Search results for: information systems failure
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 19741

Search results for: information systems failure

19291 River Bank Erosion Studies: A Review on Investigation Approaches and Governing Factors

Authors: Azlinda Saadon

Abstract:

This paper provides detail review on river bank erosion studies with respect to their processes, methods of measurements and factors governing river bank erosion. Bank erosion processes are commonly associated with river changes initiation and development, through width adjustment and planform evolution. It consists of two main types of erosion processes; basal erosion due to fluvial hydraulic force and bank failure under the influence of gravity. Most studies had only focused on one factor rather than integrating both factors. Evidences of previous works have shown integration between both processes of fluvial hydraulic force and bank failure. Bank failure is often treated as probabilistic phenomenon without having physical characteristics and the geotechnical aspects of the bank. This review summarizes the findings of previous investigators with respect to measurement techniques and prediction rates of river bank erosion through field investigation, physical model and numerical model approaches. Factors governing river bank erosion considering physical characteristics of fluvial erosion are defined.

Keywords: river bank erosion, bank erosion, dimensional analysis, geotechnical aspects

Procedia PDF Downloads 414
19290 Structural Safety Assessment of Transmission Tower with High-Low Legs

Authors: Chi-Rung Jiang, Chun-Chung Chen, Sheng-Yuan Shiao, Fang-Yao Yeh

Abstract:

Transmission lines are essential for power systems which play a significant role in a city for the development of infrastructures. Once a tower on the transmission line is damaged or becomes unstable, small-scale transmission tower damage might cause a large-scale electric power failure, and consequently, the enormous economic losses will occur. This paper assesses the structural safety and considers the impact of earthquakes and winds, presents a preliminary study of transmission tower with high-low legs by building structural analysis models of towers. The result shows that the high-low legs towers do have some structural characteristics need to be considered, such as the length of the difference of high legs and low legs should be restricted and the deployment direction of legs must be carefully planned during the design of transmission towers. The outcome of this study is beneficial to power systems authorities.

Keywords: power transition tower, structural analysis, high-low legs, safety assessment

Procedia PDF Downloads 206
19289 The Major Challenge of the Health System Health Management Services in Kosovo and Impact on Satisfaction

Authors: Nevruz Zogu, Shpetim Rezniqi

Abstract:

In the framework of transformational economic development social pluralism and the free, market health systems operating in the countries of our region are naturally involved in a process of profound change and reform. Health systems actually represent complex ensembles centers and public and private institutions (domestic and foreign), who administer substantial amounts of human, technological, material, financial, information and scientific facts • The goal of health systems is much more than medical care. It includes the promotion, protection, treatment and rehabilitation of health of the population. • Meeting the needs of increasingly diverse broader health services efficient, secure the quality and affordability of their increasing cost of unstoppable, requires the necessary reform of health systems and implementing policies and new management methods, to ensure effectiveness and health benefits as higher population.

Keywords: health, management, economy, finance

Procedia PDF Downloads 406
19288 Cooperative Scheme Using Adjacent Base Stations in Wireless Communication

Authors: Young-Min Ko, Seung-Jun Yu, Chang-Bin Ha, Hyoung-Kyu Song

Abstract:

In a wireless communication system, the failure of base station can result in a communication disruption in the cell. This paper proposes a way to deal with the failure of base station in a wireless communication system based on OFDM. Cooperative communication of the adjacent base stations can be a solution of the problem. High performance is obtained by the configuration of transmission signals which is applied CDD scheme in the cooperative communication. The Cooperative scheme can be a effective solution in case of the particular situation.

Keywords: base station, CDD, OFDM, diversity gain, MIMO

Procedia PDF Downloads 467
19287 A Novel Image Steganography Method Based on Mandelbrot Fractal

Authors: Adnan H. M. Al-Helali, Hamza A. Ali

Abstract:

The growth of censorship and pervasive monitoring on the Internet, Steganography arises as a new means of achieving secret communication. Steganography is the art and science of embedding information within electronic media used by common applications and systems. Generally, hiding information of multimedia within images will change some of their properties that may introduce few degradation or unusual characteristics. This paper presents a new image steganography approach for hiding information of multimedia (images, text, and audio) using generated Mandelbrot Fractal image as a cover. The proposed technique has been extensively tested with different images. The results show that the method is a very secure means of hiding and retrieving steganographic information. Experimental results demonstrate that an effective improvement in the values of the Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Normalized Cross Correlation (NCC), and Image Fidelity (IF) over the pervious techniques.

Keywords: fractal image, information hiding, Mandelbrot set fractal, steganography

Procedia PDF Downloads 604
19286 FEM and Experimental Modal Analysis of Computer Mount

Authors: Vishwajit Ghatge, David Looper

Abstract:

Over the last few decades, oilfield service rolling equipment has significantly increased in weight, primarily because of emissions regulations, which require larger/heavier engines, larger cooling systems, and emissions after-treatment systems, in some cases, etc. Larger engines cause more vibration and shock loads, leading to failure of electronics and control systems. If the vibrating frequency of the engine matches the system frequency, high resonance is observed on structural parts and mounts. One such existing automated control equipment system comprising wire rope mounts used for mounting computers was designed approximately 12 years ago. This includes the use of an industrial- grade computer to control the system operation. The original computer had a smaller, lighter enclosure. After a few years, a newer computer version was introduced, which was 10 lbm heavier. Some failures of internal computer parts have been documented for cases in which the old mounts were used. Because of the added weight, there is a possibility of having the two brackets impact each other under off-road conditions, which causes a high shock input to the computer parts. This added failure mode requires validating the existing mount design to suit the new heavy-weight computer. This paper discusses the modal finite element method (FEM) analysis and experimental modal analysis conducted to study the effects of vibration on the wire rope mounts and the computer. The existing mount was modelled in ANSYS software, and resultant mode shapes and frequencies were obtained. The experimental modal analysis was conducted, and actual frequency responses were observed and recorded. Results clearly revealed that at resonance frequency, the brackets were colliding and potentially causing damage to computer parts. To solve this issue, spring mounts of different stiffness were modeled in ANSYS software, and the resonant frequency was determined. Increasing the stiffness of the system increased the resonant frequency zone away from the frequency window at which the engine showed heavy vibrations or resonance. After multiple iterations in ANSYS software, the stiffness of the spring mount was finalized, which was again experimentally validated.

Keywords: experimental modal analysis, FEM Modal Analysis, frequency, modal analysis, resonance, vibration

Procedia PDF Downloads 306
19285 Sodium-glucose Co-transporter-2 Inhibitors in Heart Failure with Mildly Reduced Reduced Ejection Fraction: Future Perspectives in Patients with Neoplasia

Authors: M. A. Munteanu, A. M. Lungu, A. I. Chivescu, V. Teodorescu, E. Tufanoiu, C. Nicolae, T. I. Nanea

Abstract:

Introduction: Sodium-glucose co-transporter 2 inhibitors (SGLT2i), which were first developed as antidiabetic medications, have demonstrated numerous positive benefits on the cardiovascular system, especially in the prevention of heart failure (HF). HF is a challenging, multifaceted disease that needs all-encompassing therapy. It should not be viewed as a limited form of heart illness but rather as a systemic disease that leads to multiple organ failure and death. SGLT2i is an extremely effective tool for treating HF by using its pleiotropic effects. In addition to its use in patients with diabetes mellitus who are at high cardiovascular risk or who have already experienced a cardiovascular event, SGLT2i administration has been shown to have positive effects on a variety of HF manifestations and stages, regardless of the patient's presence of diabetes mellitus. Material and Methods: According to the guide, 110 patients (83 males and 27 females) with heart failure with mildly reduced ejection fraction (HFmrEF), with T2D and neoplasia, were enrolled in the prospective study. The structural and functional state of the left ventricle myocardium and ejection fraction was assessed through echocardiography. Patients were randomized to receive once-daily dapagliflozin 10 mg. Results: Patients with HFmrEF were divided into 3 subgroups according to age. 7% (8) patients aged < 45 years, 35% (28) patients aged between 46-59 years, and 58% (74) patients aged> 60 years. The most prevalent comorbidities were hypertension (43.1%), coronary heart disease (40%), and obesity (33.2%). Study drug discontinuation and serious adverse events were not frequent in the subgroups, in either men or women, until now. Conclusions: SGLT-2 inhibitors are a novel class of antidiabetic agents that have demonstrated positive efficacy and safety outcomes in the setting of HFmrEF. Until now, in our study, dapagliflozin was safe and well-tolerated irrespective of sex.

Keywords: diabetes mellitus type 2, Sodium-glucose co-transporters-2 inhibitors, heart failure, neoplasia

Procedia PDF Downloads 66
19284 Challenges and Success Factors in Introducing Information Systems for Students' Online Registration

Authors: Stanley Fore, Sharon Chipeperekwa

Abstract:

The start of the 2011 academic year in South Africa saw a number of Institutions of Higher Learning introducing online registration for their students. The efficiency and effectiveness of Information Systems are increasingly becoming a necessity and not an option for many organizations. An information system should be able to allow end users to access information easily and navigate with ease. The selected University of Technology (UoT) in this research is one of the largest public institution of higher learning in the Western Cape Province and boasts of an enrolment of more than 30000 students per academic year. An observation was made that, during registration students’ stand in long queues waiting to register or for assistance to register. The system tends to ‘freeze’ whilst students are registering and students are in most cases unfamiliar with the system interface. They constantly have to enquire what to do next when going through online registration process. A mixed method approach will be adopted which comprises of quantitative and qualitative approaches. The study uses constructs of the updated DeLone and McLean IS success model (2003) to analyse and explain the student’s perceptions of the online registration system. The research was undertaken to establish the student’s perceptions of the online registration system. This research seeks to identify and analyse the challenges and success factors of introducing an online registration system whilst highlighting the extent to which this system has been able to solve the numerous problems associated with the manual era. The study will assist management and those responsible for managing the current system to determine how well the system is working or not working to achieve user satisfaction. It will also assist them going forward on what to consider before, during and after implementation of an information system. Respondents will be informed of the objectives of the research, and their consent to participate will be sought. Ethical considerations that will be applied to this study include; informed consent and protection from harm, right to privacy and involvement of the research.

Keywords: online registration, information systems, University of Technology, end-users

Procedia PDF Downloads 232
19283 In Case of Possible Disaster Management with Geographic Information System in Konya

Authors: Savaş Durduran, Ceren Yağci

Abstract:

The nature of the events going on in the world, when people’s lives are considered significantly affects natural disasters. Considering thousands of years of earth history, it is seen that many natural disasters, particularly earthquakes located in our country. Behaving cautious, without occurring hazards, after being disaster is much easier and cost effective than returning to the normal life. The four phases of disaster management in the whole world has been described as; pre-disaster preparedness and mitigation, post-disaster response and rehabilitation studies. Pre-disaster and post-disaster phases has half the weight of disaster management. How much would be prepared for disaster, no matter how disaster damage reducing work gives important, we will be less harm from material and spiritual sense. To do this in a systematic way we use the Geographic Information Systems (GIS). The execution of the emergency services to be on time and emergency control mechanism against the development the most appropriate decision Geographic Information System GIS) can be useful. The execution of the emergency services to be on time and emergency control mechanism towards for developing to be the most appropriate decision Geographic Information System (GIS) can be useful. The results obtained by using products with GIS analysis of seismic data to the city, manager of the city required information and data that can be more healthy and satisfies the appropriate policy decisions can be produced. In this study, using ArcGIS software and benefiting reports of the earthquake that occurred in the Konya city, spatial and non-spatial data consisting databases created, by the help of this database a potential disaster management aimed in the city of Konya regard to urban earthquake, GIS-aided analyzes were performed.

Keywords: geographic information systems (GIS), disaster management, emergency control mechanism, Konya

Procedia PDF Downloads 456
19282 Global Best Practice Paradox; the Failure of One Size Fits All Approach to Development a Case Study of Pakistan

Authors: Muhammad Naveed Iftikhar, Farah Khalid

Abstract:

Global best practices as ordained by international organizations comprise a broader top-down approach to development problems, without taking into account country-specific factors. The political economy of each country is extremely different and the failure of several attempts of international organizations to implement global best practice models in developing countries each with its unique set of variables, goes on to show that this is not the most efficient solution to development problems. This paper is a humble attempt at shedding light on some specific examples of failures of the global best practices. Pakistan has its unique set of problems and unless those are added to the broader equation of development, country-specific reform and growth will continue to pose a challenge to reform programs initiated by international organizations. The three case studies presented in this paper are just a few prominent examples of failure of the global best practice, top-down, universalistic approach to development as ordained by international organizations. Development and reform can only be achieved if local dynamics are given their due importance. The modus operandi of international organizations needs to be tailored according to each country’s unique politico-economic environment.

Keywords: best practice, development, context

Procedia PDF Downloads 448
19281 A Crossover Study of Therapeutic Equivalence of Generic Product Versus Reference Product of Ivabradine in Patients with Chronic Heart Failure

Authors: Hadeer E. Eliwa, Naglaa S. Bazan, Ebtissam A. Darweesh, Nagwa A. Sabri

Abstract:

Background: Generic substitution of brand ivabradine prescriptions can reduce drug expenditures and improve adherence. However, the distrust of generic medicines by practitioners and patients due to doubts regarding their quality and fear of counterfeiting compromise the acceptance of this practice. Aim: The goal of this study is to compare the therapeutic equivalence of brand product versus the generic product of ivabradine in adult patients with chronic heart failure with reduced ejection fraction (≤ 40%) (HFrEF). Methodology: Thirty-two Egyptian patients with chronic heart failure with reduced ejection fraction (HFrEF) were treated with branded ivabradine (Procrolan ©) and generic (Bradipect ©) during 24 (2x12) weeks. Primary outcomes were resting heart rate (HR), NYHA FC, Quality of life (QoL) using Minnesota Living with Heart Failure (MLWHF) and EF. Secondary outcomes were the number of hospitalizations for worsening HFrEF and adverse effects. The washout period was not allowed. Findings: At the 12th week, the reduction in HR was comparable in the two groups (90.13±7.11 to 69±11.41 vs 96.13±17.58 to 67.31±8.68 bpm in brand and generic groups, respectively). Also, the increase in EF was comparable in the two groups (27.44 ±4.59 to 33.38±5.62 vs 32±5.96 to 39.31±8.95 in brand and generic groups, respectively). The improvement in NYHA FC was comparable in both groups (87.5% in brand group vs 93.8% in the generic group). The mean value of the QOL improved from 31.63±15.8 to 19.6±14.7 vs 35.68±17.63 to 22.9±15.1 for the brand and generic groups, respectively. Similarly, at end of 24 weeks, no significant changes were observed from data observed at 12th week regarding HR, EF, QoL and NYHA FC. Only minor side effects, mainly phosphenes, and a comparable number of hospitalizations were observed in both groups. Conclusion: The study revealed no statistically significant differences in the therapeutic effect and safety between generic and branded ivabradine. We assume that practitioners can safely interchange between them for economic reasons.

Keywords: bradipect©, heart failure, ivabradine, Procrolan ©, therapeutic equivalence

Procedia PDF Downloads 447
19280 A Systematic Analysis of Knowledge Development Trends in Industrial Maintenance Projects

Authors: Lilian Ogechi Iheukwumere-Esotu, Akilu Yunusa-Kaltungo, Paul Chan

Abstract:

Industrial assets are prone to degradation and eventual failures due to repetitive loads and harsh environments in which they operate. These failures often lead to costly downtimes, which may involve loss of critical assets and/or human lives. The rising pressures from stakeholders for optimized systems’ outputs have further placed strains on business organizations. Traditional means of combating such failures are by adopting strategies capable of predicting, controlling, and/or reducing the likelihood of systems’ failures. Turnarounds, shutdowns, and outages (TSOs) projects are popular maintenance management activities conducted over a certain period of time. However, despite the critical and significant cost implications of TSOs, the management of the interface of knowledge between academia and industry to our best knowledge has not been fully explored in comparison to other aspects of industrial operations. This is perhaps one of the reasons for the limited knowledge transfer between academia and industry, which has affected the outcomes of most TSOs. Prior to now, the study of knowledge development trends as a failure analysis tool in the management of TSOs projects have not gained the required level of attention. Hence, this review provides useful references and their implications for future studies in this field. This study aims to harmonize the existing research trends of TSOs through a systematic review of more than 3,000 research articles published over 7 decades (1940- till date) which were extracted using very specific research criteria and later streamlined using nominated inclusion and exclusion parameters. The information obtained from the analysis were then synthesized and coded into 8 parameters, thereby allowing for a transformation into actionable outputs. The study revealed a variety of information, but the most critical findings can be classified into 4 folds: (1) Empirical validation of available conceptual frameworks and models is still a far cry in practice, (2) traditional project management views for managing uncertainties are still dominant, (3) Inconsistent approaches towards the adoption and promotion of knowledge management systems which supports creation, transfer and application of knowledge within and outside the project organization and, (4) exploration of social practices in industrial maintenance project environments are under-represented within the existing body of knowledge. Thus, the intention of this study is to depict the usefulness of a framework which incorporates fact findings emanating from careful analysis and illustrations of evidence based results as a suitable approach which can tackle reoccurring failures in industrial maintenance projects.

Keywords: industrial maintenance, knowledge management, maintenance projects, systematic review, TSOs

Procedia PDF Downloads 106
19279 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection

Authors: Mahshid Arabi

Abstract:

With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.

Keywords: data protection, digital technologies, information security, modern management

Procedia PDF Downloads 13
19278 Flood-prone Urban Area Mapping Using Machine Learning, a Case Sudy of M'sila City (Algeria)

Authors: Medjadj Tarek, Ghribi Hayet

Abstract:

This study aims to develop a flood sensitivity assessment tool using machine learning (ML) techniques and geographic information system (GIS). The importance of this study is integrating the geographic information systems (GIS) and machine learning (ML) techniques for mapping flood risks, which help decision-makers to identify the most vulnerable areas and take the necessary precautions to face this type of natural disaster. To reach this goal, we will study the case of the city of M'sila, which is among the areas most vulnerable to floods. This study drew a map of flood-prone areas based on the methodology where we have made a comparison between 3 machine learning algorithms: the xGboost model, the Random Forest algorithm and the K Nearest Neighbour algorithm. Each of them gave an accuracy respectively of 97.92 - 95 - 93.75. In the process of mapping flood-prone areas, the first model was relied upon, which gave the greatest accuracy (xGboost).

Keywords: Geographic information systems (GIS), machine learning (ML), emergency mapping, flood disaster management

Procedia PDF Downloads 75
19277 Feasibility Study on Developing and Enhancing of Flood Forecasting and Warning Systems in Thailand

Authors: Sitarrine Thongpussawal, Dasarath Jayasuriya, Thanaroj Woraratprasert, Sakawtree Prajamwong

Abstract:

Thailand grapples with recurrent floods causing substantial repercussions on its economy, society, and environment. In 2021, the economic toll of these floods amounted to an estimated 53,282 million baht, primarily impacting the agricultural sector. The existing flood monitoring system in Thailand suffers from inaccuracies and insufficient information, resulting in delayed warnings and ineffective communication to the public. The Office of the National Water Resources (OWNR) is tasked with developing and integrating data and information systems for efficient water resources management, yet faces challenges in monitoring accuracy, forecasting, and timely warnings. This study endeavors to evaluate the viability of enhancing Thailand's Flood Forecasting and Warning (FFW) systems. Additionally, it aims to formulate a comprehensive work package grounded in international best practices to enhance the country's FFW systems. Employing qualitative research methodologies, the study conducted in-depth interviews and focus groups with pertinent agencies. Data analysis involved techniques like note-taking and document analysis. The study substantiates the feasibility of developing and enhancing FFW systems in Thailand. Implementation of international best practices can augment the precision of flood forecasting and warning systems, empowering local agencies and residents in high-risk areas to prepare proactively, thereby minimizing the adverse impact of floods on lives and property. This research underscores that Thailand can feasibly advance its FFW systems by adopting international best practices, enhancing accuracy, and improving preparedness. Consequently, the study enriches the theoretical understanding of flood forecasting and warning systems and furnishes valuable recommendations for their enhancement in Thailand.

Keywords: flooding, forecasting, warning, monitoring, communication, Thailand

Procedia PDF Downloads 45
19276 Integrating a Security Operations Centre with an Organization’s Existing Procedures, Policies and Information Technology Systems

Authors: M. Mutemwa

Abstract:

A Cybersecurity Operation Centre (SOC) is a centralized hub for network event monitoring and incident response. SOCs are critical when determining an organization’s cybersecurity posture because they can be used to detect, analyze and report on various malicious activities. For most organizations, a SOC is not part of the initial design and implementation of the Information Technology (IT) environment but rather an afterthought. As a result, it is not natively a plug and play component; therefore, there are integration challenges when a SOC is introduced into an organization. A SOC is an independent hub that needs to be integrated with existing procedures, policies and IT systems of an organization such as the service desk, ticket logging system, reporting, etc. This paper discussed the challenges of integrating a newly developed SOC to an organization’s existing IT environment. Firstly, the paper begins by looking at what data sources should be incorporated into the Security Information and Event Management (SIEM) such as which host machines, servers, network end points, software, applications, web servers, etc. for security posture monitoring. That is which systems need to be monitored first and the order by which the rest of the systems follow. Secondly, the paper also describes how to integrate the organization’s ticket logging system with the SOC SIEM. That is how the cybersecurity related incidents should be logged by both analysts and non-technical employees of an organization. Also the priority matrix for incident types and notifications of incidents. Thirdly, the paper looks at how to communicate awareness campaigns from the SOC and also how to report on incidents that are found inside the SOC. Lastly, the paper looks at how to show value for the large investments that are poured into designing, building and running a SOC.

Keywords: cybersecurity operation centre, incident response, priority matrix, procedures and policies

Procedia PDF Downloads 139
19275 Sudden Death of a Cocaine Body Packer: An Autopsy Examination Findings

Authors: Parthasarathi Pramanik

Abstract:

Body packing is a way of transfer drugs across the international border or any drug prohibited area. The drugs are usually hidden in body packets inside the anatomical body cavities like mouth, intestines, rectum, ear, vagina etc. Cocaine is a very common drug for body packing across the world. A 48 year old male was reported dead in his hotel after complaining of chest pain and vomiting. At autopsy, there were eighty-two white cylindrical body packs in the stomach, small and large intestines. Seals of few of the packets were opened. Toxicological examination revealed presence of cocaine in the stomach, liver, kidney and hair samples. Microscopically, presence of myocardial necrosis with interstitial oedema along with hypertrophy and fibrosis of the myocardial fibre suggested heart failure due to cocaine cardio toxicity. However, focal lymphocyte infiltration and perivascular fibrosis in the myocardium also indicated chronic cocaine toxicity of the deceased. After careful autopsy examination it was considered the victim was died due congestive heart failure secondary to acute and chronic cocaine poisoning.

Keywords: cardiac failure, cocaine, body packer, sudden death

Procedia PDF Downloads 303
19274 Consumption of Fat Burners Leads to Acute Liver Failure: A Systematic Review protocol

Authors: Anjana Aggarwal, Sheilja Walia

Abstract:

Prevalence of obesity and overweight is increasing due to sedentary lifestyles and busy schedules of people that spend less time on physical exercise. To reduce weight, people are finding easier and more convenient ways. The easiest solution is the use of dietary supplements and fat burners. These are products that decrease body weight by increasing the basal metabolic rate. Various reports have been published on the consumption of fat burners leading to heart palpitations, seizures, anxiety, depression, psychosis, bradycardia, insomnia, muscle contractions, hepatotoxicity, and even liver failure. Case reports and series are reporting that the ingredients present in the fat burners caused acute liver failure (ALF) and hepatic toxicity in many cases. Another contributing factor is the absence of regulations from the Food and Drug Administration on these products, leading to increased consumption and a higher risk of liver diseases among the population. This systematic review aims to attain a better understanding of the dietary supplements used globally to reduce weight and document the case reports/series of acute liver failure caused by the consumption of fat burners. Electronic databases like PubMed, Cochrane, Google Scholar, etc., will be systematically searched for relevant articles. Various websites of dietary products and brands that sell such supplements, Journals of Hepatology, National and international projects launched for ALF, and their reports, along with the review of grey literature, will also be done to get a better understanding of the topic. After discussing with the co-author, the selection and screening of the articles will be performed by the author. The studies will be selected based on the predefined inclusion and exclusion criteria. The case reports and case series that will be included in the final list of the studies will be assessed for methodological quality using the CARE guidelines. The results from this study will provide insights and a better understanding of fat burners. Since the supplements are easily available in the market without any restrictions on their sale, people are unaware of their adverse effects. The consumption of these supplements causes acute liver failure. Thus, this review will provide a platform for future larger studies to be conducted.

Keywords: acute liver failure, dietary supplements, fat burners, weight loss supplements

Procedia PDF Downloads 65
19273 The Regulation of Reputational Information in the Sharing Economy

Authors: Emre Bayamlıoğlu

Abstract:

This paper aims to provide an account of the legal and the regulative aspects of the algorithmic reputation systems with a special emphasis on the sharing economy (i.e., Uber, Airbnb, Lyft) business model. The first section starts with an analysis of the legal and commercial nature of the tripartite relationship among the parties, namely, the host platform, individual sharers/service providers and the consumers/users. The section further examines to what extent an algorithmic system of reputational information could serve as an alternative to legal regulation. Shortcomings are explained and analyzed with specific examples from Airbnb Platform which is a pioneering success in the sharing economy. The following section focuses on the issue of governance and control of the reputational information. The section first analyzes the legal consequences of algorithmic filtering systems to detect undesired comments and how a delicate balance could be struck between the competing interests such as freedom of speech, privacy and the integrity of the commercial reputation. The third section deals with the problem of manipulation by users. Indeed many sharing economy businesses employ certain techniques of data mining and natural language processing to verify consistency of the feedback. Software agents referred as "bots" are employed by the users to "produce" fake reputation values. Such automated techniques are deceptive with significant negative effects for undermining the trust upon which the reputational system is built. The third section is devoted to explore the concerns with regard to data mobility, data ownership, and the privacy. Reputational information provided by the consumers in the form of textual comment may be regarded as a writing which is eligible to copyright protection. Algorithmic reputational systems also contain personal data pertaining both the individual entrepreneurs and the consumers. The final section starts with an overview of the notion of reputation as a communitarian and collective form of referential trust and further provides an evaluation of the above legal arguments from the perspective of public interest in the integrity of reputational information. The paper concludes with certain guidelines and design principles for algorithmic reputation systems, to address the above raised legal implications.

Keywords: sharing economy, design principles of algorithmic regulation, reputational systems, personal data protection, privacy

Procedia PDF Downloads 452
19272 Development and Implementation of E-Disease Surveillance Systems for Public Health Southern Africa: A Critical Review

Authors: Taurai T. Chikotie, Bruce W. Watson

Abstract:

The manifestation of ‘new’ infectious diseases and the re-emergence of ‘old’ infectious diseases now present global problems and Southern Africa has not been spared from such calamity. Although having an organized public health system, countries in this region have failed to leverage on the proliferation in use of Information and Communication Technologies to promote effective disease surveillance. Objective: The objective of this study was to critically review and analyse the crucial variables to consider in the development and implementation of electronic disease surveillance systems in public health within the context of Southern Africa. Methodology: A critical review of literature published in English using, Google Scholar, EBSCOHOST, Science Direct, databases from the Centre for Disease Control (CDC and articles from the World Health Organisation (WHO) was undertaken. Manual reference and grey literature searches were also conducted. Results: Little has been done towards harnessing the potential of information technologies towards disease surveillance and this has been due to several challenges that include, lack of funding, lack of health informatics experts, poor supporting infrastructure, an unstable socio-political and socio-economic ecosystem in the region and archaic policies towards integration of information technologies in public health governance. Conclusion: The Southern African region stands to achieve better health outcomes if they adopt the use of e-disease surveillance systems in public health. However, the dynamics and complexities of the socio-economic, socio-political and technical variables would need addressing to ensure the successful development and implementation of e-disease surveillance systems in the region.

Keywords: critical review, disease surveillance, public health informatics, Southern Africa

Procedia PDF Downloads 266
19271 Health Information Technology in Developing Countries: A Structured Literature Review with Reference to the Case of Libya

Authors: Haythem A. Nakkas, Philip J. Scott, Jim S. Briggs

Abstract:

This paper reports a structured literature review of the application of Health Information Technology in developing countries, defined as the World Bank categories Low-income countries, Lower-middle-income, and Upper-middle-income countries. The aim was to identify and classify the various applications of health information technology to assess its current state in developing countries and explore potential areas of research. We offer specific analysis and application of HIT in Libya as one of the developing countries. Method: A structured literature review was conducted using the following online databases: IEEE, Science Direct, PubMed, and Google Scholar. Publication dates were set for 2000-2013. For the PubMed search, publications in English, French, and Arabic were specified. Using a content analysis approach, 159 papers were analyzed and a total number of 26 factors were identified that affect the adoption of health information technology. Results: Of the 2681 retrieved articles, 159 met the inclusion criteria which were carefully analyzed and classified. Conclusion: The implementation of health information technology across developing countries is varied. Whilst it was initially expected financial constraints would have severely limited health information technology implementation, some developing countries like India have nevertheless dominated the literature and taken the lead in conducting scientific research. Comparing the number of studies to the number of countries in each category, we found that Low-income countries and Lower-middle-income had more studies carried out than Upper-middle-income countries. However, whilst IT has been used in various sectors of the economy, the healthcare sector in developing countries is still failing to benefit fully from the potential advantages that IT can offer.

Keywords: developing countries, developed countries, factors, failure, health information technology, implementation, libya, success

Procedia PDF Downloads 340
19270 A Mixed Approach to Assess Information System Risk, Operational Risk, and Congolese Microfinance Institutions Performance

Authors: Alfred Kamate Siviri, Angelus Mafikiri Tsongo, Jean Robert Kala Kamdjoug

Abstract:

Digitalization and information systems well organized have been selected as relevant measures to mitigate operational risks within organizations. Unfortunately, information system comes with new threats that can cause severe damage and quick organization lockout. This study aims to measure perceived information system risks and their effects on operational risks within the microfinance institution in D.R. Congo. Also, the factors influencing the operational risk are identified, and the link between operational risk with other risks and performance is to be assessed. The study proposes a research model drawn on the combination of Resources-Based-View, dynamic capabilities, the agency theory, the Information System Security Model, and social theories of risk. Therefore, we suggest adopting a mixed methods research with the sole aim of increasing the literature that already exists on perceived operational risk assessment and its link with other risk and performance, a focus on IT risk.

Keywords: Democratic Republic Congo, information system risk, microfinance performance, operational risk

Procedia PDF Downloads 207
19269 Law Verses Tradition: Beliefs in and Practices of Witchcraft in Contemporary Ghana and the Law

Authors: Baba Iddrisu Musah

Abstract:

Many Ghanaians, including the rich and downtrodden, elite and unlettered, rural and urban dwellers, politicians and civil servants, in one way or the other, believe in and practice witchcraft. The existence of witches’ camp in northern Ghana, the rise of Pentecostal churches, especially in southern Ghana with the penchant to cleanse people of witchcraft, as well as media reports of witchcraft imputations assuming wider dimensions in the country, often classified as a citadel of democracy, good governance and human rights in Africa, buttress the pervasive nature of belief in and the practice of witchcraft in the country. This is in spite of the fact that tremendous efforts, especially by British colonial authorities, were made to regulate witchcraft beliefs and its associated practices. Informed by Western values and philosophy, witchcraft was considered by colonial authorities as illogical and unscientific. This paper, which is largely a review of existing literature, supplemented by archival information from the national archives of Ghana, focuses on the nature of witchcraft regulation in Ghana’s pre-colonial and colonial past, as well as immediately after Ghana obtained her independence in 1957. This article concludes by rhetorically questioning whether or not believing in and the practice of witchcraft in contemporary Ghana in general, and the existence of witches’ camps in the northern region of the country are attributed to the failure of past regulations, as well as the failure of present government policies.

Keywords: colonial, natives, regulation, witchcraft

Procedia PDF Downloads 235
19268 A Machine Learning Based Method to Detect System Failure in Resource Constrained Environment

Authors: Payel Datta, Abhishek Das, Abhishek Roychoudhury, Dhiman Chattopadhyay, Tanushyam Chattopadhyay

Abstract:

Machine learning (ML) and deep learning (DL) is most predominantly used in image/video processing, natural language processing (NLP), audio and speech recognition but not that much used in system performance evaluation. In this paper, authors are going to describe the architecture of an abstraction layer constructed using ML/DL to detect the system failure. This proposed system is used to detect the system failure by evaluating the performance metrics of an IoT service deployment under constrained infrastructure environment. This system has been tested on the manually annotated data set containing different metrics of the system, like number of threads, throughput, average response time, CPU usage, memory usage, network input/output captured in different hardware environments like edge (atom based gateway) and cloud (AWS EC2). The main challenge of developing such system is that the accuracy of classification should be 100% as the error in the system has an impact on the degradation of the service performance and thus consequently affect the reliability and high availability which is mandatory for an IoT system. Proposed ML/DL classifiers work with 100% accuracy for the data set of nearly 4,000 samples captured within the organization.

Keywords: machine learning, system performance, performance metrics, IoT, edge

Procedia PDF Downloads 181
19267 Hypocalcaemia Inducing Heart Failure: A Rare Presentation

Authors: A. Kherraf, M. Bouziane, L. Azzouzi, R. Habbal

Abstract:

Introduction: Hypocalcaemia is a rare cause of heart failure. We report the clinical case of a young patient with reversible dilated cardiomyopathy secondary to hypocalcaemia in the context of hyperparathyroidism. Clinical case: We report the clinical case of a 23-year-old patient with a history of thyroidectomy for papillary thyroid carcinoma 3 years previously, who presented to the emergency room with a progressive onset dyspnea and edema of the lower limbs. Clinical examination showed hypotension at 90/70 mmHg, tachycardia at 102 bpm, and edema of the lower limbs. The ECG showed a regular sinus rhythm with a prolonged corrected QT interval to 520ms. The chest x-ray showed cardiomegaly. Echocardiography revealed dilated cardiomyopathy with biventricular dysfunction and a left ventricular ejection fraction of 45%, as well as moderate mitral insufficiency by restriction of the posterior mitral leaflet, moderate tricuspid insufficiency, and a dilated inferior vena cava with a pulmonary arterial pressure estimated at 46 mmHg. Blood tests revealed severe hypocalcemia at 38 mg / l with normal albumin and thyroxine levels, as well as hyperphosphatemia and increased TSH. The patient received calcium intake and vitamin D supplementation and was treated with beta blockers, ACE inhibitors, and diuretics with good progress and progressive normalization of cardiac function. Discussion: The cardiovascular manifestations of hypocalcaemia usually appear with deeply low serum calcium levels. This can lead to hypotension, arrhythmias, ventricular fibrillation, prolonged QT interval, or even heart failure. Heart failure is a rare and serious complication of hypocalcemia but most often characterized by complete normalization of myocardial function after treatment. The etiology of the hypocalcaemia, in this case, was probably related to accidental parathyroid removal during thyroidectomy. This is why careful monitoring of calcium levels is recommended after surgery. Conclusion: Hypocalcemic heart failure is rare but reversible heart disease. Systematic monitoring of serum calcium should be performed in all patients after thyroid surgery to avoid any complications related to hypoparathyroidism.

Keywords: hypocalcemia, heart failure, thyroid surgery, hypoparathyroidism

Procedia PDF Downloads 127
19266 Optimal Sequential Scheduling of Imperfect Maintenance Last Policy for a System Subject to Shocks

Authors: Yen-Luan Chen

Abstract:

Maintenance has a great impact on the capacity of production and on the quality of the products, and therefore, it deserves continuous improvement. Maintenance procedure done before a failure is called preventive maintenance (PM). Sequential PM, which specifies that a system should be maintained at a sequence of intervals with unequal lengths, is one of the commonly used PM policies. This article proposes a generalized sequential PM policy for a system subject to shocks with imperfect maintenance and random working time. The shocks arrive according to a non-homogeneous Poisson process (NHPP) with varied intensity function in each maintenance interval. As a shock occurs, the system suffers two types of failures with number-dependent probabilities: type-I (minor) failure, which is rectified by a minimal repair, and type-II (catastrophic) failure, which is removed by a corrective maintenance (CM). The imperfect maintenance is carried out to improve the system failure characteristic due to the altered shock process. The sequential preventive maintenance-last (PML) policy is defined as that the system is maintained before any CM occurs at a planned time Ti or at the completion of a working time in the i-th maintenance interval, whichever occurs last. At the N-th maintenance, the system is replaced rather than maintained. This article first takes up the sequential PML policy with random working time and imperfect maintenance in reliability engineering. The optimal preventive maintenance schedule that minimizes the mean cost rate of a replacement cycle is derived analytically and determined in terms of its existence and uniqueness. The proposed models provide a general framework for analyzing the maintenance policies in reliability theory.

Keywords: optimization, preventive maintenance, random working time, minimal repair, replacement, reliability

Procedia PDF Downloads 255
19265 About the Interface Bonding Safety of Adhesively Bonded Concrete Joints Under Cracking: A Fracture Energetic Approach

Authors: Brandtner-Hafner Martin

Abstract:

Adhesives are increasingly being used in the construction sector. On the one hand, this concerns dowel reinforcements using chemical anchors. On the other hand, the sealing and repair of cracks in structural concrete components are still on the rise. In the field of bonding, the interface between the joined materials is the most critical area. Therefore, it is of immense importance to characterize and investigate this section sufficiently by fracture analysis. Since standardized mechanical test methods are not sufficiently capable of doing this, recourse is made to an innovative concept based on fracture energy. Therefore, a series of experimental tests were performed using the so-called GF-principle to study the interface bonding safety of adhesively bonded concrete joints. Several different structural adhesive systems based on epoxy, CA/A hybrid, PUR, MS polymer, dispersion, and acrylate were selected for bonding concrete substrates. The results show that stable crack propagation and prevention of uncontrolled failure in bonded concrete joints depend very much on the adhesive system used, and only fracture analytical evaluation methods can provide empirical information on this.

Keywords: interface bonding safety, adhesively bonded concrete joints, GF-principle, fracture analysis

Procedia PDF Downloads 291
19264 Iot-Based Interactive Patient Identification and Safety Management System

Authors: Jonghoon Chun, Insung Kim, Jonghyun Lim, Gun Ro

Abstract:

We believe that it is possible to provide a solution to reduce patient safety accidents by displaying correct medical records and prescription information through interactive patient identification. Our system is based on the use of smart bands worn by patients and these bands communicate with the hybrid gateways which understand both BLE and Wifi communication protocols. Through the convergence of low-power Bluetooth (BLE) and hybrid gateway technology, which is one of short-range wireless communication technologies, we implement ‘Intelligent Patient Identification and Location Tracking System’ to prevent medical malfunction frequently occurring in medical institutions. Based on big data and IOT technology using MongoDB, smart band (BLE, NFC function) and hybrid gateway, we develop a system to enable two-way communication between medical staff and hospitalized patients as well as to store locational information of the patients in minutes. Based on the precise information provided using big data systems, such as location tracking and movement of in-hospital patients wearing smart bands, our findings include the fact that a patient-specific location tracking algorithm can more efficiently operate HIS (Hospital Information System) and other related systems. Through the system, we can always correctly identify patients using identification tags. In addition, the system automatically determines whether the patient is a scheduled for medical service by the system in use at the medical institution, and displays the appropriateness of the medical treatment and the medical information (medical record and prescription information) on the screen and voice. This work was supported in part by the Korea Technology and Information Promotion Agency for SMEs (TIPA) grant funded by the Korean Small and Medium Business Administration (No. S2410390).

Keywords: BLE, hybrid gateway, patient identification, IoT, safety management, smart band

Procedia PDF Downloads 298
19263 Drug Therapy Problems and Associated Factors among Patients with Heart Failure in the Medical Ward of Arba Minch General Hospital, Ethiopia

Authors: Debalke Dale, Bezabh Geneta, Yohannes Amene, Yordanos Bergene, Mohammed Yimam

Abstract:

Background: A drug therapy problem (DTP) is an event or circumstance that involves drug therapies that actually or potentially interfere with the desired outcome and requires professional judgment to resolve. Heart failure is an emerging worldwide threat whose prevalence and health loss burden constantly increase, especially in the young and in low-to-middle-income countries. There is a lack of population-based incidence and prevalence of heart failure (HF) studies in sub-Saharan African countries, including Ethiopia. Objective: The aim of this study was designed to assess drug therapy problems and associated factors among patients with HF in the medical ward of Arba Minch General Hospital(AGH), Ethiopia, from June 5 to August 20, 2022. Methods: A retrospective cross-sectional study was conducted among 180 patients with HF who were admitted to the medical ward of AGH. Data were collected from patients' cards by using questionnaires. The data were categorized and analyzed by using SPSS version 25.0 software, and data were presented in tables and words based on the nature of the data. Result: Out of the total, 85 (57.6%) were females, and 113 (75.3%) patients were aged over fifty years. Of the 150 study participants, 86 (57.3%) patients had at least one DTP identified, and a total of 116 DTPs were identified, which is 0.77 DTPs per patient. The most common types of DTP were unnecessary drug therapy (32%), followed by the need for additional drug therapy (36%), and dose too low (15%). Patients who used polypharmacy were 5.86 (AOR) times more likely to develop DTPs than those who did not (95% CI = 1.625–16.536, P = 0.005), and patients with more co-morbid conditions developed 3.68 (AOR) times more DTPs than those who had fewer co-morbidities (95% CI = 1.28–10.5, P = 0.015). Conclusion: The results of this study indicated that drug therapy problems were common among medical ward patients with heart failure. These problems are adversely affecting the treatment outcomes of patients, so it requires the special attention of healthcare professionals to optimize them.

Keywords: heart failure, drug therapy problems, Arba Minch general hospital, Ethiopia

Procedia PDF Downloads 84
19262 Coloured Petri Nets Model for Web Architectures of Web and Database Servers

Authors: Nidhi Gaur, Padmaja Joshi, Vijay Jain, Rajeev Srivastava

Abstract:

Web application architecture is important to achieve the desired performance for the application. Performance analysis studies are conducted to evaluate existing or planned systems. Web applications are used by hundreds of thousands of users simultaneously, which sometimes increases the risk of server failure in real time operations. We use Coloured Petri Net (CPN), a very powerful tool for modelling dynamic behaviour of a web application system. CPNs extend the vocabulary of ordinary Petri nets and add features that make them suitable for modelling large systems. The major focus of this work is on server side of web applications. The presented work focuses on modelling restructuring aspects, with major focus on concurrency and architecture, using CPN. It also focuses on bringing out the appropriate architecture for web and database servers given the number of concurrent users.

Keywords: coloured Petri Nets (CPNs), concurrent users, per- formance modelling, web application architecture

Procedia PDF Downloads 589