Search results for: healthcare data security
25994 Sustainable Energy Supply through the Microgrid Concept: A Case Study of University of Nigeria, Nsukka
Authors: Christian Ndubisi Madu, Benjamin C. Ozumba, Ifeanyi E. Madu, Valentine E. Nnadi, Ikenna C. Ezeasor
Abstract:
The ability to generate power and achieve energy security is one of the driving forces behind the emerging ‘microgrid’ concept. Traditional power supply often operates with centralized infrastructure for generating, transmitting and distributing electricity. The inefficiency and the incessant power outages associated with the centralized power supply system in Nigeria has alienated many users who frequently turn to electric power generator sets to power their homes and offices. Such acts are unsustainable and lead to increase in the use of fossil fuels, generation of carbon dioxide emissions and other gases, and noise pollution. They also pose significant risks as they entail random purchases and storage of gasolines which are fire hazards. It is therefore important that organizations rethink their relationships to centralized power suppliers in other to improve energy accessibility and security. This study explores the energy planning processes and learning taking place at the University of Nigeria Enugu Campus as the school lead microgrid feasibility studies in its community. There is need to develop community partners to deal with the issue of energy efficiency and also to create a strategic alliance to confront political, regulatory and economic barriers to locally-based energy planning. Community-based microgrid can help to reduce the cost of adoption and diversify risks. This study offers insights into the ways in which microgrids can further democratize energy planning, procurement, and access, while simultaneously promoting efficiency and sustainability.Keywords: microgrid, energy efficiency, sustainability, energy security
Procedia PDF Downloads 37625993 Enhancing Patient Outcomes Through Quality Improvement: Reducing Contamination Rates in Karyotyping Samples via Effective Audits and Staff Engagement
Authors: Rofaida Ashour
Abstract:
This study discusses the implementation of quality improvement initiatives aimed at reducing contamination rates in cultured karyotyping samples. The primary objective was to enhance patient outcomes through systematic audits and targeted staff engagement. Recognizing the critical impact of sample integrity on diagnostic accuracy, a thorough analysis was conducted to identify the root causes of contamination. The project involved two audit cycles, which facilitated a comprehensive assessment of adherence to local protocols. Key issues identified included lapses in the use of personal protective equipment (PPE) and inadequate awareness of proper sample handling procedures among staff. To address these challenges, a multi-faceted approach was adopted. Firstly, a presentation was delivered to the laboratory team emphasizing the significance of strict adherence to PPE guidelines during the collection and handling of samples. This session aimed to raise awareness and foster a culture of safety within the unit. Additionally, informative posters illustrating the correct procedures were strategically placed around the laboratory to serve as ongoing visual reminders for staff. Recognizing the heightened risk associated with patients exhibiting fever or signs of infection, special measures were introduced to manage their sample collection. These proactive strategies were designed to minimize the likelihood of introducing contaminated samples into the culture process. The results of the audits demonstrated a significant reduction in contamination rates, underscoring the effectiveness of the interventions. This experience reinforced the importance of continuous quality improvement in healthcare settings, particularly in ensuring the delivery of high-quality, safe, and efficient services. Conducting regular audits not only provided valuable insights into operational practices but also highlighted the critical role of active team engagement and a data-driven approach in decision-making. Effective communication and collaboration among team members emerged as essential components for the success of quality improvement initiatives.Keywords: quality improvement, contamination rates, karyotyping samples, healthcare protocols, staff engagement
Procedia PDF Downloads 1625992 Climate Change Vulnerability and Agrarian Communities: Insights from the Composite Vulnerability Index of Indian States of Andhra Pradesh and Karnataka
Authors: G. Sridevi, Amalendu Jyotishi, Sushanta Mahapatra, G. Jagadeesh, Satyasiba Bedamatta
Abstract:
Climate change is a main challenge for agriculture, food security and rural livelihoods for millions of people in India. Agriculture is the sector most vulnerable to climate change due to its high dependence on climate and weather conditions. Among India’s population of more than one billion people, about 68% are directly or indirectly involved in the agricultural sector. This sector is particularly vulnerable to present-day climate variability. In this contest this paper examines the Socio-economic and climate analytical study of the vulnerability index in Indian states of Andhra Pradesh and Karnataka. Using secondary data; it examines the vulnerability through five different sub-indicator of socio-demographic, agriculture, occupational, common property resource (CPR), and climate in respective states among different districts. Data used in this paper has taken from different sources, like census in India 2011, Directorate of Economics and Statistics of respective states governments. Rainfall data was collected from the India Meteorological Department (IMD). In order to capture the vulnerability from two different states the composite vulnerability index (CVI) was developed and used. This indicates the vulnerability situation of different districts under two states. The study finds that Adilabad district in Andhra Pradesh and Chamarajanagar in Karnataka had highest level of vulnerability while Hyderabad and Bangalore in respective states have least level of vulnerability.Keywords: vulnerability, agriculture, climate change, global warming
Procedia PDF Downloads 45925991 Barriers to Job Localization Policy in Private Sector: Case Study from Oman
Authors: Yahya Al Nahdi
Abstract:
Even though efforts to increase the participation of nationals in the workforce have been in place for more than a decade in the Sultanate of Oman, the results are not impressive. Citizens’ workforce participation – it is argued in the literature – is hindered by institutional, as well as attitudinal concerns. The purpose of this study was to determine barriers to Omanization (employment of Omani nationals) in the private sector as perceived by the senior managers in government and private sector. Data were collected predominantly through in-depth, semi-structured interviews with managers who directly deal with Omanization policies from both the public and private sector. Results from the data analysis have shown that the majority of participants acknowledged a work preference in the movement (public sector). The private sector employees' compensation and benefits package was perceived to be less attractive than that offered in the government (public sector). The negative perceptions (stereotypes) shared by expatriates regarding work attitudes and competencies of citizens in the local labour market was also overwhelmingly perceived as a major hindrance. Furthermore, institutional issues such as, ineffectiveness of rules and regulation regarding Omanization, inappropriate quota system and lack of public awareness towards private sector’s jobs, are also perceived problematic to successful Omanization. Finally, results from the data analysis were used in recommending strategies for potential consideration in the pursuit of a successful Omanization programme.Keywords: localization, job security, labour force structure, Omanization, private sector, public sector
Procedia PDF Downloads 39925990 Report of Candida Auris: An Emerging Fungal Pathogen in a Tertiary Healthcare Facility in Ekiti State, Nigeria
Authors: David Oluwole Moses, Odeyemi Adebowale Toba, Olawale Adetunji Kola
Abstract:
Candida auris, an emerging fungus, has been reported in more than 30 countries around the world since its first detection in 2009. Due to its several virulence factors, resistance to antifungals, and persistence in hospital settings, Candida auris has been reported to cause treatment-failure infections. This study was therefore carried out to determine the incidence of Candida auris in a tertiary hospital in Ekiti State, Nigeria. In this study, a total of 115 samples were screened for Candida species using cultural and molecular methods. The carriage of virulence factors and antifungal resistance among C. auris was detected using standard microbiological methods. Candida species isolated from the samples were 15 (30.0%) in clinical samples and 22 (33.85%) in hospital equipment screened. Non-albicans Candida accounted for 3 (20%) and 8 (36.36%) among the isolates from the clinical samples and equipment, respectively. Only five of the non-albicans Candida isolates were C. auris. All the isolates produced biofilm, gelatinase, and hemolysin, while none produced germ tubes. Two of the isolates were resistant to all the antifungals tested. Also, all the isolates were resistant to fluconazole and itraconazole. Nystatin appeared to be the most effective among the tested antifungals. The isolation of Candida auris is being reported for the second time in Nigeria, further confirming that the fungus has spread beyond Lagos and Ibadan, where it was first reported. The extent of the spread of the nosocomial fungus needed to be further investigated and curtailed in Nigeria before its outbreak in healthcare facilities.Keywords: candida auris, virulence factors, antifungals, pathogen, hospital, infection
Procedia PDF Downloads 5125989 A Study on Personnel Commitment Factors in Hafes Hospital
Authors: Farzaneh Bayat
Abstract:
Successful and effective presence in regional and global markets along with optimal use of available utilities and proper utilization of new sources for offering desirable services based on customer satisfaction is inevitable. Commitment has a significant role in offering optimal services. Offering high quality job and desirable services to the customers are personnel’s commitment. Thus, Shiraz Chamran Hospital which is affiliated with Shiraz Medical School and is one of the orthopedic poles in southern Iran was studied. This hospital has 750 personnel and physicians which a sample of 200 of them were chosen as the statistic society for a 5 month period from June to November 2009. Main variables in this decision are: responsibility and responsiveness, job security, team work, task autonomy, gradation opportunity, information sharing, payments and commitment. The study approach is descriptive-correlative. With applied and segmental nature of the tests and statistic analysis, the 7 hypotheses were approved with 95% of certainty.Keywords: commitment, information sharing, responsibility and responsiveness, job security, task autonomy
Procedia PDF Downloads 34225988 A Review on Big Data Movement with Different Approaches
Authors: Nay Myo Sandar
Abstract:
With the growth of technologies and applications, a large amount of data has been producing at increasing rate from various resources such as social media networks, sensor devices, and other information serving devices. This large collection of massive, complex and exponential growth of dataset is called big data. The traditional database systems cannot store and process such data due to large and complexity. Consequently, cloud computing is a potential solution for data storage and processing since it can provide a pool of resources for servers and storage. However, moving large amount of data to and from is a challenging issue since it can encounter a high latency due to large data size. With respect to big data movement problem, this paper reviews the literature of previous works, discusses about research issues, finds out approaches for dealing with big data movement problem.Keywords: Big Data, Cloud Computing, Big Data Movement, Network Techniques
Procedia PDF Downloads 8825987 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography
Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou
Abstract:
Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol
Procedia PDF Downloads 27725986 Composite Distributed Generation and Transmission Expansion Planning Considering Security
Authors: Amir Lotfi, Seyed Hamid Hosseini
Abstract:
During the recent past, due to the increase of electrical energy demand and governmental resources constraints in creating additional capacity in the generation, transmission, and distribution, privatization, and restructuring in electrical industry have been considered. So, in most of the countries, different parts of electrical industry like generation, transmission, and distribution have been separated in order to create competition. Considering these changes, environmental issues, energy growth, investment of private equity in energy generation units and difficulties of transmission lines expansion, distributed generation (DG) units have been used in power systems. Moreover, reduction in the need for transmission and distribution, the increase of reliability, improvement of power quality, and reduction of power loss have caused DG to be placed in power systems. On the other hand, considering low liquidity need, private investors tend to spend their money for DGs. In this project, the main goal is to offer an algorithm for planning and placing DGs in order to reduce the need for transmission and distribution network.Keywords: planning, transmission, distributed generation, power security, power systems
Procedia PDF Downloads 48225985 Geopolitical Architecture: The Strategic Complex in Indo Pacific Region
Authors: Muzammil Dar
Abstract:
The confluence of trans-national interests and divergent approaches followed by multiple actors has surrounded the Indo-Pacific region with myriad of strategic complexes- Geo-Political, Geo-economic, and security. This paper has thus made a humble attempt to understand the Indo-Pacific strategic predicament from Asia-Pacific perspective. The portmanteau of Indo-Pacific strategic gamble has multiple actors from global powers to regional actors. On the indo-pacific waters, not only flow trade relations, but the tides of conflicts and controversies are striking these actors against each other. The alliance formation and infrastructure building has built-in threat perceptions from rivals vice-versa. The assertiveness of China as a reality and India’s ideological doctrine of peace and friendship, as well as American rebalancing against China, could be seen as clear and bright on the Indo-Pacific strategic portmanteau. ASEAN and Japan, too, have oscillating posturing in the strategic dilemma. The aim and objective of the paper are to sketch out the prospectus and prejudices of Indo-pacific strategic complex.Keywords: Indo Pacific, Asia Pacific, security and growth for all in the region, SAGAR, ASEAN China
Procedia PDF Downloads 15425984 Development of an Systematic Design in Evaluating Force-On-Force Security Exercise at Nuclear Power Plants
Authors: Seungsik Yu, Minho Kang
Abstract:
As the threat of terrorism to nuclear facilities is increasing globally after the attacks of September 11, we are striving to recognize the physical protection system and strengthen the emergency response system. Since 2015, Korea has implemented physical protection security exercise for nuclear facilities. The exercise should be carried out with full cooperation between the operator and response forces. Performance testing of the physical protection system should include appropriate exercises, for example, force-on-force exercises, to determine if the response forces can provide an effective and timely response to prevent sabotage. Significant deficiencies and actions taken should be reported as stipulated by the competent authority. The IAEA(International Atomic Energy Agency) is also preparing force-on-force exercise program documents to support exercise of member states. Currently, ROK(Republic of Korea) is implementing exercise on the force-on-force exercise evaluation system which is developed by itself for the nuclear power plant, and it is necessary to establish the exercise procedure considering the use of the force-on-force exercise evaluation system. The purpose of this study is to establish the work procedures of the three major organizations related to the force-on-force exercise of nuclear power plants in ROK, which conduct exercise using force-on-force exercise evaluation system. The three major organizations are composed of licensee, KINAC (Korea Institute of Nuclear Nonproliferation and Control), and the NSSC(Nuclear Safety and Security Commission). Major activities are as follows. First, the licensee establishes and conducts an exercise plan, and when recommendations are derived from the result of the exercise, it prepares and carries out a force-on-force result report including a plan for implementation of the recommendations. Other detailed tasks include consultation with surrounding units for adversary, interviews with exercise participants, support for document evaluation, and self-training to improve the familiarity of the MILES (Multiple Integrated Laser Engagement System). Second, KINAC establishes a force-on-force exercise plan review report and reviews the force-on-force exercise plan report established by licensee. KINAC evaluate force-on-force exercise using exercise evaluation system and prepare training evaluation report. Other detailed tasks include MILES training, adversary consultation, management of exercise evaluation systems, and analysis of exercise evaluation results. Finally, the NSSC decides whether or not to approve the force-on-force exercise and makes a correction request to the nuclear facility based on the exercise results. The most important part of ROK's force-on-force exercise system is the analysis through the exercise evaluation system implemented by KINAC after the exercise. The analytical method proceeds in the order of collecting data from the exercise evaluation system and analyzing the collected data. The exercise application process of the exercise evaluation system introduced in ROK in 2016 will be concretely set up, and a system will be established to provide objective and consistent conclusions between exercise sessions. Based on the conclusions drawn up, the ultimate goal is to complement the physical protection system of licensee so that the system makes licensee respond effectively and timely against sabotage or unauthorized removal of nuclear materials.Keywords: Force-on-Force exercise, nuclear power plant, physical protection, sabotage, unauthorized removal
Procedia PDF Downloads 14425983 Development of a Telemedical Network Supporting an Automated Flow Cytometric Analysis for the Clinical Follow-up of Leukaemia
Authors: Claude Takenga, Rolf-Dietrich Berndt, Erling Si, Markus Diem, Guohui Qiao, Melanie Gau, Michael Brandstoetter, Martin Kampel, Michael Dworzak
Abstract:
In patients with acute lymphoblastic leukaemia (ALL), treatment response is increasingly evaluated with minimal residual disease (MRD) analyses. Flow Cytometry (FCM) is a fast and sensitive method to detect MRD. However, the interpretation of these multi-parametric data requires intensive operator training and experience. This paper presents a pipeline-software, as a ready-to-use FCM-based MRD-assessment tool for the daily clinical practice for patients with ALL. The new tool increases accuracy in assessment of FCM-MRD in samples which are difficult to analyse by conventional operator-based gating since computer-aided analysis potentially has a superior resolution due to utilization of the whole multi-parametric FCM-data space at once instead of step-wise, two-dimensional plot-based visualization. The system developed as a telemedical network reduces the work-load and lab-costs, staff-time needed for training, continuous quality control, operator-based data interpretation. It allows dissemination of automated FCM-MRD analysis to medical centres which have no established expertise for the benefit of an even larger community of diseased children worldwide. We established a telemedical network system for analysis and clinical follow-up and treatment monitoring of Leukaemia. The system is scalable and adapted to link several centres and laboratories worldwide.Keywords: data security, flow cytometry, leukaemia, telematics platform, telemedicine
Procedia PDF Downloads 98825982 Multi-dimensional Approach to Resilience and Support in Advanced School-based Mental Health Service Delivery (MARS-SMHSD) Framework Development for Low-Resource Areas
Authors: Wan You Ning
Abstract:
Addressing the rising prevalence of mental health issues among youths, the Multi-dimensional Approach to Resilience and Support in Advanced School-based Mental Health Service Delivery (MARS-ASMHSD) framework proposes the implementation of advanced mental health services in low-resource areas to further instil mental health resilience among students in a school-based setting. Recognizing the unsustainability of direct service delivery due to rapidly growing demands and costs, the MARS-ASMHSD framework endorses the deinstitutionalization of mental healthcare and explores a tiered, multi-dimensional approach in mental healthcare provision, establishing advanced school-based mental health service delivery. The framework is developed based on sustainable and credible evidence-based practices and modifications of existing mental health service deliveries in Asia, including Singapore, Thailand, Malaysia, Japan, and Taiwan. Dissemination of the framework model for implementation will enable a more progressive and advanced school-based mental health service delivery in low-resource areas. Through the evaluation of the mental health landscape and the role of stakeholders in the respective countries, the paper concludes with a multi-dimensional framework model for implementation in low-resource areas. A mixed-method independent research study is conducted to facilitate the framework's development.Keywords: mental health, youths, school-based services, framework development
Procedia PDF Downloads 4925981 A Study on 5-11 Year-Old Children's Level of Knowledge about Personal Safety and Protection from Social Dangers
Authors: Özden Kuşcu, Yağmur Kuşcu, Zeynep Çetintaş, S. Sunay Yildirim Doğru
Abstract:
The purpose of this work is to evaluate the effect of the subjects “personal safety” and “protection from dangers” included in primary school curriculum on the students’ levels of knowledge about safety and protection from social dangers. The study group included 469 students between 5–11 years old with 231 preschoolers and 238 primary school students and their parents and teachers. Instruments used to collect data were “Personal Safety Interview Form” for children, “Parent Interview Form” and “Teacher Interview Form”. Forms included 15 open-ended questions about personal safety. The researchers collected the research data through one-on-one interviews with children. Results of the study revealed that preschoolers and 1st, 2nd, and 3rd graders did not know their home addresses and telephone numbers and their families were not aware of that. The study also showed that those who had this information were unsure as to who to share this information with. Accordingly, more should be done to increase the levels of knowledge of preschoolers and 1st, 2nd, and 3rd graders about personal safety and protection from dangers.Keywords: security, social danger, elementary school, preschool
Procedia PDF Downloads 45925980 Migration, Accessing Health Services and Mental Health Outcomes: Evidence From Microdata Analysis
Authors: Suzan Odabasi
Abstract:
Suicide attempts and mental health problems among immigrants have been increasing and have become important public health concerns during the last century. Immigrants may face more difficulties in society because of social conflict, language barriers, inadequate social support, socioeconomic problems, and delay in accessing help. The limited number of research has shown that: first-generation migrants may be at higher risk of mental disorders and a higher prevalence of suicide attempts. The main aim of the proposed work is to identify to what degree each of these pressures is causing higher suicides currently observed. In addition, a comparison will be conducted between females and males and also rural and urban areas for which recent data are available. Specifically, this study investigates how accessing mental health services, the uninsured population rate, socioeconomic factors, and being an immigrant affect Turkish immigrants’ mental health and suicide attempts.Keywords: access to healthcare, immigration, health economics, mental health economics
Procedia PDF Downloads 10925979 Application to Monitor the Citizens for Corona and Get Medical Aids or Assistance from Hospitals
Authors: Vathsala Kaluarachchi, Oshani Wimalarathna, Charith Vandebona, Gayani Chandrarathna, Lakmal Rupasinghe, Windhya Rankothge
Abstract:
It is the fundamental function of a monitoring system to allow users to collect and process data. A worldwide threat, the corona outbreak has wreaked havoc in Sri Lanka, and the situation has gotten out of hand. Since the epidemic, the Sri Lankan government has been unable to establish a systematic system for monitoring corona patients and providing emergency care in the event of an outbreak. Most patients have been held at home because of the high number of patients reported in the nation, but they do not yet have access to a functioning medical system. It has resulted in an increase in the number of patients who have been left untreated because of a lack of medical care. The absence of competent medical monitoring is the biggest cause of mortality for many people nowadays, according to our survey. As a result, a smartphone app for analyzing the patient's state and determining whether they should be hospitalized will be developed. Using the data supplied, we are aiming to send an alarm letter or SMS to the hospital once the system recognizes them. Since we know what those patients need and when they need it, we will put up a desktop program at the hospital to monitor their progress. Deep learning, image processing and application development, natural language processing, and blockchain management are some of the components of the research solution. The purpose of this research paper is to introduce a mechanism to connect hospitals and patients even when they are physically apart. Further data security and user-friendliness are enhanced through blockchain and NLP.Keywords: blockchain, deep learning, NLP, monitoring system
Procedia PDF Downloads 13425978 An Experimental Machine Learning Analysis on Adaptive Thermal Comfort and Energy Management in Hospitals
Authors: Ibrahim Khan, Waqas Khalid
Abstract:
The Healthcare sector is known to consume a higher proportion of total energy consumption in the HVAC market owing to an excessive cooling and heating requirement in maintaining human thermal comfort in indoor conditions, catering to patients undergoing treatment in hospital wards, rooms, and intensive care units. The indoor thermal comfort conditions in selected hospitals of Islamabad, Pakistan, were measured on a real-time basis with the collection of first-hand experimental data using calibrated sensors measuring Ambient Temperature, Wet Bulb Globe Temperature, Relative Humidity, Air Velocity, Light Intensity and CO2 levels. The Experimental data recorded was analyzed in conjunction with the Thermal Comfort Questionnaire Surveys, where the participants, including patients, doctors, nurses, and hospital staff, were assessed based on their thermal sensation, acceptability, preference, and comfort responses. The Recorded Dataset, including experimental and survey-based responses, was further analyzed in the development of a correlation between operative temperature, operative relative humidity, and other measured operative parameters with the predicted mean vote and adaptive predicted mean vote, with the adaptive temperature and adaptive relative humidity estimated using the seasonal data set gathered for both summer – hot and dry, and hot and humid as well as winter – cold and dry, and cold and humid climate conditions. The Machine Learning Logistic Regression Algorithm was incorporated to train the operative experimental data parameters and develop a correlation between patient sensations and the thermal environmental parameters for which a new ML-based adaptive thermal comfort model was proposed and developed in our study. Finally, the accuracy of our model was determined using the K-fold cross-validation.Keywords: predicted mean vote, thermal comfort, energy management, logistic regression, machine learning
Procedia PDF Downloads 6525977 Mothers' Satisfaction with Emergency Care When Their Child Has an Autism Spectrum Disorder
Authors: Merav Ben Natan, Heba Igbarin, Arwa Watted
Abstract:
Introduction: The rising prevalence of autism spectrum disorders (ASD) has heightened the need to understand the challenges faced by children with ASD and their families in emergency departments (EDs). Children with ASD often experience additional health issues and heightened anxiety in the chaotic ED environment, which can impact their care and parental satisfaction. Purpose: This study aimed to examine factors identified by mothers as affecting their satisfaction with the care provided to their children in the ED, among mothers of children with ASD in comparison to mothers of children without ASD. Design and methods: In this correlational quantitative study, 128 Israeli mothers – 59 (46%) mothers of children with ASD and 69 (54%) of children without ASD - completed an online survey based on a Ministry of Health national survey of patient experience. Results: Mothers of children with ASD expressed lower satisfaction with the care provided. The difference was particularly evident concerning waiting times for examination of the child by nurses and physicians in the ED, whether the nurses were attentive and responsive to the mother's questions and concerns, whether the ED staff demonstrated coordination and cooperation with regard to medical care of the child, and whether work in the ED was conducted in an orderly and organized manner. The presence of communication difficulties in children predicted mothers' satisfaction with care. Conclusions: These findings suggest that certain needs of mothers and/or their children with ASD do not receive an appropriate response in the ED. Practice implications: It is important to raise the awareness of healthcare providers in EDs regarding the needs of children with ASD and their parents, especially children with communication difficulties. Strategies should be implemented to improve the experience of children with ASD and their parents in the ED.Keywords: autism spectrum disorder, emergency department, parental satisfaction, healthcare challenges
Procedia PDF Downloads 3325976 Utilization of Secure Wireless Networks as Environment for Learning and Teaching in Higher Education
Authors: Mohammed A. M. Ibrahim
Abstract:
This paper investigate the utilization of wire and wireless networks to be platform for distributed educational monitoring system. Universities in developing countries suffer from a lot of shortages(staff, equipment, and finical budget) and optimal utilization of the wire and wireless network, so universities can mitigate some of the mentioned problems and avoid the problems that maybe humble the education processes in many universities by using our implementation of the examinations system as a test-bed to utilize the network as a solution to the shortages for academic staff in Taiz University. This paper selects a two areas first one quizzes activities is only a test bed application for wireless network learning environment system to be distributed among students. Second area is the features and the security of wireless, our tested application implemented in a promising area which is the use of WLAN in higher education for leering environment.Keywords: networking wire and wireless technology, wireless network security, distributed computing, algorithm, encryption and decryption
Procedia PDF Downloads 33925975 South Africa and U.S. AFRICOM: Reflections on a Lukewarm Relationship
Authors: Theo Neethling
Abstract:
The United States Africa Command (AFRICOM) was established in 2007 as a military and diplomatic entity and is intended to assist African states and military actors to address their security needs. At the same time, AFRICOM is clearly an extension of US strategic interests on the African continent. The challenge for the US Department of Defence is to project AFRICOM as a cooperative and willing partner. This implies a partner that offers needed services and resources, and supports African security and military priorities with no presumption of having a privileged role in defining the African future. However, one of AFRICOM’s main challenges relates to the point that it has not been able to secure a firm partnership with South Africa as a key player on the continent: South Africa has continuously taken a lukewarm, if not cold, approach towards AFRICOM since its formation. The main aim of this article is to examine and discuss South Africa’s political-military relations with AFRICOM and to assess the underlying reasons currently inhibiting AFRICOM from achieving a fully productive relationship with the South African government.Keywords: AFRICOM, South African foreign policy, US interests, defence capabilities in Africa, US-Africa relations
Procedia PDF Downloads 30725974 Providing a Secure Hybrid Method for Graphical Password Authentication to Prevent Shoulder Surfing, Smudge and Brute Force Attack
Authors: Faraji Sepideh
Abstract:
Nowadays, purchase rate of the smart device is increasing and user authentication is one of the important issues in information security. Alphanumeric strong passwords are difficult to memorize and also owners write them down on papers or save them in a computer file. In addition, text password has its own flaws and is vulnerable to attacks. Graphical password can be used as an alternative to alphanumeric password that users choose images as a password. This type of password is easier to use and memorize and also more secure from pervious password types. In this paper we have designed a more secure graphical password system to prevent shoulder surfing, smudge and brute force attack. This scheme is a combination of two types of graphical passwords recognition based and Cued recall based. Evaluation the usability and security of our proposed scheme have been explained in conclusion part.Keywords: brute force attack, graphical password, shoulder surfing attack, smudge attack
Procedia PDF Downloads 16425973 Anomalies of Visual Perceptual Skills Amongst School Children in Foundation Phase in Olievenhoutbosch, Gauteng Province, South Africa
Authors: Maria Bonolo Mathevula
Abstract:
Background: Children are important members of communities playing major role in the future of any given country (Pera, Fails, Gelsomini, &Garzotto, 2018). Visual Perceptual Skills (VPSs) in children are important health aspect of early childhood development through the Foundation Phases in school. Subsequently, children should undergo visual screening before commencement of schooling for early diagnosis ofVPSs anomalies because the primary role of VPSs is to capacitate children with academic performance in general. Aim : The aim of this study was to determine the anomalies of visual VPSs amongst school children in Foundation Phase. The study’s objectives were to determine the prevalence of VPSs anomalies amongst school children in Foundation Phase; Determine the relationship between children’s academic and VPSs anomalies; and to investigate the relationship between VPSs anomalies and refractive error. Methodology: This study was a mixed method whereby triangulated qualitative (interviews) and quantitative (questionnaire and clinical data) was used. This was, therefore, descriptive by nature. The study’s target population was school children in Foundation Phase. The study followed purposive sampling method. School children in Foundation Phase were purposively sampled to form part of this study provided their parents have given a signed the consent. Data was collected by the use of standardized interviews; questionnaire; clinical data card, and TVPS standard data card. Results: Although the study is still ongoing, the preliminary study outcome based on data collected from one of the Foundation Phases have suggested the following:While VPSs anomalies is not prevalent, it, however, have indirect relationship with children’s academic performance in Foundation phase; Notably, VPSs anomalies and refractive error are directly related since majority of children with refractive error, specifically compound hyperopic astigmatism, failed most subtests of TVPS standard tests. Conclusion: Based on the study’s preliminary findings, it was clear that optometrists still have a lot to do in as far as researching on VPSs is concerned. Furthermore, the researcher recommends that optometrist, as the primary healthcare professionals, should also conduct the school-readiness pre-assessment on children before commencement of their grades in Foundation phase.Keywords: foundation phase, visual perceptual skills, school children, refractive error
Procedia PDF Downloads 10425972 Big Data and Health: An Australian Perspective Which Highlights the Importance of Data Linkage to Support Health Research at a National Level
Authors: James Semmens, James Boyd, Anna Ferrante, Katrina Spilsbury, Sean Randall, Adrian Brown
Abstract:
‘Big data’ is a relatively new concept that describes data so large and complex that it exceeds the storage or computing capacity of most systems to perform timely and accurate analyses. Health services generate large amounts of data from a wide variety of sources such as administrative records, electronic health records, health insurance claims, and even smart phone health applications. Health data is viewed in Australia and internationally as highly sensitive. Strict ethical requirements must be met for the use of health data to support health research. These requirements differ markedly from those imposed on data use from industry or other government sectors and may have the impact of reducing the capacity of health data to be incorporated into the real time demands of the Big Data environment. This ‘big data revolution’ is increasingly supported by national governments, who have invested significant funds into initiatives designed to develop and capitalize on big data and methods for data integration using record linkage. The benefits to health following research using linked administrative data are recognised internationally and by the Australian Government through the National Collaborative Research Infrastructure Strategy Roadmap, which outlined a multi-million dollar investment strategy to develop national record linkage capabilities. This led to the establishment of the Population Health Research Network (PHRN) to coordinate and champion this initiative. The purpose of the PHRN was to establish record linkage units in all Australian states, to support the implementation of secure data delivery and remote access laboratories for researchers, and to develop the Centre for Data Linkage for the linkage of national and cross-jurisdictional data. The Centre for Data Linkage has been established within Curtin University in Western Australia; it provides essential record linkage infrastructure necessary for large-scale, cross-jurisdictional linkage of health related data in Australia and uses a best practice ‘separation principle’ to support data privacy and security. Privacy preserving record linkage technology is also being developed to link records without the use of names to overcome important legal and privacy constraint. This paper will present the findings of the first ‘Proof of Concept’ project selected to demonstrate the effectiveness of increased record linkage capacity in supporting nationally significant health research. This project explored how cross-jurisdictional linkage can inform the nature and extent of cross-border hospital use and hospital-related deaths. The technical challenges associated with national record linkage, and the extent of cross-border population movements, were explored as part of this pioneering research project. Access to person-level data linked across jurisdictions identified geographical hot spots of cross border hospital use and hospital-related deaths in Australia. This has implications for planning of health service delivery and for longitudinal follow-up studies, particularly those involving mobile populations.Keywords: data integration, data linkage, health planning, health services research
Procedia PDF Downloads 21625971 Catastrophic Spending on Health: A Determinant of Access to Health Care by Migrant Slum Population
Authors: Saira Mehnaz, Ali Jafar Abedi, Shazia Farooq Fazli, Sakeena Mushfiq, Zulfia Khan, M. Athar Ansari
Abstract:
Introduction: Public health spending is a necessity in an underdeveloped country like India. The people are already suffering from poverty and that clubbed with out of pocket expenditure leads them to a very catastrophic situation, reducing the overall access to healthcare. Objectives: This study was designed to determine the usual source of medical care opted, the illness pattern, the expenditure incurred on illness and its source of procurement by the study population. It also intended to assess this expenditure as a determinant of access to health care. Methodology: Cities like Aligarh, which are classified as B grade cities in India are thought to be ripe sites for getting livelihood and hence are almost half filled with migrants living in urban slums. A cross sectional study was done to study the newer slum pockets. 3409 households with a population of 16,978 were studied with the help of pretested questionnaire; SPSS 20 was used for statistical analysis. Results and Conclusions: In our study, we found that almost all the households suffered from catastrophic health expenditure. The study population, which was already vulnerable owing to their low socio-economic and migrant status was further being forced with into poverty and indebtedness on account of expenditure on illness. This lead to a significant decrease in access to health. National health financing systems should be designed to protect households from financial catastrophe, by reducing out-of-pocket spending.Keywords: access to healthcare, catastrophic health expenditure, new urban slums, out of pocket expenditure
Procedia PDF Downloads 21125970 'Sea Power: Concept, Influence and Securitization'; the Nigerian Navy's Role in a Developing State like Nigeria
Authors: William Abiodun Duyile
Abstract:
It is common knowledge that marine food has always been found from the sea, energy can also be found underneath and, to a growing extent; other mineral resources have come from the sea spaces. It is the importance of the sea and the sea lines of communication to littoral nations that has made concepts such as sea power, naval power, etc., significant to them. The study relied on documentary data. The documentary data were sourced from government annual departmental reports, newspapers and correspondence. The secondary sources used were subjected to internal and external criticism for authentication, and then to textual and contextual analyses. The study found that the differential level of seamanship amongst states defined their relationship. It was sea power that gave some states an edge over the others. The study proves that over the ages sea power has been core to the development of States or Empires. The study found that the Nigerian Navy was centre to Nigeria’s conquest of the littoral areas of Biafra, like Bonny, Port-Harcourt, and Calabar; it was also an important turning point of the Nigerian civil war since by it Biafra became landlocked. The research was able to identify succinctly the Nigerian Navy’s contribution to the security and development of the Nigerian State.Keywords: sea power, naval power, land locked states, warship
Procedia PDF Downloads 14125969 Use Cloud-Based Watson Deep Learning Platform to Train Models Faster and More Accurate
Authors: Susan Diamond
Abstract:
Machine Learning workloads have traditionally been run in high-performance computing (HPC) environments, where users log in to dedicated machines and utilize the attached GPUs to run training jobs on huge datasets. Training of large neural network models is very resource intensive, and even after exploiting parallelism and accelerators such as GPUs, a single training job can still take days. Consequently, the cost of hardware is a barrier to entry. Even when upfront cost is not a concern, the lead time to set up such an HPC environment takes months from acquiring hardware to set up the hardware with the right set of firmware, software installed and configured. Furthermore, scalability is hard to achieve in a rigid traditional lab environment. Therefore, it is slow to react to the dynamic change in the artificial intelligent industry. Watson Deep Learning as a service, a cloud-based deep learning platform that mitigates the long lead time and high upfront investment in hardware. It enables robust and scalable sharing of resources among the teams in an organization. It is designed for on-demand cloud environments. Providing a similar user experience in a multi-tenant cloud environment comes with its own unique challenges regarding fault tolerance, performance, and security. Watson Deep Learning as a service tackles these challenges and present a deep learning stack for the cloud environments in a secure, scalable and fault-tolerant manner. It supports a wide range of deep-learning frameworks such as Tensorflow, PyTorch, Caffe, Torch, Theano, and MXNet etc. These frameworks reduce the effort and skillset required to design, train, and use deep learning models. Deep Learning as a service is used at IBM by AI researchers in areas including machine translation, computer vision, and healthcare.Keywords: deep learning, machine learning, cognitive computing, model training
Procedia PDF Downloads 21025968 Branding Tourism Destinations; The Trending Initiatives for Edifice Image Choices of Foreign Policy
Authors: Mehtab Alam, Mudiarasan Kuppusamy, Puvaneswaran Kunaserkaran
Abstract:
The purpose of this paper is to bridge the gap and complete the relationship between tourism destinations and image branding as a choice of edifice foreign policy. Such options became a crucial component for individuals interested in leisure and travel activities. The destination management factors have been evaluated and analyzed using the primary and secondary data in a mixed-methods approach (quantitative sample of 384 and qualitative 8 semi-structured interviews at saturated point). The study chose the Environmental Management Accounting (EMA) and Image Restoration (IR) theories, along with a schematic diagram and an analytical framework supported by NVivo software 12, for two locations in Abbottabad, KPK, Pakistan: Shimla Hill and Thandiani. This incorporates the use of PLS-SEM model for assessing validity of data while SPSS for data screening of descriptive statistics. The results show that destination management's promotion of tourism has significantly improved Pakistan's state image. The use of institutional setup, environmental drivers, immigration, security, and hospitality as well as recreational initiatives on destination management is encouraged. The practical ramifications direct the heads of tourism projects, diplomats, directors, and policymakers to complete destination projects before inviting people to Pakistan. The paper provides the extent of knowledge for academic tourism circles to use tourism destinations as brand ambassadors.Keywords: tourism, management, state image, foreign policy, image branding
Procedia PDF Downloads 7025967 Ethical, Legal and Societal Aspects of Unmanned Aircraft in Defence
Authors: Henning Lahmann, Benjamyn I. Scott, Bart Custers
Abstract:
Suboptimal adoption of AI in defence organisations carries risks for the protection of the freedom, safety, and security of society. Despite the vast opportunities that defence AI-technology presents, there are also a variety of ethical, legal, and societal concerns. To ensure the successful use of AI technology by the military, ethical, legal, and societal aspects (ELSA) need to be considered, and their concerns continuously addressed at all levels. This includes ELSA considerations during the design, manufacturing and maintenance of AI-based systems, as well as its utilisation via appropriate military doctrine and training. This raises the question how defence organisations can remain strategically competitive and at the edge of military innovation, while respecting the values of its citizens. This paper will explain the set-up and share preliminary results of a 4-year research project commissioned by the National Research Council in the Netherlands on the ethical, legal, and societal aspects of AI in defence. The project plans to develop a future-proof, independent, and consultative ecosystem for the responsible use of AI in the defence domain. In order to achieve this, the lab shall devise a context-dependent methodology that focuses on the ‘analysis’, ‘design’ and ‘evaluation’ of ELSA of AI-based applications within the military context, which include inter alia unmanned aircraft. This is bolstered as the Lab also recognises and complements the existing methods in regards to human-machine teaming, explainable algorithms, and value-sensitive design. Such methods will be modified for the military context and applied to pertinent case-studies. These case-studies include, among others, the application of autonomous robots (incl. semi- autonomous) and AI-based methods against cognitive warfare. As the perception of the application of AI in the military context, by both society and defence personnel, is important, the Lab will study how these perceptions evolve and vary in different contexts. Furthermore, the Lab will monitor – as they may influence people’s perception – developments in the global technological, military and societal spheres. Although the emphasis of the research project is on different forms of AI in defence, it focuses on several case studies. One of these case studies is on unmanned aircraft, which will also be the focus of the paper. Hence, ethical, legal, and societal aspects of unmanned aircraft in the defence domain will be discussed in detail, including but not limited to privacy issues. Typical other issues concern security (for people, objects, data or other aircraft), privacy (sensitive data, hindrance, annoyance, data collection, function creep), chilling effects, PlayStation mentality, and PTSD.Keywords: autonomous weapon systems, unmanned aircraft, human-machine teaming, meaningful human control, value-sensitive design
Procedia PDF Downloads 9325966 Analyzing Restrictive Refugee Policies in Japan and the United Kingdom: An Examination of Fundamental Causes and Implications
Authors: Shalini Shawari Matharage
Abstract:
The worldwide refugee challenge has arisen as a critical concern, with millions of individuals fleeing their home countries owing to conflict, persecution, and human rights violations. Since the establishment of an international framework in 1951 for tackling the humanitarian needs of refugees and asylum seekers, many developed and developing countries have adopted a refugee admittance framework into their national immigration policy and steadily changed their domestic legislation to assist the resettlement of refugees. However, many developed nations have put forth strict limitations on refugee admission in the midst of the continuing refugee crisis, claiming factors including national sovereignty, security of their borders, and national economy. Two such developed nations that have been restrictive on refugees is Japan and the United Kingdom. Despite their contrasting histories, migration methods, and viewpoints on diversity in modern society, the two notably developed nations have taken similar restrictive approaches in refugee policy in the recent years. This study attempts to investigate the underlying causes that led these countries to adopt strict refugee policies and how those policies have affected their compliance with international human rights responsibilities. The study employs a head-to-head methodology to examine the structural inequities in Japan and the United Kingdom's refugee policies. Using data from the UNHCR Refugee Data Finder, official government policy proposals, statements, and academic works, the study evaluates the contemporary refugee legislations, fundamental causes, and subsequent implications. The study illustrates a combination of economic, security, and demographic issues, as well as political rigidity and negative public perceptions, as major determinants of the two countries' restrictive refugee policies. The findings shed light on the restrictive actions taken by Japan and the UK, raising concerns about potential breaches in obligations to their commitments to international law and human rights obligations. Understanding the underlying issues influencing these policies allows lawmakers and activists to establish more compassionate refugee policies that adhere to international human rights and protect vulnerable individuals fleeing persecution. Ultimately, this study aims to contribute to the development of sensible refugee policies that uphold human rights and humanitarian values.Keywords: immigration, Japan, refugee policy, united kingdom
Procedia PDF Downloads 7425965 Breaking the Barriers: Exploring the Barriers to LGBTQ+ Accessing Palliative Care and the Hospice
Authors: Emma Worley, Mhairi De Sainte Croix, Savneet Lochab, Christopher Roberts, Mark Stroud, Mo Salehan, Kevin Jones
Abstract:
Awareness about the importance of teaching about diversity at medical school is growing. In the realm of diversity includes discussion around the LGBTQ+ community. At Bristol, diversity is taught in first or second year. However, echoing and expanding that teaching throughout the curriculum is needed. This feeds into the spiral curriculum but also highlights the relevance of the topic. It is well known that some people in the LGBTQ+ community struggle the access healthcare due to previous negative experiences. In 2019, 1 in 7 LGBTQ+ people avoided seeking medical care due to fears about discrimination. If people have fears about seeking medical help, then seeking help from Palliative care when they are at their most vulnerable situation can be even harder. To improve positive healthcare situations for people who identify as LGBTQ+ needs to start with talking. Along with some of our CTAs (clinical teaching assistants) we created a teaching session to explore the barriers faced by LGBTQ+ and incorporated communication stations into this. Our plan is to run this session as a three-hour session first discussing different topics: ethnical diversity, ‘coming out’, LGBTQ+ in the older generation, transgender. This will be followed by looking more closely at the barriers to accessing the hospice. The next part of the session will encompass two or three communication scenarios hopefully prompting further discussion and reflection on ways to improve our communication. The first scenario outline is a gay man/lesbian woman with lung cancer discussing options around the hospice. The second scenario is a transgender person with female genitalia who now has cervical cancer (as was not followed up on pap smears after the change of name). The third scenario is a HIV homosexual male patient who has been admitted with dementia. He has a partner but is not married. His next of kin is down as his parents but his parents do not know about his sexuality and HIV status. It allows discussion around confidentiality as well as broaching the meaning of ‘family’ in the LGBTQ+ community. We have chosen to pitch this teaching session to Bristol Year 4 students. They will be currently doing their 6-week Palliative care block, which fits in well. Each session will have four students attend. We have been lucky enough to have two CTAs (clinical teaching assistants) who identify as LGBTQ+ offer their experiences and help. They have been able to help us with the preparation and delivery of the session. Given anecdotal evidence and stories helps to highlight the importance and relevance of this session. The aim is to increase awareness of some factors that may contribute to people who identify as LGBTQ+ having a negative healthcare experience. By starting to talk about it allows awareness and only then will we be able to start to change and improve. Our aim, if the sessions run well, is to expand these sessions to different academy hospitals. Therefore, all Bristol 4th year students would have the opportunity to take part in the teaching session. We would like to expand our portfolio of case scenarios, to address so tricker topics such as a transgender person with dementia who reverts back to a different gender. We would also like to recruit a diverse range of actors, ideally people who identify as the patient in the scenario does. For example, a transgender person acts the transgender scenario. This would give authenticity and enhance the student’s learning experience.Keywords: communication skills, healthcare barriers, LGBTQ+, palliative care
Procedia PDF Downloads 128