Search results for: renal access
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3485

Search results for: renal access

3305 A Performance Analysis of Different Scheduling Schemes in WiMAX

Authors: A. Youseef

Abstract:

One of the most aims of IEEE 802.16 (WiMAX) is to present high-speed wireless access to cover wide range coverage. The base station (BS) and the subscriber station (SS) are the main parts of WiMAX. WiMAX uses either Point-to-Multipoint (PMP) or mesh topologies. In the PMP mode, the SSs connect to the BS to gain access to the network. However, in the mesh mode, the SSs connect to each other to gain access to the BS. The main components of QoS management in the 802.16 standard are the admission control, buffer management, and packet scheduling. There are several researches proposed to create an efficient packet scheduling schemes. Therefore, we use QualNet 5.0.2 to study the performance of different scheduling schemes, such as WFQ, SCFQ, RR, and SP when the numbers of SSs increase. We find that when the number of SSs increases, the average jitter and average end-to-end delay is increased and the throughput is reduced.

Keywords: WiMAX, scheduling scheme, QoS, QualNet

Procedia PDF Downloads 427
3304 Library on the Cloud: Universalizing Libraries Based on Virtual Space

Authors: S. Vanaja, P. Panneerselvam, S. Santhanakarthikeyan

Abstract:

Cloud Computing is a latest trend in Libraries. Entering in to cloud services, Librarians can suit the present information handling and they are able to satisfy needs of the knowledge society. Libraries are now in the platform of universalizing all its information to users and they focus towards clouds which gives easiest access to data and application. Cloud computing is a highly scalable platform promising quick access to hardware and software over the internet, in addition to easy management and access by non-expert users. In this paper, we discuss the cloud’s features and its potential applications in the library and information centers, how cloud computing actually works is illustrated in this communication and how it will be implemented. It discuss about what are the needs to move to cloud, process of migration to cloud. In addition to that this paper assessed the practical problems during migration in libraries, advantages of migration process and what are the measures that Libraries should follow during migration in to cloud. This paper highlights the benefits and some concerns regarding data ownership and data security on the cloud computing.

Keywords: cloud computing, cloud-service, cloud based-ILS, cloud-providers, discovery service, IaaS, PaaS, SaaS, virtualization, Web scale access

Procedia PDF Downloads 610
3303 A Cloud-Based Spectrum Database Approach for Licensed Shared Spectrum Access

Authors: Hazem Abd El Megeed, Mohamed El-Refaay, Norhan Magdi Osman

Abstract:

Spectrum scarcity is a challenging obstacle in wireless communications systems. It hinders the introduction of innovative wireless services and technologies that require larger bandwidth comparing to legacy technologies. In addition, the current worldwide allocation of radio spectrum bands is already congested and can not afford additional squeezing or optimization to accommodate new wireless technologies. This challenge is a result of accumulative contributions from different factors that will be discussed later in this paper. One of these factors is the radio spectrum allocation policy governed by national regulatory authorities nowadays. The framework for this policy allocates specified portion of radio spectrum to a particular wireless service provider on exclusive utilization basis. This allocation is executed according to technical specification determined by the standard bodies of each Radio Access Technology (RAT). Dynamic access of spectrum is a framework for flexible utilization of radio spectrum resources. In this framework there is no exclusive allocation of radio spectrum and even the public safety agencies can share their spectrum bands according to a governing policy and service level agreements. In this paper, we explore different methods for accessing the spectrum dynamically and its associated implementation challenges.

Keywords: licensed shared access, cognitive radio, spectrum sharing, spectrum congestion, dynamic spectrum access, spectrum database, spectrum trading, reconfigurable radio systems, opportunistic spectrum allocation (OSA)

Procedia PDF Downloads 393
3302 Deep Learning Approach for Chronic Kidney Disease Complications

Authors: Mario Isaza-Ruget, Claudia C. Colmenares-Mejia, Nancy Yomayusa, Camilo A. González, Andres Cely, Jossie Murcia

Abstract:

Quantification of risks associated with complications development from chronic kidney disease (CKD) through accurate survival models can help with patient management. A retrospective cohort that included patients diagnosed with CKD from a primary care program and followed up between 2013 and 2018 was carried out. Time-dependent and static covariates associated with demographic, clinical, and laboratory factors were included. Deep Learning (DL) survival analyzes were developed for three CKD outcomes: CKD stage progression, >25% decrease in Estimated Glomerular Filtration Rate (eGFR), and Renal Replacement Therapy (RRT). Models were evaluated and compared with Random Survival Forest (RSF) based on concordance index (C-index) metric. 2.143 patients were included. Two models were developed for each outcome, Deep Neural Network (DNN) model reported C-index=0.9867 for CKD stage progression; C-index=0.9905 for reduction in eGFR; C-index=0.9867 for RRT. Regarding the RSF model, C-index=0.6650 was reached for CKD stage progression; decreased eGFR C-index=0.6759; RRT C-index=0.8926. DNN models applied in survival analysis context with considerations of longitudinal covariates at the start of follow-up can predict renal stage progression, a significant decrease in eGFR and RRT. The success of these survival models lies in the appropriate definition of survival times and the analysis of covariates, especially those that vary over time.

Keywords: artificial intelligence, chronic kidney disease, deep neural networks, survival analysis

Procedia PDF Downloads 100
3301 Farmers’ Access to Agricultural Extension Services Delivery Systems: Evidence from a Field Study in India

Authors: Ankit Nagar, Dinesh Kumar Nauriyal, Sukhpal Singh

Abstract:

This paper examines the key determinants of farmers’ access to agricultural extension services, sources of agricultural extension services preferred and accessed by the farmers. An ordered logistic regression model was used to analyse the data of the 360 sample households based on a primary survey conducted in western Uttar Pradesh, India. The study finds that farmers' decision to engage in the agricultural extension programme is significantly influenced by factors such as education level, gender, farming experience, social group, group membership, farm size, credit access, awareness about the extension scheme, farmers' perception, and distance from extension sources. The most intriguing finding of this study is that the progressive farmers, which have long been regarded as a major source of knowledge diffusion, are the most distrusted sources of information as they are suspected of withholding vital information from potential beneficiaries. The positive relationship between farm size and ‘Access’ underlines that the extension services should revisit their strategies for targeting more marginal and small farmers constituting over 85 percent of the agricultural households by incorporating their priorities in their outreach programs. The study suggests that marginal and small farmers' productive potential could still be greatly augmented by the appropriate technology, advisory services, guidance, and improved market access. Also, the perception of poor quality of the public extension services can be corrected by initiatives aimed at building up extension workers' capacity.

Keywords: agriculture, access, extension services, ordered logistic regression

Procedia PDF Downloads 178
3300 Profile of the Renal Failure Patients under Haemodialysis at B. P. Koirala Institute of Health Sciences Nepal

Authors: Ram Sharan Mehta, Sanjeev Sharma

Abstract:

Introduction: Haemodialysis (HD) is a mechanical process of removing waste products from the blood and replacing essential substances in patients with renal failure. First artificial kidney developed in Netherlands in 1943 AD First successful treatment of CRF reported in 1960AD, life-saving treatment begins for CRF in 1972 AD. In 1973 AD Medicare took over financial responsibility for many clients and after that method become popular. BP Koirala institute of health science is the only center outside the Kathmandu, where HD service is available. In BPKIHS PD started in Jan.1998, HD started in August 2002 till September 2003 about 278 patients received HD. Day by day the number of HD patients is increasing in BPKIHS as with institutional growth. No such type of study was conducted in past hence there is lack of valid & reliable baseline data. Hence, the investigators were interested to conduct the study on " Profile of the Renal Failure patients under Haemodialysis at B.P. Koirala Institute of Health Sciences Nepal". Objectives: The objectives of the study were: to find out the Socio-demographic characteristics of the patients, to explore the knowledge of the patients regarding disease process and Haemodialysis and to identify the problems encountered by the patients. Methods: It is a hospital-based exploratory study. The population of the study was the clients under HD and the sampling method was purposive. Fifty-four patients undergone HD during the period of 17 July 2012 to 16 July 2013 of complete one year were included in the study. Structured interview schedule was used for collect data after obtaining validity and reliability. Results: Total 54 subjects had undergone for HD, having age range of 5-75 years and majority of them were male (74%) and Hindu (93 %). Thirty-one percent illiterate, 28% had agriculture their occupation, 80% of them were from very poor community, and about 30% subjects were unaware about the disease they suffering. Majority of subjects reported that they had no complications during dialysis (61%), where as 20% reported nausea and vomiting, 9% Hypotension, 4% headache and 2%chest pain during dialysis. Conclusions: CRF leading to HD is a long battle for patients, required to make major and continuous adjustment, both physiologically and psychologically. The study suggests that non-compliance with HD regimen were common. The socio-demographic and knowledge profile will help in the management and early prevention of disease and evaluate aspects that will influence care and patients can select mode of treatment themselves properly.

Keywords: profile, haemodialysis, Nepal, patients, treatment

Procedia PDF Downloads 355
3299 English and Information and Communication Technology: Zones of Exclusion in Education in Low-Income Countries

Authors: Ram A. Giri, Amna Bedri, Abdou Niane

Abstract:

Exclusion in education on the basis of language in multilingual contexts operates at multiple levels. Learners of diverse ethnolinguistic backgrounds are often expected to learn through English and are pushed further down the learning ladder if they also have to access education through Information and Communication Technology (ICT). The paper explores marginalized children’s lived experiences in accessing technology and English in four low-income countries in Africa and Asia. Based on the findings of the first phase of a multinational qualitative research study, we report on the factors or barriers that affect children’s access, opportunities and motivation for learning through technology and English. ICT and English - the language of ICT and education - can enhance learning and can even be essential. However, these two important keys to education can also function as barriers to accessing quality education, and therefore as zones of exclusion. This paper looks into how marginalized children (aged 13-15) engage in learning through ICT and English and to what extent the restrictive access and opportunities contribute to the widening of the already existing gap in education. By applying the conceptual frameworks of “access and accessibility of learning” and “zones of exclusion,” the paper elucidates how the barriers prevent children’s effective engagement with learning and addresses such questions as to how marginalized children access technology and English for learning; whether the children value English, and what their motivation and opportunity to learn it are. In addition, the paper will point out policy and pedagogic implications.

Keywords: exclusion, inclusion, inclusive education, marginalization

Procedia PDF Downloads 196
3298 New Security Approach of Confidential Resources in Hybrid Clouds

Authors: Haythem Yahyaoui, Samir Moalla, Mounir Bouden, Skander ghorbel

Abstract:

Nowadays, Cloud environments are becoming a need for companies, this new technology gives the opportunities to access to the data anywhere and anytime, also an optimized and secured access to the resources and gives more security for the data which stored in the platform, however, some companies do not trust Cloud providers, in their point of view, providers can access and modify some confidential data such as bank accounts, many works have been done in this context, they conclude that encryption methods realized by providers ensure the confidentiality, although, they forgot that Cloud providers can decrypt the confidential resources. The best solution here is to apply some modifications on the data before sending them to the Cloud in the objective to make them unreadable. This work aims on enhancing the quality of service of providers and improving the trust of the customers.

Keywords: cloud, confidentiality, cryptography, security issues, trust issues

Procedia PDF Downloads 344
3297 Detection of Leptospira interrogans in Kidney and Urine of water Buffalo and its Relationship with Histopathological and Serological Findings

Authors: M. R. Haji Hajikolaei, A. A. Nikvand, A. R. Ghadrdan, M. Ghorbanpoor, B. Mohammadian

Abstract:

This study was carried out on water buffalo for detection of Leptospira interrogans in kidney and urine and its relationship with serological findings. Blood, urine and kidney samples were taken immediately after slaughter from 353 water buffalos at Ahvaz abattoir in Khouzestan province, Iran. Sera were initially screened at serum dilution of 1:100 against seven live antigens of Leptospira interrogans: pomona, hardjo, ballum, icterohemorrhagiae, tarasovi, australis and grippotyphosa using the microscopic agglutination test (MAT) and sera with positive results were titrated against reacting antigens in serial twofold dilution from 1:100 to 1:800. The samples of kidney were embedded in paraffin wax and 5µm thick sections were stained routinely with Haematoxylin and Eosin (H&E). Polymerase chain reaction (PCR) examination was done on urine and kidney by using LipL32 gene primers. Antibodies against one or more serovars at dilution >:100 were detected in sera. The most frequent reactor was hardjo (56.2%), followed by pomona (52.3%), australis (9.8%), tarassovi (5.9%), grippotyphosa (4.5%) and icterohaemorrhagiae (3.9%). The L. interrogans were detected in 43 (12.2%) of examined buffaloes, so that 26 (8.2%) of kidney tissues, 14 (4.8%) of urine samples separately and 3 (0.84%) of both kidney and urine samples were positive in PCR. From 153 (43.3%) buffaloes with positive MAT, 24 cases were positive by PCR of kidney and/or urine samples, synchronously. Renal lesions such as interstitial nephritis, acute tubular necrosis (ATN), pyelonephritis, glomerolonephritis, renal fibrosis and hydronephrosis were found in 128 (36.3%) cases. Statistical analysis indicated that there was no significant association between results of MAT, PCR and interstitial nephritis.

Keywords: leptospiral infection, PCR, MAT, histopathology, river buffalo

Procedia PDF Downloads 304
3296 Students’ Perceptions of Communication Design in Media: Case Study of Portuguese and Spanish Communication Students

Authors: Fátima Gonçalves, Joaquim Brigas, Jorge Gonçalves

Abstract:

The proliferation of mobile devices in society enables the media to disseminate information and knowledge more rapidly. Higher education students access these contents and share them with each other, in the most diverse platforms, allowing the ubiquity in access to information. This article presents the results and respective quantitative analysis of a survey applied to communication students of two higher education institutions: one in Portugal and another in Spain. The results show that, in this sample, higher education students regularly access news content believing traditional news sources to be more credible. Regarding online sources, it was verified that the access was mostly to free news contents. This study intends to promote the knowledge about the changes that occur in the relationship of higher education students with the media, characterizing how news consumption is processed by these students, considering the resulting effects of the digital media evolution. It is intended to present not only the news sources they use, but also to know some of their habits and relationship with the news media.

Keywords: students' perceptions, communication design, mass media, higher education, digital media

Procedia PDF Downloads 214
3295 Institutional Repository ePrints at Indian Institute of Science: A Special Reference to JRD Tata Memorial Library, Bangalore, India

Authors: Nagarjuna Pitty

Abstract:

Over the past decade there has been substantial progress in the usage of ePrints resources national and international research community. JRD Tata Memorial Library has hosting for the web based ePrints services and maintenance to online user community. This paper provides an overview how to share JRDTML experiences in using GNU EPrints.org software to create and maintain the open-access institutional repository of IISc, ePrints@IISc. This paper states that the GNU EPrints.org is the first generic software for creating Open Access Initiative (OAI)-compliant repositories, which enables the researchers to self-archive their research publications thus facilitating open access to their publications. IISc has been using this software since early 2002. This paper tells that the GNU EPrints.org software is an excellent tool for creating and maintaining OAI-compliant repositories. It can be setup easily even by those who are not too much experts in computer. In this paper, author is sharing JRDTML experiences in using GNU ePrints.org software.

Keywords: digital library, open access initiative, scholarly publications, institutional repository, ePrints@IISc

Procedia PDF Downloads 527
3294 Frequency of Surgical Complications in Diabetic Patients after Kidney Transplantation

Authors: Hakan Duger, Alparslan Ersoy, Canan Ersoy

Abstract:

The improvement of surgical techniques in recent years has reduced the frequency of postoperative complications in kidney transplant recipients. Novel immunosuppressive agents have reduced rates of graft loss due to acute rejection to less than 1%. However, surgical complications may still lead graft loss and morbidity in recipients. Because of potent immunosuppression, impaired wound healing and complications are frequent after transplantation. We compared the frequency of post-operative surgical complications in diabetic and non-diabetic patients after kidney transplantation. Materials and Methods: This retrospective study conducted in consecutive patients (213 females, 285 males, median age 39 years) who underwent kidney transplant surgery at our center between December 2005 and October 2015. The patients were divided into two groups: diabetics (46 ± 10 year, 26 males, 16 females) and non-diabetics (39 ± 12 year, 259 males, 197 females). Characteristics of both groups were obtained from medical records. Results: We performed 225 living and 273 deceased donor transplantations. Renal replacement type was hemodialysis in 60.8%, peritoneal dialysis in 17.3% and preemptive in 12%. The mean body mass indexes of the recipients were 24 ± 4.6 kg/m², donor age was 48.6 ± 14.3 years, cold ischemic time was 11.3 ± 6.1 hours, surgery time was 4.9 ± 1.2 hours, and recovery time was 54±31 min. The mean hospitalization duration was 19.1 ± 13.5 days. The frequency of postoperative surgical complications was 43.8%. There was no significant difference between the ratios of post-operative surgical complications in non-diabetic (43.5%) and diabetic (47.4%) groups (p=0.648). Post-operative surgical complications were lymphocele (24.6% vs. 23.7%), delayed wound healing (13.2% vs. 7.6%), hematoma (7.8% vs.15.8 %), urinary leak (4.6% vs. 5.3%), hemorrhage (5.1% vs. 0%), hydronephrosis (2.2% vs. 0%), renal artery thrombosis (1.5% vs. 0%), renal vein thrombosis (1% vs. 2.6%), urinoma (0.7% vs. 0%), urinary obstruction (0.5% vs. 0%), ureteral stenosis (0.5% vs. 0%) and ureteral reflux (0.2% vs. 0%) in non-diabetic and diabetic groups, respectively (p > 0.05). Mean serum creatinine levels in non-diabetics and diabetics were 1.43 ± 0.81 and 1.61 ± 0.96 mg/dL at 1st month (p=0.198). At the 6th month, the mean graft and patient survival times in patients with post-operative surgical complications were significantly lower than in those who did not (162.9 ± 3.4 vs. 175.6 ± 1.5 days, p=0.008, and 171 ± 2.9 vs. 176.1 ± 1.6 days, p=0.047, respectively). However, patient survival durations of non-diabetic (173 ± 27) and diabetic (177 ± 13 day) groups were comparable (p=0.396). Conclusion: As a result, we concluded that surgical complications such as lymphocele and delayed wound healing were common and that frequency of these complications in diabetic recipients did not differ from non-diabetic one. All persons involved in the postoperative care of kidney transplant recipients be aware of the potential surgical complications for rapid diagnosis and treatment.

Keywords: kidney transplantation, diabetes mellitus, surgery, complication

Procedia PDF Downloads 155
3293 Design and Application of NFC-Based Identity and Access Management in Cloud Services

Authors: Shin-Jer Yang, Kai-Tai Yang

Abstract:

In response to a changing world and the fast growth of the Internet, more and more enterprises are replacing web-based services with cloud-based ones. Multi-tenancy technology is becoming more important especially with Software as a Service (SaaS). This in turn leads to a greater focus on the application of Identity and Access Management (IAM). Conventional Near-Field Communication (NFC) based verification relies on a computer browser and a card reader to access an NFC tag. This type of verification does not support mobile device login and user-based access management functions. This study designs an NFC-based third-party cloud identity and access management scheme (NFC-IAM) addressing this shortcoming. Data from simulation tests analyzed with Key Performance Indicators (KPIs) suggest that the NFC-IAM not only takes less time in identity identification but also cuts time by 80% in terms of two-factor authentication and improves verification accuracy to 99.9% or better. In functional performance analyses, NFC-IAM performed better in salability and portability. The NFC-IAM App (Application Software) and back-end system to be developed and deployed in mobile device are to support IAM features and also offers users a more user-friendly experience and stronger security protection. In the future, our NFC-IAM can be employed to different environments including identification for mobile payment systems, permission management for remote equipment monitoring, among other applications.

Keywords: cloud service, multi-tenancy, NFC, IAM, mobile device

Procedia PDF Downloads 405
3292 Access to Justice for Persons with Intellectual Disabilities in Indonesia: Case and Problem in Indonesian Criminal Justice System

Authors: Fines Fatimah, SH. MH.

Abstract:

Indonesia is one of the countries that has ratified the UNCRPD (United Nations Convention on the Rights of Persons with Disabilities). The ratification of this convention brings consequences on the adjustment of national legislation with the UNCRPD convention, where this ratification at the same time is a measure in the eyes of the international community that a state party could be consistent with the issues and problems of disability. Persons with disabilities often have little access to justice when they are forced to deal with the criminal justice system. Pursuit of justice through litigation are often not in their favor, therefore without any awareness of law enforcement/awareness of disability will further complicate access to justice for persons with disabilities. Under Article 13 of the UNCRPD, it appeared that the convention requires ratifying states to guarantee equal opportunity and treatment in justice for persons with disabilities. The States should also ensure that any judicial rules must be adapted to the circumstances of persons with disabilities so that people with disabilities can fully participate in all stages of the trial court and, for example, as a witness. Finally, the state must provide training to understand these persons with disabilities (for those who work in the judiciary institution such as police or prison officials). Further, this paper aims to describe problem faced by persons with intellectual disabilities to access justice in Indonesian Criminal Justice System. This paper tries to find and propose the alternative solutions to promote the quality of law enforcement in Indonesia, especially for persons with intellectual disabilities.

Keywords: access to justice, Indonesian criminal justice system, intellectual disability, ratifying states

Procedia PDF Downloads 490
3291 Software Development to Empowering Digital Libraries with Effortless Digital Cataloging and Access

Authors: Abdul Basit Kiani

Abstract:

The software for the digital library system is a cutting-edge solution designed to revolutionize the way libraries manage and provide access to their vast collections of digital content. This advanced software leverages the power of technology to offer a seamless and user-friendly experience for both library staff and patrons. By implementing this software, libraries can efficiently organize, store, and retrieve digital resources, including e-books, audiobooks, journals, articles, and multimedia content. Its intuitive interface allows library staff to effortlessly manage cataloging, metadata extraction, and content enrichment, ensuring accurate and comprehensive access to digital materials. For patrons, the software offers a personalized and immersive digital library experience. They can easily browse the digital catalog, search for specific items, and explore related content through intelligent recommendation algorithms. The software also facilitates seamless borrowing, lending, and preservation of digital items, enabling users to access their favorite resources anytime, anywhere, on multiple devices. With robust security features, the software ensures the protection of intellectual property rights and enforces access controls to safeguard sensitive content. Integration with external authentication systems and user management tools streamlines the library's administration processes, while advanced analytics provide valuable insights into patron behavior and content usage. Overall, this software for the digital library system empowers libraries to embrace the digital era, offering enhanced access, convenience, and discoverability of their vast collections. It paves the way for a more inclusive and engaging library experience, catering to the evolving needs of tech-savvy patrons.

Keywords: software development, empowering digital libraries, digital cataloging and access, management system

Procedia PDF Downloads 41
3290 Weighted Data Replication Strategy for Data Grid Considering Economic Approach

Authors: N. Mansouri, A. Asadi

Abstract:

Data Grid is a geographically distributed environment that deals with data intensive application in scientific and enterprise computing. Data replication is a common method used to achieve efficient and fault-tolerant data access in Grids. In this paper, a dynamic data replication strategy, called Enhanced Latest Access Largest Weight (ELALW) is proposed. This strategy is an enhanced version of Latest Access Largest Weight strategy. However, replication should be used wisely because the storage capacity of each Grid site is limited. Thus, it is important to design an effective strategy for the replication replacement task. ELALW replaces replicas based on the number of requests in future, the size of the replica, and the number of copies of the file. It also improves access latency by selecting the best replica when various sites hold replicas. The proposed replica selection selects the best replica location from among the many replicas based on response time that can be determined by considering the data transfer time, the storage access latency, the replica requests that waiting in the storage queue and the distance between nodes. Simulation results utilizing the OptorSim show our replication strategy achieve better performance overall than other strategies in terms of job execution time, effective network usage and storage resource usage.

Keywords: data grid, data replication, simulation, replica selection, replica placement

Procedia PDF Downloads 233
3289 Open Access in the Economic Sphere: A Framework Interpreting the Rise of the UK, US and China at Different Historical Times

Authors: Guanghua Yu

Abstract:

This article has examined the rise of the UK, US, and China at different historical times to explain the argument that it is open access in the economic sphere, as well as institutional building related to the protection of property rights, contract enforcement, financial market, the rule of law, and human resource accumulation that determine economic and human development. Both the UK, after the Glorious Revolution in the seventeenth century, and China, after its adoption of the open door policy at the end of the 1970s, follow such a path of development. The difference between the UK and China in moving toward that path is the different coordination of elites. While the coordination of elites in the UK through parliament played important roles in forcing the government to consider the wider encompassing interest in society after the Glorious Revolution, the coordination of elites in China has mainly been achieved by the Communist Party of China such that the Chinese Government has started to pay greater deal of attention to the wider encompassing interest in the country from 1978. The article has also examined the rise of the US following colonial settlement to independence and institutional building thereafter. The US case is similarly consistent with the argument that open access in the economic sphere and institutional building matter the most to economic development. More decentralized methods of the coordination of elites in the US among colonies (states), the federal governments, and other political groups similarly shaped the path towards open access in the economic sphere and institutional building. As such, open access in the political sphere plays an indirect role in development at best. If that is correct, there are possibilities that different political systems are able to achieve coordination of elites so that governments will turn their attention to development.

Keywords: open access, interconnected institutions, democracy, development

Procedia PDF Downloads 52
3288 Research and Implementation of Cross-domain Data Sharing System in Net-centric Environment

Authors: Xiaoqing Wang, Jianjian Zong, Li Li, Yanxing Zheng, Jinrong Tong, Mao Zhan

Abstract:

With the rapid development of network and communication technology, a great deal of data has been generated in different domains of a network. These data show a trend of increasing scale and more complex structure. Therefore, an effective and flexible cross-domain data-sharing system is needed. The Cross-domain Data Sharing System(CDSS) in a net-centric environment is composed of three sub-systems. The data distribution sub-system provides data exchange service through publish-subscribe technology that supports asynchronism and multi-to-multi communication, which adapts to the needs of the dynamic and large-scale distributed computing environment. The access control sub-system adopts Attribute-Based Access Control(ABAC) technology to uniformly model various data attributes such as subject, object, permission and environment, which effectively monitors the activities of users accessing resources and ensures that legitimate users get effective access control rights within a legal time. The cross-domain access security negotiation subsystem automatically determines the access rights between different security domains in the process of interactive disclosure of digital certificates and access control policies through trust policy management and negotiation algorithms, which provides an effective means for cross-domain trust relationship establishment and access control in a distributed environment. The CDSS’s asynchronous,multi-to-multi and loosely-coupled communication features can adapt well to data exchange and sharing in dynamic, distributed and large-scale network environments. Next, we will give CDSS new features to support the mobile computing environment.

Keywords: data sharing, cross-domain, data exchange, publish-subscribe

Procedia PDF Downloads 101
3287 Acute Kidney Injury in Severe Trauma Patients: Clinical Presentation and Risk Factor Analysis

Authors: Inkyong Yi

Abstract:

Acute kidney injury (AKI) in trauma patients is known to be associated with multiple factors, especially shock and consequent inadequate renal perfusion, yet its clinical presentation is little known in severe trauma patients. Our aim was to investigate the clinical presentation of acute kidney injury and its outcome in severe trauma patients at a level I trauma center. A total of 93 consecutive adult trauma patients with an injury severity score (ISS) of more than 15 were analyzed retrospectively from our Level I trauma center data base. Patients with direct renal injury were excluded. Patients were dichotomized into two groups, according to the presence of AKI. Various clinical parameters were compared between two groups, with Student’s T test and Mann-Whitney’s U test. The AKI group was further dichotomized into patients who recovered within seven days, and those who required more than 7days for recovery or those who did not recover at all. Various clinical parameters associated with outcome were further analyzed. Patients with AKI (n=33, 35%) presented with significantly higher age (61.4±17.3 vs. 45.4±17.3, p < 0.0001), incidence of comorbidities (hypertension; 51.5% vs. 13.3%, OR 6.906 95%CI 2.515-18.967, diabetes; 27.3% vs. 6.7%, OR 5.250, 95%CI 1.472-18.722), odds of head and neck trauma (69.7% vs. 41.7%, OR 3.220, 95%CI 1.306-7.942) and presence of shock during emergency room care (66.7% vs 21.7% OR 7.231, 95%CI, 2.798-18.687). Among AKI patients, patients who recovered within 1 week showed lower peak lactate (4.7mmol/L, 95%CI 2.9-6.5 vs 7.3mmol/L, 95%CI 5.0-9.6, p < 0.0287), lesser units of transfusion during first 24 hours (pRBC; 20.4unit, 95%CI 12.5-28.3 vs. 58.9unit, 95%CI 39.4-78.5, p=0.0003, FFP; 16.6unit, 95%CI 6.8-26.4 vs. 56.1unit, 95%CI 26.9-85.2, p=0.0027). In severe trauma patients, patients with AKI showed different clinical presentations and worse outcomes. Initial presence of shock and higher DIC profiles may be important risk factors for AKI in severe trauma patients. In patients with AKI, peak lactate level and amounts of transfusion are related to recovery.

Keywords: acute kidney injury, lactate, transfusion, trauma

Procedia PDF Downloads 170
3286 Improving System Performance through User's Resource Access Patterns

Authors: K. C. Wong

Abstract:

This paper demonstrates a number of examples in the hope to shed some light on the possibility of designing future operating systems in a more adaptation-based manner. A modern operating system, we conceive, should possess the capability of 'learning' in such a way that it can dynamically adjust its services and behavior according to the current status of the environment in which it operates. In other words, a modern operating system should play a more proactive role during the session of providing system services to users. As such, a modern operating system is expected to create a computing environment, in which its users are provided with system services more matching their dynamically changing needs. The examples demonstrated in this paper show that user's resource access patterns 'learned' and determined during a session can be utilized to improve system performance and hence to provide users with a better and more effective computing environment. The paper also discusses how to use the frequency, the continuity, and the duration of resource accesses in a session to quantitatively measure and determine user's resource access patterns for the examples shown in the paper.

Keywords: adaptation-based systems, operating systems, resource access patterns, system performance

Procedia PDF Downloads 111
3285 Evaluation of Easy-to-Use Energy Building Design Tools for Solar Access Analysis in Urban Contexts: Comparison of Friendly Simulation Design Tools for Architectural Practice in the Early Design Stage

Authors: M. Iommi, G. Losco

Abstract:

Current building sector is focused on reduction of energy requirements, on renewable energy generation and on regeneration of existing urban areas. These targets need to be solved with a systemic approach, considering several aspects simultaneously such as climate conditions, lighting conditions, solar radiation, PV potential, etc. The solar access analysis is an already known method to analyze the solar potentials, but in current years, simulation tools have provided more effective opportunities to perform this type of analysis, in particular in the early design stage. Nowadays, the study of the solar access is related to the easiness of the use of simulation tools, in rapid and easy way, during the design process. This study presents a comparison of three simulation tools, from the point of view of the user, with the aim to highlight differences in the easy-to-use of these tools. Using a real urban context as case study, three tools; Ecotect, Townscope and Heliodon, are tested, performing models and simulations and examining the capabilities and output results of solar access analysis. The evaluation of the ease-to-use of these tools is based on some detected parameters and features, such as the types of simulation, requirements of input data, types of results, etc. As a result, a framework is provided in which features and capabilities of each tool are shown. This framework shows the differences among these tools about functions, features and capabilities. The aim of this study is to support users and to improve the integration of simulation tools for solar access with the design process.

Keywords: energy building design tools, solar access analysis, solar potential, urban planning

Procedia PDF Downloads 317
3284 Improvement of Data Transfer over Simple Object Access Protocol (SOAP)

Authors: Khaled Ahmed Kadouh, Kamal Ali Albashiri

Abstract:

This paper presents a designed algorithm involves improvement of transferring data over Simple Object Access Protocol (SOAP). The aim of this work is to establish whether using SOAP in exchanging XML messages has any added advantages or not. The results showed that XML messages without SOAP take longer time and consume more memory, especially with binary data.

Keywords: JAX-WS, SMTP, SOAP, web service, XML

Procedia PDF Downloads 460
3283 Identification and Optimisation of South Africa's Basic Access Road Network

Authors: Diogo Prosdocimi, Don Ross, Matthew Townshend

Abstract:

Road authorities are mandated within limited budgets to both deliver improved access to basic services and facilitate economic growth. This responsibility is further complicated if maintenance backlogs and funding shortfalls exist, as evident in many countries including South Africa. These conditions require authorities to make difficult prioritisation decisions, with the effect that Road Asset Management Systems with a one-dimensional focus on traffic volumes may overlook the maintenance of low-volume roads that provide isolated communities with vital access to basic services. Given these challenges, this paper overlays the full South African road network with geo-referenced information for population, primary and secondary schools, and healthcare facilities to identify the network of connective roads between communities and basic service centres. This connective network is then rationalised according to the Gross Value Added and number of jobs per mesozone, administrative and functional road classifications, speed limit, and road length, location, and name to estimate the Basic Access Road Network. A two-step floating catchment area (2SFCA) method, capturing a weighted assessment of drive-time to service centres and the ratio of people within a catchment area to teachers and healthcare workers, is subsequently applied to generate a Multivariate Road Index. This Index is used to assign higher maintenance priority to roads within the Basic Access Road Network that provide more people with better access to services. The relatively limited incidence of Basic Access Roads indicates that authorities could maintain the entire estimated network without exhausting the available road budget before practical economic considerations get any purchase. Despite this fact, a final case study modelling exercise is performed for the Namakwa District Municipality to demonstrate the extent to which optimal relocation of schools and healthcare facilities could minimise the Basic Access Road Network and thereby release budget for investment in roads that best promote GDP growth.

Keywords: basic access roads, multivariate road index, road prioritisation, two-step floating catchment area method

Procedia PDF Downloads 198
3282 Effect of Access to Finance on Innovation and Productivity of SMEs in Nigeria: Evidence from the World Bank Enterprise Survey

Authors: Abidemi C. Adegboye, Samuel Iweriebor

Abstract:

The primary link between financial institutions and economic performance is the provision of resources by these institutions to businesses in order to drive enterprise expansion, sustainability, and development. In this study, the role of access to finance in driving innovations and productivity in Nigerian SMEs is investigated using the World Bank Enterprise Survey (ES) dataset. Innovation is defined based on the ES analysis using five compositions including product, method, organisational, use of foreign-licensed technology, and spending on R&D. The study considers finance in terms of source in meeting investment needs and in terms of access. Moreover, finance access is categorized as external and internal to a firm with each having different implications. The research methodology adopted a survey analysis based on the 2014 World Bank Enterprise Survey of 19 states in Nigeria. The survey comprised over 10,000 manufacturing and services firms, both at the small scale and medium scale levels. The logit estimation technique is used to estimate the relationships in the study. The results from the empirical analysis show that in general, access to finance drives SME innovation in Nigeria. In particular, ease of accessing bank loans and credit is shown to be the strongest positive force in driving all types of innovation among SMEs in Nigeria. In the same vein, the type of finance source for investment matters in terms of how it affects innovation: it is shown that both internal and external sources improve investment in product, process, and organisational innovation, but only external financing has effect on R&D spending and use of foreign licensed technology. Overall spending on R&D is only driven by access to external finance by the SMEs. For productivity, the results show that while structure of financing investment improves productivity, increased access to finance may actually lead to productivity decline among SMEs in Nigeria. There is a need for the financial system to evolve structures to increase fund availability to SMEs in Nigeria, especially for the purpose of innovation investment.

Keywords: access to finance, financing investment, innovation, productivity, SMEs

Procedia PDF Downloads 329
3281 Analysis and Evaluation of Both AC and DC Standalone Photovoltaic Supply to Ethio-Telecom Access Layer Devices: The Case of Multi-Service Access Gateway in Adama

Authors: Frie Ayalew, Seada Hussen

Abstract:

Ethio-telecom holds a variety of telecom devices that needs a consistent power source to be operational. The company got this power mainly from the national grid and used this power source alone or with a generator and/or batteries as a backup. In addition, for off-grid or remote areas, the company commonly uses generators and batteries. But unstable diesel prices, huge expenses of fuel and transportation, and high carbon emissions are the main problems associated with fuel energy. So, the design of solar power with battery backup is a highly recommended and advantageous source for the next coming years. This project designs the AC and DC standalone photovoltaic supply to Ethio-telecom access layer devices for the case of multi-service access gateway in Adama. The design is done by using Homer software for both AC and DC loads. The project shows that the design of a solar based microgrid is the best option for the designed area.

Keywords: solar power, battery, inverter, Ethio-telecom, solar radiation

Procedia PDF Downloads 49
3280 Evidence Based Policy Studies: Examining Alternative Policy Practice towards Improving Enrolment to Higher Education in Nigeria

Authors: Muftahu Jibirin Salihu, Hazri Jamil

Abstract:

The persisting challenge of access and enrolment to higher education in commonwealth countries has been reported in several studies, including reports of the international organization such as World Bank, UNESCO among others however from the macro perspective. The overarching aim of this study is to examine alternative policy practices towards improving access to university education in Nigeria at meso level of policy practice from evidence base policy studies using one university as a case. The study adopted a qualitative approach to gain insightful understanding on the issue of the study employing a semi-structure interview and policy documents as the means for obtaining the data and other relevant information for the study. The participants of the study were purposively chosen which comprise of a number of individuals from the selected university and other related organization which responsible for the policies development and implementation of Nigerian higher education system. From the findings of the study, several initiatives have been taken at meso level to address this challenge including the introduction of the University Matriculation Program as an alternative route for enhancing to access to the university education. However, the study further provided a number of recommendations which aimed at improving access to university education such as improving the entry requirements, society orientation on university education and the issue of ranking of certificate among the Nigerian higher institutions of learning.

Keywords: policy practice, access, enrolment, university, education, Nigeria

Procedia PDF Downloads 235
3279 The Critical Relevance of Credit and Debt Data in Household Food Security Analysis: The Risks of Ineffective Response Actions

Authors: Siddharth Krishnaswamy

Abstract:

Problem Statement: Currently, when analyzing household food security, the most commonly studied food access indicators are household income and expenditure. Larger studies do take into account other indices such as credit and employment. But these are baselines studies and by definition are conducted infrequently. Food security analysis for access is usually dedicated to analyzing income and expenditure indicators. And both these indicators are notoriously inconsistent. Yet this data can very often end up being the basis on which household food access is calculated; and by extension, be used for decision making. Objectives: This paper argues that along with income and expenditure, credit and debit information should be collected so that an accurate analysis of household food security (and in particular) food access can be determined. The lack of collection and analysis of this information routinely means that there is often a “masking” of the actual situation; a household’s food access and food availability patterns may be adequate mainly as a result of borrowing and may even be due to a long- term dependency (a debt cycle). In other words, such a household is, in reality, worse off than it appears a factor masked by its performance on basic access indicators. Procedures/methodologies/approaches: Existing food security data sets collected in 2005 in Azerbaijan, 2010 across Myanmar and 2014-15 across Uganda were used to support the theory that analyzing income and expenditure of a HHs and analyzing the same in addition to data on credit & borrowing patterns will result in an entirely different scenario of food access of the household. Furthermore, the data analyzed depicts food consumption patterns across groups of households and then relates this to the extent of dependency on credit, i.e. households borrowing money in order to meet food needs. Finally, response options that were based on analyzing only income and expenditure; and response options based on income, expenditure, credit, and borrowing – from the same geographical area of operation are studied and discussed. Results: The purpose of this work was to see if existing methods of household food security analysis could be improved. It is hoped that food security analysts will collect household level information on credit and debit and analyze them against income, expenditure and consumption patterns. This will help determine if a household’s food access and availability are dependent on unsustainable strategies such as borrowing money for food or undertaking sustained debts. Conclusions: The results clearly show the amount of relevant information that is missing in Food Access analysis if debit and borrowing of the household is not analyzed along with the typical Food Access indicators that are usually analyzed. And the serious repercussions this has on Programmatic response and interventions.

Keywords: analysis, food security indicators, response, resilience analysis

Procedia PDF Downloads 304
3278 An Integrated Architecture of E-Learning System to Digitize the Learning Method

Authors: M. Touhidul Islam Sarker, Mohammod Abul Kashem

Abstract:

The purpose of this paper is to improve the e-learning system and digitize the learning method in the educational sector. The learner will login into e-learning platform and easily access the digital content, the content can be downloaded and take an assessment for evaluation. Learner can get access to these digital resources by using tablet, computer, and smart phone also. E-learning system can be defined as teaching and learning with the help of multimedia technologies and the internet by access to digital content. E-learning replacing the traditional education system through information and communication technology-based learning. This paper has designed and implemented integrated e-learning system architecture with University Management System. Moodle (Modular Object-Oriented Dynamic Learning Environment) is the best e-learning system, but the problem of Moodle has no school or university management system. In this research, we have not considered the school’s student because they are out of internet facilities. That’s why we considered the university students because they have the internet access and used technologies. The University Management System has different types of activities such as student registration, account management, teacher information, semester registration, staff information, etc. If we integrated these types of activity or module with Moodle, then we can overcome the problem of Moodle, and it will enhance the e-learning system architecture which makes effective use of technology. This architecture will give the learner to easily access the resources of e-learning platform anytime or anywhere which digitizes the learning method.

Keywords: database, e-learning, LMS, Moodle

Procedia PDF Downloads 155
3277 Endovascular Aneurysm Repair (Evar) with Endoanchors: For Tandem Aortic Abdominal Aneurysm (Aaa) with Hostile Neck & Proximal Penetrating Atherosclerotic Ulcer

Authors: Von Jerick Tenorio, Jonald Lucero, Marivic Vestal, Edwin Tiempo

Abstract:

In patients with hostile aortic neck anatomy, the risks of proximal seal complications and stent migration remain with EVAR despite improved endograft technology. This case report discusses how the technical challenges of the hostile neck anatomy, proximal penetrating atherosclerotic ulcer (PAU) and tortuous femoral access were addressed. The CT aortogram of a 63-year-old hypertensive and diabetic man with recurring abdominal discomfort revealed a fusiform infra-renal aneurysm measuring 8.8 cm in length and 5.7 cm in diameter. The proximal landing zone only has a 3 mm healthy neck with a conicity of > 10% and a thrombus of 4 mm thick. Proximal to the aneurysm is a PAU with a circumferential mural thrombus. The right femoral artery is tortuous with > 90o angulation. A 20% oversized Endurant II endograft and Aptus Heli-FX EndoAnchors were deployed as prophylaxis for type I endoleaks and endograft migration consequent to the conical neck and proximal aneurysm extension consequent to the PAU. A stiff Backup Meier guide wire facilitated the deployment of the endograft. Coil embolization of the right internal iliac artery was performed as prophylaxis for type II endoleaks. EndoAnchors can be used as an adjunct to EVAR as prophylaxis for proximal seal complications and stent migration in patients with hostile aortic aneurysm neck anatomy and concomitant proximal PAU.

Keywords: endoAnchors, endoleaks, EVAR, hostile neck

Procedia PDF Downloads 170
3276 Freedom of Information and Freedom of Expression

Authors: Amin Pashaye Amiri

Abstract:

Freedom of information, according to which the public has a right to have access to government-held information, is largely considered as a tool for improving transparency and accountability in governments, and as a requirement of self-governance and good governance. So far, more than ninety countries have recognized citizens’ right to have access to public information. This recognition often took place through the adoption of an act referred to as “freedom of information act”, “access to public records act”, and so on. A freedom of information act typically imposes a positive obligation on a government to initially and regularly release certain public information, and also obliges it to provide individuals with information they request. Such an act usually allows governmental bodies to withhold information only when it falls within a limited number of exemptions enumerated in the act such as exemptions for protecting privacy of individuals and protecting national security. Some steps have been taken at the national and international level towards the recognition of freedom of information as a human right. Freedom of information was recognized in a few countries as a part of freedom of expression, and therefore, as a human right. Freedom of information was also recognized by some international bodies as a human right. The Inter-American Court of Human Rights ruled in 2006 that Article 13 of the American Convention on Human Rights, which concerns the human right to freedom of expression, protects the right of all people to request access to government information. The European Court of Human Rights has recently taken a considerable step towards recognizing freedom of information as a human right. However, in spite of the measures that have been taken, public access to government information is not yet widely accepted as an international human right. The paper will consider the degree to which freedom of information has been recognized as a human right, and study the possibility of widespread recognition of such a human right in the future. It will also examine the possible benefits of such recognition for the development of the human right to free expression.

Keywords: freedom of information, freedom of expression, human rights, government information

Procedia PDF Downloads 515