Search results for: private cloud
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2395

Search results for: private cloud

1975 Multimodal Biometric Cryptography Based Authentication in Cloud Environment to Enhance Information Security

Authors: D. Pugazhenthi, B. Sree Vidya

Abstract:

Cloud computing is one of the emerging technologies that enables end users to use the services of cloud on ‘pay per usage’ strategy. This technology grows in a fast pace and so is its security threat. One among the various services provided by cloud is storage. In this service, security plays a vital factor for both authenticating legitimate users and protection of information. This paper brings in efficient ways of authenticating users as well as securing information on the cloud. Initial phase proposed in this paper deals with an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. Unique identification and slow intrusive formulates an advanced reliability on user-behaviour based biometrics than conventional means of password authentication. By biometric systems, the accounts are accessed only by a legitimate user and not by a nonentity. The biometric templates employed here do not include single trait but multiple, viz., iris and finger prints. The coordinating stage of the authentication system functions on Ensemble Support Vector Machine (SVM) and optimization by assembling weights of base SVMs for SVM ensemble after individual SVM of ensemble is trained by the Artificial Fish Swarm Algorithm (AFSA). Thus it helps in generating a user-specific secure cryptographic key of the multimodal biometric template by fusion process. Data security problem is averted and enhanced security architecture is proposed using encryption and decryption system with double key cryptography based on Fuzzy Neural Network (FNN) for data storing and retrieval in cloud computing . The proposing scheme aims to protect the records from hackers by arresting the breaking of cipher text to original text. This improves the authentication performance that the proposed double cryptographic key scheme is capable of providing better user authentication and better security which distinguish between the genuine and fake users. Thus, there are three important modules in this proposed work such as 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. The extraction of the feature and texture properties from the respective fingerprint and iris images has been done initially. Finally, with the help of fuzzy neural network and symmetric cryptography algorithm, the technique of double key encryption technique has been developed. As the proposed approach is based on neural networks, it has the advantage of not being decrypted by the hacker even though the data were hacked already. The results prove that authentication process is optimal and stored information is secured.

Keywords: artificial fish swarm algorithm (AFSA), biometric authentication, decryption, encryption, fingerprint, fusion, fuzzy neural network (FNN), iris, multi-modal, support vector machine classification

Procedia PDF Downloads 258
1974 Performance Analysis of Search Medical Imaging Service on Cloud Storage Using Decision Trees

Authors: González A. Julio, Ramírez L. Leonardo, Puerta A. Gabriel

Abstract:

Telemedicine services use a large amount of data, most of which are diagnostic images in Digital Imaging and Communications in Medicine (DICOM) and Health Level Seven (HL7) formats. Metadata is generated from each related image to support their identification. This study presents the use of decision trees for the optimization of information search processes for diagnostic images, hosted on the cloud server. To analyze the performance in the server, the following quality of service (QoS) metrics are evaluated: delay, bandwidth, jitter, latency and throughput in five test scenarios for a total of 26 experiments during the loading and downloading of DICOM images, hosted by the telemedicine group server of the Universidad Militar Nueva Granada, Bogotá, Colombia. By applying decision trees as a data mining technique and comparing it with the sequential search, it was possible to evaluate the search times of diagnostic images in the server. The results show that by using the metadata in decision trees, the search times are substantially improved, the computational resources are optimized and the request management of the telemedicine image service is improved. Based on the experiments carried out, search efficiency increased by 45% in relation to the sequential search, given that, when downloading a diagnostic image, false positives are avoided in management and acquisition processes of said information. It is concluded that, for the diagnostic images services in telemedicine, the technique of decision trees guarantees the accessibility and robustness in the acquisition and manipulation of medical images, in improvement of the diagnoses and medical procedures in patients.

Keywords: cloud storage, decision trees, diagnostic image, search, telemedicine

Procedia PDF Downloads 199
1973 Damage Cost for Private Property by Extreme Wind over the past 10 Years in Korea

Authors: Gou-Moon Choi, Woo-Young Jung, Chan-Young Yune

Abstract:

Recently, the natural disaster has increased worldwide. In Korea, the damage to life and property caused by a typhoon, heavy rain, heavy snow, and an extreme wind also increases every year. Among natural disasters, the frequency and the strength of wind have increased because sea surface temperature has risen due to the increase of the average temperature of the Earth. In the case of extreme wind disaster, it is impossible to control or reduce the occurrence, and the recovery cost always exceeds the damage cost. Therefore, quantitative estimation of the damage cost for extreme wind needs to be established beforehand to install proactive countermeasures. In this study, the damage cost for private properties was analyzed based on the data for the past 10 years in Korea. The damage cost curve was also suggested for the metropolitan cities and provinces. The result shows the possibility for the regional application of the damage cost curve because the damage cost of the regional area is estimated based on the cost of cities and provinces.

Keywords: damage cost, extreme wind, natural disaster, private property

Procedia PDF Downloads 300
1972 Influence of Servant Leadership on Faculty Retention in Higher Education Institutes: Mediating Role of Job Satisfaction

Authors: Aneela Sheikh

Abstract:

Private higher education institutes are challenged for their resilience and competitive edge in the globalized knowledge-based economy in the 21st century. Faculty retention plays an important role as a catalyst for addressing the current mega-developmental phenomenon in higher education institutes faced by developing countries. This study intends to explore the influence of servant leadership practice on faculty retention through the intervening role of job satisfaction towards minimizing the high faculty turnover in private higher education institutes, with the mediating role of job satisfaction. A sample of 341 faculty members from ten private higher education institutes in Lahore city of Pakistan, was selected through a stratified proportionate random sampling technique. A descriptive survey research approach was employed to collect data from 341 faculty members by administering a close-ended questionnaire based on a seven-point Likert scale as a self-administered research instrument. The study was conducted under the domain of the Leader-Member Exchange (LMX) theory. The mediating role of job satisfaction was measured by bootstrapping technique. The results revealed that servant leadership has a statistically significant influence on faculty retention, with a statistically significant mediating role of job satisfaction, in private higher education institutes in Pakistan. Further, up to the best of the authors’ knowledge, this is the first systematic and empirical study on faculty retention conducted against the backdrop of servant leadership in an Eastern context, particularly in Pakistan.

Keywords: servant leadership, faculty retention, job satisfaction, higher education institutes

Procedia PDF Downloads 77
1971 Public-Private Partnership Projects in Canada: A Case Study Approach

Authors: Samuel Carpintero

Abstract:

Public-private partnerships (PPP) arrangements have emerged all around the world as a response to infrastructure deficits and the need to refurbish existing infrastructure. The motivations of governments for embarking on PPPs for the delivery of public infrastructure are manifold, and include on-time and on-budget delivery as well as access to private project management expertise. The PPP formula has been used by some State governments in United States and Canada, where the participation of private companies in financing and managing infrastructure projects has increased significantly in the last decade, particularly in the transport sector. On the one hand, this paper examines the various ways used in these two countries in the implementation of PPP arrangements, with a particular focus on risk transfer. The examination of risk transfer in this paper is carried out with reference to the following key PPP risk categories: construction risk, revenue risk, operating risk and availability risk. The main difference between both countries is that in Canada the demand risk remains usually within the public sector whereas in the United States this risk is usually transferred to the private concessionaire. The aim is to explore which lessons can be learnt from both models than might be useful for other countries. On the other hand, the paper also analyzes why the Spanish companies have been so successful in winning PPP contracts in North America during the past decade. Contrary to the Latin American PPP market, the Spanish companies do not have any cultural advantage in the case of the United States and Canada. Arguably, some relevant reasons for the success of the Spanish groups are their extensive experience in PPP projects (that dates back to the late 1960s in some cases), their high technical level (that allows them to be aggressive in their bids), and their good position and track-record in the financial markets. The article’s empirical base consists of data provided by official sources of both countries as well as information collected through face-to-face interviews with public and private representatives of the stakeholders participating in some of the PPP schemes. Interviewees include private project managers of the concessionaires, representatives of banks involved as financiers in the projects, and experts in the PPP industry with close knowledge of the North American market. Unstructured in-depth interviews have been adopted as a means of investigation for this study because of its powers to achieve honest and robust responses and to ensure realism in the collection of an overall impression of stakeholders’ perspectives.

Keywords: PPP, concession, infrastructure, construction

Procedia PDF Downloads 295
1970 A Framework for Analyzing Public Interaction of Saudi Universities on Twitter

Authors: Sahar Al-Qahtani, Rabeeh Ayaz Abbasi, Naif Radi Aljohani

Abstract:

Many universities use social media platforms as new communication channels to disseminate information and promptly communicate with their audience. As Twitter is one of the widely used social media platforms, this research aims to explore the adaption and utilization of Twitter by universities. We propose a framework called 'Social Network Analysis for Universities on Twitter' (SNAUT) to analyze the usage of Twitter by universities and to measure their interaction with public. The study includes a sample of around 110,000 tweets from 36 Saudi universities, including both public and private universities. Using SNAUT, we can (1) investigate the purpose of using Twitter by universities, (2) determine the broad topics discussed by them, and (3) identify the groups closely associated with the universities. The results show that most of the Saudi universities (whether public or private) actively use Twitter. Results also reveal that public universities respond to public queries more frequently, but private universities stand out more in terms of information dissemination using retweets and diverse hashtags. Finally, we develop a ranking mechanism in SNAUT for ranking universities based on their social interaction with the public on Twitter.

Keywords: social media, twitter, social network analysis, universities, higher education, Saudi Arabia

Procedia PDF Downloads 131
1969 Patient Reported Experience of in-Patient Orthognathic Care in an NHS Hospital, in Comparison to a Private Hospital

Authors: R. Litt, A. Kana, K. House

Abstract:

The primary aim of this patient-related experience questionnaire was to gain a better understanding of our patients' experience as inpatients when they undergo orthognathic surgery. The secondary aim of this study was to identify ways in which we can improve the orthognathic inpatient experience and to share this with other units. All patients who received orthognathic surgery at an NHS hospital - Bristol Royal Infirmary, England, over the course of 6 months were asked to complete a questionnaire regarding their care. This data was then analysed and compared to the same questionnaire given to patients treated in a private hospital where orthognathic surgery was completed. All treatment was completed by the same surgeon. The design of the questions took into account NICE (National Institute for Health and Care Excellence) guidance on improving the experience of patient care. Particularly taking into account patients' essential requirements of care, for example, assessing and managing pain, ensuring adequate and appropriate nutrition, and ensuring the patients' personal needs are regularly reviewed and addressed. Overall the patient-related experience after orthognathic surgery was comparable in both the NHS and private hospitals. However, the questionnaire highlighted aspects of inpatient care after orthognathic surgery that can easily be improved in order to provide our patients with the best possible care.

Keywords: orthognathic surgery, patient feedback, jaw surgery, inpatient experience

Procedia PDF Downloads 144
1968 An Institutional Leadership Framework on University Academics’ Decision to Become Institutional Leaders: A Malaysian Perspective

Authors: Norazharuddin Shah Abdullah, Harshita Aini Haroon, Norazian Mohmad Azman, Erlane K. Ghani, Ismie Roha Mohamed Jais, Kamaruzzaman Muhammad, Azleen Ilias

Abstract:

This study examines the factors that influence academics' decisions to accept or decline leadership roles in Malaysian universities. A questionnaire survey was distributed to a total of 1771 academics from public and private institutions in Malaysia. This study shows that the majority of academics in universities, regardless of whether they are public or private, have a reluctance to take on administrative roles. In particular, this study shows that female academics in public universities have no ambition for administrative roles, while female academics in private universities show a strong enthusiasm for taking up administrative positions. In terms of age, academics of all age groups made comparable choices, but academics who are under 30 years old have a greater propensity to aspire to an administrative position. Associate professors at private universities also opt for an administrative position. The factors that influence academics' decisions to accept or decline an administrative position are categorised into five categories: career development, skills and experience, preferences, perceptions, and organization. The findings of this study suggest that the increasing number of academics not seeking institutional leadership positions is a concern, as universities need a sufficient pool of potential successors to effectively fulfil the purpose and vision of the university. This study suggests the implementation of awareness and training initiatives to inspire academics, especially young academics, to take up leadership roles within the institutions.

Keywords: academics, institutional leadership, leadership, universities, Malaysia

Procedia PDF Downloads 54
1967 Cloud Based Supply Chain Traceability

Authors: Kedar J. Mahadeshwar

Abstract:

Concept introduction: This paper talks about how an innovative cloud based analytics enabled solution that could address a major industry challenge that is approaching all of us globally faster than what one would think. The world of supply chain for drugs and devices is changing today at a rapid speed. In the US, the Drug Supply Chain Security Act (DSCSA) is a new law for Tracing, Verification and Serialization phasing in starting Jan 1, 2015 for manufacturers, repackagers, wholesalers and pharmacies / clinics. Similarly we are seeing pressures building up in Europe, China and many countries that would require an absolute traceability of every drug and device end to end. Companies (both manufacturers and distributors) can use this opportunity not only to be compliant but to differentiate themselves over competition. And moreover a country such as UAE can be the leader in coming up with a global solution that brings innovation in this industry. Problem definition and timing: The problem of counterfeit drug market, recognized by FDA, causes billions of dollars loss every year. Even in UAE, the concerns over prevalence of counterfeit drugs, which enter through ports such as Dubai remains a big concern, as per UAE pharma and healthcare report, Q1 2015. Distribution of drugs and devices involves multiple processes and systems that do not talk to each other. Consumer confidence is at risk due to this lack of traceability and any leading provider is at risk of losing its reputation. Globally there is an increasing pressure by government and regulatory bodies to trace serial numbers and lot numbers of every drug and medical devices throughout a supply chain. Though many of large corporations use some form of ERP (enterprise resource planning) software, it is far from having a capability to trace a lot and serial number beyond the enterprise and making this information easily available real time. Solution: The solution here talks about a service provider that allows all subscribers to take advantage of this service. The solution allows a service provider regardless of its physical location, to host this cloud based traceability and analytics solution of millions of distribution transactions that capture lots of each drug and device. The solution platform will capture a movement of every medical device and drug end to end from its manufacturer to a hospital or a doctor through a series of distributor or retail network. The platform also provides advanced analytics solution to do some intelligent reporting online. Why Dubai? Opportunity exists with huge investment done in Dubai healthcare city also with using technology and infrastructure to attract more FDI to provide such a service. UAE and countries similar will be facing this pressure from regulators globally in near future. But more interestingly, Dubai can attract such innovators/companies to run and host such a cloud based solution and become a hub of such traceability globally.

Keywords: cloud, pharmaceutical, supply chain, tracking

Procedia PDF Downloads 525
1966 Development of a Miniature and Low-Cost IoT-Based Remote Health Monitoring Device

Authors: Sreejith Jayachandran, Mojtaba Ghods, Morteza Mohammadzaheri

Abstract:

The modern busy world is running behind new embedded technologies based on computers and software; meanwhile, some people forget to do their health condition and regular medical check-ups. Some of them postpone medical check-ups due to a lack of time and convenience, while others skip these regular evaluations and medical examinations due to huge medical bills and hospital expenses. Engineers and medical experts have come together to give birth to a new device in the telemonitoring system capable of monitoring, checking, and evaluating the health status of the human body remotely through the internet for the needs of all kinds of people. The remote health monitoring device is a microcontroller-based embedded unit. Various types of sensors in this device are connected to the human body, and with the help of an Arduino UNO board, the required analogue data is collected from the sensors. The microcontroller on the Arduino board processes the analogue data collected in this way into digital data and transfers that information to the cloud, and stores it there, and the processed digital data is instantly displayed through the LCD attached to the machine. By accessing the cloud storage with a username and password, the concerned person’s health care teams/doctors and other health staff can collect this data for the assessment and follow-up of that patient. Besides that, the family members/guardians can use and evaluate this data for awareness of the patient's current health status. Moreover, the system is connected to a Global Positioning System (GPS) module. In emergencies, the concerned team can position the patient or the person with this device. The setup continuously evaluates and transfers the data to the cloud, and also the user can prefix a normal value range for the evaluation. For example, the blood pressure normal value is universally prefixed between 80/120 mmHg. Similarly, the RHMS is also allowed to fix the range of values referred to as normal coefficients. This IoT-based miniature system (11×10×10) cm³ with a low weight of 500 gr only consumes 10 mW. This smart monitoring system is manufactured with 100 GBP, which can be used not only for health systems, it can be used for numerous other uses including aerospace and transportation sections.

Keywords: embedded technology, telemonitoring system, microcontroller, Arduino UNO, cloud storage, global positioning system, remote health monitoring system, alert system

Procedia PDF Downloads 82
1965 Numerical Modeling of Air Pollution with PM-Particles and Dust

Authors: N. Gigauri, A. Surmava, L. Intskirveli, V. Kukhalashvili, S. Mdivani

Abstract:

The subject of our study is atmospheric air pollution with numerical modeling. In the presented article, as the object of research, there is chosen city Tbilisi, the capital of Georgia, with a population of one and a half million and a difficult terrain. The main source of pollution in Tbilisi is currently vehicles and construction dust. The concentrations of dust and PM (Particulate Matter) were determined in the air of Tbilisi and in its vicinity. There are estimated their monthly maximum, minimum, and average concentrations. Processes of dust propagation in the atmosphere of the city and its surrounding territory are modelled using a 3D regional model of atmospheric processes and an admixture transfer-diffusion equation. There were taken figures of distribution of the polluted cloud and dust concentrations in different areas of the city at different heights and at different time intervals with the background stationary westward and eastward wind. It is accepted that the difficult terrain and mountain-bar circulation affect the deformation of the cloud and its spread, there are determined time periods when the dust concentration in the city is greater than MAC (Maximum Allowable Concentration, MAC=0.5 mg/m³).

Keywords: air pollution, dust, numerical modeling, PM-particles

Procedia PDF Downloads 134
1964 Water Monitoring Sentinel Cloud Platform: Water Monitoring Platform Based on Satellite Imagery and Modeling Data

Authors: Alberto Azevedo, Ricardo Martins, André B. Fortunato, Anabela Oliveira

Abstract:

Water is under severe threat today because of the rising population, increased agricultural and industrial needs, and the intensifying effects of climate change. Due to sea-level rise, erosion, and demographic pressure, the coastal regions are of significant concern to the scientific community. The Water Monitoring Sentinel Cloud platform (WORSICA) service is focused on providing new tools for monitoring water in coastal and inland areas, taking advantage of remote sensing, in situ and tidal modeling data. WORSICA is a service that can be used to determine the coastline, coastal inundation areas, and the limits of inland water bodies using remote sensing (satellite and Unmanned Aerial Vehicles - UAVs) and in situ data (from field surveys). It applies to various purposes, from determining flooded areas (from rainfall, storms, hurricanes, or tsunamis) to detecting large water leaks in major water distribution networks. This service was built on components developed in national and European projects, integrated to provide a one-stop-shop service for remote sensing information, integrating data from the Copernicus satellite and drone/unmanned aerial vehicles, validated by existing online in-situ data. Since WORSICA is operational using the European Open Science Cloud (EOSC) computational infrastructures, the service can be accessed via a web browser and is freely available to all European public research groups without additional costs. In addition, the private sector will be able to use the service, but some usage costs may be applied, depending on the type of computational resources needed by each application/user. Although the service has three main sub-services i) coastline detection; ii) inland water detection; iii) water leak detection in irrigation networks, in the present study, an application of the service to Óbidos lagoon in Portugal is shown, where the user can monitor the evolution of the lagoon inlet and estimate the topography of the intertidal areas without any additional costs. The service has several distinct methodologies implemented based on the computations of the water indexes (e.g., NDWI, MNDWI, AWEI, and AWEIsh) retrieved from the satellite image processing. In conjunction with the tidal data obtained from the FES model, the system can estimate a coastline with the corresponding level or even topography of the inter-tidal areas based on the Flood2Topo methodology. The outcomes of the WORSICA service can be helpful for several intervention areas such as i) emergency by providing fast access to inundated areas to support emergency rescue operations; ii) support of management decisions on hydraulic infrastructures operation to minimize damage downstream; iii) climate change mitigation by minimizing water losses and reduce water mains operation costs; iv) early detection of water leakages in difficult-to-access water irrigation networks, promoting their fast repair.

Keywords: remote sensing, coastline detection, water detection, satellite data, sentinel, Copernicus, EOSC

Procedia PDF Downloads 122
1963 Effects of Education Equity Policy on Housing Prices: Evidence from Simultaneous Admission to Public and Private Schools Policy in Shanghai

Authors: Tianyu Chen

Abstract:

China's school district education policy has encouraged parents to purchase properties in school districts with high-quality education resources. Shanghai has implemented "Simultaneous Admission to Public and Private Schools" (SAPPS) since 2018, which has covered all nine-year compulsory education by 2020. This study examines the impact of SAPPS on the housing market, specifically the premium effect of houses located in dual-school districts. Based on the Hedonic Pricing Model and the Signaling Theory, data is collected from 585 second-hand house transactions in Pudong New Area, Shanghai, and it is analyzed with the Difference-in-Differences (DID) model. The results indicate that the implementation of SAPPS has exacerbated the premium of dual school district housing and weakened the effect of the policy to a certain degree. To ensure equal access to education for all students, the government should work both on the supply and demand sides of the education resource equation.

Keywords: simultaneous admission to public and private schools, housing prices, education policy, education equity

Procedia PDF Downloads 75
1962 Genodata: The Human Genome Variation Using BigData

Authors: Surabhi Maiti, Prajakta Tamhankar, Prachi Uttam Mehta

Abstract:

Since the accomplishment of the Human Genome Project, there has been an unparalled escalation in the sequencing of genomic data. This project has been the first major vault in the field of medical research, especially in genomics. This project won accolades by using a concept called Bigdata which was earlier, extensively used to gain value for business. Bigdata makes use of data sets which are generally in the form of files of size terabytes, petabytes, or exabytes and these data sets were traditionally used and managed using excel sheets and RDBMS. The voluminous data made the process tedious and time consuming and hence a stronger framework called Hadoop was introduced in the field of genetic sciences to make data processing faster and efficient. This paper focuses on using SPARK which is gaining momentum with the advancement of BigData technologies. Cloud Storage is an effective medium for storage of large data sets which is generated from the genetic research and the resultant sets produced from SPARK analysis.

Keywords: human genome project, Bigdata, genomic data, SPARK, cloud storage, Hadoop

Procedia PDF Downloads 255
1961 Message Authentication Scheme for Vehicular Ad-Hoc Networks under Sparse RSUs Environment

Authors: Wen Shyong Hsieh, Chih Hsueh Lin

Abstract:

In this paper, we combine the concepts of chameleon hash function (CHF) and identification based cryptography (IBC) to build a message authentication environment for VANET under sparse RSUs. Based on the CHF, TA keeps two common secrets that will be embedded to all identities to be as the evidence of mutual trusting. TA will issue one original identity to every RSU and vehicle. An identity contains one public ID and one private key. The public ID, includes three components: pseudonym, random key, and public key, is used to present one entity and can be verified to be a legal one. The private key is used to claim the ownership of the public ID. Based on the concept of IBC, without any negotiating process, a CHF pairing key multiplied by one private key and other’s public key will be used for mutually trusting and to be utilized as the session key of secure communicating between RSUs and vehicles. To help the vehicles to do message authenticating, the RSUs are assigned to response the vehicle’s temple identity request using two short time secretes that are broadcasted by TA. To light the loading of request information, one day is divided into M time slots. At every time slot, TA will broadcast two short time secretes to all valid RSUs for that time slot. Any RSU can response the temple identity request from legal vehicles. With the collected announcement of public IDs from the neighbor vehicles, a vehicle can set up its neighboring set, which includes the information about the neighbor vehicle’s temple public ID and temple CHF pairing key that can be derived by the private key and neighbor’s public key and will be used to do message authenticating or secure communicating without the help of RSU.

Keywords: Internet of Vehicles (IOV), Vehicular Ad-hoc Networks (VANETs), Chameleon Hash Function (CHF), message authentication

Procedia PDF Downloads 389
1960 Medical and Surgical Nursing Care

Authors: Nassim Salmi

Abstract:

This study aimed to identify the administrative, social, cultural, economic and psychological challenges facing the nursing s ector in the Tebessa Algeria. It also seeks to identify whether there are differences between the opinions of managers in public and private hospitals about these challenges. To achieve the objectives of the study, the descriptive analytical method was adopted. The study also used the questionnaire as a tool for collecting the necessary data and information, which was applied to a sample of directors of public and private hospitals in the Tebessa, which amounted to (114) individuals. The study reached a set of results, including: that there are no statistically significant differences between the opinions of managers in public and private hospitals about the administrative, social, cultural, economic and psychological challenges facing the nursing sector in the Tebessa . The results also showed agreement between the views of managers in private public hospitals that the most important administrative challenges are the lack of training programs that affect the efficiency and performance of nursing work, and that the most important social and cultural challenges are the hospital’s failure to provide suitable nurseries for Saudi female nurses, and that the most important economic challenges are the lack of Availability of medical equipment and devices, and the most important psychological challenge is the tense relationship between the administration and the hospital's nursing staff. The study recommended focusing on the importance of rehabilitation and training together, activating the role of training in the ministry and making it compulsory and a condition of renewal for practicing and continuing the nursing profession, and providing the social and economic needs of the nursing staff.

Keywords: postoperative care, gynecology, nursing documentation, database

Procedia PDF Downloads 84
1959 Thermodynamics of Aqueous Solutions of Organic Molecule and Electrolyte: Use Cloud Point to Obtain Better Estimates of Thermodynamic Parameters

Authors: Jyoti Sahu, Vinay A. Juvekar

Abstract:

Electrolytes are often used to bring about salting-in and salting-out of organic molecules and polymers (e.g. polyethylene glycols/proteins) from the aqueous solutions. For quantification of these phenomena, a thermodynamic model which can accurately predict activity coefficient of electrolyte as a function of temperature is needed. The thermodynamics models available in the literature contain a large number of empirical parameters. These parameters are estimated using lower/upper critical solution temperature of the solution in the electrolyte/organic molecule at different temperatures. Since the number of parameters is large, inaccuracy can bethe creep in during their estimation, which can affect the reliability of prediction beyond the range in which these parameters are estimated. Cloud point of solution is related to its free energy through temperature and composition derivative. Hence, the Cloud point measurement can be used for accurate estimation of the temperature and composition dependence of parameters in the model for free energy. Hence, if we use a two pronged procedure in which we first use cloud point of solution to estimate some of the parameters of the thermodynamic model and determine the rest using osmotic coefficient data, we gain on two counts. First, since the parameters, estimated in each of the two steps, are fewer, we achieve higher accuracy of estimation. The second and more important gain is that the resulting model parameters are more sensitive to temperature. This is crucial when we wish to use the model outside temperatures window within which the parameter estimation is sought. The focus of the present work is to prove this proposition. We have used electrolyte (NaCl/Na2CO3)-water-organic molecule (Iso-propanol/ethanol) as the model system. The model of Robinson-Stokes-Glukauf is modified by incorporating the temperature dependent Flory-Huggins interaction parameters. The Helmholtz free energy expression contains, in addition to electrostatic and translational entropic contributions, three Flory-Huggins pairwise interaction contributions viz., and (w-water, p-polymer, s-salt). These parameters depend both on temperature and concentrations. The concentration dependence is expressed in the form of a quadratic expression involving the volume fractions of the interacting species. The temperature dependence is expressed in the form .To obtain the temperature-dependent interaction parameters for organic molecule-water and electrolyte-water systems, Critical solution temperature of electrolyte -water-organic molecules is measured using cloud point measuring apparatus The temperature and composition dependent interaction parameters for electrolyte-water-organic molecule are estimated through measurement of cloud point of solution. The model is used to estimate critical solution temperature (CST) of electrolyte water-organic molecules solution. We have experimentally determined the critical solution temperature of different compositions of electrolyte-water-organic molecule solution and compared the results with the estimates based on our model. The two sets of values show good agreement. On the other hand when only osmotic coefficients are used for estimation of the free energy model, CST predicted using the resulting model show poor agreement with the experiments. Thus, the importance of the CST data in the estimation of parameters of the thermodynamic model is confirmed through this work.

Keywords: concentrated electrolytes, Debye-Hückel theory, interaction parameters, Robinson-Stokes-Glueckauf model, Flory-Huggins model, critical solution temperature

Procedia PDF Downloads 389
1958 Occupational Health and Well-Being of Healthcare Workers at Tertiary Care Hospitals in Lahore, Pakistan: A Comparison of Public and Private Sector

Authors: Mehwish Sarfaraz Ahmad

Abstract:

Background: There is a prevailing perception in Pakistan that private hospitals offer better services than government hospitals. Unfortunately, Pakistan faces challenges in providing efficient healthcare due to limited resources and management capabilities, resulting in demotivation among healthcare workers. Aim: The purpose of this study was to conduct a comprehensive assessment of the occupational health and well-being of healthcare workers in both public and private sector tertiary care hospitals in Lahore, Pakistan, to compare the well-being of healthcare professionals in these two sectors and investigate the influence of workplace culture and experiences on their overall health. Methods: A cross-sectional study was conducted using a validated International Questionnaire, and data from 440 participants was collected using a stratified random sampling technique from a diverse group of healthcare professionals from the public and private tertiary care hospitals in Lahore, Pakistan. The researcher conducted a comparative analysis using appropriate statistical tests, such as Anova, t-tests, chi-square tests, and regression analysis, to explore potential relationships between various factors. Results: The majority of respondents (70.2%) reported their health as "Good" or "Very good, a small percentage (8.2%) rated their health as "Poor," while 24.1% considered their health as "Fair". 39.6% reported being satisfied with their workplace culture, while a majority of 60.4% indicated being unsatisfied with their workplace culture. Results showed that workplace culture has a positive correlation with the overall health and well-being of healthcare professionals. The study found significant differences in health ratings, prevalence of chronic health conditions, workplace culture, and safety perceptions between healthcare professionals in public and private sector tertiary care hospitals. Conclusion: The study's findings emphasize the significance of promoting a positive workplace culture, ensuring workplace safety, and addressing chronic health conditions among healthcare workers.

Keywords: occupational health and well-being, workplace culture, frequency of fatigue, availabity of benefits

Procedia PDF Downloads 66
1957 Evaluating Value of Users' Personal Information Based on Cost-Benefit Analysis

Authors: Jae Hyun Park, Sangmi Chai, Minkyun Kim

Abstract:

As users spend more time on the Internet, the probability of their personal information being exposed has been growing. This research has a main purpose of investigating factors and examining relationships when Internet users recognize their value of private information with a perspective of an economic asset. The study is targeted on Internet users, and the value of their private information will be converted into economic figures. Moreover, how economic value changes in relation with individual attributes, dealer’s traits, circumstantial properties will be studied. In this research, the changes in factors on private information value responding to different situations will be analyzed in an economic perspective. Additionally, this study examines the associations between users’ perceived risk and value of their personal information. By using the cost-benefit analysis framework, the hypothesis that the user’s sense in private information value can be influenced by individual attributes and situational properties will be tested. Therefore, this research will attempt to provide answers for three research objectives. First, this research will identify factors that affect value recognition of users’ personal information. Second, it provides evidences that there are differences on information system users’ economic value of information responding to personal, trade opponent, and situational attributes. Third, it investigates the impact of those attributes on individuals’ perceived risk. Based on the assumption that personal, trade opponent and situation attributes make an impact on the users’ value recognition on private information, this research will present the understandings on the different impacts of those attributes in recognizing the value of information with the economic perspective and prove the associative relationships between perceived risk and decision on the value of users’ personal information. In order to validate our research model, this research used the regression methodology. Our research results support that information breach experience and information security systems is associated with users’ perceived risk. Information control and uncertainty are also related to users’ perceived risk. Therefore, users’ perceived risk is considered as a significant factor on evaluating the value of personal information. It can be differentiated by trade opponent and situational attributes. This research presents new perspective on evaluating the value of users’ personal information in the context of perceived risk, personal, trade opponent and situational attributes. It fills the gap in the literature by providing how users’ perceived risk are associated with personal, trade opponent and situation attitudes in conducting business transactions with providing personal information. It adds to previous literature that the relationship exists between perceived risk and the value of users’ private information in the economic perspective. It also provides meaningful insights to the managers that in order to minimize the cost of information breach, managers need to recognize the value of individuals’ personal information and decide the proper amount of investments on protecting users’ online information privacy.

Keywords: private information, value, users, perceived risk, online information privacy, attributes

Procedia PDF Downloads 232
1956 Food Security in Germany: Inclusion of the Private Sector through Law Reform Faces Challenges

Authors: Agnetha Schuchardt, Jennifer Hartmann, Laura Schulte, Roman Peperhove, Lars Gerhold

Abstract:

If critical infrastructures fail, even for a short period of time, it can have significant negative consequences for the affected population. This is especially true for the food sector that is strongly interlinked with other sectors like the power supply. A blackout could lead to several cities being without food supply for numerous days, simply because cash register systems do no longer work properly. Following the public opinion, securing the food supply in emergencies is considered a task of the state, however, in the German context, the key players are private enterprises and private households. Both are not aware of their responsibility and both cannot be forced to take any preventive measures prior to an emergency. This problem became evident to officials and politicians so that the law covering food security was revised in order to include private stakeholders into mitigation processes. The paper will present a scientific review of governmental and regulatory literature. The focus is the inclusion of the food industry through a law reform and the challenges that still exist. Together with legal experts, an analysis of regulations will be presented that explains the development of the law reform concerning food security and emergency storage in Germany. The main findings are that the existing public food emergency storage is out-dated, insufficient and too expensive. The state is required to protect food as a critical infrastructure but does not have the capacities to live up to this role. Through a law reform in 2017, new structures should to established. The innovation was to include the private sector into the civil defense concept since it has the required knowledge and experience. But the food industry is still reluctant. Preventive measures do not serve economic purposes – on the contrary, they cost money. The paper will discuss respective examples like equipping supermarkets with emergency power supply or self-sufficient cash register systems and why the state is not willing to cover the costs of these measures, but neither is the economy. The biggest problem with the new law is that private enterprises can only be forced to support food security if the state of emergency has occurred already and not one minute earlier. The paper will cover two main results: the literature review and an expert workshop that will be conducted in summer 2018 with stakeholders from different parts of the food supply chain as well as officials of the public food emergency concept. The results from this participative process will be presented and recommendations will be offered that show how the private economy could be better included into a modern food emergency concept (e. g. tax reductions for stockpiling).

Keywords: critical infrastructure, disaster control, emergency food storage, food security, private economy, resilience

Procedia PDF Downloads 182
1955 Analyzing the Quality of Cloud-Based E-Learning Systems on the Perception of the Learners and the Teachers

Authors: R. W. C. Devindi, S. M. Buddika Harshanath

Abstract:

E-learning is a widely used technology for learning in the modern world. With the pandemic situation the popularity of using e-learning has been increased in a larger capacity. The e-learning educational systems require software resources as well as hardware usually but it is hard for most of the education institutions to afford those resources. Also with the massive user load e-learning has to broaden the server side resources as well. Therefore, in the present cloud computing was implemented in order to make the e – learning systems more efficient. The researcher has analyzed the quality of the e-learning systems on the perception of the learners and the teachers with the aid of hypothesis and has given the analyzed results and the discussion in this report. Therefore, the future research will be able to get some steps to increase the quality of the online learning systems furthermore. In the case of e-learning, quality assurance and cost effectiveness are essential. A complex quality assurance system is used in the stated project. There are no well-defined standard evaluation measures in this field. As a result, accurately assessing the e-learning system's overall quality is challenging. The researcher has done the analysis with the aid of standard methods and software.

Keywords: LMS–learning management system, SPSS–statistical package for social sciences (software), eigen value, hypothesis

Procedia PDF Downloads 104
1954 Classroom Incivility Behaviours among Medical Students: A Comparative Study in Pakistan

Authors: Manal Rauf

Abstract:

Trained medical practitioners are produced from medical colleges serving in public and private sectors. Prime responsibility of teaching faculty is to inculcate required work ethic among the students by serving as role models for them. It is an observed fact that classroom incivility behaviours are providing a friction in achieving these targets. Present study aimed at identification of classroom incivility behaviours observed by teachers and students of public and private medical colleges as per Glasser’s Choice Theory, making a comparison and investigating the strategies being adopted by teachers of both sectors to control undesired class room behaviours. Findings revealed that a significant difference occurs between teacher and student incivility behaviours. Public sector teacher focussed on survival as a strong factor behind in civil behaviours whereas private sector teachers considered power as the precedent for incivility. Teachers of both sectors are required to use verbal as well as non-verbal immediacy to reach a healthy leaning environment.

Keywords: classroom incivility behaviour, glasser choice theory, Mehrabian immediacy theory

Procedia PDF Downloads 232
1953 Critical Reflection in Teaching and Learning Mathematics towards Perspective Transformation: Practices in Public and Private Schools

Authors: Arturo Tobias Calizon Jr.

Abstract:

The study investigated the practices in critical reflection being employed in teaching and learning mathematics in public and private schools for students to achieve perspective transformation in psychological, convictional and behavioral dimensions. There were 1,969 senior high school and college student-respondents selected at random from 33 schools. Process reflection is most commonly practiced in both public and private schools. Convictional dimension of perspective transformation is most frequently achieved. There is no significant difference in practices of process reflection between senior high school and college students. However, there is a significant difference in perspective transformation in behavioral dimension achieved by students from public and private schools. Also, there are significant differences in psychological, convictional and behavioral dimensions of perspective transformation achieved by senior high school and college students. There is a high and significant relationship between critical reflection practices and perspective transformation of students. The researcher concludes that there are teaching strategies that facilitate critical thinking, and there are learning activities that alter perspective of students about mathematics as an abstract field. The researcher further concludes that consistent use of appropriate teaching and learning activities could bring about perspective transformation in students with success.

Keywords: critical reflection, perspective transformation, process reflection, convictional dimension, teaching and learning mathematics

Procedia PDF Downloads 153
1952 Cloud Points to Create an Innovative and Custom Ankle Foot Orthosis in CAD Environment

Authors: Y. Benabid, K. Benfriha, V. Rieuf, J. F. Omhover

Abstract:

This paper describes an approach to create custom concepts for innovative products; this approach describes relations between innovation tools and Computer Aided Design environment (use creativity session and design tools). A model for the design process is proposed and explored in order to describe the power tool used to create and ameliorate an innovative product all based upon a range of data (cloud points) in this study. Comparison between traditional method and innovative method we help to generate and put forward a new model of the design process in order to create a custom Ankle Foot Orthosis (AFO) in a CAD environment in order to ameliorate and controlling the motion. The custom concept needs big development in different environments; the relation between these environments is described. The results can help the surgeons in the upstream treatment phases. CAD models can be applied and accepted by professionals in the design and manufacture systems. This development is based on the anatomy of the population of North Africa.

Keywords: ankle foot orthosis, CAD, reverse engineering, sketch

Procedia PDF Downloads 447
1951 Blockchain-Based Approach on Security Enhancement of Distributed System in Healthcare Sector

Authors: Loong Qing Zhe, Foo Jing Heng

Abstract:

A variety of data files are now available on the internet due to the advancement of technology across the globe today. As more and more data are being uploaded on the internet, people are becoming more concerned that their private data, particularly medical health records, are being compromised and sold to others for money. Hence, the accessibility and confidentiality of patients' medical records have to be protected through electronic means. Blockchain technology is introduced to offer patients security against adversaries or unauthorised parties. In the blockchain network, only authorised personnel or organisations that have been validated as nodes may share information and data. For any change within the network, including adding a new block or modifying existing information about the block, a majority of two-thirds of the vote is required to confirm its legitimacy. Additionally, a consortium permission blockchain will connect all the entities within the same community. Consequently, all medical data in the network can be safely shared with all authorised entities. Also, synchronization can be performed within the cloud since the data is real-time. This paper discusses an efficient method for storing and sharing electronic health records (EHRs). It also examines the framework of roles within the blockchain and proposes a new approach to maintain EHRs with keyword indexes to search for patients' medical records while ensuring data privacy.

Keywords: healthcare sectors, distributed system, blockchain, electronic health records (EHR)

Procedia PDF Downloads 184
1950 Impact of Exogenous Risk Factors into Actual Construction Price in PPP Projects

Authors: Saleh Alzahrani, Halim Boussabaine

Abstract:

Many of Public Private Partnership (PPP) are developed based on a public project is to be awarded to a private party within a one contractual framework. PPP project risks typically include the development and construction of a new asset as well as its operation. Certainly the most severe consequences of risks through the construction period are price and time overruns. These events are among the most generally used situation in value for money analysis risks. The sources of risk change during the time in PPP project. In traditional procurement, the public sector usually has to cover all prices suffering from these risks. At least there is plenty to suggest that price suffering is a norm in some of the projects that are delivered under traditional procurement. This paper will find the impact of exogenous risk factors into actual construction price into PPP projects. The paper will present a brief literature review on PPP risk pricing strategies and then using system dynamics (SD) to analyses of the risks associated with the estimated project price. Based on the finding from these analyses a risk pricing association model is presented and discussed. The paper concludes with thoughts for future research.

Keywords: public private partnership (PPP), risk, risk pricing, system dynamics (SD)

Procedia PDF Downloads 551
1949 Heliport Remote Safeguard System Based on Real-Time Stereovision 3D Reconstruction Algorithm

Authors: Ł. Morawiński, C. Jasiński, M. Jurkiewicz, S. Bou Habib, M. Bondyra

Abstract:

With the development of optics, electronics, and computers, vision systems are increasingly used in various areas of life, science, and industry. Vision systems have a huge number of applications. They can be used in quality control, object detection, data reading, e.g., QR-code, etc. A large part of them is used for measurement purposes. Some of them make it possible to obtain a 3D reconstruction of the tested objects or measurement areas. 3D reconstruction algorithms are mostly based on creating depth maps from data that can be acquired from active or passive methods. Due to the specific appliance in airfield technology, only passive methods are applicable because of other existing systems working on the site, which can be blinded on most spectral levels. Furthermore, reconstruction is required to work long distances ranging from hundreds of meters to tens of kilometers with low loss of accuracy even with harsh conditions such as fog, rain, or snow. In response to those requirements, HRESS (Heliport REmote Safeguard System) was developed; which main part is a rotational head with a two-camera stereovision rig gathering images around the head in 360 degrees along with stereovision 3D reconstruction and point cloud combination. The sub-pixel analysis introduced in the HRESS system makes it possible to obtain an increased distance measurement resolution and accuracy of about 3% for distances over one kilometer. Ultimately, this leads to more accurate and reliable measurement data in the form of a point cloud. Moreover, the program algorithm introduces operations enabling the filtering of erroneously collected data in the point cloud. All activities from the programming, mechanical and optical side are aimed at obtaining the most accurate 3D reconstruction of the environment in the measurement area.

Keywords: airfield monitoring, artificial intelligence, stereovision, 3D reconstruction

Procedia PDF Downloads 117
1948 Factors Leading to the Renegotiation of Private Finance Initiative Design-Build-Finance-Operate Road Projects in the UK

Authors: Ajibola Fatokun, Akintola Akintoye, Champika Liyanage

Abstract:

The issue of renegotiation has not received public sector applause because of the outcomes recorded over years. Numerous reasons have been adduced by the stakeholders for the renegotiation of PPP road projects. In some instances, the reason can also be the factor leading to the renegotiation of PFI (DBFO) road projects. Thus, a number of factors inform the decision of the primary stakeholders to renegotiate the contract. This paper, therefore, evaluates and assesses the factors leading to the renegotiation of PFI (DBFO) road projects in the UK. Qualitative interviews involving both public and private stakeholders were extensively adopted on five PFI (DBFO) case study road projects in order to address the aim of this study. This serves to complement the findings of the literature with respect to the factors leading to the renegotiation of PPP road projects. The findings of this research reveal the respective factors leading to the renegotiations of PFI (DBFO) road projects in the UK. However, the prominent factors are a change in scope of the works necessitating works removal and an addition of assets, change in standards and obsolete specification occasioned by the long duration of the PFI road project concession among others.

Keywords: renegotiation, factors, Private Finance Initiative (PFI), design-build-finance-operate (DBFO) road projects

Procedia PDF Downloads 339
1947 Alternative Funding Strategies for Tertiary Education in Nigeria: Quest for Improved Quality of Teaching and Learning

Authors: Temitayo Olaitan

Abstract:

There is a growing concern about the quality of Nigerian tertiary education. This paper maintains that quality in tertiary education relates to the development of intellectual independence, which sharpens the minds of the individual and helps transform the society economically, socially and politically. However, the paper underscores underfunding as a critical challenge to the quality of teaching and learning in tertiary education. To this end, this paper emphasizes the role of internally generated revenue (IGR) and other alternative funding strategies (public-private partnership) as inevitable for quality tertiary education. This paper hinges on stakeholders approach as a means of ensuring quality teaching and learning in tertiary education. This paper recommends that school managers should seek professional and more efficient ways of developing their revenue generating systems. It also recommends that institutions should restructure to accommodate an alternative funding strategy such as private/corporate sponsorship to ensure that sustainable initiatives are created. The paper concludes that Nigerian government should come up with a policy on how private sectors should support in improving the quality of tertiary education through active participation in funding and physical facilities development in Nigerian higher institutions of learning.

Keywords: alternative funding, budgetary allocation, quality education, tertiary education

Procedia PDF Downloads 454
1946 Measuring Satisfaction with Life Construct Among Public and Private University Students During COVID-19 Pandemic in Sabah, Malaysia

Authors: Mohd Dahlan Abdul Malek, Muhamad Idris, Adi Fahrudin, Ida Shafinaz Mohamed Kamil, Husmiati Yusuf, Edeymend Reny Japil, Wan Anor Wan Sulaiman, Lailawati Madlan, Alfred Chan, Nurfarhana Adillah Aftar, Mahirah Masdin

Abstract:

This research intended to develop a valid and reliable instrument of the Satisfaction with Life Scale (SWLS) to measure satisfaction with life (SWL) constructs among public and private university students in Sabah, Malaysia, through the exploratory factor analysis (EFA) procedure. The pilot study obtained a sample of 108 students from public and private education institutions in Sabah, Malaysia, through an online survey using a self-administered questionnaire. The researchers performed the EFA procedure on SWL construct using IBM SPSS 25. The Bartletts' Test of Sphericity is highly significant (Sig. = .000). Furthermore, the sampling adequacy by Kaiser-Meyer-Olkin (KMO = 0.839) is excellent. Using the extraction method of Principal Component Analysis (PCA) with Varimax Rotation, a component of the SWL construct is extracted with an eigenvalue of 3.101. The variance explained for this component is 62.030%. The construct of SWL has Cronbach's alpha value of .817. The development scale and validation confirmed that the instrument is consistent and stable with both private and public college and university student samples. It adds a remarkable contribution to the measurement of SWLS, mainly in the context of higher education institution students. The EFA outcomes formed a configuration that extracts a component of SWL, which can be measured by the original five items established in this research. This research reveals that the SWL construct is applicable to this study.

Keywords: satisfaction, university students, measurement, scale development

Procedia PDF Downloads 88