In recent years, there have been several cases of global epidemics such as influenza B or Ebola. In these cases, several factors are key to limit the effects of the epidemic and avoid contagion. Between of them is the speed of knowing which persons are infected, which persons has been in contact with any infected person or know what the focus of the epidemic. In general, obtaining this information requires a process of research among the first affected that can be slow and complicated. This article describes a tool that aims to generate alerts when there are data about an epidemic, and notify all persons who could be exposed to contagion and prevent new infections occurs.
Transforming the Kenya Health Information System (KHIS) to an Early Warning a...Stephen Olubulyera
Transforming the Kenya Health Information System (KHIS) to an Early Warning and Real-Time Electronic Disease Notification System: Optimization for Epidemiology, Disease Surveillance and Response in Kenya.
To develop a concept on transforming the Kenya Health Management Information System (KHIS) to an electronic disease early warning and real-time notification system through optimization of disease surveillance indicators: automatic and real-time notifications integrated into an informative standardised tool. The concepts will enhance and develop part of the list of diseases mandatorily reported within the stipulated period in disease occurrence depending on the case definition of the diseases, virulence and the degree of spread of new emerging diseases that have not been defined e.g. a new infectious disease.
The document summarizes a proposed smart e-health care system using IoT and machine learning. It begins with an introduction to how advances in IoT and communication technologies have enabled remote health monitoring systems. It then reviews related literature on stress sensors and IoT solutions applied to healthcare.
The proposed system involves developing an IoT-based health monitoring system using various body sensors. Machine learning algorithms would then be used to predict diseases based on sensor inputs. The system aims to highlight the need for secure IoT systems and propose a solution for data privacy and security. Key aspects of the proposed system design include collecting sensor data, transmitting it via microcontroller and cloud for real-time monitoring, and using machine learning models to check values
AI has the potential to help address challenges in healthcare by analyzing complex health data, enabling continuous preventative care, and personalized treatment. However, several challenges remain, including a lack of standardized high-quality data for training AI models and ensuring privacy and proper validation of AI systems. Success stories so far include using deep learning for medical imaging analysis and chatbots. Key trends include "serious wearables" providing clinical decision support and using AI in drug development and analyzing real-world data.
A study on the impact of data analytics in COVID-19 health care systemDr. C.V. Suresh Babu
Through the disperse of novel coronavirus illness globally, existence became considerably contrived. Data analytics have experienced powerful development over the past few years. As it happens, it’s exceptionally considerable to take advantage of data analytics to assist mankind in a prompt as well as factually precise method to forestall additionally restrain the advancement of the widespread, sustain gregarious balance and evaluate the influence of the widespread. The unforeseen significant number of coronavirus disease instances has disturbed medical care system in many economies furthermore eventuated in an insufficiency of dormitory in the hospices. For this reason, prognosticating quantity of coronavirus infection instances is indispensable for administrations to adopt the necessary measures. The count of coronavirus disease instances could be correctly anticipated by taking into account historical records of announced instances side by side few extraneous components that impact the disseminate of the COVID-19 . Hence, the principal aim out of this research is to contemporaneously consider historical data and the extraneous components. This paper explores how data analytics can play a role in health care especially in novel coronavirus illness.
The Role of Information Communication Technology & Geoinformatics in Vector C...ANUMBA JOSEPH UCHE
Driving forces behind a growing interest in Integrated Vector Management include the need to overcome challenges experienced with conventional single-intervention approaches to vector control as well as recent opportunities for promoting multi-sectoral approaches to human health.
In any vector based disease, the most important process in controlling it is monitoring the vector population (Surveillance). This surveillance is important to prioritize the area for treatment and vector control measures.
By providing the tools (ICT & Geoinformatics) to better understand surveillance results, Integrated Vector Management Officers across Nigeria can optimize their own surveillance programs.
Extension personnel can use the system for educating the public and potentially save human lives.
Hence, the integration of ICT & Geoinformatics in vector surveillance ought to be a fundamental skill for modern Integrated Vector Management officers across the Globe
Fattori - Considerazioni su E-Patient - In collaborazione con Giorgia MioneGiuseppe Fattori
The document discusses the concept of an "e-patient" which refers to patients who use online resources and social media to educate themselves and engage with their healthcare. It provides the URL for a website about e-patients as well as several articles and a book that discuss topics such as the use of patient blogs, social media's role in engaging patients, and physicians' responses to patients using online information.
Repurposed existing drugs and updated global health policy and clinical guidelines will be essential for limiting the social and economic devastation caused by this virus. So, we are leading a three-phase multinational Network Medicine clinical study (MNM COVID-19 study). The study will apply Network Medicine methodologies to repurpose existing drugs for SARS-CoV-2 infected patients and update global health policy and clinical guidelines.
Transforming the Kenya Health Information System (KHIS) to an Early Warning a...Stephen Olubulyera
Transforming the Kenya Health Information System (KHIS) to an Early Warning and Real-Time Electronic Disease Notification System: Optimization for Epidemiology, Disease Surveillance and Response in Kenya.
To develop a concept on transforming the Kenya Health Management Information System (KHIS) to an electronic disease early warning and real-time notification system through optimization of disease surveillance indicators: automatic and real-time notifications integrated into an informative standardised tool. The concepts will enhance and develop part of the list of diseases mandatorily reported within the stipulated period in disease occurrence depending on the case definition of the diseases, virulence and the degree of spread of new emerging diseases that have not been defined e.g. a new infectious disease.
The document summarizes a proposed smart e-health care system using IoT and machine learning. It begins with an introduction to how advances in IoT and communication technologies have enabled remote health monitoring systems. It then reviews related literature on stress sensors and IoT solutions applied to healthcare.
The proposed system involves developing an IoT-based health monitoring system using various body sensors. Machine learning algorithms would then be used to predict diseases based on sensor inputs. The system aims to highlight the need for secure IoT systems and propose a solution for data privacy and security. Key aspects of the proposed system design include collecting sensor data, transmitting it via microcontroller and cloud for real-time monitoring, and using machine learning models to check values
AI has the potential to help address challenges in healthcare by analyzing complex health data, enabling continuous preventative care, and personalized treatment. However, several challenges remain, including a lack of standardized high-quality data for training AI models and ensuring privacy and proper validation of AI systems. Success stories so far include using deep learning for medical imaging analysis and chatbots. Key trends include "serious wearables" providing clinical decision support and using AI in drug development and analyzing real-world data.
A study on the impact of data analytics in COVID-19 health care systemDr. C.V. Suresh Babu
Through the disperse of novel coronavirus illness globally, existence became considerably contrived. Data analytics have experienced powerful development over the past few years. As it happens, it’s exceptionally considerable to take advantage of data analytics to assist mankind in a prompt as well as factually precise method to forestall additionally restrain the advancement of the widespread, sustain gregarious balance and evaluate the influence of the widespread. The unforeseen significant number of coronavirus disease instances has disturbed medical care system in many economies furthermore eventuated in an insufficiency of dormitory in the hospices. For this reason, prognosticating quantity of coronavirus infection instances is indispensable for administrations to adopt the necessary measures. The count of coronavirus disease instances could be correctly anticipated by taking into account historical records of announced instances side by side few extraneous components that impact the disseminate of the COVID-19 . Hence, the principal aim out of this research is to contemporaneously consider historical data and the extraneous components. This paper explores how data analytics can play a role in health care especially in novel coronavirus illness.
The Role of Information Communication Technology & Geoinformatics in Vector C...ANUMBA JOSEPH UCHE
Driving forces behind a growing interest in Integrated Vector Management include the need to overcome challenges experienced with conventional single-intervention approaches to vector control as well as recent opportunities for promoting multi-sectoral approaches to human health.
In any vector based disease, the most important process in controlling it is monitoring the vector population (Surveillance). This surveillance is important to prioritize the area for treatment and vector control measures.
By providing the tools (ICT & Geoinformatics) to better understand surveillance results, Integrated Vector Management Officers across Nigeria can optimize their own surveillance programs.
Extension personnel can use the system for educating the public and potentially save human lives.
Hence, the integration of ICT & Geoinformatics in vector surveillance ought to be a fundamental skill for modern Integrated Vector Management officers across the Globe
Fattori - Considerazioni su E-Patient - In collaborazione con Giorgia MioneGiuseppe Fattori
The document discusses the concept of an "e-patient" which refers to patients who use online resources and social media to educate themselves and engage with their healthcare. It provides the URL for a website about e-patients as well as several articles and a book that discuss topics such as the use of patient blogs, social media's role in engaging patients, and physicians' responses to patients using online information.
Repurposed existing drugs and updated global health policy and clinical guidelines will be essential for limiting the social and economic devastation caused by this virus. So, we are leading a three-phase multinational Network Medicine clinical study (MNM COVID-19 study). The study will apply Network Medicine methodologies to repurpose existing drugs for SARS-CoV-2 infected patients and update global health policy and clinical guidelines.
Modern society is highly dependent on the provisioning of clean water, healthy and plentiful food, breathable air, and prompt intervention to curtail disease outbreaks. The public health system is critical in supporting these activities. Today’s information technology provides public health practitioners key capabilities in maintaining the health of the population. This lecture will provide a basic foundation of knowledge about public health practice for clinical informaticians, and highlight specialized information systems and data standards used in public health today. We will explore the existing public health informatics infrastructure including surveillance systems, the process of electronic laboratory reporting (ELR) of notifiable diseases, vital statistics systems, and the critical importance of GIS systems in the public health
Medical technologies and data protection issues - food for thoughtRenato Monteiro
Document prepared towards the modernization procedure of Council of Europe´s Convention 108 on the Protection of Personal Data. Available at: http://www.coe.int/t/dghl/standardsetting/dataprotection/TPD_documents/T-PD-BUR%282014%2904Rev%20-%20Medical%20Data%20%28By%20Renato%20Leite%29.pdf
Big Data, CEP and IoT : Redefining Holistic Healthcare Information Systems an...Tauseef Naquishbandi
Healthcare industry has been a significant area for innovative application of various technologies over decades. Being an area of social relevance governmental spending on healthcare have always been on the rise over the years. Event Processing (CEP) has been in use for many years for situational awareness and response generation. Computing technologies have played an important role in improvising several aspects of healthcare. Recently emergent technology paradigms of Big Data, Internet of Things (IoT) and Complex Event Processing (CEP) have the potential not only to deal with pain areas of healthcare domain but also to redefine healthcare offerings. This paper aims to lay the groundwork for a healthcare system which builds upon integration of Big Data, CEP and IoT.
Fattori - 50 abstracts of e patient. In collaborazione con Monica DaghioGiuseppe Fattori
This document contains summaries of 50 abstracts related to e-patients and social media. Some key points:
1) Participatory surveillance of hypoglycemia in an online diabetes social network found high rates of hypoglycemic events and related harms like daily worry and withdrawal from activities. Engagement was also high.
2) Analysis of self-reported Parkinson's disease symptom data from an online platform found short-term dynamics like fluctuations exceeding clinically important differences that add to understanding of disease progression.
3) Examination of influential cancer patients on Twitter found most tweets focused on support rather than medical information, indicating its role in online patient community and support.
Internet of Medical Things: Technological Environment of Personalized/ Precis...Alexandre Prozoroff
On the basis of a coherent technological infrastructure operators of wireless and wired communications grows up the fragments of the global Internet of Medical Things (IoMT). Each fragments that focuses on acquisition and processing of biometric data is local telebiometrics system.
kHealth Bariatrics is an effort to bout against weight recidivism post bariatric surgery. The computer scientists working at Kno.e.sis, an Ohio Center of Excellence in BioHealth Innovation, are collaborating with a bariatric surgeon and a behavioural specialist to bolster weight loss surgery patients for appropriate postsurgical progress.
White Paper HDI_big data and prevention_EN_Nov2016Anne Gimalac
This document discusses the potential role of big data and genomics in cancer treatment and prevention. It describes how genome sequencing is becoming more routine in cancer research and treatment to better understand cancers and personalize therapies. However, true big data approaches analyzing large, diverse genomic datasets have not yet been widely applied. Major technological, organizational, and economic challenges remain to fully realize the promise of precision, personalized 6P medicine based on big data and molecular diagnostics.
Advance IoT-based BSN Healthcare System for Emergency Response of Patient wit...IJMTST Journal
BSN is a prior and emerging technology in the medical field .BSN care system first deploy light weight ,tinypowered
sensors on patient body which communicate with each other and the coordinator node which is on
the body.This system mainly focuses on the measurement and estimation of important parameters like
ECG,temperature,level of blood. This real time system focuses on several parameters like patient location,
data storage, motion detection and transmission of data as well as alert messages to first responder and
server of hospital.In this system we are using three types of sensors ECG sensor,temperature sensor and
level sensor which gathers patients information and sends to micro-controller via which it goes to
BTC(Bluetooth Controller) through it is transferred to an Android smart phone of patient via Wi-Fi/Internet it
goes to server and from the server data is sends to doctors Android App. We are additionally using NFC(Near
Field Communication) technology,motion detection of patient by continuous grabbing of feed from
camera.Subsequently, by using this customized algorithm we proposed IOT based healthcare system using
body sensors which efficiently accomplish requirement.
Risk & Opportunities: Healthcare InformationHal Amens
This document outlines risks and opportunities associated with the increasing complexity of health-related information sharing as records move to electronic formats. It notes that while electronic records provide opportunities to capture, store, share and use data in new ways, this also creates new risks from issues like data breaches and defining standards of care. However, the larger databases and connected networks also enable opportunities to more easily find needed information, conduct research across larger populations, and better inform patients and providers. The document acknowledges that while many have discussed these topics, taking a broader view of the many interconnected elements is novel and where risks and opportunities arise.
The HHS emPOWER Initiative provides Medicare data and mapping tools to support emergency preparedness, response, recovery, and resilience activities at the local level. This includes de-identified data on electricity-dependent Medicare beneficiaries, individual data available for approved emergency responses, and the HHS emPOWER Map. Broome County Health Department uses these resources to enhance situational awareness, inform planning, and identify at-risk populations for outreach and resource allocation before, during, and after disasters.
Nosocomial infections, also known as healthcare-associated infections (HAIs), pose a significant problem in healthcare facilities. Exchanging patient data between clinicians and public health agencies could help address the spread of HAIs. Empirical data mapping patient movement networks and monitoring HAI spread could improve understanding and response. Standardized HAI surveillance data collected annually from healthcare facilities is considered open access and can be used by researchers and health organizations without ethical restrictions to advance public health goals like HAI prevention.
The document is a social media toolkit from the Centers for Disease Control and Prevention (CDC) that provides guidance on using social media for health communication. It covers topics such as developing a social media strategy, evaluating social media efforts, and descriptions of various social media tools including buttons/badges, image sharing, RSS feeds, podcasts, video sharing, widgets, eCards, mobile technologies, Twitter, blogs, and Facebook. It aims to help public health professionals integrate social media into their communication campaigns and activities.
Ethical Considerations for a Public Health Response Using Molecular HIV Surve...HopkinsCFAR
This document discusses a multi-stakeholder consultation regarding the ethical use of molecular HIV surveillance (MHS) data for public health purposes. MHS analyzes genetic sequences from HIV tests to identify clusters of individuals with closely related viruses, potentially indicating transmission relationships. While MHS could help target prevention, concerns include potential misinterpretation increasing criminalization risk. The consultation made recommendations in four areas: community education and engagement; examining laws/policies around data sharing; research on effectiveness and optimal implementation; and ensuring community input on policies. Addressing these issues is important as public health agencies expand use of this new surveillance approach.
Epidemic Alert System: A Web-based Grassroots ModelIJECEIAES
This document summarizes research on web-based epidemic alert systems. It discusses how most current systems analyze large amounts of unstructured data from various online sources using complex algorithms, which can generate imprecise results given the lack of standards. The document then proposes a new grassroots web-based system that collects structured data directly from primary health centers, hospitals, and laboratories. This traditional approach uses threshold values based on percentiles to determine when an epidemic is triggered. If adopted, it could help standardize web-based disease surveillance.
Sting Stigma Eradication Application forms the lifetime of fighting Stigma related to HIV/AIDS in Kenya and other developing countries in Africa. However, through this project there is remarkable improvement in approach of dealing with people affected or infected by HIV. It is therefore a turning point to a long journey of fighting the diseases in the entire continent. The IT initiative has encouraged various organizations to develop systems to facilitate their day to day operations. SSEA incorporates various modules for automating service delivery and enhancing communication between the concerned parties and thus help in saving time and operations thus increasing efficiency. The purpose of this solution is to present the software engineering approach for development which focuses on the set of activities and associated results to develop a Sting Stigma Eradication Application meant to perform some of services delivery necessary for individuals affected by HIV/AIDS automatically at their comfort by use of widely used technology, mobile and web technology.
The study aimed to investigate into the impact of a National COVID-19 Health contact tracing and monitoring system for Namibia. The study used qualitative methods as a research strategy. Qualitative data was collected
through zoom meeting and a Google form link was distributed to the participants. The findings of the study revealed
that a total of 18 participants responded to the semi-structured questions of which 38.9% represents male while
female 61.1%. The age group between 18–25 response rate were 22.2%, age group between 26–35 response rate were
55.6%, age group between 36–45 response rate were 16.7% and the age group between 46 and above response rate
was 10% represented in green colour to represent participants who fall in the age group between 46 and above
GIVING UP PRIVACY FOR SECURITY: A SURVEY ON PRIVACY TRADE-OFF DURING PANDEMIC...ijcisjournal
While the COVID-19 pandemic continues to be as complex as ever, the collection and exchange of data in the light of fighting coronavirus poses a major challenge for privacy systems around the globe. The disease’s size and magnitude are not uncommon but it appears to be at the point of hysteria surrounding it. Consequently, in a very short time, extreme measures for dealing with the situation appear to have become
the norm. Any such actions affect the privacy of individuals in particular. In some cases, there is intensive monitoring of the whole population while the medical data of those diagnosed with the virus is commonly circulated through institutions and nations. This may well be in the interest of saving the world from a deadly disease, but is it appropriate and right? Although creative solutions have been implemented in many countries to address the issue, proponents of privacy are concerned that technologies will eventually erode privacy, while regulators and privacy supporters are worried about what kind of impact this could bring. While that tension has always been present, privacy has been thrown into sharp relief by the sheer urgency
of containing an exponentially spreading virus. The essence of this dilemma indicates that establishing the right equilibrium will be the best solution. The jurisprudence concerning cases regarding the willingness of public officials to interfere with the constitutional right to privacy in the interests of national security or public health has repeatedly proven that a reasonable balance can be reached.
Covid-19 is the destructive world’s most recent pandemic that is experienced in every part of the world.
This deadly virus affects different people in different ways. Most infected people will develop mild to moderate
illness and recover without hospitalisation. Covid-19 most common symptoms include fever, dry and tiredness.
It is against this background that in Namibian health environment the country uses a manual system to record
public member’s demographic information when visiting public places which do not allow tracing and monitoring of every public member who visited the 14 regions in the country. Therefore, the present study developed a
National COVID-19 health contact tracing and monitoring system which will allow every public member who visits
an enclosed public place by capturing their demographic information as well as the date and time the facility was
visited. The system replaces the paper-based method of recording the information of people visiting public places
with an entrance that allows the coming in and out of people. The system will also allow for real-time monitoring of
temperature changes of individuals.
Modern society is highly dependent on the provisioning of clean water, healthy and plentiful food, breathable air, and prompt intervention to curtail disease outbreaks. The public health system is critical in supporting these activities. Today’s information technology provides public health practitioners key capabilities in maintaining the health of the population. This lecture will provide a basic foundation of knowledge about public health practice for clinical informaticians, and highlight specialized information systems and data standards used in public health today. We will explore the existing public health informatics infrastructure including surveillance systems, the process of electronic laboratory reporting (ELR) of notifiable diseases, vital statistics systems, and the critical importance of GIS systems in the public health
Medical technologies and data protection issues - food for thoughtRenato Monteiro
Document prepared towards the modernization procedure of Council of Europe´s Convention 108 on the Protection of Personal Data. Available at: http://www.coe.int/t/dghl/standardsetting/dataprotection/TPD_documents/T-PD-BUR%282014%2904Rev%20-%20Medical%20Data%20%28By%20Renato%20Leite%29.pdf
Big Data, CEP and IoT : Redefining Holistic Healthcare Information Systems an...Tauseef Naquishbandi
Healthcare industry has been a significant area for innovative application of various technologies over decades. Being an area of social relevance governmental spending on healthcare have always been on the rise over the years. Event Processing (CEP) has been in use for many years for situational awareness and response generation. Computing technologies have played an important role in improvising several aspects of healthcare. Recently emergent technology paradigms of Big Data, Internet of Things (IoT) and Complex Event Processing (CEP) have the potential not only to deal with pain areas of healthcare domain but also to redefine healthcare offerings. This paper aims to lay the groundwork for a healthcare system which builds upon integration of Big Data, CEP and IoT.
Fattori - 50 abstracts of e patient. In collaborazione con Monica DaghioGiuseppe Fattori
This document contains summaries of 50 abstracts related to e-patients and social media. Some key points:
1) Participatory surveillance of hypoglycemia in an online diabetes social network found high rates of hypoglycemic events and related harms like daily worry and withdrawal from activities. Engagement was also high.
2) Analysis of self-reported Parkinson's disease symptom data from an online platform found short-term dynamics like fluctuations exceeding clinically important differences that add to understanding of disease progression.
3) Examination of influential cancer patients on Twitter found most tweets focused on support rather than medical information, indicating its role in online patient community and support.
Internet of Medical Things: Technological Environment of Personalized/ Precis...Alexandre Prozoroff
On the basis of a coherent technological infrastructure operators of wireless and wired communications grows up the fragments of the global Internet of Medical Things (IoMT). Each fragments that focuses on acquisition and processing of biometric data is local telebiometrics system.
kHealth Bariatrics is an effort to bout against weight recidivism post bariatric surgery. The computer scientists working at Kno.e.sis, an Ohio Center of Excellence in BioHealth Innovation, are collaborating with a bariatric surgeon and a behavioural specialist to bolster weight loss surgery patients for appropriate postsurgical progress.
White Paper HDI_big data and prevention_EN_Nov2016Anne Gimalac
This document discusses the potential role of big data and genomics in cancer treatment and prevention. It describes how genome sequencing is becoming more routine in cancer research and treatment to better understand cancers and personalize therapies. However, true big data approaches analyzing large, diverse genomic datasets have not yet been widely applied. Major technological, organizational, and economic challenges remain to fully realize the promise of precision, personalized 6P medicine based on big data and molecular diagnostics.
Advance IoT-based BSN Healthcare System for Emergency Response of Patient wit...IJMTST Journal
BSN is a prior and emerging technology in the medical field .BSN care system first deploy light weight ,tinypowered
sensors on patient body which communicate with each other and the coordinator node which is on
the body.This system mainly focuses on the measurement and estimation of important parameters like
ECG,temperature,level of blood. This real time system focuses on several parameters like patient location,
data storage, motion detection and transmission of data as well as alert messages to first responder and
server of hospital.In this system we are using three types of sensors ECG sensor,temperature sensor and
level sensor which gathers patients information and sends to micro-controller via which it goes to
BTC(Bluetooth Controller) through it is transferred to an Android smart phone of patient via Wi-Fi/Internet it
goes to server and from the server data is sends to doctors Android App. We are additionally using NFC(Near
Field Communication) technology,motion detection of patient by continuous grabbing of feed from
camera.Subsequently, by using this customized algorithm we proposed IOT based healthcare system using
body sensors which efficiently accomplish requirement.
Risk & Opportunities: Healthcare InformationHal Amens
This document outlines risks and opportunities associated with the increasing complexity of health-related information sharing as records move to electronic formats. It notes that while electronic records provide opportunities to capture, store, share and use data in new ways, this also creates new risks from issues like data breaches and defining standards of care. However, the larger databases and connected networks also enable opportunities to more easily find needed information, conduct research across larger populations, and better inform patients and providers. The document acknowledges that while many have discussed these topics, taking a broader view of the many interconnected elements is novel and where risks and opportunities arise.
The HHS emPOWER Initiative provides Medicare data and mapping tools to support emergency preparedness, response, recovery, and resilience activities at the local level. This includes de-identified data on electricity-dependent Medicare beneficiaries, individual data available for approved emergency responses, and the HHS emPOWER Map. Broome County Health Department uses these resources to enhance situational awareness, inform planning, and identify at-risk populations for outreach and resource allocation before, during, and after disasters.
Nosocomial infections, also known as healthcare-associated infections (HAIs), pose a significant problem in healthcare facilities. Exchanging patient data between clinicians and public health agencies could help address the spread of HAIs. Empirical data mapping patient movement networks and monitoring HAI spread could improve understanding and response. Standardized HAI surveillance data collected annually from healthcare facilities is considered open access and can be used by researchers and health organizations without ethical restrictions to advance public health goals like HAI prevention.
The document is a social media toolkit from the Centers for Disease Control and Prevention (CDC) that provides guidance on using social media for health communication. It covers topics such as developing a social media strategy, evaluating social media efforts, and descriptions of various social media tools including buttons/badges, image sharing, RSS feeds, podcasts, video sharing, widgets, eCards, mobile technologies, Twitter, blogs, and Facebook. It aims to help public health professionals integrate social media into their communication campaigns and activities.
Ethical Considerations for a Public Health Response Using Molecular HIV Surve...HopkinsCFAR
This document discusses a multi-stakeholder consultation regarding the ethical use of molecular HIV surveillance (MHS) data for public health purposes. MHS analyzes genetic sequences from HIV tests to identify clusters of individuals with closely related viruses, potentially indicating transmission relationships. While MHS could help target prevention, concerns include potential misinterpretation increasing criminalization risk. The consultation made recommendations in four areas: community education and engagement; examining laws/policies around data sharing; research on effectiveness and optimal implementation; and ensuring community input on policies. Addressing these issues is important as public health agencies expand use of this new surveillance approach.
Epidemic Alert System: A Web-based Grassroots ModelIJECEIAES
This document summarizes research on web-based epidemic alert systems. It discusses how most current systems analyze large amounts of unstructured data from various online sources using complex algorithms, which can generate imprecise results given the lack of standards. The document then proposes a new grassroots web-based system that collects structured data directly from primary health centers, hospitals, and laboratories. This traditional approach uses threshold values based on percentiles to determine when an epidemic is triggered. If adopted, it could help standardize web-based disease surveillance.
Sting Stigma Eradication Application forms the lifetime of fighting Stigma related to HIV/AIDS in Kenya and other developing countries in Africa. However, through this project there is remarkable improvement in approach of dealing with people affected or infected by HIV. It is therefore a turning point to a long journey of fighting the diseases in the entire continent. The IT initiative has encouraged various organizations to develop systems to facilitate their day to day operations. SSEA incorporates various modules for automating service delivery and enhancing communication between the concerned parties and thus help in saving time and operations thus increasing efficiency. The purpose of this solution is to present the software engineering approach for development which focuses on the set of activities and associated results to develop a Sting Stigma Eradication Application meant to perform some of services delivery necessary for individuals affected by HIV/AIDS automatically at their comfort by use of widely used technology, mobile and web technology.
The study aimed to investigate into the impact of a National COVID-19 Health contact tracing and monitoring system for Namibia. The study used qualitative methods as a research strategy. Qualitative data was collected
through zoom meeting and a Google form link was distributed to the participants. The findings of the study revealed
that a total of 18 participants responded to the semi-structured questions of which 38.9% represents male while
female 61.1%. The age group between 18–25 response rate were 22.2%, age group between 26–35 response rate were
55.6%, age group between 36–45 response rate were 16.7% and the age group between 46 and above response rate
was 10% represented in green colour to represent participants who fall in the age group between 46 and above
GIVING UP PRIVACY FOR SECURITY: A SURVEY ON PRIVACY TRADE-OFF DURING PANDEMIC...ijcisjournal
While the COVID-19 pandemic continues to be as complex as ever, the collection and exchange of data in the light of fighting coronavirus poses a major challenge for privacy systems around the globe. The disease’s size and magnitude are not uncommon but it appears to be at the point of hysteria surrounding it. Consequently, in a very short time, extreme measures for dealing with the situation appear to have become
the norm. Any such actions affect the privacy of individuals in particular. In some cases, there is intensive monitoring of the whole population while the medical data of those diagnosed with the virus is commonly circulated through institutions and nations. This may well be in the interest of saving the world from a deadly disease, but is it appropriate and right? Although creative solutions have been implemented in many countries to address the issue, proponents of privacy are concerned that technologies will eventually erode privacy, while regulators and privacy supporters are worried about what kind of impact this could bring. While that tension has always been present, privacy has been thrown into sharp relief by the sheer urgency
of containing an exponentially spreading virus. The essence of this dilemma indicates that establishing the right equilibrium will be the best solution. The jurisprudence concerning cases regarding the willingness of public officials to interfere with the constitutional right to privacy in the interests of national security or public health has repeatedly proven that a reasonable balance can be reached.
Covid-19 is the destructive world’s most recent pandemic that is experienced in every part of the world.
This deadly virus affects different people in different ways. Most infected people will develop mild to moderate
illness and recover without hospitalisation. Covid-19 most common symptoms include fever, dry and tiredness.
It is against this background that in Namibian health environment the country uses a manual system to record
public member’s demographic information when visiting public places which do not allow tracing and monitoring of every public member who visited the 14 regions in the country. Therefore, the present study developed a
National COVID-19 health contact tracing and monitoring system which will allow every public member who visits
an enclosed public place by capturing their demographic information as well as the date and time the facility was
visited. The system replaces the paper-based method of recording the information of people visiting public places
with an entrance that allows the coming in and out of people. The system will also allow for real-time monitoring of
temperature changes of individuals.
Disease outbreak detection, monitoring and notification systems are increasingly gaining popularity since
these systems are designed to assess threats to public health and disease outbreaks are becoming
increasingly common world-wide. A variety of systems are in use around the world, with coverage of
national, international and global disease outbreaks. These systems use different taxonomies and
classifications for the detection and prioritization of potential disease outbreaks. In this paper, we study
and analyze the current disease outbreak systems. Subsequently, we extract features and functions of
typical and generic disease outbreak systems. We then propose a generic model for disease outbreak
notification systems. Our effort is directed towards standardizing the design process for typical disease
outbreak systems.
1. The document describes a fuzzy logic-based decision-making system to predict the risk of a person being infected with COVID-19 based on their symptoms and parameters.
2. The system uses 8 input variables like fever, cough, breathing difficulty, etc. and 1 output variable of COVID-19 prognosis. It defines membership functions and 77 fuzzy rules to relate the inputs and output.
3. Testing on real patient data yielded an accuracy of 97.2%, sensitivity of 100%, and specificity of 96.2% in predicting low, moderate, and high risk of COVID-19 infection.
Natural Language Processing and summarization of medical symptomatic data fro...IRJET Journal
This document proposes a system to detect the spread of diseases across geographical locations using natural language processing and machine learning algorithms. The system analyzes symptomatic data from patient complaints recorded by doctors. It extracts symptoms using NLP techniques and predicts diseases by matching symptoms to a disease database. The system then plots the predicted diseases on a map to show spread across different regions over time. This early detection of disease spread can help healthcare organizations respond faster and prevent outbreaks.
The use of mobile applications, through smart phones, smartphones, has been considered by many to be the technological revolution of greatest repercussion in recent times. Compared to a handheld computer and with access to millions of applications, its main feature is unlimited mobility, accompanying its user at all times and in any place. In health, it is known that professionals are constantly moving outside of the institutions in which they work, so mobility is fundamental, which contributes to the interoperability of mobile technologies. This study aims to identify the research involving mobile technology applied to the vaccination being used. The methodology used is of the type integrative review of the literature. The final sample had 14 papers.
Cloud Computing: A Key to Effective & Efficient Disease Surveillance Systemidescitation
Cloud computing, a future generation concept
characterized by three entities: Software, hardware &
network designed to enhance the capacity building
simultaneously increasing the throughput by extending the
reach for any system without having heavy investment of
infrastructure and training new personnel. It is becoming
a major building block for any sort of businesses across the
globe. This paper likes to propose a cloud as a solution for
having an effective disease surveillance system. Till now,
multiple surveillance systems come into play but still they
lack sensitivity, specificity & timeliness.
An Overview on the Use of Data Mining and Linguistics Techniques for Building...ijcsit
The usage of Online Social Networks (OSN), such as Facebook and Twitter are becoming more and more
popular in order to exchange and disseminate news and information in real-time. Twitter in particular
allows the instant dissemination of short messages in the form of microblogs to followers. This Survey
reviews literature to explore and examine the usage of how OSNs, such as the microblogging tool Twitter,
can help in the detection of spreading epidemics. The paper highlights significant challenges in the field of
Natural Language Processing (NLP) when using microblog based Early Disease Detection Systems. For
instance, microblogging data is an unstructured collection of short messages (140 characters in Twitter),
with noise and non-standard use of the English language. Hence, research is currently exploring the field
of linguistics in order to determine the semantics of the text and uses data mining techniques in order to
extract useful information for disease spread detection. Furthermore, the survey discusses applications and
existing early disease detection systems based on OSNs and outlines directions for future research on
improving such systems based on a combination of linguistics methods, data mining techniques and
recommendation systems.
This document summarizes an intelligent mobile health monitoring system (IMHMS) that collects biomedical and environmental data from sensors, analyzes the data using an intelligent medical server, and provides medical feedback to patients through their mobile devices. The system aims to improve healthcare access and provide personalized health monitoring anywhere through integration of biosensors, wireless networks, and mobile computing. It discusses related works in mobile health monitoring and care. Key aspects of IMHMS include its system architecture, characteristics like long-term ambulatory monitoring and real-time updates, impact on healthcare research through data mining, and future directions like developing the intelligent medical server.
The Addition Symptoms Parameter on Sentiment Analysis to Measure Public Healt...TELKOMNIKA JOURNAL
This document discusses a method for measuring public health concerns based on sentiment analysis of tweets. The method involves collecting tweets related to specific diseases, preprocessing the tweets, and analyzing sentiment using a scoring method that classifies tweets based on words. The scoring method is tested with and without additional parameters for symptoms. Results are compared to manually classified tweets to evaluate accuracy and the impact of the additional parameters on measuring public concern levels.
PANDEMIC INFORMATION DISSEMINATION WEB APPLICATION: A MANUAL DESIGN FOR EVERYONEijcsitcejournal
The aim of this research is to generate a web application from an inedited methodology with a series of
instructions indicating the coding in a flow diagram. The primary purpose of this methodology is to aid
non-profits in disseminating information regarding the COVID-19 pandemic, so that users can share vital
and up-to-date information. This is a functional design, and a series of screenshots demonstrating its
behaviour is presented below. This unique design arose from the necessity to create a web application for
an information dissemination platform; it also addresses an audience that does not have programming
knowledge. This document uses the scientific method in its writing. The authors understand that there is a
similar design in the bibliography; therefore, the differences between the designs are described herein; it
is very important to point out that this proposal can be taken as an alternative to the design of any web
application.
IT is playing a key role in tackling the COVID-19 pandemic through various technologies:
1. Remote health monitoring, telemedicine, and chatbots allow virtual doctor visits and patient engagement while maintaining social distancing.
2. AI and machine learning are used to track, monitor, and predict the spread of the virus through tools like contact tracing apps and analysis of medical images and data.
3. Digital technologies help distribute reliable health information and ease anxiety through online wellness apps.
Square transposition: an approach to the transposition process in block cipherjournalBEEI
The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology. The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values. This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable. This research designs a transposition algorithm called square transposition. Each process uses square 8 × 8 as a place to insert and retrieve 64-bits. The determination of the pairing of the input scheme and the retrieval scheme that have unequal flow is an important factor in producing a good transposition. The square transposition can generate random and non-pattern indices so that transposition can be done better than DES and AES.
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
The document proposes using a particle swarm optimization (PSO) algorithm to optimize the hyperparameters of a convolutional neural network (CNN) for image classification. The PSO algorithm is used to find optimal values for CNN hyperparameters like the number and size of convolutional filters. In experiments on the MNIST handwritten digit dataset, the optimized CNN achieved a testing error rate of 0.87%, which is competitive with state-of-the-art models. The proposed approach finds optimized CNN architectures automatically without requiring manual design or encoding strategies during training.
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
In this contemporary era, the uses of machine learning techniques are increasing rapidly in the field of medical science for detecting various diseases such as liver disease (LD). Around the globe, a large number of people die because of this deadly disease. By diagnosing the disease in a primary stage, early treatment can be helpful to cure the patient. In this research paper, a method is proposed to diagnose the LD using supervised machine learning classification algorithms, namely logistic regression, decision tree, random forest, AdaBoost, KNN, linear discriminant analysis, gradient boosting and support vector machine (SVM). We also deployed a least absolute shrinkage and selection operator (LASSO) feature selection technique on our taken dataset to suggest the most highly correlated attributes of LD. The predictions with 10 fold cross-validation (CV) made by the algorithms are tested in terms of accuracy, sensitivity, precision and f1-score values to forecast the disease. It is observed that the decision tree algorithm has the best performance score where accuracy, precision, sensitivity and f1-score values are 94.295%, 92%, 99% and 96% respectively with the inclusion of LASSO. Furthermore, a comparison with recent studies is shown to prove the significance of the proposed system.
A secure and energy saving protocol for wireless sensor networksjournalBEEI
The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovative technologies and research directions that have come up addressing the usability of WSN under various schemes. This domain permits dependable tracking of a diversity of environments for both military and civil applications. The key management mechanism is a primary protocol for keeping the privacy and confidentiality of the data transmitted among different sensor nodes in WSNs. Since node's size is small; they are intrinsically limited by inadequate resources such as battery life-time and memory capacity. The proposed secure and energy saving protocol (SESP) for wireless sensor networks) has a significant impact on the overall network life-time and energy dissipation. To encrypt sent messsages, the SESP uses the public-key cryptography’s concept. It depends on sensor nodes' identities (IDs) to prevent the messages repeated; making security goals- authentication, confidentiality, integrity, availability, and freshness to be achieved. Finally, simulation results show that the proposed approach produced better energy consumption and network life-time compared to LEACH protocol; sensors are dead after 900 rounds in the proposed SESP protocol. While, in the low-energy adaptive clustering hierarchy (LEACH) scheme, the sensors are dead after 750 rounds.
Plant leaf identification system using convolutional neural networkjournalBEEI
This paper proposes a leaf identification system using convolutional neural network (CNN). This proposed system can identify five types of local Malaysia leaf which were acacia, papaya, cherry, mango and rambutan. By using CNN from deep learning, the network is trained from the database that acquired from leaf images captured by mobile phone for image classification. ResNet-50 was the architecture has been used for neural networks image classification and training the network for leaf identification. The recognition of photographs leaves requested several numbers of steps, starting with image pre-processing, feature extraction, plant identification, matching and testing, and finally extracting the results achieved in MATLAB. Testing sets of the system consists of 3 types of images which were white background, and noise added and random background images. Finally, interfaces for the leaf identification system have developed as the end software product using MATLAB app designer. As a result, the accuracy achieved for each training sets on five leaf classes are recorded above 98%, thus recognition process was successfully implemented.
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
This study aims to develop Moodle-based LMS with customized learning content and modified user interface to facilitate pedagogical processes during covid-19 pandemic and investigate how teachers of socially disadvantaged schools perceived usability and technology acceptance. Co-design process was conducted with two activities: 1) need assessment phase using an online survey and interview session with the teachers and 2) the development phase of the LMS. The system was evaluated by 30 teachers from socially disadvantaged schools for relevance to their distance learning activities. We employed computer software usability questionnaire (CSUQ) to measure perceived usability and the technology acceptance model (TAM) with insertion of 3 original variables (i.e., perceived usefulness, perceived ease of use, and intention to use) and 5 external variables (i.e., attitude toward the system, perceived interaction, self-efficacy, user interface design, and course design). The average CSUQ rating exceeded 5.0 of 7 point-scale, indicated that teachers agreed that the information quality, interaction quality, and user interface quality were clear and easy to understand. TAM results concluded that the LMS design was judged to be usable, interactive, and well-developed. Teachers reported an effective user interface that allows effective teaching operations and lead to the system adoption in immediate time.
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
Dynamic learning environment has emerged as a powerful platform in a modern e-learning system. The learning situation that constantly changing has forced the learning platform to adapt and personalize its learning resources for students. Evidence suggested that adaptation and personalization of e-learning systems (APLS) can be achieved by utilizing learner modeling, domain modeling, and instructional modeling. In the literature of APLS, questions have been raised about the role of individual characteristics that are relevant for adaptation. With several options, a new problem has been raised where the attributes of students in APLS often overlap and are not related between studies. Therefore, this study proposed a list of learner model attributes in dynamic learning to support adaptation and personalization. The study was conducted by exploring concepts from the literature selected based on the best criteria. Then, we described the results of important concepts in student modeling and provided definitions and examples of data values that researchers have used. Besides, we also discussed the implementation of the selected learner model in providing adaptation in dynamic learning.
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
1) Researchers developed a prototype contactless transaction system using QR codes and digital payments to support physical distancing during the COVID-19 pandemic in traditional markets.
2) The system allows sellers and buyers in traditional markets to conduct fast, secure transactions via smartphones without direct cash exchange. Buyers scan sellers' QR codes to view product details and make e-wallet payments.
3) Testing showed the system's functions worked properly and users found it easy to use and useful for supporting contactless transactions and digital transformation of traditional markets. However, further development is needed to increase trust in digital payments for users unfamiliar with the technology.
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
The use of a real-time operating system is required for the demarcation of industrial wireless sensor network (IWSN) stacks (RTOS). In the industrial world, a vast number of sensors are utilised to gather various types of data. The data gathered by the sensors cannot be prioritised ahead of time. Because all of the information is equally essential. As a result, a protocol stack is employed to guarantee that data is acquired and processed fairly. In IWSN, the protocol stack is implemented using RTOS. The data collected from IWSN sensor nodes is processed using non-preemptive scheduling and the protocol stack, and then sent in parallel to the IWSN's central controller. The real-time operating system (RTOS) is a process that occurs between hardware and software. Packets must be sent at a certain time. It's possible that some packets may collide during transmission. We're going to undertake this project to get around this collision. As a prototype, this project is divided into two parts. The first uses RTOS and the LPC2148 as a master node, while the second serves as a standard data collection node to which sensors are attached. Any controller may be used in the second part, depending on the situation. Wireless HART allows two nodes to communicate with each other.
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
This document describes the implementation of a double-layer structure on an octagon microstrip yagi antenna (OMYA) to improve its performance at 5.8 GHz. The double-layer consists of two double positive (DPS) substrates placed above the OMYA. Simulation and experimental results show that the double-layer configuration increases the gain of the OMYA by 2.5 dB compared to without the double-layer. The measured bandwidth of the OMYA with double-layer is 14.6%, indicating the double-layer can increase both the gain and bandwidth of the OMYA.
The calculation of the field of an antenna located near the human headjournalBEEI
In this work, a numerical calculation was carried out in one of the universal programs for automatic electro-dynamic design. The calculation is aimed at obtaining numerical values for specific absorbed power (SAR). It is the SAR value that can be used to determine the effect of the antenna of a wireless device on biological objects; the dipole parameters will be selected for GSM1800. Investigation of the influence of distance to a cell phone on radiation shows that absorbed in the head of a person the effect of electromagnetic radiation on the brain decreases by three times this is a very important result the SAR value has decreased by almost three times it is acceptable results.
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering the secure performance at the physical layer. In the considered system model, the base station acts a relay to allow two users at the left side communicate with two users at the right side. By considering imperfect channel state information (CSI), the secure performance need be studied since an eavesdropper wants to overhear signals processed at the downlink. To provide secure performance metric, we derive exact expressions of secrecy outage probability (SOP) and and evaluating the impacts of main parameters on SOP metric. The important finding is that we can achieve the higher secrecy performance at high signal to noise ratio (SNR). Moreover, the numerical results demonstrate that the SOP tends to a constant at high SNR. Finally, our results show that the power allocation factors, target rates are main factors affecting to the secrecy performance of considered uplink-downlink NOMA systems.
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
This report presents an investigation on how to improve the current dual-band antenna to enhance the better result of the antenna parameters for energy harvesting application. Besides that, to develop a new design and validate the antenna frequencies that will operate at 2.4 GHz and 5.4 GHz. At 5.4 GHz, more data can be transmitted compare to 2.4 GHz. However, 2.4 GHz has long distance of radiation, so it can be used when far away from the antenna module compare to 5 GHz that has short distance in radiation. The development of this project includes the scope of designing and testing of antenna using computer simulation technology (CST) 2018 software and vector network analyzer (VNA) equipment. In the process of designing, fundamental parameters of antenna are being measured and validated, in purpose to identify the better antenna performance.
Transforming data-centric eXtensible markup language into relational database...journalBEEI
eXtensible markup language (XML) appeared internationally as the format for data representation over the web. Yet, most organizations are still utilising relational databases as their database solutions. As such, it is crucial to provide seamless integration via effective transformation between these database infrastructures. In this paper, we propose XML-REG to bridge these two technologies based on node-based and path-based approaches. The node-based approach is good to annotate each positional node uniquely, while the path-based approach provides summarised path information to join the nodes. On top of that, a new range labelling is also proposed to annotate nodes uniquely by ensuring the structural relationships are maintained between nodes. If a new node is to be added to the document, re-labelling is not required as the new label will be assigned to the node via the new proposed labelling scheme. Experimental evaluations indicated that the performance of XML-REG exceeded XMap, XRecursive, XAncestor and Mini-XML concerning storing time, query retrieval time and scalability. This research produces a core framework for XML to relational databases (RDB) mapping, which could be adopted in various industries.
Key performance requirement of future next wireless networks (6G)journalBEEI
The document provides an overview of the key performance indicators (KPIs) for 6G wireless networks compared to 5G networks. Some of the major KPIs discussed for 6G include: achieving data rates of up to 1 Tbps and individual user data rates up to 100 Gbps; reducing latency below 10 milliseconds; supporting up to 10 million connected devices per square kilometer; improving spectral efficiency by up to 100 times through technologies like terahertz communications and smart surfaces; and achieving an energy efficiency of 1 pico-joule per bit transmitted through techniques like wireless power transmission and energy harvesting. The document outlines how 6G aims to integrate terrestrial, aerial and maritime communications into a single network to provide ubiquitous connectivity with higher
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
This paper presents the use of the inverse confidential technique on bilateral function with the territorial intensity-based optical flow to prove the effectiveness in noise resistance environment. In general, the image’s motion vector is coded by the technique called optical flow where the sequences of the image are used to determine the motion vector. But, the accuracy rate of the motion vector is reduced when the source of image sequences is interfered by noises. This work proved that the inverse confidential technique on bilateral function can increase the percentage of accuracy in the motion vector determination by the territorial intensity-based optical flow under the noisy environment. We performed the testing with several kinds of non-Gaussian noises at several patterns of standard image sequences by analyzing the result of the motion vector in a form of the error vector magnitude (EVM) and compared it with several noise resistance techniques in territorial intensity-based optical flow method.
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
This study aims to model climate change based on rainfall, air temperature, pressure, humidity and wind with grADS software and create a global warming module. This research uses 3D model, define, design, and develop. The results of the modeling of the five climate elements consist of the annual average temperature in Indonesia in 2009-2015 which is between 29oC to 30.1oC, the horizontal distribution of the annual average pressure in Indonesia in 2009-2018 is between 800 mBar to 1000 mBar, the horizontal distribution the average annual humidity in Indonesia in 2009 and 2011 ranged between 27-57, in 2012-2015, 2017 and 2018 it ranged between 30-60, during the East Monsoon, the wind circulation moved from northern Indonesia to the southern region Indonesia. During the west monsoon, the wind circulation moves from the southern part of Indonesia to the northern part of Indonesia. The global warming module for SMA/MA produced is feasible to use, this is in accordance with the value given by the validate of 69 which is in the appropriate category and the response of teachers and students through a 91% questionnaire.
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
The purpose of this paper is to propose an approach of re-organizing input data to recognize emotion based on short signal segments and increase the quality of emotional recognition using physiological signals. MIT's long physiological signal set was divided into two new datasets, with shorter and overlapped segments. Three different classification methods (support vector machine, random forest, and multilayer perceptron) were implemented to identify eight emotional states based on statistical features of each segment in these two datasets. By re-organizing the input dataset, the quality of recognition results was enhanced. The random forest shows the best classification result among three implemented classification methods, with an accuracy of 97.72% for eight emotional states, on the overlapped dataset. This approach shows that, by re-organizing the input dataset, the high accuracy of recognition results can be achieved without the use of EEG and ECG signals.
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
Manual system vehicle parking makes finding vacant parking lots difficult, so it has to check directly to the vacant space. If many people do parking, then the time needed for it is very much or requires many people to handle it. This research develops a real-time parking system to detect parking. The system is designed using the HSV color segmentation method in determining the background image. In addition, the detection process uses the background subtraction method. Applying these two methods requires image preprocessing using several methods such as grayscaling, blurring (low-pass filter). In addition, it is followed by a thresholding and filtering process to get the best image in the detection process. In the process, there is a determination of the ROI to determine the focus area of the object identified as empty parking. The parking detection process produces the best average accuracy of 95.76%. The minimum threshold value of 255 pixels is 0.4. This value is the best value from 33 test data in several criteria, such as the time of capture, composition and color of the vehicle, the shape of the shadow of the object’s environment, and the intensity of light. This parking detection system can be implemented in real-time to determine the position of an empty place.
Quality of service performances of video and voice transmission in universal ...journalBEEI
The universal mobile telecommunications system (UMTS) has distinct benefits in that it supports a wide range of quality of service (QoS) criteria that users require in order to fulfill their requirements. The transmission of video and audio in real-time applications places a high demand on the cellular network, therefore QoS is a major problem in these applications. The ability to provide QoS in the UMTS backbone network necessitates an active QoS mechanism in order to maintain the necessary level of convenience on UMTS networks. For UMTS networks, investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined. According to the results, appropriate QoS adaption allows for specific voice and video transmission. Finally, by analyzing existing QoS parameters, the QoS performance of 4G/UMTS networks may be improved.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Design and optimization of ion propulsion dronebjmsejournal
Electric propulsion technology is widely used in many kinds of vehicles in recent years, and aircrafts are no exception. Technically, UAVs are electrically propelled but tend to produce a significant amount of noise and vibrations. Ion propulsion technology for drones is a potential solution to this problem. Ion propulsion technology is proven to be feasible in the earth’s atmosphere. The study presented in this article shows the design of EHD thrusters and power supply for ion propulsion drones along with performance optimization of high-voltage power supply for endurance in earth’s atmosphere.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
Rainfall intensity duration frequency curve statistical analysis and modeling...bijceesjournal
Using data from 41 years in Patna’ India’ the study’s goal is to analyze the trends of how often it rains on a weekly, seasonal, and annual basis (1981−2020). First, utilizing the intensity-duration-frequency (IDF) curve and the relationship by statistically analyzing rainfall’ the historical rainfall data set for Patna’ India’ during a 41 year period (1981−2020), was evaluated for its quality. Changes in the hydrologic cycle as a result of increased greenhouse gas emissions are expected to induce variations in the intensity, length, and frequency of precipitation events. One strategy to lessen vulnerability is to quantify probable changes and adapt to them. Techniques such as log-normal, normal, and Gumbel are used (EV-I). Distributions were created with durations of 1, 2, 3, 6, and 24 h and return times of 2, 5, 10, 25, and 100 years. There were also mathematical correlations discovered between rainfall and recurrence interval.
Findings: Based on findings, the Gumbel approach produced the highest intensity values, whereas the other approaches produced values that were close to each other. The data indicates that 461.9 mm of rain fell during the monsoon season’s 301st week. However, it was found that the 29th week had the greatest average rainfall, 92.6 mm. With 952.6 mm on average, the monsoon season saw the highest rainfall. Calculations revealed that the yearly rainfall averaged 1171.1 mm. Using Weibull’s method, the study was subsequently expanded to examine rainfall distribution at different recurrence intervals of 2, 5, 10, and 25 years. Rainfall and recurrence interval mathematical correlations were also developed. Further regression analysis revealed that short wave irrigation, wind direction, wind speed, pressure, relative humidity, and temperature all had a substantial influence on rainfall.
Originality and value: The results of the rainfall IDF curves can provide useful information to policymakers in making appropriate decisions in managing and minimizing floods in the study area.
artificial intelligence and data science contents.pptxGauravCar
What is artificial intelligence? Artificial intelligence is the ability of a computer or computer-controlled robot to perform tasks that are commonly associated with the intellectual processes characteristic of humans, such as the ability to reason.
› ...
Artificial intelligence (AI) | Definitio
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Generation of infectious disease alerts through the use of geolocation
1. Bulletin of Electrical Engineering and Informatics
Vol. 9, No. 4, August 2020, pp. 1533~1541
ISSN: 2302-9285, DOI: 10.11591/eei.v9i4.1945 1533
Journal homepage: http://beei.org
Generation of infectious disease alerts through
the use of geolocation
Antonio Sarasa Cabezuelo
Departmento de Sistemas Informáticos y Computación, Universidad Complutense de Madrid, Spain
Article Info ABSTRACT
Article history:
Received Dec 2, 2019
Revised Feb 7, 2020
Accepted Mar 1, 2020
In recent years, there have been several cases of global epidemics such as
influenza B or Ebola. In these cases, several factors are key to limit
the effects of the epidemic and avoid contagion. Between of them
is the speed of knowing which persons are infected, which persons has been
in contact with any infected person or know what the focus of the epidemic.
In general, obtaining this information requires a process of research among
the first affected that can be slow and complicated. This article describes
a tool that aims to generate alerts when there are data about an epidemic,
and notify all persons who could be exposed to contagion and prevent new
infections occurs.
Keywords:
App
Big data
Epidemiological alerts
Online analytical processing
Web mining This is an open access article under the CC BY-SA license.
Corresponding Author:
Antonio Sarasa Cabezuelo,
Departamento de Sistemas Informáticos y Computación,
Universidad Complutense de Madrid,
Calle Profesor José García Santesmases, 9. Madrid 28042, Spain.
Email: asarasa@ucm.es
1. INTRODUCTION
In recent years, there have been several cases of epidemics that have had serious consequences
worldwide. In 2009 it came the pandemic due to influenza A (H1N1) caused by a variant of Influenza virus
A (H1N1) with genetic material [1] from an avian strain, two swine strains and a human who suffered
a mutation and jumped between species pigs to humans, then allow spread from person to person.
This epidemic officially began on June 11, 2009 and its ending was announced on August 10, 2010, leaving
a total of 19000 victims. In December 2013, it started the Ebola epidemic in Guinea, and lasted until March
29, 2016. This outbreak left a total of 11323 victims and 28646 contagions according to the World Health
Organization with a rate of 70% mortality.
In general, in all cases of epidemics, the immediate availability of information about where occurred
the first infection, individuals that are infected [2], and people who have been in contact with infected people,
can limit greatly the expansion of the epidemic. Obtaining these data is not an easy task since in most cases
do not have that information immediately, and requires a slow and complicated process of investigation.
However, the time factor is key in these cases to limit the spread and effects of the epidemic.
There are several examples of the use of internet [3] and information systems [4] to help prevent and
limit the effects of epidemics [5]. One of the most famous case was the monitoring and analysis
of influenza and Dengue by Google [6]. However, there are other initiatives [7] such as FrontlineSMS [8],
a communication system based on sending SMS that arriving in a data center that is responsible for spreading
the message among groups of health experts and respond with an SMS. FrontlineSMS: medic is a subproject
more specific of Frontline. Another example is Ushahidi [9]. It is an open source project that emerged as
2. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 4, August 2020 : 1533 – 1541
1534
a result of the earthquake in Haiti in 2007 [10]. It provides a system for collecting information through
SMS [11], Web, voice messages and email [12]. It also has tools for translation, classification and
georeferencing [13]. The information is presented in accessible maps via web or mobile phones [14].
The Asthmapolis [15] project focuses on asthma patients to track asthma attacks. They use an inhaler that has
GPS with a mobile application that keeps track of the frequency of attacks. Using these data and
the analyzing of environmental causes, it is generated risk maps of outbreaks [16]. The HealthMap [17]
website and the app Outbreaks Near Me [18] use unofficial sources of information [19] on the network for
tracking disease outbreaks [20] and perform real-time monitoring of possible epidemics [21]. Analyzes
the information obtained and provides a unified view [22]. Flu Near You [23], a website created with
the American Public Health Association and the Skoll Global Threats Fund of San Francisco, which allows
individuals to send information about potential diseases. Weekly, they do reports about the health status.
The last case is medic mobile [24] that offers several applications to register and track disease outbreaks
faster, keep stock of essential medicines and communicate about emergencies [25].
This article describes a tool which offers a partial solution to the problem described. The application
is not a medical protocol to answer against epidemics or an emergency plan. It is a system alerting to
epidemics that uses the medical information and data obtained from the mobile phone (geographical data and
information recovered from sensors of the mobile phone). In this sense, the goal of the application is
the quick recovery of data about possible epidemics, performing a quick analysis of the data to locate
the outbreaks of epidemics and possible areas of infection, and the transmission of results to all users so they
know whether they are infected or they can avoid contagion areas.
The article is structured as follows. In section 2, the objectives of the system are described.
In section 3, it is described the problem of sources of information. In section 4, the architecture software is
presented. In section 5, it is described the analysis of data performed by the system. Finally, conclusions and
future work are proposed in section 6.
2. RESEARCH METHOD
The main problems of the application are to retrieve information about outbreaks, analyze
the information and inform system users through alerts on the mobile phone so they can use the information
obtained in order to prevent contagion. In order to do so, it requires that the system retrieves information
from three different sources. The first source of information comes from the mobile phone of users on
the system. This information is obtained from sensors that have built-in phone [26]. Essentially, it is
information about geolocation with the goal of knowing at every moment where the individual is localized,
the places that has visited and at what times. Other data such as brightness or temperature are also obtained.
The second source of information is from medical experts. Experts that will use this application
must enter data of all cases of people infected that they manage. Of all medical information about an infected
patient will be used the following information: geographic location, type of disease, the symptoms,
the patient's condition, information about places where the individual has been and when it has been in these
places. In order to perform the processing of the information, the personal data of patients are not needed,
so that they remain anonymous. In any case, every patient will be informed that their data will be used,
so they can decide if they are willing to lend them or not. Additionally, it is used other medical data obtained
from official sources that serve to complement the information collected directly by doctors.
The third source of information is the unofficial information extracted directly from the Internet [27].
For this goal, it was chosen several information sources: Twitter, Facebook and several online newspapers.
It performs a combined analysis of keywords and sentimental analysis [28] to retrieve information about
possible outbreaks or evolution of an outbreak identified. In order to process information from all sources
of information, it was developed a system consisting of a web client and an Android application, four
databases (two relational and two non-relational) for storage of the data, and finally two RESTful APIs, that
allow the mobile application and the web client to perform data counting and interaction with databases.
All users of the system must install the Android app and its functionality is the recovery of data
from sensors of mobile phones and sending them to the database that centralizes all the information gathered.
In addition, through this app, users receive alerts as well as all the information generated by data analysis.
The second application is a Web application that is used by doctors to enter information about infected
patients that have been attended by the doctor. In addition, doctors use the web application in order to track
the infected patients: next visits, evolution of the patient. In addition, the web application has a set
of internal scripts that perform various functions of processing and information retrieval. On the one hand,
there is a process that periodically connects to the sources of unofficial information previously commented
(twitter, Facebook and several online newspapers), then retrieves information, and stores it in the database.
3. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Generation of infectious disease alerts through the use of geolocation (Antonio Sarasa-Cabezuelo)
1535
Also, there is another internal script that whenever new information is added to the system, then it
processes all data to generate alerts to be sent to all system users. Alerts that are sent are of various types
depending on the situation of each user. Those users who have not been in a focus of an epidemic or they are
not in a contagion area, then receive an informational alert about where there was an outbreak and areas that
should be avoided to not be exposed to possible infection. Nevertheless, users who could be infected receive
the previous alerts described and they are informed of possible contagion. In addition, the system suggests
them that they should go to a medical facility to validate whether they really have been infected or not.
Also in the latter case, the script automatically adds the data of users that may be infected to the set of data
of users that they are tracked. In this way, when the user visits the health center, the doctor already knows
that this is a possible case of contagion. This action also is used to analyze other possible cases of indirect
contagion that could have been generated from individuals who might be infected.
Finally, in order to manage this information, it has been used two types of different databases.
To store data coming from the sensors of mobile phones and data entered by doctors about patients who have
attended, it has used a relational database of MySQL type. However, for data coming from the Internet, it has
used a NoSQL database of MongoDB type [29]. The decision to use two different databases is due to
the different nature of the data. In the first case, data uses a fixed structure, while data obtained from internet
are data whose structure can change their structure every time that it is recovered.
3. RESULT AND DISCUSSIONS
3.1. The Android app
The main function of the app is the retrieval of data from the sensors of mobile phones in order to
analyze and to generate alerts about possible outbreaks, areas of infection or infection of the users. For this
the app sends the location and the time or 'timestamp' of the users. The location is sent every 5 minutes
or whenever a change of position of 100 meters is detected. In this way, it is avoided to saturate the sending
of data and to keep a control of them and, above all, battery savings are achieved, an aspect to be taken into
account in mobile devices. This information is stored in the MongoDB database. The main functionalities
of the app are:
a. Registration. The user must install the app on the mobile phone, and do the registration in the app to use
the services of the system. It must enter: name, surname, ID number, date of birth and email. When
the user accept, then the user receives an email confirmation. Once the user confirms, then the user can
enter the password that it will use in the account.
b. Login. In the authentication window, the user must enter the password and ID number, and then it must
click on the link "Enter". In addition, ther is the option to create a new account.
c. Main interface. When the user logs into the account reaches the main navigation page. On this page,
the user can choose from several options: "My account", "Settings", "About", "Technical support"
and "Logout". By "Settings", user can configure some options of the app: “Enable geolocation” (the app
can collect the geolocation data of the mobile phone and send this data to the database), “Enable
notifications” (the user can receive alerts and information that the system generates when analyzing
the data), “Exclusive use with Wi-Fi” ( the app will send data in the case of there are a Wi-Fi connection
available), “Language” (the user can change the language used in the user interface) and the last option
allows users to enter Twitter and Facebook so that they can share the information generated by
the application. The option “My account” implements the core functionality of the app. It has 3 options:
− Check the current state of the user and the zone. On this page, the user can verify the situation in
which he is with respect to a possible infection. The application shows if the user could be infected
because he has been in contact with some people who might be infected. It also shows if in
the area where it is located, there is an outbreak and, therefore, it is advisable to avoid the area.
It can see two zones: the upper one indicates the current state of the user (if the health is in danger
because the algorithm has detected it), while the lower one reports the status of the area in which the
user is at that moment (if in the current area there is some risk of infection detected by
the algorithm or if the area is free of diseases). When the screen is moved down, the current view will
be updated, so that the user's current position will be taken again to see if there is any risk in their
new location.
− Check and delete news. On this page, the application will show all the news about the epidemics that
generate the web application, the appearance of new infections or the extinction of them. News are
common for all users. Each news is obtained from the information that the application retrieves on
Twitter as well as on Facebook and online newspapers. In addition, in the upper part there are data of
possible interest such as the municipality, the current temperature and the date. To update all the
4. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 4, August 2020 : 1533 – 1541
1536
information, just make the 'swipe' gesture. Also, it is possible to delete a news item that it has been
already reviewed or that they are not useful.
− Consult profile. The user's profile page displays all user data and it can be changed the password
of the user.
3.2. The web application
The web client will be the point of interaction with doctors or health specialists. Through this web,
it possible to establish the starting point of a contagion (ie the user) and the date, so that the execution of
the algorithm alerts the possible affected and allows the visualization of the evolution of a disease, such as
the number affected, the areas and statistical data on these. In addition, possible sources can be searched from
a list of users, to see where a contagion might have arisen.
The web page is the tool that the doctor will tell day by day, he will consult it every day and it will
be part of his work. All possible actions are aimed at the study of different diseases, infections and outbreaks
using patient data, and show all this information once computed. The website communicates with the API,
which, by consulting the system databases, returns all the information requested. The main interface as
shown in Figure 1 is divided into several areas: information about contagions and a search engine of patients,
a form for sending messages to patients and a bar of functions in the top side. In the top left, it appears
the identification of the health center in which the application runs. In the upper right, it appears the user
of the doctor who is using the application.
Figure 1. Main interface
The area information about contagions show a list of all areas with epidemics. It is a real-time
information. For each epidemic disease, it is indicated: the city or town where it is located the focus,
the number of infections, the number of deaths that have occurred due to the epidemic, the level of danger
and a color ranging from yellow (level 1), orange(level 2) and red(level 3). The color graphically depicts
the danger of the epidemic. A hot map shows the areas where there is an epidemic If more detail is needed,
the map allows zooming and brings several options can alternate between different views of the map:
political or physical.
Next to each row of information, there is a delete button that lets remove a focus, once it has
disappeared. When pressed, the alert level goes to 0 and disappears from the list and heat map, showing
an alert message informing of the recent change. Also, there is an update button that allows real time refresh
the data displayed in case any of them has been modified during the observation period. When a user clicks
on an area of the map will appear in a new window where are shown the streets and areas of the city which
are dangerous (because there is an infected focus).
In the upper right portion of the page, there is a search engine of patients that uses the patient's ID
number. If it does not exist or if it is an incorrect identifier, a warning message is displayed. And, if it is
correct, it retrieves as result the patient's report, showing personal data and observations about the disease.
In addition, it can record whether a user has died because of a contagious disease. It also has a link to send
an email to the patient. If the patient searched is sick, then it is shown all the diseases with a Heal button
where the doctor can press to eliminate that disease of the patient in case of being cured. If all the diseases
of the patient disappear, the condition of the patient is updated from sick to cure.
5. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Generation of infectious disease alerts through the use of geolocation (Antonio Sarasa-Cabezuelo)
1537
The bar of functions offers the next options:
a. Contagions. This link leads to a page in which the doctor can register a new infected patient. It is a form
where the doctor must insert: ID number, exposure time, and minimum distance to be a contagion,
disease, discharge date, severity, description, and a parameter about the number of days. This last
parameter set when it must perform a search of patients they could have been infected. For this, it is
executed an algorithm to search for all users who meet the parameters entered (patients potentially
being infected), and generating notifications for each of them. Also on this page the doctor can consult
notifications have been sent in recent days as shown in Figure 2(a). There is a user search by identifier
which allows to display all the notifications sent. So, it is shown a table with the identifier, the name,
the illness for which it was notified and the date of the notification. The doctor can confirm
the contagion after a physical examination or set a false alarm in case the patient does not present any disease.
b. Sources. This link leads to a page in which the doctor can consult the active sources or register a new
source. In the page Active sources as shown in Figure 2(b), there is a list with every source. In every
row is shown: number of people affected, start date and description of the outbreak. Also, it is possible
to cancel a focus. In the page Register a source allows to find the place of origin of a disease using
a series of infected individuals. For this purpose, a form is available where it is possible to enter
the identification number of an infected patient and add it to a list. All the users searched for are shown
in a table. Next, it is executed a script that performs a triangulation with infected patients to find
the focus of the epidemic. When the algorithm finishes crossing all the places and obtaining the results,
a table with all of them is shown, as well as a map with a mark in the exact point where the focus of the
disease may have been located.
(a) (b)
Figure 2. (a) Notifications, (b) Active sources
c. Statistics. This link provides access to a set of graphical representations of statistics that can be about
general data or specific data on diseases. The general statistics shows a ranking of the top 5 most
contagious diseases, diseases with higher mortality, and the status of all patients. With respect specific
diseases, there is a search engine to retrieve information from a particular disease. In the first place,
a table is shown with the number of people infected by that disease, the deaths that it has produced,
and whether it is eradicated or not. Also, there are a two graphical representations that shown statistical
data on infections by sex and age, as well as the number of deaths that have occurred due to these
diseases. In all cases, it is possible to export all the data and generate a pdf report with all the charts and
tables of the diseases.
d. @Social. In this link, there is a heat map that shows the presence of diseases globally using the data
obtained from the web with the data collector. Also, it is possible to query a specific area by name and
date, and it will be shown a list of diseases in this are by date. There is a filter in order to show
the active diseases in a concrete date.
3.2. RESTful APIs
There are 2 APIs that are the entry point for mobile applications and the website, making it possible
to abstract their functionality and interact with databases to save and request data:
a. The first API allows interacting with all data related to users registered in the system (diseases,
notifications, news, infections and outbreaks). This API offers the following functionality:
6. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 4, August 2020 : 1533 – 1541
1538
b. Related to users: 1)User registration: given the name, surname, email, date of birth, gender, weight,
identification document (DNI/NIE) and password, add the user to the database if there is no user with
the same identification document or with the same email; 2) Edition of the state of the deceased user: in
the event that a user dies, its status is changed to "deceased" and the number of deaths caused by
the diseases to which the active contagions of said user belong is increased by one unit; 3) Obtaining
a user's data according to identification document and password for checking when entering the mobile
application; 4) Obtaining a user according to the identification document. If said user exists,
their sociodemographic data and active contagions are obtained with the data of the disease to which
they belong; 5) Obtaining the number of users that are in each state (undefined, healthy, cured, sick,
and deceased).
c. Related to diseases:1) Obtaining the list of diseases; 2) Obtaining the desired number of diseases with
the greatest number of infected users; 3) Obtaining the desired amount of diseases with the highest
number of deaths caused; 4) Obtaining the data of a disease according to the name; 5) Obtaining the list
of users affected by a disease with their data on gender, age, and weight.
d. Related to the contagions: 1) Given an initial user, a distance, a time window to the past, a time
of exposure and a description, it is analyzed in search of the possible infected users adding a notification
for those affected; 2) Given a user and a contagion, said user is added to the list of users belonging to
said contagion. In addition, the data of the disease to which this infection belongs is updated: a unit is
added to the number of people infected in the age range to which the user belongs, the average weight
that the disease is affected is updated and a unit to the number of people infected of the same gender as
the user; 3) Given a user and a contagion, said user is removed from the list of users belonging to said
contagion. In addition, if the user does not have any more active contagions, their status is changed to
"cured"; 4) Given a contagion, the status of said contagion is updated to "inactive"; 5) Obtaining the list
of all active infections; 6) Obtaining the list of infections that belong to a disease, according to
the name, and the list of users that belong to each of these infections; 7) Obtaining geographical points,
latitude and longitude, where the active contagions are.
e. Related to the outbreaks: 1) Given a list of user identifiers (DNI/NIE) and a disease, possible points are
obtained where they could infect (foci) both all users of the list, as a small group of them.
In addition, a focus is added to the given disease, and a place for each point found at said focus;
2) Given a focus and a place, the given place is removed from the list of places of said focus;
3) Obtaining the list of active bulbs with their respective places.
f. Related to notifications: 1) Given the identification document of a user, all outstanding notifications are
obtained, that is, the possible diseases that have been contracted by said user and detected by
the system; 2) Given a user and a notification, it is verified that said user has attended the medical
review regarding a possible contagion. If the user gives positive referring to the contagious disease,
said user is added to the list of infected users (appropriately updating the data of the disease); 3) Given
a user and a notification, the notification of the system is eliminated. In addition, the user's status is
updated to "healthy" or "cured" as appropriate.
g. And the second API allows interacting with data on diseases and geographical areas from social
networks, newspapers and official websites. This API offers the following features: 1) Obtain the list
of active diseases together with the place where they are present and the number of times they have
been mentioned on twitter, newspapers and on the CDC website [30]; 2) Obtain the list of active
diseases in a place and/or on a specific date, as before with the respective information on the mentions
in the WWW; 3) Obtain the list of geographical locations and the weight of each point of the active
diseases. As well as the respective centers of the spotlights; 4) Get the list of geographic locations and
the weight of each point for a specific disease. As well as all the respective centers of the spotlights.
3.3. Analysis of data
In order to carry out an analysis of the data that are generated in social networks such as Twitter,
on the websites of official organizations such as the CDC [30] and in online newspapers, several programs
are used. Observe that these data are unstructured, so they need to be processed to retrieve the information
contained in them. The main function of the data obtained from the Web is to check the presence of diseases
in the different localities of the planet, and also measure the "concern" or "awareness" that the population
of a geographical location has about a disease.
First of all, there is a program that analyzes the health sections of "El Mundo", "Público" and "20
minutos". There is a program that runs once a day for each of them, analyzing the pages in search of news
that mention any of the currently active diseases in Spanish or English. If it is found anything, then it is
analyzed the text in search of geographical locations, language and feeling (positive, neutral or negative),
to be able to give a more appropriate value to the content and the "concern" that reflects, updating with it
7. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Generation of infectious disease alerts through the use of geolocation (Antonio Sarasa-Cabezuelo)
1539
the corresponding diseases and the geographical points in which they are located. There is also another
program that analyzes the alerts section of the CDC (Disease Control Center) page [30]. As with the news in
the previous section, it is executed on a daily basis and updates the database with the information collected
about diseases and their geographical disposition. To analyze the data produced in the social network Twitter,
two programs are used that are in continuous operation. The first one is pending the tweets produced by
official accounts, such as "sanidadgob" (corresponding to the Ministry of Health of the Spanish
Government), ECDC_Outbreaks, CDCespanol and CDCemergency
The second program analyzes in real time all the tweets produced that contain in their text any of
the currently active diseases, in Spanish or English. For both cases, the text is analyzed in search
of geographic locations, language and sentiment, and the database is updated with the corresponding diseases
and their geographical points. Once the tweets or news have been obtained, the processing is as follows:
− Get the language using the MonkeyLearn API.
− According to the language get the feeling using the MonkeyLearn API.
− Obtain the names of diseases mentioned in the news, according to the existing ones in the database.
− Get the names of locations mentioned in the news, using the MonkeyLearn API.
− Obtain all possible combinations of disease and location. If there were no location, all the locations
of that disease would be obtained in the database and it would be treated as generic news.
− If there is no entry in the MySQL database with this combination of disease and location, it is created;
if it exists, its update date is updated, the weight and the alert level are updated.
− If there is no entry in the MongoDB database with this combination of disease and location, it is
created. If there is no center within 500 meters of said location, one is added.
There is also another program that analyzes the alerts section of the CDC (Disease Control Center)
page. This program analyzes the entries, which always follow the same format: level, date, illness (possible
alternative name), place (possible specification). The text of each entry is analyzed in search of the previous
fields and once obtained, the database is consulted. In the case of not existing, an entry is created; if it exists,
the modification date is updated and a cdc is added to the entry.
The system requires two types of calculations:
a. Possible contagious people. Given an initial user who has been infected with a specific disease, we want
to analyze its particular characteristics in order to calculate the values of 3 variables that will determine
whether a person using the implemented system has been infected with a disease or not: exposure time,
distance to the epidemic focus and temporary moment of infection. All the variables are dependent on
the disease considered. In this sense, the first variable refers to the minimum time of exposure to
a specific disease so that a person could become infected. Regarding the second variable, it refers to
the minimum distance to the infection center so that a person could become infected. Finally, the third
variable refers to the time in days when a disease begins to be contagious. The combination of these 3
variables defines what is called a contagion window that represents the physical-temporal limits for
a person to be considered as infected. To calculate the infection window, the input data is: an initial
user, a time window to the past (which is the first day to be taken into account), a maximum distance
and a minimum exposure time. The algorithm traverses the user's points in the specified time window
and compares with other points in the same time window, with an error of + - 5 minutes (since that is
the time interval between sending locations if the user moves), and compares the position. If both points
are at a specified lower distance, all their points are compared. If the distance condition is also met at all
points in the specified exposure time, that user is added to the list of infected users.
b. Search of the origin of infection. Given a list of infected users, it is about finding the source
of infection. To do this, a triangulation is performed using the positions in which a user has been in
the past. From the positions the path that the user followed is reconstructed. From the paths of all users,
the intersections between the considered users are searched. To calculate the infection focus,
the algorithm obtains the paths of each infected user according to a list of geographical points
(locations) in which it has been in the past. Next, it generates all the possible combinations, that is,
it starts by combining users 2 to 2 until all the users of the list are considered. Once the combinations
are generated, possible crossings are looked for (intersection of the straight lines that form the road).
If an intersection is found, it is added to the list. The combinations are used because it is possible that
users have been infected in different sources, because what a search for a point in common to all roads
could give a false negative.
4. CONCLUSION
In recent years there have been several epidemics globally, which have shown that the time factor
is key. The quickly to have data about infections or focus of the epidemic, directly influences the extent
8. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 4, August 2020 : 1533 – 1541
1540
and effects of the epidemic. This paper presents a system that allows using an Android app to collect data
from sensors of the mobile phones, and also it is collected data of patients who visit medical centers with
a web application. Thus when an infection is detected, a set of processes analyze data collected from mobile
and patients. As result, it is generated alerts that are reported both users could be infected as those users that
are not. Likewise, the system allows to track infected patients and sources of infection, and do statistics on
the data collected. In addition to the data sources mentioned, the system also retrieves information from
official and unofficial sources such as Twitter or Facebook. As future work we want to add new sources
of information and the use of machine learning algorithms that can predict where an epidemic could occur
through the analysis of information.
REFERENCES
[1] S. Davis, “The different types of flu explained–seasonal influenza, swine flu and avian flu,” SA Pharmacist's
Assistant, vol. 19, no. 2, pp. 10-11, 2019.
[2] C. S. Wood, et al., “Taking connected mobile-health diagnostics of infectious diseases to the field,” Nature,
vol. 566, no. 7745, pp. 467-474, 2019.
[3] T. W.Burkholder, et al., “Adherence to Universal Travel Screening in the Emergency Department During Epidemic
Ebola Virus Disease,” The Journal of emergency medicine, vol. 56, no. 1, pp. 7-14, 2019.
[4] W. S.Chan, et al., “Use of social network sites for communication among health professionals: systematic review,”
Journal of medical Internet research, vol. 20, no. 3, pp. e117, 2018.
[5] G. Eysenbach, “Infodemiology and infoveillance: framework for an emerging set of public health informatics
methods to analyze search, communication and publication behavior on the Internet,” Journal of medical Internet
research, vol. 11, no. 1, pp. e11, 2009.
[6] Y. Zhang, et al., “Using Google Trends and ambient temperature to predict seasonal influenza outbreaks,”
Environment international, vol. 117, pp. 284-291, 2018.
[7] M. H. El Amrani, “E-Health or the Human 2.0!,” International Conference on Advanced Intelligent Systems for
Sustainable Development, pp. 146-153, 2018.
[8] H. A. C. K. Jayathilake, et al., “Use of free open source software technologies to enhance knowledge mobilization in
smallholder agricultural communities in Sri Lanka,” Tropical Agricultural Research, vol. 29, no. 2, pp. 147-156, 2018.
[9] A. K. Njeru, et al., “Contribution of social media platforms in conflict management: Case of Ushahidi Platform in
Kenya,” International Academic Journal of Information Sciences and Project Management, vol. 3 , no. 2,
pp. 364-377, 2018.
[10] R. Bernard, et al., “Intelligence and global health: assessing the role of open source and social media intelligence
analysis in infectious disease outbreaks,” Journal of Public Health, vol. 26, no. 5, pp. 509-514, 2018.
[11] L. Bengtsson, et al., “Improved response to disasters and outbreaks by tracking population movements with mobile
phone network data: a post-earthquake geospatial study in Haiti,” PLoS Med, vol. 8, no. 8, 2011.
[12] J. P. LoGerfo, et al., “Using Targeted mHealth Messages to Address Hypertension and Diabetes Self-Management in
Cambodia: Protocol for a Clustered Randomized Controlled Trial,” JMIR Research Protocols, vol. 8, no. 3, 2019.
[13] A. Signorini, et al., “The use of Twitter to track levels of disease activity and public concern in the US during
the influenza A H1N1 pandemic,” PloS one, vol. 6, no. 5, 2011.
[14] S. A. Hameed, et al., “Application of mobile cloud computing in emergency health care,” Bulletin of Electrical
Engineering and Informatics, vol. 8, no. 3, pp. 1088-1095, 2019.
[15] F. Bamashmoos, et al., “A review of air quality sensing technologies and their potential interfaces with IoT for asthma
management,” 11th PErvasive Technologies Related to Assistive Environments Conference, pp. 470-475, 2018.
[16] J. Ginsberg, et al., “Detecting influenza epidemics using search engine query data,” Nature, vol. 457, no. 7232,
pp. 1012-1014, 2009.
[17] T. Millard, et al., “The systematic development of a complex intervention: HealthMap, an online self-management
support program for people with HIV,” BMC infectious diseases, vol. 18, no. 1, pp. 1-10, 2018.
[18] C. C. Freifeld, et al., “HealthMap: global infectious disease monitoring through automated classification and
visualization of Internet media reports,” Journal of the American Medical Informatics Association, vol. 15, no. 2,
pp. 150-157, 2008.
[19] C. C. Freifeld, et al., “Participatory epidemiology: use of mobile phones for community-based health reporting,”
PLoS Med, vol. 7, no. 12, 2010.
[20] J. S. Brownstein, et al., “Information technology and global surveillance of cases of 2009 H1N1 influenza,” New
England Journal of Medicine, vol. 362, no. 18, pp. 1731-1735, 2010.
[21] S. M. Fast, et al., “Predicting social response to infectious disease outbreaks from internet-based news streams,”
Annals of Operations Research, vol. 263, no. 1-2, pp. 551-564, 2018.
[22] J. S. Brownstein, et al., “Surveillance Sans Frontieres: Internet-based emerging infectious disease intelligence and
the HealthMap project,” PLoS Med, vol. 5, no. 7, 2008.
[23] K. Baltrusaitis, et al., “Evaluation of approaches that adjust for biases in participatory surveillance systems,” Online
Journal of Public Health Informatics, vol. 10, no. 1, 2018.
[24] S. Bhatt, et al., “Mobile technology and cancer screening: Lessons from rural India,” Journal of global health, vol.
8, no. 2, 2018.
9. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Generation of infectious disease alerts through the use of geolocation (Antonio Sarasa-Cabezuelo)
1541
[25] N. A. Christakis, et al., “Social network sensors for early detection of contagious outbreaks,” PloS one, vol. 5,
no. 9, 2010.
[26] A. Ajofoyinbo, et al., “Health Monitoring and Control of Civil Infrastructures using Wireless Smart Sensors,”
Bulletin of Electrical Engineering and Informatics, vol. 3, no. 3, pp. 201-212, 2014.
[27] A. Signorini, et al., “The use of Twitter to track levels of disease activity and public concern in the US during the
influenza A H1N1 pandemic,” PloS one, vol. 6, no. 5, 2011.
[28] A. Ortigosa, et al., “Sentiment analysis in Facebook and its application to e-learning,” Computers in Human
Behavior, vol. 31, pp. 527-541, 2014.
[29] A. Sarasa-Cabezuelo, “The Role of NonSQL Databases in Big Data. Smart Data: State-of-the-Art Perspectives,”
Computing and Applications, vol. 93, 2019
[30] A. Groom, et al., “CDC Partnerships With Tribal Epidemiology Centers to Improve the Health of American Indian
and Alaska Native Communities,” Journal of Public Health Management and Practice, vol. 25, pp. S5-S6, 2019.
BIOGRAPHY OF AUTHOR
Antonio Sarasa Cabezuelo, has a MS. degree on Mathematics of Computer Sciences from
the Complutense Universtiy of Madrid, and CS PhD from the Complutense University
of Madrid. Currently, he is an associate professor in the Computer Science School at
Complutense University of Madrid, and a member of the research group ILSA (Implementation
of Language-Driven Software and Applications, http://ilsa.fdi.ucm.es).