Search results for: healthcare data security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 27204

Search results for: healthcare data security

25524 talk2all: A Revolutionary Tool for International Medical Tourism

Authors: Madhukar Kasarla, Sumit Fogla, Kiran Panuganti, Gaurav Jain, Abhijit Ramanujam, Astha Jain, Shashank Kraleti, Sharat Musham, Arun Chaudhury

Abstract:

Patients have often chosen to travel for care — making pilgrimages to academic meccas and state-of-the-art hospitals for sophisticated surgery. This culture is still persistent in the landscape of US healthcare, with hundred thousand of visitors coming to the shores of United States to seek the high quality of medical care. One of the major challenges in this form of medical tourism has been the language barrier. Thus, an Iraqi patient, with immediate needs of communicating the healthcare needs to the treating team in the hospital, may face huge barrier in effective patient-doctor communication, delaying care and even at times reducing the quality. To circumvent these challenges, we are proposing the use of a state-of-the-art tool, Talk2All, which can translate nearly one hundred international languages (and even sign language) in real time. The tool is an easy to download app and highly user friendly. It builds on machine learning principles to decode different languages in real time. We suggest that the use of Talk2All will tremendously enhance communication in the hospital setting, effectively breaking the language barrier. We propose that vigorous incorporation of Talk2All shall overcome practical challenges in international medical and surgical tourism.

Keywords: language translation, communication, machine learning, medical tourism

Procedia PDF Downloads 208
25523 Socio-Cultural Factors Influencing Adherence to Anti-Retroviral Therapy among HIV Patients in a University Teaching Hospital in South-Western Nigeria

Authors: Okunola Oluseye Ademola

Abstract:

The study investigated various socio-cultural factors influencing adherence to antiretroviral drugs among people living with HIV in a University Teaching Hospital in South-western Nigeria. The objectives are to examine the perception of people living with HIV/AIDS (PLWHA) of antiretroviral therapy (ART) in Obafemi Awolowo University Teaching Hospitals Complex, Ile-Ife, investigate the influence of socio-cultural factors on adherence of PLWHA to treatment regimen in the study area and assess the prevalence of adherence to ART among PLWHA in the study area. It was a cross-sectional where both qualitative and quantitative research methods were adopted. The participants were HIV diagnosed patients attending clinic at the Obafemi Awolowo University Teaching Hospitals Complex in Ile-Ife between the ages of 18 and 60 years. Also three healthcare delivery personnel working in the clinic were interviewed. Out of the 3007 patients receiving treatment, using Fischer’s formula of sampling technique, 336 patients living with HIV/AIDS were selected for the study. These participants had been on antiretroviral drugs for more than six months prior to the study and were selected using simple random sampling technique. Two focus group discussion sessions comprising of 10 male and 10 female living with HIV and currently on ART were conducted. These groups were purposively selected based on their being on ART for more than one year. Also in-depth interviews were conducted among three purposively selected healthcare givers (an experienced nurse, a doctor and a pharmacist) who are working in this clinic. All the participants were interviewed at the clinic on the various clinic days. Data were collected using a structured questionnaire, an interview guide and tape-recorder. The quantitative data were analysed using descriptive and inferential statistics. Content analysis was employed to analyse responses from IDI and FGD sessions. The findings from the study revealed a very positive perception to ART among PLWHA which was about 86.3% while the level of adherence to ART was 89.0% among the respondents. There was a very strong relationship between social and family supports and the degree of adherence to ART in the PLWHA. Nutrition, polygamy, difficulty in financing transportation fare to the clinic, unemployment, drug hawkers, religion, excuse duty from work and waking up very early were highlighted as socio-cultural barriers to adherence to ART. Fear of death, strong family support, religion belief, not seeking alternative treatment, absence of rituals and perceived improved health status were identified as very strong facilitators to adherence. The study concluded that to achieve a very optimal outcome in the management of HIV among PLWHA, various social and cultural contexts should be taken into consideration as this study was able to ascertain the influence of various socio-cultural factors militating and facilitating adherence to ART.

Keywords: ART, HIV, PLWHA, socio-cultural

Procedia PDF Downloads 273
25522 Assessing the Competence of Junior Pediatric Doctors in Managing Pediatric Diabetic Ketoacidosis: An Exploration Across Pediatric Care Units

Authors: Mai Ali

Abstract:

Advancing beyond the junior stage of a paediatrician’s career is a crucial step where they accumulate essential skills and knowledge. This process prepares them for the challenges they'll encounter throughout their profession, particularly in dealing with paediatric emergencies. This can be especially demanding for trainees specializing in fields like endocrinology, particularly in the management of Diabetic Ketoacidosis (DKA) in the UK. In different societal contexts, junior doctors, whether specializing in pediatrics or other medical fields, are generally expected to possess a fundamental level of knowledge and skills necessary for managing diabetic ketoacidosis (DKA) emergencies. These physicians consistently concurred in recognizing prevalent problems in the healthcare facilities they examined. Such issues include the lack of established guidelines for DKA treatment and the inadequate availability of comprehensive training opportunities. The abstract underscores the critical importance of junior paediatricians acquiring expertise in managing paediatric emergencies, with a specific focus on DKA. Commonly, issues like the lack of standardized protocols and training deficiencies are recurring themes across healthcare facilities. This research proposal aims to conduct a thematic analysis of the proficiency of paediatric trainees in the United Kingdom when handling DKA in various clinical contexts. The primary goal is to assess their competency and suggest effective strategies for comprehensive DKA training improvement.

Keywords: junior pediatrician, DKA, standardized protocols, level of competence

Procedia PDF Downloads 73
25521 Internet of Things Networks: Denial of Service Detection in Constrained Application Protocol Using Machine Learning Algorithm

Authors: Adamu Abdullahi, On Francisca, Saidu Isah Rambo, G. N. Obunadike, D. T. Chinyio

Abstract:

The paper discusses the potential threat of Denial of Service (DoS) attacks in the Internet of Things (IoT) networks on constrained application protocols (CoAP). As billions of IoT devices are expected to be connected to the internet in the coming years, the security of these devices is vulnerable to attacks, disrupting their functioning. This research aims to tackle this issue by applying mixed methods of qualitative and quantitative for feature selection, extraction, and cluster algorithms to detect DoS attacks in the Constrained Application Protocol (CoAP) using the Machine Learning Algorithm (MLA). The main objective of the research is to enhance the security scheme for CoAP in the IoT environment by analyzing the nature of DoS attacks and identifying a new set of features for detecting them in the IoT network environment. The aim is to demonstrate the effectiveness of the MLA in detecting DoS attacks and compare it with conventional intrusion detection systems for securing the CoAP in the IoT environment. Findings: The research identifies the appropriate node to detect DoS attacks in the IoT network environment and demonstrates how to detect the attacks through the MLA. The accuracy detection in both classification and network simulation environments shows that the k-means algorithm scored the highest percentage in the training and testing of the evaluation. The network simulation platform also achieved the highest percentage of 99.93% in overall accuracy. This work reviews conventional intrusion detection systems for securing the CoAP in the IoT environment. The DoS security issues associated with the CoAP are discussed.

Keywords: algorithm, CoAP, DoS, IoT, machine learning

Procedia PDF Downloads 70
25520 EcoMush: Mapping Sustainable Mushroom Production in Bangladesh

Authors: A. A. Sadia, A. Emdad, E. Hossain

Abstract:

The increasing importance of mushrooms as a source of nutrition, health benefits, and even potential cancer treatment has raised awareness of the impact of climate-sensitive variables on their cultivation. Factors like temperature, relative humidity, air quality, and substrate composition play pivotal roles in shaping mushroom growth, especially in Bangladesh. Oyster mushrooms, a commonly cultivated variety in this region, are particularly vulnerable to climate fluctuations. This research explores the climatic dynamics affecting oyster mushroom cultivation and, presents an approach to address these challenges and provides tangible solutions to fortify the agro-economy, ensure food security, and promote the sustainability of this crucial food source. Using climate and production data, this study evaluates the performance of three clustering algorithms -KMeans, OPTICS, and BIRCH- based on various quality metrics. While each algorithm demonstrates specific strengths, the findings provide insights into their effectiveness for this specific dataset. The results yield essential information, pinpointing the optimal temperature range of 13°C-22°C, the unfavorable temperature threshold of 28°C and above, and the ideal relative humidity range of 75-85% with the suitable production regions in three different seasons: Kharif-1, 2, and Robi. Additionally, a user-friendly web application is developed to support mushroom farmers in making well-informed decisions about their cultivation practices. This platform offers valuable insights into the most advantageous periods for oyster mushroom farming, with the overarching goal of enhancing the efficiency and profitability of mushroom farming.

Keywords: climate variability, mushroom cultivation, clustering techniques, food security, sustainability, web-application

Procedia PDF Downloads 60
25519 Explore the Effect of Telecare for the Elderly in Preventing and Delaying the Quality of Disability Care with Bluetooth Brainwave Equipment

Authors: Jui-Chen Huang

Abstract:

The purpose of this study is to explore the effects of telecare on preventing and delaying the quality of disability care in elderly people with portable comfort Bluetooth brainwave devices with remote healthcare functions. Through the teaching videos and remotely teaching the elderly, which had ever learned the care courses of the prevent and delay disability, these elderly did muscle strength training. Then this paper explores the effect of training with the data by SPSS 18.0 statistical software. The data is collected with pre-test, post-test and analyze data from the measure of the Bluetooth brain wave equipment including the pressure index, relaxation index, attention and fatigue index of the elderly. In this study, 30 elderly people who had taken preventive and delayed disability care courses were studied to explore the effect of their care quality improvement. The results showed that the pressure index, relaxation index, attention, and fatigue index of the elderly had statistically significant differences in two months. It can be seen that elderly people who have been treated to prevent and delay disability care courses can significantly improve their care quality if they continue to receive intensive training to prevent and delay disability through remote mode. This telecare is applied to the elderly program that has been used to prevent and delay disability care courses. It is worth continuing to promote, and it is recommended that follow-up studies be conducted in a longer-term manner to explore long-term benefits. It can solve the current insufficiency of long-term care resources, but the demand is urgent.

Keywords: telecare, bluetooth brainwave equipment, prevention and delay of disability, the elderly, care quality

Procedia PDF Downloads 144
25518 New Requirements of the Fifth Dimension of War: Planning of Cyber Operation Capabilities

Authors: Mehmet Kargaci

Abstract:

Transformation of technology and strategy has been the main factor for the evolution of war. In addition to land, maritime, air and space domains, cyberspace has become the fifth domain with emerge of internet. The current security environment has become more complex and uncertain than ever before. Moreover, warfare has evaluated from conventional to irregular, asymmetric and hybrid war. Weak actors such as terrorist organizations and non-state actors has increasingly conducted cyber-attacks against strong adversaries. Besides, states has developed cyber capabilities in order to defense critical infrastructure regarding the cyber threats. Cyber warfare will be key in future security environment. Although what to do has been placed in operational plans, how to do has lacked and ignored as to cyber defense and attack. The purpose of the article is to put forward a model for how to conduct cyber capabilities in a conventional war. First, cyber operations capabilities will be discussed. Second put forward the necessities of cyberspace environment and develop a model for how to plan an operation using cyber operation capabilities, finally the assessment of the applicability of cyber operation capabilities and offers will be presented.

Keywords: cyber war, cyber threats, cyber operation capabilities, operation planning

Procedia PDF Downloads 331
25517 Prospects for Sustainable Chemistry in South Africa: A Plural Healthcare System

Authors: Ntokozo C. Mthembu

Abstract:

The notion of sustainable chemistry has become significant in the discourse for a global post-colonial era, including South Africa, especially when it comes to access to the general health system and related policies in relation to disease or ease of human life. In view of the stubborn vestiges of coloniality in the daily lives of indigenous African people in general, the fundamentals of present Western medical and traditional medicine systems and related policies in the democratic era were examined in this study. The situation of traditional healers in relation to current policy was also reviewed. The advent of democracy in South Africa brought about a variety of development opportunities and limitations, particularly with respect to indigenous African knowledge systems such as traditional medicine. There were high hopes that the limitations of previous narrow cultural perspectives would be rectified in the democratic era through development interventions, but some sections of society, such as traditional healers, remain marginalised. The Afrocentric perspective was explored in dissecting government interventions related to traditional medicine. This article highlights that multiple medical systems should be adopted and that health policies should be aligned in order to guarantee mutual respect and to address the remnants of colonialism in South Africa, Africa and the broader global community.

Keywords: traditional healing system, healers, pluralist healthcare system, post-colonial era

Procedia PDF Downloads 147
25516 Resilient Security System with Toll Free Call Services: Case Study of Adama City

Authors: Shanko Chura Aredo, Hailu Jeldie Wodajo, Muktar Jeylan, Kedir Ilka, Abdulnasir Husein

Abstract:

Toll-free numbers are calling numbers that have unique three or four digit numbers and that don’t require payment from phone lines in order to be called. With the help of these numbers, callers can connect with nearby organizations and/or people without incurring far-reaching fees. Calls to assistance centers are especially popular from toll-free phones. In the past, toll-free services have offered prospective clients and other parties a simple and cost-free means of getting in touch with enterprises. Nevertheless, unless they have an ”unlimited calling” plan, wireless subscribers will be billed for the airtime minutes used during a toll-free call. In Adama, the second largest city in Ethiopia, a call center has been installed as part of smart security system and serving since January 2023 for collection of complaints from different community levels. The call center is situated at the mayor office and has 11 active workers, 4 of these working the night time and the remaining during day time. The information reported in the form of complaints from individuals and groups are illegal constructions, illegal trade, income concealment or hiding, giving and receiving bribe, informing new faces of suspected enemies and exposing individual or group conflicts. This technology has been found to bring a significant outcome in minimizing illegal acts, public safety threats and service delivery problems.

Keywords: smart, safety, crime, call center, security

Procedia PDF Downloads 50
25515 Exploratory Study on Psychosocial Influences of Spinal Cord Injury to Patients: Basis for Medical Social Work Intervention Plan

Authors: Delies L. Alejo

Abstract:

This study explores the psychosocial influences of Spinal Cord Injury (SCI) on patients in the Philippine Orthopedic Center Hospital in the Philippines, examining their social functioning and proposing interventions for reintegration. Quantitative data were collected through surveys using a concurrent triangulation research design, while qualitative insights were obtained via interviews. Findings revealed significant psychosocial challenges among SCI patients, impacting relationships, family dynamics, work, friendships, parenting, education, and self-care. Demographic profiles indicated variations in psychosocial functioning. The study underscores the importance of tailored interventions for SCI patients based on age, marital status, gender, education, and occupation. Triangulation of data enhanced understanding, revealing four themes: ‘Resilient Navigation of Intimacy and Connection,’ ‘Family Dynamics and Care Challenges,’ ‘Occupational Hurdles and Work Engagement,’ and ‘Social and Community Integration Obstacles.’ The study proposes a holistic intervention plan, addressing emotional challenges, creating support networks, implementing vocational rehabilitation, promoting community engagement, and sustaining collaboration with healthcare professionals.

Keywords: spinal cord injury, psychosocial influences, social functioning, concurrent triangulation, intervention plan

Procedia PDF Downloads 42
25514 Effect of Institution Volume on Mortality and Outcomes in Osteoporotic Hip Fracture Care

Authors: J. Milton, C. Uzoigwe, O. Ayeko, B. Offorha, K. Anderson, R. G. Middleton

Abstract:

Background: We used the UK National Hip Fracture database to determine the effect of institution hip fracture case volume on hip fracture healthcare outcomes in 2019. Using logistic regression for each healthcare outcome, we compared the best performing 50 units with the poorest performing 50 units in order to determine if the unit volume was associated with performance for each particular outcome. Method: We analysed 175 institutions treating a total of 67,673 patients over the course of a year. Results: The number of hip fractures seen per unit ranged between 86 and 952. Larger units tendered to perform health assessments more consistently and mobilise patients more expeditiously post-operatively. Patients treated at large institutions had shorter lengths of stay. With regard to most other outcomes, there was no association between unit case volume and performance, notably compliance with the Best Practice Tariff, time to surgery, proportion of eligible patients undergoing total hip arthroplasty, length of stay, delirium risk, and pressure sore risk assessments. Conclusion: There is no relationship between unit volume and the majority of health care outcomes. It would seem that larger institutions tend to perform better at parameters that are dependent upon personnel numbers. However, where the outcome is contingent, even partially, on physical infrastructure capacity, there was no difference between larger and smaller units.

Keywords: institution volume, mortality, neck of femur fractures, osteoporosis

Procedia PDF Downloads 88
25513 Big Data and Health: An Australian Perspective Which Highlights the Importance of Data Linkage to Support Health Research at a National Level

Authors: James Semmens, James Boyd, Anna Ferrante, Katrina Spilsbury, Sean Randall, Adrian Brown

Abstract:

‘Big data’ is a relatively new concept that describes data so large and complex that it exceeds the storage or computing capacity of most systems to perform timely and accurate analyses. Health services generate large amounts of data from a wide variety of sources such as administrative records, electronic health records, health insurance claims, and even smart phone health applications. Health data is viewed in Australia and internationally as highly sensitive. Strict ethical requirements must be met for the use of health data to support health research. These requirements differ markedly from those imposed on data use from industry or other government sectors and may have the impact of reducing the capacity of health data to be incorporated into the real time demands of the Big Data environment. This ‘big data revolution’ is increasingly supported by national governments, who have invested significant funds into initiatives designed to develop and capitalize on big data and methods for data integration using record linkage. The benefits to health following research using linked administrative data are recognised internationally and by the Australian Government through the National Collaborative Research Infrastructure Strategy Roadmap, which outlined a multi-million dollar investment strategy to develop national record linkage capabilities. This led to the establishment of the Population Health Research Network (PHRN) to coordinate and champion this initiative. The purpose of the PHRN was to establish record linkage units in all Australian states, to support the implementation of secure data delivery and remote access laboratories for researchers, and to develop the Centre for Data Linkage for the linkage of national and cross-jurisdictional data. The Centre for Data Linkage has been established within Curtin University in Western Australia; it provides essential record linkage infrastructure necessary for large-scale, cross-jurisdictional linkage of health related data in Australia and uses a best practice ‘separation principle’ to support data privacy and security. Privacy preserving record linkage technology is also being developed to link records without the use of names to overcome important legal and privacy constraint. This paper will present the findings of the first ‘Proof of Concept’ project selected to demonstrate the effectiveness of increased record linkage capacity in supporting nationally significant health research. This project explored how cross-jurisdictional linkage can inform the nature and extent of cross-border hospital use and hospital-related deaths. The technical challenges associated with national record linkage, and the extent of cross-border population movements, were explored as part of this pioneering research project. Access to person-level data linked across jurisdictions identified geographical hot spots of cross border hospital use and hospital-related deaths in Australia. This has implications for planning of health service delivery and for longitudinal follow-up studies, particularly those involving mobile populations.

Keywords: data integration, data linkage, health planning, health services research

Procedia PDF Downloads 214
25512 An Attribute Based Access Control Model with POL Module for Dynamically Granting and Revoking Authorizations

Authors: Gang Liu, Huimin Song, Can Wang, Runnan Zhang, Lu Fang

Abstract:

Currently, resource sharing and system security are critical issues. This paper proposes a POL module composed of PRIV ILEGE attribute (PA), obligation and log which improves attribute based access control (ABAC) model in dynamically granting authorizations and revoking authorizations. The following describes the new model termed PABAC in terms of the POL module structure, attribute definitions, policy formulation and authorization architecture, which demonstrate the advantages of it. The POL module addresses the problems which are not predicted before and not described by access control policy. It can be one of the subject attributes or resource attributes according to the practical application, which enhances the flexibility of the model compared with ABAC. A scenario that illustrates how this model is applied to the real world is provided.

Keywords: access control, attribute based access control, granting authorizations, privilege, revoking authorizations, system security

Procedia PDF Downloads 354
25511 Efficient Internal Generator Based on Random Selection of an Elliptic Curve

Authors: Mustapha Benssalah, Mustapha Djeddou, Karim Drouiche

Abstract:

The random number generation (RNG) presents a significant importance for the security and the privacy of numerous applications, such as RFID technology and smart cards. Since, the quality of the generated bit sequences is paramount that a weak internal generator for example, can directly cause the entire application to be insecure, and thus it makes no sense to employ strong algorithms for the application. In this paper, we propose a new pseudo random number generator (PRNG), suitable for cryptosystems ECC-based, constructed by randomly selecting points from several elliptic curves randomly selected. The main contribution of this work is the increasing of the generator internal states by extending the set of its output realizations to several curves auto-selected. The quality and the statistical characteristics of the proposed PRNG are validated using the Chi-square goodness of fit test and the empirical Special Publication 800-22 statistical test suite issued by NIST.

Keywords: PRNG, security, cryptosystem, ECC

Procedia PDF Downloads 439
25510 Mitigating Denial of Service Attacks in Information Centric Networking

Authors: Bander Alzahrani

Abstract:

Information-centric networking (ICN) using architectures such as Publish-Subscribe Internet Routing Paradigm (PSIRP) is one of the promising candidates for a future Internet, has recently been under the spotlight by the research community to investigate the possibility of redesigning the current Internet architecture to solve many issues such as routing scalability, security, and quality of services issues.. The Bloom filter-based forwarding is a source-routing approach that is used in the PSIRP architecture. This mechanism is vulnerable to brute force attacks which may lead to denial-of-service (DoS) attacks. In this work, we present a new forwarding approach that keeps the advantages of Bloom filter-based forwarding while mitigates attacks on the forwarding mechanism. In practice, we introduce a special type of forwarding nodes called Edge-FW to be placed at the edge of the network. The role of these node is to add an extra security layer by validating and inspecting packets at the edge of the network against brute-force attacks and check whether the packet contains a legitimate forwarding identifier (FId) or not. We leverage Certificateless Aggregate Signature (CLAS) scheme with a small size of 64-bit which is used to sign the FId. Hence, this signature becomes bound to a specific FId. Therefore, malicious nodes that inject packets with random FIds will be easily detected and dropped at the Edge-FW node when the signature verification fails. Our preliminary security analysis suggests that with the proposed approach, the forwarding plane is able to resist attacks such as DoS with very high probability.

Keywords: bloom filter, certificateless aggregate signature, denial-of-service, information centric network

Procedia PDF Downloads 194
25509 Climate Change Vulnerability and Agrarian Communities: Insights from the Composite Vulnerability Index of Indian States of Andhra Pradesh and Karnataka

Authors: G. Sridevi, Amalendu Jyotishi, Sushanta Mahapatra, G. Jagadeesh, Satyasiba Bedamatta

Abstract:

Climate change is a main challenge for agriculture, food security and rural livelihoods for millions of people in India. Agriculture is the sector most vulnerable to climate change due to its high dependence on climate and weather conditions. Among India’s population of more than one billion people, about 68% are directly or indirectly involved in the agricultural sector. This sector is particularly vulnerable to present-day climate variability. In this contest this paper examines the Socio-economic and climate analytical study of the vulnerability index in Indian states of Andhra Pradesh and Karnataka. Using secondary data; it examines the vulnerability through five different sub-indicator of socio-demographic, agriculture, occupational, common property resource (CPR), and climate in respective states among different districts. Data used in this paper has taken from different sources, like census in India 2011, Directorate of Economics and Statistics of respective states governments. Rainfall data was collected from the India Meteorological Department (IMD). In order to capture the vulnerability from two different states the composite vulnerability index (CVI) was developed and used. This indicates the vulnerability situation of different districts under two states. The study finds that Adilabad district in Andhra Pradesh and Chamarajanagar in Karnataka had highest level of vulnerability while Hyderabad and Bangalore in respective states have least level of vulnerability.

Keywords: vulnerability, agriculture, climate change, global warming

Procedia PDF Downloads 455
25508 Hybrid Anomaly Detection Using Decision Tree and Support Vector Machine

Authors: Elham Serkani, Hossein Gharaee Garakani, Naser Mohammadzadeh, Elaheh Vaezpour

Abstract:

Intrusion detection systems (IDS) are the main components of network security. These systems analyze the network events for intrusion detection. The design of an IDS is through the training of normal traffic data or attack. The methods of machine learning are the best ways to design IDSs. In the method presented in this article, the pruning algorithm of C5.0 decision tree is being used to reduce the features of traffic data used and training IDS by the least square vector algorithm (LS-SVM). Then, the remaining features are arranged according to the predictor importance criterion. The least important features are eliminated in the order. The remaining features of this stage, which have created the highest level of accuracy in LS-SVM, are selected as the final features. The features obtained, compared to other similar articles which have examined the selected features in the least squared support vector machine model, are better in the accuracy, true positive rate, and false positive. The results are tested by the UNSW-NB15 dataset.

Keywords: decision tree, feature selection, intrusion detection system, support vector machine

Procedia PDF Downloads 258
25507 Barriers to Job Localization Policy in Private Sector: Case Study from Oman

Authors: Yahya Al Nahdi

Abstract:

Even though efforts to increase the participation of nationals in the workforce have been in place for more than a decade in the Sultanate of Oman, the results are not impressive. Citizens’ workforce participation – it is argued in the literature – is hindered by institutional, as well as attitudinal concerns. The purpose of this study was to determine barriers to Omanization (employment of Omani nationals) in the private sector as perceived by the senior managers in government and private sector. Data were collected predominantly through in-depth, semi-structured interviews with managers who directly deal with Omanization policies from both the public and private sector. Results from the data analysis have shown that the majority of participants acknowledged a work preference in the movement (public sector). The private sector employees' compensation and benefits package was perceived to be less attractive than that offered in the government (public sector). The negative perceptions (stereotypes) shared by expatriates regarding work attitudes and competencies of citizens in the local labour market was also overwhelmingly perceived as a major hindrance. Furthermore, institutional issues such as, ineffectiveness of rules and regulation regarding Omanization, inappropriate quota system and lack of public awareness towards private sector’s jobs, are also perceived problematic to successful Omanization. Finally, results from the data analysis were used in recommending strategies for potential consideration in the pursuit of a successful Omanization programme.

Keywords: localization, job security, labour force structure, Omanization, private sector, public sector

Procedia PDF Downloads 392
25506 Simulation Data Summarization Based on Spatial Histograms

Authors: Jing Zhao, Yoshiharu Ishikawa, Chuan Xiao, Kento Sugiura

Abstract:

In order to analyze large-scale scientific data, research on data exploration and visualization has gained popularity. In this paper, we focus on the exploration and visualization of scientific simulation data, and define a spatial V-Optimal histogram for data summarization. We propose histogram construction algorithms based on a general binary hierarchical partitioning as well as a more specific one, the l-grid partitioning. For effective data summarization and efficient data visualization in scientific data analysis, we propose an optimal algorithm as well as a heuristic algorithm for histogram construction. To verify the effectiveness and efficiency of the proposed methods, we conduct experiments on the massive evacuation simulation data.

Keywords: simulation data, data summarization, spatial histograms, exploration, visualization

Procedia PDF Downloads 172
25505 Health Care Teams during COVID-19: Roles, Challenges, Emotional State and Perceived Preparedness to the Next Pandemic

Authors: Miriam Schiff, Hadas Rosenne, Ran Nir-Paz, Shiri Shinan Altman

Abstract:

To examine (1) the level, predictors, and subjective perception of professional quality of life (PRoQL), posttraumatic growth, roles, task changes during the pandemic, and perceived preparedness for the next pandemic. These variables were added as part of an international study on social workers in healthcare stress, resilience, and perceived preparedness we took part in, along with Australia, Canada, China, Hong Kong, Singapore, and Taiwan. (2) The extent to which background variables, rate of exposure to the virus, working in COVID wards, profession, personal resilience, and resistance to organizational change predict posttraumatic growth, perceived preparedness, and PRoQL (the latter was examined among social workers only). (3) The teams' perceptions of how the pandemic impacted them at the personal, professional, and organizational levels and what assisted them. Methodologies: Mixed quantitative and qualitative methods were used. 1039 hospital healthcare workers from various professions participated in the quantitative study while 32 participated in in-depth interviews. The same methods were used in six other countries. Findings: The level of PRoQL was moderate, with higher burnout and secondary traumatization level than during routine times. Differences between countries in the level of PRoQL were found as well. Perceived preparedness for the next pandemic at the personal level was moderate and similar among the different health professions. Higher exposure to the virus was associated with lower perceived preparedness of the hospitals. Compared to other professions, doctors and nurses perceived hospitals as significantly less prepared for the next pandemic. The preparedness of the State of Israel for the next pandemic is perceived as low by all healthcare professionals. A moderate level of posttraumatic growth was found. Staff who worked at the COVID ward reported a greater level of growth. Doctors reported the lowest level of growth. The staff's resilience was high, with no differences among professions or levels of exposure. Working in the COVID ward and resilience predicted better preparedness, while resistance to organizational change predicted worse preparedness. Findings from the qualitative part of the study revealed that healthcare workers reported challenges at the personal, professional and organizational level during the different waves of the pandemic. They also report on internal and external resources they either owned or obtained during that period. Conclusion: Exposure to the COVID-19 virus is associated with secondary traumatization on one hand and personal posttraumatic growth on the other hand. Personal and professional discoveries and a sense of mission helped cope with the pandemic that was perceived as a historical event, war, or mass casualty event. Personal resilience, along with the support of colleagues, family, and direct management, were seen as significant components of coping. Hospitals should plan ahead and improve their preparedness to the next pandemic.

Keywords: covid-19, health-care, social workers, burnout, preparedness, international perspective

Procedia PDF Downloads 70
25504 Impact of Network Workload between Virtualization Solutions on a Testbed Environment for Cybersecurity Learning

Authors: Kevin Fernagut, Olivier Flauzac, Erick M. G. Robledo, Florent Nolot

Abstract:

The adoption of modern lightweight virtualization often comes with new threats and network vulnerabilities. This paper seeks to assess this with a different approach studying the behavior of a testbed built with tools such as Kernel-Based Virtual Machine (KVM), Linux Containers (LXC) and Docker, by performing stress tests within a platform where students experiment simultaneously with cyber-attacks, and thus observe the impact on the campus network and also find the best solution for cyber-security learning. Interesting outcomes can be found in the literature comparing these technologies. It is, however, difficult to find results of the effects on the global network where experiments are carried out. Our work shows that other physical hosts and the faculty network were impacted while performing these trials. The problems found are discussed, as well as security solutions and the adoption of new network policies.

Keywords: containerization, containers, cybersecurity, cyberattacks, isolation, performance, virtualization, virtual machines

Procedia PDF Downloads 142
25503 Development of a Telemedical Network Supporting an Automated Flow Cytometric Analysis for the Clinical Follow-up of Leukaemia

Authors: Claude Takenga, Rolf-Dietrich Berndt, Erling Si, Markus Diem, Guohui Qiao, Melanie Gau, Michael Brandstoetter, Martin Kampel, Michael Dworzak

Abstract:

In patients with acute lymphoblastic leukaemia (ALL), treatment response is increasingly evaluated with minimal residual disease (MRD) analyses. Flow Cytometry (FCM) is a fast and sensitive method to detect MRD. However, the interpretation of these multi-parametric data requires intensive operator training and experience. This paper presents a pipeline-software, as a ready-to-use FCM-based MRD-assessment tool for the daily clinical practice for patients with ALL. The new tool increases accuracy in assessment of FCM-MRD in samples which are difficult to analyse by conventional operator-based gating since computer-aided analysis potentially has a superior resolution due to utilization of the whole multi-parametric FCM-data space at once instead of step-wise, two-dimensional plot-based visualization. The system developed as a telemedical network reduces the work-load and lab-costs, staff-time needed for training, continuous quality control, operator-based data interpretation. It allows dissemination of automated FCM-MRD analysis to medical centres which have no established expertise for the benefit of an even larger community of diseased children worldwide. We established a telemedical network system for analysis and clinical follow-up and treatment monitoring of Leukaemia. The system is scalable and adapted to link several centres and laboratories worldwide.

Keywords: data security, flow cytometry, leukaemia, telematics platform, telemedicine

Procedia PDF Downloads 977
25502 Usability and Biometric Authentication of Electronic Voting System

Authors: Nighat Ayub, Masood Ahmad

Abstract:

In this paper, a new voting system is developed and its usability is evaluated. The main feature of this system is the biometric verification of the voter and then a few easy steps to cast a vote. As compared to existing systems available, e.g dual vote, the new system requires no training in advance. The security is achieved via multiple key concept (another part of this project). More than 100 student voters were participated in the election from University of Malakanad, Chakdara, PK. To achieve the reliability, the voters cast their votes in two ways, i.e. paper based and electronic based voting using our new system. The results of paper based and electronic voting system are compared and it is concluded that the voters cast their votes for the intended candidates on the electronic voting system. The voters were requested to fill a questionnaire and the results of the questionnaire are carefully analyzed. The results show that the new system proposed in this paper is more secure and usable than other systems.

Keywords: e-voting, security, usability, authentication

Procedia PDF Downloads 388
25501 The Socioeconomic and Moral Impacts of the Syrian Refugees to Turkey

Authors: Inci Aksu Kargin

Abstract:

The civil war which began in the Daraa province of Syria in March 2011, has caused thousands of Syrians to die and millions more to seek refuge in other countries such as Turkey, Lebanon, Jordan, Iraq, and Egypt. In order to understand the Syrian refugees’ living conditions and the problems they have experienced in Turkey in-depth, and to analyze how the arrival of the Syrian refugees in Turkey has affected the local people who live in Turkish-Syrian border, this study employed interviews, which were conducted with three different groups. First, 60 Syrian refugees, who have settled in Hatay and Gaziantep, were interviewed. Then, the Turkish government institutions, and NGOs, which are responsible for assisting the refugees, were interviewed. These interviews revealed that many Syrian refugees have encountered with several issues such as access to labor and housing markets as well as free healthcare and public education services. Second, 60 Turkish citizens living in Hatay and Gaziantep provinces were interviewed. These interviews shed light on the many issues (e.g., increase of unemployment, increase in the rental and sale prices of the houses, decrease in the quality of healthcare services, increase in traffic problems, problems with regard to the usage of parks and gardens) that Turkish citizens began experiencing after mass asylum claim of the Syrian refugees to Turkey. In addition to these, the existing social problems in Turkey such as child labor, begging, child brides, and illegal marriages (religious marriages) worsen.

Keywords: migration, refugees, Syrian civil war, Turkey

Procedia PDF Downloads 280
25500 Fundamentals and Techniques of Organic Agriculture in Egypt

Authors: Moustafa Odah

Abstract:

Organic Agriculture is a new and sustainable agricultural system that depends on the use of organic materials from within the farm resulting from crop residues and animal husbandry and the cultivation of leguminous crops, away from the use of chemicals in fertilization or pest resistance, which leads to the production of safe, clean and healthy food products with nutritional value high and free of chemicals enhance food security; it is also an agricultural model preserve natural resources by improving the fertility and soil characteristics, and enhance biodiversity and biological cycles; additionally, they preserve the environment from pollution, which makes it play an important role in providing food needs of the present generations and the preservation of the rights of the coming generations to achieve sustainable development.

Keywords: organic agriculture, food security and achieving sustainable development, fertilization or pest resistance, crop residues and animal husbandry and the cultivation of leguminous crops

Procedia PDF Downloads 76
25499 Similarities and Differences in Values of Young Women and Their Parents: The Effect of Value Transmission and Value Change

Authors: J. Fryt, K. Pietras, T. Smolen

Abstract:

Intergenerational similarities in values may be effect of value transmission within families or socio-cultural trends prevailing at a specific point in time. According to salience hypothesis, salient family values may be transmitted more frequently. On the other hand, many value studies reveal that generational shift from social values (conservation and self-transcendence) to more individualistic values (openness to change and self-enhancement) suggest that value transmission and value change are two different processes. The first aim of our study was to describe similarities and differences in values of young women and their parents. The second aim was to determine which value similarities may be due to transmission within families. Ninety seven Polish women aged 19-25 and both their mothers and fathers filled in the Portrait Value Questionaire. Intergenerational similarities in values between women were found in strong preference for benevolence, universalism and self-direction as well as low preference for power. Similarities between younger women and older men were found in strong preference for universalism and hedonism as well as lower preference for security and tradition. Young women differed from older generation in strong preference for stimulation and achievement as well as low preference for conformity. To identify the origin of intergenerational similarities (whether they are the effect of value transmission within families or not), we used the comparison between correlations of values in family dyads (mother-daughter, father-daughter) and distribution of correlations in random intergenerational dyads (random mother-daughter, random father-daughter) as well as peer dyads (random daughter-daughter). Values representing conservation (security, tradition and conformity) as well as benevolence and power were transmitted in families between women. Achievement, power and security were transmitted between fathers and daughters. Similarities in openness to change (self-direction, stimulation and hedonism) and universalism were not stronger within families than in random intergenerational and peer dyads. Taken together, our findings suggest that despite noticeable generation shift from social to more individualistic values, we can observe transmission of parents’ salient values such as security, tradition, benevolence and achievement.

Keywords: value transmission, value change, intergenerational similarities, differences in values

Procedia PDF Downloads 425
25498 The Role of Moroccan Salafist Radicalism in Creating Threat to Spain’s Security

Authors: Stanislaw Kosmynka

Abstract:

Although the genesis of the activity of fighting salafist radicalism in Spain dates back to the 80’s, the development of extremism of this kind manifested itself only in the next decade. Its first permanently functioning structures in this country in the second half of 90’s of 20th century came from Algieria and Syria. At the same time it should be emphasized that this distinction is in many dimensions conventional, the more so because they consisted also of immigrants from other coutries of Islam, particularly from Morocco. The paper seeks to understand the radical salafist challenge for Spain in the context of some terrorist networks consisted of immigrants from Morocco. On the eve of the new millennium Moroccan jihadists played an increasingly important role. Although the activity of these groups had for many years mainly logistical and propaganda character, the bomb attack carried out on 11 March 2004 in Madrid constituted an expression of open forms of terrorism, directed against the authorities and society of Spain and reflected the narration of representatives of the trend of the global jihad. The people involved in carrying out that act of violence were to a large extent Moroccan immigrants; also in the following years among the cells of radicals in Spain Moroccans stood out many times. That is why the forms and directions of activity of these extremists in Spain, also after 11th March 2004 and in the actual context of the impact of Islamic State, are worth presenting. The paper is focused on threats to the security of Spain and the region and remains connected with the issues of mutual relations of the society of a host country with immigrant communities which to a large degree come from this part of Maghreb.

Keywords: jihadi terrorism, Morocco, radical salafism, security, Spain, terrorist cells, threat

Procedia PDF Downloads 522
25497 IT and Security Experts' Innovation and Investment Front for IT-Entrepreneurship in Pakistan

Authors: Ahmed Mateen, Zhu Qingsheng, Muhammad Awais, Muhammad Yahya Saeed

Abstract:

This paper targets the rising factor of entrepreneurship innovation, which lacks in Pakistan as compared to the other countries or the regions like China, India, and Malaysia, etc. This is an exploratory and explanatory study. Major aspects have identified as the direction for the policymakers while highlighting the issues in true spirit. IT needs to be considered not only as a technology but also as itself growing as a new community. IT management processes are complex and broad, so generally requires extensive attention to the collective aspects of human variables, capital and technology. In addition, projects tend to have a special set of critical success factors, and if these are processed and given attention, it will improve the chances of successful implementation. This is only possible with state of the art intelligent decision support systems and accumulating IT staff to some extent in decision processes. This paper explores this issue carefully and discusses six issues to observe the implemented strength and possible enhancement.

Keywords: security and defense forces, IT-incentives, big IT-players, IT-entrepreneurial-culture

Procedia PDF Downloads 217
25496 Application to Monitor the Citizens for Corona and Get Medical Aids or Assistance from Hospitals

Authors: Vathsala Kaluarachchi, Oshani Wimalarathna, Charith Vandebona, Gayani Chandrarathna, Lakmal Rupasinghe, Windhya Rankothge

Abstract:

It is the fundamental function of a monitoring system to allow users to collect and process data. A worldwide threat, the corona outbreak has wreaked havoc in Sri Lanka, and the situation has gotten out of hand. Since the epidemic, the Sri Lankan government has been unable to establish a systematic system for monitoring corona patients and providing emergency care in the event of an outbreak. Most patients have been held at home because of the high number of patients reported in the nation, but they do not yet have access to a functioning medical system. It has resulted in an increase in the number of patients who have been left untreated because of a lack of medical care. The absence of competent medical monitoring is the biggest cause of mortality for many people nowadays, according to our survey. As a result, a smartphone app for analyzing the patient's state and determining whether they should be hospitalized will be developed. Using the data supplied, we are aiming to send an alarm letter or SMS to the hospital once the system recognizes them. Since we know what those patients need and when they need it, we will put up a desktop program at the hospital to monitor their progress. Deep learning, image processing and application development, natural language processing, and blockchain management are some of the components of the research solution. The purpose of this research paper is to introduce a mechanism to connect hospitals and patients even when they are physically apart. Further data security and user-friendliness are enhanced through blockchain and NLP.

Keywords: blockchain, deep learning, NLP, monitoring system

Procedia PDF Downloads 129
25495 The Limits of Charity: Advancing a Rights-based Justice Model to Remedy Poverty and Hunger

Authors: Tracy Smith-Carrier

Abstract:

In 1995, the World Health Organization declared that poverty was the biggest killer and the greatest cause of suffering in the world. Income is certainly a key social determinant of health, the lack of which causes innumerable health and mental health conditions. In seeking to provide relief from financial hardship for residents within their populace, states in the Global North have largely turned to the non-profit and charitable sector. The stigma and shame of accessing charity is a significant barrier for many, but what is more problematic is that the embrace of the charitable model has let governments off the hook from responding to their international human rights obligations. Although states are signatories to various human rights treaties and conventions internationally, many of these laws have not been implemented domestically. This presentation explores the limits of the charitable model in addressing poverty in countries of the Global North. Unlike in the ages passed, when poverty was thought to be an individual problem, we now know that poverty is largely systemic in nature. In this presentation, we will identify the structural determinants of poverty, outline why people are reticent to access charitable programs and services and how income security is reproduced through the charitable model, and discuss evidence-informed solutions, such as a basic income guarantee, to move beyond the charitable model in favour of a rights-based justice model. To move beyond charity, we must demand that governments recognize our fundamental human rights and address poverty and hunger using a justice model based on substantive human rights.

Keywords: basic income, charity, poverty, income security, hunger, food security, social justice, human rights

Procedia PDF Downloads 112