Статті в журналах з теми "Heath security"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Heath security.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Heath security".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Alam, Uzma, Juliet Nabyonga-Orem, Abdulaziz Mohammed, Deborah R. Malac, John N. Nkengasong, and Matshidiso R. Moeti. "Redesigning health systems for global heath security." Lancet Global Health 9, no. 4 (April 2021): e393-e394. http://dx.doi.org/10.1016/s2214-109x(20)30545-3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Ramji-Nogales, Jaya. "Race in Security." AJIL Unbound 116 (2022): 242–47. http://dx.doi.org/10.1017/aju.2022.38.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In “Making Sense of Security,” J. Benton Heath pushes the reader to tangle with two unresolved foundational questions about the use of security in international law: who decides questions of security, and on what grounds.1 This essay examines the role of race in both of those questions, identifying structures and mechanisms of racial subordination that must be surfaced to fully make sense of security.2 In particular, it foregrounds the tension between reformist reforms and abolitionist reforms to which Heath makes reference. By rendering visible the historical and contemporary work performed by white supremacy in security, this essay seeks to elucidate and problematize that dilemma. Rather than retaining the exclusionary security frame, a turn to solidarity offers the possibility of a more inclusive approach to international law that creates connection based on our shared humanity.
3

Chandrakar, Preeti. "A Secure Remote User Authentication Protocol for Healthcare Monitoring Using Wireless Medical Sensor Networks." International Journal of Ambient Computing and Intelligence 10, no. 1 (January 2019): 96–116. http://dx.doi.org/10.4018/ijaci.2019010106.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The wireless medical sensor networks WMSN play a crucial role in healthcare monitoring remotely. In remote healthcare monitoring, the sensor nodes are deployed in patient's body for collecting physiological data and transmit these data over an insecure channel. The patient's health information is highly sensitive and important. Any malicious modification in physiological data will make wrong diagnoses and harm the patient health. Therefore, privacy, data security, and user authentication are extremely important for accessing patient's real-time heath information over an insecure channel. In this regard, this article proposes a secure and robust two-factor based remote user authentication protocol for healthcare monitoring. The authentication proof has done with the help of BAN logic, which ensures that the proposed scheme provides mutual authentication and session key agreement securely. The informal security verification proves that the developed protocol is secure from various security attacks. The simulation of the proposed scheme has been done using AVISPA tool, whose simulation results confirm that the proposed scheme is secure from active and passive attacks. Performance evaluation shows that the proposed protocol is efficient in terms of security features, computation cost, communication cost, and execution time.
4

Rodiles, Alejandro. "Making Sense of Violent Extremism." AJIL Unbound 116 (2022): 230–35. http://dx.doi.org/10.1017/aju.2022.41.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In “Making Sense of Security,” J. Benton Heath convincingly argues that the concept of security should be understood as a struggle for epistemic authority. Heath develops a comprehensive typology that helps to understand the processes through which people make sense of the term security, while it also helps identifying the legal and political practices involved. However, as he rightly observes, these approaches to security are “not stable equilibria but rather more like quantum states, in which each type contains the potential for the others.”1 Global counterterrorism law powerfully illustrates this evolution. In particular, the growing field of preventing and countering violent extremism (P/CVE) reveals a flow of security conceptions, including realist, widened, and discursive security. Applying Heath's typology to this field shows that evolving rationales have set in motion normative practices, which are difficult to trace from within a traditional international security law framework. In their relational modes, such practices aim at turning risks into opportunities, thus denoting that one's security is the other's perpetuation of insecurities. The recourse to resilience as a technique of counterterrorism governance that instrumentalizes shared and emerging social identities and practices in order to prevent extremism, contributes to the entrenchment of an ever-expanding security apparatus. But it is precisely by resorting to social life—unpredictable as it is—that resilience becomes a quantum state itself, which bears potential for disruption.
5

Martin, Craig. "Climate Change and Global Security: Framing an Existential Threat." AJIL Unbound 116 (2022): 248–53. http://dx.doi.org/10.1017/aju.2022.39.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Should the climate change crisis be framed in security terms? Many argue that it is dangerous to treat non-military threats as security issues. Such “securitization” is associated with the expansion of executive power and the exercise of exceptional measures involving the suspension of individual rights, secrecy, state violence, and a weakening of the rule of law. Nonetheless, climate change has already been identified as a security issue by many government agencies and international institutions.1 But, as J. Benton Heath explores in “Making Sense of Security,” the very concept of security is both ambiguous and contested.2 There are different and competing ideas about what it means, when, and by whom it should be invoked, the kinds of law and policy responses it should trigger, and, crucially, who gets to decide these questions. Heath argues that differing approaches to security reflect deeper struggles over whose knowledge matters in identifying and responding to security threats. He develops a typology for assessing these different approaches, and the implications they have for international law and institutions. But, while he notes that climate change is precisely one of those issues around which there are competing security claims, he leaves to others the question of whether, or how, to frame climate change in security terms. This essay takes up that question, continuing the inquiry into how best to understand the concept of security, and how Heath's typology helps think about the question. It argues that it may indeed be important to frame climate change in security terms, but as a matter of global security rather than national security.
6

Muka, Romina, Sule Yildrim-Yayilgan, and Kozeta Sevrani. "Security Analysis of Wireless BAN in e-Health." Spring 2017 5, no. 2 (May 1, 2017): 1–7. http://dx.doi.org/10.33107/ijbte.2017.5.2.02.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The Wireless Body Area Network (WBAN) has gained popularity as a new technology for e-Health, and is considered as one of the key research areas in computer science and healthcare applications. WBAN collects patients’ data, monitors constantly their physiological parameters, using small implantable or wearable sensors, and communicates these data using wireless communication techniques in short range. WBAN is playing a huge role in improving the quality of healthcare. Still, due to sensitive and concurrent nature of e-Heath systems, current research has showed that designers must take into considerations the security and privacy protection of the data collected by a WBAN to safeguard patients from different exploits or malicious attacks, since e-Health technologies are increasingly connected to the Internet via wireless communications. In this paper we outline the most important security requirements for WBANs. Furthermore, we discuss key security threats to avoid. Finally, we conclude with a summary of security mechanisms to follow that address security and privacy concerns of WBANs, and need to be explored in an increasingly connected healthcare world.
7

Gautam, Pratiksha, Mohd Dilshad Ansari, and Surender Kumar Sharma. "Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing." International Journal of Information Security and Privacy 13, no. 1 (January 2019): 59–69. http://dx.doi.org/10.4018/ijisp.2019010105.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Recently, the electronic heath record (EHR) has become the chosen method to maintain a patient's health information. The advancement of cloud computing enables users to access their data with flexibility, providing large storage capability at low costs, which encourages EHR maintainers to consider shifting from their own storage to the cloud. In cloud computing, it is no doubt that securing EHRs poses a gigantic challenge. Various security properties like access control, data privacy, and scalable access between different clouds needs to be satisfied. This article presents a secure and efficient blueprint for securing data confidentiality on cloud computing storage. The proposed framework is carried out for EHR confidential data on cloud storage. Moreover, the proposed approach combines the obfuscation and RSA encryption together to enforce confidentiality and authentication. Through this framework, the data confidentiality and authentication scheme on EHR information can be enforced on clouds storage.
8

Nandan Sharma. "Indian Healthcare Segment: A Challenge to Human Security in 21st Century." Legal Research Development: An International Refereed e-Journal 2, no. I (September 30, 2017): 63–70. http://dx.doi.org/10.53724/lrd/v2n1.06.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
During the last three decades, the pharmaceutical sector has shown an explosive growth all over the world. After eatables, cosmetics and textile, pharmaceutical are rapidly surging ahead to become the third largest industry in several developed countries, thanks to health awareness propagated by World Health Organization (WHO).1 India has not lagged behind. Indian Pharmaceutical Industry in spite of tough competition, have got entrenched in eastern, mid-eastern and in several western markets. Some of our pharmaceutical multinationals have already acquired an edge over several well established foreign multinationals. Our pharmaceutical export revenue is increasing year after year. The researcher has highlighted the issue concerning the heath issues of the people of developing nations like India as a challenge for 21st century.
9

Srivastava, Mahendra P. "Plant Clinic Towards Plant Health and Food Security." International Journal of Phytopathology 2, no. 3 (December 30, 2013): 193–203. http://dx.doi.org/10.33687/phytopath.002.03.0327.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Ever-growing population, climatic changes and unprecedented losses due to pests and diseases pose serious threat to food security. Precisely food security implies availability of adequate food to everyone in all times to come. Food and Agriculture Organization of united Nations (FAO) defines “food security” as a state of affairs where all people at all times have access to safe and nutritious food to maintain healthy and active life. Food is one of the three basic needs of man, without which his survival is at stake. Plants constitute the basic source of food and as such, plant health management is crucial to food security, which is jeopardized due to unprecedented threat by large number of insect-pests, diseases, weeds and several edaphic and environmental stresses. Srivastava (2008, 2009) has very well highlighted the importance of plant heath security through phytomedicines/pesticides and plant health clinic in order to prevent 40 per cent losses occurring from field to fork globally. Due to unabated rise in population, reduction in arable land will be an ongoing process, hence we may have to strive hard to grow more food from limited land employing innovative strategies and more importantly adopting multipronged initiative and timely diagnostic and management strategies from plant health clinic to combat attack from pests and environmental stress, manage plant health mitigate losses.
10

Heath, J. Benton, Ina Popova, Justin Jacinto, Samaa Haridi, Tafadzwa Pasipanodya, and Sabina Sacco. "Litigating Health and Security Exceptions in Investment Treaties: A Simulation." Proceedings of the ASIL Annual Meeting 115 (2021): 151–54. http://dx.doi.org/10.1017/amp.2021.138.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
J. Benton Heath introduced the topic. Essential security interests clauses have been invoked in a handful of cases, including several cases arising out of the Argentine debt crisis and the twin cases brought by Deutsche Bank and CC/Devas against India relating to satellite frequencies, with mixed outcomes and reasoning. In several treaties, these clauses also refer to public health measures, but there is little guidance on how such clauses should be interpreted or applied. Using a fictional but realistic scenario, the advocates and tribunal members—playing assigned roles—were asked to consider whether public health exceptions are self-judging, whether they deprive a tribunal of jurisdiction or go to the merits, and what showing is required for the clause to apply. The scenario also raised broader doctrinal questions about the nature of exceptions in investment treaties, their relationship with the treaty's primary obligations, and the interrelationship between security clauses and the customary international law defense of necessity.
11

Anghie, Antony T. "Introduction to the Symposium on J. Benton Heath, “Making Sense of Security”." AJIL Unbound 116 (2022): 225–29. http://dx.doi.org/10.1017/aju.2022.42.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Jones, Marcella K., Gary Bloch, and Andrew D. Pinto. "A novel income security intervention to address poverty in a primary care setting: a retrospective chart review." BMJ Open 7, no. 8 (August 2017): e014270. http://dx.doi.org/10.1136/bmjopen-2016-014270.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
ObjectiveTo examine the development and implementation of a novel income security intervention in primary care.DesignA retrospective, descriptive chart review of all patients referred to the Income Security Heath Promotion service during the first year of the service (December 2013–December 2014).SettingA multisite interdisciplinary primary care organisation in inner city Toronto, Canada, serving over 40 000 patients.ParticipantsThe study population included 181 patients (53% female, mean age 48 years) who were referred to the Income Security Health Promotion service and engaged in care.InterventionThe Income Security Health Promotion service consists of a trained health promoter who provides a mixture of expert advice and case management to patients to improve income security. An advisory group, made up of physicians, social workers, a community engagement specialist and a clinical manager, supports the service.Outcome measuresSociodemographic information, health status, referral information and encounter details were collected from patient charts.ResultsEncounters focused on helping patients with increasing their income (77.4%), reducing their expenses (58.6%) and improving their financial literacy (26.5%). The health promoter provided an array of services to patients, including assistance with taxes, connecting to community services, budgeting and accessing free services. The service could be improved with more specific goal setting, better links to other members of the healthcare team and implementing routine follow-up with each patient after discharge.ConclusionsIncome Security Health Promotion is a novel service within primary care to assist vulnerable patients with a key social determinant of health. This study is a preliminary look at understanding the functioning of the service. Future research will examine the impact of the Income Security Health Promotion service on income security, financial literacy, engagement with health services and health outcomes.
13

Jean Marie, Ntampera, Amitabye Luximon-Ramma, and Nshimirimana Jacques. "Analysis of Health System for Health Security: Case of Burundi." Texila International Journal of Academic Research 11, no. 1 (January 31, 2024): 16–28. http://dx.doi.org/10.21522/tijar.2014.11.01.art002.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Health system contributing to health security constituting an approach that harmoniously brings together efforts to strengthen the resources and capacities necessary for the implementation of the International Health Regulations, the components of health systems and those of other sectors for effective management of health emergencies, while maintaining the continuity of essential health services. The countries that have a weak health system face many challenges related to health security. A descriptive study was used during this study to identify if Burundi health system is contributing to the health security. 5health zones have been selected and 350 individuals questioned if they have received health education related to diseases with epidemic potential and if they have suffered from them. A questionnaire which includes the diseases with epidemic potential was distributed to 350 respondents between 20 to 55 years old. The majority (58%) of the respondents were female compared to 42% male. Most (93.0 %) respondents have received health education related to prevention of diseases with epidemic potential. The result shows significant differences in location, gender, marital status, occupation, and several outbreaks (P<0.001). The future research should focus on the re-organization of health systems to respond effectively to different heath threats, especially these can spread locally and globally. Identification of all these issues that can spread to neighbors, and which can cause high morbidity and mortality. of the country, the gaps, and priorities and to know where to convey the efforts for universal health coverage. Keywords: Burundi, Epidemic potential, Health system, health security, prevention.
14

Pandi Rais, Shahrul bin Abd Shofi, Erina Sonia, and Sulis Setyoningsih. "THE ISLAMIC LAW REVIEW ON MANAGEMENT OF THE SOCIAL SECURITY ORGANIZING AGENCY (BPJS)." Qawãnïn Journal of Economic Syaria Law 4, no. 2 (July 24, 2020): 177–92. http://dx.doi.org/10.30762/q.v4i2.2469.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The Social Security Organizing Agency (BPJS) is a legal entity formed in the aspect of a health insurance program. BPJS is part of the JKN (National Health Insurance) which has the aim of ensuring the health of the entire citizen . To measure whether the BPJS for heath has been able to realize its goals, it is necessary to discuss this matter through this journal. With the journal method, the descriptive type method, and the data collection technique used is library research. Then the data is analyzed by descriptive analysis method and associated with the facts. Data shows that the BPJS is a mutual assistance guarantee program, participation is mandatory for all  citizens and is not selective, as well as the existence of a contribution system. Facilities provided include First Level Health Facilities (FKTP), Advanced Level Referral Health Facilities (FKRTL), supporting health facilities, all of which are provided to address health problems since the level of minor illness. However, in the development of the implementation of the BPJS program, several problems emerged, which eventually affected the level of public health. The results of the Bahtsul Masail of PBNU in the Bahtsul Masail commission session at the Bahrul Ulum Nahdatul Ulama Islamic Boarding School, decided that the Social Security Organizing Agency (BPJS) was halal and could be used for all groups in the framework of health insurance in Indonesia. The Social Security Organizing Agency (BPJS) is a legal entity formed in the aspect of a health insurance program. BPJS is part of the JKN (National Health Insurance) which has the aim of ensuring the health of the entire citizen . To measure whether the BPJS for heath has been able to realize its goals, it is necessary to discuss this matter through this journal. With the journal method, the descriptive type method, and the data collection technique used is library research. Then the data is analyzed by descriptive analysis method and associated with the facts. Data shows that the BPJS is a mutual assistance guarantee program, participation is mandatory for all citizens and is not selective, as well as the existence of a contribution system. Facilities provided include FirstLevel Health Facilities (FKTP), Advanced Level Referral Health Facilities (FKRTL), supporting health facilities, all of which are provided to address health problems since the level of minor illness. However, in the development of the implementation of the BPJS program, several problems emerged, which eventually affected the level of public health. The results of the Bahtsul Masail of PBNU in the Bahtsul Masail commission session at the Bahrul Ulum Nahdatul Ulama Islamic Boarding School, decided that the Social Security Organizing Agency (BPJS) was halal and could be used for all groups in the framework of health insurance in Indonesia.
15

Zhang, Xiaohan. "Decoding China’s COVID-19 Health Code Apps: The Legal Challenges." Healthcare 10, no. 8 (August 5, 2022): 1479. http://dx.doi.org/10.3390/healthcare10081479.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Heath code apps, along with robust testing, isolation, and the care of cases, are a vital strategy for containing the spread of the COVID-19 outbreak in China. They have remained stable and consistent, allowing China to extensively restore its social and economic development. However, the ethical and legal boundaries of deploying health code apps for disease surveillance and control purposes are unclear, and a rapidly evolving debate has emerged around the promises and risks of their fast promotion. The article outlines the legal challenges by applying the core values of the Personal Information Protection Law (PIPL), the fundamental law for personal information protection in China, into the context of the nationwide use of health code apps. It elaborates on the balance between the demands for upholding individuals’ rights to the security of their personal information and those for public access to such information to prevent the spread of infectious diseases. It identifies the current gaps in addressing personal information harms during the use of the apps, particularly with regard to user consent, transparency, necessity, storage duration, and security safeguards.
16

Mondal, Koushik, Satyendra Singh Yadav, Vipin Pal, Akhilendra Pratap Singh, Yogita Yogita, and Mangal Singh. "Detecting Sinkhole Attacks in IoT-Based Wireless Sensor Networks Using Distance From Base Station." International Journal of Information System Modeling and Design 13, no. 6 (November 2022): 1–18. http://dx.doi.org/10.4018/ijismd.297628.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Wireless sensor networks (WSNs) are infrastructure-less in nature, which contains numbers of autonomous sensor nodes. These sensor nodes are dedicated to monitoring the physical conditions of the environment and are organizing the collected data at a central location. Application area of WSN, like - heath care, military surveillance, are sensitive with respective to information sensed, that’s why security of WSN needs to be very effective. Providing security to WSN plays a major role as it consists of limited resources. The security system should lie within the boundary of the resource potential as well as should be competent enough to handle attacks. Intrusion detection system (IDS) is one such type of defense system, which can fulfill the measure of limitation of resources. In this paper, a detection technique is proposed against sinkhole attack using the Euclidean distance of each node from base station. The main advantage of the proposed technique is that it doesn't require any extra hardware setup as well as doesn't require extra communication cost.
17

Aljuaid, Hanan, and Shabir A. Parah. "Secure Patient Data Transfer Using Information Embedding and Hyperchaos." Sensors 21, no. 1 (January 4, 2021): 282. http://dx.doi.org/10.3390/s21010282.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Health 4.0 is an extension of the Industry standard 4.0 which is aimed at the virtualization of health-care services. It employs core technologies and services for integrated management of electronic health records (EHRs), captured through various sensors. The EHR is processed and transmitted to distant experts for better diagnosis and improved healthcare delivery. However, for the successful implementation of Heath 4.0 many challenges do exist. One of the critical issues that needs attention is the security of EHRs in smart health systems. In this work, we have developed a new interpolation scheme capable of providing better quality cover media and supporting reversible EHR embedding. The scheme provides a double layer of security to the EHR by firstly using hyperchaos to encrypt the EHR. The encrypted EHR is reversibly embedded in the cover images produced by the proposed interpolation scheme. The proposed interpolation module has been found to provide better quality interpolated images. The proposed system provides an average peak signal to noise ratio (PSNR) of 52.38 dB for a high payload of 0.75 bits per pixel. In addition to embedding EHR, a fragile watermark (WM) is also encrypted using the hyperchaos embedded into the cover image for tamper detection and authentication of the received EHR. Experimental investigations reveal that our scheme provides improved performance for high contrast medical images (MI) when compared to various techniques for evaluation parameters like imperceptibility, reversibility, payload, and computational complexity. Given the attributes of the scheme, it can be used for enhancing the security of EHR in health 4.0.
18

Gostin, Lawrence O. "When Terrorism Threatens Health: How Far are Limitations on Human Rights Justified." Journal of Law, Medicine & Ethics 31, no. 4 (2003): 524–28. http://dx.doi.org/10.1111/j.1748-720x.2003.tb00120.x.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
A single defining question perennially intrigues scholars and practitioners interested in public heath: To what extent should human rights be limited to protect the community’s health and safety? The question achieved prominence in the aftermath of the attacks on the World Trade Center and Pentagon on September 11, 2001 and with the intentional dispersal of anthrax spores through the U.S. Postal Systein. The conflict between security and public health intensified with the development of the Model State Emergency Health Powers Act (“Model Act”), drafted by the Center for Law and the Public’s Health at the request of the Centers for Disease Control and Prevention. The Model Act grants states consiclernble powers to control persons and property in response to a public health emergency, defined to inclucle bioterrorism or the appearance of novel or previously controlled or eradicated infectious agents or biological toxins.
19

Catford, J. "Food security, climate change and heath promotion: opening up the streams not just helping out down stream." Health Promotion International 23, no. 2 (January 16, 2008): 105–8. http://dx.doi.org/10.1093/heapro/dan016.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Akello, Mercy Catherine, and David Mwesigwa. "Household Size and Household Food Security in Ngetta Ward, Lira City, Northern Uganda." International Journal of Developing Country Studies 5, no. 1 (October 20, 2023): 88–109. http://dx.doi.org/10.47941/ijdcs.1479.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose: The study examined the effect of Household size/family size on Household food security in Lira city East Division. Specific issues that were studied are; the impact of average household size on household food security, the level of household food security and the effect of household size on household food security ‟household food security and whether household size affects household food security. Methodology: A purposive sampling and simple random sampling method for the study was used to select houses in each cell for the distribution of the questionnaire. Questionnaires and interview guide served as the main tools for data collection. The study targeted a sample population of 300 respondents out of which 60 participants were drawn from the small family and the other 240 from the large family in the study area. Findings: The findings indicated that, large family size puts an extra burden on food consumption and is more likely to experience food insecurity in contrast to households with a small and average family size. Large households, with more young or school-going children, also tend to fall below the poverty line and vulnerable to food insecurity. The results further revealed financial problems, lack of parental care and poor heath as the challenges faced by large families. Unique contribution to theory, practice and policy: This study contributes to the understanding of the relationship between household size and household food security so that policy makers can plan for an ever growing human population especially in the rural and peri-urban areas. The study recommends the need for intensive education on population related matters for parents and various incentives packages to families with smaller sizes.
21

Dembek, Zygmunt F., Tesema Chekol, and Aiguo Wu. "The Opioid Epidemic: Challenge to Military Medicine and National Security." Military Medicine 185, no. 5-6 (February 20, 2020): e662-e667. http://dx.doi.org/10.1093/milmed/usz487.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract Introduction We examine the current status of the military relevance of opioids, their use and misuse in military and veteran populations, the national security consequences of opioid use in our military age population, public health implications, and military, veteran, and government solutions for opioid addiction. Materials and Methods A literature search of recent published research, federal government, and related open source materials was conducted using PubMed, Google, and Google Scholar, and all materials retrieved were manually identified, screened, and evaluated for inclusion. A modified Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) approach was used for the selection of relevant articles. Heath policy literature and relevant demographic information published within the last 5 years was also included to provide current information and search for solutions to address the escalating national opioid crisis. Results Synthetic opioids are used for pain and trauma management, not readily substituted, and have exceptionally high addiction potential. Combat wounded veterans have greater potential for opioid misuse than civilian populations. Assessment, management, and treatment of opioid use in this population are essential. Veterans receiving synthetic opioids have been noted to have multiple overdose risk factors. Opioids are readily available nationally as “street drugs” and also in the form of fentanyl-contaminated heroin. The opioid crisis affects the military age population and the top states for military enlistments. Younger age males with lower education and income are at significant risk for opioid use disorder. Recently increased drug overdose deaths contribute to an increased U.S. mortality rate with a commensurate decline in life expectancy at birth. Opioid abuse contributes to increased incidence of infectious disease. Behavioral health programs directed at military and veterans to identify risk factors for opioid misuse have been introduced. Prescription drug monitoring initiatives continue for these populations with increased information exchanged between military and civilian healthcare. Lifesaving interventions for opioid addiction include methadone maintenance and fentanyl test strip accessibility. Newly implemented federal funding healthcare initiatives to the states are now directed at opioid use prevention and enhanced surveillance. Conclusions Given increasing rates of opioid addiction and death, viable solutions are universally needed. Successful intervention measures should be widely shared between military, veteran, and civilian healthcare and public health communities. Increased collaboration between these groups could inculcate successful programs to prevent and decrease opioid use. Results received from recent military and veterans’ programs for prescription and electronic medical record (EMR) monitoring and data sharing may also prove useful for civilian healthcare providers and hospital systems. Future evaluations from ongoing federally funded programs to the states for addiction surveillance and intervention may help create measures to address the proliferation of opioid addiction with increased death rates. Anticipated results from these federal efforts should help inform opioid programs in military and veterans’ health systems.
22

Maatouk, F., W. El May, H. Ghedira, and N. Fathallah. "[Profile of first year dental students in Tunisia]." Eastern Mediterranean Health Journal 7, no. 1-2 (March 15, 2001): 52–59. http://dx.doi.org/10.26719/2001.7.1-2.52.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The aim of this study was to assess social conditions, school history, professional choices and oral health status of first-year dental students 1998/1999. We included 155 Tunisian students, 18-22 years old. There was a higher proportion of female students [58%] whose average age [18.9 years] was younger than the males. We found that 79% came from urban environments and 41% from middle socioeconomic background. Also 48% had parents who had a high level of education. Dental studies were the first choice for 50% of the students and they were looking for prestige and security. Concerning oral heath status, 88% of the students had periodontal problems and 70% had caries. More information for students about the options available to them at university and greater efforts from teachers to motivate students in oral hygiene are needed.
23

Marvasi, Massimiliano, Lilliam Casillas, Alberto Vassallo, and Diane Purchase. "Educational Activities for Students and Citizens Supporting the One-Health Approach on Antimicrobial Resistance." Antibiotics 10, no. 12 (December 11, 2021): 1519. http://dx.doi.org/10.3390/antibiotics10121519.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Antibiotic resistance is one of the biggest threats to global health, food security and development. Urgent action is needed at all levels of society to reduce the impact and spread of antibiotic resistance. For a more sustaining approach, education in children, college students, citizens and caregivers are essential. The One-Heath approach is a collaborative, multisectoral and transdisciplinary strategy in which, no single organizations or sector can address the issue of antimicrobial resistance at the human–environment interface alone. Within this strategy, education plays a central role. In this scoping review, we highlighted a range of learning activities on antibiotic resistance as part of the One-Health approach. In particular, those applications that can be introduced to a wide audience to help arrest the current crisis for the next generation. The review identifies a high number of teaching opportunities: board and role-play games, round tables, musicals, e-learning and environmental experiments to couple with more curricula and formal education to inform a diverse group of audiences.
24

Arora, Samridhi, and Kanchan Sharma. "Mid-Day Meal Scheme amidst COVID-19 in India - A Review Based Analysis." Asian Pacific Journal of Health Sciences 9, no. 4 (June 20, 2022): 134–37. http://dx.doi.org/10.21276/apjhs.2022.9.4.26.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The COVID-19 pandemic posed a crisis like situation in the health and education sector devastating lives of many, particularly children from poor families and putting their future heath on the verge of deterioration. It made hard for today’s man to get a healthy meal a day in pandemic induced economic shutdown. Mid-Day Meal Scheme is also promising a kind of food security to the children for whom it is quite hard to get their daily meals in the crisis. It is really important to determine the drivers and stressors deteriorating health and nutritional conditions since the pandemic is on high. Keeping these in notice, the present study was conducted to have a holistic view of the current condition of the operationalization of the Mid-Day Meal Scheme. It has been tried to know whether the current implementation of Mid-Day Meal Scheme is promising a healthy meal to the children since the operationalization has been changed in context of the COVID-19 scenario. Instead of hot cooked meal, food security allowances, and dry ration are supplied to the beneficiary children. The study was conducted to know that at how much level the beneficiaries actually receiving the benefits of the scheme currently. Some suggestions were also made at the end of the study to make the scheme more available and better in terms of its distribution of services to the beneficiary children.
25

Dale, Ann, Bradley Evanoff, Diane Rohlman, Jaime Strickland, and Kevin Kelly. "O1E.2 Influence of work organization and environment on health and productivity outcomes among construction apprentices: a total worker health® approach." Occupational and Environmental Medicine 76, Suppl 1 (April 2019): A10.3—A11. http://dx.doi.org/10.1136/oem-2019-epi.28.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
IntroductionConstruction is a hazardous industry, with well-recognized risks of traumatic injury and high physical demands. Other threats to construction workers’ health and well-being occur from work organization and work environment factors, including precarious employment, long commutes, long work hours, and employer policies regarding health and safety. These non-traditional hazards have been associated with injury and illness, psychosocial stress, and unhealthy behaviors including poor diet and smoking. The cumulative impacts of both traditional and non-traditional hazards on the health and well-being of construction workers are largely unknown.MethodsWe conducted annual surveys among apprentice construction workers to identify relationships between four study domains: work organization and environment, health behaviors, health outcomes, and work outcomes.Results963 baseline surveys were completed and returned by apprentice construction workers (90% response rate, mean age 28). Preliminary analyses examined associations between work organization factors and four self-reported outcomes: lower work ability, lower productivity, higher rates of missed days of work due to injury, and use of prescription pain medication. We found that all four outcomes were associated with high job demands, low supervisor support, and low job security. Other factors associated with one or more outcomes included low job security, mandatory overtime, low coworker support, and low foreman supervision of safety. Compared to commercial construction workers, those in residential construction reported higher use of pain medication and higher rates of missed days due to work injuries. One year follow-up data from 901 workers are now being analyzed; we will present results of relationships between the four study domains.DiscussionCross-sectional data highlight non-traditional worksite health risks, and suggest potential interventions to improve heath behaviors and outcomes among construction workers.
26

Gupta, Neera, Tushar Dixit, and Vikram K. "Factoring digital health for improved outcomes in management of Non Communicable Diseases." Journal of Social Health and Diabetes 04, no. 02 (December 2016): 102–7. http://dx.doi.org/10.4103/2321-0656.187998.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractMake in India is a flagship campaign from the Government of India which is aimed at various sectors. Indian health-care system can take advantages by introducing digital technologies to health care. The possible uses of health information technology as a method to engage with people involving communicable and noncommunicable diseases (NCDs) are wide-ranging. Health information technology can support interventions for prevention, diagnosis, managing surveillance, disease monitoring, and treatment compliance of many conditions. Digital health can offer various technologies such as wearables that are tracked by various mobile or smartphone applications to facilitates patient engagement, self-monitoring, and implementing behavior changes in NCDs such as diabetes. By incorporating the interactive audiovisual items, the digital health tools can create greater interest and engage people from different geographies, age, gender, and culture. Currently, the common digital heath tech issues include hesitancy from doctors to adopt any new product or technology, difficulty in reaching and accessing the needy patients, cultural diversity in population, and inadequate infrastructure. The ethical issues of consent, data security, and privacy of patients need to be addressed as they are highly sensitive in nature.
27

Kuiken, Jonathan. "Striking the Balance: Intervention versus Non-intervention in Britain's Oil Policy, 1957–1970." Britain and the World 8, no. 1 (March 2015): 5–26. http://dx.doi.org/10.3366/brw.2015.0165.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This article focuses on attempts by the British Government to reexamine and recalibrate its oil policy following the Suez Crisis until the election of the Conservative Government of Edward Heath in 1970. It argues that despite a long-term strategy of non-intervention in the affairs of Britain's two domestically-based oil companies, British Petroleum and Shell, repeated Government attempts to increase the effectiveness of its oil policy in meeting its twin goal of security of supply and profitability to the British economy led to a gradual increase in state intervention in oil matters. The unintended consequence of this process was the deterioration of relations with BP and Shell, leading to the breakdown of Britain's traditional approach of allowing the firms to handle oil matters independently.
28

Frikha, Tarek, Ahmed Chaari, Faten Chaabane, Omar Cheikhrouhou, and Atef Zaguia. "Healthcare and Fitness Data Management Using the IoT-Based Blockchain Platform." Journal of Healthcare Engineering 2021 (July 9, 2021): 1–12. http://dx.doi.org/10.1155/2021/9978863.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Because of the availability of more than an actor and a wireless component among e-health applications, providing more security and safety is expected. Moreover, ensuring data confidentiality within different services becomes a key requirement. In this paper, we propose to collect data from health and fitness smart devices deployed in connection with the proposed IoT blockchain platform. The use of these devices helps us in extracting an amount of highly valuable heath data that are filtered, analyzed, and stored in electronic health records (EHRs). Different actors of the platform, coaches, patients, and doctors, collaborate to provide an on-time diagnosis and treatment for various diseases in an easy and cost-effective way. Our main purpose is to provide a distributed, secure, and authorized access to these sensitive data using the Ethereum blockchain technology. We have designed an integrated low-powered IoT blockchain platform for a healthcare application to store and review EHRs. This architecture, based on the blockchain Ethereum, includes a web and mobile application allowing the patient as well as the medical and paramedical staff to have a secure access to health information. The Ethereum node is implemented on an embedded platform, which should provide an efficient, flexible, and secure system despite the limited resources and low power consumption of the multiprocessor platform.
29

Vroegindewey, G. V. "(A256) Public Health: A Portal to Peace." Prehospital and Disaster Medicine 26, S1 (May 2011): s70. http://dx.doi.org/10.1017/s1049023x11002408.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
War, conflict, and complex emergencies are major contributors to the crisis of human suffering with impacts on health, public health infrastructure, food security, economic viability, community infrastructure, and social fabric as well as the environment. Conflict mitigation and resolution are essential to the recovery and restoration of the community and health. Public health can serve as a mechanism to mitigate the impacts of conflict, serve as a bridge to resolve conflict and provide community resilience. The role of health care professionals as a “Bridge to Peace” is a critical component of conflict resolution. Health as a Bridge for Peace was formally accepted by the 51st World Health Assembly in May 1998 as a feature of the “Health for All in the 21st Century” strategy and has been demonstrated across a wide range of conflicts. Public health has attributes that make it a valuable platform for conflict resolution: it is broad, population-based, affects all parties, benefits both individuals and society, valued by recipients, and supports Universal Values. Public heath can be utilized in pre-conflict, conflict, and post-conflict situations and has been used in more than 20 conflict scenarios with Humanitarian Cease-fires, Days of Tranquility, and Safe/Peace Corridors supporting programs such as childhood vaccination days in Afghanistan to Guinea Worm Eradication in East Africa.
30

Saleh, Mohammed M. "United Notation 2030 Agenda for Sustainable Development Goals: Appraisal and Prospects." European Journal of Economics and Business Studies 9, no. 1 (October 6, 2017): 301. http://dx.doi.org/10.26417/ejes.v9i1.p301-305.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
United Nations adopted in 2015 seventeen Sustainable Development Goals to be achieved in 2030.The main goals are: ending poverty, ending hunger, achieving equity in heath, education, water treatment and sanitation, full and productive employment for all, sustainable economic growth, sustainable consumption and production pattern, combat climate change and other environmental goals. There are many constraints encountering the achievements of these goal.These constraints are basically financial and political. This paper emphasizes that these goals cannot be achieved without large scale of international financial support in term of grants and easy term loans. In addition, UN has to play its role in preserving international peace and security which are the basic elements in sustainable development. Time frame for achieving sustainable development goals should be extended ,probably, to the mid of this century.
31

Said, Alejandro, Yasser Davizón, Rogelio Soto, Carlos Félix-Herrán, Carlos Hernández-Santos, and Piero Espino-Román. "An Infinite-Norm Algorithm for Joystick Kinematic Control of Two-Wheeled Vehicles." Electronics 7, no. 9 (August 27, 2018): 164. http://dx.doi.org/10.3390/electronics7090164.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In this paper, we propose an algorithm based on the mathematical p-norm which has been applied to improve both the traction power and the trajectory smoothness of joystick-controlled two-wheeled vehicles. This algorithm can theoretically supply 100% of available power to each of the actuators if the infinity-norm is used, i.e., when the p-norm tends to infinity. Furthermore, a geometrical model using the radius of curvature has been developed to track the effect of the proposed algorithm on the vehicle’s trajectory. Findings in this research work contribute to the kinematic control and path planning algorithms for vehicles actuated by two wheels, such as tanks and electric wheelchairs, both of vital importance for the security and heath industry. Computer simulations and experiments with a real robot are performed to verify the results.
32

V., Dr Suma. "COMPUTER VISION FOR HUMAN-MACHINE INTERACTION-REVIEW." Journal of Trends in Computer Science and Smart Technology 2019, no. 02 (December 29, 2019): 131–39. http://dx.doi.org/10.36548/jtcsst.2019.2.006.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The paper is a review on the computer vision that is helpful in the interaction between the human and the machines. The computer vision that is termed as the subfield of the artificial intelligence and the machine learning is capable of training the computer to visualize, interpret and respond back to the visual world in a similar way as the human vision does. Nowadays the computer vision has found its application in broader areas such as the heath care, safety security, surveillance etc. due to the progress, developments and latest innovations in the artificial intelligence, deep learning and neural networks. The paper presents the enhanced capabilities of the computer vision experienced in various applications related to the interactions between the human and machines involving the artificial intelligence, deep learning and the neural networks.
33

Almalki, Abrar, Balakrishna Gokaraju, Nikhil Mehta, and Daniel Adrian Doss. "Geospatial and Machine Learning Regression Techniques for Analyzing Food Access Impact on Health Issues in Sustainable Communities." ISPRS International Journal of Geo-Information 10, no. 11 (November 3, 2021): 745. http://dx.doi.org/10.3390/ijgi10110745.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Food access is a major key component in food security, as it is every individual’s right to proper access to a nutritious and affordable food supply. Low access to healthy food sources influences people’s diet and activity habits. Guilford County in North Carolina has a high ranking in low food security and a high rate of health issues such as high blood pressure, high cholesterol, and obesity. Therefore, the primary objective of this study was to investigate the geospatial correlation between health issues and food access areas. The secondary objective was to quantitatively compare food access areas and heath issues’ descriptive statistics. The tertiary objective was to compare several machine learning techniques and find the best model that fit health issues against various food access variables with the highest performance accuracy. In this study, we adopted a food-access perspective to show that communities that have residents who have equitable access to healthy food options are typically less vulnerable to health-related disasters. We propose a methodology to help policymakers lower the number of health issues in Guilford County by analyzing such issues via correlation with respect to food access. Specifically, we conducted a geographic information system mapping methodology to examine how access to healthy food options influenced health and mortality outcomes in one of the largest counties in the state of North Carolina. We created geospatial maps representing food deserts—areas with scarce access to nutritious food; food swamps—areas with more availability of unhealthy food options compared to healthy food options; and food oases—areas with a relatively higher availability of healthy food options than unhealthy options. Our results presented a positive correlation coefficient of R2 = 0.819 among obesity and the independent variables of transportation access, and population. The correlation coefficient matrix analysis helped to identify a strong negative correlation between obesity and median income. Overall, this study offers valuable insights that can help health authorities develop preemptive preparedness for healthcare disasters.
34

King, Heather C., Monique Bouvier, Natalie Todd, Coleman J. Bryan, Gregg Montalto, Christine Johnson, Robert Hawkins, Lisa A. Braun, John Malone, and Patricia Watts Kelley. "Shipboard Global Health Engagement Missions: Essential Lessons for Military Healthcare Personnel." Military Medicine 184, no. 11-12 (May 29, 2019): e758-e764. http://dx.doi.org/10.1093/milmed/usz113.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract Introduction Global health engagement missions are conducted to improve and protect the health of populations worldwide. Recognizing the strong link between health and security, the Armed Forces have increased the number of global health engagement missions over the last decade to support force health protection, medical readiness, enhance interoperability, improve host nation capacity building, combat global health threats (i.e., emerging infectious diseases), support humanitarian assistance and disaster relief efforts, as well as build trust and deepen professional medical relationships worldwide. These missions additionally support the US Global Health Security Agenda, US National Security Strategy, US National Defense Strategy and National Military Strategy. Although global health engagement missions are conducted by armed forces with numerous military units and geographical locations, military healthcare personnel assigned to US Naval hospital ships also perform a wide range of these missions. These missions comprise some of the largest global health engagement missions conducted, encompassing hundreds of subject matter expert exchanges, community health exchanges, medical symposiums, and side-by-side partnered healthcare in countries around the world. Military healthcare personnel who have completed past missions possess valuable knowledge related to ship-based global health engagement missions. Capturing and transferring this knowledge to future deployed personnel is important for future successful missions, but has remained a significant challenge. The purpose of this study was to capture and examine first-person accounts of experiential learning among active duty physicians, nurses, and hospital corpsmen who had participated in recent hospital ship-based global heath engagement missions. Materials and Methods We used the interpretive, ethnographic method of interviewing and data analysis described by Benner. Interviews elicited detailed, narrative examples of experiences from military health care personnel who had participated in previous global health engagement missions aboard hospital ships (N = 141). Our approach to gaining meaning from these narratives was guided by three central strategies: (1) identify paradigm cases, (2) identify themes within and across participant narratives of meaningful patterns, and (3) identify exemplars to represent common patterns of meaning and common situations. Additionally, we collected demographic information. Results Our findings provide firsthand descriptions of five essential elements to prepare military healthcare personnel for shipboard global health engagement missions. These essential elements are mission clarity, preparedness, experiential knowledge, lessons learned, and flexibility/adaptability. Conclusions Widespread dissemination of the lessons learned from military global health engagement missions is crucial to shaping forces that operate effectively in a rapidly changing global environment. Sharing lessons learned increases efficiency, adaptability, and agility, while decreasing variance in processes and the need to relearn mission-specific lessons.
35

Le, Tuan-Vinh. "Securing Group Patient Communication in 6G-Aided Dynamic Ubiquitous Healthcare with Real-Time Mobile DNA Sequencing." Bioengineering 10, no. 7 (July 15, 2023): 839. http://dx.doi.org/10.3390/bioengineering10070839.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
(1) Background: With an advanced technique, third-generation sequencing (TGS) provides services with long deoxyribonucleic acid (DNA) reads and super short sequencing time. It enables onsite mobile DNA sequencing solutions for enabling ubiquitous healthcare (U-healthcare) services with modern mobile technology and smart entities in the internet of living things (IoLT). Due to some strict requirements, 6G technology can efficiently facilitate communications in a truly intelligent U-healthcare IoLT system. (2) Research problems: conventional single user–server architecture is not able to enable group conversations where “multiple patients–server” communication or “patient–patient” communication in the group is required. The communications are carried out via the open Internet, which is not a trusted channel. Since heath data and medical information are very sensitive, security and privacy concerns in the communication systems have become extremely important. (3) Purpose: the author aims to propose a dynamic group-based patient-authenticated key distribution protocol for 6G-aided U-healthcare services enabled by mobile DNA sequencing. In the protocol, an authenticated common session key is distributed by the server to the patients. Using the key, patients in a healthcare group are allowed to securely connect with the service provider or with each other for specific purposes of communication. (4) Results: the group key distribution process is protected by a secure three-factor authentication mechanism along with an efficient sequencing-device-based single sign-on (SD-SSO) solution. Based on traceable information stored in the server database, the proposed approach can provide patient-centered services which are available on multiple mobile devices. Security robustness of the proposed protocol is proven by well-known verification tools and a detailed semantic discussion. Performance evaluation shows that the protocol provides more functionality and incurs a reasonable overhead in comparison with the existing works.
36

Smith, Michael D., and Alisha Coleman-Jensen. "Food insecurity, acculturation and diagnosis of CHD and related health outcomes among immigrant adults in the USA." Public Health Nutrition 23, no. 3 (August 13, 2019): 416–31. http://dx.doi.org/10.1017/s1368980019001952.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractObjective:To deepen understanding of the relationship between food insecurity, acculturation, and diagnosis of CHD and related health outcomes among immigrant adults.Design:Using cross-sectional, nationally representative data from the National Health Interview Survey 2011 to 2015, we address two research questions. First, what is the relationship of household food insecurity and acculturation with: CHD, angina pectoris, heart attack, self-rated poor health and obesity? Second, what is the association of food insecurity with these health outcomes over years of living in the USA? We estimate multivariate logistic regressions without (question 1) and with (question 2) an interaction term between food insecurity and acculturation for CHD and related health outcomes.Setting:USA.Participants:Low-income immigrant adults.Results:Food insecurity and acculturation are both associated with diagnosis of CHD and related health outcomes among immigrant adults. Food insecurity and acculturation are associated with the health of female immigrants more than males. Also, the differences by food security status in the probability of having several poor health outcomes (self-rated heath, obesity, women’s angina pectoris) are largest for those in the USA for less than 5 years, decrease for those who have lived in the USA for 5–14 years, and are larger again for those in the USA for 15 or more years.Conclusions:Recent and long-term food-insecure immigrants are more vulnerable to CHD and related health outcomes than those in the USA for 5–14 years. Further research is needed to understand why.
37

Melanson, Richard A. "U.S. Security Assistance: The Political Process. Edited by Ernest Graves and Steven A. Hildreth. (Lexington, Mass.: D.C. Heath, 1985. Pp. xii + 192. $24.00.)." American Political Science Review 79, no. 4 (December 1985): 1240–41. http://dx.doi.org/10.2307/1956324.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Aboudouh, Khaled. "الأمن الصحِّي". Security Policy Paper 2, № 1 (31 березня 2021): 1–4. http://dx.doi.org/10.26735/cacg7069.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Kamradt-Scott, Adam. "Securing Indo-Pacific health security: Australia’s approach to regional health security." Australian Journal of International Affairs 72, no. 6 (October 15, 2018): 500–519. http://dx.doi.org/10.1080/10357718.2018.1534942.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Verma, Pulkit, and Neeraj Kumar. "COVID-19 Contact Tracing Applications: Design and Operations." International Journal of Health Sciences and Research 11, no. 4 (April 5, 2021): 1–11. http://dx.doi.org/10.52403/ijhsr.20210401.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The Digital footprint we create in our modern lives through hour handheld devices and wearable gadgets is enormous. It was little known that, in the light of the recent outburst of the pandemic, this digital footprint would play an important role in contact tracing of the infected patients. This digital encounter tracing came into existence in order to relieve the Heath Authorities from the burden of manually tracking the contacts. Different countries developed a number of contact tracing apps based on the different architectures for the same purpose. This paper analyses the different intricacies of the architectures currently in use from the perspective of information storage, division of processing, capabilities and possible security concerns. Effort has been made in order to touch upon the possible attacks in each of the architectures. The paper concludes with the future research efforts in possible optimization of the architecture and the protocols, which in turn may lead to better contact tracing and containment of pandemic. Key words: Digital Proximity, Contact Tracing, Bluetooth, GPS, DP, encryption, Anonymized, Decentralized, Open Source, PACT, DESIRE.
41

Оборин, Матвей, and Matvey Oborin. "Development features of the market of health resort services in Sverdlovsk region." Services in Russia and abroad 10, no. 1 (May 16, 2016): 54–63. http://dx.doi.org/10.12737/19169.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Development of the health resort activities on the territory of Sverdlovsk region - an important and controversial factor, which is reflected in low rates and current problems of development. They are connected with the development peculiarities of the region, natural conditions, and availability of federal and regional programs. Necessity for the organization of health resort activities related to its significant impact on the social and economic situation of the region. Sverdlovsk region is an industrial urban area that, apart from the advantages, creates certain problems for the population. These include health deterioration, increasing of mortality and morbidity, reducing of natural population growth, deterioration of health, which leads to a reduction of the rate of economic development. That is why the region needs to organize health resort activity. Recreational potential of Sverdlovsk region is considered to be healthy, and it is caused by a boundary position of the region in Europe and Asia, political stability, which guarantees the security of any type of tourist activity. In addition, the high cultural and historical heritage of the area determines the long-term development of tourism in general. Nevertheless, the author of the article notes the presence of a significant number of problems, such as the need for recreational activities in urban and industrialized territories, but civil and industrial development area limit the possibility of recreation. Load regulation system on the natural systems of certain recreation areas is absent, and it causes a significant increasing of load and violation of the integrity of ecosystems. Low development of transport infrastructure and insufficient quality of personnel training creates problems for the future development of the market of heath resort services
42

De, B., and S. Bandyopadhyay. "Influence of soil conservation techniques on growth and yield of maize (Zea mays L.) in Terai region of West Bengal." SAARC Journal of Agriculture 11, no. 1 (March 20, 2014): 133–47. http://dx.doi.org/10.3329/sja.v11i1.18390.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The climate of the terai region of West Bengal, India in general, is subtropical par humid to tropical with light textured acid soil with the problems like low moisture retention, low water use efficiency, leaching of bases, soil erosion, limited availability of multiple plant nutrients and restricted activity of beneficial soil micro-organisms. To combat these soil health related problems and to improve the overall productivity of North Bengal, a comparison between the conventional and conservation tillage was taken up and the immediate results were measured in terms of growth, yield attributes and yield. In the first two years of experimentation, though different growth attributes, grain yield, stover yield, and different yield attributing characters such as kernel rows cob-1, number of kernels row-1, 100 seed weight (g), number of seeds cob-1, girth of cob, length of cob and number of effective cob plant-1 were higher in conventional tillage as compared to conservation tillage but in terms of soil heath characteristics, conservation tillage had a meaningful remark from the initial years towards the future food security. Mulching @ 4 t ha-1 was found to have performed better than unmulched treatments. Application of 75% recommended dose of fertilizer + Vermicompost @ 10 t ha-1 resulted in better growth and yield attributes which directly influenced to have higher grain and stover yield. DOI: http://dx.doi.org/10.3329/sja.v11i1.18390 SAARC J. Agri., 11(1): 133-147 (2013)
43

Kurniawan, Faizal, Ali Maksum, Cleo Putri Al-Yusainy, and Muhammad Anas. "The Urgency of Stunting Policy Management Based on Local Knowledge in Malang Regency." Journal of Local Government Issues 7, no. 1 (March 30, 2024): 100–110. http://dx.doi.org/10.22219/logos.v7i1.25669.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In the Malang Regency region, the issue of stunting is pressing. According to statistics showing the high rate of stunting in Malang Regency, a stunting management strategy must be put into place right away. To date, the issue has been whether policies at the upstream level address all the factors necessary to combat stunting. This study talks about how urgent municipal policies are, particularly for managing stunting. It should be mentioned that government policies currently in place are focused on improving and regulating food security, food quality, and program socialization. Additionally, both targeted and delicate treatments are a manifestation of the prevention of stunting. The heath industry performs specific interventions. The phenomenology of Malang Regency's stunting prevention strategies is revealed by this study. According to the study's findings, there are a number of issues that require immediate attention, particularly those that are local in nature, like local education on the marriage readiness index, particularly in areas with a high incidence of young marriage, like Tajinan sub-district. The health sector, as well as other connected sectors, must be involved in the regional follow-up to the village level of policies and regulations that are in place at the federal level. Due to the community's increased knowledge of the value of a balanced diet and the readiness of parents at marriageable age, the community-based coping system needs to be improved once more. Localized coping strategies will undoubtedly.
44

Chesterton, Bridget María. "INTER-AMERICAN NOTES: CONFERENCES." Americas 72, no. 1 (January 2015): 149–50. http://dx.doi.org/10.1017/tam.2014.31.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Between July 23 and July 25, 2014, the University of Montevideo hosted the Fourth Jornadas Internacionales de Historia del Paraguay, with sponsorship from the Universities of Georgia, Köln, and Rennes 2. Organized by Thomas Whigham and Juan Manuel Casal, the conference included 45 presenters and 70 attendees traveling to the Uruguayan capital from the United States, Germany, Spain, Italy, Paraguay, Brazil, Chile, Uruguay, and Paraguay. Students from both the National and Catholic Universities of Asunción also took part with one of their number, Claudio José Fuentes Armadans (Universidad Católica), providing an interesting presentation on the history of the Liberal Party. First-time contributors to the conference included Carlos Gómez Florentín (SUNY Stony Brook), who discussed the environmental history of the hydroelectric complex at Itaipú, and Justin Michael Heath (University of Texas, Austin), who traced the evolution of frontier security in the early Jesuit missions. The Jornadas also benefited from repeat contributors, including Ignacio Telesca (Universidad Nacional de Formosa/CONICET), who analyzed the historical content of Paraguayan textbooks in the late nineteenth and early twentieth centuries, and Bridget María Chesterton, who discussed how the “sweet herb” ka’a he’e (stevia) has affected markets and habits of consumption in more recent times.
45

Brandon, William P., and Zachary Mohr. "Securing Social Security Solvency." Politics and the Life Sciences 38, no. 2 (2019): 144–67. http://dx.doi.org/10.1017/pls.2019.16.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractAdequate income is a social determinant of health. In the United States, only Social Security beneficiaries receive inflation-protected guaranteed income. Social Security needs another 1983 compromise in which stakeholders accepted “shared pain” to avoid insolvency. We propose indexing the benefit using the chained consumer price index (CPI) for all urban consumers and providing a one-time bonus of 8% to 10% for beneficiaries in their mid-80s, when needs become greater. The chained CPI has little impact when beneficiaries start receiving benefits, but older beneficiaries need protection. The estimated 75-year savings from this restructured benefit amount to 14.2% to 18% of Social Security deficits. Modest increases in payroll taxes and maximum earnings taxed should make up most of the shortfall. Including unearned income with wages and salaries subject to the 6.2% individual tax would produce much more revenue. The discussion explores the proposal’s political feasibility, grounding in current policy and political science literature, and the role of income as a social determinant of health.
46

Matlin, Stephen A., Alyna C. Smith, Jessica Merone, Michele LeVoy, Jalpa Shah, Frank Vanbiervliet, Stéphanie Vandentorren, Joanna Vearey, and Luciano Saso. "The Challenge of Reaching Undocumented Migrants with COVID-19 Vaccination." International Journal of Environmental Research and Public Health 19, no. 16 (August 12, 2022): 9973. http://dx.doi.org/10.3390/ijerph19169973.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Access to vaccination against a health threat such as that presented by the COVID-19 pandemic is an imperative driven, in principle, by at least three compelling factors: (1) the right to health of all people, irrespective of their status; (2) humanitarian need of undocumented migrants, as well as of others including documented migrants, refugees and displaced people who are sometimes vulnerable and living in precarious situations; and (3) the need to ensure heath security globally and nationally, which in the case of a global pandemic requires operating on the basis that, for vaccination strategies to succeed in fighting a pandemic, the highest possible levels of vaccine uptake are required. Yet some population segments have had limited access to mainstream health systems, both prior to as well as during the COVID-19 pandemic. People with irregular resident status are among those who face extremely high barriers in accessing both preventative and curative health care. This is due to a range of factors that drive exclusion, both on the supply side (e.g., systemic and practical restrictions in service delivery) and the demand side (e.g., in uptake, including due to fears that personal data would be transmitted to immigration authorities). Moreover, undocumented people have often been at increased risk of infection due to their role as “essential workers”, including those experiencing higher exposure to the SARS-CoV-2 virus due to frontline occupations while lacking protective equipment. Often, they have also been largely left out of social protection measures granted by governments to their populations during successive lockdowns. This article reviews the factors that serve as supply-side and demand-side barriers to vaccination for undocumented migrants and considers what steps need to be taken to ensure that inclusive approaches operate in practice.
47

Khodabux, Nusra, Satheesh Gangadharan, Samuel Tromans, and Avinash Hiremath. "Survey of remote consultations in psychiatry during the SARS-CoV-2 outbreak." BJPsych Open 7, S1 (June 2021): S264—S265. http://dx.doi.org/10.1192/bjo.2021.704.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AimsTo compare the usage of remote consultations before and after the first wave of the SARS-CoV-2 outbreak and explore mental health workers’ views on the usage of telemedicine.MethodAn online questionnaire survey was developed, and disseminated to mental healthcare professionals via e-mail and social media. Quantitative data were analysed using descriptive statistics and qualitative data were analysed using Braun and Clarke's six step procedure for thematic analysis.1ResultThere were 40 responses from mental healthcare professionals of varying grades from different sub-specialties, predominantly from the UK. Compared to before the SARS-CoV-2 outbreak, there was an increase in usage of telephone (9(22.5% to (29)72.5%) and video consultations (4(10%) to 17(42.5%)). Respondents reported an increase in virtual MDTs (35(87.5%) during the pandemic, 9(22.5%) pre-pandemic).Based on a 5-point Likert scale, the mean technical quality of telephone consultations was 3.56/5 (Range 2-5), with 75% rating telephone consultations as not being as good as face-to-face consultations. The mean technical quality of video consultations was 3.58/5 (Range 2-5), with 63% rating video consultations as not being as good as face-to-face consultations. 25 (62.5%) respondents felt comfortable using telephone consultations during the pandemic, 20(50%) felt comfortable using video consultations. Recurring themes identified from the qualitative data regarding reasons for the technical quality ratings were: connection issues, poor infrastructure and security concerns.Nine (23%) respondents felt that using video conferencing consultations had a detrimental impact on the mental health of patients while 14(35%) felt that telephone consultations had a detrimental impact on patients’ mental health. Recurring themes for health practitioners’ perceived effect of the use of telemedicine on patients’ mental heath were the loss of personal touch and reduced patient engagement.ConclusionThere was a substantial increase in usage of remote consultations during the first wave of the SARS-CoV-2 pandemic among mental healthcare professionals. The results reported in the present study suggest there are numerous barriers to the use of telemedicine in psychiatry, which require future exploration, ideally through interview or ethnographic studies.
48

Araújo Correia, João. "Ministério da Saúde e da Segurança Social." Medicina Interna 26, no. 4 (December 11, 2019): 271. http://dx.doi.org/10.24950/rspmi/pp/4/2019.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Boström, Martina, Marie Ernsth Bravell, Dan Lundgren, and Anita Björklund. "Promoting sense of security in old-age care." Health 05, no. 06 (2013): 56–63. http://dx.doi.org/10.4236/health.2013.56a2009.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Davies, Sara E., and Sophie Harman. "Securing Reproductive Health: A Matter of International Peace and Security." International Studies Quarterly 64, no. 2 (April 11, 2020): 277–84. http://dx.doi.org/10.1093/isq/sqaa020.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract Failure to access reproductive health care is a threat to the security of women around the world. This article offers three propositions to recognize reproductive health as a matter of international peace and security. The first is to recognize current processes of advancement and backlash politics as a silent security dilemma that undermines rights, justice, and public health based approaches to reproductive health. The second is to draw on the human security origins of global health security to reorient the concept away from protecting states to protecting individuals. Finally, a feminist approach to security is incomplete without recognising reproductive health as a threat to women's security and as a barrier to their participation in international peace and security processes. Reproductive health is central to effective peacebuilding yet remains curiously absent from the international peace and security discourse. We discuss how and why reproductive security should become integrated within the Women, Peace, and Security (WPS) agenda in order to hold states to account for reproductive health access. Reproductive security defines the urgency and threat of restricted reproductive health care to the lives of women, health-care providers, and sustained international peace and security.

До бібліографії