Frontiers in Public Health,
Journal Year:
2024,
Volume and Issue:
12
Published: Feb. 13, 2024
The
coronavirus
disease
2019
(COVID-19)
has
caused
a
global
pandemic
that
wreaked
havoc
on
the
lives
of
millions
people
around
world.
Confinement
measures
aim
to
reduce
epidemic's
spread
and
minimize
burden
morbidity
mortality.
In
response
challenges
by
pandemic,
digital
health
passports
have
been
developed
exponentially.
We
highlight
latent
epidemiological
barriers
achieve
standardized
care
platforms.
This
review
paper
not
only
highlights
but
also
articulates
possible
infrastructure
required
make
International
Standard
for
multi-factor
authenticated
validated
passport.
IEEE Access,
Journal Year:
2022,
Volume and Issue:
10, P. 62613 - 62660
Published: Jan. 1, 2022
The
origin
of
the
COVID-19
pandemic
has
given
overture
to
redirection,
as
well
innovation
many
digital
technologies.
Even
after
progression
vaccination
efforts
across
globe,
total
eradication
this
is
still
a
distant
future
due
evolution
new
variants.
To
proactively
deal
with
pandemic,
health
care
service
providers
and
caretaker
organizations
require
technologies,
alongside
improvements
in
existing
related
Internet
Things
(IoT),
Artificial
Intelligence
(AI),
Machine
Learning
terms
infrastructure,
efficiency,
privacy,
security.
This
paper
provides
an
overview
current
theoretical
application
prospects
IoT,
AI,
cloud
computing,
edge
deep
learning
techniques,
blockchain
social
networks,
robots,
machines,
security
techniques.
In
consideration
these
intersection
we
reviewed
technologies
within
broad
umbrella
AI-IoT
most
concise
classification
scheme.
review,
illustrated
that
technological
applications
innovations
have
impacted
field
healthcare.
essential
found
for
healthcare
were
fog
computing
learning,
blockchain.
Furthermore,
highlighted
several
aspects
their
impact
novel
methodology
using
techniques
from
image
processing,
machine
differential
system
modeling.
Logistics,
Journal Year:
2022,
Volume and Issue:
6(3), P. 52 - 52
Published: July 21, 2022
Background:
The
main
goal
of
this
case
study
is
to
analyze
the
air
traffic,
cargo,
and
safety-hygiene
corridor
between
UK
Spain,
in
airports
managed
by
MAG
Group
(UK)
AENA
(Spain).
Methods:
To
review
specific
paradigm
research
which
discusses,
investigates,
analyses
Spain
at
Results:
traffic
that
airlines
project
onto
UK-Spain
has
decreased
due
pandemic,
but
result
shows
medium
term,
implement
new
Safety-Hygiene
Air
Corridor
(SHAC)
will
return
economically
nurture
airlines,
destination
thanks
vaccines,
digital
COVID-19
certificate
give
more
confidence
passengers
travel,
with
safety
regulations
airlines.
Furthermore,
results
show
need
create
Elements
(SHACE)
improve
activity
these
countries.
Conclusions:
contributes
towards
providing
solutions
such
as
those
we
propose
study,
SHAC
SHACE
guarantee
value
corridors
countries,
reduce
uncertainty
organizations,
passengers,
restore
tourism
aviation
industries.
Digital Threats Research and Practice,
Journal Year:
2022,
Volume and Issue:
4(1), P. 1 - 17
Published: April 22, 2022
COVID-19
vaccines
have
been
rolled
out
in
many
countries
and
with
them
a
number
of
vaccination
certificates.
For
instance,
the
EU
is
utilizing
digital
certificate
form
QR-code
that
digitally
signed
can
be
easily
validated
throughout
all
countries.
In
this
article,
we
document
current
state
market
darkweb
focus
on
Digital
Green
Certificate
(DGC)
.
We
investigate
17
marketplaces
10
vendor
shops
include
certificates
their
listings,
discover
multitude
sellers
both
types
platforms
are
advertising
forging
capabilities.
According
to
claims,
it
possible
buy
fake
issued
worldwide.
demonstrate
some
examples
such
sellers,
including
how
they
advertise
services,
develop
taxonomy
capabilities,
describing
potential
methods
vendors
generate
highlight
two
particular
cases
shops,
one
showing
an
elevated
degree
professionalism,
showcasing
forged
valid
certificates,
validity
which
verify
using
different
national
mobile
applications.
Computers & Security,
Journal Year:
2022,
Volume and Issue:
125, P. 103051 - 103051
Published: Dec. 5, 2022
Following
QUIC
protocol
ratification
on
May
2021,
the
third
major
version
of
Hypertext
Transfer
Protocol,
namely
HTTP/3,
was
published
around
one
year
later
in
RFC
9114.
In
light
these
consequential
advancements,
current
work
aspires
to
provide
a
full-blown
coverage
following
issues,
which
our
knowledge
have
received
feeble
or
no
attention
literature
so
far.
First,
we
complete
review
attacks
against
HTTP/2,
and
elaborate
if
way
they
can
be
migrated
HTTP/3.
Second,
through
creation
testbed
comprising
at
present
six
most
popular
HTTP/3-enabled
servers,
examine
effectiveness
quartet
attacks,
either
stemming
directly
from
HTTP/2
relevant
being
entirely
new.
This
scrutiny
led
assignment
least
CVE
ID
with
critical
base
score
by
MITRE.
No
less
important,
capitalizing
realistic,
abundant
devices
testbed,
compiled
voluminous,
labeled
corpus
containing
traces
ten
diverse
HTTP
services.
An
initial
evaluation
dataset
mainly
means
machine
learning
techniques
is
included
as
well.
Given
that
30
GB
made
available
both
pcap
CSV
formats,
forthcoming
research
easily
take
advantage
any
subset
features,
contingent
upon
specific
network
topology
configuration.
JMIR Formative Research,
Journal Year:
2024,
Volume and Issue:
8, P. e52185 - e52185
Published: May 3, 2024
Background
Surgical
scheduling
is
pivotal
in
managing
daily
surgical
sequences,
impacting
patient
experience
and
hospital
resources
significantly.
With
operating
rooms
costing
approximately
US
$36
per
minute,
efficient
vital.
However,
global
practices
vary,
largely
due
to
challenges
predicting
individual
surgeon
times
for
diverse
conditions.
Inspired
by
the
Toyota
Production
System’s
efficiency
addressing
similar
logistical
challenges,
we
applied
its
principles
as
detailed
book
“Lean
Thinking”
Womack
Jones,
which
identifies
processes
that
do
not
meet
customer
needs
wasteful.
This
insight
critical
health
care,
where
waste
can
compromise
safety
medical
quality.
Objective
study
aims
use
lean
thinking
methods
develop
a
more
system
better
aligns
with
user
without
additional
financial
burdens.
Methods
We
implemented
5
of
system:
specifying
value,
identifying
value
stream,
enabling
flow,
establishing
pull,
pursuing
perfection.
Value
was
defined
terms
meeting
customer’s
needs,
this
context
involved
developing
responsive
system.
Our
approach
included
2
subsystems:
one
handling
presurgery
data
another
intraoperative
postoperative
data.
identified
inefficiencies
subsystem
responded
creating
comprehensive
stream
map
process.
developed
Excel
(Microsoft
Corporation)
macros
using
Visual
Basic
Applications.
The
first
calculated
average
surgery
from
intra-
or
historic
data,
while
second
estimated
durations
generated
concise,
visually
engaging
reports
assessed
effectiveness
new
comparing
task
completion
satisfaction
between
old
systems.
Results
implementation
revised
significantly
reduced
overall
time
301
seconds
261
(P=.02),
significant
reductions
process
99
62
(P<.001).
Despite
these
improvements,
21%
nurses
preferred
older
familiarity.
protects
privacy
streamlines
schedule
dissemination
through
secure
LINE
group
(LY
Corp),
ensuring
seamless
flow.
design
allows
real-time
updates
has
been
effectively
monitoring
over
3
years.
“pull”
principle
demonstrated
when
an
unplanned
software
issue
prompted
immediate,
user-led
troubleshooting,
enhancing
reliability.
Continuous
improvement
efforts
are
ongoing,
except
preoperative
confirmation
step,
requires
further
enhancement
ensure
optimal
safety.
Conclusions
Lean
Toyota’s
methods,
combined
computer
programming,
revitalize
processes.
They
offer
effective
solutions
enable
creation
novel
incurring
costs.
Frontiers in Blockchain,
Journal Year:
2023,
Volume and Issue:
6
Published: March 13, 2023
During
the
COVID-19
pandemic,
it
was
necessary
to
validate
a
person’s
health
status
along
with
their
identity
permit
travel.
This
facilitated
via
paper-based
certificates
and
centralized
digital
apps.
Even
after
COVID-19,
is
anticipated
that
such
verifications
will
be
required
for
travel
other
purposes.
As
result,
there
needs
an
additional
credential,
“Health
Passport,”
establishes
whether
person
satisfies
requirements
various
Digital
credentials
so
prepared
should
trustable,
unforgeable,
verifiable.
The
Health
Passport
designed
protect
end-users’
privacy
give
people
control
over
data
they
use
confirm
credentials.
article
explores
generalized
system
uses
agent-oriented
modeling
(AOM)
design
blockchain-based
self-sovereign
(SSI)
integrated
Personal
Record
(PHR)
address
this
requirement.
demonstrates
feasibility
of
solution
by
implementing
proof
concept
on
Hyperledger
Indy
Aries,
PHR
–
MediTrans.
Credential
issuance
verification
time
were
calculated,
observed
overhead
minimal.
allows
users
verify
verifier
without
revealing
any
significant
personal
information.
Our
can
into
as
SSI
added
plugin
accessible
mobile/web
app.
Threat
Modeling
is
a
structured
process
to
identify
critical
assets
in
an
organization
and
the
threats
posed
by
adversarial
agents.
The
goal
of
applying
such
achieve
shared
understanding
inherent
risks
potential
counter-measures
that
can
be
put
place.
In
practice,
threat
modeling
collaborative
combining
stakeholders'
perceptions
holistic
view
landscape.
However,
this
paper
points
out
related
work
mainly
focuses
on
adapting
models
technical
aspects
architectural
decisions.
Thus,
non-technical
stakeholders
are
not
included
process.This
proposes
CoReTM,
novel
overarching
approach
well-established
methodologies
setting.
resulting
allows
organizations
extend
automated
way
while
supporting
on-site,
remote,
or
hybrid
operations
synchronous
asynchronous
fashion.
Software Practice and Experience,
Journal Year:
2022,
Volume and Issue:
52(10), P. 2263 - 2287
Published: July 22, 2022
COVID-19
pandemic
undoubtedly
lingers
on
and
has
brought
unprecedented
changes
globally
including
travel
arrangements.
Blockchain-based
solutions
have
been
proposed
to
aid
amid
the
hap.
Presently,
extant
are
country
or
regional-based,
downplay
privacy,
non-responsive,
often
impractical,
come
with
blockchain-related
complexities
presenting
technological
hurdle
for
travelers.
We
therefore
propose
a
solution
namely,
Borderless
foster
global
allowing
travelers
countries
collaboratively
engage
in
secure
adaptive
proof
protocol
dubbed
Proof-of-COVID-19
status
number
of
arbitrary
statements
ascertain
fact
that
traveler
poses
no
danger
irrespective
located.
As
far
as
we
know,
this
is
first
its
kind.
implemented
decentralized
application
leveraging
blockchain
trust
anchor
storage
technology.
Security
analysis
evaluation
performed
proving
security,
privacy-preservation,
cost-effectiveness
along
implementation
envisioning
it
blueprint
facilitate
cross-border
during
present
future
pandemics.
Our
experimental
results
show
takes
less
than
60
3
s
onboard
users
perform
verification
respectively
attesting
real
usability
scenarios
traits
proofs
responsiveness
dynamics
pandemics
abstraction
from
In
recent
years,
we
have
seen
the
outbreak
of
COVID,
and
vaccination
has
proved
to
be
quite
effective
in
this
case.
Vaccination
a
large
population
country
like
India
is
big
hurdle.
People
wait
for
hours
get
slot
vaccination.
However,
most
humans
still
need
help
getting
because
information
about
place
opening
time
unavailable.
We
proposed
tracker
model
problem,
which
provides
instant
communication
users
location,
makes
registering
very
easy.
The
based
on
object-oriented,
database,
networking
techniques
that
use
fuzzy
logic
availability
slots
using
three
input
parameters:
age,
vaccine
slot,
status.
web-based
application
clients
can
access
with
server.
registered
are
given
priority
their
possibilities,
calculated
technique.
According
preference,
low,
medium,
high,
or
user
informed
how
many
available
booked
they
gave
when
signed
up.
After
successfully
vaccinating
first
dose,
countdown
started
following
amount.
simulation
results
show
effectiveness
model.