Search results for: Acute heart attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2669

Search results for: Acute heart attacks

2339 Management of Coronary Heart Disease through Yoga

Authors: Subramaniam Iyer

Abstract:

The most common disease that is pertaining to all human beings is heart-related. The reasons for coronary artery disease are due to lifestyle and eating habits. Due to this, many people mentally become sick, feeling that soon they will die due to their heart problems. This results in stress and anxiety, which has become common amongst all the Indians. Medicines are the commonest curative remedy in India, but it is proposed through this article some remedies through yoga. This article does not guarantee a 100% result, but it is a preventive remedy for coronary artery disease. Yoga is giving a new lease of life to many, so to tackle chronic diseases, it provides remedies that will be lifelong. It is brought to many people by Patanjali. Yoga will provide support to patients having coronary artery disease through its various relevant postures (asanas), which can be done very easily. Yoga does not send a message that if you do it regularly, you will be relieved from a particular disease. If it is performed every day, it will add vital energy for a smooth life, even if you are suffering from any chronic disease. In this article, we will be providing 6 postures (asanas), which can be performed at any time in the day, but the early morning will always be preferred (empty stomach) to get a good result. Secondly, these postures must be implemented after due consultation with your physician. If your physician disapproves, don’t do these postures as it will be harmful to your body.

Keywords: coronary artery, yoga, disease, remedy, medicine

Procedia PDF Downloads 167
2338 On the Use of Machine Learning for Tamper Detection

Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode

Abstract:

The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.

Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT

Procedia PDF Downloads 153
2337 A Review of Ultralightweight Mutual Authentication Protocols

Authors: Umar Mujahid, Greatzel Unabia, Hongsik Choi, Binh Tran

Abstract:

Radio Frequency Identification (RFID) is one of the most commonly used technologies in IoTs and Wireless Sensor Networks which makes the devices identification and tracking extremely easy to manage. Since RFID uses wireless channel for communication, which is open for all types of adversaries, researchers have proposed many Ultralightweight Mutual Authentication Protocols (UMAPs) to ensure security and privacy in a cost-effective manner. These UMAPs involve simple bitwise logical operators such as XOR, AND, OR & Rot, etc., to design the protocol messages. However, most of these UMAPs were later reported to be vulnerable against many malicious attacks. In this paper, we have presented a detailed overview of some eminent UMAPs and also discussed the many security attacks on them. Finally, some recommendations and suggestions have been discussed, which can improve the design of the UMAPs.

Keywords: RFID, Ultralightweight, UMAP, SASI

Procedia PDF Downloads 153
2336 A Case Series on Isolated Lead aVR ST-Segment Elevation Clinical Significance and Outcome

Authors: Fae Princess Bermudez

Abstract:

Background: One of the least significant leads on a 12-lead electrocardiogram is the augmented right lead (aVR), as it is not as specific compared to the other leads. In this case series, the value of lead aVR, which is more often than not ignored, is highlighted. Three cases of aVR ST segment elevation on 12-lead electrocardiogram are described, with the end outcome of demise of all three patients. The importance of immediate revascularization is described to improve prognosis in this group of patients. Objectives: This case series aims to primarily present under-reported cases of isolated aVR ST-segrment elevation myocardial infarction (STEMI), their course and outcome. More specific aims are to identify the criteria in determination of isolated aVR STEMI, know its clinical significance, and determine appropriate management for patients with this ECG finding. Method: A short review of previous studies, case reports, articles and guidelines from 2011-2016 was done. The author reviewed available literature, sorted out those that proved to be significant for the presented cases, and described them in conjunction with the aforementioned cases. Findings: Based on the limited information on these rare or under-reported cases, it was found that isolated aVR STEMI had a poorer prognosis that led to significant mortality and morbidity of patients. The significance of aVR ST-elevation was that of an occlusion of the left coronary artery or a severe three-vessel disease in the presence of an Acute Coronary Syndrome. Guidelines from American Heart Association/American College of Cardiology Foundation in 2013 already recognized ST-elevation of lead aVR in isolation as a STEMI; hence, recommended that patients with this particular ECG finding should undergo reperfusion strategies to improve prognosis. Conclusion: The indispensability of isolated aVR ST-segment elevation on ECG should alert physicians, especially Emergency physicians, to the high probability of Acute Coronary Syndrome with a very poor prognosis. If this group of patients is not promptly managed, demise may ensue, with cardiogenic shock as the most probable cause. With this electrocardiogram finding, physicians must be quick to make clinical decisions to increase chances of survival of this group of patients.

Keywords: AVR ST-elevation, diffuse ST-segment depression, left coronary artery infarction, myocardial infarction

Procedia PDF Downloads 209
2335 Saudi Human Awareness Needs: A Survey in How Human Causes Errors and Mistakes Leads to Leak Confidential Data with Proposed Solutions in Saudi Arabia

Authors: Amal Hussain Alkhaiwani, Ghadah Abdullah Almalki

Abstract:

Recently human errors have increasingly become a very high factor in security breaches that may affect confidential data, and most of the cyber data breaches are caused by human errors. With one individual mistake, the attacker will gain access to the entire network and bypass the implemented access controls without any immediate detection. Unaware employees will be vulnerable to any social engineering cyber-attacks. Providing security awareness to People is part of the company protection process; the cyber risks cannot be reduced by just implementing technology; the human awareness of security will significantly reduce the risks, which encourage changes in staff cyber-awareness. In this paper, we will focus on Human Awareness, human needs to continue the required security education level; we will review human errors and introduce a proposed solution to avoid the breach from occurring again. Recently Saudi Arabia faced many attacks with different methods of social engineering. As Saudi Arabia has become a target to many countries and individuals, we needed to initiate a defense mechanism that begins with awareness to keep our privacy and protect the confidential data against possible intended attacks.

Keywords: cybersecurity, human aspects, human errors, human mistakes, security awareness, Saudi Arabia, security program, security education, social engineering

Procedia PDF Downloads 160
2334 Reliable and Energy-Aware Data Forwarding under Sink-Hole Attack in Wireless Sensor Networks

Authors: Ebrahim Alrashed

Abstract:

Wireless sensor networks are vulnerable to attacks from adversaries attempting to disrupt their operations. Sink-hole attacks are a type of attack where an adversary node drops data forwarded through it and hence affecting the reliability and accuracy of the network. Since sensor nodes have limited battery power, it is essential that any solution to the sinkhole attack problem be very energy-aware. In this paper, we present a reliable and energy efficient scheme to forward data from source nodes to the base station while under sink-hole attack. The scheme also detects sink-hole attack nodes and avoid paths that includes them.

Keywords: energy-aware routing, reliability, sink-hole attack, WSN

Procedia PDF Downloads 396
2333 Acute Oral Toxicity Study of Mystroxylon aethiopicum Root Bark Aqueous Extract in Albino Mice

Authors: Mhuji Kilonzo

Abstract:

Acute oral toxicity of Mystroxylon aethiopicum root bark aqueous was evaluated in albino mice of either sex. In this study, five groups of mice were orally treated with doses of 1000, 2000, 3000, 4000 and 5000 mg/kg body weight of the crude extract. The mortality, signs of toxicity and body weights were observed individually for two weeks. At the end of the two weeks study, all animals were sacrificed, and the hematological and biochemical parameters, as well as organ weights relative to body weight of each animal, were determined. No mortality, signs of toxicity and abnormalities in vital organs were observed in the entire period of study for both treated and control groups of mice. Additionally, there were no significant changes (p > 0.05) in the blood hematology and biochemical analysis. However, the body weights of all mice increased significantly. The Mystroxylon aethiopicum root bark aqueous extract were found to have a high safe margin when administered orally. Hence, the extract can be utilized for pharmaceutical formulations.

Keywords: acute oral toxicity, albino mice, Mystroxylon aethiopicum, safety

Procedia PDF Downloads 289
2332 Diversity of Enterovirus Genotypes Circulating in Pediatric Patients with Acute Gastroenteritis in Thailand from 2019 to 2022

Authors: Zhenfeng Xie

Abstract:

Acute gastroenteritis (AGE) is a common cause of morbidity and mortality in infants and young children worldwide, especially in developing countries. Enterovirus(EVs) have been identified in patients with AGE in many countries around the world, and some studies have revealed that EV infection is associated with gastrointestinal symptoms and plays a role in AGE. As a potential causative pathogen of AGE in humans, continuous detection and identification of EVs in pediatric patients with AGE is needed. In this study, we aimed to investigate the prevalence, seasonal distribution, and molecular characteristics of EVs circulating in pediatric patients with AGE in Thailand from 2019 to 2022. A total of 1422 stool specimens were collected for this study. RT-PCR amplification of the 5'UTR was used to screen for EV positive samples. EV genotyping was determined based on nucleotide sequence and phylogenetic analysis of the VP1 sequences. EV prevalence in pediatric AGE patients was 8.3% (118 out of 1,422). Among these, 35.6% of EV infection cases were caused by species A, followed by species C and B (33.1% and 30.5%, respectively). A total of 26 EV genotypes were identified in this study. Poliovirus 3 and coxsackievirus A2 were the predominant genotypes detected(14% and 13%, respectively). EV was detected all year round with higher prevalence between July and December. In summary, this study reports EV's prevalence and genotype diversity in pediatric patients with AGE in Thailand during 2019-2022.

Keywords: enterovirus, epidemiology, acute gastroenteritis, genotype

Procedia PDF Downloads 71
2331 Acute Kidney Injury in Severe Trauma Patients: Clinical Presentation and Risk Factor Analysis

Authors: Inkyong Yi

Abstract:

Acute kidney injury (AKI) in trauma patients is known to be associated with multiple factors, especially shock and consequent inadequate renal perfusion, yet its clinical presentation is little known in severe trauma patients. Our aim was to investigate the clinical presentation of acute kidney injury and its outcome in severe trauma patients at a level I trauma center. A total of 93 consecutive adult trauma patients with an injury severity score (ISS) of more than 15 were analyzed retrospectively from our Level I trauma center data base. Patients with direct renal injury were excluded. Patients were dichotomized into two groups, according to the presence of AKI. Various clinical parameters were compared between two groups, with Student’s T test and Mann-Whitney’s U test. The AKI group was further dichotomized into patients who recovered within seven days, and those who required more than 7days for recovery or those who did not recover at all. Various clinical parameters associated with outcome were further analyzed. Patients with AKI (n=33, 35%) presented with significantly higher age (61.4±17.3 vs. 45.4±17.3, p < 0.0001), incidence of comorbidities (hypertension; 51.5% vs. 13.3%, OR 6.906 95%CI 2.515-18.967, diabetes; 27.3% vs. 6.7%, OR 5.250, 95%CI 1.472-18.722), odds of head and neck trauma (69.7% vs. 41.7%, OR 3.220, 95%CI 1.306-7.942) and presence of shock during emergency room care (66.7% vs 21.7% OR 7.231, 95%CI, 2.798-18.687). Among AKI patients, patients who recovered within 1 week showed lower peak lactate (4.7mmol/L, 95%CI 2.9-6.5 vs 7.3mmol/L, 95%CI 5.0-9.6, p < 0.0287), lesser units of transfusion during first 24 hours (pRBC; 20.4unit, 95%CI 12.5-28.3 vs. 58.9unit, 95%CI 39.4-78.5, p=0.0003, FFP; 16.6unit, 95%CI 6.8-26.4 vs. 56.1unit, 95%CI 26.9-85.2, p=0.0027). In severe trauma patients, patients with AKI showed different clinical presentations and worse outcomes. Initial presence of shock and higher DIC profiles may be important risk factors for AKI in severe trauma patients. In patients with AKI, peak lactate level and amounts of transfusion are related to recovery.

Keywords: acute kidney injury, lactate, transfusion, trauma

Procedia PDF Downloads 203
2330 A Survey in Techniques for Imbalanced Intrusion Detection System Datasets

Authors: Najmeh Abedzadeh, Matthew Jacobs

Abstract:

An intrusion detection system (IDS) is a software application that monitors malicious activities and generates alerts if any are detected. However, most network activities in IDS datasets are normal, and the relatively few numbers of attacks make the available data imbalanced. Consequently, cyber-attacks can hide inside a large number of normal activities, and machine learning algorithms have difficulty learning and classifying the data correctly. In this paper, a comprehensive literature review is conducted on different types of algorithms for both implementing the IDS and methods in correcting the imbalanced IDS dataset. The most famous algorithms are machine learning (ML), deep learning (DL), synthetic minority over-sampling technique (SMOTE), and reinforcement learning (RL). Most of the research use the CSE-CIC-IDS2017, CSE-CIC-IDS2018, and NSL-KDD datasets for evaluating their algorithms.

Keywords: IDS, imbalanced datasets, sampling algorithms, big data

Procedia PDF Downloads 327
2329 Countering Radicalization to Violent Extremism: A Comparative Study of Canada, the UK and South East Asia

Authors: Daniel Alati

Abstract:

Recent high-profile terrorist events in Canada, the United Kingdom and Europe – the London Bridge attacks, the terrorist attacks in Nice, France and Barcelona, Spain, the 2014 Ottawa Parliament attacks and the 2017 attacks in Edmonton – have all raised levels of public and academic concern with so-called “lone-wolf” and “radicalized” terrorism. Similarly, several countries outside of the “Western” world have been dealing with radicalization to violent extremism for several years. Many South East Asian countries, including Indonesia, Malaysia, Singapore and the Philippines have all had experience with what might be described as ISIS or extremist-inspired acts of terrorism. Indeed, it appears the greatest strength of groups such as ISIS has been their ability to spread a global message of violent extremism that has led to radicalization in markedly different jurisdictions throughout the world. These markedly different jurisdictions have responded with counter-radicalization strategies that warrant further comparative analysis. This paper utilizes an inter-disciplinary legal methodology. In doing so, it compares legal, political, cultural and historical aspects of the counter-radicalization strategies employed by Canada, the United Kingdom and several South East Asian countries (Indonesia, Malaysia, Singapore and the Philippines). Whilst acknowledging significant legal and political differences between these jurisdictions, the paper engages in these analyses with an eye towards understanding which best practices might be shared between the jurisdictions. In doing so, it presents valuable findings of a comparative nature that are useful to both academic and practitioner audiences in several jurisdictions.

Keywords: Canada, United Kingdom and South East Asia, comparative law and politics, radicalization to violent extremism, terrorism

Procedia PDF Downloads 341
2328 Classification of ECG Signal Based on Mixture of Linear and Non-Linear Features

Authors: Mohammad Karimi Moridani, Mohammad Abdi Zadeh, Zahra Shahiazar Mazraeh

Abstract:

In recent years, the use of intelligent systems in biomedical engineering has increased dramatically, especially in the diagnosis of various diseases. Also, due to the relatively simple recording of the electrocardiogram signal (ECG), this signal is a good tool to show the function of the heart and diseases associated with it. The aim of this paper is to design an intelligent system for automatically detecting a normal electrocardiogram signal from abnormal one. Using this diagnostic system, it is possible to identify a person's heart condition in a very short time and with high accuracy. The data used in this article are from the Physionet database, available in 2016 for use by researchers to provide the best method for detecting normal signals from abnormalities. Data is of both genders and the data recording time varies between several seconds to several minutes. All data is also labeled normal or abnormal. Due to the low positional accuracy and ECG signal time limit and the similarity of the signal in some diseases with the normal signal, the heart rate variability (HRV) signal was used. Measuring and analyzing the heart rate variability with time to evaluate the activity of the heart and differentiating different types of heart failure from one another is of interest to the experts. In the preprocessing stage, after noise cancelation by the adaptive Kalman filter and extracting the R wave by the Pan and Tampkinz algorithm, R-R intervals were extracted and the HRV signal was generated. In the process of processing this paper, a new idea was presented that, in addition to using the statistical characteristics of the signal to create a return map and extraction of nonlinear characteristics of the HRV signal due to the nonlinear nature of the signal. Finally, the artificial neural networks widely used in the field of ECG signal processing as well as distinctive features were used to classify the normal signals from abnormal ones. To evaluate the efficiency of proposed classifiers in this paper, the area under curve ROC was used. The results of the simulation in the MATLAB environment showed that the AUC of the MLP and SVM neural network was 0.893 and 0.947, respectively. As well as, the results of the proposed algorithm in this paper indicated that the more use of nonlinear characteristics in normal signal classification of the patient showed better performance. Today, research is aimed at quantitatively analyzing the linear and non-linear or descriptive and random nature of the heart rate variability signal, because it has been shown that the amount of these properties can be used to indicate the health status of the individual's heart. The study of nonlinear behavior and dynamics of the heart's neural control system in the short and long-term provides new information on how the cardiovascular system functions, and has led to the development of research in this field. Given that the ECG signal contains important information and is one of the common tools used by physicians to diagnose heart disease, but due to the limited accuracy of time and the fact that some information about this signal is hidden from the viewpoint of physicians, the design of the intelligent system proposed in this paper can help physicians with greater speed and accuracy in the diagnosis of normal and patient individuals and can be used as a complementary system in the treatment centers.

Keywords: neart rate variability, signal processing, linear and non-linear features, classification methods, ROC Curve

Procedia PDF Downloads 262
2327 Cyber Supply Chain Resilient: Enhancing Security through Leadership to Protect National Security

Authors: Katie Wood

Abstract:

Cyber criminals are constantly on the lookout for new opportunities to exploit organisation and cause destruction. This could lead to significant cause of economic loss for organisations in the form of destruction in finances, reputation and even the overall survival of the organization. Additionally, this leads to serious consequences on national security. The threat of possible cyber attacks places further pressure on organisations to ensure they are secure, at a time where international scale cyber attacks have occurred in a range of sectors. Stakeholders are wanting confidence that their data is protected. This is only achievable if a business fosters a resilient supply chain strategy which is implemented throughout its supply chain by having a strong cyber leadership culture. This paper will discuss the essential role and need for organisations to adopt a cyber leadership culture and direction to learn about own internal processes to ensure mitigating systemic vulnerability of its supply chains. This paper outlines that to protect national security there is an urgent need for cyber awareness culture change. This is required in all organisations, regardless of their sector or size, to implementation throughout the whole supplier chain to support and protect economic prosperity to make the UK more resilient to cyber-attacks. Through businesses understanding the supply chain and risk management cycle of their own operates has to be the starting point to ensure effective cyber migration strategies.

Keywords: cyber leadership, cyber migration strategies, resilient supply chain strategy, cybersecurity

Procedia PDF Downloads 242
2326 Hemocompatible Thin-Film Materials Recreating the Structure of the Cell Niches with High Potential for Endothelialization

Authors: Roman Major, Klaudia Trembecka- Wojciga, Juergen Markus Lackner, Boguslaw Major

Abstract:

The future and the development of science is therefore seen in interdisciplinary areas such as bio medical engineering. Self-assembled structures, similar to stem cell niches would inhibit fast division process and subsequently capture the stem cells from the blood flow. By means of surface topography and the stiffness as well as micro structure progenitor cells should be differentiated towards the formation of endothelial cells monolayer which effectively will inhibit activation of the coagulation cascade. The idea of the material surface development met the interest of the clinical institutions, which support the development of science in this area and are waiting for scientific solutions that could contribute to the development of heart assist systems. This would improve the efficiency of the treatment of patients with myocardial failure, supported with artificial heart assist systems. Innovative materials would enable the redesign, in the post project activity, construction of ventricular heart assist.

Keywords: bio-inspired materials, electron microscopy, haemocompatibility, niche-like structures, thin coatings

Procedia PDF Downloads 478
2325 Prescribing Pattern of Drugs in Patients with ARDS: An Observational Study

Authors: Rahul Magazine, Shobitha Rao

Abstract:

The aim of this study was to study the prescribing pattern of drugs in patients with ARDS (Acute Respiratory Distress Syndrome) managed at a tertiary care hospital. This observational study was conducted at Kasturba Hospital, Karnataka, India. Data of patients admitted from January 2010 to December 2012 was collected. A total of 150 patients of ARDS were included. Data included patients’ age, gender, clinical disorders precipitating ARDS, and prescribing pattern of drugs. The mean age of the study population was 42.92±13.91 years. 48% of patients were less than 40 years of age. Infection was the cause of ARDS in 81.3% of subjects. Antibiotics were prescribed in all the subjects and beta-lactams were prescribed in 97.3%. 41.3% were prescribed corticosteroids, 39.3% diuretics and 89.3% intravenous fluids. Infection was the commonest etiology for ARDS, and beta-lactams were the commonest antibiotics prescribed. Corticosteroids and diuretics were prescribed in a significant number of patients. Most of the patients received intravenous fluids.

Keywords: acute respiratory syndrome, beta lactams, corticosteroids, Acute Respiratory Distress Syndrome (ARDS)

Procedia PDF Downloads 369
2324 Acute and Chronic Effect of Biopesticide on Infestation of Whitefly Bemisia tabaci (Gennadius) on the Culantro Cultivation

Authors: U. Pangnakorn, S. Chuenchooklin

Abstract:

Acute and chronic effects of biopesticide from entomopathogenic nematode (Steinernema thailandensis n. sp.), bacteria ISR (Pseudomonas fluorescens), wood vinegar and fermented organic substances from plants: (neem Azadirachta indica + citronella grass Cymbopogon nardus Rendle + bitter bush Chromolaena odorata L.) were tested on culantro (Eryngium foetidum L.). The biopesticide was investigated for infestation reduction of the major insect pest whitefly (Bemisia tabaci (Gennadius)). The experimental plots were located at a farm in Nakhon Sawan Province, Thailand. This study was undertaken during the drought season (late November to May). Effectiveness of the treatment was evaluated in terms of acute and chronic effect. The populations of whitefly were observed and recorded every hour up to 3 hours with insect nets and yellow sticky traps after the treatments were applied for the acute effect. The results showed that bacteria ISR had the highest effectiveness for controlling whitefly infestation on culantro; the whitefly numbers on insect nets were 12.5, 10.0 and 7.5 after 1 hr, 2 hr, and 3 hr, respectively while the whitefly on yellow sticky traps showed 15.0, 10.0 and 10.0 after 1 hr, 2 hr, and 3 hr, respectively. For chronic effect, the whitefly was continuously collected and recorded at weekly intervals; the result showed that treatment of bacteria ISR found the average whitefly numbers only 8.06 and 11.0 on insect nets and sticky traps respectively, followed by treatment of nematode where the average whitefly was 9.87 and 11.43 on the insect nets and sticky traps, respectively. In addition, the minor insect pests were also observed and collected. The biopesticide influenced the reduction number of minor insect pests (red spider mites, beet armyworm, short-horned grasshopper, pygmy locusts, etc.) with only a few found on the culantro cultivation.

Keywords: whitefly (Bemisia tabaci Gennadius), culantro (Eryngium foetidum L.), acute and chronic effect, entomopathogenic nematode (Steinernema thailandensis n. sp.), bacteria ISR (Pseudomonas fluorescens)

Procedia PDF Downloads 281
2323 Effect of Acute Ingestion of Ice Water on Blood Pressure in Relation to Body Mass Index

Authors: Savitri Siddanagoudra, Shantala Herlekar, Priya Arjunwadekar

Abstract:

Background: The physiological response to water drinking in healthy subjects is an integrated response with an increase in sympathetic vasoconstrictor activity with induced bradycardia. Obesity is a modern pandemic, implicated in the pathogenesis of cardiovascular disease. In autonomic failure patients, water drinking has been shown the increased high blood pressure and bradycardia. Acute effects of ice water ingestion on blood pressure (BP) in relation to body mass index (BMI) is not addressed in literature. Objectives: Objective of this study is to evaluate BP before and after ingestion of cold water in all the three groups. Methods and Material: 60 healthy subjects between the age group of 18-24 yrs were selected and assigned into 3 groups based on BMI. BMI less than and equal to 25 kg/m2 is selected as Normal BMI group ,between 25- 29 kg/m2 as Overweight and BMI more than and equal to 30 kg/m2 as Obese. Procedure: Basal and after ingestion of 250 ml of cold water (7 0C ± 0.5 0C)BP was recorded in all the 3 groups. Results: Basal and after ice water ingestion BP increased statistically in all 3 groups. Conclusion: On acute ingestion of ice water overweight, obese may have more sympathoexcitaion compared to normal subjects.

Keywords: blood pressure, body mass index, ice water, symathoexcitation

Procedia PDF Downloads 160
2322 Analysing Responses of Intermediate and Expert Karate Athletes towards the Gyaku-Zuki Using Virtual Reality

Authors: Nicole Bandow, Peter Emmermacher, Oliver Wienert, Steffen Masik, Kerstin Witte

Abstract:

Karate-kumite is a fast sport where a good perception and anticipation of movements is needed in order to respond appropriately. Perception and anticipation are therefore essential for an efficient and precise movement control and a limiting factor in karate kumite. Previous studies only used 2D video technologies combined with the occlusion technique to study anticipation in sports. These studies showed limitations in the usage of 2D video footage in regards to realism and the presentation of depth information. To overcome these issues a virtual 3D environment was developed to create a similar to real life environment. The aim of this study was to compare the differences in responses of intermediate and expert karate athletes towards temporally and spatially occluded virtual karate attacks from two attackers. Five male expert and five intermediate karate athletes responded physically to nine (3 temporal combined with 3 spatial) occluded attacks of the Gyaku-Zuki of each attacker in the 3D virtual environment. The responses were evaluated in regards to correct point of time and appropriate response technique. Significant differences between the expertises’ responses for the attackers were found. Experts respond more often correct to early information of attacks than novices.

Keywords: anticipation, karate, occlusion, virtual reality

Procedia PDF Downloads 472
2321 Machine Learning-Driven Prediction of Cardiovascular Diseases: A Supervised Approach

Authors: Thota Sai Prakash, B. Yaswanth, Jhade Bhuvaneswar, Marreddy Divakar Reddy, Shyam Ji Gupta

Abstract:

Across the globe, there are a lot of chronic diseases, and heart disease stands out as one of the most perilous. Sadly, many lives are lost to this condition, even though early intervention could prevent such tragedies. However, identifying heart disease in its initial stages is not easy. To address this challenge, we propose an automated system aimed at predicting the presence of heart disease using advanced techniques. By doing so, we hope to empower individuals with the knowledge needed to take proactive measures against this potentially fatal illness. Our approach towards this problem involves meticulous data preprocessing and the development of predictive models utilizing classification algorithms such as Support Vector Machines (SVM), Decision Tree, and Random Forest. We assess the efficiency of every model based on metrics like accuracy, ensuring that we select the most reliable option. Additionally, we conduct thorough data analysis to reveal the importance of different attributes. Among the models considered, Random Forest emerges as the standout performer with an accuracy rate of 96.04% in our study.

Keywords: support vector machines, decision tree, random forest

Procedia PDF Downloads 40
2320 Beating Heart Coronary Artery Bypass Grafting on Intermittent Pump Support

Authors: Sushil Kumar Singh, Vivek Tewarson, Sarvesh Kumar, Shobhit Kumar

Abstract:

Objective: ‘Beating Heart coronary artery bypass grafting on Intermittent Pump Support’ is a more reliable method of coronary revascularization that takes advantage of off and on-pump CABG while eliminating the disadvantage of both techniques. Methods: From January 2015 to December 2021, a new technique, “Intermittent On pump beating heart CABG” using a suction stabilizer was used by putting aortic and venous cannulas electively in all the patients. Patients were supported by a pump intermittently, as and when required (Group 1, n=254). Retrospective data were collected from our record of the patients who underwent off-pump CABG electively by the same surgeon and team (Group 2, n=254). Results: Significant advantage was noted in Group 1 patients in terms of the number of grafts (3.31 ± 1.16 vs. 2.30 ±0.66), grafting of lateral vessels (316 vs.202), mean operating time (1.37 ± 0.23 hrs vs. 2.22 ± 0.45 hrs) and postoperative blood loss (406.30 ± 257.90 ml vs. 567.41 ± 265.20 ml).CPB support time was less than 15 minutes in the majority of patients (n=179, 70.37 %), with a mean of 16.81 minutes. It was required, particularly during the grafting of lateral vessels. A rise in enzymes level (CRP, CKMB, Trop I, and NTPro BNP) was noted in Group 1 patients. But, these did not affect the postoperative course in patients. There was no mortality in Group 1 patients, while four patients in Group 2 died. Coclusions: Intermittent on-pump CABG technique is a promising method of surgical revascularization for all patients requiring CABG. It has shown its superiority in terms of safety, the number of grafts, operating time, and better perioperative course.

Keywords: cardiopulmonary bypass, CABG, beating heart CABG, on-pump CABG

Procedia PDF Downloads 120
2319 Resistance to Sulfuric Acid Attacks of Self-Consolidating Concrete: Effect Metakaolin and Various Cements Types

Authors: Kianoosh Samimi, Farhad Estakhr, Mahdi Mahdikhani, Faramaz Moodi

Abstract:

Due to their fluidity and simplicity of use, self-compacting concretes (SCCs) have undeniable advantages. In recent years, the role of metakaolin as a one of pozzolanic materials in concrete has been considered by researchers. It can modify various properties of concrete, due to high pozzolanic reactions and also makes a denser microstructure. The objective of this paper is to examine the influence of three type of Portland cement and metakaolin on fresh state, compressive strength and sulfuric acid attacks in self- consolidating concrete at early age up to 90 days of curing in lime water. Six concrete mixtures were prepared with three types of different cement as Portland cement type II, Portland Slag Cement (PSC), Pozzolanic Portland Cement (PPC) and 15% substitution of metakaolin by every cement. The results show that the metakaolin admixture increases the viscosity and the demand amount of superplasticizer. According to the compressive strength results, the highest value of compressive strength was achieved for PSC and without any metakaolin at age of 90 days. Conversely, the lowest level of compressive strength at all ages of conservation was obtained for PPC and containing 15% metakaolin. According to this study, the total substitution of PSC and PPC by Portland cement type II is beneficial to the increasing in the chemical resistance of the SCC with respect to the sulfuric acid attack. On the other hand, this increase is more noticeable by the use of 15% of metakaolin. Therefore, it can be concluded that metakaolin has a positive effect on the chemical resistance of SCC containing of Portland cement type II, PSC, and PPC.

Keywords: SCC, metakaolin, cement type, durability, compressive strength, sulfuric acid attacks

Procedia PDF Downloads 185
2318 A Secure Survey against Black Hole Attack in MANET

Authors: G. Usha, S. Kannimuthu, K. Mahalakshmi

Abstract:

Mobile Adhoc Network (MANET) is one of the most promising technologies that have applications ranging from various portable devices to military networks. MANET has no fixed infrastructure and the security of such network is a big concern. Therefore, in order to operate MANET’s securely, the misbehavior and intrusions should be detected before the attackers affect the network communication. In this article, we make a comprehensive survey against black hole attack that is a serious threat against MANET that exploits the routing behavior of the MANET. We have given broad survey solutions that detect black hole attacks in MANET. This is achieved by analyzing the techniques involved in detecting the attacks in each scheme. Furthermore, we examine about the challenges to the researchers for constructing an in-depth solution against black hole attack.

Keywords: AODV, cross layer security, mobile Adhoc network (MANET), packet delivery ratio, single layer security

Procedia PDF Downloads 406
2317 Orientia Tsutsugamushi an Emerging Etiology of Acute Encephalitis Syndrome in Northern Part of India

Authors: Amita Jain, Shantanu Prakash, Suruchi Shukla

Abstract:

Introduction: Acute encephalitis syndrome (AES) is a complex multi etiology syndrome posing a great public health problem in the northern part of India. Japanese encephalitis (JE) virus is an established etiology of AES in this region. Recently, Scrub typhus (ST) is being recognized as an emerging aetiology of AES in JE endemic belt. This study was conducted to establish the direct evidence of Central nervous system invasion by Orientia tsutsugamushi leading to AES. Methodology: A total of 849 cases with clinical diagnosis of AES were enrolled from six districts (Deoria and its adjoining area) of the traditional north Indian Japanese encephalitis (JE) belt. Serum and Cerebrospinal fluid samples were collected and tested for major agent causing acute encephalitis. AES cases either positive for anti-ST IgM antibodies or negative for all tested etiologies were investigated for ST-DNA by real-time PCR. Results: Of these 505 cases, 250 patients were laboratory confirmed for O. tsutsugamushi infection either by anti-ST IgM antibodies positivity (n=206) on serum sample or by ST-DNA detection by real-time PCR assay on CSF sample (n=2) or by both (n=42).Total 29 isolate could be sequenced for 56KDa gene. Conclusion: All the strains were found to cluster with Gilliam strains. The majority of the isolates showed a 97–99% sequence similarity with Thailand and Cambodian strains. Gilliam strain of O.tsusugamushi is an emerging as one of the major aetiologies leading to AES in northern part of India.

Keywords: acute encephalitis syndrome, O. tsutsugamushi, Gilliam strain, North India, cerebrospinal fluid

Procedia PDF Downloads 249
2316 Blast Resistance Enhancement of Structures Subjected to Improvised Explosive Devices Attack: A Numerical Study

Authors: Michael I. Okereke, Ambrose I. Akpoyomare

Abstract:

This paper presents a numerical study of the impact mechanic of metallic and sandwich structures incorporate with blast resistance enhancements. The study focuses on structures that have been exposed to improvised explosives devices (IEDs) attacks. The results show numerical conclusions on mechanisms to ensure blast resistance enhancement for the applications studied in this work. The work has identified optimal panel configuration both in geometry and configurations to ensure optimal blast resistance response to such IEDs discharges. Findings from this work will drive improvements in especially military and civilian vehicles in countries where blast attacks on vehicular occupants are quite rampant like Pakistan and Afghanistan.

Keywords: blast resistance, blast enhancement, explosives, material behavior

Procedia PDF Downloads 373
2315 Percentile Norms of Heart Rate Variability (HRV) of Indian Sportspersons Withdrawn from Competitive Games and Sports

Authors: Pawan Kumar, Dhananjoy Shaw

Abstract:

Heart rate variability (HRV) is the physiological phenomenon of variation in the time interval between heartbeats and is alterable with fitness, age and different medical conditions including withdrawal/retirement from games/sports. Objectives of the study were to develop (a) percentile norms of heart rate variability (HRV) variables derived from time domain analysis of the Indian sportspersons withdrawn from competitive games/sports pertaining to sympathetic and parasympathetic activity (b) percentile norms of heart rate variability (HRV) variables derived from frequency domain analysis of the Indian sportspersons withdrawn from competitive games/sports pertaining to sympathetic and parasympathetic activity. The study was conducted on 430 males. Ages of the sample ranged from 30 to 35 years of same socio-economic status. Date was collected using ECG polygraphs. Data were processed and extracted using frequency domain analysis and time domain analysis. Collected data were computed with percentile from one to hundred. The finding showed that the percentile norms of heart rate variability (HRV) variables derived from time domain analysis of the Indian sportspersons withdrawn from competitive games/sports pertaining to sympathetic and parasympathetic activity namely, NN50 count (ranged from 1 to 189 score as percentile range). pNN50 count (ranged from .24 to 60.80 score as percentile range). SDNN (ranged from 17.34 to 167.29 score as percentile range). SDSD (ranged from 11.14 to 120.46 score as percentile range). RMMSD (ranged from 11.19 to 120.24 score as percentile range) and SDANN (ranged from 4.02 to 88.75 score as percentile range). The percentile norms of heart rate variability (HRV) variables derived from frequency domain analysis of the Indian sportspersons withdrawn from competitive games/sports pertaining to sympathetic and parasympathetic activity namely Low Frequency (Normalized Power) ranged from 20.68 to 90.49 score as percentile range. High Frequency (Normalized Power) ranged from 14.37 to 81.60 score as percentile range. LF/ HF ratio(ranged from 0.26 to 9.52 score as percentile range). LF (Absolute Power) ranged from 146.79 to 5669.33 score as percentile range. HF (Absolute Power) ranged from 102.85 to 10735.71 score as percentile range and Total Power (Absolute Power) ranged from 471.45 to 25879.23 score as percentile range. Conclusion: The analysis documented percentile norms for time domain analysis and frequency domain analysis for versatile use and evaluation.

Keywords: RMSSD, Percentile, SDANN, HF, LF

Procedia PDF Downloads 420
2314 L-Carnitine vs Extracorporeal Elimination for Acute Valproic Acid Intoxication: A Systemic Review

Authors: Byung Keun Yang, Jae Eun Ku, Young Seon Joo, Je Sung You, Sung Phil Chung, Hahn Shick Lee

Abstract:

The purpose of this study is to review the evidence comparing the efficacy and safety between L-carnitine and extracorporeal elimination therapy in the management of acute valproic acid L-carnitine vs Extracorporeal Elimination for Acute Valproic acid Intoxication. PubMed, Embase, Cochrane library, Web of Science, KoreaMed, KMbase, and KISS were searched, using the terms carnitine and valproic acid. All studies, regardless of design, reporting efficacy or safety endpoints were included. Reference citations from identified publications were reviewed. Both English and Korean languages were included. Two authors extracted primary data elements including poisoning severity, presenting features, clinical management, and outcomes. Thirty two articles including 33 cases were identified. Poisoning severity was classified as 3 mild, 11 moderate, and 19 severe cases. Nine cases were treated with L-carnitine while 24 cases received extracorporeal therapy without L-carnitine. All patients except one expired patient treated with hemodialysis recovered clinically and no adverse effects were noted. A case report comparing two patients who ingested the same amount of valproic acid showed increased ICU stay (3 vs. 11 days) in case of delayed extracorporeal therapy. Published evidence comparing L-carnitine with extracorporeal therapy is limited. Based on the available evidence, it is reasonable to consider L-carnitine for patients with acute valproic acid overdose. In case of severe poisoning, extracorporeal therapy would also be considered in the early phase of treatment.

Keywords: carnitine, overdose, poisoning, renal dialysis, valproic acid

Procedia PDF Downloads 365
2313 The Effects of Ellagic Acid on Rat Heart Induced Tobacco Smoke

Authors: Nalan Kaya, D. Ozlem Dabak, Gonca Ozan, Elif Erdem, Enver Ozan

Abstract:

One of the common causes of cardiovascular disease (CVD) is smoking. Moreover, tobacco smoke decreases the amount of oxygen that the blood can carry and increases the tendency for blood clots. Ellagic acid is a powerful antioxidant found especially in red fruits. It was shown to block atherosclerotic process suppressing oxidative stress and inflammation. The aim of this study was to examine the protective effects of ellagic acid against oxidative damage on heart tissues of rats induced by tobacco smoke. Twenty-four male adult (8 weeks old) Spraque-Dawley rats were divided randomly into 4 equal groups: group I (Control), group II (Tobacco smoke), group III (Tobacco smoke + corn oil) and group IV (Tobacco smoke + ellagic acid). The rats in group II, III and IV, were exposed to tobacco smoke 1 hour twice a day for 12 weeks. In addition to tobacco smoke exposure, 12 mg/kg ellagic acid (dissolved in corn oil), was applied to the rats in group IV by oral gavage. An equal amount of corn oil used in solving ellagic acid was applied to the rats by oral gavage in group III. At the end of the experimental period, rats were decapitated. Heart tissues and blood samples were taken. Histological and biochemical analyzes were performed. Vascular congestion, hyperemic areas, inflammatory cell infiltration and increased connective tissue in the perivascular area were observed in tobacco smoke and tobacco smoke + corn oil groups. Increased connective tissue in the perivascular area, hemorrhage and inflammatory cell infiltration were decreased in tobacco smoke + EA group. Group-II GSH level was not changed (significantly), CAT, SOD, GPx activities were significantly higher than group-I. Compared to group-II, group-IV GSH, SOD, CAT, GPx activities were increased, and MDA level was decreased significantly. Group-II and Group-III levels were similar. The results indicate that ellagic acid could protect the heart tissue from the tobacco smoke harmful effects.

Keywords: ellagic acid, heart, rat, tobacco smoke

Procedia PDF Downloads 224
2312 Synthetic Dermal Template Use in the Reconstruction of a Chronic Scalp Wound

Authors: Stephanie Cornish

Abstract:

The use of synthetic dermal templates, also known as dermal matrices, such as PolyNovo® Biodegradable Temporising Matrix (BTM), has been well established in the reconstruction of acute wounds with a full thickness defect of the skin. Its use has become common place in the treatment of full thickness burns and is not unfamiliar in the realm of necrotising fasciitis, free flap donor site reconstruction, and the management of acute traumatic wounds. However, the use of dermal templates for more chronic wounds is rare. The authors present the successful use of BTM in the reconstruction of a chronic scalp wound following the excision of a malignancy and multiple previous failed attempts at repair, thus demonstrating the potential for an increased scope of use.

Keywords: dermal template, BTM, chronic, scalp wound, reconstruction

Procedia PDF Downloads 91
2311 The Effect of Acute Toxicity and Thyroid Hormone Treatments on Hormonal Changes during Embryogenesis of Acipenser persicus

Authors: Samaneh Nazeri, Bagher Mojazi Amiri, Hamid Farahmand

Abstract:

Production of high quality fish eggs with reasonable hatching rate makes a success in aquaculture industries. It is influenced by the environmental stimulators and inhibitors. Diazinon is a widely-used pesticide in Golestan province (Southern Caspian Sea, North of Iran) which is washed to the aquatic environment (3 mg/L in the river). It is little known about the effect of this pesticide on the embryogenesis of sturgeon fish, the valuable species of the Caspian Sea. Hormonal content of the egg is an important factor to guaranty the successful passes of embryonic stages. In this study, the fate of Persian sturgeon embryo to 24, 48, 72, and 96-hours exposure of diazinon (LC50 dose) was tested. Also, the effect of thyroid hormones (T3 and T4) on these embryos was tested concurrently or separately with diazinon LC 50 dose. Fertilized eggs are exposed to T3 (low dose: 1 ng/ml, high dose: 10 ng/ml), T4 (low dose: 1 ng/ml, high dose: 10 ng/ml). Six eggs were randomly selected from each treatment (with three replicates) in five developmental stages (two cell- division, neural, heart present, heart beaten, and hatched larvae). The possibility of changing T3, T4, and cortisol contents of the embryos were determined in all treated groups and in every mentioned embryonic stage. The hatching rate in treated groups was assayed at the end of the embryogenesis to clarify the effect of thyroid hormones and diazinon. The results indicated significant differences in thyroid hormone contents, but no significant differences were recognized in cortisol levels at various early life stages of embryos. There was also significant difference in thyroid hormones in (T3, T4) + diazinon treated embryos (P˂0.05), while no significant difference between control and treatments in cortisol levels was observed. The highest hatching rate was recorded in HT3 treatment, while the lowest hatching rate was recorded for diazinon LC50 treatment. The result confirmed that Persian sturgeon embryo is less sensitive to diazinon compared to teleost embryos, and thyroid hormones may increase hatching rate even in the presence of diazinon.

Keywords: Persian sturgeon, diazinon, thyroid hormones, cortisol, embryo

Procedia PDF Downloads 303
2310 A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks

Authors: Naghmeh Moradpoor Sheykhkanloo

Abstract:

Structured Query Language Injection (SQLI) attack is a code injection technique in which malicious SQL statements are inserted into a given SQL database by simply using a web browser. Losing data, disclosing confidential information or even changing the value of data are the severe damages that SQLI attack can cause on a given database. SQLI attack has also been rated as the number-one attack among top ten web application threats on Open Web Application Security Project (OWASP). OWASP is an open community dedicated to enabling organisations to consider, develop, obtain, function, and preserve applications that can be trusted. In this paper, we propose an effective pattern recognition neural network model for detection and classification of SQLI attacks. The proposed model is built from three main elements of: a Uniform Resource Locator (URL) generator in order to generate thousands of malicious and benign URLs, a URL classifier in order to: 1) classify each generated URL to either a benign URL or a malicious URL and 2) classify the malicious URLs into different SQLI attack categories, and an NN model in order to: 1) detect either a given URL is a malicious URL or a benign URL and 2) identify the type of SQLI attack for each malicious URL. The model is first trained and then evaluated by employing thousands of benign and malicious URLs. The results of the experiments are presented in order to demonstrate the effectiveness of the proposed approach.

Keywords: neural networks, pattern recognition, SQL injection attacks, SQL injection attack classification, SQL injection attack detection

Procedia PDF Downloads 469