205 research outputs found

    An Insight on Medical Insurance Malpractices Prevailing in the Healthcare Industry and its Impact on Socio Economic Background – Special Reference to UAE Private Healthcare Industry

    Get PDF
    Purpose: Examine medical insurance malpractices in the UAE's private healthcare industry and assess their impact on the socio-economic landscape, focusing on the context of a rapidly growing economy and a diverse healthcare system.   Theoretical framework: Situated within the dynamic framework of the UAE's expanding economy and healthcare sector, emphasizing the pivotal role of health insurance policies in providing medical coverage.   Design/Methodology/Approach: Employ a comprehensive research approach to uncover prevalent medical insurance malpractices within the private healthcare industry of the UAE. Analyze the effects of these practices on various socio-economic aspects.   Findings: In the backdrop of an evolving healthcare landscape, the study reveals instances of malpractices within medical insurance in the UAE's private healthcare sector. These practices have implications for access to quality healthcare and the broader socio-economic fabric.   Research, practical & social implications: The research outcomes hold significant implications for both policy makers and stakeholders within the healthcare industry. Addressing medical insurance malpractices is essential to ensure equitable access to healthcare services and to maintain a healthy socio-economic balance.   Originality/Value: This study contributes to the understanding of the interplay between medical insurance malpractices and the socio-economic backdrop of the UAE's private healthcare industry. By shedding light on exploitative practices, the research highlights the need for regulatory measures to safeguard the well-being of both individuals and the nation's socio-economic landscape

    Capacity reduction and Fire Load Factors for LRFD of Steel Members Exposed to Fire

    Get PDF
    A general reliability-based methodology is proposed for developing capacity reduction and fire load factors for design of steel members exposed to fire. The effect of active fire protection systems (e.g., sprinklers, smoke and heat detectors, fire brigade, etc.) in reducing the probability of occurrence of a severe fire is included. The design parameters that significantly affect the fire design of steel members are chosen as random variables. Raw experimental data published in the literature was analyzed to obtain the statistics of parameters for which no statistical information was available in the literature. Model errors associated with the thermal analysis models are also characterized based on experimental data. It is found that uncertainty associated with the fire design parameters is significantly higher than that of room temperature design parameters. To illustrate the proposed methodology, capacity reduction and fire load factors are developed for simply supported steel beams in U.S. office buildings, and it is shown that for consistent reliability these factors should vary depending on the presence of active fire protection systems in a building

    Sensors to Monitor CFRP/Concrete Bond in Beams Using Electrochemical Impedance Spectroscopy

    Get PDF
    The use of inexpensive electrochemical impedance spectroscopy based sensor technology for nondestructive evaluation (NDE) of bond degradation between external carbon fiber-reinforced polymer (CFRP) reinforcement and concrete is examined. Copper tape on the surface of the CFRP sheet, stainless steel wire embedded in the concrete, and reinforcing bars were used as the sensing elements. Laboratory experiments were designed to test the capability of the sensors to detect the debonding of the CFRP from the concrete and to study the effect of short-term (humidity and temperature fluctuations) and long-term (freeze-thaw and wet-dry exposure and rebar corrosion) environmental conditions on the measurements. The CFRP sheet was debonded from the concrete, and impedance measurements were taken between various pairs of electrodes at various interfacial crack lengths. The dependence of the impedance spectra, and of the parameters obtained from equivalent circuit analysis, on the interfacial crack length was studied. Capacitance parameters in the equivalent circuit correlated strongly with the interfacial crack length and can be used to assess the global state of the bond between CFRP sheets and concrete. Impedance measurements taken between embedded wire sensors can be used to detect the location of debonded regions

    Bytewise Approximate Matching: The Good, The Bad, and The Unknown

    Get PDF
    Hash functions are established and well-known in digital forensics, where they are commonly used for proving integrity and file identification (i.e., hash all files on a seized device and compare the fingerprints against a reference database). However, with respect to the latter operation, an active adversary can easily overcome this approach because traditional hashes are designed to be sensitive to altering an input; output will significantly change if a single bit is flipped. Therefore, researchers developed approximate matching, which is a rather new, less prominent area but was conceived as a more robust counterpart to traditional hashing. Since the conception of approximate matching, the community has constructed numerous algorithms, extensions, and additional applications for this technology, and are still working on novel concepts to improve the status quo. In this survey article, we conduct a high-level review of the existing literature from a non-technical perspective and summarize the existing body of knowledge in approximate matching, with special focus on bytewise algorithms. Our contribution allows researchers and practitioners to receive an overview of the state of the art of approximate matching so that they may understand the capabilities and challenges of the field. Simply, we present the terminology, use cases, classification, requirements, testing methods, algorithms, applications, and a list of primary and secondary literature

    Risperidone induced tardive dyskinesia

    Get PDF
    Risperidone is an atypical antipsychotic drug which has been less likely to produce extrapyramidal symptoms. The aim of this case report is to illustrate that low dose risperidone may cause tardive dyskinesia. A 29 year old male patient with 9 year history of paranoid schizophrenia, developed tardive dyskinesia after receiving risperidone 2 mg for 7 years. He had received small dosages of Haloperidol before the therapy of risperidone for short periods

    Application of Noise Cancelling and Damage Detection Algorithms in NDE of Concrete Bridge Decks Using Impact Signals

    Get PDF
    Delamination is a commonly observed distress in concrete bridge decks. Among all the delamination detection methods, acoustic methods have the advantages of being fast and inexpensive. In traditional acoustic inspection methods, the inspector drags a chain alone or hammers on the bridge deck and detects delamination from the “hollowness” of the sound. The signals are often contaminated by ambient traffic noise and the detection of delamination is highly subjective. This paper describes the performance of an impact-based acoustic NDE method where the traffic noise was filtered by employing a noise cancelling algorithm and where subjectivity was eliminated by introducing feature extraction and pattern recognition algorithms. Different algorithms were compared and the best one was selected in each category. The comparison showed that the modified independent component analysis (ICA) algorithm was most effective in cancelling the traffic noise and features consisting of mel-frequency cepstral coefficients (MFCCs) had the best performance in terms of repeatability and separability. The condition of the bridge deck was then detected by a radial basis function (RBF) neural network. The performance of the system was evaluated using both experimental and field data. The results show that the selected algorithms increase the noise robustness of acoustic methods and perform satisfactorily if the training data is representative

    College-Wide First Year and Career Mentorship Programs

    Get PDF
    The College of Engineering at the University of New Haven began two formal mentorship programs in spring 2020 with the help of a for-profit company named Mentor Collective. The First-Year Mentorship Program is designed for students entering the university and the Career Mentorship Program is designed for juniors and seniors. The programs were sponsored by a generous gift from Sikorsky, a Lockheed Martin Company. This paper focuses particularly on the impact of the First-Year Mentorship Program on the first to second year retention of engineering and computer science students

    A Cyber Forensics Needs Analysis Survey: Revisiting the Domain\u27s Needs a Decade Later

    Get PDF
    The number of successful cyber attacks continues to increase, threatening financial and personal security worldwide. Cyber/digital forensics is undergoing a paradigm shift in which evidence is frequently massive in size, demands live acquisition, and may be insufficient to convict a criminal residing in another legal jurisdiction. This paper presents the findings of the first broad needs analysis survey in cyber forensics in nearly a decade, aimed at obtaining an updated consensus of professional attitudes in order to optimize resource allocation and to prioritize problems and possible solutions more efficiently. Results from the 99 respondents gave compelling testimony that the following will be necessary in the future: 1) better education/training/certification (opportunities, standardization, and skill-sets); 2) support for cloud and mobile forensics; 3) backing for and improvement of open-source tools 3) research on encryption, malware, and trail obfuscation; 4) revised laws (specific, up-to-date, and which protect user privacy); 5) better communication, especially between/with law enforcement (including establishing new frameworks to mitigate problematic communication); 6) more personnel and funding

    ”CyberWorld” as a Theme for a University-wide First-year Common Course

    Get PDF
    Nowadays we all live in a cyber world and use the internet for emailing, banking, streaming video, shopping, reading news, or other activities. Given all the time people spend online, it is important that all students (regardless of their major) learn some basics about living in a cyber world, e.g., strategies for online safety, impact of artificial intelligence, digital forensics or ancestry.com. To facilitate students from many majors to learn about important issues related to the internet, eight faculty from a variety of disciplines at the University of New Haven integrated the theme of Cyber World into our team-taught, first-year experience course, also referred to as the “Common Course.” The Common Course’s primary purpose is to enable students to develop evidence-based arguments and to challenge their own and others’ assumptions in relation to that evidence. Each Common Course class focuses on a broad topic (e.g., Justice, Happiness, or Identity) that instructors use as a touch point to facilitate critical thinking. In Cyber World, however, the topic is given stronger focus, and all students in the class are expected to come away with specific cyber-related knowledge. A special challenge is that the majority of the 160 students are from non-STEM majors. Given the varied background of students, this course covers a variety of topics such as sharing DNA with ancestry.com, protecting against identity theft, detecting fake news, and oversharing personal information. The course is taught by eight faculty members from four different colleges having expertise in a variety of disciplines. An important side effect of this faculty diversity is that interdisciplinary collaborations among faculty are promoted. Our paper has three significant contributions: (1) We present the eight topics related to living in a cyber world that we chose for this course, including our rationale for why they are appropriate and relevant; (2) We summarize how we integrated the Cyber World topics into the structure of the Common Course, which includes a discussion of the challenges we faced; and (3) We summarize some initial results on how students perceived their experience as well as how they performed compared to other common course sections / topics
    • …
    corecore