Search results for: access to justice
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3934

Search results for: access to justice

1774 Views on Abortion and Case Law on International and European Levels: Past and Present Jurisprudence

Authors: Aurélie Cassiers

Abstract:

In this presentation, an overview is given of the freedom of states to legislate concerning abortion. Today, access to safe and legal abortion is still a hot topic in many countries in the world. Abortion policies try to strike a balance between women’s rights to self-determination and private life on the one hand, and the protection of the life of unborn children on the other. Each country has different religious, cultural and political views on abortion, and therefore specific legislations. However, citizens may submit a complaint at international courts when they find their national legislation too restrictive. The study is discussed of the development of the ECtHR, UNCHR, and IACHR case law, regarding the question of the ‘right to abort’ and indirectly of the protection of the unborn children. Each relevant case is analyzed to answer the following questions: Is the unborn child protected, and if so, how? Why does the woman want to abort and how is her interest or right protected? How is a fair balance reached between the different interests? Is the state completely free to write policies that restrict abortion? What are the factors to determine the margin of appreciation of the state? In conclusion, does this specific court recognize a right to abort, and if so, under which conditions? To conclude, this presentation shows that each court has its own perspective on and perception of abortion, and its own criteria to determine whether the state is complying with international norms regarding individual liberty and protection of the children.

Keywords: abortion, international courts, unborn children, women rights

Procedia PDF Downloads 121
1773 Enhancing Internet of Things Security: A Blockchain-Based Approach for Preventing Spoofing Attacks

Authors: Salha Abdullah Ali Al-Shamrani, Maha Muhammad Dhaher Aljuhani, Eman Ali Ahmed Aldhaheri

Abstract:

With the proliferation of Internet of Things (IoT) devices in various industries, there has been a concurrent rise in security vulnerabilities, particularly spoofing attacks. This study explores the potential of blockchain technology in enhancing the security of IoT systems and mitigating these attacks. Blockchain's decentralized and immutable ledger offers significant promise for improving data integrity, transaction transparency, and tamper-proofing. This research develops and implements a blockchain-based IoT architecture and a reference network to simulate real-world scenarios and evaluate a blockchain-integrated intrusion detection system. Performance measures including time delay, security, and resource utilization are used to assess the system's effectiveness, comparing it to conventional IoT networks without blockchain. The results provide valuable insights into the practicality and efficacy of employing blockchain as a security mechanism, shedding light on the trade-offs between speed and security in blockchain deployment for IoT. The study concludes that despite minor increases in time consumption, the security benefits of incorporating blockchain technology into IoT systems outweigh potential drawbacks, demonstrating a significant potential for blockchain in bolstering IoT security.

Keywords: internet of things, spoofing, IoT, access control, blockchain, raspberry pi

Procedia PDF Downloads 60
1772 The Systematic Impact of Climatic Disasters on the Maternal Health in Pakistan

Authors: Yiqi Zhu, Jean Francois Trani, Rameez Ulhassan

Abstract:

Extreme weather phenomena increased by 46% between 2007 and 2017 and have become more intense with the rise in global average temperatures. This increased intensity of climate variations often induces humanitarian crises and particularly affects vulnerable populations in low- and middle-income countries (LMICs). Expectant and lactating mothers are among the most vulnerable groups. Pakistan ranks 10th among the most affected countries by climate disasters. In 2022, monsoon floods submerged a third of the country, causing the loss of 1,500 lives. Approximately 650,000 expectant and lactating mothers faced systematic stress from climatic disasters. Our study used participatory methods to investigate the systematic impact of climatic disasters on maternal health. In March 2023, we conducted six Group Model Building (GMB) workshops with healthcare workers, fathers, and mothers separately in two of the most affected areas in Pakistan. This study was approved by the Islamic Relief Research Review Board. GMB workshops consist of three sessions. In the first session, participants discussed the factors that impact maternal health. After identifying the factors, they discussed the connections among them and explored the system structures that collectively impact maternal health. Based on the discussion, a causal loop diagram (CLD) was created. Finally, participants discussed action ideas that could improve the system to enhance maternal health. Based on our discussions and the causal loop diagram, we identified interconnected factors at the family, community, and policy levels. Mothers and children are directly impacted by three interrelated factors: food insecurity, unstable housing, and lack of income. These factors create a reinforcing cycle that negatively affects both mothers and newborns. After the flood, many mothers were unable to produce sufficient breastmilk due to their health status. Without breastmilk and sufficient food for complementary feeding, babies tend to get sick in damp and unhygienic environments resulting from temporary or unstable housing. When parents take care of sick children, they miss out on income-generating opportunities. At the community level, the lack of access to clean water and sanitation (WASH) and maternal healthcare further worsens the situation. Structural failures such as a lack of safety nets and programs associated with flood preparedness make families increasingly vulnerable with each disaster. Several families reported that they had not fully recovered from a flood that occurred ten years ago, and this latest disaster destroyed their lives again. Although over twenty non-profit organizations are working in these villages, few of them provide sustainable support. Therefore, participants called for systemic changes in response to the increasing frequency of climate disasters. The study reveals the systematic vulnerabilities of mothers and children after climatic disasters. The most vulnerable populations are often affected the most by climate change. Collaborative efforts are required to improve water and forest management, strengthen public infrastructure, increase access to WASH, and gradually build climate-resilient communities. Governments, non-governmental organizations, and the community should work together to develop and implement effective strategies to prevent, mitigate, and adapt to climate change and its impacts.

Keywords: climatic disasters, maternal health, Pakistan, systematic impact, flood, disaster relief.

Procedia PDF Downloads 62
1771 Patient Perspectives on Telehealth During the Pandemic in the United States

Authors: Manal Sultan Alhussein, Xiang Michelle Liu

Abstract:

Telehealth is an advanced technology using digital information and telecommunication facilities that provide access to health services from a distance. It slows the transmission factor of COVID-19, especially for elderly patients and patients with chronic diseases during the pandemic. Therefore, understanding patient perspectives on telehealth services and the factors impacting their option of telehealth service will shed light on the measures that healthcare providers can take to improve the quality of telehealth services. This study aimed to evaluate perceptions of telehealth services among different patient groups and explore various aspects of telehealth utilization in the United States during the COVID-19 pandemic. An online survey distributed via social media platforms was used to collect research data. In addition to the descriptive statistics, both correlation and regression analyses were conducted to test research hypotheses. The empirical results highlighted that the factors such as accessibility to telehealth services and the type of specialty clinics that the patients required play important roles in the effectiveness of telehealth services they received. However, the results found that patients’ waiting time to receive telehealth services and their annual income did not significantly influence their desire to select receiving healthcare services via telehealth. The limitations of the study and future research directions are discussed.

Keywords: telehealth, patient satisfaction, pandemic, healthcare, survey

Procedia PDF Downloads 104
1770 Bacteriological Safety of Sachet Drinking Water Sold in Benin City, Nigeria

Authors: Stephen Olusanmi Akintayo

Abstract:

Access to safe drinking water remains a major challenge in Nigeria, and where available, the quality of the water is often in doubt. An alternative to the inadequate clean drinking water is being found in treated drinking water packaged in electrically heated sealed nylon and commonly referred to as “sachet water”. “Sachet water” is a common thing in Nigeria as the selling price is within the reach of members of the low socio- economic class and the setting up of a production unit does not require huge capital input. The bacteriological quality of selected “sachet water” stored at room temperature over a period of 56 days was determined to evaluate the safety of the sachet drinking water. Test for the detection of coliform bacteria was performed, and the result showed no coliform bacteria that indicates the absence of fecal contamination throughout 56 days. Heterotrophic plate count (HPC) was done at an interval 14 days, and the samples showed HPC between 0 cfu/mL and 64 cfu/mL. The highest count was observed on day 1. The count decreased between day 1 and 28, while no growths were observed between day 42 and 56. The decrease in HPC suggested the presence of residual disinfectant in the water. The organisms isolated were identified as Staphylococcus epidermis and S. aureus. The presence of these microorganisms in sachet water is indicative for contamination during processing and handling.

Keywords: coliform, heterotrophic plate count, sachet water, Staphyloccocus aureus, Staphyloccocus epidermidis

Procedia PDF Downloads 330
1769 Candida antarctica Lipase-B Catalyzed Alkaline-Hydrolysis of Some Aryl-Alkyl Acetate in Non-Aqueous Media

Authors: M. Merabet-Khelassi, Z. Houiene, L. Aribi-Zouioueche, O. Riant

Abstract:

Lipases (EC.3.1.1.3) are efficient biotools widely used for their remarkable chemo-, regio- and enantio-selectivity, especially, in kinetic resolution of racemates. They offer access to a large panel of enantiopure building blocks, such as secondary benzylic alcohols, commonly used as synthetic intermediates in pharmaceutical and agrochemical industries. Due to the stability of lipases in both water and organic solvents poor in water, they are able to catalyze both transesterifications of arylalkylcarbinols and hydrolysis of their corresponding acetates. The use of enzymatic hydrolysis in aqueous media still limited. In this presentation, we expose a practical methodology for the preparation of optically enriched acetates using a Candida antarctica lipase B-catalyzed hydrolysis in non-aqueous media in the presence of alkaline carbonate salts. The influence of several parameters which can intervene on the enzymatic efficiency such as the impact of the introduction of the carbonates salts, its amount and the nature of the alkaline earth metal are discussed. The obtained results show that the use of sodium carbonate with CAL-B enhances drastically both reactivity and selectivity of this immobilized lipase. In all cases, the resulting alcohols and remaining acetates are obtained in high ee values (up to > 99 %), and the selectivities reach (E > 500).

Keywords: alkaline-hydrolysis, enzymatic kinetic resolution, lipases, arylalkylcarbinol, non-aqueous media

Procedia PDF Downloads 151
1768 Tracing the Direction of Media Activism: Public Perspective

Authors: G. Arockiasamy, B. Sujeevan Kumar, Surendheran

Abstract:

Human progress and development are highly influenced by the power of information access and technology. A global and multi-national transformation all over the word is possible due to digitalization. In the process of exchanging information, experience, and resources, there is a radical shift in who controls them. Mass media has turned the world into a global village by strengthening communication network. As a result, a new digital culture has emerged as a social network commonly known as new media. Today the advancement of technology is at the doorstep of everyone linking to anywhere. The traditional social restrictions are broken down by the new type of virtual communication modality that transcends people beyond boundaries At the same time media empire has invaded every nook and corner of the world through great expansion. Media activism is growing stronger and stronger but the truth and true meaning lost in the process. This paper explores the peoples’ attitude to media activism and tracing its direction. The methodology employed is random sampling survey and content analysis method. Both qualitatively and quantitatively measured. The findings tend to show 60 percent indicate media activism as positive and others indicate as negative. As a conclusion, media activism has danger within but depends on nature of the development of human orientation.

Keywords: media activism, media industry, program, truth information, orientation and nature

Procedia PDF Downloads 203
1767 Shaheen Bagh Protests: Women, Public Spaces, Citizenship and Dissent

Authors: Priyanka Joshi

Abstract:

The paper traces the evolving relationship between women, public spaces, and citizenship and dissent by analyzing acts of dissent led by women. The paper outlines this relationship in the context of the protests held in Shaheen Bagh, Delhi against the Citizenship Amendment Act (CAA), National Registry of Citizens (NRC), and National Population Register (NPR) in 2019. Additionally, the paper aims to explore how the multiple identities of the protestors in Shaheen Bagh affected the nature, implications, and responses to the protests. To do so, the paper will analyze three key areas in relationship with women, namely, public spaces, citizenship, and dissent. In doing so, it will examine the gendered access to public spaces and its implications on the realization of one’s citizenship rights. Moreover, it will explore the historical notions of citizenship, its contemporary understanding, the exclusionary nature of citizenship, and the conflict between community rights and individual rights with respect to women’s rights. In context of dissent, it will evaluate the understanding of dissent and trace the difference in the experience of dissent based on gender by reviewing social movements led and maintained by women. This paper will utilize secondary data to explore the questions it poses. This includes a study of books and journal articles in conjunction with media reports concerning gender, public spaces, citizenship, and dissent. It will apply an intersectional lens in its analysis.

Keywords: citizenship, dissent, public spaces, Shaheen Bagh, women

Procedia PDF Downloads 144
1766 Food Security in Nigeria: An Examination of Food Availability and Accessibility in Nigeria

Authors: Okolo Chimaobi Valentine, Obidigbo Chizoba

Abstract:

As a basic physiology need, the threat to sufficient food production is the threat to human survival. Food security has been an issue that has gained global concern. This paper looks at the food security in Nigeria by assessing the availability of food and accessibility of the available food. The paper employed multiple linear regression technique and graphic trends of growth rates of relevant variables to show the situation of food security in Nigeria. Results of the tests revealed that population growth rate was higher than the growth rate of food availability in Nigeria for the earlier period of the study. Commercial bank credit to the agricultural sector, foreign exchange utilization for food and the Agricultural Credit Guarantee Scheme Fund (ACGSF) contributed significantly to food availability in Nigeria. Food prices grew at a faster rate than the average income level, making it difficult to access sufficient food. It implies that prior to the year 2012; there was insufficient food to feed the Nigerian populace. However, continued credit to the food and agricultural sector will ensure sustained and sufficient production of food in Nigeria. Microfinance banks should make sufficient credit available to the smallholder farmer. The government should further control and subsidize the rising price of food to make it more accessible by the people.

Keywords: food, accessibility, availability, security

Procedia PDF Downloads 362
1765 Telecontrolled Service Robots for Increasing the Quality of Life of Elderly and Disabled

Authors: Nayden Chivarov, Denis Chikurtev, Kaloyan Yovchev, Nedko Shivarov

Abstract:

This paper represents methods for improving the efficiency and precision of service mobile robot. This robot is used for increasing the quality of life of elderly and disabled people. The key concept of the proposed Intelligent Service Mobile Robot is its easier adaptability to achieve services for a wide range of Elderly or Disabled Person’s needs, by performing different tasks for supporting Elderly or Disabled Persons care. We developed robot autonomous navigation and computer vision systems in order to recognize different objects and bring them to the people. Web based user interface is developed to provide easy access and tele-control of the robot by any device through the internet. In this study algorithms for object recognition and localization are proposed for providing successful object recognition and accuracy in the positioning. Different methods for sending movement commands to the mobile robot system are proposed and evaluated. After executing some experiments to show the results of the research, we can summarize that these systems and algorithms provide good control of the service mobile robot and it will be more useful to help the elderly and disabled persons.

Keywords: service robot, mobile robot, autonomous navigation, computer vision, web user interface, ROS

Procedia PDF Downloads 328
1764 Predisposition of Small Scale Businesses in Fagge, Kano State, Nigeria, Towards Profit and Loss Sharing Mode of Finance

Authors: Farida, M. Shehu, Shehu U. R. Aliyu

Abstract:

Access to finance has been recognized in the literature as one of the major impediments confronting small scale businesses (SSBs). This largely arises due to high lending rate, religious inclinations, collateral, etc. Islamic mode finance operates under Profit and Loss Sharing (PLS) arrangement between a borrower (business owner) and a lender (Islamic bank). This paper empirically assesses the determinants of predisposition of small scale business operators in Fagge local government area, Kano State, Nigeria, towards the PLS. Cross-sectional data from a sample of 291 small scale business operators was analyzed using logit and probit regression models. Empirical results reveal that while awareness and religion inclination positively drive interest towards the PLS, lending rate and collateral work against it. The paper, therefore, strongly recommends more advocacy campaigns and setting up of more Islamic banks in the country to cater for the financing and religious needs of SSBs in the study area.

Keywords: Islamic finance, logit and probit models, profit and loss sharing small scale businesses, finance, commerce

Procedia PDF Downloads 362
1763 Providing a Secure, Reliable and Decentralized Document Management Solution Using Blockchain by a Virtual Identity Card

Authors: Meet Shah, Ankita Aditya, Dhruv Bindra, V. S. Omkar, Aashruti Seervi

Abstract:

In today's world, we need documents everywhere for a smooth workflow in the identification process or any other security aspects. The current system and techniques which are used for identification need one thing, that is ‘proof of existence’, which involves valid documents, for example, educational, financial, etc. The main issue with the current identity access management system and digital identification process is that the system is centralized in their network, which makes it inefficient. The paper presents the system which resolves all these cited issues. It is based on ‘blockchain’ technology, which is a 'decentralized system'. It allows transactions in a decentralized and immutable manner. The primary notion of the model is to ‘have everything with nothing’. It involves inter-linking required documents of a person with a single identity card so that a person can go anywhere without having the required documents with him/her. The person just needs to be physically present at a place wherein documents are necessary, and using a fingerprint impression and an iris scan print, the rest of the verification will progress. Furthermore, some technical overheads and advancements are listed. This paper also aims to layout its far-vision scenario of blockchain and its impact on future trends.

Keywords: blockchain, decentralized system, fingerprint impression, identity management, iris scan

Procedia PDF Downloads 118
1762 Practices of Entomophagy and Entomotherapy in Baranggay Alambijud, Argao and Baranggay Lusaran, Cebu City, Philippines

Authors: Jake Joshua C. Garces, Zandra O. Jarito, Leslie Ann T. Barriga, Froilen C. Domicelo, Nimfa R. Pansit

Abstract:

The study was conducted in order to discover the medicinal and edible potentialities of different insect species in Baranggay Alambijud, Argao and Baranggay Lusaran, Cebu City, Cebu. In order to identify these entomological practices, a survey was carried out by the researchers in these key sites. Fourteen key informants were obtained and these were identified with the aide of two sampling methods- snowball technique and purposive sampling. Open-ended questionnaires were employed in order to obtain authentic and significant information from the key informants. Results portrayed that in the practice of entomotherapy, two insects were used as medicine namely: migratory locust (Locusta migratoria manillensis) and honey bee (Apis dorsata); and two insect by-products were utilized namely: feces of cockroach (Periplaneta Americana) and honey. White grub (Cotinis nitida) and bee eggs were also documented to manifest edible capability and were thus utilized in the entomophagic practices. After applying thematic analysis, it was determined that the causative factors of their entomological practices include their limited educational attainment, their inability to access urban societies and the influence brought about by their family and community.

Keywords: entomophagy, entomotherapy, entomology, key informants

Procedia PDF Downloads 329
1761 Convergence and Stability in Federated Learning with Adaptive Differential Privacy Preservation

Authors: Rizwan Rizwan

Abstract:

This paper provides an overview of Federated Learning (FL) and its application in enhancing data security, privacy, and efficiency. FL utilizes three distinct architectures to ensure privacy is never compromised. It involves training individual edge devices and aggregating their models on a server without sharing raw data. This approach not only provides secure models without data sharing but also offers a highly efficient privacy--preserving solution with improved security and data access. Also we discusses various frameworks used in FL and its integration with machine learning, deep learning, and data mining. In order to address the challenges of multi--party collaborative modeling scenarios, a brief review FL scheme combined with an adaptive gradient descent strategy and differential privacy mechanism. The adaptive learning rate algorithm adjusts the gradient descent process to avoid issues such as model overfitting and fluctuations, thereby enhancing modeling efficiency and performance in multi-party computation scenarios. Additionally, to cater to ultra-large-scale distributed secure computing, the research introduces a differential privacy mechanism that defends against various background knowledge attacks.

Keywords: federated learning, differential privacy, gradient descent strategy, convergence, stability, threats

Procedia PDF Downloads 13
1760 Time of Week Intensity Estimation from Interval Censored Data with Application to Police Patrol Planning

Authors: Jiahao Tian, Michael D. Porter

Abstract:

Law enforcement agencies are tasked with crime prevention and crime reduction under limited resources. Having an accurate temporal estimate of the crime rate would be valuable to achieve such a goal. However, estimation is usually complicated by the interval-censored nature of crime data. We cast the problem of intensity estimation as a Poisson regression using an EM algorithm to estimate the parameters. Two special penalties are added that provide smoothness over the time of day and day of the week. This approach presented here provides accurate intensity estimates and can also uncover day-of-week clusters that share the same intensity patterns. Anticipating where and when crimes might occur is a key element to successful policing strategies. However, this task is complicated by the presence of interval-censored data. The censored data refers to the type of data that the event time is only known to lie within an interval instead of being observed exactly. This type of data is prevailing in the field of criminology because of the absence of victims for certain types of crime. Despite its importance, the research in temporal analysis of crime has lagged behind the spatial component. Inspired by the success of solving crime-related problems with a statistical approach, we propose a statistical model for the temporal intensity estimation of crime with censored data. The model is built on Poisson regression and has special penalty terms added to the likelihood. An EM algorithm was derived to obtain maximum likelihood estimates, and the resulting model shows superior performance to the competing model. Our research is in line with the smart policing initiative (SPI) proposed by the Bureau Justice of Assistance (BJA) as an effort to support law enforcement agencies in building evidence-based, data-driven law enforcement tactics. The goal is to identify strategic approaches that are effective in crime prevention and reduction. In our case, we allow agencies to deploy their resources for a relatively short period of time to achieve the maximum level of crime reduction. By analyzing a particular area within cities where data are available, our proposed approach could not only provide an accurate estimate of intensities for the time unit considered but a time-variation crime incidence pattern. Both will be helpful in the allocation of limited resources by either improving the existing patrol plan with the understanding of the discovery of the day of week cluster or supporting extra resources available.

Keywords: cluster detection, EM algorithm, interval censoring, intensity estimation

Procedia PDF Downloads 61
1759 Strategies and Perceptions of Small Olive Oil Farmers of By-Product Valorization

Authors: Judit Manuel-i-Martin, Mechthild Donner, Ivana Radic, Yamna Erraach, Fatima Elhadad, Taoufik Yatribi, Feliu Lopez-i-Gelats

Abstract:

This paper investigates how small olive farmers and olive oil producers implement circular economy practices to manage olive related waste and how such strategies are perceived by the farmers themselves. While there is a lot of data and research about possible uses of olive oil by-products, the perceptions and related practices of olive oil farmers is a much less investigated domain. A total of 60 semi-structured interviews were conducted in one of the most relevant olive oil producing regions in the Iberian Peninsula -the region of Terres de Ponent (Catalonia – Spain) - to examine the different by-product valorization strategies the olive oil farms develop. We test the hypothesis that the strategies conducted depend on the nature and amount of resources available by the farm. The results obtained point that access to milling infrastructure is a determining factor. We also found that olive tree pruning biomass and olive pomace are the most common by-products valorized by farmers, the first one on-farm and the latter in mills. Results indicate that high value uses for olive oil by-products are rarely implemented by farmers. We conclude that olive farmers tend to perceive by-product valorization strategies as waste management practices rather than as additional sources of value for their farm.

Keywords: circular economy, discourses, Mediterranean region, olive oil by-products, farmers’ strategies, olive pomace

Procedia PDF Downloads 125
1758 The Connection between De Minimis Rule and the Effect on Trade

Authors: Pedro Mario Gonzalez Jimenez

Abstract:

The novelties introduced by the last Notice on agreements of minor importance tighten the application of the ‘De minimis’ safe harbour in the European Union. However, the undetermined legal concept of effect on trade between the Member States becomes importance at the same time. Therefore, the current analysis that the jurist should carry out in the European Union to determine if an agreement appreciably restrict competition under Article 101 of the Treaty on the Functioning of the European Union is double. Hence, it is necessary to know how to balance the significance in competition and the significance in effect on trade between the Member States. It is a crucial issue due to the negative delimitation of restriction of competition affects the positive one. The methodology of this research is rather simple. Beginning with a historical approach to the ‘De Minimis Rule’, their main problems and uncertainties will be found. So, after the analysis of normative documents and the jurisprudence of the Court of Justice of the European Union some proposals of ‘Lege ferenda’ will be offered. These proposals try to overcome the contradictions and questions that currently exist in the European Union as a consequence of the current legal regime of agreements of minor importance. The main findings of this research are the followings: Firstly, the effect on trade is another way to analyze the importance of an agreement different from the ‘De minimis rule’. In point of fact, this concept is singularly adapted to go through agreements that have as object the prevention, restriction or distortion of competition, as it is observed in the most famous European Union case-law. Thanks to the effect on trade, as long as the proper requirements are met there is no a restriction of competition under article 101 of the Treaty on the Functioning of the European Union, even if the agreement had an anti-competitive object. These requirements are an aggregate market share lower than 5% on any of the relevant markets affected by the agreement and turnover lower than 40 million of Euros. Secondly, as the Notice itself says ‘it is also intended to give guidance to the courts and competition authorities of the Member States in their application of Article 101 of the Treaty, but it has no binding force for them’. This reality makes possible the existence of different statements among the different Member States and a confusing perception of what a restriction of competition is. Ultimately, damage on trade between the Member States could be observed for this reason. The main conclusion is that the significant effect on trade between Member States is irrelevant in agreements that restrict competition because of their effects but crucial in agreements that restrict competition because of their object. Thus, the Member States should propose the incorporation of a similar concept in their legal orders in order to apply the content of the Notice. Otherwise, the significance of the restrictive agreement on competition would not be properly assessed.

Keywords: De minimis rule, effect on trade, minor importance agreements, safe harbour

Procedia PDF Downloads 171
1757 Study of Exciton Binding Energy in Photovoltaic Polymers and Non-Fullerene Acceptors

Authors: Ho-Wa Li, Sai-Wing Tsang

Abstract:

The excitonic effect in organic semiconductors plays a key role in determining the electronic devices performance. Strong exciton binding energy has been regarded as the detrimental factor limiting the further improvement in organic photovoltaic cells. To the best of our knowledge, only limited reported can be found in measuring the exciton binding energy in organic photovoltaic materials. Conventional sophisticated approach using photoemission spectroscopy (UPS and IPES) would limit the wide access of the investigation. Here, we demonstrate a facile approach to study the electrical and optical quantum efficiencies of a series of conjugated photovoltaic polymer, fullerene and non-fullerene materials. Quantitative values of the exciton binding energy in those prototypical materials were obtained with concise photovoltaic device structure. And the extracted binding energies have excellent agreement with those determined by the conventional photoemission technique. More importantly, our findings can provide valuable information on the excitonic dissociation in the first excited state. Particularly, we find that the high binding energy of some non-fullerene acceptors limits the combination of polymer acceptors for efficiency exciton dissociation. The results bring insight into the engineering of excitonic effect for the development of efficient organic photovoltaic cells.

Keywords: organic photovoltaics, quantum efficiency, exciton binding energy, device physics

Procedia PDF Downloads 137
1756 Challenges of Technical and Engineering Students in the Application of Scientific Cancer Knowledge to Preserve the Future Generation in Sub-Saharan Africa

Authors: K. Shaloom Mbambu, M. Pascal Tshimbalanga, K. Ruth Mutala, K. Roger Kabuya, N. Dieudonné Kabeya, Y. L. Kabeya Mukeba

Abstract:

In this article, the authors examine the even more worrying situation of girls in sub-Saharan Africa. Two-girls on five are private of Global Education, which represents a real loss to the development of communities and countries. Cultural traditions, poverty, violence, early and forced marriages, early pregnancies, and many other gender inequalities were the causes of this cancer development. Namely, "it is no more efficient development tool that is educating girls." The non-schooling of girls and their lack of supervision by liberal professions have serious consequences for the life of each of them. To improve the conditions of their inferior status, girls to men introduce poverty and health risks. Raising awareness among parents and communities on the importance of girls' education, improving children's access to school, girl-boy equality with their rights, creating income, and generating activities for girls, girls, and girls learning of liberal trades to make them self-sufficient. Organizations such as the United Nations Organization can save the children. ASEAD and the AEDA group are predicting the impact of this cancer on the development of a nation's future generation must be preserved.

Keywords: young girl, Sub-Saharan Africa, higher and vocational education, development, society, environment

Procedia PDF Downloads 247
1755 Social Networking Sites: A Platform for Communication and Collaboration for Visually Impaired

Authors: Sufia Khowaja, Nishat Fatima

Abstract:

Social networking sites are significant for visually impaired to overcome the unique challenges they face and access the resources they need to succeed in their education and beyond which might be difficult to obtain through traditional means. It provides them an opportunity to build relationships, stay connected with their support network as well as to develop social skills which give them emotional support to fell less isolated. In this connection the study is conducted with the aim to determine the use of social networking sites, purpose of using and activities performed by visually impaired at Delhi University, Delhi, Jawaharlal Nehru University, Delhi and Jamia Milia Islamia, Delhi. The study followed survey technique in which structured interview is followed to collect data from 137 visually impaired students and analysed using ‘SPSS ver23’. The findings of the study revealed that mostly used social networking sites are whatsapp by 89.23% students of DU, 95.12% of JNU, 87.09% of JMI, followed by e-mail by 78.46% of DU, 78.04% of JNU, 64.51%; youtube by 73.84% DU, 90.24% JNU, 80.64% JMI. Purpose for using these sites is for academics mentioned by 96.92% DU, 100% JNU, 93.54% JMI. Activities performed on sites are sending and receiving messaging 96.92% DU, 92.68% JNU, 93.55% JMI, communicating with friends and family as well as getting academic information. Findings of the study will be helpful for libraries to disseminate their services and resources as well as latest updates to their visually impaired users with the help of most used tools.

Keywords: social networking sites, visually impaired, Delhi University, Jawaharlal Nehru University, Jamia Milia Islamia

Procedia PDF Downloads 82
1754 An Improved Image Steganography Technique Based on Least Significant Bit Insertion

Authors: Olaiya Folorunsho, Comfort Y. Daramola, Joel N. Ugwu, Lawrence B. Adewole, Olufisayo S. Ekundayo

Abstract:

In today world, there is a tremendous rise in the usage of internet due to the fact that almost all the communication and information sharing is done over the web. Conversely, there is a continuous growth of unauthorized access to confidential data. This has posed a challenge to information security expertise whose major goal is to curtail the menace. One of the approaches to secure the safety delivery of data/information to the rightful destination without any modification is steganography. Steganography is the art of hiding information inside an embedded information. This research paper aimed at designing a secured algorithm with the use of image steganographic technique that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image (bmp) in order to enhance security and reliability. In the LSB approach, the basic idea is to replace the LSB of the pixels of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The system was implemented using C# programming language of Microsoft.NET framework. The performance evaluation of the proposed system was experimented by conducting a benchmarking test for analyzing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The result showed that image steganography performed considerably in securing data hiding and information transmission over the networks.

Keywords: steganography, image steganography, least significant bits, bit map image

Procedia PDF Downloads 255
1753 Barriers That Special Education Teachers Faced When Working with Students with Intellectual Disabilities in an Inclusion Schools

Authors: Faris Algahtani

Abstract:

Every child has a right to education. This is one of the laws in the constitution and it empowers every child to access knowledge but it does not, however, allocate special interest to the rights of education for children with disabilities. It also does not address the challenges that teachers of such children face while trying to educate them. This study was conducted at government schools of Saudi Arabia. As the teaching profession is the most valuable profession and deserves to have its challenges tackled. This paper explores the challenges that teachers face as they try to teach students who have intellectual disabilities (ID). It looks at the daily challenges of a teacher who has to teach both children with disabilities and those without. The literature review shed light on the various aspects of mainstream education from the classroom to the outside environment to the teachers involved in mainstream education. The study employed qualitative methods in which Focus Group Discussions were utilized and Twenty (N=20) special education teachers were randomly sampled from primary schools through 6 groups of teachers from 6 different schools were interviewed through semi-structured interviews with the aim of drawing collective perceptions rather than personal perceptions about the challenges. The study found that most teachers had similar perceptions about the challenges that teachers face as they educate students with intellectual disabilities. The study recommends that The Ministry of Education should consider increasing the availability of special needs courses, workshops and conference for special education teachers.

Keywords: intellectual disabilities, inclusion, mainstream schools, disabilities, special education teachers

Procedia PDF Downloads 127
1752 Regulation on the Protection of Personal Data Versus Quality Data Assurance in the Healthcare System Case Report

Authors: Elizabeta Krstić Vukelja

Abstract:

Digitization of personal data is a consequence of the development of information and communication technologies that create a new work environment with many advantages and challenges, but also potential threats to privacy and personal data protection. Regulation (EU) 2016/679 of the European Parliament and of the Council is becoming a law and obligation that should address the issues of personal data protection and information security. The existence of the Regulation leads to the conclusion that national legislation in the field of virtual environment, protection of the rights of EU citizens and processing of their personal data is insufficiently effective. In the health system, special emphasis is placed on the processing of special categories of personal data, such as health data. The healthcare industry is recognized as a particularly sensitive area in which a large amount of medical data is processed, the digitization of which enables quick access and quick identification of the health insured. The protection of the individual requires quality IT solutions that guarantee the technical protection of personal categories. However, the real problems are the technical and human nature and the spatial limitations of the application of the Regulation. Some conclusions will be drawn by analyzing the implementation of the basic principles of the Regulation on the example of the Croatian health care system and comparing it with similar activities in other EU member states.

Keywords: regulation, healthcare system, personal dana protection, quality data assurance

Procedia PDF Downloads 31
1751 Online Graduate Students’ Perspective on Engagement in Active Learning in the United States

Authors: Ehi E. Aimiuwu

Abstract:

As of 2017, many researchers in educational journals are still wondering if students are effectively and efficiently engaged in active learning in the online learning environment. The goal of this qualitative single case study and narrative research is to explore if students are actively engaged in their online learning. Seven online students in the United States from LinkedIn and residencies were interviewed for this study. Eleven online learning techniques from research were used as a framework.  Data collection tools were used for the study that included a digital audiotape, observation sheet, interview protocol, transcription, and NVivo 12 Plus qualitative software.  Data analysis process, member checking, and key themes were used to reach saturation. About 85.7% of students preferred individual grading. About 71.4% of students valued professor’s interacting 2-3 times weekly, participating through posts and responses, having good internet access, and using email.  Also, about 57.1% said students log in 2-3 times weekly to daily, professor’s social presence helps, regular punctuality in work submission, and prefer assessments style of research, essay, and case study.  About 42.9% appreciated syllabus usefulness and professor’s expertise.

Keywords: class facilitation, course management, online teaching, online education, student engagement

Procedia PDF Downloads 122
1750 The Hypoglycemic Grab Back (HOGG): Preparing Hypo-Screen-Bags to Streamline the Time-Consuming Process of Administering Glucose Systemic Correction

Authors: Mai Ali

Abstract:

Background: Preparing Hypo-screen-bags in advance streamlines the time-consuming process of administering glucose systemic correction. Additionally, Hypo-Screen Grab Bags are widely adopted in UK hospitals. Aim: The aim of the study is to improve hypoglycemia screening efficiency and equipment accessibility by streamlining item access to grab bag restocking staff. Methodology: The study centered on neonatal wards at LGI & St. James Neonatal Unit and related units. A web-based survey was conducted to evaluate local practices, gathering 21 responses from relevant general staff. The survey outcomes: (1) The demand for accessible grab bags is evident for smoother processes. (2) The potential to enhance efficiency through improved preparation of hypo-screen grab bags. Intervention: A Hypo-Screen Grab Bag was designed, including checklists for stocked items and required samples. Medical staff oversee restocking after use. Conclusion: The study successfully improved hypoglycemia screening efficiency and aided junior staff with accessible supplies and a user-friendly checklist.

Keywords: neonatal hypoglycemia, grab bag, hypo-screening, junior staff

Procedia PDF Downloads 47
1749 Future Education: Changing Paradigms

Authors: Girish Choudhary

Abstract:

Education is in a state of flux. Not only one need to acquire skills in order to cope with a fast changing global world, an explosive growth in technology, on the other hand is providing a new wave of teaching tools - computer aided video instruction, hypermedia, multimedia, CD-ROMs, Internet connections, and collaborative software environments. The emerging technology incorporates the group qualities of interactive, classroom-based learning while providing individual students the flexibility to participate in an educational programme at their own time and place. The technology facilitating self learning also seems to provide a cost effective solution to the dilemma of delivering education to masses. Online education is a unique learning domain that provides for many to many communications as well. The computer conferencing software defines the boundaries of the virtual classroom. The changing paradigm provides access of instruction to a large proportion of society, promises a qualitative change in the quality of learning and echoes a new way of thinking in educational theory that promotes active learning and open new learning approaches. Putting it to practice is challenging and may fundamentally alter the nature of educational institutions. The subsequent part of paper addresses such questions viz. 'Do we need to radically re-engineer the curriculum and foster an alternate set of skills in students?' in the onward journey.

Keywords: on-line education, self learning, energy and power engineering, future education

Procedia PDF Downloads 318
1748 Towards the Management of Cybersecurity Threats in Organisations

Authors: O. A. Ajigini, E. N. Mwim

Abstract:

Cybersecurity is the protection of computers, programs, networks, and data from attack, damage, unauthorised, unintended access, change, or destruction. Organisations collect, process and store their confidential and sensitive information on computers and transmit this data across networks to other computers. Moreover, the advent of internet technologies has led to various cyberattacks resulting in dangerous consequences for organisations. Therefore, with the increase in the volume and sophistication of cyberattacks, there is a need to develop models and make recommendations for the management of cybersecurity threats in organisations. This paper reports on various threats that cause malicious damage to organisations in cyberspace and provides measures on how these threats can be eliminated or reduced. The paper explores various aspects of protection measures against cybersecurity threats such as handling of sensitive data, network security, protection of information assets and cybersecurity awareness. The paper posits a model and recommendations on how to manage cybersecurity threats in organisations effectively. The model and the recommendations can then be utilised by organisations to manage the threats affecting their cyberspace. The paper provides valuable information to assist organisations in managing their cybersecurity threats and hence protect their computers, programs, networks and data in cyberspace. The paper aims to assist organisations to protect their information assets and data from cyberthreats as part of the contributions toward community engagement.

Keywords: confidential information, cyberattacks, cybersecurity, cyberspace, sensitive information

Procedia PDF Downloads 245
1747 Educational Deprivation and Their Determinants in India: Evidence from National Sample Survey

Authors: Mukesh Ranjan

Abstract:

Applying probit model on the micro data of NSS 71st round on education for understanding the access to education post the passage of Right to Education act,2009 in India. The empirical analysis shows that at all India level the mean age of enrollment in school is 5.5 years and drop-out age is around 14 years (or studied up to class 7) and around 60 percent females never get enrolled in any school in their lifetime. Nearly 20 percent children in Bihar never seen school and surprisingly, the relatively developed states like Gujarat, Maharashtra, Karnataka, Kerala and Tamil Nadu have more than one-third of the children and half of the children in Andhra Pradesh, West Bengal and Orissa as educationally wasted. The relative contribution in educational wastage is maximum by Bengal (10 %) while UP contributed a maximum of 30 % in educational non-enrollment in the country. Educational wastage is more likely to increase with age. Marriage is a resistive factor in getting education. Muslims are educationally more deprived than Hindus. Larger family and rich household are less likely to be educationally deprived. Major reasons for drop-out until 9 years were lack of interest in education and financial constraint; between 10-12 years, lack of interest and unable to cope up with studies and post 12 years financial constraint, marriage and other household reasons.

Keywords: probit model, educational wastage, educational non-enrollment, educational deprivation

Procedia PDF Downloads 294
1746 The Effect of Reverse Trendelenburg Position on the Back Pain after Cardiovascular Angiography and Interventions

Authors: Pramote Thangkratok

Abstract:

The aims of this experimental study were to investigate the effect of Reverse Trendelenburg Position on the Back Pain after Cardiovascular Angiography and Interventions. In addition, to compare bleeding and hematoma occurrences at the Access site between experimental and control groups. The randomized controlled trial (RCT) was conducted in 70 patients who underwent Cardiovascular Angiography and Interventions via the femoral artery and received post procedural care at the intermediate cardiac care unit, Bangkok Heart Hospital. From December 2015 to February 2016. The control group (35 patients) was to get standard care after the intervention, whereas the experimental group (35 patients) was Reverse Trendelenburg Position 30-45 degrees. The groups were not significantly different in terms of demographic characteristics, Age, Gender, BMI, blood pressure, heart rate. While not significantly different from each other, the intensity of back pain control group had a significantly higher pain score than experimental group. Vascular complications in terms of bleeding and hematoma were not significantly different between the control and experimental groups. The findings show that Reverse Trendelenburg Position after Cardiovascular Angiography and Interventions would reduce or prevent the back pain without increasing the chance of bleeding and hematoma.

Keywords: reverse trendelenburg position, back pain, cardiovascular angiography, cardiovascular interventions

Procedia PDF Downloads 268
1745 Design Criteria Recommendation to Achieve Accessibility In-House to Different Users

Authors: Claudia Valderrama-Ulloa, Cristian Schmitt, Juan Pablo Marchetti, Viviana Bucarey

Abstract:

Access to adequate housing is a fundamental human right and a crucial factor for health. Housing should be inclusive, accessible, and able to meet the needs of all its inhabitants at every stage of their lives without hindering their health, autonomy, or independence. This article addresses the importance of designing housing for people with disabilities, which varies depending on individual abilities, preferences, and cultural considerations. Based on the components of the International Classification of Functioning, Disability and Health, wheelchair users, little people (achondroplasia), children with autism spectrum disorder and Down syndrome were characterized, and six domains of activities related to daily life inside homes were defined. The article describes the main barriers homes present for this group of people. It proposes a list of architectural and design aspects to reduce barriers to housing use. The aspects are divided into three main groups: space management, building services, and supporting facilities. The article emphasizes the importance of consulting professionals and users with experience designing for diverse needs to create inclusive, safe, and supportive housing for people with disabilities.

Keywords: achondroplasia, autism spectrum disorder, disability, down syndrome, wheelchair user

Procedia PDF Downloads 99