Search results for: central venous access
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5935

Search results for: central venous access

5845 Classifications of Sleep Apnea (Obstructive, Central, Mixed) and Hypopnea Events Using Wavelet Packet Transform and Support Vector Machines (VSM)

Authors: Benghenia Hadj Abd El Kader

Abstract:

Sleep apnea events as obstructive, central, mixed or hypopnea are characterized by frequent breathing cessations or reduction in upper airflow during sleep. An advanced method for analyzing the patterning of biomedical signals to recognize obstructive sleep apnea and hypopnea is presented. In the aim to extract characteristic parameters, which will be used for classifying the above stated (obstructive, central, mixed) sleep apnea and hypopnea, the proposed method is based first on the analysis of polysomnography signals such as electrocardiogram signal (ECG) and electromyogram (EMG), then classification of the (obstructive, central, mixed) sleep apnea and hypopnea. The analysis is carried out using the wavelet transform technique in order to extract characteristic parameters whereas classification is carried out by applying the SVM (support vector machine) technique. The obtained results show good recognition rates using characteristic parameters.

Keywords: obstructive, central, mixed, sleep apnea, hypopnea, ECG, EMG, wavelet transform, SVM classifier

Procedia PDF Downloads 346
5844 Assessing the Physical Conditions of Motorcycle Taxi Stands and Comfort Conditions of the Drivers in the Central Business District of Bangkok

Authors: Nissa Phloimontri

Abstract:

This research explores the current physical conditions of motorcycle taxi stands located near the BTS stations in the central business district (CBD) and the comfort conditions of motorcycle taxi drivers. The criteria set up for physical stand survey and assessment are the integration of multimodal access design guidelines. After the survey, stands that share similar characteristics are classified into a series of typologies. Based on the environmental comfort model, questionnaires and in-depth interviews are conducted to evaluate the comfort levels of drivers including physical, functional, and psychological comfort. The results indicate that there are a number of motorcycle taxi stands that are not up to standard and are not conducive to the work-related activities of drivers. The study concludes by recommending public policy for integrated paratransit stops that support the multimodal transportation and seamless mobility concepts within the specific context of Bangkok as well as promote the quality of work life of motorcycle taxi drivers.

Keywords: motorcycle taxi, paratransit stops, environmental comfort, quality of work life

Procedia PDF Downloads 74
5843 An Attribute Based Access Control Model with POL Module for Dynamically Granting and Revoking Authorizations

Authors: Gang Liu, Huimin Song, Can Wang, Runnan Zhang, Lu Fang

Abstract:

Currently, resource sharing and system security are critical issues. This paper proposes a POL module composed of PRIV ILEGE attribute (PA), obligation and log which improves attribute based access control (ABAC) model in dynamically granting authorizations and revoking authorizations. The following describes the new model termed PABAC in terms of the POL module structure, attribute definitions, policy formulation and authorization architecture, which demonstrate the advantages of it. The POL module addresses the problems which are not predicted before and not described by access control policy. It can be one of the subject attributes or resource attributes according to the practical application, which enhances the flexibility of the model compared with ABAC. A scenario that illustrates how this model is applied to the real world is provided.

Keywords: access control, attribute based access control, granting authorizations, privilege, revoking authorizations, system security

Procedia PDF Downloads 334
5842 Dynamic Change of Floods Disaster Monitoring for River Central Bar by Remote Sensing Time-Series Images

Authors: Zuoji Huang, Jinyan Sun, Chunlin Wang, Haiming Qian, Nan Xu

Abstract:

The spatial extent and area of central river bars can always vary due to the impact of water level, sediment supply and human activities. In 2016, a catastrophic flood disaster caused by sustained and heavy rainfall happened in the middle and lower Yangtze River. The flood led to the most serious economic and social loss since 1954, and strongly affected the central river bar. It is essential to continuously monitor the dynamics change of central bars because it can avoid frequent field measurements in central bars before and after the flood disaster and is helpful for flood warning. This paper focused on the dynamic change of central bars of Phoenix bar and Changsha bar in the Yangtze River in 2016. In this study, GF-1 (GaoFen-1) WFV(wide field view) data was employed owing to its high temporal frequency and high spatial resolution. A simple NDWI (Normalized Difference Water Index) method was utilized for river central bar mapping. Human-checking was then performed to ensure the mapping quality. The relationship between the area of central bars and the measured water level was estimated using four mathematical models. Furthermore, a risk assessment index was proposed to map the spatial pattern of inundation risk of central bars. The results indicate a good ability of the GF-1 WFV imagery with a 16-m spatial resolution to characterize the seasonal variation of central river bars and to capture the impact of a flood disaster on the area of central bars. This paper observed a significant negative but nonlinear relationship between the water level and the area of central bars, and found that the cubic function fits best among four models (R² = 0.9839, P < 0.000001, RMSE = 0.4395). The maximum of the inundated area of central bars appeared during the rainy season on July 8, 2016, and the minimum occurred during the dry season on December 28, 2016, which are consistent with the water level measured by the hydrological station. The results derived from GF-1 data could provide a useful reference for decision-making of real-time disaster early warning and post-disaster reconstruction.

Keywords: central bars, dynamic change, water level, the Yangtze river

Procedia PDF Downloads 220
5841 Analyzing the Technology Affecting on the Social Integration of Students at University

Authors: Sujit K. Basak, Simon Collin

Abstract:

The aim of this paper is to examine the technology access and use on the affecting social integration of local students at university. This aim is achieved by designing a structural equation modeling (SEM) in terms of integration with peers, integration with faculty, faculty support and on the other hand, examining the socio demographic impact on the technology access and use. The collected data were analyzed using the WarpPLS 5.0 software. This study was survey based and it was conducted at a public university in Canada. The results of the study indicated that technology has a strong impact on integration with faculty, faculty support, but technology does not have an impact on integration with peers. However, the social demographic has also an impact on the technology access and use.

Keywords: faculty, integration, peer, technology access and use

Procedia PDF Downloads 481
5840 The Effect of Branched-Chain Amino Acids, Arginine, and Citrulline on Repeated Swimming Performance

Authors: Chun-Fang Hsueh, Chen-Kang Chang

Abstract:

Introduction: Branched-chain amino acids (BCAA) could reduce cerebral uptake of tryptophan, leading to decreased synthesis of serotonin in the brain. Arginine and citrulline could reduce exercise-induced hyperammonemia by increasing nitric oxide synthesis and the urea cycle. The combination of these supplements could reduce exercise-induced central fatigue. The purpose of this study was to examine the effect of BCAA, arginine, and citrulline supplementation on repeated swimming performance in teenage athletes. Methods: Eight male and eight female high school swimmers ingested 0.085 g/kg BCAA, 0.05 g/kg arginine and 0.05 g/kg citrulline (AA trial) or placebo (PL trial) in a randomized cross-over design. One hour after the ingestion, the subjects performed a 50 m sprint with their best style every 2 min for 8 times in an indoor 25 m pool. The subjects were asked to swim with their maximal effort each time. The time, stroke frequency and stroke length in each sprint were recorded. Venous blood samples were collected before and after the exercise. The time for each sprint was analyzed by 2-way analysis of variance with repeated measurement. Results: When all subjects were pooled together, total time for the AA trial was significantly faster than the PL trial (AA: 244.02 ± 22.94 s; PL: 247.55 ± 24.17 s, p < .001). Individual sprint time showed significant trial (p= .001) and trial x time (p= .004) effects. The post-hoc analysis revealed that the AA trial was significantly faster than the PL trial in the 2nd, 5th, and 6th sprint. In female subjects, there is a significant trial effect (p= .004) with the AA trial being faster in the 1st, 2nd, and 5th sprint. On the other hand, the trial effect was not significant (p= .072) in male subjects. Conclusions: The combined supplementation could improve 8 x 50 m performance in high school swimmers. The blood parameters including BCAA, tryptophan, NH₃, nitric oxide, and urea, as well as the stroke frequency and length in each sprint, are being analyzed. The results will be presented in the conference.

Keywords: central fatigue, hyperammonemia, tryptophan, urea

Procedia PDF Downloads 160
5839 Access to Health Data in Medical Records in Indonesia in Terms of Personal Data Protection Principles: The Limitation and Its Implication

Authors: Anny Retnowati, Elisabeth Sundari

Abstract:

This research aims to elaborate the meaning of personal data protection principles on patient access to health data in medical records in Indonesia and its implications. The method uses normative legal research by examining health law in Indonesia regarding the patient's right to access their health data in medical records. The data will be analysed qualitatively using the interpretation method to elaborate on the limitation of the meaning of personal data protection principles on patients' access to their data in medical records. The results show that patients only have the right to obtain copies of their health data in medical records. There is no right to inspect directly at any time. Indonesian health law limits the principle of patients' right to broad access to their health data in medical records. This restriction has implications for the reduction of personal data protection as part of human rights. This research contribute to show that a limitaion of personal data protection may abuse the human rights.

Keywords: access, health data, medical records, personal data, protection

Procedia PDF Downloads 57
5838 Access to Livelihoods for Urban Refugees in Kenya: The Case Study of Somalis Living in Eastleigh

Authors: Nancy Njoka, Manuela Ramos Cacciatore

Abstract:

In Kenya, refugee situations are becoming increasingly protracted, stretching over the years or even decades. As urbanization rates increase, so do the numbers of urban refugees in the country. Refugees living in urban areas face a range of challenges. In their efforts to pursue livelihoods, refugees have identified strategies to confront these challenges. In the same manner, humanitarian actors have come up with different interventions to promote access to livelihoods working through obstacles and barriers created by host governments. This paper seeks to understand the experience of Somali urban refugees living in the urban area of Eastleigh, Nairobi, both by investigating their own actions towards creating avenues to access livelihoods and by understanding their social, economic and policy context in which they forge livelihoods. The empirical data collected through fieldwork in Nairobi in 2020 serves as the basis of this qualitative case study. Drawing upon the themes of urban refugee movement, Somali ethnicity, citizenship discrimination and the livelihoods of refugees, the paper highlights how the actions of the Kenyan government and international non-governmental organization (INGO)s affect access to livelihoods and the consequences of these actions for Somali urban refugees. The results of the paper found that Somali urban refugees are taking active steps to create livelihoods for themselves. This is seen in the growth of Eastleigh as an economic hub in Kenya which is owned and run mostly by Somalis. Indeed, the Somali community is central to the establishment of networks in the neighborhood. Somali urban refugees are marginalized by the Kenyan government, reducing their opportunity to create dignified lives in Eastleigh. Findings also point out the community-based approaches used by INGOs in livelihood interventions. The relevance of this research lies in the interconnection of humanitarian development interventions for protracted refugees and the promotion of livelihoods in an urban and global context.

Keywords: Kenya, livelihoods, Somali, urban refugees

Procedia PDF Downloads 148
5837 Co-Existence of Central Serous Retinopathy and Diabetic Retinopathy: A Diagnostic Dilemma

Authors: Avantika Verma

Abstract:

Diabetic retinopathy (DR) and Central serous retinopathy (CSR) are 2 distinct entities, with difference in age of presentation, eitiopathogenesis and clinical features, but when occurring together, can be a diagnostic dilemma and requires careful evaluation. Case study of 3 patients with long standing diabetes (>15yrs) and features of Central serous retinopathy was done at Bangalore West Lions Superspeciality Eye Hospital, Bangalore, India in 2013. Even though diabetic retinopathy and CSR have different pathologies, they can coexist. The reason for coexistence could be the following: A patient with CSR as a young adult could develop DR in later years. Stress could be the contributing factor in older patient with diabetes.Stress could be a common factor for both, as it is one of the important factors in the pathogenesis of Maturity Onset Diabetes Miletus (MODY). In any situation, a careful evaluation is necessary to differentiate the cause of fundus picture, as treatment differs for the two diseases.

Keywords: central serous retinopathy, diabetic retinopathy, existence, stress

Procedia PDF Downloads 206
5836 Dynamic Shock Bank Liquidity Analysis

Authors: C. Recommandé, J. C. Blind, A. Clavel, R. Gourichon, V. Le Gal

Abstract:

Simulations are developed in this paper with usual DSGE model equations. The model is based on simplified version of Smets-Wouters equations in use at European Central Bank which implies 10 macro-economic variables: consumption, investment, wages, inflation, capital stock, interest rates, production, capital accumulation, labour and credit rate, and allows take into consideration the banking system. Throughout the simulations, this model will be used to evaluate the impact of rate shocks recounting the actions of the European Central Bank during 2008.

Keywords: CC-LM, Central Bank, DSGE, liquidity shock, non-standard intervention

Procedia PDF Downloads 427
5835 On Lie-Central Derivations and Almost Inner Lie-Derivations of Leibniz Algebras

Authors: Natalia Pacheco Rego

Abstract:

The Liezation functor is a map from the category of Leibniz algebras to the category of Lie algebras, which assigns a Leibniz algebra to the Lie algebra given by the quotient of the Leibniz algebra by the ideal spanned by the square elements of the Leibniz algebra. This functor is left adjoint to the inclusion functor that considers a Lie algebra as a Leibniz algebra. This environment fits in the framework of central extensions and commutators in semi-abelian categories with respect to a Birkhoff subcategory, where classical or absolute notions are relative to the abelianization functor. Classical properties of Leibniz algebras (properties relative to the abelianization functor) were adapted to the relative setting (with respect to the Liezation functor); in general, absolute properties have the corresponding relative ones, but not all absolute properties immediately hold in the relative case, so new requirements are needed. Following this line of research, it was conducted an analysis of central derivations of Leibniz algebras relative to the Liezation functor, called as Lie-derivations, and a characterization of Lie-stem Leibniz algebras by their Lie-central derivations was obtained. In this paper, we present an overview of these results, and we analyze some new properties concerning Lie-central derivations and almost inner Lie-derivations. Namely, a Leibniz algebra is a vector space equipped with a bilinear bracket operation satisfying the Leibniz identity. We define the Lie-bracket by [x, y]lie = [x, y] + [y, x] , for all x, y . The Lie-center of a Leibniz algebra is the two-sided ideal of elements that annihilate all the elements in the Leibniz algebra through the Lie-bracket. A Lie-derivation is a linear map which acts as a derivative with respect to the Lie-bracket. Obviously, usual derivations are Lie-derivations, but the converse is not true in general. A Lie-derivation is called a Lie-central derivation if its image is contained in the Lie-center. A Lie-derivation is called an almost inner Lie-derivation if the image of an element x is contained in the Lie-commutator of x and the Leibniz algebra. The main results we present in this talk refer to the conditions under which Lie-central derivation and almost inner Lie-derivations coincide.

Keywords: almost inner Lie-derivation, Lie-center, Lie-central derivation, Lie-derivation

Procedia PDF Downloads 113
5834 Efficacy of Eutectic Mixture of Local Anaesthetics and Diclofenac Spray in Attenuating Intravenous Cannulation Pain- Paeallel Randomized Trial

Authors: Anju Rani, Geeta, Sudha Rani, Choudhary, Puhal

Abstract:

Method- A total of 300 patients were studied, with 100 patients in each group. Patients aged 16-60 years, ASA grade I and II undergoing elective general surgical, urology and orthopedic procedures were included in the study. The patients were randomly allocated to any of the three groups by Using Sealed envelopes. 1. Group A: EMLA (eutectic mixture of 2.5% lidocaine with 2.5% prilocaine) - Patients receiving eutectic Lidocaine/ Prilocaine cream (2gm/10cm2) of Prilox cream), for 60- 70 min under occlusive dressing. 2. Group B - Patients receiving topical diclofenac 4 % spray gel for 60- 70 min, covering an absorption area of 50 cm2 3. Group C: control – Direct cannulation was done without any intervention. Results - Group B showed significantly least number of patients complaining pain on IV cannulation in comparison to group A and group C. The Mean VAS scores were found to be maximum in GROUP C: control-8.76 ± 4.14, then in GROUP A: EMLA- 2.54 ± 4.21.and least in GROUP B: Diclofenac 4% spray-1.13 ± 3.05. Erythema, induration and edema were significantly reported to be higher for the control group. Also group A patients reported adverse skin reactions more than patients in group B. Conclusion - It can be concluded that diclofenac spray 4 % and EMLA cream are effective in reducing the incidence and severity of venous cannulation pain as compared to the control group. However, a higher incidence of skin blanching, erythema, and oedema associated with EMLA cream and a lower incidence of these adverse effects favours the use of diclofenac spray 4%. They are promising agents for the treatment of venous cannulation pain.

Keywords: diclofenac spray, EMLA, intravenous, pain

Procedia PDF Downloads 129
5833 Blockchain Technology Security Evaluation: Voting System Based on Blockchain

Authors: Omid Amini

Abstract:

Nowadays, technology plays the most important role in the life of human beings because people use technology to share data and to communicate with each other, but the challenge is the security of this data. For instance, as more people turn to technology in the world, more data is generated, and more hackers try to steal or infiltrate data. In addition, the data is under the control of the central authority, which can trigger the challenge of losing information and changing information; this can create widespread anxiety for different people in different communities. In this paper, we sought to investigate Blockchain technology that can guarantee information security and eliminate the challenge of central authority access to information. Now a day, people are suffering from the current voting system. This means that the lack of transparency in the voting system is a big problem for society and the government in most countries, but blockchain technology can be the best alternative to the previous voting system methods because it removes the most important challenge for voting. According to the results, this research can be a good start to getting acquainted with this new technology, especially on the security part and familiarity with how to use a voting system based on blockchain in the world. At the end of this research, it is concluded that the use of blockchain technology can solve the major security problem and lead to a secure and transparent election.

Keywords: blockchain, technology, security, information, voting system, transparency

Procedia PDF Downloads 97
5832 Epidemiological Profile of Hospital Acquired Infections Caused by Acinetobacter baumannii in Intensive Care Unit

Authors: A. Dali-Ali, F. Agag, H. Beldjilali, A. Oukebdane, K. Meddeber, R. Dali-Yahia, N. Midoun

Abstract:

The ability of Acinetobacter baumannii to develop multiple resistances towards to the majority of antibiotics explains the therapeutic difficulties encountered in severe infections. Furthermore, its persistence in the humid or dry environment promotes cross-contamination in intensive care units. The aim of our study was to describe the epidemiological and bacterial resistance profiles of hospital-acquired infections caused by Acinetobacter baumannii in the intensive care unit of our teaching hospital. During the study period (June 3, 2012 to December 31, 2013), 305 patients having duration of hospitalization equal or more than 48 hours were included in the study. Among these, 36 had developed, at least, one health-care associated infection caused by Acinetobacter baumannii. The rate of infected patients was equal to 11.8% (36/305). The rate of cumulative incidence of hospital-acquired pneumonia was the highest (9.2%) followed by central venous catheter infection (1.3%). Analysis of the various antibiotic resistance profile shows that 93.8% of the strains were resistant to imipenem. The nosocomial infection control committee set up a special program not only to reduce the high rates of incidence of these infections but also to descrease the rate of imipenem resistance.

Keywords: Acinetobacer baumannii, epidemiological profile, hospital acquired infections, intensive care unit

Procedia PDF Downloads 301
5831 Low Students' Access to University Education in Nigeria: Causes and Remedy

Authors: Robert Ogbanje Okwori

Abstract:

The paper explained the causes low students’ access to university education in Nigeria and how it can be remedied. It is discovered that low students’ access to university education in Nigeria is evident despite these number of universities in the country. In 2006/2007 academic session, 806,089 sat for Joint Unified Matriculation Board Examination (JAMB) into Nigerian universities and only 123,626 (15.3%) were admitted while 2011/2012 academic session, a total of 1,493,604 candidates sat for Joint Unified Matriculation Board Examination (JAMB) into Nigerian universities and only 65,073 (43.57%) were admitted. This necessitates for the research. Therefore, the study posed the following research questions. What are causes of low students’ access to university education in Nigeria? What are the challenges of students’ access to university education in Nigeria? How can students’ access to university education in Nigeria be improved? Sample survey research design was adopted for the study. A structured questionnaire was used to gather data for the study. Six hundred and eighty (680) respondents which comprised of 100 level university students; JAMB Officers and University administrators (Vice Chancellors, Registrars and Admission Officers) were used for the study. Stratified random sampling was applied for adequate representation of respondents from universities in the six geopolitical zones of Nigeria. Mean was used to answer research questions while Kuder-Richardson formula 20 was used to check the internal consistency of the instrument. The correlation coefficient of the instrument was 0.87. The major findings include the carrying capacity of each university contributes to low students’ access to university education and academic staff were inadequate. From the analysis of the study, it is concluded that the rate of access to university education is low, therefore, every university should establish distance learning programme to reduce university admission crisis. The training infrastructure in the universities should be improved upon by the owners to increase the carrying capacity of each university.

Keywords: access, causes, low, university

Procedia PDF Downloads 438
5830 Analysis of Performance of 3T1D Dynamic Random-Access Memory Cell

Authors: Nawang Chhunid, Gagnesh Kumar

Abstract:

On-chip memories consume a significant portion of the overall die space and power in modern microprocessors. On-chip caches depend on Static Random-Access Memory (SRAM) cells and scaling of technology occurring as per Moore’s law. Unfortunately, the scaling is affecting stability, performance, and leakage power which will become major problems for future SRAMs in aggressive nanoscale technologies due to increasing device mismatch and variations. 3T1D Dynamic Random-Access Memory (DRAM) cell is a non-destructive read DRAM cell with three transistors and a gated diode. In 3T1D DRAM cell gated diode (D1) acts as a storage device and also as an amplifier, which leads to fast read access. Due to its high tolerance to process variation, high density, and low cost of memory as compared to 6T SRAM cell, it is universally used by the advanced microprocessor for on chip data and program memory. In the present paper, it has been shown that 3T1D DRAM cell can perform better in terms of fast read access as compared to 6T, 4T, 3T SRAM cells, respectively.

Keywords: DRAM Cell, Read Access Time, Retention Time, Average Power dissipation

Procedia PDF Downloads 283
5829 Health Effect of the Central European Diet in Postmenopausal Women with Increased Waist Circumference: A Preliminary Study

Authors: Joanna Bajerska, Agata Chmurzyńska, Agata Muzsik, Patrycja Krzyżanowska, Klaudia Łochocka, Jarosław Walkowiak

Abstract:

The Mediterranean diet (MED) is regarded as beneficial in the therapy of central obesity-associated metabolic abnormalities. However, in the traditional diet of the Central European countries, food items with positive nutritional profiles (rye bread, oats, buckwheat, herrings, linseed and rapeseed oil, berries, apples, plums, root vegetables etc.) are also used. We hypothesized that the Central European Diet (CED) may be comparatively effective in reducing symptoms of central obesity as MED. We tested the health effects of the CED, which is an environmentally friendly regional diet and the traditional MED diet in a group of postmenopausal centrally obese women. A total 58 with a mean age of 60 y (50-70y), body mass index (in kg/m(2)) of 33.4 (22.6-47.3), and waist circumference of 105 cm (87.5-137 cm) were randomly assigned to receive either the diet based on food items commonly used in Central Europe (the CED group; n = 29) or the Mediterranean diet (the MED group; n = 29) for 15 weeks. Body mass and body composition were measured with a Bod Pod (Cosmed, Italy). A non-elastic flexible measuring tape was used to measure waist circumference. Additionally, blood pressure, plasma lipid and glucose levels were assessed with the use of a biochemical analyzer. A total of 50 subjects [86% (CED 83%; MED 90%)] completed the intervention. A high dietary compliance for both described diets was achieved. The mean (±SEM) weight and waist circumference changes were -7.4 ± 0.7 kg; -8.3 ± 0.7 cm and -8.1 ± 0.5 kg; -7.1 ± 0.6 cm for the CED and MED groups, respectively. Moreover, there were no differences between the effectiveness of the diets used in terms of the influence on fat mass, blood pressure, and biochemical parameters. The preliminary data suggest that both described diets may be successfully used for improving central obesity-associated metabolic abnormalities. The project was financed by the National Science Centre awarded based on the number of decision DEC-013/09/B/NZ9/02365

Keywords: central european diet, central obesity, Mediterranean diet, metabolic abnormalities

Procedia PDF Downloads 408
5828 The Relationship between Central Bank Independence and Inflation: Evidence from Africa

Authors: R. Bhattu Babajee, Marie Sandrine Estelle Benoit

Abstract:

The past decades have witnessed a considerable institutional shift towards Central Bank Independence across economies of the world. The motivation behind such a change is the acceptance that increased central bank autonomy has the power of alleviating inflation bias. Hence, studying whether Central Bank Independence acts as a significant factor behind the price stability in the African economies or whether this macroeconomic aim in these countries result from other economic, political or social factors is a pertinent issue. The main research objective of this paper is to assess the relationship between central bank autonomy and inflation in African economies where inflation has proved to be a serious problem. In this optic, we shall measure the degree of CBI in Africa by computing the turnover rates of central banks governors thereby studying whether decisions made by African central banks are affected by external forces. The purpose of this study is to investigate empirically the association between Central Bank Independence (CBI) and inflation for 10 African economies over a period of 17 years, from 1995 to 2012. The sample includes Botswana, Egypt, Ghana, Kenya, Madagascar, Mauritius, Mozambique, Nigeria, South Africa, and Uganda. In contrast to empirical research, we have not been using the usual static panel model for it is associated with potential mis specification arising from the absence of dynamics. To this issue a dynamic panel data model which integrates several control variables has been used. Firstly, the analysis includes dynamic terms to explain the tenacity of inflation. Given the confirmation of inflation inertia, that is very likely in African countries there exists the need for including lagged inflation in the empirical model. Secondly, due to known reverse causality between Central Bank Independence and inflation, the system generalized method of moments (GMM) is employed. With GMM estimators, the presence of unknown forms of heteroskedasticity is admissible as well as auto correlation in the error term. Thirdly, control variables have been used to enhance the efficiency of the model. The main finding of this paper is that central bank independence is negatively associated with inflation even after including control variables.

Keywords: central bank independence, inflation, macroeconomic variables, price stability

Procedia PDF Downloads 345
5827 Ancient Iran Water Technologies

Authors: Akbar Khodavirdizadeh, Ali Nemati Babaylou, Hassan Moomivand

Abstract:

The history of human access to water technique has been one of the factors in the formation of human civilizations in the ancient world. The technique that makes surface water and groundwater accessible to humans on the ground has been a clever technique in human life to reach the water. In this study, while examining the water technique of ancient Iran using the Qanats technique, the water supply system of different regions of the ancient world were also studied and compared. Six groups of the ancient region of ancient Greece (Archaic 480-750 BC and Classical 223-480 BC), Urartu in Tuspa (600-850 BC), Petra (106-168 BC), Ancient Rome (265 BC), and the ancient United States (1450 BC) and ancient Iranian water technologies were studied under water supply systems. Past water technologies in these areas: water transmission systems in primary urban centers, use of water structures in water control, use of bridges in water transfer, construction of waterways for water transfer, storage of rainfall, construction of various types of pottery- ceramic, lead, wood and stone pipes have been used in water transfer, flood control, water reservoirs, dams, channel, wells, and Qanat. The central plateau of Iran is one of the arid and desert regions. Archaeological, geomorphological, and paleontological studies of the central region of the Iranian plateau showed that without the use of Qanats, the possibility of urban civilization in this region was difficult and even impossible. Zarch aqueduct is the most important aqueduct in Yazd region. Qanat of Zarch is a plain Qanat with a gallery length of 80 km; its mother well is 85 m deep and has 2115 well shafts. The main purpose of building the Qanat of Zārch was to access the groundwater source and transfer it to the surface of the ground. Regarding the structure of the aqueduct and the technique of transferring water from the groundwater source to the surface, it has a great impact on being different from other water techniques in the ancient world. The results show that the use of water technologies in ancient is very important to understand the history of humanity in the use of hydraulic techniques.

Keywords: ancient water technologies, groundwaters, qanat, human history, Ancient Iran

Procedia PDF Downloads 85
5826 Epidemiology of Hepatitis B and Hepatitis C Viruses Among Pregnant Women at Queen Elizabeth Central Hospital, Malawi

Authors: Charles Bijjah Nkhata, Memory Nekati Mvula, Milton Masautso Kalongonda, Martha Masamba, Isaac Thom Shawa

Abstract:

Viral Hepatitis is a serious public health concern globally with deaths estimated at 1.4 million annually due to liver fibrosis, cirrhosis, and hepatocellular carcinoma. Hepatitis B and C are the most common viruses that cause liver damage. However, the majority of infected individuals are unaware of their serostatus. Viral Hepatitis has contributed to maternal and neonatal morbidity and mortality. There is no updated data on the Epidemiology of hepatitis B and C among pregnant mothers in Malawi. To assess the epidemiology of Hepatitis B and C viruses among pregnant women at Queen Elizabeth Central Hospital. Specific Objectives • To determine sero-prevalence of HBsAg and Anti-HCV in pregnant women at QECH. • To investigate risk factors associated with HBV and HCV infection in pregnant women. • To determine the distribution of HBsAg and Anti-HCV infection among pregnant women of different age group. A descriptive cross-sectional study was conducted among pregnant women at QECH in last quarter of 2021. Of the 114 pregnant women, 96 participants were consented and enrolled using a convenient sampling technique. 12 participants were dropped due to various reasons; therefore 84 completed the study. A semi-structured questionnaire was used to collect socio-demographic and behavior characteristics to assess the risk of exposure. Serum was processed from venous blood samples and tested for HBsAg and Anti-HCV markers utilizing Rapid screening assays for screening and Enzyme Linked Immunosorbent Assay for confirmatory. A total of 84 pregnant consenting pregnant women participated in the study, with 1.2% (n=1/84) testing positive for HBsAg and nobody had detectable anti-HCV antibodies. There was no significant link between HBV and HCV in any of the socio-demographic data or putative risk variables. The findings indicate a viral hepatitis prevalence lower than the set range by the WHO. This suggests that HBV and HCV are rare in pregnant women at QECH. Nevertheless, accessible screening for all pregnant women should be provided. The prevention of MTCT is key for reduction and prevention of the global burden of chronic viral Hepatitis.

Keywords: viral hepatitis, hepatitis B, hepatitis C, pregnancy, malawi, liver disease, mother to child transmission

Procedia PDF Downloads 143
5825 BTG-BIBA: A Flexibility-Enhanced Biba Model Using BTG Strategies for Operating System

Authors: Gang Liu, Can Wang, Runnan Zhang, Quan Wang, Huimin Song, Shaomin Ji

Abstract:

Biba model can protect information integrity but might deny various non-malicious access requests of the subjects, thereby decreasing the availability in the system. Therefore, a mechanism that allows exceptional access control is needed. Break the Glass (BTG) strategies refer an efficient means for extending the access rights of users in exceptional cases. These strategies help to prevent a system from stagnation. An approach is presented in this work for integrating Break the Glass strategies into the Biba model. This research proposes a model, BTG-Biba, which provides both an original Biba model used in normal situations and a mechanism used in emergency situations. The proposed model is context aware, can implement a fine-grained type of access control and primarily solves cross-domain access problems. Finally, the flexibility and availability improvement with the use of the proposed model is illustrated.

Keywords: Biba model, break the glass, context, cross-domain, fine-grained

Procedia PDF Downloads 516
5824 Assessment of Pakistan-China Economic Corridor: An Emerging Dynamic of 21st Century

Authors: Naad-E-Ali Sulehria

Abstract:

Pakistan and china have stepped in a new phase of strengthening fraternity as the dream of economic corridor once discerned by both countries is going to take a pragmatic shape. Pak-China economic corridor an under construction program is termed to be an emerging dynamic of 21st century that anticipates a nexus between Asian continent and Indian Ocean by extending its functions to adjoining East, South, Central and Western Asian regions. The $45.6 billion worth heavily invested megaprojects by China are meant to revive energy sector and building economic infrastructure in Pakistan. Evidently, these projects are a part of ‘southern extension’ of Silk Road economic belt which is going to draw out prominent incentives for both countries particularly bolstering China to acquire influential dominance over the regional trade and beyond. In pursuit to adhere, by these progressive plans both countries have began working on their respective assignments. This article discusses the economical development programs under China’s peripheral diplomacy regarding its region-specific-approach to accumulate trade of Persian Gulf and access the landlocked Central Asian states through Pakistan in a sublimate context to break US encirclement of Asia. Pakistan’s utmost preference to utilize its strategic channel as a trade hub to become an emerging economy and surpass its arch-rival India for strategic concerns is contemplated accordingly. The needs and feasibility of the economic gateway and the dividends it can provide in the contemporary scenario are examined carefully and analysis is drawn upon the future prospects of the Pakistan-China Economic corridor once completed.

Keywords: pak-china economic corridor (PCEC), central asian republic states (CARs), new silk road economic belt, gawadar

Procedia PDF Downloads 343
5823 Channels Splitting Strategy for Optical Local Area Networks of Passive Star Topology

Authors: Peristera Baziana

Abstract:

In this paper, we present a network configuration for a WDM LANs of passive star topology that assume that the set of data WDM channels is split into two separate sets of channels, with different access rights over them. Especially, a synchronous transmission WDMA access algorithm is adopted in order to increase the probability of successful transmission over the data channels and consequently to reduce the probability of data packets transmission cancellation in order to avoid the data channels collisions. Thus, a control pre-transmission access scheme is followed over a separate control channel. An analytical Markovian model is studied and the average throughput is mathematically derived. The performance is studied for several numbers of data channels and various values of control phase duration.

Keywords: access algorithm, channels division, collisions avoidance, wavelength division multiplexing

Procedia PDF Downloads 266
5822 A New Bound on the Average Information Ratio of Perfect Secret-Sharing Schemes for Access Structures Based on Bipartite Graphs of Larger Girth

Authors: Hui-Chuan Lu

Abstract:

In a perfect secret-sharing scheme, a dealer distributes a secret among a set of participants in such a way that only qualified subsets of participants can recover the secret and the joint share of the participants in any unqualified subset is statistically independent of the secret. The access structure of the scheme refers to the collection of all qualified subsets. In a graph-based access structures, each vertex of a graph G represents a participant and each edge of G represents a minimal qualified subset. The average information ratio of a perfect secret-sharing scheme realizing a given access structure is the ratio of the average length of the shares given to the participants to the length of the secret. The infimum of the average information ratio of all possible perfect secret-sharing schemes realizing an access structure is called the optimal average information ratio of that access structure. We study the optimal average information ratio of the access structures based on bipartite graphs. Based on some previous results, we give a bound on the optimal average information ratio for all bipartite graphs of girth at least six. This bound is the best possible for some classes of bipartite graphs using our approach.

Keywords: secret-sharing scheme, average information ratio, star covering, deduction, core cluster

Procedia PDF Downloads 340
5821 Digital Demands: Addressing the Digital Divide in Basic Education and Its Relation to Academic Performance and Aspirations

Authors: Jose Rodrigo Zubiri, Sofia Carmen Tomacruz

Abstract:

Amidst an increasingly digitalized society, information and communication technologies have been seamlessly integrated into the economic, social, and political life of individuals. Information has been regarded as a primary good, essential to the wellbeing and self-respect of individuals in society. The digital engagements of an individual play a key role in a variety of life outcomes ranging from academic performance to entrepreneurial success to health service uptake. As a result of varying degrees of access to the Internet and ICTs across populations and individuals, a digital divide emerges. Education, a sector pivotal to directing individual life trajectories, has been radically transformed with regards to the learning process and access to information and thus faces the implications of the digital divide, as new waves of inequalities are introduced in the classroom. As the period of basic education is critical to transitioning into civic life or higher education, digital inequalities are capable of aggravating pre-existing social inequalities. Through survey-questionnaires, conducted on 152 high school students from a Philippine public school, the study reveals the correlation of academic performance and aspirations (for their highest academic qualification) to access to digital technologies and the Internet, according to Van Dijk’s four measurements of digital poverty, namely: motivational access, material access, skills access, and usage access. The findings reveal a positive correlation for academic performance whereas no correlation was found between aspirations and digital access. In the study, significant correlational differences were also found between genders, specifically, in terms of skills access and academic performance.

Keywords: digital divide, ICTs, inequality, education, life trajectories

Procedia PDF Downloads 243
5820 An Intelligent Cloud Radio Access Network (RAN) Architecture for Future 5G Heterogeneous Wireless Network

Authors: Jin Xu

Abstract:

5G network developers need to satisfy the necessary requirements of additional capacity from massive users and spectrally efficient wireless technologies. Therefore, the significant amount of underutilized spectrum in network is motivating operators to combine long-term evolution (LTE) with intelligent spectrum management technology. This new LTE intelligent spectrum management in unlicensed band (LTE-U) has the physical layer topology to access spectrum, specifically the 5-GHz band. We proposed a new intelligent cloud RAN for 5G.

Keywords: cloud radio access network, wireless network, cloud computing, multi-agent

Procedia PDF Downloads 394
5819 Identify Users Behavior from Mobile Web Access Logs Using Automated Log Analyzer

Authors: Bharat P. Modi, Jayesh M. Patel

Abstract:

Mobile Internet is acting as a major source of data. As the number of web pages continues to grow the Mobile web provides the data miners with just the right ingredients for extracting information. In order to cater to this growing need, a special term called Mobile Web mining was coined. Mobile Web mining makes use of data mining techniques and deciphers potentially useful information from web data. Web Usage mining deals with understanding the behavior of users by making use of Mobile Web Access Logs that are generated on the server while the user is accessing the website. A Web access log comprises of various entries like the name of the user, his IP address, a number of bytes transferred time-stamp etc. A variety of Log Analyzer tools exists which help in analyzing various things like users navigational pattern, the part of the website the users are mostly interested in etc. The present paper makes use of such log analyzer tool called Mobile Web Log Expert for ascertaining the behavior of users who access an astrology website. It also provides a comparative study between a few log analyzer tools available.

Keywords: mobile web access logs, web usage mining, web server, log analyzer

Procedia PDF Downloads 339
5818 Walls, Barriers, and Fences to Informal Political Economy of Land Resource Accesses: A Case of Banyabunagana Along with Uganda–Congo Border, South Western Uganda, Kisoro District

Authors: Niringiye Fred

Abstract:

Banyabunagana has always had access to land resources for grazing animals, sand mining, and farmland across the border in the Democratic Republic of Congo during the pre-colonial and colonial times, usually on an informal arrangement facilitated by kinship ties and rent transactions for these resources. However, in recent periods, the government of the Democratic Republic of the Congo (DRC) has been pursuing a policy of constructing barriers such as walls and fences so that Banyabunagana communities do not access the land on the DRC side of the border. This is happening in the background of increased and intensified demand for land use on the side of the Ugandan community. This paper will attempt to discuss the reasons behind the construction of walls, fences, and other barriers which deny access to land for Banyabunagana communities in Bunagana Parish, Muramba Sub-county- Kisoro district, Uganda. The research will attempt to answer the following main questions, among others, whether there are the factors that explain the construction of walls and fences which could limit or deny access to the informal use of land and other resources and whether policy options to ensure continued access to land and other resources for local communities.

Keywords: border, walls, fences, land resource access

Procedia PDF Downloads 82
5817 Content of Trace Elements in Agricultural Soils from Central and Eastern Europe

Authors: S. Krustev, V. Angelova, K. Ivanov, P. Zaprjanova

Abstract:

Approximately a dozen trace elements are vital for the development of all plants and some other elements are significant for some species. Heavy metals do not belong to this group of elements that are essential to plants, but some of them such as copper and zinc, have a dual effect on their growth. Concentration levels of these elements in the different regions of the world vary considerably. Their high concentrations in some parts of Central and Eastern Europe cause concern for human health and degrade the quality of agricultural produce from these areas. This study aims to compare the prevalence and levels of the major trace elements in some rural areas of Central and Eastern Europe. Soil samples from different regions of the Czech Republic, Slovakia, Austria, Hungary, Serbia, Romania, Bulgaria and Greece far from large industrial centers have been studied. The main methods for their determination are the atomic spectral techniques – atomic absorption and plasma atomic emission. As a result of this study, data on microelements levels in soils of 17 points from the main grain-producing regions of Central and Eastern Europe are presented and systematized. The content of trace elements was in the range of 5.0-84.1 mg.kg⁻¹ for Cu, 0.3-1.4 mg.kg⁻¹ for Cd, 26.1-225.5 mg.kg⁻¹ for Zn, 235.5-788.6 mg.kg⁻¹ for Mn and 4.1-25.8 mg.kg⁻¹ for Pb.

Keywords: trace elements, heavy metals, agricultural soils, Central and Eastern Europe

Procedia PDF Downloads 136
5816 Identity Management in Virtual Worlds Based on Biometrics Watermarking

Authors: S. Bader, N. Essoukri Ben Amara

Abstract:

With the technological development and rise of virtual worlds, these spaces are becoming more and more attractive for cybercriminals, hidden behind avatars and fictitious identities. Since access to these spaces is not restricted or controlled, some impostors take advantage of gaining unauthorized access and practicing cyber criminality. This paper proposes an identity management approach for securing access to virtual worlds. The major purpose of the suggested solution is to install a strong security mechanism to protect virtual identities represented by avatars. Thus, only legitimate users, through their corresponding avatars, are allowed to access the platform resources. Access is controlled by integrating an authentication process based on biometrics. In the request process for registration, a user fingerprint is enrolled and then encrypted into a watermark utilizing a cancelable and non-invertible algorithm for its protection. After a user personalizes their representative character, the biometric mark is embedded into the avatar through a watermarking procedure. The authenticity of the avatar identity is verified when it requests authorization for access. We have evaluated the proposed approach on a dataset of avatars from various virtual worlds, and we have registered promising performance results in terms of authentication accuracy, acceptation and rejection rates.

Keywords: identity management, security, biometrics authentication and authorization, avatar, virtual world

Procedia PDF Downloads 244