Search results for: data access
26970 Analysis of Access to Credit among Rural Farmers in Giwa Local Government Area of Kaduna State, Nigeria
Authors: S. Ibrahim, Bashir Umar
Abstract:
Agricultural credit is very important for sustainable agricultural development to be achieved in any country of the world. Rural credit has proven to be a powerful instrument against poverty reduction and development in rural area. Agricultural credit enhances productivity and promotes standard of living by breaking vicious cycle of poverty of small scale farmers. This study examined access to credit among rural farmers in Giwa local government area of Kaduna state. Two stages sampling procedure was employed to select forty-two (42) respondents for the study. Primary data were collected using structured questionnaire with the help of well-trained enumerators. Data were analyzed using simple descriptive statistics. The results revealed that farmers were predominantly male (57.1%) and most (54.7%), were married with one level of education or another (66.5.%). Majority of the households’ head were between the ages of 31 to 50. majority of the farmers (68.2%) had more than 2ha of farmlands with at least 5 years of farming experience and an annual farm income of N 61,000 to 100,000 (61.9%). The Various sources of credit by the farmers in the study area were commercial banks (38.1%), Co-operative banks (47.6%), Development banks (14.2%) (formal) and Relatives (26.1%), Personal Savings (Adashi scheme) (52.3%), Moneylenders (21.4%) (informal). As regard to the amount of credit obtained by the farmers 38.1% received N 50,000-100,000, 50 % obtained N 100,001-500,000 while 11.9% obtained N 500,001-1,000,000. High interest Inadequate collateral, Complicated Procedures, lack of guarantor were the major constrains encountered by the farmers in accessing loans. The study therefore recommends that Rural farmers should be encouraged to form credit and thrift cooperative societies from which they can access much cheaper credits, Moreover, to ensure that any credit obtained may be manageable for the farmers, financial institutions should provide loans with low interest rates and government and non-governmental organizations should simplify procedures associated with accessing loans.Keywords: analysis, access, credit, farmers
Procedia PDF Downloads 6326969 Saudi Human Awareness Needs: A Survey in How Human Causes Errors and Mistakes Leads to Leak Confidential Data with Proposed Solutions in Saudi Arabia
Authors: Amal Hussain Alkhaiwani, Ghadah Abdullah Almalki
Abstract:
Recently human errors have increasingly become a very high factor in security breaches that may affect confidential data, and most of the cyber data breaches are caused by human errors. With one individual mistake, the attacker will gain access to the entire network and bypass the implemented access controls without any immediate detection. Unaware employees will be vulnerable to any social engineering cyber-attacks. Providing security awareness to People is part of the company protection process; the cyber risks cannot be reduced by just implementing technology; the human awareness of security will significantly reduce the risks, which encourage changes in staff cyber-awareness. In this paper, we will focus on Human Awareness, human needs to continue the required security education level; we will review human errors and introduce a proposed solution to avoid the breach from occurring again. Recently Saudi Arabia faced many attacks with different methods of social engineering. As Saudi Arabia has become a target to many countries and individuals, we needed to initiate a defense mechanism that begins with awareness to keep our privacy and protect the confidential data against possible intended attacks.Keywords: cybersecurity, human aspects, human errors, human mistakes, security awareness, Saudi Arabia, security program, security education, social engineering
Procedia PDF Downloads 16226968 Access and Utilization of Family Planning Services among Women in a Rural Community of Enugu state Nigeria, using a Descriptive Cross-sectional Design
Authors: Chidiebere Joy Nwankwo, Benjamin S. C. Uzochukwu, Florence T. Sibeudu
Abstract:
Background: Family planning is one of the most cost-effective ways to prevent maternal, infant, and child mortality. It can decrease maternal mortality by reducing the number of unintended pregnancies, the number of abortions, and the proportion of births at high risk. It has been seen to improve the health and economic well-being of families and communities and ensures women’s planned childbearing in order to achieve education and career goals which could raise family income thereby reducing poverty. The choice and use of a particular family planning method and their sources vary globally. Rural Communities often face significant challenges in accessing and utilizing family planning services. Aim: This study set out to assess Access and Utilization of Family Planning Services among Women of Reproductive Age in a Rural Community of Enugu state, Nigeria. Rural communities were chosen for this study because past demographic surveys have shown that women in urban areas are more likely to accept and practice family planning compared to those in rural areas. Method: A Descriptive Cross-sectional Research design was employed to achieve the aim and objectives of the study. Data collected from 177 consenting participants using interviewer-administered questionnaires was analysed using Descriptive statistics to summarize the Socio-demographic characteristics of the participants and Access and Utilization of Family Planning Services among the participants including Reasons for using different Family Planning Methods and Barriers encountered in Access and Utilization of these services. A Cross-tabulation between Socio-demographic Characteristics of respondents and the use of Family Planning services was carried out. Result: The findings of this study revealed that majority of the participants (72.9%) have not utilized any family planning service. Out of those (27.1%) that have used any family planning service, majority of them are still currently using a form of family planning service and have access to them in health facilities, patent medicine vendors and others based on multiple responses. Male condoms were the most utilized modern family planning service. Based on multiple responses, inaccessibility, personal beliefs and partner’s objection were the most identified barriers encountered in accessing family planning services. Conclusion: Access and uptake of family planning services in rural communities is lower than the national average. Increasing access to family planning is an urgent priority for rural areas Interventions that will scale up Access and Utilization of family planning services in rural communities should be intensified.Keywords: access, family planning, rural community, utilization
Procedia PDF Downloads 4726967 Bridging the Gaping Levels of Information Entree for Visually Impaired Students in the Sri Lankan University Libraries
Authors: Wilfred Jeyatheese Jeyaraj
Abstract:
Education is a key determinant of future success, and every person deserves non-discriminant access to information for educational inevitabilities in any case. Analysing and understanding complex information is a crucial learning tool, especially for students. In order to compete equally with sighted students, visually impaired students require the unhinged access to access to all the available information resources. When the education of visually impaired students comes to a focal point, it can be stated that visually impaired students encounter several obstacles and barriers before they enter the university and during their time there as students. These obstacles and barriers are spread across technical, organizational and social arenas. This study reveals the possible approaches to absorb and benefit from the information provided by the Sri Lankan University Libraries for visually impaired students. Purposive sampling technique was used to select sample visually impaired students attached to the Sri Lankan National universities. There are 07 National universities which accommodate the visually impaired students and with the identified data, they were selected for this study and 80 visually impaired students were selected as the sample group. Descriptive type survey method was used to collect data. Structured questionnaires, interviews and direct observation were used as research instruments. As far as the Sri Lankan context spread is concerned, visually impaired students are able to finish their courses through their own determination to overcome the barriers they encounter on their way to graduation, through moral and practical support from their own friends and very often through a high level of creativity. According to the findings there are no specially trained university librarians to serve visually impaired users and less number of assistive technology equipment are available at present. This paper enables all university libraries in Sri Lanka to be informed about the social isolation of visually compromised students at the Sri Lankan universities and focuses on the rectification issues by considering their distinct case for interaction.Keywords: information access, Sri Lanka, university libraries, visual impairment
Procedia PDF Downloads 23526966 Artificial Intelligence as a User of Copyrighted Work: Descriptive Study
Authors: Dominika Collett
Abstract:
AI applications, such as machine learning, require access to a vast amount of data in the training phase, which can often be the subject of copyright protection. During later usage, the various content with which the application works can be recorded or made available on the basis of which it produces the resulting output. The EU has recently adopted new legislation to secure machine access to protected works under the DSM Directive; but, the issue of machine use of copyright works is not clearly addressed. However, such clarity is needed regarding the increasing importance of AI and its development. Therefore, this paper provides a basic background of the technology used in the development of applications in the field of computer creativity. The second part of the paper then will focus on a legal analysis of machine use of the authors' works from the perspective of existing European and Czech legislation. The main results of the paper discuss the potential collision of existing legislation in regards to machine use of works with special focus on exceptions and limitations. The legal regulation of machine use of copyright work will impact the development of AI technology.Keywords: copyright, artificial intelligence, legal use, infringement, Czech law, EU law, text and data mining
Procedia PDF Downloads 12426965 Investigation of Delivery of Triple Play Services
Authors: Paramjit Mahey, Monica Sharma, Jasbinder Singh
Abstract:
Fiber based access networks can deliver performance that can support the increasing demands for high speed connections. One of the new technologies that have emerged in recent years is Passive Optical Networks. This paper is targeted to show the simultaneous delivery of triple play service (data, voice and video). The comparative investigation and suitability of various data rates is presented. It is demonstrated that as we increase the data rate, number of users to be accommodated decreases due to increase in bit error rate.Keywords: BER, PON, TDMPON, GPON, CWDM, OLT, ONT
Procedia PDF Downloads 54226964 Data Mining Approach for Commercial Data Classification and Migration in Hybrid Storage Systems
Authors: Mais Haj Qasem, Maen M. Al Assaf, Ali Rodan
Abstract:
Parallel hybrid storage systems consist of a hierarchy of different storage devices that vary in terms of data reading speed performance. As we ascend in the hierarchy, data reading speed becomes faster. Thus, migrating the application’ important data that will be accessed in the near future to the uppermost level will reduce the application I/O waiting time; hence, reducing its execution elapsed time. In this research, we implement trace-driven two-levels parallel hybrid storage system prototype that consists of HDDs and SSDs. The prototype uses data mining techniques to classify application’ data in order to determine its near future data accesses in parallel with the its on-demand request. The important data (i.e. the data that the application will access in the near future) are continuously migrated to the uppermost level of the hierarchy. Our simulation results show that our data migration approach integrated with data mining techniques reduces the application execution elapsed time when using variety of traces in at least to 22%.Keywords: hybrid storage system, data mining, recurrent neural network, support vector machine
Procedia PDF Downloads 30926963 Access of Small and Medium Enterprises to Finance in Rural Areas: Case of Indonesia and Thailand
Authors: N. Ikasari, T. Sumransat, U. Eko, R. Kusumastuti
Abstract:
Small and medium enterprises (SMEs) are regarded as the engine for economic development, notwithstanding their continuous financing conundrum. In the case of developing countries, access to finance is a reflection of the effectiveness of government policy. The widely accepted perspective to assess small businesses’ access to finance is that of economic view. The existing body of literature presents access to finance in three dimensions; they are accessibility, eligibility and affordability. Within this perspective, the role of socio-cultural has not explored. This study is aimed at investigating the existence of any socio-cultural factors within access to finance issue in Asian countries where governance is enriched by countries’ values and beliefs. The significance of this study is the instigation of supplementary dimension to assess access to finance that eventually contributes to the development of micro-finance policy. Indonesia and Thailand are selected as cases in point, where distinction is drawn on the level of cultural diversity and micro-finance policy in respective country. A questionnaire is used to collect information related to the three dimensions of access to finance as well as to explore alternative financing reasoning to elaborate the issue from the demand side. Questionnaires are distributed to 60 small business owners operating in Indonesia and the same number in Thailand. In order to present a complete understanding on the matter at hand, interviews with banks are conducted to capture the perspective as presented by the supply side. Research findings show that small business owners and banks in Indonesia and Thailand are in agreement that access to finance is not deemed as an issue. However, trust issue that exists mutually between financing users and providers leads small business owners in Indonesia to look for alternative financing other than banks. The findings contribute to the refinement of micro-financing policy in Indonesia and Thailand.Keywords: access to finance, Indonesia, small and medium enterprises, Thailand
Procedia PDF Downloads 29226962 End to End Monitoring in Oracle Fusion Middleware for Data Verification
Authors: Syed Kashif Ali, Usman Javaid, Abdullah Chohan
Abstract:
In large enterprises multiple departments use different sort of information systems and databases according to their needs. These systems are independent and heterogeneous in nature and sharing information/data between these systems is not an easy task. The usage of middleware technologies have made data sharing between systems very easy. However, monitoring the exchange of data/information for verification purposes between target and source systems is often complex or impossible for maintenance department due to security/access privileges on target and source systems. In this paper, we are intended to present our experience of an end to end data monitoring approach at middle ware level implemented in Oracle BPEL for data verification without any help of monitoring tool.Keywords: service level agreement, SOA, BPEL, oracle fusion middleware, web service monitoring
Procedia PDF Downloads 48226961 The Role of Access Control Techniques in Creating a Safe Cyberspace for Children
Authors: Sara Muslat Alsahali, Nout Mohammed Alqahtani
Abstract:
Digital technology has changed the world, and with the increasing number of children accessing the Internet, it has now become an integral part of children's lives from their early years. With the rapid development of digital technology, the risks children face on the internet also evolve from cyberbullying to misuse, sexual exploitation, and abuse of their private information over the Internet. Digital technology, with its advantages and disadvantages, is now a fact of our life. Therefore, knowledge of how to reduce its risks and maximize its benefits will help shape the growth and future of a new generation of digital citizens. This paper will discuss access control techniques that help to create secure cyberspace where children can be safe without depriving them of their rights and freedom to use the internet and preventing them from its benefits. Also, it sheds light on its challenges and problems by classifying the methods of parental controlling into two possibilities asynchronous and synchronous techniques and choosing YouTube as a case study of access control techniques.Keywords: access control, cyber security, kids, parental monitoring
Procedia PDF Downloads 13926960 The Impact of Access to Finances on Survival of Small and Medium Enterprises: The South African Perspective in an Covid-19 Era
Authors: Thabiso Sthembiso Msomi
Abstract:
SMEs are the main engine of growth in most developing economies. One of the main factors that hinder the development of SME is access to finance. In this study, we explored the factors that hinder the growth and survival of SMEs in South Africa. The capital structure theory formed the theoretical underpinning for the study. The quantitative research design was adopted and data was collected from retail, construction, manufacturing and agriculture sectors of SMEs within the KwaZulu-Natal province of South Africa. The modified version of the Cochran formula was used to determine the sample size as 321 SMEs and analysed using the five-point Likert scale. The purposive sampling technique was used to select owners of SME. Statistical Package for the Social Sciences (SPSS) was used for the data analysis through Exploratory Factor Analysis (EFA) to determine the factor structures of items employed to measure each of the constructs in this study. Then, the Cronbach’s alpha test was conducted to determine the reliability of each construct. Kaiser-Meyer-Olkin (KMO) was used to determine the adequacy of the sample size. Linear regression was done to determine the effect of the independent variables on the dependent variable. The findings suggest that the main constraints facing South African SMEs were the lack of experienced management. Furthermore, the SMEs would fail to raise customer awareness of their products and services, which in turn affects their market access and monthly turnover. The study recommends that SMEs keep up-to-date records of business transactions to enable the business to keep track of its operations. The study recommends that South African banks adopt an SME accounting and bookkeeping program. The finding of this study benefits policymakers in both the private and public sectors.Keywords: small businesses, access to finances, COVID-19, SMEs survival
Procedia PDF Downloads 17826959 Lifetime Improvement of IEEE.802.15.6 Sensors in Scheduled Access Mode
Authors: Latif Adnane, C. E. Ait Zaouiat, M. Eddabbah
Abstract:
In Wireless Body Area Networks, the issue of systems lifetime is a big challenge to complete. In this paper, we have tackled this subject to suggest some solutions. For this aim, we have studied some batteries characteristics related to human body temperature. Moreover, we have analyzed a mathematical model which defines sensors lifetime (battery lifetime). Based on this model, we note that the random access increases the energy consumption, because nodes are waking up during the whole superframe period. Results show that using scheduled mode access of IEEE 802.15.6 maximizes the lifetime function, by setting nodes in the sleep mode in the inactive period of transmission.Keywords: battery, energy consumption, IEEE 802.15.6, lifetime, polling
Procedia PDF Downloads 34726958 Effect of Agricultural Extension Services on Technical Efficiency of Smallholder Cassava Farmers in Ghana: A Stochastic Meta-Frontier Analysis
Authors: Arnold Missiame
Abstract:
In Ghana, rural dwellers who depend primarily on agriculture for their livelihood constitute about 60% of the country’s population. This shows the critical role and potentials of the agricultural sector in helping to achieve Ghana’s vision 2030. With the current threat of climate change and advancements in technology, agricultural extension is not just about technology transfer and improvements in productivity, but it is also about improving the managerial and technical skills of farmers. In Ghana, the government of Ghana as well as other players in the sector like; non-governmental organizations, NGOs, local and international funding agencies, for decades now, have made capacity-building-investments in smallholder farmers by way of extension services delivery. This study sought to compare the technical efficiency of farmers who have access to agricultural extension and farmers who do not in Ghana. The study employed the stochastic meta-frontier model to analyze household survey data comprising 300 smallholder cassava farmers from the Fanteakwa district of Ghana. The farmers were selected through a two-stage sampling technique where 5 communities were purposively selected in the first stage and then 60 smallholder cassava farmers were randomly selected from each of the 5 communities. Semi-structured questionnaires were used to collect data on farmers’ socioeconomic and farm-level characteristics. The results showed that farmers who have access to agricultural extensions services have higher technical efficiencies (TE) and produce much closer to their meta-production frontiers (higher technology gap ratios (TGR) than farmers who do not have access to such extension services. Furthermore, experience in cassava cultivation and formal education significantly improves the technical efficiencies of farmers. The study recommends that the mode and scope of agricultural extension service delivery in the country should be enhanced to ensure that smallholder farmers have easy access to extension agents.Keywords: agricultural extension, Ghana, smallholder farmers, stochastic meta-frontier model, technical efficiency
Procedia PDF Downloads 10926957 Evaluation of Australian Open Banking Regulation: Balancing Customer Data Privacy and Innovation
Authors: Suman Podder
Abstract:
As Australian ‘Open Banking’ allows customers to share their financial data with accredited Third-Party Providers (‘TPPs’), it is necessary to evaluate whether the regulators have achieved the balance between protecting customer data privacy and promoting data-related innovation. Recognising the need to increase customers’ influence on their own data, and the benefits of data-related innovation, the Australian Government introduced ‘Consumer Data Right’ (‘CDR’) to the banking sector through Open Banking regulation. Under Open Banking, TPPs can access customers’ banking data that allows the TPPs to tailor their products and services to meet customer needs at a more competitive price. This facilitated access and use of customer data will promote innovation by providing opportunities for new products and business models to emerge and grow. However, the success of Open Banking depends on the willingness of the customers to share their data, so the regulators have augmented the protection of data by introducing new privacy safeguards to instill confidence and trust in the system. The dilemma in policymaking is that, on the one hand, lenient data privacy laws will help the flow of information, but at the risk of individuals’ loss of privacy, on the other hand, stringent laws that adequately protect privacy may dissuade innovation. Using theoretical and doctrinal methods, this paper examines whether the privacy safeguards under Open Banking will add to the compliance burden of the participating financial institutions, resulting in the undesirable effect of stifling other policy objectives such as innovation. The contribution of this research is three-fold. In the emerging field of customer data sharing, this research is one of the few academic studies on the objectives and impact of Open Banking in the Australian context. Additionally, Open Banking is still in the early stages of implementation, so this research traces the evolution of Open Banking through policy debates regarding the desirability of customer data-sharing. Finally, the research focuses not only on the customers’ data privacy and juxtaposes it with another important objective of promoting innovation, but it also highlights the critical issues facing the data-sharing regime. This paper argues that while it is challenging to develop a regulatory framework for protecting data privacy without impeding innovation and jeopardising yet unknown opportunities, data privacy and innovation promote different aspects of customer welfare. This paper concludes that if a regulation is appropriately designed and implemented, the benefits of data-sharing will outweigh the cost of compliance with the CDR.Keywords: consumer data right, innovation, open banking, privacy safeguards
Procedia PDF Downloads 14126956 Water Access and Food Security: A Cross-Sectional Study of SSA Countries in 2017
Authors: Davod Ahmadi, Narges Ebadi, Ethan Wang, Hugo Melgar-Quiñonez
Abstract:
Compared to the other Least Developed Countries (LDCs), major countries in sub-Saharan Africa (SSA) have limited access to the clean water. People in this region, and more specifically females, suffer from acute water scarcity problems. They are compelled to spend too much of their time bringing water for domestic use like drinking and washing. Apart from domestic use, water through affecting agriculture and livestock contributes to the food security status of people in vulnerable regions like SSA. Livestock needs water to grow, and agriculture requires enormous quantities of water for irrigation. The main objective of this study is to explore the association between access to water and individuals’ food security status. Data from 2017 Gallup World Poll (GWP) for SSA were analyzed (n=35,000). The target population in GWP is the entire civilian, non-institutionalized, aged 15 and older population. All samples selection is probability based and nationally representative. The Gallup surveys an average of 1,000 samples of individuals per country. Three questions related to water (i.e., water quality, availability of water for crops and availability of water for livestock) were used as the exposure variables. Food Insecurity Experience Scale (FIES) was used as the outcome variable. FIES measures individuals’ food security status, and it is composed of eight questions with simple dichotomous responses (1=Yes and 0=No). Different statistical analyses such as descriptive, crosstabs and binary logistic regression, form the basis of this study. Results from descriptive analyses showed that more than 50% of the respondents had no access to enough water for crops and livestock. More than 85% of respondents were categorized as “food insecure”. Findings from cross-tabulation analyses showed that food security status was significantly associated with water quality (0.135; P=0.000), water for crops (0.106; P=0.000) and water for livestock (0.112; P=0.000). In regression analyses, the probability of being food insecure increased among people who expressed no satisfaction with water quality (OR=1.884 (OR=1.768-2.008)), not enough water for crops (OR=1.721 (1.616-1.834)) and not enough water for livestock (OR=1.706 (1.819)). In conclusion, it should note that water access affects food security status in SSA.Keywords: water access, agriculture, livestock, FIES
Procedia PDF Downloads 15226955 Full Disclosure Policy: Transparency in Fiscal Administration
Authors: Joyly Jill Apud
Abstract:
Corruption is an all-encompassing issue worldwide. Many attempts have been done to address such cases especially by the government through increasing transparency. The Philippine government increased the mechanism of transparency by opening to public its financial transactions through Full Disclosure Policy – mandating all local governments to post in their websites all financial transactions (Philippine Public Transparency Reporting Project, 2011). For transparency to be fully realized, the challenge lies in creating a mechanism where the constituents are encouraged to engage as social auditors. In line of the said challenge, the study focused in Davao City, Philippines measuring the respondent’s awareness, access and utilization of Full Disclosure Policy (FDP). Particularly, this study determined the significant difference on the awareness, access and utilization of respondents when grouped according to sector and the significant relationship between respondents’ awareness and in the access and utilization of FDP reports. The study used descriptive-correlation, Mean, Anova and Pearson R as statistical treatment. The 120 respondents are from the different sectors of Davao City. These are the Academe, Youth, LGUs, NGOs, Business, and Church groups. The awareness of the respondents was measured in three main categories: Existence of the Policy, Content of the Policy and the Manner of Publication. Access and Utilization of the FDP reports is divided into three: Budget Reports, Procurement Reports and Special Purpose Fund Reports. Results showed that the respondents are moderately aware of the Policy. Though it manifested that the respondents are aware of the disclosure, they are unaware of the Full Disclosure Policy and Full Disclosure Policy Portal. Moreover, the respondents seldom access and utilize all the FDP reports. Further results revealed that there is a significant difference in the awareness and the access and utilization of FDP when grouped according to sector. Moreover, significant relationship in the awareness and the access and utilization of the FDP is evident. It showed that the higher the awareness on FDP, the higher the level of access and utilization on the FDP reports.Keywords: corruption, e-governance, budget transparency, participation
Procedia PDF Downloads 39526954 Weighing the Economic Cost of Illness Due to Dysentery and Cholera Triggered by Poor Sanitation in Rural Faisalabad, Pakistan
Authors: Syed Asif Ali Naqvi, Muhammad Azeem Tufail
Abstract:
Inadequate sanitation causes direct costs of treating illnesses and loss of income through reduced productivity. This study estimated the economic cost of health (ECH) due to poor sanitation and factors determining the lack of access to latrine for the rural, backward hamlets and slums of district Faisalabad, Pakistan. Cross sectional data were collected and analyzed for the study. As the population under study was homogenous in nature, it is why a simple random sampling technique was used for the collection of data. Data of 440 households from 4 tehsils were gathered. The ordinary least square (OLS) model was used for health cost analysis, and the Probit regression model was employed for determining the factors responsible for inaccess to toilets. The results of the study showed that condition of toilets, situation of sewerage system, access to adequate sanitation, Cholera, diarrhea and dysentery, Water and Sanitation Agency (WASA) maintenance, source of medical treatment can plausibly have a significant connection with the dependent variable. Outcomes of the second model showed that the variables of education, family system, age, and type of dwelling have positive and significant sway with the dependent variable. Variable of age depicted an insignificant association with access to toilets. Variable of monetary expenses would negatively influence the dependent variable. Findings revealed the fact, health risks are often exacerbated by inadequate sanitation, and ultimately, the cost on health also surges. Public and community toilets for youths and social campaigning are suggested for public policy.Keywords: sanitation, toilet, economic cost of health, water, Punjab
Procedia PDF Downloads 12326953 Domestic and Foreign Terrorism: Evaluation of the Breeding Ground
Authors: T. K. Hung
Abstract:
Terrorism acts have occurred across both developed and developing states, with well-identified motivation and causes. For many years, terrorism eradication has become a major topic yet only passive actions were taken in response to acts. The linkage between the location of terrorism occurrence and breeding ground is not well-documented, resulting in the passive approach used in counter-terrorism nowadays. The evaluation investigates all post-9/11 terrorism affairs considering their state capacity, safety, ease of border access control, religion diversity, and technology access, to measure the level of breeding ground of the states. Those "weak" states with poor border access control, resources capacity and domestic safety are the best breeding ground for terrorists. Although many attacks were caused by religious motivation, religion diversity does not predict the breeding ground. States with censored technology access, particular computer-mediated communication, predict on the terrorism breeding ground, moderated by the level of breeding ground of neighboring states.Keywords: counter-terrorism, lethality, security, terrorism
Procedia PDF Downloads 34026952 Factors Affecting Access to Education: The Experiences of Parents of Children Who Are Deaf or Hard of Hearing
Authors: Hanh Thi My Nguyen
Abstract:
The purpose of this research is to examine the experiences of parents of children who are deaf or hard of hearing in supporting their children to access education in Vietnam. Parents play a crucial role in supporting their children to gain full access to education. It was widely reported that parents of those children confronted a range of problems to support their children to access education. To author’s best knowledge, there has been a lack of research exploring the experiences of those parents in literature. This research examines factors affecting those parents in supporting their children to access education. To conduct the study, qualitative approach using a phenomenological research design was chosen to explore the central phenomena. Ten parents of children who were diagnosed as deaf or hard of hearing and aged 6-9 years were recruited through the support of the Association of Parents of Children with Hearing Impairment. Participants were interviewed via telephone with a mix of open and closed questions; interviews were audio recorded, transcribed and thematically analysed. The research results show that there are nine main factors that affected the parents in this study in making decisions relating to education for their children including: lack of information resources, perspectives of those parents on communication approaches, the families’ financial capacity, the psychological impact on the participants after their children’ diagnosis, the attitude of family members, attitude of school administrators, lack of local schools and qualified teachers, and current education system for the deaf in Vietnam. Apart from those factors, the lack of knowledge of the participants’ partners about deaf education and the partners’ employment are barriers to educational access and successful communication with their child.Keywords: access to education, deaf, hard of hearing, parents experience
Procedia PDF Downloads 13626951 Spectrum Allocation Using Cognitive Radio in Wireless Mesh Networks
Authors: Ayoub Alsarhan, Ahmed Otoom, Yousef Kilani, Abdel-Rahman al-GHuwairi
Abstract:
Wireless mesh networks (WMNs) have emerged recently to improve internet access and other networking services. WMNs provide network access to the clients and other networking functions such as routing, and packet forwarding. Spectrum scarcity is the main challenge that limits the performance of WMNs. Cognitive radio is proposed to solve spectrum scarcity problem. In this paper, we consider a cognitive wireless mesh network where unlicensed users (secondary users, SUs) can access free spectrum that is allocated to spectrum owners (primary users, PUs). Although considerable research has been conducted on spectrum allocation, spectrum assignment is still considered an important challenging problem. This problem can be solved using cognitive radio technology that allows SUs to intelligently locate free bands and access them without interfering with PUs. Our scheme considers several heuristics for spectrum allocation. These heuristics include: channel error rate, PUs activities, channel capacity and channel switching time. Performance evaluation of the proposed scheme shows that the scheme is able to allocate the unused spectrum for SUs efficiently.Keywords: cognitive radio, dynamic spectrum access, spectrum management, spectrum sharing, wireless mesh networks
Procedia PDF Downloads 53026950 Improving Access to Palliative Care for Heart Failure Patients in England Using a Health Systems Approach
Authors: Alex Hughes
Abstract:
Patients with advanced heart failure develop specific palliative care needs due to the progressive symptom burden and unpredictable disease trajectory. NICE guidance advises that palliative care should be provided to patients with both cancer and non-cancer conditions as and when required. However, there is some way to go before this guidance is consistently and effectively implemented nationwide in conditions such as heart failure. The Ambitions for Palliative and End of Life Care: A national framework for local action in England provides a set of foundations and ambitions which outline a vision for what high-quality palliative and end-of-life care look like in England. This poster aims to critically consider how to improve access to palliative care for heart failure patients in England by analysing the foundations taken from this framework to generate specific recommendations using Soft Systems Methodology (SSM). The eight foundations analysed are: ‘Personalised care planning’, ‘Shared records’, ‘Evidence and information’, ‘Involving, supporting and caring for those important to the dying Person’, ‘Education and training’, ‘24/7 access’, ‘Co-design’ and ‘Leadership.’ A number of specific recommendations have been generated which highlight a need to close the evidence-policy gap and implement policy with sufficient evidence. These recommendations, alongside the creation of an evidence-based national strategy for palliative care and heart failure, should improve access to palliative care for heart failure patients in England. Once implemented, it will be necessary to evaluate the effect of these proposals to understand if access to palliative care for heart failure patients actually improves.Keywords: access, health systems, heart failure, palliative care
Procedia PDF Downloads 12826949 The Effective Use of the Network in the Distributed Storage
Authors: Mamouni Mohammed Dhiya Eddine
Abstract:
This work aims at studying the exploitation of high-speed networks of clusters for distributed storage. Parallel applications running on clusters require both high-performance communications between nodes and efficient access to the storage system. Many studies on network technologies led to the design of dedicated architectures for clusters with very fast communications between computing nodes. Efficient distributed storage in clusters has been essentially developed by adding parallelization mechanisms so that the server(s) may sustain an increased workload. In this work, we propose to improve the performance of distributed storage systems in clusters by efficiently using the underlying high-performance network to access distant storage systems. The main question we are addressing is: do high-speed networks of clusters fit the requirements of a transparent, efficient and high-performance access to remote storage? We show that storage requirements are very different from those of parallel computation. High-speed networks of clusters were designed to optimize communications between different nodes of a parallel application. We study their utilization in a very different context, storage in clusters, where client-server models are generally used to access remote storage (for instance NFS, PVFS or LUSTRE). Our experimental study based on the usage of the GM programming interface of MYRINET high-speed networks for distributed storage raised several interesting problems. Firstly, the specific memory utilization in the storage access system layers does not easily fit the traditional memory model of high-speed networks. Secondly, client-server models that are used for distributed storage have specific requirements on message control and event processing, which are not handled by existing interfaces. We propose different solutions to solve communication control problems at the filesystem level. We show that a modification of the network programming interface is required. Data transfer issues need an adaptation of the operating system. We detail several propositions for network programming interfaces which make their utilization easier in the context of distributed storage. The integration of a flexible processing of data transfer in the new programming interface MYRINET/MX is finally presented. Performance evaluations show that its usage in the context of both storage and other types of applications is easy and efficient.Keywords: distributed storage, remote file access, cluster, high-speed network, MYRINET, zero-copy, memory registration, communication control, event notification, application programming interface
Procedia PDF Downloads 22226948 Implementation and Performance Analysis of Data Encryption Standard and RSA Algorithm with Image Steganography and Audio Steganography
Authors: S. C. Sharma, Ankit Gambhir, Rajeev Arya
Abstract:
In today’s era data security is an important concern and most demanding issues because it is essential for people using online banking, e-shopping, reservations etc. The two major techniques that are used for secure communication are Cryptography and Steganography. Cryptographic algorithms scramble the data so that intruder will not able to retrieve it; however steganography covers that data in some cover file so that presence of communication is hidden. This paper presents the implementation of Ron Rivest, Adi Shamir, and Leonard Adleman (RSA) Algorithm with Image and Audio Steganography and Data Encryption Standard (DES) Algorithm with Image and Audio Steganography. The coding for both the algorithms have been done using MATLAB and its observed that these techniques performed better than individual techniques. The risk of unauthorized access is alleviated up to a certain extent by using these techniques. These techniques could be used in Banks, RAW agencies etc, where highly confidential data is transferred. Finally, the comparisons of such two techniques are also given in tabular forms.Keywords: audio steganography, data security, DES, image steganography, intruder, RSA, steganography
Procedia PDF Downloads 29126947 Biodiversity and Biotechnology: Some Considerations about the International Regulation of Agriculture and the International Legal System on Access to Genetic Resources
Authors: Leandro Moura da Silva
Abstract:
The international community has strived to create legal mechanisms to protect their biodiversity, but this can represent, sometimes, particularly in the case of regulatory regime on access to genetic resources, an excessive nationalism which transforms itself into a significant obstacle to scientific progress causing damages to the country and to local farmers. Although it has been poorly publicized in the media, the international legal system was marked, in 2014, by the entry into force of the Nagoya Protocol, which regulates the access and benefit sharing of genetic resources of the States Party to that legal instrument. However, it’s not reasonable to think of regulating access to genetic resources without reflecting on the links of this important subject with other related issues, such as family farming and agribusiness, food safety, food security, intellectual property rights (on seeds, genetic material, new plant varieties, etc.), environmental sustainability, biodiversity, and biosafety.Keywords: international law, regulation on agriculture, agronomy techniques, sustainability, genetic resources and new crop varieties, CBD, Nagoya Protocol, ITPGRFA
Procedia PDF Downloads 50226946 Inter-Generational Benefits of Improving Access to Justice for Women: Evidence from Peru
Authors: Iva Trako, Maris Micaela Sviatschi, Guadalupe Kavanaugh
Abstract:
Domestic violence is a major concern in developing countries, with important social, economic and health consequences. However, institutions do not usually address the problems facing women or ethnic and religious minorities. For example, the police do very little to stop domestic violence in rural areas of developing countries. This paper exploits the introduction of women’s justice centers (WJCs) in Peru to provide causal estimates on the effects of improving access to justice for women and children. These centers offer a new integrated public service model for women by including medical, psychological and legal support in cases of violence against women. Our empirical approach uses a difference in difference estimation exploiting variation over time and space in the opening of WJC together with province-by-year fixed effects. Exploiting administrative data from health providers and district attorney offices, we find that after the opening of these centers, there are important improvements on women's welfare: a large reduction in femicides and female hospitalizations for assault. Moreover, using geo-coded household surveys we find evidence that the existence of these services reduces domestic violence, improves women's health, increases women's threat points and, therefore, lead to household decisions that are more aligned with their interests. Using administrative data on the universe of schools, we find large gains on human capital for their children: affected children are more likely to enroll, attend school and have better grades in national exams, instead of working for the family. In sum, the evidence in this paper shows that providing access to justice for women can be a powerful tool to reduce domestic violence and increase education of children, suggesting a positive inter-generational benefit.Keywords: access to justice, domestic violence, education, household bargaining
Procedia PDF Downloads 18626945 Transforming Healthcare Data Privacy: Integrating Blockchain with Zero-Knowledge Proofs and Cryptographic Security
Authors: Kenneth Harper
Abstract:
Blockchain technology presents solutions for managing healthcare data, addressing critical challenges in privacy, integrity, and access. This paper explores how privacy-preserving technologies, such as zero-knowledge proofs (ZKPs) and homomorphic encryption (HE), enhance decentralized healthcare platforms by enabling secure computations and patient data protection. An examination of the mathematical foundations of these methods, their practical applications, and how they meet the evolving demands of healthcare data security is unveiled. Using real-world examples, this research highlights industry-leading implementations and offers a roadmap for future applications in secure, decentralized healthcare ecosystems.Keywords: blockchain, cryptography, data privacy, decentralized data management, differential privacy, healthcare, healthcare data security, homomorphic encryption, privacy-preserving technologies, secure computations, zero-knowledge proofs
Procedia PDF Downloads 2026944 Access to Sexual Reproductive Health (SRH) Education and Services to Deaf Adolescents in Wakiso, Uganda - The Ugandan Perspective
Authors: Racheal Ayanga, Nancy Katumba Muwangala, Jane Babirye, Harriet Kivumbi
Abstract:
Background: Deaf adolescents are vulnerable. Deafness limits their access to resources that are accessed by their hearing peers. There is minimal attention placed on the SRH needs of persons with disabilities, especially in developing countries. We sought to assess barriers to access of SRH education and services for deaf adolescents in Uganda. Methods: We performed a cross sectional study using a questionnaire on knowledge of and access to SRH education and services from a selected sample of deaf adolescents aged 13-19 years at Wakiso Secondary school for the deaf. A consecutive sample of eligible participants was asked to join the study after obtaining informed consent until the target sample size was reached. Results: From 01 Jul 2022 to 30 Jan 2023, 70 quantitative interviews were conducted. Participants’ mean age was 17 years, and 66% were female. 89% had heard about several components of SRH. 99% reported a need for education and services but had challenges with access 85% of the time. 54% reported receipt of education and services from government or private facilities, and the rest from friends, parents, siblings, teachers and the internet. Conclusion: Government needs to look into availing tailored, sustainable SRH education/services to deaf adolescents at health facilities and teach health workers sign language. SRH education to parents, teachers and communities of deaf adolescents improves access in hard-to-reach areas. Integration of services into routine health care is key in creating and improving models of access to wider communities of persons with disabilities to improve their mental health.Keywords: sexual and reproductive health, deaf, adolescents, education, services, disabilities, mental health, hard-to-reach areas
Procedia PDF Downloads 8826943 Remote Wireless Communications Lab in Real Time
Authors: El Miloudi Djelloul
Abstract:
Technology nowadays enables the remote access to laboratory equipment and instruments via Internet. This is especially useful in engineering education, where students can conduct laboratory experiment remotely. Such remote laboratory access can enable student to use expensive laboratory equipment, which is not usually available to students. In this paper, we present a method of creating a Web-based Remote Laboratory Experimentation in the master degree course “Wireless Communications Systems” which is part of “ICS (Information and Communication Systems)” and “Investment Management in Telecommunications” curriculums. This is done within the RIPLECS Project and the NI2011 FF005 Research Project “Implementation of Project-Based Learning in an Interdisciplinary Master Program”.Keywords: remote access, remote laboratory, wireless telecommunications, external antenna-switching controller board (EASCB)
Procedia PDF Downloads 51526942 Internet Economy: Enhancing Information Communication Technology Adaptation, Service Delivery, Content and Digital Skills for Small Holder Farmers in Uganda
Authors: Baker Ssekitto, Ambrose Mbogo
Abstract:
The study reveals that indeed agriculture employs over 70% of Uganda’s population, of which majority are youth and women. The study further reveals that over 70% of the farmers are smallholder farmers based in rural areas, whose operations are greatly affected by; climate change, weak digital skills, limited access to productivity knowledge along value chains, limited access to quality farm inputs, weak logistics systems, limited access to quality extension services, weak business intelligence, limited access to quality markets among others. It finds that the emerging 4th industrial revolution powered by artificial intelligence, 5G and data science will provide possibilities of addressing some of these challenges. Furthermore, the study finds that despite rapid development of ICT4Agric Innovation, their uptake is constrained by a number of factors including; limited awareness of these innovations, low internet and smart phone penetration especially in rural areas, lack of appropriate digital skills, inappropriate programmes implementation models which are project and donor driven, limited articulation of value addition to various stakeholders among others. Majority of farmers and other value chain actors lacked knowledge and skills to harness the power of ICTs, especially their application of ICTs in monitoring and evaluation on quality of service in the extension system and farm level processes.Keywords: artificial intelligence, productivity, ICT4agriculture, value chain, logistics
Procedia PDF Downloads 7826941 Generic Data Warehousing for Consumer Electronics Retail Industry
Authors: S. Habte, K. Ouazzane, P. Patel, S. Patel
Abstract:
The dynamic and highly competitive nature of the consumer electronics retail industry means that businesses in this industry are experiencing different decision making challenges in relation to pricing, inventory control, consumer satisfaction and product offerings. To overcome the challenges facing retailers and create opportunities, we propose a generic data warehousing solution which can be applied to a wide range of consumer electronics retailers with a minimum configuration. The solution includes a dimensional data model, a template SQL script, a high level architectural descriptions, ETL tool developed using C#, a set of APIs, and data access tools. It has been successfully applied by ASK Outlets Ltd UK resulting in improved productivity and enhanced sales growth.Keywords: consumer electronics, data warehousing, dimensional data model, generic, retail industry
Procedia PDF Downloads 413