113 research outputs found

    Fog based Secure Framework for Personal Health Records Systems

    Get PDF
    The rapid development of personal health records (PHR) systems enables an individual to collect, create, store and share his PHR to authorized entities. Health care systems within the smart city environment require a patient to share his PRH data with a multitude of institutions' repositories located in the cloud. The cloud computing paradigm cannot meet such a massive transformative healthcare systems due to drawbacks including network latency, scalability and bandwidth. Fog computing relieves the burden of conventional cloud computing by availing intermediate fog nodes between the end users and the remote servers. Aiming at a massive demand of PHR data within a ubiquitous smart city, we propose a secure and fog assisted framework for PHR systems to address security, access control and privacy concerns. Built under a fog-based architecture, the proposed framework makes use of efficient key exchange protocol coupled with ciphertext attribute based encryption (CP-ABE) to guarantee confidentiality and fine-grained access control within the system respectively. We also make use of digital signature combined with CP-ABE to ensure the system authentication and users privacy. We provide the analysis of the proposed framework in terms of security and performance.Comment: 12 pages (CMC Journal, Tech Science Press

    Develop a model to measure the ethical effects of students through social media use

    Get PDF
    Social media users can be negatively affected by cyber harassment. These effects can cause emotional distress and lead people to stop using social network sites or to end their life. In addition, the users of this technology usually get upset when network providers interfere and consider such interference to be unfair. Therefore, this paper attempted to mitigate the gap in the literature concerning the use of social media for engaging in cyber harassment in the context of higher education. Therefore, the main objective was to develop a model that will bridge this gap. The model developed in this paper is based on the unified theory of acceptance and use of technology, theory of planned behavior, and technology support. To achieve the study's objectives, a questionnaire was used as the main data collection method, and it was distributed to 340 students who used social media. This paper argues that these decisions of interference can be handled by employing a method that users find sufficient and appropriate. In conclusion, this research specifically proposes a model for identifying the significant factors that are anticipated to play major roles in minimizing cyber harassment among Saudi students. The proposed model will help administrations and decision makers to formulate strategies that can significantly affect anti-cyber harassment among students

    Cyber harassment prevention through user behavior analysis online in kingdom of Saudi Arabia (KSA)

    Get PDF
    This research attempted to mitigate the gap in literature concerning a one serious problem in Saudi society and government is cyber harassment. This problem is caused through the increasing use of technology. Accordingly, the main objective was to explore the factors that influence the intention to minimize cyber harassment among Saudi citizen. Nevertheless, the researcher has assured that the Saudis will remain at risk of cyber harassment, until these factors are fully investigated among the Saudi community. In conclusion, this research specifically proposed in future a model and framework for identifying the significant factors that are anticipated to play a major in minimizing cyber harassment among Saudis. The proposed framework will help the administration and decision-makers in the KSA to formulate strategies that can significantly affect anti-cyber harassment among youths

    Towards prevention of sportsmen burnout : Formal analysis of sub-optimal tournament scheduling

    Get PDF
    Funding Statement: The authors are grateful to the Deanship of Scientific Research at King Saud University, Saudi Arabia for funding this work through the Vice Deanship of Scientific Research Chairs: Chair of Pervasive and Mobile Computing.Peer reviewedPublisher PD

    Software Defined Network-Based Multi-Access Edge Framework for Vehicular Networks

    Get PDF
    The authors are grateful to the Deanship of Scientific Research at King Saud University for funding this work through Vice Deanship of Scientific Research Chairs: Chair of Pervasive and Mobile Computing.Peer reviewe

    Multi‑sectoral impact assessment during the 1st wave of COVID‑19 pandemic in West Bengal (India) for sustainable planning and management

    Get PDF
    With the advancement of globalisation, urbanisation and environmental change, the outbreak of the Coronavirus disease 2019 (COVID-19), as an infectious disease, has become a global threat. The entire world is continuously trying to adapt to the pandemic situation due to the sudden outbreak of COVID-19 and the lockdown phase, which has not been faced before. The fear of infection by such an unknown virus and the epidemic transformed the built-up environment and impacted various sectors of lives and livelihoods, which must be assessed in spatial perspectives. The objective of this research is to assess the multi-sectoral impact due to the COVID-19 pandemic. Thus, it is designed to inspect seven essential sectors, namely, the economy, employment, education, transport, travel and tourism, health and environment sector-wise impact assessment of the West Bengal state of India. Taking the required COVID-19 data from the government website of India (http://www.covid19india.org; https://www.mygov.in/corona-data/covid19-statewise-status) and West Bengal (https://covidindia.org/west-bengal), a methodology is proposed on an integrated framework for the multi-sectoral impact assessment. The study concentrates on West Bengal, as no study exists on the multi-sectoral impact assessment due to the COVID-19 pandemic during the 1st wave, especially using the geospatial platform. The economy, employment, education, transport, health, tourism and environment multi sectors of West Bengal are selected in this research, as these sectors have built the economic, sociocultural and environmental pillars of the state. All these sectors have been seriously affected, and the nature of the impact is diverse and large. Before the vaccine comes into the hands of the common people of West Bengal and in a broad sense in India, the awareness should be increased at the grass-root level to fight against the pandemic situation and even after the post-COVID era. The application of geospatial technology used for the mapping and analysis of COVID-19 affects the related database to tease out the multidimensional study, which aims to plan future road maps, search for answers and learn to add further security to overcome the future virus attack

    Modeling of Groundwater Potential Using Cloud Computing Platform: A Case Study from Nineveh Plain, Northern Iraq

    Get PDF
    Knowledge of the groundwater potential, especially in an arid region, can play a major role in planning the sustainable management of groundwater resources. In this study, nine machine learning (ML) algorithms—namely, Artificial Neural Network (ANN), Decision Jungle (DJ), Averaged Perceptron (AP), Bayes Point Machine (BPM), Decision Forest (DF), Locally-Deep Support Vector Machine (LD-SVM), Boosted Decision Tree (BDT), Logistic Regression (LG), and Support Vector Machine (SVM)—were run on the Microsoft Azure cloud computing platform to model the groundwater potential. We investigated the relationship between 512 operating boreholes with a specified specific capacity and 14 groundwater-influencing occurrence factors. The unconfined aquifer in the Nineveh plain, Mosul Governorate, northern Iraq, was used as a case study. The groundwater-influencing factors used included elevation, slope, curvature, topographic wetness index, stream power index, soil, land use/land cover (LULC), geology, drainage density, aquifer saturated thickness, aquifer hydraulic conductivity, aquifer specific yield, depth to groundwater, distance to faults, and fault density. Analysis of the contribution of these factors in groundwater potential using information gain ratio indicated that aquifer saturated thickness, rainfall, hydraulic conductivity, depth to groundwater, specific yield, and elevation were the most important factors (average merit \u3e 0.1), followed by geology, fault density, drainage density, soil, LULC, and distance to faults (average merit \u3c 0.1). The average merits for the remaining factors were zero, and thus, these factors were removed from the analysis. When the selected ML classifiers were used to estimate groundwater potential in the Azure cloud computing environment, the DJ and BDT models performed the best in terms of all statistical error measures used (accuracy, precision, recall, F-score, and area under the receiver operating characteristics curve), followed by DF and LD-SVM. The probability of groundwater potential from these algorithms was mapped and visualized into five groundwater potential zones: very low, low, moderate, high, and very high, which correspond to the northern (very low to low), southern (moderate), and middle (high to very high) portions of the study area. Using a cloud computing service provides an improved platform for quickly and cheaply running and testing different algorithms for predicting groundwater potential

    CAUSES AND MANAGEMENT OF VIRAL EYE INFECTION

    Get PDF
    Introduction: The eye is a fascinating organ for several reasons. It is not only have a composite structure, however it is considered an immune-privileged organ. The anatomy of the eye is composed of the anterior and posterior parts, the line of division is posterior to the lens. The anterior chamber lies within the anterior segment and is an immuneprivileged anatomical location, this is due to the fact that the T-cell response in this area is suppressed This protects the eye from potentially destructive immune attacks however it also makes defence against infectious agents challenging, particularly where T-cell responses are critical for immunological defence. Viruses could get into the eye by direct inoculation, or through haematogenous or neuronal spread. The diagnoses of viral eye infections are usually clinical one, helped by taking a thorough history and performing ophthalmic examination. But in challenging cases the lab tests are essential. In this review, we will discuss the most recent evidence regarding Causes and management of viral eye infection Aim of work: In this review, we will discuss the most recent evidence regarding Causes and management of viral eye infection Methodology: We did a systematic search for Causes and management of viral eye infection using PubMed search engine (http://www.ncbi.nlm.nih.gov/) and Google Scholar search engine (https://scholar.google.com). All relevant studies were retrieved and discussed. We only included full articles. Conclusions: A wide range of of viruses can affect the eye and cause viral eye infections, either as a primary infection or reactivation. Some affect the eye directly while the others indirectly but may still manifest with eye disease. One virus may affect several parts of the eye, while different viruses may cause the same eye disease. This could complicate the clinical diagnosis of viral eye disease, but the lab tests like PCR and antibody tests could assist in challenging cases where there may be diagnostic dilemma. The HIV epidemic has had an huge impact on ophthalmology clinics, this is because the virus can cause different eye diseases, and the associated decrease in cell-mediated immunity makes the person highly susceptible to opportunistic viral eye infections, sometimes with severe morbidity. There could be other viruses that may affect the eye that we did not discuss. Key words: Causes, management, viral eye infection

    Thyroid disorders, epidemiology and outcome among patients in South Western region: Southern Saudi Arabia

    Get PDF
    Background: Thyroid gland may have a group of a medical condition that affects its main function. The thyroid gland is located at the front of the neck and produces thyroid hormones. The released hormones go through the blood to many body organs for regulating their function, meaning that it is an endocrine organ. These hormones normally act in the body to regulate energy use, infant development, and childhood development. The study aimed to assess the epidemiology of thyroid disorders among cases in the south-western region, Saudi Arabia, and to assess the reporting quality for these cases data.Methods: A retrospective record based descriptive approach was used through reviewing medical records of all cases that were admitted and diagnosed as thyroid related disorders for different indications in the main hospital (king Khalid Hospital) during the period from January 2018 to January 2020. Data extracted throng pre-structured questionnaire including patient's bio-clinical data, preoperative radiological and laboratory investigations. Also, laryngoscope pre and post operatively was reviewed to record findings.Results: The study included 405 cases with thyroid disorders whose ages ranged from 15 to 71 years old with a mean age of 30.5±10.6 years. Females were 82.7% of the included cases, and 83.8% were Saudi. Thyroid related symptoms were recorded for 1-2 years among 58.1% of the cases and for more than 5 years among 15.8%. Thyroid enlargement was recorded for 73.1% of the cases. The multinodular enlargement was recorded for 53.5% of the cases followed with diffuse thyroid enlargement (27.3%). Regarding the type of surgery undergone, total thyroidectomy was the most recorded followed with lobectomy.Conclusions: The study revealed that the majority of the cases were females at middle age presented with benign lesions with Euthyroid status. The most important conclusion was the significant remarkable underreporting of the different clinical data for the cases with many missing items
    corecore