Search results for: Kenneth Harper
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 88

Search results for: Kenneth Harper

88 Transforming Healthcare Data Privacy: Integrating Blockchain with Zero-Knowledge Proofs and Cryptographic Security

Authors: Kenneth Harper

Abstract:

Blockchain technology presents solutions for managing healthcare data, addressing critical challenges in privacy, integrity, and access. This paper explores how privacy-preserving technologies, such as zero-knowledge proofs (ZKPs) and homomorphic encryption (HE), enhance decentralized healthcare platforms by enabling secure computations and patient data protection. An examination of the mathematical foundations of these methods, their practical applications, and how they meet the evolving demands of healthcare data security is unveiled. Using real-world examples, this research highlights industry-leading implementations and offers a roadmap for future applications in secure, decentralized healthcare ecosystems.

Keywords: blockchain, cryptography, data privacy, decentralized data management, differential privacy, healthcare, healthcare data security, homomorphic encryption, privacy-preserving technologies, secure computations, zero-knowledge proofs

Procedia PDF Downloads 0
87 Destruction of Coastal Wetlands in Harper City-Liberia: Setting Nature against the Future Society

Authors: Richard Adu Antwako

Abstract:

Coastal wetland destruction and its consequences have recently taken the center stage of global discussions. This phenomenon is no gray area to humanity as coastal wetland-human interaction seems inevitably ingrained in the earliest civilizations, amidst the demanding use of its resources to meet their necessities. The severity of coastal wetland destruction parallels with growing civilizations, and it is against this backdrop that, this paper interrogated the causes of coastal wetland destruction in Harper City in Liberia, compared the degree of coastal wetland stressors to the non-equilibrium thermodynamic scale as well as suggested an integrated coastal zone management to address the problems. Literature complemented the primary data gleaned via global positioning system devices, field observation, questionnaire, and interviews. Multi-sampling techniques were used to generate data from the sand miners, institutional heads, fisherfolk, community-based groups, and other stakeholders. Non-equilibrium thermodynamic theory remains vibrant in discerning the ecological stability, and it would be employed to further understand the coastal wetland destruction in Harper City, Liberia and to measure the coastal wetland stresses-amplitude and elasticity. The non-equilibrium thermodynamics postulates that the coastal wetlands are capable of assimilating resources (inputs), as well as discharging products (outputs). However, the input-output relationship exceedingly stretches beyond the thresholds of the coastal wetlands, leading to coastal wetland disequilibrium. Findings revealed that the sand mining, mangrove removal, and crude dumping have transformed the coastal wetlands, resulting in water pollution, flooding, habitat loss and disfigured beaches in Harper City in Liberia. This paper demonstrates that the coastal wetlands are converted into developmental projects and agricultural fields, thus, endangering the future society against nature.

Keywords: amplitude, crude dumping, elasticity, non-equilibrium thermodynamics, wetland destruction

Procedia PDF Downloads 136
86 A Next-Generation Blockchain-Based Data Platform: Leveraging Decentralized Storage and Layer 2 Scaling for Secure Data Management

Authors: Kenneth Harper

Abstract:

The rapid growth of data-driven decision-making across various industries necessitates advanced solutions to ensure data integrity, scalability, and security. This study introduces a decentralized data platform built on blockchain technology to improve data management processes in high-volume environments such as healthcare and financial services. The platform integrates blockchain networks using Cosmos SDK and Polkadot Substrate alongside decentralized storage solutions like IPFS and Filecoin, and coupled with decentralized computing infrastructure built on top of Avalanche. By leveraging advanced consensus mechanisms, we create a scalable, tamper-proof architecture that supports both structured and unstructured data. Key features include secure data ingestion, cryptographic hashing for robust data lineage, and Zero-Knowledge Proof mechanisms that enhance privacy while ensuring compliance with regulatory standards. Additionally, we implement performance optimizations through Layer 2 scaling solutions, including ZK-Rollups, which provide low-latency data access and trustless data verification across a distributed ledger. The findings from this exercise demonstrate significant improvements in data accessibility, reduced operational costs, and enhanced data integrity when tested in real-world scenarios. This platform reference architecture offers a decentralized alternative to traditional centralized data storage models, providing scalability, security, and operational efficiency.

Keywords: blockchain, cosmos SDK, decentralized data platform, IPFS, ZK-Rollups

Procedia PDF Downloads 0
85 Science and Monitoring Underpinning River Restoration: A Case Study

Authors: Geoffrey Gilfillan, Peter Barham, Lisa Smallwood, David Harper

Abstract:

The ‘Welland for People and Wildlife’ project aimed to improve the River Welland’s ecology and water quality, and to make it more accessible to the community of Market Harborough. A joint monitoring project by the Welland Rivers Trust & University of Leicester was incorporated into the design. The techniques that have been used to measure its success are hydrological, geomorphological, and water quality monitoring, species and habitat surveys, and community engagement. Early results show improvements to flow and habitat diversity, water quality and biodiversity of the river environment. Barrier removal has increased stickleback mating activity, and decreased parasitically infected fish in sample catches. The habitats provided by the berms now boast over 25 native plant species, and the river is clearer, cleaner and with better-oxygenated water.

Keywords: community engagement, ecological monitoring, river restoration, water quality

Procedia PDF Downloads 228
84 Nonlinear Model Predictive Control for Biodiesel Production via Transesterification

Authors: Juliette Harper, Yu Yang

Abstract:

Biofuels have gained significant attention recently due to the new regulations and agreements regarding fossil fuels and greenhouse gases being made by countries around the globe. One of the most common types of biofuels is biodiesel, primarily made via the transesterification reaction. We model this nonlinear process in MATLAB using the standard kinetic equations. Then, a nonlinear Model predictive control (NMPC) was developed to regulate this process due to its capability to handle process constraints. The feeding flow uncertainty and kinetic disturbances are further incorporated in the model to capture the real-world operating conditions. The simulation results will show that the proposed NMPC can guarantee the final composition of fatty acid methyl esters (FAME) above the target threshold with a high chance by adjusting the process temperature and flowrate. This research will allow further understanding of NMPC under uncertainties and how to design the computational strategy for larger process with more variables.

Keywords: NMPC, biodiesel, uncertainties, nonlinear, MATLAB

Procedia PDF Downloads 90
83 Social Discussion Networks during the Covid-19 Pandemic: A Study of College Students Core Discussion Groups

Authors: Regan Harper, Song Yang, Douglas Adams

Abstract:

During the historically unprecedent time of Covid-19 pandemic, we survey college students with social issue generators to measure their core discussion groups. For the total 191 students, we elicit 847 conversation partners (alters) with our five social issue generators such as school closing, facemasks, collegiate sports, race and policing, and social inequality, producing an average of 4.43 alters per respondent. The core discussion groups of our sample are very gender balanced, with female alters slightly outnumbering male alters. However, the core discussion groups are racially homogenous, consisting of mostly white students (around or above 80 percent). Explanatory analyses reveal that gender and race of respondents significantly impact the size, gender composition, and racial composition of their core discussion networks. We discuss those major findings and implications of future studies in our conclusion section.

Keywords: core discussion groups, social issue generators, ego-centric network, Covid-19 pandemic

Procedia PDF Downloads 76
82 Fixing the Identity Gap in Fashion: Magazines' Role in Consumption of Clothes

Authors: Kateryna Pilyarchuk

Abstract:

A dress has, since times immemorial, been used to communicate the wearer’s identity. When a new trend is born, fashionistas buy it not only with the purpose to beautify themselves, but also to acquire the collective identity. Fashion has become a means of narrating one’s stance and status. Thus, when one spends money on a brand, one pays for some unmaterial components associated with it. This paper will present some ways in which fashion magazines promote consumerism by drawing on women’s craving for collective identity and need to fill in their identity gap by means of a purchase. By applying the method of critical discursive psychology, it will present layers of ideology and positions that become visible in framing of the message in U.S. Harper’s Bazaar. In this context, fashion decisions that are presented to its readers will be critically evaluated from the gender perspective. It will be demonstrated that what is presented as a postfeminist choice in the neoliberal society is still, to a considerable extent, oppressive and driven by the male gaze. As the findings show, the contemporary female identities in fashion are still built on the principles of traditional femininity. Magazines and fashion discourse train women that they should fear being left out of fashion and, by extension, out of the category of the sexually appealing (from the male perspective).

Keywords: collective identity, critical discursive psychology, fashion discourse, identity gap

Procedia PDF Downloads 142
81 Teacher Education and Curriculum Innovation in Nigeria: Issues and Perspectives

Authors: Kenneth Uzochukwu Ezugwu

Abstract:

The quest for adequate teacher education is a serious task for the educational system in Nigeria because teachers are the major translators of education programmes in the classroom. The production of well trained teachers will enhance quality of the products of the school system. It is in this respect that the national policy on education posited that no educational system can rise above the quality of teachers. It is in the light of the above that this paper discusses and brought to the fore certain issues as the re-introduction of teacher training colleges, competitive entry requirement into teacher education and continuous on-the-job training as areas of needed innovation.

Keywords: curriculum innovation, issues, perspectives, teacher education

Procedia PDF Downloads 596
80 Assessing Student Attitudes toward Graded Readers, MReader and the MReader Challenge

Authors: Catherine Cheetam, Alan Harper, Melody Elliott, Mika Ito

Abstract:

This paper describes a pilot study conducted with English as a foreign language (EFL) students at a private university in Japan who used graded readers and the MReader website in class or independently to enhance their English reading skills. Each semester students who read 100,000 words with MReader quizzes passed enter into the ‘MReader Challenge,’ a reading contest that recognizes students for their achievement. The study focused specifically on the attitudes of thirty-six EFL students who successfully completed the Challenge in the 2015 spring semester using graded readers and MReader, and their motivation to continue using English in the future. The attitudes of these students were measured using their responses to statements on a Likert scaled survey. Follow-up semi-structured interviews were conducted with eleven students to gain additional insight into their opinions. The results from this study suggest that reading graded readers in general promoted intrinsic motivation among a majority of the participants. This study is preliminary and needs to be expanded and continued to assess the lasting impact of the extensive reading program. Limitations and future directions of the study are also summarized and discussed.

Keywords: attitudes, extensive, intrinsic, methodolgies, motivation, reading

Procedia PDF Downloads 200
79 Identification of Autism Spectrum Disorders in Day-Care Centres

Authors: Kenneth Larsen, Astrid Aasland, Synnve Schjølberg, Trond Diseth

Abstract:

Autism Spectrum Disorders (ASD) are neurodevelopmental disorders emerging in early development characterized by impairment in social communication skills and a restricted, repetitive and stereotyped patterns of behavior and interests. Early identification and interventions potentially improve development and quality of life of children with ASD. Symptoms of ASD are apparent through the second year of life, yet diagnostic age are still around 4 years of age. This study explored whether symptoms associated with ASD are possible to identify in typical Norwegian day-care centers in the second year of life. Results of this study clearly indicates that most described symptoms also are identifiable by day-care staff, and that a short observation list of 5 symptoms clearly identify children with ASD from a sample of normal developing peers.

Keywords: autism, early identification, day-care, screening

Procedia PDF Downloads 388
78 Quality and Coverage Assessment in Software Integration Based On Mutation Testing

Authors: Iyad Alazzam, Kenneth Magel, Izzat Alsmadi

Abstract:

The different activities and approaches in software testing try to find the most possible number of errors or failures with the least amount of possible effort. Mutation is a testing approach that is used to discover possible errors in tested applications. This is accomplished through changing one aspect of the software from its original and writes test cases to detect such change or mutation. In this paper, we present a mutation approach for testing software components integration aspects. Several mutation operations related to components integration are described and evaluated. A test case study of several open source code projects is collected. Proposed mutation operators are applied and evaluated. Results showed some insights and information that can help testing activities in detecting errors and improving coverage.

Keywords: software testing, integration testing, mutation, coverage, software design

Procedia PDF Downloads 421
77 A Method for Quantifying Arsenolipids in Sea Water by HPLC-High Resolution Mass Spectrometry

Authors: Muslim Khan, Kenneth B. Jensen, Kevin A. Francesconi

Abstract:

Trace amounts (ca 1 µg/L, 13 nM) of arsenic are present in sea water mostly as the oxyanion arsenate. In contrast, arsenic is present in marine biota (animals and algae) at very high levels (up to100,000 µg/kg) a significant portion of which is present as lipid-soluble compounds collectively termed arsenolipids. The complex nature of sea water presents an analytical challenge to detect trace compounds and monitor their environmental path. We developed a simple method using liquid-liquid extraction combined with HPLC-High Resolution Mass Spectrometer capable of detecting trace of arsenolipids (99 % of the sample matrix while recovering > 80 % of the six target arsenolipids with limit of detection of 0.003 µg/L.)

Keywords: arsenolipids, sea water, HPLC-high resolution mass spectrometry

Procedia PDF Downloads 362
76 The Nature of Intelligence and Its Forms: An Ontological-Modeling Approach

Authors: Husam El-Asfour, Fateh Adhnouss, Kenneth McIsaac, Abdul Mutalib Wahaishi, Raafat Aburukba, Idris El-Feghia

Abstract:

Although intelligence is commonly referred to as the observable behavior in various fields and domains, it must also be shown how it develops by exhibiting multiple forms and without observing the inherent behavior. There have been several official and informal definitions of intelligence in various areas; however, no scientific agreement on a definition has been agreed upon. There must be a single definition, structure, and precise modeling for articulating how intelligence is perceived by people and machines in order to comprehend intelligence. Another key challenge is defining the different environment types based on the integral elements (agents) and their possible interactions. On the basis of conceptualization, this paper proposes a formal model for defining and developing intelligence. Forms of intelligence are derived from an ontological view, and thus intelligence is defined, described, and modeled based on the various types of environments.

Keywords: intelligence, forms, transformation, conceptualization, ontological view

Procedia PDF Downloads 132
75 Identifying Families in C-SPAN’s: U.S. Presidential Ratings: 2000, 2009, and 2017

Authors: Alexander Cramer, Kenneth Cramer

Abstract:

Since the inauguration of President George Washington in 1789, the United States of America has seen the governance of some 44 individual presidents. Although such presidents share a variety of attributes, they still differ from one another on many others. Significantly, these traits may be used to construct distinct sets of 'families' of presidents throughout American history. By comparatively analyzing data from experts on the U.S. presidency – in this case, the C-SPAN Presidential Historians Surveys from 2000, 2009, and 2017 – this article identifies a consistent set of six presidential families: the All Stars; the Conservative Visionaries; the Postwar Progressives; the Average Joes; the Forgettables; and the Regrettables. In situating these categories in history, this article argues that U.S. presidents can be accurately organized into cohesive, like-performing families whose constituents share a common set of criteria.

Keywords: C-SPAN, POTUS presidential performance, presidential ranking, presidential studies, presidential surveys, United States

Procedia PDF Downloads 188
74 Creating a Virtual Perception for Upper Limb Rehabilitation

Authors: Nina Robson, Kenneth John Faller II, Vishalkumar Ahir, Arthur Ricardo Deps Miguel Ferreira, John Buchanan, Amarnath Banerjee

Abstract:

This paper describes the development of a virtual-reality system ARWED, which will be used in physical rehabilitation of patients with reduced upper extremity mobility to increase limb Active Range of Motion (AROM). The ARWED system performs a symmetric reflection and real-time mapping of the patient’s healthy limb on to their most affected limb, tapping into the mirror neuron system and facilitating the initial learning phase. Using the ARWED, future experiments will test the extension of the action-observation priming effect linked to the mirror-neuron system on healthy subjects and then stroke patients.

Keywords: physical rehabilitation, mirror neuron, virtual reality, stroke therapy

Procedia PDF Downloads 425
73 The Labor Participation–Fertility Trade-off: The Case of the Philippines

Authors: Daphne Ashley Sze, Kenneth Santos, Ariane Gabrielle Lim

Abstract:

As women are now given more freedom and choice to pursue employment, the world’s over-all fertility has been decreasing mainly due to the shift in time allocation between working and child rearing. As such, we study the case of the Philippines, where there exists a decreasing fertility rate and increasing openness for women labor participation. We focused on the distinction between fertility and fecundity, the former being the manifestation of the latter and aim to trace and compare the effects of both fecundity and fertility to women’s employment status through the estimation of the reproduction function and multinomial logistic function. Findings suggest that the perception of women regarding employment opportunities in the Philippines links the negative relationship observed between fertility, fecundity and women’s employment status. Today, there has been a convergence in the traditional family roles of men and women, as both genders now have identical employment opportunities that continue to shape their preferences.

Keywords: multinomial logistic function, tobit, fertility, women employment status, fecundity

Procedia PDF Downloads 596
72 The Labor Participation-Fertility Trade-Off: Exploring Fecundity and Its Consequences to Women's Employment in the Philippines

Authors: Ariane C. Lim, Daphne Ashley L. Sze, Kenneth S. Santos

Abstract:

As women are now given more freedom and choice to pursue employment, the world’s over-all fertility has been decreasing mainly due to the shift in time allocation between working and child-rearing. As such, we study the case of the Philippines, where there exists a decreasing fertility rate and increasing openness for women labor participation. We focused on the distinction between fertility and fecundity, the former being the manifestation of the latter and aim to trace and compare the effects of both fecundity and fertility to women’s employment status through the estimation of the reproduction function and multinomial logistic function. Findings suggest that the perception of women regarding employment opportunities in the Philippines links the negative relationship observed between fertility, fecundity and women’s employment status. Today, there has been a convergence in the traditional family roles of men and women, as both genders now have identical employment opportunities that continue to shape their preferences.

Keywords: multinomial logistic function, tobit, fertility, women employment status, fecundity

Procedia PDF Downloads 623
71 Developing Models for Predicting Physiologically Impaired Arm Reaching Paths

Authors: Nina Robson, Kenneth John Faller II, Vishalkumar Ahir, Mustafa Mhawesh, Reza Langari

Abstract:

This paper describes the development of a model of an impaired human arm performing a reaching motion, which will be used to predict hand path trajectories for people with reduced arm joint mobility. Assuming that the arm was in contact with a surface during the entire movement, the contact conditions at the initial and final task locations were determined and used to generate the entire trajectory. The model was validated by comparing it to experimental data, which simulated an arm joint impairment by physically constraining the joint motion with a brace. Future research will include using the model in the development of physical training protocols that avoid early recruitment of “healthy” Degrees-Of-Freedom (DOF) for reaching motions, thus facilitating an Active Range-Of-Motion Recovery (AROM) for a particular impaired joint.

Keywords: higher order kinematic specifications, human motor coordination, impaired movement, kinematic synthesis

Procedia PDF Downloads 334
70 Text Similarity in Vector Space Models: A Comparative Study

Authors: Omid Shahmirzadi, Adam Lugowski, Kenneth Younge

Abstract:

Automatic measurement of semantic text similarity is an important task in natural language processing. In this paper, we evaluate the performance of different vector space models to perform this task. We address the real-world problem of modeling patent-to-patent similarity and compare TFIDF (and related extensions), topic models (e.g., latent semantic indexing), and neural models (e.g., paragraph vectors). Contrary to expectations, the added computational cost of text embedding methods is justified only when: 1) the target text is condensed; and 2) the similarity comparison is trivial. Otherwise, TFIDF performs surprisingly well in other cases: in particular for longer and more technical texts or for making finer-grained distinctions between nearest neighbors. Unexpectedly, extensions to the TFIDF method, such as adding noun phrases or calculating term weights incrementally, were not helpful in our context.

Keywords: big data, patent, text embedding, text similarity, vector space model

Procedia PDF Downloads 167
69 The Effect of Spatial Variability on Axial Pile Design of Closed Ended Piles in Sand

Authors: Cormac Reale, Luke J. Prendergast, Kenneth Gavin

Abstract:

While significant improvements have been made in axial pile design methods over recent years, the influence of soils natural variability has not been adequately accounted for within them. Soil variability is a crucial parameter to consider as it can account for large variations in pile capacity across the same site. This paper seeks to address this knowledge deficit, by demonstrating how soil spatial variability can be accommodated into existing cone penetration test (CPT) based pile design methods, in the form of layered non-homogeneous random fields. These random fields model the scope of a given property’s variance and define how it varies spatially. A Monte Carlo analysis of the pile will be performed taking into account parameter uncertainty and spatial variability, described using the measured scales of fluctuation. The results will be discussed in light of Eurocode 7 and the effect of spatial averaging on design capacities will be analysed.

Keywords: pile axial design, reliability, spatial variability, CPT

Procedia PDF Downloads 242
68 Customer Involvement in the Development of New Sustainable Products: A Review of the Literature

Authors: Natalia Moreira, Trevor Wood-Harper

Abstract:

The acceptance of sustainable products by the final consumer is still one of the challenges of the industry, which constantly seeks alternative approaches to successfully be accepted in the global market. A large set of methods and approaches have been discussed and analysed throughout the literature. Considering the current need for sustainable development and the current pace of consumption, the need for a combined solution towards the development of new products became clear, forcing researchers in product development to propose alternatives to the previous standard product development models. This paper presents, through a systemic analysis of the literature on product development, eco-design and consumer involvement, a set of alternatives regarding consumer involvement towards the development of sustainable products and how these approaches could help improve the sustainable industry’s establishment in the general market. The initial findings of the research show that the understanding of the benefits of sustainable behaviour lead to a more conscious acquisition and eventually to the implementation of sustainable change in the consumer. Thus this paper is the initial approach towards the development of new sustainable products using the fashion industry as an example of practical implementation and acceptance by the consumers. By comparing the existing literature and critically analysing it this paper concluded that the consumer involvement is strategic to improve the general understanding of sustainability and its features. The use of consumers and communities has been studied since the early 90s in order to exemplify uses and to guarantee a fast comprehension. The analysis done also includes the importance of this approach for the increase of innovation and ground breaking developments, thus requiring further research and practical implementation in order to better understand the implications and limitations of this methodology.

Keywords: consumer involvement, products development, sustainability, eco-design

Procedia PDF Downloads 589
67 Fighting for Equality in Early Buddhism

Authors: Kenneth Lee

Abstract:

During Buddha’s time in the 5th century BCE, the Indian society was organized by a social stratification system called “the caste system” (Skt. varna), which still exists today. The origination of the caste system can be traced back to 1500 BCE within the ancient Vedic texts of the Aryans, the Indo-European nomadic people who migrated and settled in the Indus Valley region. However, the four-tiered hierarchical nature of the caste system created inequality, privilege, and discrimination based on hereditary transmission. After renouncing his royal status as a prince, Siddhartha Gautama spent six years in the forest, practiced austerities, mastered meditation, and eventually realized enlightenment. Thereupon, now referred to as “Shakyamuni Buddha” or “sage from the tribe of Shakya who has become awake,” the Buddha founded the Sangha, a community of monks, nuns, and lay followers, where everyone was equal and treated equally. After providing a brief overview of Buddha’s time, this talk will examine Buddha’s Dharma or teachings on equality and his creation of the Sangha as “society within a society, which had a dissolving effect on society.

Keywords: equality, women, buddhism, discrimination

Procedia PDF Downloads 103
66 An Intensional Conceptualization Model for Ontology-Based Semantic Integration

Authors: Fateh Adhnouss, Husam El-Asfour, Kenneth McIsaac, AbdulMutalib Wahaishi, Idris El-Feghia

Abstract:

Conceptualization is an essential component of semantic ontology-based approaches. There have been several approaches that rely on extensional structure and extensional reduction structure in order to construct conceptualization. In this paper, several limitations are highlighted relating to their applicability to the construction of conceptualizations in dynamic and open environments. These limitations arise from a number of strong assumptions that do not apply to such environments. An intensional structure is strongly argued to be a natural and adequate modeling approach. This paper presents a conceptualization structure based on property relations and propositions theory (PRP) to the model ontology that is suitable for open environments. The model extends the First-Order Logic (FOL) notation and defines the formal representation that enables interoperability between software systems and supports semantic integration for software systems in open, dynamic environments.

Keywords: conceptualization, ontology, extensional structure, intensional structure

Procedia PDF Downloads 110
65 Secure Data Sharing of Electronic Health Records With Blockchain

Authors: Kenneth Harper

Abstract:

The secure sharing of Electronic Health Records (EHRs) is a critical challenge in modern healthcare, demanding solutions to enhance interoperability, privacy, and data integrity. Traditional standards like Health Information Exchange (HIE) and HL7 have made significant strides in facilitating data exchange between healthcare entities. However, these approaches rely on centralized architectures that are often vulnerable to data breaches, lack sufficient privacy measures, and have scalability issues. This paper proposes a framework for secure, decentralized sharing of EHRs using blockchain technology, cryptographic tokens, and Non-Fungible Tokens (NFTs). The blockchain's immutable ledger, decentralized control, and inherent security mechanisms are leveraged to improve transparency, accountability, and auditability in healthcare data exchanges. Furthermore, we introduce the concept of tokenizing patient data through NFTs, creating unique digital identifiers for each record, which allows for granular data access controls and proof of data ownership. These NFTs can also be employed to grant access to authorized parties, establishing a secure and transparent data sharing model that empowers both healthcare providers and patients. The proposed approach addresses common privacy concerns by employing privacy-preserving techniques such as zero-knowledge proofs (ZKPs) and homomorphic encryption to ensure that sensitive patient information can be shared without exposing the actual content of the data. This ensures compliance with regulations like HIPAA and GDPR. Additionally, the integration of Fast Healthcare Interoperability Resources (FHIR) with blockchain technology allows for enhanced interoperability, enabling healthcare organizations to exchange data seamlessly and securely across various systems while maintaining data governance and regulatory compliance. Through real-world case studies and simulations, this paper demonstrates how blockchain-based EHR sharing can reduce operational costs, improve patient outcomes, and enhance the security and privacy of healthcare data. This decentralized framework holds great potential for revolutionizing healthcare information exchange, providing a transparent, scalable, and secure method for managing patient data in a highly regulated environment.

Keywords: blockchain, electronic health records (ehrs), fast healthcare interoperability resources (fhir), health information exchange (hie), hl7, interoperability, non-fungible tokens (nfts), privacy-preserving techniques, tokens, secure data sharing,

Procedia PDF Downloads 0
64 Software Verification of Systematic Resampling for Optimization of Particle Filters

Authors: Osiris Terry, Kenneth Hopkinson, Laura Humphrey

Abstract:

Systematic resampling is the most popularly used resampling method in particle filters. This paper seeks to further the understanding of systematic resampling by defining a formula made up of variables from the sampling equation and the particle weights. The formula is then verified via SPARK, a software verification language. The verified systematic resampling formula states that the minimum/maximum number of possible samples taken of a particle is equal to the floor/ceiling value of particle weight divided by the sampling interval, respectively. This allows for the creation of a randomness spectrum that each resampling method can fall within. Methods on the lower end, e.g., systematic resampling, have less randomness and, thus, are quicker to reach an estimate. Although lower randomness allows for error by having a larger bias towards the size of the weight, having this bias creates vulnerabilities to the noise in the environment, e.g., jamming. Conclusively, this is the first step in characterizing each resampling method. This will allow target-tracking engineers to pick the best resampling method for their environment instead of choosing the most popularly used one.

Keywords: SPARK, software verification, resampling, systematic resampling, particle filter, tracking

Procedia PDF Downloads 77
63 Fostering Enriched Teaching and Learning Experience Using Effective Cyber-Physical Learning Environment

Authors: Shubhakar K., Nachamma S., Judy T., Jacob S. C., Melvin Lee, Kenneth Lo

Abstract:

In recent years, technological advancements have ushered in a new era of education characterized by the integration of technology-enabled devices and online tools. The cyber-physical learning environment (CPLE) is a prime example of this evolution, merging remote cyber participants with in-class learners through immersive technology, interactive digital whiteboards, and online communication platforms like Zoom and MS Teams. This approach transforms the teaching and learning experience into a more seamless, immersive, and inclusive one. This paper outlines the design principles and key features of CPLE that support both teaching and group-based activities. We also explore the key characteristics and potential impact of such environments on educational practices. By analyzing user feedback, we evaluate how technology enhances teaching and learning in a cyber-physical setting, its impact on learning outcomes, user-friendliness, and areas for further enhancement to optimize the teaching and learning environment.

Keywords: cyber-physical class, hybrid teaching, online learning, remote learning, technology enabled learning

Procedia PDF Downloads 25
62 The Development of Educational Video Games Aimed at Enhancing Academic Motivation and Learning Among African American Males

Authors: Kenneth Philip Jones

Abstract:

This dissertation investigates the potential of developing educational-based video games to motivate and engage African American males. The study employed a qualitative methodological approach by investigating African American males who are avid video game players and are currently enrolled at a college or university. The participants were individually and collectively video and audio recorded during the interviews and observations. Situated Learning theory analyzed how motivation and engagement can transfer from a video game to an educational context. The research aims to address the disparities in our educational systems when it comes to providing a culture, climate, and atmosphere that will enable the academic development of African American males. The primary objective of the findings is based on the participants’ responses and the data collected to provide recommendations to educators and scholars on how to address the issues that have demoralized African American males in education and provide a platform that will allow for equality in educational development and advancement.

Keywords: video games, motivation, behavioral, learning transfer

Procedia PDF Downloads 115
61 Manipulating The PAAR Proteins of Acinetobacter Baumannii

Authors: Irene Alevizos, Jessica Lewis, Marina Harper, John Boyce

Abstract:

Acinetobacter baumannii causes a range of severe nosocomial-acquired infections, and many strains are multi-drug resistant. A. baumannii possesses survival mechanisms allowing it to thrive in competitive polymicrobial environments, including a Type VI Secretion System (T6SS) that injects effector proteins into other bacteria to give a competitive advantage. The effects of T6SS firing are broad and depend entirely on the effector that is delivered. Effects can include toxicity against prokaryotic or eukaryotic cells and the acquisition of essential nutrients. The T6SS of some species can deliver ‘specialised effectors’ that are fused directly to T6SS components, such as PAAR proteins. PAAR proteins are predicted to form the piercing tip of the T6SS and are essential for T6SS function. Although no specialised effectors have been identified in A. baumannii, many strains encode multiple PAAR proteins. Analysis of PAAR proteins across the species identified 12 families of PAAR proteins with distinct C-terminal extensions. A. baumannii AB307-0294 encodes two PAAR proteins, one of which has a C-terminal extension. Mutation of one or both of the PAAR-encoding genes in this strain showed that expression of either PAAR protein was sufficient for T6SS function. We employed a heterologous expression approach and determined that PAAR proteins from different A. baumannii strains, as well as the closely related A. baylyi species, could complement the A. baumannii ∆paar mutant and restore T6SS function. Furthermore, we showed that PAAR fusions could be used to deliver artificially cloned protein fragments by generating Histidine- and Streptavidin- tagged PAAR specialised effectors, which restored T6SS activity. This provides evidence that the fusion of protein fragments onto PAAR proteins in A. baumannii is compatible with a functional T6SS. Successful delivery by this mechanism extends the scope of what the T6SS can deliver, including user designed proteins.

Keywords: A. baumannii, effectors, PAAR, T6SS

Procedia PDF Downloads 92
60 A Phishing Email Detection Approach Using Machine Learning Techniques

Authors: Kenneth Fon Mbah, Arash Habibi Lashkari, Ali A. Ghorbani

Abstract:

Phishing e-mails are a security issue that not only annoys online users, but has also resulted in significant financial losses for businesses. Phishing advertisements and pornographic e-mails are difficult to detect as attackers have been becoming increasingly intelligent and professional. Attackers track users and adjust their attacks based on users’ attractions and hot topics that can be extracted from community news and journals. This research focuses on deceptive Phishing attacks and their variants such as attacks through advertisements and pornographic e-mails. We propose a framework called Phishing Alerting System (PHAS) to accurately classify e-mails as Phishing, advertisements or as pornographic. PHAS has the ability to detect and alert users for all types of deceptive e-mails to help users in decision making. A well-known email dataset has been used for these experiments and based on previously extracted features, 93.11% detection accuracy is obtainable by using J48 and KNN machine learning techniques. Our proposed framework achieved approximately the same accuracy as the benchmark while using this dataset.

Keywords: phishing e-mail, phishing detection, anti phishing, alarm system, machine learning

Procedia PDF Downloads 333
59 Differential Item Functioning in the Vocabulary Test of Grade 7 Students in Public and Private Schools

Authors: Dave Kenneth Tayao Cayado, Carlo P. Magno

Abstract:

The most common source of bias detected are those of gender and socioeconomic status. The present study investigated the Differential Item Functioning (DIF) or item bias between public and private school students in a vocabulary test. Studies on DIF were expanded by using the type of school as a source of bias. There were 200 participants in this study. 100 came from a public secondary school and 100 came from a private secondary school. The vocabulary skills of students were measured using a standardized vocabulary test for grade 7 students. Using DIF, specifically the Rasch-Welch approach, it was found that out of 24 items, 12 were biased for a specific group. The vocabulary skills on the use of slang, idiomatic expression, personification, collocations, and partitive relations were biased for private schools while the use of slang and homonymous words were biased for public school students. The analysis debunked the trend that private school students are outperforming public school students in terms of academic achievement. It was revealed that there are some competencies that private school students are having difficulty and vice versa.

Keywords: differential item functioning, item bias, public school students, private school students, vocabulary

Procedia PDF Downloads 181