Search results for: healthcare data security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 27204

Search results for: healthcare data security

25434 An Interpretive Phenomenological Approach to Children’s Experience of Infidelity in Iran: Consequences and Hurts

Authors: Mehravar Javid, Stacey Dershewitz, Shohreh Hashemighoochani, Artin Yousefi

Abstract:

One of the most common reasons for destroying relationships is infidelity. This study was conducted to understand children's experience of infidelity in Iran. In this qualitative research, the interpretive phenomenological approach and theoretical (purposive) sampling method were used, and the data was saturated by conducting semi-structured interviews with eight offspring of families affected by infidelity. All interviews were audio recorded and analyzed on paper after implementation. Acceptability and homogeneity of data were confirmed by different methods. Eight main themes were identified from the participants' statements: description of the family atmosphere, lack of security and distrust, emotional reactions, behavioral reactions, worry about the future, financial problems, mother's physical-psychological state, and mother's coping strategies and offspring's proposed solutions. The children's experiences showed that in addition to causing irreparable harm to the wife, infidelity affected the whole family and caused the children to suffer crucial consequences such as emotional, behavioral, educational, and economic consequences and mistrust.

Keywords: consequences and hurt, infidelity, offspring, phenomenology, qualitative research

Procedia PDF Downloads 55
25433 Utilization of Secure Wireless Networks as Environment for Learning and Teaching in Higher Education

Authors: Mohammed A. M. Ibrahim

Abstract:

This paper investigate the utilization of wire and wireless networks to be platform for distributed educational monitoring system. Universities in developing countries suffer from a lot of shortages(staff, equipment, and finical budget) and optimal utilization of the wire and wireless network, so universities can mitigate some of the mentioned problems and avoid the problems that maybe humble the education processes in many universities by using our implementation of the examinations system as a test-bed to utilize the network as a solution to the shortages for academic staff in Taiz University. This paper selects a two areas first one quizzes activities is only a test bed application for wireless network learning environment system to be distributed among students. Second area is the features and the security of wireless, our tested application implemented in a promising area which is the use of WLAN in higher education for leering environment.

Keywords: networking wire and wireless technology, wireless network security, distributed computing, algorithm, encryption and decryption

Procedia PDF Downloads 331
25432 Report of Candida Auris: An Emerging Fungal Pathogen in a Tertiary Healthcare Facility in Ekiti State, Nigeria

Authors: David Oluwole Moses, Odeyemi Adebowale Toba, Olawale Adetunji Kola

Abstract:

Candida auris, an emerging fungus, has been reported in more than 30 countries around the world since its first detection in 2009. Due to its several virulence factors, resistance to antifungals, and persistence in hospital settings, Candida auris has been reported to cause treatment-failure infections. This study was therefore carried out to determine the incidence of Candida auris in a tertiary hospital in Ekiti State, Nigeria. In this study, a total of 115 samples were screened for Candida species using cultural and molecular methods. The carriage of virulence factors and antifungal resistance among C. auris was detected using standard microbiological methods. Candida species isolated from the samples were 15 (30.0%) in clinical samples and 22 (33.85%) in hospital equipment screened. Non-albicans Candida accounted for 3 (20%) and 8 (36.36%) among the isolates from the clinical samples and equipment, respectively. Only five of the non-albicans Candida isolates were C. auris. All the isolates produced biofilm, gelatinase, and hemolysin, while none produced germ tubes. Two of the isolates were resistant to all the antifungals tested. Also, all the isolates were resistant to fluconazole and itraconazole. Nystatin appeared to be the most effective among the tested antifungals. The isolation of Candida auris is being reported for the second time in Nigeria, further confirming that the fungus has spread beyond Lagos and Ibadan, where it was first reported. The extent of the spread of the nosocomial fungus needed to be further investigated and curtailed in Nigeria before its outbreak in healthcare facilities.

Keywords: candida auris, virulence factors, antifungals, pathogen, hospital, infection

Procedia PDF Downloads 38
25431 System Detecting Border Gateway Protocol Anomalies Using Local and Remote Data

Authors: Alicja Starczewska, Aleksander Nawrat, Krzysztof Daniec, Jarosław Homa, Kacper Hołda

Abstract:

Border Gateway Protocol is the main routing protocol that enables routing establishment between all autonomous systems, which are the basic administrative units of the internet. Due to the poor protection of BGP, it is important to use additional BGP security systems. Many solutions to this problem have been proposed over the years, but none of them have been implemented on a global scale. This article describes a system capable of building images of real-time BGP network topology in order to detect BGP anomalies. Our proposal performs a detailed analysis of BGP messages that come into local network cards supplemented by information collected by remote collectors in different localizations.

Keywords: BGP, BGP hijacking, cybersecurity, detection

Procedia PDF Downloads 70
25430 South Africa and U.S. AFRICOM: Reflections on a Lukewarm Relationship

Authors: Theo Neethling

Abstract:

The United States Africa Command (AFRICOM) was established in 2007 as a military and diplomatic entity and is intended to assist African states and military actors to address their security needs. At the same time, AFRICOM is clearly an extension of US strategic interests on the African continent. The challenge for the US Department of Defence is to project AFRICOM as a cooperative and willing partner. This implies a partner that offers needed services and resources, and supports African security and military priorities with no presumption of having a privileged role in defining the African future. However, one of AFRICOM’s main challenges relates to the point that it has not been able to secure a firm partnership with South Africa as a key player on the continent: South Africa has continuously taken a lukewarm, if not cold, approach towards AFRICOM since its formation. The main aim of this article is to examine and discuss South Africa’s political-military relations with AFRICOM and to assess the underlying reasons currently inhibiting AFRICOM from achieving a fully productive relationship with the South African government.

Keywords: AFRICOM, South African foreign policy, US interests, defence capabilities in Africa, US-Africa relations

Procedia PDF Downloads 297
25429 Student Researchers and Industry Partnerships Improve Health Management with Data Driven Decisions

Authors: Carole A. South-Winter

Abstract:

Research-based learning gives students the opportunity to experience problems that require critical thinking and idea development. The skills they gain in working through these problems 'hands-on,' develop into attributes that benefit their careers in the professional field. The partnerships developed between students and industries give advantages to both sides. The students gain knowledge and skills that will increase their likelihood of success in the future and the industries are given research on new advancements that will give them a competitive advantage in their given field of work. The future of these partnerships is dependent on the success of current programs, enabling the enhancement and improvement of the research efforts. Once more students can complete research, there will be an increase in reliability of the results for each industry. The overall goal is to continue the support for research-based learning and the partnerships formed between students and industries.

Keywords: global healthcare, industry partnerships, research-driven decisions, short-term study abroad

Procedia PDF Downloads 121
25428 Evaluation of Clinical Decision Support System in Electronic Medical Record System: A Case of Malawi National Art Electronic Medical Record System

Authors: Pachawo Bisani, Goodall Nyirenda

Abstract:

The Malawi National Antiretroviral Therapy (NART) Electronic Medical Record (EMR) system was designed and developed with guidance from the Ministry of Health through the Department of HIV and AIDS (DHA) with the aim of supporting the management of HIV patient data and reporting in high prevalence ART clinics. As of 2021, the system has been scaled up to over 206 facilities across the country. The system is integrated with the clinical decision support system (CDSS) to assist healthcare providers in making a decision about an individual patient at a particular point in time. Despite NART EMR undergoing several evaluations and assessments, little has been done to evaluate the clinical decision support system in the NART EMR system. Hence, the study aimed to evaluate the use of CDSS in the NART EMR system in Malawi. The study adopted a mixed-method approach, and data was collected through interviews, observations, and questionnaires. The study has revealed that the CDSS tools were integrated into the ART clinic workflow, making it easy for the user to use it. The study has also revealed challenges in system reliability and information accuracy. Despite the challenges, the study further revealed that the system is effective and efficient, and overall, users are satisfied with the system. The study recommends that the implementers focus more on the logic behind the clinical decision-support intervention in order to address some of the concerns and enhance the accuracy of the information supplied. The study further suggests consulting the system's actual users throughout implementation.

Keywords: clinical decision support system, electronic medical record system, usability, antiretroviral therapy

Procedia PDF Downloads 90
25427 Providing a Secure Hybrid Method for Graphical Password Authentication to Prevent Shoulder Surfing, Smudge and Brute Force Attack

Authors: Faraji Sepideh

Abstract:

Nowadays, purchase rate of the smart device is increasing and user authentication is one of the important issues in information security. Alphanumeric strong passwords are difficult to memorize and also owners write them down on papers or save them in a computer file. In addition, text password has its own flaws and is vulnerable to attacks. Graphical password can be used as an alternative to alphanumeric password that users choose images as a password. This type of password is easier to use and memorize and also more secure from pervious password types. In this paper we have designed a more secure graphical password system to prevent shoulder surfing, smudge and brute force attack. This scheme is a combination of two types of graphical passwords recognition based and Cued recall based. Evaluation the usability and security of our proposed scheme have been explained in conclusion part.

Keywords: brute force attack, graphical password, shoulder surfing attack, smudge attack

Procedia PDF Downloads 155
25426 Multi-dimensional Approach to Resilience and Support in Advanced School-based Mental Health Service Delivery (MARS-SMHSD) Framework Development for Low-Resource Areas

Authors: Wan You Ning

Abstract:

Addressing the rising prevalence of mental health issues among youths, the Multi-dimensional Approach to Resilience and Support in Advanced School-based Mental Health Service Delivery (MARS-ASMHSD) framework proposes the implementation of advanced mental health services in low-resource areas to further instil mental health resilience among students in a school-based setting. Recognizing the unsustainability of direct service delivery due to rapidly growing demands and costs, the MARS-ASMHSD framework endorses the deinstitutionalization of mental healthcare and explores a tiered, multi-dimensional approach in mental healthcare provision, establishing advanced school-based mental health service delivery. The framework is developed based on sustainable and credible evidence-based practices and modifications of existing mental health service deliveries in Asia, including Singapore, Thailand, Malaysia, Japan, and Taiwan. Dissemination of the framework model for implementation will enable a more progressive and advanced school-based mental health service delivery in low-resource areas. Through the evaluation of the mental health landscape and the role of stakeholders in the respective countries, the paper concludes with a multi-dimensional framework model for implementation in low-resource areas. A mixed-method independent research study is conducted to facilitate the framework's development.

Keywords: mental health, youths, school-based services, framework development

Procedia PDF Downloads 40
25425 Opening up Government Datasets for Big Data Analysis to Support Policy Decisions

Authors: K. Hardy, A. Maurushat

Abstract:

Policy makers are increasingly looking to make evidence-based decisions. Evidence-based decisions have historically used rigorous methodologies of empirical studies by research institutes, as well as less reliable immediate survey/polls often with limited sample sizes. As we move into the era of Big Data analytics, policy makers are looking to different methodologies to deliver reliable empirics in real-time. The question is not why did these people do this for the last 10 years, but why are these people doing this now, and if the this is undesirable, and how can we have an impact to promote change immediately. Big data analytics rely heavily on government data that has been released in to the public domain. The open data movement promises greater productivity and more efficient delivery of services; however, Australian government agencies remain reluctant to release their data to the general public. This paper considers the barriers to releasing government data as open data, and how these barriers might be overcome.

Keywords: big data, open data, productivity, data governance

Procedia PDF Downloads 362
25424 Soft Infrastructure in Tourism Development

Authors: Seetanah Boopen, Padachi Kesseven, R. Juwaheer , R. V. Sannassee, M. L. Lamport

Abstract:

This study aims primarily at investigating the importance of soft infrastructure in tourism development for the case of an island economy namely Mauritius. The study in the first place assesses the level of perceived and actual satisfaction of the present state of the different types of soft tourism infrastructure and the allied services provided by tourism stakeholders in Mauritius and address the identified gaps. In order to address the study objectives, a rigorous survey analysis among 1741 international tourists at the departure lounge of the Sir Seewoosagur International Airport of Mauritius was carried out. The respondents placed significant emphasis on the different elements of the soft infrastructure dimension, where many of the elements falling under this dimension were rated with a high mean score. In particular the visitors rated communication, both internet and telephone services, and security to be most important. Significant gap has been found in the categories of ‘Health’ and ‘Security’. This indicates that the tourists ascribe high importance to the soft infrastructure dimension. The link between the respondent profile and the key variables which influence the tourist choice of the island as a destination are found to be equally important for most of the international tourists. However, these were deemed to be more critical for tourists travelling with family members. Although the survey instrument attempted to measure any gap between on the one hand, the importance of the infrastructure dimension and on the other hand, the level of satisfaction with the infrastructure dimension, overall the results do not show any statistically significant gap among the different elements of the infrastructural dimension. The study dwells into further analysis by engaging into an econometric framework related to a Probit Model, using the data collected, to gauge the effect of soft infrastructure on tourist intention to repeat or recommend the destination. The results confirm that soft infrastructure is found to be sensible to tourists, although relatively less sensitive as compared to tourism and transport and hotel infrastructure.

Keywords: tourism development, soft infrastructure, Mauritius, hotel infrastructure

Procedia PDF Downloads 480
25423 A Review on Existing Challenges of Data Mining and Future Research Perspectives

Authors: Hema Bhardwaj, D. Srinivasa Rao

Abstract:

Technology for analysing, processing, and extracting meaningful data from enormous and complicated datasets can be termed as "big data." The technique of big data mining and big data analysis is extremely helpful for business movements such as making decisions, building organisational plans, researching the market efficiently, improving sales, etc., because typical management tools cannot handle such complicated datasets. Special computational and statistical issues, such as measurement errors, noise accumulation, spurious correlation, and storage and scalability limitations, are brought on by big data. These unique problems call for new computational and statistical paradigms. This research paper offers an overview of the literature on big data mining, its process, along with problems and difficulties, with a focus on the unique characteristics of big data. Organizations have several difficulties when undertaking data mining, which has an impact on their decision-making. Every day, terabytes of data are produced, yet only around 1% of that data is really analyzed. The idea of the mining and analysis of data and knowledge discovery techniques that have recently been created with practical application systems is presented in this study. This article's conclusion also includes a list of issues and difficulties for further research in the area. The report discusses the management's main big data and data mining challenges.

Keywords: big data, data mining, data analysis, knowledge discovery techniques, data mining challenges

Procedia PDF Downloads 105
25422 Mothers' Satisfaction with Emergency Care When Their Child Has an Autism Spectrum Disorder

Authors: Merav Ben Natan, Heba Igbarin, Arwa Watted

Abstract:

Introduction: The rising prevalence of autism spectrum disorders (ASD) has heightened the need to understand the challenges faced by children with ASD and their families in emergency departments (EDs). Children with ASD often experience additional health issues and heightened anxiety in the chaotic ED environment, which can impact their care and parental satisfaction. Purpose: This study aimed to examine factors identified by mothers as affecting their satisfaction with the care provided to their children in the ED, among mothers of children with ASD in comparison to mothers of children without ASD. Design and methods: In this correlational quantitative study, 128 Israeli mothers – 59 (46%) mothers of children with ASD and 69 (54%) of children without ASD - completed an online survey based on a Ministry of Health national survey of patient experience. Results: Mothers of children with ASD expressed lower satisfaction with the care provided. The difference was particularly evident concerning waiting times for examination of the child by nurses and physicians in the ED, whether the nurses were attentive and responsive to the mother's questions and concerns, whether the ED staff demonstrated coordination and cooperation with regard to medical care of the child, and whether work in the ED was conducted in an orderly and organized manner. The presence of communication difficulties in children predicted mothers' satisfaction with care. Conclusions: These findings suggest that certain needs of mothers and/or their children with ASD do not receive an appropriate response in the ED. Practice implications: It is important to raise the awareness of healthcare providers in EDs regarding the needs of children with ASD and their parents, especially children with communication difficulties. Strategies should be implemented to improve the experience of children with ASD and their parents in the ED.

Keywords: autism spectrum disorder, emergency department, parental satisfaction, healthcare challenges

Procedia PDF Downloads 18
25421 Adoption of Climate-Smart Agriculture Practices Among Farmers and Its Effect on Crop Revenue in Ethiopia

Authors: Fikiru Temesgen Gelata

Abstract:

Food security, adaptation, and climate change mitigation are all problems that can be resolved simultaneously with Climate-Smart Agriculture (CSA). This study examines determinants of climate-smart agriculture (CSA) practices among smallholder farmers, aiming to understand the factors guiding adoption decisions and evaluate the impact of CSA on smallholder farmer income in the study areas. For this study, three-stage sampling techniques were applied to select 230 smallholders randomly. Mann-Kendal test and multinomial endogenous switching regression model were used to analyze trends of decrease or increase within long-term temporal data and the impact of CSA on the smallholder farmer income, respectively. Findings revealed education level, household size, land ownership, off-farm income, climate information, and contact with extension agents found to be highly adopted CSA practices. On the contrary, erosion exerted a detrimental impact on all the agricultural practices examined within the study region. Various factors such as farming methods, the size of farms, proximity to irrigated farmlands, availability of extension services, distance to market hubs, and access to weather forecasts were recognized as key determinants influencing the adoption of CSA practices. The multinomial endogenous switching regression model (MESR) revealed that joint adoption of crop rotation and soil and water conservation practices significantly increased farm income by 1,107,245 ETB. The study recommends that counties and governments should prioritize addressing climate change in their development agendas to increase the adoption of climate-smart farming techniques.

Keywords: climate-smart practices, food security, Oincome, MERM, Ethiopia

Procedia PDF Downloads 19
25420 Design and Implementation of a Hardened Cryptographic Coprocessor with 128-bit RISC-V Core

Authors: Yashas Bedre Raghavendra, Pim Vullers

Abstract:

This study presents the design and implementation of an abstract cryptographic coprocessor, leveraging AMBA(Advanced Microcontroller Bus Architecture) protocols - APB (Advanced Peripheral Bus) and AHB (Advanced High-performance Bus), to enable seamless integration with the main CPU(Central processing unit) and enhance the coprocessor’s algorithm flexibility. The primary objective is to create a versatile coprocessor that can execute various cryptographic algorithms, including ECC(Elliptic-curve cryptography), RSA(Rivest–Shamir–Adleman), and AES (Advanced Encryption Standard) while providing a robust and secure solution for modern secure embedded systems. To achieve this goal, the coprocessor is equipped with a tightly coupled memory (TCM) for rapid data access during cryptographic operations. The TCM is placed within the coprocessor, ensuring quick retrieval of critical data and optimizing overall performance. Additionally, the program memory is positioned outside the coprocessor, allowing for easy updates and reconfiguration, which enhances adaptability to future algorithm implementations. Direct links are employed instead of DMA(Direct memory access) for data transfer, ensuring faster communication and reducing complexity. The AMBA-based communication architecture facilitates seamless interaction between the coprocessor and the main CPU, streamlining data flow and ensuring efficient utilization of system resources. The abstract nature of the coprocessor allows for easy integration of new cryptographic algorithms in the future. As the security landscape continues to evolve, the coprocessor can adapt and incorporate emerging algorithms, making it a future-proof solution for cryptographic processing. Furthermore, this study explores the addition of custom instructions into RISC-V ISE (Instruction Set Extension) to enhance cryptographic operations. By incorporating custom instructions specifically tailored for cryptographic algorithms, the coprocessor achieves higher efficiency and reduced cycles per instruction (CPI) compared to traditional instruction sets. The adoption of RISC-V 128-bit architecture significantly reduces the total number of instructions required for complex cryptographic tasks, leading to faster execution times and improved overall performance. Comparisons are made with 32-bit and 64-bit architectures, highlighting the advantages of the 128-bit architecture in terms of reduced instruction count and CPI. In conclusion, the abstract cryptographic coprocessor presented in this study offers significant advantages in terms of algorithm flexibility, security, and integration with the main CPU. By leveraging AMBA protocols and employing direct links for data transfer, the coprocessor achieves high-performance cryptographic operations without compromising system efficiency. With its TCM and external program memory, the coprocessor is capable of securely executing a wide range of cryptographic algorithms. This versatility and adaptability, coupled with the benefits of custom instructions and the 128-bit architecture, make it an invaluable asset for secure embedded systems, meeting the demands of modern cryptographic applications.

Keywords: abstract cryptographic coprocessor, AMBA protocols, ECC, RSA, AES, tightly coupled memory, secure embedded systems, RISC-V ISE, custom instructions, instruction count, cycles per instruction

Procedia PDF Downloads 64
25419 A Systematic Review on Challenges in Big Data Environment

Authors: Rimmy Yadav, Anmol Preet Kaur

Abstract:

Big Data has demonstrated the vast potential in streamlining, deciding, spotting business drifts in different fields, for example, producing, fund, Information Technology. This paper gives a multi-disciplinary diagram of the research issues in enormous information and its procedures, instruments, and system identified with the privacy, data storage management, network and energy utilization, adaptation to non-critical failure and information representations. Other than this, result difficulties and openings accessible in this Big Data platform have made.

Keywords: big data, privacy, data management, network and energy consumption

Procedia PDF Downloads 305
25418 Enhancing Financial Security: Real-Time Anomaly Detection in Financial Transactions Using Machine Learning

Authors: Ali Kazemi

Abstract:

The digital evolution of financial services, while offering unprecedented convenience and accessibility, has also escalated the vulnerabilities to fraudulent activities. In this study, we introduce a distinct approach to real-time anomaly detection in financial transactions, aiming to fortify the defenses of banking and financial institutions against such threats. Utilizing unsupervised machine learning algorithms, specifically autoencoders and isolation forests, our research focuses on identifying irregular patterns indicative of fraud within transactional data, thus enabling immediate action to prevent financial loss. The data we used in this study included the monetary value of each transaction. This is a crucial feature as fraudulent transactions may have distributions of different amounts than legitimate ones, such as timestamps indicating when transactions occurred. Analyzing transactions' temporal patterns can reveal anomalies (e.g., unusual activity in the middle of the night). Also, the sector or category of the merchant where the transaction occurred, such as retail, groceries, online services, etc. Specific categories may be more prone to fraud. Moreover, the type of payment used (e.g., credit, debit, online payment systems). Different payment methods have varying risk levels associated with fraud. This dataset, anonymized to ensure privacy, reflects a wide array of transactions typical of a global banking institution, ranging from small-scale retail purchases to large wire transfers, embodying the diverse nature of potentially fraudulent activities. By engineering features that capture the essence of transactions, including normalized amounts and encoded categorical variables, we tailor our data to enhance model sensitivity to anomalies. The autoencoder model leverages its reconstruction error mechanism to flag transactions that deviate significantly from the learned normal pattern, while the isolation forest identifies anomalies based on their susceptibility to isolation from the dataset's majority. Our experimental results, validated through techniques such as k-fold cross-validation, are evaluated using precision, recall, and the F1 score alongside the area under the receiver operating characteristic (ROC) curve. Our models achieved an F1 score of 0.85 and a ROC AUC of 0.93, indicating high accuracy in detecting fraudulent transactions without excessive false positives. This study contributes to the academic discourse on financial fraud detection and provides a practical framework for banking institutions seeking to implement real-time anomaly detection systems. By demonstrating the effectiveness of unsupervised learning techniques in a real-world context, our research offers a pathway to significantly reduce the incidence of financial fraud, thereby enhancing the security and trustworthiness of digital financial services.

Keywords: anomaly detection, financial fraud, machine learning, autoencoders, isolation forest, transactional data analysis

Procedia PDF Downloads 52
25417 Perceived Effect of Livelihood Diversification on the Welfare of Rural Households in Niger State, Nigeria

Authors: Oladipo Joseph Ajayi, Yakubu Muhammed, Raufu Olusola Sanusi

Abstract:

This study determined the perceived effect of livelihood diversification on welfare of rural household in Niger state, Nigeria. Multi-stage sampling technique was adopted for sampling the respondents. Data used for the study were obtained from primary source. Structured questionnaire with interview schedule was administered to 180 randomly selected rural farmers in the study area. Descriptive statistics analysis and z-test statistics were used to analyse the data collected. The study revealed the mean age of the household to be 43 years, mean years of schooling was 8.5, mean household size was 6 people, mean farming experience of 17.5 years and mean farm size of 1.8 hectares. The effect of livelihood diversification revealed that livelihood diversification had positive and significant effect on food security (65.6%) and income generation (66.8%) in the study area. The major constraints to diversification in the study area were poor infrastructure, unavailability of credit and climatic risk and uncertainty. The study, therefore, recommended that rural household should be sensitised to diversify their income source into non-farm activities.

Keywords: income, livelihood diversification , rural household, welfare

Procedia PDF Downloads 409
25416 Survey on Big Data Stream Classification by Decision Tree

Authors: Mansoureh Ghiasabadi Farahani, Samira Kalantary, Sara Taghi-Pour, Mahboubeh Shamsi

Abstract:

Nowadays, the development of computers technology and its recent applications provide access to new types of data, which have not been considered by the traditional data analysts. Two particularly interesting characteristics of such data sets include their huge size and streaming nature .Incremental learning techniques have been used extensively to address the data stream classification problem. This paper presents a concise survey on the obstacles and the requirements issues classifying data streams with using decision tree. The most important issue is to maintain a balance between accuracy and efficiency, the algorithm should provide good classification performance with a reasonable time response.

Keywords: big data, data streams, classification, decision tree

Procedia PDF Downloads 516
25415 Use Cloud-Based Watson Deep Learning Platform to Train Models Faster and More Accurate

Authors: Susan Diamond

Abstract:

Machine Learning workloads have traditionally been run in high-performance computing (HPC) environments, where users log in to dedicated machines and utilize the attached GPUs to run training jobs on huge datasets. Training of large neural network models is very resource intensive, and even after exploiting parallelism and accelerators such as GPUs, a single training job can still take days. Consequently, the cost of hardware is a barrier to entry. Even when upfront cost is not a concern, the lead time to set up such an HPC environment takes months from acquiring hardware to set up the hardware with the right set of firmware, software installed and configured. Furthermore, scalability is hard to achieve in a rigid traditional lab environment. Therefore, it is slow to react to the dynamic change in the artificial intelligent industry. Watson Deep Learning as a service, a cloud-based deep learning platform that mitigates the long lead time and high upfront investment in hardware. It enables robust and scalable sharing of resources among the teams in an organization. It is designed for on-demand cloud environments. Providing a similar user experience in a multi-tenant cloud environment comes with its own unique challenges regarding fault tolerance, performance, and security. Watson Deep Learning as a service tackles these challenges and present a deep learning stack for the cloud environments in a secure, scalable and fault-tolerant manner. It supports a wide range of deep-learning frameworks such as Tensorflow, PyTorch, Caffe, Torch, Theano, and MXNet etc. These frameworks reduce the effort and skillset required to design, train, and use deep learning models. Deep Learning as a service is used at IBM by AI researchers in areas including machine translation, computer vision, and healthcare. 

Keywords: deep learning, machine learning, cognitive computing, model training

Procedia PDF Downloads 204
25414 Phone Number Spoofing Attack in VoLTE 4G

Authors: Joo-Hyung Oh

Abstract:

The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on all-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. And in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.

Keywords: LTE, 4G, VoLTE, phone number spoofing

Procedia PDF Downloads 427
25413 Catastrophic Spending on Health: A Determinant of Access to Health Care by Migrant Slum Population

Authors: Saira Mehnaz, Ali Jafar Abedi, Shazia Farooq Fazli, Sakeena Mushfiq, Zulfia Khan, M. Athar Ansari

Abstract:

Introduction: Public health spending is a necessity in an underdeveloped country like India. The people are already suffering from poverty and that clubbed with out of pocket expenditure leads them to a very catastrophic situation, reducing the overall access to healthcare. Objectives: This study was designed to determine the usual source of medical care opted, the illness pattern, the expenditure incurred on illness and its source of procurement by the study population. It also intended to assess this expenditure as a determinant of access to health care. Methodology: Cities like Aligarh, which are classified as B grade cities in India are thought to be ripe sites for getting livelihood and hence are almost half filled with migrants living in urban slums. A cross sectional study was done to study the newer slum pockets. 3409 households with a population of 16,978 were studied with the help of pretested questionnaire; SPSS 20 was used for statistical analysis. Results and Conclusions: In our study, we found that almost all the households suffered from catastrophic health expenditure. The study population, which was already vulnerable owing to their low socio-economic and migrant status was further being forced with into poverty and indebtedness on account of expenditure on illness. This lead to a significant decrease in access to health. National health financing systems should be designed to protect households from financial catastrophe, by reducing out-of-pocket spending.

Keywords: access to healthcare, catastrophic health expenditure, new urban slums, out of pocket expenditure

Procedia PDF Downloads 201
25412 A Review of Machine Learning for Big Data

Authors: Devatha Kalyan Kumar, Aravindraj D., Sadathulla A.

Abstract:

Big data are now rapidly expanding in all engineering and science and many other domains. The potential of large or massive data is undoubtedly significant, make sense to require new ways of thinking and learning techniques to address the various big data challenges. Machine learning is continuously unleashing its power in a wide range of applications. In this paper, the latest advances and advancements in the researches on machine learning for big data processing. First, the machine learning techniques methods in recent studies, such as deep learning, representation learning, transfer learning, active learning and distributed and parallel learning. Then focus on the challenges and possible solutions of machine learning for big data.

Keywords: active learning, big data, deep learning, machine learning

Procedia PDF Downloads 435
25411 Strengthening Legal Protection of Personal Data through Technical Protection Regulation in Line with Human Rights

Authors: Tomy Prihananto, Damar Apri Sudarmadi

Abstract:

Indonesia recognizes the right to privacy as a human right. Indonesia provides legal protection against data management activities because the protection of personal data is a part of human rights. This paper aims to describe the arrangement of data management and data management in Indonesia. This paper is a descriptive research with qualitative approach and collecting data from literature study. Results of this paper are comprehensive arrangement of data that have been set up as a technical requirement of data protection by encryption methods. Arrangements on encryption and protection of personal data are mutually reinforcing arrangements in the protection of personal data. Indonesia has two important and immediately enacted laws that provide protection for the privacy of information that is part of human rights.

Keywords: Indonesia, protection, personal data, privacy, human rights, encryption

Procedia PDF Downloads 180
25410 Real-Time Aerial Marine Surveillance System for Safe Navigation

Authors: Vinesh Thiruchelvam, Umar Mumtaz Chowdry, Sathish Kumar Selvaperumal

Abstract:

The prime purpose of the project is to provide a sophisticated system for surveillance specialized for the Port Authorities in the Maritime Industry. The current aerial surveillance does not have a wide dimensioning view. The channels of communication is shared and not exclusive allowing for communications errors or disturbance mainly due to traffic. The scope is to analyze the various aspects as real-time aerial and marine surveillance is one of the most important methods which could ensure the domain security of the sailors. The system will improve real time data as obtained for the controller base station. The key implementation will be based on camera speed, angle and adherence to a sustainable power utilization module.

Keywords: SMS, real time, GUI, maritime industry

Procedia PDF Downloads 491
25409 A Socio-Technical Approach to Cyber-Risk Assessment

Authors: Kitty Kioskli, Nineta Polemi

Abstract:

Evaluating the levels of cyber-security risks within an enterprise is most important in protecting its information system, services and all its digital assets against security incidents (e.g. accidents, malicious acts, massive cyber-attacks). The existing risk assessment methodologies (e.g. eBIOS, OCTAVE, CRAMM, NIST-800) adopt a technical approach considering as attack factors only the capability, intention and target of the attacker, and not paying attention to the attacker’s psychological profile and personality traits. In this paper, a socio-technical approach is proposed in cyber risk assessment, in order to achieve more realistic risk estimates by considering the personality traits of the attackers. In particular, based upon principles from investigative psychology and behavioural science, a multi-dimensional, extended, quantifiable model for an attacker’s profile is developed, which becomes an additional factor in the cyber risk level calculation.

Keywords: attacker, behavioural models, cyber risk assessment, cybersecurity, human factors, investigative psychology, ISO27001, ISO27005

Procedia PDF Downloads 158
25408 A Real Time Monitoring System of the Supply Chain Conditions, Products and Means of Transport

Authors: Dimitris E. Kontaxis, George Litainas, Dimitris P. Ptochos

Abstract:

Real-time monitoring of the supply chain conditions and procedures is a critical element for the optimal coordination and safety of the deliveries, as well as for the minimization of the delivery time and cost. Real-time monitoring requires IoT data streams, which are related to the conditions of the products and the means of transport (e.g., location, temperature/humidity conditions, kinematic state, ambient light conditions, etc.). These streams are generated by battery-based IoT tracking devices, equipped with appropriate sensors, and are transmitted to a cloud-based back-end system. Proper handling and processing of the IoT data streams, using predictive and artificial intelligence algorithms, can provide significant and useful results, which can be exploited by the supply chain stakeholders in order to enhance their financial benefits, as well as the efficiency, security, transparency, coordination, and sustainability of the supply chain procedures. The technology, the features, and the characteristics of a complete, proprietary system, including hardware, firmware, and software tools -developed in the context of a co-funded R&D programme- are addressed and presented in this paper.

Keywords: IoT embedded electronics, real-time monitoring, tracking device, sensor platform

Procedia PDF Downloads 172
25407 Alcohol and Tobacco Influencing Prevalence of Hypertension among 15-54 Old Indian Men: An Application of Discriminant Analysis Using National Family Health Survey, 2015-16

Authors: Chander Shekhar, Jeetendra Yadav, Shaziya Allarakha

Abstract:

Hypertension has been described as an 'iceberg disease' as those who suffered are ignored and hence usually seek healthcare services at a very late stage. It is estimated that more than 2 million Indians are suffering from hypertensive heart disease that contributed to above 0.13 million deaths in 2016. The paper study aims to know the prevalence of Hypertension in India and its variation by socioeconomic backgrounds and to find out risk factors discriminating hypertension with special emphasis on consumption of tobacco and alcohol among men aged 15-54 years in India. The paper uses NFHS (2015-16) data. The paper used binary logistic regression and discriminant analysis to find significant predictors and discriminants of interest. The prevalence of hypertension was 16.5% in the study population. The results suggest that consumption of alcohol and tobacco are significant discriminant characteristics in carrying hypertension irrespective of what socioeconomic background characteristic he possesses.

Keywords: hypertention, alcohol, tobacco, discriminant

Procedia PDF Downloads 139
25406 A Smart Contract Project: Peer-to-Peer Energy Trading with Price Forecasting in Microgrid

Authors: Şakir Bingöl, Abdullah Emre Aydemir, Abdullah Saado, Ahmet Akıl, Elif Canbaz, Feyza Nur Bulgurcu, Gizem Uzun, Günsu Bilge Dal, Muhammedcan Pirinççi

Abstract:

Smart contracts, which can be applied in many different areas, from financial applications to the internet of things, come to the fore with their security, low cost, and self-executing features. In this paper, it is focused on peer-to-peer (P2P) energy trading and the implementation of the smart contract on the Ethereum blockchain. It is assumed a microgrid consists of consumers and prosumers that can produce solar and wind energy. The proposed architecture is a system where the prosumer makes the purchase or sale request in the smart contract and the maximum price obtained through the distribution system operator (DSO) by forecasting. It is aimed to forecast the hourly maximum unit price of energy by using deep learning instead of a fixed pricing. In this way, it will make the system more reliable as there will be more dynamic and accurate pricing. For this purpose, Istanbul's energy generation, energy consumption and market clearing price data were used. The consistency of the available data and forecasting results is observed and discussed with graphs.

Keywords: energy trading smart contract, deep learning, microgrid, forecasting, Ethereum, peer to peer

Procedia PDF Downloads 129
25405 Knowledge, Attitude and Beliefs Towards Polypharmacy Amongst Older People Attending Family Medicine Clinic at the Aga Khan University Hospital, Nairobi, Kenya (AKUHN) Sub-Saharan Africa-Qualitative Study

Authors: Maureen Kamau, Gulnaz Mohamoud, Adelaide Lusambili, Njeri Nyanja

Abstract:

Life expectancy has increased over the last century amongst older individuals, and in particular, those 60 years and over. The World Health Organization estimates that the world's population of persons over 60 years will rise to 22 per cent by the year 2050. Ageing is associated with increasing disability, multiple chronic conditions, and an increase in the use of health services. These multiple chronic conditions are managed with polypharmacy. Polypharmacy has numerous adverse effects including non-adherence, poor compliance to the various medications, reduced appetite, and risk of fall. Studies on polypharmacy and ageing are few and poorly understood especially in low and middle - income countries. The aim of this study was to explore the knowledge, attitudes and beliefs of older people towards polypharmacy. A qualitative study of 15 patients aged 60 years and above, taking more than five medications per day were conducted at the Aga Khan University using Semi-structured in-depth interviews. Three interviews were pilot interviews, and data analysis was performed on 12 interviews. Data were analyzed using NVIVO 12 software. A thematic qualitative analysis was carried out guided by Braun and Clarke (2006) framework. Themes identified; - knowledge of their co-morbidities and of the medication that older persons take, sources of information about medicines, and storage of the medication, experiences and attitudes of older patients towards polypharmacy both positive and negative, older peoples beliefs and their coping mechanisms with polypharmacy. The study participants had good knowledge on their multiple co-morbidities, and on the medication they took. The patients had positive attitudes towards medication as it enhanced their health and well-being, and enabled them to perform their activities of daily living. There was a strong belief among older patients that the medications were necessary for their health. All these factors enhanced compliance to the multiple medication. However, some older patients had negative attitudes due to the pill burden, side effects of the medication, and stigma associated with being ill. Cost of healthcare was a concern, with most of the patients interviewed relying on insurance to cover the cost of their medication. Older patients had accepted that the medication they were prescribed were necessary for their health, as it enabled them to complete their activities of daily living. Some concerns about the side effects of the medication arose, and brought about the need for patient education that would ensure that the patients are aware of the medications they take, and potential side effects. The effect that the COVID 19 pandemic had in the healthcare of the older patients was evident by the number of the older patients avoided coming to the hospital during the period of the pandemic. The relationship with the primary care physician and the older patients is an important one, especially in LMICs such as Kenya, as many of the older patients trusted the doctors wholeheartedly to make the best decision about their health and about their medication. Prescription review is important to avoid the use of potentially inappropriate medication.

Keywords: polypharmacy, older patients, multiple chronic conditions, Kenya, Africa, qualitative study, indepth interviews, primary care

Procedia PDF Downloads 92