Search results for: healthcare data security
25729 The Role of Food Labeling on Consumers’ Buying Decision: Georgian Case
Authors: Nugzar Todua
Abstract:
The paper studies the role of food labeling in order to promote healthy eating issue in Georgia. The main focus of the research is directed to consumer attitudes regarding food labeling. The methodology of the paper is based on the focus group work, as well as online and face to face surveys. The data analysis has been provided through ANOVA. The study proves that the impact of variables such as the interest, awareness, reliability, assurance and satisfaction of consumers' on buying decision, is statistically important. The study reveals that consumers’ perception regarding to food labeling is positive, but their level of knowledge and ability is rather low. It is urgent to strengthen marketing promotions strategies in the process of implementations of food security policy in Georgia.Keywords: food labeling, buying decision, Georgian consumers, marketing research
Procedia PDF Downloads 16725728 The Cost-Effectiveness of High-Volume Hospital’s Surgical Care for Pancreatic Cancer: Economic Evidence Reviewed
Authors: Shannon Hearney, Jeffrey Hoch
Abstract:
Pancreatic cancer is a notoriously costly and deadly form of cancer. Many types of treatment centers exist for patients to seek care from, including high-volume centers which have shown promise to provide the highest quality of care. While it may be true that this type of center provides the best care it is unclear if that care is cost-effective. Studies in the US have confirmed that high-volume hospitals do provide higher quality of care but have shown inconsistencies in the cost-effectiveness of that care. Other studies, like those from Finland have shown that high-volume centers had lower mortality and lower costs than low-volume centers. This paper thus seeks to review the current scientific literature to better understand if high-volume centers are cost-effective in delivering care in both a European setting and in the US. A review of major reference databases such as Medline, Embase and PubMed will be conducted for cost-effectiveness studies on the surgical treatment of pancreatic cancer at high-volume centers. Possible MeSH terms to be included, but not limited to, are: “pancreatic cancer”, “cost analysis”, “cost-effectiveness”, “economic evaluation”, “pancreatic neoplasms”, “surgical”, and “high-volume”. Studies must also have been available in the English language. This review will encompass European scientific literature, as well as those in the US. Based on our preliminary findings, we anticipate high-volume hospitals to provide better care at greater costs. We anticipate that high-volume hospitals may be cost-effective in different contexts depending on the national structure of a healthcare system. Countries with more centralized and socialized healthcare may yield results that are more cost-effective. High-volume centers may differ in their cost-effectiveness of the surgical care of pancreatic cancer internationally especially when comparing those in the United States to others throughout Europe.Keywords: cost-effectiveness analysis, economic evaluation, pancreatic cancer, scientific literature review
Procedia PDF Downloads 9325727 Data Poisoning Attacks on Federated Learning and Preventive Measures
Authors: Beulah Rani Inbanathan
Abstract:
In the present era, it is vivid from the numerous outcomes that data privacy is being compromised in various ways. Machine learning is one technology that uses the centralized server, and then data is given as input which is being analyzed by the algorithms present on this mentioned server, and hence outputs are predicted. However, each time the data must be sent by the user as the algorithm will analyze the input data in order to predict the output, which is prone to threats. The solution to overcome this issue is federated learning, where the models alone get updated while the data resides on the local machine and does not get exchanged with the other local models. Nevertheless, even on these local models, there are chances of data poisoning, and it is crystal clear from various experiments done by many people. This paper delves into many ways where data poisoning occurs and the many methods through which it is prevalent that data poisoning still exists. It includes the poisoning attacks on IoT devices, Edge devices, Autoregressive model, and also, on Industrial IoT systems and also, few points on how these could be evadible in order to protect our data which is personal, or sensitive, or harmful when exposed.Keywords: data poisoning, federated learning, Internet of Things, edge computing
Procedia PDF Downloads 8925726 ASEAN Our Eyes: A Strategic Information Exchange Platform on Counter-Terrorism
Authors: Nila Febri Wilujeng, Helda Risman
Abstract:
Enjoying stable security within its region for the last 50 years, ASEAN nowadays contends with the global context emerging dynamically, which brings about multidimensional challenges and threats such as terrorism, radicalism, armed rebellion, hijacking, and other non-traditional threats. Dealing with these circumstances, ASEAN member states tighten its capacity by enhancing regional cooperation and strategic information exchange among ASEAN member states so-called ASEAN Our Eyes. This initiative adopted for the sake of forestalling any possible threat posed by violent extremism, radicalization, and terrorism through timely strategic information exchange among ASEAN member states. By using qualitative method, this paper will utilize regional security complex and international cooperation theories in analyzing the process to examine ASEAN Our Eyes based on its terms of reference. As a result, it portrays that ASEAN Our Eyes is able to undermine the gaps in the realm of strategic information exchange in monitoring the movement of violent extremism, radicalism, foreign terrorist fighters, and crime-terror nexus. However, it remains premature as a strategic measure to encounter those threats in the years to come.Keywords: regional cooperation, counter-terrorism, ASEAN our eyes, strategic information exchange
Procedia PDF Downloads 21525725 The Relationships between the Feelings of Bullying, Self- Esteem, Employee Silence, Anger, Self- Blame and Shame
Authors: Şebnem Aslan, Demet Akarçay
Abstract:
The objective of this study is to investigate the feelings of health employees occurred by bullying and the relationships between these feelings at work place. In this context, the relationships between bullying and the feelings of self-esteem, employee silence, anger, self- blame and shame. This study was conducted among 512 health employees in three hospitals in Konya by using survey method and simple random sampling. The scales of bullying, self-esteem, employee silence, anger, self-blame, and shame were performed within the study. The obtained data were analyzed with descriptive analysis, correlation, confirmative factor analysis, structural equation modeling and path analysis. The results of the study showed that while bullying had a positive effect on self-esteem (.61), employee silence (.41), anger (.18), a negative effect on self-blame and shame (-.26) was observed. Employee silence affected self-blame and shame (.83) as positively. Besides, self-esteem impacted on self- blame and shame (.18), employee silence (.62) positively and self-blame and shame was observed as negatively affecting on anger (-.20). Similarly, self-esteem was found as negatively affected on anger (-.13).Keywords: bullying, self-esteem, employee silence, anger, shame and guilt, healthcare employee
Procedia PDF Downloads 29925724 Insecurity as a Challenge to Nutritional Status of Children and Mothers in Dansadau, Maru Local Government Area Zamfara State, North Western Nigeria
Authors: Mohammed Hussaini
Abstract:
This paper discusses insecurity as a challenge to the nutritional Status of children and mothers in Dansadau, Maru Local Government area of Zamfara state, Northwestern Nigeria. A Descriptive survey design was used in the study. Objectives of the study were formulated to guide the study. 20 Health workers and 100 mothers were used as population of the study; the instrument validation for data collection was interview. The interview structure was validated by 3 experts, the data collected was analyzed and presented using descriptive standard score (Z-score). The study revealed that, Nutritional Status of children and mothers in Northwest Nigeria specifically Zamfara state is low. This mostly affect children and mother as a result of serious insecurity challenge in the region, consisting of banditry and kidnapping, killing of farmers, destruction of farmland, burning of farm products. The study recommended that the focus is on implementing strong communication strategies to enhance short-term relief initiatives, both governmental and non-governmental organizations should actively play a role in initiating lasting change, especially when tackling issues of insecurity and effectively addressing the rise of armed banditry and other security concerns requires a sophisticated and nuanced strategy.Keywords: insecurity, malnutrition, children, mothers
Procedia PDF Downloads 5625723 WHO Surgical Safety Checklist in a Rural Ugandan Hospital, Barriers and Drivers to Implementation
Authors: Lucie Litvack, Malaz Elsaddig, Kevin Jones
Abstract:
There is strong evidence to support the efficacy of the World Health Organization (WHO) Surgical Safety Checklist in improving patient safety; however, its use can be associated with difficulties. This study uses qualitative data collected in Kitovu Healthcare Complex, a rural Ugandan hospital, to identify factors that may influence the use of the checklist in a low-income setting. Potential barriers to and motivators for the hospital’s use of this checklist are identified and explored through observations of current patient safety practices; semi-structured interviews with theatre staff; a focus group with doctors; and trial implementation of the checklist. Barriers identified include the institutional context; knowledge and understanding; patient safety culture; resources and checklist contents. Motivators for correct use include prior knowledge; team attitudes; and a hospital advocate. Challenges are complex and unique to this socioeconomic context. Stepwise change to improve patient safety practices, local champions, whole team training, and checklist modification may assist the implementation and sustainable use of the checklist in an effective way.Keywords: anaesthesia, patient safety, Uganda, WHO surgical safety checklist
Procedia PDF Downloads 36025722 Factors Influencing Intention to Engage in Long-term Care Services among Nursing Aide Trainees and the General Public
Authors: Ju-Chun Chien
Abstract:
Rapid aging and depopulation could lead to serious problems, including workforce shortages and health expenditure costs. The current and predicted future LTC workforce shortages could be a real threat to Taiwan’s society. By means of comparison of data from 144 nursing aide trainees and 727 general public, the main purpose of the present study was to determine whether there were any notable differences between the two groups toward engaging in LTC services. Moreover, this study focused on recognizing the attributes of the general public who had the willingness to take LTC jobs but continue to ride the fence. A self-developed questionnaire was designed based on Ajzen’s Theory of Planned Behavior model. After conducting exploratory factor analysis (EFA) and reliability analysis, the questionnaire was a reliable and valid instrument for both nursing aide trainees and the general public. The main results were as follows: Firstly, nearly 70% of nursing aide trainees showed interest in LTC jobs. Most of them were middle-aged female (M = 46.85, SD = 9.31), had a high school diploma or lower, had unrelated work experience in healthcare, and were mostly unemployed. The most common reason for attending the LTC training program was to gain skills in a particular field. The second most common reason was to obtain the license. The third and fourth reasons were to be interested in caring for people and to increase income. The three major reasons that might push them to leave LTC jobs were physical exhaustion, payment is bad, and being looked down on. Secondly, the variables that best-predicted nursing aide trainees’ intention to engage in LTC services were having personal willingness, perceived behavior control, with high school diploma or lower, and supported from family and friends. Finally, only 11.80% of the general public reported having interest in LTC jobs (the disapproval rating was 50% for the general public). In comparison to nursing aide trainees who showed interest in LTC settings, 64.8% of the new workforce for LTC among the general public was male and had an associate degree, 54.8% had relevant healthcare experience, 67.1% was currently employed, and they were younger (M = 32.19, SD = 13.19) and unmarried (66.3%). Furthermore, the most commonly reason for the new workforce to engage in LTC jobs were to gain skills in a particular field. The second priority was to be interested in caring for people. The third and fourth most reasons were to give back to society and to increase income, respectively. The top five most commonly reasons for the new workforce to quitting LTC jobs were listed as follows: physical exhaustion, being looked down on, excessive working hours, payment is bad, and excessive job stress.Keywords: long-term care services, nursing aide trainees, Taiwanese people, theory of planned behavior
Procedia PDF Downloads 16025721 Faculty Attendance Management System (FAMS)
Authors: G. C. Almiranez, J. Mercado, L. U. Aumentado, J. M. Mahaguay, J. P. Cruz, M. L. Saballe
Abstract:
This research project focused on the development of an application that aids the university administrators to establish an efficient and effective system in managing faculty attendance and discourage unnecessary absences. The Faculty Attendance Management System (FAMS) is a web based and mobile application which is proven to be efficient and effective in handling and recording data, generating updated reports and analytics needed in managing faculty attendance. The FAMS can facilitate not only a convenient and faster way of gathering and recording of data but it can also provide data analytics, immediate feedback system mechanism and analysis. The software database architecture uses MySQL for web based and SQLite for mobile applications. The system includes different modules that capture daily attendance of faculty members, generate faculty attendance reports and analytics, absences notification system for faculty members, chairperson and dean regarding absences, and immediate communication system concerning the absences incurred. Quantitative and qualitative evaluation showed that the system satisfactory meet the stakeholder’s requirements. The functionality, usability, reliability, performance, and security all turned out to be above average. System testing, integration testing and user acceptance testing had been conducted. Results showed that the system performed very satisfactory and functions as designed. Performance of the system is also affected by Internet infrastructure or connectivity of the university. The faculty analytics generated from the system may not only be used by Deans and Chairperson in their evaluation of faculty performance but as well as the individual faculty to increase awareness on their attendance in class. Hence, the system facilitates effective communication between system stakeholders through FAMS feedback mechanism and up to date posting of information.Keywords: faculty attendance management system, MySQL, SQLite, FAMS, analytics
Procedia PDF Downloads 44225720 New Practical and Non-Malleable Elgamal Encryption for E-Voting Protoco
Authors: Karima Djebaili, Lamine Melkemi
Abstract:
Elgamal encryption is a fundamental public-key encryption in cryptography, which is based on the difficulty of discrete logarithm problem and the Diffie-Hellman problem. Supposing the Diffie–Hellman problem is computationally infeasible then Elgamal is secure under a chosen plaintext attack, where security indicates it is difficult for the attacker, given the ciphertext, to restore the whole of the plaintext. However, although it is secure against chosen plaintext attack, Elgamal is absolutely malleable i.e. is not secure against an adaptive chosen ciphertext attack, where the attacker can recover the plaintext. We present a extension on Elgamal encryption which result in non-malleability against adaptive chosen plaintext attack using concatenation and a cryptographic hash function, our evidence utilizes the device of plaintext aware. The algorithm proposed can be used in cryptography voting protocol given its level security. Our protocol protects the confidentiality of voters because each voter encrypts their choice before casting their vote, offers public verifiability using a signing algorithm, the final result is correctly computed using homomorphic property, and works even in the presence of an adversary due to the propriety of non-malleability. Moreover, the protocol prevents some parties colluding to fix the vote results.Keywords: Elgamal encryption, non-malleability, plaintext aware, e-voting
Procedia PDF Downloads 45425719 A Real-World Roadmap and Exploration of Quantum Computers Capacity to Trivialise Internet Security
Authors: James Andrew Fitzjohn
Abstract:
This paper intends to discuss and explore the practical aspects of cracking encrypted messages with quantum computers. The theory of this process has been shown and well described both in academic papers and headline-grabbing news articles, but with all theory and hyperbole, we must be careful to assess the practicalities of these claims. Therefore, we will use real-world devices and proof of concept code to prove or disprove the notion that quantum computers will render the encryption technologies used by many websites unfit for purpose. It is time to discuss and implement the practical aspects of the process as many advances in quantum computing hardware/software have recently been made. This paper will set expectations regarding the useful lifespan of RSA and cipher lengths and propose alternative encryption technologies. We will set out comprehensive roadmaps describing when and how encryption schemes can be used, including when they can no longer be trusted. The cost will also be factored into our investigation; for example, it would make little financial sense to spend millions of dollars on a quantum computer to factor a private key in seconds when a commodity GPU could perform the same task in hours. It is hoped that the real-world results depicted in this paper will help influence the owners of websites who can take appropriate actions to improve the security of their provisions.Keywords: quantum computing, encryption, RSA, roadmap, real world
Procedia PDF Downloads 13625718 An Approach of Computer Modalities for Exploration of Hieroglyphics Substantial in an Investigation
Authors: Aditi Chauhan, Neethu S. Mohan
Abstract:
In the modern era, the advancement and digitalization in technology have taken place during an investigation of crime scene. The rapid enhancement and investigative techniques have changed the mean of identification of suspect. Identification of the person is one of the significant aspects, and personal authentication is the key of security and reliability in society. Since early 90 s, people have relied on comparing handwriting through its class and individual characteristics. But in today’s 21st century we need more reliable means to identify individual through handwriting. An approach employing computer modalities have lately proved itself auspicious enough in exploration of hieroglyphics substantial in investigating the case. Various software’s such as FISH, WRITEON, and PIKASO, CEDAR-FOX SYSTEM identify and verify the associated quantitative measure of the similarity between two samples. The research till date has been confined to identify the authorship of the concerned samples. But prospects associated with the use of computational modalities might help to identify disguised writing, forged handwriting or say altered or modified writing. Considering the applications of such modal, similar work is sure to attract plethora of research in immediate future. It has a promising role in national security too. Documents exchanged among terrorist can also be brought under the radar of surveillance, bringing forth their source of existence.Keywords: documents, identity, computational system, suspect
Procedia PDF Downloads 17925717 Standard Resource Parameter Based Trust Model in Cloud Computing
Authors: Shyamlal Kumawat
Abstract:
Cloud computing is shifting the approach IT capital are utilized. Cloud computing dynamically delivers convenient, on-demand access to shared pools of software resources, platform and hardware as a service through internet. The cloud computing model—made promising by sophisticated automation, provisioning and virtualization technologies. Users want the ability to access these services including infrastructure resources, how and when they choose. To accommodate this shift in the consumption model technology has to deal with the security, compatibility and trust issues associated with delivering that convenience to application business owners, developers and users. Absent of these issues, trust has attracted extensive attention in Cloud computing as a solution to enhance the security. This paper proposes a trusted computing technology through Standard Resource parameter Based Trust Model in Cloud Computing to select the appropriate cloud service providers. The direct trust of cloud entities is computed on basis of the interaction evidences in past and sustained on its present performances. Various SLA parameters between consumer and provider are considered in trust computation and compliance process. The simulations are performed using CloudSim framework and experimental results show that the proposed model is effective and extensible.Keywords: cloud, Iaas, Saas, Paas
Procedia PDF Downloads 33425716 Simulation and Hardware Implementation of Data Communication Between CAN Controllers for Automotive Applications
Authors: R. M. Kalayappan, N. Kathiravan
Abstract:
In automobile industries, Controller Area Network (CAN) is widely used to reduce the system complexity and inter-task communication. Therefore, this paper proposes the hardware implementation of data frame communication between one controller to other. The CAN data frames and protocols will be explained deeply, here. The data frames are transferred without any collision or corruption. The simulation is made in the KEIL vision software to display the data transfer between transmitter and receiver in CAN. ARM7 micro-controller is used to transfer data’s between the controllers in real time. Data transfer is verified using the CRO.Keywords: control area network (CAN), automotive electronic control unit, CAN 2.0, industry
Procedia PDF Downloads 39925715 Improving the Statistics Nature in Research Information System
Authors: Rajbir Cheema
Abstract:
In order to introduce an integrated research information system, this will provide scientific institutions with the necessary information on research activities and research results in assured quality. Since data collection, duplication, missing values, incorrect formatting, inconsistencies, etc. can arise in the collection of research data in different research information systems, which can have a wide range of negative effects on data quality, the subject of data quality should be treated with better results. This paper examines the data quality problems in research information systems and presents the new techniques that enable organizations to improve their quality of research information.Keywords: Research information systems (RIS), research information, heterogeneous sources, data quality, data cleansing, science system, standardization
Procedia PDF Downloads 15925714 Data Mining Meets Educational Analysis: Opportunities and Challenges for Research
Authors: Carla Silva
Abstract:
Recent development of information and communication technology enables us to acquire, collect, analyse data in various fields of socioeconomic – technological systems. Along with the increase of economic globalization and the evolution of information technology, data mining has become an important approach for economic data analysis. As a result, there has been a critical need for automated approaches to effective and efficient usage of massive amount of educational data, in order to support institutions to a strategic planning and investment decision-making. In this article, we will address data from several different perspectives and define the applied data to sciences. Many believe that 'big data' will transform business, government, and other aspects of the economy. We discuss how new data may impact educational policy and educational research. Large scale administrative data sets and proprietary private sector data can greatly improve the way we measure, track, and describe educational activity and educational impact. We also consider whether the big data predictive modeling tools that have emerged in statistics and computer science may prove useful in educational and furthermore in economics. Finally, we highlight a number of challenges and opportunities for future research.Keywords: data mining, research analysis, investment decision-making, educational research
Procedia PDF Downloads 36125713 Value Chain Analysis of Melon “Egusi” (Citrullus lanatus Thunb. Mansf) among Rural Farm Enterprises in South East, Nigeria
Authors: Chigozirim Onwusiribe, Jude Mbanasor
Abstract:
Egusi Melon (Citrullus Lanatus Thunb. Mansf ) is a very important oil seed that serves a major ingredient in the diet of most of the households in Nigeria. Egusi Melon is very nutritious and very important in meeting the food security needs of Nigerians. Egusi Melon is cultivated in most farm enterprise in South East Nigeria but the profitability of its value chain needs to be investigated. This study analyzed the profitability of the Egusi Melon value chain. Specifically this study developed a value chain map for Egusi Melon, analysed the profitability of each stage of the Egusi Melon Value chain and analysed the determinants of the profitability of the Egusi Melon at each stage of the value chain. Multi stage sampling technique was used to select 125 farm enterprises with similar capacity and characteristics. Questionnaire and interview were used to elicit the required data while descriptive statistics, Food and Agriculture Organization Value Chain Analysis Tool, profitability ratios and multiple regression analysis were used for the data analysis. One of the findings showed that the stages of the Egusi Melon value chain are very profitable. Based on the findings, we recommend the provision of grants by government and donor agencies to the farm enterprises through their cooperative societies, this will provide the necessary funds for the local fabrication of value addition and processing equipment to suit their unique value addition needs not met by the imported equipment.Keywords: value, chain, melon, farm, enterprises
Procedia PDF Downloads 13825712 Empowering the Sustainability of Community Health: An Application of the Theory of Maqasid Al-Shariah
Authors: Ahasanul Haque, Noor Hazilah Abd Manaf, Zohurul Anis, Tarekol Islam
Abstract:
Sustainable community health (SCH) is an example of a new healthcare concept formed from applying the Maqasid al-Shariah principle to hospital management and delivery services. Because the idea is novel, it needs comprehensive and ongoing investigation to be improved. However, there is a lack of research on the necessity of developing sustainable community health (SCH), particularly its organizational structure. Furthermore, there is a misconception about the order of components in Maqasid al-Shariah, particularly in a hospital setting. Furthermore, the use of medicines and treatment by conventional recommendations to carry out the treatment by the Maqasid al Shariah. As such, this study focuses on the essential prerequisite for establishing a sustainable community health system based on Maqasid al-Shariah. This study discusses the use of Maqasid al-Shariah in administration and treatment. In this qualitative research approach, a literature search and interviews with specialists are conducted. The gathered data is examined using content analysis, emphasizing inductive and deductive reasoning. The research reveals that the Shariah Advisory Council and Shariah Critical Point are necessary for sustainable community health. In conclusion, by discussing the causes for each instance, this research adds to the creation of methods for determining the level of Maasid al-Shariah in-hospital care.Keywords: empowering, sustainability, community health, maqasid al shariah, hospital and malaysia
Procedia PDF Downloads 9025711 Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System
Authors: Farheen Tabassum, Shoab Ahmed Khan
Abstract:
The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches.Keywords: Distributed Denial-of-Service (DDoS), Collaborative Intrusion Detection System (CIDS), Slowloris, OSSIM (Open Source Security Information Management tool), OSSEC HIDS
Procedia PDF Downloads 35525710 A Method of Detecting the Difference in Two States of Brain Using Statistical Analysis of EEG Raw Data
Authors: Digvijaysingh S. Bana, Kiran R. Trivedi
Abstract:
This paper introduces various methods for the alpha wave to detect the difference between two states of brain. One healthy subject participated in the experiment. EEG was measured on the forehead above the eye (FP1 Position) with reference and ground electrode are on the ear clip. The data samples are obtained in the form of EEG raw data. The time duration of reading is of one minute. Various test are being performed on the alpha band EEG raw data.The readings are performed in different time duration of the entire day. The statistical analysis is being carried out on the EEG sample data in the form of various tests.Keywords: electroencephalogram(EEG), biometrics, authentication, EEG raw data
Procedia PDF Downloads 46625709 Factors Influencing the Uptake of Vaccinations amongst Pregnant Women Following the COVID-19 Pandemic
Authors: Jo Parsons, Cath Grimley, Debra Bick, Sarah Hillman, Louise Clarke, Helen Atherton
Abstract:
The problem: Vaccinations are routinely offered to pregnant women in the UK for influenza (flu), pertussis (whooping cough), and COVID-19, yet the uptake of these vaccinations in pregnancy remains low. Pregnant women are at increased risk of hospitalisation, morbidity, and mortality from these preventable illnesses, which can also expose their unborn babies to an increased risk of serious complications, including in utero death. This research aims to explore how pregnant women feel about vaccinations offered during pregnancy (flu, whooping cough, and COVID-19), particularly following the COVID-19 pandemic. It also aims to examine factors influencing women’s decisions about vaccinations during pregnancy and how they feel about their health and vulnerabilities to illness arising from the COVID-19 pandemic. The approach: This is a qualitative study involving semi-structured interviews with pregnant women and midwives in the UK. Interviews with pregnant women explored their views since the COVID-19 pandemic about vaccinations offered during pregnancy and whether the pandemic has influenced perceptions of vulnerability to illness in pregnant women. Interviews with midwives explored vaccination discussions they routinely have with pregnant women and identified some of the barriers to vaccination that pregnant women discuss with them. Pregnant women were recruited via participating hospitals and community groups. Midwives were recruited via participating hospitals and midwife-specific social media groups. All interviews were conducted remotely (using telephone or Microsoft Teams) and analysed using thematic analysis. Findings: 43 pregnant women and 16 midwives were recruited and interviewed. The findings presented will focus on data from pregnant women. Pregnant women reported a wide range of views and vaccination behaviour, and identified several factors influencing their decision whether to accept vaccinations or not. These included internal factors (comprised of beliefs about susceptibility to illness, perceptions of immunity, fear, and feelings of responsibility), other influences (including visibility of illness and external influences such as healthcare professional recommendations), vaccination-related factors (comprised of beliefs about effectiveness and safety of vaccinations, availability and accessibility of vaccinations and preferences for alternative forms of protection to vaccination) and COVID-19 specific factors (including COVID-19 vaccinations and COVID-19 specific influences). Implications: Findings identified some of the factors that affect pregnant women’s decisions when deciding to have a vaccination or not and how these decisions have been influenced by COVID-19. Findings highlight areas where healthcare professional advice needs to focus, such as the provision of information about the increased vulnerability to illnesses during pregnancy and consideration of opportunistic vaccination at hospital appointments to maximise uptake of vaccinations during pregnancy. Findings of this study will inform the development of an intervention to increase vaccination uptake amongst pregnant women.Keywords: vaccination, pregnancy, qualitative, interviews, COVID-19
Procedia PDF Downloads 10025708 Dermoscopy Compliance: Improving Melanoma Detection Pathways Through Quality Improvement
Authors: Max Butler
Abstract:
Melanoma accounts for 80% of skin cancer-related deaths globally. The poor prognosis and increasing incidence of melanoma impose a significant burden on global healthcare systems. Early detection, precise diagnosis, and preventative strategies are critical to improving patient outcomes. Dermoscopy is the gold standard for specialist assessments of pigmented skin lesions, as it can differentiate between benign and malignant growths with greater accuracy than visual inspection. In the United Kingdom, guidelines from the National Institute of Clinical Excellence (NICE) state dermoscopy should be used in all specialist assessments of pigmented skin lesions. Compliance with this guideline is low, resulting in missed and delayed melanoma diagnoses. To address this problem, a quality improvement project was initiated at Buckinghamshire Healthcare Trust (BHT) within the plastic surgery department. The target group was a trainee and consultant plastic surgeons conducting outpatient skin cancer clinics. Analysis of clinic documentation over a one-month period found that only 62% (38/61) of patients referred with pigmented skin lesions were examined using dermoscopy. To increase dermoscopy rates, teaching was delivered to the department highlighting national guidelines and the evidence base for dermoscopic examination. In addition, clinic paperwork was redesigned to include a text box for dermoscopic examination. Reauditing after the intervention found a significant increase in dermoscopy rates (52/61, p = 0.014). In conclusion, implementing a quality improvement project with targeted teaching and documentation template templates successfully increased dermoscopy rates. This is a promising step toward improving early melanoma detection and patient outcomes.Keywords: melanoma, dermoscopy, plastic surgery, quality improvement
Procedia PDF Downloads 7325707 Object Detection Based on Plane Segmentation and Features Matching for a Service Robot
Authors: António J. R. Neves, Rui Garcia, Paulo Dias, Alina Trifan
Abstract:
With the aging of the world population and the continuous growth in technology, service robots are more and more explored nowadays as alternatives to healthcare givers or personal assistants for the elderly or disabled people. Any service robot should be capable of interacting with the human companion, receive commands, navigate through the environment, either known or unknown, and recognize objects. This paper proposes an approach for object recognition based on the use of depth information and color images for a service robot. We present a study on two of the most used methods for object detection, where 3D data is used to detect the position of objects to classify that are found on horizontal surfaces. Since most of the objects of interest accessible for service robots are on these surfaces, the proposed 3D segmentation reduces the processing time and simplifies the scene for object recognition. The first approach for object recognition is based on color histograms, while the second is based on the use of the SIFT and SURF feature descriptors. We present comparative experimental results obtained with a real service robot.Keywords: object detection, feature, descriptors, SIFT, SURF, depth images, service robots
Procedia PDF Downloads 54725706 Growing Acts of Terrorism in Local Conflicts: A Dire Need for International Attention
Authors: Yusuf Abubakar Mamud
Abstract:
Highlighting the imperatives of local conflicts considering the dangerous dimensions of terrorism they are assuming in Africa has not attracted serious academic and political attention. The discourse about conflict in Africa was discussed within five identified conflict zones in the continent. The threats from these local conflicts are diverse and complex and the acts of terrorism in these local conflicts are driven by certain attitudes and behaviours linked to the African leadership. The paper examined and noted that the current conflict resolution model of the African Union (AU) was robust with requisite institutions to address the trends in local conflicts. However, it was observed that the AU peace and security framework lacked the requisite structural and technical capabilities to proactively address the drivers of local conflicts in Africa. It was found that the persistence of local conflicts in the African region may deny her the opportunities of achievement of the targets envisioned in the Sustainable Development Goals (SDGs). Consequently, the paper called on the international community to support Africa through provision of capacity. It urged the African leaders themselves to develop the political will to ensure that all issues concerning peace and security in the continent were guided by the provisions of the AU Constitutive Act. The need to strengthen the APRM in the light of the current trends in local conflicts was also highlighted.Keywords: conflicts, local conflicts, terrorism, sustainable development
Procedia PDF Downloads 27925705 Communication Barriers in Midwifery Students in the Field of Perinatal Palliative Care
Authors: Magdalena Hasplova, Katerina Ivanova
Abstract:
Perinatal palliative care is a relatively young and developing field that includes the care of a fetus or newborn with a life-threatening or limiting defect and his family. However, the training of midwives in perinatal palliative care is insufficient and midwives do not feel prepared for this aspect of their work. This fact can affect the barriers to communication with the mother or family of the endangered child. The main aim was to analyze the awareness of midwifery students on the issue of perinatal palliative care in the Czech Republic. Based on the analysis, draw attention to possible communication barriers that may be caused by insufficient information. The research was carried out using a qualitative method, the method of data collection was a semi-structured interview. Eleven female students took part in the research, and the respondents were selected using the Snowballing method. Some methods of grounded theory (open coding and category creation) were used to analyze the data. Based on the results of the research, questions were set in a questionnaire focused on communication barriers between mothers (family) and health care professionals in the care of newborns with life-threatening or limiting disabilities. Based on the analysis of data, categories 1 were determined. Knowledge of perinatal palliative care 2. Education 3. Practical experience 4. Readiness and concerns in the provision of perinatal palliative care 6. Supervision. The questions in the questionnaire were then derived taking into account the data obtained, and the operationalization of health literacy in the field of perinatal palliative care was performed. The analysis of the interviews revealed that the education of midwives in the Czech Republic in the issue of perinatal palliative care is not uniform. The research confirmed the insufficient knowledge and skills of midwifery students preparing to provide perinatal palliative care. Respondents reported feelings of unpreparedness in the areas of communication with a woman after perinatal loss, psychological support for a woman and her family, the care of a stillborn or dying child, or self-coping with death. The questions in the questionnaire then develop these areas. We assumed that by analyzing and interpreting the data obtained from our research, we will help to better understand the concerns and motivations of students in providing holistic perinatal palliative care. We came to the conclusion that it would be appropriate to set up a unified and comprehensive education on this issue in the Czech Republic. Healthcare professionals are in a unique position that can positively or negatively affect the intensity of perinatal loss. Already properly set up education of health professionals leads to overcoming barriers in communication between health professionals and the family, experiencing perinatal loss.Keywords: midwife, perinatal loss, perinatal palliative care, communication, barriers, mothers, family
Procedia PDF Downloads 12025704 Enhancing the Safety Climate and Reducing Violence against Staff in Closed Hospital Wards
Authors: Valerie Isaak
Abstract:
This study examines the effectiveness of an intervention program aimed at enhancing a unit-level safety climate as a way to minimize the risk of employees being injured by patient violence. The intervention program conducted in maximum security units in one of the psychiatric hospitals in Israel included a three day workshop. Safety climate was examined before and after the implementation of the intervention. We also collected data regarding incidents involving patient violence. Six months after the intervention a significant improvement in employees’ perceptions regarding management’s commitment to safety were found as well as a marginally significant improvement in communication concerning safety issues. Our research shows that an intervention program aimed at enhancing a safety climate is associated with a decrease in the number of aggressive incidents. We conclude that such an intervention program is likely to return the sense of safety and reduce the scope of violence.Keywords: violence, intervention, safety climate, performance, public sector
Procedia PDF Downloads 35525703 To Ensure Maximum Voter Privacy in E-Voting Using Blockchain, Convolutional Neural Network, and Quantum Key Distribution
Authors: Bhaumik Tyagi, Mandeep Kaur, Kanika Singla
Abstract:
The advancement of blockchain has facilitated scholars to remodel e-voting systems for future generations. Server-side attacks like SQL injection attacks and DOS attacks are the most common attacks nowadays, where malicious codes are injected into the system through user input fields by illicit users, which leads to data leakage in the worst scenarios. Besides, quantum attacks are also there which manipulate the transactional data. In order to deal with all the above-mentioned attacks, integration of blockchain, convolutional neural network (CNN), and Quantum Key Distribution is done in this very research. The utilization of blockchain technology in e-voting applications is not a novel concept. But privacy and security issues are still there in a public and private blockchains. To solve this, the use of a hybrid blockchain is done in this research. This research proposed cryptographic signatures and blockchain algorithms to validate the origin and integrity of the votes. The convolutional neural network (CNN), a normalized version of the multilayer perceptron, is also applied in the system to analyze visual descriptions upon registration in a direction to enhance the privacy of voters and the e-voting system. Quantum Key Distribution is being implemented in order to secure a blockchain-based e-voting system from quantum attacks using quantum algorithms. Implementation of e-voting blockchain D-app and providing a proposed solution for the privacy of voters in e-voting using Blockchain, CNN, and Quantum Key Distribution is done.Keywords: hybrid blockchain, secure e-voting system, convolutional neural networks, quantum key distribution, one-time pad
Procedia PDF Downloads 9725702 Improved K-Means Clustering Algorithm Using RHadoop with Combiner
Authors: Ji Eun Shin, Dong Hoon Lim
Abstract:
Data clustering is a common technique used in data analysis and is used in many applications, such as artificial intelligence, pattern recognition, economics, ecology, psychiatry and marketing. K-means clustering is a well-known clustering algorithm aiming to cluster a set of data points to a predefined number of clusters. In this paper, we implement K-means algorithm based on MapReduce framework with RHadoop to make the clustering method applicable to large scale data. RHadoop is a collection of R packages that allow users to manage and analyze data with Hadoop. The main idea is to introduce a combiner as a function of our map output to decrease the amount of data needed to be processed by reducers. The experimental results demonstrated that K-means algorithm using RHadoop can scale well and efficiently process large data sets on commodity hardware. We also showed that our K-means algorithm using RHadoop with combiner was faster than regular algorithm without combiner as the size of data set increases.Keywords: big data, combiner, K-means clustering, RHadoop
Procedia PDF Downloads 44325701 Framework for Integrating Big Data and Thick Data: Understanding Customers Better
Authors: Nikita Valluri, Vatcharaporn Esichaikul
Abstract:
With the popularity of data-driven decision making on the rise, this study focuses on providing an alternative outlook towards the process of decision-making. Combining quantitative and qualitative methods rooted in the social sciences, an integrated framework is presented with a focus on delivering a much more robust and efficient approach towards the concept of data-driven decision-making with respect to not only Big data but also 'Thick data', a new form of qualitative data. In support of this, an example from the retail sector has been illustrated where the framework is put into action to yield insights and leverage business intelligence. An interpretive approach to analyze findings from both kinds of quantitative and qualitative data has been used to glean insights. Using traditional Point-of-sale data as well as an understanding of customer psychographics and preferences, techniques of data mining along with qualitative methods (such as grounded theory, ethnomethodology, etc.) are applied. This study’s final goal is to establish the framework as a basis for providing a holistic solution encompassing both the Big and Thick aspects of any business need. The proposed framework is a modified enhancement in lieu of traditional data-driven decision-making approach, which is mainly dependent on quantitative data for decision-making.Keywords: big data, customer behavior, customer experience, data mining, qualitative methods, quantitative methods, thick data
Procedia PDF Downloads 16425700 Design of an Ensemble Learning Behavior Anomaly Detection Framework
Authors: Abdoulaye Diop, Nahid Emad, Thierry Winter, Mohamed Hilia
Abstract:
Data assets protection is a crucial issue in the cybersecurity field. Companies use logical access control tools to vault their information assets and protect them against external threats, but they lack solutions to counter insider threats. Nowadays, insider threats are the most significant concern of security analysts. They are mainly individuals with legitimate access to companies information systems, which use their rights with malicious intents. In several fields, behavior anomaly detection is the method used by cyber specialists to counter the threats of user malicious activities effectively. In this paper, we present the step toward the construction of a user and entity behavior analysis framework by proposing a behavior anomaly detection model. This model combines machine learning classification techniques and graph-based methods, relying on linear algebra and parallel computing techniques. We show the utility of an ensemble learning approach in this context. We present some detection methods tests results on an representative access control dataset. The use of some explored classifiers gives results up to 99% of accuracy.Keywords: cybersecurity, data protection, access control, insider threat, user behavior analysis, ensemble learning, high performance computing
Procedia PDF Downloads 130