Search results for: access approval
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3476

Search results for: access approval

3236 IAM Smart – A Sustainable Way to Reduce Plastics in Organizations

Authors: Krithika Kumaragurubaran, Mannu Thareja

Abstract:

Saving our planet Earth is the responsibility of every human being. Global warming and carbon emissions are killing our planet. We must adopt sustainable practices to give our future generations an equal opportunity to enjoy this planet Earth, our home. One of the most used unsustainable materials is plastic. Plastics are used everywhere. They are cheap, durable, strong, waterproof, non-corrosive with a long life. So longthat it makes plastic unsustainable. With this paper, we want to bring awareness on the usage of plastic in the organizations and how to reduce it by adopting sustainable practices powered by technology. We have taken a case study on the usage of photo ID cards, which are commonly used for authentication and authorization. These ID cards are used by employees or visitors to get access to the restricted areas inside the office buildings. The scale of these plastic cards can be in thousands for a bigger organization. This paper proposes smart alternatives to Identity and Access Management (IAM) which could replace the traditional method of using plastic ID cards. Further, the proposed solution is secure with multi-factor authentication (MFA), cost effective as there is no need to manage the supply chain of ID cards, provides instant IAM with self-service, and has the convenience of smart phone. Smart IAM is not only user friendly however also environment friendly.

Keywords: sustainability, reduce plastic, IAM (Identity and Access Management), multi-factor authentication

Procedia PDF Downloads 77
3235 Protection of Website Owners' Rights: Proportionality of Website Blocking in Russia and Beyond

Authors: Ekaterina Semenova

Abstract:

The article explores the issue of website owners’ liability for the illicit content. Whilst various issues of secondary liability of internet access providers for the illicit content have been widely discussed in the law doctrine, the liability of website owners has attracted less attention. Meanwhile, the website blocking injunctions influence website owners’ rights most, since website owners have the interest to keep their website online, rather than internet access providers. The discussion of internet access providers’ liability overshadows the necessity to protect the website owners’ rights to due process and proportionality of blocking injunctions. The analysis of Russian website blocking regulation and case law showed that the protection of website owners’ rights depends on the kind of illicit content: some content induces automatic blocking injunctions without prior notice of website owners and any opportunity to appeal, while other content does not invoke automatic blocking and provides an opportunity for the website owner to avoid or appeal an injunction. Comparative analysis of website blocking regulations in European countries reveals different approaches to the proportionality of website blocking and website owner’s rights protection. Based on the findings of the study, we conclude that the global trend to impose website blocking injunctions on wide range of illicit content without due process of law interferes with the rights of website owners.

Keywords: illicit content, liability, Russia, website blocking

Procedia PDF Downloads 327
3234 Public Policy as a Component of Entrepreneurship Ecosystems: Challenges of Implementation

Authors: José Batista de Souza Neto

Abstract:

This research project has as its theme the implementation of public policies to support micro and small businesses (MSEs). The research problem defined was how public policies for access to markets that drive the entrepreneurial ecosystem of MSEs are implemented. The general objective of this research is to understand the process of implementing a public policy to support the entrepreneurial ecosystem of MSEs by the Support Service for Micro and Small Enterprises of the State of São Paulo (SEBRAESP). Public policies are constituent elements of entrepreneurship ecosystems that influence the creation and development of ventures from the action of the entrepreneur. At the end of the research, it is expected to achieve the results for the following specific objectives: (a) understand how the entrepreneurial ecosystem of MSEs is constituted; (b) understand how market access public policies for MSEs are designed and implemented; (c) understand SEBRAE's role in the entrepreneurship ecosystem; and (d) offer an action plan and monitor its execution up to march, 2023. The field research will be conducted based on Action Research, with a qualitative and longitudinal approach to the data. Data collection will be based on narratives produced since 2019 when the decision to implement Comércio Brasil program, a public policy focused on generating market access for 4280 MSEs yearly, was made. The narratives will be analyzed by the method of document analysis and narrative analysis. It is expected that the research will consolidate the relevance of public policies to market access for MSEs and the role of SEBRAE as a protagonist in the implementation of these public policies in the entrepreneurship ecosystem will be demonstrated. Action research is recognized as an intervention method, it is expected that this research will corroborate its role in supporting management processes.

Keywords: entrepreneurship, entrepreneurship ecosystem, public policies, SEBRAE, action research

Procedia PDF Downloads 158
3233 Use of Information and Communication Technology (ICT) Among Nigerian Colleges of Education Lecturers: A Gender Analysis Approach

Authors: Rasheed A. Saliu, Sunday E. Ogundipe, Oluwaseun A. Adefila

Abstract:

Information and Communication Technology (ICT) in recent time has transformed the means by which we inform ourselves, with world events and areas of personal interests, and further our learning. Today, for many, books and journals are no longer the first or primary source of information or learning. We now regularly rely on images, video, animations and sound to acquire information and to learn. Increased and improved access to the internet has accelerated this phenomenon. We now acquire and access information in ways fundamentally different from the pre-ICT era. But to what extent is academic staff in colleges of education, having access to and the utilising of ICT devices in their lecture deliveries especially in School of Science and Vocational and Technical? The main focus of this paper is to proffer solution to this salient question. It is essentially an empirical study carried out in five colleges of education in south-west zone of Nigeria. The target population was the academic staff in the selected institution. A total number of 150 male and female lecturers were contacted for the study. The main instrument was questionnaire. The finding reveals that male lecturers are much more ICT inclined than women folk in the academics. Some recommendations were made to endear academics to utilizing ICT at their disposal to foster qualitative delivery in this digital era.

Keywords: education, gender, ICT, Nigeria

Procedia PDF Downloads 268
3232 The Personal Characteristics of Nurse Managers and the Personal and Professional Factors That Affect Them

Authors: Handan Alan, Ulkü Baykal

Abstract:

Personal characteristics help people understand and recognize both themselves and other people. They are also known to have direct effects on managerial behaviors. Managers’ personalities indicate how they think, perceive reality and relate to others, and affect their decision-making and problem-solving methods. This descriptive study aims to determine the personal characteristics of nurse managers and the personal and professional factors that affect them since sufficient data does not exist on personal characteristics despite the focus on the leadership and managerial characteristics in nursing. The study population consisted of nurses working in administrative positions at hospitals affiliated with the public hospitals union, research and practice hospitals affiliated with universities and private hospitals in cities in the Marmara Region. The study sample consisted of nurse managers working in the hospitals that permitted conducting the study (excluding private branch hospitals). The data were collected after obtaining the approval of the Clinical Research Ethics Committee of Çanakkale Onsekiz Mart University (Approval date: 1.7.2015, Decision No: 2015-01) and written official permissions from the administrations of the hospitals included in the study. The data analysis was carried out using means and standard deviations (SD) as descriptive statistics, one-way analysis of variance for inter-group comparisons and the independent samples t-test for paired group comparisons. A significance threshold of p < 0.05 was used to evaluate the findings. The data were collected using the Five Factor Personality Inventory. The study included 900 nurse managers, who obtained the highest mean score on the conscientiousness dimension (X=4.22 ±0.35). This dimension was followed by their mean scores on the agreeableness (X=4.06±0.40), intelligence (X=4.05±0.37), extroversion (X=3.50±0.43), and emotional instability (X=2.07±0.53) dimensions. Statistically significant differences were found between the independent variables of age, gender, marital status, education level, work institution, professional experience, institutional experience, managerial experience, administrative position, work unit and managerial education when compared using the five factor personality inventory (p < 0.05). In conclusion, the nurse managers described themselves having high conscientiousness. Statistically significant differences were found between the five factor personality inventory mean scores and their personal and professional characteristics.

Keywords: nurse manager, personality, personal characteristics, professional characteristics

Procedia PDF Downloads 223
3231 Performance Evaluation of Fingerprint, Auto-Pin and Password-Based Security Systems in Cloud Computing Environment

Authors: Emmanuel Ogala

Abstract:

Cloud computing has been envisioned as the next-generation architecture of Information Technology (IT) enterprise. In contrast to traditional solutions where IT services are under physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This is due to the fact that the systems are opened to the whole world and as people tries to have access into the system, many people also are there trying day-in day-out on having unauthorized access into the system. This research contributes to the improvement of cloud computing security for better operation. The work is motivated by two problems: first, the observed easy access to cloud computing resources and complexity of attacks to vital cloud computing data system NIC requires that dynamic security mechanism evolves to stay capable of preventing illegitimate access. Second; lack of good methodology for performance test and evaluation of biometric security algorithms for securing records in cloud computing environment. The aim of this research was to evaluate the performance of an integrated security system (ISS) for securing exams records in cloud computing environment. In this research, we designed and implemented an ISS consisting of three security mechanisms of biometric (fingerprint), auto-PIN and password into one stream of access control and used for securing examination records in Kogi State University, Anyigba. Conclusively, the system we built has been able to overcome guessing abilities of hackers who guesses people password or pin. We are certain about this because the added security system (fingerprint) needs the presence of the user of the software before a login access can be granted. This is based on the placement of his finger on the fingerprint biometrics scanner for capturing and verification purpose for user’s authenticity confirmation. The study adopted the conceptual of quantitative design. Object oriented and design methodology was adopted. In the analysis and design, PHP, HTML5, CSS, Visual Studio Java Script, and web 2.0 technologies were used to implement the model of ISS for cloud computing environment. Note; PHP, HTML5, CSS were used in conjunction with visual Studio front end engine design tools and MySQL + Access 7.0 were used for the backend engine and Java Script was used for object arrangement and also validation of user input for security check. Finally, the performance of the developed framework was evaluated by comparing with two other existing security systems (Auto-PIN and password) within the school and the results showed that the developed approach (fingerprint) allows overcoming the two main weaknesses of the existing systems and will work perfectly well if fully implemented.

Keywords: performance evaluation, fingerprint, auto-pin, password-based, security systems, cloud computing environment

Procedia PDF Downloads 113
3230 Women as Victims of Land Grabbing: Implications for Household Food Security and Livelihoods in Cameroon

Authors: Valentine Ndi

Abstract:

This multi-sited research will make use of primary and secondary data to understand the multiple implications of land grabbing for local food production and rural livelihoods in Cameroon. Amidst restricted access to land and forest resources, this study will demonstrate how land previously accessed by communities to grow crops and to harvest forest resources is being acquired and transformed into commercial oil palm plantations by Herakles Farms, a US-based company, with Sithe Global Sustainable Oils Cameroon as its local subsidiary. Focusing on selected land grabbing communities in Cameroon, the study uses a feminist political ecology lens to examine the gendered nature in resources access and its impacts for women’s food production in particular, and rural livelihoods in general. The paper will argue that the change in land use particularly erodes women’s rights to access land and forest resources, and in turn negatively affects local food production and rural livelihood in the region. It will show how women in the region play instrumental and dominant roles in ensuring local food production through subsistence and semi-subsistence agriculture but are unfortunately the main losers of territory that the state considers as ‘empty’ or underutilized - and is subjected to appropriation. The paper will conclude that, rural women’s active participation in the decision-making processes concerning the use of and/or allotment of land to foreign investors is indispensable to guarantee local, national and global food security, but also to ensure that alternative livelihood options are provided, particularly to those rural women facing dispossession or at risk of being dispossessed.

Keywords: land grabbing, feminst political ecology, gender, access to resources, rural livelihoods, Cameroon

Procedia PDF Downloads 234
3229 Marketing and Pharmaceutical Analysis of Medical Cosmetics in Bulgaria and Japan

Authors: V. Petkova, V. Valchanova, D. Grekova, K. Andreevska, S. T. Geurguiev, V. Madgarov, D. Grekov

Abstract:

Introduction: Production, distribution and sale of cosmetics is a global industry, which played a key role in the European Union (EU), the US and Japan. A major participant EU whose market cosmetics is greater than in the US and 2 times greater than that in Japan. The output value of the cosmetics industry in the EU is estimated at about € 35 billion in 2001. Nearly 5 billion cosmetic products (number of packages) are sold annually in the EU, and the main markets are France, Germany, Italy, Spain and the UK. The aim of the study is legal and marketing analysis of cosmetic products dispensed in a pharmacy. Materials and methodology: Historical legislative analysis - the method is applied in the analysis of changes in the legislative regulation of the activities of cosmetic products in Japan and Bulgaria Comparative legislative analysis - the method is applied when comparing the legislative requirements for cosmetic products in the already mentioned countries. Both methods are applied to the following regulations: 1) Japanese Pharmaceuticals Affairs Law, Tokyo, Japan, Ministry of Health, Labour and Welfare; 2) Law on Medicinal Products for Human Use; effective from 3.01.2014. Results: The legislative framework for cosmetic products in Bulgaria and Japan is close and generally includes general guidelines: Definition of a medicinal product; Categorization of drugs (with differences in sub-categories); Pre-registration and marketing approval of the competent authorities; Compulsory compliance with gmp (unlike cosmetics); Regulatory focus on product quality, efficacy and safety; Obligations for labeling of such products; Created systems Pharmacovigilance and commitment of all parties - industry and health professionals; The main similarities in the regulation of products classified as cosmetics are in the following segments: Full producer responsibility for product safety; Surveillance of market regulatory authorities; No need for pre-registration or pre-marketing approval (a basic requirement for notification); Without restrictions on sales channels; GMP manuals for cosmetics; Regulatory focus on product safety (than over efficiency); General requirements in labeling: The main differences in the regulation of products classified as cosmetics are in the following segments: Details in the regulation of cosmetic products; Future convergence of regulatory frameworks can contribute to the removal of barriers to trade, to encourage innovation, while simultaneously ensuring a high level of protection of consumer safety.

Keywords: cosmetics, legislation, comparative analysis, Bulgaria, Japan

Procedia PDF Downloads 569
3228 Judicial Institutions in a Post-Conflict Society: Gaining Legitimacy through a Holistic Reform

Authors: Abdul Salim Amin

Abstract:

This paper focuses on how judiciaries in post-conflict society gain legitimacy through reformation. Legitimacy plays a pivotal role in shaping peoples’ behavior to submit to the law and verifies the rightfulness of an organ for taking binding decisions. Among various dynamics, judicial independence, access to justice and behavioral changes of the judicial officials broadly contribute in legitimation of judiciary in general, and the court in particular. Increasing the independence of judiciary through reform limits the interference of governmental branches in judicial issues and protects basic rights of the citizens. Judicial independence does not only matter in institutional terms, individual independence also influences the impartiality and integrity of judges, which can be increased through education and better administration of justice. Finally, access to justice as an intertwined concept both at the legal and moral spectrum of judicial reform avails justice to the citizen and increases the level of public trust and confidence. Efficient legal decisions on fostering such elements through holistic reform create a rule of law atmosphere. Citizens do not accept illegitimate judiciary and do not trust its decisions. Lack of such tolerance and confidence deters the rule of law and, thus, undermines the democratic development of a society.

Keywords: legitimacy, judicial reform, judicial independence, access to justice, legal training, informal justice, rule of law

Procedia PDF Downloads 478
3227 Green Spaces in Sustaining Cognitive Behaviour for Treating Anxiety and Depression in Children: A Prospective Study

Authors: Minakshi Jain, I. P. Singh

Abstract:

Due to the era of outstanding technology and modern lifestyle, human beings are debasing their physical, psychological, and mental well-being. The effect of this leads to a trail of chronic diseases like anxiety, loneliness, and depression, especially in children and young adults. This is visible in individuals who suffer from clinical depression, which leads to impaired mood and distortion of cognition, particularly in children. The Members of the WHO European Region made a declaration to provisioning each child with access to healthy and safe environments by 2020, and the decision was taken at the Conference on Environment and Health in 2010 as an initiative to improve access to green spaces in cities which provides universal access for quality spaces for both social interaction and human well-being. In line with this, the paper aims to establish a prospective study on linking green spaces and CBT (Cognitive behavior therapy) in order to treat disorders with reference to children and young adults. A questionnaire was adopted to explore the possibility of green spaces as additive measures for the existing modes of therapy. The results adapted from the questionnaire show that certain species of vegetation have a significant effect in enhancing effective mental well-being.

Keywords: CBT, therapeutic gardens UCLA loneliness scale, anxiety, depression, green spaces, biophilia, environmental psychology

Procedia PDF Downloads 21
3226 Apathetic Place, Hostile Space: A Qualitative Study on the Ability of Immigration Detention in the UK to Promote the Health and Dignity of Detainees

Authors: P. Dhesi, R. Burns

Abstract:

Background: The UK has one of the largest immigration detention estates in Europe and is under increasing scrutiny, particularly regarding the lack of transparency over the use of detention and the conditions. Therefore, this research seeks to explore the professional perceptions of the ability of immigration detention in the UK to promote health and dignity. Methods: A phenomenological approach to qualitative methods were used, with social constructivist theorisations of health and dignity. Seven semi-structured interviews were conducted using Microsoft Teams. Participants included a range of immigration detention stakeholders who have visited closed immigration detention centres in the UK in a professional capacity. Recorded interviews were transcribed verbatim, and analysis was data-driven through inductive reflexive thematic analysis of the entire data set to account for the small sample size. This study received ethical approval from University College London Research Ethics Committee. Results: Two global themes were created through analysis: apathetic place and hostile space. Apathetic place discusses the lack of concern for detainees' daily living and healthcare needs within immigration detention in the UK. This is explored through participants' perceptions of the lack of ability of monitoring and evaluation processes to ensure detainees are able to live with dignity and understand the unfulfilled duty of care that exists in detention. Hostile space discusses immigration detention in the UK as a wider system of hostility. This is explored through the disempowering impact on detainees, the perception of a failing system as a result of inadequate safeguarding procedures, and a belief that the intention of immigration detention is misaligned with its described purpose. Conclusion: This research explains why the current immigration detention system in the UK is unable to promote health and dignity, offering a social justice and action-orientated approach to research in this sphere. The findings strengthen the discourse against the use of detention as an immigration control tool in the UK. Implications for further research include a stronger emphasis on investigating alternatives to detention and culturally considerate opportunities for patient-centred healthcare.

Keywords: access to healthcare, dignity, health, immigration detention, migrant, refugee, UK

Procedia PDF Downloads 76
3225 Tackling the Digital Divide: Enhancing Video Consultation Access for Digital Illiterate Patients in the Hospital

Authors: Wieke Ellen Bouwes

Abstract:

This study aims to unravel which factors enhance accessibility of video consultations (VCs) for patients with low digital literacy. Thirteen in-depth interviews with patients, hospital employees, eHealth experts, and digital support organizations were held. Patients with low digital literacy received in-home support during real-time video consultations and are observed during the set-up of these consultations. Key findings highlight the importance of patient acceptance, emphasizing video consultations benefits and avoiding standardized courses. The lack of a uniform video consultation system across healthcare providers poses a barrier. Familiarity with support organizations – to support patients in usage of digital tools - among healthcare practitioners enhances accessibility. Moreover, considerations regarding the Dutch General Data Protection Regulation (GDPR) law influence support patients receive. Also, provider readiness to use video consultations influences patient access. Further, alignment between learning styles and support methods seems to determine abilities to learn how to use video consultations. Future research could delve into tailored learning styles and technological solutions for remote access to further explore effectiveness of learning methods.

Keywords: video consultations, digital literacy skills, effectiveness of support, intra- and inter-organizational relationships, patient acceptance of video consultations

Procedia PDF Downloads 43
3224 The Effective Use of the Network in the Distributed Storage

Authors: Mamouni Mohammed Dhiya Eddine

Abstract:

This work aims at studying the exploitation of high-speed networks of clusters for distributed storage. Parallel applications running on clusters require both high-performance communications between nodes and efficient access to the storage system. Many studies on network technologies led to the design of dedicated architectures for clusters with very fast communications between computing nodes. Efficient distributed storage in clusters has been essentially developed by adding parallelization mechanisms so that the server(s) may sustain an increased workload. In this work, we propose to improve the performance of distributed storage systems in clusters by efficiently using the underlying high-performance network to access distant storage systems. The main question we are addressing is: do high-speed networks of clusters fit the requirements of a transparent, efficient and high-performance access to remote storage? We show that storage requirements are very different from those of parallel computation. High-speed networks of clusters were designed to optimize communications between different nodes of a parallel application. We study their utilization in a very different context, storage in clusters, where client-server models are generally used to access remote storage (for instance NFS, PVFS or LUSTRE). Our experimental study based on the usage of the GM programming interface of MYRINET high-speed networks for distributed storage raised several interesting problems. Firstly, the specific memory utilization in the storage access system layers does not easily fit the traditional memory model of high-speed networks. Secondly, client-server models that are used for distributed storage have specific requirements on message control and event processing, which are not handled by existing interfaces. We propose different solutions to solve communication control problems at the filesystem level. We show that a modification of the network programming interface is required. Data transfer issues need an adaptation of the operating system. We detail several propositions for network programming interfaces which make their utilization easier in the context of distributed storage. The integration of a flexible processing of data transfer in the new programming interface MYRINET/MX is finally presented. Performance evaluations show that its usage in the context of both storage and other types of applications is easy and efficient.

Keywords: distributed storage, remote file access, cluster, high-speed network, MYRINET, zero-copy, memory registration, communication control, event notification, application programming interface

Procedia PDF Downloads 194
3223 A Multicriteria Analysis of Energy Poverty Index: A Case Study of Non-interconnected Zones in Colombia

Authors: Angelica Gonzalez O, Leonardo Rivera Cadavid, Diego Fernando Manotas

Abstract:

Energy poverty considers a population that does not have access to modern energy service. In particular, an area of a country that is not connected to the national electricity grid is known as a Non-Interconnected Zone (NIZ). Access to electricity has a significant impact on the welfare and development opportunities of the population. Different studies have shown that most health problems have an empirical cause and effect relationship with multidimensional energy poverty. Likewise, research has been carried out to review the consequences of not having access to electricity, and its results have concluded a statistically significant relationship between energy poverty and sources of drinking water, access to clean water, risks of mosquito bites, obesity, sterilization, marital status, occupation, and residence. Therefore, extensive research has been conducted in the construction of an energy poverty measure based on an index. Some of these studies introduce a Multidimensional Energy Poverty Index (MEPI), Compose Energy Poverty Index (CEPI), Low Income High Costs indicator (LIHC), among others. For this purpose, this study analyzes the energy poverty index using a multicriteria analysis determining the set of feasible alternatives - for which Colombia's ZNI will be used as a case study - to be considered in the problem and the set of relevant criteria in the characterization of the ZNI, from which the prioritization is obtained to determine the level of adjustment of each alternative with respect to the performance in each criterion. Additionally, this study considers the installation of Micro-Grids (MG). This is considered a straightforward solution to this problem because an MG is a local electrical grid, able to operate in grid-connected and island mode. Drawing on those insights, this study compares an energy poverty index considering an MG installation and calculates the impacts of different criterias in an energy poverty index in NIZ.

Keywords: multicirteria, energy poverty, rural, microgrids, non-interconnect zones

Procedia PDF Downloads 86
3222 Mirror of Princes as a Literary Genre in Classic Arabic Literature

Authors: Samir Kittaniy

Abstract:

The “Mirrors of Princes” is considered one of the most important literary types in Arabic and Islamic heritage. The term can be found in various types of “Adab”. The paper deals with the phrase: “Mirrors of princes” itself, showing its nature and the extent of its spread among researchers. Thus, the article relates to one of the main cultural pillars of the literary heritage. Creative individuals within the framework of this type of “Adab” have viewed the rulers as the ultimate goal they try to reach in their classification efforts, with the aim of educating, entertaining and amusing. Most literary classifications were submitted as a gift to the rulers, in an attempt to get closer to them. Pragmatic moral and political advices were among the most prominent issues to gain the approval of rulers.

Keywords: Islam, Arabic, literature, Middle East, mirrors of princes

Procedia PDF Downloads 497
3221 Effects of National Policy on Montana Medicaid Coverage and Enrollment

Authors: Ryan J. Trefethen, Vincent H. Smith

Abstract:

This study explores the relationship between national spending on the Medicaid program, and total Medicaid spending and enrollment in Montana, a state that ranks thirty-third in per capita income and thirty-seventh in median household income in the United States. The purpose of the research is to estimate the potential effects that specific changes to national healthcare policy would likely have on funding for the Montana Medicaid Program and enrollees in the program, members of families in poverty whose incomes are low, even though in many cases they have steady jobs. A particular concern is the effect on access to care for children in poverty who tend to be food insecure and, therefore, especially in need of access to health care. The research uses data collected from a variety of government publications, including the Medicaid Financial Management Report, the Medicaid Managed Care Enrollment Report, and the Centers for Medicare and Medicaid Services MSIS State Summaries for fiscal years 2000-2015. These data were examined using econometric analysis, to assess these impacts. The evidence indicates that the changes included in recent congressional legislative initiatives would potentially leave an additional 50,000 to 60,000 Montana residents, five to six percent of the state’s population, in poverty without access to health care. Impacts on children in poverty would potentially be substantial.

Keywords: children, healthcare, medicaid, montana, poverty

Procedia PDF Downloads 231
3220 Advancing Women's Participation in SIDS' Renewable Energy Sector: A Multicriteria Evaluation Framework

Authors: Carolina Mayen Huerta, Clara Ivanescu, Paloma Marcos

Abstract:

Due to their unique geographic challenges and the imperative to combat climate change, Small Island Developing States (SIDS) are experiencing rapid growth in the renewable energy (RE) sector. However, women's representation in formal employment within this burgeoning field remains significantly lower than their male counterparts. Conventional methodologies often overlook critical geographic data that influence women's job prospects. To address this gap, this paper introduces a Multicriteria Evaluation (MCE) framework designed to identify spatially enabling environments and restrictions affecting women's access to formal employment and business opportunities in the SIDS' RE sector. The proposed MCE framework comprises 24 key factors categorized into four dimensions: Individual, Contextual, Accessibility, and Place Characterization. "Individual factors" encompass personal attributes influencing women's career development, including caregiving responsibilities, exposure to domestic violence, and disparities in education. "Contextual factors" pertain to the legal and policy environment, influencing workplace gender discrimination, financial autonomy, and overall gender empowerment. "Accessibility factors" evaluate women's day-to-day mobility, considering travel patterns, access to public transport, educational facilities, RE job opportunities, healthcare facilities, and financial services. Finally, "Place Characterization factors" enclose attributes of geographical locations or environments. This dimension includes walkability, public transport availability, safety, electricity access, digital inclusion, fragility, conflict, violence, water and sanitation, and climatic factors in specific regions. The analytical framework proposed in this paper incorporates a spatial methodology to visualize regions within countries where conducive environments for women to access RE jobs exist. In areas where these environments are absent, the methodology serves as a decision-making tool to reinforce critical factors, such as transportation, education, and internet access, which currently hinder access to employment opportunities. This approach is designed to equip policymakers and institutions with data-driven insights, enabling them to make evidence-based decisions that consider the geographic dimensions of disparity. These insights, in turn, can help ensure the efficient allocation of resources to achieve gender equity objectives.

Keywords: gender, women, spatial analysis, renewable energy, access

Procedia PDF Downloads 32
3219 A Multicriteria Evaluation Framework for Enhancing Women's Participation in SIDS Renewable Energy Sector

Authors: Carolina Mayen Huerta, Clara Ivanescu, Paloma Marcos

Abstract:

Due to their unique geographic challenges and the imperative to combat climate change, Small Island Developing States (SIDS) are experiencing rapid growth in the renewable energy (RE) sector. However, women's representation in formal employment within this burgeoning field remains significantly lower than their male counterparts. Conventional methodologies often overlook critical geographic data that influence women's job prospects. To address this gap, this paper introduces a Multicriteria Evaluation (MCE) framework designed to identify spatially enabling environments and restrictions affecting women's access to formal employment and business opportunities in the SIDS' RE sector. The proposed MCE framework comprises 24 key factors categorized into four dimensions: Individual, Contextual, Accessibility, and Place Characterization. "Individual factors" encompass personal attributes influencing women's career development, including caregiving responsibilities, exposure to domestic violence, and disparities in education. "Contextual factors" pertain to the legal and policy environment, influencing workplace gender discrimination, financial autonomy, and overall gender empowerment. "Accessibility factors" evaluate women's day-to-day mobility, considering travel patterns, access to public transport, educational facilities, RE job opportunities, healthcare facilities, and financial services. Finally, "Place Characterization factors" enclose attributes of geographical locations or environments. This dimension includes walkability, public transport availability, safety, electricity access, digital inclusion, fragility, conflict, violence, water and sanitation, and climatic factors in specific regions. The analytical framework proposed in this paper incorporates a spatial methodology to visualize regions within countries where conducive environments for women to access RE jobs exist. In areas where these environments are absent, the methodology serves as a decision-making tool to reinforce critical factors, such as transportation, education, and internet access, which currently hinder access to employment opportunities. This approach is designed to equip policymakers and institutions with data-driven insights, enabling them to make evidence-based decisions that consider the geographic dimensions of disparity. These insights, in turn, can help ensure the efficient allocation of resources to achieve gender equity objectives.

Keywords: gender, women, spatial analysis, renewable energy, access

Procedia PDF Downloads 40
3218 Advancing Environmental Justice Through Active Mobility And Green Transport Modes In Urban Areas

Authors: Allison A. Roberts

Abstract:

Urbanization has led to numerous environmental challenges, often disproportionately affecting marginalized communities. This paper explores the critical concept of environmental justice and the urgent need to address environmental disparities in urban areas. It delves into the adverse impacts of rapid urbanization, including pollution and unequal access to resources. The research focuses on the potential impact of two key solutions: active mobility and green transport. By addressing transportation disparities and offering improved access to jobs, education, and services for marginalized communities, these initiatives can bridge socio-environmental gaps where environmental justice and ecological sustainability go hand in hand.

Keywords: environmental justice, transport economics, sustainability, urbanization

Procedia PDF Downloads 69
3217 Pneumoperitoneum Creation Assisted with Optical Coherence Tomography and Automatic Identification

Authors: Eric Yi-Hsiu Huang, Meng-Chun Kao, Wen-Chuan Kuo

Abstract:

For every laparoscopic surgery, a safe pneumoperitoneumcreation (gaining access to the peritoneal cavity) is the first and essential step. However, closed pneumoperitoneum is usually obtained by blind insertion of a Veress needle into the peritoneal cavity, which may carry potential risks suchas bowel and vascular injury.Until now, there remains no definite measure to visually confirm the position of the needle tip inside the peritoneal cavity. Therefore, this study established an image-guided Veress needle method by combining a fiber probe with optical coherence tomography (OCT). An algorithm was also proposed for determining the exact location of the needle tip through the acquisition of OCT images. Our method not only generates a series of “live” two-dimensional (2D) images during the needle puncture toward the peritoneal cavity but also can eliminate operator variation in image judgment, thus improving peritoneal access safety. This study was approved by the Ethics Committee of Taipei Veterans General Hospital (Taipei VGH IACUC 2020-144). A total of 2400 in vivo OCT images, independent of each other, were acquired from experiments of forty peritoneal punctures on two piglets. Characteristic OCT image patterns could be observed during the puncturing process. The ROC curve demonstrates the discrimination capability of these quantitative image features of the classifier, showing the accuracy of the classifier for determining the inside vs. outside of the peritoneal was 98% (AUC=0.98). In summary, the present study demonstrates the ability of the combination of our proposed automatic identification method and OCT imaging for automatically and objectively identifying the location of the needle tip. OCT images translate the blind closed technique of peritoneal access into a visualized procedure, thus improving peritoneal access safety.

Keywords: pneumoperitoneum, optical coherence tomography, automatic identification, veress needle

Procedia PDF Downloads 99
3216 Performance Evaluation of Distributed and Co-Located MIMO LTE Physical Layer Using Wireless Open-Access Research Platform

Authors: Ishak Suleiman, Ahmad Kamsani Samingan, Yeoh Chun Yeow, Abdul Aziz Bin Abdul Rahman

Abstract:

In this paper, we evaluate the benefits of distributed 4x4 MIMO LTE downlink systems compared to that of the co-located 4x4 MIMO LTE downlink system. The performance evaluation was carried out experimentally by using Wireless Open-Access Research Platform (WARP), where the comparison between the 4x4 MIMO LTE transmission downlink system in distributed and co-located techniques was examined. The measured Error Vector Magnitude (EVM) results showed that the distributed technique achieved better system performance compared to the co-located arrangement.

Keywords: multiple-input-multiple-output (MIMO), distributed MIMO, co-located MIMO, LTE

Procedia PDF Downloads 390
3215 Educational Justice as the Basis for Social Justice

Authors: Baratali Monfaredraz

Abstract:

The concept of justice has been able to occupy a lot of people’s minds and speeches for a long time. Justice has various dimensions such as economic justice, judicial justice, political justice, educational justice, ethnical justice and etc. Educational justice as one of the most basic dimensions of justice can alter our education in every field and it can flourish the talents and capabilities on macro level. One of the most efficient ways for social justice realization is to provide equal opportunities for all people in the society to be able to access equally to education as their human rights since today how progress occurs in education is regarded as the index of social development. On this basis, especially developing countries try to provide equal opportunities for all people in terms of access to education, specifically in higher education. At present, private education system violates the principles of conducting effort, meeting the needs and in part realizing the capabilities and so it cannot be justified to be a fair conductance. It seems that providing higher quality education in public schools and lowering role of teacher and educational facilities in educational achievement can be considered as a proper way to remove the discrimination in terms of unequal distribution of educational facilities. In addition, higher education development in deprived regions can initialize social activities among the inhabitants of these regions. Justice in educational field can result in access of all people to economic and social situations and job opportunities in future.

Keywords: educational justice, deprivation, private schools, higher education, job opportunities

Procedia PDF Downloads 453
3214 Multi-Level Security Measures in Cloud Computing

Authors: Shobha G. Ranjan

Abstract:

Cloud computing is an emerging, on-demand and internet- based technology. Varieties of services like, software, hardware, data storage and infrastructure can be shared though the cloud computing. This technology is highly reliable, cost effective and scalable in nature. It is a must only the authorized users should access these services. Further the time granted to access these services should be taken into account for proper accounting purpose. Currently many organizations do the security measures in many different ways to provide the best cloud infrastructure to their clients, but that’s not the limitation. This paper presents the multi-level security measure technique which is in accordance with the OSI model. In this paper, details of proposed multilevel security measures technique are presented along with the architecture, activities, algorithms and probability of success in breaking authentication.

Keywords: cloud computing, cloud security, integrity, multi-tenancy, security

Procedia PDF Downloads 475
3213 Assistive Technologies and the 'Myth' of Independent Living: A Sociological Understanding of Assistive Technologies for Locomotor Disabled in India

Authors: Pavani K. Sree, Ragahava Reddy Chandri

Abstract:

Independent living and living with dignity have been the hallmarks of the movement of the persons with disabilities across the globe against the oppression perpetuated by society in the form of social and physical structural barriers. Advancements in assistive technologies have been providing a new lease of life to persons with disabilities. However, access to these technologies is marred by the issues of affordability and availability. Poor from the developing countries find it difficult to make independent living or live with dignity because of lack of access and inability to afford the advance technologies. Class and gender appear to be key factors influencing the access to modern assistive technologies. The present paper attempts to understand the dynamics of class and gender in accessing advanced technologies in the Indian context. Based on an empirical study in which data were collected from persons with locomotor disabilities and service providers, the paper finds that the advance technologies are expensive and inaccessible to all persons with disabilities. The paper also finds that men with disabilities are prioritized by the members of the family for the use of advance technologies while women with disabilities are forced to live with not so advanced technologies. The paper finds that the state institutions working in the field of prosthetics and assistive technologies fail to deliver to the requirements of the poor. It was found that because of lack of facilities at the state institutions the cost of prosthetics, in the case of orthopedically challenged, is expensive and unaffordable for the poor. It was found that while rich male access the private services the poor women depend on the state institutions. It may be said that the social, cultural stereotypes extend not only to the state organizations but also to the use of prosthetics. Thus the notions of independent living and living with dignity in third world countries context are still elusive.

Keywords: accessibility, assistive technology, class, gender, state

Procedia PDF Downloads 273
3212 Design Channel Non Persistent CSMA MAC Protocol Model for Complex Wireless Systems Based on SoC

Authors: Ibrahim A. Aref, Tarek El-Mihoub, Khadiga Ben Musa

Abstract:

This paper presents Carrier Sense Multiple Access (CSMA) communication model based on SoC design methodology. Such model can be used to support the modelling of the complex wireless communication systems, therefore use of such communication model is an important technique in the construction of high performance communication. SystemC has been chosen because it provides a homogeneous design flow for complex designs (i.e. SoC and IP based design). We use a swarm system to validate CSMA designed model and to show how advantages of incorporating communication early in the design process. The wireless communication created through the modeling of CSMA protocol that can be used to achieve communication between all the agents and to coordinate access to the shared medium (channel).

Keywords: systemC, modelling, simulation, CSMA

Procedia PDF Downloads 395
3211 Automation of Student Attendance Management System Using BPM

Authors: Kh. Alaa, Sh. Sarah, J. Khowlah, S. Liyakathunsia

Abstract:

Education has become very important nowadays and with the rapidly increasing number of student, taking the attendance manually is getting very difficult and time wasting. In order to solve this problem, an automated solution is required. An effective automated system can be implemented to manage student attendance in different ways. This research will discuss a unique class attendance system which integrates both Face Recognition and RFID technique. This system focuses on reducing the time spent on submitting of the lecture and the wastage of time on submitting and getting approval for the absence excuse and sick leaves. As a result, the suggested solution will enhance not only the time, also it will also be helpful in eliminating fake attendance.

Keywords: attendance system, face recognition, RFID, process model, cost, time

Procedia PDF Downloads 332
3210 Performance Analysis of IDMA Scheme Using Quasi-Cyclic Low Density Parity Check Codes

Authors: Anurag Saxena, Alkesh Agrawal, Dinesh Kumar

Abstract:

The next generation mobile communication systems i.e. fourth generation (4G) was developed to accommodate the quality of service and required data rate. This project focuses on multiple access technique proposed in 4G communication systems. It is attempted to demonstrate the IDMA (Interleave Division Multiple Access) technology. The basic principle of IDMA is that interleaver is different for each user whereas CDMA employs different signatures. IDMA inherits many advantages of CDMA such as robust against fading, easy cell planning; dynamic channel sharing and IDMA increase the spectral efficiency and reduce the receiver complexity. In this, performance of IDMA is analyzed using QC-LDPC coding scheme further it is compared with LDPC coding and at last BER is calculated and plotted in MATLAB.

Keywords: 4G, QC-LDPC, CDMA, IDMA

Procedia PDF Downloads 289
3209 Analysis of Access to Credit among Rural Farmers in Giwa Local Government Area of Kaduna State, Nigeria

Authors: S. Ibrahim, Bashir Umar

Abstract:

Agricultural credit is very important for sustainable agricultural development to be achieved in any country of the world. Rural credit has proven to be a powerful instrument against poverty reduction and development in rural area. Agricultural credit enhances productivity and promotes standard of living by breaking vicious cycle of poverty of small scale farmers. This study examined access to credit among rural farmers in Giwa local government area of Kaduna state. Two stages sampling procedure was employed to select forty-two (42) respondents for the study. Primary data were collected using structured questionnaire with the help of well-trained enumerators. Data were analyzed using simple descriptive statistics. The results revealed that farmers were predominantly male (57.1%) and most (54.7%), were married with one level of education or another (66.5.%). Majority of the households’ head were between the ages of 31 to 50. majority of the farmers (68.2%) had more than 2ha of farmlands with at least 5 years of farming experience and an annual farm income of N 61,000 to 100,000 (61.9%). The Various sources of credit by the farmers in the study area were commercial banks (38.1%), Co-operative banks (47.6%), Development banks (14.2%) (formal) and Relatives (26.1%), Personal Savings (Adashi scheme) (52.3%), Moneylenders (21.4%) (informal). As regard to the amount of credit obtained by the farmers 38.1% received N 50,000-100,000, 50 % obtained N 100,001-500,000 while 11.9% obtained N 500,001-1,000,000. High interest Inadequate collateral, Complicated Procedures, lack of guarantor were the major constrains encountered by the farmers in accessing loans. The study therefore recommends that Rural farmers should be encouraged to form credit and thrift cooperative societies from which they can access much cheaper credits, Moreover, to ensure that any credit obtained may be manageable for the farmers, financial institutions should provide loans with low interest rates and government and non-governmental organizations should simplify procedures associated with accessing loans.

Keywords: analysis, access, credit, farmers

Procedia PDF Downloads 31
3208 Design and Implementation of a Memory Safety Isolation Method Based on the Xen Cloud Environment

Authors: Dengpan Wu, Dan Liu

Abstract:

In view of the present cloud security problem has increasingly become one of the major obstacles hindering the development of the cloud computing, put forward a kind of memory based on Xen cloud environment security isolation technology implementation. And based on Xen virtual machine monitor system, analysis of the model of memory virtualization is implemented, using Xen memory virtualization system mechanism of super calls and grant table, based on the virtual machine manager internal implementation of access control module (ACM) to design the security isolation system memory. Experiments show that, the system can effectively isolate different customer domain OS between illegal access to memory data.

Keywords: cloud security, memory isolation, xen, virtual machine

Procedia PDF Downloads 367
3207 Social Inclusion Challenges in Indigenous Communities: Case of the Baka Pygmies Community of Cameroon

Authors: Igor Michel Gachig, Samanta Tiague

Abstract:

Baka ‘Pygmies’ is an indigenous community living in the rainforest region of Cameroon. This community is known to be poor and marginalized from the political, economic and social life, regardless of sedentarization and development efforts. In fact, the social exclusion of ‘Pygmy’ people prevents them from gaining basic citizen’s rights, among which access to education, land, healthcare, employment and justice. In this study, social interactions, behaviors, and perceptions were considered. An interview guide and focus group discussions were used to collect data. A sample size of 97 was used, with 60 Baka Pygmies and 37 Bantus from two Baka-Bantu settlements/villages of the south region of Cameroon. The data were classified in terms of homogenous, exhaustive and exclusive categories. This classification has enabled factors explaining social exclusion in the Baka community to be highlighted using content analysis. The study shows that (i) limited access to education, natural resources and care in modern healthcare organizations, and (ii) different views on the development expectations and integration approaches both highlight the social exclusion in the Baka ‘Pygmies’ community. Therefore, an effective and adequate social integration of ‘Pygmies’ based on cultural peculiarities and identity, as well as reduction of disparities and improvement of their access to education should be of major concern to the government and policy makers.

Keywords: development, indigenous people, integration, social exclusion

Procedia PDF Downloads 108