Search results for: Web scale access
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8763

Search results for: Web scale access

8583 Institutional Repository ePrints at Indian Institute of Science: A Special Reference to JRD Tata Memorial Library, Bangalore, India

Authors: Nagarjuna Pitty

Abstract:

Over the past decade there has been substantial progress in the usage of ePrints resources national and international research community. JRD Tata Memorial Library has hosting for the web based ePrints services and maintenance to online user community. This paper provides an overview how to share JRDTML experiences in using GNU EPrints.org software to create and maintain the open-access institutional repository of IISc, ePrints@IISc. This paper states that the GNU EPrints.org is the first generic software for creating Open Access Initiative (OAI)-compliant repositories, which enables the researchers to self-archive their research publications thus facilitating open access to their publications. IISc has been using this software since early 2002. This paper tells that the GNU EPrints.org software is an excellent tool for creating and maintaining OAI-compliant repositories. It can be setup easily even by those who are not too much experts in computer. In this paper, author is sharing JRDTML experiences in using GNU ePrints.org software.

Keywords: digital library, open access initiative, scholarly publications, institutional repository, ePrints@IISc

Procedia PDF Downloads 528
8582 Design and Application of NFC-Based Identity and Access Management in Cloud Services

Authors: Shin-Jer Yang, Kai-Tai Yang

Abstract:

In response to a changing world and the fast growth of the Internet, more and more enterprises are replacing web-based services with cloud-based ones. Multi-tenancy technology is becoming more important especially with Software as a Service (SaaS). This in turn leads to a greater focus on the application of Identity and Access Management (IAM). Conventional Near-Field Communication (NFC) based verification relies on a computer browser and a card reader to access an NFC tag. This type of verification does not support mobile device login and user-based access management functions. This study designs an NFC-based third-party cloud identity and access management scheme (NFC-IAM) addressing this shortcoming. Data from simulation tests analyzed with Key Performance Indicators (KPIs) suggest that the NFC-IAM not only takes less time in identity identification but also cuts time by 80% in terms of two-factor authentication and improves verification accuracy to 99.9% or better. In functional performance analyses, NFC-IAM performed better in salability and portability. The NFC-IAM App (Application Software) and back-end system to be developed and deployed in mobile device are to support IAM features and also offers users a more user-friendly experience and stronger security protection. In the future, our NFC-IAM can be employed to different environments including identification for mobile payment systems, permission management for remote equipment monitoring, among other applications.

Keywords: cloud service, multi-tenancy, NFC, IAM, mobile device

Procedia PDF Downloads 406
8581 Evaluate the Possibility of Using ArcGIS Basemaps as GCP for Large Scale Maps

Authors: Jali Octariady, Ida Herliningsih, Ade K. Mulyana, Annisa Fitria, Diaz C. K. Yuwana

Abstract:

Awareness of the importance large-scale maps for development of a country is growing in all walks of life, especially for governments in Indonesia. Various parties, especially local governments throughout Indonesia demanded for immediate availability the large-scale maps of 1:5000 for regional development. But in fact, the large-scale maps of 1:5000 is only available less than 5% of the entire territory of Indonesia. Unavailability precise GCP at the entire territory of Indonesia is one of causes of slow availability the large scale maps of 1:5000. This research was conducted to find an alternative solution to this problem. This study was conducted to assess the accuracy of ArcGIS base maps coordinate when it shall be used as GCP for creating a map scale of 1:5000. The study was conducted by comparing the GCP coordinate from Field survey using GPS Geodetic than the coordinate from ArcGIS basemaps in various locations in Indonesia. Some areas are used as a study area are Lombok Island, Kupang City, Surabaya City and Kediri District. The differences value of the coordinates serve as the basis for assessing the accuracy of ArcGIS basemaps coordinates. The results of the study at various study area show the variation of the amount of the coordinates value given. Differences coordinate value in the range of millimeters (mm) to meters (m) in the entire study area. This is shown the inconsistency quality of ArcGIS base maps coordinates. This inconsistency shows that the coordinate value from ArcGIS Basemaps is careless. The Careless coordinate from ArcGIS Basemaps indicates that its cannot be used as GCP for large-scale mapping on the entire territory of Indonesia.

Keywords: accuracy, ArcGIS base maps, GCP, large scale maps

Procedia PDF Downloads 346
8580 Access to Justice for Persons with Intellectual Disabilities in Indonesia: Case and Problem in Indonesian Criminal Justice System

Authors: Fines Fatimah, SH. MH.

Abstract:

Indonesia is one of the countries that has ratified the UNCRPD (United Nations Convention on the Rights of Persons with Disabilities). The ratification of this convention brings consequences on the adjustment of national legislation with the UNCRPD convention, where this ratification at the same time is a measure in the eyes of the international community that a state party could be consistent with the issues and problems of disability. Persons with disabilities often have little access to justice when they are forced to deal with the criminal justice system. Pursuit of justice through litigation are often not in their favor, therefore without any awareness of law enforcement/awareness of disability will further complicate access to justice for persons with disabilities. Under Article 13 of the UNCRPD, it appeared that the convention requires ratifying states to guarantee equal opportunity and treatment in justice for persons with disabilities. The States should also ensure that any judicial rules must be adapted to the circumstances of persons with disabilities so that people with disabilities can fully participate in all stages of the trial court and, for example, as a witness. Finally, the state must provide training to understand these persons with disabilities (for those who work in the judiciary institution such as police or prison officials). Further, this paper aims to describe problem faced by persons with intellectual disabilities to access justice in Indonesian Criminal Justice System. This paper tries to find and propose the alternative solutions to promote the quality of law enforcement in Indonesia, especially for persons with intellectual disabilities.

Keywords: access to justice, Indonesian criminal justice system, intellectual disability, ratifying states

Procedia PDF Downloads 490
8579 Scale-Up Process for Phyllanthus niruri Enriched Extract by Supercritical Fluid Extraction

Authors: Norsyamimi Hassim, Masturah Markom

Abstract:

Supercritical fluid extraction (SFE) has been known as a sustainable and safe extraction technique for plant extraction due to the minimal usage of organic solvent. In this study, a scale-up process for the selected herbal plant (Phyllanthus niruri) was investigated by using supercritical carbon dioxide (SC-CO2) with food-grade (ethanol-water) cosolvent. The quantification of excess ethanol content in the final dry extracts was conducted to determine the safety of enriched extracts. The extraction yields obtained by scale-up SFE unit were not much different compared to the predicted extraction yields with an error of 2.92%. For component contents, the scale-up extracts showed comparable quality with laboratory-scale experiments. The final dry extract showed that the excess ethanol content was 1.56% g/g extract. The fish embryo toxicity test (FETT) on the zebrafish embryos showed no toxicity effects by the extract, where the LD50 value was found to be 505.71 µg/mL. Thus, it has been proven that SFE with food-grade cosolvent is a safe extraction technique for the production of bioactive compounds from P. niruri.

Keywords: scale-up, supercritical fluid extraction, enriched extract, toxicity, ethanol content

Procedia PDF Downloads 102
8578 Software Development to Empowering Digital Libraries with Effortless Digital Cataloging and Access

Authors: Abdul Basit Kiani

Abstract:

The software for the digital library system is a cutting-edge solution designed to revolutionize the way libraries manage and provide access to their vast collections of digital content. This advanced software leverages the power of technology to offer a seamless and user-friendly experience for both library staff and patrons. By implementing this software, libraries can efficiently organize, store, and retrieve digital resources, including e-books, audiobooks, journals, articles, and multimedia content. Its intuitive interface allows library staff to effortlessly manage cataloging, metadata extraction, and content enrichment, ensuring accurate and comprehensive access to digital materials. For patrons, the software offers a personalized and immersive digital library experience. They can easily browse the digital catalog, search for specific items, and explore related content through intelligent recommendation algorithms. The software also facilitates seamless borrowing, lending, and preservation of digital items, enabling users to access their favorite resources anytime, anywhere, on multiple devices. With robust security features, the software ensures the protection of intellectual property rights and enforces access controls to safeguard sensitive content. Integration with external authentication systems and user management tools streamlines the library's administration processes, while advanced analytics provide valuable insights into patron behavior and content usage. Overall, this software for the digital library system empowers libraries to embrace the digital era, offering enhanced access, convenience, and discoverability of their vast collections. It paves the way for a more inclusive and engaging library experience, catering to the evolving needs of tech-savvy patrons.

Keywords: software development, empowering digital libraries, digital cataloging and access, management system

Procedia PDF Downloads 42
8577 Weighted Data Replication Strategy for Data Grid Considering Economic Approach

Authors: N. Mansouri, A. Asadi

Abstract:

Data Grid is a geographically distributed environment that deals with data intensive application in scientific and enterprise computing. Data replication is a common method used to achieve efficient and fault-tolerant data access in Grids. In this paper, a dynamic data replication strategy, called Enhanced Latest Access Largest Weight (ELALW) is proposed. This strategy is an enhanced version of Latest Access Largest Weight strategy. However, replication should be used wisely because the storage capacity of each Grid site is limited. Thus, it is important to design an effective strategy for the replication replacement task. ELALW replaces replicas based on the number of requests in future, the size of the replica, and the number of copies of the file. It also improves access latency by selecting the best replica when various sites hold replicas. The proposed replica selection selects the best replica location from among the many replicas based on response time that can be determined by considering the data transfer time, the storage access latency, the replica requests that waiting in the storage queue and the distance between nodes. Simulation results utilizing the OptorSim show our replication strategy achieve better performance overall than other strategies in terms of job execution time, effective network usage and storage resource usage.

Keywords: data grid, data replication, simulation, replica selection, replica placement

Procedia PDF Downloads 233
8576 Open Access in the Economic Sphere: A Framework Interpreting the Rise of the UK, US and China at Different Historical Times

Authors: Guanghua Yu

Abstract:

This article has examined the rise of the UK, US, and China at different historical times to explain the argument that it is open access in the economic sphere, as well as institutional building related to the protection of property rights, contract enforcement, financial market, the rule of law, and human resource accumulation that determine economic and human development. Both the UK, after the Glorious Revolution in the seventeenth century, and China, after its adoption of the open door policy at the end of the 1970s, follow such a path of development. The difference between the UK and China in moving toward that path is the different coordination of elites. While the coordination of elites in the UK through parliament played important roles in forcing the government to consider the wider encompassing interest in society after the Glorious Revolution, the coordination of elites in China has mainly been achieved by the Communist Party of China such that the Chinese Government has started to pay greater deal of attention to the wider encompassing interest in the country from 1978. The article has also examined the rise of the US following colonial settlement to independence and institutional building thereafter. The US case is similarly consistent with the argument that open access in the economic sphere and institutional building matter the most to economic development. More decentralized methods of the coordination of elites in the US among colonies (states), the federal governments, and other political groups similarly shaped the path towards open access in the economic sphere and institutional building. As such, open access in the political sphere plays an indirect role in development at best. If that is correct, there are possibilities that different political systems are able to achieve coordination of elites so that governments will turn their attention to development.

Keywords: open access, interconnected institutions, democracy, development

Procedia PDF Downloads 52
8575 Identification of Potential Large Scale Floating Solar Sites in Peninsular Malaysia

Authors: Nur Iffika Ruslan, Ahmad Rosly Abbas, Munirah Stapah@Salleh, Nurfaziera Rahim

Abstract:

Increased concerns and awareness of environmental hazards by fossil fuels burning for energy have become the major factor driving the transition toward green energy. It is expected that an additional of 2,000 MW of renewable energy is to be recorded from the renewable sources by 2025 following the implementation of Large Scale Solar projects in Peninsular Malaysia, including Large Scale Floating Solar projects. Floating Solar has better advantages over its landed counterparts such as the requirement for land acquisition is relatively insignificant. As part of the site selection process established by TNB Research Sdn. Bhd., a set of mandatory and rejection criteria has been developed in order to identify only sites that are feasible for the future development of Large Scale Floating Solar power plant. There are a total of 85 lakes and reservoirs identified within Peninsular Malaysia. Only lakes and reservoirs with a minimum surface area of 120 acres will be considered as potential sites for the development of Large Scale Floating Solar power plant. The result indicates a total of 10 potential Large Scale Floating Solar sites identified which are located in Selangor, Johor, Perak, Pulau Pinang, Perlis and Pahang. This paper will elaborate on the various mandatory and rejection criteria, as well as on the various site selection process required to identify potential (suitable) Large Scale Floating Solar sites in Peninsular Malaysia.

Keywords: Large Scale Floating Solar, Peninsular Malaysia, Potential Sites, Renewable Energy

Procedia PDF Downloads 153
8574 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification

Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang

Abstract:

One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.

Keywords: malware detection, network security, targeted attack, computational intelligence

Procedia PDF Downloads 228
8573 Improving System Performance through User's Resource Access Patterns

Authors: K. C. Wong

Abstract:

This paper demonstrates a number of examples in the hope to shed some light on the possibility of designing future operating systems in a more adaptation-based manner. A modern operating system, we conceive, should possess the capability of 'learning' in such a way that it can dynamically adjust its services and behavior according to the current status of the environment in which it operates. In other words, a modern operating system should play a more proactive role during the session of providing system services to users. As such, a modern operating system is expected to create a computing environment, in which its users are provided with system services more matching their dynamically changing needs. The examples demonstrated in this paper show that user's resource access patterns 'learned' and determined during a session can be utilized to improve system performance and hence to provide users with a better and more effective computing environment. The paper also discusses how to use the frequency, the continuity, and the duration of resource accesses in a session to quantitatively measure and determine user's resource access patterns for the examples shown in the paper.

Keywords: adaptation-based systems, operating systems, resource access patterns, system performance

Procedia PDF Downloads 111
8572 Development and Evaluation of a Psychological Adjustment and Adaptation Status Scale for Breast Cancer Survivors

Authors: Jing Chen, Jun-E Liu, Peng Yue

Abstract:

Objective: The objective of this study was to develop a psychological adjustment and adaptation status scale for breast cancer survivors, and to examine the reliability and validity of the scale. Method: 37 breast cancer survivors were recruited in qualitative research; a five-subject theoretical framework and an item pool of 150 items of the scale were derived from the interview data. In order to evaluate and select items and reach a preliminary validity and reliability for the original scale, the suggestions of study group members, experts and breast cancer survivors were taken, and statistical methods were used step by step in a sample of 457 breast cancer survivors. Results: An original 24-item scale was developed. The five dimensions “domestic affections”, “interpersonal relationship”, “attitude of life”, “health awareness”, “self-control/self-efficacy” explained 58.053% of the total variance. The content validity was assessed by experts, the CVI was 0.92. The construct validity was examined in a sample of 264 breast cancer survivors. The fitting indexes of confirmatory factor analysis (CFA) showed good fitting of the five dimensions model. The criterion-related validity of the total scale with PTGI was satisfactory (r=0.564, p<0.001). The internal consistency reliability and test-retest reliability were tested. Cronbach’s alpha value (0.911) showed a good internal consistency reliability, and the intraclass correlation coefficient (ICC=0.925, p<0.001) showed a satisfactory test-retest reliability. Conclusions: The scale was brief and easy to understand, was suitable for breast cancer patients whose physical strength and energy were limited.

Keywords: breast cancer survivors, rehabilitation, psychological adaption and adjustment, development of scale

Procedia PDF Downloads 490
8571 Evaluation of Easy-to-Use Energy Building Design Tools for Solar Access Analysis in Urban Contexts: Comparison of Friendly Simulation Design Tools for Architectural Practice in the Early Design Stage

Authors: M. Iommi, G. Losco

Abstract:

Current building sector is focused on reduction of energy requirements, on renewable energy generation and on regeneration of existing urban areas. These targets need to be solved with a systemic approach, considering several aspects simultaneously such as climate conditions, lighting conditions, solar radiation, PV potential, etc. The solar access analysis is an already known method to analyze the solar potentials, but in current years, simulation tools have provided more effective opportunities to perform this type of analysis, in particular in the early design stage. Nowadays, the study of the solar access is related to the easiness of the use of simulation tools, in rapid and easy way, during the design process. This study presents a comparison of three simulation tools, from the point of view of the user, with the aim to highlight differences in the easy-to-use of these tools. Using a real urban context as case study, three tools; Ecotect, Townscope and Heliodon, are tested, performing models and simulations and examining the capabilities and output results of solar access analysis. The evaluation of the ease-to-use of these tools is based on some detected parameters and features, such as the types of simulation, requirements of input data, types of results, etc. As a result, a framework is provided in which features and capabilities of each tool are shown. This framework shows the differences among these tools about functions, features and capabilities. The aim of this study is to support users and to improve the integration of simulation tools for solar access with the design process.

Keywords: energy building design tools, solar access analysis, solar potential, urban planning

Procedia PDF Downloads 317
8570 Improvement of Data Transfer over Simple Object Access Protocol (SOAP)

Authors: Khaled Ahmed Kadouh, Kamal Ali Albashiri

Abstract:

This paper presents a designed algorithm involves improvement of transferring data over Simple Object Access Protocol (SOAP). The aim of this work is to establish whether using SOAP in exchanging XML messages has any added advantages or not. The results showed that XML messages without SOAP take longer time and consume more memory, especially with binary data.

Keywords: JAX-WS, SMTP, SOAP, web service, XML

Procedia PDF Downloads 461
8569 Identification and Optimisation of South Africa's Basic Access Road Network

Authors: Diogo Prosdocimi, Don Ross, Matthew Townshend

Abstract:

Road authorities are mandated within limited budgets to both deliver improved access to basic services and facilitate economic growth. This responsibility is further complicated if maintenance backlogs and funding shortfalls exist, as evident in many countries including South Africa. These conditions require authorities to make difficult prioritisation decisions, with the effect that Road Asset Management Systems with a one-dimensional focus on traffic volumes may overlook the maintenance of low-volume roads that provide isolated communities with vital access to basic services. Given these challenges, this paper overlays the full South African road network with geo-referenced information for population, primary and secondary schools, and healthcare facilities to identify the network of connective roads between communities and basic service centres. This connective network is then rationalised according to the Gross Value Added and number of jobs per mesozone, administrative and functional road classifications, speed limit, and road length, location, and name to estimate the Basic Access Road Network. A two-step floating catchment area (2SFCA) method, capturing a weighted assessment of drive-time to service centres and the ratio of people within a catchment area to teachers and healthcare workers, is subsequently applied to generate a Multivariate Road Index. This Index is used to assign higher maintenance priority to roads within the Basic Access Road Network that provide more people with better access to services. The relatively limited incidence of Basic Access Roads indicates that authorities could maintain the entire estimated network without exhausting the available road budget before practical economic considerations get any purchase. Despite this fact, a final case study modelling exercise is performed for the Namakwa District Municipality to demonstrate the extent to which optimal relocation of schools and healthcare facilities could minimise the Basic Access Road Network and thereby release budget for investment in roads that best promote GDP growth.

Keywords: basic access roads, multivariate road index, road prioritisation, two-step floating catchment area method

Procedia PDF Downloads 199
8568 Analysis and Evaluation of Both AC and DC Standalone Photovoltaic Supply to Ethio-Telecom Access Layer Devices: The Case of Multi-Service Access Gateway in Adama

Authors: Frie Ayalew, Seada Hussen

Abstract:

Ethio-telecom holds a variety of telecom devices that needs a consistent power source to be operational. The company got this power mainly from the national grid and used this power source alone or with a generator and/or batteries as a backup. In addition, for off-grid or remote areas, the company commonly uses generators and batteries. But unstable diesel prices, huge expenses of fuel and transportation, and high carbon emissions are the main problems associated with fuel energy. So, the design of solar power with battery backup is a highly recommended and advantageous source for the next coming years. This project designs the AC and DC standalone photovoltaic supply to Ethio-telecom access layer devices for the case of multi-service access gateway in Adama. The design is done by using Homer software for both AC and DC loads. The project shows that the design of a solar based microgrid is the best option for the designed area.

Keywords: solar power, battery, inverter, Ethio-telecom, solar radiation

Procedia PDF Downloads 49
8567 Evidence Based Policy Studies: Examining Alternative Policy Practice towards Improving Enrolment to Higher Education in Nigeria

Authors: Muftahu Jibirin Salihu, Hazri Jamil

Abstract:

The persisting challenge of access and enrolment to higher education in commonwealth countries has been reported in several studies, including reports of the international organization such as World Bank, UNESCO among others however from the macro perspective. The overarching aim of this study is to examine alternative policy practices towards improving access to university education in Nigeria at meso level of policy practice from evidence base policy studies using one university as a case. The study adopted a qualitative approach to gain insightful understanding on the issue of the study employing a semi-structure interview and policy documents as the means for obtaining the data and other relevant information for the study. The participants of the study were purposively chosen which comprise of a number of individuals from the selected university and other related organization which responsible for the policies development and implementation of Nigerian higher education system. From the findings of the study, several initiatives have been taken at meso level to address this challenge including the introduction of the University Matriculation Program as an alternative route for enhancing to access to the university education. However, the study further provided a number of recommendations which aimed at improving access to university education such as improving the entry requirements, society orientation on university education and the issue of ranking of certificate among the Nigerian higher institutions of learning.

Keywords: policy practice, access, enrolment, university, education, Nigeria

Procedia PDF Downloads 236
8566 Conception and Misconceptions About Mental Health in Gwafan Community of Jos North Nigeria

Authors: Tabitha D. Hussein, Arigu M. Sunday

Abstract:

This paper is an attempt to gauge the conception and misconception of mental health in the Gwafan community, Jos North Plateau State, Nigeria (West Africa), to ascertain which side of the scale the pendulum swings. Mental health education and awareness are necessary for healthy community development. However, in a society such as ours in Nigeria (Africa) that is not knowledge-based, it is easy for people to embrace hearsay, speculations, superstition, and the supernatural. The objectives of this paper are two folds: first, to examine the level of awareness of the people on mental health, or the lack of it; second, to ascertain their access to mental health services and good practices. The methodology adopted is qualitative research, and the instrument used is T-test related. The findings include, first, the fact that a larger population has misconceptions about Mental Health. Second, this misconception is a result of a lack of basic knowledge of Mental Health. Based on the aforementioned, the paper recommends that there is a need for more Mental Health Education among the populace and access to Mental Health services and practices (Preventative and Curative). The paper concludes that in a society that is not knowledgebase, every attempt should be made to shift people’s mindset from superstitious knowledge to evidence-based knowledge, which can empower them to make informed decisions not only on mental Health but on associative Health issues that can aid their wellbeing, livelihood and sustainable development as a whole.

Keywords: conceptions, misconceptions, mental health, knowledge, superstition, service delivery

Procedia PDF Downloads 21
8565 Policies and Practice of Refugee Education from Malaysian Perspective: Preliminary Findings

Authors: A. H. A. Hamid, N. A. Zainuddin, M. Y. M. Nor

Abstract:

Millions of child refugees leave their countries in the hope of better and safer lives particularly in the aspect of education. However, the education access for the child refugees is strongly depending on the policies made by the federal and local governments. Malaysia, in particular, is a country which does not have a specific educational policy that is inclusive of child refugees. Hence, this study explores the feasibility of possible educational policy that specifically caters the needs of child refugees in Malaysia. These are preliminary findings of a case study which involved thirty-five postgraduate students in a local university who undertook Educational Policy coursework and five teachers in a refugee community centre in Kuala Lumpur, Malaysia. Interviews were recorded, transcribed and thematically analysed in relation to issues highlighted in the refugee education literature. The findings showed that most of the informants felt there is an urgent need of a systematic intervention put in place by the local government to cater to the needs of equal education access to the child refugees. A further large scale study is needed in the near future by integrating different perspectives of relevant stakeholders for an effective, efficient and sustainable policy formulation and implementation related to child refugees in Malaysia. The findings may be of interests to the educators, the ministry of education, state education office, district education office, teachers, parents and surrounding communities for their awareness about the needs of refugee education and the feasibility of educational policy for child refugees in the country.

Keywords: child refugees, educational policy, inclusive education, Malaysia

Procedia PDF Downloads 117
8564 Issues and Challenges of Information and Communication Technology Adoption and Application for Business-Related Performance among Agro-Based Small and Medium Entrepreneurs in the State of Selangor, Malaysia

Authors: Mohd Nizam Osman

Abstract:

This study explores issues and challenges of information and communication technology (ICT) adoption and application for business-related performance of Agro-based small and medium-scale enterprises (SMEs) in the state of Selangor, Malaysia. Globally, SMEs have championed the socio-economic development of nations across the globe, including Malaysia. Thus, the objectives of this study explore issues and challenges of agro-based SMEs' adoption and usage of ICT, the business-related performance of SMEs via the adoption of ICT, and the impact of incentives on SMEs' adoption and use of ICT. The study was conducted in Selangor, Malaysia. A qualitative research approach was deployed for the study. Data for the study emanated from semi-structured interviews and field note observation of 14 informants who are registered as small-scale business owners and operators. Based on thematic analysis, data were triangulated to ensure consistency and validation of findings for the study. Findings revealed that SMEs are faced with a lack of funding, low expertise, and lack of storage, leading to an unsustainable supply of goods and services. Although effective communication, ease of business activities/transactions, and information search by way of research were among the business performance experienced by SMEs' adoption of ICT. Further findings showed that loan conditions and personal and business interests hindered SMEs' reception and access to programs, schemes, and incentives geared at aiding the continuous growth and development of agro-based SMEs. The study suggests the need for policy change in terms of diversification of channels of funding and access to funds to enable credit guarantee schemes and peer or community-based financing. Consequently, the study recommends the engagement of SMEs in policy decision-making to ascertain the type of incentives relevant to their business operations. Likewise, from a technological standpoint, the study suggests the expansion of the framework of technology acceptance with focuses on affordability, type of users, and level of usage.

Keywords: ICT adoption, business related performance, agro-based SMEs, ICT application for SMEs

Procedia PDF Downloads 45
8563 The Critical Relevance of Credit and Debt Data in Household Food Security Analysis: The Risks of Ineffective Response Actions

Authors: Siddharth Krishnaswamy

Abstract:

Problem Statement: Currently, when analyzing household food security, the most commonly studied food access indicators are household income and expenditure. Larger studies do take into account other indices such as credit and employment. But these are baselines studies and by definition are conducted infrequently. Food security analysis for access is usually dedicated to analyzing income and expenditure indicators. And both these indicators are notoriously inconsistent. Yet this data can very often end up being the basis on which household food access is calculated; and by extension, be used for decision making. Objectives: This paper argues that along with income and expenditure, credit and debit information should be collected so that an accurate analysis of household food security (and in particular) food access can be determined. The lack of collection and analysis of this information routinely means that there is often a “masking” of the actual situation; a household’s food access and food availability patterns may be adequate mainly as a result of borrowing and may even be due to a long- term dependency (a debt cycle). In other words, such a household is, in reality, worse off than it appears a factor masked by its performance on basic access indicators. Procedures/methodologies/approaches: Existing food security data sets collected in 2005 in Azerbaijan, 2010 across Myanmar and 2014-15 across Uganda were used to support the theory that analyzing income and expenditure of a HHs and analyzing the same in addition to data on credit & borrowing patterns will result in an entirely different scenario of food access of the household. Furthermore, the data analyzed depicts food consumption patterns across groups of households and then relates this to the extent of dependency on credit, i.e. households borrowing money in order to meet food needs. Finally, response options that were based on analyzing only income and expenditure; and response options based on income, expenditure, credit, and borrowing – from the same geographical area of operation are studied and discussed. Results: The purpose of this work was to see if existing methods of household food security analysis could be improved. It is hoped that food security analysts will collect household level information on credit and debit and analyze them against income, expenditure and consumption patterns. This will help determine if a household’s food access and availability are dependent on unsustainable strategies such as borrowing money for food or undertaking sustained debts. Conclusions: The results clearly show the amount of relevant information that is missing in Food Access analysis if debit and borrowing of the household is not analyzed along with the typical Food Access indicators that are usually analyzed. And the serious repercussions this has on Programmatic response and interventions.

Keywords: analysis, food security indicators, response, resilience analysis

Procedia PDF Downloads 304
8562 An Integrated Architecture of E-Learning System to Digitize the Learning Method

Authors: M. Touhidul Islam Sarker, Mohammod Abul Kashem

Abstract:

The purpose of this paper is to improve the e-learning system and digitize the learning method in the educational sector. The learner will login into e-learning platform and easily access the digital content, the content can be downloaded and take an assessment for evaluation. Learner can get access to these digital resources by using tablet, computer, and smart phone also. E-learning system can be defined as teaching and learning with the help of multimedia technologies and the internet by access to digital content. E-learning replacing the traditional education system through information and communication technology-based learning. This paper has designed and implemented integrated e-learning system architecture with University Management System. Moodle (Modular Object-Oriented Dynamic Learning Environment) is the best e-learning system, but the problem of Moodle has no school or university management system. In this research, we have not considered the school’s student because they are out of internet facilities. That’s why we considered the university students because they have the internet access and used technologies. The University Management System has different types of activities such as student registration, account management, teacher information, semester registration, staff information, etc. If we integrated these types of activity or module with Moodle, then we can overcome the problem of Moodle, and it will enhance the e-learning system architecture which makes effective use of technology. This architecture will give the learner to easily access the resources of e-learning platform anytime or anywhere which digitizes the learning method.

Keywords: database, e-learning, LMS, Moodle

Procedia PDF Downloads 155
8561 Freedom of Information and Freedom of Expression

Authors: Amin Pashaye Amiri

Abstract:

Freedom of information, according to which the public has a right to have access to government-held information, is largely considered as a tool for improving transparency and accountability in governments, and as a requirement of self-governance and good governance. So far, more than ninety countries have recognized citizens’ right to have access to public information. This recognition often took place through the adoption of an act referred to as “freedom of information act”, “access to public records act”, and so on. A freedom of information act typically imposes a positive obligation on a government to initially and regularly release certain public information, and also obliges it to provide individuals with information they request. Such an act usually allows governmental bodies to withhold information only when it falls within a limited number of exemptions enumerated in the act such as exemptions for protecting privacy of individuals and protecting national security. Some steps have been taken at the national and international level towards the recognition of freedom of information as a human right. Freedom of information was recognized in a few countries as a part of freedom of expression, and therefore, as a human right. Freedom of information was also recognized by some international bodies as a human right. The Inter-American Court of Human Rights ruled in 2006 that Article 13 of the American Convention on Human Rights, which concerns the human right to freedom of expression, protects the right of all people to request access to government information. The European Court of Human Rights has recently taken a considerable step towards recognizing freedom of information as a human right. However, in spite of the measures that have been taken, public access to government information is not yet widely accepted as an international human right. The paper will consider the degree to which freedom of information has been recognized as a human right, and study the possibility of widespread recognition of such a human right in the future. It will also examine the possible benefits of such recognition for the development of the human right to free expression.

Keywords: freedom of information, freedom of expression, human rights, government information

Procedia PDF Downloads 515
8560 The Mechanism of Calcium Carbonate Scale Deposition Affected by Carboxymethyl Chitosan

Authors: Genaro Bolívar, Manuel Mas, Maria Tortolero, Jorge Salazar

Abstract:

Due to the extensive use of water injection for oil displacement and pressure maintenance in oil fields, many reservoirs experience the problem of scale deposition when injection water starts to break through. In most cases the scaled-up wells are caused by the formation of sulfate and carbonate scales of calcium and strontium. Due to their relative hardness and low solubility, there are limited processes available for their removal and preventive measures such as the “squeeze” inhibitor treatment have to be taken. It is, therefore, important to gain a proper understanding of the kinetics of scale formation and its detrimental effects on formation damage under both inhibited and uninhibited conditions. Recently, the production of chitosan was started in our country and in the PDVSA-Intevep laboratories was synthesized and evaluated the properties of carboxymethyl chitosan (CMQ) as chelating agent of Ca2 + ions in water injection. In this regard, the characterization of the biopolymer by 13C - NMR, FTIR, TGA, and TM0374-2007 standard laboratory test has demonstrated the ability to remove up to 70% calcium ions in solution and shows a behavior that approaches that of commercial products.

Keywords: carboxymethyl chitosan, scale, calcium carbonate scale deposition, water injection

Procedia PDF Downloads 410
8559 Girls’ Education Policy and Practices in Three Selected Countries of Africa: Feminism, Educational Reform and Cultural Inflections in View

Authors: Endalew Fufa Kufi

Abstract:

One of the major concerns in educational provision and success determination is access to available opportunities. In that, girls’ access to education has been a point of concern, and more emphasis has come to be at the forefront regarding success. Researches have mostly been held on extremes such as equal access and success, but only a few works deal with process issues related to home and school interplay, issues of progress from lower to higher levels, and spatial conditions related to girls’ education. Hence, this survey assessed experiences in three countries of Africa: Ethiopia, Ghana, and Botswana regarding girls’ education in policy and practice as related to contextual matters in girls’ education. Contextual discourse analysis of qualitative design was used to materialize the study. From each country, five research works held 2010 onwards were purposively selected through criterion-sampling. On the policy aspect, workable documents were looked into. The findings denoted that educational access was of more stretch and generic nature, and the narration was dominated by institutional expectations, not identifying which group should benefit what. The researches largely dealt with either subject-specific dealings or access alone at large. Success studies, by far, dealt with a comparison of girls with boys rather than determinant-related projections. Moreover, the cultural representation of girls’ education had a very minimal part in both policy and researches. From that, it could be found that in-depth scrutiny on the individual, institutional, and leadership determinants of girls’ education would be necessary.

Keywords: determinants, girls, education, feminism

Procedia PDF Downloads 257
8558 The Influence of the Institutional Environment in Increasing Wealth: The Case of Women Business Operators in a Rural Setting

Authors: S. Archsana, Vajira Balasuriya

Abstract:

In Trincomalee of Sri Lanka, a post-conflict area, resettlement projects and policy initiatives are taking place to improve the wealth of the rural communities through promoting economic activities by way of encouraging the rural women to opt to commence and operate Micro and Small Scale (MSS) businesses. This study attempts to identify the manner in which the institutional environment could facilitate these MSS businesses owned and operated by women in the rural environment. The respondents of this study are the beneficiaries of the Divi Neguma Development Training Program (DNDTP); a project designed to aid women owned MSS businesses, in Trincomalee district. 96 women business operators, who had obtained financing facilities from the DNDTP, are taken as the sample based on fixed interval random sampling method. The study reveals that primary challenges encountered by 82% of the women business operators are lack of initial capital followed by 71% initial market finding and 35% access to technology. The low level of education and language barriers are the constraints in accessing support agencies/service providers. Institutional support; specifically management and marketing services, have a significant relationship with wealth augmentation. Institutional support at the setting-up stage of businesses are thin whereas terms and conditions of the finance facilities are perceived as ‘too challenging’. Although diversification enhances wealth of the rural women business operators, assistance from the institutional framework to prepare financial reports that are required for business expansion is skinny. The study further reveals that institutional support is very much weak in terms of providing access to new technology and identifying new market networks. A mechanism that could facilitate the institutional framework to support the rural women business operators to access new technology and untapped market segments, and assistance in preparation of legal and financial documentation is recommended.

Keywords: business facilitation, institutional support, rural women business operators, wealth augmentation

Procedia PDF Downloads 408
8557 Sustainable Micro Architecture: A Pattern for Urban Release Areas

Authors: Saber Fatourechian

Abstract:

People within modern cities have faced macro urban values spreads rapidly through current style of living. Unexpected phenomena without any specific features of micro scale, humanity and urban social/cultural patterns. The gap between micro and macro scale is unidentified and people could not recognize where they are especially in the interaction between life and city. Urban life details were verified. Micro architecture is a pattern in which human activity derives from human needs in an unconscious position. Sustainable attitude via micro architecture causes flexibility in decision making through micro urbanism essentially impacts macro scale. In this paper the definition of micro architecture and its relation with city and human activity are argued, there after the interaction between micro and macro scale is presented as an effective way for urban sustainable development.

Keywords: micro architecture, sustainability, human activity, city

Procedia PDF Downloads 470
8556 Factor Structure of the University of California, Los Angeles (UCLA) Loneliness Scale: Gender, Age, and Marital Status Differences

Authors: Hamzeh Dodeen

Abstract:

This study aims at examining the effects of item wording effects on the factor structure of the University of California, Los Angeles (UCLA) Loneliness Scale: gender, age, and marital status differences. A total of 2374 persons from the UAE participated, representing six different populations (teenagers/elderly, males/females, and married/unmarried). The results of the exploratory factor analysis using principal axis factoring with (oblique) rotation revealed that two factors were extracted from the 20 items of the scale. The nine positively worded items were highly loaded on the first factor, while 10 out of the 11 negatively worded items were highly loaded on the second factor. The two-factor solution was confirmed on the six different populations based on age, gender, and marital status. It has been concluded that the rating of the UCLA scale is affected by a response style related to the item wording.

Keywords: UCLA Loneliness Scale, loneliness, positively worded items, factor structure, negatively worded items

Procedia PDF Downloads 327
8555 VDGMSISS: A Verifiable and Detectable Multi-Secret Images Sharing Scheme with General Access Structure

Authors: Justie Su-Tzu Juan, Ming-Jheng Li, Ching-Fen Lee, Ruei-Yu Wu

Abstract:

A secret image sharing scheme is a way to protect images. The main idea is dispersing the secret image into numerous shadow images. A secret image sharing scheme can withstand the impersonal attack and achieve the highly practical property of multiuse  is more practical. Therefore, this paper proposes a verifiable and detectable secret image-sharing scheme called VDGMSISS to solve the impersonal attack and to achieve some properties such as encrypting multi-secret images at one time and multi-use. Moreover, our scheme can also be used for any genera access structure.

Keywords: multi-secret image sharing scheme, verifiable, de-tectable, general access structure

Procedia PDF Downloads 100
8554 Effect of Polarized Light Therapy on Oral Mucositis in Cancer Patients Receiving Chemotherapy

Authors: Zakaria Mowafy Emam Mowafy, Hamed Abd Allah Hamed, Marwa Mahmoud Abd-Elmotalb, Andrew Anis Fakhray Mosaad

Abstract:

The purpose of this paper is to determine the efficacy of polarized light therapy for chemotherapy-treated cancer patients who have oral mucositis. Methods of evaluation are the measurement of the WHO oral mucositis scale and the common toxicity criteria scale. Methods: Thirty cancer patients receiving chemotherapy (males and females) who had oral mucositis and ulceration pain, and their ages ranged from 30 to 55 years, were divided into two groups. Group (A), composed of 15 patients, received the Bioptron light therapy (BLT) in addition to the routine medical care of oral mucositis. Group (B) received only the routine medical care of oral mucositis; the duration of the BLT application was 10 minutes applied daily for 30 days. Results and conclusion: Results showed that the application of the BLT had valuable healing effects on oral mucositis in cancer patients receiving chemotherapy, as evidenced by the high decreases of the WHO oral mucositis scale and the common toxicity criteria scale.

Keywords: Bioptron light therapy, oral mucositis, WHO oral mucositis scale, common toxicity criteria scale

Procedia PDF Downloads 67