Objectives: We examined perceptions and behaviors associated with smoking susceptibility among adolescents in the current tobacco landscape. Methods: Participants were 8th and 10th grade ...never-smokers of conventional cigarettes (N = 19,853) from Monitoring the Future surveys
(2014-2016). Using weighted multivariable logistic regression, we examined risk factors for smoking susceptibility: alternative tobacco product use (e-cigarettes, large cigars, little cigars/cigarillos, and flavored little cigars/cigarillos), ownership of tobacco promotional items (TPIs),
access to cigarettes, perceived influence of antismoking advertisements, and perceived addictiveness of conventional cigarette smoking. Results: Among never-smokers of conventional cigarettes, 16.7% were susceptible to smoking, 6.2% were past 30-day alternative tobacco product users,
and 3.5% owned TPIs. Alternative tobacco product use, ownership of TPIs, and easy access to cigarettes were associated with increased likelihood of smoking susceptibility. Perceived great influence by antismoking ads and higher perceived addictiveness of conventional cigarette smoking were
associated with lower odds of smoking susceptibility. Conclusion: Alternative tobacco product use, ownership of TPIs, easy access to cigarettes, low influence by antismoking ads, and low perceptions of the addictiveness of conventional cigarettes are significant and actionable risk factors for smoking susceptibility among today's adolescents.
The paper is devoted to the description and experimental analysis of the new active queue management strategies. Construction of strategies is based on developing the idea of the dropping function, ...which is used in the classic series of RED accesses restriction algorithms. Three modifications of the dropping function are used: with randomization of parameters, with abandonment of structuring and with account for the service time of tasks. The
G
/
G
/1/
N
queue system, for which results of numerical experiments are given, has been chosen as an object of management. In all experiments, the efficiency of the strategies (according to various criteria) has been increased as the mentioned improvements have been implemented. The advantage of new algorithms is particularly evident in the cases of high loads.
Cloud manufacturing has recently become a hot research topic in the manufacturing industry. One of the key bottlenecks that hinders the development and application of cloud manufacturing is security. ...As the adoption and use of manufacturing cloud depends on its security mechanism to a large extent, we propose a new resource security method to enhance the security of cloud manufacturing services by providing resources exclusive access to cloud virtual machine and restricting cloud access from unauthorized users. To enable authorized users in the right location, right time and right network to access resources, a GeoAuthentication model that maps geographic location, access time, and subnetwork information into a secret key is proposed. We also propose conflict firewall in manufacturing cloud to separate users with conflict of interest.
Abstract
Objective:
To evaluate the impact of increased access restrictions to branded oxycodone hydrochloride extended-release tablets (oxycodone HCl ER), on healthcare utilization and costs in ...patients using extended-release and long-acting opioids (ER/LA opioids) from the health plan perspective during the period from 1/1/2009 to 6/30/2012.
Methods:
This retrospective cohort study analyzed claims data for adult patients from US plans that increased oxycodone HCl ER access restrictions. Study groups were segmented into commercial and Medicare payers, and by prior authorization (PA) and tier change (TC) restrictions. Six-month outpatient visits and prescription utilization and costs were evaluated during the pre- and post-access restriction periods using a bootstrapped t-test and regression to test the differences.
Results:
Mean 6-month post-restriction combined pharmacy and outpatient visit costs were $1131 (p < 0.001), $660 (p = 0.009), $699 (p < 0.001), and $564 (p < 0.001) higher than pre-restriction costs in commercial PA, commercial TC, Medicare PA, and Medicare TC groups, respectively. Outpatient visits accounted for the greatest proportion of increased costs in the access restriction groups.
Conclusions:
The results of this study suggest that oxycodone HCl ER access restrictions such as PA and TC may increase medical costs without an offsetting savings in pharmacy costs.
Nowadays, urban freight transport has become one of the most significant contributors to congestion and pollution. To combat these negative impacts, local authorities implement some restrictive ...regulations imposed on logistic enterprises about the time and area to which their vehicles can access. Under this circumstance, this paper constructed a city distribution routing optimization model considering access restriction. A Genetic Algorithm was proposed to solve the model. Numerical experiments based on the Solomons benchmark problems proved the effectiveness of the proposed model and algorithms.
Aim: To assess the impact of access restrictions on varenicline utilization. Methods: Employer-sponsored health plans contributing to the MarketScan Commercial Claims and Encounters Database were ...categorized according to 2009 varenicline access restrictions: no coverage; prior authorization; smoking cessation program requirement; no restrictions. The cohort comprised all adults continuously enrolled in plans during 2009. Each restriction cohort was compared with the no restrictions cohort using descriptive analyses. Data were assessed using logistic regression; demographic and clinical characteristics were covariates. Results: In this study (no coverage, n = 454,419; prior authorization, n = 171,530; smoking cessation program, n = 108,181; no restrictions, n = 607,389), compared with the no restrictions cohort, the odds of treatment were 71% lower (odds ratio: 0.29; 95% CI: 0.26, 0.31) in the smoking cessation program cohort (p < 0.001) and 80% lower (odds ratio: 0.20; 95% CI: 0.19, 0.22) in the prior authorization cohort (p < 0.001). Conclusions: Access restrictions were associated with significantly lower odds for varenicline utilization.
Online Medical System Using ElGamal Gupta, Shivam Kumar; Thenmalar, S.; Subha, S. T.
2023 International Conference on Computer Communication and Informatics (ICCCI),
2023-Jan.-23
Conference Proceeding
Cost-effective and secure sharing of individual health records is now possible through the use of cloud services in the healthcare sector. Storing sensitive health information in the cloud raises ...concerns about its security, necessitating an assessment of the best means of protecting this information. As a result, we propose a strategy to facilitate the exchange of private health data in the cloud, which we refer to as Enhanced Security Services. These systems ensure the confidentiality of PHRs while also protecting the patient's right to exercise autonomy over their own health information. Patients encrypt their data and store it on remote servers, allowing multiple parties access to specific sections of their medical records. Key pairs and re-encryption keys are initially generated and stored on a semi-trusted proxy and re-encryption server (SRS). This approach is safe because it uses both forward and backward access control and guards against insider threats. Using High-Level Petri Nets, we formally investigate and verify the efficacy of this strategy (HLPN). An evaluation of the personal health data methodology's efficiency suggests it can exchange data safely via the cloud.
ABSTRACT IN ENGLISH: Following the attacks of 9/11, a number of actions were taken to disrupt terrorists travels at airports. These responses have received a lot of attention, in the media and ...elsewhere. The aim of this paper is to draw a broader picture. Do these actions, often considered in isolation, add up to a control revolution? Reviewing attempts to disrupt terrorists travels both at the level of departures and arrivals, the layout of airports turns out to be a key to the question. It allows for contrasting changes that have occurred at both levels of access control. Insight is therefore gained into how technical networks relate to territories and whether this relationship has been profoundly affected by a control revolution. // ABSTRACT IN FRENCH: À la suite des attentats du 11 septembre, plusieurs actions ont été entreprises pour stopper les voyages de terroristes dans les aéroports. Ces solutions ont reçu une très grande attention, dans les médias comme ailleurs. L'objet de cet article est d'en dresser une image plus large. Ces actions, souvent considérées isolément, viennent-elles renforcer la nouvelle logique de contrôle? En analysant les tentatives pour perturber les voyages de terroristes tant au niveau des départs qu'à celui des arrivées, on voit que l'appréhension de la conception des aéroports permet de répondre à cette question. Elle tient compte des changements contrastés qui ont été opérés aux deux niveaux du contrôle à l'accès des aéroports. Ainsi, un nouvel éclairage peut être apporté sur la manière dont les réseaux techniques sont liés aux territoires et si cette relation a été profondément transformée. Reprinted by permission of the Laboratoire Techniques-Territoires-Sociétés (LATTS)
We developed a general-purpose database (DB) system that manages and opens experimental and/or observational data accumulated in universities and academic institutes. This platform works as a web-DB ...management system in which databases can be easily managed without special skills and facilities. By defining a group manager and data manager, the proposed system defines a flexible access restriction for each user and each unit of datasets under the control of these managers. We demonstrate how a variety of web-DBs are appropriately integrated under one management system in such situations in which each web-DB has a different user interface in its search and data distribution functions and is designed with a different language (or script) and connection method to its DB. In spite of the diversity of web-DBs, the proposed system is highly suitable for practical use.
Reducing access to ignition materials such as matches and lighters is a standard part of most interventions to reduce juvenile firesetting, but children of all ages are still permitted to purchase ...ignition materials, such as matches and lighters, from retail outlets. This brief research report describes the costs and consequences of the misuse of retail-obtained ignition materials by children and youth. This study shows that almost a fifth (18%) of children and adolescents referred to a specialized juvenile fire-starting program had used ignition materials that they obtained from retail outlets in their fire-starting. Moreover, their fire-starting was extensive and had caused or had the potential to cause significant injuries. In addition, their fire incidents were costly in terms of damage and community resources. Implications for fire safety education for retailers, further research, and legislative action are discussed.