Search results for: healthcare data security
25820 Risks beyond Cyber in IoT Infrastructure and Services
Authors: Mattias Bergstrom
Abstract:
Significance of the Study: This research will provide new insights into the risks with digital embedded infrastructure. Through this research, we will analyze each risk and its potential negation strategies, especially for AI and autonomous automation. Moreover, the analysis that is presented in this paper will convey valuable information for future research that can create more stable, secure, and efficient autonomous systems. To learn and understand the risks, a large IoT system was envisioned, and risks with hardware, tampering, and cyberattacks were collected, researched, and evaluated to create a comprehensive understanding of the potential risks. Potential solutions have then been evaluated on an open source IoT hardware setup. This list shows the identified passive and active risks evaluated in the research. Passive Risks: (1) Hardware failures- Critical Systems relying on high rate data and data quality are growing; SCADA systems for infrastructure are good examples of such systems. (2) Hardware delivers erroneous data- Sensors break, and when they do so, they don’t always go silent; they can keep going, just that the data they deliver is garbage, and if that data is not filtered out, it becomes disruptive noise in the system. (3) Bad Hardware injection- Erroneous generated sensor data can be pumped into a system by malicious actors with the intent to create disruptive noise in critical systems. (4) Data gravity- The weight of the data collected will affect Data-Mobility. (5) Cost inhibitors- Running services that need huge centralized computing is cost inhibiting. Large complex AI can be extremely expensive to run. Active Risks: Denial of Service- It is one of the most simple attacks, where an attacker just overloads the system with bogus requests so that valid requests disappear in the noise. Malware- Malware can be anything from simple viruses to complex botnets created with specific goals, where the creator is stealing computer power and bandwidth from you to attack someone else. Ransomware- It is a kind of malware, but it is so different in its implementation that it is worth its own mention. The goal with these pieces of software is to encrypt your system so that it can only be unlocked with a key that is held for ransom. DNS spoofing- By spoofing DNS calls, valid requests and data dumps can be sent to bad destinations, where the data can be extracted for extortion or to corrupt and re-inject into a running system creating a data echo noise loop. After testing multiple potential solutions. We found that the most prominent solution to these risks was to use a Peer 2 Peer consensus algorithm over a blockchain to validate the data and behavior of the devices (sensors, storage, and computing) in the system. By the devices autonomously policing themselves for deviant behavior, all risks listed above can be negated. In conclusion, an Internet middleware that provides these features would be an easy and secure solution to any future autonomous IoT deployments. As it provides separation from the open Internet, at the same time, it is accessible over the blockchain keys.Keywords: IoT, security, infrastructure, SCADA, blockchain, AI
Procedia PDF Downloads 10825819 The Various Legal Dimensions of Genomic Data
Authors: Amy Gooden
Abstract:
When human genomic data is considered, this is often done through only one dimension of the law, or the interplay between the various dimensions is not considered, thus providing an incomplete picture of the legal framework. This research considers and analyzes the various dimensions in South African law applicable to genomic sequence data – including property rights, personality rights, and intellectual property rights. The effective use of personal genomic sequence data requires the acknowledgement and harmonization of the rights applicable to such data.Keywords: artificial intelligence, data, law, genomics, rights
Procedia PDF Downloads 14425818 Object Recognition System Operating from Different Type Vehicles Using Raspberry and OpenCV
Authors: Maria Pavlova
Abstract:
In our days, it is possible to put the camera on different vehicles like quadcopter, train, airplane and etc. The camera also can be the input sensor in many different systems. That means the object recognition like non separate part of monitoring control can be key part of the most intelligent systems. The aim of this paper is to focus of the object recognition process during vehicles movement. During the vehicle’s movement the camera takes pictures from the environment without storage in Data Base. In case the camera detects a special object (for example human or animal), the system saves the picture and sends it to the work station in real time. This functionality will be very useful in emergency or security situations where is necessary to find a specific object. In another application, the camera can be mounted on crossroad where do not have many people and if one or more persons come on the road, the traffic lights became the green and they can cross the road. In this papers is presented the system has solved the aforementioned problems. It is presented architecture of the object recognition system includes the camera, Raspberry platform, GPS system, neural network, software and Data Base. The camera in the system takes the pictures. The object recognition is done in real time using the OpenCV library and Raspberry microcontroller. An additional feature of this library is the ability to display the GPS coordinates of the captured objects position. The results from this processes will be sent to remote station. So, in this case, we can know the location of the specific object. By neural network, we can learn the module to solve the problems using incoming data and to be part in bigger intelligent system. The present paper focuses on the design and integration of the image recognition like a part of smart systems.Keywords: camera, object recognition, OpenCV, Raspberry
Procedia PDF Downloads 22025817 Differentials in Reproductive and Child Health Care in India
Authors: Dewaram Abhiman Nagdeve
Abstract:
The present paper examined the urban-rural differentials and the factors influencing net change in reproductive and child health input, its utilization, and its output during the National Family Health Survey conducted during 1992-93 and 2019-21 in India. The analysis of NFHS data has been done and variables have been grouped into health input regarding antenatal care, postnatal care, and child care, utilization regarding reproductive and child health care, and reproductive and child health outcomes. An analysis was done using bivariate analysis and the chi-square test. The study reveals that there was an increase in health input, utilization, and output during the intra-survey period. Urban-rural disparities in Reproductive and Child Health (RCH) indicators persist, highlighting the need for focused intervention by the Indian government. Key steps should include enhancing RCH programs through robust information and education campaigns and deploying dedicated health personnel to remote and inaccessible rural areas. These initiatives are crucial to reducing both maternal and child mortality rates and ensuring equitable healthcare access nationwide.Keywords: urban, rural, differentials, reproductive and child health, India
Procedia PDF Downloads 1525816 Assessing Smallholder Rice and Vegetable Farmers’ Constraints and Needs to Adopt Small-Scale Irrigation in South Tongu District, Ghana
Authors: Tamekloe Michael Kossivi, Kenichi Matsui
Abstract:
Irrigation access is one of the essential rural development investment options that can significantly improve smallholder farmers’ agriculture productivity. Investment in irrigation infrastructural development to supply adequate water could improve food security, growth in income for farmers, poverty alleviation, and improve business and livelihood. This paper assesses smallholder farmers’ constraints and the needs to adopt small-scale irrigation for crops production in the South Tongu District of Ghana. The data collection involved database search, questionnaire survey, interview, and field work. The structured questionnaire survey was administered from September to November 2020 among 120 respondents in six purposively sampled irrigation communities in the District. The questions focused on small-scale irrigation development constraints and needs. As a result, we found that the respondents relied mainly on rainfall for agriculture production. They did not have adequate irrigation access. Even though the District is blessed with open arable lands and rich water sources for rice and vegetable production on a massive scale, water sources like the Lower Volta River, Tordzi River, and Avu Lagoon were not close enough to the respondents. The respondents faced inadequate credit support (100%), unreliable rainfall (76%), insufficient water supply (54%), and unreliable water delivery challenges on their farms (53%). Physical constraints for the respondents to adopt irrigation included flood (77%), drought (93%), inadequate irrigation technology (59%), and insufficient technical know-how (65%). Farmers were interested in investing in irrigation infrastructural development to enhance productivity on their farms only if they own the farmlands. External support from donors on irrigation systems did not allow smallholder farmers to control irrigation facilities.Keywords: constraints, food security, needs, smallholder farmers, small-scale irrigation
Procedia PDF Downloads 13925815 Leveraging Digital Cyber Technology for Self-Care and Improved Management of DMPA-SC Clients
Authors: Oluwaseun Adeleke, Grace Amarachi Omenife, Jennifer Adebambo, Mopelola Raji, Anthony Nwala, Mogbonjubade Adesulure
Abstract:
Introduction: The incorporation of digital technology in healthcare systems is instrumental in transforming the delivery, management, and overall experience of healthcare and holds the potential to scale up access through over 200 million active mobile phones used in Nigeria. Digital tools enable increased access to care, stronger client engagement, progress in research and data-driven insights, and more effective promotion of self-care and do-it-yourself practices. The Delivering Innovation in Self-Care (DISC) project 2021 has played a pivotal role in granting women greater autonomy over their sexual and reproductive health (SRH) through a variety of approaches, including information and training to self-inject contraception (DMPA-SC). To optimize its outcomes, the project also leverages digital technology platforms like social media: Facebook, Instagram, and Meet Tina (Chatbot) via WhatsApp, Customer Relationship Management (CRM) applications Freshworks, and Viamo. Methodology: The project has been successful at optimizing in-person digital cyberspace interaction to sensitize individuals effectively about self-injection and provide linkages to SI services. This platform employs the Freshworks CRM software application, along with specially trained personnel known as Cyber IPC Agents and DHIS calling centers. Integration of Freshworks CRM software with social media allows a direct connection with clients to address emerging issues, schedule follow-ups, send reminders to improve compliance with self-injection schedules, enhance the overall user experience for self-injection (SI) clients, and generate comprehensive reports and analytics on client interactions. Interaction covers a range of topics, including – How to use SI, learning more about SI, side-effects and its management, accessing services, fertility, ovulation, other family planning methods, inquiries related to Sexual Reproductive Health as well as uses an address log to connect them with nearby facilities or online pharmaceuticals. Results: Between the months of March to September, a total of 5,403 engagements were recorded. Among these, 4,685 were satisfactorily resolved. Since the program's inception, digital advertising has created 233,633,075 impressions, reached 12,715,582 persons, and resulted in 3,394,048 clicks. Conclusion: Leveraging digital technology has proven to be an invaluable tool in client management and improving client experience. The use of Cyber technology has enabled the successful development and maintenance of client relationships, which have been effective at providing support, facilitating delivery and compliance with DMPA-SC self-injection services, and ensuring overall client satisfaction. Concurrently, providing qualitative data, including user experience feedback, has enabled the derivation of crucial insights that inform the decision-making process and guide in normalizing self-care behavior.Keywords: selfcare, DMPA-SC self-injection, digital technology, cyber technology, freshworks CRM software
Procedia PDF Downloads 6925814 Big Brain: A Single Database System for a Federated Data Warehouse Architecture
Authors: X. Gumara Rigol, I. Martínez de Apellaniz Anzuola, A. Garcia Serrano, A. Franzi Cros, O. Vidal Calbet, A. Al Maruf
Abstract:
Traditional federated architectures for data warehousing work well when corporations have existing regional data warehouses and there is a need to aggregate data at a global level. Schibsted Media Group has been maturing from a decentralised organisation into a more globalised one and needed to build both some of the regional data warehouses for some brands at the same time as the global one. In this paper, we present the architectural alternatives studied and why a custom federated approach was the notable recommendation to go further with the implementation. Although the data warehouses are logically federated, the implementation uses a single database system which presented many advantages like: cost reduction and improved data access to global users allowing consumers of the data to have a common data model for detailed analysis across different geographies and a flexible layer for local specific needs in the same place.Keywords: data integration, data warehousing, federated architecture, Online Analytical Processing (OLAP)
Procedia PDF Downloads 23825813 Supplier Relationship Management and Selection Strategies: A Literature Review
Authors: Priyesh Kumar Singh, S. K. Sharma, Sanjay Verma, C. Samuel
Abstract:
Supplier Relationship Management (SRM), is strategic planning and managing of all interactions with suppliers to maximize its value. Its application varies from construction industries to healthcare system and investment banks to aviation industries. Several buyer-supplier relationship models, as well as supplier selection and evaluation strategies, have been documented by many academicians and researchers. In this paper, through a comprehensive literature review of over 30 published papers, different theoretical models, empirical data and conclusions were analysed relating to SRM to find its role in establishing better supplier relationships. These journal articles were searched by using the keyword “supplier relationship management,” in databases of Mendeley Library, ProQuest, EBSCO and Google Scholar. This paper reviews the academic literature on different relationship models, supplier evaluation, and selection strategies to discuss its implications in different situations. It also describes the dominant factors responsible for buyer-supplier relationships such trust and power. Finally, conclusions have been drawn which can be validated by various researchers and can help practitioners in industries.Keywords: supplier relationship management, supplier performance, supplier evaluation, supplier selection strategies
Procedia PDF Downloads 29025812 Telepsychiatry for Asian Americans
Authors: Jami Wang, Brian Kao, Davin Agustines
Abstract:
COVID-19 highlighted the active discrimination against the Asian American population easily seen through media, social tension, and increased crimes against the specific population. It is well known that long-term racism can also have a large impact on both emotional and psychological well-being. However, the healthcare disparity during this time also revealed how the Asian American community lacked the research data, political support, and medical infrastructure for this particular population. During a time when Asian American fear for safety with decreasing mental health, telepsychiatry is particularly promising. COVID-19 demonstrated how well psychiatry could integrate with telemedicine, with psychiatry being the second most utilized telemedicine visits. However, the Asian American community did not utilize the telepsychiatry resources as much as other groups. Because of this, we wanted to understand why the patient population who was affected the most by COVID-19 mentally did not seek out care. To do this, we decided to study the top top telepsychiatry platforms. The current top telepsychiatry companies in the United States include Teladoc and BetterHelp. In the Teladoc mental health sector, they only had 4 available languages (English, Spanish, French, and Danis,) with none of them being an Asian language. In a similar manner, Teladoc’s top competitor in the telepsychiatry space, BetterHelp, only listed a total of 3 Asian languages, including Mandarin, Japanese, and Malaysian. However, this is still a short list considering they have over 20 languages available. The shortage of available physicians that speak multiple languages is concerning, as it could be difficult for the Asian American community to relate with. There are limited mental health resources that cater to their likely cultural needs, further exacerbating the structural racism and institutional barriers to appropriate care. It is important to note that these companies do provide interpreters to comply with the nondiscrimination and language assistance federal law. However, interactions with an interpreter are not only more time-consuming but also less personal than talking directly with a physician. Psychiatry is the field that emphasizes interpersonal relationships. The trust between a physician and the patient is critical in developing patient rapport to guide in better understanding the clinical picture and treating the patient appropriately. The language barrier creates an additional barrier between the physician and patient. Because Asian Americans are one of the largest growing patient population bases, these telehealth companies have much to gain by catering to the Asian American market. Without providing adequate access to bilingual and bicultural physicians, the current system will only further exacerbate the growing disparity. The healthcare community and telehealth companies need to recognize that the Asian American population is a severely underserved population in mental health and has much to gain from telepsychiatry. The lack of language is one of many reasons why there is a disparity for Asian Americans in the mental health space.Keywords: telemedicine, psychiatry, Asian American, disparity
Procedia PDF Downloads 10725811 A Review Paper on Data Mining and Genetic Algorithm
Authors: Sikander Singh Cheema, Jasmeen Kaur
Abstract:
In this paper, the concept of data mining is summarized and its one of the important process i.e KDD is summarized. The data mining based on Genetic Algorithm is researched in and ways to achieve the data mining Genetic Algorithm are surveyed. This paper also conducts a formal review on the area of data mining tasks and genetic algorithm in various fields.Keywords: data mining, KDD, genetic algorithm, descriptive mining, predictive mining
Procedia PDF Downloads 59525810 Data-Mining Approach to Analyzing Industrial Process Information for Real-Time Monitoring
Authors: Seung-Lock Seo
Abstract:
This work presents a data-mining empirical monitoring scheme for industrial processes with partially unbalanced data. Measurement data of good operations are relatively easy to gather, but in unusual special events or faults it is generally difficult to collect process information or almost impossible to analyze some noisy data of industrial processes. At this time some noise filtering techniques can be used to enhance process monitoring performance in a real-time basis. In addition, pre-processing of raw process data is helpful to eliminate unwanted variation of industrial process data. In this work, the performance of various monitoring schemes was tested and demonstrated for discrete batch process data. It showed that the monitoring performance was improved significantly in terms of monitoring success rate of given process faults.Keywords: data mining, process data, monitoring, safety, industrial processes
Procedia PDF Downloads 40325809 Pattern in Splitting Sequence in Okike’s Merged Irregular Transposition Cipher for Encrypting Cyberspace Messages
Authors: Okike Benjamin, E. J. D. Garba
Abstract:
The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. The researchers in this work propose a new encryption technique to be known as Merged Irregular Transposition Cipher. In this proposed encryption technique, a message to be encrypted will first of all be split into multiple parts depending on the length of the message. After the split, different keywords are chosen to encrypt different parts of the message. After encrypting all parts of the message, the positions of the encrypted message could be swapped to other position thereby making it very difficult to decrypt by any unauthorized user.Keywords: information security, message splitting, pattern, sequence
Procedia PDF Downloads 29225808 Relation of Optimal Pilot Offsets in the Shifted Constellation-Based Method for the Detection of Pilot Contamination Attacks
Authors: Dimitriya A. Mihaylova, Zlatka V. Valkova-Jarvis, Georgi L. Iliev
Abstract:
One possible approach for maintaining the security of communication systems relies on Physical Layer Security mechanisms. However, in wireless time division duplex systems, where uplink and downlink channels are reciprocal, the channel estimate procedure is exposed to attacks known as pilot contamination, with the aim of having an enhanced data signal sent to the malicious user. The Shifted 2-N-PSK method involves two random legitimate pilots in the training phase, each of which belongs to a constellation, shifted from the original N-PSK symbols by certain degrees. In this paper, legitimate pilots’ offset values and their influence on the detection capabilities of the Shifted 2-N-PSK method are investigated. As the implementation of the technique depends on the relation between the shift angles rather than their specific values, the optimal interconnection between the two legitimate constellations is investigated. The results show that no regularity exists in the relation between the pilot contamination attacks (PCA) detection probability and the choice of offset values. Therefore, an adversary who aims to obtain the exact offset values can only employ a brute-force attack but the large number of possible combinations for the shifted constellations makes such a type of attack difficult to successfully mount. For this reason, the number of optimal shift value pairs is also studied for both 100% and 98% probabilities of detecting pilot contamination attacks. Although the Shifted 2-N-PSK method has been broadly studied in different signal-to-noise ratio scenarios, in multi-cell systems the interference from the signals in other cells should be also taken into account. Therefore, the inter-cell interference impact on the performance of the method is investigated by means of a large number of simulations. The results show that the detection probability of the Shifted 2-N-PSK decreases inversely to the signal-to-interference-plus-noise ratio.Keywords: channel estimation, inter-cell interference, pilot contamination attacks, wireless communications
Procedia PDF Downloads 21925807 Biosignal Measurement System Based on Ultra-Wide Band Human Body Communication
Authors: Jonghoon Kim, Gilwon Yoon
Abstract:
A wrist-band type biosignal measurement system and its data transfer through human body communication (HBC) were investigated. An HBC method based on pulses of ultra-wide band instead of using frequency or amplitude modulations was studied and implemented since the system became very compact and it was more suited for personal or mobile health monitoring. Our system measured photo-plethysmogram (PPG) and measured PPG signals were transmitted through a finger to a monitoring PC system. The device was compact and low-power consuming. HBC communication has very strong security measures since it does not use wireless network. Furthermore, biosignal monitoring system becomes handy because it does not need to have wire connections.Keywords: biosignal, human body communication, mobile health, PPG, ultrawide band
Procedia PDF Downloads 47825806 Violent Conflict and the Protection of Women from Sex and Gender-Based Violence: A Third World Feminist Critique of the United Nations Women, Peace, and Security Agenda
Authors: Seember Susan Aondoakura
Abstract:
This paper examines the international legal framework established to address the challenges women and girls experience in situations of violent conflict. The United Nations (UN) women, peace, and security agenda (hereafter WPS agenda, the Agenda) aspire to make wars safer for women. It recognizes women's agency in armed conflict and their victimization and formulates measures for their protection. The Agenda also acknowledges women's participation in conflict transformation and post-conflict reconstruction. It also calls for the involvement of women in conflict transformation, encourages the protection of women from sex and gender-based violence (SGBV), and provides relief and recovery from conflict-related SGBV. Using Third World Critical Feminist Theory, this paper argues that the WPS agenda overly focus on the protection of women from SGBV occurring in the less developed and conflict-ridden states in the global south, obscures the complicity of western states and economies to the problem, and silences the privileges that such states derive from war economies that continue to fuel conflict. This protectionist approach of the UN also obliterates other equally pressing problems in need of attention, like the high rates of economic degradation in conflict-ravaged societies of the global south. Prioritising protection also 'others' the problem, obliterating any sense of interconnections across geographical locations and situating women in the less developed economies of the global south as the victims and their men as the perpetrators. Prioritising protection ultimately situates western societies as saviours of Third World women with no recourse to their role in engendering and sustaining war. The paper demonstrates that this saviour mentality obliterates chances of any meaningful coalition between the local and the international in framing and addressing the issue, as solutions are formulated from a specific lens—the white hegemonic lens.Keywords: conflict, protection, security, SGBV
Procedia PDF Downloads 9825805 Scenario Analysis to Assess the Competitiveness of Hydrogen in Securing the Italian Energy System
Authors: Gianvito Colucci, Valeria Di Cosmo, Matteo Nicoli, Orsola Maria Robasto, Laura Savoldi
Abstract:
The hydrogen value chain deployment is likely to be boosted in the near term by the energy security measures planned by European countries to face the recent energy crisis. In this context, some countries are recognized to have a crucial role in the geopolitics of hydrogen as importers, consumers and exporters. According to the European Hydrogen Backbone Initiative, Italy would be part of one of the 5 corridors that will shape the European hydrogen market. However, the set targets are very ambitious and require large investments to rapidly develop effective hydrogen policies: in this regard, scenario analysis is becoming increasingly important to support energy planning, and energy system optimization models appear to be suitable tools to quantitively carry on that kind of analysis. The work aims to assess the competitiveness of hydrogen in contributing to the Italian energy security in the coming years, under different price and import conditions, using the energy system model TEMOA-Italy. A wide spectrum of hydrogen technologies is included in the analysis, covering the production, storage, delivery, and end-uses stages. National production from fossil fuels with and without CCS, as well as electrolysis and import of low-carbon hydrogen from North Africa, are the supply solutions that would compete with other ones, such as natural gas, biomethane and electricity value chains, to satisfy sectoral energy needs (transport, industry, buildings, agriculture). Scenario analysis is then used to study the competition under different price and import conditions. The use of TEMOA-Italy allows the work to catch the interaction between the economy and technological detail, which is much needed in the energy policies assessment, while the transparency of the analysis and of the results is ensured by the full accessibility of the TEMOA open-source modeling framework.Keywords: energy security, energy system optimization models, hydrogen, natural gas, open-source modeling, scenario analysis, TEMOA
Procedia PDF Downloads 11925804 The Invisible Labour of Informal Care: Parentified Caregiving in David Chariandy's Soucouyant
Authors: Walter Rafael Ramos Villanueva
Abstract:
The overwhelming majority of scholarship on David Chariandy’s novel Soucouyant focuses on how Adele’s dementia represents the preservation of “cultural memory” and the perniciousness of “historical trauma.” However, by metaphorizing Adele’s mental condition, these critics risk treating her dementia as mostly figurative, and they thus elide a more detailed discussion of the literal ramifications of her dementia diagnosis. To move beyond these readings, then, my paper will approach Adele’s disorder as a literal medical condition and explore how her caregiving needs affect not only her but also those around her. Soucouyant subverts traditional caregiving narratives by depicting the difficult and typically invisible labour of informal caregiving that is undertaken by the families and friends of those who are ill or otherwise disabled. Because Adele’s family is unable to access proper public healthcare resources within the community, the burden of care falls upon the protagonist and his brother, who become “parentified children.” Parentified children, according to Nancy D. Chase, are “parents to their parents, and fulfill this role at the expense of their own developmentally appropriate needs and pursuits.” The novel provides a depiction of informal caregiving that is multi-faceted and asks us to question why is it exactly that we place the burden of care on those who are not equipped to handle such pressures instead of putting the onus on the government and the public healthcare system to take care of its most vulnerable members. Ageing Studies scholar Larry Polvika notes that although policymakers often offer “pious expressions of appreciation” and acknowledge that informal caregiving is “the backbone of our long-term care system,” governmental support for these caregivers remains inadequate. It is my belief that, by showcasing the struggles of informal caregivers, Chariandy’s text combats this dangerous and empty political rhetoric.Keywords: caregiving, dementia, literature, parentified children
Procedia PDF Downloads 17925803 An Empirical Study of Factors that Impact Government E-Services Acceptance by Citizens: Case Study from UAE
Authors: Emad Bataineh, Sara Al-Mutawa
Abstract:
The primary focus of this study is to investigate and identify the perceptions of potential end users relating to factors which impact on e-services acceptance. Technology Acceptance Model (TAM) has been adopted in this study as it can be extended when technologies are introduced. This research validates the developed TAM model and evaluates the variance of the outcome variable (acceptance of e-services). Five factors were adopted as determinants of acceptance of e-services: ease of use, security, trust, web skills, and language. The study was undertaken in the General Directorate of Residency and Foreigners Affairs (GDRFA) in the UAE. A quantitative survey methodology was adopted in this study, which surveyed 466 customers who use the GDRFA e-services. The overall findings revealed that security language, web skills and support significantly affected ease of use and perceived usefulness. However, the trust doesn’t affect the ease of use. Further, ease of use significantly affects intention to use and perceived usefulness while in turn intention to use was influenced by perceived usefulness. This study offers an understanding of people’s adoption of e-government services with the help of established theories such as TAM and various factors that influence the e-government adoption with reference to UAE.Keywords: e-government portal, e-service, usability, TAM model
Procedia PDF Downloads 43625802 Policy and System Research for Health of Ageing Population
Authors: Sehrish Ather
Abstract:
Introduction: To improve organizational achievements through the production of new knowledge, health policy and system research is the basic requirement. An aging population is always the source of the increased burden of chronic diseases, disabilities, mental illnesses, and other co-morbidities; therefore the provision of quality health care services to every group of the population should be achieved by making strong policy and system research for the betterment of health care system. Unfortunately, the whole world is lacking policies and system research for providing health care to their elderly population. Materials and Methods: A literature review of published studies on aging diseases was done, ranging from the year 2011-2018. Geriatric, population, health policy, system, and research were the key terms used for the search. Databases searched were Google Scholar, PubMed, Science Direct, Ovid, and Research Gate. Grey literature was searched from various websites, including IHME, Library of the University of Lahore, World Health Organization (Ageing and Life Course), and Personal communication with Neuro-physicians. After careful reviewing published and un-published information, it was decided to carry on with commentary. Results and discussion: Most of the published studies have highlighted the need to advocate the funders of health policy and stakeholders of healthcare system research, and it was detected as a major issue, research on policy and healthcare system to provide health care to 'geriatric population' was found as highly neglected area. Conclusion: It is concluded that physicians are more involved with the policy and system research regarding any type of diseases, but scientists and researchers of basic and social science are less likely to be involved in methods used for health policy and system research due to lack of funding and resources. Therefore ageing diseases should be considered as a priority, and comprehensive policy and system research should be initiated for diseases of the geriatric population.Keywords: geriatric population, health care system, health policy, system research
Procedia PDF Downloads 11125801 The Effect of Geographical Differentials of Epidemiological Transition on Health-Seeking Behavior in India
Authors: Sumit Kumar Das, Laishram Ladusingh
Abstract:
Aim: The aim of the study is to examine the differential of epidemiological transition across fifteen agro-climatic zones of India and its effect on health-seeking behavior. Data and Methods: Unit level data on consumption expenditure on health of India from three decadal rounds conducted by National Sample Survey Organization are used for the analysis. These three rounds are 52nd (1995-96), 60th (2004-05) and 71st (2014-15). The age-adjusted prevalence rate for communicable diseases and non-communicable diseases are estimated for fifteen agro-climatic zones of India for three time periods. Bivariate analysis is used to find out determinants of health-seeking behavior. Multilevel logistic regression is used to examine factors effecting on household health-seeking behavior. Result: The prevalence of communicable diseases is increasing in most of the zones of India. Every South Indian zones, Gujarat plains, and lower Gangetic plain are facing the severe attack of dual burden of diseases. Demand for medical advice has increased in southern zones, and east zones, reliance on private healthcare facilities are increasing in most of the zone. Demographic characteristics of the household head have a significant impact on health-seeking behavior. Conclusion: Proper program implementation is required considering the disease prevalence and differential in the pattern of health seeking behavior. Along with initiation and strengthening of programs for non-communicable, existing programs for communicable diseases need to monitor and supervised strictly.Keywords: agro-climatic zone, epidemiological transition, health-seeking behavior, multilevel regression
Procedia PDF Downloads 18425800 A Survey of Semantic Integration Approaches in Bioinformatics
Authors: Chaimaa Messaoudi, Rachida Fissoune, Hassan Badir
Abstract:
Technological advances of computer science and data analysis are helping to provide continuously huge volumes of biological data, which are available on the web. Such advances involve and require powerful techniques for data integration to extract pertinent knowledge and information for a specific question. Biomedical exploration of these big data often requires the use of complex queries across multiple autonomous, heterogeneous and distributed data sources. Semantic integration is an active area of research in several disciplines, such as databases, information-integration, and ontology. We provide a survey of some approaches and techniques for integrating biological data, we focus on those developed in the ontology community.Keywords: biological ontology, linked data, semantic data integration, semantic web
Procedia PDF Downloads 45125799 An Analysis of Non-Elliptic Curve Based Primality Tests
Authors: William Wong, Zakaria Alomari, Hon Ching Lai, Zhida Li
Abstract:
Modern-day information security depends on implementing Diffie-Hellman, which requires the generation of prime numbers. Because the number of primes is infinite, it is impractical to store prime numbers for use, and therefore, primality tests are indispensable in modern-day information security. A primality test is a test to determine whether a number is prime or composite. There are two types of primality tests, which are deterministic tests and probabilistic tests. Deterministic tests are adopting algorithms that provide a definite answer whether a given number is prime or composite. While in probabilistic tests, a probabilistic result would be provided, there is a degree of uncertainty. In this paper, we review three probabilistic tests: the Fermat Primality Test, the Miller-Rabin Test, and the Baillie-PSW Test, as well as one deterministic test, the Agrawal-Kayal-Saxena (AKS) Test. Furthermore, we do an analysis of these tests. All of the reviews discussed are not based on the Elliptic Curve. The analysis demonstrates that, in the majority of real-world scenarios, the Baillie- PSW test’s favorability stems from its typical operational complexity of O(log 3n) and its capacity to deliver accurate results for numbers below 2^64.Keywords: primality tests, Fermat’s primality test, Miller-Rabin primality test, Baillie-PSW primality test, AKS primality test
Procedia PDF Downloads 9125798 Impact of Out-Of-Pocket Payments on Health Care Finance and Access to Health Care Services: The Case of Health Transformation Program in Turkey
Authors: Bengi Demirci
Abstract:
Out-of-pocket payments have become one of the common models adopted by health care reforms all over the world, and they have serious implications for not only the financial set-up of the health care systems in question but also for the people involved in terms of their access to the health care services provided. On the one hand, out-of-pocket payments are used in raising resources for the finance of the health care system and in decreasing non-essential health care expenses by having a deterrent role on the patients. On the other hand, out-of-pocket payment model causes regressive distribution effect by putting more burdens on the lower income groups and making them refrain from using health care services. Being a relatively incipient country having adopted the out-of-pocket payment model within the context of its Health Transformation Program which has been ongoing since the early 2000s, Turkey provides a good case for re-evaluating the pros and cons of this model in order not to sacrifice equality in access to health care for raising revenue for health care finance and vice versa. Therefore this study aims at analyzing the impact of out-of-pocket payments on the health finance system itself and on the patients’ access to healthcare services in Turkey where out-of-pocket payment model has been in use for a while. In so doing, data showing the revenue obtained from out-of-pocket payments and their share in health care finance are analyzed. In addition to this, data showing the change in the amount of expenditure made by patients on health care services after the adoption of out-of-pocket payments and the change in the use of various health care services in the meanwhile are examined. It is important for the incipient countries like Turkey to be careful in striking the right balance between the objective of cost efficiency and that of equality in accessing health care services while adopting the out-of-pocket payment model.Keywords: health care access, health care finance, health reform, out-of-pocket payments
Procedia PDF Downloads 37525797 Analysis the Impacts of WeChat Mobile Payment in China Teens' Online Purchasing Behaviors
Authors: Lok Yi Joyce Poon
Abstract:
China's mobile payment market has boomed in the past few years. WeChat (Chinese name as Weixin) owned by Tencent is known as the fastest growing all-in-one social messaging platforms. The company has launched the WeChat Pay in 2013, in which users can link their credit card to their user account and make payments within the app’s built in digital wallet. WeChat Payment is a one-stop payment tool that can provide a seamless online experience for the shoppers to transfer money between WeChat users (peer-to-peer) and make payments online by scanning a QR code, a prominent facilitator for transactions in WeChat, to complete the payment with the app without directing the users to the external websites. The aims of this study are to examine the effectiveness of WeChat mobile payment in China as well as the impacts of the China teen’s online purchasing behavior since the establishment of WeChat Payment. The research method of this study is conducted by both online survey on Sojump, a popular online survey platform in China. A total of 120 respondents among 18 to 25 teens in China completed the survey. Data sources included participants’ response to an end-of-session questionnaire, encompassing with the types of multiple choice, open-ended questions. To have an in-depth analysis, a face-to-face interview with a Chinese teen who is a frequent user of the WeChat Pay. The main finding of the study shows that the majority of the teenagers frequently use the WeChat payment tool because of its convenience, user-friendliness and the scenarios offered within the WeChat Wallet. The respondents claimed that they will settle the bills in their daily lives via WeChat Pay. However, the respondents in the age group of 40 or above will not use the WeChat Pay due to the security concern and they do not see the app as a platform for commercial activities like online shopping. Throughout the study, it is recommended WeChat should put more efforts on the security issue and improve the payment technology by adopting the near-field communication terminals instead of requiring users to scan QR codes before they complete the transaction.Keywords: digital wallet, mobile payment, online purchasing behavior, WeChat Pay
Procedia PDF Downloads 39425796 Computer-Aided Depression Screening: A Literature Review on Optimal Methodologies for Mental Health Screening
Authors: Michelle Nighswander
Abstract:
Suicide can be a tragic response to mental illness. It is difficult for people to disclose or discuss suicidal impulses. The stigma surrounding mental health can create a reluctance to seek help for mental illness. Patients may feel pressure to exhibit a socially desirable demeanor rather than reveal these issues, especially if they sense their healthcare provider is pressed for time or does not have an extensive history with their provider. Overcoming these barriers can be challenging. Although there are several validated depression and suicide risk instruments, varying processes used to administer these tools may impact the truthfulness of the responses. A literature review was conducted to find evidence of the impact of the environment on the accuracy of depression screening. Many investigations do not describe the environment and fewer studies use a comparison design. However, three studies demonstrated that computerized self-reporting might be more likely to elicit truthful and accurate responses due to increased privacy when responding compared to a face-to-face interview. These studies showed patients reported positive reactions to computerized screening for other stigmatizing health conditions such as alcohol use during pregnancy. Computerized self-screening for depression offers the possibility of more privacy and patient reflection, which could then send a targeted message of risk to the healthcare provider. This could potentially increase the accuracy while also increasing time efficiency for the clinic. Considering the persistent effects of mental health stigma, how these screening questions are posed can impact patients’ responses. This literature review analyzes trends in depression screening methodologies, the impact of setting on the results and how this may assist in overcoming one barrier caused by stigma.Keywords: computerized self-report, depression, mental health stigma, suicide risk
Procedia PDF Downloads 13225795 The Future of Food and Agriculture in India: Trends and Challenges
Authors: Vishwambhar Prasad Sati
Abstract:
India’s economy is agriculture dominated. About 70% of the total population depends on practicing agriculture. Out of an estimated 140.3 million ha net cultivated area, 79.44 million ha (57%) is rain-fed, contributing 44% of the total food grain production. Meanwhile, India ranks second and shares 11.3% of the arable land of the world. It means that India has a high potential to harness agricultural resources for present and future food security. However, about 21.9% of people are living below the poverty line, and similarly, a large number of people are deprived or insecure about food. This situation is most critical in rural areas, where about 70% population lives. The study examines the present status, future trends, and challenges of food and agriculture in India. Time series data of the last three decades was gathered from secondary sources on area, production, and yield of crops; irrigated area; production of major crops; area, production, and yield of crops in the major food-producing states of India; food storage and poverty. The data were analyzed using descriptive statistics, correlation methods, and a regression model. State-level data on area, production, and yield of crops and irrigation facilities were indexed into levels, and the potentials of food production in the major food-producing states were observed. It was noted that the progressive growth rate of food production is higher than the population, which means that food is enough to feed the population; however, it is not accessible to all optimally because of wastage, leakage, lack of food storage, and proper distribution of food. If food is stored and distributed properly, there would not be any food shortage in India, the study revealed.Keywords: agriculture, food production, population growth, poverty, future trends
Procedia PDF Downloads 10225794 Classification of Generative Adversarial Network Generated Multivariate Time Series Data Featuring Transformer-Based Deep Learning Architecture
Authors: Thrivikraman Aswathi, S. Advaith
Abstract:
As there can be cases where the use of real data is somehow limited, such as when it is hard to get access to a large volume of real data, we need to go for synthetic data generation. This produces high-quality synthetic data while maintaining the statistical properties of a specific dataset. In the present work, a generative adversarial network (GAN) is trained to produce multivariate time series (MTS) data since the MTS is now being gathered more often in various real-world systems. Furthermore, the GAN-generated MTS data is fed into a transformer-based deep learning architecture that carries out the data categorization into predefined classes. Further, the model is evaluated across various distinct domains by generating corresponding MTS data.Keywords: GAN, transformer, classification, multivariate time series
Procedia PDF Downloads 13325793 Sustaining Efficiency in Electricity Distribution to Enhance Effective Human Security for the Vulnerable People in Ghana
Authors: Anthony Nyamekeh-Armah Adjei, Toshiaki Aoki
Abstract:
The unreliable and poor efficiency of electricity distribution leading to frequent power outages and high losses are the major challenge facing the power distribution sector in Ghana. Distribution system routes electricity from the power generating station at a higher voltage through the transmission grid and steps it down through the low voltage lines to end users. Approximately all electricity problems and disturbances that have increased the call for renewable and sustainable energy in recent years have their roots in the distribution system. Therefore, sustaining electricity distribution efficiency can potentially contribute to the reserve of natural energy resources use in power generation, reducing greenhouse gas emission (GHG), decreasing tariffs for consumers and effective human security. Human Security is a people-centered approach where individual human being is the principal object of concern, focuses on protecting the vital core of all human lives in ways for meeting basic needs that enhance the safety and protection of individuals and communities. The vulnerability is the diminished capacity of an individual or group to anticipate, resist and recover from the effect of natural, human-induced disaster. The research objectives are to explore the causes of frequent power outages to consumers, high losses in the distribution network and the effect of poor electricity distribution efficiency on the vulnerable (poor and ordinary) people that mostly depend on electricity for their daily activities or life to survive. The importance of the study is that in a developing country like Ghana where raising a capital for new infrastructure project is difficult, it would be beneficial to enhance the efficiency that will significantly minimize the high energy losses, reduce power outage, to ensure safe and reliable delivery of electric power to consumers to secure the security of people’s livelihood. The methodology used in this study is both interview and questionnaire survey to analyze the response from the respondents on causes of power outages and high losses facing the electricity company of Ghana (ECG) and its effect on the livelihood on the vulnerable people. Among the outcome of both administered questionnaire and the interview survey from the field were; poor maintenance of existing sub-stations, use of aging equipment, use of poor distribution infrastructure and poor metering and billing system. The main observation of this paper is that the poor network efficiency (high losses and power outages) affects the livelihood of the vulnerable people. Therefore, the paper recommends that policymakers should insist on all regulation guiding electricity distribution to improve system efficiency. In conclusion, there should be decentralization of off-grid solar PV technologies to provide a sustainable and cost-effective, which can increase daily productivity and improve the quality of life of the vulnerable people in the rural communities.Keywords: electricity efficiency, high losses, human security, power outage
Procedia PDF Downloads 28825792 Generative AI: A Comparison of Conditional Tabular Generative Adversarial Networks and Conditional Tabular Generative Adversarial Networks with Gaussian Copula in Generating Synthetic Data with Synthetic Data Vault
Authors: Lakshmi Prayaga, Chandra Prayaga. Aaron Wade, Gopi Shankar Mallu, Harsha Satya Pola
Abstract:
Synthetic data generated by Generative Adversarial Networks and Autoencoders is becoming more common to combat the problem of insufficient data for research purposes. However, generating synthetic data is a tedious task requiring extensive mathematical and programming background. Open-source platforms such as the Synthetic Data Vault (SDV) and Mostly AI have offered a platform that is user-friendly and accessible to non-technical professionals to generate synthetic data to augment existing data for further analysis. The SDV also provides for additions to the generic GAN, such as the Gaussian copula. We present the results from two synthetic data sets (CTGAN data and CTGAN with Gaussian Copula) generated by the SDV and report the findings. The results indicate that the ROC and AUC curves for the data generated by adding the layer of Gaussian copula are much higher than the data generated by the CTGAN.Keywords: synthetic data generation, generative adversarial networks, conditional tabular GAN, Gaussian copula
Procedia PDF Downloads 8525791 Analysis of Impact of Flu Vaccination on Acute Respiratory Viral Infections (ARVI) Morbidity among Population in South Kazakhstan Region, 2010-2015
Authors: Karlygash Tulendieva
Abstract:
Presently vaccination is the most effective method of prevention of flu and its complications. The purpose of this study was to analyze the impact of the increase of coverage of the population of South Kazakhstan region with flu vaccination and decrease of the ARVI morbidity. The analysis was performed on the data of flu vaccination of risk groups, including children under one year and pregnant women. Data on ARVI morbidity during 2010-2015 and data on vaccination were taken from the reports of the Epidemiological Surveillance Unit of Department of Consumers’ Rights Protection of South Kazakhstan region. Coverage with flu vaccination of the risk groups was annually increasing and in 2015 it reached 16% (450,000/2,800,682) from the total population. The ARVI morbidity rate in the entire population in 2010 was 2,010.4 per 100,000 of the population and decreased 3.2 times to 609.9 per 100,000 of the population in 2015. Annual growth was observed from 2010 to 2015 of specific weight of the vaccinated main risk groups: healthcare workers by 51% (from 17,331 in 2010 to 33,538 in 2015), children with chronic pulmonary and cardio-vascular diseases, immune deficiency, weak and sickly children above six months by 39% (from 63,122 in 2010 to 158,023 in 2015), adults with chronic co-morbidities by 27% (from 44,271 in 2010 to 162,595 in 2015), persons above 65 by 17% (from 10,276 in 2010 to 57,875 in 2015), and annual coverage of pregnant women on second or third trimester from 34,443 in 2010 to 37,969 in 2015. Starting from 2013 and until 2015 vaccination was performed in the region with coverage of at least 90% of children from 6 months to one year. The ARVI morbidity in this age group decreased 3.3 times from 8,687.8 per 100,000 of the population in 2010 to 2,585.8 per 100,000 of the population in 2015. Vaccination of pregnant women on 2-3 trimester was started in the region in 2012. Annual increase of vaccination coverage of pregnant women from 86.1% (34,443/40,000) in 2012 to 95% (37,969/40,000) in 2015 decreased the morbidity 1.5 times from 4,828.8 per 100,000 of population in 2012 to 3,022.7 per 100,000 of population in 2015. Following the increase of vaccination coverage of the population in South Kazakhstan region, the trend was observed of decrease of ARVI morbidity rates among the population and main risk groups, among pregnant women and children under one year.Keywords: acute respiratory viral infections, flu, risk groups, vaccination
Procedia PDF Downloads 242