Search results for: internet health check
10516 Prevalence of Common Mental Disorders and Its Correlation with Mental Toughness among Professional South African Rugby Players
Authors: H. B. Grobler, K. Du Plooy, P. Kruger, S. Ellis
Abstract:
Objectives: The primary objective of the study was to determine the common mental disorders (CMD) identified by professional South African rugby players and its correlation with their mental toughness, as a first step towards developing such a programme within a larger research project. Design: Survey research, within the theoretical perspective of field theory, was conducted, utilising an adaptation of an already existing mental health questionnaire. The aim was to obtain feedback from as many possible professional South African rugby players in order to make certain generalizations and come to conclusions with regard to the current mental health experiences of these rugby players. Methods: Non-randomized sampling was done, linking it with internet research in the form of the online completion of a questionnaire. A sample of 215 rugby players participated and completed the online questionnaire. Permission was obtained to make use of an existing questionnaire, previously used by the specific authors with retired professional rugby players. A section on mental toughness was added. Data were descriptively analysed by means of the SPSS software platform. Results: Results indicated that the most significant problem that the players are experiencing, is a problem with alcohol (47.9%). Other problems that featured are distress (16.3%), sleep disturbances (7%), as well as anxiety and depression (4.2%). 4.7% of the players indicated that they smoke. 3.3% of the players experience themselves as not being mentally tough. A positive correlation between mental toughness and sound sleep (0.262) was found while a negative correlation was found between mental toughness and the following: anxiety/depression (-0.401), anxiety/depression positive (-0.423), distress (-0.259) and common mental disorder problems in general (-0.220). Conclusions: Although the presence of CMD at first glance do not seem significantly high amongst all the players, it must be considered that if one player in a team experiences the presence of CMD, it will have an impact on his mental toughness and most likely on his performance, as well as on the performance of the whole team. It is therefore important to ensure mental health in the whole team, by addressing individual CMD problems. A mental health support programme is therefore needed to be implemented to the benefit of these players within the South African context.Keywords: common mental disorders, mental toughness, professional athletes, rugby players
Procedia PDF Downloads 22010515 The Quality of Health Services and Patient Satisfaction in Hospital
Authors: Malki Nadia Fatima Zahra, Kellal Chaimaa, Brahimi Houria
Abstract:
Quality is one of the most important modern management patterns that organizations seek to achieve in all areas and sectors in order to meet the needs and desires of customers and to remain continuity, as they constitute a competitive advantage for the organization, and among the most prominent organizations that must be available on the quality factor are health organizations as they relate to the most valuable component of production It is a person and his health, and that any error in it threatens his life and may lead to death, so she must provide health services of high quality to achieve the highest degree of satisfaction for the patient. This research aims to study the quality of health services and the extent of their impact on patient satisfaction, and this is through an applied study that relied on measuring the level of quality of health services in the university hospital center of Algeria and the extent of their impact on patient satisfaction according to the dimensions of the quality of health services, and we reached a conclusion that the determinants of the quality of health services. It affects patient satisfaction, which necessitates developing health services according to patients' requirements and improving their quality to obtain patient satisfaction.Keywords: health service, health quality, quality determinants, patient satisfaction
Procedia PDF Downloads 7010514 Digital Forensics Analysis Focusing on the Onion Router Browser Artifacts in Windows 10
Authors: Zainurrasyid Abdullah, Mohamed Fadzlee Sulaiman, Muhammad Fadzlan Zainal, M. Zabri Adil Talib, Aswami Fadillah M. Ariffin
Abstract:
The Onion Router (Tor) browser is a well-known tool and widely used by people who seeking for web anonymity when browsing the internet. Criminals are taking this advantage to be anonymous over the internet. Accessing the dark web could be the significant reason for the criminal in order for them to perform illegal activities while maintaining their anonymity. For a digital forensic analyst, it is crucial to extract the trail of evidence in proving that the criminal’s computer has used Tor browser to conduct such illegal activities. By applying the digital forensic methodology, several techniques could be performed including application analysis, memory analysis, and registry analysis. Since Windows 10 is the latest operating system released by Microsoft Corporation, this study will use Windows 10 as the operating system platform that running Tor browser. From the analysis, significant artifacts left by Tor browser were discovered such as the execution date, application installation date and browsing history that can be used as an evidence. Although Tor browser was designed to achieved anonymity, there is still some trail of evidence can be found in Windows 10 platform that can be useful for investigation.Keywords: artifacts analysis, digital forensics, forensic analysis, memory analysis, registry analysis, tor browser, Windows 10
Procedia PDF Downloads 17110513 Spanish Language Violence Corpus: An Analysis of Offensive Language in Twitter
Authors: Beatriz Botella-Gil, Patricio Martínez-Barco, Lea Canales
Abstract:
The Internet and ICT are an integral element of and omnipresent in our daily lives. Technologies have changed the way we see the world and relate to it. The number of companies in the ICT sector is increasing every year, and there has also been an increase in the work that occurs online, from sending e-mails to the way companies promote themselves. In social life, ICT’s have gained momentum. Social networks are useful for keeping in contact with family or friends that live far away. This change in how we manage our relationships using electronic devices and social media has been experienced differently depending on the age of the person. According to currently available data, people are increasingly connected to social media and other forms of online communication. Therefore, it is no surprise that violent content has also made its way to digital media. One of the important reasons for this is the anonymity provided by social media, which causes a sense of impunity in the victim. Moreover, it is not uncommon to find derogatory comments, attacking a person’s physical appearance, hobbies, or beliefs. This is why it is necessary to develop artificial intelligence tools that allow us to keep track of violent comments that relate to violent events so that this type of violent online behavior can be deterred. The objective of our research is to create a guide for detecting and recording violent messages. Our annotation guide begins with a study on the problem of violent messages. First, we consider the characteristics that a message should contain for it to be categorized as violent. Second, the possibility of establishing different levels of aggressiveness. To download the corpus, we chose the social network Twitter for its ease of obtaining free messages. We chose two recent, highly visible violent cases that occurred in Spain. Both of them experienced a high degree of social media coverage and user comments. Our corpus has a total of 633 messages, manually tagged, according to the characteristics we considered important, such as, for example, the verbs used, the presence of exclamations or insults, and the presence of negations. We consider it necessary to create wordlists that are present in violent messages as indicators of violence, such as lists of negative verbs, insults, negative phrases. As a final step, we will use automatic learning systems to check the data obtained and the effectiveness of our guide.Keywords: human language technologies, language modelling, offensive language detection, violent online content
Procedia PDF Downloads 13310512 Exploring the Association between Personality Traits and Adolescent Wellbeing in Online Education: A Systematic Review
Authors: Rashmi Motwani, Ritu Raj
Abstract:
The emergence of online educational environments has changed the way adolescents learn, which has benefits and drawbacks for their development. This review has as its goal the examination of how personality traits and adolescents’ well-being are associated in the setting of online education. This review analyses the effects of a variety of personality traits on the mental, emotional, and social health of online school-going adolescents by looking at a wide range of previous research. This research explores the mechanisms that mediate or regulate the connection between one's personality traits and well-being in an online educational environment. The elements can be broken down into two categories: technological, like internet availability and digital literacy, and social, including social support, peer interaction, and teacher-student connections. To improve the well-being of adolescents in online learning environments, it is essential to understand factors that moderate the effects of interventions and support systems. This review concludes by emphasising the complex nature of the association between individual differences in personality and the success of online students aged 13 to 18. This review contributes to the development of evidence-based strategies for promoting positive mental health and overall well-being among adolescents engaged in online educational settings by shedding light on the impact of personality traits on various dimensions of well-being and by identifying the mediating or moderating factors. Educators, governments, and parents can use the findings of this review to create an online learning environment that is safe and well-being for adolescents.Keywords: personality traits, adolescent, wellbeing, online education
Procedia PDF Downloads 5210511 Information Technology and the Challenges Facing the Legal Profession in Nigeria
Authors: Odoh Ben Uruchi
Abstract:
Information Technology is an outcome of the nexus between the computer technology and the communication technology which has grown as silver fiber in Nigeria. Information Technology represents the fourth generation of human communication after sight, oral and written communications. The internet, as with all path-breaking technological developments gives us all the ample privileges to act as a global community; advertise and operate across all frontiers; over boarders and beyond the control of any government. The security concerns, computer abuse and the side effects of this technology have moved to the forefront of the consciousness of law enforcement agencies. Unfortunately, Nigeria is one of the very few countries in the world to have not legislated Cyber Laws, although several unsuccessful attempts have been made in recent times at providing the legal framework for regulating the activities in Nigerian cyberspace. Traditional legal systems have led to great difficulty in keeping pace with the rapid growth of the internet and its impact throughout Nigeria. The only existing legal frameworks are constantly being challenged by technological advancement. This has created a need to constantly update and adapt the way in which we organize ourselves as Legal Practitioners in order to maintain overall control of its domestic and national interests. This paper seeks to appraise the challenges facing the legal profession in Nigeria because of want of Cyber Laws. In doing this, the paper shall highlight the loopholes in the existing laws and recommends the way forward.Keywords: information technology, challenges, legal profession, Nigeria
Procedia PDF Downloads 51710510 Open Innovation for Crowdsourced Product Development: The Case Study of Quirky.com
Authors: Ana Bilandzic, Marcus Foth, Greg Hearn
Abstract:
In a narrow sense, innovation is the invention and commercialisation of a new product or service in the marketplace. The literature suggests places that support knowledge exchange and social interaction, e.g. coffee shops, to nurture innovative ideas. With the widespread success of Internet, interpersonal communication and interaction changed. Online platforms complement physical places for idea exchange and innovation – the rise of hybrid, ‘net localities.’ Further, since its introduction in 2003 by Chesbrough, the concept of open innovation received increased attention as a topic in academic research as well as an innovation strategy applied by companies. Open innovation allows companies to seek and release intellectual property and new ideas from outside of their own company. As a consequence, the innovation process is no longer only managed within the company, but it is pursued in a co-creation process with customers, suppliers, and other stakeholders. Quirky.com (Quirky), a company founded by Ben Kaufman in 2009, recognised the opportunity given by the Internet for knowledge exchange and open innovation. Quirky developed an online platform that makes innovation available to everyone. This paper reports on a study that analysed Quirky’s business process in an extended event-driven process chain (eEPC). The aim was to determine how the platform enabled crowdsourced innovation for physical products on the Internet. The analysis reveals that key elements of the business model are based on open innovation. Quirky is an example of how open innovation can support crowdsourced and crowdfunded product ideation, development and selling. The company opened up various stages in the innovation process to its members to contribute in the product development, e.g. product ideation, design, and market research. Throughout the process, members earn influence through participating in the product development. Based on the influence they receive, shares on the product’s turnover. The outcomes of the study’s analysis highlighted certain benefits of open innovation for product development. The paper concludes with recommendations for future research to look into opportunities of open innovation approaches to be adopted by tertiary institutions as a novel way to commercialise research intellectual property.Keywords: business process, crowdsourced innovation, open innovation, Quirky
Procedia PDF Downloads 23310509 Impacts and Implications: Exploring the Long-Term Health Benefits of Regular Physical Activity
Authors: Muhammad Wahb
Abstract:
Physical activity is increasingly recognized as a significant factor in maintaining optimal health and preventing chronic diseases. This research scrutinizes the long-term health benefits of sustained physical activity, employing a systematic review of epidemiological studies and randomized control trials conducted over the past decade. The study illuminates the protective effects of regular physical activity against cardiovascular disease, obesity, diabetes, and mental health disorders, with a special focus on the mechanisms involved. Furthermore, the paper provides insights into how public health initiatives can effectively promote physical activity among diverse populations, contributing to improved community health outcomes.Keywords: physical activity, long-term health benefits, chronic disease prevention, public health
Procedia PDF Downloads 9810508 Context Aware Anomaly Behavior Analysis for Smart Home Systems
Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu
Abstract:
The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.Keywords: Internet of Things, network security, context awareness, intrusion detection
Procedia PDF Downloads 19410507 Hybrid Bee Ant Colony Algorithm for Effective Load Balancing and Job Scheduling in Cloud Computing
Authors: Thomas Yeboah
Abstract:
Cloud Computing is newly paradigm in computing that promises a delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet). As Cloud Computing is a newly style of computing on the internet. It has many merits along with some crucial issues that need to be resolved in order to improve reliability of cloud environment. These issues are related with the load balancing, fault tolerance and different security issues in cloud environment.In this paper the main concern is to develop an effective load balancing algorithm that gives satisfactory performance to both, cloud users and providers. This proposed algorithm (hybrid Bee Ant Colony algorithm) is a combination of two dynamic algorithms: Ant Colony Optimization and Bees Life algorithm. Ant Colony algorithm is used in this hybrid Bee Ant Colony algorithm to solve load balancing issues whiles the Bees Life algorithm is used for optimization of job scheduling in cloud environment. The results of the proposed algorithm shows that the hybrid Bee Ant Colony algorithm outperforms the performances of both Ant Colony algorithm and Bees Life algorithm when evaluated the proposed algorithm performances in terms of Waiting time and Response time on a simulator called CloudSim.Keywords: ant colony optimization algorithm, bees life algorithm, scheduling algorithm, performance, cloud computing, load balancing
Procedia PDF Downloads 62910506 Data, Digital Identity and Antitrust Law: An Exploratory Study of Facebook’s Novi Digital Wallet
Authors: Wanjiku Karanja
Abstract:
Facebook has monopoly power in the social networking market. It has grown and entrenched its monopoly power through the capture of its users’ data value chains. However, antitrust law’s consumer welfare roots have prevented it from effectively addressing the role of data capture in Facebook’s market dominance. These regulatory blind spots are augmented in Facebook’s proposed Diem cryptocurrency project and its Novi Digital wallet. Novi, which is Diem’s digital identity component, shall enable Facebook to collect an unprecedented volume of consumer data. Consequently, Novi has seismic implications on internet identity as the network effects of Facebook’s large user base could establish it as the de facto internet identity layer. Moreover, the large tracts of data Facebook shall collect through Novi shall further entrench Facebook's market power. As such, the attendant lock-in effects of this project shall be very difficult to reverse. Urgent regulatory action is therefore required to prevent this expansion of Facebook’s data resources and monopoly power. This research thus highlights the importance of data capture to competition and market health in the social networking industry. It utilizes interviews with key experts to empirically interrogate the impact of Facebook’s data capture and control of its users’ data value chains on its market power. This inquiry is contextualized against Novi’s expansive effect on Facebook’s data value chains. It thus addresses the novel antitrust issues arising at the nexus of Facebook’s monopoly power and the privacy of its users’ data. It also explores the impact of platform design principles, specifically data portability and data portability, in mitigating Facebook’s anti-competitive practices. As such, this study finds that Facebook is a powerful monopoly that dominates the social media industry to the detriment of potential competitors. Facebook derives its power from its size, annexure of the consumer data value chain, and control of its users’ social graphs. Additionally, the platform design principles of data interoperability and data portability are not a panacea to restoring competition in the social networking market. Their success depends on the establishment of robust technical standards and regulatory frameworks.Keywords: antitrust law, data protection law, data portability, data interoperability, digital identity, Facebook
Procedia PDF Downloads 12310505 Global Health Access to Reproductive Care: Vesicovaginal Fistulas and Obstetrics in Pakistan
Authors: Aena Iqbal
Abstract:
The lack of access to maternal and reproductive health in Pakistan poses a great threat to global public health. Obstetric issues, including vesicovaginal fistulas (VVF), are the most common in South Asian countries, leaving women in a more vulnerable state. Koohi Goth Women’s Hospital offers free VVF operations, which draws in women from all over Pakistan. Although reproductive health is being handled, mental health is often neglected in these scenarios. Using a series of questions inspired by the Warwick Edinburgh Model, this paper builds on the results from interviewing women who have received vesicovaginal fistula repair surgery on their mental health, a taboo topic in Pakistan.Keywords: obstetrics, VVF, Pakistan, reproductive health
Procedia PDF Downloads 10910504 The Construction of Healthy Bodies in U.S. and China: A Comparative Analysis of Women's Health and Trends Health
Authors: Yang L. Frances
Abstract:
Women's health and wellness has been becoming an increasingly important issue in mass media in the age of globalization. In this context, the current research focuses on comparing the construction of healthy bodies in women's health magazines of China and U.S. Trends Health in China and Women's Health in U.S are chosen. Textual analysis and in depth interviews are combined to examine how the healthy bodies are constructed in two magazines through discursive strategies. The interviews with the Deputy Editorial Director, Creative Director and Senior Visual Design of two magazines are undertaken to make the further comparisons. In both Trends Health and Women's Health, women's subjectivity is realized in the construction of ideal healthy body; nevertheless in the process of constructing healthy body, the disciplinary practices imposed on women's bodies are different in two magazines. This paper argues that women's health magazines in both China and America provide an alternative discourse to speak their voices on the one hand, but on the other hand, Women's Health and Trends Health construct the healthy body through disparate disciplinary practices because of the different socio-cultural contexts in two societies.Keywords: healthy body, women's health magazines, Foucault, textual analysis
Procedia PDF Downloads 35310503 IOT Based Process Model for Heart Monitoring Process
Authors: Dalyah Y. Al-Jamal, Maryam H. Eshtaiwi, Liyakathunisa Syed
Abstract:
Connecting health services with technology has a huge demand as people health situations are becoming worse day by day. In fact, engaging new technologies such as Internet of Things (IOT) into the medical services can enhance the patient care services. Specifically, patients suffering from chronic diseases such as cardiac patients need a special care and monitoring. In reality, some efforts were previously taken to automate and improve the patient monitoring systems. However, the previous efforts have some limitations and lack the real-time feature needed for chronic kind of diseases. In this paper, an improved process model for patient monitoring system specialized for cardiac patients is presented. A survey was distributed and interviews were conducted to gather the needed requirements to improve the cardiac patient monitoring system. Business Process Model and Notation (BPMN) language was used to model the proposed process. In fact, the proposed system uses the IOT Technology to assist doctors to remotely monitor and follow-up with their heart patients in real-time. In order to validate the effectiveness of the proposed solution, simulation analysis was performed using Bizagi Modeler tool. Analysis results show performance improvements in the heart monitoring process. For the future, authors suggest enhancing the proposed system to cover all the chronic diseases.Keywords: IoT, process model, remote patient monitoring system, smart watch
Procedia PDF Downloads 33310502 Exploring the Meaning of Safety in Acute Mental Health Inpatient Units from the Consumer Perspective
Authors: Natalie Cutler, Lorna Moxham, Moira Stephens
Abstract:
Safety is a priority in mental health services, and no more so than in the acute inpatient setting. Mental health service policies and accreditation frameworks commonly approach safety from a risk reduction or elimination perspective leading to service approaches that are arguably more focused on risk than on safety. An exploration what safety means for people who have experienced admission to an acute mental health inpatient unit is currently under way in Sydney, Australia. Using a phenomenographic research approach, this study is seeking to understand the meaning of safety from the perspective of people who use, rather than those who deliver mental health services. Preliminary findings suggest that the meanings of safety for users of mental health services vary from the meanings inherent in the policies and frameworks that inform how mental health services and mental health practice are delivered. This variance has implications for the physical and environmental design of acute mental health inpatient facilities, the policies and practices, and the education and training of mental health staff in particular nurses, who comprise the majority of the mental health workforce. These variances will be presented, along with their implications for the way quality and safety in mental health services are evaluated.Keywords: acute inpatient, mental health, nursing, phenomenography, recovery, safety
Procedia PDF Downloads 23310501 Exploring Social Impact of Emerging Technologies from Futuristic Data
Authors: Heeyeul Kwon, Yongtae Park
Abstract:
Despite the highly touted benefits, emerging technologies have unleashed pervasive concerns regarding unintended and unforeseen social impacts. Thus, those wishing to create safe and socially acceptable products need to identify such side effects and mitigate them prior to the market proliferation. Various methodologies in the field of technology assessment (TA), namely Delphi, impact assessment, and scenario planning, have been widely incorporated in such a circumstance. However, literatures face a major limitation in terms of sole reliance on participatory workshop activities. They unfortunately missed out the availability of a massive untapped data source of futuristic information flooding through the Internet. This research thus seeks to gain insights into utilization of futuristic data, future-oriented documents from the Internet, as a supplementary method to generate social impact scenarios whilst capturing perspectives of experts from a wide variety of disciplines. To this end, network analysis is conducted based on the social keywords extracted from the futuristic documents by text mining, which is then used as a guide to produce a comprehensive set of detailed scenarios. Our proposed approach facilitates harmonized depictions of possible hazardous consequences of emerging technologies and thereby makes decision makers more aware of, and responsive to, broad qualitative uncertainties.Keywords: emerging technologies, futuristic data, scenario, text mining
Procedia PDF Downloads 49210500 Deep Routing Strategy: Deep Learning based Intelligent Routing in Software Defined Internet of Things.
Authors: Zabeehullah, Fahim Arif, Yawar Abbas
Abstract:
Software Defined Network (SDN) is a next genera-tion networking model which simplifies the traditional network complexities and improve the utilization of constrained resources. Currently, most of the SDN based Internet of Things(IoT) environments use traditional network routing strategies which work on the basis of max or min metric value. However, IoT network heterogeneity, dynamic traffic flow and complexity demands intelligent and self-adaptive routing algorithms because traditional routing algorithms lack the self-adaptions, intelligence and efficient utilization of resources. To some extent, SDN, due its flexibility, and centralized control has managed the IoT complexity and heterogeneity but still Software Defined IoT (SDIoT) lacks intelligence. To address this challenge, we proposed a model called Deep Routing Strategy (DRS) which uses Deep Learning algorithm to perform routing in SDIoT intelligently and efficiently. Our model uses real-time traffic for training and learning. Results demonstrate that proposed model has achieved high accuracy and low packet loss rate during path selection. Proposed model has also outperformed benchmark routing algorithm (OSPF). Moreover, proposed model provided encouraging results during high dynamic traffic flow.Keywords: SDN, IoT, DL, ML, DRS
Procedia PDF Downloads 11310499 Health Information Seeking Estonians Aged ≥ 50 Years during the COVID-19 Pandemic
Authors: Marianne Paimre
Abstract:
The COVID-19 crisis has prompted older people to adopt new technologies to facilitate their daily life. This study explored the relationships between socioeconomic indicators, technology acceptance, online health information seeking (OHIS), and health behavior (HB), including readiness for COVID-19 vaccination among Estonian older adults. A cross-sectional survey was conducted among 501 people aged ≥ 50 in 2020. Its findings indicate that the more recurrent the need for health information was (rho = .11, p<.05), and the more regularly one searched for it (rho = .14, p<.01), the more willing a person was to get vaccinated. Also, interest in digital applications corresponded to vaccination readiness (rho = .25, p<.001). However, this relationship did not emerge in the case of other health behaviors such as healthy diet and exercise. Differences in health information behavior (HIB) should be considered when developing effective means of health communication designed especially for crisis situations.Keywords: older adults, technology acceptance, health information behavior, health behavior, COVID-19 pandemic
Procedia PDF Downloads 9310498 Multi-Level Clustering Based Congestion Control Protocol for Cyber Physical Systems
Authors: Manpreet Kaur, Amita Rani, Sanjay Kumar
Abstract:
The Internet of Things (IoT), a cyber-physical paradigm, allows a large number of devices to connect and send the sensory data in the network simultaneously. This tremendous amount of data generated leads to very high network load consequently resulting in network congestion. It further amounts to frequent loss of useful information and depletion of significant amount of nodes’ energy. Therefore, there is a need to control congestion in IoT so as to prolong network lifetime and improve the quality of service (QoS). Hence, we propose a two-level clustering based routing algorithm considering congestion score and packet priority metrics that focus on minimizing the network congestion. In the proposed Priority based Congestion Control (PBCC) protocol the sensor nodes in IoT network form clusters that reduces the amount of traffic and the nodes are prioritized to emphasize important data. Simultaneously, a congestion score determines the occurrence of congestion at a particular node. The proposed protocol outperforms the existing Packet Discard Network Clustering (PDNC) protocol in terms of buffer size, packet transmission range, network region and number of nodes, under various simulation scenarios.Keywords: internet of things, cyber-physical systems, congestion control, priority, transmission rate
Procedia PDF Downloads 30810497 Secure Optimized Ingress Filtering in Future Internet Communication
Authors: Bander Alzahrani, Mohammed Alreshoodi
Abstract:
Information-centric networking (ICN) using architectures such as the Publish-Subscribe Internet Technology (PURSUIT) has been proposed as a new networking model that aims at replacing the current used end-centric networking model of the Internet. This emerged model focuses on what is being exchanged rather than which network entities are exchanging information, which gives the control plane functions such as routing and host location the ability to be specified according to the content items. The forwarding plane of the PURSUIT ICN architecture uses a simple and light mechanism based on Bloom filter technologies to forward the packets. Although this forwarding scheme solve many problems of the today’s Internet such as the growth of the routing table and the scalability issues, it is vulnerable to brute force attacks which are starting point to distributed- denial-of-service (DDoS) attacks. In this work, we design and analyze a novel source-routing and information delivery technique that keeps the simplicity of using Bloom filter-based forwarding while being able to deter different attacks such as denial of service attacks at the ingress of the network. To achieve this, special forwarding nodes called Edge-FW are directly attached to end user nodes and used to perform a security test for malicious injected random packets at the ingress of the path to prevent any possible attack brute force attacks at early stage. In this technique, a core entity of the PURSUIT ICN architecture called topology manager, that is responsible for finding shortest path and creating a forwarding identifiers (FId), uses a cryptographically secure hash function to create a 64-bit hash, h, over the formed FId for authentication purpose to be included in the packet. Our proposal restricts the attacker from injecting packets carrying random FIds with a high amount of filling factor ρ, by optimizing and reducing the maximum allowed filling factor ρm in the network. We optimize the FId to the minimum possible filling factor where ρ ≤ ρm, while it supports longer delivery trees, so the network scalability is not affected by the chosen ρm. With this scheme, the filling factor of any legitimate FId never exceeds the ρm while the filling factor of illegitimate FIds cannot exceed the chosen small value of ρm. Therefore, injecting a packet containing an FId with a large value of filling factor, to achieve higher attack probability, is not possible anymore. The preliminary analysis of this proposal indicates that with the designed scheme, the forwarding function can detect and prevent malicious activities such DDoS attacks at early stage and with very high probability.Keywords: forwarding identifier, filling factor, information centric network, topology manager
Procedia PDF Downloads 15410496 A Comparative Study of Maternal Health among Urban Slums and Non-Slums Women (Special Reference to Indore City, Madhya Pradesh, India)
Authors: Shiksha Thakur, Rashmi Jain
Abstract:
Maternal health is the most crucial element in the primary health care delivery system of any healthy society. We aware that the maternal health situation in India has been a cause of concern for us, in spite of the rapidly progressing socio-economic environment overall. India has realized impressive gains in Mother & Child survival over the last two decades. MMR as per 2012-2013 in India is 167 as per MMR bulletin, though there are variations between states in the Country. In 2013, an estimated 2,89,000 women worldwide died from complications arising from pregnancy & childbirth. In view of the above facts, a study was conducted in Indore to analyse the maternal health status among urban slums and non-slums women.Keywords: antenatal care, postnatal care, JSY, maternal health, child health, reproductive health
Procedia PDF Downloads 15510495 A Machine Learning Approach for Anomaly Detection in Environmental IoT-Driven Wastewater Purification Systems
Authors: Giovanni Cicceri, Roberta Maisano, Nathalie Morey, Salvatore Distefano
Abstract:
The main goal of this paper is to present a solution for a water purification system based on an Environmental Internet of Things (EIoT) platform to monitor and control water quality and machine learning (ML) models to support decision making and speed up the processes of purification of water. A real case study has been implemented by deploying an EIoT platform and a network of devices, called Gramb meters and belonging to the Gramb project, on wastewater purification systems located in Calabria, south of Italy. The data thus collected are used to control the wastewater quality, detect anomalies and predict the behaviour of the purification system. To this extent, three different statistical and machine learning models have been adopted and thus compared: Autoregressive Integrated Moving Average (ARIMA), Long Short Term Memory (LSTM) autoencoder, and Facebook Prophet (FP). The results demonstrated that the ML solution (LSTM) out-perform classical statistical approaches (ARIMA, FP), in terms of both accuracy, efficiency and effectiveness in monitoring and controlling the wastewater purification processes.Keywords: environmental internet of things, EIoT, machine learning, anomaly detection, environment monitoring
Procedia PDF Downloads 15210494 Analysis of Trends in Equity of Maternal Health Care in South India
Authors: Anushree S. Panikkassery
Abstract:
The paper analyses the pattern and trend of maternal health care in south Indian states. It studies the interstate disparities in terms of maternal health care. It also compares the trends in terms of achieving the target of sustainable development Goal is related to maternal health. The maternal health care (MHC) development is one of the key indicators for the development of health sector in the country and assumes significance from the socioeconomic and developmental perspectives. Maternal health care mainly consists of composite care during pregnancy, child birth as well as postpartum period. Antenatal care, identification, referral and management of high risk pregnancies, safe and healthy child birth and early postnatal care are some of the important issues pertaining to maternal health. Data is collected from national family health survey 1992-93, 1998-99, 2005-06, and 2015-16. A concentration index is used to study the disparities in equity of maternal health among south Indian states. The study shows that there has been an improvement in maternal health care in south Indian states with Kerala topping among the states. But there exist disparities among the south Indian states.Keywords: antenatal care, disparities, equity, maternal health
Procedia PDF Downloads 38410493 Public Awareness of Aphasia in Taiwan: A Pilot Study
Authors: Ching-Yu Lin
Abstract:
The number of patients with aphasia has been gradually increasing; however, public awareness of aphasia is still limited. Moreover, surveys about public awareness of aphasia have been conducted in several countries, but there is no research about public awareness of aphasia in Taiwan so far. Therefore, this study aims at the investigation of public awareness of aphasia in Taiwan. In this pilot study, the original English-version questionnaire will be translated into Mandarin Chinese by a speech therapist (the author), and 100 Taiwanese over 18 years old will be recruited to finish the questionnaire. People with an occupation about health or medical will be excluded. In order to reach more people, the questionnaire will be an Internet survey by Google Forms, and the URL of the survey will be distributed by messaging, i.e. e-mail, Facebook Messenger, Instagram DM, or Line. Data will be analyzed via PASW Statistic 18. Descriptive statistics will be used to summarize what proportion of the public have heard of aphasia and what proportion of the public have basic knowledge of aphasia in Taiwan. The sources of information about aphasia will also be investigated. Further, differences in awareness of aphasia due to age, gender, and education level will be discussed.Keywords: aphasia, public awareness, public knowledge, taiwan
Procedia PDF Downloads 10610492 The Design and Development of Online Infertility Prevention Education in the Frame of Mayer's Multimedia Learning Theory
Authors: B. Baran, S. N. Kaptanoglu, M. Ocal, Y. Kagnici, E. Esen, E. Siyez, D. M. Siyez
Abstract:
Infertility is the fact that couples cannot have children despite 1 year of unprotected sexual life. Infertility can be considered as an important problem affecting not only sexual life but also social and psychological conditions of couples. Learning about information about preventable factors related to infertility during university years plays an important role in preventing a possible infertility case in older ages. The possibility to facilitate access to information with the internet has provided the opportunity to reach a broad audience in the diverse learning environments and educational environment. Moreover, the internet has become a basic resource for the 21st-century learners. Providing information about infertility over the internet will enable more people to reach in a short time. When studies conducted abroad about infertility are examined, interactive websites and online education programs come to the fore. In Turkey, while there is no comprehensive online education program for university students, it seems that existing studies are aimed to make more advertisements for doctors or hospitals. In this study, it was aimed to design and develop online infertility prevention education for university students. Mayer’s Multimedia Learning Theory made up the framework for the online learning environment in this study. The results of the needs analysis collected from the university students in Turkey who were selected with sampling to represent the audience for online learning contributed to the design phase. In this study, an infertility prevention online education environment designed as a 4-week education was developed by explaining the theoretical basis and needs analysis results. As a result; in the development of the online environment, different kind of visual aids that will increase teaching were used in the environment of online education according to Mayer’s principles of extraneous processing (coherence, signaling, spatial contiguity, temporal contiguity, redundancy, expectation principles), essential processing (segmenting, pre-training, modality principles) and generative processing (multimedia, personalization, voice principles). For example, the important points in reproductive systems’ expression were emphasized by visuals in order to draw learners’ attention, and the presentation of the information was also supported by the human voice. In addition, because of the limited knowledge of university students in the subject, the issue of female reproductive and male reproductive systems was taught before preventable factors related to infertility. Furthermore, 3D video and augmented reality application were developed in order to embody female and male reproductive systems. In conclusion, this study aims to develop an interactive Online Infertility Prevention Education in which university students can easily access reliable information and evaluate their own level of knowledge about the subject. It is believed that the study will also guide the researchers who want to develop online education in this area as it contains design-stage decisions of interactive online infertility prevention education for university students.Keywords: infertility, multimedia learning theory, online education, reproductive health
Procedia PDF Downloads 17210491 The M Health Paradigm for the Chronic Care Management of Obesity: New Opportunities in Clinical Psychology and Medicine
Authors: Gianluca Castelnuovo, Gian Mauro Manzoni, Giada Pietrabissa, Stefania Corti, Emanuele Giusti, Roberto Cattivelli, Enrico Molinari, Susan Simpson
Abstract:
Obesity is currently an important public health problem of epidemic proportions (globesity). Moreover Binge Eating Disorder (BED) is typically connected with obesity, even if not occurring exclusively in conjunction with overweight conditions. Typically obesity with BED requires a longer term treatment in comparison with simple obesity. Rehabilitation interventions that aim at improving weight-loss, reducing obesity-related complications and changing dysfunctional behaviors, should ideally be carried out in a multidisciplinary context with a clinical team composed of psychologists, dieticians, psychiatrists, endocrinologists, nutritionists, physiotherapists, etc. Long-term outpatient multidisciplinary treatments are likely to constitute an essential aspect of rehabilitation, due to the growing costs of a limited inpatient approach. Internet-based technologies can improve long-term obesity rehabilitation within a collaborative approach. The new m health (m-health, mobile health) paradigm, defined as clinical practices supported by up to date mobile communication devices, could increase compliance- engagement and contribute to a significant cost reduction in BED and obesity rehabilitation. Five psychological components need to be considered for successful m Health-based obesity rehabilitation in order to facilitate weight-loss.1) Self-monitoring. Portable body monitors, pedometers and smartphones are mobile and, therefore, can be easily used, resulting in continuous self-monitoring. 2) Counselor feedback and communication. A functional approach is to provide online weight-loss interventions with brief weekly or monthly counselor or psychologist visits. 3) Social support. A group treatment format is typically preferred for behavioral weight-loss interventions. 4) Structured program. Technology-based weight-loss programs incorporate principles of behavior therapy and change with structured weekly protocolos including nutrition, exercise, stimulus control, self-regulation strategies, goal-setting. 5) Individually tailored program. Interventions specifically designed around individual’s goals typically record higher rates of adherence and weight loss. Opportunities and limitations of m health approach in clinical psychology for obesity and BED are discussed, taking into account future research directions in this promising area.Keywords: obesity, rehabilitation, out-patient, new technologies, tele medicine, tele care, m health, clinical psychology, psychotherapy, chronic care management
Procedia PDF Downloads 47510490 Internet of Assets: A Blockchain-Inspired Academic Program
Authors: Benjamin Arazi
Abstract:
Blockchain is the technology behind cryptocurrencies like Bitcoin. It revolutionizes the meaning of trust in the sense of offering total reliability without relying on any central entity that controls or supervises the system. The Wall Street Journal states: “Blockchain Marks the Next Step in the Internet’s Evolution”. Blockchain was listed as #1 in Linkedin – The Learning Blog “most in-demand hard skills needed in 2020”. As stated there: “Blockchain’s novel way to store, validate, authorize, and move data across the internet has evolved to securely store and send any digital asset”. GSMA, a leading Telco organization of mobile communications operators, declared that “Blockchain has the potential to be for value what the Internet has been for information”. Motivated by these seminal observations, this paper presents the foundations of a Blockchain-based “Internet of Assets” academic program that joins under one roof leading application areas that are characterized by the transfer of assets over communication lines. Two such areas, which are pillars of our economy, are Fintech – Financial Technology and mobile communications services. The next application in line is Healthcare. These challenges are met based on available extensive professional literature. Blockchain-based assets communication is based on extending the principle of Bitcoin, starting with the basic question: If digital money that travels across the universe can ‘prove its own validity’, can this principle be applied to digital content. A groundbreaking positive answer here led to the concept of “smart contract” and consequently to DLT - Distributed Ledger Technology, where the word ‘distributed’ relates to the non-existence of reliable central entities or trusted third parties. The terms Blockchain and DLT are frequently used interchangeably in various application areas. The World Bank Group compiled comprehensive reports, analyzing the contribution of DLT/Blockchain to Fintech. The European Central Bank and Bank of Japan are engaged in Project Stella, “Balancing confidentiality and auditability in a distributed ledger environment”. 130 DLT/Blockchain focused Fintech startups are now operating in Switzerland. Blockchain impact on mobile communications services is treated in detail by leading organizations. The TM Forum is a global industry association in the telecom industry, with over 850 member companies, mainly mobile operators, that generate US$2 trillion in revenue and serve five billion customers across 180 countries. From their perspective: “Blockchain is considered one of the digital economy’s most disruptive technologies”. Samples of Blockchain contributions to Fintech (taken from a World Bank document): Decentralization and disintermediation; Greater transparency and easier auditability; Automation & programmability; Immutability & verifiability; Gains in speed and efficiency; Cost reductions; Enhanced cyber security resilience. Samples of Blockchain contributions to the Telco industry. Establishing identity verification; Record of transactions for easy cost settlement; Automatic triggering of roaming contract which enables near-instantaneous charging and reduction in roaming fraud; Decentralized roaming agreements; Settling accounts per costs incurred in accordance with agreement tariffs. This clearly demonstrates an academic education structure where fundamental technologies are studied in classes together with these two application areas. Advanced courses, treating specific implementations then follow separately. All are under the roof of “Internet of Assets”.Keywords: blockchain, education, financial technology, mobile telecommunications services
Procedia PDF Downloads 18010489 Computer-Aided Ship Design Approach for Non-Uniform Rational Basis Spline Based Ship Hull Surface Geometry
Authors: Anu S. Nair, V. Anantha Subramanian
Abstract:
This paper presents a surface development and fairing technique combining the features of a modern computer-aided design tool namely the Non-Uniform Rational Basis Spline (NURBS) with an algorithm to obtain a rapidly faired hull form. Some of the older series based designs give sectional area distribution such as in the Wageningen-Lap Series. Others such as the FORMDATA give more comprehensive offset data points. Nevertheless, this basic data still requires fairing to obtain an acceptable faired hull form. This method uses the input of sectional area distribution as an example and arrives at the faired form. Characteristic section shapes define any general ship hull form in the entrance, parallel mid-body and run regions. The method defines a minimum of control points at each section and using the Golden search method or the bisection method; the section shape converges to the one with the prescribed sectional area with a minimized error in the area fit. The section shapes combine into evolving the faired surface by NURBS and typically takes 20 iterations. The advantage of the method is that it is fast, robust and evolves the faired hull form through minimal iterations. The curvature criterion check for the hull lines shows the evolution of the smooth faired surface. The method is applicable to hull form from any parent series and the evolved form can be evaluated for hydrodynamic performance as is done in more modern design practice. The method can handle complex shape such as that of the bulbous bow. Surface patches developed fit together at their common boundaries with curvature continuity and fairness check. The development is coded in MATLAB and the example illustrates the development of the method. The most important advantage is quick time, the rapid iterative fairing of the hull form.Keywords: computer-aided design, methodical series, NURBS, ship design
Procedia PDF Downloads 16910488 A Primer to the Learning Readiness Assessment to Raise the Sharing of E-Health Knowledge amongst Libyan Nurses
Authors: Mohamed Elhadi M. Sharif, Mona Masood
Abstract:
The usage of e-health facilities is seen to be the first priority by the Libyan government. As such, this paper focuses on how the key factors or elements of working size in terms of technological availability, structural environment, and other competence-related matters may affect nurses’ sharing of knowledge in e-health. Hence, this paper investigates learning readiness assessment to raise e-health for Libyan regional hospitals by using e-health services in nursing education.Keywords: Libyan nurses, e-learning readiness, e-health, nursing education
Procedia PDF Downloads 49410487 Effect of Information and Communication Intervention on Stable Economic Growth in Ethiopia
Authors: Medhin Haftom Hailu
Abstract:
The advancement of information technology has significantly impacted Ethiopia's economy, driving innovation, productivity, job creation, and global connectivity. This research examined the impact of contemporary information and communication technologies on Ethiopian economic progress. The study examined eight variables, including mobile, internet, and fixed-line penetration rates, and five macroeconomic control variables. The results showed a positive and strong effect of ICT on economic growth in Ethiopia, with 1% increase in mobile, internet, and fixed line services penetration indexes resulting in an 8.03, 10.05, and 30.06% increase in real GDP. The Granger causality test showed that all ICT variables Granger caused economic growth, but economic growth Granger caused mobile penetration rate only. The study suggests that coordinated ICT infrastructure development, increased telecom service accessibility, and increased competition in the telecom market are crucial for Ethiopia's economic growth. Ethiopia is attempting to establish a digital economy through massive investment in ensuring ICT quality and accessibility. Thus, the research could enhance in understanding of the economic impact of ICT expansion for successful ICT policy interventions for future research.Keywords: economic growth, cointegration and error correction, ICT expansion, granger causality, penetration
Procedia PDF Downloads 81