Sunday, February 23, 2020

Life Experiences of the Elderly Patients with Diabetes Mellitus Research Paper

Life Experiences of the Elderly Patients with Diabetes Mellitus - Research Paper Example According to the most recent forecasts, the number of patients with different types of diabetes will reach more than 360 million globally by 2030 (Wild, Roglic, Green, Sicree, and King, 2004). The lion's share of such occurrence is attributed to the elderly population. Most likely, the main reason for high vulnerability of the elderly population to diabetes is the ageing process that leads to a broad range of physiological changes, including decreased or deteriorated functionality of vital life organs (Rother, 2007). A number of studies have been conducted up to date to explore the effects of diabetes on the general health condition of the elderly patients. However, only few works are available to investigate specific life experiences of the elderly patients with diabetes though such research is necessary to improve the quality of health care for the elderly. Various types of diabetes and chronic illnesses associated with late adulthood represent a serious challenge for modern health care practitioners. According the estimates provided by the National Academy on an Aging Society (NAAS) and APA almost 4/5 of the elder adult population suffers from at least one chronic illness, while majority of seniors have multiple chronic health problems the most common of which are arthritis, hypertension, hearing impairments, heart disease, cataracts, various types of diabetes, osteoporosis, vascular diseases, neurological diseases, including stroke, and respiratory diseases (APA, 2003). Absolute majority of these illnesses and health problems are associated with specific life experiences, psychological issues and mental health problems, which should be taken into consideration during treatment (Frazer, Leicht, & Baker, 1996). Understanding of specific life experiences of senior diabetic patients is highly essential in the clinical setting for several reasons. Firstly, it will enable the health practitioner to design a correct treatment strategy to cope with the disease and improve quality of the patient's life. Secondly, such understanding is likely to contribute greatly to the efficiency of non-clinical (social) support of the diabetic patients and decrease the occurrence of complications, such as, for example, hypoglycemic episodes. This study employs phenomenological approach to investigate the specific life experiences and meaning of life of senior patients with diabetes. Literature review There is sufficient literature addressing various aspect of diabetes and particularly its relationship with the quality of patient's life. The following review briefly describes several most notable publications that provide valuable background information in the context of this study. One of the most recent studies carried out by Peck (2003) establishes a link between several chronic illnesses including type 2 diabetes in the elderly population and quality of life. The concept of 'quality of life' covers a number of different aspects such as food preferences, level of physical activity, psychological issues and social status, etc. Besides, the author provides some credible evidence that ability of the elderly diabetic patients to effectively cope with the illness normally results in substantially improved qualify of

Friday, February 7, 2020

An Anomaly Detection Scheme for prevention of collaborative attacks Dissertation

An Anomaly Detection Scheme for prevention of collaborative attacks - Dissertation Example These systems can be networks, ISP core or P2P systems. Some of the attackers that can collaborate to paralyze a system include, Denial of Messages attacks in which corrupt nodes interfere with radio signals of the genuine nodes thus preventing them from receiving messages. Secondly, Sybil attacks in which users acquire multiple fake identities, controls various nodes of the system, and eventually controls its decisions. Finally malicious flooding where a malicious node floods the system with messages. These attackers have various characteristics that lead to inefficiency of a system. They can cause disruptions at short intervals making the system very slow to respond to any action or they can concentrate at various nodes to cause confusion to the anomaly detection system that is in place. An anomaly is the unusual or unexpected behaviors in an information system .Anomalies violate the security policies of a system and they need early detection and counteraction else, they translate into real life negative situations. An anomaly detection scheme is a technical mechanism used to protect a computer infrastructure from attacks. Recently, there are several attack detection schemes. In order to benefit fully from, the anomaly detection concept, there should be additional security features like the authentication and access control protocols. An attack Detection System is a very important part of the entire system when developed with security in mind. The Anomaly Detection Schemes is not a new concept but it is in various applications with a promise of viable results. Lazarevic et al. (2003) compared various Anomaly Detection Schemes in a network to perform execution of data that was suspicious. Most of the organizations have adopted a system that suits them in detection and prevention of attacks .An example of such a system is the Intrusion Prevention System, which is very useful in preventing the Distributed Denial of Service attacks. Detection and prevention of th e collaborative attacks depends on several factors. Another such system is the STAND system, which is an improved version of CAD sensors discussed later in the prose. Change in time domain: All detection schemes require enough time for discovery of the attack and reaction to it. The attacks can be automatic, manual or semi-automatic. Automatic attacks leave no communication duration to the machine that is about to take place. The time parameters that determine the effect of an attack are reaction time; detection time and the response time. Many of the attackers make use of slow time dynamics of transmission time out. Here the attacker sends short-term bursts. In order to overcome the attackers in good time, there should be a means for real-time attack classification and a defense mechanism. This means that data mining by the detection system should be real-time, putting into consideration efficiency, accuracy, and usability, (Axelsson, 1999). To ensure high accuracy in a short time, data mining process uses programs that analyze the data and at the same time distinguish between genuine actions and malicious attacks. To ensure high efficiency, the costs of the extracted features are calculated and the cost approach is useful in production of efficient detection model. Usability improvement is by adapting algorithms that that facilitate fast updating of the system to enhance quick attack detection (Barbara et al., 2001; Barbara et al., 2002). Audit data analysis and mining (ADAM) is the system that proposes use of data