Search results for: healthcare data security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 27744

Search results for: healthcare data security

26634 Postoperative Emergence Delirium in Children: An Incomprehensible Scenario For Parents’

Authors: Jenny Ringblom, Marie Proczkowska, Laura Korhonen, Ingrid Wåhlin

Abstract:

Background: Emergence delirium is a well-known behaviour of perceptual disturbances that may occur after general anaesthesia in children. Children with emergence delirium are often confused; they cry, are involuntarily physically active and are almost impossible to console. The prevalence varies considerably between about 13% and 53%. Research has mainly focused on how different medication accents affect the incidence of emergence delirium, but less is known about parents’ experiences of emergence delirium during the recovery process. Aim: The aim of this study was to describe parents’ experiences and reflections during their child's emergence delirium behaviour when recovering from anaesthesia. Method: The study has a qualitative design, and the data has been analyzed using thematic analysis. A total of 16 parents were interviewed at two county hospitals in Sweden. Results: When the parents reunited with their child at the recovering unit, they felt as if they were encountering an incomprehensible scenario. When watching their child demonstrating emergence delirium, they experienced fear and insecurity and had feelings of powerlessness and guilt. Information and previous experience turned out to offer relief and being seen by the healthcare staff when they, in their vulnerability, failed to reach or console their child gave hope and energy. Conclusion: Emergence delirium must be extensively considered in children undergoing general anaesthesia. Healthcare staff needs to be aware of the parental difficulties it may cause. There is also important to know what parents experience as relieving, such as receiving information and when staff members are being available, responsive and supportive during the wake-up period.

Keywords: emergence delirium, experiences, pediatrics, parents, postoperative care

Procedia PDF Downloads 130
26633 Medication Errors in Neonatal Intensive Care Unit

Authors: Ramzi Shawahna

Abstract:

Background: Neonatal intensive care units are high-risk settings where medication errors can occur and cause harm to this fragile segment of patients. This multicenter qualitative study was conducted to describe medication errors that occurred in neonatal intensive care units in Palestine from the perspectives of healthcare providers. Methods: This exploratory multicenter qualitative study was conducted and reported in adherence to the consolidated criteria for reporting qualitative research checklist. Semi-structured in-depth interviews were conducted with healthcare professionals (4 pediatricians/neonatologists and 11 intensive care unit nurses) who provided care services for patients admitted to neonatal intensive care units in Palestine. An interview schedule guided the semi-structured in-depth interviews. The qualitative interpretive description approach was used to thematically analyze the data. Results: The total duration of the interviews was 282 min. The healthcare providers described their experiences with 41 different medication errors. These medication errors were categorized under 3 categories and 10 subcategories. Errors that occurred while preparing/diluting/storing medications were related to calculations, using a wrong solvent/diluent, dilution errors, failure to adhere to guidelines while preparing the medication, failure to adhere to storage/packaging guidelines, and failure to adhere to labeling guidelines. Errors that occurred while prescribing/administering medications were related to inappropriate medication for the neonate, using a different administration technique from the one that was intended and administering a different dose from the one that was intended. Errors that occurred after administering the medications were related to failure to adhere to monitoring guidelines. Conclusion: In this multicenter study, pediatricians/neonatologists and neonatal intensive care unit nurses described medication errors occurring in intensive care units in Palestine. Medication errors occur in different stages of the medication process: preparation/dilution/storage, prescription/administration, and monitoring. Further studies are still needed to quantify medication errors occurring in neonatal intensive care units and investigate if the designed strategies could be effective in minimizing medication errors.

Keywords: medication errors, pharmacist, pharmacology, neonates

Procedia PDF Downloads 85
26632 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks

Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas

Abstract:

Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.

Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model

Procedia PDF Downloads 61
26631 Design and Development of Data Mining Application for Medical Centers in Remote Areas

Authors: Grace Omowunmi Soyebi

Abstract:

Data Mining is the extraction of information from a large database which helps in predicting a trend or behavior, thereby helping management make knowledge-driven decisions. One principal problem of most hospitals in rural areas is making use of the file management system for keeping records. A lot of time is wasted when a patient visits the hospital, probably in an emergency, and the nurse or attendant has to search through voluminous files before the patient's file can be retrieved; this may cause an unexpected to happen to the patient. This Data Mining application is to be designed using a Structured System Analysis and design method, which will help in a well-articulated analysis of the existing file management system, feasibility study, and proper documentation of the Design and Implementation of a Computerized medical record system. This Computerized system will replace the file management system and help to easily retrieve a patient's record with increased data security, access clinical records for decision-making, and reduce the time range at which a patient gets attended to.

Keywords: data mining, medical record system, systems programming, computing

Procedia PDF Downloads 210
26630 Innovative Power Engineering in a Selected Rural Commune

Authors: Pawel Sowa, Joachim Bargiel

Abstract:

This paper presents modern solutions of distributed generation in rural communities aiming at the improvement of energy and environmental security, as well as power supply reliability to important customers (e.g. health care, sensitive consumer required continuity). Distributed sources are mainly gas and biogas cogeneration units, as well as wind and photovoltaic sources. Some examples of their applications in a selected Silesian community are given.

Keywords: energy security, mini energy centres , power engineering, power supply reliability

Procedia PDF Downloads 301
26629 Secure Mobile E-Business Applications

Authors: Hala A. Alrumaih

Abstract:

It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy. One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly. Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.

Keywords: e-business, mobile applications, risk mitigations, security assurance

Procedia PDF Downloads 295
26628 Tag Impersonation Attack on Ultra-lightweight Radio Frequency Identification Authentication Scheme (ESRAS)

Authors: Reham Al-Zahrani, Noura Aleisa

Abstract:

The proliferation of Radio Frequency Identification (RFID) technology has raised concerns about system security, particularly regarding tag impersonation attacks. Regarding RFID systems, an appropriate authentication protocol must resist active and passive attacks. A tag impersonation occurs when an adversary's tag is used to fool an authenticating reader into believing it is a legitimate tag. This paper analyzed the security of the efficient, secure, and practical ultra-lightweight RFID Authentication Scheme (ESRAS). Then, the paper presents a comprehensive analysis of the Efficient, Secure, and Practical Ultra-Lightweight RFID Authentication Scheme (ESRAS) in the context of radio frequency identification (RFID) systems that employed the Scyther tool to examine the protocol's security against a tag impersonation attack.

Keywords: RFID, impersonation attack, authentication, ultra-lightweight protocols

Procedia PDF Downloads 66
26627 PUF-Based Lightweight Iot Secure Authentication Chip Design

Authors: Wenxuan Li, Lei Li, Jin Li, Yuanhang He

Abstract:

This paper designed a secure chip for IoT communication security integrated with the PUF-based firmware protection scheme. Then, the Xilinx Kintex-7 and STM-32 were used for the prototype verification. Firmware protection worked well on FPGA and embedded platforms. For the ASIC implementation of the PUF module, contact PUF is chosen. The post-processing method and its improvement are analyzed with emphasis. This paper proposed a more efficient post-processing method for contact PUF named SXOR, which has practical value for realizing lightweight security modules in IoT devices. The analysis was carried out under the hypothesis that the contact holes are independent and combine the existing data in the open literature. The post-processing effects of SXOR and XOR are basically the same under the condition that the proposed post-processing circuit occupies only 50.6% of the area of XOR. The average Hamming weight of the PUF output bit sequence obtained by the proposed post-processing method is 0.499735, and the average Hamming weight obtained by the XOR-based post-processing method is 0.499999.

Keywords: PUF, IoT, authentication, secure communication, encryption, XOR

Procedia PDF Downloads 142
26626 Evaluation of Food Safety and Security Practices in Midday Meal Programmes in Rural Areas of Beed District

Authors: Nuzhat Sultana M. B.

Abstract:

Children are high-risk population in terms of food born illnesses. Food safety and security are the most important aspect of the success of midday meal programmes. Improper holding temperatures, cross-contamination and poor personal hygiene of food handlers are the main causes for the prevalence of pathogenic microbes in the food servicing areas. Two hundred and fifty preschool children in the age of 3 to 6 years from urban and rural anganwadies (pre school center) of Beed district were selected. Nutritional status of preschool children were assessed by anthropometrical and clinical measurement. The study assessed the food safety and security with the help of personal hygiene and other safety measures maintained by the food personnel working for midday meal programme, supplying mid meals to children in govt. anganwadies (pre school center). The hygiene level, sanitary condition and microbial quality of food and water, pathological health examination of food handlers were assessed with the help of checklist. A questionnaire was designed to evaluate knowledge, attitude, and practices of food handlers. Results of the study show that the nutritional and health status of rural and urban preschool children was very poor. Many of the food handlers were not aware of general knowledge and hygiene practices to be followed during food preparation areas. An intervention programme of education and importing training at workplaces has shown a positive impact on the outcome of safety and security practices and safe, hygienic practices of food handlers at workplace.

Keywords: food, health, preschool children, safety, security

Procedia PDF Downloads 203
26625 National Security Threat and Fear of Rising Islamic Extremism in Bangladesh due to Influx of Rohingya Refugees

Authors: Afsana Afsar Tuly

Abstract:

The Rohingyas are a group of minority Muslimsin Myanmar who witnessed series of persecution, violence, and torture from Burmese military since 1948. In 2017, around 700,000 Rohingyas fled to the neighboring country Bangladesh and took shelter as refugees after facing clashes with Myanmar security forces. The number increased to 1.8 million in 2020, creating one of the largest refugee crises of recent times. This research focuses on the vulnerability and poverty faced by Rohingyas in refugee camps and how thelack of long-term solution and silence from international communitycan pose national security threat and increasing Islamic extremism in Bangladesh. Islamic religious and terrorist groups have used the Rohingyas position as stateless people to influence them into speaking against the secular government of Bangladesh. There has been increasing crime rates and formation of different rebel groups in refugee camps, causing clashes with Bangladeshi police and authority. Human trafficking, illegal drug dealings, prostitution, and other illicit activities have continuously gone up in the southeastern part of Bangladesh. Some economic, social, and environmental factors are studied and analyzed to show the change in Bangladesh between 2017 and 2020.

Keywords: national security threat, islamic extremism, rohingya refugees, refugee studies, Bangladesh, myanmar

Procedia PDF Downloads 146
26624 Transforming Health Information from Manual to Digital (Electronic) World: A Reference and Guide

Authors: S. Karthikeyan, Naveen Bindra

Abstract:

Introduction: To update ourselves and understand the concept of latest electronic formats available for Health care providers and how it could be used and developed as per standards. The idea is to correlate between the patients Manual Medical Records keeping and maintaining patients Electronic Information in a Health care setup in this world. Furthermore this stands with adapting to the right technology depending upon the organization and improve our quality and quantity of Healthcare providing skills. Objective: The concept and theory is to explain the terms of Electronic Medical Record (EMR), Electronic Health Record (EHR) and Personal Health Record (PHR) and selecting the best technical among the available Electronic sources and software before implementing. It is to guide and make sure the technology used by the end users without any doubts and difficulties. The idea is to evaluate is to admire the uses and barriers of EMR-EHR-PHR. Aim and Scope: The target is to achieve the health care providers like Physicians, Nurses, Therapists, Medical Bill reimbursements, Insurances and Government to assess the patient’s information on easy and systematic manner without diluting the confidentiality of patient’s information. Method: Health Information Technology can be implemented with the help of Organisations providing with legal guidelines and help to stand by the health care provider. The main objective is to select the correct embedded and affordable database management software and generating large-scale data. The parallel need is to know how the latest software available in the market. Conclusion: The question lies here is implementing the Electronic information system with healthcare providers and organisation. The clinicians are the main users of the technology and manage us to ‘go paperless’. The fact is that day today changing technologically is very sound and up to date. Basically the idea is to tell how to store the data electronically safe and secure. All three exemplifies the fact that an electronic format has its own benefit as well as barriers.

Keywords: medical records, digital records, health information, electronic record system

Procedia PDF Downloads 461
26623 Cryptography Based Authentication Methods

Authors: Mohammad A. Alia, Abdelfatah Aref Tamimi, Omaima N. A. Al-Allaf

Abstract:

This paper reviews a comparison study on the most common used authentication methods. Some of these methods are actually based on cryptography. In this study, we show the main cryptographic services. Also, this study presents a specific discussion about authentication service, since the authentication service is classified into several categorizes according to their methods. However, this study gives more about the real life example for each of the authentication methods. It talks about the simplest authentication methods as well about the available biometric authentication methods such as voice, iris, fingerprint, and face authentication.

Keywords: information security, cryptography, system access control, authentication, network security

Procedia PDF Downloads 471
26622 Improving Security Features of Traditional Automated Teller Machines-Based Banking Services via Fingerprint Biometrics Scheme

Authors: Anthony I. Otuonye, Juliet N. Odii, Perpetual N. Ibe

Abstract:

The obvious challenges faced by most commercial bank customers while using the services of ATMs (Automated Teller Machines) across developing countries have triggered the need for an improved system with better security features. Current ATM systems are password-based, and research has proved the vulnerabilities of these systems to heinous attacks and manipulations. We have discovered by research that the security of current ATM-assisted banking services in most developing countries of the world is easily broken and maneuvered by fraudsters, majorly because it is quite difficult for these systems to identify an impostor with privileged access as against the authentic bank account owner. Again, PIN (Personal Identification Number) code passwords are easily guessed, just to mention a few of such obvious limitations of traditional ATM operations. In this research work also, we have developed a system of fingerprint biometrics with PIN code Authentication that seeks to improve the security features of traditional ATM installations as well as other Banking Services. The aim is to ensure better security at all ATM installations and raise the confidence of bank customers. It is hoped that our system will overcome most of the challenges of the current password-based ATM operation if properly applied. The researchers made use of the OOADM (Object-Oriented Analysis and Design Methodology), a software development methodology that assures proper system design using modern design diagrams. Implementation and coding were carried out using Visual Studio 2010 together with other software tools. Results obtained show a working system that provides two levels of security at the client’s side using a fingerprint biometric scheme combined with the existing 4-digit PIN code to guarantee the confidence of bank customers across developing countries.

Keywords: fingerprint biometrics, banking operations, verification, ATMs, PIN code

Procedia PDF Downloads 45
26621 An Investigation of the Relevant Factors of Unplanned Readmission within 14 Days of Discharge in a Regional Teaching Hospital in South Taiwan

Authors: Xuan Hua Huang, Shu Fen Wu, Yi Ting Huang, Pi Yueh Lee

Abstract:

Background: In Taiwan, the Taiwan healthcare care Indicator Series regards the rate of hospital readmission as an important indicator of healthcare quality. Unplanned readmission not only effects patient’s condition but also increase healthcare utilization rate and healthcare costs. Purpose: The purpose of this study was explored the effects of adult unplanned readmission within 14 days of discharge at a regional teaching hospital in South Taiwan. Methods: The retrospectively review design was used. A total 495 participants of unplanned readmissions and 878 of non-readmissions within 14 days recruited from a regional teaching hospital in Southern Taiwan. The instruments used included the Charlson Comorbidity Index, and demographic characteristics, and disease-related variables. Statistical analyses were performed with SPSS version 22.0. The descriptive statistics were used (means, standard deviations, and percentage) and the inferential statistics were used T-test, Chi-square test and Logistic regression. Results: The unplanned readmissions within 14 days rate was 36%. The majorities were 268 males (54.1%), aged >65 were 318 (64.2%), and mean age was 68.8±14.65 years (23-98years). The mean score for the comorbidities was 3.77±2.73. The top three diagnosed of the readmission were digestive diseases (32.7%), respiratory diseases (15.2%), and genitourinary diseases (10.5%). There were significant relationships among the gender, age, marriage, comorbidity status, and discharge planning services (χ2: 3.816-16.474, p: 0.051~0.000). Logistic regression analysis showed that old age (OR = 1.012, 95% CI: 1.003, 1.021), had the multi-morbidity (OR = 0.712~4.040, 95% CI: 0.559~8.522), had been consult with discharge planning services (OR = 1.696, 95% CI: 1.105, 2.061) have a higher risk of readmission. Conclusions: This study finds that multi-morbidity was independent risk factor for unplanned readmissions at 14 days, recommended that the interventional treatment of the medical team be provided to provide integrated care for multi-morbidity to improve the patient's self-care ability and reduce the 14-day unplanned readmission rate.

Keywords: unplanned readmission, comorbidities, Charlson comorbidity index, logistic regression

Procedia PDF Downloads 149
26620 Non-Physician Medical Worker Experience during the COVID-19 Pandemic

Authors: William Mahony, L. Jacqueline Hirth, Richard Rupp, Sandra Gonzalez, Roger Zoorob

Abstract:

Background: The impact of the COVID-19 pandemic on physicians has been considered by many researchers, but less is known about non-physician healthcare workers. The aim of this study is to examine the association of COVID-19 safety training and communication with stress. Methods: A 91-item online survey was distributed, starting January 2, 2021, to non-physician healthcare workers, including physician assistants, nurse practitioners, and medical assistants (MAs) in the United States through email and social media. A $1 donation was made to the Red Cross for each completed survey. The survey consisted of demographics, occupational questions, and perceived stress (perceived stress scale, PSS). Items on the PSS were combined for an overall score and categorized according to the severity of perceived stress. Chi-square tests were performed for bivariate analyses of categorical variables. Results: Of the 284 participants consenting to complete the survey, 197 participants completed the full survey. MAs made up most of the sample at 79%. Among all respondents, 47% had moderate PSS scores (scored between 14 and 26), and 51% had severe PSS scores (scored between 27 and 40). Unvaccinated participants reported statistically significantly lower levels of perceived stress (p = 0.002). Performing tasks outside of typical job responsibilities was not associated with PSS scores (p = .667). Discussion: Non-physician healthcare workers demonstrated a high level of perceived stress overall. The association between vaccination status and perceived stress should be examined in order to evaluate whether vaccination levels could be improved with further education about the virus and associated risks.

Keywords: COVID-19, SARS-Cov-2, nursing, public health

Procedia PDF Downloads 176
26619 Effectiveness of Weather Index Insurance for Smallholders in Ethiopia

Authors: Federica Di Marcantonio, Antoine Leblois, Wolfgang Göbel, Hervè Kerdiles

Abstract:

Weather-related shocks can threaten the ability of farmers to maintain their agricultural output and food security levels. Informal coping mechanisms (i.e. migration or community risk sharing) have always played a significant role in mitigating the negative effects of weather-related shocks in Ethiopia, but they have been found to be an incomplete strategy, particularly as a response to covariate shocks. Particularly, as an alternative to the traditional risk pooling products, an innovative form of insurance known as Index-based Insurance has received a lot of attention from researchers and international organizations, leading to an increased number of pilot initiatives in many countries. Despite the potential benefit of the product in protecting the livelihoods of farmers and pastoralists against climate shocks, to date there has been an unexpectedly low uptake. Using information from current pilot projects on index-based insurance in Ethiopia, this paper discusses the determinants of uptake that have so far undermined the scaling-up of the products, by focusing in particular on weather data availability, price affordability and willingness to pay. We found that, aside from data constraint issues, high price elasticity and low willingness to pay represent impediments to the development of the market. These results, bring us to rethink the role of index insurance as products for enhancing smallholders’ response to covariate shocks, and particularly for improving their food security.

Keywords: index-based insurance, willingness to pay, satellite information, Ethiopia

Procedia PDF Downloads 407
26618 Reliable and Error-Free Transmission through Multimode Polymer Optical Fibers in House Networks

Authors: Tariq Ahamad, Mohammed S. Al-Kahtani, Taisir Eldos

Abstract:

Optical communications technology has made enormous and steady progress for several decades, providing the key resource in our increasingly information-driven society and economy. Much of this progress has been in finding innovative ways to increase the data carrying capacity of a single optical fiber. In this research article we have explored basic issues in terms of security and reliability for secure and reliable information transfer through the fiber infrastructure. Conspicuously, one potentially enormous source of improvement has however been left untapped in these systems: fibers can easily support hundreds of spatial modes, but today’s commercial systems (single-mode or multi-mode) make no attempt to use these as parallel channels for independent signals. Bandwidth, performance, reliability, cost efficiency, resiliency, redundancy, and security are some of the demands placed on telecommunications today. Since its initial development, fiber optic systems have had the advantage of most of these requirements over copper-based and wireless telecommunications solutions. The largest obstacle preventing most businesses from implementing fiber optic systems was cost. With the recent advancements in fiber optic technology and the ever-growing demand for more bandwidth, the cost of installing and maintaining fiber optic systems has been reduced dramatically. With so many advantages, including cost efficiency, there will continue to be an increase of fiber optic systems replacing copper-based communications. This will also lead to an increase in the expertise and the technology needed to tap into fiber optic networks by intruders. As ever before, all technologies have been subject to hacking and criminal manipulation, fiber optics is no exception. Researching fiber optic security vulnerabilities suggests that not everyone who is responsible for their networks security is aware of the different methods that intruders use to hack virtually undetected into fiber optic cables. With millions of miles of fiber optic cables stretching across the globe and carrying information including but certainly not limited to government, military, and personal information, such as, medical records, banking information, driving records, and credit card information; being aware of fiber optic security vulnerabilities is essential and critical. Many articles and research still suggest that fiber optics is expensive, impractical and hard to tap. Others argue that it is not only easily done, but also inexpensive. This paper will briefly discuss the history of fiber optics, explain the basics of fiber optic technologies and then discuss the vulnerabilities in fiber optic systems and how they can be better protected. Knowing the security risks and knowing the options available may save a company a lot embarrassment, time, and most importantly money.

Keywords: in-house networks, fiber optics, security risk, money

Procedia PDF Downloads 423
26617 Improving Health Workers’ Well-Being in Cittadella Hospital (Province of Padua), Italy

Authors: Emanuela Zilli, Suana Tikvina, Davide Bonaldo, Monica Varotto, Scilla Rizzardi, Barbara Ruzzante, Raffaele Napolitano, Stefano Bevilacqua, Antonella Ruffatto

Abstract:

A healthy workplace increases productivity, creativity and decreases absenteeism and turnover. It also contributes to creating a more secure work environment with fewer risks of violence. In the past 3 years, the healthcare system has suffered the psychological, economic and social consequences of the COVID-19 pandemic. On the other hand, the healthcare staff reductions determine high levels of work-related stress that are often unsustainable. The Hospital of Cittadella (in the province of Padua) has 400 beds and serves a territory of 300,000 inhabitants. The hospital itself counts 1.250 healthcare employees (healthcare professionals). This year, the Medical Board of Directors has requested additional staff; however, the economic situation of Italy can not sustain additional hires. At the same time, we have initiated projects that aim to increase well-being, decrease stress and encourage activities that promote self-care. One of the projects that the hospital has organized is the psychomotor practice. It is held by therapists and trainers who operate according to the traditional method. According to the literature, the psychomotor practice is specifically intended for the staff operating in the Intensive Care Unit, Emergency Department and Pneumology Ward. The project consisted of one session of 45 minutes a week for 3 months. This method brings focus to controlled breathing, posture, muscle work and movement that help manage stress and fatigue, creating a more mindful and sustainable lifestyle. In addition, a Qigong course was held every two weeks for 5 months. It is an ancient Chinese practice designed to optimize the energy within the body, reducing stress levels and increasing general well-being. Finally, Tibetan singing crystal bowls sessions, held by a music therapist, consisted of monthly guided meditation sessions using the sounds of the crystal bowls. Sound therapy uses the vibrations created from the crystal bowls to balance the vibrations within the body to promote relaxation. In conclusion, well-being and organizational performance are closely related to each other. It is crucial for any organization to encourage and maintain better physical and mental health of the healthcare staff as it directly affects productivity and, consequently, user satisfaction of the services provided.

Keywords: health promotion, healthcare workers management, Weel being and organizational performance, Psychomotor practice

Procedia PDF Downloads 70
26616 Exploring Factors Related to Unplanning Readmission of Elderly Patients in Taiwan

Authors: Hui-Yen Lee, Hsiu-Yun Wei, Guey-Jen Lin, Pi-Yueh Lee Lee

Abstract:

Background: Unplanned hospital readmissions increase healthcare costs and have been considered a marker of poor healthcare performance. The elderly face a higher risk of unplanned readmission due to elderly-specific characteristics such as deteriorating body functions and the relatively high incidence of complications after treatment of acute diseases. Purpose: The aim of this study was exploring the factors that relate to the unplanned readmission of elderly within 14 days of discharge at our hospital in southern Taiwan. Methods: We retrospectively reviewed the medical records of patients aged ≥65 years who had been re-admitted between January 2018 and December 2018.The Charlson Comorbidity score was calculated using previous used method. Related factors that affected the rate of unplanned readmission within 14 days of discharge were screened and analyzed using the chi-squared test and logistic regression analysis. Results: This study enrolled 829 subjects aged more than 65 years. The numbers of unplanned readmission patients within 14 days were 318 cases, while those did not belong to the unplanned readmission were 511 cases. In 2018, the rate of elderly patients in unplanned 14 days readmissions was 38.4%. The majority patients were females (166 cases, 52.2%), with an average age of 77.6 ± 7.90 years (65-98). The average value of Charlson Comorbidity score was 4.42±2.76. Using logistic regression analysis, we found that the gastric or peptic ulcer (OR=1.917 , P< 0.002), diabetes (OR= 0.722, P< 0.043), hemiplegia (OR= 2.292, P< 0.015), metastatic solid tumor (OR= 2.204, P< 0.025), hypertension (OR= 0.696, P< 0.044), and skin ulcer/cellulitis (OR= 2.747, P< 0.022) have significantly higher risk of 14-day readmissions. Conclusion: The results of the present study may assist the healthcare teams to understand the factors that may affect unplanned readmission in the elderly. We recommend that these teams give efficient approach in their medical practice, provide timely health education for elderly, and integrative healthcare for chronic diseases in order to reduce unplanned readmissions.

Keywords: unplanning readmission, elderly, Charlson comorbidity score, logistic regression analysis

Procedia PDF Downloads 131
26615 Health Inequalities in the Global South: Identification of Poor People with Disabilities in Cambodia to Generate Access to Healthcare

Authors: Jamie Lee Harder

Abstract:

In the context of rapidly changing social and economic circumstances in the developing world, this paper analyses access to public healthcare for poor people with disabilities in Cambodia. Like other countries of South East Asia, Cambodia is developing at rapid pace. The historical past of Cambodia, however, has set former social policy structures to zero. This past forces Cambodia and its citizens to implement new public health policies to align with the needs of social care, healthcare, and urban planning. In this context, the role of people with disabilities (PwDs) is crucial as new developments should and can take into consideration their specific needs from the beginning onwards. This paper is based on qualitative research with expert interviews and focus group discussions in Cambodia. During the field work it became clear that the identification tool for the poorest households (HHs) does not count disability as a financial risk to fall into poverty neither when becoming sick nor because of higher health expenditures and/or lower income because of the disability. The social risk group of poor PwDs faces several barriers in accessing public healthcare. The urbanization, the socio-economic health status, and opportunities for education; all influence social status and have an impact on the health situation of these individuals. Cambodia has various difficulties with providing access to people with disabilities, mostly due to barriers regarding finances, geography, quality of care, poor knowledge about their rights and negative social and cultural beliefs. Shortened budgets and the lack of prioritizations lead to the need for reorientation of local communities, international and national non-governmental organizations and social policy. The poorest HHs are identified with a questionnaire, the IDPoor program, for which the Ministry of Planning is responsible. The identified HHs receive an ‘Equity Card’ which provides access free of charge to public healthcare centers and hospitals among other benefits. The dataset usually does not include information about the disability status. Four focus group discussions (FGD) with 28 participants showed various barriers in accessing public healthcare. These barriers go far beyond a missing ramp to access the healthcare center. The contents of the FGDs were ratified and repeated during the expert interviews with the local Ministries, NGOs, international organizations and private persons working in the field. The participants of the FGDs faced and continue to face high discrimination, low capacity to work and earn an own income, dependency on others and less social competence in their lives. When discussing their health situation, we identified, a huge difference between those who are identified and hold an Equity Card and those who do not. Participants reported high costs without IDPoor identification, positive experiences when going to the health center in terms of attitude and treatment, low satisfaction with specific capacities for treatments, negative rumors, and discrimination with the consequence of fear to seek treatment in many cases. The problem of accessing public healthcare by risk groups can be adapted to situations in other countries.

Keywords: access, disability, health, inequality, Cambodia

Procedia PDF Downloads 152
26614 Border Security: Implementing the “Memory Effect” Theory in Irregular Migration

Authors: Iliuta Cumpanasu, Veronica Oana Cumpanasu

Abstract:

This paper focuses on studying the conjunction between the new emerged theory of “Memory Effect” in Irregular Migration and Related Criminality and the notion of securitization, and its impact on border management, bringing about a scientific advancement in the field by identifying the patterns corresponding to the linkage of the two concepts, for the first time, and developing a theoretical explanation, with respect to the effects of the non-military threats on border security. Over recent years, irregular migration has experienced a significant increase worldwide. The U.N.'s refugee agency reports that the number of displaced people is at its highest ever - surpassing even post-World War II numbers when the world was struggling to come to terms with the most devastating event in history. This is also the fresh reality within the core studied coordinate, the Balkan Route of Irregular Migration, which starts from Asia and Africa and continues to Turkey, Greece, North Macedonia or Bulgaria, Serbia, and ends in Romania, where thousands of migrants find themselves in an irregular situation concerning their entry to the European Union, with its important consequences concerning the related criminality. The data from the past six years was collected by making use of semi-structured interviews with experts in the field of migration and desk research within some organisations involved in border security, pursuing the gathering of genuine insights from the aforementioned field, which was constantly addressed the existing literature and subsequently subjected to the mixed methods of analysis, including the use of the Vector Auto-Regression estimates model. Thereafter, the analysis of the data followed the processes and outcomes in Grounded Theory, and a new Substantive Theory emerged, explaining how the phenomena of irregular migration and cross-border criminality are the decisive impetus for implementing the concept of securitization in border management by using the proposed pattern. The findings of the study are therefore able to capture an area that has not yet benefitted from a comprehensive approach in the scientific community, such as the seasonality, stationarity, dynamics, predictions, or the pull and push factors in Irregular Migration, also highlighting how the recent ‘Pandemic’ interfered with border security. Therefore, the research uses an inductive revelatory theoretical approach which aims at offering a new theory in order to explain a phenomenon, triggering a practically handy contribution for the scientific community, research institutes or Academia and also usefulness to organizational practitioners in the field, among which UN, IOM, UNHCR, Frontex, Interpol, Europol, or national agencies specialized in border security. The scientific outcomes of this study were validated on June 30, 2021, when the author defended his dissertation for the European Joint Master’s in Strategic Border Management, a two years prestigious program supported by the European Commission and Frontex Agency and a Consortium of six European Universities and is currently one of the research objectives of his pending PhD research at the West University Timisoara.

Keywords: migration, border, security, memory effect

Procedia PDF Downloads 92
26613 The New Approach to Airport Emergency Plans

Authors: Jakub Kraus, Vladimír Plos, Peter Vittek

Abstract:

This article deals with a new approach to the airport emergency plans, which are the basic documents and manuals for dealing with events with impact on safety or security. The article describes the identified parts in which the current airport emergency plans do not fulfill their role and which should therefore be considered in the creation of corrective measures. All these issues have been identified at airports in the Czech Republic and confirmed at airports in neighboring countries.

Keywords: airport emergency plan, aviation safety, aviation security, comprehensive management system

Procedia PDF Downloads 512
26612 The Burden and the Consequences of Waste Management in Nigeria: Geophysical Approach

Authors: Joseph Omeiza Alao

Abstract:

The wobbly state of waste management and the high level of environmental irresponsibility is a threat to environmental security, which invariably endangered public health, regional groundwater systems and atmospheric condition. The dumping of waste materials in water bodies and gutters and the frequent burning of waste materials heaped at dumpsites as well depict the highest level of environmental indiscipline. These unruly human factors have compelled this study to apply four different techniques for environmental impact assessment and the possible public health risks of poor waste management in Nigeria. The techniques include a geophysical survey (resistivity data acquisition), dispatched questionnaire surveys, physiochemical water analysis and a physical survey of several dumpsites. While the resistivity data indicates high-level dumpsite leachate invading the ground soil down to the water table, the physiochemical water analysis depicts high content of BOD (401 – 711) mg/l, COD (731 – 1312) mg/l, TDS (419 – 1871) mg/l and heavy metals (0.014 – 1.971) mg/l present in the regional groundwater systems, which have altered the chemistry of the regional groundwater. The resistivity data shows that the overburdened soil layer overlaying the regional groundwater systems was very low (4.5 Ωm – 151 Ωm) as against the existing data (180 Ωm – 3500 Ωm). However, the physical surveys and the dispatched questionnaire surveys explore the depth of environmental irresponsibility among the citizen. While the imprints of gross environmental indiscipline may be absolutely irreversible, adequate knowledge of the environmental implications of careless waste disposal. After a critical examination of the current waste management strategies in Nigeria, the study suggests a future direction for environmental security and sustainability. Several influential regional factors, such as geology, climatic conditions, and hydrology, were also discussed.

Keywords: groundwater, environmental indiscipline, waste management, water analysis, leachate plumes, public health

Procedia PDF Downloads 69
26611 Impacts of Sociological Dynamics on Entomophagy Practice and Food Security in Nigeria

Authors: O. B. Oriolowo, O. J. John

Abstract:

Empirical findings have shown insects to be nutritious and good source of food for man. However, human food preferences are not only determined by nutritional values of food consumed but, more importantly, by sociology and economic pressure. This study examined the interrelation between science and sociology in sustaining the acceptance of entomophagy among college students to combat food insecurity. A twenty items five Likert scale, College Students Entomophagy Questionnaire (CSEQ), was used to elucidate information from the respondents. The reliability coefficient was obtained to be 0.91 using Spearman-Brown Prophecy formula. Three research questions and three hypotheses were raised. Also, quantitative nutritional analysis of few insects and some established conventional protein sources were undertaking in order to compare their nutritional status. The data collected were analyzed using descriptive statistics of percentages and inferential statistics of correlation and Analysis of Variance (ANOVA). The results obtained showed that entomophagy has cultural heritage among different tribes in Nigeria and is an acceptable practice; it cuts across every social stratum and is practiced among both major religions. Moreover, insects compared favourably in term of nutrient contents when compared with the conventional animal protein sources analyzed. However, there is a gradual decline in the practice of entomophagy among students, which may be attributed to the influence of western civilization. This study, therefore, recommended an intensification of research and enlightenment of people on the usefulness of entomophagy so as to preserve its cultural heritage as well as boost human food security.

Keywords: entomophagy, food security, malnutrition, poverty alleviation, sociology

Procedia PDF Downloads 121
26610 War and Surgery: A Comparative Analysis of Postoperative Complications, Outcomes, and Risk Factors in Conflict and Safe Zones across Sudan, with a Proposed Predictive Model for Severity

Authors: Alaa Ashraf Khaleel Abdallah

Abstract:

Background: The global landscape has witnessed an alarming rise in armed conflicts, further devastating populations through enforced displacement, compromised infrastructure, and strained healthcare systems. In Sudan, the situation is particularly dire, with conflict exacerbating shortages in medical supplies and personnel, pushing the already fragile healthcare system into crisis, especially affecting surgical care. Initially, war impacts were significant in conflict zones like Khartoum, but since mid-April 2023, the entire country has descended into chaos. Weak monitoring and health information systems hinder accurate assessment of surgical care in conflict zones, leading to inadequate resource allocation, suboptimal care, and missed opportunities for global learning. This study investigates the impact of the Sudanese conflict on postoperative complications, exploring prevalence, types, outcomes, and psychological effects in conflict and safe areas. Methods: Conducted across 10 Sudanese states—5 in conflict zones such as Khartoum and West Darfur, and 5 in safer regions like River Nile and Kassala—this study analyzed data from 1,457 patients who underwent surgery post-April 2023. Data were collected using a pretested, mixed-mode questionnaire that incorporated elements from validated frameworks and tailored questions specific to the study's context. Hospital records and surgical logs were also used, with data analyzed via SPSS. Results: The overall prevalence of postoperative complications was 35.89%, with a higher rate in conflict zones (57.5%) compared to safe areas (26.4%). Surgical site infections predominated in conflict zones (24.7%) and higher than its prevalence in safe areas, and while fever was prevalent in safer regions even though much less compared to conflict areas, bleeding from surgical site was very frequent in conflict areas. Most patients recovered within two months at a rate higher in safe areas, but most of them required further medical or surgical management within the first month, but psychological impacts were more pronounced in conflict zones with 22.22% reported anxiety among injuries patients, and 20.6% experienced depression, 13.5% and 16.9% respectively, in those had surgeries for other medical conditions, compared to 0.22%anxiety rates and 8.1%for depression in safer regions. Risk factors included age, travel to conflict zones, access to care, delays, and comorbidities. Conclusion: Strengthening healthcare systems and ensuring accessible surgical care are critical in both conflict and safe areas. Specific attention must be given to addressing patient suffering and demographic shifts caused by armed conflict. Further research is needed to refine the predictive model for postoperative complications in conflict zones.

Keywords: postoperative complications, conflict zones, risk factors, surgical outcomes, Sudan

Procedia PDF Downloads 13
26609 Cryptographic Resource Allocation Algorithm Based on Deep Reinforcement Learning

Authors: Xu Jie

Abstract:

As a key network security method, cryptographic services must fully cope with problems such as the wide variety of cryptographic algorithms, high concurrency requirements, random job crossovers, and instantaneous surges in workloads. Its complexity and dynamics also make it difficult for traditional static security policies to cope with the ever-changing situation. Cyber Threats and Environment. Traditional resource scheduling algorithms are inadequate when facing complex decision-making problems in dynamic environments. A network cryptographic resource allocation algorithm based on reinforcement learning is proposed, aiming to optimize task energy consumption, migration cost, and fitness of differentiated services (including user, data, and task security) by modeling the multi-job collaborative cryptographic service scheduling problem as a multi-objective optimized job flow scheduling problem and using a multi-agent reinforcement learning method, efficient scheduling and optimal configuration of cryptographic service resources are achieved. By introducing reinforcement learning, resource allocation strategies can be adjusted in real-time in a dynamic environment, improving resource utilization and achieving load balancing. Experimental results show that this algorithm has significant advantages in path planning length, system delay and network load balancing and effectively solves the problem of complex resource scheduling in cryptographic services.

Keywords: cloud computing, cryptography on-demand service, reinforcement learning, workflow scheduling

Procedia PDF Downloads 18
26608 Evaluating the Perception of Roma in Europe through Social Network Analysis

Authors: Giulia I. Pintea

Abstract:

The Roma people are a nomadic ethnic group native to India, and they are one of the most prevalent minorities in Europe. In the past, Roma were enslaved and they were imprisoned in concentration camps during the Holocaust; today, Roma are subject to hate crimes and are denied access to healthcare, education, and proper housing. The aim of this project is to analyze how the public perception of the Roma people may be influenced by antiziganist and pro-Roma institutions in Europe. In order to carry out this project, we used social network analysis to build two large social networks: The antiziganist network, which is composed of institutions that oppress and racialize Roma, and the pro-Roma network, which is composed of institutions that advocate for and protect Roma rights. Measures of centrality, density, and modularity were obtained to determine which of the two social networks is exerting the greatest influence on the public’s perception of Roma in European societies. Furthermore, data on hate crimes on Roma were gathered from the Organization for Security and Cooperation in Europe (OSCE). We analyzed the trends in hate crimes on Roma for several European countries for 2009-2015 in order to see whether or not there have been changes in the public’s perception of Roma, thus helping us evaluate which of the two social networks has been more influential. Overall, the results suggest that there is a greater and faster exchange of information in the pro-Roma network. However, when taking the hate crimes into account, the impact of the pro-Roma institutions is ambiguous, due to differing patterns among European countries, suggesting that the impact of the pro-Roma network is inconsistent. Despite antiziganist institutions having a slower flow of information, the hate crime patterns also suggest that the antiziganist network has a higher impact on certain countries, which may be due to institutions outside the political sphere boosting the spread of antiziganist ideas and information to the European public.

Keywords: applied mathematics, oppression, Roma people, social network analysis

Procedia PDF Downloads 278
26607 Proposal of Optimality Evaluation for Quantum Secure Communication Protocols by Taking the Average of the Main Protocol Parameters: Efficiency, Security and Practicality

Authors: Georgi Bebrov, Rozalina Dimova

Abstract:

In the field of quantum secure communication, there is no evaluation that characterizes quantum secure communication (QSC) protocols in a complete, general manner. The current paper addresses the problem concerning the lack of such an evaluation for QSC protocols by introducing an optimality evaluation, which is expressed as the average over the three main parameters of QSC protocols: efficiency, security, and practicality. For the efficiency evaluation, the common expression of this parameter is used, which incorporates all the classical and quantum resources (bits and qubits) utilized for transferring a certain amount of information (bits) in a secure manner. By using criteria approach whether or not certain criteria are met, an expression for the practicality evaluation is presented, which accounts for the complexity of the QSC practical realization. Based on the error rates that the common quantum attacks (Measurement and resend, Intercept and resend, probe attack, and entanglement swapping attack) induce, the security evaluation for a QSC protocol is proposed as the minimum function taken over the error rates of the mentioned quantum attacks. For the sake of clarity, an example is presented in order to show how the optimality is calculated.

Keywords: quantum cryptography, quantum secure communcation, quantum secure direct communcation security, quantum secure direct communcation efficiency, quantum secure direct communcation practicality

Procedia PDF Downloads 185
26606 Advances in Mathematical Sciences: Unveiling the Power of Data Analytics

Authors: Zahid Ullah, Atlas Khan

Abstract:

The rapid advancements in data collection, storage, and processing capabilities have led to an explosion of data in various domains. In this era of big data, mathematical sciences play a crucial role in uncovering valuable insights and driving informed decision-making through data analytics. The purpose of this abstract is to present the latest advances in mathematical sciences and their application in harnessing the power of data analytics. This abstract highlights the interdisciplinary nature of data analytics, showcasing how mathematics intersects with statistics, computer science, and other related fields to develop cutting-edge methodologies. It explores key mathematical techniques such as optimization, mathematical modeling, network analysis, and computational algorithms that underpin effective data analysis and interpretation. The abstract emphasizes the role of mathematical sciences in addressing real-world challenges across different sectors, including finance, healthcare, engineering, social sciences, and beyond. It showcases how mathematical models and statistical methods extract meaningful insights from complex datasets, facilitating evidence-based decision-making and driving innovation. Furthermore, the abstract emphasizes the importance of collaboration and knowledge exchange among researchers, practitioners, and industry professionals. It recognizes the value of interdisciplinary collaborations and the need to bridge the gap between academia and industry to ensure the practical application of mathematical advancements in data analytics. The abstract highlights the significance of ongoing research in mathematical sciences and its impact on data analytics. It emphasizes the need for continued exploration and innovation in mathematical methodologies to tackle emerging challenges in the era of big data and digital transformation. In summary, this abstract sheds light on the advances in mathematical sciences and their pivotal role in unveiling the power of data analytics. It calls for interdisciplinary collaboration, knowledge exchange, and ongoing research to further unlock the potential of mathematical methodologies in addressing complex problems and driving data-driven decision-making in various domains.

Keywords: mathematical sciences, data analytics, advances, unveiling

Procedia PDF Downloads 95
26605 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble

Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi

Abstract:

Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.

Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble

Procedia PDF Downloads 222