Epidemiological contemplation for a currently pragmatic COVID-19 health passport: a perspective DOI Creative Commons
Radha Ambalavanan, R Sterling Snead, Julia Marczika

et al.

Frontiers in Public Health, Journal Year: 2024, Volume and Issue: 12

Published: Feb. 13, 2024

The coronavirus disease 2019 (COVID-19) has caused a global pandemic that wreaked havoc on the lives of millions people around world. Confinement measures aim to reduce epidemic's spread and minimize burden morbidity mortality. In response challenges by pandemic, digital health passports have been developed exponentially. We highlight latent epidemiological barriers achieve standardized care platforms. This review paper not only highlights but also articulates possible infrastructure required make International Standard for multi-factor authenticated validated passport.

Language: Английский

Artificial Intelligence and Internet of Things (AI-IoT) Technologies in Response to COVID-19 Pandemic: A Systematic Review DOI Creative Commons
Junaid Iqbal Khan, Jebran Khan,

Furqan Ali

et al.

IEEE Access, Journal Year: 2022, Volume and Issue: 10, P. 62613 - 62660

Published: Jan. 1, 2022

The origin of the COVID-19 pandemic has given overture to redirection, as well innovation many digital technologies. Even after progression vaccination efforts across globe, total eradication this is still a distant future due evolution new variants. To proactively deal with pandemic, health care service providers and caretaker organizations require technologies, alongside improvements in existing related Internet Things (IoT), Artificial Intelligence (AI), Machine Learning terms infrastructure, efficiency, privacy, security. This paper provides an overview current theoretical application prospects IoT, AI, cloud computing, edge deep learning techniques, blockchain social networks, robots, machines, security techniques. In consideration these intersection we reviewed technologies within broad umbrella AI-IoT most concise classification scheme. review, illustrated that technological applications innovations have impacted field healthcare. essential found for healthcare were fog computing learning, blockchain. Furthermore, highlighted several aspects their impact novel methodology using techniques from image processing, machine differential system modeling.

Language: Английский

Citations

63

The Safety-Hygiene Air Corridor between UK and Spain Will Coexist with COVID-19 DOI Creative Commons
Lázaro Florido-Benítez

Logistics, Journal Year: 2022, Volume and Issue: 6(3), P. 52 - 52

Published: July 21, 2022

Background: The main goal of this case study is to analyze the air traffic, cargo, and safety-hygiene corridor between UK Spain, in airports managed by MAG Group (UK) AENA (Spain). Methods: To review specific paradigm research which discusses, investigates, analyses Spain at Results: traffic that airlines project onto UK-Spain has decreased due pandemic, but result shows medium term, implement new Safety-Hygiene Air Corridor (SHAC) will return economically nurture airlines, destination thanks vaccines, digital COVID-19 certificate give more confidence passengers travel, with safety regulations airlines. Furthermore, results show need create Elements (SHACE) improve activity these countries. Conclusions: contributes towards providing solutions such as those we propose study, SHAC SHACE guarantee value corridors countries, reduce uncertainty organizations, passengers, restore tourism aviation industries.

Language: Английский

Citations

16

COVID-19 Vaccination Certificates in the Darkweb DOI Open Access
Dimitrios Georgoulias, Jens Myrup Pedersen, Morten Falch

et al.

Digital Threats Research and Practice, Journal Year: 2022, Volume and Issue: 4(1), P. 1 - 17

Published: April 22, 2022

COVID-19 vaccines have been rolled out in many countries and with them a number of vaccination certificates. For instance, the EU is utilizing digital certificate form QR-code that digitally signed can be easily validated throughout all countries. In this article, we document current state market darkweb focus on Digital Green Certificate (DGC) . We investigate 17 marketplaces 10 vendor shops include certificates their listings, discover multitude sellers both types platforms are advertising forging capabilities. According to claims, it possible buy fake issued worldwide. demonstrate some examples such sellers, including how they advertise services, develop taxonomy capabilities, describing potential methods vendors generate highlight two particular cases shops, one showing an elevated degree professionalism, showcasing forged valid certificates, validity which verify using different national mobile applications.

Language: Английский

Citations

15

Can VUCA events catalyze digital public sector innovations? Evidence from three digital innovation trends in Asia DOI Creative Commons
Aarthi Raghavan, Mehmet Akif Demircioğlu, Serik Orazgaliyev

et al.

Journal of Open Innovation Technology Market and Complexity, Journal Year: 2025, Volume and Issue: unknown, P. 100529 - 100529

Published: April 1, 2025

Language: Английский

Citations

0

A hands-on gaze on HTTP/3 security through the lens of HTTP/2 and a public dataset DOI Creative Commons
Efstratios Chatzoglou, Vasileios Kouliaridis, Georgios Kambourakis

et al.

Computers & Security, Journal Year: 2022, Volume and Issue: 125, P. 103051 - 103051

Published: Dec. 5, 2022

Following QUIC protocol ratification on May 2021, the third major version of Hypertext Transfer Protocol, namely HTTP/3, was published around one year later in RFC 9114. In light these consequential advancements, current work aspires to provide a full-blown coverage following issues, which our knowledge have received feeble or no attention literature so far. First, we complete review attacks against HTTP/2, and elaborate if way they can be migrated HTTP/3. Second, through creation testbed comprising at present six most popular HTTP/3-enabled servers, examine effectiveness quartet attacks, either stemming directly from HTTP/2 relevant being entirely new. This scrutiny led assignment least CVE ID with critical base score by MITRE. No less important, capitalizing realistic, abundant devices testbed, compiled voluminous, labeled corpus containing traces ten diverse HTTP services. An initial evaluation dataset mainly means machine learning techniques is included as well. Given that 30 GB made available both pcap CSV formats, forthcoming research easily take advantage any subset features, contingent upon specific network topology configuration.

Language: Английский

Citations

14

Developing a Cost-Effective Surgical Scheduling System for Improved Data Utilization in Hospitals: Application of Lean Thinking and Toyota’s Methods to Surgery-Related Big Data (Preprint) DOI Creative Commons
Chien‐Chung Lin, Jian-Hong Shen, Shu-Fang Chen

et al.

JMIR Formative Research, Journal Year: 2024, Volume and Issue: 8, P. e52185 - e52185

Published: May 3, 2024

Background Surgical scheduling is pivotal in managing daily surgical sequences, impacting patient experience and hospital resources significantly. With operating rooms costing approximately US $36 per minute, efficient vital. However, global practices vary, largely due to challenges predicting individual surgeon times for diverse conditions. Inspired by the Toyota Production System’s efficiency addressing similar logistical challenges, we applied its principles as detailed book “Lean Thinking” Womack Jones, which identifies processes that do not meet customer needs wasteful. This insight critical health care, where waste can compromise safety medical quality. Objective study aims use lean thinking methods develop a more system better aligns with user without additional financial burdens. Methods We implemented 5 of system: specifying value, identifying value stream, enabling flow, establishing pull, pursuing perfection. Value was defined terms meeting customer’s needs, this context involved developing responsive system. Our approach included 2 subsystems: one handling presurgery data another intraoperative postoperative data. identified inefficiencies subsystem responded creating comprehensive stream map process. developed Excel (Microsoft Corporation) macros using Visual Basic Applications. The first calculated average surgery from intra- or historic data, while second estimated durations generated concise, visually engaging reports assessed effectiveness new comparing task completion satisfaction between old systems. Results implementation revised significantly reduced overall time 301 seconds 261 (P=.02), significant reductions process 99 62 (P<.001). Despite these improvements, 21% nurses preferred older familiarity. protects privacy streamlines schedule dissemination through secure LINE group (LY Corp), ensuring seamless flow. design allows real-time updates has been effectively monitoring over 3 years. “pull” principle demonstrated when an unplanned software issue prompted immediate, user-led troubleshooting, enhancing reliability. Continuous improvement efforts are ongoing, except preoperative confirmation step, requires further enhancement ensure optimal safety. Conclusions Lean Toyota’s methods, combined computer programming, revitalize processes. They offer effective solutions enable creation novel incurring costs.

Language: Английский

Citations

3

Health Passport: A blockchain-based PHR-integrated self-sovereign identity system DOI Creative Commons
Merlin George, Anu Mary Chacko

Frontiers in Blockchain, Journal Year: 2023, Volume and Issue: 6

Published: March 13, 2023

During the COVID-19 pandemic, it was necessary to validate a person’s health status along with their identity permit travel. This facilitated via paper-based certificates and centralized digital apps. Even after COVID-19, is anticipated that such verifications will be required for travel other purposes. As result, there needs an additional credential, “Health Passport,” establishes whether person satisfies requirements various Digital credentials so prepared should trustable, unforgeable, verifiable. The Health Passport designed protect end-users’ privacy give people control over data they use confirm credentials. article explores generalized system uses agent-oriented modeling (AOM) design blockchain-based self-sovereign (SSI) integrated Personal Record (PHR) address this requirement. demonstrates feasibility of solution by implementing proof concept on Hyperledger Indy Aries, PHR – MediTrans. Credential issuance verification time were calculated, observed overhead minimal. allows users verify verifier without revealing any significant personal information. Our can into as SSI added plugin accessible mobile/web app.

Language: Английский

Citations

6

CoReTM: An Approach Enabling Cross-Functional Collaborative Threat Modeling DOI
Jan von der Assen, Muriel Figueredo Franco, Christian Killer

et al.

Published: July 27, 2022

Threat Modeling is a structured process to identify critical assets in an organization and the threats posed by adversarial agents. The goal of applying such achieve shared understanding inherent risks potential counter-measures that can be put place. In practice, threat modeling collaborative combining stakeholders' perceptions holistic view landscape. However, this paper points out related work mainly focuses on adapting models technical aspects architectural decisions. Thus, non-technical stakeholders are not included process.This proposes CoReTM, novel overarching approach well-established methodologies setting. resulting allows organizations extend automated way while supporting on-site, remote, or hybrid operations synchronous asynchronous fashion.

Language: Английский

Citations

9

COVID‐19 and future pandemics: A blockchain‐based privacy‐aware secure borderless travel solution from electronic health records DOI
Justice Odoom,

Xiaofang Huang,

Samuel Akwasi Danso

et al.

Software Practice and Experience, Journal Year: 2022, Volume and Issue: 52(10), P. 2263 - 2287

Published: July 22, 2022

COVID-19 pandemic undoubtedly lingers on and has brought unprecedented changes globally including travel arrangements. Blockchain-based solutions have been proposed to aid amid the hap. Presently, extant are country or regional-based, downplay privacy, non-responsive, often impractical, come with blockchain-related complexities presenting technological hurdle for travelers. We therefore propose a solution namely, Borderless foster global allowing travelers countries collaboratively engage in secure adaptive proof protocol dubbed Proof-of-COVID-19 status number of arbitrary statements ascertain fact that traveler poses no danger irrespective located. As far as we know, this is first its kind. implemented decentralized application leveraging blockchain trust anchor storage technology. Security analysis evaluation performed proving security, privacy-preservation, cost-effectiveness along implementation envisioning it blueprint facilitate cross-border during present future pandemics. Our experimental results show takes less than 60 3 s onboard users perform verification respectively attesting real usability scenarios traits proofs responsiveness dynamics pandemics abstraction from

Language: Английский

Citations

7

A Vaccine Slot Tracker Model Using Fuzzy Logic for Providing Quality of Service DOI
Mohammad Faiz, Nausheen Fatima, Ramandeep Kaur Sandhu

et al.

Published: Oct. 16, 2023

In recent years, we have seen the outbreak of COVID, and vaccination has proved to be quite effective in this case. Vaccination a large population country like India is big hurdle. People wait for hours get slot vaccination. However, most humans still need help getting because information about place opening time unavailable. We proposed tracker model problem, which provides instant communication users location, makes registering very easy. The based on object-oriented, database, networking techniques that use fuzzy logic availability slots using three input parameters: age, vaccine slot, status. web-based application clients can access with server. registered are given priority their possibilities, calculated technique. According preference, low, medium, high, or user informed how many available booked they gave when signed up. After successfully vaccinating first dose, countdown started following amount. simulation results show effectiveness model.

Language: Английский

Citations

4