Search results for: medical device security
6307 Device for Reversible Hydrogen Isotope Storage with Aluminum Oxide Ceramic Case
Authors: Igor P. Maximkin, Arkady A. Yukhimchuk, Victor V. Baluev, Igor L. Malkov, Rafael K. Musyaev, Damir T. Sitdikov, Alexey V. Buchirin, Vasily V. Tikhonov
Abstract:
Minimization of tritium diffusion leakage when developing devices handling tritium-containing media is key problems whose solution will at least allow essential enhancement of radiation safety and minimization of diffusion losses of expensive tritium. One of the ways to solve this problem is to use Al₂O₃ high-strength non-porous ceramics as a structural material of the bed body. This alumina ceramics offers high strength characteristics, but its main advantages are low hydrogen permeability (as against the used structural material) and high dielectric properties. The latter enables direct induction heating of an hydride-forming metal without essential heating of the pressure and containment vessel. The use of alumina ceramics and induction heating allows: - essential reduction of tritium extraction time; - several orders reduction of tritium diffusion leakage; - more complete extraction of tritium from metal hydrides due to its higher heating up to melting in the event of final disposal of the device. The paper presents computational and experimental results for the tritium bed designed to absorb 6 liters of tritium. Titanium was used as hydrogen isotope sorbent. Results of hydrogen realize kinetic from hydride-forming metal, strength and cyclic service life tests are reported. Recommendations are also provided for the practical use of the given bed type.Keywords: aluminum oxide ceramic, hydrogen pressure, hydrogen isotope storage, titanium hydride
Procedia PDF Downloads 4076306 The Processing of Implicit Stereotypes in Everyday Scene Perception
Authors: Magali Mari, Fabrice Clement
Abstract:
The present study investigated the influence of implicit stereotypes on adults’ visual information processing, using an eye-tracking device. Implicit stereotyping is an automatic and implicit process; it happens relatively quickly, outside of awareness. In the presence of a member of a social group, a set of expectations about the characteristics of this social group appears automatically in people’s minds. The study aimed to shed light on the cognitive processes involved in stereotyping and to further investigate the use of eye movements to measure implicit stereotypes. With an eye-tracking device, the eye movements of participants were analyzed, while they viewed everyday scenes depicting women and men in congruent or incongruent gender role activities (e.g., a woman ironing or a man ironing). The settings of these scenes had to be analyzed to infer the character’s role. Also, participants completed an implicit association test that combined the concept of gender with attributes of occupation (home/work), while measuring reaction times to assess participants’ implicit stereotypes about gender. The results showed that implicit stereotypes do influence people’s visual attention; within a fraction of a second, the number of returns, between stereotypical and counter-stereotypical scenes, differed significantly, meaning that participants interpreted the scene itself as a whole before identifying the character. They predicted that, in such a situation, the character was supposed to be a woman or a man. Also, the study showed that eye movements could be used as a fast and reliable supplement for traditional implicit association tests to measure implicit stereotypes. Altogether, this research provides further understanding of implicit stereotypes processing as well as a natural method to study implicit stereotypes.Keywords: eye-tracking, implicit stereotypes, social cognition, visual attention
Procedia PDF Downloads 1596305 Mandatory Wellness Assessments for Medical Students at the University of Ottawa
Authors: Haykal. Kay-Anne
Abstract:
The health and well-being of students is a priority for the Faculty of Medicine at the University of Ottawa. The demands of medical studies are extreme, and many studies confirm that the prevalence of psychological distress is very high among medical students and that it is higher than that of the general population of the same age. The main goal is to identify risk factors for mental health among medical students at the University of Ottawa. The secondary objectives are to determine the variation of these risk factors according to demographic variables, as well as to determine if there is a change in the mental health of students during the 1st and 3rd years of their study. Medical students have a mandatory first and third-year wellness check meeting. This assessment includes a questionnaire on demographic information, mental health, and risk factors such as physical health, sleep, social support, financial stress, education and career, stress and drug use and/or alcohol. Student responses were converted to numerical values and analyzed statistically. The results show that 61% of the variation in the mean of the mental health score is explained by the following risk factors (R2 = 0.61, F (9.396) = 67.197, p < 0.01): lack of sleep and fatigue (β = 0.281, p < 0.001), lack of social support (β = 0.217, p <0.001), poor study or career development (β = 0.195, p < 0.001) and an increase stress and drug and alcohol use (β = -0.239, p < 0.001). No demographic variable has a significant effect on the presence of risk factors. In addition, fixed-effects regression demonstrated significantly lower mental health (p < 0.1) among first-year students (M = 0.587, SD = 0.072) than among third-year students (M = 0.719, SD = 0.071). This preliminary study indicates the need to continue data collection and analysis to increase the significance of the study results. As risk factors are present at the beginning of medical studies, it is important to offer resources to students very early in their medical studies and to have close monitoring and supervision.Keywords: assessment of mental health, medical students, risk factors for mental health, wellness assessment
Procedia PDF Downloads 1236304 Adjustment of the Level of Vibrational Force on Targeted Teeth
Authors: Amin Akbari, Dongcai Wang, Huiru Li, Xiaoping Du, Jie Chen
Abstract:
The effect of vibrational force (VF) on accelerating orthodontic tooth movement depends on the level of delivered stimulation to the tooth in terms of peak load (PL), which requires contacts between the tooth and the VF device. A personalized device ensures the contacts, but the resulting PL distribution on the teeth is unknown. Furthermore, it is unclear whether the PL on particular teeth can be adjusted to the prescribed values. The objective of this study was to investigate the efficacy of apersonalized VF device in controlling the level of stimulation on two teeth, the mandibular canines and 2nd molars. A 3-D finite element (FE) model of human dentition, including teeth, PDL, and alveolar bone, was created from the cone beam computed tomography images of an anonymous subject. The VF was applied to the teeth through a VFdevice consisting of a mouthpiece with engraved tooth profile of the subject and a VF source that applied 0.3 N force with the frequency of 30 Hz. The dentition and mouthpiece were meshed using 10-node tetrahedral elements. Interface elements were created at the interfaces between the teeth and the mouthpiece. The upper and lower teeth bite on the mouthpiece to receive the vibration. The depth of engraved individual tooth profile could be adjusted, which was accomplished by adding a layer of material as an interference or removing a layer of material as a clearance to change the PL on the tooth. The interference increases the PL while the clearance decreases it. Fivemouthpiece design cases were simulated, which included a mouthpiece without interference/clearance; the mouthpieces with bilateral interferences on both mandibular canines and 2nd molars with magnitudes of 0.1, 0.15, and 0.2-mm, respectively; and mouthpiece with bilateral 0.3-mm clearances on the four teeth. Then, the force distributions on the entire dentition were compared corresponding to these adjustments. The PL distribution on the teeth is uneven when there is no interference or clearance. Among all teeth, the anterior segment receives the highest level of PL. Adding 0.1, 0.15, and 0.2-mm interferences to the canines and 2nd molars bilaterally leads to increase of the PL on the canines by 10, 62, and 73 percent and on the 2nd molar by 14, 55, and 87 percent, respectively. Adding clearances to the canines and 2nd molars by removing the contactsbetween these teeth and the mouthpiece results in zero PL on them. Moreover, introducing interference to mandibular canines and 2nd molarsredistributes the PL on the entireteeth. The share of the PL on the anterior teeth are reduced. The use of the personalized mouthpiece ensures contactsof the teeth to the mouthpiece so that all teeth can be stimulated. However, the PL distribution is uneven. Adding interference between a tooth and the mouthpiece increases the PL while introducing clearance decreases the PL. As a result, the PL is redistributed. This study confirms that the level of VF stimulation on the individual tooth can be adjusted to a prescribed value.Keywords: finite element method, orthodontic treatment, stress analysis, tooth movement, vibrational force
Procedia PDF Downloads 2246303 Requirement Engineering for Intrusion Detection Systems in Wireless Sensor Networks
Authors: Afnan Al-Romi, Iman Al-Momani
Abstract:
The urge of applying the Software Engineering (SE) processes is both of vital importance and a key feature in critical, complex large-scale systems, for example, safety systems, security service systems, and network systems. Inevitably, associated with this are risks, such as system vulnerabilities and security threats. The probability of those risks increases in unsecured environments, such as wireless networks in general and in Wireless Sensor Networks (WSNs) in particular. WSN is a self-organizing network of sensor nodes connected by wireless links. WSNs consist of hundreds to thousands of low-power, low-cost, multi-function sensor nodes that are small in size and communicate over short-ranges. The distribution of sensor nodes in an open environment that could be unattended in addition to the resource constraints in terms of processing, storage and power, make such networks in stringent limitations such as lifetime (i.e. period of operation) and security. The importance of WSN applications that could be found in many militaries and civilian aspects has drawn the attention of many researchers to consider its security. To address this important issue and overcome one of the main challenges of WSNs, security solution systems have been developed by researchers. Those solutions are software-based network Intrusion Detection Systems (IDSs). However, it has been witnessed, that those developed IDSs are neither secure enough nor accurate to detect all malicious behaviours of attacks. Thus, the problem is the lack of coverage of all malicious behaviours in proposed IDSs, leading to unpleasant results, such as delays in the detection process, low detection accuracy, or even worse, leading to detection failure, as illustrated in the previous studies. Also, another problem is energy consumption in WSNs caused by IDS. So, in other words, not all requirements are implemented then traced. Moreover, neither all requirements are identified nor satisfied, as for some requirements have been compromised. The drawbacks in the current IDS are due to not following structured software development processes by researches and developers when developing IDS. Consequently, they resulted in inadequate requirement management, process, validation, and verification of requirements quality. Unfortunately, WSN and SE research communities have been mostly impermeable to each other. Integrating SE and WSNs is a real subject that will be expanded as technology evolves and spreads in industrial applications. Therefore, this paper will study the importance of Requirement Engineering when developing IDSs. Also, it will study a set of existed IDSs and illustrate the absence of Requirement Engineering and its effect. Then conclusions are drawn in regard of applying requirement engineering to systems to deliver the required functionalities, with respect to operational constraints, within an acceptable level of performance, accuracy and reliability.Keywords: software engineering, requirement engineering, Intrusion Detection System, IDS, Wireless Sensor Networks, WSN
Procedia PDF Downloads 3226302 Border Security: Implementing the “Memory Effect” Theory in Irregular Migration
Authors: Iliuta Cumpanasu, Veronica Oana Cumpanasu
Abstract:
This paper focuses on studying the conjunction between the new emerged theory of “Memory Effect” in Irregular Migration and Related Criminality and the notion of securitization, and its impact on border management, bringing about a scientific advancement in the field by identifying the patterns corresponding to the linkage of the two concepts, for the first time, and developing a theoretical explanation, with respect to the effects of the non-military threats on border security. Over recent years, irregular migration has experienced a significant increase worldwide. The U.N.'s refugee agency reports that the number of displaced people is at its highest ever - surpassing even post-World War II numbers when the world was struggling to come to terms with the most devastating event in history. This is also the fresh reality within the core studied coordinate, the Balkan Route of Irregular Migration, which starts from Asia and Africa and continues to Turkey, Greece, North Macedonia or Bulgaria, Serbia, and ends in Romania, where thousands of migrants find themselves in an irregular situation concerning their entry to the European Union, with its important consequences concerning the related criminality. The data from the past six years was collected by making use of semi-structured interviews with experts in the field of migration and desk research within some organisations involved in border security, pursuing the gathering of genuine insights from the aforementioned field, which was constantly addressed the existing literature and subsequently subjected to the mixed methods of analysis, including the use of the Vector Auto-Regression estimates model. Thereafter, the analysis of the data followed the processes and outcomes in Grounded Theory, and a new Substantive Theory emerged, explaining how the phenomena of irregular migration and cross-border criminality are the decisive impetus for implementing the concept of securitization in border management by using the proposed pattern. The findings of the study are therefore able to capture an area that has not yet benefitted from a comprehensive approach in the scientific community, such as the seasonality, stationarity, dynamics, predictions, or the pull and push factors in Irregular Migration, also highlighting how the recent ‘Pandemic’ interfered with border security. Therefore, the research uses an inductive revelatory theoretical approach which aims at offering a new theory in order to explain a phenomenon, triggering a practically handy contribution for the scientific community, research institutes or Academia and also usefulness to organizational practitioners in the field, among which UN, IOM, UNHCR, Frontex, Interpol, Europol, or national agencies specialized in border security. The scientific outcomes of this study were validated on June 30, 2021, when the author defended his dissertation for the European Joint Master’s in Strategic Border Management, a two years prestigious program supported by the European Commission and Frontex Agency and a Consortium of six European Universities and is currently one of the research objectives of his pending PhD research at the West University Timisoara.Keywords: migration, border, security, memory effect
Procedia PDF Downloads 926301 A Software Engineering Methodology for Developing Secure Obfuscated Software
Authors: Carlos Gonzalez, Ernesto Linan
Abstract:
We propose a methodology to conciliate two apparently contradictory processes in the development of secure obfuscated software and good software engineered software. Our methodology consists first in the system designers defining the type of security level required for the software. There are four types of attackers: casual attackers, hackers, institution attack, and government attack. Depending on the level of threat, the methodology we propose uses five or six teams to accomplish this task. One Software Engineer Team and one or two software Obfuscation Teams, and Compiler Team, these four teams will develop and compile the secure obfuscated software, a Code Breakers Team will test the results of the previous teams to see if the software is not broken at the required security level, and an Intrusion Analysis Team will analyze the results of the Code Breakers Team and propose solutions to the development teams to prevent the detected intrusions. We also present an analytical model to prove that our methodology is no only easier to use, but generates an economical way of producing secure obfuscated software.Keywords: development methodology, obfuscated software, secure software development, software engineering
Procedia PDF Downloads 2506300 Using Short Narrative Film to Drive Healthcare Policy: A Case Study
Authors: T. L. Granzyk, S. Scarborough, J. DeCosmo
Abstract:
The use of health-related or medical narratives has gained increasing anecdotal and research-based support as a successful device for changing health behavior and outcomes. These narratives, in the form of oral storytelling, short films, and educational documentaries, for example, are most effective when including empathetic characters that transport viewers into the story and command both their attention and emotional response. This case study outlines how and why one large health system created a short narrative film for their internal Sepsis Awareness campaign, which told the dramatic story of a patient recovering from a missed sepsis diagnosis, leaving her a quad-amputee. Results include positive global anecdotal response to the film from healthcare professionals and patients, as well as use of the film to support legislation, ultimately passed in favor of the formation of Sepsis Awareness Workgroups in Maryland. Authors conclude that narrative films can be used successfully to initiate healthcare legislation and to increase internal and external awareness of health-related areas in need of greater improvement and support. As such, healthcare leaders and stakeholders would benefit from learning how to intentionally create, cultivate, and curate narratives from within their own health systems that elicit an empathetic response.Keywords: healthcare policy, healthcare narratives, sepsis awareness, short films
Procedia PDF Downloads 1026299 Analytical Study of Applying the Account Aggregation Approach in E-Banking Services
Authors: A. Al Drees, A. Alahmari, R. Almuwayshir
Abstract:
The advanced information technology is becoming an important factor in the development of financial services industry, especially the banking industry. It has introduced new ways of delivering banking to the customer, such as Internet Banking. Banks began to look at electronic banking (e-banking) as a means to replace some of their traditional branch functions using the Internet as a new distribution channel. Some consumers have at least more than one account, and across banks, and access these accounts using e-banking services. To look at the current net worth position, customers have to login to each of their accounts and get the details and work on consolidation. This not only takes ample time but it is a repetitive activity at a specified frequency. To address this point, an account aggregation concept is added as a solution. E-banking account aggregation, as one of the e-banking types, appeared to build a stronger relationship with customers. Account Aggregation Service generally refers to a service that allows customers to manage their bank accounts maintained in different institutions through a common Internet banking operating a platform, with a high concern to security and privacy. This paper presents an overview of an e-banking account aggregation approach as a new service in the e-banking field.Keywords: e-banking, account aggregation, security, enterprise development
Procedia PDF Downloads 3286298 The Prevalence and Impact of Anxiety Among Medical Students in the MENA Region: A Systematic Review, Meta-Analysis, and Meta-Regression
Authors: Kawthar F. Albasri, Abdullah M. AlHudaithi, Dana B. AlTurairi, Abdullaziz S. AlQuraini, Adoub Y. AlDerazi, Reem A. Hubail, Haitham A. Jahrami
Abstract:
Several studies have found that medical students have a significant prevalence of anxiety. The purpose of this review paper is to carefully evaluate the current research on anxiety among medical students in the MENA region and, as a result, estimate the prevalence of these disturbances. Multiple databases, including the CINAHL (Cumulative Index to Nursing and Allied Health Literature), Cochrane Library, Embase, MEDLINE (Medical Literature Analysis and Retrieval System Online), PubMed, PsycINFO (Psychological Information Database), Scopus, Web of Science, UpToDate, ClinicalTrials.gov, WHO Global Health Library, EbscoHost, ProQuest, JAMA Network, and ScienceDirect, were searched. The retrieved article reference lists were rigorously searched and rated for quality. A random effects meta-analysis was performed to compute estimates. The current meta-analysis revealed an alarming estimated pooled prevalence of anxiety (K = 46, N = 27023) of 52.5% [95%CI: 43.3%–61.6%]. A total of 62.0% [95% CI 42.9%; 78.0%] of the students (K = 18, N = 16466) suffered from anxiety during the COVID-19 pandemic, while 52.5% [95% CI 43.3%; 61.6%] had anxiety before COVID-19. Based on the GAD-7 measure, a total of 55.7% [95%CI 30.5%; 78.3%] of the students (K = 10, N = 5830) had anxiety, and a total of 54.7% of the students (K = 18, N = 12154) [95%CI 42.8%; 66.0%] had anxiety using the DASS-21 or 42 measure. Anxiety is a common issue among medical students, making it a genuine problem. Further research should be conducted post-COVD 19, with a focus on anxiety prevention and intervention initiatives for medical students.Keywords: anxiety, medical students, MENA, meta-analysis, prevalence
Procedia PDF Downloads 736297 Graphene Based Electronic Device
Authors: Ali Safari, Pejman Hosseiniun, Iman Rahbari, MohamadReza Kalhor
Abstract:
The semiconductor industry is placing an increased emphasis on emerging materials and devices that may provide improved performance, or provide novel functionality for devices. Recently, graphene, as a true two-dimensional carbon material, has shown fascinating applications in electronics. In this paper detailed discussions are introduced for possible applications of grapheme Transistor in RF and digital devices.Keywords: graphene, GFET, RF, digital
Procedia PDF Downloads 3616296 Diversity and Distribution of Cytochrome P450 2C9 Genes Related with Medical Cannabis in Thai Patients
Authors: Tanakrit Doltanakarn
Abstract:
Introduction: These days, cannabis is being accepted in many countries due to the fact that cannabis could be use in medical. The medical cannabis is used to treat and reduce the pain many diseases. For example, neuropathic pain, Parkinson, autism disorders, cancer pain reduce the adverse effect of chemotherapy, diabetes, and migraine. Active ingredients in cannabis that modulate patients' perceptions of their conditions include Δ9‐tetrahydrocannabinol (THC), cannabidiol (CBD), flavonoids, and terpenes. However, there is an adverse effect of cannabis, cardiovascular effects, psychosis, schizophrenia, mood disorder, and cognitive alternation. These effects are from the THC and CBD ingredients in the cannabis. The metabolize processes of delta-9 THC to 11-OH-delta 9 -THC (inactive form), THC were cause of adverse effects. Interestingly, the distributions of CYP2C9 gene (CYP2C9*2 and CYP2C9*3, poor metabolizer) that might affect incidences of adverse effects in patients who treated with medical cannabis. Objective: The aim of this study we want to investigate the association between genetic polymorphism of CYP2C9 frequency and Thai patients who treated with medical cannabis. Materials and Methods:We recruited sixty-five unrelated Thai patients from the College of Pharmacy, Rangsit University. DNA were extracted using Genomic DNA Mini Kit. Genotyping of CYP2C9*2 (430C>T, rs1799853) and CYP2C9*3 (1075A>C, rs1057910) were genotyped by the TaqMan Real-time PCR assay. Results: Among these 31 medicals cannabis-induced ADRs patients, they were diagnosed with 22 (33.85%) tachycardia and 3 (4.62%) arrhythmia. There were 34 (52.31%) medical cannabis-tolerant controls who were included in this study.40 (61.53%) Thai patients were female, and 25 (38.46%) were male, with median age of 57 (range 27 – 87) years. In this study, we found none of the medical cannabis-induced ADRs carried CYP2C9*2 variant along with medical cannabis-tolerant control group. CYP2C9*3 variant (intermediate metabolizer, IM) was found just only one of thirty-one (3.23%) in the medical cannabis-induced ADRs and two of thirty-fourth (5.88%) in the tolerant controls. Conclusions: Thus, the distribution of CYP2C9 alleles offer a comprehensive view of pharmacogenomics marker in Thai population that could be used as a reference for worldwide to investigate the pharmacogenomics application.Keywords: medical cannabis, adverse effect, CYP2C9, thai patients
Procedia PDF Downloads 1016295 Applying Simulation-Based Digital Teaching Plans and Designs in Operating Medical Equipment
Authors: Kuo-Kai Lin, Po-Lun Chang
Abstract:
Background: The Emergency Care Research Institute released a list for the top 10 medical technology hazards in 2017, with the following hazard topping the list: ‘infusion errors can be deadly if simple safety steps are overlooked.’ In addition, hospitals use various assessment items to evaluate the safety of their medical equipment, confirming the importance of medical equipment safety. In recent years, the topic of patient safety has garnered increasing attention. Accordingly, various agencies have established patient safety-related committees to coordinate, collect, and analyze information regarding abnormal events associated with medical practice. Activities to promote and improve employee training have been introduced to diminish the recurrence of medical malpractice. Objective: To allow nursing personnel to acquire the skills needed to operate common medical equipment and update and review such skills whenever necessary to elevate medical care quality and reduce patient injuries caused by medical equipment operation errors. Method: In this study, a quasi-experimental design was adopted and nurses from a regional teaching hospital were selected as the study sample. Online videos instructing the operation method of common medical equipment were made and quick response codes were designed for the nursing personnel to quickly access the videos when necessary. Senior nursing supervisors and equipment experts were invited to formulate a ‘Scale-based Questionnaire for Assessing Nursing Personnel’s Operational Knowledge of Common Medical Equipment’ to evaluate the nursing personnel’s literacy regarding the operation of the medical equipment. From March to October 2017, an employee training on medical equipment operation and a practice course (simulation course) were implemented, after which the effectiveness of the training and practice course were assessed. Results: Prior to and after the training and practice course, the 66 participating nurses scored 58 and 87 on ‘operational knowledge of common medical equipment,’ respectively (showing a significant statistical difference; t = -9.407, p < .001); 53.5 and 86.3 on ‘operational knowledge of 12-lead electrocardiography’ (z = -2.087, p < .01), respectively; 40 and 79.5 on ‘operational knowledge of cardiac defibrillators’ (z = -3.849, p < .001), respectively; 90 and 98 on ‘operational knowledge of Abbott pumps’ (z = -1.841, p = 0.066), respectively; and 8.7 and 13.7 on ‘perceived competence’ (showing a significant statistical difference; t = -2.77, p < .05). In the participating hospital, medical equipment operation errors were observed in both 2016 and 2017. However, since the implementation of the intervention, medical equipment operation errors have not yet been observed up to October 2017, which can be regarded as the secondary outcome of this study. Conclusion: In this study, innovative teaching strategies were adopted to effectively enhance the professional literacy and skills of nursing personnel in operating medical equipment. The training and practice course also elevated the nursing personnel’s related literacy and perceived competence of operating medical equipment. The nursing personnel was thus able to accurately operate the medical equipment and avoid operational errors that might jeopardize patient safety.Keywords: medical equipment, digital teaching plan, simulation-based teaching plan, operational knowledge, patient safety
Procedia PDF Downloads 1386294 Accelerating Mobile Innovation, Adoption, and Translational Science within a Large Research Enterprise and Healthcare System
Authors: Stephen Wheat
Abstract:
Institutional mobile application governance and distribution processes are essential to mobile app innovation. The absence of effective processes poses a significant barrier to the development and adoption of mobile apps for use within a research enterprise and also impedes the translational science of applying research apps in clinical and engineering settings. To accelerate mobile app innovation and adoption, Emory University and Emory Healthcare implemented a three-pronged strategy including. I) Mobile app review and distribution policies and processes. II) Mobile app management infrastructure and mobile app foundation components. III) A strategic sourcing strategy based on preferred mobile app development firms. The results have been an increase from five to 56 mobile apps in the pipeline over three years; increased engagement from technology transfer, legal counsel, compliance, and information security; articulation of a coordinated mobile app strategy; and allocation of more institutional resources toward specific mobile technology and mobile application goals.Keywords: mobile app management, governance, distribution, information security
Procedia PDF Downloads 2996293 Electronic Device Robustness against Electrostatic Discharges
Authors: Clara Oliver, Oibar Martinez
Abstract:
This paper is intended to reveal the severity of electrostatic discharge (ESD) effects in electronic and optoelectronic devices by performing sensitivity tests based on Human Body Model (HBM) standard. We explain here the HBM standard in detail together with the typical failure modes associated with electrostatic discharges. In addition, a prototype of electrostatic charge generator has been designed, fabricated, and verified to stress electronic devices, which features a compact high voltage source. This prototype is inexpensive and enables one to do a battery of pre-compliance tests aimed at detecting unexpected weaknesses to static discharges at the component level. Some tests with different devices were performed to illustrate the behavior of the proposed generator. A set of discharges was applied according to the HBM standard to commercially available bipolar transistors, complementary metal-oxide-semiconductor transistors and light emitting diodes. It is observed that high current and voltage ratings in electronic devices not necessarily provide a guarantee that the device will withstand high levels of electrostatic discharges. We have also compared the result obtained by performing the sensitivity tests based on HBM with a real discharge generated by a human. For this purpose, the charge accumulated in the person is monitored, and a direct discharge against the devices is generated by touching them. Every test has been performed under controlled relative humidity conditions. It is believed that this paper can be of interest for research teams involved in the development of electronic and optoelectronic devices which need to verify the reliability of their devices in terms of robustness to electrostatic discharges.Keywords: human body model, electrostatic discharge, sensitivity tests, static charge monitoring
Procedia PDF Downloads 1496292 A Multi-Tenant Problem Oriented Medical Record System for Representing Patient Care Cases using SOAP (Subjective-Objective-Assessment-Plan) Note
Authors: Sabah Mohammed, Jinan Fiaidhi, Darien Sawyer
Abstract:
Describing clinical cases according to a clinical charting standard that enforces interoperability and enables connected care services can save lives in the event of a medical emergency or provide efficient and effective interventions for the benefit of the patients through the integration of bedside and bench side clinical research. This article presented a multi-tenant extension to the problem-oriented medical record that we have prototyped previously upon using the GraphQL Application Programming Interface to represent the notion of a problem list. Our implemented extension enables physicians and patients to collaboratively describe the patient case via using multi chatbots to collaboratively describe the patient case using the SOAP charting standard. Our extension also connects the described SOAP patient case with the HL7 FHIR (Health Interoperability Resources) medical record for connecting the patient case to the bench data.Keywords: problem-oriented medical record, graphQL, chatbots, SOAP
Procedia PDF Downloads 916291 An Evaluation of People’s Susceptibility to Phishing Attacks in Nepal and Effectiveness of the Applied Countermeasures
Authors: Sunil Chaudhary, Rajendra Bahadur Thapa, Eleni Berki, Marko Helenius
Abstract:
The increasing number of Internet and mobile phone users, and essentially those, who use these electronic media to perform online transactions makes Nepal lucrative for phishing attacks. It is one of the reasons behind escalating phishing attacks in the country. Therefore, in this paper we examine various phishing attempts and real scenarios in Nepal to determine the seriousness of the problem. We also want to find out how prepared are the Internet and mobile phone users and how well-equipped are the private sector and government authorities responsible to handle cybercrime in the country. We considered five areas of research study, i.e., legal measures, technical and procedural measures, organizational structure, capacity building and international cooperation. These constitute important factors in cyber security and are recommended by the Global Cyber security Agenda (GCA). On the basis of our findings, we provide essential suggestions to make anti-phishing measures more appropriate to Nepalese State and society.Keywords: internet banking, mobile banking, e-commerce, phishing, anti-phishing, Nepal
Procedia PDF Downloads 4876290 Intrusion Detection Based on Graph Oriented Big Data Analytics
Authors: Ahlem Abid, Farah Jemili
Abstract:
Intrusion detection has been the subject of numerous studies in industry and academia, but cyber security analysts always want greater precision and global threat analysis to secure their systems in cyberspace. To improve intrusion detection system, the visualisation of the security events in form of graphs and diagrams is important to improve the accuracy of alerts. In this paper, we propose an approach of an IDS based on cloud computing, big data technique and using a machine learning graph algorithm which can detect in real time different attacks as early as possible. We use the MAWILab intrusion detection dataset . We choose Microsoft Azure as a unified cloud environment to load our dataset on. We implement the k2 algorithm which is a graphical machine learning algorithm to classify attacks. Our system showed a good performance due to the graphical machine learning algorithm and spark structured streaming engine.Keywords: Apache Spark Streaming, Graph, Intrusion detection, k2 algorithm, Machine Learning, MAWILab, Microsoft Azure Cloud
Procedia PDF Downloads 1476289 Factors Affecting Citizens’ Behavioural Intention to Use E-voter Registration and Verification System Towards the Electoral Process in Nigeria
Authors: Aishatu Shuaibu
Abstract:
It is expected that electronic voter registration and verification in Nigeria will enhance the integrity of elections, which is vital for democratic development; it is also expected to enhance efficiency, transparency, and security. However, the reasons for citizens' intentions with respect to behavioral use of such platforms have not been studied in the literature much. This paper, therefore, intends to look into significant characteristics affecting the acceptance and use of e-voter technology among Nigerian residents. Data will be collected using a structured questionnaire from several local government areas (LGAs) around Nigeria to evaluate the influence of demographic characteristics, technology usability, security perceptions, and governmental education on the intention to implement e-voter systems. The results will offer vital insights into the barriers and drivers of voter technology acceptance, aiding in policy suggestions to enhance voter registration and verification processes within Nigeria's electoral framework. This study is designed to aid electoral stakeholders in devising successful strategies for encouraging the broad deployment of e-voter systems in Nigeria.Keywords: e-governance, e-voting, e-democracy, INEC, Nigeria
Procedia PDF Downloads 206288 The Effects of Changes in Accounting Standards on Loan Loss Provisions (LLP) as Earnings Management Device: Evidence from Malaysia and Nigeria Banks (Part I)
Authors: Ugbede Onalo, Mohd Lizam, Ahmad Kaseri
Abstract:
In view of dearth of studies on changes in accounting standards and banks’ earnings management particularly in the context of emerging economies, and the recent Malaysia and Nigeria change from their respective local GAAP to IFRS, this study deemed it overwhelming to investigate the effects of the switch on banks’ earnings management focusing on LLP as the manipulative device. This study employed judgmental sampling to select twenty eight banks- eight Malaysia and twenty Nigeria banks as sample covering period 2008-2013. To provide an empirical research setting in pursuant of the objective of this study, the study period is further partitioned into pre (2008, 2009, 2010) and post (2011, 2012, 2013) IFRS adoption periods. This study consistent with previous studies models a LLP regression model to investigate specific discretionary accruals of banks. Findings suggest that Malaysia and Nigeria banks individually use LLP to manage reported earnings more prior to IFRS implementation. Comparative overall results evidenced that the pre IFRS adoption or domestic GAAP era for both Malaysia and Nigeria sample banks is associated with higher prevalent earnings management through LLP than the corresponding post IFRS adoption era in diverse magnitude but in favour of Malaysia banks for both periods. With results demonstrating that IFRS adoption is linked to lower earnings management via LLP, this study therefore recommends the global adoption of IFRS as reporting framework. This study also endorses that Nigeria banks embrace and borrow a leaf from Malaysia banks good corporate governance practices.Keywords: accounting standards, IFRS, FRS, SAS, LLP, earnings management
Procedia PDF Downloads 4026287 Performance Investigation of Silica Gel Fluidized Bed
Authors: Sih-Li Chen, Chih-Hao Chen, Chi-Tong Chan
Abstract:
Poor ventilation and high carbon dioxide (CO2) concentrations lead to the formation of sick buildings. This problem cannot simply be resolved by introducing fresh air from outdoor environments because this creates extra loads on indoor air-conditioning systems. Desiccants are widely used in air conditioning systems in tropical and subtropical regions with high humidity to reduce the latent heat load from fresh air. Desiccants are usually used as a packed-bed type, which is low cost, to combine with air-conditioning systems. Nevertheless, the pressure drop of a packed bed is too high, and the heat of adsorption caused by the adsorption process lets the temperature of the outlet air increase, bringing about an extra heat load, so the high pressure drop and the increased temperature of the outlet air are energy consumption sources needing to be resolved. For this reason, the gas-solid fluidised beds that have high heat and mass transfer rates, uniform properties and low pressure drops are very suitable for use in air-conditioning systems.This study experimentally investigates the performance of silica gel fluidized bed device which applying to an air conditioning system. In the experiments, commercial silica gel particles were filled in the two beds and to form a fixed packed bed and a fluidized bed. The results indicated that compared to the fixed packed bed device, the total adsorption and desorption by amounts of fluidized bed for 40 minutes increased 20.6% and 19.9% respectively when the bed height was 10 cm and superficial velocity was set to 2 m/s. In addition, under this condition, the pressure drop and outlet air temperature raise were reduced by 36.0% and 30.0%. Given the above results, application of the silica gel fluidized bed to air conditioning systems has great energy-saving potential.Keywords: fluidized bed, packed bed, silica gel, adsorption, desorption, pressure drop
Procedia PDF Downloads 5366286 Digital Literacy Skills for Geologist in Public Sector
Authors: Angsumalin Puntho
Abstract:
Disruptive technology has had a great influence on our everyday lives and the existence of an organization. Geologists in the public sector need to keep up with digital technology and be able to work and collaborate in a more effective manner. The result from SWOT and 7S McKinsey analyses suggest that there are inadequate IT personnel, no individual digital literacy development plan, and a misunderstanding of management policies. The Office of Civil Service Commission develops digital literacy skills that civil servants and government officers should possess in order to work effectively; it consists of nine dimensions, including computer skills, internet skills, cyber security awareness, word processing, spreadsheets, presentation programs, online collaboration, graphics editors and cyber security practices; and six steps of digital literacy development including self-assessment, individual development plan, self-learning, certified test, learning reflection, and practices. Geologists can use digital literacy as a learning tool to develop themselves for better career opportunities.Keywords: disruptive technology, digital technology, digital literacy, computer skills
Procedia PDF Downloads 1166285 Relationship between Exercise Activity with Incidence of Overweight-Obesity in Medical Students
Authors: Randy M. Fitratullah, Afriwardi, Nurhayati
Abstract:
Overweight-obesity caused by exercise. The objective of this research is to analyze the relation between exercise with the incidence of overweight-obesity of medical students of medical faculty of Andalas Univesity batch 2013. This is an analytical observational research with case-control method. This research conducted in FK Unand on September-October 2015. The population of this research is medical students batch 2013. 26 samples (13 samples were case, 13 samples were control) were taken by purposive sampling technique and analysed using statistical univariate and bivariate analysis. Exercise questionnaire was used as research instruments. Based on the interview with questionnaire, anaerobic exercise was majority in case group and aerobic exercise was majority in control group. The case and control group have a rare category in exercise. Less category was majority in exercise duration of case and enough category was majority in control group. Bivariate analysis is using chi-square test with cell combining to 2x2 table, obtained p-value=0.097 in sort of exercise, p-value=1,000 in the frequency of exercise, and p-value=0,112 in duration of exercise, which means statistically unsignificant. There is no relation between exercise with the incidence of overweight-obesity of medical students of FK Unand batch 2013. For medical students suffers overweight-obesity is suggested for increase the frequency of exercise.Keywords: overweight-obesity, exercise, aerobic, anaerobic, frequency, duration
Procedia PDF Downloads 2626284 A Review on Medical Image Registration Techniques
Authors: Shadrack Mambo, Karim Djouani, Yskandar Hamam, Barend van Wyk, Patrick Siarry
Abstract:
This paper discusses the current trends in medical image registration techniques and addresses the need to provide a solid theoretical foundation for research endeavours. Methodological analysis and synthesis of quality literature was done, providing a platform for developing a good foundation for research study in this field which is crucial in understanding the existing levels of knowledge. Research on medical image registration techniques assists clinical and medical practitioners in diagnosis of tumours and lesion in anatomical organs, thereby enhancing fast and accurate curative treatment of patients. Literature review aims to provide a solid theoretical foundation for research endeavours in image registration techniques. Developing a solid foundation for a research study is possible through a methodological analysis and synthesis of existing contributions. Out of these considerations, the aim of this paper is to enhance the scientific community’s understanding of the current status of research in medical image registration techniques and also communicate to them, the contribution of this research in the field of image processing. The gaps identified in current techniques can be closed by use of artificial neural networks that form learning systems designed to minimise error function. The paper also suggests several areas of future research in the image registration.Keywords: image registration techniques, medical images, neural networks, optimisaztion, transformation
Procedia PDF Downloads 1786283 Indoor and Outdoor Forest Farming for Year-Round Food and Medicine Production, Carbon Sequestration, Soil-Building, and Climate Change Mitigation
Authors: Jerome Osentowski
Abstract:
The objective at Central Rocky Mountain Permaculture Institute has been to put in practice a sustainable way of life while growing food, medicine, and providing education. This has been done by applying methods of farming such as agroforestry, forest farming, and perennial polycultures. These methods have been found to be regenerative to the environment through carbon sequestration, soil-building, climate change mitigation, and the provision of food security. After 30 years of implementing carbon farming methods, the results are agro-diversity, self-sustaining systems, and a consistent provision of food and medicine. These results are exhibited through polyculture plantings in an outdoor forest garden spanning roughly an acre containing about 200 varieties of fruits, nuts, nitrogen-fixing trees, and medicinal herbs, and two indoor forest garden greenhouses (one Mediterranean and one Tropical) containing about 50 varieties of tropical fruits, beans, herbaceous plants and more. While the climate zone outside the greenhouse is 6, the tropical forest garden greenhouse retains an indoor climate zone of 11 with near-net-zero energy consumption through the use of a climate battery, allowing the greenhouse to serve as a year-round food producer. The effort to source food from the forest gardens is minimal compared to annual crop production. The findings at Central Rocky Mountain Permaculture Institute conclude that agroecological methods are not only beneficial but necessary in order to revive and regenerate the environment and food security.Keywords: agroecology, agroforestry, carbon farming, carbon sequestration, climate battery, food security, forest farming, forest garden, greenhouse, near-net-zero, perennial polycultures
Procedia PDF Downloads 4426282 Banking and Accounting Analysis Researches Effect on Environment
Authors: Marina Magdy Naguib Karas
Abstract:
New methods of providing banking services to the customer have been introduced, such as online banking. Banks have begun to consider electronic banking (e-banking) as a way to replace some traditional branch functions by using the Internet as a new distribution channel. Some consumers have at least one account at multiple banks and access these accounts through online banking. To check their current net worth, clients need to log into each of their accounts, get detailed information, and work toward consolidation. Not only is it time-consuming, but it is also a repeatable activity with a certain frequency. To solve this problem, the concept of account aggregation was added as a solution. Account consolidation in e-banking as a form of electronic banking appears to build a stronger relationship with customers. An account linking service is generally referred to as a service that allows customers to manage their bank accounts held at different institutions via a common online banking platform that places a high priority on security and data protection. The article provides an overview of the account aggregation approach in e-banking as a new service in the area of e-banking.Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise development
Procedia PDF Downloads 506281 Expert System: Debugging Using MD5 Process Firewall
Authors: C. U. Om Kumar, S. Kishore, A. Geetha
Abstract:
An Operating system (OS) is software that manages computer hardware and software resources by providing services to computer programs. One of the important user expectations of the operating system is to provide the practice of defending information from unauthorized access, disclosure, modification, inspection, recording or destruction. Operating system is always vulnerable to the attacks of malwares such as computer virus, worm, Trojan horse, backdoors, ransomware, spyware, adware, scareware and more. And so the anti-virus software were created for ensuring security against the prominent computer viruses by applying a dictionary based approach. The anti-virus programs are not always guaranteed to provide security against the new viruses proliferating every day. To clarify this issue and to secure the computer system, our proposed expert system concentrates on authorizing the processes as wanted and unwanted by the administrator for execution. The Expert system maintains a database which consists of hash code of the processes which are to be allowed. These hash codes are generated using MD5 message-digest algorithm which is a widely used cryptographic hash function. The administrator approves the wanted processes that are to be executed in the client in a Local Area Network by implementing Client-Server architecture and only the processes that match with the processes in the database table will be executed by which many malicious processes are restricted from infecting the operating system. The add-on advantage of this proposed Expert system is that it limits CPU usage and minimizes resource utilization. Thus data and information security is ensured by our system along with increased performance of the operating system.Keywords: virus, worm, Trojan horse, back doors, Ransomware, Spyware, Adware, Scareware, sticky software, process table, MD5, CPU usage and resource utilization
Procedia PDF Downloads 4276280 Assessment and Evaluation of Traffic Noise in Selected Government Healthcare Facilities at Birnin Kebbi, Kebbi State-Nigeria
Authors: Muhammad Naziru Yahaya, Buhari Samaila, Nasiru Abubakar
Abstract:
Noise pollution caused by vehicular movement in urban cities has reached alarming proportions due to continuous increases in vehicles and industrialization. Traffic noise causes deafness, annoyance, and other health challenges. According to World Health Organization recommends 60Db daytime sound levels and 40db night time sound levels in hospitals, schools, and other residential areas. Measurements of traffic noise were taken at six different locations of selected healthcare facilities at Birnin Kebbi (Sir Yahaya Memorial Hospital and Federal Medical Centre Birnin Kebbi). The data was collected in the vicinity of hospitals using the slow setting of the device and pointed at noise sources. An integrated multifunctional sound level GM1352, KK2821163 model, was used for measuring the emitted noise and temperatures. The data was measured and recorded at three different periods of the day 8 am – 12 pm, 3 pm – 6 pm, and 6 pm – 8:30 pm, respectively. The results show that a fair traffic flow producing an average sound level in the order of 38db – 64db was recorded at GOPDF, amenityF, and ante-natalF. Similarly, high traffic noise was observed at GOPDS, amenityS, and Fati-LamiS in the order of 52db – 78db unsatisfactory threshold for human hearing.Keywords: amenities, healthcare, noise, hospital, traffic
Procedia PDF Downloads 1176279 Nanofluidic Cell for Resolution Improvement of Liquid Transmission Electron Microscopy
Authors: Deybith Venegas-Rojas, Sercan Keskin, Svenja Riekeberg, Sana Azim, Stephanie Manz, R. J. Dwayne Miller, Hoc Khiem Trieu
Abstract:
Liquid Transmission Electron Microscopy (TEM) is a growing area with a broad range of applications from physics and chemistry to material engineering and biology, in which it is possible to image in-situ unseen phenomena. For this, a nanofluidic device is used to insert the nanoflow with the sample inside the microscope in order to keep the liquid encapsulated because of the high vacuum. In the last years, Si3N4 windows have been widely used because of its mechanical stability and low imaging contrast. Nevertheless, the pressure difference between the inside fluid and the outside vacuum in the TEM generates bulging in the windows. This increases the imaged fluid volume, which decreases the signal to noise ratio (SNR), limiting the achievable spatial resolution. With the proposed device, the membrane is fortified with a microstructure capable of stand higher pressure differences, and almost removing completely the bulging. A theoretical study is presented with Finite Element Method (FEM) simulations which provide a deep understanding of the membrane mechanical conditions and proves the effectiveness of this novel concept. Bulging and von Mises Stress were studied for different membrane dimensions, geometries, materials, and thicknesses. The microfabrication of the device was made with a thin wafer coated with thin layers of SiO2 and Si3N4. After the lithography process, these layers were etched (reactive ion etching and buffered oxide etch (BOE) respectively). After that, the microstructure was etched (deep reactive ion etching). Then the back side SiO2 was etched (BOE) and the array of free-standing micro-windows was obtained. Additionally, a Pyrex wafer was patterned with windows, and inlets/outlets, and bonded (anodic bonding) to the Si side to facilitate the thin wafer handling. Later, a thin spacer is sputtered and patterned with microchannels and trenches to guide the nanoflow with the samples. This approach reduces considerably the common bulging problem of the window, improving the SNR, contrast and spatial resolution, increasing substantially the mechanical stability of the windows, allowing a larger viewing area. These developments lead to a wider range of applications of liquid TEM, expanding the spectrum of possible experiments in the field.Keywords: liquid cell, liquid transmission electron microscopy, nanofluidics, nanofluidic cell, thin films
Procedia PDF Downloads 2556278 Food Insecurity Assessment, Consumption Pattern and Implications of Integrated Food Security Phase Classification: Evidence from Sudan
Authors: Ahmed A. A. Fadol, Guangji Tong, Wlaa Mohamed
Abstract:
This paper provides a comprehensive analysis of food insecurity in Sudan, focusing on consumption patterns and their implications, employing the Integrated Food Security Phase Classification (IPC) assessment framework. Years of conflict and economic instability have driven large segments of the population in Sudan into crisis levels of acute food insecurity according to the (IPC). A substantial number of people are estimated to currently face emergency conditions, with an additional sizeable portion categorized under less severe but still extreme hunger levels. In this study, we explore the multifaceted nature of food insecurity in Sudan, considering its historical, political, economic, and social dimensions. An analysis of consumption patterns and trends was conducted, taking into account cultural influences, dietary shifts, and demographic changes. Furthermore, we employ logistic regression and random forest analysis to identify significant independent variables influencing food security status in Sudan. Random forest clearly outperforms logistic regression in terms of area under curve (AUC), accuracy, precision and recall. Forward projections of the IPC for Sudan estimate that 15 million individuals are anticipated to face Crisis level (IPC Phase 3) or worse acute food insecurity conditions between October 2023 and February 2024. Of this, 60% are concentrated in Greater Darfur, Greater Kordofan, and Khartoum State, with Greater Darfur alone representing 29% of this total. These findings emphasize the urgent need for both short-term humanitarian aid and long-term strategies to address Sudan's deepening food insecurity crisis.Keywords: food insecurity, consumption patterns, logistic regression, random forest analysis
Procedia PDF Downloads 74