63 results match your criteria: "Security Research Institute[Affiliation]"

The operational management of healthcare services is expected to directly touch patient experiences. Iranian Ministry of Health and Medical Education (MoHME) for the first time, as such, has sought to improve the operational management of healthcare delivery within a reform agenda by setting benchmarks for 'number of visit per hour' and waiting time in outpatient clinics of about 700 affiliated hospitals. As a new initiative, it has faced with mixed reactions and various doubts have been cast on its successful implementation.

View Article and Find Full Text PDF

We propose a controlled quantum teleportation scheme to teleport an unknown state based on the interactions between flying photons and quantum dots (QDs) confined within single- and double-sided cavities. In our scheme, users (Alice and Bob) can teleport the unknown state through a secure entanglement channel under the control and distribution of an arbitrator (Trent). For construction of the entanglement channel, Trent utilizes the interactions between two photons and the QD-cavity system, which consists of a charged QD (negatively charged exciton) inside a single-sided cavity.

View Article and Find Full Text PDF

Introduction: Informal patients' payments (IPPs) is a sensitive subject. The aim of current study was to assess the trends in informal payment studies and explore methods of IPPs measurement, prevalence, and features (payment type, volume, and receiver) in various contexts.

Methods: A search strategy was developed to identify peer-reviewed articles addressing informal payments on PubMed, Science Direct, Web of Science, Scopus, and CINAHL.

View Article and Find Full Text PDF

We design schemes to generate and distribute hybrid entanglement and hyperentanglement correlated with degrees of freedom (polarization and time-bin) via weak cross-Kerr nonlinearities (XKNLs) and linear optical devices (including time-bin encoders). In our scheme, the multi-photon gates (which consist of XKNLs, quantum bus [qubus] beams, and photon-number-resolving [PNR] measurement) with time-bin encoders can generate hyperentanglement or hybrid entanglement. And we can also purify the entangled state (polarization) of two photons using only linear optical devices and time-bin encoders under a noisy (bit-flip) channel.

View Article and Find Full Text PDF

We present two-photon interference experiments with polarization-entangled photon pairs in a polarization-based Franson-type interferometer. Although the two photons do not meet at a common beamsplitter, a phase-insensitive Hong-Ou-Mandel type two-photon interference peak and dip fringes are observed, resulting from the two-photon interference effect between two indistinguishable two-photon probability amplitudes leading to a coincidence detection. A spatial quantum beating fringe is also measured for nondegenerate photon pairs in the same interferometer, although the two-photon states have no frequency entanglement.

View Article and Find Full Text PDF

The chemical composition of fulvic acid (FA) with a molecular weight below 500 (FA-500) was analyzed, and its activity on promoting the seed germination of wheat was studied in this paper. The FA-500 was obtained by membrane separation technology and qualitatively and quantitatively analyzed by using gas chromatography-mass spectrometry combined with the retention index. Forty-seven constituents were identified, including structures with ester, acid and alcohol groups, which accounted for 95% of the total composition.

View Article and Find Full Text PDF

Security Attacks and Solutions in Electronic Health (E-health) Systems.

J Med Syst

December 2016

School of Science and Security Research Institute, Edith Cowan University, Perth, 6027, Australia.

For centuries, healthcare has been a basic service provided by many governments to their citizens. Over the past few decades, we have witnessed a significant transformation in the quality of healthcare services provided by healthcare organizations and professionals. Recent advances have led to the emergence of Electronic Health (E-health), largely made possible by the massive deployment and adoption of information and communication technologies (ICTs).

View Article and Find Full Text PDF

myBlackBox: Blackbox Mobile Cloud Systems for Personalized Unusual Event Detection.

Sensors (Basel)

May 2016

Department of Computer Science, University of Colorado, Boulder, CO 80309, USA.

We demonstrate the feasibility of constructing a novel and practical real-world mobile cloud system, called myBlackBox, that efficiently fuses multimodal smartphone sensor data to identify and log unusual personal events in mobile users' daily lives. The system incorporates a hybrid architectural design that combines unsupervised classification of audio, accelerometer and location data with supervised joint fusion classification to achieve high accuracy, customization, convenience and scalability. We show the feasibility of myBlackBox by implementing and evaluating this end-to-end system that combines Android smartphones with cloud servers, deployed for 15 users over a one-month period.

View Article and Find Full Text PDF

Although solar radiation management (SRM) might play a role as an emergency geoengineering measure, its potential risks remain uncertain, and hence there are ethical and governance issues in the face of SRM's actual deployment. By using an integrated assessment model, we first present one possible methodology for evaluating the value arising from retaining an SRM option given the uncertainty of climate sensitivity, and also examine sensitivities of the option value to SRM's side effects (damages). Reflecting the governance challenges on immediate SRM deployment, we assume scenarios in which SRM could only be deployed with a limited degree of cooling (0.

View Article and Find Full Text PDF

Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem.

Med Devices (Auckl)

August 2015

eHealth Research Group and Security Research Institute, Edith Cowan University, Perth, WA, Australia.

The increased connectivity to existing computer networks has exposed medical devices to cybersecurity vulnerabilities from which they were previously shielded. For the prevention of cybersecurity incidents, it is important to recognize the complexity of the operational environment as well as to catalog the technical vulnerabilities. Cybersecurity protection is not just a technical issue; it is a richer and more intricate problem to solve.

View Article and Find Full Text PDF

A population-based influenza surveillance study (using PCR virus subtyping) on Izu-Oshima Island, Japan, found that the cumulative incidence of influenza A(H1N1)pdm09 virus infections 2 seasons after the pandemic was highest for those 10-14 years of age (43.1%). No postpandemic A(H1N1)pdm09 case-patients had been infected with A(H1N1)pdm09 virus during the pandemic season.

View Article and Find Full Text PDF

This paper presents and discusses data on the readmissions experience of a community-based psychiatric treatment facility. Nearly one-half of all patients experienced readmission within four years. Further, the admission, treatment, and discharge of a cohort of admissions represents roughly onehalf of the treatmenteffort which will be absorbed by that cohort within four years.

View Article and Find Full Text PDF