1,069 research outputs found

    Changes in Malaria Prevention and Incidence Due to Political Restructuring of Mozambique and South Africa

    Get PDF
    The UN’s current Millennium Development Goal puts pressure on many countries to decrease malaria incidence by 2015, including Mozambique and South Africa. While Mozambique and South Africa have continually worked to decrease malaria incidence for the last five decades, neither country can claim elimination of disease by UN standards. This study analyzes the changes in political structure and the simultaneous changes in the malaria prevention programs of Mozambique and South Africa after the end of their respective civil wars in 1992 and 1994. This study analyzed public health, historical, and social science journal articles. This study examined political power distribution, primary healthcare, and malaria prevention strategies, and community perception of healthcare to identify the different political dynamics affecting malaria incidence control in Mozambique and South Africa. This study identified that while Mozambique heavily financially dependent, strong community structure, and general malaria outbreaks compared to South Africa’s economic independence, phasing out of private health care, and localized strong malaria epidemics, showcase the difference between the status of the two countries in malaria elimination. As bordering countries, the elimination of malaria in the two countries is tied together. The migration of people in between and the pre-existing organizations working in between the two countries showcase that South Africa and Mozambique must work together to eliminate malaria. A potential international cooperation agreement between South Africa and Mozambique that allows the two countries to help each other financially, through research, and management of malaria prevention resources would help eliminate malaria, while keeping the countries moderately independent of external aid.https://scholarscompass.vcu.edu/uresposters/1126/thumbnail.jp

    Family Violence against Women: How Does Ethiopian Law Compare with International Definitions?

    Get PDF
    With the recognition of family violence by the United Nations as a human rights abuse in the 1990s, the issue of family violence has achieved a much greater profile in terms of law and policy development in many countries. However, unfortunately, in Ethiopia so far no serious steps have been taken in this direction. The evidence of growing incidence of family violence against women in the country is a clear indication that the general Criminal Law provisions are failing to combat this social evil. In this background, this paper discusses the enormity of the problem of FVAW in the Ethiopian society, shows the inadequacy of the relevant legal provisions under the Ethiopian laws in the light of the international legal instruments and special laws of prominent countries, and emphasizes on the immediate need for the enactment of special law to prevent family violence in Ethiopia.Key words: Family, definition

    Designing of MATLAB Program for Various Fuzzy Quality Regions in CSP-MLP-T-3 Sampling plan

    Get PDF
    In this paper, an optimal designing methodology is proposed to determine the parameters for Multi-Level Continuous Sampling Plans CSP-MLP-T-3, when the lifetime of the product follows generalized exponential distribution. The two points on the operating characteristic curve approach are used to find the optimal parameters for the proposed plan. The plan parameters are determined through Quality Decision Region

    Competition between Superconductivity and Charge Density Wave Ordering in the Lu5_5Ir4_4(Si1−x_{1-x}Gex_x)10_{10} Alloy System

    Full text link
    We have performed bulk measurements such as dc magnetic susceptibility, electrical resistivity and heat capacity on the pseudo-ternary alloys Lu5_5Ir4_4(Si1−x_{1-x}Gex_x)10_{10} to study the interplay and competition between superconductivity and the charge density wave (CDW) ordering transition. We track the evolution of the superconducting transition temperature TSC_{SC} and the CDW ordering temperature TCDW_{CDW} as a function of x (concentration of Ge) (0.0≤x≤ 1.00.0 \leq x\leq~1.0). We find that increasing x (increasing disorder) suppresses the TCDW_{CDW} rapidly with the concomitant increase in TSC_{SC}. We present a temperature-concentration (or volume) phase diagram for this system and compare our results with earlier work on substitution at the Lu or Ir site to show how dilution at the Si site presents a different situation from these other works. The heat capacity data in the vicinity of the CDW transition has been analyzed using a model of critical fluctuations in addition to a mean-field contribution and a smooth lattice background. We find that the critical exponents change appreciably with increasing disorder. This analysis suggests that the strong-coupling and non mean-field like CDW transition in the parent compound Lu5_5Ir4_4Si10_{10} changes to a mean-field like transition with increasing Ge concentration.Comment: 14 pages and 8 figures. Accepted for publication in Phys. Rev.

    How well do India's social service programs serve the poor?

    Get PDF
    Reaching India's poor calls for greatly improved social service delivery systems, better targeting of the poor, more coordination between agencies, policies aimed at income generation, and more involvement of the poor and of nongovernmental organizations. The authors of this paper found that India's social services were used relatively little by the poor. The health and education of the poor has improved but not as much for the population as a whole. The reasons that all social service programs did so little to alleviate poverty are similar. Physical access to education and health services has improved but inequalities exist because of biases in locating facilities. The access of the poor to housing, social security, and social welfare services has been limited because these services were inadequate relative to needs and because services leak to the nonpoor. Social service policies are not comprehensive enough and the quality of services is low. Issues common to the social sector delivery systems are weak management, ineffective targeting, and inflexible service delivery systems that result in a mismatch between perceived needs and services delivered. The bureaucracy is inadequate to reach the poor. Existing capacity and resources are inadequate, particularly for education and health.Health Monitoring&Evaluation,Health Economics&Finance,Poverty Assessment,Safety Nets and Transfers,Rural Poverty Reduction

    Security on the Abusive Social Network Sites- A Survey

    Get PDF
    To share business interests, the internet social network have become the common platform where users communicate through which My Space, Second Life and similar web2.0 sites can pose malicious security hazards. The social networking sites are viewed as a kind of online cocktail party in business view as a friendly comfortable place to establish contacts, associate buyers or sellers and raise personal or corporate file. To the maxim, cocktail party metaphor is not pure, obviously in the content of a load glass house for social network serves, the users are served in with care and endless visibility through a highly amplified bullhorn. The social network sites are accessed from the comfort and privacy by maximum users, there is a possibility of false sense of anonymity where the users natural defences can too devasted due to the lack of physical contact on social network site by which there is an endanger of disclosing the information of individuals which would never think of revealing to another at a cocktail partys

    trans-​(±)​-​2-​(4-​Methoxyphenyl)​-​4-​oxo-​2,​3,​4,​5-​tetrahydro-​1,​5-​benzothiazepin-​3-​yl acetate

    Get PDF
    The title compd., C18H17NO4S, is a diltiazem-​related compd. The mol. packing is predominantly stabilized by H bonding; amide groups H bond with adjacent mols. to form centrosym. dimers. The seven-​membered ring is distorted, showing a twist-​boat conformation. The benzene ring is planar but the methoxyphenyl ring deviates significantly from planarity. The relative configuration of the methoxyphenyl and acetoxy groups is gauche. Crystallog. data and at. coordinates are given

    DESIGN AND IMPLEMENTATION OF A SERVER INDEPENDENT THREE LEVEL AUTHENTICATION SYSTEM

    Get PDF
    As the rapid growth of Internet of Things (IoT) technology in the healthcare sector has led to the emergence of many security threats and risks, the increasing use of sensor objects in the medical field has become quite challenging to ensure full protection. Security and Privacy are among the vital requirements for the IoT (Internet of Things) network domain, which involve data authentication and security. There are numerous approaches to arrange authentication and authorization within information systems. Usually, authentication is utilized for login purposes and essentially acts as a security tool for personal user data. It represents the first level of protection against the disclosure of any system information. Users no longer trust traditional password-based authentication methods, given the increased interaction among online services. Credentials acquired online are frequently utilized to secure additional credentials, and advanced attacks frequently focus on the least secure among a large number of available credentials. One-time passwords and a two-factor authentication mechanism are being investigated by researchers as they seem to present a natural progression from traditional username/password schemes. Authentication is one of the primary ways of establishing and ensuring security in the network. Hence in this work, design and implementation of a server independent three level authentication system is presented. In this system, three levels of authentication such as face recognition, matrix recognition, email and OTP (One Time Password) verification. After successful three level authentications, Hospital Management/administration can access the medical data. This system performs three level authentications which is unique and novel as a result intruder is not able to steal the medical information. Hence, this system will provide greater security
    • …
    corecore