ScienceOpen PostersPub Date : 2020-11-25DOI: 10.14293/s2199-1006.1.sor-.ppzfbui.v1
Kummari Gurudev
{"title":"Healthcare security monitoring schemes for detection of node replication attack in wireless sensor networks","authors":"Kummari Gurudev","doi":"10.14293/s2199-1006.1.sor-.ppzfbui.v1","DOIUrl":"https://doi.org/10.14293/s2199-1006.1.sor-.ppzfbui.v1","url":null,"abstract":"Due to the increased growth of elderly people in recent years, healthcare systems face many challenges on the money spent for those people. Both quality and affordability has to be provided by the new technology which is the todays need. When applying WSN technologies, the advantages such as continuous monitoring with alert mechanisms and relative information are to be satisfied. Among the other challenges, due to the deployed environment, security is a key challenge. As gateway connects to the wireless networks, it is the target area for many adversaries to launch various attacks. Initially, attacker launches node compromise attack which leads to node replication attack.","PeriodicalId":21568,"journal":{"name":"ScienceOpen Posters","volume":"140 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86663912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ScienceOpen PostersPub Date : 2020-11-24DOI: 10.14293/s2199-1006.1.sor-.ppfh7mz.v1
J. Lazarus
{"title":"Security of Medical Images in Health Information","authors":"J. Lazarus","doi":"10.14293/s2199-1006.1.sor-.ppfh7mz.v1","DOIUrl":"https://doi.org/10.14293/s2199-1006.1.sor-.ppfh7mz.v1","url":null,"abstract":"Cryptrography for Security of Medical Images in Health Information","PeriodicalId":21568,"journal":{"name":"ScienceOpen Posters","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87941328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ScienceOpen PostersPub Date : 2020-11-23DOI: 10.14293/s2199-1006.1.sor-.ppkmchm.v1
B. Pearcy, Parma Barbaro, Nathan Adey, Lee-Ann Bamess, S. Curtis, Sally Coombs, Vincent O. Mancini, P. Rao
{"title":"Efficacy of parent information sessions for understanding Attention-deficit/Hyperactivity disorder children","authors":"B. Pearcy, Parma Barbaro, Nathan Adey, Lee-Ann Bamess, S. Curtis, Sally Coombs, Vincent O. Mancini, P. Rao","doi":"10.14293/s2199-1006.1.sor-.ppkmchm.v1","DOIUrl":"https://doi.org/10.14293/s2199-1006.1.sor-.ppkmchm.v1","url":null,"abstract":"Background: The Complex Attention-deficit Hyperactivity Disorders Service (CAHDS) conduct caregiver information sessions across a number of different topics throughout each year. The aim of these workshops is to help caregivers better understand and relate to their child with attention-deficit hyperactivity disorder (ADHD). The four workshops cover different topics related to ADHD, and are facilitated by related disciplines. The topics covered include; understanding your childs behaviour, family self-care and stress management, Social connectedness and communication, sensory processing and ADHD. Objective: To assess the efficacy of the caregiver information workshops on caregiver belief in their understanding, use of strategies, and resources, to help their child with ADHD. Method: Caregivers who had children with or previously with the CAHDS service were invited to attend workshops held throughout the year. Caregivers complete a feedback survey before and after the session, and the results were compared. Data was collected from 2016 to 2019. Results: For each of the workshop topics, caregivers reported a weak to moderate improvement in their understanding, strategies, and resources for helping their children with ADHD. Significance and sampling issues are discussed. Conclusions : Information sessions for caregivers present as an efficacious treatment approach in the understanding and support of children with ADHD.","PeriodicalId":21568,"journal":{"name":"ScienceOpen Posters","volume":"121 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88259120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ScienceOpen PostersPub Date : 2020-11-23DOI: 10.14293/s2199-1006.1.sor-.ppxwjsk.v1
Vincent O. Mancini, B. Pearcy, P. Rao, H. Fraser
{"title":"Development and Validation of a Screening Instrument for Sleep Difficulties in Children with ADHD","authors":"Vincent O. Mancini, B. Pearcy, P. Rao, H. Fraser","doi":"10.14293/s2199-1006.1.sor-.ppxwjsk.v1","DOIUrl":"https://doi.org/10.14293/s2199-1006.1.sor-.ppxwjsk.v1","url":null,"abstract":"Background and Aim: ADHD is the most common childhood neurodevelopmental disorder. ADHD symptoms can lead to impairments in other areas of functioning approximately 75% of children with ADHD also experience difficulties with sleep. Childhood sleep difficulties intensify ADHD symptom severity and cause additional impairments. There is growing support for routine assessment of sleep as part of standard ADHD management. However, assessment of sleep difficulties remains poorly addressed as they fail to account for the unique expression of sleep difficulties present in children with ADHD.\u0000 Our recently submitted systematic review identified the lack of appropriate tools to screen children with ADHD for sleep difficulties. Research Method: This multi-phase research will address this gap in current knowledge by undertaking a comprehensive project that will develop, trial, and evaluate a fit-for-purpose screening assessment of sleep difficulties in children with ADHD. This project will: (i) \u0000 develop a purpose-built screening instrument with the aid of consumer and clinician engagement, (ii) \u0000 validate this this new measure for the assessment of sleep in children with ADHD, and (iii) \u0000 evaluate an information intervention of sleep problems for children with ADHD with the new measure. Anticipated Results: A screening instrument will be developed through collaboration with sleep experts and parents of children with ADHD which will then be piloted and validated using best practice methods. Implications: It is anticipated that this research will help to provide clinicians with greater accuracy in identifying sleep difficulties in children with ADHD and therefore enabling opportunities for early intervention and improved treatment outcomes.","PeriodicalId":21568,"journal":{"name":"ScienceOpen Posters","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89603977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ScienceOpen PostersPub Date : 2020-11-22DOI: 10.14293/s2199-1006.1.sor-.ppv1nf8.v1
Anushka Xavier K
{"title":"CRYPTOGRAPHY USED IN WHATSAPP","authors":"Anushka Xavier K","doi":"10.14293/s2199-1006.1.sor-.ppv1nf8.v1","DOIUrl":"https://doi.org/10.14293/s2199-1006.1.sor-.ppv1nf8.v1","url":null,"abstract":"In this era people are closely connected to each other using technology.Messaging services a plays a crucial role in this process.For this, WhatsApp Messenger being an exclusive cross-platform that allows to exchange text, files as well as audio and video messages.WhatsApp has 1.5 billion dynamic clients in 180 nations.However, being such a well liked application,taking care of privacy breach is very salient. It is necessary that the application protects clients confidentiality and authenticity. Thus, to give assurance and stealth to client, for the most part cryptography is utilized as a spine of the web based exchanges. WhatsApp utilizes End-to-End Encryption technique and uses various protocols (Signal protocol etc.) and keys (public key, private key etc.) along with algorithm like Curve25519.In this era people are closely connected to each other using technology.Messaging services a plays a crucial role in this process.For this, WhatsApp Messenger being an exclusive cross-platform that allows to exchange text, files as well as audio and video messages.WhatsApp has 1.5 billion dynamic clients in 180 nations.However, being such a well liked application,taking care of privacy breach is very salient. It is necessary that the application protects clients confidentiality and authenticity. Thus, to give assurance and stealth to client, for the most part cryptography is utilized as a spine of the web based exchanges. WhatsApp utilizes End-to-End Encryption technique and uses various protocols (Signal protocol etc.) and keys (public key, private key etc.) along with algorithm like Curve25519.","PeriodicalId":21568,"journal":{"name":"ScienceOpen Posters","volume":"100 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81068503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ScienceOpen PostersPub Date : 2020-11-20DOI: 10.14293/s2199-1006.1.sor-.ppnkah8.v1
Loveson Paul
{"title":"BLOCKCHAIN IN DIAMOND SUPPLY CHAIN","authors":"Loveson Paul","doi":"10.14293/s2199-1006.1.sor-.ppnkah8.v1","DOIUrl":"https://doi.org/10.14293/s2199-1006.1.sor-.ppnkah8.v1","url":null,"abstract":"Blockchain is a distributed database that maintains a continuously-growing list of recordscalledblockssecured from tampering and revision.Trust and ethics is a problem in thediamond industry. The diamond industry has long faced problems with reporting the origin of adiamond and authenticating its ID and grading. Traditionally documented on paper, but sometimes its still difficult to trace the diamonds true origins and providence. People may ask\u0000 Where did the diamond come from? Was it blood diamond? Who owns it? Who bought it? Where is it now? Blockchain can be used in diamond industry for tracking diamonds to secure and trace the diamond provenance. The information is stored securely at every step of the process on blockchain-based platform.","PeriodicalId":21568,"journal":{"name":"ScienceOpen Posters","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77400115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ScienceOpen PostersPub Date : 2020-11-20DOI: 10.14293/s2199-1006.1.sor-.pptwhdo.v1
Helan Selvin
{"title":"Blockchain in Pharma Supply Chain","authors":"Helan Selvin","doi":"10.14293/s2199-1006.1.sor-.pptwhdo.v1","DOIUrl":"https://doi.org/10.14293/s2199-1006.1.sor-.pptwhdo.v1","url":null,"abstract":"Blockchain is an emerging technology these days. It's a chain of blocks organized in a decentralized system witha public ledger having ledgers from initial to final. The pharma supply chain system has a lot of issues considering a large number of intermediaries are involved in it. Blockchain is an effective solution for it since its network is closed and decentralized. It helps to overcome the middlemen problem through its transparencyand traceability. Starting from the manufacturers to the end retailers the products can be traced through the supply chain by ensuring authenticity throughout the processes.If a quality issue of the product is identified, blockchain can facilitate the recalls by determining the location of the faulty product within the supply chain.","PeriodicalId":21568,"journal":{"name":"ScienceOpen Posters","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89439988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ScienceOpen PostersPub Date : 2020-11-18DOI: 10.14293/s2199-1006.1.sor-.ppnd49g.v1
Akhil Soman
{"title":"Cryptography in Banking Sector","authors":"Akhil Soman","doi":"10.14293/s2199-1006.1.sor-.ppnd49g.v1","DOIUrl":"https://doi.org/10.14293/s2199-1006.1.sor-.ppnd49g.v1","url":null,"abstract":"The development of cryptographic techniques has seen a lot of applications in the banking industry. In this blog we see some of the major cryptographic techniques which has been used extensively in the banking industry, for the implementation of data security norms and the fulfillment of compliance requirements.","PeriodicalId":21568,"journal":{"name":"ScienceOpen Posters","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87087953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ScienceOpen PostersPub Date : 2020-11-18DOI: 10.14293/s2199-1006.1.sor-.ppvmbgs.v1
Allen Jacob Siby
{"title":"Cryptography used in SecuringVehicles Electronic Control Units","authors":"Allen Jacob Siby","doi":"10.14293/s2199-1006.1.sor-.ppvmbgs.v1","DOIUrl":"https://doi.org/10.14293/s2199-1006.1.sor-.ppvmbgs.v1","url":null,"abstract":"Electronic Control Units(ECUs) are know as the brains of a vehicle. A modern vehicle can have over eighty ECUs. All of these brains are given a particular task and all of them are controlled by a Super Master ECU which knows what the vehicle is doing and how it is behaving. These ECUs are vulnerable to attacks. Attacks to the brains of a vehicle can result in causalities. Hence the concept of cryptography is adopted into the field of automobiles.","PeriodicalId":21568,"journal":{"name":"ScienceOpen Posters","volume":"81 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76852592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ScienceOpen PostersPub Date : 2020-11-17DOI: 10.14293/s2199-1006.1.sor-.ppa8ctd.v1
M. Patel
{"title":"Global Pandemic COVID-19 (2019-nCoV): Novel Deadliest Contagion","authors":"M. Patel","doi":"10.14293/s2199-1006.1.sor-.ppa8ctd.v1","DOIUrl":"https://doi.org/10.14293/s2199-1006.1.sor-.ppa8ctd.v1","url":null,"abstract":"Global pandemic cause by coronavirus has been reported in Wuhan, China; in late December 2019. Within time duration of few weeks, the newly identified virus designated as 2019-Novel Coronavirus (2019-nCoV) and it was declared by World Health Organization (WHO). At the time of late January 2020, WHO announced it as the international emergency outbreak because of the rapid spread and increases at the global level. There is no any preventive vaccine is present or any approved therapy/treatment for this viral emergency which is very infectious globally. Till the previous few decades, six strains of coronaviruses were found, but in Wuhan, China in December 2019, a totally new strain of coronavirus was spread across the city. Within few days, it was designated as the novel coronavirus abbreviated as 2019-nCoV by World Health Organization. The rate of virus progression is still not determined and that is why it is very difficult to find the patient zero which is very essential. Phylogenetic analysis of the virus specifies bat origin of 2019-nCoV, its transmission is airborne i.e. human to human, infected person can be identified having the primary symptoms which includes high fever, upper or lower respiratory tract infection. Its diagnosis at the molecular level includes Real-Time PCR for encoding genes for the internal transcribed RNA-dependent RNA polymerase and Spike protein receptor binding domain. It can be confirmed by the Sanger Sequencing including full genome analysis by Next Generation Sequencing, multiplex nucleic acid amplification and microarray based analysis. There are few mRNA vaccines which were developed by few Biotechnology companies, showing positive results against COVID-19 and it is there in 4th phase clinical trial which possibly be the first vaccine available in the market in between mid-2021.","PeriodicalId":21568,"journal":{"name":"ScienceOpen Posters","volume":"99 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77570777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}