Search results for: emergency medical services information system (EMSIS)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 29471

Search results for: emergency medical services information system (EMSIS)

28331 Machine Learning Methods for Network Intrusion Detection

Authors: Mouhammad Alkasassbeh, Mohammad Almseidin

Abstract:

Network security engineers work to keep services available all the time by handling intruder attacks. Intrusion Detection System (IDS) is one of the obtainable mechanisms that is used to sense and classify any abnormal actions. Therefore, the IDS must be always up to date with the latest intruder attacks signatures to preserve confidentiality, integrity, and availability of the services. The speed of the IDS is a very important issue as well learning the new attacks. This research work illustrates how the Knowledge Discovery and Data Mining (or Knowledge Discovery in Databases) KDD dataset is very handy for testing and evaluating different Machine Learning Techniques. It mainly focuses on the KDD preprocess part in order to prepare a decent and fair experimental data set. The J48, MLP, and Bayes Network classifiers have been chosen for this study. It has been proven that the J48 classifier has achieved the highest accuracy rate for detecting and classifying all KDD dataset attacks, which are of type DOS, R2L, U2R, and PROBE.

Keywords: IDS, DDoS, MLP, KDD

Procedia PDF Downloads 228
28330 Microbial Resource Research Infrastructure: A Large-Scale Research Infrastructure for Microbiological Services

Authors: R. Hurtado-Ortiz, D. Clermont, M. Schüngel, C. Bizet, D. Smith, E. Stackebrandt

Abstract:

Microbiological resources and their derivatives are the essential raw material for the advancement of human health, agro-food, food security, biotechnology, research and development in all life sciences. Microbial resources, and their genetic and metabolic products, are utilised in many areas such as production of healthy and functional food, identification of new antimicrobials against emerging and resistant pathogens, fighting agricultural disease, identifying novel energy sources on the basis of microbial biomass and screening for new active molecules for the bio-industries. The complexity of public collections, distribution and use of living biological material (not only living but also DNA, services, training, consultation, etc.) and service offer, demands the coordination and sharing of policies, processes and procedures. The Microbial Resource Research Infrastructure (MIRRI) is an initiative within the European Strategy Forum Infrastructures (ESFRI), bring together 16 partners including 13 European public microbial culture collections and biological resource centres (BRCs), supported by several European and non-European associated partners. The objective of MIRRI is to support innovation in microbiology by provision of a one-stop shop for well-characterized microbial resources and high quality services on a not-for-profit basis for biotechnology in support of microbiological research. In addition, MIRRI contributes to the structuring of microbial resources capacity both at the national and European levels. This will facilitate access to microorganisms for biotechnology for the enhancement of the bio-economy in Europe. MIRRI will overcome the fragmentation of access to current resources and services, develop harmonised strategies for delivery of associated information, ensure bio-security and other regulatory conditions to bring access and promote the uptake of these resources into European research. Data mining of the landscape of current information is needed to discover potential and drive innovation, to ensure the uptake of high quality microbial resources into research. MIRRI is in its Preparatory Phase focusing on governance and structure including technical, legal governance and financial issues. MIRRI will help the Biological Resources Centres to work more closely with policy makers, stakeholders, funders and researchers, to deliver resources and services needed for innovation.

Keywords: culture collections, microbiology, infrastructure, microbial resources, biotechnology

Procedia PDF Downloads 433
28329 A Review of Farmer Participation in Information and Communication Technology through Mobile Banking and Mobile Marketing in Rural Agricultural Systems

Authors: J. Cadby, K. Miyazawa

Abstract:

Information and Communication Technology (ICT) has been widely adopted into the agricultural landscape with advancements of mobile connectivity and data accessibility. In developed nations, mobile-technology is well integrated into marketing transactions, and also plays a crucial role in making data-driven decisions on-farm. In developing nations, mobile banking and access to agricultural extension services allow for informed decision-making and smoother transactions. In addition, the availability of updated and readily available market and climate data provides a negotiation platform, reducing economic risks for farmers worldwide. The total usage of mobile technology has risen over the past 20 years, and almost three-quarters of the world’s population subscribes to mobile technology. This study reviewed mobile technology integration into agricultural systems in developing and developed nations. Data from secondary sources were collected and investigated. The objectives of the study include a review of the success of mobile banking transactions in developing nations, and a review of application and SMS based services for direct marketing in both developed and developing nations. Rural farmers in developing countries with access to diverse m-banking options experienced increased access to farm investment resources with the use of mobile banking technology. Rural farmers involved in perishable crop production were also more likely to benefit from mobile platform sales participation. ICT programs reached through mobile application and SMS increased access to agricultural extension materials and marketing tools for demographics that faced literacy-challenges and isolated markets. As mobile technology becomes more ubiquitous in the global agricultural system, training and market opportunities to facilitate mobile usage in developing agricultural systems are necessary. Digital skills training programs are necessary in order to improve equal global adoption of ICT in agriculture.

Keywords: market participation, mobile banking, mobile technology, rural farming

Procedia PDF Downloads 241
28328 Human Computer Interaction Using Computer Vision and Speech Processing

Authors: Shreyansh Jain Jeetmal, Shobith P. Chadaga, Shreyas H. Srinivas

Abstract:

Internet of Things (IoT) is seen as the next major step in the ongoing revolution in the Information Age. It is predicted that in the near future billions of embedded devices will be communicating with each other to perform a plethora of tasks with or without human intervention. One of the major ongoing hotbed of research activity in IoT is Human Computer Interaction (HCI). HCI is used to facilitate communication between an intelligent system and a user. An intelligent system typically comprises of a system consisting of various sensors, actuators and embedded controllers which communicate with each other to monitor data collected from the environment. Communication by the user to the system is typically done using voice. One of the major ongoing applications of HCI is in home automation as a personal assistant. The prime objective of our project is to implement a use case of HCI for home automation. Our system is designed to detect and recognize the users and personalize the appliances in the house according to their individual preferences. Our HCI system is also capable of speaking with the user when certain commands are spoken such as searching on the web for information and controlling appliances. Our system can also monitor the environment in the house such as air quality and gas leakages for added safety.

Keywords: human computer interaction, internet of things, computer vision, sensor networks, speech to text, text to speech, android

Procedia PDF Downloads 351
28327 Toward a Risk Assessment Model Based on Multi-Agent System for Cloud Consumer

Authors: Saadia Drissi

Abstract:

The cloud computing is an innovative paradigm that introduces several changes in technology that have resulted a new ways for cloud providers to deliver their services to cloud consumers mainly in term of security risk assessment, thus, adapting a current risk assessment tools to cloud computing is a very difficult task due to its several characteristics that challenge the effectiveness of risk assessment approaches. As consequence, there is a need of risk assessment model adapted to cloud computing. This paper requires a new risk assessment model based on multi-agent system and AHP model as fundamental steps towards the development of flexible risk assessment approach regarding cloud consumers.

Keywords: cloud computing, risk assessment model, multi-agent system, AHP model, cloud consumer

Procedia PDF Downloads 539
28326 Automated Marker Filling System

Authors: Pinisetti Swami Sairam, Meera C. S.

Abstract:

Marker pens are widely used all over the world, mainly in educational institutions due to their neat, accurate and easily erasable nature. But refilling the ink in these pens is a tedious and time consuming job. Besides, it requires careful handling of the pens and ink bottle. A fully automated marker filling system is a solution developed to overcome this problem. The system comprises of pneumatics and electronics modules as well as PLC control. The system design is done in such a way that the empty markers are dumped in a marker container which then sent through different modules of the system in order to refill it automatically. The filled markers are then collected in a marker container. Refilling of ink takes place in different stages inside the system. An ink detecting system detects the colour of the marker which is to be filled and then refilling is done. The processes like capping and uncapping of the cap as well as screwing and unscrewing of the tip are done with the help of robotic arm and gripper. We make use of pneumatics in this system in order to get the precision while performing the capping, screwing, and refilling operations. Thus with the help of this system we can achieve cleanliness, accuracy, effective and time saving in the process of filling a marker.

Keywords: automated system, market filling, information technology, control and automation

Procedia PDF Downloads 483
28325 Message Framework for Disaster Management: An Application Model for Mines

Authors: A. Baloglu, A. Çınar

Abstract:

Different tools and technologies were implemented for Crisis Response and Management (CRM) which is generally using available network infrastructure for information exchange. Depending on type of disaster or crisis, network infrastructure could be affected and it could not be able to provide reliable connectivity. Thus any tool or technology that depends on the connectivity could not be able to fulfill its functionalities. As a solution, a new message exchange framework has been developed. Framework provides offline/online information exchange platform for CRM Information Systems (CRMIS) and it uses XML compression and packet prioritization algorithms and is based on open source web technologies. By introducing offline capabilities to the web technologies, framework will be able to perform message exchange on unreliable networks. The experiments done on the simulation environment provide promising results on low bandwidth networks (56kbps and 28.8 kbps) with up to 50% packet loss and the solution is to successfully transfer all the information on these low quality networks where the traditional 2 and 3 tier applications failed.

Keywords: crisis response and management, XML messaging, web services, XML compression, mining

Procedia PDF Downloads 329
28324 A Practice of Zero Trust Architecture in Financial Transactions

Authors: Liwen Wang, Yuting Chen, Tong Wu, Shaolei Hu

Abstract:

In order to enhance the security of critical financial infrastructure, this study carries out a transformation of the architecture of a financial trading terminal to a zero trust architecture (ZTA), constructs an active defense system for cybersecurity, improves the security level of trading services in the Internet environment, enhances the ability to prevent network attacks and unknown risks, and reduces the industry and security risks brought about by cybersecurity risks. This study introduces the SDP technology of ZTA, adapts and applies it to a financial trading terminal to achieve security optimization and fine-grained business grading control. The upgraded architecture of the trading terminal moves security protection forward to the user access layer, replaces VPN to optimize remote access, and significantly improves the security protection capability of Internet transactions. The study achieves 1. deep integration with the access control architecture of the transaction system; 2. no impact on the performance of terminals and gateways, and no perception of application system upgrades; 3. customized checklist and policy configuration; 4. introduction of industry-leading security technology such as single-packet authorization (SPA) and secondary authentication. This study carries out a successful application of ZTA in the field of financial trading and provides transformation ideas for other similar systems while improving the security level of financial transaction services in the Internet environment.

Keywords: zero trust, trading terminal, architecture, network security, cybersecurity

Procedia PDF Downloads 147
28323 Improving Fingerprinting-Based Localization System Using Generative AI

Authors: Getaneh Berie Tarekegn, Li-Chia Tai

Abstract:

With the rapid advancement of artificial intelligence, low-power built-in sensors on Internet of Things devices, and communication technologies, location-aware services have become increasingly popular and have permeated every aspect of people’s lives. Global navigation satellite systems (GNSSs) are the default method of providing continuous positioning services for ground and aerial vehicles, as well as consumer devices (smartphones, watches, notepads, etc.). However, the environment affects satellite positioning systems, particularly indoors, in dense urban and suburban cities enclosed by skyscrapers, or when deep shadows obscure satellite signals. This is because (1) indoor environments are more complicated due to the presence of many objects surrounding them; (2) reflection within the building is highly dependent on the surrounding environment, including the positions of objects and human activity; and (3) satellite signals cannot be reached in an indoor environment, and GNSS doesn't have enough power to penetrate building walls. GPS is also highly power-hungry, which poses a severe challenge for battery-powered IoT devices. Due to these challenges, IoT applications are limited. Consequently, precise, seamless, and ubiquitous Positioning, Navigation and Timing (PNT) systems are crucial for many artificial intelligence Internet of Things (AI-IoT) applications in the era of smart cities. Their applications include traffic monitoring, emergency alarms, environmental monitoring, location-based advertising, intelligent transportation, and smart health care. This paper proposes a generative AI-based positioning scheme for large-scale wireless settings using fingerprinting techniques. In this article, we presented a semi-supervised deep convolutional generative adversarial network (S-DCGAN)-based radio map construction method for real-time device localization. We also employed a reliable signal fingerprint feature extraction method with t-distributed stochastic neighbor embedding (t-SNE), which extracts dominant features while eliminating noise from hybrid WLAN and long-term evolution (LTE) fingerprints. The proposed scheme reduced the workload of site surveying required to build the fingerprint database by up to 78.5% and significantly improved positioning accuracy. The results show that the average positioning error of GAILoc is less than 0.39 m, and more than 90% of the errors are less than 0.82 m. According to numerical results, SRCLoc improves positioning performance and reduces radio map construction costs significantly compared to traditional methods.

Keywords: location-aware services, feature extraction technique, generative adversarial network, long short-term memory, support vector machine

Procedia PDF Downloads 31
28322 Downtime Estimation of Building Structures Using Fuzzy Logic

Authors: M. De Iuliis, O. Kammouh, G. P. Cimellaro, S. Tesfamariam

Abstract:

Community Resilience has gained a significant attention due to the recent unexpected natural and man-made disasters. Resilience is the process of maintaining livable conditions in the event of interruptions in normally available services. Estimating the resilience of systems, ranging from individuals to communities, is a formidable task due to the complexity involved in the process. The most challenging parameter involved in the resilience assessment is the 'downtime'. Downtime is the time needed for a system to recover its services following a disaster event. Estimating the exact downtime of a system requires a lot of inputs and resources that are not always obtainable. The uncertainties in the downtime estimation are usually handled using probabilistic methods, which necessitates acquiring large historical data. The estimation process also involves ignorance, imprecision, vagueness, and subjective judgment. In this paper, a fuzzy-based approach to estimate the downtime of building structures following earthquake events is proposed. Fuzzy logic can integrate descriptive (linguistic) knowledge and numerical data into the fuzzy system. This ability allows the use of walk down surveys, which collect data in a linguistic or a numerical form. The use of fuzzy logic permits a fast and economical estimation of parameters that involve uncertainties. The first step of the method is to determine the building’s vulnerability. A rapid visual screening is designed to acquire information about the analyzed building (e.g. year of construction, structural system, site seismicity, etc.). Then, a fuzzy logic is implemented using a hierarchical scheme to determine the building damageability, which is the main ingredient to estimate the downtime. Generally, the downtime can be divided into three main components: downtime due to the actual damage (DT1); downtime caused by rational and irrational delays (DT2); and downtime due to utilities disruption (DT3). In this work, DT1 is computed by relating the building damageability results obtained from the visual screening to some already-defined components repair times available in the literature. DT2 and DT3 are estimated using the REDITM Guidelines. The Downtime of the building is finally obtained by combining the three components. The proposed method also allows identifying the downtime corresponding to each of the three recovery states: re-occupancy; functional recovery; and full recovery. Future work is aimed at improving the current methodology to pass from the downtime to the resilience of buildings. This will provide a simple tool that can be used by the authorities for decision making.

Keywords: resilience, restoration, downtime, community resilience, fuzzy logic, recovery, damage, built environment

Procedia PDF Downloads 154
28321 Adherence of Trauma and Orthopaedics Surgery Operative Notes to the RCS Good Surgical Practice Guidelines in Ashford and St. Peter's Hospital

Authors: Maryam Risla Shahul Hameed, Tharsiga Yogarajah, Fritzy Mathew, Tayyaba Syed, Shalin Shaunak

Abstract:

Aim: Auditing the adherence of Trauma and Orthopaedics Operative notes to the RCS Good Surgical Practice Guidelines. Method: Clinical audit conducted on 150 operative notes over a period of 2 months April- May 2023, including emergency and elective surgeries performed in Ashford and St. Peter’s Hospital. The RCS Good Practice Surgical Guidelines for an ideal operative note were used to compare.Results: Date of the procedure and signature of the surgeon were mentioned in all the notes by default in the electronic template being used. Title of the operation performed and whether elective or emergency were mentioned by 92% and 45%, respectively. Name of theatre anaesthetist and operating surgeons were mentioned by 73% and 93% respectively. Time of surgery mentioned by 26%. Operative findings and operative diagnosis mentioned by 83% and 53% respectively. Incision and complications of surgery mentioned in 80% and 53%, respectively. Details of tissue added/ altered/ removed mentioned by 46%. Information on prosthesis or implant used is mentioned by 54%. Details of closure and anticipated blood loss mentioned in 91% and 45% respectively. Antibiotic prophylaxis was mentioned by 63%, out of which only 23% mentioned the name and duration of the antibiotic. VTE prophylaxis was mentioned by 84%, out of which only 23% and 29% mentioned the name and duration of the prophylaxis, respectively. Conclusion: There is more for improvement in the operative notes for better continuity of care between the operating surgeons and other doctors in the wards taking care of the patients post operatively. We recommend to follow a standardized guidelines by all the nationwide and a standard template to be followed by all.

Keywords: surgery, notes, RCS, guidelines

Procedia PDF Downloads 155
28320 Implementation of an Online-Platform at the University of Freiburg to Help Medical Students Cope with Stress

Authors: Zoltán Höhling, Sarah-Lu Oberschelp, Niklas Gilsdorf, Michael Wirsching, Andrea Kuhnert

Abstract:

A majority of medical students at the University of Freiburg reported stress-related psychosomatic symptoms which are often associated with their studies. International research supports these findings, as medical students worldwide seem to be at special risk for mental health problems. In some countries and institutions, psychologically based interventions that assist medical students in coping with their stressors have been implemented. It turned out that anonymity is an important aspect here. Many students fear a potential damage of reputation when being associated with mental health problems, which may be due to a high level of competitiveness in classes. Therefore, we launched an online-platform where medical students could anonymously seek help and exchange their experiences with fellow students and experts. Medical students of all semesters have access to it through the university’s learning management system (called “ILIAS”). The informative part of the platform consists of exemplary videos showing medical students (actors) who act out scenes that demonstrate the antecedents of stress-related psychosomatic disorders. These videos are linked to different expert comments, describing the exhibited symptoms in an understandable and normalizing way. The (inter-)active part of the platform consists of self-help tools (such as meditation exercises or general tips for stress-coping) and an anonymous interactive forum where students can describe their stress-related problems and seek guidance from experts and/or share their experiences with fellow students. Besides creating an immediate proposal to help affected students, we expect that competitiveness between students might be diminished and bondage improved through mutual support between them. In the initial phase after the platform’s launch, it was accessed by a considerable number of medical students. On a closer look it appeared that platform sections like general information on psychosomatic-symptoms and self-treatment tools were accessed far more often than the online-forum during the first months after the platform launch. Although initial acceptance of the platform was relatively high, students showed a rather passive way of using our platform. While user statistics showed a clear demand for information on stress-related psychosomatic symptoms and its possible remedies, active engagement in the interactive online-forum was rare. We are currently advertising the platform intensively and trying to point out the assured anonymity of the platform and its interactive forum. Our plans, to assure students their anonymity through the use of an e-learning facility and promote active engagement in the online forum, did not (yet) turn out as expected. The reasons behind this may be manifold and based on either e-learning related issues or issues related to students’ individual needs. Students might, for example, question the assured anonymity due to a lack of trust in the technological functioning university’s learning management system. However, one may also conclude that reluctance to discuss stress-related psychosomatic symptoms with peer medical students may not be solely based on anonymity concerns, but could be rooted in more complex issues such as general mistrust between students.

Keywords: e-tutoring, stress-coping, student support, online forum

Procedia PDF Downloads 373
28319 Perceived Competence toward Helping an Accident Victim in Pre-Hospital Setting among Medical Graduates: A Cross Sectional Study from Jodhpur, Rajasthan

Authors: Neeti Rustagi, Naveen Dutt, Arvind Sinha, Mahaveer S. Rhodha, Pankaja R. Raghav

Abstract:

Background: Pre-hospital trauma care services are in developing stage in fast-urbanizing cities of India including Jodhpur. Training of health professionals in providing necessary pre-hospital trauma care is an essential step in decreasing accident related morbidity and mortality. The current study explores the response of a medical graduate toward helping an accident victim in a pre-hospital setting before patient can be transferred to definitive trauma facility. Methodology: This study examines the perceived competence in predicting response to an accident victim by medical graduates in Jodhpur, Rajasthan. Participants completed measures of attitude, normative influence and perceived behavior control toward providing pre-hospital care to an accident victim. Likert scale was used to measure the participant responses. Preliminary and descriptive analysis were used using SPSS 21.0. Internal consistency of the responses received was measured using Cronbach’s alpha. Results: Almost all medical graduates agreed that road accidents are common in their area (male: 92%; female: 78%). More male medical graduates (28%) reported helping an accident victim as compared to female physicians (9%) in the previous three months. Majority of study participants (96%) reported that providing immediate care to an accident victim is essential to save the life of an individual. Experience of helping an accident victim was considered unpleasant by the majority of female participants (70%) as compared to male participants (36%). A large number of participants believed that their friends (80%) and colleagues (96%) would appreciate them helping an accident victim in a pre-hospital setting. A large number of participants also believed that they possess the necessary skills and competencies (80%) towards helping a roadside accident victim in the pre-hospital care environment. Perceived competence of helping a roadside accident victim until they are transferred to a health facility was reported by less than half of the participants (male: 56%; female: 43%). Conclusion: Medical graduates have necessary attitude, competencies, and intention of helping a roadside accident victim. The societal response towards helping a road side accident victim is also supportive. In spite of positive determinants, a large proportion of medical graduates have perceived lack of competence in helping a roadside accident victim. This is essential to explore further as providing pre-hospital care to a roadside accident victim is an essential step in establishing the continuum of care to an accident victim especially in countries where pre-hospital services are in developing phase.

Keywords: prehospital care, perceived behavior, perceived competence, medical graduates

Procedia PDF Downloads 122
28318 Identification of Watershed Landscape Character Types in Middle Yangtze River within Wuhan Metropolitan Area

Authors: Huijie Wang, Bin Zhang

Abstract:

In China, the middle reaches of the Yangtze River are well-developed, boasting a wealth of different types of watershed landscape. In this regard, landscape character assessment (LCA) can serve as a basis for protection, management and planning of trans-regional watershed landscape types. For this study, we chose the middle reaches of the Yangtze River in Wuhan metropolitan area as our study site, wherein the water system consists of rich variety in landscape types. We analyzed trans-regional data to cluster and identify types of landscape characteristics at two levels. 55 basins were analyzed as variables with topography, land cover and river system features in order to identify the watershed landscape character types. For watershed landscape, drainage density and degree of curvature were specified as special variables to directly reflect the regional differences of river system features. Then, we used the principal component analysis (PCA) method and hierarchical clustering algorithm based on the geographic information system (GIS) and statistical products and services solution (SPSS) to obtain results for clusters of watershed landscape which were divided into 8 characteristic groups. These groups highlighted watershed landscape characteristics of different river systems as well as key landscape characteristics that can serve as a basis for targeted protection of watershed landscape characteristics, thus helping to rationally develop multi-value landscape resources and promote coordinated development of trans-regions.

Keywords: GIS, hierarchical clustering, landscape character, landscape typology, principal component analysis, watershed

Procedia PDF Downloads 216
28317 Information Literacy: Concept and Importance

Authors: Gaurav Kumar

Abstract:

An information literate person is one who uses information effectively in all its forms. When presented with questions or problems, an information literate person would know what information to look for, how to search efficiently and be able to access relevant sources. In addition, an information literate person would have the ability to evaluate and select appropriate information sources and to use the information effectively and ethically to answer questions or solve problems. Information literacy has become an important element in higher education. The information literacy movement has internationally recognized standards and learning outcomes. The step-by-step process of achieving information literacy is particularly crucial in an era where knowledge could be disseminated through a variety of media. What is the relationship between information literacy as we define it in higher education and information literacy among non-academic populations? What forces will change how we think about the definition of information literacy in the future and how we will apply the definition in all environments?

Keywords: information literacy, human beings, visual media and computer network etc, information literacy

Procedia PDF Downloads 324
28316 A Fuzzy Decision Making Approach for Supplier Selection in Healthcare Industry

Authors: Zeynep Sener, Mehtap Dursun

Abstract:

Supplier evaluation and selection is one of the most important components of an effective supply chain management system. Due to the expanding competition in healthcare, selecting the right medical device suppliers offers great potential for increasing quality while decreasing costs. This paper proposes a fuzzy decision making approach for medical supplier selection. A real-world medical device supplier selection problem is presented to illustrate the application of the proposed decision methodology.

Keywords: fuzzy decision making, fuzzy multiple objective programming, medical supply chain, supplier selection

Procedia PDF Downloads 439
28315 Repeated Suicidal Attempts in Foster Teenagers: Breaking the Cycle Using a Stepped Care Approach

Authors: Mathilde Blondon, Salla Aicha Dieng, Catherine Pfister

Abstract:

In a paradoxical way, teenagers nowadays seem to use suicidal attempts to elaborate on their trauma abuses and regain some kind of control in their lives. As their behavior becomes life-threatening, the hospital offers a variety of expertise to address their need, with Child Protective Services also joining in, to a point when teenagers could have a feeling of losing control of their lives, which results in them making more suicidal attempts. Our goal here is to walk with these foster teenagers long enough to step therapy up first, then as their mental health is restored enough to step the therapy down in a way that is secure and will give them their life back. This would prevent them from making suicidal attempts to get a feeling of control over their life. We’ll present a clinical case of a 14-year-old girl named Sofia, who was suffering from parental deprivation, an identity disorder, and severe depression disorder. Our intervention took place in January 2024, after Sofia had undergone four hospitalizations, including a two-month period in a specialized clinic. In a stepping-up effort, a substantial setting has been built around Sofia. She was coming three days a week to therapeutic activities at the Child Psychiatry Day Hospital, she had one psychotherapy session a week at the Medical-Psychological Center, and she was meeting with the Adolescent Psychiatrist on a regular basis. However, her suicidal attempts frequency continued to increase to the point when she couldn’t stay more than four days outside the hospital unit without harming herself and being brought back to the Emergency Unit. We were all stuck in some kind of medical deadlock, writing to clinics that had no room for her while social workers were calling foster homes that wouldn’t even accept her either. At some point, a clinical decision was made by the psychiatrist to stop what appeared to be a global movement of traumatic repetition, which involved Sofia’s family, the medical team and the social workers as one. This decision to step therapy down created a surprise and put an end to the cycle. It provided a new path, a new solution where Sofia could securely settle without being unfaithful to her family. Her suicidal attempts stopped for four weeks. She had one relapse, then didn’t make another attempt so far. There is a fine line between too little and too much, a pathway with the right amount of care and support. We believe it is not a steady line but rather a path up and down the hill. It’s about building up this moment when medication and mental processes have improved the subject’s condition enough to allow the medical team to step therapy down and give more control back to the subject. These needed variations used to come from a change of hospital or medical team. Stepped care avoids any breaking of bonds and appears to be decisive in stopping teenagers’ suicidal attempts.

Keywords: child protection, adolescent psychiatry, teenager suicidal attempt, foster teenagers, parental deprivation, stepped care

Procedia PDF Downloads 9
28314 The Study of Consumer Behavior towards Online Travel Agents in Purchasing Tourism Related Products and Services

Authors: Punrapha Praditpong, Surangkana Pipatchokchaiyo

Abstract:

The objectives of this study were to study the consumer behavior of the Baby boomers, the X & the Y generation towards Online Travel Agents in purchasing tourism-related products and services. The research methodology of this research used the quantitative study and the sample size consisted of 400 questionnaires in five districts of Bangkok. The data was analyzed by frequency, percentage, mean and SD. Moreover, all the hypotheses were tested by One-Way ANOVA and Pearson-Correlation statistics. The research findings were as follows: 1) There were significant effects to the purchasing decision making process towards purchasing tourism related products and services via OTAs; 2) There were different consumer behaviors from the Baby boomers, the X generation and the Y generation towards purchasing tourism related products and services via OTAs, which are explained in detail in finding. The research offers a discussion and presents some recommendations for the OTA websites.

Keywords: consumer behavior, online travel agent, x generations, y generations

Procedia PDF Downloads 286
28313 A Comprehensive Metamodel of an Urbanized Information System: Experimental Case

Authors: Leila Trabelsi

Abstract:

The urbanization of Information Systems (IS) is an effective approach to master the complexity of the organization. It strengthens the coherence of IS and aligns it with the business strategy. Moreover, this approach has significant advantages such as reducing Information Technologies (IT) costs, enhancing the IS position in a competitive environment and ensuring the scalability of the IS through the integration of technological innovations. Therefore, the urbanization is considered as a business strategic decision. Thus, its embedding becomes a necessity in order to improve the IS practice. However, there is a lack of experimental cases studying meta-modelling of Urbanized Information System (UIS). The aim of this paper addresses new urbanization content meta-model which permits modelling, testing and taking into consideration organizational aspects. This methodological framework is structured according to two main abstraction levels, a conceptual level and an operational level. For each of these levels, different models are proposed and presented. The proposed model for has been empirically tested on company. The findings of this paper present an experimental study of urbanization meta-model. The paper points out the significant relationships between dimensions and their evolution.

Keywords: urbanization, information systems, enterprise architecture, meta-model

Procedia PDF Downloads 428
28312 Islamic Banking Recovery Process and Its Parameters: A Practitioner’s Viewpoints in the Light of Humanising Financial Services

Authors: Muhammad Izzam Bin Mohd Khazar, Nur Adibah Binti Zainudin

Abstract:

Islamic banking as one of the financial institutions is highly required to maintain a prudent approach to ensure that any financing given is able to generate income to their respective shareholders. As the default payment of customers is probably occurred in the financing, having a prudent approach in the recovery process is a must to ensure that financing losses are within acceptable limits. The objective of this research is to provide the best practice of recovery which is anticipated to benefit both bank and customers. This study will address arising issue on the current practice of recovery process and followed by providing humanising recovery solutions in the light of the Maqasid Shariah. The study identified main issues pertaining to Islamic recovery process which can be categorized into knowledge crisis, process issues, specific treatment cases and system issues. Knowledge crisis is related to direct parties including judges, solicitors and salesperson, while the recovery process issues include the process of issuance of reminder, foreclosure and repossession of asset. Furthermore, special treatment for particular cases also should be observed since different contracts in Islamic banking products will need different treatment. Finally, issues in the system used in the recovery process are still unresolved since the existing technology is still young in this area to embraced Islamic finance requirements and nature of calculation. In order to humanize the financial services in Islamic banking recovery process, we have highlighted four main recommendation to be implemented by Islamic Financial Institutions namely; 1) early deterrent by improving the awareness, 2) improvement of the internal process, 3) reward mechanism, and 4) creative penalty to provide awareness to all stakeholders.

Keywords: humanizing financial services, Islamic Finance, Maqasid Syariah, recovery process

Procedia PDF Downloads 187
28311 Simple Infrastructure in Measuring Countries e-Government

Authors: Sukhbaatar Dorj, Erdenebaatar Altangerel

Abstract:

As alternative to existing e-government measuring models, here proposed a new customer centric, service oriented, simple approach for measuring countries e-Governments. If successfully implemented, built infrastructure will provide a single e-government index number for countries. Main schema is as follows. Country CIO or equal position government official, at the beginning of each year will provide to United Nations dedicated web site 4 numbers on behalf of own country: 1) Ratio of available online public services, to total number of public services, 2) Ratio of interagency inter ministry online public services to total number of available online public services, 3) Ratio of total number of citizen and business entities served online annually to total number of citizen and business entities served annually online and physically on those services, 4) Simple index for geographical spread of online served citizen and business entities. 4 numbers then combined into one index number by mathematical Average function. In addition to 4 numbers 5th number can be introduced as service quality indicator of online public services. If in ordering of countries index number is equal, 5th criteria will be used. Notice: This approach is for country’s current e-government achievement assessment, not for e-government readiness assessment.

Keywords: countries e-government index, e-government, infrastructure for measuring e-government, measuring e-government

Procedia PDF Downloads 318
28310 Making Waves: Preparing the Next Generation of Bilingual Medical Doctors

Authors: Edith Esparza-Young, Ángel M. Matos, Yaritza Gonzalez, Kirthana Sugunathevan

Abstract:

Introduction: This research describes the existing medical school program which supports a multicultural setting and bilingualism. The rise of Spanish speakers in the United States has led to the recruitment of bilingual medical students who can serve the evolving demographics. This paper includes anecdotal evidence, narratives and the latest research on the outcomes of supporting a multilingual academic experience in medical school and beyond. People in the United States will continue to need health care from physicians who have experience with multicultural competence. Physicians who are bilingual and possess effective communication skills will be in high demand. Methodologies: This research is descriptive. Through this descriptive research, the researcher will describe the qualities and characteristics of the existing medical school programs, curriculum, and student services. Additionally, the researcher will shed light on the existing curriculum in the medical school and also describe specific programs which help to serve as safety nets to support diverse populations. The method included observations of the existing program and the implementation of the medical school program, specifically the Accelerated Review Program, the Language Education and Professional Communication Program, student organizations and the Global Health Institute. Concluding Statement: This research identified and described characteristics of the medical school’s program. The research explained and described the current and present phenomenon of this medical program, which has focused on increasing the graduation of bilingual and minority physicians. The findings are based on observations of the curriculum, programs and student organizations which evolves and remains innovative to stay current with student enrollment.

Keywords: bilingual, English, medicine, doctor

Procedia PDF Downloads 129
28309 Evaluating the Satisfaction of Chinese Consumers toward Influencers at TikTok

Authors: Noriyuki Suyama

Abstract:

The progress and spread of digitalization have led to the provision of a variety of new services. The recent progress in digitization can be attributed to rapid developments in science and technology. First, the research and diffusion of artificial intelligence (AI) has made dramatic progress. Around 2000, the third wave of AI research, which had been underway for about 50 years, arrived. Specifically, machine learning and deep learning were made possible in AI, and the ability of AI to acquire knowledge, define the knowledge, and update its own knowledge in a quantitative manner made the use of big data practical even for commercial PCs. On the other hand, with the spread of social media, information exchange has become more common in our daily lives, and the lending and borrowing of goods and services, in other words, the sharing economy, has become widespread. The scope of this trend is not limited to any industry, and its momentum is growing as the SDGs take root. In addition, the Social Network Service (SNS), a part of social media, has brought about the evolution of the retail business. In the past few years, social network services (SNS) involving users or companies have especially flourished. The People's Republic of China (hereinafter referred to as "China") is a country that is stimulating enormous consumption through its own unique SNS, which is different from the SNS used in developed countries around the world. This paper focuses on the effectiveness and challenges of influencer marketing by focusing on the influence of influencers on users' behavior and satisfaction with Chinese SNSs. Specifically, Conducted was the quantitative survey of Tik Tok users living in China, with the aim of gaining new insights from the analysis and discussions. As a result, we found several important findings and knowledge.

Keywords: customer satisfaction, social networking services, influencer marketing, Chinese consumers’ behavior

Procedia PDF Downloads 84
28308 Context Aware Anomaly Behavior Analysis for Smart Home Systems

Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu

Abstract:

The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.

Keywords: Internet of Things, network security, context awareness, intrusion detection

Procedia PDF Downloads 175
28307 Improving Fingerprinting-Based Localization (FPL) System Using Generative Artificial Intelligence (GAI)

Authors: Getaneh Berie Tarekegn, Li-Chia Tai

Abstract:

With the rapid advancement of artificial intelligence, low-power built-in sensors on Internet of Things devices, and communication technologies, location-aware services have become increasingly popular and have permeated every aspect of people’s lives. Global navigation satellite systems (GNSSs) are the default method of providing continuous positioning services for ground and aerial vehicles, as well as consumer devices (smartphones, watches, notepads, etc.). However, the environment affects satellite positioning systems, particularly indoors, in dense urban and suburban cities enclosed by skyscrapers, or when deep shadows obscure satellite signals. This is because (1) indoor environments are more complicated due to the presence of many objects surrounding them; (2) reflection within the building is highly dependent on the surrounding environment, including the positions of objects and human activity; and (3) satellite signals cannot be reached in an indoor environment, and GNSS doesn't have enough power to penetrate building walls. GPS is also highly power-hungry, which poses a severe challenge for battery-powered IoT devices. Due to these challenges, IoT applications are limited. Consequently, precise, seamless, and ubiquitous Positioning, Navigation and Timing (PNT) systems are crucial for many artificial intelligence Internet of Things (AI-IoT) applications in the era of smart cities. Their applications include traffic monitoring, emergency alarming, environmental monitoring, location-based advertising, intelligent transportation, and smart health care. This paper proposes a generative AI-based positioning scheme for large-scale wireless settings using fingerprinting techniques. In this article, we presented a novel semi-supervised deep convolutional generative adversarial network (S-DCGAN)-based radio map construction method for real-time device localization. We also employed a reliable signal fingerprint feature extraction method with t-distributed stochastic neighbor embedding (t-SNE), which extracts dominant features while eliminating noise from hybrid WLAN and long-term evolution (LTE) fingerprints. The proposed scheme reduced the workload of site surveying required to build the fingerprint database by up to 78.5% and significantly improved positioning accuracy. The results show that the average positioning error of GAILoc is less than 0.39 m, and more than 90% of the errors are less than 0.82 m. According to numerical results, SRCLoc improves positioning performance and reduces radio map construction costs significantly compared to traditional methods.

Keywords: location-aware services, feature extraction technique, generative adversarial network, long short-term memory, support vector machine

Procedia PDF Downloads 32
28306 A Fact-Finding Analysis on the Expulsions Made under Title 42 in Us

Authors: Avi Shrivastava

Abstract:

Title 42, an emergency health decree, has forced the federal authorities to turn away asylum seekers and all other border crossers since last year. When Title 42 was first deployed in immigration detention centers, where many migrants are held when they arrive at the U.S.-Mexico border, the Trump administration embraced it as a strategy. Expulsions Policy and New Border Challenges will be examined in regard to Title 42 concerns. Humanitarian measures for refugees arriving at the US-Mexico border are the focus of this article. To a large extent, this article addresses the implications of the United States' use of Title 42 in expelling refugees and the possible ramifications of doing away with it. A secondary data collecting strategy was used to gather the information for this study, allowing researchers to examine a large number of previously collected data sets. Information about Title 42 may be found in a variety of places, such as scholarly publications, newspapers, books, and the internet. The inquiry employed qualitative and explanatory research approaches. The claim that 1.7 million individuals were forced to leave the country as a result of it was withdrawn. Since CBP and ICE were limited in their ability to process deportees, it employed a very random patchwork technique in selecting the expelled individuals. As a consequence, repeat offenders, particularly those who were single, got a reduced punishment. The government will be compelled to focus on long-overdue but vital border enhancements if expulsions are halted. Title 42 provisions may help expedite the processing of asylum and other types of humanitarian relief. The government is prepared for an increase in arrivals, but ending the program would lead to a return to arrival levels seen during the Title 42 period.

Keywords: migrants, refugees, title 42, medical, trump administration

Procedia PDF Downloads 82
28305 The Role of Building Services in Energy Conservation into Residential Buildings

Authors: Osama Ahmed Ibrahim Masoud, Mohamed Ibrahim Mohamed Abdelhadi, Ahmed Mohamed Seddik Hassan

Abstract:

The problem of study focuses on thermal comfort realization in a residential building during hot and dry climate periods consumes a major electrical energy for air conditioning operation. Thermal comfort realization in a residential building during such climate becomes more difficult regarding the phenomena of climate change, and the use of building and construction materials which have the feature of heat conduction as (bricks-reinforced concrete) and the global energy crises. For that, this study aims to how to realize internal thermal comfort through how to make the best use of building services (temporarily used service spaces) for reducing the electrical energy transfer and saving self-shading. In addition, the possibility of reduction traditional energy (fossil fuel) consumed in cooling through the use of building services for reducing the internal thermal comfort and the relationship between them. This study is based on measuring the consumed electrical energy rate in cooling (by using Design-Builder program) for a residential building (the place of study is: Egypt- Suez Canal- Suez City), this design model has lots of alternatives designs for the place of building services (center of building- the eastern front- southeastern front- the southern front- the south-west front, the western front). The building services are placed on the fronts with different rates for determining the best rate on fronts which realizes thermal comfort with the lowest of energy consumption used in cooling. Findings of the study indicate to that the best position for building services is on the west front then the south-west front, and the more the building services increase, the more energy consumption used in cooling of residential building decreases. Recommendations indicate to the need to study the building services positions in the new projects progress to select the best alternatives to realize ‘Energy conservation’ used in cooling or heating into the buildings in general, residential buildings particularly.

Keywords: residential buildings, energy conservation, thermal comfort, building services, temporary used service spaces, DesignBuilder

Procedia PDF Downloads 274
28304 Risks beyond Cyber in IoT Infrastructure and Services

Authors: Mattias Bergstrom

Abstract:

Significance of the Study: This research will provide new insights into the risks with digital embedded infrastructure. Through this research, we will analyze each risk and its potential negation strategies, especially for AI and autonomous automation. Moreover, the analysis that is presented in this paper will convey valuable information for future research that can create more stable, secure, and efficient autonomous systems. To learn and understand the risks, a large IoT system was envisioned, and risks with hardware, tampering, and cyberattacks were collected, researched, and evaluated to create a comprehensive understanding of the potential risks. Potential solutions have then been evaluated on an open source IoT hardware setup. This list shows the identified passive and active risks evaluated in the research. Passive Risks: (1) Hardware failures- Critical Systems relying on high rate data and data quality are growing; SCADA systems for infrastructure are good examples of such systems. (2) Hardware delivers erroneous data- Sensors break, and when they do so, they don’t always go silent; they can keep going, just that the data they deliver is garbage, and if that data is not filtered out, it becomes disruptive noise in the system. (3) Bad Hardware injection- Erroneous generated sensor data can be pumped into a system by malicious actors with the intent to create disruptive noise in critical systems. (4) Data gravity- The weight of the data collected will affect Data-Mobility. (5) Cost inhibitors- Running services that need huge centralized computing is cost inhibiting. Large complex AI can be extremely expensive to run. Active Risks: Denial of Service- It is one of the most simple attacks, where an attacker just overloads the system with bogus requests so that valid requests disappear in the noise. Malware- Malware can be anything from simple viruses to complex botnets created with specific goals, where the creator is stealing computer power and bandwidth from you to attack someone else. Ransomware- It is a kind of malware, but it is so different in its implementation that it is worth its own mention. The goal with these pieces of software is to encrypt your system so that it can only be unlocked with a key that is held for ransom. DNS spoofing- By spoofing DNS calls, valid requests and data dumps can be sent to bad destinations, where the data can be extracted for extortion or to corrupt and re-inject into a running system creating a data echo noise loop. After testing multiple potential solutions. We found that the most prominent solution to these risks was to use a Peer 2 Peer consensus algorithm over a blockchain to validate the data and behavior of the devices (sensors, storage, and computing) in the system. By the devices autonomously policing themselves for deviant behavior, all risks listed above can be negated. In conclusion, an Internet middleware that provides these features would be an easy and secure solution to any future autonomous IoT deployments. As it provides separation from the open Internet, at the same time, it is accessible over the blockchain keys.

Keywords: IoT, security, infrastructure, SCADA, blockchain, AI

Procedia PDF Downloads 95
28303 Mapping of Risks and Opportunities for Adolescents Girls’ Sexual and Reproductive Health in Peri-Urban Setting in Mwanza, Tanzania

Authors: Soori Nnko, Zaina Mchome, John Dusabe, Angela Obasi

Abstract:

In sub-Saharan Africa, adolescent girls living in urban and periurban settings are among the groups at increased risk of getting sexually transmitted infections. One of the challenges to improve uptake of sexual and reproductive health (SRH) services among adolescents is linked to little appreciation about their vulnerability and the knowledge on availability of the SRH services. Objective: This study assesses adolescents’ perceptions on risks for SRH problems and the availability of services to prevent against SRH problems. Methodology: The study was conducted in March 2011 in Mwanza region, Tanzania. Data collection techniques included 18 Participatory Group Discussions and 17 In-depth Interviews with adolescents and young mothers aged 15-20 years. Results: Adolescents indicated that risk places included their homes, bushes, commercial centers, roadsides as well as school settings. Risk for having unprotected sex varied depending on where you are, and the time of the day. For example, collection of firewood in the bushes or water from the wells exposed girls to men who forced or lured them to have sex. The girls reported to encounter motorcyclists who offered the ride in exchange for sex. Girls also knew myriads places to seek SRH services, including public and private clinics, drug shops and traditional healers. Despite being aware of risky environment, and places to seek the services, access to SRH services were limited due to the stigma and negative attitude of community regarding adolescents’ utilization of SRH services. Conclusion: Adolescents are exposed to various risky environments, yet due to social stigma they have difficult to access the available SRH services.

Keywords: adolescent girls, sexual and reproductive health, AIDS, risk, opportunities, interventions, sub Saharan africa

Procedia PDF Downloads 434
28302 Transnational Higher Education: Developing a Transnational Student Success Signature for Clinical Medical Students an Action Research Project

Authors: Wendy Maddison

Abstract:

This paper describes an Action Research project which was undertaken to inform professional practice in order to develop a newly created Centre for Student Success in the specific context of transnational medical and nursing education in the Middle East. The objectives were to enhance the academic performance, persistence, integration and personal and professional development of a multinational study body, in particular in relation to preclinical medical students, and to establish a comfortable, friendly and student-driven environment within an Irish medical university recently established in Bahrain. Expatriating a new part of itself into a corner of the world and within a context which could be perceived as the antithesis of itself, in particular in terms of traditional cultural and organisational values, the university has had to innovate in the range of services, programmes and other offerings which engages and supports the academic success of medical and nursing students as they “encounter the world in the classroom” in the context of an Arab Islamic culture but within a European institution of transnational education, engaging with a global learning environment locally. The outcomes of the project resulted in the development of a specific student success ‘signature’ for this particular transnational higher education context.

Keywords: transnational higher education, medical education, action research, student success, Middle Eastern context, student persistence in the global-local, student support mechanisms

Procedia PDF Downloads 688