Search results for: medical device security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7836

Search results for: medical device security

6546 Water-Repellent Finishing on Cotton Fabric by SF₆ Plasma

Authors: We'aam Alali, Ziad Saffour, Saker Saloum

Abstract:

Low-pressure, sulfur hexafluoride (SF₆) remote radio-frequency (RF) plasma, ignited in a hollow cathode discharge (HCD-L300) plasma system, has been shown to be a powerful method in cotton fabric finishing to achieve water-repellent property. This plasma was ignited at an SF6 flow rate of (200 cm), low pressure (0.5 mbar), and radio frequency (13.56 MHz) with a power of (300 W). The contact angle has been measured as a function of the plasma exposure period using the water contact angle measuring device (WCA), and the changes in the morphology, chemical structure, and mechanical properties as tensile strength and elongation at the break of the fabric have also been investigated using the scanning electron microscope (SEM), energy-dispersive X-ray spectroscopy (EDX), attenuated total reflectance Fourier transform Infrared spectroscopy (ATR-FTIR), and tensile test device, respectively. In addition, weight loss of the fabric and the fastness of washing have been studied. It was found that the exposure period of the fabric to the plasma is an important parameter. Moreover, a good water-repellent cotton fabric can be obtained by treating it with SF₆ plasma for a short time (1 min) without degrading its mechanical properties. Regarding the modified morphology of the cotton fabric, it was found that grooves were formed on the surface of the fibers after treatment. Chemically, the fluorine atoms were attached to the surface of the fibers.

Keywords: cotton fabric, SEM, SF₆ plasma, water-repellency

Procedia PDF Downloads 80
6545 Study on Network-Based Technology for Detecting Potentially Malicious Websites

Authors: Byung-Ik Kim, Hong-Koo Kang, Tae-Jin Lee, Hae-Ryong Park

Abstract:

Cyber terrors against specific enterprises or countries have been increasing recently. Such attacks against specific targets are called advanced persistent threat (APT), and they are giving rise to serious social problems. The malicious behaviors of APT attacks mostly affect websites and penetrate enterprise networks to perform malevolent acts. Although many enterprises invest heavily in security to defend against such APT threats, they recognize the APT attacks only after the latter are already in action. This paper discusses the characteristics of APT attacks at each step as well as the strengths and weaknesses of existing malicious code detection technologies to check their suitability for detecting APT attacks. It then proposes a network-based malicious behavior detection algorithm to protect the enterprise or national networks.

Keywords: Advanced Persistent Threat (APT), malware, network security, network packet, exploit kits

Procedia PDF Downloads 366
6544 Teleconsultations and The Need of Onsite Additional Medical Services

Authors: Cristina Hotoleanu

Abstract:

Introduction: The recent Covid-19 pandemic accelerated the development of e-health, including telemedicine, smartphone applications, and medical wearable devices. Providing remote teleconsultations supposes challenges which may require further face-to-face medical interactions. The aim of this study was to assess the correlation between the types of teleconsultations and the need of onsite medical services (investigations and medical visits) for the diagnosis and treatment. Methods: a retrospective study including all the teleconsultations using the platform offered by a telehealth provider in Romania (Telios Care SA) between May 1, 2021- April 30, 2022, was performed. Binary data were analysed using the chi-square test with a significance level of p < 0.05. Results: out of 7163 consultations, 3961 were phone calls, 1981 were online messages, and 1221 were video calls. Onsite medical services were indicated in 3327 (46.44%) cases; the onsite investigations or the onsite visits were recommended for 2908 patients as follows: 2326 in case of phone calls, 582 in case of online messages, none in case of video calls. Both onsite investigations and visits were indicated for 419 patients. The need for onsite additional medical services was significantly higher in the case of phone calls than in the other 2 types of teleconsultations (Chi square= 1207.06, p= 0.00001). The indication for onsite services was done mainly after teleconsultations covering medical specialties (87.34%), significantly higher than the other specialties (Chi square=914.59, p=0.00001). Teleconsultations in surgical specialties and other fields (pharmacy, dentistry, psychology, wellbeing- nutrition, fitness) resulted in 12.13%, respective less than 1%, indication for onsite investigations or visits, explained by using of video calls in most of the cases. Conclusion: a further onsite medical service was necessary in less than a half of the teleconsultations. This indication was done mainly after phone calls and teleconsultations in medical specialties. Video calls were used mostly in psychology, nutrition, and fitness teleconsultations and did not require a further onsite medical service. Other studies are necessary to assess better the types of teleconsultations and the specialties bringing the biggest benefit for the patients.

Keywords: onsite medical services, phone calls, teleconsultations, telemedicine

Procedia PDF Downloads 101
6543 Cost-Effective Mechatronic Gaming Device for Post-Stroke Hand Rehabilitation

Authors: A. Raj Kumar, S. Bilaloglu

Abstract:

Stroke is a leading cause of adult disability worldwide. We depend on our hands for our activities of daily living(ADL). Although many patients regain the ability to walk, they continue to experience long-term hand motor impairments. As the number of individuals with young stroke is increasing, there is a critical need for effective approaches for rehabilitation of hand function post-stroke. Motor relearning for dexterity requires task-specific kinesthetic, tactile and visual feedback. However, when a stroke results in both sensory and motor impairment, it becomes difficult to ascertain when and what type of sensory substitutions can facilitate motor relearning. In an ideal situation, real-time task-specific data on the ability to learn and data-driven feedback to assist such learning will greatly assist rehabilitation for dexterity. We have found that kinesthetic and tactile information from the unaffected hand can assist patients re-learn the use of optimal fingertip forces during a grasp and lift task. Measurement of fingertip grip force (GF), load forces (LF), their corresponding rates (GFR and LFR), and other metrics can be used to gauge the impairment level and progress during learning. Currently ATI mini force-torque sensors are used in research settings to measure and compute the LF, GF, and their rates while grasping objects of different weights and textures. Use of the ATI sensor is cost prohibitive for deployment in clinical or at-home rehabilitation. A cost effective mechatronic device is developed to quantify GF, LF, and their rates for stroke rehabilitation purposes using off-the-shelf components such as load cells, flexi-force sensors, and an Arduino UNO microcontroller. A salient feature of the device is its integration with an interactive gaming environment to render a highly engaging user experience. This paper elaborates the integration of kinesthetic and tactile sensing through computation of LF, GF and their corresponding rates in real time, information processing, and interactive interfacing through augmented reality for visual feedback.

Keywords: feedback, gaming, kinesthetic, rehabilitation, tactile

Procedia PDF Downloads 240
6542 Synthesis of Highly Stable Near-Infrared FAPbI₃ Perovskite Doped with 5-AVA and Its Applications in NIR Light-Emitting Diodes for Bioimaging

Authors: Nasrud Din, Fawad Saeed, Sajid Hussain, Rai Muhammad Dawood Sultan, Premkumar Sellan, Qasim Khan, Wei Lei

Abstract:

The continuously increasing external quantum efficiencies of Perovskite light-emitting diodes (LEDs) have received significant interest in the scientific community. The need for monitoring and medical diagnostics has experienced a steady growth in recent years, primarily caused by older people and an increasing number of heart attacks, tumors, and cancer disorders among patients. The application of Perovskite near-infrared light-emitting diode (PeNIRLEDs) has exhibited considerable efficacy in bioimaging, particularly in the visualization and examination of blood arteries, blood clots, and tumors. PeNIRLEDs exhibit exciting potential in the field of blood vessel imaging because of their advantageous attributes, including improved depth penetration and less scattering in comparison to visible light. In this study, we synthesized FAPbI₃ Perovskite doped with different concentrations of 5-Aminovaleric acid (5-AVA) 1-6 mg. The incorporation of 5-AVA as a dopant during the FAPbI₃ Perovskite formation influences the FAPbI3 Perovskite’s structural and optical properties, improving its stability, photoluminescence efficiency, and charge transport characteristics. We found a resulting PL emission peak wavelength of 850 nm and bandwidth of 44 nm, along with a calculated quantum yield of 75%. The incorporation of 5-AVA-modified FAPbI₃ Perovskite into LEDs will show promising results, enhancing device efficiency, color purity, and stability. Making it suitable for various medical applications, including subcutaneous deep vein imaging, blood flow visualization, and tumor illumination.

Keywords: perovskite light-emitting diodes, deep vein imaging, blood flow visualization, tumor illumination

Procedia PDF Downloads 56
6541 Direct Visualization of Shear Induced Structures in Wormlike Micellar Solutions by Microfluidics and Advanced Microscopy

Authors: Carla Caiazza, Valentina Preziosi, Giovanna Tomaiuolo, Denis O'Sullivan, Vincenzo Guida, Stefano Guido

Abstract:

In the last decades, wormlike micellar solutions have been extensively used to tune the rheological behavior of home care and personal care products. This and other successful applications underlie the growing attention that both basic and applied research are devoting to these systems, and to their unique rheological and flow properties. One of the key research topics is the occurrence of flow instabilities at high shear rates (such as shear banding), with the possibility of appearance of flow induced structures. In this scenario, microfluidics is a powerful tool to get a deeper insight into the flow behavior of a wormlike micellar solution, as the high confinement of a microfluidic device facilitates the onset of the flow instabilities; furthermore, thanks to its small dimensions, it can be coupled with optical microscopy, allowing a direct visualization of flow structuring phenomena. Here, the flow of a widely used wormlike micellar solution through a glass capillary has been studied, by coupling the microfluidic device with μPIV techniques. The direct visualization of flow-induced structures and the flow visualization analysis highlight a relationship between solution structuring and the onset of discontinuities in the velocity profile.

Keywords: flow instabilities, flow-induced structures, μPIV, wormlike micelles

Procedia PDF Downloads 346
6540 Understanding Success Factors of an Information Security Management System Plan Phase Self-Implementation

Authors: Nurazean Maarop, Noorjan Mohd Mustapha, Rasimah Yusoff, Roslina Ibrahim, Norziha Megat Mohd Zainuddin

Abstract:

The goal of this study is to identify success factors that could influence the ISMS self-implementation in government sector from qualitative perspective. This study is based on a case study in one of the Malaysian government agency. Semi-structured interviews involving five key informants were conducted to examine factors addressed in the conceptual framework. Subsequently, thematic analysis was executed to describe the influence of each factor on the success implementation of ISMS. The result of this study indicates that management commitment, implementer commitment and implementer competency are part of the success factors for ISMS self-implementation in Malaysian Government Sector.

Keywords: ISMS success factors, IT project management, IS success, information security

Procedia PDF Downloads 315
6539 Motivational Profiles of Choice of Medical Studies: Cross-Sectional Study

Authors: Rajae Tahri, Omar Chokairi, Asmae Saadi, Souad Chaouir

Abstract:

Background: The factors motivating students to choose a medical career is a long-standing topic of publication and discussion. To our knowledge, no national study on the motivation for choosing medical studies has been published to date. Population and methods: This is an observational, descriptive, and cross-sectional study of first-year medical students at the Faculty of Medicine and Pharmacy of Rabat. An anonymous questionnaire comprising 16 questions was developed and distributed to students during Embryology tutorials. The students were free to fill it in or not. The number of students who consented to participate in the survey was 266. The variables studied are the socio-demographic variables of the students and the reasons for choosing medical studies. Results: The most strongly and frequently chosen reasons for choice by our students were saving lives (64.9%), helping others (62.1%), love of medicine (57%), and reducing suffering (56.5%). The comparison of the results according to gender showed a significant difference between the degree of self-motivation of girls compared to that of boys (p <0.001). The reason that stood out the most for them was teamwork. The presence of a health professional in the family was associated with strong extrinsic motivation (p = 0.005). Conclusion: Understanding medical student career choices would improve our knowledge of the factors that influence medical student learning and performance. This knowledge will make it possible to adapt the educational strategies to maintain the motivation of the students throughout their course as well as during their exercise.

Keywords: motivation, motivational profiles, medical studies, Morocco

Procedia PDF Downloads 87
6538 Improving Health Care and Patient Safety at the ICU by Using Innovative Medical Devices and ICT Tools: Examples from Bangladesh

Authors: Mannan Mridha, Mohammad S. Islam

Abstract:

Innovative medical technologies offer more effective medical care, with less risk to patient and healthcare personnel. Medical technology and devices when properly used provide better data, precise monitoring and less invasive treatments and can be more targeted and often less costly. The Intensive Care Unit (ICU) equipped with patient monitoring, respiratory and cardiac support, pain management, emergency resuscitation and life support devices is particularly prone to medical errors for various reasons. Many people in the developing countries now wonder whether their visit to hospital might harm rather than help them. This is because; clinicians in the developing countries are required to maintain an increasing workload with limited resources and absence of well-functioning safety system. A team of experts from the medical, biomedical and clinical engineering in Sweden and Bangladesh have worked together to study the incidents, adverse events at the ICU in Bangladesh. The study included both public and private hospitals to provide a better understanding for physical structure, organization and practice in operating processes of care, and the occurrence of adverse outcomes the errors, risks and accidents related to medical devices at the ICU, and to develop a ICT based support system in order to reduce hazards and errors and thus improve the quality of performance, care and cost effectiveness at the ICU. Concrete recommendations and guidelines have been made for preparing appropriate ICT related tools and methods for improving the routine for use of medical devices, reporting and analyzing of the incidents at the ICU in order to reduce the number of undetected and unsolved incidents and thus improve the patient safety.

Keywords: intensive care units, medical errors, medical devices, patient care and safety

Procedia PDF Downloads 148
6537 Knowledge, Attitude, and Practice of Medical Ethics amongst Paediatric Surgeons and Trainees in Malaysia

Authors: Salehah Tahkin, Norlaila Mustafa, Dayang Anita Abdul Aziz

Abstract:

Knowledge of medical ethics is important to all practitioners so the best care can be delivered to all patients through safe practice. Surgeons are not exceptions to this. Knowledge, attitude, and practice (KAP) of medical ethics among paediatric surgeons and trainees in Malaysia has not been evaluated before. This study aims to determine the level of KAP regarding medical ethics among these groups. This was a cross-sectional study involving three groups of samples, i.e., paediatric surgeons (PS), paediatric surgical trainees (PST), and medical officers with a special interest in paediatric surgery (MO). A validated KAP questionnaire was used. Standard formulas were used to calculate objective indexes for measuring KAP, which were then compared for statistical significance across different sample groups; p less than 0.05 is taken as significant. The index is rated into 5 classes using a score of 0 to 10, i.e., poor (1-2.99), fair (3-4.99), good (5-6.99), very good (7-8.99), and excellent (9-10). There were 117 samples, i.e., PS n=45 (38.5%), PST n=25 (21.3%), and MO n=47 (40.2%). For knowledge, all three groups display a good index score (mean score of 5.44). For attitude, PS and MO also display an index score of good (mean score of 5.81), while the PST index score was fair (4.82). For practice, our study shows a highest score of 7.14 (very good) among PST. However, these differences were not statistically significant (p> 0.05). Conclusion: Training in paediatric surgery must continue to emphasize professionalism and medical ethics education to deliver the best health care services.

Keywords: KAP, medical ethics, paediatric, surgeons, trainees

Procedia PDF Downloads 78
6536 Nutritional Potential and Traditional Uses of High Altitude Wild Edible Plants in Eastern Himalayas, India

Authors: Hui Tag, Jambey Tsering, Pallabi Kalita Hui, Baikuntha Jyoti Gogoi, Vijay Veer

Abstract:

The food security issues and its relevance in High Mountain regions of the world have been often neglected. Wild edible plants have been playing a major role in livelihood security among the tribal Communities of East Himalayan Region of the world since time immemorial. The Eastern Himalayan Region of India is one of the mega diverse regions of world and rated as top 12th Global Biodiversity Hotspots by IUCN and recognized as one of the 200 significant eco-regions of the Globe. The region supports one of the world’s richest alpine floras and about one-third of them are endemic to the region. There are at least 7,500 flowering plants, 700 orchids, 58 bamboo species, 64 citrus species, 28 conifers, 500 mosses, 700 ferns and 728 lichens. The region is the home of more than three hundred different ethnic communities having diverse knowledge on traditional uses of flora and fauna as food, medicine and beverages. Monpa, Memba and Khamba are among the local communities residing in high altitude region of Eastern Himalaya with rich traditional knowledge related to utilization of wild edible plants. The Monpas, Memba and Khamba are the followers Mahayana sect of Himalayan Buddhism and they are mostly agrarian by primary occupation and also heavily relaying on wild edible plants for their livelihood security during famine since millennia. In the present study, we have reported traditional uses of 40 wild edible plant species and out of which 6 species were analysed at biochemical level for nutrients contents and free radical scavenging activities. The results have shown significant free radical scavenging (antioxidant) activity and nutritional potential of the selected 6 wild edible plants used by the local communities of Eastern Himalayan Region of India.

Keywords: East Himalaya, local community, wild edible plants, nutrition, food security

Procedia PDF Downloads 262
6535 The Psychological Effect of Emotional Demands and Discrimination, and the Role of Job Resources among Asian Immigrant Microbusiness Owners

Authors: Il-Ho Kim, Samuel Noh, Kwame McKenzie, Cyu-Chul Choi

Abstract:

Many members of immigrant minorities choose to operate microbusinesses that involve emotionally taxing interactions with customers and discriminatory exposures in the workplace. This study investigated the psychological risks of emotional demands and discrimination as well as the buffering roles of two types of job resources (job autonomy and job security) among immigrant microbusiness owners (MBOs). Data were derived from a cross-sectional survey of 550 Korean immigrant MBOs, aged 30 to 70, living in Toronto and its surrounding areas. Face-to-face interviews were conducted between March and November 2013. Results showed that emotional suppression and discrimination were positively associated with depressive symptoms. However, the direct effect of positive emotional demands was insignificant. For job resources, the beneficial effect of job security on depressive symptom was apparent, but the effect of job autonomy was trivial. Regarding the moderating effect, job security buffered the psychological harm of both emotional suppression and workplace discrimination. Although job autonomy buffered the link between discrimination and depressive symptoms, the buffering effect of job autonomy on the emotional suppression-depression link was insignificant. This study’s finding implies that emotional demands and workplace discrimination seem to be important factors in contributing to occupational psychological problems, but the psychological impact can differ according to the types of emotional demands and job resources among immigrant MBOs.

Keywords: immigrant microbusiness owners, emotional demands, discrimination, job resources, depression

Procedia PDF Downloads 222
6534 The Impact of Malicious Attacks on the Performance of Routing Protocols in Mobile Ad-Hoc Networks

Authors: Habib Gorine, Rabia Saleh

Abstract:

Mobile Ad-Hoc Networks are the special type of wireless networks which share common security requirements with other networks such as confidentiality, integrity, authentication, and availability, which need to be addressed in order to secure data transfer through the network. Their routing protocols are vulnerable to various malicious attacks which could have a devastating consequence on data security. In this paper, three types of attacks such as selfish, gray hole, and black hole attacks have been applied to the two most important routing protocols in MANET named dynamic source routing and ad-hoc on demand distance vector in order to analyse and compare the impact of these attacks on the Network performance in terms of throughput, average delay, packet loss, and consumption of energy using NS2 simulator.

Keywords: MANET, wireless networks, routing protocols, malicious attacks, wireless networks simulation

Procedia PDF Downloads 320
6533 A Risk-Based Comprehensive Framework for the Assessment of the Security of Multi-Modal Transport Systems

Authors: Mireille Elhajj, Washington Ochieng, Deeph Chana

Abstract:

The challenges of the rapid growth in the demand for transport has traditionally been seen within the context of the problems of congestion, air quality, climate change, safety, and affordability. However, there are increasing threats including those related to crime such as cyber-attacks that threaten the security of the transport of people and goods. To the best of the authors’ knowledge, this paper presents for the first time, a comprehensive framework for the assessment of the current and future security issues of multi-modal transport systems. The approach or method proposed is based on a structured framework starting with a detailed specification of the transport asset map (transport system architecture), followed by the identification of vulnerabilities. The asset map and vulnerabilities are used to identify the various approaches for exploitation of the vulnerabilities, leading to the creation of a set of threat scenarios. The threat scenarios are then transformed into risks and their categories, and include insights for their mitigation. The consideration of the mitigation space is holistic and includes the formulation of appropriate policies and tactics and/or technical interventions. The quality of the framework is ensured through a structured and logical process that identifies the stakeholders, reviews the relevant documents including policies and identifies gaps, incorporates targeted surveys to augment the reviews, and uses subject matter experts for validation. The approach to categorising security risks is an extension of the current methods that are typically employed. Specifically, the partitioning of risks into either physical or cyber categories is too limited for developing mitigation policies and tactics/interventions for transport systems where an interplay between physical and cyber processes is very often the norm. This interplay is rapidly taking on increasing significance for security as the emergence of cyber-physical technologies, are shaping the future of all transport modes. Examples include: Connected Autonomous Vehicles (CAVs) in road transport; the European Rail Traffic Management System (ERTMS) in rail transport; Automatic Identification System (AIS) in maritime transport; advanced Communications, Navigation and Surveillance (CNS) technologies in air transport; and the Internet of Things (IoT). The framework adopts a risk categorisation scheme that considers risks as falling within the following threat→impact relationships: Physical→Physical, Cyber→Cyber, Cyber→Physical, and Physical→Cyber). Thus the framework enables a more complete risk picture to be developed for today’s transport systems and, more importantly, is readily extendable to account for emerging trends in the sector that will define future transport systems. The framework facilitates the audit and retro-fitting of mitigations in current transport operations and the analysis of security management options for the next generation of Transport enabling strategic aspirations such as systems with security-by-design and co-design of safety and security to be achieved. An initial application of the framework to transport systems has shown that intra-modal consideration of security measures is sub-optimal and that a holistic and multi-modal approach that also addresses the intersections/transition points of such networks is required as their vulnerability is high. This is in-line with traveler-centric transport service provision, widely accepted as the future of mobility services. In summary, a risk-based framework is proposed for use by the stakeholders to comprehensively and holistically assess the security of transport systems. It requires a detailed understanding of the transport architecture to enable a detailed vulnerabilities analysis to be undertaken, creates threat scenarios and transforms them into risks which form the basis for the formulation of interventions.

Keywords: mitigations, risk, transport, security, vulnerabilities

Procedia PDF Downloads 165
6532 Landmines and the Postcolonial Security Discourse in Zimbabwe

Authors: Fradreck Jockonia Mujuru

Abstract:

The effects of landmine residues from the Zimbabwean liberation war are persisting. Landmines are violently maiming and killing people and animals, causing certain areas inaccessible for agriculture and habitation, instilling fear, and even inducing forced migration. A significant gap in landmines literature is that they are mainly treated as a humanitarian issue and less scholarly. This paper engaged in theorising landmines using postcolonial literature as an epistemology. The results exhibit three issues. One, postcolonial literature provides a timeframe, a process, a space, and an attitude towards modernity on the inquiry of landmines. Two, landmines are understood in the context of war and were further decolonised to pick unique principles studied. Lastly, some of the unique principles found in landmines after decolonising are their ability to provide surveillance, repression and violent fate to all who cross the set boundaries. Therefore, theorising landmines can also be pushed further to be understood through repression. This article concluded that landmines can be theorised outside mainstream International Relations theories using postcolonial literature.

Keywords: landmines, postcolonial, repression, security, violence

Procedia PDF Downloads 76
6531 Taxonomy of Threats and Vulnerabilities in Smart Grid Networks

Authors: Faisal Al Yahmadi, Muhammad R. Ahmed

Abstract:

Electric power is a fundamental necessity in the 21st century. Consequently, any break in electric power is probably going to affect the general activity. To make the power supply smooth and efficient, a smart grid network is introduced which uses communication technology. In any communication network, security is essential. It has been observed from several recent incidents that adversary causes an interruption to the operation of networks. In order to resolve the issues, it is vital to understand the threats and vulnerabilities associated with the smart grid networks. In this paper, we have investigated the threats and vulnerabilities in Smart Grid Networks (SGN) and the few solutions in the literature. Proposed solutions showed developments in electricity theft countermeasures, Denial of services attacks (DoS) and malicious injection attacks detection model, as well as malicious nodes detection using watchdog like techniques and other solutions.

Keywords: smart grid network, security, threats, vulnerabilities

Procedia PDF Downloads 139
6530 Medical Image Classification Using Legendre Multifractal Spectrum Features

Authors: R. Korchiyne, A. Sbihi, S. M. Farssi, R. Touahni, M. Tahiri Alaoui

Abstract:

Trabecular bone structure is important texture in the study of osteoporosis. Legendre multifractal spectrum can reflect the complex and self-similarity characteristic of structures. The main objective of this paper is to develop a new technique of medical image classification based on Legendre multifractal spectrum. Novel features have been developed from basic geometrical properties of this spectrum in a supervised image classification. The proposed method has been successfully used to classify medical images of bone trabeculations, and could be a useful supplement to the clinical observations for osteoporosis diagnosis. A comparative study with existing data reveals that the results of this approach are concordant.

Keywords: multifractal analysis, medical image, osteoporosis, fractal dimension, Legendre spectrum, supervised classification

Procedia PDF Downloads 514
6529 A Real Time Development Study for Automated Centralized Remote Monitoring System at Royal Belum Forest

Authors: Amri Yusoff, Shahrizuan Shafiril, Ashardi Abas, Norma Che Yusoff

Abstract:

Nowadays, illegal logging has been causing much effect to our forest. Some of it causes a flash flood, avalanche, global warming, and etc. This comprehensibly makes us wonder why, what, and who has made it happened. Often, it already has been too late after we have known the cause of it. Even the Malaysian Royal Belum forest has not been spared from land clearing or illegal activity by the natives although this area has been gazetted as a protected area preserved for future generations. Furthermore, because of its sizeable and wide area, these illegal activities are difficult to monitor and to maintain. A critical action must be called upon to prevent all of these unhealthy activities from recurrence. Therefore, a remote monitoring device must be developed in order to capture critical real-time data such as temperature, humidity, gaseous, fire, and rain detection which indicates the current and preserved natural state and habitat in the forest. Besides, this device location can be detected via GPS by showing the latitudes and longitudes of its current location and then to be transmitted by SMS via GSM system. All of its readings will be sent in real-time for data management and analysis. This result will be benefited to the monitoring bodies or relevant authority in keeping the forest in the natural habitat. Furthermore, this research is to gather a unified data and then will be analysed for its comparison with an existing method.

Keywords: remote monitoring system, forest data, GSM, GPS, wireless sensor

Procedia PDF Downloads 417
6528 Adult Attachment Security as a Predictor of Career Decision-Making Self-Efficacy among College Students in the United States

Authors: Mai Kaneda, Sarah Feeney

Abstract:

This study examined the association between adult attachment security and career decision-making self-efficacy (CDMSE) among college students in the United States. Previous studies show that attachment security is associated with levels of CDMSE among college students. Given that a majority of studies examining career development variables have used parental attachment measures, this study adds to understanding of this phenomenon by utilizing a broader measure of attachment. The participants included 269 college students (76% female) between the ages of 19-29. An anonymous survey was distributed online via social media as well as in hard copy format in classrooms. Multiple regression analyses were conducted to determine the relationship between anxious and avoidant attachment and CDMSE. Results revealed anxious attachment was a significant predictor of CDMSE (B = -.13, p = .01), such that greater anxiety in attachment was associated with lower levels of CDMSE. When accounting for anxious attachment, avoidant attachment was no longer significant as a predictor of CDMSE (B = -.12, p = .10). The variance in college CDMSE explained by the model was 7%, F(2,267) = 9.51, p < .001. Results for anxious attachment are consistent with existing literature that finds insecure attachment to be related to lower levels of CDMSE, however the non-significant results for avoidant attachment as a predictor of CDMSE suggest not all types of attachment insecurity are equally related to CDMSE. Future research is needed to explore the nature of the relationship between different dimensions of attachment insecurity and CDMSE.

Keywords: attachment, career decision-making, college students, self-efficacy

Procedia PDF Downloads 221
6527 Engaging the Terrorism Problematique in Africa: Discursive and Non-Discursive Approaches to Counter Terrorism

Authors: Cecil Blake, Tolu Kayode-Adedeji, Innocent Chiluwa, Charles Iruonagbe

Abstract:

National, regional and international security threats have dominated the twenty-first century thus far. Insurgencies that utilize “terrorism” as their primary strategy pose the most serious threat to global security. States in turn adopt terrorist strategies to resist and even defeat insurgents who invoke the legitimacy of statehood to justify their action. In short, the era is dominated by the use of terror tactics by state and non-state actors. Globally, there is a powerful network of groups involved in insurgencies using Islam as the bastion for their cause. In Africa, there are Boko Haram, Al Shabaab and Al Qaeda in the Maghreb representing Islamic groups utilizing terror strategies and tactics to prosecute their wars. The task at hand is to discover and to use multiple ways of handling the present security threats, including novel approaches to policy formulation, implementation, monitoring and evaluation that would pay significant attention to the important role of culture and communication strategies germane for discursive means of conflict resolution. In other to achieve this, the proposed research would address inter alia, root causes of insurgences that predicate their mission on Islamic tenets particularly in Africa; discursive and non-discursive counter-terrorism approaches fashioned by African governments, continental supra-national and regional organizations, recruitment strategies by major non-sate actors in Africa that rely solely on terrorist strategies and tactics and sources of finances for the groups under study. A major anticipated outcome of this research is a contribution to answers that would lead to the much needed stability required for development in African countries experiencing insurgencies carried out by the use of patterned terror strategies and tactics. The nature of the research requires the use of triangulation as the methodological tool.

Keywords: counter-terrorism, discourse, Nigeria, security, terrorism

Procedia PDF Downloads 486
6526 Sportband: An Idea for Workout Monitoring in Amateur and Recreational Sports

Authors: Kamila Mazur-Oleszczuk, Rafal Banasiuk, Dawid Krasnowski, Maciej Pek, Marcin Podgorski, Krzysztof Rykaczewski, Sabina Zoledowska, Dawid Nidzworski

Abstract:

Workout safety is one of the most significant challenges of recreational sports. Loss of water and electrolytes is a consequence of thermoregulatory sweating during exercise. The rate of sweat loss and its chemical composition can fluctuate within and among individuals. That is why we propose our sportband 'Flow' as a device for monitoring these parameters. 'Flow' consists of two parts: an intelligent module and a mobile application. The application allows verifying the training progress and data archiving. The sportband intelligent module includes temperature, heart rate and pulse measurement (non-invasive, continuous methods of workout monitoring). Apart from the standard components, the device will consist of a sweat composition analyzer situated in sportband intelligent module. Sweat is a water solution of numerous compounds such as ions (sodium up to 1609 µg/ml, potassium up to 274 µg/ml), lactic acid (skin pH is between 4.5 - 6) and a small amount of glucose. Awareness of sweat composition allows personalizing electrolyte intake after training. A comprehensive workout monitoring (sweat composition, heart rate, blood oxygen level) will provide improvement in the training routine and time management, which is our goal for the development of the sweat composition analyzer.

Keywords: flow, sportband, sweat, workout monitoring

Procedia PDF Downloads 152
6525 Nanoparticles in Diagnosis and Treatment of Cancer, and Medical Imaging Techniques Using Nano-Technology

Authors: Rao Muhammad Afzal Khan

Abstract:

Nano technology is emerging as a useful technology in nearly all areas of Science and Technology. Its role in medical imaging is attracting the researchers towards existing and new imaging modalities and techniques. This presentation gives an overview of the development of the work done throughout the world. Furthermore, it lays an idea into the scope of the future use of this technology for diagnosing different diseases. A comparative analysis has also been discussed with an emphasis to detect diseases, in general, and cancer, in particular.

Keywords: medical imaging, cancer detection, diagnosis, nano-imaging, nanotechnology

Procedia PDF Downloads 479
6524 Understanding Everyday Insecurities Emerging from Fragmented Territorial Control in Post-Accord Colombia

Authors: Clara Voyvodic

Abstract:

Transitions from conflict to peace are by no means smooth nor linear, particularly from the perspective of those living through them. Over the last few decades, the changing focus in peacebuilding studies has come to appreciate the everyday experience of communities and how that provides a lens through which the relative success or efficacy of these transitions can be understood. In particular, the demobilization of a significant conflict actor is not without consequences, not just for the macro-view of state stabilization and peace, but for the communities who find themselves without a clear authority of territorial control. In Colombia, the demobilization and disarmament of the FARC guerilla group provided a brief respite to the conflict and a major political win for President Manuel Santos. However, this victory has proven short-lived. Drawing from extensive field research in Colombia within the last year, including interviews with local communities and actors operating in these regions, field observations, and other primary resources, this paper examines the post-accord transitions in Colombia and the everyday security experiences of local communities in regions formerly controlled by the FARC. In order to do so, the research focused on a semi-ethnographic approach in the northern region of the department of Antioquia and the coastal area of the border department of Nariño that documented how individuals within these marginalized communities have come to understand and negotiate their security in the years following the accord and the demobilization of the FARC. This presentation will argue that the removal of the FARC as an informal governance actor opened a space for multiple actors to attempt to control the same territory, including the state. This shift has had a clear impact on the everyday security experiences of the local communities. With an exploration of the dynamics of local governance and its impact on lived security experiences, this research seeks to demonstrate how distinct patterns of armed group behavior are emerging not only from a vacuum of control left by the FARC but from an increase in state presence that nonetheless remains inconsistent and unpersuasive as a monopoly of force in the region. The increased multiplicity of actors, particularly the state, has meant that the normal (informal) rules for communities to navigate these territories are no longer in play as the identities, actions, and intentions of different competing groups have become frustratingly opaque. This research provides a prescient analysis on how the shifting dynamics of territorial control in a post-peace accord landscape produce uncertain realities that affect the daily lives of the local communities and endanger the long-term prospect of human-centered security.

Keywords: armed actors, conflict transitions, informal governance, post-accord, security experiences

Procedia PDF Downloads 132
6523 Medical Surveillance Management

Authors: Jina K., Kittinan C. Athitaya J., Weerapat B., Amornrat T., Waraphan N.

Abstract:

Working in the exploration and production of petroleum exposed workers to various health risks, including but not limited to physical and chemical risks. Although lots of barriers have been put in place, e.g., hazard monitoring in the workplace, appropriate training on health hazards, proper personal protective equipment (PPE), the health hazard may harm the workers if the barriers are not effectively implemented. To prove the effectiveness of these barriers, it is necessary to monitor exposure by putting in place the medical surveillance program via biological monitoring of chemical hazards and physical check-ups for physical hazards. Medical surveillance management is the systematic assessment and monitoring of employees exposed or potentially exposed to occupational hazards with the goal of reducing and ultimately preventing occupational illness and injury. The paper aims to demonstrate the effectiveness of medical surveillance management in mitigating health risks associated with physical and chemical hazards in the petroleum industry by focusing on implementing programs for biological monitoring and physical examinations, including defining procedures for biological monitoring, urine sample collection, physical examinations, and result management on offshore petroleum platforms. The implementation of medical surveillance management has proven effective in monitoring worker exposure to physical and chemical hazards, leading to reduced medical expenses and the risk associated with work-related diseases significantly.

Keywords: medical surveillance, petroleum industry, occupational hazards, medical surveillance process

Procedia PDF Downloads 17
6522 A Test Methodology to Measure the Open-Loop Voltage Gain of an Operational Amplifier

Authors: Maninder Kaur Gill, Alpana Agarwal

Abstract:

It is practically not feasible to measure the open-loop voltage gain of the operational amplifier in the open loop configuration. It is because the open-loop voltage gain of the operational amplifier is very large. In order to avoid the saturation of the output voltage, a very small input should be given to operational amplifier which is not possible to be measured practically by a digital multimeter. A test circuit for measurement of open loop voltage gain of an operational amplifier has been proposed and verified using simulation tools as well as by experimental methods on breadboard. The main advantage of this test circuit is that it is simple, fast, accurate, cost effective, and easy to handle even on a breadboard. The test circuit requires only the device under test (DUT) along with resistors. This circuit has been tested for measurement of open loop voltage gain for different operational amplifiers. The underlying goal is to design testable circuits for various analog devices that are simple to realize in VLSI systems, giving accurate results and without changing the characteristics of the original system. The DUTs used are LM741CN and UA741CP. For LM741CN, the simulated gain and experimentally measured gain (average) are calculated as 89.71 dB and 87.71 dB, respectively. For UA741CP, the simulated gain and experimentally measured gain (average) are calculated as 101.15 dB and 105.15 dB, respectively. These values are found to be close to the datasheet values.

Keywords: Device Under Test (DUT), open loop voltage gain, operational amplifier, test circuit

Procedia PDF Downloads 447
6521 Performance Improvement of SOI-Tri Gate FinFET Transistor Using High-K Dielectric with Metal Gate

Authors: Fatima Zohra Rahou, A.Guen Bouazza, B. Bouazza

Abstract:

SOI TRI GATE FinFET transistors have emerged as novel devices due to its simple architecture and better performance: better control over short channel effects (SCEs) and reduced power dissipation due to reduced gate leakage currents. As the oxide thickness scales below 2 nm, leakage currents due to tunneling increase drastically, leading to high power consumption and reduced device reliability. Replacing the SiO2 gate oxide with a high-κ material allows increased gate capacitance without the associated leakage effects. In this paper, SOI TRI-GATE FinFET structure with use of high K dielectric materials (HfO2) and SiO2 dielectric are simulated using the 3-D device simulator Devedit and Atlas of TCAD Silvaco. The simulated results exhibits significant improvements in the performances of SOI TRI GATE FinFET with gate oxide HfO2 compared with conventional gate oxide SiO2 for the same structure. SOI TRI-GATE FinFET structure with the use of high K materials (HfO2) in gate oxide results into the increase in saturation current, threshold voltage, on-state current and Ion/Ioff ratio while off-state current, subthreshold slope and DIBL effect are decreased.

Keywords: technology SOI, short-channel effects (SCEs), multi-gate SOI MOSFET, SOI-TRI Gate FinFET, high-K dielectric, Silvaco software

Procedia PDF Downloads 347
6520 For Single to Multilayer Polyvinylidene Fluoride Based Polymer for Electro-Caloric Cooling

Authors: Nouh Zeggai, Lucas Debrux, Fabien Parrain, Brahim Dkhil, Martino Lobue, Morgan Almanza

Abstract:

Refrigeration and air conditioning are some of the most used energies in our daily life, especially vapor compression refrigeration. Electrocaloric material might appears as an alternative towards solid-state cooling. polyvinylidene fluoride (PVDF) based polymer has shown promising adiabatic temperature change (∆T) and entropy change (∆S). There is practically no limit to the electric field that can be applied, except the one that the material can withstand. However, when working with a large surface as required in a device, the chance to have a defect is larger and can drastically reduce the voltage breakdown, thus reducing the electrocaloric properties. In this work, we propose to study how the characteristic of a single film are transposed when going to multilayer. The laminator and the hot press appear as two interesting processes that have been investigating to achieve a multilayer film. The study is mainly focused on the breakdown field and the adiabatic temperature change, but the phase and crystallinity have also been measured. We process one layer-based PVDF and assemble them to obtain a multilayer. Pressing at hot temperature method and lamination were used for the production of the thin films. The multilayer film shows higher breakdown strength, temperature change, and crystallinity (beta phases) using the hot press technique.

Keywords: PVDF-TrFE-CFE, multilayer, electrocaloric effect, hot press, cooling device

Procedia PDF Downloads 170
6519 An Analytical Approach to Assess and Compare the Vulnerability Risk of Operating Systems

Authors: Pubudu K. Hitigala Kaluarachchilage, Champike Attanayake, Sasith Rajasooriya, Chris P. Tsokos

Abstract:

Operating system (OS) security is a key component of computer security. Assessing and improving OSs strength to resist against vulnerabilities and attacks is a mandatory requirement given the rate of new vulnerabilities discovered and attacks occurring. Frequency and the number of different kinds of vulnerabilities found in an OS can be considered an index of its information security level. In the present study five mostly used OSs, Microsoft Windows (windows 7, windows 8 and windows 10), Apple’s Mac and Linux are assessed for their discovered vulnerabilities and the risk associated with each. Each discovered and reported vulnerability has an exploitability score assigned in CVSS score of the national vulnerability database. In this study the risk from vulnerabilities in each of the five Operating Systems is compared. Risk Indexes used are developed based on the Markov model to evaluate the risk of each vulnerability. Statistical methodology and underlying mathematical approach is described. Initially, parametric procedures are conducted and measured. There were, however, violations of some statistical assumptions observed. Therefore the need for non-parametric approaches was recognized. 6838 vulnerabilities recorded were considered in the analysis. According to the risk associated with all the vulnerabilities considered, it was found that there is a statistically significant difference among average risk levels for some operating systems, indicating that according to our method some operating systems have been more risk vulnerable than others given the assumptions and limitations. Relevant test results revealing a statistically significant difference in the Risk levels of different OSs are presented.

Keywords: cybersecurity, Markov chain, non-parametric analysis, vulnerability, operating system

Procedia PDF Downloads 183
6518 Demulsification of Oil from Produced water Using Fibrous Coalescer

Authors: Nutcha Thianbut

Abstract:

In the petroleum drilling industry, besides oil and gas, water is also produced from petroleum production. which will have oil droplets dispersed in the water as an emulsion. Commonly referred to as produced water, most industrial water-based produced water methods use the method of pumping water back into wells or catchment areas. because it cannot be utilized further, but in the compression of water each time, the cost is quite high. And the survey found that the amount of water from the petroleum production process has increased every year. In this research, we would like to study the removal of oil in produced water by the Coalescer device using fibers from agricultural waste as an intermediary. As an alternative to reduce the cost of water management in the petroleum drilling industry. The objectives of this research are 1. To study the fiber pretreatment by chemical process for the efficiency of oil-water separation 2. To study and design the fiber-packed coalescer device to destroy the emulsion of crude oil in water. 3. To study the working conditions of coalescer devices in emulsion destruction. using a fiber medium. In this research, the experiment was divided into two parts. The first part will study the absorbency of fibers. It compares untreated fibers with chemically treated alkaline fibers that change over time as well as adjusting the amount of fiber on the absorbency of the fiber and the second part will study the separation of oil from produced water by Coalescer equipment using fiber as medium to study the optimum condition of coalescer equipment for further development and industrial application.

Keywords: produced water, fiber, surface modification, coalescer

Procedia PDF Downloads 166
6517 Efficacy and Safety of Electrical Vestibular Stimulation on Adults with Symptoms of Insomnia: A Double-Blind, Randomized, Sham-Controlled Trial

Authors: Teris Cheung, Joyce Yuen Ting Lam, Kwan Hin Fong, Calvin Pak-Wing Cheng, Julie Sittlington, Yu-Tao Xiang, Tim Man Ho Li

Abstract:

Insomnia is one of the most common health problems in the general population. Insomnia can be acute, intermittent, and become chronic, often due to comorbidity with other physical and mental health conditions. Although there are conventional pharmaceutical and psychotherapeutic treatments to treat symptoms of insomnia, however; there is no robust and novel randomized controlled trial (RCT) using transdermal neurostimulation on individuals with insomnia symptoms. This gives us the impetus to execute the first nationwide RCT. Aim: To evaluate the efficacy of Electrical Vestibular Stimulation (VeNS) on individuals with insomnia in Hong Kong. Design: This study was a two-armed, double blinded, randomized, sham-controlled trial. Sampling: 60 community-dwelling adults aged 18 and 60 years with moderate insomnia symptoms or above (Insomnia Severity Index > 14) were recruited. All subjects were computerized randomized into either the active VeNS group or the sham VeNS group on a 1:1 ratio. Intervention: All participants received a home-use VeNS device and used 30-min VeNS sessions during five consecutive days across a 4-week period (total treatment hours: 10). Baseline measurements and post-VeNS evaluation of the psychological outcomes, including 1) insomnia severity, 2) sleep quality, and 3) quality of life were investigated. The short-and long-term sustainability of the VeNS intervention was assessed immediately after poststim and at a 1-month and 3-month follow-up period. Data analysis: A mixed GEE model was used to analyze the repeated measures data. Missing data were managed by multiple imputations. The level of significance was set to p < 0.05. Significance of the study: This is the first trial to examine the efficacy and safety of VeNS among adults with insomnia symptoms in Hong Kong. Findings that emerged were used to determine whether this VeNS device can be considered a self-help technological device to reduce the severity of insomnia in the community setting and to reduce the global disease burden. Clinical Trial Registration: ClinicalTrials.gov, identifier: NCT04452981.

Keywords: adults, insomnia, neuromodulation, rct, vestibular stimulation

Procedia PDF Downloads 83