Search results for: false EIV
87 Current Drainage Attack Correction via Adjusting the Attacking Saw-Function Asymmetry
Authors: Yuri Boiko, Iluju Kiringa, Tet Yeap
Abstract:
Current drainage attack suggested previously is further studied in regular settings of closed-loop controlled Brushless DC (BLDC) motor with Kalman filter in the feedback loop. Modeling and simulation experiments are conducted in a Matlab environment, implementing the closed-loop control model of BLDC motor operation in position sensorless mode under Kalman filter drive. The current increase in the motor windings is caused by the controller (p-controller in our case) affected by false data injection of substitution of the angular velocity estimates with distorted values. Operation of multiplication to distortion coefficient, values of which are taken from the distortion function synchronized in its periodicity with the rotor’s position change. A saw function with a triangular tooth shape is studied herewith for the purpose of carrying out the bias injection with current drainage consequences. The specific focus here is on how the asymmetry of the tooth in the saw function affects the flow of current drainage. The purpose is two-fold: (i) to produce and collect the signature of an asymmetric saw in the attack for further pattern recognition process, and (ii) to determine conditions of improving stealthiness of such attack via regulating asymmetry in saw function used. It is found that modification of the symmetry in the saw tooth affects the periodicity of current drainage modulation. Specifically, the modulation frequency of the drained current for a fully asymmetric tooth shape coincides with the saw function modulation frequency itself. Increasing the symmetry parameter for the triangle tooth shape leads to an increase in the modulation frequency for the drained current. Moreover, such frequency reaches the switching frequency of the motor windings for fully symmetric triangular shapes, thus becoming undetectable and improving the stealthiness of the attack. Therefore, the collected signatures of the attack can serve for attack parameter identification via the pattern recognition route.Keywords: bias injection attack, Kalman filter, BLDC motor, control system, closed loop, P-controller, PID-controller, current drainage, saw-function, asymmetry
Procedia PDF Downloads 8086 Safety-critical Alarming Strategy Based on Statistically Defined Slope Deformation Behaviour Model Case Study: Upright-dipping Highwall in a Coal Mining Area
Authors: Lintang Putra Sadewa, Ilham Prasetya Budhi
Abstract:
Slope monitoring program has now become a mandatory campaign for any open pit mines around the world to operate safely. Utilizing various slope monitoring instruments and strategies, miners are now able to deliver precise decisions in mitigating the risk of slope failures which can be catastrophic. Currently, the most sophisticated slope monitoring technology available is the Slope Stability Radar (SSR), whichcan measure wall deformation in submillimeter accuracy. One of its eminent features is that SSRcan provide a timely warning by automatically raise an alarm when a predetermined rate-of-movement threshold is reached. However, establishing proper alarm thresholds is arguably one of the onerous challenges faced in any slope monitoring program. The difficulty mainly lies in the number of considerations that must be taken when generating a threshold becausean alarm must be effectivethat it should limit the occurrences of false alarms while alsobeing able to capture any real wall deformations. In this sense, experience shows that a site-specific alarm thresholdtendsto produce more reliable results because it considers site distinctive variables. This study will attempt to determinealarming thresholds for safety-critical monitoring based on an empirical model of slope deformation behaviour that is defined statistically fromdeformation data captured by the Slope Stability Radar (SSR). The study area comprises of upright-dipping highwall setting in a coal mining area with intense mining activities, andthe deformation data used for the study were recorded by the SSR throughout the year 2022. The model is site-specific in nature thus, valuable information extracted from the model (e.g., time-to-failure, onset-of-acceleration, and velocity) will be applicable in setting up site-specific alarm thresholds and will give a clear understanding of how deformation trends evolve over the area.Keywords: safety-critical monitoring, alarming strategy, slope deformation behaviour model, coal mining
Procedia PDF Downloads 9085 Reconceptualizing Human Trafficking: Revealings of the Experience of Ethiopian Migrant Returnees
Authors: Waganesh Zeleke, Abebaw Minaye
Abstract:
This study examined the act, means, and purpose of human trafficking in the case of Ethiopian migrant returnees from the Middle East and South Africa. Using a questionnaire survey data was gathered from 1078 returnees. Twelve focus group discussions were used to solicit detailed experience of returnee about the process of their 'unsafe' immigration. Both quantitative and qualitative analysis results revealed that against the mainstream thinking of human trafficking means such as forcing, coercing, abducting or threatening, traffickers used 'victims’ free will' means by providing false promises to and capitalizing on the vulnerability of migrants. The migrants’ living condition including unemployment, ambitious view to change their life, and low level of risk perception were found to be risk factors which made them vulnerable and target of the brokers and smugglers who served as a catalyst in the process of their 'unsafe' migration. Equal to the traffickers/brokers/agency, the migrants’ family, friends and Ethiopian embassies contributed to the deplorable situation of migrant workers. 64.4% of the returnees reported that their migration is self-initiated, and 20% reported peer pressure and 13.8 percent reported family pressure, and it is only 1.8% who reported having been pushed by brokers. The findings revealed that 69.5% of the returnees do not know about the lifestyle and culture of the host community before their leave. In a similar vein, 50.9% of the returnees reported that they do not know about the nature of the work they are to do and their responsibilities. Further, 81% of the returnees indicated that the pre-migration training they received was not enough in equipping them with the required skill. Despite the returnees experiences of various forms of abuse and exploitation in the journey and at the destination they still have a positive attitude for migration (t=9.7 mean of 18.85 with a test value of 15). The returnees evaluated the support provided by sending agencies and Ethiopian embassies in the destination to be poor. 51.8% of the migrants do not know the details of the contract they signed during migration. Close to 70% of the returnees expressed that they had not got any legal support from stakeholders when they faced problems. What is more is that despite all these 27.9% of the returnees indicated re-immigrating as their plan. Based on these findings on the context and experience of Ethiopian migrant returnees, implications for training, policy, research, and intervention are discussed.Keywords: trafficking, migrant, returnee, Ethiopia, experience, reconceptualizing
Procedia PDF Downloads 30884 Maize Farmers’ Perception of Sharp Practices among Agro-Input Dealers in Ibadan/Ibarapa Agricultural Zone, Oyo State
Authors: Ademola A. Ladele, Peace I. Aburime
Abstract:
Fake and substandard agricultural inputs pose a serious stumbling block to farm productivity and subsequently improved livelihood. There is, therefore, a need to pave ways for sustainable agriculture and self-sufficiency in food production by proffering solutions to this challenge. Maize farmers' perception of sharp practices among agro-input dealers in Ibadan/Ibarapa agricultural zone in Oyo state was therefore investigated. A multi-stage random sampling technique was used to select registered maize farmers in the Ibadan/Ibarapa agricultural zone of the Oyo State Agricultural Development Programme (OYSADEP). A structured questionnaire was used to collect information on the perception of sharp practices and the effects of sharp practices. A total of seventy-five maize farmers were interviewed. A focus group discussion was organized to identify ways of curbing sharp practices to complement the survey. Data were analyzed using descriptive statistics, Chi-square, and Pearson Product Moment Correlation (PPMC). Forms of sharp practices indicated were sales of expired fertilizers, expired pesticides, expired herbicides, underweight fertilizers, adulterated fertilizers, adulterated herbicides, packs containing broken seeds, infested seeds, lack of truth in labeling/wrong labels, manipulation of measuring scales, and false declaration of hecterages covered by tractor operators. The majority had unfavorable perception of agro-input dealers on sharp practices. A significant relationship was observed between respondents’ level of education and their perception of sharp practices. There were no significant relationships between respondents’ sex, marital status and religion, and their perception of sharp practices. A significant correlation exists between the forms of sharp practices and the perceived effect on agricultural production. It is concluded that the perceived effect of sharp practices was critical and the endemic culture of sharp practices prevailed in agro-input in Ibadan/Ibarapa agricultural zone. A standard regulatory system that will certify and monitor the quality of inputs should be put in place.Keywords: agricultural productivity, agro-input dealers, maize farmers, sharp practices
Procedia PDF Downloads 19883 Improve Divers Tracking and Classification in Sonar Images Using Robust Diver Wake Detection Algorithm
Authors: Mohammad Tarek Al Muallim, Ozhan Duzenli, Ceyhun Ilguy
Abstract:
Harbor protection systems are so important. The need for automatic protection systems has increased over the last years. Diver detection active sonar has great significance. It used to detect underwater threats such as divers and autonomous underwater vehicle. To automatically detect such threats the sonar image is processed by algorithms. These algorithms used to detect, track and classify of underwater objects. In this work, divers tracking and classification algorithm is improved be proposing a robust wake detection method. To detect objects the sonar images is normalized then segmented based on fixed threshold. Next, the centroids of the segments are found and clustered based on distance metric. Then to track the objects linear Kalman filter is applied. To reduce effect of noise and creation of false tracks, the Kalman tracker is fine tuned. The tuning is done based on our active sonar specifications. After the tracks are initialed and updated they are subjected to a filtering stage to eliminate the noisy and unstable tracks. Also to eliminate object with a speed out of the diver speed range such as buoys and fast boats. Afterwards the result tracks are subjected to a classification stage to deiced the type of the object been tracked. Here the classification stage is to deice wither if the tracked object is an open circuit diver or a close circuit diver. At the classification stage, a small area around the object is extracted and a novel wake detection method is applied. The morphological features of the object with his wake is extracted. We used support vector machine to find the best classifier. The sonar training images and the test images are collected by ARMELSAN Defense Technologies Company using the portable diver detection sonar ARAS-2023. After applying the algorithm to the test sonar data, we get fine and stable tracks of the divers. The total classification accuracy achieved with the diver type is 97%.Keywords: harbor protection, diver detection, active sonar, wake detection, diver classification
Procedia PDF Downloads 23882 Representations of Wolves (Canis lupus) in Feature Films: The Detailed Analysis of the Text and Picture in the Chosen Movies
Authors: Barbara Klimek
Abstract:
Wolves are one of the most misrepresented species in literature and the media. They’re often portrayed as vicious, man-eating beasts whose main life goal is to hunt and kill people. Many movie directors use wolves as their main characters in different types of films, especially horror, thriller and science fiction movies to create gore and fear. This, in turn, results in people being afraid of wolves and wanting to destroy them. Such cultural creations caused wolves being stalked, abused and killed by people and in many areas they were completely destroyed. This paper analyzes the representations of wolves in the chosen films in the four main portrayed aspects: 1. the overall picture – true versus false, positive versus negative, based on stereotypes or realistic, displaying wolf behavior typical of the species or fake 2. subjectivity – how humans treat and talk about the animals – as subjects or as objects 3. animal welfare – how humans treat wolves and nature, are the human – animal relations positive and appropriate or negative and abusive 4. empathy – are human characters shown to co-feel the suffering with the wolves, do they display signs of empathy towards the animals, do the animals empathize with humans? The detailed analysis of the text and pictures presented in the chosen films concludes that wolves are especially misrepresented in the movies. Their behavior is shown as fake and negative, based on stereotypes and myths, the human – animal relations are shown mainly as negative where people fear the animals and hunt them and wolves stalk, follow, attack and kill humans. It shows that people do not understand the needs of these animals and are unable to show empathy towards them. The article will discuss the above-mentioned study results in detail and will present many examples. Animal representations in cultural creations, including film have a great impact on how people treat particular species of animals. The media shape people’s attitudes, what in turn results in people either respecting and protecting the animals or fearing, disliking and destroying the particular species.Keywords: film, movies, representations, wolves
Procedia PDF Downloads 21381 Revision of Arthroplasty in Rheumatoid and Osteoarthritis: Methotrexate and Radiographic Lucency in RA Patients
Authors: Mike T. Wei, Douglas N. Mintz, Lisa A. Mandl, Arielle W. Fein, Jayme C. Burket, Yuo-Yu Lee, Wei-Ti Huang, Vivian P. Bykerk, Mark P. Figgie, Edward F. Di Carlo, Bruce N. Cronstein, Susan M. Goodman
Abstract:
Background/Purpose: Rheumatoid arthritis (RA) patients have excellent total hip arthroplasty (THA) survival, and methotrexate (MTX), an anti-inflammatory disease modifying drug which may affect bone reabsorption, may play a role. The purpose of this study is to determine the diagnosis leading to revision THA (rTHA) in RA patients and to assess the association of radiographic lucency with MTX use. Methods: All patients with validated diagnosis of RA in the institution’s THA registry undergoing rTHA from May 2007 - February 2011 were eligible. Diagnosis leading to rTHA and medication use was determined by chart review. Osteolysis was evaluated on available radiographs by measuring maximum lucency in each Gruen zone. Differences within RA patients with/without MTX in osteolysis, demographics, and medications were assessed with chi-squared, Fisher's exact tests or Mann-Whitney U tests as appropriate. The error rate for multiple comparisons of lucency in the different Gruen zones was corrected via false discovery rate methods. A secondary analysis was performed to determine differences in diagnoses leading to revision between RA and matched OA controls (2:1 match by sex age +/- 5 years). OA exclusion criteria included presence of rheumatic diseases, use of MTX, and lack of records. Results: 51 RA rTHA were identified and compared with 103 OA. Mean age for RA was 57.7 v 59.4 years for OA (p = 0.240). 82.4% RA were female v 83.5% OA (p = 0.859). RA had lower BMI than OA (25.5 v 28.2; p = 0.166). There was no difference in diagnosis leading to rTHA, including infection (RA 3.9 v OA 6.8%; p = 0.719) or dislocation (RA 23.5 v OA 23.3%; p = 0.975). There was no significant difference in the length of time the implant was in before revision: RA 11.0 v OA 8.8 years (p = 0.060). Among RA with/without MTX, there was no difference in use of biologics (30.0 v 43.3%, p = 0.283), steroids (47.6 v 50.0%, p = 0.867) or bisphosphonates (23.8 v 33.3%, p = 0.543). There was no difference in rTHA diagnosis with/without MTX, including loosening (52.4 v 56.7%, p = 0.762). There was no significant difference in lucencies with MTX use in any Gruen zone. Patients with MTX had femoral stem subsidence of 3.7mm v no subsidence without MTX (p = 0.006). Conclusion: There was no difference in the diagnosis leading to rTHR in RA and OA, although RA trended longer prior to rTHA. In this small retrospective study, there were no significant differences associated with MTX exposure or radiographic lucency among RA patients. The significance of subsidence is not clear. Further study of arthroplasty survival in RA patients is warranted.Keywords: hip arthroplasty, methotrexate, revision arthroplasty, rheumatoid arthritis
Procedia PDF Downloads 24780 Prevalence of Treponema pallidum Infection among HIV-Seroreactive Patients in Kano, Nigeria
Authors: Y. Mohammed, A. I. Kabuga
Abstract:
Sexually transmitted infections (STIs) have continued to be a major public health problem in sub-Saharan Africa especially with the recent resurgence of syphilis. Syphilis is a systemic disease caused by the bacterium, spirochete Treponema pallidum and has been reported as one of the common sexually transmitted infections (STIs) in Nigeria. Presence of genital ulcer disease from syphilis facilitates human immunodeficiency virus (HIV) transmission and their ¬diagnosis is essential for the proper management. Venereal Disease Research Laboratory (VDRL) test is used as a screening test for the diagnosis of syphilis. However, unusual VDRL test results have been reported in HIV-infected persons with syphilis. There are reports showing higher than expected VDRL titers as well as biological false positive in most of the studies. A negative Rapid Plasma Reagin (RPR) test or VDRL test result may not rule out syphilis in patients with HIV infection. For laboratory confirmation of syphilis, one specific Treponemal test, namely, Fluroscent Treponemal Antibody Absorption (FTA-ABS) test or Treponema Pallidum Haemagglutination Assay (TPHA) should be done along with VDRL. A prospective cross sectional study was conducted for 2 years from Jun, 2012 to Jun 2014 to determine the prevalence of syphilis in HIV-seroreactive patients at 5 selected HIV/AIDS treatment and counseling centers in Kano State, North Western, Nigeria. New HIV-Seroreactive patients who gave informed consent to participate in the study were recruited. Venereal Diseases Research Laboratory (VDRL) test for Syphilis screening was performed on the same sera samples which were collected for HIV testing. A total of 238 patients, 113 (47%) males and 125 (53%) females, were enrolled. In the present study, 238 HIV-seropositive patients were screened for syphilis by VDRL test. Out of these 238 cases, 72 (32%) patients were positive for TPHA and 8 (3.4%) patients were reactive for VDRL in various titers with an overall prevalence of 3.4%. All the eight patients who were reactive for VDRL test were also positive for TPHA test. In Conclusions, with high prevalence of syphilis among HIV-infected people from this study, it is recommended that serological testing for syphilis should be carried out in all patients with newly diagnosed HIV infection. Detection and treatment of STI should have a central role in HIV prevention and control. This will help in proper management of patients having STIs and HIV co infection.Keywords: HIV, infections, STIs, syphilis
Procedia PDF Downloads 32179 Predicting Success and Failure in Drug Development Using Text Analysis
Authors: Zhi Hao Chow, Cian Mulligan, Jack Walsh, Antonio Garzon Vico, Dimitar Krastev
Abstract:
Drug development is resource-intensive, time-consuming, and increasingly expensive with each developmental stage. The success rates of drug development are also relatively low, and the resources committed are wasted with each failed candidate. As such, a reliable method of predicting the success of drug development is in demand. The hypothesis was that some examples of failed drug candidates are pushed through developmental pipelines based on false confidence and may possess common linguistic features identifiable through sentiment analysis. Here, the concept of using text analysis to discover such features in research publications and investor reports as predictors of success was explored. R studios were used to perform text mining and lexicon-based sentiment analysis to identify affective phrases and determine their frequency in each document, then using SPSS to determine the relationship between our defined variables and the accuracy of predicting outcomes. A total of 161 publications were collected and categorised into 4 groups: (i) Cancer treatment, (ii) Neurodegenerative disease treatment, (iii) Vaccines, and (iv) Others (containing all other drugs that do not fit into the 3 categories). Text analysis was then performed on each document using 2 separate datasets (BING and AFINN) in R within the category of drugs to determine the frequency of positive or negative phrases in each document. A relative positivity and negativity value were then calculated by dividing the frequency of phrases with the word count of each document. Regression analysis was then performed with SPSS statistical software on each dataset (values from using BING or AFINN dataset during text analysis) using a random selection of 61 documents to construct a model. The remaining documents were then used to determine the predictive power of the models. Model constructed from BING predicts the outcome of drug performance in clinical trials with an overall percentage of 65.3%. AFINN model had a lower accuracy at predicting outcomes compared to the BING model at 62.5% but was not effective at predicting the failure of drugs in clinical trials. Overall, the study did not show significant efficacy of the model at predicting outcomes of drugs in development. Many improvements may need to be made to later iterations of the model to sufficiently increase the accuracy.Keywords: data analysis, drug development, sentiment analysis, text-mining
Procedia PDF Downloads 15778 Mitigation of Cascading Power Outage Caused Power Swing Disturbance Using Real-time DLR Applications
Authors: Dejenie Birile Gemeda, Wilhelm Stork
Abstract:
The power system is one of the most important systems in modern society. The existing power system is approaching the critical operating limits as views of several power system operators. With the increase of load demand, high capacity and long transmission networks are widely used to meet the requirement. With the integration of renewable energies such as wind and solar, the uncertainty, intermittence bring bigger challenges to the operation of power systems. These dynamic uncertainties in the power system lead to power disturbances. The disturbances in a heavily stressed power system cause distance relays to mal-operation or false alarms during post fault power oscillations. This unintended operation of these relays may propagate and trigger cascaded trappings leading to total power system blackout. This is due to relays inability to take an appropriate tripping decision based on ensuing power swing. According to the N-1 criterion, electric power systems are generally designed to withstand a single failure without causing the violation of any operating limit. As a result, some overloaded components such as overhead transmission lines can still work for several hours under overload conditions. However, when a large power swing happens in the power system, the settings of the distance relay of zone 3 may trip the transmission line with a short time delay, and they will be acting so quickly that the system operator has no time to respond and stop the cascading. Misfiring of relays in absence of fault due to power swing may have a significant loss in economic performance, thus a loss in revenue for power companies. This research paper proposes a method to distinguish stable power swing from unstable using dynamic line rating (DLR) in response to power swing or disturbances. As opposed to static line rating (SLR), dynamic line rating support effective mitigation actions against propagating cascading outages in a power grid. Effective utilization of existing transmission lines capacity using machine learning DLR predictions will improve the operating point of distance relay protection, thus reducing unintended power outages due to power swing.Keywords: blackout, cascading outages, dynamic line rating, power swing, overhead transmission lines
Procedia PDF Downloads 14377 Cross-sectional Developmental Trajectories of Executive Function and Relations to Theory of Mind in Autism Spectrum Disorder
Authors: Evangelia-Chrysanthi Kouklari, Evdokia Tagkouli, Vassiliki Ntre, Artemios Pehlivanidis, Stella Tsermentseli, Gerasimos Kolaitis, Katerina Papanikolaou
Abstract:
Executive Function (EF) is a set of goal-directed cognitive skills essentially needed in problem-solving and social behavior. Developmental EF research has indicated that EF emerges early in life and marks dramatic changes before the age of 5. Research evidence has suggested that it may continue to develop up to adolescence as well, following the development of the prefrontal cortex. Over the last decade, research evidence has suggested distinguished domains of cool and hot EF, but traditionally the development of EF in Autism Spectrum Disorder (ASD) has been examined mainly with tasks that address the “cool” cognitive aspects of EF. Thus, very little is known about the development of “hot” affective EF processes and whether the cross-sectional developmental pathways of cool and hot EF present similarities in ASD. Cool EF has also been proven to have a strong correlation with Theory of Mind (ToM) in young and middle childhood in typical development and in ASD, but information about the relationship of hot EF to ToM skills is minimal. The present study’s objective was to explore the age-related changes of cool and hot EF in ASD participants from middle childhood to adolescence, as well as their relationship to ToM. This study employed an approach of cross-sectional developmental trajectories to investigate patterns of cool and hot EF relative to chronological age within ASD. Eighty-two participants between 7 and 16 years of age were recruited to undertake measures that assessed cool EF (working memory, cognitive flexibility, planning & inhibition), hot EF (affective decision making & delay discounting) and ToM (false belief and mental state/emotion recognition). Results demonstrated that trajectories of all cool EF presented age-related changes in ASD (improvements with age). With regards to hot EF, affective decision-making presented age-related changes, but for delay discounting, there were no statistically significant changes found across younger and older ASD participants. ToM was correlated only to cool EF. Theoretical implications are discussed as the investigation of the cross-sectional developmental trajectories of the broader EF (cool and hot domains) may contribute to better defining cognitive phenotypes in ASD. These findings highlight the need to examine developmental trajectories of both hot and cool EF in research and clinical practice as they may aid in enhancing diagnosis or better-informed intervention programs.Keywords: autism spectrum disorder, developmental trajectories, executive function, theory of mind
Procedia PDF Downloads 14876 The Good, the Bad and the Unknown: Exploring the Knowledge, Attitude and Behaviour towards the Use of Insecticide Treated Mosquito Nets among Pregnant Women and Children in Rural South-Western Uganda
Authors: Ivan M. Taremwa, Scholastic Ashaba, Harriet O. Adrama, Carlrona Ayebazibwe, Daniel Omoding, Imelda Kemeza, Jane Yatuha, Thadeus Turuho, Noni E. MacDonald, Robert Hilliard
Abstract:
Background: The burden of malaria in Uganda remains unacceptably high, especially among children and pregnant women. To prevent malaria related complications, household possession and use of Insecticide Treated mosquito Nets (ITNs) has become a common practice in the country. Despite the availability of ITNs, the number of malaria cases has not gone down. We sought to explore knowledge, attitude, and behaviour towards the use of ITNs as a nightly malaria prevention strategy among pregnant women and children under five years of age in rural southwest Uganda. Materials and Methods: This was a community based, descriptive cross-sectional study, in which households with children under 5 years, and/or pregnant women were enrolled. We used a structured questionnaire to collect data on participants’ understanding of the causes, signs and symptoms of malaria; use of ITNs to prevent malaria; attitudes and behaviours towards the use of ITNs. We also conducted key informant interviews (KIIs) to get in-depth understanding of responses from the participants. We analysed quantitative data using STATA version 12. Qualitative findings from the KIIs were transcribed and translated, and manually analysed using thematic content analysis. Results: Of the 369 households enrolled, 98.6% (N=363) households had children under five. Most participants (41.2%, N=152) were in the 21-30 years of age category (mean age; 32.2). 98.6% (N=362) of the respondents considered ITNs a key malaria prevention strategy. The ITN possession rate was 84.0% (N=310), of these, 67.0% (N=205) consistently used them. 39% of the respondents did not have a positive attitude towards ITNs, as they considered more the perceived effects of ITNs. Conclusions: Although 84.0% of the respondents possessed ITNs, many were not consistently using them. There is need to engage all stakeholders (including cultural leaders, community health workers, religious leaders and the government) in the malaria prevention campaigns using ITNs through: a) government’s concerted effort to ensure universal access of good quality ITNs, b) end-user directed education to correct false beliefs and misinformation, c) telling the ITN success stories to improve on the usage.Keywords: ITNs use, malaria, pregnant women, rural Uganda
Procedia PDF Downloads 35575 Evidence of a Negativity Bias in the Keywords of Scientific Papers
Authors: Kseniia Zviagintseva, Brett Buttliere
Abstract:
Science is fundamentally a problem-solving enterprise, and scientists pay more attention to the negative things, that cause them dissonance and negative affective state of uncertainty or contradiction. While this is agreed upon by philosophers of science, there are few empirical demonstrations. Here we examine the keywords from those papers published by PLoS in 2014 and show with several sentiment analyzers that negative keywords are studied more than positive keywords. Our dataset is the 927,406 keywords of 32,870 scientific articles in all fields published in 2014 by the journal PLOS ONE (collected from Altmetric.com). Counting how often the 47,415 unique keywords are used, we can examine whether those negative topics are studied more than positive. In order to find the sentiment of the keywords, we utilized two sentiment analysis tools, Hu and Liu (2004) and SentiStrength (2014). The results below are for Hu and Liu as these are the less convincing results. The average keyword was utilized 19.56 times, with half of the keywords being utilized only 1 time and the maximum number of uses being 18,589 times. The keywords identified as negative were utilized 37.39 times, on average, with the positive keywords being utilized 14.72 times and the neutral keywords - 19.29, on average. This difference is only marginally significant, with an F value of 2.82, with a p of .05, but one must keep in mind that more than half of the keywords are utilized only 1 time, artificially increasing the variance and driving the effect size down. To examine more closely, we looked at those top 25 most utilized keywords that have a sentiment. Among the top 25, there are only two positive words, ‘care’ and ‘dynamics’, in position numbers 5 and 13 respectively, with all the rest being identified as negative. ‘Diseases’ is the most studied keyword with 8,790 uses, with ‘cancer’ and ‘infectious’ being the second and fourth most utilized sentiment-laden keywords. The sentiment analysis is not perfect though, as the words ‘diseases’ and ‘disease’ are split by taking 1st and 3rd positions. Combining them, they remain as the most common sentiment-laden keyword, being utilized 13,236 times. More than just splitting the words, the sentiment analyzer logs ‘regression’ and ‘rat’ as negative, and these should probably be considered false positives. Despite these potential problems, the effect is apparent, as even the positive keywords like ‘care’ could or should be considered negative, since this word is most commonly utilized as a part of ‘health care’, ‘critical care’ or ‘quality of care’ and generally associated with how to improve it. All in all, the results suggest that negative concepts are studied more, also providing support for the notion that science is most generally a problem-solving enterprise. The results also provide evidence that negativity and contradiction are related to greater productivity and positive outcomes.Keywords: bibliometrics, keywords analysis, negativity bias, positive and negative words, scientific papers, scientometrics
Procedia PDF Downloads 18674 Usability Testing on Information Design through Single-Lens Wearable Device
Authors: Jae-Hyun Choi, Sung-Soo Bae, Sangyoung Yoon, Hong-Ku Yun, Jiyoung Kwahk
Abstract:
This study was conducted to investigate the effect of ocular dominance on recognition performance using a single-lens smart display designed for cycling. A total of 36 bicycle riders who have been cycling consistently were recruited and participated in the experiment. The participants were asked to perform tasks riding a bicycle on a stationary stand for safety reasons. Independent variables of interest include ocular dominance, bike usage, age group, and information layout. Recognition time (i.e., the time required to identify specific information measured with an eye-tracker), error rate (i.e. false answer or failure to identify the information in 5 seconds), and user preference scores were measured and statistical tests were conducted to identify significant results. Recognition time and error ratio showed significant difference by ocular dominance factor, while the preference score did not. Recognition time was faster when the single-lens see-through display on the dominant eye (average 1.12sec) than on the non-dominant eye (average 1.38sec). Error ratio of the information recognition task was significantly lower when the see-through display was worn on the dominant eye (average 4.86%) than on the non-dominant eye (average 14.04%). The interaction effect of ocular dominance and age group was significant with respect to recognition time and error ratio. The recognition time of the users in their 40s was significantly longer than the other age groups when the display was placed on the non-dominant eye, while no difference was observed on the dominant eye. Error ratio also showed the same pattern. Although no difference was observed for the main effect of ocular dominance and bike usage, the interaction effect between the two variables was significant with respect to preference score. Preference score of daily bike users was higher when the display was placed on the dominant eye, whereas participants who use bikes for leisure purposes showed the opposite preference patterns. It was found more effective and efficient to wear a see-through display on the dominant eye than on the non-dominant eye, although user preference was not affected by ocular dominance. It is recommended to wear a see-through display on the dominant eye since it is safer by helping the user recognize the presented information faster and more accurately, even if the user may not notice the difference.Keywords: eye tracking, information recognition, ocular dominance, smart headware, wearable device
Procedia PDF Downloads 27273 Close-Reading Works of Art and the Ideal of Naïveté: Elements of an Anti-Cartesian Approach to Humanistic Liberal Education
Authors: Peter Hajnal
Abstract:
The need to combine serious training in disciplinary/scholarly approaches to problems of general significance with an educational experience that engages students with these very same problems on a personal level is one of the key challenges facing modern liberal education in the West. The typical approach to synthesizing these two goals, one highly abstract, the other elusively practical, proceeds by invoking ideals traditionally associated with Enlightenment and 19th century “humanism”. These ideas are in turn rooted in an approach to reality codified by Cartesianism and the rise of modern science. Articulating this connection of the modern humanist tradition with Cartesianism allows for demonstrating how the central problem of modern liberal education is rooted in the strict separation of knowledge and personal experience inherent in the dualism of Descartes. The question about the shape of contemporary liberal education is, therefore, the same as asking whether an anti-Cartesian version of liberal education is possible at all. Although the formulation of a general answer to this question is a tall order (whether in abstract or practical terms), and might take different forms (nota bene in Eastern and Western contexts), a key inspiration may be provided by a certain shift of attitude towards the Cartesian conception of the relationship of knowledge and experience required by discussion based close-reading of works of visual art. Taking the work of Stanley Cavell as its central inspiration, my paper argues that this shift of attitude in question is best described as a form of “second naïveté”, and that it provides a useful model of conceptualizing in more concrete terms the appeal for such a “second naïveté” expressed in recent writings on the role of various disciplines in organizing learning by philosophers of such diverse backgrounds and interests as Hilary Putnam and Bruno Latour. The adoption of naïveté so identified as an educational ideal may be seen as a key instrument in thinking of the educational context as itself a medium of synthesis of the contemplative and the practical. Moreover, it is helpful in overcoming the bad dilemma of ideological vs. conservative approaches to liberal education, as well as in correcting a certain commonly held false view of the historical roots of liberal education in the Renaissance, which turns out to offer much more of a sui generis approach to practice rather than represent a mere precursor to the Cartesian conception.Keywords: liberal arts, philosophy, education, Descartes, naivete
Procedia PDF Downloads 19172 Detection and Classification Strabismus Using Convolutional Neural Network and Spatial Image Processing
Authors: Anoop T. R., Otman Basir, Robert F. Hess, Eileen E. Birch, Brooke A. Koritala, Reed M. Jost, Becky Luu, David Stager, Ben Thompson
Abstract:
Strabismus refers to a misalignment of the eyes. Early detection and treatment of strabismus in childhood can prevent the development of permanent vision loss due to abnormal development of visual brain areas. We developed a two-stage method for strabismus detection and classification based on photographs of the face. The first stage detects the presence or absence of strabismus, and the second stage classifies the type of strabismus. The first stage comprises face detection using Haar cascade, facial landmark estimation, face alignment, aligned face landmark detection, segmentation of the eye region, and detection of strabismus using VGG 16 convolution neural networks. Face alignment transforms the face to a canonical pose to ensure consistency in subsequent analysis. Using facial landmarks, the eye region is segmented from the aligned face and fed into a VGG 16 CNN model, which has been trained to classify strabismus. The CNN determines whether strabismus is present and classifies the type of strabismus (exotropia, esotropia, and vertical deviation). If stage 1 detects strabismus, the eye region image is fed into stage 2, which starts with the estimation of pupil center coordinates using mask R-CNN deep neural networks. Then, the distance between the pupil coordinates and eye landmarks is calculated along with the angle that the pupil coordinates make with the horizontal and vertical axis. The distance and angle information is used to characterize the degree and direction of the strabismic eye misalignment. This model was tested on 100 clinically labeled images of children with (n = 50) and without (n = 50) strabismus. The True Positive Rate (TPR) and False Positive Rate (FPR) of the first stage were 94% and 6% respectively. The classification stage has produced a TPR of 94.73%, 94.44%, and 100% for esotropia, exotropia, and vertical deviations, respectively. This method also had an FPR of 5.26%, 5.55%, and 0% for esotropia, exotropia, and vertical deviation, respectively. The addition of one more feature related to the location of corneal light reflections may reduce the FPR, which was primarily due to children with pseudo-strabismus (the appearance of strabismus due to a wide nasal bridge or skin folds on the nasal side of the eyes).Keywords: strabismus, deep neural networks, face detection, facial landmarks, face alignment, segmentation, VGG 16, mask R-CNN, pupil coordinates, angle deviation, horizontal and vertical deviation
Procedia PDF Downloads 9371 The Production, Negotiation and Resistance of Short Video Producers
Abstract:
Based on the question of, "Are short video creators who are digital workers controlled by platform rules?" this study discusses the specific ways of platform rules control and the impact on short video creators. Based on the theory of digital labor, this paper adopts the method of in-depth interview and participant observation and chooses 24 producers of short video content of Tiktok to conduct in-depth interview. At the same time, through entering the short video creation field, the author carries on the four-month field investigation, obtains the creation process related data, and analyzes how the short video creator, as the digital labor, is controlled by the platform rule, as well as the creator in this process of compromise and resistance, a more comprehensive presentation of the short video creators of the labor process. It is found that the short video creators are controlled by the platform rules, mainly in the control of traffic rules, and the creators create content, compromise and resist under the guidance of traffic. First, while the platform seems to offer a flexible and autonomous way for creators to monetize, the threshold for participating in the event is actually very high for creators, and the rules for monetizing the event are vague. Under the influence of the flow rule, the creator is faced unstable incomes and high costs. Therefore, creators have to follow the rules of traffic to guide their own creation, began to flow-oriented content production, mainly reflected in the need to keep up-to-date, the pursuit of traffic to ride on the hot spots, in order to flow regardless, set up people "Born for the show", by the label solidified content creation. Secondly, the irregular working hours lead to the extension and overwork of the working hours, which leads to the internal friction of the short video creators at the spiritual level, and finally leads to the Rat Race of video creation. Thirdly, the video creator has completed the internalization and compromise of the platform rules in practice, which promotes the creator to continue to create independently, and forms the intrinsic motive force of the creator. Finally, the rule-controlled short video creators resist and fight in flexible ways, make use of the mechanism and rules of the platform to carry on the second creation, carry on the routine production, purchase the false flow, transfer the creation position to maintain own creation autonomy.Keywords: short videos, tiktok, production, digital labors
Procedia PDF Downloads 6070 Discussion of Blackness in Wrestling
Authors: Jason Michael Crozier
Abstract:
The wrestling territories of the mid-twentieth century in the United States are widely considered the birthplace of modern professional wrestling, and by many professional wrestlers, to be a beacon of hope for the easing of racial tensions during the civil rights era and beyond. The performers writing on this period speak of racial equality but fail to acknowledge the exploitation of black athletes as a racialized capital commodity who suffered the challenges of systemic racism, codified by a false narrative of aspirational exceptionalism and equality measured by audience diversity. The promoters’ ability to equate racial and capital exploitation with equality leads to a broader discussion of the history of Muscular Christianity in the United States and the exploitation of black bodies. Narratives of racial erasure that dominate the historical discourse when examining athleticism and exceptionalism redefined how blackness existed and how physicality and race are conceived of in sport and entertainment spaces. When discussing the implications of race and professional wrestling, it is important to examine the role of promotions as ‘imagined communities’ where the social agency of wrestlers is defined and quantified based on their ‘desired elements’ as a performer. The intentionally vague nature of this language masks a deep history of racialization that has been perpetuated by promoters and never fully examined by scholars. Sympathetic racism and the omission of cultural identity are also key factors in the limitations and racial barriers placed upon black athletes in the squared circle. The use of sympathetic racism within professional wrestling during the twentieth century defined black athletes into two distinct categorizations, the ‘black savage’ or the ‘black minstrel’. Black wrestlers of the twentieth century were defined by their strength as a capital commodity and their physicality rather than their knowledge of the business and in-ring skill. These performers had little agency in their ability to shape their own character development inside and outside the ring. Promoters would often create personas that heavily racialized the performer by tying them to a regional past or memory, such as that of slavery in the deep south using dog collar matches and adoring black characters in chains. Promoters softened cultural memory by satirizing the historic legacy of slavery and the black identity.Keywords: sympathetic racism, social agency, racial commodification, stereotyping
Procedia PDF Downloads 13569 The Challenges of Public Relations Practice in Developing Nations and the Way Forward: Ethiopian Perspective
Authors: Yared Pawlos Woldeyes
Abstract:
Public Relations often referred to as ‘PR’, is the practice of managing the spread of information between an individual or organization, such as a business, government agency, or a nonprofit organization, and the public. Public Relations are important because they help organizations or entities cultivate and maintain meaningful connections with society at large through platforms like print media and social media. Individuals that identify as public relation specialists establish and maintain relationships with an organization’s target audiences, relevant media sources, and opinion leaders. With regard to the challenges, when trying to practice public relations for government institutions, the priority for specialists is often to help members of society exercise a positive attitude and impression of a country’s political systems and practices. If you consider the case of public relations for government entities in Ethiopia there are several factors to consider. First, public relations in Ethiopia are very much driven by a desire to create a good image of the country and prevent the spread of any information that creates a bad image of Ethiopia. Also, the current ruling party dominates public relations in Ethiopia. Unfortunately, this means that more often than not, public relations specialists are forced by the government to spread and mass communicate false information to the public instead of the truth. Any opposition to government’s agenda will result in seriously negative repercussions for public relations specialists. Although public relations is supposed to create a positive and honest relationship between an organization or the government with the public, in Ethiopia, that is not the case. As a result, very few people express an interest in practicing public relations here. Despite this, there is an opportunity for the development of an accountable public relation affairs in developing nations, taking Ethiopian’s case. For instance, the fact that Public relations are provided as a field of study in college or university to produce competent and trained specialists, the enormous contribution of good communication to the public developmental efforts linking the government to the people, and the better payment to employees of public relation officers are some of them. Therefore, there is a need by the respective stakeholders to work in coalition in raising awareness of the youth regarding the importance of a responsible public relations officer to the country’s developmental efforts, encouragement of Civil Society Organizations working in promoting free press and expression of ideas, improving the governmental structure to be transparent and that allows independent officers, and hosting international conferences on public relations practice so that the specialists can exchange knowledge and skills.Keywords: developing nations, Ethiopia, public relations, public relations specialist
Procedia PDF Downloads 23068 Identification of Information War in Lithuania
Authors: Vitalijus Leibenka
Abstract:
After 2014 the world of Russia’s actions in annexing Crimea has seen a hybrid war that has helped Russia achieve its goals. The world and NATO nations have pointed out that hybrid action can help achieve not only military but also economic and political goals. One of the weapons of action in hybrid warfare is information warfare tools, the use of which helps to carry out actions in the context of hybrid warfare as a whole. In addition, information war tools can be used alone, over time and for long-term purposes. Although forms of information war, such as propaganda and disinformation, have been used in the past, in old conflicts and wars, new forms of information war have emerged as a result of technological development, making the dissemination of information faster and more efficient. The world understands that information is becoming a weapon, but not everyone understands that both information war and information warfare differ in their essence and full content. In addition, the damage and impact of the use of information war, which may have worse consequences than a brief military conflict, is underestimated. Lithuania is also facing various interpretations of the information war. Some believe that the information attack is an information war and the understanding of the information war is limited to a false message in the press. Others, however, deepen and explain the essence of the information war. Society has formed in such a way that not all people are able to assess the threats of information war, to separate information war from information attack. Recently, the Lithuanian government has been taking measures in the context of the information war, making decisions that allow the development of the activities of the state and state institutions in order to create defense mechanisms in the information war. However, this is happening rather slowly and incompletely. Every military conflict, related to Lithuania in one way or another, forces Lithuanian politicians to take up the theme of information warfare again. As a result, a national cyber security center is being set up, and Russian channels spreading lies are banned. However, there is no consistent development and continuous improvement of action against information threats. Although a sufficiently influential part of society (not a political part) helps to stop the spread of obscure information by creating social projects such as “Demaskuok” and “Laikykis ten su Andriumi tapinu”, it goes without saying that it will not become a key tool in the fight against information threats. Therefore, in order to achieve clean dissemination of information in Lithuania, full-fledged and substantial political decisions are necessary, the adoption of which would change the public perception of the information war, its damage, impact and actions that would allow to combat the spread. Political decisions should cover the educational, military, economic and political areas, which are one of the main and most important in the state, which would allow to fundamentally change the situation against the background of information war.Keywords: information war, information warfare, hybrid war, hybrid warfare, NATO, Lithuania, Russia
Procedia PDF Downloads 6267 Expression of Ki-67 in Multiple Myeloma: A Clinicopathological Study
Authors: Kangana Sengar, Sanjay Deb, Ramesh Dawar
Abstract:
Introduction: Ki-67 can be a useful marker in determining proliferative activity in patients with multiple myeloma (MM). However, using Ki-67 alone results in the erroneous inclusion of non-myeloma cells leading to false high counts. We have used Dual IHC (immunohistochemistry) staining with Ki-67 and CD138 to enhance specificity in assessing proliferative activity of bone marrow plasma cells. Aims and objectives: To estimate the proportion of proliferating (Ki-67 expressing) plasma cells in patients with MM and correlation of Ki-67 with other known prognostic parameters. Materials and Methods: Fifty FFPE (formalin fixed paraffin embedded) blocks of trephine biopsies of cases diagnosed as MM from 2010 to 2015 are subjected to H & E staining and Dual IHC staining for CD 138 and Ki-67. H & E staining is done to evaluate various histological parameters like percentage of plasma cells, pattern of infiltration (nodular, interstitial, mixed and diffuse), routine parameters of marrow cellularity and hematopoiesis. Clinical data is collected from patient records from Medical Record Department. Each of CD138 expressing cells (cytoplasmic, red) are scored as proliferating plasma cells (containing a brown Ki¬67 nucleus) or non¬proliferating plasma cells (containing a blue, counter-stained, Ki-¬67 negative nucleus). Ki-67 is measured as percentage positivity with a maximum score of hundred percent and lowest of zero percent. The intensity of staining is not relevant. Results: Statistically significant correlation of Ki-67 in D-S Stage (Durie & Salmon Stage) I vs. III (p=0.026) and ISS (International Staging System) Stage I vs. III (p=0.019), β2m (p=0.029) and percentage of plasma cells (p < 0.001) is seen. No statistically significant correlation is seen between Ki-67 and hemoglobin, platelet count, total leukocyte count, total protein, albumin, S. calcium, S. creatinine, S. LDH, blood urea and pattern of infiltration. Conclusion: Ki-67 index correlated with other known prognostic parameters. However, it is not determined routinely in patients with MM due to little information available regarding its relevance and paucity of studies done to correlate with other known prognostic factors in MM patients. To the best of our knowledge, this is the first study in India using Dual IHC staining for Ki-67 and CD138 in MM patients. Routine determination of Ki-67 will help to identify patients who may benefit with more aggressive therapy. Recommendation: In this study follow up of patients is not included, and the sample size is small. Studying with larger sample size and long follow up is advocated to prognosticate Ki-67 as a marker of survival in patients with multiple myeloma.Keywords: bone marrow, dual IHC, Ki-67, multiple myeloma
Procedia PDF Downloads 15566 Ribotaxa: Combined Approaches for Taxonomic Resolution Down to the Species Level from Metagenomics Data Revealing Novelties
Authors: Oshma Chakoory, Sophie Comtet-Marre, Pierre Peyret
Abstract:
Metagenomic classifiers are widely used for the taxonomic profiling of metagenomic data and estimation of taxa relative abundance. Small subunit rRNA genes are nowadays a gold standard for the phylogenetic resolution of complex microbial communities, although the power of this marker comes down to its use as full-length. We benchmarked the performance and accuracy of rRNA-specialized versus general-purpose read mappers, reference-targeted assemblers and taxonomic classifiers. We then built a pipeline called RiboTaxa to generate a highly sensitive and specific metataxonomic approach. Using metagenomics data, RiboTaxa gave the best results compared to other tools (Kraken2, Centrifuge (1), METAXA2 (2), PhyloFlash (3)) with precise taxonomic identification and relative abundance description, giving no false positive detection. Using real datasets from various environments (ocean, soil, human gut) and from different approaches (metagenomics and gene capture by hybridization), RiboTaxa revealed microbial novelties not seen by current bioinformatics analysis opening new biological perspectives in human and environmental health. In a study focused on corals’ health involving 20 metagenomic samples (4), an affiliation of prokaryotes was limited to the family level with Endozoicomonadaceae characterising healthy octocoral tissue. RiboTaxa highlighted 2 species of uncultured Endozoicomonas which were dominant in the healthy tissue. Both species belonged to a genus not yet described, opening new research perspectives on corals’ health. Applied to metagenomics data from a study on human gut and extreme longevity (5), RiboTaxa detected the presence of an uncultured archaeon in semi-supercentenarians (aged 105 to 109 years) highlighting an archaeal genus, not yet described, and 3 uncultured species belonging to the Enorma genus that could be species of interest participating in the longevity process. RiboTaxa is user-friendly, rapid, allowing microbiota structure description from any environment and the results can be easily interpreted. This software is freely available at https://github.com/oschakoory/RiboTaxa under the GNU Affero General Public License 3.0.Keywords: metagenomics profiling, microbial diversity, SSU rRNA genes, full-length phylogenetic marker
Procedia PDF Downloads 12165 Profiling Risky Code Using Machine Learning
Authors: Zunaira Zaman, David Bohannon
Abstract:
This study explores the application of machine learning (ML) for detecting security vulnerabilities in source code. The research aims to assist organizations with large application portfolios and limited security testing capabilities in prioritizing security activities. ML-based approaches offer benefits such as increased confidence scores, false positives and negatives tuning, and automated feedback. The initial approach using natural language processing techniques to extract features achieved 86% accuracy during the training phase but suffered from overfitting and performed poorly on unseen datasets during testing. To address these issues, the study proposes using the abstract syntax tree (AST) for Java and C++ codebases to capture code semantics and structure and generate path-context representations for each function. The Code2Vec model architecture is used to learn distributed representations of source code snippets for training a machine-learning classifier for vulnerability prediction. The study evaluates the performance of the proposed methodology using two datasets and compares the results with existing approaches. The Devign dataset yielded 60% accuracy in predicting vulnerable code snippets and helped resist overfitting, while the Juliet Test Suite predicted specific vulnerabilities such as OS-Command Injection, Cryptographic, and Cross-Site Scripting vulnerabilities. The Code2Vec model achieved 75% accuracy and a 98% recall rate in predicting OS-Command Injection vulnerabilities. The study concludes that even partial AST representations of source code can be useful for vulnerability prediction. The approach has the potential for automated intelligent analysis of source code, including vulnerability prediction on unseen source code. State-of-the-art models using natural language processing techniques and CNN models with ensemble modelling techniques did not generalize well on unseen data and faced overfitting issues. However, predicting vulnerabilities in source code using machine learning poses challenges such as high dimensionality and complexity of source code, imbalanced datasets, and identifying specific types of vulnerabilities. Future work will address these challenges and expand the scope of the research.Keywords: code embeddings, neural networks, natural language processing, OS command injection, software security, code properties
Procedia PDF Downloads 10664 Evaluation of Diagnostic Values of Culture, Rapid Urease Test, and Histopathology in the Diagnosis of Helicobacter pylori Infection and in vitro Effects of Various Antimicrobials against Helicobacter pylori
Authors: Recep Kesli, Huseyin Bilgin, Yasar Unlu, Gokhan Gungor
Abstract:
Aim: The aim of this study, was to investigate the presence of Helicobacter pylori (H. pylori) infection by culture, histology, and RUT (Rapid Urease Test) in gastric antrum biopsy samples taken from patients presented with dyspeptic complaints and to determine resistance rates of amoxicillin, clarithromycin, levofloxacin and metronidazole against the H. pylori strains by E-test. Material and Methods: A total of 278 patients who admitted to Konya Education and Research Hospital Department of Gastroenterology with dyspeptic complaints, between January 2011-July 2013, were included in the study. Microbiological and histopathological examinations of biopsy specimens taken from antrum and corpus regions were performed. The presence of H. pylori in biopsy samples was investigated by culture (Portagerm pylori-PORT PYL, Pylori agar-PYL, GENbox microaer, bioMerieux, France), histology (Giemsa, Hematoxylin and Eosin staining), and RUT(CLOtest, Cimberly-Clark, USA). Antimicrobial resistance of isolates against amoxicillin, clarithromycin, levofloxacin, and metronidazole was determined by E-test method (bioMerieux, France). As a gold standard in the diagnosis of H. pylori; it was accepted that the culture method alone was positive or both histology and RUT were positive together. Sensitivity and specificity for histology and RUT were calculated by taking the culture as a gold standard. Sensitivity and specificity for culture were also calculated by taking the co-positivity of both histology and RUT as a gold standard. Results: H. pylori was detected in 140 of 278 of patients with culture and 174 of 278 of patients with histology in the study. H. pylori positivity was also found in 191 patients with RUT. According to the gold standard criteria, a false negative result was found in 39 cases by culture method, 17 cases by histology, and 8 cases by RUT. Sensitivity and specificity of the culture, histology, and RUT methods of the patients were 76.5 % and 88.3 %, 87.8 % and 63 %, 94.2 % and 57.2 %, respectively. Antibiotic resistance was investigated by E-test in 140 H. pylori strains isolated from culture. The resistance rates of H. pylori strains to the amoxicillin, clarithromycin, levofloxacin, and metronidazole was detected as 9 (6.4 %), 22 (15.7 %), 17 (12.1 %), 57 (40.7 %), respectively. Conclusion: In our study, RUT was found to be the most sensitive, culture was the most specific test between culture, histology, and RUT methods. Although we detected the specificity of the culture method as high, its sensitivity was found to be quite low compared to other methods. The low sensitivity of H. pylori culture may be caused by the factors affect the chances of direct isolation such as spoild bacterium, difficult-to-breed microorganism, clinical sample retrieval, and transport conditions.Keywords: antimicrobial resistance, culture, histology, H. pylori, RUT
Procedia PDF Downloads 16363 Oral Microbiota as a Novel Predictive Biomarker of Response To Immune Checkpoint Inhibitors in Advanced Non-small Cell Lung Cancer Patients
Authors: Francesco Pantano, Marta Fogolari, Michele Iuliani, Sonia Simonetti, Silvia Cavaliere, Marco Russano, Fabrizio Citarella, Bruno Vincenzi, Silvia Angeletti, Giuseppe Tonini
Abstract:
Background: Although immune checkpoint inhibitors (ICIs) have changed the treatment paradigm of non–small cell lung cancer (NSCLC), these drugs fail to elicit durable responses in the majority of NSCLC patients. The gut microbiota, able to regulate immune responsiveness, is emerging as a promising, modifiable target to improve ICIs response rates. Since the oral microbiome has been demonstrated to be the primary source of bacterial microbiota in the lungs, we investigated its composition as a potential predictive biomarker to identify and select patients who could benefit from immunotherapy. Methods: Thirty-five patients with stage IV squamous and non-squamous cell NSCLC eligible for an anti-PD-1/PD-L1 as monotherapy were enrolled. Saliva samples were collected from patients prior to the start of treatment, bacterial DNA was extracted using the QIAamp® DNA Microbiome Kit (QIAGEN) and the 16S rRNA gene was sequenced on a MiSeq sequencing instrument (Illumina). Results: NSCLC patients were dichotomized as “Responders” (partial or complete response) and “Non-Responders” (progressive disease), after 12 weeks of treatment, based on RECIST criteria. A prevalence of the phylum Candidatus Saccharibacteria was found in the 10 responders compared to non-responders (abundance 5% vs 1% respectively; p-value = 1.46 x 10-7; False Discovery Rate (FDR) = 1.02 x 10-6). Moreover, a higher prevalence of Saccharibacteria Genera Incertae Sedis genus (belonging to the Candidatus Saccharibacteria phylum) was observed in "responders" (p-value = 6.01 x 10-7 and FDR = 2.46 x 10-5). Finally, the patients who benefit from immunotherapy showed a significant abundance of TM7 Phylum Sp Oral Clone FR058 strain, member of Saccharibacteria Genera Incertae Sedis genus (p-value = 6.13 x 10-7 and FDR=7.66 x 10-5). Conclusions: These preliminary results showed a significant association between oral microbiota and ICIs response in NSCLC patients. In particular, the higher prevalence of Candidatus Saccharibacteria phylum and TM7 Phylum Sp Oral Clone FR058 strain in responders suggests their potential immunomodulatory role. The study is still ongoing and updated data will be presented at the congress.Keywords: oral microbiota, immune checkpoint inhibitors, non-small cell lung cancer, predictive biomarker
Procedia PDF Downloads 9762 Role of Grey Scale Ultrasound Including Elastography in Grading the Severity of Carpal Tunnel Syndrome - A Comparative Cross-sectional Study
Authors: Arjun Prakash, Vinutha H., Karthik N.
Abstract:
BACKGROUND: Carpal tunnel syndrome (CTS) is a common entrapment neuropathy with an estimated prevalence of 0.6 - 5.8% in the general adult population. It is caused by compression of the Median Nerve (MN) at the wrist as it passes through a narrow osteofibrous canal. Presently, the diagnosis is established by the clinical symptoms and physical examination and Nerve conduction study (NCS) is used to assess its severity. However, it is considered to be painful, time consuming and expensive, with a false-negative rate between 16 - 34%. Ultrasonography (USG) is now increasingly used as a diagnostic tool in CTS due to its non-invasive nature, increased accessibility and relatively low cost. Elastography is a newer modality in USG which helps to assess stiffness of tissues. However, there is limited available literature about its applications in peripheral nerves. OBJECTIVES: Our objectives were to measure the Cross-Sectional Area (CSA) and elasticity of MN at the carpal tunnel using Grey scale Ultrasonography (USG), Strain Elastography (SE) and Shear Wave Elastography (SWE). We also made an attempt to independently evaluate the role of Gray scale USG, SE and SWE in grading the severity of CTS, keeping NCS as the gold standard. MATERIALS AND METHODS: After approval from the Institutional Ethics Review Board, we conducted a comparative cross sectional study for a period of 18 months. The participants were divided into two groups. Group A consisted of 54 patients with clinically diagnosed CTS who underwent NCS, and Group B consisted of 50 controls without any clinical symptoms of CTS. All Ultrasound examinations were performed on SAMSUNG RS 80 EVO Ultrasound machine with 2 - 9 Mega Hertz linear probe. In both groups, CSA of the MN was measured on Grey scale USG, and its elasticity was measured at the carpal tunnel (in terms of Strain ratio and Shear Modulus). The variables were compared between both groups by using ‘Independent t test’, and subgroup analyses were performed using one-way analysis of variance. Receiver operating characteristic curves were used to evaluate the diagnostic performance of each variable. RESULTS: The mean CSA of the MN was 13.60 + 3.201 mm2 and 9.17 + 1.665 mm2 in Group A and Group B, respectively (p < 0.001). The mean SWE was 30.65 + 12.996 kPa and 17.33 + 2.919 kPa in Group A and Group B, respectively (p < 0.001), and the mean Strain ratio was 7.545 + 2.017 and 5.802 + 1.153 in Group A and Group B respectively (p < 0.001). CONCLUSION: The combined use of Gray scale USG, SE and SWE is extremely useful in grading the severity of CTS and can be used as a painless and cost-effective alternative to NCS. Early diagnosis and grading of CTS and effective treatment is essential to avoid permanent nerve damage and functional disability.Keywords: carpal tunnel, ultrasound, elastography, nerve conduction study
Procedia PDF Downloads 10161 Thyroid Cancer Treatment in Yemen Under Blockade Conditions and Absence of Radioactive Iodine
Authors: Anis Al-Yakhiri
Abstract:
Introduction: The World Health Organization (WHO) classifies malignant epithelial thyroid tumors into four major groups (papillary, follicular, medullar and undifferentiated) . Papillary thyroid carcinoma (PTC) is the most common type, for about eight out of ten thyroid cancers belong to this histological type. Radioactive iodine (RAI) is considered effective for patients with total or nearly total thyroidectomy, but the beneficial effects of RAI are still controversial. War conditions forced us to study alternative methods of using radioactive iodine in the treatment of patients with PTC. Material and methods: Between January 2014 and June 2021, in Al-Yakhiri hospital, 57 Total Thyroidectomy with Radical BilateralNeckDissection (RBND) were performed, 50 for malignant disease,7 for false positive cytology.RBND involves surgical clearance of Levels II-VI. Mean age was 40.7 years old and 92% of the patients were female. 7(14%) patients had hypothyroidism which required preoperative thyroid hormone treatment. The Thyroid Stimulating Hormone- Suppression Therapy (TSH-ST) immediately started after RBND for mostpatients on the first day. It consisted in reducing the level of TSH< 0.1 mIU/L. Results: The Apron flap was used on most operations (40)80% and with lateral extensions had 10(20%). RBND involves surgical clearance of Levels II-VI performed in all operated patients, besides that, 4(8%) of them had resection of sternocleidomastoid muscle (SCM) and accessory nerve (XIn) and internal jugular vein (IJV) withclearance of Levels IB. The PTC was the most common 80.9% (38 patients from 47)by histopathological report. and 4(8%) patients of 50 had resection of sternocleidomastoid muscle (SCM) and accessory nerve (XIn) and internal jugular vein (IJV). The postoperative mortality rate not observed (0%). The postoperative morbidity rate was 22.8% (n =13).Seroma(8.7%),Hypocalcimia(7%), Wound infection(5.3%), Bleeding(1.8%). To suppress TSH and growth of any residual thyroid theTSH-ST (levothyroxine150 – 600mcg)was performed in all patients 57(100%) on the first day afterRBND. We tracked the results of treatment for two years in 30 patients with PTC, only 3 of them received radioactive iodine abroad. Biennial Recurrence rate for PTC appeared in one woman (2%), who had RAI postoperatively in the form of neck lymph nodes metastasis. Conclusion: For patients with PTC, thyroidectomy plus prophylacticRBND is a safe and efficient procedure and it results in lower recurrence rate. Postoperative treatment with exogenous thyroid hormone in doses sufficient to suppress TSH (not less than 150mcg), decreases incidence of recurrence. Total Thyroidectomy with RBND followed by TSH-ST, in our opinion, applicable optimal treatment scheme care for this patient population.Keywords: thyroid cancer, Yemen war, absence of radioactive iodine, neck dissection, surgery results
Procedia PDF Downloads 8160 Axillary Evaluation with Targeted Axillary Dissection Using Ultrasound-Visible Clips after Neoadjuvant Chemotherapy for Patients with Node-Positive Breast Cancer
Authors: Naomi Sakamoto, Eisuke Fukuma, Mika Nashimoto, Yoshitomo Koshida
Abstract:
Background: Selective localization of the metastatic lymph node with clip and removal of clipped nodes with sentinel lymph node (SLN), known as targeted axillary dissection (TAD), reduced false-negative rates (FNR) of SLN biopsy (SLNB) after neoadjuvant chemotherapy (NAC). For the patients who achieved nodal pathologic complete response (pCR), accurate staging of axilla by TAD lead to omit axillary lymph node dissection (ALND), decreasing postoperative arm morbidity without a negative effect on overall survival. This study aimed to investigate the ultrasound (US) identification rate and success removal rate of two kinds of ultrasound-visible clips placed in metastatic lymph nodes during TAD procedure. Methods: This prospective study was conducted using patients with clinically T1-3, N1, 2, M0 breast cancer undergoing NAC followed by surgery. A US-visible clip was placed in the suspicious lymph node under US guidance before neoadjuvant chemotherapy. Before surgery, US examination was performed to evaluate the detection rate of clipped node. During the surgery, the clipped node was removed using several localization techniques, including hook-wire localization, dye-injection, or fluorescence technique, followed by a dual-technique SLNB and resection of palpable nodes if present. For the fluorescence technique, after injection of 0.1-0.2 mL of indocyanine green dye (ICG) into the clipped node, ICG fluorescent imaging was performed using the Photodynamic Eye infrared camera (Hamamatsu Photonics k. k., Shizuoka, Japan). For the dye injection method, 0.1-0.2 mL of pyoktanin blue dye was injected into the clipped node. Results: A total of 29 patients were enrolled. Hydromark™ breast biopsy site markers (Hydromark, T3 shape; Devicor Medical Japan, Tokyo, Japan) was used in 15patients, whereas a UltraCor™ Twirl™ breast marker (Twirl; C.R. Bard, Inc, NJ, USA) was placed in 14 patients. US identified the clipped node marked with the UltraCore Twirl in 100% (14/14) and with the Hydromark in 93.3% (14/15, p = ns). Success removal of clipped node marked with the UltraCore Twirl was achieved in 100% (14/14), whereas the node marked with the Hydromark was removed in 80% (12/15) (p = ns). Conclusions: The ultrasound identification rate differed between the two types of ultrasound-visible clips, which also affected the success removal rate of clipped nodes. Labelling the positive node with a US-highly-visible clip allowed successful TAD.Keywords: breast cancer, neoadjuvant chemotherapy, targeted axillary dissection, breast tissue marker, clip
Procedia PDF Downloads 6659 Analytical Validity Of A Tech Transfer Solution To Internalize Genetic Testing
Authors: Lesley Northrop, Justin DeGrazia, Jessica Greenwood
Abstract:
ASPIRA Labs now offers an en-suit and ready-to-implement technology transfer solution to enable labs and hospitals that lack the resources to build it themselves to offer in-house genetic testing. This unique platform employs a patented Molecular Inversion Probe (MIP) technology that combines the specificity of a hybrid capture protocol with the ease of an amplicon-based protocol and utilizes an advanced bioinformatics analysis pipeline based on machine learning. To demonstrate its efficacy, two independent genetic tests were validated on this technology transfer platform: expanded carrier screening (ECS) and hereditary cancer testing (HC). The analytical performance of ECS and HC was validated separately in a blinded manner for calling three different types of variants: SNVs, short indels (typically, <50 bp), and large indels/CNVs defined as multi-exonic del/dup events. The reference set was constructed using samples from Coriell Institute, an external clinical genetic testing laboratory, Maine Molecular Quality Controls Inc. (MMQCI), SeraCare and GIAB Consortium. Overall, the analytical performance showed a sensitivity and specificity of >99.4% for both ECS and HC in detecting SNVs. For indels, both tests reported specificity of 100%, and ECS demonstrated a sensitivity of 100%, whereas HC exhibited a sensitivity of 96.5%. The bioinformatics pipeline also correctly called all reference CNV events resulting in a sensitivity of 100% for both tests. No additional calls were made in the HC panel, leading to a perfect performance (specificity and F-measure of 100%). In the carrier panel, however, three additional positive calls were made outside the reference set. Two of these calls were confirmed using an orthogonal method and were re-classified as true positives leaving only one false positive. The pipeline also correctly identified all challenging carrier statuses, such as positive cases for spinal muscular atrophy and alpha-thalassemia, resulting in 100% sensitivity. After confirmation of additional positive calls via long-range PCR and MLPA, specificity for such cases was estimated at 99%. These performance metrics demonstrate that this tech-transfer solution can be confidently internalized by clinical labs and hospitals to offer mainstream ECS and HC as part of their test catalog, substantially increasing access to quality germline genetic testing for labs of all sizes and resources levels.Keywords: clinical genetics, genetic testing, molecular genetics, technology transfer
Procedia PDF Downloads 17858 Intensive Care Unit Patient Self-Determination When Facing Cardiovascular Surgery for the First Time
Authors: Hsiao-Lin Fang
Abstract:
The Patient Self-Determination Act is based on the belief that each life is unique. The act regards each patient as an autonomous entity and explicitly protects the patient’s rights to know and make decisions and choices while ensuring that the patient’s wish for a peaceful end is granted. Even when the patient is unconscious and unable to express himself/herself, the patient’s self-determination and its exercise are still protected under the law. The act also ensures that healthcare professionals (HCPs) have a specific set of rules to follow and complete legal protection when their patients are unable to express themselves clearly. This report is about a 55-year-old female patient who weighed 110 kg and was diagnosed with acute type A aortic dissection. The case was that the patient suddenly felt backache and nausea during sleep before daybreak and was therefore transferred to this hospital from the original one. After the doctor explained the patient’s conditions, it was concluded that surgery was necessary. However, the patient’s family was immediately against the surgery after having heard its possible complications. Nevertheless, the patient was still willing to receive the surgery. Being at odds with her family, the patient decided to sign the surgery agreement herself and agreed to receive the two surgical procedures: (1) ascending aorta replacement and (2) innominate artery debranching. After the surgery, the patient did not regain consciousness and therefore received computed tomography scanning of the brain, which revealed false lumen involving proximal left common carotid artery, left subclavian artery and innominate artery, and severe compression of the true lumen with total/subtotal occlusion in the left common carotid artery. On the following day, the doctor discussed two further surgical procedures: (1) endografting for descending aorta and (2) endografting for left common carotid artery and subclavian artery with the family. However, as the patient’s postoperative recovery of consciousness only reached the level of stupor and her family had no intention of subsequent healthcare for the patient, the family made the joint decision three days later to have the endotracheal tube removed from the patient and let her die a natural death. Suggestion: An advance directive (AD) can be created beforehand. Once the patient is in a special clinical state (e.g., terminal illness, permanent vegetative state, etc.), the AD can determine whether to sustain the patient’s life through ‘medical intervention’ or to respect the patient’s rights to choose a peaceful end and receive palliative care. Through the expression of self-determination, it is possible to respect the patient’s medical practice autonomy and protect the patient’s dignity and right to a peaceful end, thereby respecting and supporting the patient’s decision. This also allows the three sides: the patient, the family and the medical team to understand the patient’s true wish in the process of advance care planning (ACP) and thereby promote harmony in the HCP-patient relationship.Keywords: intensive care unit patient, cardiovascular surgery, self-determination, advance directive
Procedia PDF Downloads 176