• Title/Summary/Keyword: new health technology

Search Result 1,277, Processing Time 0.028 seconds

New Normal and Business Sustainability in the Age of Global pandemic

  • Kalam, Abul;Hossain, Md. Alamgir;Jahan, Nusrat;Kim, Minho
    • Asia-Pacific Journal of Business
    • /
    • v.12 no.1
    • /
    • pp.71-86
    • /
    • 2021
  • Purpose - This study examines the awareness regarding the symptoms of COVID-19 exposures and safety distances strategies whether they were useful to resile the businesses a mid of the pandemic. Besides exploring the awareness and safety distances, the effectiveness of offering free use of protective equipment (mask, hand sanitizer, frequent hand washing, etc.) to the customers for visiting the business centers was also examined. Design/methodology/approach - This study collected 264 survey data in Bangladesh which is one of the most densely populated country and very vulnerable for COVID-19 due to its socio-economic condition. The multiple regression analysis is used to analyze the data. Findings - The findings of the study indicate that the awareness about the symptoms of virus exposures (cough, fever, diarrhea, and weakness) has significant affirmative effects to enhance the public movement for business purposes with the lower possibility to be affected by the virus. The study also indicates that safety distances and protective equipment can mediate the significant positive relationship between the awareness of the disease and the businesses' resilient capacity. Research implications or Originality - COVID-19, as an apprehensive health issue in the current world, has sharpened the uncertainty of the businesses. One essential technique as lockdown, has been followed by almost every country to protect the transmission of the virus even though the scholars criticized it due to the substantial adverse effects on the country's economy. Under this circumstances, this study provides implications to the relevant businesses by assessing the nexus between the safety distances and the proper uses of protective equipment with the business resilient.

Development of Levee Safety Revaluation for Satellite Images (위성 이미지를 활용한 제방 안정성 평가 기법 개발)

  • Bang, Young Jun;Lee, Seung Oh
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.3
    • /
    • pp.1-14
    • /
    • 2022
  • Recently, the risk of water disasters are increasing due to climate change and the aging of river levees. Existing conventional river embankment inspections have many limitations due to the consumption of a lot of manpower and budget. Thus, it is necessary to establish a new monitoring and forecast/warning method for effective flood response. This study proposes the river levee health monitoring system by analyzing the relationship between river levee deformation and hydrological factors using Sentinel-1. The variance index calculated in this study was classified into 4 grades. And the levees collapse section was judged to be a high vulnerable point in which the variance rapidly increased based on the result of the rapid increase in soil moisture. In the future, it is expected that it will be possible to advance levee maintenance technology and improve national disaster management through the advancement of the existing levee management system and automated monitoring through the forensic method that combines remote technology.

Implementation Plan of Integrated Medical Information System for Ubiquitous Healthcare Service (U-Healthcare 서비스를 위한 통합의료정보시스템의 구축방안)

  • Jung, Yong-Sik
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.2
    • /
    • pp.115-126
    • /
    • 2010
  • Modern society can be described as ubiquitous computing over the concept of information. Information technology(IT) has been developing in a way that relative technologies are integrated to each other. Especially in ubiquitous environment, medical information industry shows significant interest in the U-healthcare service area. This paper will first look into U-healthcare service environment and component of Integrated Medical Information Systems(IMIS). Secondly, it examines the basic technological factors for integrated medical information systems, which is datawarehouse, network, communication standards and technology related U-healthcare service. Finally it proposes how to implement and operate new integrated medical information system for ubiquitous health care service. The system will do point of care(POC) for customers by real time and diagnose them using their various and personal medical data. The information will be communicated back to the customers, which will improve their satisfaction.

Malware Detection Using Deep Recurrent Neural Networks with no Random Initialization

  • Amir Namavar Jahromi;Sattar Hashemi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.177-189
    • /
    • 2023
  • Malware detection is an increasingly important operational focus in cyber security, particularly given the fast pace of such threats (e.g., new malware variants introduced every day). There has been great interest in exploring the use of machine learning techniques in automating and enhancing the effectiveness of malware detection and analysis. In this paper, we present a deep recurrent neural network solution as a stacked Long Short-Term Memory (LSTM) with a pre-training as a regularization method to avoid random network initialization. In our proposal, we use global and short dependencies of the inputs. With pre-training, we avoid random initialization and are able to improve the accuracy and robustness of malware threat hunting. The proposed method speeds up the convergence (in comparison to stacked LSTM) by reducing the length of malware OpCode or bytecode sequences. Hence, the complexity of our final method is reduced. This leads to better accuracy, higher Mattews Correlation Coefficients (MCC), and Area Under the Curve (AUC) in comparison to a standard LSTM with similar detection time. Our proposed method can be applied in real-time malware threat hunting, particularly for safety critical systems such as eHealth or Internet of Military of Things where poor convergence of the model could lead to catastrophic consequences. We evaluate the effectiveness of our proposed method on Windows, Ransomware, Internet of Things (IoT), and Android malware datasets using both static and dynamic analysis. For the IoT malware detection, we also present a comparative summary of the performance on an IoT-specific dataset of our proposed method and the standard stacked LSTM method. More specifically, of our proposed method achieves an accuracy of 99.1% in detecting IoT malware samples, with AUC of 0.985, and MCC of 0.95; thus, outperforming standard LSTM based methods in these key metrics.

Review of the Computerization Component for the Utilization of ICF as a Global Protocol (글로벌 프로토콜로서의 ICF 활용을 위한 전산화 구성요소 고찰)

  • Nyeon-Sik Choi;Ju-Min Song
    • Journal of the Korean Society of Physical Medicine
    • /
    • v.18 no.3
    • /
    • pp.121-133
    • /
    • 2023
  • PURPOSE: Computerization using ICF as a protocol can enhance the assessment, communication, and decision-making of various disciplines and cultures, individual functions, disabilities and health to promote communication and understanding among various professionals, organizations, and countries. The empirical foundation for these propositions was provided by delineating of six distinct computerization components. METHODS: This study analyzed 14 papers that combined the medical field and information technology to activate the ICF through computerization. From each of these papers, distinctive advantages were extracted to propose six computerization elements. The validity of these computerization elements was examined. These papers encompass various computerization elements, among which core elements were identified. In particular, six common core elements were extracted from these papers and assumed to be strategic computerization components for ICF activation. A heuristic methodology was employed to validate these components, representing IT technology maturity using four determining indices, which were then presented graphically for validation attempts. RESULTS: Four quantified indices were defined: reliability, cost-effectiveness, support and updates, and collaboration. Using these indices, this study identified elements that leverage existing IT technologies and require new development. The possibility of increasing utility was identified by applying computerization to ICF. CONCLUSION: This study examined the strategic elements of utilizing ICF by computerizing it using a protocol concept and discussed its potential for utilization. The potential to enhance the value of information in social, physical, and cultural contexts was presented by integrating various domains and data within the ICF framework.

University Students' Life Experiences in (Non-)face-to-face Education Situations due to COVID-19 (코로나19로 인한 대학생의 (비)대면 교육 상황 속 생활경험)

  • Youngmi An;Youngran An
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.223-238
    • /
    • 2023
  • This research presents the actual situation analysis and suggestions for the changes, experiences, and process of adaptation that college students have experienced throughout their studies and life over the past two years and more. In-depth interviews were conducted with university students, who are educational objects, and qualitative analysis methods were used to explore the overall living experiences under the pandemic situation. The interview questions were composed to cover classes, life, and emotional experiences after COVID-19, and the result of analyzing the responses boiled down to four super-categories of 'adaptation process to a new system, daily incontinence, struggle for health, and longing for connection.' This study is significant in that it analyzed the experiences and intimate changes of individual college students in unexpected and challenging situations, and urged the myriad aspects that universities, society, and the government should illuminate and respond to.

Promoting Preschoolers' Contact Ability and Sense of Security through Aesthetic Education

  • Wang He Fei
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.1
    • /
    • pp.221-231
    • /
    • 2023
  • Nowadays, more and more countries are paying attention to basic teaching, so it can be found that they are carrying out a new round of basic teaching reform. The fundamental purpose is to adapt to the economic, cultural and technological development of the 21st century, so that their nationals will not be eliminated in the competition of the world environment, the spiritual civilization and material life of the nationals can be further improved, and they can have an advantage in the competition and catch up with the advanced level of the world. The cultivation of preschoolers' mental health determines the future development of a person. Through the long-term practice of art teaching at the Longyuan Branch of the District Third Kindergarten of Guangxi, This paper summarizes some effective teaching methods to cultivate children's connection ability and sense of security through aesthetic education.Firstly, preschoolers' contact ability was studied, and the aspects such as the definition of contact ability and the reasons for the formation of contact ability were explored. Secondly, the development of preschoolers' sense of security, what to avoid in order to develop a good sense of security and the effects of security on children were investigated. Finally, several specific teaching cases were written based on these theories. Through these cases, aesthetic education was utilized to promote preschoolers' contact ability and develop a sense of security. The study mainly draws the following conclusions that if children want to have a successful career, a happy family in the future, it is crucial to have the ability of connect and security in childhood. Aesthetic education can promote the formation of children's ability of connection and security.Finally, I write specific teaching cases based on the above theories and practice, through which these cases use aesthetic education to promote the formation of children's contact ability and sense of security.

A vibration-based approach for detecting arch dam damage using RBF neural networks and Jaya algorithms

  • Ali Zar;Zahoor Hussain;Muhammad Akbar;Bassam A. Tayeh;Zhibin Lin
    • Smart Structures and Systems
    • /
    • v.32 no.5
    • /
    • pp.319-338
    • /
    • 2023
  • The study presents a new hybrid data-driven method by combining radial basis functions neural networks (RBF-NN) with the Jaya algorithm (JA) to provide effective structural health monitoring of arch dams. The novelty of this approach lies in that only one user-defined parameter is required and thus can increase its effectiveness and efficiency, as compared to other machine learning techniques that often require processing a large amount of training and testing model parameters and hyper-parameters, with high time-consuming. This approach seeks rapid damage detection in arch dams under dynamic conditions, to prevent potential disasters, by utilizing the RBF-NNN to seamlessly integrate the dynamic elastic modulus (DEM) and modal parameters (such as natural frequency and mode shape) as damage indicators. To determine the dynamic characteristics of the arch dam, the JA sequentially optimizes an objective function rooted in vibration-based data sets. Two case studies of hyperbolic concrete arch dams were carefully designed using finite element simulation to demonstrate the effectiveness of the RBF-NN model, in conjunction with the Jaya algorithm. The testing results demonstrated that the proposed methods could exhibit significant computational time-savings, while effectively detecting damage in arch dam structures with complex nonlinearities. Furthermore, despite training data contaminated with a high level of noise, the RBF-NN and JA fusion remained the robustness, with high accuracy.

Development of Knee Radiography Auxiliary Device (무릎 방사선 검사 보조장비의 개발)

  • Do-Byung Rhee;Il-Hwan Bae;Hye-Jung Kim;So-Mi Lee;Deok-Mun Kwon;Dong-Ho Choi;Hee-June Kim
    • Journal of radiological science and technology
    • /
    • v.47 no.2
    • /
    • pp.87-95
    • /
    • 2024
  • Most knee axial radiographs, known as sunrise and skyline view, were performed with the patient in the prone position. The authors tried to address some of the shortcomings of conventional radiography by developing a new radiography method, K-RAD. According to previous research, the K-RAD method showed a wider patellar-femoral joint space than conventional radiography and provided a clear patellar hemi-lateral image with a constant gap between the femoral trochlear groove and tibial tuberosity. The authors worked with an orthopedic specialist to perform radiography using the K-RAD method rather than using existing methods, and as a result, the two knees were aligned correctly and a clear image of the patellar-femoral joint space was created. The authors propose the K-RAD method for knee axial radiography because the K-RAD method provides a sense of stability to the patient and provides images with high diagnostic value.

An In Silico Drug Repositioning Strategy to Identify Specific STAT-3 Inhibitors for Breast Cancer

  • Sruthy Sathish
    • Journal of Integrative Natural Science
    • /
    • v.16 no.4
    • /
    • pp.123-131
    • /
    • 2023
  • Breast cancer continues to pose a substantial worldwide health challenge, thereby requiring the development of innovative strategies to discover new therapeutic interventions. Signal Transducer and Activator of Transcription 3 (STAT-3) has been identified as a significant factor in the development of several types of cancer, including breast cancer. This is primarily attributed to its diverse functions in promoting tumour formation and conferring resistance to therapeutic interventions. This study presents an in silico drug repositioning approach that focuses on identifying specific inhibitors of STAT-3 for the purpose of treating breast cancer. We initially examined the structural and functional attributes of STAT-3, thereby elucidating its crucial involvement in cellular signalling cascades. A comprehensive virtual screening was performed on a diverse collection of drugs that have been approved by the FDA from zinc15 database. Various computational techniques, including molecular docking, cross docking, and cDFT analysis, were utilised in order to prioritise potential candidates. This prioritisation was based on their predicted binding energies and outer molecular orbital reactivity. The findings of our study have unveiled a Dihydroergotamine and Paritaprevir that have been approved by the FDA and exhibit considerable promise as selective inhibitors of STAT-3. In conclusion, the utilisation of our in silico drug repositioning approach presents a prompt and economically efficient method for the identification of potential compounds that warrant subsequent experimental validation as selective STAT-3 inhibitors in the context of breast cancer. The present study highlights the considerable potential of employing computational strategies to expedite the drug discovery process. Moreover, it provides valuable insights into novel avenues for targeted therapeutic interventions in the context of breast cancer treatment.