scholarly journals On the Exploration of the Natural Sequence of Primes With Cellular Automata Targeting Enhanced Data Security and Privacy

Enhanced data security and privacy are one of the major concerns in today’s digital society. The role of Primes towards the enhancements of data security and privacy is undeniable. Though several prime generations were presented, yet a cost effective and an easy to implement generation of Prime sequence should always have an advantage targeting real life applications. Hence, prime sequence generation using Cellular Automata (CA) is presented in this article as CA based modelling are easy to implement at the cost of flip-flops. The main contribution of this research is to explore the natural sequence of primes (i.e., primes A000040) with a special class of group CA, at fixed boundary environment; which may potentially be used as a Prime source towards the enhancements of data security and privacy. Experimental results confirm that the first 50 members of A000040 series may be explored at automata size 8 only. Detailed investigations towards the CA configuration and its dynamics in view of the generation of prime A000040 sequence, are also presented in this article.

2014 ◽  
Vol 2 ◽  
pp. 319-322
Author(s):  
Vitaliy Moskalenko ◽  
Iryna Nizhenkovskaya ◽  
Elena Welchinska

Countries worldwide are facing similar healthcare problems.  Medicine develops new methods for treatment, and pharmaceutical companies invent more efficient products.  These technological advances are, however, expensive, and put a double-strain on public healthcare spending: the cost of sophisticated treatment keeps growing, and improved healthcare allows patients to live longer, thus requiring more treatment.  Budgetary constraints, however, require government to restrict expenditure.  These challenges have to be answered in the context of existing public healthcare systems, which, are well established and complex.  Healthcare reforms will necessarily reflect these characteristics, as well as the relative political weight of the partners.  Such reforms will most likely affect all partners involved in the provision and healthcare management, including social security institutions (state agencies, sickness funds, etc.), doctors, and other health professionals—pharmacists.  Currently one of most important strategic tasks of modernization of the system of higher education in Ukraine is the high quality education provided to pharmacists in order to satisfy the worldwide needs.Whatever specific reform will be adopted, the main goals are to make the system more efficient and, thus, more cost effective; and, because the first aspect will not sufficiently decrease the expenditure, it is necessary to limit the scope of public health care while maintaining a balance of benefits.  


2013 ◽  
Vol 1 (2) ◽  
pp. 54-57
Author(s):  
TM Ibrahim

INTRODUCTION: The role of blood cultures (BCs) in the management of community acquired pneumonia (CAP) has generated a lot of controversy among clinicians in recent times. The main objectives of this audit were to determine if BC results impact the choice of antibiotics, and hospital outcomes in CAP. MATERIALS AND METHODS: This was a retrospective study of adults with CAP treated in the ED of Goulbourn Valley Base Hospital, Shepparton in Australia from November 2010 to November 2011. RESULTS: Two hundred and twenty five patients were treated for CAP during the period in review with a mean age of 67.09±19.82 yrs and male:female of 1.5:1. 277 sets of BCs were performed and only 2.2% of the cases had true positive BCs .87% of the total cost of performing these BCs was spent on those with negative cultres.15.1% of the cases had their antibiotics changed during their hospitalization but the results of the BCs had no impact on the antibiotic change. Even though not statistically significant true positive BCs was associated with prolong length of hospital stay (7.6 ± 9.39 days vs 4.89 ± 3.24 days, p=0.44), and duration of IV antibiotic use (4.8±3.27 days vs 3.58±1.97 days, p=0.39). But the case fatality rate was much lower in those with positive BCs, (0 vs 5.7%,p< 0.05). Tachycardia (>120.4±12.46 bpm), neutrophilia (15.0± 8.16 /ul), and high CRP (326.4±146.32 ug/l) were predictors of true positive BCs. CONCLUSIONS: Routine BCs in the management of CAP is not cost-effective with large portion of the cost spent on cultures that returned negative result .Therefore it use show be limited to those likely to return positive cultures. DOI: http://dx.doi.org/10.3126/ijim.v1i2.7408 Int J Infect Microbiol 2012;1(1):54-57


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
László Hajdu ◽  
Miklós Krész ◽  
András Bóta

AbstractBoth community detection and influence maximization are well-researched fields of network science. Here, we investigate how several popular community detection algorithms can be used as part of a heuristic approach to influence maximization. The heuristic is based on the community value, a node-based metric defined on the outputs of overlapping community detection algorithms. This metric is used to select nodes as high influence candidates for expanding the set of influential nodes. Our aim in this paper is twofold. First, we evaluate the performance of eight frequently used overlapping community detection algorithms on this specific task to show how much improvement can be gained compared to the originally proposed method of Kempe et al. Second, selecting the community detection algorithm(s) with the best performance, we propose a variant of the influence maximization heuristic with significantly reduced runtime, at the cost of slightly reduced quality of the output. We use both artificial benchmarks and real-life networks to evaluate the performance of our approach.


2019 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Matteo La Torre ◽  
Vida Lucia Botes ◽  
John Dumay ◽  
Elza Odendaal

Purpose Privacy concerns and data security are changing the risks for businesses and organisations. This indicates that the accountability of all governance participants changes. This paper aims to investigate the role of external auditors within data protection practices and how their role is evolving due to the current digital ecosystem. Design/methodology/approach By surveying the literature, the authors embrace a practice-oriented perspective to explain how data protection practices emerge, exist and occur and examine the auditors’ position within data protection. Findings Auditors need to align their tasks to the purpose of data protection practices. Accordingly, in accessing and using data, auditors are required to engage moral judgements and follow ethical principles that go beyond their legal responsibility. Simultaneously, their accountability extends to data protection ends for instilling confidence that security risks are properly managed. Due to the changing technological conditions under, which auditors operate, the traditional auditors’ task of hearing and verifying extend to new phenomena that create risks for businesses. Thus, within data protection practices, auditors have the accountability to keep interested parties informed about data security and privacy risks, continue to transmit signals to users and instill confidence in businesses. Research limitations/implications The normative level of the study is a research limitation, which calls for future empirical research on how Big Data and data protection is reshaping accounting and auditing practices. Practical implications This paper provides auditing standard setters and practitioners with insights into the redefinitions of auditing practices in the era of Big Data. Social implications Recent privacy concerns at Facebook have sent warning signals across the world about the risks posed by in Big Data systems in terms of privacy, to those charged with governance of organisations. Auditors need to understand these privacy issues to better serve their clients. Originality/value This paper contributes to triggering discussions and future research on data protection and privacy in accounting and auditing research, which is an emerging, yet unresearched topic.


Author(s):  
Kinza Sarwar ◽  
Munam Ali Shah

Healthcare industry confronts many challenges in a pursuit to give safe, cost-effective and highly-valued healthcare services; Radio Frequency Identification (RFID) is considered as one of the rising mechanism which helps in addressing the challenges, currently faced by Mobile Healthcare Service System (MHS). This article focuses on the contribution of cost-effective RFID deployments in healthcare sector that broadly categorize tracking of items, patients and items associated to patient; providing solutions for improving the auditability and accountability, reducing human errors, eliminating the risks of misidentification, identifying treatment errors and keeping the inventory updated. It explores certain parameters that can play an important role for the cost effective deployment of an RFID system such as security and privacy concerns, social and ethical aspects. Moreover, the article analyses the main challenges faced and investigates how security threats and vulnerabilities are a red flag to RFID technology. Furthermore, different solutions are highlighted that can streamline the operation and can optimize the workflow services in healthcare system. RFID represents next-generation enhancement over bar-code technology. Based on performance evaluation and comparison, differences between the two technologies are identified. This article also provides an overview that how RFID is a key enabler to build-up the healthcare service system and an efficacious affirm in optimizing and transforming healthcare practices.


Author(s):  
Arnab Mitra ◽  
Sayantan Saha

A lightweight data security model is of much importance in view of security and privacy of data in several networks (e.g., fog networks) where available computing units at edge nodes are often constrained with low computing capacity and limited storage/availability of energy. To facilitate lightweight data security at such constrained scenarios, cellular automata (CA)-based lightweight data security model is presented in this chapter to enable low-cost physical implementation. For this reason, a detailed investigation is presented in this chapter to explore the potential capabilities of CA-based scheme towards the design of lightweight data security model. Further, a comparison among several existing lightweight data security models ensure the effectiveness for proposed CA-based lightweight data security model. Thus, application suitability in view of fog networks is explored for the proposed CA-based model which has further potential for easy training of a reservoir of computers towards uses in IoT (internet of things)-based multiple industry applications.


2004 ◽  
Vol 118 (3) ◽  
pp. 189-192 ◽  
Author(s):  
S. Uppal ◽  
J. Jose ◽  
P. Banks ◽  
E. Mackay ◽  
A. P. Coatesworth

The need to reduce costs while providing a first-class service has led to the expansion in the role of nurses in recent years. We present results of a comparison of the cost-effectiveness of conventional and nurse-led out-patient ear clinics. Our results indicate that cost-effective health care is a distinct competitive advantage for nurses taking up some roles conventionally performed by doctors. The difference in mean cost of out-patient visit per patient between the two groups is £75.28. This is equivalent to a reduction in cost to the hospital of more than £47000 for the 626 patients seen in a nurse-led ear clinic in a year. The nurse-led service is thus more cost-effective and presents an opportunity by freeing up otolaryngologists’ time to see more complex patients and has the potential for reducing out-patient access time in the NHS.


Author(s):  
Jens G. Acker ◽  
C. Becker-Carus ◽  
Antje Büttner-Teleaga ◽  
Werner Cassel ◽  
Heidi Danker-Hopfe ◽  
...  

AbstractActigraphy has been used for more than 60 years to objectively measure sleep–wake rhythms. Improved modern devices are increasingly employed to diagnose sleep medicine disorders in the clinical setting. Although less accurate than polysomnography, the chief advantage of actigraphs lies in the cost-effective collection of objective data over prolonged periods of time under everyday conditions. Since the cost of wrist actigraphy is not currently reimbursed, this method has not enjoyed wide acceptance to date. The present article provides an overview of the main clinical applications of actigraphy, including the recommendations of specialist societies.


2021 ◽  
pp. 2150020
Author(s):  
Lele Liao ◽  
Wei Zhao ◽  
Ying Liu ◽  
Jun Li

Aiming at refining the unideal microstructure and magnetic performance of sintered Ce–Fe–B magnets, La was introduced into the alloy. The role of La addition on the microstructure and magnetic properties revolution of Ce–Fe–B magnet was investigated in this study. The results suggested that La substitution could obstacle the phase structure deterioration during sintering process and maintained high 2:14:1 phase proportion. Meanwhile, uniform grain size and continuous RE-rich grain boundary phase appeared with La addition, which could be attributed to the segregation behaviors of La element and enhanced oxidation resistance with more 2:14:1 phase. The coercivity showed noteworthy increase from 2.93 kOe to 4.78 kOe under the synergetic effect of maintained 2:14:1 phase proportion, uniform RE2Fe[Formula: see text]B grain and even RE-rich phase distribution. This work indicated that La could act as a useful additive to obtain the cost-effective magnetic materials with moderate performance.


Sign in / Sign up

Export Citation Format

Share Document