Knowledge as the Engine: Transforming Healthcare Delivery Through Information and Communications Technology Applying a Sustainable Development Framework
Sustainable Development,
Год журнала:
2025,
Номер
unknown
Опубликована: Апрель 7, 2025
ABSTRACT
The
future
of
health
in
Ghana
is
indeed
a
complex
and
multifaceted
landscape
characterized
by
both
challenges
promising
opportunities.
Such
opportunities
lie
adopting
technology,
which
can
revolutionize
healthcare
knowledge
management
elevate
quality
Ghana.
As
such,
this
study
tested
the
prognosis
using
lens
technology
acceptance
model
(TAM)
to
investigate
information
communications
(ICT)
assimilation
activities
(KA)
improve
delivery
Community‐based
Health
Planning
Services
(CHPS)
zones
TAM
framework
offers
strong
theoretical
basis
for
evaluating
professionals'
use
ICT
providing
services.
A
pooled
dataset
657
sector
respondents
was
employed
test
hypothesis
Partial
Least
Squares
Structural
Equation
Modeling
(PLS‐SEM)
technique.
It
found
that
adoption
KA
significantly
helps
facilities
Moreover,
relationship
best
mediated
through
policies
(HP)
KA.
results
further
demonstrate
effective
CHPS
contributes
HP
monitoring.
concluded
advent
has
reformed
collaboration
among
diverse
teams
sector,
fostering
seamless
exchange
expertise.
This
interactive
platform,
accessible
at
fraction
cost
traditional
methods,
empowers
providers
work
together
effectively,
enhancing
efficiency
patient
care.
Язык: Английский
Agentic AI in Personalized Medicine and Treatment
Advances in computational intelligence and robotics book series,
Год журнала:
2025,
Номер
unknown, С. 85 - 100
Опубликована: Май 9, 2025
Personalized
medicine
is
revolutionizing
healthcare
by
shifting
from
a
one-size-fits-all
approach
to
individualized
treatments
tailored
genetic,
phenotypic,
environmental,
and
lifestyle
factors.
It
addresses
biologically
complex
diseases,
interindividual
drug
response
variations,
patient-specific
needs,
driven
integrated
diagnostics
patient
empowerment.
This
patient-centric
model
enhances
informed
decision-making,
behavior
change,
outcomes
measurement,
aligning
treatment
strategies
with
individual
preferences.
Leading
journals
global
agencies
recognize
its
potential
transform
disease
prevention,
diagnosis,
treatment,
offering
improved
societal
benefits.
ensures
more
patients
receive
effective
therapies,
minimizing
ineffective
enhancing
overall
impact.
As
pivots
toward
precision,
personalized
promises
transformative
future
in
achieving
equitable,
effective,
innovative
care.
Язык: Английский
Artificial neural network analysis of temperature-dependent properties of second-grade nanofluid flow over an exponentially curved Riga surface
Modern Physics Letters B,
Год журнала:
2025,
Номер
unknown
Опубликована: Май 31, 2025
We
investigated
the
flow
of
chemically
reactive
non-Newtonian
nanofluid
over
an
exponentially
stretching
curved
Riga
sheet,
addressing
its
significance
in
advanced
heat
and
mass
transfer
processes
relevant
to
engineering
industrial
applications.
The
aim
is
explore
effects
involving
factors
on
velocity,
temperature,
concentration
profiles,
as
well
associated
physical
quantities
such
skin
friction,
Nusselt
number,
Sherwood
number.
research
employs
a
hybrid
methodology
combining
boundary
layer
approximation,
dimensional
transformation
governing
PDEs
into
ODEs,
numerical
solutions,
Artificial
Neural
Networks
(ANNs)
for
enhanced
prediction
analysis.
results
expose
that
key
parameters
significantly
impact
characteristics,
with
ANN
providing
accurate
predictions
validate
outcomes.
comprehensive
approach
emphasizes
potential
complementing
methods
scrutinizing
complex
fluid
dynamic
systems.
A
higher
thermophoresis
parameter
increased
thermal
resistance,
which
restricted
raised
local
temperature.
velocity
profile
near
surface
due
enhancing
elastic
forces
motion.
Symmetric
error
distributions
low
mean
errors
demonstrate
strong
accuracy
while
outliers
present
challenges
scenarios.
Язык: Английский
Design and Implementation of Lightweight Certificateless Secure Communication Scheme on Industrial NFV-Based IPv6 Virtual Networks
Electronics,
Год журнала:
2024,
Номер
13(13), С. 2649 - 2649
Опубликована: Июль 5, 2024
With
the
fast
growth
of
Industrial
Internet
Everything
(IIoE),
computing
and
telecommunication
industries
all
over
world
are
moving
rapidly
towards
IPv6
address
architecture,
which
supports
virtualization
architectures
such
as
Network
Function
Virtualization
(NFV).
NFV
provides
networking
services
like
routing,
security,
storage,
etc.,
through
software-based
virtual
machines.
As
a
result,
reduces
equipment
costs.
Due
to
increase
in
applications
on
Things
(IoT)-based
networks,
security
threats
have
also
increased.
The
communication
links
between
people
or
from
one
machine
another
insecure.
Usually,
critical
data
exchanged
IoE,
so
authentication
confidentiality
significant
concerns.
Asymmetric
key
cryptosystems
computation
overheads.
This
paper
proposes
lightweight
certificateless
end-to-end
secure
scheme
provide
against
replay
attacks,
man-in-the-middle
(MITM)
impersonation
attacks
with
low
system
is
implemented
Linux-based
Lubuntu
20.04
machines
using
Java
programming
connected
NFV-based
large-scale
hybrid
IPv4-IPv6
networks.
Finally,
we
compare
performance
our
proposed
existing
schemes
based
In
addition,
measure
analyze
virtualized
networks
regard
several
parameters
delay
packet
loss.
results
comparison
show
that
cost
by
38.87%
26.08%.
Язык: Английский
Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM Attacks
Cryptography,
Год журнала:
2024,
Номер
8(4), С. 49 - 49
Опубликована: Окт. 28, 2024
After
the
end
of
IPv4
addresses,
Internet
is
moving
towards
IPv6
address
architecture
quickly
with
support
virtualization
techniques
worldwide.
and
protocols
will
co-exist
long
during
changeover
process.
Some
attacks,
such
as
MITM
do
not
discriminate
by
appearance
affect
architectures.
In
an
attack,
attacker
secretly
captures
data,
masquerades
original
sender,
sends
it
toward
receiver.
The
receiver
replies
to
because
does
authenticate
source.
Therefore,
authentication
between
two
parties
compromised
due
attack.
existing
schemes
adopt
complicated
mathematical
procedures.
increase
computation
communication
costs.
This
paper
proposes
a
lightweight
authentic
end-to-end
model
detect
attacks
using
pre-shared
symmetric
key.
addition,
we
implement
analyze
performance
our
proposed
security
on
Linux-based
virtual
machines
connected
large-scale
hybrid
IPv4-IPv6
networks.
Moreover,
analyses
prove
effectiveness
model.
Finally,
compare
models
in
terms
cost
overhead.
Язык: Английский