Search results for: medical device security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7848

Search results for: medical device security

6258 Deterministic Random Number Generator Algorithm for Cryptosystem Keys

Authors: Adi A. Maaita, Hamza A. A. Al Sewadi

Abstract:

One of the crucial parameters of digital cryptographic systems is the selection of the keys used and their distribution. The randomness of the keys has a strong impact on the system’s security strength being difficult to be predicted, guessed, reproduced or discovered by a cryptanalyst. Therefore, adequate key randomness generation is still sought for the benefit of stronger cryptosystems. This paper suggests an algorithm designed to generate and test pseudo random number sequences intended for cryptographic applications. This algorithm is based on mathematically manipulating a publically agreed upon information between sender and receiver over a public channel. This information is used as a seed for performing some mathematical functions in order to generate a sequence of pseudorandom numbers that will be used for encryption/decryption purposes. This manipulation involves permutations and substitutions that fulfills Shannon’s principle of “confusion and diffusion”. ASCII code characters wereutilized in the generation process instead of using bit strings initially, which adds more flexibility in testing different seed values. Finally, the obtained results would indicate sound difficulty of guessing keys by attackers.

Keywords: cryptosystems, information security agreement, key distribution, random numbers

Procedia PDF Downloads 268
6257 An Integrated Experimental and Numerical Approach to Develop an Electronic Instrument to Study Apple Bruise Damage

Authors: Paula Pascoal-Faria, Rúben Pereira, Elodie Pinto, Miguel Belbut, Ana Rosa, Inês Sousa, Nuno Alves

Abstract:

Apple bruise damage from harvesting, handling, transporting and sorting is considered to be the major source of reduced fruit quality, resulting in loss of profits for the entire fruit industry. The three factors which can physically cause fruit bruising are vibration, compression load and impact, the latter being the most common source of bruise damage. Therefore, prediction of the level of damage, stress distribution and deformation of the fruits under external force has become a very important challenge. In this study, experimental and numerical methods were used to better understand the impact caused when an apple is dropped from different heights onto a plastic surface and a conveyor belt. Results showed that the extent of fruit damage is significantly higher for plastic surface, being dependent on the height. In order to support the development of a biomimetic electronic device for the determination of fruit damage, the mechanical properties of the apple fruit were determined using mechanical tests. Preliminary results showed different values for the Young’s modulus according to the zone of the apple tested. Along with the mechanical characterization of the apple fruit, the development of the first two prototypes is discussed and the integration of the results obtained to construct the final element model of the apple is presented. This work will help to reduce significantly the bruise damage of fruits or vegetables during the entire processing which will allow the introduction of exportation destines and consequently an increase in the economic profits in this sector.

Keywords: apple, fruit damage, impact during crop and post-crop, mechanical characterization of the apple, numerical evaluation of fruit damage, electronic device

Procedia PDF Downloads 305
6256 Natural User Interface Adapter: Enabling Natural User Interface for Non-Natural User Interface Applications

Authors: Vijay Kumar Kolagani, Yingcai Xiao

Abstract:

Adaptation of Natural User Interface (NUI) has been slow and limited. NUI devices like Microsoft’s Kinect and Ultraleap’s Leap Motion can only interact with a handful applications that were specifically designed and implemented for them. A NUI device just can’t be used to directly control millions of applications that are not designed to take NUI input. This is in the similar situation like the adaptation of color TVs. At the early days of color TV, the broadcasting format was in RGB, which was not viewable by blackand-white TVs. TV broadcasters were reluctant to produce color programs due to limited viewership. TV viewers were reluctant to buy color TVs because there were limited programs to watch. Color TV’s breakthrough moment came after the adaptation of NTSC standard which allowed color broadcasts to be compatible with the millions of existing black-and-white TVs. This research presents a framework to use NUI devices to control existing non-NUI applications without reprogramming them. The methodology is to create an adapter to convert input from NUI devices into input compatible with that generated by CLI (Command Line Input) and GUI (Graphical User Interface) devices. The CLI/GUI compatible input is then sent to the active application through the operating system just like any input from a CLI/GUI device to control the non-NUI program that the user is controlling. A sample adapter has been created to convert input from Kinect to keyboard strokes, so one can use the input from Kinect to control any applications that take keyboard input, such as Microsoft’s PowerPoint. When the users use the adapter to control their PowerPoint presentations, they can free themselves from standing behind a computer to use its keyboard and can roam around in front of the audience to use hand gestures to control the PowerPoint. It is hopeful such adapters can accelerate the adaptation of NUI devices.

Keywords: command line input, graphical user interface, human computer interaction, natural user interface, NUI adapter

Procedia PDF Downloads 15
6255 The Application of a Neural Network in the Reworking of Accu-Chek to Wrist Bands to Monitor Blood Glucose in the Human Body

Authors: J. K Adedeji, O. H Olowomofe, C. O Alo, S.T Ijatuyi

Abstract:

The issue of high blood sugar level, the effects of which might end up as diabetes mellitus, is now becoming a rampant cardiovascular disorder in our community. In recent times, a lack of awareness among most people makes this disease a silent killer. The situation calls for urgency, hence the need to design a device that serves as a monitoring tool such as a wrist watch to give an alert of the danger a head of time to those living with high blood glucose, as well as to introduce a mechanism for checks and balances. The neural network architecture assumed 8-15-10 configuration with eight neurons at the input stage including a bias, 15 neurons at the hidden layer at the processing stage, and 10 neurons at the output stage indicating likely symptoms cases. The inputs are formed using the exclusive OR (XOR), with the expectation of getting an XOR output as the threshold value for diabetic symptom cases. The neural algorithm is coded in Java language with 1000 epoch runs to bring the errors into the barest minimum. The internal circuitry of the device comprises the compatible hardware requirement that matches the nature of each of the input neurons. The light emitting diodes (LED) of red, green, and yellow colors are used as the output for the neural network to show pattern recognition for severe cases, pre-hypertensive cases and normal without the traces of diabetes mellitus. The research concluded that neural network is an efficient Accu-Chek design tool for the proper monitoring of high glucose levels than the conventional methods of carrying out blood test.

Keywords: Accu-Check, diabetes, neural network, pattern recognition

Procedia PDF Downloads 147
6254 Detection and Quantification of Ochratoxin A in Food by Aptasensor

Authors: Moez Elsaadani, Noel Durand, Brice Sorli, Didier Montet

Abstract:

Governments and international instances are trying to improve the food safety system to prevent, reduce or avoid the increase of food borne diseases. This food risk is one of the major concerns for the humanity. The contamination by mycotoxins is a threat to the health and life of humans and animals. One of the most common mycotoxin contaminating feed and foodstuffs is Ochratoxin A (OTA), which is a secondary metabolite, produced by Aspergillus and Penicillium strains. OTA has a chronic toxic effect and proved to be mutagenic, nephrotoxic, teratogenic, immunosuppressive, and carcinogenic. On the other side, because of their high stability, specificity, affinity, and their easy chemical synthesis, aptamer based methods are applied to OTA biosensing as alternative to traditional analytical technique. In this work, five aptamers have been tested to confirm qualitatively and quantitatively their binding with OTA. In the same time, three different analytical methods were tested and compared based on their ability to detect and quantify the OTA. The best protocol that was established to quantify free OTA from linked OTA involved an ultrafiltration method in green coffee solution with. OTA was quantified by HPLC-FLD to calculate the binding percentage of all five aptamers. One aptamer (The most effective with 87% binding with OTA) has been selected to be our biorecognition element to study its electrical response (variation of electrical properties) in the presence of OTA in order to be able to make a pairing with a radio frequency identification (RFID). This device, which is characterized by its low cost, speed, and a simple wireless information transmission, will implement the knowledge on the mycotoxins molecular sensors (aptamers), an electronic device that will link the information, the quantification and make it available to operators.

Keywords: aptamer, aptasensor, detection, Ochratoxin A

Procedia PDF Downloads 181
6253 Performance Evaluation of a Fuel Cell Membrane Electrode Assembly Prepared from a Reinforced Proton Exchange Membrane

Authors: Yingjeng James Li, Yun Jyun Ou, Chih Chi Hsu, Chiao-Chih Hu

Abstract:

A fuel cell is a device that produces electric power by reacting fuel and oxidant electrochemically. There is no pollution produced from a fuel cell if hydrogen is employed as the fuel. Therefore, a fuel cell is considered as a zero emission device and is a source of green power. A membrane electrode assembly (MEA) is the key component of a fuel cell. It is, therefore, beneficial to develop MEAs with high performance. In this study, an MEA for proton exchange membrane fuel cell (PEMFC) was prepared from a 15-micron thick reinforced PEM. The active area of such MEA is 25 cm2. Carbon supported platinum (Pt/C) was employed as the catalyst for both anode and cathode. The platinum loading is 0.6 mg/cm2 based on the sum of anode and cathode. Commercially available carbon papers coated with a micro porous layer (MPL) serve as gas diffusion layers (GDLs). The original thickness of the GDL is 250 μm. It was compressed down to 163 μm when assembled into the single cell test fixture. Polarization curves were taken by using eight different test conditions. At our standard test condition (cell: 70 °C; anode: pure hydrogen, 100%RH, 1.2 stoic, ambient pressure; cathode: air, 100%RH, 3.0 stoic, ambient pressure), the cell current density is 1250 mA/cm2 at 0.6 V, and 2400 mA/cm2 at 0.4 V. At self-humidified condition and cell temperature of 55 °C, the cell current density is 1050 mA/cm2 at 0.6 V, and 2250 mA/cm2 at 0.4 V. Hydrogen crossover rate of the MEA is 0.0108 mL/min*cm2 according to linear sweep voltammetry experiments. According to the MEA’s Pt loading and the cyclic voltammetry experiments, the Pt electrochemical surface area is 60 m2/g. The ohmic part of the impedance spectroscopy results shows that the membrane resistance is about 60 mΩ*cm2 when the MEA is operated at 0.6 V.

Keywords: fuel cell, membrane electrode assembly, proton exchange membrane, reinforced

Procedia PDF Downloads 294
6252 Fabrication of 2D Nanostructured Hybrid Material-Based Devices for High-Performance Supercapacitor Energy Storage

Authors: Sunil Kumar, Vinay Kumar, Mamta Bulla, Rita Dahiya

Abstract:

Supercapacitors have emerged as a leading energy storage technology, gaining popularity in applications like digital telecommunications, memory backup, and hybrid electric vehicles. Their appeal lies in a long cycle life, high power density, and rapid recharge capabilities. These exceptional traits attract researchers aiming to develop advanced, cost-effective, and high-energy-density electrode materials for next-generation energy storage solutions. Two-dimensional (2D) nanostructures are highly attractive for fabricating nanodevices due to their high surface-to-volume ratio and good compatibility with device design. In the current study, a composite was synthesized by combining MoS2 with reduced graphene oxide (rGO) under optimal conditions and characterized using various techniques, including XRD, FTIR, SEM and XPS. The electrochemical properties of the composite material were assessed through cyclic voltammetry, galvanostatic charging-discharging and electrochemical impedance spectroscopy. The supercapacitor device demonstrated a specific capacitance of 153 F g-1 at a current density of 1 Ag-1, achieving an excellent energy density of 30.5 Wh kg-1 and a power density of 600 W kg-1. Additionally, it maintained excellent cyclic stability over 5000 cycles, establishing it as a promising candidate for efficient and durable energy storage solutions. These findings highlight the dynamic relationship between electrode materials and offer valuable insights for the development and enhancement of high-performance symmetric devices.

Keywords: 2D material, energy density, galvanostatic charge-discharge, hydrothermal reactor, specific capacitance

Procedia PDF Downloads 15
6251 Exploration of RFID in Healthcare: A Data Mining Approach

Authors: Shilpa Balan

Abstract:

Radio Frequency Identification, also popularly known as RFID is used to automatically identify and track tags attached to items. This study focuses on the application of RFID in healthcare. The adoption of RFID in healthcare is a crucial technology to patient safety and inventory management. Data from RFID tags are used to identify the locations of patients and inventory in real time. Medical errors are thought to be a prominent cause of loss of life and injury. The major advantage of RFID application in healthcare industry is the reduction of medical errors. The healthcare industry has generated huge amounts of data. By discovering patterns and trends within the data, big data analytics can help improve patient care and lower healthcare costs. The number of increasing research publications leading to innovations in RFID applications shows the importance of this technology. This study explores the current state of research of RFID in healthcare using a text mining approach. No study has been performed yet on examining the current state of RFID research in healthcare using a data mining approach. In this study, related articles were collected on RFID from healthcare journal and news articles. Articles collected were from the year 2000 to 2015. Significant keywords on the topic of focus are identified and analyzed using open source data analytics software such as Rapid Miner. These analytical tools help extract pertinent information from massive volumes of data. It is seen that the main benefits of adopting RFID technology in healthcare include tracking medicines and equipment, upholding patient safety, and security improvement. The real-time tracking features of RFID allows for enhanced supply chain management. By productively using big data, healthcare organizations can gain significant benefits. Big data analytics in healthcare enables improved decisions by extracting insights from large volumes of data.

Keywords: RFID, data mining, data analysis, healthcare

Procedia PDF Downloads 234
6250 Indicators to Assess the Quality of Health Services

Authors: Muyatdinova Aigul, Aitkaliyeva Madina

Abstract:

The article deals with the evaluation of the quality of medical services on the basis of quality indicators. For this purpose allocated initially the features of the medical services market. The Features of the market directly affect on the evaluation process that takes a multi-level and multi-stakeholder nature. Unlike ordinary goods market assessment of medical services does not only market. Such an assessment is complemented by continuous internal and external evaluation, including experts and accrediting bodies. In the article highlighted the composition of indicators for a comprehensive evaluation

Keywords: health care market, quality of health services, indicators of care quality

Procedia PDF Downloads 437
6249 Wireless Transmission of Big Data Using Novel Secure Algorithm

Authors: K. Thiagarajan, K. Saranya, A. Veeraiah, B. Sudha

Abstract:

This paper presents a novel algorithm for secure, reliable and flexible transmission of big data in two hop wireless networks using cooperative jamming scheme. Two hop wireless networks consist of source, relay and destination nodes. Big data has to transmit from source to relay and from relay to destination by deploying security in physical layer. Cooperative jamming scheme determines transmission of big data in more secure manner by protecting it from eavesdroppers and malicious nodes of unknown location. The novel algorithm that ensures secure and energy balance transmission of big data, includes selection of data transmitting region, segmenting the selected region, determining probability ratio for each node (capture node, non-capture and eavesdropper node) in every segment, evaluating the probability using binary based evaluation. If it is secure transmission resume with the two- hop transmission of big data, otherwise prevent the attackers by cooperative jamming scheme and transmit the data in two-hop transmission.

Keywords: big data, two-hop transmission, physical layer wireless security, cooperative jamming, energy balance

Procedia PDF Downloads 490
6248 Adhesion of Staphylococcus epidermidis and Staphylococcus aureus to Intravascular cannulae

Authors: Ghadah Abusalim, Suliman Alharbi, Hesham Khalil, Milton Wainwright, Mohammad A. Khiyami

Abstract:

The use of implantable foreign devices in medicine has recently increased dramatically. Intravascular cannulae and catheters are used to administer fluids, medications, parenteral nutrition, and blood products in order to monitor hemodynamic status and also to provide hemodialysis. The early and late failure of inserted or implanted devices is largely the result of bacterial infection and may lead to the disruption of integration between the device and the tissues which surround it. Staphylococcus aureus and Staphylococcus epidermidis are widely considered to be the most common organisms causing device-related infection. Our study showed that S. aureus and S. epidermidis adhered to intravascular cannulae made up of PTFE, SPTFE and vialon. Adhesion of S. epidermidis and S. aureus to intravascular cannulae varied significantly depending upon the type of material used and the presence of coating materials. Both bacteria adhered less to PTFE followed by Vialon and SPTFE and the adhesion capacity of S. aureus and S. epidermidis increased over time. Coating intravascular cannulae with human serum albumin inhibited the adhesion of S. aureus and S. epidermidis to these cannulae, and pretreatment of cannulae with fibronectin inhibited the adhesion of S. epidermidis but increased the adhesion of S. aureus to all types of cannulae. Pretreatment of cannulae surface with potassium chloride or calcium chloride increased the adhesion of S. aureus and S. epidermidis to cannulae, suggesting a role for electrostatic forces in the mechanism of such adhesion. This study will hopefully clarify the mechanism of adhesion and provide possible means of preventing such adhesion either by the use of better material coatings or by interfering with the process of adhesion by targeting bacterial structures responsible for it. Currently we recommend the use of PTFE cannulae as they exhibit a lower bacterial adhesion capacity compared to the other tested cannulae.

Keywords: Staphylococcus epidermidis, Staphylococcus aureus, adhesion, cannulae, PTFE, Vialon

Procedia PDF Downloads 349
6247 Member States 'Perception of Threat' to Migration Crises as a Determinant Factor of Change in Cooperation: A Comparison between the Yugoslav Migration Crisis and the Syrian Refugees' Crisis

Authors: Diego Caballero Vélez

Abstract:

In 1997 the Schengen Convention was incorporated in the mainstream of EU law by the Amsterdam Treaty. It came into effect in 1999 with the abolition of internal border controls in the EU, a milestone in the European integration project. In the meantime, due to the Yugoslav wars, nearly 700,000 asylum applications were filed in the European countries provoking a major refugee crisis. During this period, the opening of Eastern Europe fostered more cooperation and policy-making at the EU level in migration issues. Currently, a similar migratory crisis is taking place in Europe. The Syrian war has caused the most massive influx of immigrants in Europe since World War II. Nevertheless, the EU is adopting different migration policies from those implemented during the Yugoslav migration crisis. The current crisis has not led to a common European position but national responses have been offered on migration policies and responsibility for border security and asylum-seekers. A lot of factors can explain this change from a cooperation scenario to a no cooperation one, such as the economic crisis, but this research is focused on the premise that 'threat perception' lies at the core of some states grand strategies towards migration and it also influences in multilateral or unilateral responses. Migration rests at the nexus of three dimensions of security, including geopolitical interests, material production, and internal security. According to some scholars, migration policy is an 'integral instrument' of state grand strategy in that context. Political integration at the EU might be altered with the emergence of existential threats. In other words, some areas of the European cooperation can be transformed when a 'critical juncture' occurs, for instance a migration crisis. In that instance, Member states could see migration as a matter of threat that modifies their national interests and willingness to embrace international cooperation. This research will focus on EU Member states´ perceptions of the 90´s migration crisis and the current one. The goal is to evaluate to what extent the perceptions of threat are one of the main factors for explaining the transition from a cooperation scenario to a no-cooperation one in European asylum and security policies. To analyze threat perception in both migration crisis, some relevant Member states are treated as cases of study and a comparative analysis is carried out based on public opinion polls, public and policy discourse in migration, voting practices and deconstruction of the migration policies themselves both at EU level and a national one.

Keywords: cooperation, migration crisis, national responses, threat perception

Procedia PDF Downloads 239
6246 Research Progress on Patient Perception Assessment Tools for Patient Safety

Authors: Yirui Wang

Abstract:

In the past few decades, patient safety has been the focus of much attention in the global medical and health field. As medical standards continue to improve and develop, the demand for patient safety is also growing. As one of the important dimensions in assessing patient safety, the Patient Perception Patient Safety Assessment Tool provides unique and valuable information from the patient's own perspective and plays an important role in promoting patient safety. This article aims to summarize and analyze the assessment content, assessment methods and applications of currently commonly used patient-perceived patient safety assessment tools at home and abroad, with a view to providing a reference for medical staff to select appropriate patient-perceived patient safety assessment tools.

Keywords: patients, patient safety, perception, assessment tools, review

Procedia PDF Downloads 88
6245 Effect of Nutrition and Rehabilitation Programs in Treating High Blood Cholesterol For Ages (30-40) Years

Authors: Luma Hameed Abd, Ammar Hamza Hadi, Amjed Abid Ali Mahdi

Abstract:

Context: The study focused on treating high blood cholesterol in individuals aged 30-40 years using rehabilitation and nutrition programs compared to medical drugs. Research aim: To compare the effectiveness of exercise rehabilitation and nutrition programs with medical drugs in reducing high blood cholesterol levels. Methodology: An experimental method with equal groups was utilized, involving 160 patients from Najaf Hospital. SPSS was used for data analysis. Findings: The study showed that both the exercise and nutrition program, as well as medical drugs, contributed to lowering cholesterol levels, with the first group showing better results. Theoretical importance: The research highlights the significance of a holistic approach combining exercise, nutrition, and medical treatment in managing high cholesterol. Data collection: Blood cholesterol tests were conducted before and after the programs to assess improvements. Analysis procedures: Statistical methods such as arithmetic mean, standard deviation, Torsion coefficient, and T-test for correlated samples were employed to analyze the results. Questions addressed: The study addressed the effectiveness of rehabilitation and nutrition programs compared to medical drugs in treating high blood cholesterol. Conclusion: The research concluded that the combination of exercise rehabilitation and nutrition programs was more effective in reducing blood cholesterol levels compared to medical drugs.

Keywords: nutrition, rehabilitation, programs, high blood cholesterol

Procedia PDF Downloads 20
6244 Israeli Households Caring for Children and Adults with Intellectual and Developmental Disabilities: An Explorative Study

Authors: Ayelet Gur

Abstract:

Background: In recent years we are witnessing a welcome trend in which more children/persons with disabilities are living at home with their families and within their communities. This trend is related to various policy innovations as the UN Convention on the Rights of People with Disabilities that reflect a shift from the medical-institutional model to a human rights approach. We also witness the emergence of family centered approaches that perceive the family and not just the individual with the disability as a worthy target of policy planning, implementation and evaluation efforts. The current investigation aims to explore economic, psychological and social factors among households of families of children or adults with intellectual disabilities in Israel and to present policy recommendation. Methods: A national sample of 301 households was recruited through the education and employment settings of persons with intellectual disability. The main caregiver of the person with the disability (a parent) was interviewed. Measurements included the income and expense surveys; assets and debts questionnaire; the questionnaire on resources and stress; the social involvement questionnaire and Personal Wellbeing Index. Results: Findings indicate significant gaps in financial circumstances between households of families of children with intellectual disabilities and households of the general Israeli society. Households of families of children with intellectual disabilities report lower income and higher expenditures and loans than the general society. They experience difficulties in saving and coping with unexpected expenses. Caregivers (the parents) experience high stress, low social participation, low financial support from family, friend and non-governmental organizations and decreased well-being. They are highly dependent on social security allowances which constituted 40% of the household's income. Conclusions: Households' dependency on social security allowances may seem contradictory to the encouragement of persons with intellectual disabilities to favor independent living in light of the human rights approach to disability. New policy should aim at reducing caregivers' stress and enhance their social participation and support, with special emphasis on families of lower socio-economic status. Finally, there is a need to continue monitoring the economic and psycho-social needs of households of families of children with intellectual disabilities and other developmental disabilities.

Keywords: disability policy, family policy, intellectual and developmental disabilities, Israel, households study, parents of children with disabilities

Procedia PDF Downloads 155
6243 Comparison of Medical Students Evaluation by Serious Games and Clinical Case-Multiple Choice Questions

Authors: Chamtouri I., Kechida M.

Abstract:

Background: Evaluation has a prominent role in medical education and graduation. This evaluation has usually done in face-to-face, by written or oral questions. Simulation is increasingly taking a part as a method of evaluation. Due to the Covid-19 pandemic, which disrupted face-to-face evaluation, simulation using serious games (SG) is emerging in the field of training and assessment of medical students. The aim of our study is to compare the results of the evaluation of medical students by virtual simulation by online serious games versus clinical case-multiple choice questions (MCQ) and to assess the degree of satisfaction from these two evaluation methods. Methods: Medical students from the same study level were voluntarily participated in this study. Groupe 1 had an evaluation by SG dealing with “diagnosis and management of ST-segment elevationmyocardialinfarction (STEMI)alreadyprepared on the website www.Mediactiv.com. Groupe 2 were evaluated by clinical case-MCQ having thes same topic as SG. Results of the two groups were compared. Satisfaction questionnaire was filled by the two groups. Satisfaction degree was compared between the two groups. Results. In this study, 64 medical students (G1:31 and G2: 33) were enrolled. Obtaining complete notes in the "questioning" and "clinical examination" parts is significantly more important in-group 1 compared to group 2. No significant difference detected between the two groups in terms of “ECG interpretation” and “diagnosis of STEMI” parts. A greater number of students of group 1 obtained the full note compared to group 2 in “the initial treatment part” (54.8% vs. 39.4%; p = 0.04). Thirty learners (96.8%) in-group 1 obtained a total score ≥ 50% versus 69.7% in-group 2 (p = 0.004). The full score of 100% was obtained in three learners in-group1, while no student scored 100% in-group2 (p = 0.027). Medical evaluation using SG was reported as more innovative, fun, and realistic compared to evaluation by clinical case-MCQ. No significant difference detected between the two methods in terms of stress. Conclusion: Simulation by SG can be considered as an innovative and effective method in evaluating medical students with a higher degree of satisfaction.

Keywords: evaluation, serious games, medical students, satisfaction

Procedia PDF Downloads 142
6242 The Need to Teach the Health Effects of Climate Change in Medical Schools

Authors: Ábrám Zoltán

Abstract:

Introduction: Climate change is now a major health risk, and its environmental and health effects have become frequently discussed topics. The consequences of climate change are clearly visible in natural disasters and excess deaths caused by extreme weather conditions. Global warming and the increasingly frequent extreme weather events have direct, immediate effects or long-term, indirect effects on health. For this reason, it is a need to teach the health effects of climate change in medical schools. Material and methods: We looked for various surveys, studies, and reports on the main pathways through which global warming affects health. Medical schools face the challenge of teaching the health implications of climate change and integrating knowledge about the health effects of climate change into medical training. For this purpose, there were organised World Café workshops for three target groups: medical students, academic staff, and practising medical doctors. Results: Among the goals of the research is the development of a detailed curriculum for medical students, which serves to expand their knowledge in basic education. At the same time, the project promotes the increase of teacher motivation and the development of methodological guidelines for university teachers; it also provides further training for practicing doctors. The planned teaching materials will be developed in a format suitable for traditional face-to-face teaching, as well as e-learning teaching materials. CLIMATEMED is a project based on the cooperation of six universities and institutions from four countries, the aim of which is to improve the curriculum and expand knowledge about the health effects of climate change at medical universities. Conclusions: In order to assess the needs, summarize the proposals, to develop the necessary strategy, World Café type, one-and-a-half to two-hour round table discussions will take place separately for medical students, academic staff, and practicing doctors. The CLIMATEMED project can facilitate the integration of knowledge about the health effects of climate change into curricula and can promote practical use. The avoidance of the unwanted effects of global warming and climate change is not only a public matter, but it is also a challenge to change our own lifestyle. It is the responsibility of all of us to protect the Earth's ecosystem and the physical and mental health of ourselves and future generations.

Keywords: climate change, health effects, medical schools, World Café, medical students

Procedia PDF Downloads 83
6241 Face Recognition Using Eigen Faces Algorithm

Authors: Shweta Pinjarkar, Shrutika Yawale, Mayuri Patil, Reshma Adagale

Abstract:

Face recognition is the technique which can be applied to the wide variety of problems like image and film processing, human computer interaction, criminal identification etc. This has motivated researchers to develop computational models to identify the faces, which are easy and simple to implement. In this, demonstrates the face recognition system in android device using eigenface. The system can be used as the base for the development of the recognition of human identity. Test images and training images are taken directly with the camera in android device.The test results showed that the system produces high accuracy. The goal is to implement model for particular face and distinguish it with large number of stored faces. face recognition system detects the faces in picture taken by web camera or digital camera and these images then checked with training images dataset based on descriptive features. Further this algorithm can be extended to recognize the facial expressions of a person.recognition could be carried out under widely varying conditions like frontal view,scaled frontal view subjects with spectacles. The algorithm models the real time varying lightning conditions. The implemented system is able to perform real-time face detection, face recognition and can give feedback giving a window with the subject's info from database and sending an e-mail notification to interested institutions using android application. Face recognition is the technique which can be applied to the wide variety of problems like image and film processing, human computer interaction, criminal identification etc. This has motivated researchers to develop computational models to identify the faces, which are easy and simple to implement. In this , demonstrates the face recognition system in android device using eigenface. The system can be used as the base for the development of the recognition of human identity. Test images and training images are taken directly with the camera in android device.The test results showed that the system produces high accuracy. The goal is to implement model for particular face and distinguish it with large number of stored faces. face recognition system detects the faces in picture taken by web camera or digital camera and these images then checked with training images dataset based on descriptive features. Further this algorithm can be extended to recognize the facial expressions of a person.recognition could be carried out under widely varying conditions like frontal view,scaled frontal view subjects with spectacles. The algorithm models the real time varying lightning conditions. The implemented system is able to perform real-time face detection, face recognition and can give feedback giving a window with the subject's info from database and sending an e-mail notification to interested institutions using android application.

Keywords: face detection, face recognition, eigen faces, algorithm

Procedia PDF Downloads 361
6240 Blind Watermarking Using Discrete Wavelet Transform Algorithm with Patchwork

Authors: Toni Maristela C. Estabillo, Michaela V. Matienzo, Mikaela L. Sabangan, Rosette M. Tienzo, Justine L. Bahinting

Abstract:

This study is about blind watermarking on images with different categories and properties using two algorithms namely, Discrete Wavelet Transform and Patchwork Algorithm. A program is created to perform watermark embedding, extraction and evaluation. The evaluation is based on three watermarking criteria namely: image quality degradation, perceptual transparency and security. Image quality is measured by comparing the original properties with the processed one. Perceptual transparency is measured by a visual inspection on a survey. Security is measured by implementing geometrical and non-geometrical attacks through a pass or fail testing. Values used to measure the following criteria are mostly based on Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The results are based on statistical methods used to interpret and collect data such as averaging, z Test and survey. The study concluded that the combined DWT and Patchwork algorithms were less efficient and less capable of watermarking than DWT algorithm only.

Keywords: blind watermarking, discrete wavelet transform algorithm, patchwork algorithm, digital watermark

Procedia PDF Downloads 268
6239 Secure Text Steganography for Microsoft Word Document

Authors: Khan Farhan Rafat, M. Junaid Hussain

Abstract:

Seamless modification of an entity for the purpose of hiding a message of significance inside its substance in a manner that the embedding remains oblivious to an observer is known as steganography. Together with today's pervasive registering frameworks, steganography has developed into a science that offers an assortment of strategies for stealth correspondence over the globe that must, however, need a critical appraisal from security breach standpoint. Microsoft Word is amongst the preferably used word processing software, which comes as a part of the Microsoft Office suite. With a user-friendly graphical interface, the richness of text editing, and formatting topographies, the documents produced through this software are also most suitable for stealth communication. This research aimed not only to epitomize the fundamental concepts of steganography but also to expound on the utilization of Microsoft Word document as a carrier for furtive message exchange. The exertion is to examine contemporary message hiding schemes from security aspect so as to present the explorative discoveries and suggest enhancements which may serve a wellspring of information to encourage such futuristic research endeavors.

Keywords: hiding information in plain sight, stealth communication, oblivious information exchange, conceal, steganography

Procedia PDF Downloads 241
6238 Ilizarov's External Fixator. A Bone Regeneration Method Little Used in Africa. Our Experience of 20 Years in Cameroon.

Authors: Ibrahima Farikou, Kolontchang Gatchou Alberic Lionel, Tsiagadgui Jean Gustave, Ngo Yamben Marie-Ange, Handy Eone Daniel

Abstract:

Introduction: It was in 1956 that Ilizarov pioneered the concept of osteogenesis in distraction by the device that bears his name to help produce bone and soft tissue regeneration and bone consolidation. This technique is not widely used in Africa where, however, its applications are numerous (loss of bone substances, congenital or acquired malformations). Our goal is to bring the indications of Ilizarov's device back to our practice conditions. Methods: Our study was conducted in 2 hospitals over a period of 20 years. For the retrospective phase, this study included all complete usable records of patients operated on in the Ilizarov external fixator department, and for the prospective phase, all patients operated on in the departments with complete usable records. Our sample was consecutive and not exhaustive. Data were analyzed by SPSS software version 23.0. Results: A total of 52 patients were reviewed. The average age of our patients was 14.7 years. The sex ratio was 1.6 in favor of men. The lower limb was the most affected (49), with a predominance of the tibia (62.4%). The average elongation was 6.4 cm. Traumatic acquired pathologies (delayed union, malunion) represented 60.6%. The mean time to union was seven months. Correction of the limb length discrepancy or filling of loss of bone substance was obtained in 75% of cases. Functionally, 80.8% of the patients treated had regained autonomy at the end of treatment, but in 17.3% of the patients, pain and limping persisted. Conclusion: This technique should be popularized in Africa because the benefit that would accrue to patients is invaluable and would be an attractive alternative to many amputations sometimes carried out in Africa by despair.

Keywords: ilizarov, external fixator, limb lengthening, bone regeneration, africa

Procedia PDF Downloads 101
6237 A Model to Assist Military Mission Planners in Identifying and Assessing Variables Impacting Food Security

Authors: Lynndee Kemmet

Abstract:

The U.S. military plays an increasing role in supporting political stability efforts, and this includes efforts to prevent the food insecurity that can trigger political and social instability. This paper presents a model that assists military commanders in identifying variables that impact food production and distribution in their areas of operation (AO), in identifying connections between variables and in assessing the impacts of those variables on food production and distribution. Through use of the model, military units can better target their data collection efforts and can categorize and analyze data within the data categorization framework most widely-used by military forces—PMESII-PT (Political, Military, Economic, Infrastructure, Information, Physical Environment and Time). The model provides flexibility of analysis in that commanders can target analysis to be highly focused on a specific PMESII-PT domain or variable or conduct analysis across multiple PMESII-PT domains. The model is also designed to assist commanders in mapping food systems in their AOs and then identifying components of those systems that must be strengthened or protected.

Keywords: food security, food system model, political stability, US Military

Procedia PDF Downloads 196
6236 Evaluating the Teaching and Learning Value of Tablets

Authors: Willem J. A. Louw

Abstract:

The wave of new advanced computing technology that has been developed during the recent past has significantly changed the way we communicate, collaborate and collect information. It has created a new technology environment and paradigm in which our children and students grow-up and this impacts on their learning. Research confirmed that Generation Y students have a preference for learning in the new technology environment. The challenge or question is: How do we adjust our teaching and learning to make the most of these changes. The complexity of effective and efficient teaching and learning must not be underestimated and changes must be preceded by proper objective research to prevent any haphazard developments that could do more harm than benefit. A blended learning approach has been used in the Forestry department for a few numbers of years including the use of electronic-peer assisted learning (e-pal) in a fixed-computer set-up within a learning management system environment. It was decided to extend the investigation and do some exploratory research by using a range of different Tablet devices. For this purpose, learning activities or assignments were designed to cover aspects of communication, collaboration and collection of information. The Moodle learning management system was used to present normal module information, to communicate with students and for feedback and data collection. Student feedback was collected by using an online questionnaire and informal discussions. The research project was implemented in 2013, 2014 and 2015 amongst first and third-year students doing a forestry three-year technical tertiary qualification in commercial plantation management. In general, more than 80% of the students alluded to that the device was very useful in their learning environment while the rest indicated that the devices were not very useful. More than ninety percent of the students acknowledged that they would like to continue using the devices for all of their modules whilst the rest alluded to functioning efficiently without the devices. Results indicated that information collection (access to resources) was rated the highest advantageous factor followed by communication and collaboration. The main general advantages of using Tablets were listed by the students as being mobility (portability), 24/7 access to learning material and information of any kind on a user friendly device in a Wi-Fi environment, fast computing process speeds, saving time, effort and airtime through skyping and e-mail, and use of various applications. Ownership of the device is a critical factor while the risk was identified as a major potential constraint. Significant differences were reported between the different types and quality of Tablets. The preferred types are those with a bigger screen and the ones with overall better functionality and quality features. Tablets significantly increase the collaboration, communication and information collection needs of the students. It does, however, not replace the need of a computer/laptop because of limited storage and computation capacity, small screen size and inefficient typing.

Keywords: tablets, teaching, blended learning, tablet quality

Procedia PDF Downloads 248
6235 Proof of Concept Design and Development of a Computer-Aided Medical Evaluation of Symptoms Web App: An Expert System for Medical Diagnosis in General Practice

Authors: Ananda Perera

Abstract:

Computer-Assisted Medical Evaluation of Symptoms (CAMEOS) is a medical expert system designed to help General Practices (GPs) make an accurate diagnosis. CAMEOS comprises a knowledge base, user input, inference engine, reasoning module, and output statement. The knowledge base was developed by the author. User input is an Html file. The physician user collects data in the consultation. Data is sent to the inference engine at servers. CAMEOS uses set theory to simulate diagnostic reasoning. The program output is a list of differential diagnoses, the most probable diagnosis, and the diagnostic reasoning.

Keywords: CDSS, computerized decision support systems, expert systems, general practice, diagnosis, diagnostic systems, primary care diagnostic system, artificial intelligence in medicine

Procedia PDF Downloads 155
6234 Determining the Effect of Tdcs in Pain and Quality of Life in Patients with Fibromyalgia

Authors: Farid Rezaei, Zahra Reza Soltani, Behrouz Tavana, Afsaneh Dadarkhah, Masoume Bahrami Asl, S. Alireza Mirghasemi

Abstract:

Introduction: Fibromyalgia is a syndrome comprised of a group of symptoms. The primary symptom of fibromyalgia is pain propagation is associated by Secondary symptoms include fatigue, cognitive disorders, sleep disorders and hypersensitivity to painful stimuli. Recent studies have shown that there is a direct relationship between fibromyalgia and certain changes in brain activity. Aim: The aim of this study is determining the effect of tDCS in pain and quality of life in patients with fibromyalgia. Method: 68 patients with fibromyalgia who had inclusion criterias were randomly divided into two groups of case and control. Groups were matched in terms of gender, age, education, duration of pain and PMS. Patient groups treated with tDCS device manufacture by Enraf company made in Netherlands (M1 anodal stimulation, 2 mA constant current, 20 minutes, for 10 sessions (3 days a week)). Also the protocol was done for control group, in sham mode of tDCS device that had no current, for 10 sessions of 20 minutes. Before treatment, immediately after the end of 10 sessions treatment (short-term) and 10 week later (long-term effect), pain intensity questionnaires (VAS) and quality of life in fibromyalgia patients questionnaire was completed by the patient. Results: Pain intensity were significantly lower in the treatment group than the sham group 2 weeks and 10 weeks after treatment than before treatment (P < 0.001). Although the quality of life of patients 2 weeks after treatment showed no significant change, but ten weeks after treatment were more than sham group (P < 0.0001). Conclusion: Our results suggest that tDCS is a safe and effective in treating fibromyalgia patients and an important effect in reducing pain and increasing quality of their life.

Keywords: fibromyalgia, tDCS, quality of life, VAS score

Procedia PDF Downloads 341
6233 Multisignature Schemes for Reinforcing Trust in Cloud Software-As-A-Service Services

Authors: Mustapha Hedabou, Ali Azougaghe, Ahmed Bentajer, Hicham Boukhris, Mourad Eddiwani, Zakaria Igarramen

Abstract:

Software-as-a-service (SaaS) is emerging as a dominant approach to delivering software. It encompasses a range of business, technical opportunities, issue, and challenges. Trustiness in the cloud services regarding the security and the privacy of the delivered data is the most critical issue with the SaaS model. In this paper, we survey the security concerns related to the SaaS model, and we propose the design of a trusted SaaS model that gives users more confidence into SaaS services by leveraging a trust in a neutral source code certifying authority. The proposed design is based on the use of the multisignature mechanism for signing the source code of the application service. In our model, the cloud provider acts as a root of trust by ensuring the integrity of the application service when it was running on its platform. The proposed design prevents insider attacks from tampering with application service before and after it was launched in a cloud provider platform.

Keywords: cloud computing, SaaS Platform, TPM, trustiness, code source certification, multi-signature schemes

Procedia PDF Downloads 275
6232 The Underground Ecosystem of Credit Card Frauds

Authors: Abhinav Singh

Abstract:

Point Of Sale (POS) malwares have been stealing the limelight this year. They have been the elemental factor in some of the biggest breaches uncovered in past couple of years. Some of them include • Target: A Retail Giant reported close to 40 million credit card data being stolen • Home Depot : A home product Retailer reported breach of close to 50 million credit records • Kmart: A US retailer recently announced breach of 800 thousand credit card details. Alone in 2014, there have been reports of over 15 major breaches of payment systems around the globe. Memory scrapping malwares infecting the point of sale devices have been the lethal weapon used in these attacks. These malwares are capable of reading the payment information from the payment device memory before they are being encrypted. Later on these malwares send the stolen details to its parent server. These malwares are capable of recording all the critical payment information like the card number, security number, owner etc. All these information are delivered in raw format. This Talk will cover the aspects of what happens after these details have been sent to the malware authors. The entire ecosystem of credit card frauds can be broadly classified into these three steps: • Purchase of raw details and dumps • Converting them to plastic cash/cards • Shop! Shop! Shop! The focus of this talk will be on the above mentioned points and how they form an organized network of cyber-crime. The first step involves buying and selling of the stolen details. The key point to emphasize are : • How is this raw information been sold in the underground market • The buyer and seller anatomy • Building your shopping cart and preferences • The importance of reputation and vouches • Customer support and replace/refunds These are some of the key points that will be discussed. But the story doesn’t end here. As of now the buyer only has the raw card information. How will this raw information be converted to plastic cash? Now comes in picture the second part of this underground economy where-in these raw details are converted into actual cards. There are well organized services running underground that can help you in converting these details into plastic cards. We will discuss about this technique in detail. At last, the final step involves shopping with the stolen cards. The cards generated with the stolen details can be easily used to swipe-and-pay for purchased goods at different retail shops. Usually these purchases are of expensive items that have good resale value. Apart from using the cards at stores, there are underground services that lets you deliver online orders to their dummy addresses. Once the package is received it will be delivered to the original buyer. These services charge based on the value of item that is being delivered. The overall underground ecosystem of credit card fraud works in a bulletproof way and it involves people working in close groups and making heavy profits. This is a brief summary of what I plan to present at the talk. I have done an extensive research and have collected good deal of material to present as samples. Some of them include: • List of underground forums • Credit card dumps • IRC chats among these groups • Personal chat with big card sellers • Inside view of these forum owners. The talk will be concluded by throwing light on how these breaches are being tracked during investigation. How are credit card breaches tracked down and what steps can financial institutions can build an incidence response over it.

Keywords: POS mawalre, credit card frauds, enterprise security, underground ecosystem

Procedia PDF Downloads 439
6231 Geothermal Resources to Ensure Energy Security During Climate Change

Authors: Debasmita Misra, Arthur Nash

Abstract:

Energy security and sufficiency enables the economic development and welfare of a nation or a society. Currently, the global energy system is dominated by fossil fuels, which is a non-renewable energy resource, which renders vulnerability to energy security. Hence, many nations have begun augmenting their energy system with renewable energy resources, such as solar, wind, biomass and hydro. However, with climate change, how sustainable are some of the renewable energy resources in the future is a matter of concern. Geothermal energy resources have been underexplored or underexploited in global renewable energy production and security, although it is gaining attractiveness as a renewable energy resource. The question is, whether geothermal energy resources are more sustainable than other renewable energy resources. High-temperature reservoirs (> 220 °F) can produce electricity from flash/dry steam plants as well as binary cycle production facilities. Most of the world’s high enthalpy geothermal resources are within the seismo-tectonic belt. However, exploration for geothermal energy is of great importance in conventional geothermal systems in order to improve its economic viability. In recent years, there has been an increase in the use and development of several exploration methods for geo-thermal resources, such as seismic or electromagnetic methods. The thermal infrared band of the Landsat can reflect land surface temperature difference, so the ETM+ data with specific grey stretch enhancement has been used to explore underground heat water. Another way of exploring for potential power is utilizing fairway play analysis for sites without surface expression and in rift zones. Utilizing this type of analysis can improve the success rate of project development by reducing exploration costs. Identifying the basin distribution of geologic factors that control the geothermal environment would help in identifying the control of resource concentration aside from the heat flow, thus improving the probability of success. The first step is compiling existing geophysical data. This leads to constructing conceptual models of potential geothermal concentrations which can then be utilized in creating a geodatabase to analyze risk maps. Geospatial analysis and other GIS tools can be used in such efforts to produce spatial distribution maps. The goal of this paper is to discuss how climate change may impact renewable energy resources and how could a synthesized analysis be developed for geothermal resources to ensure sustainable and cost effective exploitation of the resource.

Keywords: exploration, geothermal, renewable energy, sustainable

Procedia PDF Downloads 154
6230 The Construction of Women’s Leadership in the Swedish Armed Forces in the Context of the Women, Peace and Security Agenda

Authors: Sofia Sutera

Abstract:

Despite the introduction of the Women, Peace, and Security (WPS) Agenda in 2000, thanks to the UNSCR 1325 and subsequent resolutions, and the clear stance of the UN towards the support of increased participation of women in peace and security processes, women’s leadership in this context remains very low. Considering specifically the framework of peacekeeping operations, the aim of this paper is to analyze the way women’s leadership is constructed in the Swedish Armed Forces (SAF). In the context of the WPS Agenda, Sweden has been chosen as a case study because of the relevance of its singular feminist policies (the statement in 2014 from Wallström, previous and current Minister for Foreign Affairs and Deputy Prime Minister, that Sweden is pursuing a feminist foreign policy is a clear example). Moreover, the SAF adopted in 2016 the Handbok Gender. This policy addresses explicitly the gender perspective embraced by the Swedish military institution, a sui-generis organization even in the Scandinavian reality. Indeed, the SAF has assumed a clear commitment to represent its institution as gender aware and gender equal. The theoretical perspective utilized in this research, which focuses specifically on women, is feminism and particularly a feminist constructivist approach, with an institutional focus on the military institution, has been chosen. Taking into account the specificity of the feminist research, the above-mentioned gender policy has been examined by means of a critical discourse analysis (CDA) whose main aim is to investigate the social structures of discourse and the power relationships inherent to it. Thus, CDA appears to be quite relevant in order to understand the construction of women’s leadership in the Handbok Gender. Nevertheless, even in a country which officially identifies as feminist and which is characterized by a peculiar military institution, the conclusions of this analysis revealed that women’s leadership in peacekeeping operations remains very low.

Keywords: feminism, peacekeeping operations, swedish armed forces, UNSCR 1325, women's leadership, WPS agenda

Procedia PDF Downloads 135
6229 Assessment of Arterial Stiffness through Measurement of Magnetic Flux Disturbance and Electrocardiogram Signal

Authors: Jing Niu, Jun X. Wang

Abstract:

Arterial stiffness predicts mortality and morbidity, independently of other cardiovascular risk factors. And it is a major risk factor for age-related morbidity and mortality. The non-invasive industry gold standard measurement system of arterial stiffness utilizes pulse wave velocity method. However, the desktop device is expensive and requires trained professional to operate. The main objective of this research is the proof of concept of the proposed non-invasive method which uses measurement of magnetic flux disturbance and electrocardiogram (ECG) signal for measuring arterial stiffness. The method could enable accurate and easy self-assessment of arterial stiffness at home, and to help doctors in research, diagnostic and prescription in hospitals and clinics. A platform for assessing arterial stiffness through acquisition and analysis of radial artery pulse waveform and ECG signal has been developed based on the proposed method. Radial artery pulse waveform is acquired using the magnetic based sensing technology, while ECG signal is acquired using two dry contact single arm ECG electrodes. The measurement only requires the participant to wear a wrist strap and an arm band. Participants were recruited for data collection using both the developed platform and the industry gold standard system. The results from both systems underwent correlation assessment analysis. A strong positive correlation between the results of the two systems is observed. This study presents the possibility of developing an accurate, easy to use and affordable measurement device for arterial stiffness assessment.

Keywords: arterial stiffness, electrocardiogram, pulse wave velocity, Magnetic Flux Disturbance

Procedia PDF Downloads 187