Search results for: attacks and controls
1315 Experimental Analysis of Control in Electric Vehicle Charging Station Based Grid Tied Photovoltaic-Battery System
Authors: A. Hassoune, M. Khafallah, A. Mesbahi, T. Bouragba
Abstract:
This work presents an improved strategy of control for charging a lithium-ion battery in an electric vehicle charging station using two charger topologies i.e. single ended primary inductor converter (SEPIC) and forward converter. In terms of rapidity and accuracy, the power system consists of a topology/control diagram that would overcome the performance constraints, for instance the power instability, the battery overloading and how the energy conversion blocks would react efficiently to any kind of perturbations. Simulation results show the effectiveness of the proposed topologies operated with a power management algorithm based on voltage/peak current mode controls. In order to provide credible findings, a low power prototype is developed to test the control strategy via experimental evaluations of the converter topology and its controls.Keywords: battery storage buffer, charging station, electric vehicle, experimental analysis, management algorithm, switches control
Procedia PDF Downloads 1651314 Hybridization of Mathematical Transforms for Robust Video Watermarking Technique
Authors: Harpal Singh, Sakshi Batra
Abstract:
The widespread and easy accesses to multimedia contents and possibility to make numerous copies without loss of significant fidelity have roused the requirement of digital rights management. Thus this problem can be effectively solved by Digital watermarking technology. This is a concept of embedding some sort of data or special pattern (watermark) in the multimedia content; this information will later prove ownership in case of a dispute, trace the marked document’s dissemination, identify a misappropriating person or simply inform user about the rights-holder. The primary motive of digital watermarking is to embed the data imperceptibly and robustly in the host information. Extensive counts of watermarking techniques have been developed to embed copyright marks or data in digital images, video, audio and other multimedia objects. With the development of digital video-based innovations, copyright dilemma for the multimedia industry increases. Video watermarking had been proposed in recent years to serve the issue of illicit copying and allocation of videos. It is the process of embedding copyright information in video bit streams. Practically video watermarking schemes have to address some serious challenges as compared to image watermarking schemes like real-time requirements in the video broadcasting, large volume of inherently redundant data between frames, the unbalance between the motion and motionless regions etc. and they are particularly vulnerable to attacks, for example, frame swapping, statistical analysis, rotation, noise, median and crop attacks. In this paper, an effective, robust and imperceptible video watermarking algorithm is proposed based on hybridization of powerful mathematical transforms; Fractional Fourier Transform (FrFT), Discrete Wavelet transforms (DWT) and Singular Value Decomposition (SVD) using redundant wavelet. This scheme utilizes various transforms for embedding watermarks on different layers by using Hybrid systems. For this purpose, the video frames are portioned into layers (RGB) and the watermark is being embedded in two forms in the video frames using SVD portioning of the watermark, and DWT sub-band decomposition of host video, to facilitate copyright safeguard as well as reliability. The FrFT orders are used as the encryption key that allows the watermarking method to be more robust against various attacks. The fidelity of the scheme is enhanced by introducing key generation and wavelet based key embedding watermarking scheme. Thus, for watermark embedding and extraction, same key is required. Therefore the key must be shared between the owner and the verifier via some safe network. This paper demonstrates the performance by considering different qualitative metrics namely Peak Signal to Noise ratio, Structure similarity index and correlation values and also apply some attacks to prove the robustness. The Experimental results are presented to demonstrate that the proposed scheme can withstand a variety of video processing attacks as well as imperceptibility.Keywords: discrete wavelet transform, robustness, video watermarking, watermark
Procedia PDF Downloads 2241313 Oxidative Antioxidative Status and DNA Damage Profile Induced by Chemotherapy in Algerian Children with Lymphoma
Authors: Assia Galleze, Abdurrahim Kocyigit, Nacira Cherif, Nidel Benhalilou, Nabila Attal, Chafia Touil Boukkoffa, Rachida Raache
Abstract:
Introduction and aims: Chemotherapeutic agents used to inhibit cell division and reduce tumor growth, increase reactive oxygen species levels, which contributes to their genotoxicity [1]. The comet assay is an inexpensive and rapid method to detect the damage at cellular levels and has been used in various cancer populations undergoing chemotherapy [2,3]. The present study aim to assess the oxidative stress and the genotoxicity induced by chemotherapy by the determination of plasma malondialdehyde (MDA) level, protein carbonyl (PC) content, superoxide dismutase (SOD) activity and lymphocyte DNA damage in Algerian children with lymphoma. Materials and Methods: For our study, we selected thirty children with lymphoma treated in university hospital of Beni Messous, Algeria, and fifty unrelated subjects as controls, after obtaining the informed consent in accordance with the Declaration of Helsinki (1964). Plasma levels of MDA, PC and SOD activity were spectrophotometrically measured, while DNA damage was assessed by alkaline comet assay in peripheral blood leukocytes. Results and Discussion: Plasma MDA, PC levels and lymphocyte DNA damage, were found to be significantly higher in lymphoma patients than in controls (p < 0.001). Whereas, SOD activity in lymphoma patients was significantly lower than in healthy controls (p < 0.001). There were significant positive correlations between DNA damage, MDA and PC in patients (r = 0.96, p < 0.001, r = 0.97, p < 0.001, respectively), and negative correlation with SOD (r = 0.87, p < 0.01). Conclusion and Perspective: Our results indicated that, leukocytes DNA damage and oxidative stress were significantly higher in lymphoma patients, suggesting that the direct effect of chemotherapy and the alteration of the redox balance may influence oxidative/antioxidative status.Keywords: chemotherapy, comet assay, DNA damage, lymphoma
Procedia PDF Downloads 1371312 The Neurofunctional Dissociation between Animal and Tool Concepts: A Network-Based Model
Authors: Skiker Kaoutar, Mounir Maouene
Abstract:
Neuroimaging studies have shown that animal and tool concepts rely on distinct networks of brain areas. Animal concepts depend predominantly on temporal areas while tool concepts rely on fronto-temporo-parietal areas. However, the origin of this neurofunctional distinction for processing animal and tool concepts remains still unclear. Here, we address this question from a network perspective suggesting that the neural distinction between animals and tools might reflect the differences in their structural semantic networks. We build semantic networks for animal and tool concepts derived from McRae and colleagues’s behavioral study conducted on a large number of participants. These two networks are thus analyzed through a large number of graph theoretical measures for small-worldness: centrality, clustering coefficient, average shortest path length, as well as resistance to random and targeted attacks. The results indicate that both animal and tool networks have small-world properties. More importantly, the animal network is more vulnerable to targeted attacks compared to the tool network a result that correlates with brain lesions studies.Keywords: animals, tools, network, semantics, small-worls, resilience to damage
Procedia PDF Downloads 5431311 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks
Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba
Abstract:
The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.Keywords: authentication, long term evolution, security, vehicle-to-everything
Procedia PDF Downloads 1671310 The Causes and Consequences of Anti-muslim Prejudice: Evidence from a National Scale Longitudinal Study in New Zealand
Authors: Aarif Rasheed, Joseph Bulbulia
Abstract:
Western democracies exhibit signs of distinctive anti-Muslim prejudice, but little is known about its causes and effects on Muslim minorities. Here, drawing on nine years of responses from a nationally representative longitudinal sample of New Zealanders (New Zealand Attitudes and Values Study, N > 31,000), we systematically investigate the demographic and ideological predictors of factors that predict both positive and negative change in Muslim attitudes. First, we find that that education, moderate and liberal political ideology, and positive views about religion predict greater Muslim acceptance. Second, we find a there though there is a general trend for increasing acceptance over nine years, we find evidence of increasing extremism at the margins. Third, focusing on the Muslim sub-sample and comparing it to other religious sub-groups, we find substantially higher reports of perceived anti-religious prejudice. Collectively, these results point to serious challenges to the health of New Zealand as a democracy where people can worship freely without discrimination. Finally, we find consistency in our responses with the reported experiences of victims of the Christchurch attacks, in terms of harassment, assault, slurs, and other hostile behaviour both before and after the attacks.Keywords: democracy, longitudinal, Muslim, panel data, prejudice
Procedia PDF Downloads 1431309 Survival Analysis after a First Ischaemic Stroke Event: A Case-Control Study in the Adult Population of England.
Authors: Padma Chutoo, Elena Kulinskaya, Ilyas Bakbergenuly, Nicholas Steel, Dmitri Pchejetski
Abstract:
Stroke is associated with a significant risk of morbidity and mortality. There is scarcity of research on the long-term survival after first-ever ischaemic stroke (IS) events in England with regards to effects of different medical therapies and comorbidities. The objective of this study was to model the all-cause mortality after an IS diagnosis in the adult population of England. Using a retrospective case-control design, we extracted the electronic medical records of patients born prior to or in year 1960 in England with a first-ever ischaemic stroke diagnosis from January 1986 to January 2017 within the Health and Improvement Network (THIN) database. Participants with a history of ischaemic stroke were matched to 3 controls by sex and age at diagnosis and general practice. The primary outcome was the all-cause mortality. The hazards of the all-cause mortality were estimated using a Weibull-Cox survival model which included both scale and shape effects and a shared random effect of general practice. The model included sex, birth cohort, socio-economic status, comorbidities and medical therapies. 20,250 patients with a history of IS (cases) and 55,519 controls were followed up to 30 years. From 2008 to 2015, the one-year all-cause mortality for the IS patients declined with an absolute change of -0.5%. Preventive treatments to cases increased considerably over time. These included prescriptions of statins and antihypertensives. However, prescriptions for antiplatelet drugs decreased in the routine general practice since 2010. The survival model revealed a survival benefit of antiplatelet treatment to stroke survivors with hazard ratio (HR) of 0.92 (0.90 – 0.94). IS diagnosis had significant interactions with gender and age at entry and hypertension diagnosis. IS diagnosis was associated with high risk of all-cause mortality with HR= 3.39 (3.05-3.72) for cases compared to controls. Hypertension was associated with poor survival with HR = 4.79 (4.49 - 5.09) for hypertensive cases relative to non-hypertensive controls, though the detrimental effect of hypertension has not reached significance for hypertensive controls, HR = 1.19(0.82-1.56). This study of English primary care data showed that between 2008 and 2015, the rates of prescriptions of stroke preventive treatments increased, and a short-term all-cause mortality after IS stroke declined. However, stroke resulted in poor long-term survival. Hypertension, a modifiable risk factor, was found to be associated with poor survival outcomes in IS patients. Antiplatelet drugs were found to be protective to survival. Better efforts are required to reduce the burden of stroke through health service development and primary prevention.Keywords: general practice, hazard ratio, health improvement network (THIN), ischaemic stroke, multiple imputation, Weibull-Cox model.
Procedia PDF Downloads 1861308 Power System Cyber Security Risk in the Era of Digital Transformation
Authors: Rafat Rob, Khaled Alotaibi, Dana Nour, Abdullah Albadrani, Abdulmohsen Mulhim
Abstract:
Power systems digitization solutions provides a comprehensive smart, cohesive, interconnected network, extensive connectivity between digital assets, physical power plants, and resources to form digital economies. However, digitization has exposed the classical air gapped power plants to the rapid spread of cyber threats and attacks in the process delaying and forcing many organizations to rethink their cyber security policies and standards before they can augment their operation the new advanced digital devices. Cyber Security requirements for power systems (and industry control systems therein) demand a new approach, unique methodology, and design process that is completely different to Cyber Security measures designed for the IT systems. In practice, Cyber Security strategy, as applied to power systems, tends to be closely aligned to those measures applied for IT system purposes. The differentiator for Cyber Security in terms of power systems are the physical assets and applications used, alongside the ever-growing rate of expansion within the industry controls sector (in comparison to the relatively saturated growth observed for corporate IT systems). These factors increase the magnitude of the cyber security risk within such systems. The introduction of smart devices and sensors along the grid initiate vulnerable entry points to the systems. Every installed Smart Meter is a target; the way these devices communicate with each other may instigate a Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack. Attacking one sensor or meter has the potential to propagate itself throughout the power grid reaching the IT network, where it may manifest itself as a malware infiltration.Keywords: supply chain, cybersecurity, maturity model, risk, smart grid
Procedia PDF Downloads 1141307 Nature of Body Image Distortion in Eating Disorders
Authors: Katri K. Cornelissen, Lise Gulli Brokjob, Kristofor McCarty, Jiri Gumancik, Martin J. Tovee, Piers L. Cornelissen
Abstract:
Recent research has shown that body size estimation of healthy women is driven by independent attitudinal and perceptual components. The attitudinal component represents psychological concerns about body, coupled to low self-esteem and a tendency towards depressive symptomatology, leading to over-estimation of body size, independent of the Body Mass Index (BMI) someone actually has. The perceptual component is a normal bias known as contraction bias, which, for bodies is dependent on actual BMI. Women with a BMI less than the population norm tend to overestimate their size, while women with a BMI greater than the population norm tend to underestimate their size. Women whose BMI is close to the population mean are most accurate. This is indexed by a regression of estimated BMI on actual BMI with a slope less than one. It is well established that body dissatisfaction, i.e. an attitudinal distortion, leads to body size overestimation in eating disordered individuals. However, debate persists as to whether women with eating disorders may also suffer a perceptual body distortion. Therefore, the current study was set to ask whether women with eating disorders exhibit the normal contraction bias when they estimate their own body size. If they do not, this would suggest differences in the way that women with eating disorders process the perceptual aspects of body shape and size in comparison to healthy controls. 100 healthy controls and 33 women with a history of eating disorders were recruited. Critically, it was ensured that both groups of participants represented comparable and adequate ranges of actual BMI (e.g. ~18 to ~40). Of those with eating disorders, 19 had a history of anorexia nervosa, 6 bulimia nervosa, and 8 OSFED. 87.5% of the women with a history of eating disorders self-reported that they were either recovered or recovering, and 89.7% of them self-reported that they had had one or more instances of relapse. The mean time lapsed since first diagnosis was 5 years and on average participants had experienced two relapses. Participants were asked to fill number of psychometric measures (EDE-Q, BSQ, RSE, BDI) to establish the attitudinal component of their body image as well as their tendency to internalize socio-cultural body ideals. Additionally, participants completed a method of adjustment psychophysical task, using photorealistic avatars calibrated for BMI, in order to provide an estimate of their own body size and shape. The data from the healthy controls replicate previous findings, revealing independent contributions to body size estimation from both attitudinal and perceptual (i.e. contraction bias) body image components, as described above. For the eating disorder group, once the adequacy of their actual BMI ranges was established, a regression of estimated BMI on actual BMI had a slope greater than 1, significantly different to that from controls. This suggests that (some) eating disordered individuals process the perceptual aspects of body image differently from healthy controls. It therefore is necessary to develop interventions which are specific to the perceptual processing of body shape and size for the management of (some) individuals with eating disorders.Keywords: body image distortion, perception, recovery, relapse, BMI, eating disorders
Procedia PDF Downloads 681306 Relationship between Matrilin-3 (MATN-3) Gene Single Nucleotide Six Polymorphism, Transforming Growth Factor Beta 2 and Radiographic Grading in Primary Osteoarthritis
Authors: Heba Esaily, Rawhia Eledl, Daila Aboelela, Rasha Noreldin
Abstract:
Objective: Assess serum level of Transforming growth factor beta 2 (TGF-β2) and Matrilin-3 (MATN3) SNP6 polymorphism in osteoarthritic patients Background: Osteoarthritis (OA) is a musculoskeletal disease characterized by pain and joint stiffness. TGF-β 2 is involved in chondrogenesis and osteogenesis, It has found that MATN3 gene and protein expression was correlated with the extent of tissue damage in OA. Findings suggest that regulation of MATN3 expression is essential for maintenance of the cartilage extracellular matrix microenvironment Subjects and Methods: 72 cases of primary OA (56 with knee OA and 16 with generalized OA were compared with that of 18 healthy controls. Radiographs were scored with the Kellgren-Lawrence scale. Serum TGF-β2 was measured by using (ELISA), levels of marker were correlated to radiographic grading of disease and MATN3 SNP6 polymorphism was determined by (PCR-RFLP). Results: MATN3 SNP6 polymorphism and serum level of TGF-β2 were higher in OA compared with controls. Genotype, NN and N allele frequency were higher in patients with OA compared with controls. NN genotype and N allele frequency were higher in knee osteoarthritis than generalized OA. Significant positive correlation between level of TGFβ2 and radiographic grading in group with knee OA, but no correlation between serum level of TGFβ2 and radiographic grading in generalized OA. Conclusion: MATN3 SNP6 polymorphism and TGF-β2 implicated in the pathogenesis of osteoarthritis. Association of N/N genotype with primary osteoarthritis emphasizes on the need for prospective study include larger sample size to confirm the results of the present study.Keywords: Matrilin-3, transforming growth factor beta 2, primary osteoarthritis, knee osteoarthritis
Procedia PDF Downloads 2691305 An Improved Method on Static Binary Analysis to Enhance the Context-Sensitive CFI
Authors: Qintao Shen, Lei Luo, Jun Ma, Jie Yu, Qingbo Wu, Yongqi Ma, Zhengji Liu
Abstract:
Control Flow Integrity (CFI) is one of the most promising technique to defend Code-Reuse Attacks (CRAs). Traditional CFI Systems and recent Context-Sensitive CFI use coarse control flow graphs (CFGs) to analyze whether the control flow hijack occurs, left vast space for attackers at indirect call-sites. Coarse CFGs make it difficult to decide which target to execute at indirect control-flow transfers, and weaken the existing CFI systems actually. It is an unsolved problem to extract CFGs precisely and perfectly from binaries now. In this paper, we present an algorithm to get a more precise CFG from binaries. Parameters are analyzed at indirect call-sites and functions firstly. By comparing counts of parameters prepared before call-sites and consumed by functions, targets of indirect calls are reduced. Then the control flow would be more constrained at indirect call-sites in runtime. Combined with CCFI, we implement our policy. Experimental results on some popular programs show that our approach is efficient. Further analysis show that it can mitigate COOP and other advanced attacks.Keywords: contex-sensitive, CFI, binary analysis, code reuse attack
Procedia PDF Downloads 3231304 Xeroderma Pigmentosum Group G: Gene Polymorphism and Risk of Breast Cancer
Authors: Malik SS, Masood N, Mubarik S, Khadim TM
Abstract:
Introduction: Xeroderma pigmentosum group G (XPG) gene plays a crucial role in the correction of UV-induced DNA damage through nucleotide excision repair pathway. Single nucleotide polymorphisms in XPG gene have been reported to be associated with different cancers. Current case-control study was designed to evaluate the relationship between one of the most frequently found XPG (rs1047768 T>C) polymorphism and breast cancer risk. Methodology: A total of 200 individuals were screened for this polymorphism including 100 pathologically confirmed breast cancer cases and age-matched 100 controls. Genotyping was carried out using Tetra amplification-refractory mutation system (ARMS) PCR and results were confirmed by gel electrophoresis. Results: Conditional logistic regression analysis showed significant association between TC genotype (OR: 8.9, CI: 2.0 – 38.7) and increased breast cancer risk. Although homozygous CC genotype was more frequent in patients as compared to controls, but it was statistically non-significant (OR: 3.9, CI: 0.4 – 35.7). Conclusion: In conclusion, XPG (rs1047768 T>C) polymorphism may contribute towards increased risk of breast cancer but other polymorphisms may also be evaluated to elucidate their role in breast cancer.Keywords: XPG, breast cancer, NER, ARMS-PCR
Procedia PDF Downloads 1881303 Money Laundering and Financing of Terrorism
Authors: Covadonga Mallada Fernández
Abstract:
Economic development and globalization of international markets have created a favourable atmosphere for the emergence of new forms of crime such as money laundering or financing of terrorism, which may contribute to destabilized and damage economic systems. In particular, money laundering have acquired great importance since the 11S attacks, what has caused on the one hand, the establishment and development of preventive measures and, on the other hand, a progressive hardening of penal measures. Since then, the regulations imposed to fight against money laundering have been viewed as key components also in the fight against terrorist financing. Terrorism, at the beginning, was a “national” crime connected with internal problems of the State (for instance the RAF in Germany or ETA in Spain) but in the last 20 years has started to be an international problem that is connected with the defence and security of the States. Therefore, the new strategic concept for the defense and security of NATO has a comprehensive list of security threats to the Alliance, such as terrorism, international instability, money laundering or attacks on cyberspace, among others. With this new concept, money laundering and terrorism has become a priority in the national defense. In this work we will analyze the methods to combat these new threats to the national security. We will study the preventive legislations to combat money laundering and financing of terrorism, the UIF that exchange information between States, and the hawala-Banking.Keywords: control of financial flows, money laundering, terrorism, financing of terrorism
Procedia PDF Downloads 4541302 MiR-200a/ZEB1 Pathway in Liver Fibrogenesis of Biliary Atresia
Authors: Hai-Ying Liu, Yi-Hao Chen, Shu-Yin Pang, Feng-Hua Wang, Xiao-Fang Peng, Li-Yuan Yang, Zheng-Rong Chen, Yi Chen, Bing Zhu
Abstract:
Objective: Biliary atresia (BA) is characterized by progressive liver fibrosis. Epithelial-mesenchymal transition (EMT) has been implicated as a key mechanism in the pathogenesis of organ fibrosis. MiR-200a has been shown to repress EMT. We aim to explore the role of miR-200a in the fibrogenesis of BA. Methods: We obtained the plasma samples and liver samples from patients with BA or controls to examine the role of miR-200a. Histological liver fibrosis was assessed using the Ishak fibrosis scores. Reverse transcription quantitative polymerase chain reaction (RT-qPCR) was performed to detect the expression of miR-200a in plasma. We also evaluated the expression of miR-200a in liver tissues using tyramide signal amplification fluorescence in situ hybridization (TSA-FISH). The expression of EMT related proteins zinc finger E-box-binding homeobox 1 (ZEB1), E-cadherin and α-smooth muscle actin (α-SMA) in the liver sections were detected by immunohistochemical staining. Results: We found that the expression of miR-200a was both elevated in the plasma and liver tissues from BA patients compared with the controls. The hepatic expression of ZEB1 and α-SMA were markedly increased in the liver sections from BA patients compared to the controls, whereas E-cadherin was downregulated in the BA group. Simultaneously, we noted that the hepatic expression of miR-200a, E-cadherin and α-SMA were upregulated with the progression of liver fibrosis in the BA group, while ZEB1 was downregulated with the progression of liver fibrosis in BA patients. Conclusion: These findings suggest EMT has a critical effect on the fibrotic process of BA, and the interaction between miR-200a and ZEB1 may regulate EMT and eventually influence liver fibrogenesis of BA.Keywords: biliary atresia, liver fibrosis, MicroRNA, epithelial-mesenchymal transition, zinc finger E-box-binding homeobox 1
Procedia PDF Downloads 3591301 Probability Sampling in Matched Case-Control Study in Drug Abuse
Authors: Surya R. Niraula, Devendra B Chhetry, Girish K. Singh, S. Nagesh, Frederick A. Connell
Abstract:
Background: Although random sampling is generally considered to be the gold standard for population-based research, the majority of drug abuse research is based on non-random sampling despite the well-known limitations of this kind of sampling. Method: We compared the statistical properties of two surveys of drug abuse in the same community: one using snowball sampling of drug users who then identified “friend controls” and the other using a random sample of non-drug users (controls) who then identified “friend cases.” Models to predict drug abuse based on risk factors were developed for each data set using conditional logistic regression. We compared the precision of each model using bootstrapping method and the predictive properties of each model using receiver operating characteristics (ROC) curves. Results: Analysis of 100 random bootstrap samples drawn from the snowball-sample data set showed a wide variation in the standard errors of the beta coefficients of the predictive model, none of which achieved statistical significance. One the other hand, bootstrap analysis of the random-sample data set showed less variation, and did not change the significance of the predictors at the 5% level when compared to the non-bootstrap analysis. Comparison of the area under the ROC curves using the model derived from the random-sample data set was similar when fitted to either data set (0.93, for random-sample data vs. 0.91 for snowball-sample data, p=0.35); however, when the model derived from the snowball-sample data set was fitted to each of the data sets, the areas under the curve were significantly different (0.98 vs. 0.83, p < .001). Conclusion: The proposed method of random sampling of controls appears to be superior from a statistical perspective to snowball sampling and may represent a viable alternative to snowball sampling.Keywords: drug abuse, matched case-control study, non-probability sampling, probability sampling
Procedia PDF Downloads 4931300 Effects of Plant Growth Promoting Rhizobacteria on the Yield and Nutritive Quality of Tomato Fruits
Authors: Narjes Dashti, Nida Ali, Magdy Montasser, Vineetha Cherian
Abstract:
The influence of two PGPR strains, Pseudomonas aeruginosa and Stenotrophomonas rhizophilia, on fruit yields, pomological traits and chemical contents of tomato (Solanum lycopersicum) fruits were studied. The study was conducted separately on two different cultivar varieties of tomato, namely Supermarmande and UC82B. The results indicated that the presence of the PGPR almost doubled the average yield per plant. There was a significant improvement in the pomological qualities of the PGPR treated tomato fruits compared to the corresponding healthy treatments especially in traits such as the average fruit weight, height, and fruit volume. The chemical analysis of tomato fruits revealed that the presence of the PGPRs increased the total protein, lycopene, alkalinity and phenol content of the tomato fruits compared to the healthy controls. They had no influence on the reduced sugar, total soluble solids or the titerable acid content of fruits. However their presence reduced the amount of ascorbic acid in tomato fruits compared to the healthy controls.Keywords: PGPR, tomato, fruit quality
Procedia PDF Downloads 3291299 Investigation of External Pressure Coefficients on Large Antenna Parabolic Reflector Using Computational Fluid Dynamics
Authors: Varun K, Pramod B. Balareddy
Abstract:
Estimation of wind forces plays a significant role in the in the design of large antenna parabolic reflectors. Reflector surface accuracies are very sensitive to the gain of the antenna system at higher frequencies. Hence accurate estimation of wind forces becomes important, which is primary input for design and analysis of the reflector system. In the present work, numerical simulation of wind flow using Computational Fluid Dynamics (CFD) software is used to investigate the external pressure coefficients. An extensive comparative study has been made between the CFD results and the published wind tunnel data for different wind angle of attacks (α) acting over concave to convex surfaces respectively. Flow simulations using CFD are carried out to estimate the coefficients of Drag, Lift and Moment for the parabolic reflector. Coefficients of pressures (Cp) over the front and the rear face of the reflector are extracted over surface of the reflector to study the net pressure variations. These resultant pressure variations are compared with the published wind tunnel data for different angle of attacks. It was observed from the CFD simulations, both convex and concave face of reflector system experience a band of pressure variations for the positive and negative angle of attacks respectively. In the published wind tunnel data, Pressure variations over convex surfaces are assumed to be uniform and vice versa. Chordwise and spanwise pressure variations were calculated and compared with the published experimental data. In the present work, it was observed that the maximum pressure coefficients for α ranging from +30° to -90° and α=+90° was lower. For α ranging from +45° to +75°, maximum pressure coefficients were higher as compared to wind tunnel data. This variation is due to non-uniform pressure distribution observed over front and back faces of reflector. Variations in Cd, Cl and Cm over α=+90° to α=-90° was in close resemblance with the experimental data.Keywords: angle of attack, drag coefficient, lift coefficient, pressure coefficient
Procedia PDF Downloads 2571298 Numerical Study of Steel Structures Responses to External Explosions
Authors: Mohammad Abdallah
Abstract:
Due to the constant increase in terrorist attacks, the research and engineering communities have given significant attention to building performance under explosions. This paper presents a methodology for studying and simulating the dynamic responses of steel structures during external detonations, particularly for accurately investigating the impact of incrementing charge weight on the members total behavior, resistance and failure. Prediction damage method was introduced to evaluate the damage level of the steel members based on five scenarios of explosions. Johnson–Cook strength and failure model have been used as well as ABAQUS finite element code to simulate the explicit dynamic analysis, and antecedent field tests were used to verify the acceptance and accuracy of the proposed material strength and failure model. Based on the structural response, evaluation criteria such as deflection, vertical displacement, drift index, and damage level; the obtained results show the vulnerability of steel columns and un-braced steel frames which are designed and optimized to carry dead and live load to resist and endure blast loading.Keywords: steel structure, blast load, terrorist attacks, charge weight, damage level
Procedia PDF Downloads 3641297 Toward an Understanding of the Neurofunctional Dissociation between Animal and Tool Concepts: A Graph Theoretical Analysis
Authors: Skiker Kaoutar, Mounir Maouene
Abstract:
Neuroimaging studies have shown that animal and tool concepts rely on distinct networks of brain areas. Animal concepts depend predominantly on temporal areas while tool concepts rely on fronto-temporo-parietal areas. However, the origin of this neurofunctional distinction for processing animal and tool concepts remains still unclear. Here, we address this question from a network perspective suggesting that the neural distinction between animals and tools might reflect the differences in their structural semantic networks. We build semantic networks for animal and tool concepts derived from Mc Rae and colleagues’s behavioral study conducted on a large number of participants. These two networks are thus analyzed through a large number of graph theoretical measures for small-worldness: centrality, clustering coefficient, average shortest path length, as well as resistance to random and targeted attacks. The results indicate that both animal and tool networks have small-world properties. More importantly, the animal network is more vulnerable to targeted attacks compared to the tool network a result that correlates with brain lesions studies.Keywords: animals, tools, network, semantics, small-world, resilience to damage
Procedia PDF Downloads 5471296 Optimized and Secured Digital Watermarking Using Entropy, Chaotic Grid Map and Its Performance Analysis
Authors: R. Rama Kishore, Sunesh
Abstract:
This paper presents an optimized, robust, and secured watermarking technique. The methodology used in this work is the combination of entropy and chaotic grid map. The proposed methodology incorporates Discrete Cosine Transform (DCT) on the host image. To improve the imperceptibility of the method, the host image DCT blocks, where the watermark is to be embedded, are further optimized by considering the entropy of the blocks. Chaotic grid is used as a key to reorder the DCT blocks so that it will further increase security while selecting the watermark embedding locations and its sequence. Without a key, one cannot reveal the exact watermark from the watermarked image. The proposed method is implemented on four different images. It is concluded that the proposed method is giving better results in terms of imperceptibility measured through PSNR and found to be above 50. In order to prove the effectiveness of the method, the performance analysis is done after implementing different attacks on the watermarked images. It is found that the methodology is very strong against JPEG compression attack even with the quality parameter up to 15. The experimental results are confirming that the combination of entropy and chaotic grid map method is strong and secured to different image processing attacks.Keywords: digital watermarking, discreate cosine transform, chaotic grid map, entropy
Procedia PDF Downloads 2531295 Gene Distribution of CB1 Receptor rs2023239 in Thailand Cannabis Patients
Authors: Tanyaporn Chairoch
Abstract:
Introduction: Cannabis is a drug to treat patients with many diseases such as Multiple sclerosis, Alzheimer’s disease, and Epilepsy, where theycontain many active compounds such as delta-9 tetrahydrocannabinol (THC) and cannabidiol (CBD). Especially, THC is the primary psychoactive ingredient in cannabis and binds to cannabinoid 1 (CB1) receptors. Moreover, CB1 is located on the neocortex, hippocampus, basal ganglia, cerebellum, and brainstem. In previous study, we found the association between the variant of CB1recptors gene (rs2023239) and decreased effect of nicotine reinforcement in patients. However, there are no data describing whether the distribution of CB1 receptor gene is a genetic marker for Thai patients who are treated with cannabis. Objective: Thus, the aim of this study we want to investigate the frequency of the CB1 receptor gene in Thai patients. Materials and Methods: All of sixty Thai patients received the medical cannabis for treatment who were recruited in this study. DNA will be extracted from EDTA whole blood by Genomic DNA Mini Kit. The genotyping of CNR1 gene (rs 2023239) was genotyped by the TaqMan real time PCR assay (ABI, Foster City, CA, USA).and using the real-time PCR ViiA7 (ABI, Foster City, CA, USA). Results: We found thirty-eight (63.3%) Thai patients were female, and twenty-two (36.70%) were male in this study with median age of 45.8 (range19 – 87 ) years. Especially, thirty-two (53.30%) medical cannabis tolerant controls were female ( 55%) and median age of52.1 (range 27 – 79 ) years. The most adverse effects for medical cannabis treatment was tachycardia. Furthermore, the number of rs 2023239 (TT) carriers was 26 of 27 (96.29%) in medical cannabis-induced adverse effects and 32 of 33 (96.96%) in tolerant controls. Additionally, rs 2023239 (CT) variant was found just only one of twenty-seven (3.7%) in medical cannabis-induced adverse effects and 1 of 33 (3.03%) in tolerant controls. Conclusions: The distribution of genetic variant in CNR1 gene might serve as a pharmacogenetics markers for screening before initiating the therapy with medical cannabis in Thai patients.Keywords: cannabis, pharmacogenetics, CNR1 gene, thai patient
Procedia PDF Downloads 1101294 Enhancing Human Mobility Exoskeleton Comfort Using Admittance Controller
Authors: Alexandre Rabaseda, Emelie Seguin, Marc Doumit
Abstract:
Human mobility exoskeletons have been in development for several years and are becoming increasingly efficient. Unfortunately, user comfort was not always a priority design criterion throughout their development. To further improve this technology, exoskeletons should operate and deliver assistance without causing discomfort to the user. For this, improvements are necessary from an ergonomic point of view. The device’s control method is important when endeavoring to enhance user comfort. Exoskeleton or rehabilitation device controllers use methods of control called interaction controls (admittance and impedance controls). This paper proposes an extended version of an admittance controller to enhance user comfort. The control method used consists of adding an inner loop that is controlled by a proportional-integral-derivative (PID) controller. This allows the interaction force to be kept as close as possible to the desired force trajectory. The force-tracking admittance controller modifies the actuation force of the system in order to follow both the desired motion trajectory and the desired relative force between the user and the exoskeleton.Keywords: mobility assistive device, exoskeleton, force-tracking admittance controller, user comfort
Procedia PDF Downloads 1561293 Numerical Regularization of Ill-Posed Problems via Hybrid Feedback Controls
Authors: Eugene Stepanov, Arkadi Ponossov
Abstract:
Many mathematical models used in biological and other applications are ill-posed. The reason for that is the nature of differential equations, where the nonlinearities are assumed to be step functions, which is done to simplify the analysis. Prominent examples are switched systems arising from gene regulatory networks and neural field equations. This simplification leads, however, to theoretical and numerical complications. In the presentation, it is proposed to apply the theory of hybrid feedback controls to regularize the problem. Roughly speaking, one attaches a finite state control (‘automaton’), which follows the trajectories of the original system and governs its dynamics at the points of ill-posedness. The construction of the automaton is based on the classification of the attractors of the specially designed adjoint dynamical system. This ‘hybridization’ is shown to regularize the original switched system and gives rise to efficient hybrid numerical schemes. Several examples are provided in the presentation, which supports the suggested analysis. The method can be of interest in other applied fields, where differential equations contain step-like nonlinearities.Keywords: hybrid feedback control, ill-posed problems, singular perturbation analysis, step-like nonlinearities
Procedia PDF Downloads 2451292 TNFRSF11B Gene Polymorphisms A163G and G11811C in Prediction of Osteoporosis Risk
Authors: I. Boroňová, J.Bernasovská, J. Kľoc, Z. Tomková, E. Petrejčíková, D. Gabriková, S. Mačeková
Abstract:
Osteoporosis is a complex health disease characterized by low bone mineral density, which is determined by an interaction of genetics with metabolic and environmental factors. Current research in genetics of osteoporosis is focused on identification of responsible genes and polymorphisms. TNFRSF11B gene plays a key role in bone remodeling. The aim of this study was to investigate the genotype and allele distribution of A163G (rs3102735) osteoprotegerin gene promoter and G1181C (rs2073618) osteoprotegerin first exon polymorphisms in the group of 180 unrelated postmenopausal women with diagnosed osteoporosis and 180 normal controls. Genomic DNA was isolated from peripheral blood leukocytes using standard methodology. Genotyping for presence of different polymorphisms was performed using the Custom Taqman®SNP Genotyping assays. Hardy-Weinberg equilibrium was tested for each SNP in the groups of participants using the chi-square (χ2) test. The distribution of investigated genotypes in the group of patients with osteoporosis were as follows: AA (66.7%), AG (32.2%), GG (1.1%) for A163G polymorphism; GG (19.4%), CG (44.4%), CC (36.1%) for G1181C polymorphism. The distribution of genotypes in normal controls were follows: AA (71.1%), AG (26.1%), GG (2.8%) for A163G polymorphism; GG (22.2%), CG (48.9%), CC (28.9%) for G1181C polymorphism. In A163G polymorphism the variant G allele was more common among patients with osteoporosis: 17.2% versus 15.8% in normal controls. Also, in G1181C polymorphism the phenomenon of more frequent occurrence of C allele in the group of patients with osteoporosis was observed (58.3% versus 53.3%). Genotype and allele distributions showed no significant differences (A163G: χ2=0.270, p=0.605; χ2=0.250, p=0.616; G1181C: χ2= 1.730, p=0.188; χ2=1.820, p=0.177). Our results represents an initial study, further studies of more numerous file and associations studies will be carried out. Knowing the distribution of genotypes is important for assessing the impact of these polymorphisms on various parameters associated with osteoporosis. Screening for identification of “at-risk” women likely to develop osteoporosis and initiating subsequent early intervention appears to be most effective strategy to substantially reduce the risks of osteoporosis.Keywords: osteoporosis, real-time PCR method, SNP polymorphisms
Procedia PDF Downloads 3291291 Soluble CD36 and Cardiovascular Risk in Middle-Aged Subjects
Authors: Mohammad Alkhatatbeh, Nehad Ayoub, Nizar Mhaidat, Nesreen Saadeh, Lisa Lincz
Abstract:
CD36 is involved in the development of atherosclerosis by enhancing macrophage endocytosis of oxidized-low density lipoproteins and foam cell formation. Soluble CD36 (sCD36) was found to be elevated in type 2 diabetic patients and was supposed to act as a marker of insulin resistance and atherosclerosis. In young subjects, sCD36 was associated with cardiovascular risk factors including obesity and hypertriglyceridemia. This study was conducted to further investigate the relationship between plasma sCD36 and cardiovascular risk factors among middle-aged patients with metabolic syndrome (MetS) and healthy controls. SCD36 concentrations were determined by enzyme-linked immunosorbent assays (ELISA) for 41 patients with MetS and 36 healthy controls. Data for other variables were obtained from patients' medical records. SCD36 concentrations were relatively low compared to most other studies and were not significantly different between the MetS group and controls (P-value=0.17). SCD36 was also not correlated with age, body mass index, glucose, lipid profile, serum electrolytes and blood counts. SCD36 was not significantly different between subjects with obesity, hyperglycemia, dyslipidemia, hypertension or cardiovascular disease and those without these abnormalities (P-value > 0.05). The inconsistency between results reported in this study and other studies may be unique to the study population or be a result of the lack of a reliable standardized method for determining absolute sCD36 concentrations. However, further investigations are required to assess CD36 tissue expression in the study population and to assess the accuracy of various commercially available sCD36 ELISA kits. Thus, the availability of a standardized simple sCD36 ELISA that could be performed in any basic laboratory would be more favorable to the specialized flow cytometry methods that detect CD36+ microparticles if it was to be used as a biomarker.Keywords: metabolic syndrome, CD36, cardiovascular risk, obesity, type 2 diabetes mellitus
Procedia PDF Downloads 2661290 Evaluation of P300 and CNV Changes in Patients with Essential Tremor
Authors: Sehur Sibel Ozkaynak, Zakir Koc, Ebru Barcın
Abstract:
Essential tremor (ET) is one of the most common movement disorders and has long been considered a monosymptomatic disorder. While ET has traditionally been categorized as a pure motor disease, cross-sectional and longitudinal studies of cognition in ET have been demonstrated that these patients may have cognitive dysfunction. We investigated the neuro physiological aspects of cognition in ET, using event-related potentials (ERPs).Twenty patients with ET and 20 age-education and sex matched healthy controls underwent a neuro physiological evaluation. P300 components and Contingent Negative Variation (CNV) were recorded. The latencies and amplitudes of the P300 and CNV were evaluated. P200-N200 amplitude was significantly smaller in the ET group, while no differences emerged between patients and controls in P300 latencies. CNV amplitude was significantly smaller at Cz electrode site in the ET group. No differences were observed between in the two groups in CNV latencies. As a result, P300 and CNV parameters did not show significant differences between in the two groups, does not mean that there aren't mild cognitive changes in ET patients. In this regard, there is a need to further studies using electro physiological tests related to cognitive changes in ET patients.Keywords: cognition, essential tremor, event related potentials
Procedia PDF Downloads 2871289 Interleukin-6 and Tumor Necrosis Factor-α Levels in Tear Film of Keratoconus Patients
Authors: Mazdak Ganjalikhani, Mohamad Namgar, Alireza Peyman
Abstract:
Introduction: The present study was carried out to measure the levels of inflammatory markers Interleukin-6 (IL-6) and tumor necrosis factor-alpha (TNF-α) in tear of keratoconus patients and investigate their relationship with the severity of keratoconus. Materials and Methods: This study was performed on 81 patients with keratoconus (cases) and 85 healthy individuals (controls) who were selected through the convenience sampling method from patients visiting the Feiz Ophthalmology Hospital affiliated with the Isfahan University of Medical Sciences. Tear levels of IL-6 and TNF-α were measured after collecting the patient's tears from the lower eyelid through the Schirmer I method using a filter paper (Schirmer tear test strip) without anesthesia. Findings: The mean levels of IL-6 and TNF-α were 26.77±8.16 and 34.58±9.82 in the control group and 103.22±51.94, and 183.76±54.61 in the case group, respectively, indicating a significant difference between two groups (p<0.05). In addition, there was a significant relationship between the severity of the keratoconus and the mean levels of TNF-α and IL-6 in the case group (p<0.05). Conclusion: According to the results, the mean levels of IL-6 and TNF-α were higher in keratoconus cases than in the controls, and the disease severity was significantly associated with the levels of inflammatory markers IL-6 and TNF-α.Keywords: keratoonus, cataract, tumor necrotic factor, interleukin 6
Procedia PDF Downloads 41288 Enhancement of Transaction's Authentication for the Europay, MasterCard, and Visa Contactless Card Payments
Authors: Ossama Al-Maliki
Abstract:
Europay, MasterCard, and Visa (EMV) is one of the most popular payment protocol in the world. The EMV protocol supports Chip and PIN Transactions, Chip and Signature transactions, and Contactless transactions. This protocol suffers from tens of £ millions of lost per year due to many fraudulent payments. This is due to several reported vulnerable points in the protocols used for such payments that allow skimming, replay, cloning, Mole Point of Sale (POS), relay, and other attacks to be conducted. In this paper, we are focusing on the EMV contactless specification and we have proposed two proposal solutions to the addition of a localization factor to enhance the payment authentication of such transactions designed to prevent relay, cloning, and Mole-POS attacks. Our proposed solution is a back-end localization scheme to help the Issuer-Bank compare the location of the genuine cardholder in relation to the used POS. Our scheme uses 'something you have' which is the Cardholder Smartphone (CSP) to provide the location of the cardholder at the time of the transaction and without impacting the contactless payment time/protocol. The Issuer-bank obtain the CSP Location using tried and tested localization techniques, and independently of the cardholder. Both of our proposal solutions do not require infrastructure changes, and it uses existing EMV/SP protocol messages to communicate our scheme information.Keywords: NFC, RFID, contactless card, authentication, location, EMV
Procedia PDF Downloads 2421287 Assessment of Dental Caries in Children of Age 6 and 7 Years Old in Albania
Authors: Mimoza Canga, Irene Malagnino, Ruzhdie Qafmolla, Vergjini Mulo, Gresa Baboci, Vito Antonio Malagnino
Abstract:
Background: Dental caries represents the most widespread pathology in childhood. The prevalence of dental caries varies with age, gender, socio economic status, geographical location, nutrition habits, and oral hygiene. Objective: The objective of the present longitudinal study is to show clearly the prevalence of dental caries in the children of age 6 and 7 years old in Vlore, Albania, in a two year time period with controls done every 6 months. Materials and methods: The present study was conducted on 530 children, with a controlled sample for a time period of 24 months from September 2019- September 2021. The children in the study had different economic and social backgrounds. The teeth controls were done by the dentists who work at the hospital of the city. The present study was conducted in accordance with Helsinki declaration. Permissions were obtained in written form, which allowed us to perform the observations. Parents had the right to withdraw their children at any time. Statistical analysis was performed using IBM SPSS Statistics 23.0. The significance level (α) was set at 0.05, whereas P-value and analysis of variance (ANOVA) were used to analyze the data. Results: The data of the present study showed that the age group of 6 years old had 139 or 52.3% of the children with dental caries and 127 or 47.7% of them had no dental caries, while at the age of 7 there were 184 or 69.7% of the children with dental caries problems in the permanent molars and 80 or 30.3% of them had no dental caries. In the present study, it was observed that there is a statistically significant association between age group and presence of caries. Children 7 years old had higher presence of dental caries (χ2 = 16.934 (df 1) p-value < 0.001). According to the present research, there is a statistically significant correlation between period of time and the presence of dental caries. Furthermore, in the actual research, it was established that in the time 18-24 months, the prevalence of dental caries was high (χ2=15,318 (df 1) p-value = 0.004). Conclusion: According to the results of the present study performed in Albania in a two year time period with controls done every 6 months, it is proved that the prevalence of dental caries was 17.4 percent higher among children 7 years old in comparison with the children 6 years old.Keywords: age, children, dental caries, permanent molars
Procedia PDF Downloads 2231286 Changes in Pulmonary Functions in Diabetes Mellitus Type 2
Authors: N. Anand, P. S. Nayyer, V. Rana, S. Verma
Abstract:
Background: Diabetes mellitus is a group of disorders characterized by hyperglycemia and associated with microvascular and macrovascular complications. Among the lesser known complications is the involvement of respiratory system. Changes in pulmonary volume, diffusion and elastic properties of lungs as well as the performance of the respiratory muscles lead to a restrictive pattern in lung functions. The present study was aimed to determine the changes in various parameters of pulmonary function tests amongst patients with Type 2 Diabetes Mellitus and also try to study the effect of duration of Diabetes Mellitus on pulmonary function tests. Methods: It was a cross sectional study performed at Dr Baba Saheb Ambedkar Hospital and Medical College in, Delhi, A Tertiary care referral centre which included 200 patients divided into 2 groups. The first group included diagnosed patients with diabetes and the second group included controls. Cases and controls symptomatic for any acute or chronic Respiratory or Cardiovascular illness or a history of smoking were excluded. Both the groups were subjected to spirometry to evaluate for the pulmonary function tests. Result: The mean Forced Vital Capacity (FVC), Forced Expiratory Volume in first second (FEV1), Peak Expiratory Flow Rate(PEFR) was found to be significantly decreased ((P < 0.001) as compared to controls while the mean ratio of Forced Expiratory Volume in First second to Forced Vital Capacity was not significantly decreased( p>0.005). There was no correlation seen with duration of the disease. Conclusion: Forced Vital Capacity (FVC), Forced Expiratory Volume in first second (FEV1), Peak Expiratory Flow Rate(PEFR) were found to be significantly decreased in patients of Diabetes mellitus while ratio of Forced Expiratory Volume in First second to Forced Vital Capacity (FEV1/FVC) was not significantly decreased. The duration of Diabetes mellitus was not found to have any statistically significant effect on Pulmonary function tests (p > 0.005).Keywords: diabetes mellitus, pulmonary function tests, forced vital capacity, forced expiratory volume in first second
Procedia PDF Downloads 369