Search results for: limited access order
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 19247

Search results for: limited access order

18917 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification

Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang

Abstract:

One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.

Keywords: malware detection, network security, targeted attack, computational intelligence

Procedia PDF Downloads 234
18916 Analysis of Delivery of Quad Play Services

Authors: Rahul Malhotra, Anurag Sharma

Abstract:

Fiber based access networks can deliver performance that can support the increasing demands for high speed connections. One of the new technologies that have emerged in recent years is Passive Optical Networks. This paper is targeted to show the simultaneous delivery of triple play service (data, voice, and video). The comparative investigation and suitability of various data rates is presented. It is demonstrated that as we increase the data rate, number of users to be accommodated decreases due to increase in bit error rate.

Keywords: FTTH, quad play, play service, access networks, data rate

Procedia PDF Downloads 384
18915 Trajectory Design and Power Allocation for Energy -Efficient UAV Communication Based on Deep Reinforcement Learning

Authors: Yuling Cui, Danhao Deng, Chaowei Wang, Weidong Wang

Abstract:

In recent years, unmanned aerial vehicles (UAVs) have been widely used in wireless communication, attracting more and more attention from researchers. UAVs can not only serve as a relay for auxiliary communication but also serve as an aerial base station for ground users (GUs). However, limited energy means that they cannot work all the time and cover a limited range of services. In this paper, we investigate 2D UAV trajectory design and power allocation in order to maximize the UAV's service time and downlink throughput. Based on deep reinforcement learning, we propose a depth deterministic strategy gradient algorithm for trajectory design and power distribution (TDPA-DDPG) to solve the energy-efficient and communication service quality problem. The simulation results show that TDPA-DDPG can extend the service time of UAV as much as possible, improve the communication service quality, and realize the maximization of downlink throughput, which is significantly improved compared with existing methods.

Keywords: UAV trajectory design, power allocation, energy efficient, downlink throughput, deep reinforcement learning, DDPG

Procedia PDF Downloads 117
18914 Racial and Ethnic Health Disparities: An Investigation of the Relationship between Race, Ethnicity, Health Care Access, and Health Status

Authors: Dorcas Matowe

Abstract:

Inequality in health care for racial and ethnic minorities continues to be a growing concern for many Americans. Some of the barriers hindering the elimination of health disparities include lack of insurance, socioeconomic status (SES), and racism. This study will specifically focus on the association between some of these factors- health care access, which includes insurance coverage and frequency of doctor visits, race, ethnicity, and health status. The purpose of this study will be to address the following questions: is having health insurance associated with increased doctor visits? Are racial and ethnic minorities with health insurance more or less likely to see a doctor? Is the association between having health insurance moderated by being an ethnic minority? Given the current implications of the 2010 Affordable Care Act, this study will highlight the need to prioritize health care access for minorities and confront institutional racism. Critical Race Theory (CRT) will demonstrate how racism has reinforced these health disparities. This quantitative study design will analyze secondary data from the 2015 Behavioral Risk Factor Surveillance System (BRFSS) questionnaire, a telephone survey conducted annually in all 50 states and three US territories by state health departments in conjunction with the Center for Disease Control (CDC). Non-identifying health-related data is gathered annually from over 400,000 adults 18 years and above about their health status and use of preventative services. Through Structural Equation Modeling (SEM), the relationship between the predictor variables of health care access, race, and ethnicity, the criterion variable of health status, and the latent variables of emotional support and life satisfaction will be examined. It is hypothesized that there will be an interaction between certain racial and ethnic minorities who went to see a doctor, had insurance coverage, experienced racism, and the quality of their health status, emotional support, and life satisfaction.

Keywords: ethnic minorities, health disparities, health access, racism

Procedia PDF Downloads 243
18913 Securing Internet of Things Devices in Healthcare industry: An Investigation into Efficient and Effective Authorization Procedures

Authors: Maruf Farhan, Abdul Salih, Sikandar Ali Tahir

Abstract:

Protecting patient information's confidentiality is paramount considering the widespread use of Internet of Things (IoT) gadgets in medical settings. This study's subjects are decentralized identifiers (DIDs) and verifiable credentials (VCs) in conjunction with an OAuth-based authorization framework, as they are the key to protecting IoT healthcare devices. DIDs enable autonomous authentication and trust formation between IoT devices and other entities. To authorize users and enforce access controls based on verified claims, VCs offer a secure and adaptable solution. Through the proposed method, medical facilities can improve the privacy and security of their IoT devices while streamlining access control administration. A Smart pill dispenser in a hospital setting is used to illustrate the advantages of this method. The findings demonstrate the value of DIDs, VCs, and OAuth-based delegation in protecting the IoT devices. Improved processes for authorizing and controlling access to IoT devices are possible thanks to the research findings, which also help ensure patient confidentiality in the healthcare sector.

Keywords: Iot, DID, authorization, verifiable credentials

Procedia PDF Downloads 53
18912 Totally Implantable Venous Access Device for Long Term Parenteral Nutrition in a Patient with High Output Enterocutaneous Fistula Due to Advanced Malignancy

Authors: Puneet Goyal, Aarti Agarwal

Abstract:

Background and Objective: Nutritional support is an integral part of palliative care of advanced non-resectable abdominal malignancy patients, though is frequently neglected aspect. Non-Healing high output Entero-cutaneous fistulas sometimes require long term parenteral nutrition, to take care of catabolism and replacement of nutrients. We present a case of inoperable pancreatic malignancy with high output entero-cutaneous fistula, which was provided parenteral nutritional support with the use of Totally Implantable Venous Access Device (TIVAD). Method and Results: 55 year old man diagnosed with carcinoma pancreas had developed high entero-cutaneous fistula. His tumor was found to be inoperable and was on total parenteral nutrition through routine central line. This line was difficult to maintain as he required it for a long term TPN. He was planned to undergo Totally Implantable Venous Access Device (TIVAD) implantation. 8Fr single lumen catheter with Groshong non-return Valve (Bard Access Systems, Inc. USA) was inserted through right internal jugular vein, under fluoroscopic guidance. The catheter was tunneled subcutaneously and brought towards infraclavicular pocket, cut at appropriate length and connected to port and locked. Port was sutured in floor of pocket. Free flow of blood aspirated, flushed with heparinized saline. There was no kink observed in entire length of catheter under fluoroscopy. Skin over infraclavicular pocket was sutured. Long term catheter care and associated risks were explained to patient and relatives. Patient continued to receive total parenteral nutrition as well as other supportive therapy though TIVAD for next 6 weeks, till his demise. Conclusion: TIVADs are standard of care for long term venous access solutions in cancer patients requiring chemotherapy. In this case, we extended its use for providing parenteral nutrition and other supportive therapy. TIVADs can be implanted in advanced cancer patients for providing venous access solution required for various palliative treatments and medications. This will help in improving quality of life and satisfaction amongst terminally ill cancer patients.

Keywords: parenteral nutrition, totally implantable venous access device, long term venous access, interventions in anesthesiology

Procedia PDF Downloads 216
18911 Modeling Comfort by Thermal Inertia in Eco-Construction for Low-Income People in an Aqueous Environment in the Face of Sustainable Development in Sub-Saharan Africa; Case of the City of Kinshasa, DR Congo

Authors: Mbambu K. Shaloom, Biba Kalengo, Pierre Echard, Olivier Gilson, Tshiswaka Ngalula, Léonard Kabeya Mukeba Yakasham

Abstract:

In this 21st century, while design and eco-construction continue to be governed by considerations of functionality, safety, comfort and initial investment cost. Today, the principles of sustainable development lead us to think over longer time frames, to take into account new issues and the operating costs of green energy. DR Congo (sub-Saharan Africa) still suffers from the unusability of certain bio-sourced materials (such as bamboo, branches, etc.) and the lack of energy, i.e. 9% of the population has access to electricity and 21% of access to water. Ecoconstruction involves the energy performance of buildings which carry out a dynamic thermal simulation, which targets the different assumptions and conventional parameters (weather, occupancy, materials, thermal comfort, green energies, etc.). The objective of this article is to remedy the thermal, economic and technical artisanal problems in an aqueous environment in the city of Kinshasa. In order to establish a behavioral model to mitigate environmental impacts on architectural modifications and low-cost eco-construction through the approach of innovation and design thinking.

Keywords: thermal comfort, bio-sourced material, eco-architecture, eco-construction, squatting, design thinking

Procedia PDF Downloads 54
18910 The Ethical Healthcare Paradigm with in Corporate Framework: CSR for Equitable Access to Drugs

Authors: Abhay Vir Singh Kanwar

Abstract:

The pharmaceutical industry today is a multi-billion dollar business and yet disadvantages people in many corners of the globe who are still dying in large numbers from curable illnesses for lack of access to drugs. The astronomical prices of essential and life-saving drugs is not just an economic problem that can be settled through clever market strategies but is an ethical issue, given the accumulated wealth of today’s humanity and the sense of global justice that it increasingly comes to share. In this paper, I make a very practical argument for what I shall call ‘the ethical healthcare paradigm’, which, I propose, can replace the economistic paradigm that can still drive the healthcare sector without creating spillover effects on the market. Taking off from the ethical-philosophical argument for recognizing every individual’s right to capability to be healthy, I shall come to the focused practical proposal of the cost-rationalization and universal availability of essential, life-saving drugs through the undertaking of research and development funding for drug innovation by the business establishment as such in terms of the concept of CSR. The paper will first expose the concepts of basic and fundamental capabilities in relation to education and health, after which it will focus on the right to capability to be healthy of every person. In the third section, it will discuss the ‘ethical healthcare paradigm’ as opposed to the economistic health paradigm and will argue that the patient will have to be considered the primary stakeholder of this paradigm or the very ‘subject’ of healthcare. The next section will be on an ethical-historical critique of the pharmaceutical industry’s profit driven economism. The section after that will look at the business operation and the stages in the life cycle of a drug that comes to the market in order to understand the risks, strengths and problems of the pharmaceutical industry. Finally, the paper will discuss the concept of CSR in relation to the ethical healthcare paradigm in order to propose CSR funding in research and development for innovation on drugs so that life-saving drugs can be made available to every sick person cost-effectively.

Keywords: capability approach, healthcare, CSR, patient

Procedia PDF Downloads 279
18909 An Optimal Algorithm for Finding (R, Q) Policy in a Price-Dependent Order Quantity Inventory System with Soft Budget Constraint

Authors: S. Hamid Mirmohammadi, Shahrazad Tamjidzad

Abstract:

This paper is concerned with the single-item continuous review inventory system in which demand is stochastic and discrete. The budget consumed for purchasing the ordered items is not restricted but it incurs extra cost when exceeding specific value. The unit purchasing price depends on the quantity ordered under the all-units discounts cost structure. In many actual systems, the budget as a resource which is occupied by the purchased items is limited and the system is able to confront the resource shortage by charging more costs. Thus, considering the resource shortage costs as a part of system costs, especially when the amount of resource occupied by the purchased item is influenced by quantity discounts, is well motivated by practical concerns. In this paper, an optimization problem is formulated for finding the optimal (R, Q) policy, when the system is influenced by the budget limitation and a discount pricing simultaneously. Properties of the cost function are investigated and then an algorithm based on a one-dimensional search procedure is proposed for finding an optimal (R, Q) policy which minimizes the expected system costs .

Keywords: (R, Q) policy, stochastic demand, backorders, limited resource, quantity discounts

Procedia PDF Downloads 617
18908 Numerical Solutions of Fredholm Integral Equations by B-Spline Wavelet Method

Authors: Ritu Rani

Abstract:

In this paper, we apply minimalistically upheld linear semi-orthogonal B-spline wavelets, exceptionally developed for the limited interim to rough the obscure function present in the integral equations. Semi-orthogonal wavelets utilizing B-spline uniquely developed for the limited interim and these wavelets can be spoken to in a shut frame. This gives a minimized help. Semi-orthogonal wavelets frame the premise in the space L²(R). Utilizing this premise, an arbitrary function in L²(R) can be communicated as the wavelet arrangement. For the limited interim, the wavelet arrangement cannot be totally introduced by utilizing this premise. This is on the grounds that backings of some premise are truncated at the left or right end purposes of the interim. Subsequently, an uncommon premise must be brought into the wavelet development on the limited interim. These functions are alluded to as the limit scaling functions and limit wavelet functions. B-spline wavelet method has been connected to fathom linear and nonlinear integral equations and their systems. The above method diminishes the integral equations to systems of algebraic equations and afterward these systems can be illuminated by any standard numerical methods. Here, we have connected Newton's method with suitable starting speculation for solving these systems.

Keywords: semi-orthogonal, wavelet arrangement, integral equations, wavelet development

Procedia PDF Downloads 149
18907 Preparation of Flurbiprofen Derivative for Enhanced Brain Penetration

Authors: Jungkyun Im

Abstract:

Nonsteroidal anti-inflammatory drugs (NSAIDs) are effective for relieving pain and reducing inflammation. They are nonselective inhibitors of two isoforms of COX, cyclooxygenase-1 (COX-1) and cyclooxygenase-2 (COX-2), and thereby inhibiting the production of hormone-like lipid compounds such as, prostaglandins and thromboxanes which cause inflammation, pain, fever, platelet aggregation, etc. In addition, recently there are many research articles reporting the neuroprotective effect of NSAIDs in neurodegenerative diseases, such as Alzheimer’s disease (AD) and Parkinson’s disease (PD). However, the clinical use of NSAIDs in these diseases is limited by low brain distribution. Therefore, in order to assist the in-depth investigation on the pharmaceutical mechanism of flurbiprofen in neuroprotection and to make flurbiprofen a more potent drug to prevent or alleviate neurodegenerative diseases, delivery of flurbiprofen to brain should be effective and sufficient amount of flurbiprofen must penetrate the BBB thus gaining access into the patient’s brain. We have recently developed several types of guanidine-rich molecular carriers with high molecular weights and good water solubility that readily cross the blood-brain barrier (BBB) and display efficient distributions in the mouse brain. The G8 (having eight guanidine groups) molecular carrier based on D-sorbitol was found to be very effective in delivering anticancer drugs to a mouse brain. In the present study, employing the same molecular carrier, we prepared the flurbiprofen conjugate and studied its BBB permeation by mouse tissue distribution study. Flurbiprofen was attached to a molecular carrier with a fluorescein probe and multiple terminal guanidiniums. The conjugate was found to internalize into live cells and readily cross the BBB to enter the mouse brain. Our novel synthetic flurbiprofen conjugate will hopefully delivery NSAIDs into brain, and is therefore applicable to the neurodegenerative diseases treatment or prevention.

Keywords: flurbiprofen, drug delivery, molecular carrier, organic synthesis

Procedia PDF Downloads 211
18906 Stability of Concrete Moment Resisting Frames in View of Current Codes Requirements

Authors: Mahmoud A. Mahmoud, Ashraf Osman

Abstract:

In this study, the different approaches currently followed by design codes to assess the stability of buildings utilizing concrete moment resisting frames structural system are evaluated. For such purpose, a parametric study was performed. It involved analyzing group of concrete moment resisting frames having different slenderness ratios (height/width ratios), designed for different lateral loads to vertical loads ratios and constructed using ordinary reinforced concrete and high strength concrete for stability check and overall buckling using code approaches and computer buckling analysis. The objectives were to examine the influence of such parameters that directly linked to frames’ lateral stiffness on the buildings’ stability and evaluates the code approach in view of buckling analysis results. Based on this study, it was concluded that, the most susceptible buildings to instability and magnification of second order effects are buildings having high aspect ratios (height/width ratio), having low lateral to vertical loads ratio and utilizing construction materials of high strength. In addition, the study showed that the instability limits imposed by codes are mainly mathematical to ensure reliable analysis not a physical ones and that they are in general conservative. Also, it has been shown that the upper limit set by one of the codes that second order moment for structural elements should be limited to 1.4 the first order moment is not justified, instead, the overall story check is more reliable.

Keywords: buckling, lateral stability, p-delta, second order

Procedia PDF Downloads 230
18905 Review of Various Designs and Development in Hydropower Turbines

Authors: Fatemeh Behrouzi, Adi Maimun, Mehdi Nakisa

Abstract:

The growth of population, rising fossil fuel prices which the fossil fuels are limited and decreased day by day, pollution problem due to use of fossil fuels and electrical demand are important role to encourage of using the green energy and renewable technologies. Among different renewable energy technologies, hydro power generation (large and small scale) is the prime choice in terms of contribution to the world's electricity generation by using water current turbines. Nowadays, researchers focus on design and development of different kind of turbines to capture hydro-power electricity generation as clean and reliable energy. This article is review about statues of water current turbines carried out to generate electricity from hydro-kinetic energy especially places that they do not have electricity, but they have access to the current water.

Keywords: water current turbine, renewable energy, hydro-power, mechanic

Procedia PDF Downloads 440
18904 Multicenter Evaluation of the ACCESS Anti-HCV Assay on the DxI 9000 ACCESS Immunoassay Analyzer, for the Detection of Hepatitis C Virus Antibody

Authors: Dan W. Rhodes, Juliane Hey, Magali Karagueuzian, Florianne Martinez, Yael Sandowski, Vanessa Roulet, Mahmoud Badawi, Mohammed-Amine Chakir, Valérie Simon, Jérémie Gautier, Françoise Le Boulaire, Catherine Coignard, Claire Vincent, Sandrine Greaume, Isabelle Voisin

Abstract:

Background: Beckman Coulter, Inc. (BEC) has recently developed a fully automated second-generation anti-HCV test on a new immunoassay platform. The objective of this multicenter study conducted in Europe was to evaluate the performance of the ACCESS anti-HCV assay on the recently CE-marked DxI 9000 ACCESS Immunoassay Analyzer as an aid in the diagnosis of HCV (Hepatitis C Virus) infection and as a screening test for blood and plasma donors. Methods: The clinical specificity of the ACCESS anti-HCV assay was determined using HCV antibody-negative samples from blood donors and hospitalized patients. Sample antibody status was determined by a CE-marked anti-HCV assay (Abbott ARCHITECTTM anti-HCV assay or Abbott PRISM HCV assay) with an additional confirmation method (Immunoblot testing with INNO-LIATM HCV Score - Fujirebio), if necessary, according to pre-determined testing algorithms. The clinical sensitivity was determined using known HCV antibody-positive samples, identified positive by Immunoblot testing with INNO-LIATM HCV Score - Fujirebio. HCV RNA PCR or genotyping was available on all Immunoblot positive samples for further characterization. The false initial reactive rate was determined on fresh samples from blood donors and hospitalized patients. Thirty (30) commercially available seroconversion panels were tested to assess the sensitivity for early detection of HCV infection. The study was conducted from November 2019 to March 2022. Three (3) external sites and one (1) internal site participated. Results: Clinical specificity (95% CI) was 99.7% (99.6 – 99.8%) on 5852 blood donors and 99.0% (98.4 – 99.4%) on 1527 hospitalized patient samples. There were 15 discrepant samples (positive on ACCESS anti-HCV assay and negative on both ARCHITECT and Immunoblot) observed with hospitalized patient samples, and of note, additional HCV RNA PCR results showed five (5) samples had positive HCV RNA PCR results despite the absence of HCV antibody detection by ARCHITECT and Immunoblot, suggesting a better sensitivity of the ACCESS anti-HCV assay with these five samples compared to the ARCHITECT and Immunoblot anti-HCV assays. Clinical sensitivity (95% CI) on 510 well-characterized, known HCV antibody-positive samples was 100.0% (99.3 – 100.0%), including 353 samples with known HCV genotypes (1 to 6). The overall false initial reactive rate (95% CI) on 6630 patient samples was 0.02% (0.00 – 0.09%). Results obtained on 30 seroconversion panels demonstrated that the ACCESS anti-HCV assay had equivalent sensitivity performances, with an average bleed difference since the first reactive bleed below one (1), compared to the ARCHITECTTM anti-HCV assay. Conclusion: The newly developed ACCESS anti-HCV assay from BEC for use on the DxI 9000 ACCESS Immunoassay Analyzer demonstrated high clinical sensitivity and specificity, equivalent to currently marketed anti-HCV assays, as well as a low false initial reactive rate.

Keywords: DxI 9000 ACCESS Immunoassay Analyzer, HCV, HCV antibody, Hepatitis C virus, immunoassay

Procedia PDF Downloads 73
18903 Pupil with Special Educational Needs Camouflaging and Teacher Training of University Teaching Staff: Practical Reflection

Authors: Ana Mercedes Vernia Carrasco

Abstract:

The objective of this work is to reflect through the theoretical framework on the access to the university for the formation of a degree in a teacher of primary education. The University Access Tests in Spain evaluate a series of skills and competencies in writing, which leave aside the sample of another set of skills and tools that this type of test cannot evaluate. In the last years, a very much diversified student body has arrived in the classrooms of the Universities. Nowadays, talking about special education means attending to the changes that are being experienced in this area. At present, the educational model focuses on the reinforcement by the educational institutions so that they form the students according to their personal characteristics and that it is not the students that must adapt to the system. A bibliographic review plus some years of experience in training for the future teacher allows us to make an initial assessment about the lack of rigor in the tests of access to the university. In conclusion, we can say that, although we are not a specialist in the type of Special Educational Needs that can manifest the students, therefore, we understand that teacher today needs training and support to develop their teaching with the best quality possible. These teacher and student needs also imply more institutional support.

Keywords: training, special needs, didactics, music

Procedia PDF Downloads 74
18902 Traffic Forecasting for Open Radio Access Networks Virtualized Network Functions in 5G Networks

Authors: Khalid Ali, Manar Jammal

Abstract:

In order to meet the stringent latency and reliability requirements of the upcoming 5G networks, Open Radio Access Networks (O-RAN) have been proposed. The virtualization of O-RAN has allowed it to be treated as a Network Function Virtualization (NFV) architecture, while its components are considered Virtualized Network Functions (VNFs). Hence, intelligent Machine Learning (ML) based solutions can be utilized to apply different resource management and allocation techniques on O-RAN. However, intelligently allocating resources for O-RAN VNFs can prove challenging due to the dynamicity of traffic in mobile networks. Network providers need to dynamically scale the allocated resources in response to the incoming traffic. Elastically allocating resources can provide a higher level of flexibility in the network in addition to reducing the OPerational EXpenditure (OPEX) and increasing the resources utilization. Most of the existing elastic solutions are reactive in nature, despite the fact that proactive approaches are more agile since they scale instances ahead of time by predicting the incoming traffic. In this work, we propose and evaluate traffic forecasting models based on the ML algorithm. The algorithms aim at predicting future O-RAN traffic by using previous traffic data. Detailed analysis of the traffic data was carried out to validate the quality and applicability of the traffic dataset. Hence, two ML models were proposed and evaluated based on their prediction capabilities.

Keywords: O-RAN, traffic forecasting, NFV, ARIMA, LSTM, elasticity

Procedia PDF Downloads 184
18901 A Proposal of Ontology about Brazilian Government Transparency Portal

Authors: Estela Mayra de Moura Vianna, Thiago José Tavares Ávila, Bruno Morais Silva, Diego Henrique Bezerra, Paulo Henrique Gomes Silva, Alan Pedro da Silva

Abstract:

The Brazilian Federal Constitution defines the access to information as a crucial right of the citizen and the Law on Access to Public Information, which regulates this right. Accordingly, the Fiscal Responsibility Act, 2000, amended in 2009 by the “Law of Transparency”, began demanding a wider disclosure of public accounts for the society, including electronic media for public access. Thus, public entities began to create "Transparency Portals," which aim to gather a diversity of data and information. However, this information, in general, is still published in formats that do not simplify understanding of the data by citizens and that could be better especially available for audit purposes. In this context, a proposal of ontology about Brazilian Transparency Portal can play a key role in how these data will be better available. This study aims to identify and implement in ontology, the data model about Transparency Portal ecosystem, with emphasis in activities that use these data for some applications, like audits, press activities, social government control, and others.

Keywords: audit, government transparency, ontology, public sector

Procedia PDF Downloads 472
18900 Literature Review on the Barriers to Access Credit for Small Agricultural Producers and Policies to Mitigate Them in Developing Countries

Authors: Margarita Gáfaro, Karelys Guzmán, Paola Poveda

Abstract:

This paper establishes the theoretical aspects that explain the barriers to accessing credit for small agricultural producers in developing countries and identifies successful policy experiences to mitigate them. We will test two hypotheses. The first one is that information asymmetries, high transaction costs and high-risk exposure limit the supply of credit to small agricultural producers in developing countries. The second hypothesis is that low levels of financial education and productivity and high uncertainty about the returns of agricultural activity limit the demand for credit. To test these hypotheses, a review of the theoretical and empirical literature on access to rural credit in developing countries will be carried out. The first part of this review focuses on theoretical models that incorporate information asymmetries in the credit market and analyzes the interaction between these asymmetries and the characteristics of the agricultural sector in developing countries. Some of the characteristics we will focus on are the absence of collateral, the underdevelopment of the judicial systems and insurance markets, and the high dependence on climatic factors of production technologies. The second part of this review focuses on the determinants of credit demand by small agricultural producers, including the profitability of productive projects, security conditions, risk aversion or loss, financial education, and cognitive biases, among others. There are policies that focus on resolving these supply and demand constraints and managing to improve credit access. Therefore, another objective of this paper is to present a review of effective policies that have promoted access to credit for smallholders in the world. For this, information available in policy documents will be collected. This information will be complemented by interviews with officials in charge of the design and execution of these policies in a subset of selected countries. The information collected will be analyzed in light of the conceptual framework proposed in the first two parts of this section. The barriers to access to credit that each policy attempts to resolve and the factors that could explain its effectiveness will be identified.

Keywords: agricultural economics, credit access, smallholder, developing countries

Procedia PDF Downloads 41
18899 Understanding ICT Behaviors among Health Workers in Sub-Saharan Africa: A Cross-Sectional Study for Laboratory Persons in Uganda

Authors: M. Kasusse, M. Rosette, E. Burke, C. Mwangi, R. Batamwita, N. Tumwesigye, S. Aisu

Abstract:

A cross-sectional survey to ascertain the capacity of laboratory persons in using ICTs was conducted in 15 Ugandan districts (July-August 2013). A self-administered questionnaire served as data collection tool, interview guide and observation checklist. 69 questionnaires were filled, 12 interviews conducted, 45 HC observed. SPSS statistics 17.0 and SAS 9.2 software were used for entry and analyses. 69.35% of participants find it difficult to access a computer at work. Of the 30.65% who find it easy to access a computer at work, a significant 21.05% spend 0 hours on a computer daily. 60% of the participants cannot access internet at work. Of the 40% who have internet at work, a significant 20% lack email address but 20% weekly read emails weekly and 48% daily. It is viable/feasible to pilot informatics projects as strategies to build bridges develop skills for e-health landscape in laboratory services with a bigger financial muscle.

Keywords: ICT behavior, clinical laboratory persons, Sub-Saharan Africa, Uganda

Procedia PDF Downloads 208
18898 Repositioning Nigerian University Libraries for Effective Information Provision and Delivery in This Age of Globalization

Authors: S. O. Uwaifo

Abstract:

The paper examines the pivotal role of the library in university education through the provision of a wide range of information materials (print and non- print) required for the teaching, learning and research activities of the university. However certain impediments to the effectiveness of Nigerian university libraries, such as financial constraints, high foreign exchange, global disparities in accessing the internet, lack of local area networks, erratic electric power supply, absence of ICT literacy, poor maintenance culture, etc., were identified. Also, the necessity of repositioning Nigerian university libraries for effective information provision and delivery was stressed by pointing out their dividends, such as users’ access to Directory of Open Access Journals (DOAJ), Online Public Access Catalogue (OPAC), Institutional Repositories, Electronic Document Delivery, Social Media Networks, etc. It therefore becomes necessary for the libraries to be repositioned by way of being adequately automated or digitized for effective service delivery, in this age of globalization. Based on the identified barriers by this paper, some recommendations were proffered.

Keywords: repositioning, Nigerian university libraries, effective information provision and delivery, globalization

Procedia PDF Downloads 301
18897 Determinant Factor of Farm Household Fruit Tree Planting: The Case of Habru Woreda, North Wollo

Authors: Getamesay Kassaye Dimru

Abstract:

The cultivation of fruit tree in degraded areas has two-fold importance. Firstly, it improves food availability and income, and secondly, it promotes the conservation of soil and water improving, in turn, the productivity of the land. The main objectives of this study are to identify the determinant of farmer's fruit trees plantation decision and to major fruit production challenges and opportunities of the study area. The analysis was made using primary data collected from 60 sample household selected randomly from the study area in 2016. The primary data was supplemented by data collected from a key informant. In addition to the descriptive statistics and statistical tests (Chi-square test and t-test), a logit model was employed to identify the determinant of fruit tree plantation decision. Drought, pest incidence, land degradation, lack of input, lack of capital and irrigation schemes maintenance, lack of misuse of irrigation water and limited agricultural personnel are the major production constraints identified. The opportunities that need to further exploited are better access to irrigation, main road access, endowment of preferred guava variety, experience of farmers, and proximity of the study area to research center. The result of logit model shows that from different factors hypothesized to determine fruit tree plantation decision, age of the household head accesses to market and perception of farmers about fruits' disease and pest resistance are found to be significant. The result has revealed important implications for the promotion of fruit production for both land degradation control and rehabilitation and increasing the livelihood of farming households.

Keywords: degradation, fruit, irrigation, pest

Procedia PDF Downloads 187
18896 Client Hacked Server

Authors: Bagul Abhijeet

Abstract:

Background: Client-Server model is the backbone of today’s internet communication. In which normal user can not have control over particular website or server? By using the same processing model one can have unauthorized access to particular server. In this paper, we discussed about application scenario of hacking for simple website or server consist of unauthorized way to access the server database. This application emerges to autonomously take direct access of simple website or server and retrieve all essential information maintain by administrator. In this system, IP address of server given as input to retrieve user-id and password of server. This leads to breaking administrative security of server and acquires the control of server database. Whereas virus helps to escape from server security by crashing the whole server. Objective: To control malicious attack and preventing all government website, and also find out illegal work to do hackers activity. Results: After implementing different hacking as well as non-hacking techniques, this system hacks simple web sites with normal security credentials. It provides access to server database and allow attacker to perform database operations from client machine. Above Figure shows the experimental result of this application upon different servers and provides satisfactory results as required. Conclusion: In this paper, we have presented a to view to hack the server which include some hacking as well as non-hacking methods. These algorithms and methods provide efficient way to hack server database. By breaking the network security allow to introduce new and better security framework. The terms “Hacking” not only consider for its illegal activities but also it should be use for strengthen our global network.

Keywords: Hacking, Vulnerabilities, Dummy request, Virus, Server monitoring

Procedia PDF Downloads 229
18895 Awareness and Access to Rapid Diagnostic Tests of HIV, Malaria and Tuberculosis among Rural Pregnant Women of Savannakhet Province, Lao PDR

Authors: Vanphanom Sychareun, Viengnakhone Vongxay, Kongmany Chaleunvong, Pascale Hancart Petitet

Abstract:

Background: Lao PDR still has challenges in preventing and managing health against risk of emerging and re-emerging diseases, particularly HIV/AIDS, tuberculosis and malaria among pregnant women. Community-based intervention for mothers requires more evidences on awareness of such diseases and access to rapid diagnostic tests. The study aims to determine the awareness of pregnant women regarding HIV, TB and Malaria, the access to rapid diagnostic test of such diseases among pregnant women of local community and their factors related. Method: This is a cross sectional study using quantitative approach to explore the awareness of pregnant women on HIV/AIDS/TB and Malaria in Savannakhet province, Lao PDR in three remote districts (Phin, Thapangthong and Atsaphone) of Savannakhet province. The study targeted group was pregnant women at the community level. Sample size for primary data collection of pregnant women was 189. Face-to-face administered questionnaires were applied. Descriptive and inferential statistics were applied to determine the associated factors with awareness of pregnant women on HIV/AIDS/TB and Malaria. This study is under the HEALTH project/ Expertise France. Result: Most of our participants were pregnant at 28 – 42 weeks (50.3%); ranged 4 – 38 weeks. Mean age of pregnant women was 24.3 years old (range: 14 - 48 years old); 15.9% of whom were at age below 19 years. Around 94.2% of respondents works were farming, 54.5% were illiterate, 74.0% were Mon-Kmer ethnic, and 60% had income lower than average. Only 56.6% that have access to ANC, 39.1% started the access to ANC during the first trimester and only 19.6% had visited the ANC for at least four times. Almost pregnant women (and 92.1% and 93.1%) had low to moderate knowledge of HIV and TB respectively, while three-fourth of pregnant women (74.6%) had low to moderate knowledge of malaria. Slightly higher than half of participants (53.4% and 52.9%) had easy access to HIV and TB respectively ; while 72.5% had easy access to malaria. Majority of participants knew where to get tested for malaria (73.5%) and TB (54.5%), but 73.5% did not know where to get tested for HIV. Very few pregnant women (1.6%, 2.1% and 8.5%) experienced having tested for HIV/TB/malaria. respectively. Factors associated with awareness on HIV were occupation as staff, business (OR:5.9; 95% CI:1.2-28.1), upper secondary education (OR: 14.6; 95% CI:3.1-69.2); Mone-Khmer ethnic (OR: 0.4, 95% CI: 0.2-0.8); and attending ANC more than 4 times (OR:4.1, 95%:1.7-9.7). Factors associated with awareness on TB were occupation as staff, business (OR:2.4; 95% CI: 0.7-8.0), upper secondary education (OR: 6.2; 95% CI: 1.9-20.5); Mone-Khmer ethnic (OR: 0.5, 95% CI:0.3-0.9); attending ANC more than 4 times (OR:2.8, 95%:1.2-6.4). Factors associated with awareness on malaria were upper secondary education (OR: 18.1; 95% CI: 2.3-142.9); Mone-Khmer ethnic (OR: 0.2, 95% CI:0.1-0.4); attending ANC more than 4 times (OR:3.6, 95%:1.5-8.8). Conclusion: A very low awareness on HIV, TB and malaria among pregnant women in rural community of Savannakhet triggers the requirement of comprehensive public health intervention on awareness and access to prevention against emerging diseases for all pregnant women. Future intervention should focus on providing more knowledge to pregnant women during ANC and encouraging them to attend ANC more than 4 times.

Keywords: pregnant women, HIV, tuberculosis, malaria, awareness, Laos

Procedia PDF Downloads 55
18894 Performance Evaluation of Packet Scheduling with Channel Conditioning Aware Based on Wimax Networks

Authors: Elmabruk Laias, Abdalla M. Hanashi, Mohammed Alnas

Abstract:

Worldwide Interoperability for Microwave Access (WiMAX) became one of the most challenging issues, since it was responsible for distributing available resources of the network among all users this leaded to the demand of constructing and designing high efficient scheduling algorithms in order to improve the network utilization, to increase the network throughput, and to minimize the end-to-end delay. In this study, the proposed algorithm focuses on an efficient mechanism to serve non-real time traffic in congested networks by considering channel status.

Keywords: WiMAX, Quality of Services (QoS), OPNE, Diff-Serv (DS).

Procedia PDF Downloads 260
18893 Error Probability of Multi-User Detection Techniques

Authors: Komal Babbar

Abstract:

Multiuser Detection is the intelligent estimation/demodulation of transmitted bits in the presence of Multiple Access Interference. The authors have presented the Bit-error rate (BER) achieved by linear multi-user detectors: Matched filter (which treats the MAI as AWGN), Decorrelating and MMSE. In this work, authors investigate the bit error probability analysis for Matched filter, decorrelating, and MMSE. This problem arises in several practical CDMA applications where the receiver may not have full knowledge of the number of active users and their signature sequences. In particular, the behavior of MAI at the output of the Multi-user detectors (MUD) is examined under various asymptotic conditions including large signal to noise ratio; large near-far ratios; and a large number of users. In the last section Authors also shows Matlab Simulation results for Multiuser detection techniques i.e., Matched filter, Decorrelating, MMSE for 2 users and 10 users.

Keywords: code division multiple access, decorrelating, matched filter, minimum mean square detection (MMSE) detection, multiple access interference (MAI), multiuser detection (MUD)

Procedia PDF Downloads 498
18892 Food Insecurity and Its Implication for Poverty Alleviation in Nigeria

Authors: Peter Okpamen

Abstract:

Food security concentrates on the collective efforts of all nations to produce enough food to feed their people. Recently, though the emphasis shifted from food availability to accessibility constraints, which entails the difficulties undernourished people face in gaining access to food even when it is available. Broadly speaking, access to food depends on an individual’s access to resources, markets and food transfers. The opportunities to obtain food through these channels are entitlements, which when denied constitute food insecurity. Evidence shows that a significant percentage of Nigerians are undernourished with adverse implications for the fight against poverty. The greatest danger or consequence of food insecurity is malnutrition. Food insecurity as both an agent and consequence of poverty also increases the economic, political and social tensions in the country. The undernourished in Nigeria are marginalised in several ways to the extent that they are often ill; and because of illness, their work capacity is reduced with attendant reduction in their income. Without adequate income, they cannot save nor invest enough resources to take care of their basic needs. In this paper therefore, we used the political economy approach and statistical analysis to demonstrate that poverty alleviation in Nigeria would be a mirage if food security problems are not adequately resolved.

Keywords: alleviation, demographic, food insecurity, undernourished

Procedia PDF Downloads 401
18891 Evaluation of Anti-inflammatory Activities of Extracts Obtained from Capparis Erythrocarpos In-Vivo

Authors: Benedict Ofori, Kwabena Sarpong, Stephen Antwi

Abstract:

Background: Medicinal plants are utilized all around the world and are becoming increasingly important economically. The WHO notes that ‘inappropriate use of traditional medicines or practices can have negative or dangerous effects and that future research is needed to ascertain the efficacy and safety of such practices and medicinal plants used by traditional medicine systems. The poor around the world have limited access to palliative care or pain relief. Pharmacologists have been focused on developing safe and effective anti-inflammatory drugs. Most of the issues related to their use have been linked to the fact that numerous traditional and herbal treatments are classified in different nations as meals or dietary supplements. As a result, there is no need for evidence of the quality, efficacy, or safety of these herbal formulations before they are marketed. The fact that access to drugs meant for pain relief is limited in low-income countries means advanced studies should be done on home drugs meant for inflammation to close the gap. Methods: The ethanolic extracts of the plant were screened for the presence of 10 phytochemicals. The Pierce BCA Protein Assay Kit was used for the determination of the protein concentration of the egg white. The rats were randomly selected and put in 6 groups. The egg white was sub-plantar injected into the right-hand paws of the rats to induce inflammation. The animals were treated with the three plant extracts obtained from the root bark, stem, and leaves of the plant. The control groups were treated with normal saline, while the standard groups were treated with standard drugs indomethacin and celecoxib. Plethysmometer was used to measure the change in paw volume of the animals over the course of the experiment. Results: The results of the phytochemical screening revealed the presence of reducing sugars and saponins. Alkaloids were present in only R.L.S (1:1:1), and phytosterols were found in R.L(1:1) and R.L.S (1:1:1). The estimated protein concentration was found to be 103.75 mg/ml. The control group had an observable increase in paw volume, which indicated that inflammation was induced during the 5 hours. The increase in paw volume for the control group peaked at the 1st hour and decreased gradually throughout the experiment, with minimal changes in the paw volumes. The 2nd and 3rd groups were treated with 20 mg/kg of indomethacin and celecoxib. The anti-inflammatory activities of indomethacin and celecoxib were calculated to be 21.4% and 4.28%, respectively. The remaining 3 groups were treated with 2 dose levels of 200mg/kg plant extracts. R.L.S, R.L, and S.R.L had anti-inflammatory activities of 22.3%, 8.2%, and 12.07%, respectively. Conclusions: Egg albumin-induced paw model in rats can be used to evaluate the anti-inflammatory activity of herbs that might have potential anti-inflammatory activity. Herbal medications have potential anti-inflammatory activities and can be used to manage various inflammatory conditions if their efficacy and side effects are well studied. The three extracts all possessed anti-inflammatory activity, with R.L.S having the highest anti-inflammatory activity.

Keywords: inflammation, capparis erythrocarpos, anti-inflammatory activity, herbal medicine, paw volume, egg albumin

Procedia PDF Downloads 59
18890 Power Aware Modified I-LEACH Protocol Using Fuzzy IF Then Rules

Authors: Gagandeep Singh, Navdeep Singh

Abstract:

Due to limited battery of sensor nodes, so energy efficiency found to be main constraint in WSN. Therefore the main focus of the present work is to find the ways to minimize the energy consumption problem and will results; enhancement in the network stability period and life time. Many researchers have proposed different kind of the protocols to enhance the network lifetime further. This paper has evaluated the issues which have been neglected in the field of the WSNs. WSNs are composed of multiple unattended ultra-small, limited-power sensor nodes. Sensor nodes are deployed randomly in the area of interest. Sensor nodes have limited processing, wireless communication and power resource capabilities Sensor nodes send sensed data to sink or Base Station (BS). I-LEACH gives adaptive clustering mechanism which very efficiently deals with energy conservations. This paper ends up with the shortcomings of various adaptive clustering based WSNs protocols.

Keywords: WSN, I-Leach, MATLAB, sensor

Procedia PDF Downloads 252
18889 The Impact of the Atypical Crisis on Educational Migration: Economic and Policy Challenges

Authors: Manana Lobzhanidze, Marine Kobalava, Lali Chikviladze

Abstract:

The global pandemic crisis has had a significant impact on educational migration, substantially limiting young people’s access to education abroad. Therefore, it became necessary to study the economic, demographic, social, cultural and other factors associated with educational migration, to identify the economic and political challenges of educational migration and to develop recommendations. The aim of the research is to study the effects of the atypical crisis on educational migration and to make recommendations on effective migration opportunities based on the identification of economic and policy challenges in this area. Bibliographic research is used to assess the effects of the impact of the atypical crisis on educational migration presented in the papers of various scholars. Against the background of the restrictions imposed during the COVID19 pandemic, migration rates have been analyzed, endogenous and exogenous factors affecting educational migration have been identified. Quantitative and qualitative research of students and graduates of TSU Economics and Business Faculty is conducted, the results have been processed by SPSS program, the factors hindering educational migration and the challenges have been identified. The Internet and digital technologies have been shown to play a vital role in alleviating the challenges posed by the COVID-19 pandemic, however, lack of Internet access and limited financial resources have played a disruptive role in the educational migration process. The analysis of quantitative research materials revealed the problems of educational migration caused by the atypical crisis, while some issues were clarified during the focus group meetings. The following theoretical-methodological approaches were used during the research: a bibliographic research, analysis, synthesis, comparison, selection-grouping are used; Quantitative and qualitative research has been carried out, the results have been processed by SPSS program. The article presents the consequences of the atypical crisis for educational migration, identifies the main economic and policy challenges in the field of educational migration, and develops appropriate recommendations to overcome them.

Keywords: educational migration, atypical crisis, economic-political challenges, educational migration factors

Procedia PDF Downloads 115
18888 Empowering Nigerian Rural Women through Ownership of Productive Resources

Authors: Sidiqat A. Aderinoye-Abdulwahab, Lateef L. Adefalu, Rashid S. Adisa, Felix O. Oladipo, Tawakalitu A. Dolapo

Abstract:

This study investigates whether the rural women in Nigeria have access to productive resources such as land, livestock, and capital in order to determine their level of socio-economic empowerment. The study adopted a case study design while employing qualitative and quantitative methods of data collection. A multi-stage sampling technique was used to identify 7 locations, where 88 women were selected based on simple random sampling technique. Focus group discussions and questionnaire were used to elicit information. Gender analysis framework was used to explore and analyse the data generated for the study. The study found that the rural women desire to engage in gainful economic activities. However, cultural barriers prevent them from adequately exploring livelihood-improving opportunities. It was established that ownership of productive resources such as land and livestock can enhance their livelihoods provided cultural and governance issues do not deter them from accessing the services. It was therefore recommended that appropriate policies that will favour the access and ownership of assets by women so as to empower them need to be in place. The study provides a nuanced perspective on the influence and relevance of possession of physical assets in enhancing women’s livelihood diversification and overall development of rural livelihoods.

Keywords: livelihoods, productivity, development, economic activities, socio-economic empowerment

Procedia PDF Downloads 236