. The results show that, in this sample, higher education students regularly access news content believing traditional news sources to be more credible. Regarding online sources, it was verified that the access was mostly to free news contents. This study intends to promote the knowledge about the changes that occur in the relationship of higher education students with the media, characterizing how news consumption is processed by these students, considering the resulting effects of the digital media evolution. It is intended to present not only the news sources they use, but also to know some of their habits and relationship with the news media.Keywords: students' perceptions, communication design, mass media, higher education, digital media
Procedia PDF Downloads 2463666 Institutional Repository ePrints at Indian Institute of Science: A Special Reference to JRD Tata Memorial Library, Bangalore, India
Authors: Nagarjuna Pitty
Abstract:
Over the past decade there has been substantial progress in the usage of ePrints resources national and international research community. JRD Tata Memorial Library has hosting for the web based ePrints services and maintenance to online user community. This paper provides an overview how to share JRDTML experiences in using GNU EPrints.org software to create and maintain the open-access institutional repository of IISc, ePrints@IISc. This paper states that the GNU EPrints.org is the first generic software for creating Open Access Initiative (OAI)-compliant repositories, which enables the researchers to self-archive their research publications thus facilitating open access to their publications. IISc has been using this software since early 2002. This paper tells that the GNU EPrints.org software is an excellent tool for creating and maintaining OAI-compliant repositories. It can be setup easily even by those who are not too much experts in computer. In this paper, author is sharing JRDTML experiences in using GNU ePrints.org software.Keywords: digital library, open access initiative, scholarly publications, institutional repository, ePrints@IISc
Procedia PDF Downloads 5583665 Maturity Transformation Risk Factors in Islamic Banking: An Implication of Basel III Liquidity Regulations
Authors: Haroon Mahmood, Christopher Gan, Cuong Nguyen
Abstract:
Maturity transformation risk is highlighted as one of the major causes of recent global financial crisis. Basel III has proposed new liquidity regulations for transformation function of banks and hence to monitor this risk. Specifically, net stable funding ratio (NSFR) is introduced to enhance medium- and long-term resilience against liquidity shocks. Islamic banking is widely accepted in many parts of the world and contributes to a significant portion of the financial sector in many countries. Using a dataset of 68 fully fledged Islamic banks from 11 different countries, over a period from 2005 – 2014, this study has attempted to analyze various factors that may significantly affect the maturity transformation risk in these banks. We utilize 2-step system GMM estimation technique on unbalanced panel and find bank capital, credit risk, financing, size and market power are most significant among the bank specific factors. Also, gross domestic product and inflation are the significant macro-economic factors influencing this risk. However, bank profitability, asset efficiency, and income diversity are found insignificant in determining the maturity transformation risk in Islamic banking model.Keywords: Basel III, Islamic banking, maturity transformation risk, net stable funding ratio
Procedia PDF Downloads 4153664 Pharmacovigilance: An Empowerment in Safe Utilization of Pharmaceuticals
Authors: Pankaj Prashar, Bimlesh Kumar, Ankita Sood, Anamika Gautam
Abstract:
Pharmacovigilance (PV) is a rapidly growing discipline in pharmaceutical industries as an integral part of clinical research and drug development over the past few decades. PV carries a breadth of scope from drug manufacturing to its regulation with safer utilization. The fundamental steps of PV not only includes data collection and verification, coding of drugs with adverse drug reactions, causality assessment and timely reporting to the authorities but also monitoring drug manufacturing, safety issues, product quality and conduction of due diligence. Standardization of adverse event information, collaboration of multiple departments in different companies, preparation of documents in accordance to both governmental as well as non-governmental organizations (FDA, EMA, GVP, ICH) are the advancements in discipline of PV. De-harmonization, lack of predictive drug safety models, improper funding by government, non-reporting, and non-acceptability of ADRs by developing countries and reports directly from patients to the monitoring centres respectively are the major road backs of PV. Mandatory pharmacovigilance reporting, frequent inspections, funding by government, educating and training medical students, pharmacists and nurses in this segment can bring about empowerment in PV. This area needs to be addressed with a sense of urgency for the safe utilization of pharmaceuticals.Keywords: pharmacovigilance, regulatory, adverse event, drug safety
Procedia PDF Downloads 1243663 Design and Application of NFC-Based Identity and Access Management in Cloud Services
Authors: Shin-Jer Yang, Kai-Tai Yang
Abstract:
In response to a changing world and the fast growth of the Internet, more and more enterprises are replacing web-based services with cloud-based ones. Multi-tenancy technology is becoming more important especially with Software as a Service (SaaS). This in turn leads to a greater focus on the application of Identity and Access Management (IAM). Conventional Near-Field Communication (NFC) based verification relies on a computer browser and a card reader to access an NFC tag. This type of verification does not support mobile device login and user-based access management functions. This study designs an NFC-based third-party cloud identity and access management scheme (NFC-IAM) addressing this shortcoming. Data from simulation tests analyzed with Key Performance Indicators (KPIs) suggest that the NFC-IAM not only takes less time in identity identification but also cuts time by 80% in terms of two-factor authentication and improves verification accuracy to 99.9% or better. In functional performance analyses, NFC-IAM performed better in salability and portability. The NFC-IAM App (Application Software) and back-end system to be developed and deployed in mobile device are to support IAM features and also offers users a more user-friendly experience and stronger security protection. In the future, our NFC-IAM can be employed to different environments including identification for mobile payment systems, permission management for remote equipment monitoring, among other applications.Keywords: cloud service, multi-tenancy, NFC, IAM, mobile device
Procedia PDF Downloads 4353662 Access to Justice for Persons with Intellectual Disabilities in Indonesia: Case and Problem in Indonesian Criminal Justice System
Authors: Fines Fatimah, SH. MH.
Abstract:
Indonesia is one of the countries that has ratified the UNCRPD (United Nations Convention on the Rights of Persons with Disabilities). The ratification of this convention brings consequences on the adjustment of national legislation with the UNCRPD convention, where this ratification at the same time is a measure in the eyes of the international community that a state party could be consistent with the issues and problems of disability. Persons with disabilities often have little access to justice when they are forced to deal with the criminal justice system. Pursuit of justice through litigation are often not in their favor, therefore without any awareness of law enforcement/awareness of disability will further complicate access to justice for persons with disabilities. Under Article 13 of the UNCRPD, it appeared that the convention requires ratifying states to guarantee equal opportunity and treatment in justice for persons with disabilities. The States should also ensure that any judicial rules must be adapted to the circumstances of persons with disabilities so that people with disabilities can fully participate in all stages of the trial court and, for example, as a witness. Finally, the state must provide training to understand these persons with disabilities (for those who work in the judiciary institution such as police or prison officials). Further, this paper aims to describe problem faced by persons with intellectual disabilities to access justice in Indonesian Criminal Justice System. This paper tries to find and propose the alternative solutions to promote the quality of law enforcement in Indonesia, especially for persons with intellectual disabilities.Keywords: access to justice, Indonesian criminal justice system, intellectual disability, ratifying states
Procedia PDF Downloads 5153661 Software Development to Empowering Digital Libraries with Effortless Digital Cataloging and Access
Authors: Abdul Basit Kiani
Abstract:
The software for the digital library system is a cutting-edge solution designed to revolutionize the way libraries manage and provide access to their vast collections of digital content. This advanced software leverages the power of technology to offer a seamless and user-friendly experience for both library staff and patrons. By implementing this software, libraries can efficiently organize, store, and retrieve digital resources, including e-books, audiobooks, journals, articles, and multimedia content. Its intuitive interface allows library staff to effortlessly manage cataloging, metadata extraction, and content enrichment, ensuring accurate and comprehensive access to digital materials. For patrons, the software offers a personalized and immersive digital library experience. They can easily browse the digital catalog, search for specific items, and explore related content through intelligent recommendation algorithms. The software also facilitates seamless borrowing, lending, and preservation of digital items, enabling users to access their favorite resources anytime, anywhere, on multiple devices. With robust security features, the software ensures the protection of intellectual property rights and enforces access controls to safeguard sensitive content. Integration with external authentication systems and user management tools streamlines the library's administration processes, while advanced analytics provide valuable insights into patron behavior and content usage. Overall, this software for the digital library system empowers libraries to embrace the digital era, offering enhanced access, convenience, and discoverability of their vast collections. It paves the way for a more inclusive and engaging library experience, catering to the evolving needs of tech-savvy patrons.Keywords: software development, empowering digital libraries, digital cataloging and access, management system
Procedia PDF Downloads 823660 Weighted Data Replication Strategy for Data Grid Considering Economic Approach
Authors: N. Mansouri, A. Asadi
Abstract:
Data Grid is a geographically distributed environment that deals with data intensive application in scientific and enterprise computing. Data replication is a common method used to achieve efficient and fault-tolerant data access in Grids. In this paper, a dynamic data replication strategy, called Enhanced Latest Access Largest Weight (ELALW) is proposed. This strategy is an enhanced version of Latest Access Largest Weight strategy. However, replication should be used wisely because the storage capacity of each Grid site is limited. Thus, it is important to design an effective strategy for the replication replacement task. ELALW replaces replicas based on the number of requests in future, the size of the replica, and the number of copies of the file. It also improves access latency by selecting the best replica when various sites hold replicas. The proposed replica selection selects the best replica location from among the many replicas based on response time that can be determined by considering the data transfer time, the storage access latency, the replica requests that waiting in the storage queue and the distance between nodes. Simulation results utilizing the OptorSim show our replication strategy achieve better performance overall than other strategies in terms of job execution time, effective network usage and storage resource usage.Keywords: data grid, data replication, simulation, replica selection, replica placement
Procedia PDF Downloads 2603659 Open Access in the Economic Sphere: A Framework Interpreting the Rise of the UK, US and China at Different Historical Times
Authors: Guanghua Yu
Abstract:
This article has examined the rise of the UK, US, and China at different historical times to explain the argument that it is open access in the economic sphere, as well as institutional building related to the protection of property rights, contract enforcement, financial market, the rule of law, and human resource accumulation that determine economic and human development. Both the UK, after the Glorious Revolution in the seventeenth century, and China, after its adoption of the open door policy at the end of the 1970s, follow such a path of development. The difference between the UK and China in moving toward that path is the different coordination of elites. While the coordination of elites in the UK through parliament played important roles in forcing the government to consider the wider encompassing interest in society after the Glorious Revolution, the coordination of elites in China has mainly been achieved by the Communist Party of China such that the Chinese Government has started to pay greater deal of attention to the wider encompassing interest in the country from 1978. The article has also examined the rise of the US following colonial settlement to independence and institutional building thereafter. The US case is similarly consistent with the argument that open access in the economic sphere and institutional building matter the most to economic development. More decentralized methods of the coordination of elites in the US among colonies (states), the federal governments, and other political groups similarly shaped the path towards open access in the economic sphere and institutional building. As such, open access in the political sphere plays an indirect role in development at best. If that is correct, there are possibilities that different political systems are able to achieve coordination of elites so that governments will turn their attention to development.Keywords: open access, interconnected institutions, democracy, development
Procedia PDF Downloads 803658 Research and Implementation of Cross-domain Data Sharing System in Net-centric Environment
Authors: Xiaoqing Wang, Jianjian Zong, Li Li, Yanxing Zheng, Jinrong Tong, Mao Zhan
Abstract:
With the rapid development of network and communication technology, a great deal of data has been generated in different domains of a network. These data show a trend of increasing scale and more complex structure. Therefore, an effective and flexible cross-domain data-sharing system is needed. The Cross-domain Data Sharing System(CDSS) in a net-centric environment is composed of three sub-systems. The data distribution sub-system provides data exchange service through publish-subscribe technology that supports asynchronism and multi-to-multi communication, which adapts to the needs of the dynamic and large-scale distributed computing environment. The access control sub-system adopts Attribute-Based Access Control(ABAC) technology to uniformly model various data attributes such as subject, object, permission and environment, which effectively monitors the activities of users accessing resources and ensures that legitimate users get effective access control rights within a legal time. The cross-domain access security negotiation subsystem automatically determines the access rights between different security domains in the process of interactive disclosure of digital certificates and access control policies through trust policy management and negotiation algorithms, which provides an effective means for cross-domain trust relationship establishment and access control in a distributed environment. The CDSS’s asynchronous,multi-to-multi and loosely-coupled communication features can adapt well to data exchange and sharing in dynamic, distributed and large-scale network environments. Next, we will give CDSS new features to support the mobile computing environment.Keywords: data sharing, cross-domain, data exchange, publish-subscribe
Procedia PDF Downloads 1243657 The Development, Use and Imapct of an Open Source, Web-Based, Video-Annoation Tool to Provide Job-Embedded Professional Development for Educators: The Coaching Companion
Authors: Gail Joseph
Abstract:
In the United States, to advance the quality and education requirements of PreK teachers, there are concerns regarding barriers for existing early childhood educators to access formal degrees and ongoing professional development. Barriers exist related to affordability and access. Affordability is a key factor that impacts teachers access to degree programs. The lack of financial resources makes it difficult for many qualified candidates to begin, and complete, degree programs. Even if funding was not an issue, accessibility remains a pressing issue in higher education. Some common barriers include geography, long work hours, lack of professional community, childcare, and clear articulation agreements. Greater flexibility is needed to allow all early childhood professionals to pursue college coursework that takes into consideration the many competing demands on their schedules. For these busy professionals, it is particularly important that professional development opportunities are available “on demand” and are seen as relevant to their work. Courses that are available during non-traditional hours make attendance more accessible, and professional development that is relevant to what they need to know and be able to do to be effective in their current positions increase access to and the impact of ongoing professional education. EarlyEdU at the University of Washington provides institutes of higher education and state professional development systems with free comprehensive, competency based college courses based on the latest science of how to optimize child learning and outcomes across developmental domains. The coursework embeds an intentional teaching framework which requires teachers to know what to do in the moment, see effective teaching in themselves and others, enact these practices in the classroom, reflect on what works and what does not, and improve with thoughtful practices. Reinforcing the Intentional Teaching Framework in EarlyEdU courses is the Coaching Companion, an open source, web-based video annotation learning tool that supports coaching in higher education by enabling students to view and refine their teaching practices. The tool is integrated throughout EarlyEdU courses. With the Coaching Companion, students see upload teaching interactions on video and then reflect on the degree to which they incorporate evidence-based practices. Coaching Companion eliminates the traditional separation of theory and practice in college-based teacher preparation. Together, the Intentional Teaching Framework and the Coaching Companion transform the course instructor into a job-embedded coach. The instructor watches student interactions with children on video using the Coaching Companion and looks specifically for interactions defined in course assignments, readings, and lectures. Based on these observations, the instructor offers feedback and proposes next steps. Developed on federal and philanthropic funds, all EarlyEdU courses and the Coaching Companion are available for free to 2= and 4-year colleges and universities with early childhood degrees, as well as to state early learning and education departments to increase access to high quality professional development. We studied the impact of the Coaching Companion in two courses and demonstrated a significant increase in the quality of teacher-child interactions as measured by the PreK CLASS quality teaching assessment. Implications are discussed related to policy and practice.Keywords: education technology, distance education, early childhood education, professional development
Procedia PDF Downloads 1323656 Improving System Performance through User's Resource Access Patterns
Authors: K. C. Wong
Abstract:
This paper demonstrates a number of examples in the hope to shed some light on the possibility of designing future operating systems in a more adaptation-based manner. A modern operating system, we conceive, should possess the capability of 'learning' in such a way that it can dynamically adjust its services and behavior according to the current status of the environment in which it operates. In other words, a modern operating system should play a more proactive role during the session of providing system services to users. As such, a modern operating system is expected to create a computing environment, in which its users are provided with system services more matching their dynamically changing needs. The examples demonstrated in this paper show that user's resource access patterns 'learned' and determined during a session can be utilized to improve system performance and hence to provide users with a better and more effective computing environment. The paper also discusses how to use the frequency, the continuity, and the duration of resource accesses in a session to quantitatively measure and determine user's resource access patterns for the examples shown in the paper.Keywords: adaptation-based systems, operating systems, resource access patterns, system performance
Procedia PDF Downloads 1453655 Evaluation of Easy-to-Use Energy Building Design Tools for Solar Access Analysis in Urban Contexts: Comparison of Friendly Simulation Design Tools for Architectural Practice in the Early Design Stage
Abstract:
Current building sector is focused on reduction of energy requirements, on renewable energy generation and on regeneration of existing urban areas. These targets need to be solved with a systemic approach, considering several aspects simultaneously such as climate conditions, lighting conditions, solar radiation, PV potential, etc. The solar access analysis is an already known method to analyze the solar potentials, but in current years, simulation tools have provided more effective opportunities to perform this type of analysis, in particular in the early design stage. Nowadays, the study of the solar access is related to the easiness of the use of simulation tools, in rapid and easy way, during the design process. This study presents a comparison of three simulation tools, from the point of view of the user, with the aim to highlight differences in the easy-to-use of these tools. Using a real urban context as case study, three tools; Ecotect, Townscope and Heliodon, are tested, performing models and simulations and examining the capabilities and output results of solar access analysis. The evaluation of the ease-to-use of these tools is based on some detected parameters and features, such as the types of simulation, requirements of input data, types of results, etc. As a result, a framework is provided in which features and capabilities of each tool are shown. This framework shows the differences among these tools about functions, features and capabilities. The aim of this study is to support users and to improve the integration of simulation tools for solar access with the design process.Keywords: energy building design tools, solar access analysis, solar potential, urban planning
Procedia PDF Downloads 3403654 ‘Nature Will Slow You Down for a Reason’: Virtual Elder-Led Support Services during COVID-19
Authors: Grandmother Roberta Oshkawbewisens, Elder Isabelle Meawasige, Lynne Groulx, Chloë Hamilton, Lee Allison Clark, Dana Hickey, Wansu Qiu, Jared Leedham, Nishanthini Mahendran, Cameron Maclaine
Abstract:
In March of 2020, the world suddenly shifted with the onset of the COVID-19 pandemic; in-person programs and services were unavailable and a scramble to shift to virtual service delivery began. The Native Women’s Association of Canada (NWAC) established virtual programming through the Resiliency Lodge model and connected with Indigenous women, girls, Two-Spirit, transgender, and gender-diverse people across Turtle Island and Inuit Nunangat through programs that provide a safe space to slow down and reflect on their lives, environment, and well-being. To continue to grow the virtual Resiliency Lodge model, NWAC needed to develop an understanding of three questions: how COVID-19 affects Elder-led support services, how Elder-led support services have adapted during the pandemic, and what Wise Practices need to be implemented to continue to develop, refine, and evaluate virtual Elder-led support services specifically for Indigenous women, girls, two-Spirit, transgender, and gender-diverse people. Through funding from the Canadian Institute of Health Research (CIHR), NWAC gained deeper insight into these questions and developed a series of key findings and recommendations that are outlined throughout this report. The goals of this project are to contribute to a more robust participatory analysis that reflects the complexities of Elder-led virtual cultural responses and the impacts of COVID-19 on Elder-led support services; develop culturally and contextually meaningful virtual protocols and wise practices for virtual Indigenous-led support; and develop an Evaluation Strategy to improve the capacity of the Resiliency Lodge model. Significant findings from the project include Resiliency Lodge programs, especially crafting and business sessions, have provided participants with a sense of community and contributed to healing and wellness; Elder-led support services need greater and more stable funding to offer more workshops to more Indigenous women, girls, Two-Spirit, transgender, and gender-diverse people; and Elder- and Indigenous-led programs play a significant role in healing and building a sense of purpose and belonging among Indigenous people. Ultimately, the findings and recommendations outlined in this research project help to guide future Elder-led virtual support services and emphasize the critical need to increase access to Elder-led programming for Indigenous women, girls, Two-Spirit, transgender, and gender-diverse people.Keywords: indigenous women, traditional healing, virtual programs, covid-19
Procedia PDF Downloads 1393653 Onco@Home: Comparing the Costs, Revenues, and Patient Experience of Cancer Treatment at Home with the Standard of Care
Authors: Sarah Misplon, Wim Marneffe, Johan Helling, Jana Missiaen, Inge Decock, Dries Myny, Steve Lervant, Koen Vaneygen
Abstract:
The aim of this study was twofold. First, we investigated whether the current funding from the national health insurance (NHI) of home hospitalization (HH) for oncological patients is sufficient in Belgium. Second, we compared patient’s experiences and preferences of HH to the standard of care (SOC). Two HH models were examined in three Belgian hospitals and three home nursing organizations. In a first HH model, the blood draw and monitoring prior to intravenous therapy were performed by a trained home nurse at the patient’s home the day before the visit to the day hospital. In a second HH model, the administration of two subcutaneous treatments was partly provided at home instead of in the hospital. Therefore, we conducted (1) a bottom-up micro-costing study to compare the costs and revenues for the providers (hospitals and home care organizations), and (2) a cross-sectional survey to compare patient’s experiences and preferences of the SOC group and the HH group. Our results show that HH patients prefer HH and none of them wanted to return to SOC, although the satisfaction of patients was not significantly different between the two categories. At the same time, we find that costs associated to HH are higher overall. Comparing revenues with costs, we conclude that the current funding from NHI of HH for oncological patients is insufficient.Keywords: cost analysis, health insurance, preference, home hospitalization
Procedia PDF Downloads 1223652 Improvement of Data Transfer over Simple Object Access Protocol (SOAP)
Authors: Khaled Ahmed Kadouh, Kamal Ali Albashiri
Abstract:
This paper presents a designed algorithm involves improvement of transferring data over Simple Object Access Protocol (SOAP). The aim of this work is to establish whether using SOAP in exchanging XML messages has any added advantages or not. The results showed that XML messages without SOAP take longer time and consume more memory, especially with binary data.Keywords: JAX-WS, SMTP, SOAP, web service, XML
Procedia PDF Downloads 4953651 Leveraging NFT Secure and Decentralized Lending: A Defi Solution
Authors: Chandan M. S., Darshan G. A., Vyshnavi, Abhishek T.
Abstract:
In the evolving world of technology and digital assets, non-fungible tokens (NFTs) have emerged as the latest advancement. These digital assets represent ownership of intangible items and hold significant value. Unlike cryptocurrencies, like Ethereum or Bitcoin, NFTs cannot be exchanged due to their nature. Each NFT has an indivisible value. NFTs not only pave the way for financial services but also open up fresh opportunities for creators, buyers and artists. To revolutionize financing in the DeFi space, this proposed approach utilizes NFTs generated from digital arts. By eliminating intermediaries, this innovative method ensures trust and security in transactions. The idea entails automating borrower-lender interactions through contracts while securely storing data using blockchain technology. Borrowers can obtain funding by leveraging assets such as estate, artwork and collectibles that are often illiquid. The key component of this system is contracts that independently execute lending agreements and collateral transfers within predefined parameters. By leveraging the Ethereum blockchain, this project aims to provide consumers with access to a platform offering a wide range of financial services. The demonstration illustrates how NFT lending and borrowing is managed through contracts, providing a secure and trustworthy transaction environment.Keywords: blockchain, defi, NFT, ethereum, marketplace
Procedia PDF Downloads 533650 Effect of Access to Finance on Innovation and Productivity of SMEs in Nigeria: Evidence from the World Bank Enterprise Survey
Authors: Abidemi C. Adegboye, Samuel Iweriebor
Abstract:
The primary link between financial institutions and economic performance is the provision of resources by these institutions to businesses in order to drive enterprise expansion, sustainability, and development. In this study, the role of access to finance in driving innovations and productivity in Nigerian SMEs is investigated using the World Bank Enterprise Survey (ES) dataset. Innovation is defined based on the ES analysis using five compositions including product, method, organisational, use of foreign-licensed technology, and spending on R&D. The study considers finance in terms of source in meeting investment needs and in terms of access. Moreover, finance access is categorized as external and internal to a firm with each having different implications. The research methodology adopted a survey analysis based on the 2014 World Bank Enterprise Survey of 19 states in Nigeria. The survey comprised over 10,000 manufacturing and services firms, both at the small scale and medium scale levels. The logit estimation technique is used to estimate the relationships in the study. The results from the empirical analysis show that in general, access to finance drives SME innovation in Nigeria. In particular, ease of accessing bank loans and credit is shown to be the strongest positive force in driving all types of innovation among SMEs in Nigeria. In the same vein, the type of finance source for investment matters in terms of how it affects innovation: it is shown that both internal and external sources improve investment in product, process, and organisational innovation, but only external financing has effect on R&D spending and use of foreign licensed technology. Overall spending on R&D is only driven by access to external finance by the SMEs. For productivity, the results show that while structure of financing investment improves productivity, increased access to finance may actually lead to productivity decline among SMEs in Nigeria. There is a need for the financial system to evolve structures to increase fund availability to SMEs in Nigeria, especially for the purpose of innovation investment.Keywords: access to finance, financing investment, innovation, productivity, SMEs
Procedia PDF Downloads 3583649 Analysis and Evaluation of Both AC and DC Standalone Photovoltaic Supply to Ethio-Telecom Access Layer Devices: The Case of Multi-Service Access Gateway in Adama
Authors: Frie Ayalew, Seada Hussen
Abstract:
Ethio-telecom holds a variety of telecom devices that needs a consistent power source to be operational. The company got this power mainly from the national grid and used this power source alone or with a generator and/or batteries as a backup. In addition, for off-grid or remote areas, the company commonly uses generators and batteries. But unstable diesel prices, huge expenses of fuel and transportation, and high carbon emissions are the main problems associated with fuel energy. So, the design of solar power with battery backup is a highly recommended and advantageous source for the next coming years. This project designs the AC and DC standalone photovoltaic supply to Ethio-telecom access layer devices for the case of multi-service access gateway in Adama. The design is done by using Homer software for both AC and DC loads. The project shows that the design of a solar based microgrid is the best option for the designed area.Keywords: solar power, battery, inverter, Ethio-telecom, solar radiation
Procedia PDF Downloads 823648 Evidence Based Policy Studies: Examining Alternative Policy Practice towards Improving Enrolment to Higher Education in Nigeria
Authors: Muftahu Jibirin Salihu, Hazri Jamil
Abstract:
The persisting challenge of access and enrolment to higher education in commonwealth countries has been reported in several studies, including reports of the international organization such as World Bank, UNESCO among others however from the macro perspective. The overarching aim of this study is to examine alternative policy practices towards improving access to university education in Nigeria at meso level of policy practice from evidence base policy studies using one university as a case. The study adopted a qualitative approach to gain insightful understanding on the issue of the study employing a semi-structure interview and policy documents as the means for obtaining the data and other relevant information for the study. The participants of the study were purposively chosen which comprise of a number of individuals from the selected university and other related organization which responsible for the policies development and implementation of Nigerian higher education system. From the findings of the study, several initiatives have been taken at meso level to address this challenge including the introduction of the University Matriculation Program as an alternative route for enhancing to access to the university education. However, the study further provided a number of recommendations which aimed at improving access to university education such as improving the entry requirements, society orientation on university education and the issue of ranking of certificate among the Nigerian higher institutions of learning.Keywords: policy practice, access, enrolment, university, education, Nigeria
Procedia PDF Downloads 2673647 The Governance of Net-Zero Emission Urban Bus Transitions in the United Kingdom: Insight from a Transition Visioning Stakeholder Workshop
Authors: Iraklis Argyriou
Abstract:
The transition to net-zero emission urban bus (ZEB) systems is receiving increased attention in research and policymaking throughout the globe. Most studies in this area tend to address techno-economic aspects and the perspectives of a narrow group of stakeholders, while they largely overlook analysis of current bus system dynamics. This offers limited insight into the types of ZEB governance challenges and opportunities that are encountered in real-world contexts, as well as into some of the immediate actions that need to be taken to set off the transition over the longer term. This research offers a multi-stakeholder perspective into both the technical and non-technical factors that influence ZEB transitions within a particular context, the UK. It does so by drawing from a recent transition visioning stakeholder workshop (June 2023) with key public, private and civic actors of the urban bus transportation system. Using NVivo software to qualitatively analyze the workshop discussions, the research examines the key technological and funding aspects, as well as the short-term actions (over the next five years), that need to be addressed for supporting the ZEB transition in UK cities. It finds that ZEB technology has reached a mature stage (i.e., high efficiency of batteries, motors and inverters), but important improvements can be pursued through greater control and integration of ZEB technological components and systems. In this regard, telemetry, predictive maintenance and adaptive control strategies pertinent to the performance and operation of ZEB vehicles have a key role to play in the techno-economic advancement of the transition. Yet, more pressing gaps were identified in the current ZEB funding regime. Whereas the UK central government supports greater ZEB adoption through a series of grants and subsidies, the scale of the funding and its fragmented nature do not match the needs for a UK-wide transition. Funding devolution arrangements (i.e., stable funding settlement deals between the central government and the devolved administrations/local authorities), as well as locally-driven schemes (i.e., congestion charging/workplace parking levy), could then enhance the financial prospects of the transition. As for short-term action, three areas were identified as critical: (1) the creation of whole value chains around the supply, use and recycling of ZEB components; (2) the ZEB retrofitting of existing fleets; and (3) integrated transportation that prioritizes buses as a first-choice, convenient and reliable mode while it simultaneously reduces car dependency in urban areas. Taken together, the findings point to the need for place-based transition approaches that create a viable techno-economic ecosystem for ZEB development but at the same time adopt a broader governance perspective beyond a ‘net-zero’ and ‘bus sectoral’ focus. As such, multi-actor collaborations and the coordination of wider resources and agency, both vertically across institutional scales and horizontally across transport, energy and urban planning, become fundamental features of comprehensive ZEB responses. The lessons from the UK case can inform a broader body of empirical contextual knowledge of ZEB transition governance within domestic political economies of public transportation.Keywords: net-zero emission transition, stakeholders, transition governance, UK, urban bus transportation
Procedia PDF Downloads 753646 The Critical Relevance of Credit and Debt Data in Household Food Security Analysis: The Risks of Ineffective Response Actions
Authors: Siddharth Krishnaswamy
Abstract:
Problem Statement: Currently, when analyzing household food security, the most commonly studied food access indicators are household income and expenditure. Larger studies do take into account other indices such as credit and employment. But these are baselines studies and by definition are conducted infrequently. Food security analysis for access is usually dedicated to analyzing income and expenditure indicators. And both these indicators are notoriously inconsistent. Yet this data can very often end up being the basis on which household food access is calculated; and by extension, be used for decision making. Objectives: This paper argues that along with income and expenditure, credit and debit information should be collected so that an accurate analysis of household food security (and in particular) food access can be determined. The lack of collection and analysis of this information routinely means that there is often a “masking” of the actual situation; a household’s food access and food availability patterns may be adequate mainly as a result of borrowing and may even be due to a long- term dependency (a debt cycle). In other words, such a household is, in reality, worse off than it appears a factor masked by its performance on basic access indicators. Procedures/methodologies/approaches: Existing food security data sets collected in 2005 in Azerbaijan, 2010 across Myanmar and 2014-15 across Uganda were used to support the theory that analyzing income and expenditure of a HHs and analyzing the same in addition to data on credit & borrowing patterns will result in an entirely different scenario of food access of the household. Furthermore, the data analyzed depicts food consumption patterns across groups of households and then relates this to the extent of dependency on credit, i.e. households borrowing money in order to meet food needs. Finally, response options that were based on analyzing only income and expenditure; and response options based on income, expenditure, credit, and borrowing – from the same geographical area of operation are studied and discussed. Results: The purpose of this work was to see if existing methods of household food security analysis could be improved. It is hoped that food security analysts will collect household level information on credit and debit and analyze them against income, expenditure and consumption patterns. This will help determine if a household’s food access and availability are dependent on unsustainable strategies such as borrowing money for food or undertaking sustained debts. Conclusions: The results clearly show the amount of relevant information that is missing in Food Access analysis if debit and borrowing of the household is not analyzed along with the typical Food Access indicators that are usually analyzed. And the serious repercussions this has on Programmatic response and interventions.Keywords: analysis, food security indicators, response, resilience analysis
Procedia PDF Downloads 3313645 An Integrated Architecture of E-Learning System to Digitize the Learning Method
Authors: M. Touhidul Islam Sarker, Mohammod Abul Kashem
Abstract:
The purpose of this paper is to improve the e-learning system and digitize the learning method in the educational sector. The learner will login into e-learning platform and easily access the digital content, the content can be downloaded and take an assessment for evaluation. Learner can get access to these digital resources by using tablet, computer, and smart phone also. E-learning system can be defined as teaching and learning with the help of multimedia technologies and the internet by access to digital content. E-learning replacing the traditional education system through information and communication technology-based learning. This paper has designed and implemented integrated e-learning system architecture with University Management System. Moodle (Modular Object-Oriented Dynamic Learning Environment) is the best e-learning system, but the problem of Moodle has no school or university management system. In this research, we have not considered the school’s student because they are out of internet facilities. That’s why we considered the university students because they have the internet access and used technologies. The University Management System has different types of activities such as student registration, account management, teacher information, semester registration, staff information, etc. If we integrated these types of activity or module with Moodle, then we can overcome the problem of Moodle, and it will enhance the e-learning system architecture which makes effective use of technology. This architecture will give the learner to easily access the resources of e-learning platform anytime or anywhere which digitizes the learning method.Keywords: database, e-learning, LMS, Moodle
Procedia PDF Downloads 188