Search results for: healthcare data security
25938 Examining the Predictors of Non-Urgent Emergency Department Visits: A Population Based Study
Authors: Maher El-Masri, Jamie Crawley, Judy Bornais, Abeer Omar
Abstract:
Background: Misuse of Emergency Department (ED) for non-urgent healthcare results in unnecessary crowdedness that can result in long ED waits and delays in treatment, diversion of ambulances to other hospitals, poor health outcomes for patients, and increased risk of death Objectives: The main purpose of this study was to explore the independent predictors of non-urgent ED visits in Erie St. Clair LHIN. Secondary purposes of the study include comparison of the rates of non-urgent ED visits between urban and rural hospitals Design: A secondary analysis of archived population-based data on 597,373 ED visits in southwestern Ontario Results The results suggest that older (OR = .992; 95% CI .992 – .993) and female patients (OR = .940; 95% CI .929 - .950) were less likely to visit ED for non-urgent causes. Non-urgent ED visits during the winter, spring, and fall were 13%, 5.8%, and 7.5%, respectively, lesser than they were during the summer time. The data further suggest that non-urgent visits were 19.6% and 21.3% less likely to occur in evening and overnight shifts compared to the day shift. Non-urgent visits were 2.76 times more likely to present to small community hospitals than large community hospitals. Health care providers were 1.92 times more likely to refer patients with non-urgent health problem to the ED than the decision taken by patients, family member or caretakers. Conclusion: In conclusion, our study highlights a number of important factors that are associated with inappropriate use of ED visits for non-urgent health problems. Knowledge of these factors could be used to address the issue of unnecessary ED crowdedness.Keywords: emergency department, non-urgent visits, predictors, logistic regression
Procedia PDF Downloads 24825937 Development of Terrorist Threat Prediction Model in Indonesia by Using Bayesian Network
Authors: Hilya Mudrika Arini, Nur Aini Masruroh, Budi Hartono
Abstract:
There are more than 20 terrorist threats from 2002 to 2012 in Indonesia. Despite of this fact, preventive solution through studies in the field of national security in Indonesia has not been conducted comprehensively. This study aims to provide a preventive solution by developing prediction model of the terrorist threat in Indonesia by using Bayesian network. There are eight stages to build the model, started from literature review, build and verify Bayesian belief network to what-if scenario. In order to build the model, four experts from different perspectives are utilized. This study finds several significant findings. First, news and the readiness of terrorist group are the most influent factor. Second, according to several scenarios of the news portion, it can be concluded that the higher positive news proportion, the higher probability of terrorist threat will occur. Therefore, the preventive solution to reduce the terrorist threat in Indonesia based on the model is by keeping the positive news portion to a maximum of 38%.Keywords: Bayesian network, decision analysis, national security system, text mining
Procedia PDF Downloads 39425936 An Integrated Lightweight Naïve Bayes Based Webpage Classification Service for Smartphone Browsers
Authors: Mayank Gupta, Siba Prasad Samal, Vasu Kakkirala
Abstract:
The internet world and its priorities have changed considerably in the last decade. Browsing on smart phones has increased manifold and is set to explode much more. Users spent considerable time browsing different websites, that gives a great deal of insight into user’s preferences. Instead of plain information classifying different aspects of browsing like Bookmarks, History, and Download Manager into useful categories would improve and enhance the user’s experience. Most of the classification solutions are server side that involves maintaining server and other heavy resources. It has security constraints and maybe misses on contextual data during classification. On device, classification solves many such problems, but the challenge is to achieve accuracy on classification with resource constraints. This on device classification can be much more useful in personalization, reducing dependency on cloud connectivity and better privacy/security. This approach provides more relevant results as compared to current standalone solutions because it uses content rendered by browser which is customized by the content provider based on user’s profile. This paper proposes a Naive Bayes based lightweight classification engine targeted for a resource constraint devices. Our solution integrates with Web Browser that in turn triggers classification algorithm. Whenever a user browses a webpage, this solution extracts DOM Tree data from the browser’s rendering engine. This DOM data is a dynamic, contextual and secure data that can’t be replicated. This proposal extracts different features of the webpage that runs on an algorithm to classify into multiple categories. Naive Bayes based engine is chosen in this solution for its inherent advantages in using limited resources compared to other classification algorithms like Support Vector Machine, Neural Networks, etc. Naive Bayes classification requires small memory footprint and less computation suitable for smartphone environment. This solution has a feature to partition the model into multiple chunks that in turn will facilitate less usage of memory instead of loading a complete model. Classification of the webpages done through integrated engine is faster, more relevant and energy efficient than other standalone on device solution. This classification engine has been tested on Samsung Z3 Tizen hardware. The Engine is integrated into Tizen Browser that uses Chromium Rendering Engine. For this solution, extensive dataset is sourced from dmoztools.net and cleaned. This cleaned dataset has 227.5K webpages which are divided into 8 generic categories ('education', 'games', 'health', 'entertainment', 'news', 'shopping', 'sports', 'travel'). Our browser integrated solution has resulted in 15% less memory usage (due to partition method) and 24% less power consumption in comparison with standalone solution. This solution considered 70% of the dataset for training the data model and the rest 30% dataset for testing. An average accuracy of ~96.3% is achieved across the above mentioned 8 categories. This engine can be further extended for suggesting Dynamic tags and using the classification for differential uses cases to enhance browsing experience.Keywords: chromium, lightweight engine, mobile computing, Naive Bayes, Tizen, web browser, webpage classification
Procedia PDF Downloads 16525935 System Detecting Border Gateway Protocol Anomalies Using Local and Remote Data
Authors: Alicja Starczewska, Aleksander Nawrat, Krzysztof Daniec, Jarosław Homa, Kacper Hołda
Abstract:
Border Gateway Protocol is the main routing protocol that enables routing establishment between all autonomous systems, which are the basic administrative units of the internet. Due to the poor protection of BGP, it is important to use additional BGP security systems. Many solutions to this problem have been proposed over the years, but none of them have been implemented on a global scale. This article describes a system capable of building images of real-time BGP network topology in order to detect BGP anomalies. Our proposal performs a detailed analysis of BGP messages that come into local network cards supplemented by information collected by remote collectors in different localizations.Keywords: BGP, BGP hijacking, cybersecurity, detection
Procedia PDF Downloads 8125934 A Hybrid Model for Secure Protocol Independent Multicast Sparse Mode and Dense Mode Protocols in a Group Network
Authors: M. S. Jimah, A. C. Achuenu, M. Momodu
Abstract:
Group communications over public infrastructure are prone to a lot of security issues. Existing network protocols like Protocol Independent Multicast Sparse Mode (PIM SM) and Protocol Independent Multicast Dense Mode (PIM DM) do not have inbuilt security features. Therefore, any user or node can easily access the group communication as long as the user can send join message to the source nodes, the source node then adds the user to the network group. In this research, a hybrid method of salting and hashing to encrypt information in the source and stub node was designed, and when stub nodes need to connect, they must have the appropriate key to join the group network. Object oriented analysis design (OOAD) was the methodology used, and the result shows that no extra controlled bandwidth overhead cost was added by encrypting and the hybrid model was more securing than the existing PIM SM, PIM DM and Zhang secure PIM SM.Keywords: group communications, multicast, PIM SM, PIM DM, encryption
Procedia PDF Downloads 16425933 The Relationship between Human Pose and Intention to Fire a Handgun
Authors: Joshua van Staden, Dane Brown, Karen Bradshaw
Abstract:
Gun violence is a significant problem in modern-day society. Early detection of carried handguns through closed-circuit television (CCTV) can aid in preventing potential gun violence. However, CCTV operators have a limited attention span. Machine learning approaches to automating the detection of dangerous gun carriers provide a way to aid CCTV operators in identifying these individuals. This study provides insight into the relationship between human key points extracted using human pose estimation (HPE) and their intention to fire a weapon. We examine the feature importance of each keypoint and their correlations. We use principal component analysis (PCA) to reduce the feature space and optimize detection. Finally, we run a set of classifiers to determine what form of classifier performs well on this data. We find that hips, shoulders, and knees tend to be crucial aspects of the human pose when making these predictions. Furthermore, the horizontal position plays a larger role than the vertical position. Of the 66 key points, nine principal components could be used to make nonlinear classifications with 86% accuracy. Furthermore, linear classifications could be done with 85% accuracy, showing that there is a degree of linearity in the data.Keywords: feature engineering, human pose, machine learning, security
Procedia PDF Downloads 9525932 Critical Approach to Define the Architectural Structure of a Health Prototype in a Rural Area of Brazil
Authors: Domenico Chizzoniti, Monica Moscatelli, Letizia Cattani, Luca Preis
Abstract:
A primary healthcare facility in developing countries should be a multifunctional space able to respond to different requirements: Flexibility, modularity, aggregation and reversibility. These basic features could be better satisfied if applied to an architectural artifact that complies with the typological, figurative and constructive aspects of the context in which it is located. Therefore, the purpose of this paper is to identify a procedure that can define the figurative aspects of the architectural structure of the health prototype for the marginal areas of developing countries through a critical approach. The application context is the rural areas of the Northeast of Bahia in Brazil. The prototype should be located in the rural district of Quingoma, in the municipality of Lauro de Freitas, a particular place where there is still a cultural fusion of black and indigenous populations. Based on the historical analysis of settlement strategies and architectural structures in spaces of public interest or collective use, this paper aims to provide a procedure able to identify the categories and rules underlying typological and figurative aspects, in order to detect significant and generalizable elements, as well as materials and constructive techniques typically adopted in the rural areas of Brazil. The object of this work is therefore not only the recovery of certain constructive approaches but also the development of a procedure that integrates the requirements of the primary healthcare prototype with its surrounding economic, social, cultural, settlement and figurative conditions.Keywords: architectural typology, developing countries, local construction techniques, primary health care.
Procedia PDF Downloads 32625931 Evaluation of Clinical Decision Support System in Electronic Medical Record System: A Case of Malawi National Art Electronic Medical Record System
Authors: Pachawo Bisani, Goodall Nyirenda
Abstract:
The Malawi National Antiretroviral Therapy (NART) Electronic Medical Record (EMR) system was designed and developed with guidance from the Ministry of Health through the Department of HIV and AIDS (DHA) with the aim of supporting the management of HIV patient data and reporting in high prevalence ART clinics. As of 2021, the system has been scaled up to over 206 facilities across the country. The system is integrated with the clinical decision support system (CDSS) to assist healthcare providers in making a decision about an individual patient at a particular point in time. Despite NART EMR undergoing several evaluations and assessments, little has been done to evaluate the clinical decision support system in the NART EMR system. Hence, the study aimed to evaluate the use of CDSS in the NART EMR system in Malawi. The study adopted a mixed-method approach, and data was collected through interviews, observations, and questionnaires. The study has revealed that the CDSS tools were integrated into the ART clinic workflow, making it easy for the user to use it. The study has also revealed challenges in system reliability and information accuracy. Despite the challenges, the study further revealed that the system is effective and efficient, and overall, users are satisfied with the system. The study recommends that the implementers focus more on the logic behind the clinical decision-support intervention in order to address some of the concerns and enhance the accuracy of the information supplied. The study further suggests consulting the system's actual users throughout implementation.Keywords: clinical decision support system, electronic medical record system, usability, antiretroviral therapy
Procedia PDF Downloads 10625930 Treadmill Negotiation: The Stagnation of the Israeli – Palestinian Peace Process
Authors: Itai Kohavi, Wojciech Nowiak
Abstract:
This article explores the stagnation of the Israeli -Palestinian peace negotiation process, and the reasons behind the failure of more than 12 international initiatives to resolve the conflict. Twenty-seven top members of the Israeli national security elite (INSE) were interviewed, including heads of the negotiation teams, the National Security Council, the Mossad, and other intelligence and planning arms. The interviewees provided their insights on the Israeli challenges in reaching a sustainable and stable peace agreement and in dealing with the international pressure on Israel to negotiate a peace agreement while preventing anti-Israeli UN decisions and sanctions. The findings revealed a decision tree, with red herring deception strategies implemented to postpone the negotiation process and to delay major decisions during the negotiation process. Beyond the possible applications for the Israeli – Palestinian conflict, the findings shed more light on the phenomenon of rational deception of allies in a negotiation process, a subject less frequently researched as compared with deception of rivals.Keywords: deception, Israeli-Palestinian conflict, negotiation, red herring, terrorist state, treadmill negotiation
Procedia PDF Downloads 30725929 Alcohol and Tobacco Influencing Prevalence of Hypertension among 15-54 Old Indian Men: An Application of Discriminant Analysis Using National Family Health Survey, 2015-16
Authors: Chander Shekhar, Jeetendra Yadav, Shaziya Allarakha
Abstract:
Hypertension has been described as an 'iceberg disease' as those who suffered are ignored and hence usually seek healthcare services at a very late stage. It is estimated that more than 2 million Indians are suffering from hypertensive heart disease that contributed to above 0.13 million deaths in 2016. The paper study aims to know the prevalence of Hypertension in India and its variation by socioeconomic backgrounds and to find out risk factors discriminating hypertension with special emphasis on consumption of tobacco and alcohol among men aged 15-54 years in India. The paper uses NFHS (2015-16) data. The paper used binary logistic regression and discriminant analysis to find significant predictors and discriminants of interest. The prevalence of hypertension was 16.5% in the study population. The results suggest that consumption of alcohol and tobacco are significant discriminant characteristics in carrying hypertension irrespective of what socioeconomic background characteristic he possesses.Keywords: hypertention, alcohol, tobacco, discriminant
Procedia PDF Downloads 15025928 Simulation Data Summarization Based on Spatial Histograms
Authors: Jing Zhao, Yoshiharu Ishikawa, Chuan Xiao, Kento Sugiura
Abstract:
In order to analyze large-scale scientific data, research on data exploration and visualization has gained popularity. In this paper, we focus on the exploration and visualization of scientific simulation data, and define a spatial V-Optimal histogram for data summarization. We propose histogram construction algorithms based on a general binary hierarchical partitioning as well as a more specific one, the l-grid partitioning. For effective data summarization and efficient data visualization in scientific data analysis, we propose an optimal algorithm as well as a heuristic algorithm for histogram construction. To verify the effectiveness and efficiency of the proposed methods, we conduct experiments on the massive evacuation simulation data.Keywords: simulation data, data summarization, spatial histograms, exploration, visualization
Procedia PDF Downloads 18025927 Knowledge, Attitude and Beliefs Towards Polypharmacy Amongst Older People Attending Family Medicine Clinic at the Aga Khan University Hospital, Nairobi, Kenya (AKUHN) Sub-Saharan Africa-Qualitative Study
Authors: Maureen Kamau, Gulnaz Mohamoud, Adelaide Lusambili, Njeri Nyanja
Abstract:
Life expectancy has increased over the last century amongst older individuals, and in particular, those 60 years and over. The World Health Organization estimates that the world's population of persons over 60 years will rise to 22 per cent by the year 2050. Ageing is associated with increasing disability, multiple chronic conditions, and an increase in the use of health services. These multiple chronic conditions are managed with polypharmacy. Polypharmacy has numerous adverse effects including non-adherence, poor compliance to the various medications, reduced appetite, and risk of fall. Studies on polypharmacy and ageing are few and poorly understood especially in low and middle - income countries. The aim of this study was to explore the knowledge, attitudes and beliefs of older people towards polypharmacy. A qualitative study of 15 patients aged 60 years and above, taking more than five medications per day were conducted at the Aga Khan University using Semi-structured in-depth interviews. Three interviews were pilot interviews, and data analysis was performed on 12 interviews. Data were analyzed using NVIVO 12 software. A thematic qualitative analysis was carried out guided by Braun and Clarke (2006) framework. Themes identified; - knowledge of their co-morbidities and of the medication that older persons take, sources of information about medicines, and storage of the medication, experiences and attitudes of older patients towards polypharmacy both positive and negative, older peoples beliefs and their coping mechanisms with polypharmacy. The study participants had good knowledge on their multiple co-morbidities, and on the medication they took. The patients had positive attitudes towards medication as it enhanced their health and well-being, and enabled them to perform their activities of daily living. There was a strong belief among older patients that the medications were necessary for their health. All these factors enhanced compliance to the multiple medication. However, some older patients had negative attitudes due to the pill burden, side effects of the medication, and stigma associated with being ill. Cost of healthcare was a concern, with most of the patients interviewed relying on insurance to cover the cost of their medication. Older patients had accepted that the medication they were prescribed were necessary for their health, as it enabled them to complete their activities of daily living. Some concerns about the side effects of the medication arose, and brought about the need for patient education that would ensure that the patients are aware of the medications they take, and potential side effects. The effect that the COVID 19 pandemic had in the healthcare of the older patients was evident by the number of the older patients avoided coming to the hospital during the period of the pandemic. The relationship with the primary care physician and the older patients is an important one, especially in LMICs such as Kenya, as many of the older patients trusted the doctors wholeheartedly to make the best decision about their health and about their medication. Prescription review is important to avoid the use of potentially inappropriate medication.Keywords: polypharmacy, older patients, multiple chronic conditions, Kenya, Africa, qualitative study, indepth interviews, primary care
Procedia PDF Downloads 10225926 National Health Insurance: An Exploratory Study of Patient Satisfaction
Authors: Nihayatul Munaa, Nyoman A. Damayanti
Abstract:
This study seeks to understand what factors might influence a patient’s perception of health care under national health insurance in early implementation. In Indonesia, National Health Insurance was first implemented in 2014 and planned to achieve universal health coverage by 2019. However, the little understanding of this new policy lead to increase of complaint in hospital as a health care provider. This is a observational descriptive study with cross sectional design method. Data was collected through in-depth interview with 96 patient from Jemursari Islamic Hospital of Surabaya (Rumah Sakit Islam Jemursari Surabaya) who participate in National Health Insurance. Subject was selected by simple random sampling. The findings demonstrated that from five categories, 82,3% patient was satisfied in reliability aspect and 85,4% in assurance aspect, while in tangible, responsiveness and empathy aspect > 90% patient was satisfied. Meanwhile, in Indonesia, the minimum service standard of healthcare of patient satisfaction is 90%.Keywords: patient’s satisfaction, national health insurance, hospital, complaint
Procedia PDF Downloads 19525925 The Potential Impact of Big Data Analytics on Pharmaceutical Supply Chain Management
Authors: Maryam Ziaee, Himanshu Shee, Amrik Sohal
Abstract:
Big Data Analytics (BDA) in supply chain management has recently drawn the attention of academics and practitioners. Big data refers to a massive amount of data from different sources, in different formats, generated at high speed through transactions in business environments and supply chain networks. Traditional statistical tools and techniques find it difficult to analyse this massive data. BDA can assist organisations to capture, store, and analyse data specifically in the field of supply chain. Currently, there is a paucity of research on BDA in the pharmaceutical supply chain context. In this research, the Australian pharmaceutical supply chain was selected as the case study. This industry is highly significant since the right medicine must reach the right patients, at the right time, in right quantity, in good condition, and at the right price to save lives. However, drug shortages remain a substantial problem for hospitals across Australia with implications on patient care, staff resourcing, and expenditure. Furthermore, a massive volume and variety of data is generated at fast speed from multiple sources in pharmaceutical supply chain, which needs to be captured and analysed to benefit operational decisions at every stage of supply chain processes. As the pharmaceutical industry lags behind other industries in using BDA, it raises the question of whether the use of BDA can improve transparency among pharmaceutical supply chain by enabling the partners to make informed-decisions across their operational activities. This presentation explores the impacts of BDA on supply chain management. An exploratory qualitative approach was adopted to analyse data collected through interviews. This study also explores the BDA potential in the whole pharmaceutical supply chain rather than focusing on a single entity. Twenty semi-structured interviews were undertaken with top managers in fifteen organisations (five pharmaceutical manufacturers, five wholesalers/distributors, and five public hospital pharmacies) to investigate their views on the use of BDA. The findings revealed that BDA can enable pharmaceutical entities to have improved visibility over the whole supply chain and also the market; it enables entities, especially manufacturers, to monitor consumption and the demand rate in real-time and make accurate demand forecasts which reduce drug shortages. Timely and precise decision-making can allow the entities to source and manage their stocks more effectively. This can likely address the drug demand at hospitals and respond to unanticipated issues such as drug shortages. Earlier studies explore BDA in the context of clinical healthcare; however, this presentation investigates the benefits of BDA in the Australian pharmaceutical supply chain. Furthermore, this research enhances managers’ insight into the potentials of BDA at every stage of supply chain processes and helps to improve decision-making in their supply chain operations. The findings will turn the rhetoric of data-driven decision into a reality where the managers may opt for analytics for improved decision-making in the supply chain processes.Keywords: big data analytics, data-driven decision, pharmaceutical industry, supply chain management
Procedia PDF Downloads 10925924 Increasing Adherence to Preventative Care Bundles for Healthcare-Associated Infections: The Impact of Nurse Education
Authors: Lauren G. Coggins
Abstract:
Catheter-associated urinary tract infections (CAUTI) and central line-associated bloodstream infections (CLABSI) are among the most common healthcare-associated infections (HAI), contributing to prolonged lengths of stay, greater costs of patient care, and increased patient mortality. Evidence-based preventative care bundles exist to establish consistent, safe patient-care practices throughout an entire organization, helping to ensure the collective application of care strategies that aim to improve patient outcomes and minimize complications. The cardiac intensive care unit at a nationally ranked teaching and research hospital in the United States exceeded its annual CAUTI and CLABSI targets in the fiscal year 2019, prompting examination into the unit’s infection prevention efforts that included preventative care bundles for both HAIs. Adherence to the CAUTI and CLABSI preventative care bundles was evaluated through frequent audits conducted over three months, using standards and resources from The Joint Commission, a globally recognized leader in quality improvement in healthcare and patient care safety. The bundle elements with the lowest scores were identified as the most commonly missed elements. Three elements from both bundles, six elements in total, served as key content areas for the educational interventions targeted to bedside nurses. The CAUTI elements included appropriate urinary catheter order, appropriate continuation criteria, and urinary catheter care. The CLABSI elements included primary tubing compliance, needleless connector compliance, and dressing change compliance. An integrated, multi-platform education campaign featured content on each CAUTI and CLABSI preventative care bundle in its entirety, with additional reinforcement focused on the lowest scoring elements. One-on-one educational materials included an informational pamphlet, badge buddy, a presentation to reinforce nursing care standards, and real-time application through case studies and electronic health record demonstrations. A digital hub was developed on the hospital’s Intranet for quick access to unit resources, and a bulletin board helped track the number of days since the last CAUTI and CLABSI incident. Audits continued to be conducted throughout the education campaign, and staff were given real-time feedback to address any gaps in adherence. Nearly every nurse in the cardiac intensive care unit received all educational materials, and adherence to all six key bundle elements increased after the implementation of educational interventions. Recommendations from this implementation include providing consistent, comprehensive education across multiple teaching tools and regular audits to track adherence. The multi-platform education campaign brought focus to the evidence-based CAUTI and CLABSI bundles, which in turn will help to reduce CAUTI and CLABSI rates in clinical practice.Keywords: education, healthcare-associated infections, infection, nursing, prevention
Procedia PDF Downloads 11725923 Community Re-Integrated Soldiers’ Perceptions of Barriers and Facilitators to A Home-Based Physical Rehabilitation Programme Following Lower-Limb Amputation
Authors: Ashan Wijekoon, Abi Beane, Subashini Jayawardana
Abstract:
Background: Soldiers' physical rehabilitation and long term health status has been hindered due to limited investment in and access to rehabilitation services. Home-based rehabilitation programmes could offer a potentially feasible alternative to facilitate long-term recovery. Objectives: To explore Sri Lankan soldiers' perceptions of barriers and facilitators to a home-based physical rehabilitation programme.Methods and Materials: We conducted qualitative semi-structured interviews with community re-integrated army veterans who had undergone unilateral lower limb amputation following war related trauma. Veterans were identified from five districts of Sri Lanka, based on a priori knowledge of veteran community settlements (Disabled Category Registry) obtained from Directorate of Rehabilitation, MoD, Sri Lanka. Individuals were stratified for purposive selection. The interview guide was developed from existing methods and adapted for context. Verbatim transcripts of interviews were analyzed for emerging themes using an inductive approach. Following consent, participants met the researcher (AW- a trained physiotherapist fluent in Sinhalese). Results: Twenty-five Interviews were conducted, totaling 7.2 hours of new data (Mean±SD: 0.28±0.11). All participants were male, aged 30-55 years (Mean±SD: 46.1±7.4), and had experienced traumatic amputation as a result of conflict. Twenty-four sub themes were identified. Inadequate space for exercises, absence of equipment and assistance to conduct the exercises at home, alongside absence of community healthcare services were all barriers. Burden of comorbidities, including chronic pain and disability level, were also barriers. Social support systems, including soldier societies, family, and kinship with other amputees, were seen as facilitators to an at-home programme. Motivation for independence was a strong indicator of engagement. Conclusion: Environment, chronic pain, and absence of well-established community health services were key barriers. Family and soldier support was a facilitator. Engagement with community healthcare providers (physiotherapist and primary care physicians) will be essential to the success of an at-home rehabilitation program.Keywords: physical rehabilitation, home-based, soldiers, disability, lower-limb amputation, qualitative
Procedia PDF Downloads 17125922 Requirement Engineering for Intrusion Detection Systems in Wireless Sensor Networks
Authors: Afnan Al-Romi, Iman Al-Momani
Abstract:
The urge of applying the Software Engineering (SE) processes is both of vital importance and a key feature in critical, complex large-scale systems, for example, safety systems, security service systems, and network systems. Inevitably, associated with this are risks, such as system vulnerabilities and security threats. The probability of those risks increases in unsecured environments, such as wireless networks in general and in Wireless Sensor Networks (WSNs) in particular. WSN is a self-organizing network of sensor nodes connected by wireless links. WSNs consist of hundreds to thousands of low-power, low-cost, multi-function sensor nodes that are small in size and communicate over short-ranges. The distribution of sensor nodes in an open environment that could be unattended in addition to the resource constraints in terms of processing, storage and power, make such networks in stringent limitations such as lifetime (i.e. period of operation) and security. The importance of WSN applications that could be found in many militaries and civilian aspects has drawn the attention of many researchers to consider its security. To address this important issue and overcome one of the main challenges of WSNs, security solution systems have been developed by researchers. Those solutions are software-based network Intrusion Detection Systems (IDSs). However, it has been witnessed, that those developed IDSs are neither secure enough nor accurate to detect all malicious behaviours of attacks. Thus, the problem is the lack of coverage of all malicious behaviours in proposed IDSs, leading to unpleasant results, such as delays in the detection process, low detection accuracy, or even worse, leading to detection failure, as illustrated in the previous studies. Also, another problem is energy consumption in WSNs caused by IDS. So, in other words, not all requirements are implemented then traced. Moreover, neither all requirements are identified nor satisfied, as for some requirements have been compromised. The drawbacks in the current IDS are due to not following structured software development processes by researches and developers when developing IDS. Consequently, they resulted in inadequate requirement management, process, validation, and verification of requirements quality. Unfortunately, WSN and SE research communities have been mostly impermeable to each other. Integrating SE and WSNs is a real subject that will be expanded as technology evolves and spreads in industrial applications. Therefore, this paper will study the importance of Requirement Engineering when developing IDSs. Also, it will study a set of existed IDSs and illustrate the absence of Requirement Engineering and its effect. Then conclusions are drawn in regard of applying requirement engineering to systems to deliver the required functionalities, with respect to operational constraints, within an acceptable level of performance, accuracy and reliability.Keywords: software engineering, requirement engineering, Intrusion Detection System, IDS, Wireless Sensor Networks, WSN
Procedia PDF Downloads 32425921 An Interpretive Phenomenological Approach to Children’s Experience of Infidelity in Iran: Consequences and Hurts
Authors: Mehravar Javid, Stacey Dershewitz, Shohreh Hashemighoochani, Artin Yousefi
Abstract:
One of the most common reasons for destroying relationships is infidelity. This study was conducted to understand children's experience of infidelity in Iran. In this qualitative research, the interpretive phenomenological approach and theoretical (purposive) sampling method were used, and the data was saturated by conducting semi-structured interviews with eight offspring of families affected by infidelity. All interviews were audio recorded and analyzed on paper after implementation. Acceptability and homogeneity of data were confirmed by different methods. Eight main themes were identified from the participants' statements: description of the family atmosphere, lack of security and distrust, emotional reactions, behavioral reactions, worry about the future, financial problems, mother's physical-psychological state, and mother's coping strategies and offspring's proposed solutions. The children's experiences showed that in addition to causing irreparable harm to the wife, infidelity affected the whole family and caused the children to suffer crucial consequences such as emotional, behavioral, educational, and economic consequences and mistrust.Keywords: consequences and hurt, infidelity, offspring, phenomenology, qualitative research
Procedia PDF Downloads 6425920 Phone Number Spoofing Attack in VoLTE 4G
Authors: Joo-Hyung Oh
Abstract:
The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on all-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. And in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.Keywords: LTE, 4G, VoLTE, phone number spoofing
Procedia PDF Downloads 43425919 Predicting Low Birth Weight Using Machine Learning: A Study on 53,637 Ethiopian Birth Data
Authors: Kehabtimer Shiferaw Kotiso, Getachew Hailemariam, Abiy Seifu Estifanos
Abstract:
Introduction: Despite the highest share of low birth weight (LBW) for neonatal mortality and morbidity, predicting births with LBW for better intervention preparation is challenging. This study aims to predict LBW using a dataset encompassing 53,637 birth cohorts collected from 36 primary hospitals across seven regions in Ethiopia from February 2022 to June 2024. Methods: We identified ten explanatory variables related to maternal and neonatal characteristics, including maternal education, age, residence, history of miscarriage or abortion, history of preterm birth, type of pregnancy, number of livebirths, number of stillbirths, antenatal care frequency, and sex of the fetus to predict LBW. Using WEKA 3.8.2, we developed and compared seven machine learning algorithms. Data preprocessing included handling missing values, outlier detection, and ensuring data integrity in birth weight records. Model performance was evaluated through metrics such as accuracy, precision, recall, F1-score, and area under the Receiver Operating Characteristic curve (ROC AUC) using 10-fold cross-validation. Results: The results demonstrated that the decision tree, J48, logistic regression, and gradient boosted trees model achieved the highest accuracy (94.5% to 94.6%) with a precision of 93.1% to 93.3%, F1-score of 92.7% to 93.1%, and ROC AUC of 71.8% to 76.6%. Conclusion: This study demonstrates the effectiveness of machine learning models in predicting LBW. The high accuracy and recall rates achieved indicate that these models can serve as valuable tools for healthcare policymakers and providers in identifying at-risk newborns and implementing timely interventions to achieve the sustainable developmental goal (SDG) related to neonatal mortality.Keywords: low birth weight, machine learning, classification, neonatal mortality, Ethiopia
Procedia PDF Downloads 3125918 A Software Engineering Methodology for Developing Secure Obfuscated Software
Authors: Carlos Gonzalez, Ernesto Linan
Abstract:
We propose a methodology to conciliate two apparently contradictory processes in the development of secure obfuscated software and good software engineered software. Our methodology consists first in the system designers defining the type of security level required for the software. There are four types of attackers: casual attackers, hackers, institution attack, and government attack. Depending on the level of threat, the methodology we propose uses five or six teams to accomplish this task. One Software Engineer Team and one or two software Obfuscation Teams, and Compiler Team, these four teams will develop and compile the secure obfuscated software, a Code Breakers Team will test the results of the previous teams to see if the software is not broken at the required security level, and an Intrusion Analysis Team will analyze the results of the Code Breakers Team and propose solutions to the development teams to prevent the detected intrusions. We also present an analytical model to prove that our methodology is no only easier to use, but generates an economical way of producing secure obfuscated software.Keywords: development methodology, obfuscated software, secure software development, software engineering
Procedia PDF Downloads 25425917 Gendered Economic, Social, and Health Effects of the Mobile Health and Nutritional Services of the International Medical Corps (IMC) in Vulnerable Areas of Ethiopia
Authors: Abdela Zeinu Yasin
Abstract:
The current research aimed to assess the status of IMC in providing treatment for malnourished children and programs in water, sanitation, and hygiene (WASH), food and livelihood security, and comprehensive healthcare through Mobile health and nutrition programs during the last 5 years period. We have conducted 60 in-depth interviews with women during the period from conception to a child’s birthday, health facility staff, and female community health volunteers (FCHVs), as well as 12 focus group discussions with health facility staff and other household decision-makers. We employed thematic analysis using framework matrices and analytical memorandums. The study revealed that 78% of the respondents, of whom 97% were women, have benefited from the selected vulnerable areas. The use of the clear water and sanitization program has reached the 81% of selected households. The use of a modern baby delivery system among the respondent has been 68% of the women and health facilities among the decision-makers/focal person. More than 8 in 10 participants (84%) could read and understand the health facility instructions, and the majority (82%) of women, health facility staff, and male decision-makers can also read and write bulletins and instructions. We found that decision-maker women preferred participative education, whereas health facilities and the IMC desired educational and motivational bulletins. A Mobile Health and Nutrition program intervention by the IMC is acceptable in the conditions of the Ethiopian community and has the potential to improve community health and nutrition service utilization, particularly by providing clean water and sanitization; women’s birth control, and health improvement in the vulnerable regions of the country. The current research findings shall contribute to text IMC Mobile Health and Nutritional intervention design in under-resourced settings.Keywords: clean water, health and nutrition services, hygiene, IMC, mobile health, sanitation
Procedia PDF Downloads 9725916 Lived Experience of Breast Cancer for Arab Muslim Women
Authors: Nesreen M. Alqaissi
Abstract:
Little is known about the lived experiences of breast cancer among Arab Muslim women. The researcher used a qualitative interpretive phenomenological research design to explore the lived experiences of breast cancer as described by Jordanian Muslim women. A purposive sample of 20 women with breast cancer was recruited. Data were collected utilizing individual semi-structured interviews, and analyzed using Heideggerian Hermeneutical methodology. Results: Five related themes and one constitutive pattern: (a) breast cancer means death; (b) matriarchal family members as important source of support; (c) spirituality as a way to live and survive breast cancer; (d) concealing cancer experiences to protect self and families; (e) physicians as protectors and treatment decision makers; (f) the constitutive pattern: culture influencing Jordanian women experiences with breast cancer. In conclusion, researchers and healthcare providers should consider the influence of culture, spirituality, and families, when caring for women with breast cancer from Jordan.Keywords: breast cancer, Arab Muslim, Jordan, lived experiences, spirituality, culture
Procedia PDF Downloads 51725915 Real-Time Aerial Marine Surveillance System for Safe Navigation
Authors: Vinesh Thiruchelvam, Umar Mumtaz Chowdry, Sathish Kumar Selvaperumal
Abstract:
The prime purpose of the project is to provide a sophisticated system for surveillance specialized for the Port Authorities in the Maritime Industry. The current aerial surveillance does not have a wide dimensioning view. The channels of communication is shared and not exclusive allowing for communications errors or disturbance mainly due to traffic. The scope is to analyze the various aspects as real-time aerial and marine surveillance is one of the most important methods which could ensure the domain security of the sailors. The system will improve real time data as obtained for the controller base station. The key implementation will be based on camera speed, angle and adherence to a sustainable power utilization module.Keywords: SMS, real time, GUI, maritime industry
Procedia PDF Downloads 50225914 Analytical Study of Applying the Account Aggregation Approach in E-Banking Services
Authors: A. Al Drees, A. Alahmari, R. Almuwayshir
Abstract:
The advanced information technology is becoming an important factor in the development of financial services industry, especially the banking industry. It has introduced new ways of delivering banking to the customer, such as Internet Banking. Banks began to look at electronic banking (e-banking) as a means to replace some of their traditional branch functions using the Internet as a new distribution channel. Some consumers have at least more than one account, and across banks, and access these accounts using e-banking services. To look at the current net worth position, customers have to login to each of their accounts and get the details and work on consolidation. This not only takes ample time but it is a repetitive activity at a specified frequency. To address this point, an account aggregation concept is added as a solution. E-banking account aggregation, as one of the e-banking types, appeared to build a stronger relationship with customers. Account Aggregation Service generally refers to a service that allows customers to manage their bank accounts maintained in different institutions through a common Internet banking operating a platform, with a high concern to security and privacy. This paper presents an overview of an e-banking account aggregation approach as a new service in the e-banking field.Keywords: e-banking, account aggregation, security, enterprise development
Procedia PDF Downloads 33625913 The Impact of Physical Activity for Recovering Cancer Patients
Authors: Martyn Queen, Diane Crone, Andrew Parker, Saul Bloxham
Abstract:
Rationale: There is a growing body of evidence that supports the use of physical activity during and after cancer treatment. However, activity levels for patients remain low. As more cancer patients are treated successfully, and treatment costs continue to escalate, physical activity may be a promising adjunct to a person-centred healthcare approach to recovery. Aim: The aim was to further understand how physical activity may enhance the recovery process for a group of mixed-site cancer patients. Objectives: The research investigated longitudinal changes in physical activity and perceived the quality of life between two and six month’s post-exercise interventions. It also investigated support systems that enabled patients to sustain these perceived changes. Method: The respondent cohort comprised 14 mixed-site cancer patients aged 43-70 (11 women, 3 men), who participated in a two-phase physical activity intervention that took place at a university in the South West of England. Phase 1 consisted of an eight-week structured physical activity programme; Phase 2 consisted of four months of non-supervised physical activity. Semi-structured interviews took place three times over six months with each participant. Grounded theory informed the data collection and analysis which, in turn, facilitated theoretical development. Findings: Our findings propose three theories on the impact of physical activity for recovering cancer patients: 1) Knowledge gained through a structured exercise programme can enable recovering cancer patients to independently sustain physical activity to four-month follow-up. 2) Sustaining physical activity for six months promotes positive changes in the quality of life indicators of chronic fatigue, self-efficacy, the ability to self-manage and energy levels. 3) Peer support from patients facilitates adherence to a structured exercise programme and support from a spouse, or life partner facilitates independently sustained physical activity to four-month follow-up. Conclusions: This study demonstrates that qualitative research can provide an evidence base that could be used to support future care plans for cancer patients. Findings also demonstrate that a physical activity intervention can be effective at helping cancer patients recover from the side effects of their treatment, and recommends that physical activity should become an adjunct therapy alongside traditional cancer treatments.Keywords: physical activity, health, cancer recovery, quality of life, support systems, qualitative, grounded theory, person-centred healthcare
Procedia PDF Downloads 29525912 Socioeconomic Burden of a Diagnosis of Cervical Cancer in Women in Rural Uganda: Findings from a Phenomenological Study
Authors: Germans Natuhwera, Peter Ellis, Acuda Wilson, Anne Merriman, Martha Rabwoni
Abstract:
Objective: The aim of the study was to diagnose the socio-economic burden and impact of a diagnosis of cervical cancer (CC) in rural women in the context of low-resourced country Uganda, using a phenomenological enquiry. Methods: This was a multi-site phenomenological inquiry, conducted at three hospice settings; Mobile Hospice Mbarara in southwestern, Little Hospice Hoima in Western, and Hospice Africa Uganda Kampala in central Uganda. A purposive sample of women with a histologically confirmed diagnosis of CC was recruited. Data was collected using open-ended audio-recorded interviews conducted in the native languages of participants. Interviews were transcribed verbatim in English, and Braun and Clarke’s (2019) framework of thematic analysis was used. Results: 13 women with a mean age of 49.2 and age range 29-71 participated in the study. All participants were of low socioeconomic status. The majority (84.6%) had advanced disease at diagnosis. A fuller reading of transcripts produced four major themes clustered under; (1) socioeconomic characteristics of women, (2) impact of CC on women’s relationships, (3) disrupted and impaired activities of daily living (ADLs), and (4) economic disruptions. Conclusions: A diagnosis of CC introduces significant socio-economic disruptions in a woman’s and her family’s life. CC causes disability, impairs the woman and her family’s productivity hence exacerbating levels of poverty in the home. High and expensive out-of-pocket expenditure on treatment, investigations, and transport costs further compound the socio-economic burden. Decentralizing cancer care services to regional centers, scaling up screening services, subsidizing costs of cancer care services, or making cervical cancer care treatment free of charge, strengthening monitoring mechanisms in public facilities to curb the vice of healthcare workers soliciting bribes from patients, increased mass awareness campaigns about cancer, training more healthcare professionals in cancer investigation and management, and palliative care, and introducing an introductory course on gynecologic cancers into all health training institutions are recommended.Keywords: activities of daily living, cervical cancer, out-of-pocket, expenditure, phenomenology, socioeconomic
Procedia PDF Downloads 22225911 Health Hazards Among Health Care Workers and Associated Factors in Public Hospitals, Sana'a-Yemen
Authors: Makkia Ahmad Ali Al-Falahi, Abdullah Abdelaziz Muharram
Abstract:
Background: Healthcare workers (HCWs) in Yemen are exposed to a myriad of occupational health hazards, including biological, physical, ergonomic, chemical and psychosocial hazards. HCWs operate in an environment that is considered to be one of the most hazardous occupational settings. Objective: To assess the prevalence of occupational health hazards among healthcare workers and associated risk factors in public hospitals in Sana'a City, Yemen. Method: Descriptive cross-sectional design was utilized; out of 5443 totals of HCWs 396 were selected by multistage sampling technique was carried out in the public hospitals in Sana'a city, Yemen. Results: More the half (60.6%) of HCWs aged between 20-30 years, (50.8%) were males, (56.3%) were married, and (45.5%) had a diploma qualification, while (65.2%) of HCWs had less than 6 years of experience. The result showed that the highest prevalence of occupational hazards was (99%), (ergonomic hazards (93.4%), biological hazards (87.6%), psychosocial (86.65%), physical hazards (83.3%), and chemical hazards (73.5%). There were no statistically significant differences between demographic characteristics and the prevalence of occupational hazards (p >0.05). Conclusion and recommendations: The study showed the highest prevalence of occupational hazards; regarding the prevalence of biological hazards exposure to sharp-related injury, the most prevalent physical hazards were slip/trip/and fall. Ergonomic hazards had back or neck pain during work. Chemical hazards were allergic to medical gloves powder. On psychosocial hazards was suffered from verbal and physical harassment. The study concluded by raising awareness among HCWs by conducting training courses to prevent occupational hazards.Keywords: health workers, occupational hazards, risk factors, the prevalence
Procedia PDF Downloads 8425910 An Evaluation of People’s Susceptibility to Phishing Attacks in Nepal and Effectiveness of the Applied Countermeasures
Authors: Sunil Chaudhary, Rajendra Bahadur Thapa, Eleni Berki, Marko Helenius
Abstract:
The increasing number of Internet and mobile phone users, and essentially those, who use these electronic media to perform online transactions makes Nepal lucrative for phishing attacks. It is one of the reasons behind escalating phishing attacks in the country. Therefore, in this paper we examine various phishing attempts and real scenarios in Nepal to determine the seriousness of the problem. We also want to find out how prepared are the Internet and mobile phone users and how well-equipped are the private sector and government authorities responsible to handle cybercrime in the country. We considered five areas of research study, i.e., legal measures, technical and procedural measures, organizational structure, capacity building and international cooperation. These constitute important factors in cyber security and are recommended by the Global Cyber security Agenda (GCA). On the basis of our findings, we provide essential suggestions to make anti-phishing measures more appropriate to Nepalese State and society.Keywords: internet banking, mobile banking, e-commerce, phishing, anti-phishing, Nepal
Procedia PDF Downloads 49025909 Enhancing Financial Security: Real-Time Anomaly Detection in Financial Transactions Using Machine Learning
Authors: Ali Kazemi
Abstract:
The digital evolution of financial services, while offering unprecedented convenience and accessibility, has also escalated the vulnerabilities to fraudulent activities. In this study, we introduce a distinct approach to real-time anomaly detection in financial transactions, aiming to fortify the defenses of banking and financial institutions against such threats. Utilizing unsupervised machine learning algorithms, specifically autoencoders and isolation forests, our research focuses on identifying irregular patterns indicative of fraud within transactional data, thus enabling immediate action to prevent financial loss. The data we used in this study included the monetary value of each transaction. This is a crucial feature as fraudulent transactions may have distributions of different amounts than legitimate ones, such as timestamps indicating when transactions occurred. Analyzing transactions' temporal patterns can reveal anomalies (e.g., unusual activity in the middle of the night). Also, the sector or category of the merchant where the transaction occurred, such as retail, groceries, online services, etc. Specific categories may be more prone to fraud. Moreover, the type of payment used (e.g., credit, debit, online payment systems). Different payment methods have varying risk levels associated with fraud. This dataset, anonymized to ensure privacy, reflects a wide array of transactions typical of a global banking institution, ranging from small-scale retail purchases to large wire transfers, embodying the diverse nature of potentially fraudulent activities. By engineering features that capture the essence of transactions, including normalized amounts and encoded categorical variables, we tailor our data to enhance model sensitivity to anomalies. The autoencoder model leverages its reconstruction error mechanism to flag transactions that deviate significantly from the learned normal pattern, while the isolation forest identifies anomalies based on their susceptibility to isolation from the dataset's majority. Our experimental results, validated through techniques such as k-fold cross-validation, are evaluated using precision, recall, and the F1 score alongside the area under the receiver operating characteristic (ROC) curve. Our models achieved an F1 score of 0.85 and a ROC AUC of 0.93, indicating high accuracy in detecting fraudulent transactions without excessive false positives. This study contributes to the academic discourse on financial fraud detection and provides a practical framework for banking institutions seeking to implement real-time anomaly detection systems. By demonstrating the effectiveness of unsupervised learning techniques in a real-world context, our research offers a pathway to significantly reduce the incidence of financial fraud, thereby enhancing the security and trustworthiness of digital financial services.Keywords: anomaly detection, financial fraud, machine learning, autoencoders, isolation forest, transactional data analysis
Procedia PDF Downloads 60