Search results for: medical device security
6138 Blockchain for IoT Security and Privacy in Healthcare Sector
Authors: Umair Shafique, Hafiz Usman Zia, Fiaz Majeed, Samina Naz, Javeria Ahmed, Maleeha Zainab
Abstract:
The Internet of Things (IoT) has become a hot topic for the last couple of years. This innovative technology has shown promising progress in various areas, and the world has witnessed exponential growth in multiple application domains. Researchers are working to investigate its aptitudes to get the best from it by harnessing its true potential. But at the same time, IoT networks open up a new aspect of vulnerability and physical threats to data integrity, privacy, and confidentiality. It's is due to centralized control, data silos approach for handling information, and a lack of standardization in the IoT networks. As we know, blockchain is a new technology that involves creating secure distributed ledgers to store and communicate data. Some of the benefits include resiliency, integrity, anonymity, decentralization, and autonomous control. The potential for blockchain technology to provide the key to managing and controlling IoT has created a new wave of excitement around the idea of putting that data back into the hands of the end-users. In this manuscript, we have proposed a model that combines blockchain and IoT networks to address potential security and privacy issues in the healthcare domain. Then we try to describe various application areas, challenges, and future directions in the healthcare sector where blockchain platforms merge with IoT networks.Keywords: IoT, blockchain, cryptocurrency, healthcare, consensus, data
Procedia PDF Downloads 1806137 Planning the Journey of Unifying Medical Record Numbers in Five Facilities and the Expected Challenges: Case Study in Saudi Arabia
Authors: N. Al Khashan, H. Al Shammari, W. Al Bahli
Abstract:
Patients who are eligible to receive treatment at the National Guard Health Affairs (NGHA), Saudi Arabia will typically have four medical record numbers (MRN), one in each of the geographical areas. More hospitals and primary healthcare facilities in other geographical areas will launch soon which means more MRNs. When patients own four MRNs, this will cause major drawbacks in patients’ quality of care such as creating new medical files in different regions for relocated patients and using referral system among regions. Consequently, the access to a patient’s medical record from other regions and the interoperability of health information between the four hospitals’ information system would be challenging. Thus, there is a need to unify medical records among these five facilities. As part of the effort to increase the quality of care, a new Hospital Information Systems (HIS) was implemented in all NGHA facilities by the end of 2016. NGHA’s plan is put to be aligned with the Saudi Arabian national transformation program 2020; whereby 70% citizens and residents of Saudi Arabia would have a unified medical record number that enables transactions between multiple Electronic Medical Records (EMRs) vendors. The aim of the study is to explore the plan, the challenges and barriers of unifying the 4 MRNs into one Enterprise Patient Identifier (EPI) in NGHA hospitals by December 2018. A descriptive study methodology was used. A journey map and a project plan are created to be followed by the project team to ensure a smooth implementation of the EPI. It includes the following: 1) Approved project charter, 2) Project management plan, 3) Change management plan, 4) Project milestone dates. Currently, the HIS is using the regional MRN. Therefore, the HIS and all integrated health care systems in all regions will need modification to move from MRN to EPI without interfering with patient care. For now, the NGHA have successfully implemented an EPI connected with the 4 MRNs that work in the back end in the systems’ database.Keywords: consumer health, health informatics, hospital information system, universal medical record number
Procedia PDF Downloads 1966136 Mutiple Medical Landmark Detection on X-Ray Scan Using Reinforcement Learning
Authors: Vijaya Yuvaram Singh V M, Kameshwar Rao J V
Abstract:
The challenge with development of neural network based methods for medical is the availability of data. Anatomical landmark detection in the medical domain is a process to find points on the x-ray scan report of the patient. Most of the time this task is done manually by trained professionals as it requires precision and domain knowledge. Traditionally object detection based methods are used for landmark detection. Here, we utilize reinforcement learning and query based method to train a single agent capable of detecting multiple landmarks. A deep Q network agent is trained to detect single and multiple landmarks present on hip and shoulder from x-ray scan of a patient. Here a single agent is trained to find multiple landmark making it superior to having individual agents per landmark. For the initial study, five images of different patients are used as the environment and tested the agents performance on two unseen images.Keywords: reinforcement learning, medical landmark detection, multi target detection, deep neural network
Procedia PDF Downloads 1426135 A Real-World Roadmap and Exploration of Quantum Computers Capacity to Trivialise Internet Security
Authors: James Andrew Fitzjohn
Abstract:
This paper intends to discuss and explore the practical aspects of cracking encrypted messages with quantum computers. The theory of this process has been shown and well described both in academic papers and headline-grabbing news articles, but with all theory and hyperbole, we must be careful to assess the practicalities of these claims. Therefore, we will use real-world devices and proof of concept code to prove or disprove the notion that quantum computers will render the encryption technologies used by many websites unfit for purpose. It is time to discuss and implement the practical aspects of the process as many advances in quantum computing hardware/software have recently been made. This paper will set expectations regarding the useful lifespan of RSA and cipher lengths and propose alternative encryption technologies. We will set out comprehensive roadmaps describing when and how encryption schemes can be used, including when they can no longer be trusted. The cost will also be factored into our investigation; for example, it would make little financial sense to spend millions of dollars on a quantum computer to factor a private key in seconds when a commodity GPU could perform the same task in hours. It is hoped that the real-world results depicted in this paper will help influence the owners of websites who can take appropriate actions to improve the security of their provisions.Keywords: quantum computing, encryption, RSA, roadmap, real world
Procedia PDF Downloads 1316134 An Approach of Computer Modalities for Exploration of Hieroglyphics Substantial in an Investigation
Authors: Aditi Chauhan, Neethu S. Mohan
Abstract:
In the modern era, the advancement and digitalization in technology have taken place during an investigation of crime scene. The rapid enhancement and investigative techniques have changed the mean of identification of suspect. Identification of the person is one of the significant aspects, and personal authentication is the key of security and reliability in society. Since early 90 s, people have relied on comparing handwriting through its class and individual characteristics. But in today’s 21st century we need more reliable means to identify individual through handwriting. An approach employing computer modalities have lately proved itself auspicious enough in exploration of hieroglyphics substantial in investigating the case. Various software’s such as FISH, WRITEON, and PIKASO, CEDAR-FOX SYSTEM identify and verify the associated quantitative measure of the similarity between two samples. The research till date has been confined to identify the authorship of the concerned samples. But prospects associated with the use of computational modalities might help to identify disguised writing, forged handwriting or say altered or modified writing. Considering the applications of such modal, similar work is sure to attract plethora of research in immediate future. It has a promising role in national security too. Documents exchanged among terrorist can also be brought under the radar of surveillance, bringing forth their source of existence.Keywords: documents, identity, computational system, suspect
Procedia PDF Downloads 1766133 Standard Resource Parameter Based Trust Model in Cloud Computing
Authors: Shyamlal Kumawat
Abstract:
Cloud computing is shifting the approach IT capital are utilized. Cloud computing dynamically delivers convenient, on-demand access to shared pools of software resources, platform and hardware as a service through internet. The cloud computing model—made promising by sophisticated automation, provisioning and virtualization technologies. Users want the ability to access these services including infrastructure resources, how and when they choose. To accommodate this shift in the consumption model technology has to deal with the security, compatibility and trust issues associated with delivering that convenience to application business owners, developers and users. Absent of these issues, trust has attracted extensive attention in Cloud computing as a solution to enhance the security. This paper proposes a trusted computing technology through Standard Resource parameter Based Trust Model in Cloud Computing to select the appropriate cloud service providers. The direct trust of cloud entities is computed on basis of the interaction evidences in past and sustained on its present performances. Various SLA parameters between consumer and provider are considered in trust computation and compliance process. The simulations are performed using CloudSim framework and experimental results show that the proposed model is effective and extensible.Keywords: cloud, Iaas, Saas, Paas
Procedia PDF Downloads 3306132 The Clinical Use of Ahmed Valve Implant as an Aqueous Shunt for Control of Uveitic Glaucoma in Dogs
Authors: Khaled M. Ali, M. A. Abdel-Hamid, Ayman A. Mostafa
Abstract:
Objective: Safety and efficacy of Ahmed glaucoma valve implantation for the management of uveitis induced glaucoma evaluated on the five dogs with uncontrollable glaucoma. Materials and Methods: Ahmed Glaucoma Valve (AGV®; New World Medical, Rancho Cucamonga, CA, USA) is a flow restrictive, non-obstructive self-regulating valve system. Preoperative ocular evaluation included direct ophthalmoscopy and measurement of the intraocular pressure (IOP). The implant was examined and primed prior to implantation. The selected site of the valve implantation was the superior quadrant between the superior and lateral rectus muscles. A fornix-based incision was made through the conjunectiva and Tenon’s capsule. A pocket is formed by blunt dissection of Tenon’s capsule from the episclera. The body of the implant was inserted into the pocket with the leading edge of the device around 8-10 mm from the limbus. Results: No post operative complications were detected in the operated eyes except a persistent corneal edema occupied the upper half of the cornea in one case. Hyphaema was very mild and seen only in two cases which resolved quickly two days after surgery. Endoscopical evaluation for the operated eyes revealed a normal ocular fundus with clearly visible optic papilla, tapetum and retinal blood vessels. No evidence of hemorrhage, infection, adhesions or retinal abnormalities was detected. Conclusion: Ahmed glaucoma valve is safe and effective implant for treatment of uveitic glaucoma in dogs.Keywords: Ahmed valve, endoscopy, glaucoma, ocular fundus
Procedia PDF Downloads 5876131 Chikungunya Virus Detection Utilizing an Origami Based Electrochemical Paper Analytical Device
Authors: Pradakshina Sharma, Jagriti Narang
Abstract:
Due to the critical significance in the early identification of infectious diseases, electrochemical sensors have garnered considerable interest. Here, we develop a detection platform for the chikungunya virus by rationally implementing the extremely high charge-transfer efficiency of a ternary nanocomposite of graphene oxide, silver, and gold (G/Ag/Au) (CHIKV). Because paper is an inexpensive substrate and can be produced in large quantities, the use of electrochemical paper analytical device (EPAD) origami further enhances the sensor's appealing qualities. A cost-effective platform for point-of-care diagnostics is provided by paper-based testing. These types of sensors are referred to as eco-designed analytical tools due to their efficient production, usage of the eco-friendly substrate, and potential to reduce waste management after measuring by incinerating the sensor. In this research, the paper's foldability property has been used to develop and create 3D multifaceted biosensors that can specifically detect the CHIKVX-ray diffraction, scanning electron microscopy, UV-vis spectroscopy, and transmission electron microscopy (TEM) were used to characterize the produced nanoparticles. In this work, aptamers are used since they are thought to be a unique and sensitive tool for use in rapid diagnostic methods. Cyclic voltammetry (CV) and linear sweep voltammetry (LSV), which were both validated with a potentiostat, were used to measure the analytical response of the biosensor. The target CHIKV antigen was hybridized with using the aptamer-modified electrode as a signal modulation platform, and its presence was determined by a decline in the current produced by its interaction with an anionic mediator, Methylene Blue (MB). Additionally, a detection limit of 1ng/ml and a broad linear range of 1ng/ml-10µg/ml for the CHIKV antigen were reported.Keywords: biosensors, ePAD, arboviral infections, point of care
Procedia PDF Downloads 986130 A Study of Career Suitability Among Medical Students
Authors: Nurul Azmawati Mohamed, Zarini Ismail, Shalinawati Ramli, Nurul Hayati Chamhuri, Nur Syahrina Rahim, K. Omar
Abstract:
Choosing a career is one of the most important decisions in our life. A right career leads a person to grow with that career and achieve success through the decision. Thus, career suitability assessment is important to help individuals to understand how a variety of personal attributes can impact their potential success and satisfaction with different career options and work environments. Some career needs specific personality trait that relates to attributes of job requirements and commitments. For medicine, being caring, approachable, inquisitive, able to listen and understand patients’ pain, anxiety and sorrow are important. The aim of this study was to evaluate the career suitability of pre-clinical students. This was a cross sectional study conducted among pre-clinical medical students in Universiti Sains Islam Malaysia. 'Sidek Career Interest Inventory’ was used to assess the students’ suitability for the course. This instrument had been validated locally to suit the local social and cultural context. It assessed the students’ personality trait based on Holland’s theory and their interests. For students to pursue in the medical course, two main personality trait are believed to be essential namely investigative and social trait personalities. Some of the characteristics of investigative trait are analytical, rational, intellectual and curious, while the characteristics of social trait personality include empathy, friendly, understanding and accommodating. The score for each personality trait were categorized as low (0-3.99), moderate (4-6.99) and high (7-10). A total of 81 pre-clinical medical students were included in this study. About two third (93.8%) of them were female and all of them are from 20 to 21 of age. Approximately, half of the students (47.5%) scored high and another 46.3% scored moderate for investigative trait. For social trait, only 13.8% scored high while 31.3% scored moderate. Only 12.5% (10) students had high scores for both investigative and social traits. Most of the pre-clinical medical students scored high in the investigative sections, however their social values were inadequate (low scores). For them to become good medical doctors, they should be good in both investigative and social skills to enhance their suitability for this career. Therefore, there is a need to nurture these medical students with appropriate social values and soft skills.Keywords: career suitability, career interest, medical students, personality trait
Procedia PDF Downloads 3166129 The Promoting of Early Childhood Development in Local Government Child Center
Authors: Vorapoj Promasatayaprot, Sumattana Glangkarn
Abstract:
Background: Early childhood, the first five years of life, is a time of rapid cognitive, linguistic, social, emotional and motor development. This study was descriptive research which the main purpose of this research was to study early childhood development in Child Center of Local Government in order to emphasize the public citizen and communities participate in the Child Development Center. Method: The study designed was Action Research and divided into four steps consisted of (1) Planning (2) Acting (3) Observing and (4) Reflecting. This study was employed the areas and the subjects consisted of 10 committees of the Child Center in Thakhonyang municipality, Kantharawichai District, Maha Sarakham Province, Thailand and 50 representative parents by using the purposive sampling technique. The instrument used in this study were questionnaires. The data were analyzed using descriptive statistic; percentage, mean, standard deviation, maximum value, minimum, median. Qualitative data was collected using the observation and interview and was analysed by content analysis. Results: The results of this research were as follows: The promoting of early childhood development in child center at Thakhonyang Municipality, Kantharawichai District, Maha Sarakham Province, Thailand were 6 procedures ; (1) workshop participation (2) workshop in action plan (3) performing in action plan (4) following supervision (5) self – assessment (6) knowledge sharing seminar. The service model of the Local Fund Health Security in Thailand was passed the qualifications of local fund health security by 6 procedures to be the high potential local fund health security. Conclusion: The key success is that the commission will have to respond the performance at all process of plan to address the issue in the future. Factor of success is to community participate with transparent procedure. Coordination committee should manipulate the child center benefits among stake holders.Keywords: child center, develop, early childhood development, local government, promote
Procedia PDF Downloads 1936128 Carbon Capture and Storage by Continuous Production of CO₂ Hydrates Using a Network Mixing Technology
Authors: João Costa, Francisco Albuquerque, Ricardo J. Santos, Madalena M. Dias, José Carlos B. Lopes, Marcelo Costa
Abstract:
Nowadays, it is well recognized that carbon dioxide emissions, together with other greenhouse gases, are responsible for the dramatic climate changes that have been occurring over the past decades. Gas hydrates are currently seen as a promising and disruptive set of materials that can be used as a basis for developing new technologies for CO₂ capture and storage. Its potential as a clean and safe pathway for CCS is tremendous since it requires only water and gas to be mixed under favorable temperatures and mild high pressures. However, the hydrates formation process is highly exothermic; it releases about 2 MJ per kilogram of CO₂, and it only occurs in a narrow window of operational temperatures (0 - 10 °C) and pressures (15 to 40 bar). Efficient continuous hydrate production at a specific temperature range necessitates high heat transfer rates in mixing processes. Past technologies often struggled to meet this requirement, resulting in low productivity or extended mixing/contact times due to inadequate heat transfer rates, which consistently posed a limitation. Consequently, there is a need for more effective continuous hydrate production technologies in industrial applications. In this work, a network mixing continuous production technology has been shown to be viable for producing CO₂ hydrates. The structured mixer used throughout this work consists of a network of unit cells comprising mixing chambers interconnected by transport channels. These mixing features result in enhanced heat and mass transfer rates and high interfacial surface area. The mixer capacity emerges from the fact that, under proper hydrodynamic conditions, the flow inside the mixing chambers becomes fully chaotic and self-sustained oscillatory flow, inducing intense local laminar mixing. The device presents specific heat transfer rates ranging from 107 to 108 W⋅m⁻³⋅K⁻¹. A laboratory scale pilot installation was built using a device capable of continuously capturing 1 kg⋅h⁻¹ of CO₂, in an aqueous slurry of up to 20% in mass. The strong mixing intensity has proven to be sufficient to enhance dissolution and initiate hydrate crystallization without the need for external seeding mechanisms and to achieve, at the device outlet, conversions of 99% in CO₂. CO₂ dissolution experiments revealed that the overall liquid mass transfer coefficient is orders of magnitude larger than in similar devices with the same purpose, ranging from 1 000 to 12 000 h⁻¹. The present technology has shown itself to be capable of continuously producing CO₂ hydrates. Furthermore, the modular characteristics of the technology, where scalability is straightforward, underline the potential development of a modular hydrate-based CO₂ capture process for large-scale applications.Keywords: network, mixing, hydrates, continuous process, carbon dioxide
Procedia PDF Downloads 526127 Growing Acts of Terrorism in Local Conflicts: A Dire Need for International Attention
Authors: Yusuf Abubakar Mamud
Abstract:
Highlighting the imperatives of local conflicts considering the dangerous dimensions of terrorism they are assuming in Africa has not attracted serious academic and political attention. The discourse about conflict in Africa was discussed within five identified conflict zones in the continent. The threats from these local conflicts are diverse and complex and the acts of terrorism in these local conflicts are driven by certain attitudes and behaviours linked to the African leadership. The paper examined and noted that the current conflict resolution model of the African Union (AU) was robust with requisite institutions to address the trends in local conflicts. However, it was observed that the AU peace and security framework lacked the requisite structural and technical capabilities to proactively address the drivers of local conflicts in Africa. It was found that the persistence of local conflicts in the African region may deny her the opportunities of achievement of the targets envisioned in the Sustainable Development Goals (SDGs). Consequently, the paper called on the international community to support Africa through provision of capacity. It urged the African leaders themselves to develop the political will to ensure that all issues concerning peace and security in the continent were guided by the provisions of the AU Constitutive Act. The need to strengthen the APRM in the light of the current trends in local conflicts was also highlighted.Keywords: conflicts, local conflicts, terrorism, sustainable development
Procedia PDF Downloads 2766126 Study of Reporting System for Adverse Events Related to Common Medical Devices at a Tertiary Care Public Sector Hospital in India
Authors: S. Kurian, S. Satpathy, S. K. Gupta, S. Arya, D. K. Sharma
Abstract:
Advances in the use of health care technology have resulted in increased adverse events (AEs) related to the use of medical devices. The study focused on the existing reporting systems. This study was conducted in a tertiary care public sector hospital. Devices included Syringe infusion pumps, Cardiac monitors, Pulse oximeters, Ventilators and Defibrillators. A total of 211 respondents were recruited. Interviews were held with 30 key informants. Medical records were scrutinized. Relevant statistical tests were used. Resident doctors reported maximum frequency of AEs, followed by nurses; and least by consultants. A significant association was found between the cadre of health care personnel and awareness that the patients and bystanders have a risk of sustaining AE. Awareness regarding reporting of AEs was low, and it was generally done verbally. Other critical findings are discussed in the light of the barriers to reporting, reasons for non-compliance, recording system, and so on.Keywords: adverse events, health care technology, medical devices, public sector hospital, reporting systems
Procedia PDF Downloads 3396125 Moving Target Defense against Various Attack Models in Time Sensitive Networks
Authors: Johannes Günther
Abstract:
Time Sensitive Networking (TSN), standardized in the IEEE 802.1 standard, has been lent increasing attention in the context of mission critical systems. Such mission critical systems, e.g., in the automotive domain, aviation, industrial, and smart factory domain, are responsible for coordinating complex functionalities in real time. In many of these contexts, a reliable data exchange fulfilling hard time constraints and quality of service (QoS) conditions is of critical importance. TSN standards are able to provide guarantees for deterministic communication behaviour, which is in contrast to common best-effort approaches. Therefore, the superior QoS guarantees of TSN may aid in the development of new technologies, which rely on low latencies and specific bandwidth demands being fulfilled. TSN extends existing Ethernet protocols with numerous standards, providing means for synchronization, management, and overall real-time focussed capabilities. These additional QoS guarantees, as well as management mechanisms, lead to an increased attack surface for potential malicious attackers. As TSN guarantees certain deadlines for priority traffic, an attacker may degrade the QoS by delaying a packet beyond its deadline or even execute a denial of service (DoS) attack if the delays lead to packets being dropped. However, thus far, security concerns have not played a major role in the design of such standards. Thus, while TSN does provide valuable additional characteristics to existing common Ethernet protocols, it leads to new attack vectors on networks and allows for a range of potential attacks. One answer to these security risks is to deploy defense mechanisms according to a moving target defense (MTD) strategy. The core idea relies on the reduction of the attackers' knowledge about the network. Typically, mission-critical systems suffer from an asymmetric disadvantage. DoS or QoS-degradation attacks may be preceded by long periods of reconnaissance, during which the attacker may learn about the network topology, its characteristics, traffic patterns, priorities, bandwidth demands, periodic characteristics on links and switches, and so on. Here, we implemented and tested several MTD-like defense strategies against different attacker models of varying capabilities and budgets, as well as collaborative attacks of multiple attackers within a network, all within the context of TSN networks. We modelled the networks and tested our defense strategies on an OMNET++ testbench, with networks of different sizes and topologies, ranging from a couple dozen hosts and switches to significantly larger set-ups.Keywords: network security, time sensitive networking, moving target defense, cyber security
Procedia PDF Downloads 736124 Hierarchical Manganese and Nickel Selenide based Ultra-efficient Electrode Material for All-Solid-State Asymmetric Supercapacitors with Extended Energy Efficacy
Authors: Siddhant Srivastav, Soumyaranjan Mishra, Sumanta Kumar Meher
Abstract:
Researchers are attempting to develop extremely efficient electrochemical energy storage technologies as a result of the phenomenal advancement of portable electronic devices. Because of their improved electrical conductivity and narrower band gap, transition metal selenide-based nanostructures have piqued the interest of many researchers in this field. Based on this concept, we present a simple anion exchange hydrothermal synthesis method for synthesizing manganese and nickel based selenide (Mn/NiSe2) nanostructure for use in all-solid-state asymmetric supercapacitors. According to the comprehensive physicochemical characterizations, the material has lowly crystalline properties, a distinct porous microstructure, and a significant bonding contact between the metal and the selenium. The electrochemical investigations of the Mn/NiSe2 electrode material revealed supercapacitive charge discharge properties, excellent electro-kinetic reversibility, and minimal charge transfer resistance (Rct). Furthermore, the all-solid-state asymmetric supercapacitor device assembled using Mn/NiSe2 as positive electrode, nitrogen doped reduced graphene oxide (N-rGO) as negative electrode, and PVA-KOH gel as electrolyte/separator exhibit good redox behaviour, excellent charge-discharge properties with negligible voltage (IR) drop, and lower impedance characteristics. The solid state asymmetric supercapacitor device (Mn/NiSe2||N-rGO) demonstrated the power density of ultra-capacitors and the energy density of rechargeable batteries. Conclusively, the Mn/NiSe2 has been proposed as a potential outstanding electrode material for the next generation of all-solid-state asymmetric supercapacitors.Keywords: anion exchange, asymmetric supercapacitor, supercapacitive charge-discharge, voltage drop
Procedia PDF Downloads 1066123 Hierarchical Filtering Method of Threat Alerts Based on Correlation Analysis
Authors: Xudong He, Jian Wang, Jiqiang Liu, Lei Han, Yang Yu, Shaohua Lv
Abstract:
Nowadays, the threats of the internet are enormous and increasing; however, the classification of huge alert messages generated in this environment is relatively monotonous. It affects the accuracy of the network situation assessment, and also brings inconvenience to the security managers to deal with the emergency. In order to deal with potential network threats effectively and provide more effective data to improve the network situation awareness. It is essential to build a hierarchical filtering method to prevent the threats. In this paper, it establishes a model for data monitoring, which can filter systematically from the original data to get the grade of threats and be stored for using again. Firstly, it filters the vulnerable resources, open ports of host devices and services. Then use the entropy theory to calculate the performance changes of the host devices at the time of the threat occurring and filter again. At last, sort the changes of the performance value at the time of threat occurring. Use the alerts and performance data collected in the real network environment to evaluate and analyze. The comparative experimental analysis shows that the threat filtering method can effectively filter the threat alerts effectively.Keywords: correlation analysis, hierarchical filtering, multisource data, network security
Procedia PDF Downloads 2016122 Experimental Analyses of Thermoelectric Generator Behavior Using Two Types of Thermoelectric Modules for Marine Application
Authors: A. Nour Eddine, D. Chalet, L. Aixala, P. Chessé, X. Faure, N. Hatat
Abstract:
Thermal power technology such as the TEG (Thermo-Electric Generator) arouses significant attention worldwide for waste heat recovery. Despite the potential benefits of marine application due to the permanent heat sink from sea water, no significant studies on this application were to be found. In this study, a test rig has been designed and built to test the performance of the TEG on engine operating points. The TEG device is built from commercially available materials for the sake of possible economical application. Two types of commercial TEM (thermo electric module) have been studied separately on the test rig. The engine data were extracted from a commercial Diesel engine since it shares the same principle in terms of engine efficiency and exhaust with the marine Diesel engine. An open circuit water cooling system is used to replicate the sea water cold source. The characterization tests showed that the silicium-germanium alloys TEM proved a remarkable reliability on all engine operating points, with no significant deterioration of performance even under sever variation in the hot source conditions. The performance of the bismuth-telluride alloys was 100% better than the first type of TEM but it showed a deterioration in power generation when the air temperature exceeds 300 °C. The temperature distribution on the heat exchange surfaces revealed no useful combination of these two types of TEM with this tube length, since the surface temperature difference between both ends is no more than 10 °C. This study exposed the perspective of use of TEG technology for marine engine exhaust heat recovery. Although the results suggested non-sufficient power generation from the low cost commercial TEM used, it provides valuable information about TEG device optimization, including the design of heat exchanger and the types of thermo-electric materials.Keywords: internal combustion engine application, Seebeck, thermo-electricity, waste heat recovery
Procedia PDF Downloads 2446121 The Impact of Illegal Firearms Possession, Limited Security Staff and Porosity of Border on Human Security in Ipokia Local Government Area, Ogun State
Authors: Ogunmefun Folorunsho Muyideen, Aluko Tolulope Evelyn
Abstract:
One of the trending menaces faced in the world today is centered on the porosity of borders and proliferation of illegal weapons among the state members without the state authorizations. The proliferation of weapons along porous borders remains a germane and unsolvable question among developed and developing nations due to crisis degenerated from the menace (loss of lives, properties, traumatization, civil unrest and retrogressive economic development). A mixed method was adopted while the survey method was used for communities’ selection (Oke-Odan, Ajilete, Illaise, Lanlate) at Ipokia Local Government as a sample frame. Multi-stage sampling was employed to break down the site into wards, streets, and different house numbers before randomizing administration of the questionnaires using face to face method, while purposive sampling was used for collecting verbal information through an in-depth interviews method. The population size for the site is 150.398, while 399 was the sample size derived from the use of Yamane sample size formula. After retrieval of structured questionnaires, 346 were found useful, while 10 percent (399) of the quantitative instruments was summed to 30 participants that were interviewed using the in-depth interviews technique. The result of the first hypothesis shows a composite relationship between the variables tested (independents and dependent). The result indicated that the porosity of the border, illegal possession of guns, and limited security staff jointly predispose insecurity among the residents of the selected study site. The result of the second hypothesis deciphers that the illegal gun possession (independent) variable predict business outcome among the residents of the study site because sporadic gun shoot will regress the business activities in the study area. The result of third result indicated that the independent (porosity of borders) variable predict social bonding network because a high level of insecurity will destroy the level of trust in the communication among the residents of the study area. The last questions give comprehensive meaning to one of the recommendations derived using content systematic analysis, which explains that out of 30 participants interviewed, 18 submitted individual involvement in monitoring communities will solve the problem, 7 out of 30 opines that governmental agents are to be trained for effective combat, 3 participants out 30 submits that the fight is for both government and the citizens while 2 participants out of 30 claimed that there must be an agreement between Nigerian and neighbouring countries on border security. International donors must totally control the sales of weapons to unauthorized personalities. Criminal cases must be treated with deterrence measures and target hardened procedures through decoying and blending, stakeout, and sting tactics.Keywords: human security, illegal weapons, porous borders, development
Procedia PDF Downloads 1796120 Evaluation of the Impact of Telematics Use on Young Drivers’ Driving Behaviour: A Naturalistic Driving Study
Authors: WonSun Chen, James Boylan, Erwin Muharemovic, Denny Meyer
Abstract:
In Australia, drivers aged between 18 and 24 remained at high risk of road fatality over the last decade. Despite the successful implementation of the Graduated Licensing System (GLS) that supports young drivers in their early phases of driving, the road fatality statistics for these drivers remains high. In response to these statistics, studies conducted in Australia prior to the start of the COVID-19 pandemic have demonstrated the benefits of using telematics devices for improving driving behaviour, However, the impact of COVID-19 lockdown on young drivers’ driving behaviour has emerged as a global concern. Therefore, this naturalistic study aimed to evaluate and compare the driving behaviour(such as acceleration, braking, speeding, etc.) of young drivers with the adoption of in-vehicle telematics devices. Forty-two drivers aged between 18 and 30 and residing in the Australian state of Victoria participated in this study during the period of May to October 2022. All participants drove with the telematics devices during the first 30-day. At the start of the second 30-day, twenty-one participants were randomised to an intervention group where they were provided with an additional telematics ray device that provided visual feedback to the drivers, especially when they committed to aggressive driving behaviour. The remaining twenty-one participants remined their driving journeys without the extra telematics ray device (control group). Such trustworthy data enabled the assessment of changes in the driving behaviour of these young drivers using a machine learning approach in Python. Results are expected to show participants from the intervention group will show improvements in their driving behaviour compared to those from the control group.Furthermore, the telematics data enable the assessment and quantification of such improvements in driving behaviour. The findings from this study are anticipated to shed some light in guiding the development of customised campaigns and interventions to further address the high road fatality among young drivers in Australia.Keywords: driving behaviour, naturalistic study, telematics data, young drivers
Procedia PDF Downloads 1246119 Stroke Rehabilitation via Electroencephalogram Sensors and an Articulated Robot
Authors: Winncy Du, Jeremy Nguyen, Harpinder Dhillon, Reinardus Justin Halim, Clayton Haske, Trent Hughes, Marissa Ortiz, Rozy Saini
Abstract:
Stroke often causes death or cerebro-vascular (CV) brain damage. Most patients with CV brain damage lost their motor control on their limbs. This paper focuses on developing a reliable, safe, and non-invasive EEG-based robot-assistant stroke rehabilitation system to help stroke survivors to rapidly restore their motor control functions for their limbs. An electroencephalogram (EEG) recording device (EPOC Headset) and was used to detect a patient’s brain activities. The EEG signals were then processed, classified, and interpreted to the motion intentions, and then converted to a series of robot motion commands. A six-axis articulated robot (AdeptSix 300) was employed to provide the intended motions based on these commends. To ensure the EEG device, the computer, and the robot can communicate to each other, an Arduino microcontroller is used to physically execute the programming codes to a series output pins’ status (HIGH or LOW). Then these “hardware” commends were sent to a 24 V relay to trigger the robot’s motion. A lookup table for various motion intensions and the associated EEG signal patterns were created (through training) and installed in the microcontroller. Thus, the motion intention can be direct determined by comparing the EEG patterns obtaibed from the patient with the look-up table’s EEG patterns; and the corresponding motion commends are sent to the robot to provide the intended motion without going through feature extraction and interpretation each time (a time-consuming process). For safety sake, an extender was designed and attached to the robot’s end effector to ensure the patient is beyond the robot’s workspace. The gripper is also designed to hold the patient’s limb. The test results of this rehabilitation system show that it can accurately interpret the patient’s motion intension and move the patient’s arm to the intended position.Keywords: brain waves, EEG sensor, motion control, robot-assistant stroke rehabilitation
Procedia PDF Downloads 3836118 Contraceptive Uptake among Women in Low Socio-Economic Areas in Kenya: Quantitative Analysis of Secondary Data
Authors: J. Waita, S. Wamuhu, J. Makoyo, M. Rachel, T. Ngangari, W. Christine, M. Zipporah
Abstract:
Contraceptive use is one of the key global strategies to alleviate maternal mortality. Global efforts through advocating for contraceptive uptake and service provision has led improved contraceptive prevalence. In Kenya maternal mortality rate has remained a challenged despites efforts by government and non-governmental organizations. Objective: To describe the uptake of contraceptives among women in Tunza Clinics, Kenya. Design and Methods: Ps Kenya through health care marketing fund is implementing a family planning program among its 350 Tunza fractional franchise facilities. Through private partnership, private owned facilities in low socio-economic areas are recruited and trained on contraceptive technology update. The providers are supported through facilitative supervision through a mobile based application Health Network Quality Improvement System (HNQIS) and interpersonal communication through 150 community based volunteers. The data analyzed in this paper was collected between January to July 2017 to show the uptake of modern Contraceptives among women in the Tunza franchise, method mix, age and distribution among the age bracket. Further analysis compares two different service delivery strategies; outreach and walk ins. Supportive supervision HNQIS scores was analyzed. Results: During the time period, a total of 132121 family planning clients were attended in 350 facilities. The average age of clients was 29.6 years. The average number of clients attended in the facilities per month was 18874. 73.7 %( n=132121) of the clients attended in the Tunza facilities were aged above 25 years while 22.1% 20-24 years and 4.2% 15-19 years. On contraceptive method mix, intra uterine device insertions clients contributed to 7.5%, implant insertions 15.3%, pills 11.2%, injections 62.7% while condoms and emergency pills had 2.7% and 0.6% respectively. Analysis of service delivery strategy indicated more than 79% of the clients were walk ins while 21% were attended to during outreaches. Uptake of long term contraceptive methods during outreaches was 73% of the clients while short term modern methods were 27%. Health Network Quality Improvement system assessment scores indicated 51% of the facilities scored over 90%, 25% scoring 80-89% while 21% scored below 80%. Conclusion: Preference for short term methods by women is possibly associated to cost as they are cheaper and easy to administer. When the cost of intra uterine device Implants is meant affordable during outreaches, the uptake is observed to increase. Making intra uterine device and implants affordable to women is a key strategy in increasing contraceptive prevalence hence averting maternal mortality.Keywords: contraceptives, contraceptive uptake, low socio economic, supportive supervision
Procedia PDF Downloads 1686117 Sustainability through Resilience: How Emergency Responders Cope with Stressors
Authors: Sophie Kroeling, Agnetha Schuchardt
Abstract:
Striving for sustainability brings a lot of challenges for different fields of interest, e. g. security or health concerns. In Germany, civil protection is predominantly carried out by emergency responders who perform essential tasks of civil protection. Based on theoretical concepts of different psychological stress theories this contribution focuses on the question, how the resilience of emergency responders can be improved. The goal is to identify resources and successful coping strategies that help to prevent and reduce negative outcomes during or after stressful events. The paper will present results from a qualitative analysis of semi-structured qualitative interviews with 20 emergency responders. These results provide insights into the complexity of coping processes (e. g. controlling the situation, downplaying perceived personal threats through humor) and show the diversity of stressors (like complexity of the disastrous situation, intrusive press and media, or lack of social support within the organization). Self-efficacy expectation was a very important resource for coping with stressful situations. The results served as a starting point for a quantitative survey (that was conducted in March 2017), the development of education and training tools for emergency responders and the improvement of critical incident stress management processes. First results from the quantitative study with more than 700 participants show that, e. g., the emergency responders use social coping within their private social network and also within their aid organization and that both are correlated to resilience. Moreover, missing information, bureaucratic problems and social conflicts within the organization are events that the majority of the participants considered very onerous. Further results from regression analysis will be presented. The proposed paper will combine findings from the qualitative study with the quantitative results, illustrating figures and correlations with respective statements from the interviews. At the end, suggestions for the improvement of the emergency responder’s resilience are given and it is discussed how this can make a contribution to strive for civil security and furthermore a sustainable development.Keywords: civil security, emergency responders, stress, resilience, resources
Procedia PDF Downloads 1456116 Pilot Study of Determining the Impact of Surface Subsidence at The Intersection of Cave Mining with the Surface Using an Electrical Impedance Tomography
Authors: Ariungerel Jargal
Abstract:
: Cave mining is a bulk underground mining method, which allows large low-grade deposits to be mined underground. This method involves undermining the orebody to make it collapse under its own weight into a series of chambers from which the ore extracted. It is a useful technique to extend the life of large deposits previously mined by open pits, and it is a method increasingly proposed for new mines around the world. We plan to conduct a feasibility study using Electrical impedance tomography (EIT) technology to show how much subsidence there is at the intersection with the cave mining surface. EIT is an imaging technique which uses electrical measurements at electrodes attached on the body surface to yield a cross-sectional image of conductivity changes within the object. EIT has been developed in several different applications areas as a simpler, cheaper alternative to many other imaging methods. A low frequency current is injected between pairs of electrodes while voltage measurements are collected at all other electrode pairs. In the difference EIT, images are reconstructed of the change in conductivity distribution (σ) between the acquisition of the two sets of measurements. Image reconstruction in EIT requires the solution of an ill-conditioned nonlinear inverse problem on noisy data, typically requiring make simpler assumptions or regularization. It is noted that the ratio of current to voltage represents a complex value according to Ohm’s law, and that it is theoretically possible to re-express EIT. The results of the experiment were presented on the simulation, and it was concluded that it is possible to conduct further real experiments. Drill a certain number of holes in the top wall of the cave to attach the electrodes, flow a current through them, and measure and acquire the potential through these electrodes. Appropriate values should be selected depending on the distance between the holes, the frequency and duration of the measurements, the surface characteristics and the size of the study area using an EIT device.Keywords: impedance tomography, cave mining, soil, EIT device
Procedia PDF Downloads 1266115 Surveying Apps in Dam Excavation
Authors: Ali Mohammadi
Abstract:
Whenever there is a need to dig the ground, the presence of a surveyor is required to control the map. In projects such as dams and tunnels, these controls are more important because any mistakes can increase the cost. Also, time is great importance in These projects have and one of the ways to reduce the drilling time is to use techniques that can reduce the mapping time in these projects. Nowadays, with the existence of mobile phones, we can design apps that perform calculations and drawing for us on the mobile phone. Also, if we have a device that requires a computer to access its information, by designing an app, we can transfer its information to the mobile phone and use it, so we will not need to go to the office.Keywords: app, tunnel, excavation, dam
Procedia PDF Downloads 676114 An Overall Evaluation of Food Nanotechnology
Authors: Raana Babadi Fathipour
Abstract:
Nourishment nanotechnology is an range of rising intrigued and opens up a entirety universe of modern conceivable outcomes for the nourishment industry. The essential categories of nanotechnology applications and functionalities right now within the improvement of nourishment bundling incorporate: the enhancement of plastic materials obstructions, the consolidation of dynamic components that can convey utilitarian properties past those of customary dynamic bundling, and the detecting and signaling of significant data. Nano nourishment bundling materials may amplify nourishment life, move forward nourishment security, alarm buyers that nourishment is sullied or ruined, repair tears in bundling, and indeed release preservatives to expand the life of the nourishment within the bundle. Nanotechnology applications within the nourishment industry can be utilized to identify microbes in bundling, or produce stronger flavors and color quality, and security by expanding the obstruction properties. Nanotechnology holds extraordinary guarantee to supply benefits not fair inside nourishment items but too around nourishment items. In reality, nanotechnology presents modern chances for advancement within the nourishment industry at monstrous speed, but instability and wellbeing concerns are moreover developing. EU/WE/global enactment for the direction of nanotechnology in nourishment are scanty. Besides, current enactment shows up unacceptable to nanotechnology specificity.Keywords: nano technology, nano foods, food packaging, nano participle
Procedia PDF Downloads 656113 A Case Study on Indian Translation Ecosystem of Point-Of-Care Solutions
Authors: Tripta Dixit, Smita Sahu, William Selvamurthy, Sadhana Srivastava
Abstract:
The translation of healthcare technologies is an expensive, complex affair, current healthcare challenges in Asian countries and their efforts to meet Millennium Development Goals (MDGs), necessitates continuous technology advancement to save countless lives, improve the quality of life and for socio-economic development. India’s consistently improving global innovation index (57) demonstrates its innovation potential, but access to health care is asymmetric and lacks priority in India. Therefore, there is utmost need of a robust translation system for point-of-care (POC) solutions, inexpensive, low-maintenance, reliable, and easy-to-use diagnostic technologies. Few cases of POC technologies viz. Elisa based diagnostic kits for regional viral disease, a device for detection of cancerous lesions were studied to understand the process and challenges involved in their translation. Accordingly, the entire translation ecosystem was summarized proposing a nexus of various actors such as technology developer, technology transferor technology receiver, funding entities, government/regulatory bodies and their effect on translation of different medical technologies. This study highlights the role and concerns pertaining to these actors for POC such as unsystematic and unvalidated research roadmap, low profit preposition, unfocused approach of up-scaling, low market acceptability and multiple window regulatory framework, etc. This provides an opportunity to devise solutions to overcome problem areas in translation path.Keywords: healthcare technologies, point-of-care solutions, public health, translation
Procedia PDF Downloads 1726112 Shear Stress and Oxygen Concentration Manipulation in a Micropillars Microfluidic Bioreactor
Authors: Deybith Venegas-Rojas, Jens Budde, Dominik Nörz, Manfred Jücker, Hoc Khiem Trieu
Abstract:
Microfluidics is a promising approach for biomedicine cell culture experiments with microfluidic bioreactors (MBR), which can provide high precision in volume and time control over mass transport and microenvironments in small-scale studies. Nevertheless, shear stress and oxygen concentration are important factors that affect the microenvironment and then the cell culture. It is presented a novel MBR design in which differences in geometry, shear stress, and oxygen concentration were studied and optimized for cell culture. The aim is to mimic the in vivo condition with biocompatible materials and continuous perfusion of nutrients, a healthy shear stress, and oxygen concentration. The design consists of a capture system of PDMS micropillars which keep cells in place, so it is not necessary any hydrogel or complicated scaffolds for cells immobilization. Besides, the design allows continuous supply with nutrients or even any other chemical for cell experimentation. Finite element method simulations were used to study and optimize the effect of parameters such as flow rate, shear stress, oxygen concentration, micropillars shape, and dimensions. The micropillars device was fabricated with microsystem technology such as soft-lithography, deep reactive ion etching, self-assembled monolayer, replica molding, and oxygen plasma bonding. Eight different geometries were fabricated and tested, with different flow rates according to the simulations. During the experiments, it was observed the effect of micropillars size, shape, and configuration for stability and shear stress control when increasing flow rate. The device was tested with several successful HepG2 3D cell cultures. With this MBR, the aforementioned parameters can be controlled in order to keep a healthy microenvironment according to specific necessities of different cell types, with no need of hydrogels and can be used for a wide range of experiments with cells.Keywords: cell culture, micro-bioreactor, microfluidics, micropillars, oxygen concentration, shear stress
Procedia PDF Downloads 2896111 Geometric Design to Improve the Temperature
Authors: H. Ghodbane, A. A. Taleb, O. Kraa
Abstract:
This paper presents geometric design of induction heating system. The objective of this design is to improve the temperature distribution in the load. The study of such a device requires the use of models or modeling representation, physical, mathematical, and numerical. This modeling is the basis of the understanding, the design, and optimization of these systems. The optimization technique is to find values of variables that maximize or minimize the objective function.Keywords: optimization, modeling, geometric design system, temperature increase
Procedia PDF Downloads 5306110 Simulation Research of the Aerodynamic Drag of 3D Structures for Individual Transport Vehicle
Authors: Pawel Magryta, Mateusz Paszko
Abstract:
In today's world, a big problem of individual mobility, especially in large urban areas, occurs. Commonly used grand way of transport such as buses, trains or cars do not fulfill their tasks, i.e. they are not able to meet the increasing mobility needs of the growing urban population. Additional to that, the limitations of civil infrastructure construction in the cities exist. Nowadays the most common idea is to transfer the part of urban transport on the level of air transport. However to do this, there is a need to develop an individual flying transport vehicle. The biggest problem occurring in this concept is the type of the propulsion system from which the vehicle will obtain a lifting force. Standard propeller drives appear to be too noisy. One of the ideas is to provide the required take-off and flight power by the machine using the innovative ejector system. This kind of the system will be designed through a suitable choice of the three-dimensional geometric structure with special shape of nozzle in order to generate overpressure. The authors idea is to make a device that would allow to cumulate the overpressure using the a five-sided geometrical structure that will be limited on the one side by the blowing flow of air jet. In order to test this hypothesis a computer simulation study of aerodynamic drag of such 3D structures have been made. Based on the results of these studies, the tests on real model were also performed. The final stage of work was a comparative analysis of the results of simulation and real tests. The CFD simulation studies of air flow was conducted using the Star CD - Star Pro 3.2 software. The design of virtual model was made using the Catia v5 software. Apart from the objective to obtain advanced aviation propulsion system, all of the tests and modifications of 3D structures were also aimed at achieving high efficiency of this device while maintaining the ability to generate high value of overpressures. This was possible only in case of a large mass flow rate of air. All these aspects have been possible to verify using CFD methods for observing the flow of the working medium in the tested model. During the simulation tests, the distribution and size of pressure and velocity vectors were analyzed. Simulations were made with different boundary conditions (supply air pressure), but with a fixed external conditions (ambient temp., ambient pressure, etc.). The maximum value of obtained overpressure is 2 kPa. This value is too low to exploit the power of this device for the individual transport vehicle. Both the simulation model and real object shows a linear dependence of the overpressure values obtained from the different geometrical parameters of three-dimensional structures. Application of computational software greatly simplifies and streamlines the design and simulation capabilities. This work has been financed by the Polish Ministry of Science and Higher Education.Keywords: aviation propulsion, CFD, 3d structure, aerodynamic drag
Procedia PDF Downloads 3116109 Modeling and Design of Rectenna for Low Power Medical Implants
Authors: Madhav Pant, Khem N. Poudel
Abstract:
Wireless power transfer is continuously becoming more powerful and compact in medical implantable devices and the wide range of applications. A rectenna is designed for wireless power transfer technique that can be applied to medical implant devices. The experiment is performed using ANSYS HFSS, a full wave electromagnetic simulation. The dipole antenna combinations operating at 2.4 GHz are used for wireless power transfer and the maximum DC voltage reception by the implant considering International Commission on Non-Ionizing Radiation Protection (ICNIRP) regulation. The power receiving dipole antenna is placed inside the cylindrical geometry having the similar properties of the human body at the frequency of 2.4 GHz. Our design can provide the power at the depth of 5 mm skin and 5mm of bone for the implant. The voltage doubler/quadrupler rectifier in ANSYS Simplorer is used to calculate the exact DC current utilized by implant inside the human body. The qualitative design and analysis of this wireless power transfer method could also be used for other biomedical implants systems such as cardiac pacemaker, insulin pump, and retinal implants.Keywords: dipole antenna, medical implants, wireless power transfer, rectifier
Procedia PDF Downloads 172