2,868 research outputs found

    MODELLING THE HEALTH SECTOR POLICY REFORMS FOR NIGERIA:A PHASED PROJECT STUDY

    Get PDF
    Good health is a crucial part of well-being but spending on health can be justified on economic grounds. The goal of reducing poverty provides a different but equally powerful case for health investments. However, if policymakers are to accelerate the substantial health gains of recent decades, especially for the poor in African countries such as Nigeria, the agenda for reform is clear. Therefore, the thrust of this project is to formulate a model-based viable health policy reforms framework that will guarantee the attainment of the United Nations millennium development goals(as well as the capacity to live longer, healthier and more productive lives).Health, Aids, Malaria, SARS, MORTALITY, MATERNAL HEALTH, PUBLICHEALTH, DNA, CLINICAL SERVICES, POVERTY, MODELLING, DEVELOPMENT, NIGERIA, MDG, POLICY

    Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection

    Full text link
    Quantum machine learning (QML) is an emerging field of research that leverages quantum computing to improve the classical machine learning approach to solve complex real world problems. QML has the potential to address cybersecurity related challenges. Considering the novelty and complex architecture of QML, resources are not yet explicitly available that can pave cybersecurity learners to instill efficient knowledge of this emerging technology. In this research, we design and develop QML-based ten learning modules covering various cybersecurity topics by adopting student centering case-study based learning approach. We apply one subtopic of QML on a cybersecurity topic comprised of pre-lab, lab, and post-lab activities towards providing learners with hands-on QML experiences in solving real-world security problems. In order to engage and motivate students in a learning environment that encourages all students to learn, pre-lab offers a brief introduction to both the QML subtopic and cybersecurity problem. In this paper, we utilize quantum support vector machine (QSVM) for malware classification and protection where we use open source Pennylane QML framework on the drebin215 dataset. We demonstrate our QSVM model and achieve an accuracy of 95% in malware classification and protection. We will develop all the modules and introduce them to the cybersecurity community in the coming days

    ‘Yuk, the Skin of Insects!’ Tracking Sources of Errors in Second Language Reading Comprehension

    Get PDF
    This article submitted to IUPUI ScholarWorks as part of the OASIS Project.Readers for whom English is a second language often misinterpret texts. One source for such errors is failing to accurately recognize phonemic and graphemic features, leading to interpreting a text within a framework not intended by the author. Teachers can help second language readers become more perceptive by preparing students for the material and providing practice in recognizing the text's syntactic connections

    Physician use of updated anti-virus software in a tertiary Nigerian hospital

    Get PDF
    While physicians are becoming increasingly dependent on computers and the internet, highly lethal malware continue to be loaded into cyberspace. We sought to assess the proportion of physicians with updated anti-virus software in Jos University Teaching Hospital Nigeria and to determine perceived barriers to getting updates. We used a pre-tested semi-structured selfadministered questionnaire to conduct a cross-sectional survey among 118 physicians. The mean age (±SD) of subjects was 34(±4) years, with 94 male and 24 female physicians. Forty-two (36.5%) of 115 physicians with anti-virus software used an updated program (95%CI: 27, 45). The top-three antivirus software were: McAfee 40(33.9%), AVG 37(31.4%) and Norton 17(14.4%). Common infections were: Trojan horse 22 (29.7%), Brontok worm 8(10.8%), and Ravmonlog.exe 5(6.8%). Internet browsing with a firewall was an independent determinant for use of updated anti-virus software [OR 4.3, 95%CI, 1.86, 10.02; P< 0.001]. Busy schedule, 40(33.9%) and lack of credit card 39(33.1%) were perceived barriers to updating antivirus software. The use of regularly updated anti-virus software is sub-optimal among physicians implying vulnerability to computer viruses. Physicians should be careful with flash drives and should avoid being victims of the raging arms race between malware producers and anti-virus software developers.Keywords: Anti-virus software; Computer security; Updates; Physicians; Nigeri

    Caution: Do Not Bleach!

    Get PDF
    In this lesson, students will investigate the importance of coral reefs to the Earth as a whole and learn some possible explanations for the phenomenon known as "coral bleaching". They should be able to identify ways that coral reefs benefit human beings, identify major threats to reefs and discuss how they might be reduced or eliminated, describe the Coral Reef Early Warning System, and discuss why corals might expel their zooxanthellae (symbiotic algae) when under stress. Educational levels: High school, Middle school, Undergraduate lower division

    Coastal Ecosystem Science: Alien Invasion!

    Get PDF
    This lesson introduces students to the broad concept of invasive species. Students prepare a written case study on an invasive aquatic species, followed by an oral presentation. They will define, compare, and contrast invasive species, alien species, and native species, describe at least three problems that may be associated with invasive species, and describe at least three invasive species, explain how they came to be invasive, and discuss what can be done about them. The lesson plan provides a list of possible species to choose from, and information about their introduction, impact, and control. Suggestions for extensions are also provided. Educational levels: High school, Middle school, Undergraduate lower division

    Washington University Record, January 28, 2005

    Get PDF
    https://digitalcommons.wustl.edu/record/2024/thumbnail.jp
    • …
    corecore