A Study on “The Impact of Data Analytics in COVID-19 Health Care System”, Presentation slides for International Conference on "Life Sciences: Acceptance of the New Normal", St. Aloysius' College, Jabalpur, Madhya Pradesh, India, 27-28 August, 2021
Clinicians and healthcare professionals need to familiarize themselves with AI, including its applications and appropriate implementation. Here I am explaining about AI in the context of the disease life cycle.
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGijsptm
In the digital world using technology and new technologies require safe and reliable environment, and it also requires consideration to all the challenges that technology faces with them and address these challenges. Cloud computing is also one of the new technologies in the IT world in this rule there is no exception. According to studies one of the major challenges of this technology is the security and safety required for providing services and build trust in consumers to transfer their data into the cloud. In this paper we attempt to review and highlight security challenges, particularly the security of data storage in a cloud environment. Also, provides some offers to enhance the security of data storage in the cloud
computing systems that by using these opinions can be overcome somewhat on the problems.
This unit includes the following content :
*Introduction to cloud computing
*Move to cloud computing
*Types of cloud
*Working of cloud computing
*Characteristics of cloud
Clinicians and healthcare professionals need to familiarize themselves with AI, including its applications and appropriate implementation. Here I am explaining about AI in the context of the disease life cycle.
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGijsptm
In the digital world using technology and new technologies require safe and reliable environment, and it also requires consideration to all the challenges that technology faces with them and address these challenges. Cloud computing is also one of the new technologies in the IT world in this rule there is no exception. According to studies one of the major challenges of this technology is the security and safety required for providing services and build trust in consumers to transfer their data into the cloud. In this paper we attempt to review and highlight security challenges, particularly the security of data storage in a cloud environment. Also, provides some offers to enhance the security of data storage in the cloud
computing systems that by using these opinions can be overcome somewhat on the problems.
This unit includes the following content :
*Introduction to cloud computing
*Move to cloud computing
*Types of cloud
*Working of cloud computing
*Characteristics of cloud
K-nearest neighbor based facial emotion recognition using effective featuresIAESIJAI
In this paper, an experiment has been carried out based on a simple k-nearest
neighbor (kNN) classifier to investigate the capabilities of three extracted
facial features for the better recognition of facial emotions. The feature
extraction techniques used are histogram of oriented gradient (HOG), Gabor,
and local binary pattern (LBP). A comparison has been made using
performance indices such as average recognition accuracy, overall
recognition accuracy, precision, recall, kappa coefficient, and computation
time. Two databases, i.e., Cohn-Kanade (CK+) and Japanese female facial
expression (JAFFE) have been used here. Different training to testing data
division ratios is explored to find out the best one from the performance
point of view of the three extracted features, Gabor produced 94.8%, which
is the best among all in terms of average accuracy though the computational
time required is the highest. LBP showed 88.2% average accuracy with a
computational time less than that of Gabor while HOG showed minimum
average accuracy of 55.2% with the lowest computation time.
There are many security threats in cloud computing. But the major security threats in the security of the data is third party auditor of data or user data. The various security model varies from application to application. After studying the model of proof of retrievability. The new model will proposed for E-learning, while putting the data on the cloud because security is important factor
Cloud computing and artificial intelligenceFurqan Haider
Hi friends, I have created this simple yet helpful slide about application of AI in cloud computing for a presentation held at my class. i hope it would help those who looking for this topic since Its a rare topic and hardly anyone else ever made ppt about this topic. thanks
Have a nice day :)
ORGAN DONATION MANAGEMENT SYSTEM (PROJECT: ODMS)IJCSEA Journal
Organ Donation Management System is a novel idea to support organ donors in India with a new age
interface and ease of registration, and systematic guidelines of Government India to ensure the legalities.
As we included a Aadhar authentication for this process to register a donor, we duly abide by the laws,
values and of Donors to serve the communities in India. ODMS is an online system which consists of
Android Application and a Website. The health care system has access to detailed information of patients
and donors within a management. As the penetration of Mobile phone and gadgets is another boon for this
project idea deployment. We designed a system if a user willing to donate organs post their death due to an
unfortunate accident or incident with help of Aadhar system we trace the organ donor and within the
golden period we take the permission of family members of deceased organ donor to transplant his organs
to other patients in need. Aadhar plays a pivotal role in this entire process for Authentication, Tracking the
deceased donors and the Know Your Donor called as KYD where a donor himself provide a legal
acceptance of organ donation post his death through video KYC and digital forms filling.
Presentation of Vishal Gulati (Draper Esprit, Venture Partner; Horizon Discovery Group PLC, Board Director) at the Forum of the BioRegion of Catalonia, organized by Biocat.
HEALTH PREDICTION ANALYSIS USING DATA MININGAshish Salve
Data mining techniques are used for a variety of applications. In healthcare industry, datamining plays an important
role in predicting diseases. For detecting a disease number of tests should be required from the patient. But using data
mining technique the number of tests can be reduced. This reduced test plays an important role in time and performance.
This report analyses data mining techniques which can be used for predicting different types of diseases. This report reviewed
the research papers which mainly concentrate on predicting various disease
Existing model uses structured data to predict the patients of either high risk or low risk.
But for a complex disease, structured data is not a good way to describe the disease.
We propose a new convolutional neural network (CNN)-based multimodal disease risk prediction algorithm using structured and unstructured data from hospital.
In this paper, we mainly focus on the risk prediction of cerebral infarction.
Predictive Analytics and Machine Learning for Healthcare - DiabetesDr Purnendu Sekhar Das
Machine Learning on clinical datasets to predict the risk of chronic disease conditions like Type 2 Diabetes mellitus beforehand; as well as predicting outcomes like hospital readmission using EMR RWE data.
The encryption mechanism is a digital coding system dedicated to preserving the confidentiality and integrity of data. It is used for encoding plain text data into a protected and unreadable format.
Unit-IV Health Surveillance ANP m.sc I year.pptxanjalatchi
Nurses modify patient risk factors through surveillance and intervention (often carried out simultaneously), with direct oversight and surveillance for groups of patients, enabling early detection and timely intervention (Dresser, 2012) .
K-nearest neighbor based facial emotion recognition using effective featuresIAESIJAI
In this paper, an experiment has been carried out based on a simple k-nearest
neighbor (kNN) classifier to investigate the capabilities of three extracted
facial features for the better recognition of facial emotions. The feature
extraction techniques used are histogram of oriented gradient (HOG), Gabor,
and local binary pattern (LBP). A comparison has been made using
performance indices such as average recognition accuracy, overall
recognition accuracy, precision, recall, kappa coefficient, and computation
time. Two databases, i.e., Cohn-Kanade (CK+) and Japanese female facial
expression (JAFFE) have been used here. Different training to testing data
division ratios is explored to find out the best one from the performance
point of view of the three extracted features, Gabor produced 94.8%, which
is the best among all in terms of average accuracy though the computational
time required is the highest. LBP showed 88.2% average accuracy with a
computational time less than that of Gabor while HOG showed minimum
average accuracy of 55.2% with the lowest computation time.
There are many security threats in cloud computing. But the major security threats in the security of the data is third party auditor of data or user data. The various security model varies from application to application. After studying the model of proof of retrievability. The new model will proposed for E-learning, while putting the data on the cloud because security is important factor
Cloud computing and artificial intelligenceFurqan Haider
Hi friends, I have created this simple yet helpful slide about application of AI in cloud computing for a presentation held at my class. i hope it would help those who looking for this topic since Its a rare topic and hardly anyone else ever made ppt about this topic. thanks
Have a nice day :)
ORGAN DONATION MANAGEMENT SYSTEM (PROJECT: ODMS)IJCSEA Journal
Organ Donation Management System is a novel idea to support organ donors in India with a new age
interface and ease of registration, and systematic guidelines of Government India to ensure the legalities.
As we included a Aadhar authentication for this process to register a donor, we duly abide by the laws,
values and of Donors to serve the communities in India. ODMS is an online system which consists of
Android Application and a Website. The health care system has access to detailed information of patients
and donors within a management. As the penetration of Mobile phone and gadgets is another boon for this
project idea deployment. We designed a system if a user willing to donate organs post their death due to an
unfortunate accident or incident with help of Aadhar system we trace the organ donor and within the
golden period we take the permission of family members of deceased organ donor to transplant his organs
to other patients in need. Aadhar plays a pivotal role in this entire process for Authentication, Tracking the
deceased donors and the Know Your Donor called as KYD where a donor himself provide a legal
acceptance of organ donation post his death through video KYC and digital forms filling.
Presentation of Vishal Gulati (Draper Esprit, Venture Partner; Horizon Discovery Group PLC, Board Director) at the Forum of the BioRegion of Catalonia, organized by Biocat.
HEALTH PREDICTION ANALYSIS USING DATA MININGAshish Salve
Data mining techniques are used for a variety of applications. In healthcare industry, datamining plays an important
role in predicting diseases. For detecting a disease number of tests should be required from the patient. But using data
mining technique the number of tests can be reduced. This reduced test plays an important role in time and performance.
This report analyses data mining techniques which can be used for predicting different types of diseases. This report reviewed
the research papers which mainly concentrate on predicting various disease
Existing model uses structured data to predict the patients of either high risk or low risk.
But for a complex disease, structured data is not a good way to describe the disease.
We propose a new convolutional neural network (CNN)-based multimodal disease risk prediction algorithm using structured and unstructured data from hospital.
In this paper, we mainly focus on the risk prediction of cerebral infarction.
Predictive Analytics and Machine Learning for Healthcare - DiabetesDr Purnendu Sekhar Das
Machine Learning on clinical datasets to predict the risk of chronic disease conditions like Type 2 Diabetes mellitus beforehand; as well as predicting outcomes like hospital readmission using EMR RWE data.
The encryption mechanism is a digital coding system dedicated to preserving the confidentiality and integrity of data. It is used for encoding plain text data into a protected and unreadable format.
Unit-IV Health Surveillance ANP m.sc I year.pptxanjalatchi
Nurses modify patient risk factors through surveillance and intervention (often carried out simultaneously), with direct oversight and surveillance for groups of patients, enabling early detection and timely intervention (Dresser, 2012) .
A Survey and Analysis on Classification and Regression Data Mining Techniques...theijes
Classification and regression as data mining techniques for predicting the diseases outbreak has been permitted in the health institutions which have relative opportunities for conducting the treatment of diseases. But there is a need to develop a strong model for predicting disease outbreak in datasets based in various countries by filling the existing data mining technique gaps where the majority of models are relaying on single data mining techniques which their accuracies in prediction are not maximized for achieving expected results and also prediction are still few. This paper presents a survey and analysis for existing techniques on both classification and regression models techniques that have been applied for diseases outbreak prediction in datasets.
Adapting to adversity: insights from a stand-alone human immunodeficiency virus testing centre in india during the covid-19 pandemic
Authors:Sumathi Muralidhar*, Abhishek Lachyan
Int J Biol Med Res. 2024; 15(1): 7750-7755
https://www.biomedscidirect.com/2857/adapting-to-adversity-insights-from-a-stand-alone-human-immunodeficiency-virus-testing-centre-in-india-during-the-covid-19-pandemic
Adapting to adversity: insights from a stand-alone human immunodeficiency virus testing centre in india during the covid-19 pandemic
Authors:Sumathi Muralidhar*, Abhishek Lachyan
Int J Biol Med Res. 2024; 15(1): 7750-7755
https://www.biomedscidirect.com/articles.php
Abstract:
Background: The global healthcare landscape confronted unprecedented challenges during the COVID-19 pandemic in 2020. Materials and Methods: This study explores how the COVID-19 pandemic impacted healthcare services in India, with a focus on the Stand-alone HIV Testing Centre (SA-ICTC) at Safdarjung Hospital, New Delhi, during the period from April 1, 2020, to March 31, 2021. Amid the pandemic, specialized clinics for Sexually Transmitted Infections (STI) and Reproductive Tract Infections (RTI) saw a decline in outpatient attendance, while the SA-ICTC faced unique challenges. Results: To address these challenges, innovative solutions were implemented, including alternate-day duty rosters, leading to increased staff efficiency and reduced errors. The study noted a 47.9% reduction in the total number of HIV tests conducted, although the proportion of HIV-positive clients accessing services remained stable. Referrals from STI clinics and Targeted Intervention sites decreased, while referrals from the Tuberculosis (TB) center remained consistent. Client categories accessing ICTC services decreased, except for referrals from Facility Integrated Counseling and Testing Centres (F-ICTC). Conclusions: This research underscores the intricate interplay between COVID-19 and HIV, prompting positive changes in healthcare work ethics, documentation practices, and service delivery. It emphasizes the significance of strategic supply chain management, recommending a 1-2-month buffer of testing kits and consumables in HIV testing facilities to ensure uninterrupted service delivery during crises, thus safeguarding the healthcare needs of vulnerable populations.
Covid resource india 20th april 2020 reportAkshay Kokala
A quick look at how other countries have tackled it and what we can learn from them.
Do read and share. If you would like to collaborate please write to us at contact@covidresource.in
This presentation discusses the following topics:
Basic features of R
Exploring R GUI
Data Frames & Lists
Handling Data in R Workspace
Reading Data Sets & Exporting Data from R
Manipulating & Processing Data in R
A study on “Diagnosis Test of Diabetics and Hypertension by AI”, Presentation slides for International Conference on "Life Sciences: Acceptance of the New Normal", St. Aloysius' College, Jabalpur, Madhya Pradesh, India, 27-28 August, 2021
A study on “impact of artificial intelligence in covid19 diagnosis”Dr. C.V. Suresh Babu
A study on “Impact of Artificial Intelligence in COVID-19 Diagnosis”, Presentation slides for International Conference on "Life Sciences: Acceptance of the New Normal", St. Aloysius' College, Jabalpur, Madhya Pradesh, India, 27-28 August, 2021
A study on “impact of artificial intelligence in covid19 diagnosis”Dr. C.V. Suresh Babu
Although the lungs are one of the most vital organs in the body, they are vulnerable to infection and injury. COVID-19 has put the entire world in an unprecedented difficult situation, bringing life to a halt and claiming thousands of lives all across the world. Medical imaging, such as X-rays and computed tomography (CT), is essential in the global fight against COVID-19, and newly emerging artificial intelligence (AI) technologies are boosting the power of imaging tools and assisting medical specialists. AI can improve job efficiency by precisely identifying infections in X-ray and CT images and allowing further measurement. We focus on the integration of AI with X-ray and CT, both of which are routinely used in frontline hospitals, to reflect the most recent progress in medical imaging and radiology combating COVID-19.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
A study on “the impact of data analytics in covid 19 health care system”
1. A STUDY ON THE IMPACT OF
DATA ANALYTICS IN COVID-19
HEALTH CARE SYSTEM
[1] Sandya Jalesh Kumar, Student, Dept. of Information Technology,
Hindustan Institute of Technology and Science
[2] Dr. C.V. Suresh Babu, Professor, Dept. of Information Technology,
Hindustan Institute of Technology and Science
2. “
Once we know something, we find
it hard to imagine what it was like
not to know it.
2
3. INTRODUCTION
◉ Through the disperse of novel coronavirus illness globally, existence became
considerably contrived.
◉ Data analytics have experienced powerful development over the past few
years.
◉ As it happens, it’s exceptionally considerable to take advantage of data
analytics to assist mankind in a prompt as well as factually precise method to
forestall additionally restrain the advancement of the widespread, sustain
gregarious balance and evaluate the influence of the widespread.
3
4. INTRODUCTION
◉ The unforeseen significant number of coronavirus disease instances has
disturbed medical care system in many economies furthermore eventuated in
an insufficiency of dormitory in the hospices.
◉ For this reason, predicting quantity of coronavirus infection instances is
indispensable for administrations to adopt the necessary measures.
◉ The count of coronavirus disease instances could be correctly anticipated by
taking into account historical records of announced instances side by side few
extraneous components that impact the disseminate of the COVID-19 .
4
5. Work starts by reviewing many of the different modelling approaches used to
provide both descriptive analytics on the current cases and deaths, but also
those used to predict the impact of the pandemic. The descriptive analytics
models share current statistics on cases, deaths, recoveries, etc. The
predictive models share current statistics and provide forecasts for deaths
and cases in the future.
5
6. METHODS
To design the predictive model, all the official data sets available were
exploited. The Wuhan official data set was analyzed and as for the Italian
perspective, the official data set that is daily published was adopted and
updated by the Department of the Italian Civil Protection. Additional statistics
have been imported from the World Health Organization (WHO) website.
6
7. ASSUMPTIONS
1
7
We assumed that the Italian Government would act
promptly with restrictions and lockdowns on the Italian
population and that the Italian citizens would follow these
restrictions with a sense of responsibility.
8. ASSUMPTIONS
2
8
We based our initial estimation on the number of swab
tests analyzed in the initial days of the pandemic period,
where an average of 8000 swab tests were performed
daily (in May, the number of swab tests was increased
significantly to an average of 50,000 tests/day).
11. CONCLUSION
In a crisis, governments often make difficult decisions under uncertainty and time constraints.
These decisions must be both culturally appropriate and sensitive to the population. Through
early recognition of the crisis, daily briefings to the public, and simple health messaging, the
government was able to reassure the public by delivering timely, accurate, and transparent
information regarding the evolving epidemic.
11