Search results for: false alarm
139 From News Breakers to News Followers: The Influence of Facebook on the Coverage of the January 2010 Crisis in Jos
Authors: T. Obateru, Samuel Olaniran
Abstract:
In an era when the new media is affording easy access to packaging and dissemination of information, the social media have become a popular avenue for sharing information for good or ill. It is evident that the traditional role of journalists as ‘news breakers’ is fast being eroded. People now share information on happenings via the social media like Facebook, Twitter and the rest, such that journalists themselves now get leads on happenings from such sources. Beyond the access to information provided by the new media is the erosion of the gatekeeping role of journalists who by their training and calling, are supposed to handle information with responsibility. Thus, sensitive information that journalists would normally filter is randomly shared by social media activists. This was the experience of journalists in Jos, Plateau State in January 2010 when another of the recurring ethnoreligious crisis that engulfed the state resulted in another widespread killing, vandalism, looting, and displacements. Considered as one of the high points of crises in the state, journalists who had the duty of covering the crisis also relied on some of these sources to get their bearing on the violence. This paper examined the role of Facebook in the work of journalists who covered the 2010 crisis. Taking the gatekeeping perspective, it interrogated the extent to which Facebook impacted their professional duty positively or negatively vis-à-vis the peace journalism model. It employed survey to elicit information from 50 journalists who covered the crisis using questionnaire as instrument. The paper revealed that the dissemination of hate information via mobile phones and social media, especially Facebook, aggravated the crisis situation. Journalists became news followers rather than news breakers because a lot of them were put on their toes by information (many of which were inaccurate or false) circulated on Facebook. It recommended that journalists must remain true to their calling by upholding their ‘gatekeeping’ role of disseminating only accurate and responsible information if they would remain the main source of credible information on which their audience rely.Keywords: crisis, ethnoreligious, Facebook, journalists
Procedia PDF Downloads 294138 Combination between Intrusion Systems and Honeypots
Authors: Majed Sanan, Mohammad Rammal, Wassim Rammal
Abstract:
Today, security is a major concern. Intrusion Detection, Prevention Systems and Honeypot can be used to moderate attacks. Many researchers have proposed to use many IDSs ((Intrusion Detection System) time to time. Some of these IDS’s combine their features of two or more IDSs which are called Hybrid Intrusion Detection Systems. Most of the researchers combine the features of Signature based detection methodology and Anomaly based detection methodology. For a signature based IDS, if an attacker attacks slowly and in organized way, the attack may go undetected through the IDS, as signatures include factors based on duration of the events but the actions of attacker do not match. Sometimes, for an unknown attack there is no signature updated or an attacker attack in the mean time when the database is updating. Thus, signature-based IDS fail to detect unknown attacks. Anomaly based IDS suffer from many false-positive readings. So there is a need to hybridize those IDS which can overcome the shortcomings of each other. In this paper we propose a new approach to IDS (Intrusion Detection System) which is more efficient than the traditional IDS (Intrusion Detection System). The IDS is based on Honeypot Technology and Anomaly based Detection Methodology. We have designed Architecture for the IDS in a packet tracer and then implemented it in real time. We have discussed experimental results performed: both the Honeypot and Anomaly based IDS have some shortcomings but if we hybridized these two technologies, the newly proposed Hybrid Intrusion Detection System (HIDS) is capable enough to overcome these shortcomings with much enhanced performance. In this paper, we present a modified Hybrid Intrusion Detection System (HIDS) that combines the positive features of two different detection methodologies - Honeypot methodology and anomaly based intrusion detection methodology. In the experiment, we ran both the Intrusion Detection System individually first and then together and recorded the data from time to time. From the data we can conclude that the resulting IDS are much better in detecting intrusions from the existing IDSs.Keywords: security, intrusion detection, intrusion prevention, honeypot, anomaly-based detection, signature-based detection, cloud computing, kfsensor
Procedia PDF Downloads 383137 An Unsupervised Domain-Knowledge Discovery Framework for Fake News Detection
Authors: Yulan Wu
Abstract:
With the rapid development of social media, the issue of fake news has gained considerable prominence, drawing the attention of both the public and governments. The widespread dissemination of false information poses a tangible threat across multiple domains of society, including politics, economy, and health. However, much research has concentrated on supervised training models within specific domains, their effectiveness diminishes when applied to identify fake news across multiple domains. To solve this problem, some approaches based on domain labels have been proposed. By segmenting news to their specific area in advance, judges in the corresponding field may be more accurate on fake news. However, these approaches disregard the fact that news records can pertain to multiple domains, resulting in a significant loss of valuable information. In addition, the datasets used for training must all be domain-labeled, which creates unnecessary complexity. To solve these problems, an unsupervised domain knowledge discovery framework for fake news detection is proposed. Firstly, to effectively retain the multidomain knowledge of the text, a low-dimensional vector for each news text to capture domain embeddings is generated. Subsequently, a feature extraction module utilizing the unsupervisedly discovered domain embeddings is used to extract the comprehensive features of news. Finally, a classifier is employed to determine the authenticity of the news. To verify the proposed framework, a test is conducted on the existing widely used datasets, and the experimental results demonstrate that this method is able to improve the detection performance for fake news across multiple domains. Moreover, even in datasets that lack domain labels, this method can still effectively transfer domain knowledge, which can educe the time consumed by tagging without sacrificing the detection accuracy.Keywords: fake news, deep learning, natural language processing, multiple domains
Procedia PDF Downloads 98136 Meet Automotive Software Safety and Security Standards Expectations More Quickly
Authors: Jean-François Pouilly
Abstract:
This study addresses the growing complexity of embedded systems and the critical need for secure, reliable software. Traditional cybersecurity testing methods, often conducted late in the development cycle, struggle to keep pace. This talk explores how formal methods, integrated with advanced analysis tools, empower C/C++ developers to 1) Proactively address vulnerabilities and bugs, which includes formal methods and abstract interpretation techniques to identify potential weaknesses early in the development process, reducing the reliance on penetration and fuzz testing in later stages. 2) Streamline development by focusing on bugs that matter, with close to no false positives and catching flaws earlier, the need for rework and retesting is minimized, leading to faster development cycles, improved efficiency and cost savings. 3) Enhance software dependability which includes combining static analysis using abstract interpretation with full context sensitivity, with hardware memory awareness allows for a more comprehensive understanding of potential vulnerabilities, leading to more dependable and secure software. This approach aligns with industry best practices (ISO2626 or ISO 21434) and empowers C/C++ developers to deliver robust, secure embedded systems that meet the demands of today's and tomorrow's applications. We will illustrate this approach with the TrustInSoft analyzer to show how it accelerates verification for complex cases, reduces user fatigue, and improves developer efficiency, cost-effectiveness, and software cybersecurity. In summary, integrating formal methods and sound Analyzers enhances software reliability and cybersecurity, streamlining development in an increasingly complex environment.Keywords: safety, cybersecurity, ISO26262, ISO24434, formal methods
Procedia PDF Downloads 19135 Syndecan -1 as Regulator of Ischemic-Reperfusion Damage Limitation in Experiment
Authors: M. E. Kolpakova, A. A. Jakovleva, L. S. Poliakova, H. El Amghari, S. Soliman, D. R. Faizullina, V. V. Sharoyko
Abstract:
Brain neuroplasticity is associated with blood-brain barrier vascular endothelial proteoglycans and post-stroke microglial activation. The study of the mechanisms of reperfusion injury limitation by remote ischemic postconditioning (RC) is of interest due to the effects on functional recovery after cerebral ischemia. The goal of the study is the assessment of the role of syndecan-1 (SDC-1) in restriction of ischemic-reperfusion injury on middle cerebral artery model in rats using RC protocol. Randomized controlled trials were conducted. Ischemia was performed by middle cerebral artery occlusion by Belayev L. (1996) on the Wistar rat-males (n= 87) weighting 250 ± 50 g. under general anesthesia (Zoletil 100 и Xylazine 2%). Syndecan-1 (SDC-1) concentration difference in plasma samples of false operated animals and animals with brain ischemia was 30% (30 min. МСАо: 41.4 * ± 1.3 ng/ml). SDC-1 concentration in animal plasma samples with ischemia + RC protocol was 112% (30 min МСАо+ RC): 67.8**± 5.8 ng/ml). Calculation of infarction volume in the ischemia group revealed brain injury in 31.97 ± 2.5%; the volume of infarction was 13.6 ± 1.3% in 30 min. МCАо + RC group. Swelling of tissue in the group 30 min. МCАо + RC was 16 ± 2.1%; it was 47 ± 3.3%. in 30 min. МCАо group. Correlation analysis showed a high direct correlation relationship between infarct area and muscle strength in the right forelimb (КК=0.72) in the 30 min. МCАо + RC group. Correlation analysis showed very high inverse correlation between infarct area and capillary blood flow in the 30 min. МCАо + RC group (p <0.01; r = -0.98). We believe the SDC-1 molecule in blood plasma may play role of potential messenger of ischemic-reperfusion injury restriction mechanisms. This leads to infarct-limiting effect of remote ischemic postconditioning and early functioning recovery.Keywords: ischemia, МСАо, remote ischemic postconditioning, syndecan-1
Procedia PDF Downloads 62134 Scientific Investigation for an Ancient Egyptian Polychrome Wooden Stele
Authors: Ahmed Abdrabou, Medhat Abdalla
Abstract:
The studied stele dates back to Third Intermediate Period (1075-664) B.C in an ancient Egypt. It is made of wood and covered with painted gesso layers. This study aims to use a combination of multi spectral imaging {visible, infrared (IR), Visible-induced infrared luminescence (VIL), Visible-induced ultraviolet luminescence (UVL) and ultraviolet reflected (UVR)}, along with portable x-ray fluorescence in order to map and identify the pigments as well as to provide a deeper understanding of the painting techniques. Moreover; the authors were significantly interested in the identification of wood species. Multispectral imaging acquired in 3 spectral bands, ultraviolet (360-400 nm), visible (400-780 nm) and infrared (780-1100 nm) using (UV Ultraviolet-induced luminescence (UVL), UV Reflected (UVR), Visible (VIS), Visible-induced infrared luminescence (VIL) and Infrared photography. False color images are made by digitally editing the VIS with IR or UV images using Adobe Photoshop. Optical Microscopy (OM), potable X-ray fluorescence spectroscopy (p-XRF) and Fourier Transform Infrared Spectroscopy (FTIR) were used in this study. Mapping and imaging techniques provided useful information about the spatial distribution of pigments, in particular visible-induced luminescence (VIL) which allowed the spatial distribution of Egyptian blue pigment to be mapped and every region containing Egyptian blue, even down to single crystals in some instances, is clearly visible as a bright white area; however complete characterization of the pigments requires the use of p. XRF spectroscopy. Based on the elemental analysis found by P.XRF, we conclude that the artists used mixtures of the basic mineral pigments to achieve a wider palette of hues. Identification of wood species Microscopic identification indicated that the wood used was Sycamore Fig (Ficus sycomorus L.) which is recorded as being native to Egypt and was used to make wooden artifacts since at least the Fifth Dynasty.Keywords: polychrome wooden stele, multispectral imaging, IR luminescence, Wood identification, Sycamore Fig, p-XRF
Procedia PDF Downloads 264133 Tool for Maxillary Sinus Quantification in Computed Tomography Exams
Authors: Guilherme Giacomini, Ana Luiza Menegatti Pavan, Allan Felipe Fattori Alves, Marcela de Oliveira, Fernando Antonio Bacchim Neto, José Ricardo de Arruda Miranda, Seizo Yamashita, Diana Rodrigues de Pina
Abstract:
The maxillary sinus (MS), part of the paranasal sinus complex, is one of the most enigmatic structures in modern humans. The literature has suggested that MSs function as olfaction accessories, to heat or humidify inspired air, for thermoregulation, to impart resonance to the voice and others. Thus, the real function of the MS is still uncertain. Furthermore, the MS anatomy is complex and varies from person to person. Many diseases may affect the development process of sinuses. The incidence of rhinosinusitis and other pathoses in the MS is comparatively high, so, volume analysis has clinical value. Providing volume values for MS could be helpful in evaluating the presence of any abnormality and could be used for treatment planning and evaluation of the outcome. The computed tomography (CT) has allowed a more exact assessment of this structure, which enables a quantitative analysis. However, this is not always possible in the clinical routine, and if possible, it involves much effort and/or time. Therefore, it is necessary to have a convenient, robust, and practical tool correlated with the MS volume, allowing clinical applicability. Nowadays, the available methods for MS segmentation are manual or semi-automatic. Additionally, manual methods present inter and intraindividual variability. Thus, the aim of this study was to develop an automatic tool to quantity the MS volume in CT scans of paranasal sinuses. This study was developed with ethical approval from the authors’ institutions and national review panels. The research involved 30 retrospective exams of University Hospital, Botucatu Medical School, São Paulo State University, Brazil. The tool for automatic MS quantification, developed in Matlab®, uses a hybrid method, combining different image processing techniques. For MS detection, the algorithm uses a Support Vector Machine (SVM), by features such as pixel value, spatial distribution, shape and others. The detected pixels are used as seed point for a region growing (RG) segmentation. Then, morphological operators are applied to reduce false-positive pixels, improving the segmentation accuracy. These steps are applied in all slices of CT exam, obtaining the MS volume. To evaluate the accuracy of the developed tool, the automatic method was compared with manual segmentation realized by an experienced radiologist. For comparison, we used Bland-Altman statistics, linear regression, and Jaccard similarity coefficient. From the statistical analyses for the comparison between both methods, the linear regression showed a strong association and low dispersion between variables. The Bland–Altman analyses showed no significant differences between the analyzed methods. The Jaccard similarity coefficient was > 0.90 in all exams. In conclusion, the developed tool to quantify MS volume proved to be robust, fast, and efficient, when compared with manual segmentation. Furthermore, it avoids the intra and inter-observer variations caused by manual and semi-automatic methods. As future work, the tool will be applied in clinical practice. Thus, it may be useful in the diagnosis and treatment determination of MS diseases. Providing volume values for MS could be helpful in evaluating the presence of any abnormality and could be used for treatment planning and evaluation of the outcome. The computed tomography (CT) has allowed a more exact assessment of this structure which enables a quantitative analysis. However, this is not always possible in the clinical routine, and if possible, it involves much effort and/or time. Therefore, it is necessary to have a convenient, robust and practical tool correlated with the MS volume, allowing clinical applicability. Nowadays, the available methods for MS segmentation are manual or semi-automatic. Additionally, manual methods present inter and intraindividual variability. Thus, the aim of this study was to develop an automatic tool to quantity the MS volume in CT scans of paranasal sinuses. This study was developed with ethical approval from the authors’ institutions and national review panels. The research involved 30 retrospective exams of University Hospital, Botucatu Medical School, São Paulo State University, Brazil. The tool for automatic MS quantification, developed in Matlab®, uses a hybrid method, combining different image processing techniques. For MS detection, the algorithm uses a Support Vector Machine (SVM), by features such as pixel value, spatial distribution, shape and others. The detected pixels are used as seed point for a region growing (RG) segmentation. Then, morphological operators are applied to reduce false-positive pixels, improving the segmentation accuracy. These steps are applied in all slices of CT exam, obtaining the MS volume. To evaluate the accuracy of the developed tool, the automatic method was compared with manual segmentation realized by an experienced radiologist. For comparison, we used Bland-Altman statistics, linear regression and Jaccard similarity coefficient. From the statistical analyses for the comparison between both methods, the linear regression showed a strong association and low dispersion between variables. The Bland–Altman analyses showed no significant differences between the analyzed methods. The Jaccard similarity coefficient was > 0.90 in all exams. In conclusion, the developed tool to automatically quantify MS volume proved to be robust, fast and efficient, when compared with manual segmentation. Furthermore, it avoids the intra and inter-observer variations caused by manual and semi-automatic methods. As future work, the tool will be applied in clinical practice. Thus, it may be useful in the diagnosis and treatment determination of MS diseases.Keywords: maxillary sinus, support vector machine, region growing, volume quantification
Procedia PDF Downloads 504132 How to Talk about It without Talking about It: Cognitive Processing Therapy Offers Trauma Symptom Relief without Violating Cultural Norms
Authors: Anne Giles
Abstract:
Humans naturally wish they could forget traumatic experiences. To help prevent future harm, however, the human brain has evolved to retain data about experiences of threat, alarm, or violation. When given compassionate support and assistance with thinking helpfully and realistically about traumatic events, most people can adjust to experiencing hardships, albeit with residual sad, unfortunate memories. Persistent, recurrent, intrusive memories, difficulty sleeping, emotion dysregulation, and avoidance of reminders, however, may be symptoms of Post-traumatic Stress Disorder (PTSD). Brain scans show that PTSD affects brain functioning. We currently have no physical means of restoring the system of brain structures and functions involved with PTSD. Medications may ease some symptoms but not others. However, forms of "talk therapy" with cognitive components have been found by researchers to reduce, even resolve, a broad spectrum of trauma symptoms. Many cultures have taboos against talking about hardships. Individuals may present themselves to mental health care professionals with severe, disabling trauma symptoms but, because of cultural norms, be unable to speak about them. In China, for example, relationship expectations may include the belief, "Bad things happening in the family should stay in the family (jiāchǒu bùkě wàiyán 家丑不可外扬)." The concept of "family (jiā 家)" may include partnerships, close and extended families, communities, companies, and the nation itself. In contrast to many trauma therapies, Cognitive Processing Therapy (CPT) for Post-traumatic Stress Disorder asks its participants to focus not on "what" happened but on "why" they think the trauma(s) occurred. The question "why" activates and exercises cognitive functioning. Brain scans of individuals with PTSD reveal executive functioning portions of the brain inadequately active, with emotion centers overly active. CPT conceptualizes PTSD as a network of cognitive distortions that keep an individual "stuck" in this under-functioning and over-functioning dynamic. Through asking participants forms of the question "why," plus offering a protocol for examining answers and relinquishing unhelpful beliefs, CPT assists individuals in consciously reactivating the cognitive, executive functions of their brains, thus restoring normal functioning and reducing distressing trauma symptoms. The culturally sensitive components of CPT that allow people to "talk about it without talking about it" may offer the possibility for worldwide relief from symptoms of trauma.Keywords: cognitive processing therapy (CPT), cultural norms, post-traumatic stress disorder (PTSD), trauma recovery
Procedia PDF Downloads 213131 Culture and Mental Health in Nigeria: A Qualitative Study of Berom, Hausa, Yoruba and Igbo Cultural Beliefs
Authors: Dung Jidong, Rachel Tribe, Poul Rohlerder, Aneta Tunariu
Abstract:
Cultural understandings of mental health problems are frequently overshadowed by the western conceptualizations. Research on culture and mental health in the Nigerian context seems to be lacking. This study examined the linguistic understandings and cultural beliefs that have implications for mental health among the Berom, Hausa, Yoruba and Igbo people of Nigeria. A purposive sample of 53 participants underwent semi-structured interviews that lasted approximately 55 minutes each. Of the N=53 participants, n=26 were psychology-aligned practitioners and n=27 ‘laypersons’. Participants were recruited from four states in Nigeria, Plateau, Kaduna, Ekiti, and Enugu. All participants were self-identified as members of their ethnic groups who speak and understand their native-languages, cultural beliefs, and also are domiciled within their ethnic communities. Thematic analysis using socio-constructionism from a critical-realist position was employed to explore the participants’ beliefs about mental health, and the clash between western trained practitioners’ views and the cultural beliefs of the ‘laypersons’. Data analysis found three main themes that re-emerged across the four ethnic samples: (i) beliefs about mental health problems as a spiritual curse (ii) traditional and religious healing are used more often than western mental health care (iii) low levels of mental health awareness. In addition, the Nigerian traditional and religious healing are also revealed to be helpful as the practice gives prominence to the native-languages, religious and cultural values. However, participants described the role of ‘false’ traditional or religious healers in communities as being potentially harmful. Finally, due to the current lack of knowledge about mental health problems, awareness creation and re-orientation may be beneficial for both rural and urban Nigerian communities.Keywords: beliefs cultures, health mental, languages religions, values
Procedia PDF Downloads 284130 Static Application Security Testing Approach for Non-Standard Smart Contracts
Authors: Antonio Horta, Renato Marinho, Raimir Holanda
Abstract:
Considered as an evolution of the Blockchain, the Ethereum platform, besides allowing transactions of its cryptocurrency named Ether, it allows the programming of decentralised applications (DApps) and smart contracts. However, this functionality into blockchains has raised other types of threats, and the exploitation of smart contracts vulnerabilities has taken companies to experience big losses. This research intends to figure out the number of contracts that are under risk of being drained. Through a deep investigation, more than two hundred thousand smart contracts currently available in the Ethereum platform were scanned and estimated how much money is at risk. The experiment was based in a query run on Google Big Query in July 2022 and returned 50,707,133 contracts published on the Ethereum platform. After applying the filtering criteria, the experimentgot 430,584 smart contracts to download and analyse. The filtering criteria consisted of filtering out: ERC20 and ERC721 contracts, contracts without transactions, and contracts without balance. From this amount of 430,584 smart contracts selected, only 268,103 had source codes published on Etherscan, however, we discovered, using a hashing process, that there were contracts duplication. Removing the duplicated contracts, the process ended up with 20,417 source codes, which were analysed using the open source SAST tool smartbugswith oyente and securify algorithms. In the end, there was nearly $100,000 at risk of being drained from the potentially vulnerable smart contracts. It is important to note that the tools used in this study may generate false positives, which may interfere with the number of vulnerable contracts. To address this point, our next step in this research is to develop an application to test the contract in a parallel environment to verify the vulnerability. Finally, this study aims to alert users and companies about the risk on not properly creating and analysing their smart contracts before publishing them into the platform. As any other application, smart contracts are at risk of having vulnerabilities which, in this case, may result in direct financial losses.Keywords: blockchain, reentrancy, static application security testing, smart contracts
Procedia PDF Downloads 88129 The Effect of Antibiotic Use on Blood Cultures: Implications for Future Policy
Authors: Avirup Chowdhury, Angus K. McFadyen, Linsey Batchelor
Abstract:
Blood cultures (BCs) are an important aspect of management of the septic patient, identifying the underlying pathogen and its antibiotic sensitivities. However, while the current literature outlines indications for initial BCs to be taken, there is little guidance for repeat sampling in the following 5-day period and little information on how antibiotic use can affect the usefulness of this investigation. A retrospective cohort study was conducted using inpatients who had undergone 2 or more BCs within 5 days between April 2016 and April 2017 at a 400-bed hospital in the west of Scotland and received antibiotic therapy between the first and second BCs. The data for BC sampling was collected from the electronic microbiology database, and cross-referenced with data from the hospital electronic prescribing system. Overall, 283 BCs were included in the study, taken from 92 patients (mean 3.08 cultures per patient, range 2-10). All 92 patients had initial BCs, of which 83 were positive (90%). 65 had a further sample within 24 hours of commencement of antibiotics, with 35 positive (54%). 23 had samples within 24-48 hours, with 4 (17%) positive; 12 patients had sampling at 48-72 hours, 12 at 72-96 hours, and 10 at 96-120 hours, with none positive. McNemar’s Exact Test was used to calculate statistical significance for patients who received blood cultures in multiple time blocks (Initial, < 24h, 24-120h, > 120h). For initial vs. < 24h-post BCs (53 patients tested), the proportion of positives fell from 46/53 to 29/53 (one-tailed P=0.002, OR 3.43, 95% CI 1.48-7.96). For initial vs 24-120h (n=42), the proportions were 38/42 and 4/42 respectively (P < 0.001, OR 35.0, 95% CI 4.79-255.48). For initial vs > 120h (n=36), these were 33/36 and 2/36 (P < 0.001,OR ∞). These were also calculated for a positive in initial or < 24h vs. 24-120h (n=42), with proportions of 41/42 and 4/42 (P < 0.001, OR 38.0, 95% CI 5.22-276.78); and for initial or < 24h vs > 120h (n=36), with proportions of 35/36 and 2/36 respectively (P < 0.001, OR ∞). This data appears to show that taking an initial BC followed by a BC within 24 hours of antibiotic commencement would maximise blood culture yield while minimising the risk of false negative results. This could potentially remove the need for as many as 46% of BC samples without adversely affecting patient care. BC yield decreases sharply after 48 hours of antibiotic use, and may not provide any clinically useful information after this time. Further multi-centre studies would validate these findings, and provide a foundation for future health policy generation.Keywords: antibiotics, blood culture, efficacy, inpatient
Procedia PDF Downloads 173128 Short-Term Effects of an Open Monitoring Meditation on Cognitive Control and Information Processing
Authors: Sarah Ullrich, Juliane Rolle, Christian Beste, Nicole Wolff
Abstract:
Inhibition and cognitive flexibility are essential parts of executive functions in our daily lives, as they enable the avoidance of unwanted responses or selectively switch between mental processes to generate appropriate behavior. There is growing interest in improving inhibition and response selection through brief mindfulness-based meditations. Arguably, open-monitoring meditation (OMM) improves inhibitory and flexibility performance by optimizing cognitive control and information processing. Yet, the underlying neurophysiological processes have been poorly studied. Using the Simon-Go/Nogo paradigm, the present work examined the effect of a single 15-minute smartphone app-based OMM on inhibitory performance and response selection in meditation novices. We used both behavioral and neurophysiological measures (event-related potentials, ERPs) to investigate which subprocesses of response selection and inhibition are altered after OMM. The study was conducted in a randomized crossover design with N = 32 healthy adults. We thereby investigated Go and Nogo trials in the paradigm. The results show that as little as 15 minutes of OMM can improve response selection and inhibition at behavioral and neurophysiological levels. More specifically, OMM reduces the rate of false alarms, especially during Nogo trials regardless of congruency. It appears that OMM optimizes conflict processing and response inhibition compared to no meditation, also reflected in the ERP N2 and P3 time windows. The results may be explained by the meta control model, which argues in terms of a specific processing mode with increased flexibility and inclusive decision-making under OMM. Importantly, however, the effects of OMM were only evident when there was the prior experience with the task. It is likely that OMM provides more cognitive resources, as the amplitudes of these EKPs decreased. OMM novices seem to induce finer adjustments during conflict processing after familiarization with the task.Keywords: EEG, inhibition, meditation, Simon Nogo
Procedia PDF Downloads 211127 Logical Thinking: A Surprising and Promising Insight for Creative and Critical Thinkers
Authors: Luc de Brabandere
Abstract:
Searchers in various disciplines have long tried to understand how a human being thinks. Most of them seem to agree that the brain works in two very different modes. For us, the first phase of thought imagines, diverges, and unlocks the field of possibilities. The second phase, judges converge and choose. But if we were to stop there, that would give the impression that thought is essentially an individual effort that seldom depends on context. This is, however, not the case. Whether we be a champion in creativity, so primarily in induction, or a master in logic where we are confronted with reality, the ideas we layout are indeed destined to be presented to third parties. They should therefore be exposed, defended, communicated, negotiated, or even sold. Regardless of the quality of the concepts we craft (creative thinking) and the interferences we build (logical thinking) we will take one day, or another, be confronted by people whose beliefs, opinions and ideas differ from ours (critical thinking). Logic and critique: The shared characteristics of logical and critical thoughts include a three-level structure of reasoning invented by the Greeks. For the first time in history, Aristotle tried to model thought deployable in three stages: the concept, the statement, and the reasoning. The three levels can be assessed according to different criteria. A concept is more or less useful, a statement is true or false, and reasoning is right or wrong. This three-level structure allows us to differentiate logic and critique, where the intention and words used are not the same. Logic only deals with the structure of reasoning and exhausts the problem. It regards premises as acquired and excludes the debate. Logic is in all certainty and pursues the truth. Critique is most probably searching for the plausible. Logic and creativity: Many known models present the brain as a two-stroke engine (divergence vs convergence, fast vs. slow, left-brain vs right-brain, Yin vs Yang, etc.). But that’s not the only thing. “Why didn’t we think of that before?” How often have we heard that sentence? A creative idea is the outcome of logic, but you can only understand it afterward! Through the use of exercises, we will witness how logic and creativity work together. A third theme is hidden behind the two main themes of the conference: logical thought, which the author can shed some light on.Keywords: creativity, logic, critique, digital
Procedia PDF Downloads 90126 Effects of Acupuncture Treatment in Gait Parameters in Parkinson's Disease
Authors: Catarina Isabel Ramos Pereira, Jorge Machado, Begona Alonso Criado, Maria João Santos
Abstract:
Introduction: Gait disorders are one of the symptoms that have severe implications on the quality of life in Parkinson's disease (PD). Currently, there is no therapy to reverse or treat this condition. None of the drugs used in conventional medical treatment is entirely efficient, and all have a high incidence of side effects. Acupuncture treatment is believed to improve motor ability, but there is still little scientific evidence in individuals with PD. Aim: The aim of the study is to investigate the acute effect of acupuncture on gait parameters in Parkinson's disease. Methods: This is a randomized and controlled crossover study. The same individual patient was part of both the experimental (real acupuncture) and control group (false acupuncture/sham), and the sequence was randomized. Gait parameters were measured at two different moments, before and after treatment, using four force platforms as well as the collection of 3D markers positions taken by 11 cameras. Images were quantitatively analyzed using Qualisys Track Manager software that let us extract data related to the quality of gait and balance. Seven patients with the diagnosis of Parkinson's disease were included in the study. Results: Statistically significant differences were found in gait speed (p = 0.016), gait cadence (p = 0.006), support base width (p = 0.0001), medio-lateral oscillation (p = 0.017), left-right step length (p = 0.0002), and stride length: right-right (p = 0.0000) and left-left (p = 0.0018), time of left support phase (p = 0.029), right support phase (p = 0.025) and double support phase (p = 0.015), between the initial and final moments for the experimental group. Differences in right-left stride length were found for both groups. Conclusion: Our results show that acupuncture could enhance gait in Parkinson's disease patients. Deep research involving a larger number of volunteers should be accomplished to validate these encouraging findings.Keywords: acupuncture, traditional Chinese medicine, Parkinson's disease, gait
Procedia PDF Downloads 171125 Impact of Youth Corners and Knowledge about Human Sexuality among Young Adults and Adolescents of Nigerian Population in the Prevention of Sexually Transmitted Diseases
Authors: Gabriel I. Oke, Faremi O. Ayodeji
Abstract:
Background: Access to youth Friendly Health Corners is vital for ensuring sexual reproductive health and total well being of young Adults since human sexuality has been widely misunderstood. Meanwhile, behavior of young people towards it remains at variance with the alarm. This study attempt to access the impact of youth corners also called Adolescent Friendly Health Corners on manifestation of human sexual behavior among Nigerian adolescent and young adults. Description: Hundred young adults and adolescents of both sex between the Age range of 12-25years were randomly selected from 5 secondary schools and 3 prominent universities in Southwestern Nigeria and focal group discussions (FGD) were conducted among them. Fifty secondary and primary health facilities were visited between February and June 2017 to conduct interviews for health workers and to ascertain the presence or absence of youth corners. Results: 95% of the health facilities visited lack Youth Corners section neither are they willing to make provision for it due to lack of workmanship and sponsorship. However, 5% with Youth corners does not have well-trained Counselors or a Health Educator but health professionals from nursing profession. 90% of the respondents of which 16-17 years of Age is the mean age had their first sexual exposure with no use of protection even before been introduced to what Sexuality is all about. Virtually, none of the respondents had ever visited a Youth Corner before or heard the term before. 86% have heard about the term STI before of which 60% are using protection, 10% care less about any information attached to the term STI, 4% have not heard of the term STI before even when translated to their local dialect. 20% are abstaining as at the time the study was conducted and they attribute their sexual decision to religion and parental influence. Of the age group 20-25, 45% claimed they have had symptoms of one STI or the other and 40% claimed they have been tested positive for an STI before of which 12% have positive HIV status. Promiscuous behaviors were found among them before they reach the age 16years with pornography ranking the highest, followed by masturbation. Respondents blame this on peer pressure, the lack of Youth Friendly Centers in their locality and lack of proper Sexual Orientation on time. About half of the respondents make use of contraceptives while others have varying views. We found out that inability to access Youth Friendly Centers amongst the respondents might be one of the singular reasons of their early experimentation of their sex life and lack of healthy sexual lifestyle. (95% CI, P=0.922) Conclusion: The study reveals that a connection between youth Friendly Centers and Prevention of Sexually Transmitted Diseases, therefore more sustainable Friendly Youth Corners with well-trained educators are needed in various Health facilities to checkmate the numerous risks of Young People along the path of adulthood.Keywords: adolescents, sexually transmitted infections, reproductive health, youth corners
Procedia PDF Downloads 232124 A Proposed Optimized and Efficient Intrusion Detection System for Wireless Sensor Network
Authors: Abdulaziz Alsadhan, Naveed Khan
Abstract:
In recent years intrusions on computer network are the major security threat. Hence, it is important to impede such intrusions. The hindrance of such intrusions entirely relies on its detection, which is primary concern of any security tool like Intrusion Detection System (IDS). Therefore, it is imperative to accurately detect network attack. Numerous intrusion detection techniques are available but the main issue is their performance. The performance of IDS can be improved by increasing the accurate detection rate and reducing false positive. The existing intrusion detection techniques have the limitation of usage of raw data set for classification. The classifier may get jumble due to redundancy, which results incorrect classification. To minimize this problem, Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), and Local Binary Pattern (LBP) can be applied to transform raw features into principle features space and select the features based on their sensitivity. Eigen values can be used to determine the sensitivity. To further classify, the selected features greedy search, back elimination, and Particle Swarm Optimization (PSO) can be used to obtain a subset of features with optimal sensitivity and highest discriminatory power. These optimal feature subset used to perform classification. For classification purpose, Support Vector Machine (SVM) and Multilayer Perceptron (MLP) used due to its proven ability in classification. The Knowledge Discovery and Data mining (KDD’99) cup dataset was considered as a benchmark for evaluating security detection mechanisms. The proposed approach can provide an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.Keywords: Particle Swarm Optimization (PSO), Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), Local Binary Pattern (LBP), Support Vector Machine (SVM), Multilayer Perceptron (MLP)
Procedia PDF Downloads 367123 Sleep Quality as Perceived by Critically Ill Patients at El Manial University Hospitals
Authors: Mohamed Adel Ahmed, Warda Youssef Morsy , Hanaa Ali El Feky
Abstract:
Background: Literature review cited that sleep is absolutely essential for surviving and reclamation of the quality of life. Critically ill patients often have poor sleep quality with prolonged sleep latency, sleep fragmentation, decreased sleep efficiency and frequent arousals. Nurses have a unique role for the early diagnosis of sleep disorders, decreasing stressors levels and providing the necessary environmental regulations to create a therapeutic ambiance. The aim of the study: to assess perceived sleep quality and identify factors affecting sleep quality among adult critically ill patients At El Manial University Hospital. Research Design: A descriptive exploratory design was utilized. Research questions: a) how do adult critically ill patients perceive sleep quality in the Critical Care Department of El Manial University Hospital? b) What are the factors affecting sleep quality among adult critically ill patients at El Manial University Hospital? Setting: selected critical and cardiac care units at El Manial University Hospital. Sample: A samples of convenience consisting of 100 adult male and female patients were included in the study. Tools of data collection: tool 1: Socio-demographic and Medical Data Sheet, tool 2: Modified St Mary's Hospital Sleep Questionnaire tool 3: Factors Affecting Sleep Quality Questionnaire among ICU Patients Results: The current study revealed that 76.0% of the studied sample had lack of sleep disturbance before hospitalization. However, 84 % had sleep disturbances during ICU stay, of these more than two-thirds (67 %) had moderate sleep disturbance. Presence of strange and bad odors, noise, having pain, fear of death and a loud voice produced by the ICU personnel had the most significant negative impact on patients’ sleep in percentage of 52.4, 50, 61.9, 45.2, 52.4, respectively. Conclusion: Sleep disturbances in the ICU are multifactorial, and ICU patients’ perceived degrees of sleep disturbance as a moderate. Recommendations: Based on findings of the present study, the following are recommended to be done by ICU nurses; create a healing ICU environment that should incorporate noise, light and temperature controls; decrease stimuli during night time hours to promote regulation of the circadian rhythm, allow usage of sleeping aids such as relaxing music, eye patches and earplugs into their daily nursing practice; cluster nursing activities and eliminate non-essential treatments during night time hours to allow uninterrupted sleep periods of at least 90 minutes to complete one sleep cycle , and minimize staff conversation, alarm noise and light during the quiet night time hours.Keywords: sleep quality, critically ill, patients, perception
Procedia PDF Downloads 444122 Act Local, Think Global: Superior Institute of Engineering of Porto Campaign for a Sustainable Campus
Authors: R. F. Mesquita Brandão
Abstract:
Act Local, Think Global is the name of a campaign implemented at Superior Institute of Engineering of Porto (ISEP), one of schools of Polytechnic of Porto, with the main objective of increase the sustainability of the campus. ISEP has a campus with 52.000 m2 and more than 7.000 students. The campaign started in 2019 and the results are very clear. In 2019 only 16% of the waste created in the campus was correctly separate for recycling and now almost 50% of waste goes to the correct waste container. Actions to reduce the energy consumption were implemented with significantly results. One of the major problems in the campus are the water leaks. To solve this problem was implemented a methodology for water monitoring during the night, a period of time where consumptions are normally low. If water consumption in the period is higher than a determinate value it may mean a water leak and an alarm is created to the maintenance teams. In terms of energy savings, some measurements were implemented to create savings in energy consumption and in equivalent CO₂ produced. In order to reduce the use of plastics in the campus, was implemented the prohibition of selling 33 cl plastic water bottles and in collaboration with the students association all meals served in the restaurants changed the water plastic bottle for a glass that can be refilled with water in the water dispensers. This measures created a reduction of use of more than 75.000 plastic bottles per year. In parallel was implemented the ISEP water glass bottle to be used in all scientific meetings and events. Has a way of involving all community in sustainability issues was developed and implemented a vertical garden in aquaponic system. In 2019, the first vertical garden without soil was installed inside a large campus building. The system occupies the entire exterior façade (3 floors) of the entrance to ISEP's G building. On each of these floors there is a planter with 42 positions available for plants. Lettuces, strawberries, peppers are examples of some vegetable produced that can be collected by the entire community. Associated to the vertical garden was developed a monitoring system were some parameters of the system are monitored. This project is under development because it will work in a stand-alone energy feeding, with the use of photovoltaic panels for production of energy necessities. All the system was, and still is, developed by students and teachers and is used in class projects of some ISEP courses. These and others measures implemented in the campus, will be more developed in the full paper, as well as all the results obtained, allowed ISEP to be the first Portuguese high school to obtain the certification “Coração Verde” (Green Heart), awarded by LIPOR, a Portuguese company with the mission of transform waste into new resources through the implementation of innovative and circular practices, generating and sharing value.Keywords: aquaponics, energy efficiency, recycling, sustainability, waste separation
Procedia PDF Downloads 94121 Implications of Stakeholder Theory as a Critical Theory
Authors: Louis Hickman
Abstract:
Stakeholder theory is a powerful conception of the firm based on the notion that a primary focus on shareholders is inadequate and, in fact, detrimental to the long-term health of the firm. As such it represents a departure from prevalent business school teachings with their focus on accounting and cost controls. Herein, it is argued that stakeholder theory can be better conceptualized as a critical theory, or one which represents a fundamental change in business behavior and can transform the behavior of businesses if accepted. By arguing that financial interests underdetermine the success of the firm, stakeholder theory further democratizes business by endorsing an increased awareness of the importance of non-shareholder stakeholders. Stakeholder theory requires new, non-financial, measures of success that provide a new consciousness for management and businesses when conceiving their actions and place in society. Thereby, stakeholder theory can show individuals through self-reflection that the capitalist impulses to generate wealth cannot act as primary drivers of business behavior, but rather, that we would choose to support interests outside ourselves if we made the decision in free discussion. This is due to the false consciousness embedded in our capitalism that the firm’s finances are the foremost concern of modern organizations at the expense of other goals. A focus on non-shareholder stakeholders in addition to shareholders generates greater benefits for society by improving the state of customers, employees, suppliers, the community, and shareholders alike. These positive effects generate further positive gains in well-being for stakeholders and translate into increased health for the future firm. Additionally, shareholders are the only stakeholder group that does not provide long-term firm value since there are not always communities with qualified employees, suppliers capable of providing the quality of product needed, or persons with purchasing power for all conceivable products. Therefore, the firm’s long-term health is benefited most greatly by improving the greatest possible parts of the society in which it inhabits, rather than solely the shareholder.Keywords: capitalism, critical theory, self-reflection, stakeholder theory
Procedia PDF Downloads 346120 Modelling the Impact of Installation of Heat Cost Allocators in District Heating Systems Using Machine Learning
Authors: Danica Maljkovic, Igor Balen, Bojana Dalbelo Basic
Abstract:
Following the regulation of EU Directive on Energy Efficiency, specifically Article 9, individual metering in district heating systems has to be introduced by the end of 2016. These directions have been implemented in member state’s legal framework, Croatia is one of these states. The directive allows installation of both heat metering devices and heat cost allocators. Mainly due to bad communication and PR, the general public false image was created that the heat cost allocators are devices that save energy. Although this notion is wrong, the aim of this work is to develop a model that would precisely express the influence of installation heat cost allocators on potential energy savings in each unit within multifamily buildings. At the same time, in recent years, a science of machine learning has gain larger application in various fields, as it is proven to give good results in cases where large amounts of data are to be processed with an aim to recognize a pattern and correlation of each of the relevant parameter as well as in the cases where the problem is too complex for a human intelligence to solve. A special method of machine learning, decision tree method, has proven an accuracy of over 92% in prediction general building consumption. In this paper, a machine learning algorithms will be used to isolate the sole impact of installation of heat cost allocators on a single building in multifamily houses connected to district heating systems. Special emphasises will be given regression analysis, logistic regression, support vector machines, decision trees and random forest method.Keywords: district heating, heat cost allocator, energy efficiency, machine learning, decision tree model, regression analysis, logistic regression, support vector machines, decision trees and random forest method
Procedia PDF Downloads 249119 Disinformation’s Threats to Democracy in Central Africa: Case Studies from Cameroon and Central African Republic
Authors: Simont Toussi
Abstract:
Cameroon and the Central African Republic arebound by the provisions of many regional and international charters, which condemn the manipulation of information, obstacles to access reliable information, or the limitation of freedoms of expression and opinion. These two countries also have constitutional guarantees for free speech and access to true and liable information. However, they are yet to define specific policies and regulations for access to information, disinformation, or misinformation. Yet, certain countries’ laws and regulations related to information and communication technologies, to criminal procedures, to terrorism, or intelligence services contain provisions that rather hider human rights by condemning false information. Like many other African countries, Cameroon and the Central African Republic face a profound democratic regression, and governments use multiple methods to stifle online discourse and digital rights. Despite the increased uptake of digital tools for political participation, there is a lack of interactivity and adoption of these tools. This enables a scarcity of information and creates room for the spreading of disinformation in the public space, hamperingdemocracy and the respect for human rights. This research aims to analyse the adequacy of stakeholders’ responses to disinformation in Cameroon and the Central African Republic in periods of political contestation, such as elections and anti-government protests, to highlight the nature, perpetrators, strategies, and channels of disinformation, as well as its effects on democratic actors, including civil society, bloggers, government critics, activists, and other human rights defenders. The study follows a qualitative method with literature review, content analysis, andkey informant’sinterviews with stakeholders’ representatives, emphasized crowdsourcing as a data and information collecting method in the two countries.Keywords: disinformation, democracy, political manipulation, social media, media, fake news, central Africa, cameroon, misinformation, free speech
Procedia PDF Downloads 108118 Identifying Artifacts in SEM-EDS of Fouled RO Membranes Used for the Treatment of Brackish Groundwater Through Raman and ICP-MS Analysis
Authors: Abhishek Soti, Aditya Sharma, Akhilendra Bhushan Gupta
Abstract:
Fouled reverse osmosis membranes are primarily characterized by Scanning Electron Microscopy (SEM) and Energy Dispersive X-ray Spectrometer (EDS) for a detailed investigation of foulants; however, this has severe limitations on several accounts. Apart from inaccuracy in spectral properties and inevitable interferences and interactions between sample and instrument, misidentification of elements due to overlapping peaks is a significant drawback of EDS. This paper discusses this limitation by analyzing fouled polyamide RO membranes derived from community RO plants of Rajasthan treating brackish water via a combination of results obtained from EDS and Raman spectroscopy and cross corroborating with ICP-MS analysis of water samples prepared by dissolving the deposited salts. The anomalous behavior of different morphic forms of CaCO₃ in aqueous suspensions tends to introduce false reporting of the presence of certain heavy metals and rare earth metals in the scales of the fouled RO membranes used for treating brackish groundwater when analyzed using the commonly adopted techniques like SEM-EDS or Raman spectrometry. Peaks of CaCO₃ reflected in EDS spectra of the membrane were found to be misinterpreted as Scandium due to the automatic assignment of elements by the software. Similarly, the morphic forms merged with the dominant peak of CaCO₃ might be reflected as a single peak of Molybdenum in the Raman spectrum. A subsequent ICP-MS analysis of the deposited salts showed that both Sc and Mo were below detectable levels. It is always essential to cross-confirm the results through a destructive analysis method to avoid such interferences. It is further recommended to study different morphic forms of CaCO₃ scales, as they exhibit anomalous properties like reverse solubility with temperature and hence altered precipitation tendencies, for an accurate description of the composition of scales, which is vital for the smooth functioning of RO systems.Keywords: reverse osmosis, foulant analysis, groundwater, EDS, artifacts
Procedia PDF Downloads 106117 Optimization of Polymerase Chain Reaction Condition to Amplify Exon 9 of PIK3CA Gene in Preventing False Positive Detection Caused by Pseudogene Existence in Breast Cancer
Authors: Dina Athariah, Desriani Desriani, Bugi Ratno Budiarto, Abinawanto Abinawanto, Dwi Wulandari
Abstract:
Breast cancer is a regulated by many genes. Defect in PIK3CA gene especially at position of exon 9 (E542K and E545K), called hot spot mutation induce early transformation of breast cells. The early detection of breast cancer based on mutation profile of this hot spot region would be hampered by the existence of pseudogene, marked by its substitution mutation at base 1658 (E545A) and deletion at 1659 that have been previously proven in several cancers. To the best of the authors’ knowledge, until recently no studies have been reported about pseudogene phenomenon in breast cancer. Here, we reported PCR optimization to to obtain true exon 9 of PIK3CA gene from its pseudogene hence increasing the validity of data. Material and methods: two genomic DNA with Dev and En code were used in this experiment. Two pairs of primer were design for Standard PCR method. The size of PCR products for each primer is 200bp and 400bp. While other primer was designed for Nested-PCR followed with DNA sequencing method. For Nested-PCR, we optimized the annealing temperature in first and second run of PCR, and the PCR cycle for first run PCR (15x versus 25x). Result: standard PCR using both primer pairs designed is failed to detect the true PIK3CA gene, appearing a substitution mutation at 1658 and deletion at 1659 of PCR product in sequence chromatogram indicated pseudogene. Meanwhile, Nested-PCR with optimum condition (annealing temperature for the first round at 55oC, annealing temperatung for the second round at 60,7oC with 15x PCR cycles) and could detect the true PIK3CA gene. Dev sample were identified as WT while En sample contain one substitution mutation at position 545 of exon 9, indicating amino acid changing from E to K. For the conclusion, pseudogene also exists in breast cancer and the apllication of optimazed Nested-PCR in this study could detect the true exon 9 of PIK3CA gene.Keywords: breast cancer, exon 9, hotspot mutation, PIK3CA, pseudogene
Procedia PDF Downloads 244116 Blunt Abdominal Trauma Management in Adult Patients: An Investigation on Safety of Discharging Patients with Normal Initial Findings
Authors: Rahimi-Movaghar Vafa, Mansouri Pejman, Chardoli Mojtaba, Rezvani Samina
Abstract:
Introduction: Blunt abdominal trauma is one of the leading causes of morbidity and mortality in all age groups, but diagnosis of serious intra-abdominal pathology is difficult and most of the damages are obscure in the initial investigation. There is still controversy about which patients should undergo abdomen/pelvis CT, which patients needs more observation and which patients can be discharged safely The aim of this study was to determine that is it safe to discharge patients with blunt abdominal trauma with normal initial findings. Methods: This non-randomized cross-sectional study was conducted from September 2013 to September 2014 at two levels I trauma centers, Sina hospital and Rasoul-e-Akram hospital (Tehran, Iran). Our inclusion criteria were all patients were admitted for suspicious BAT and our exclusion criteria were patients that have serious head and neck, chest, spine and limb injuries which need surgical intervention, those who have unstable vital signs, pregnant women with a gestational age over 3 months and homeless or without exact home address. 390 patients with blunt trauma abdomen examined and the necessary data, including demographic data, the abdominal examination, FAST result, patients’ lab test results (hematocrit, base deficit, urine analysis) on admission and at 6 and 12 hours after admission were recorded. Patients with normal physical examination, laboratory tests and FAST were discharged from the ED during 12 hours with the explanation of the alarm signs and were followed up after 24 hours and 1 week by a telephone call. Patients with abnormal findings in physical examination, laboratory tests, and FAST underwent abdomino-pelvic CT scan. Results: The study included 390 patients with blunt abdominal trauma between 12 and 80 years of age (mean age, 37.0 ± 13.7 years) and the mean duration of hospitalization in patients was 7.4 ± 4.1 hours. 88.6% of the patients were discharged from hospital before 12 hours. Odds ratio (OR) for having any symptoms for discharge after 6 hours was 0.160 and after 12 hours was 0.117 hours, which is statistically significant. Among the variables age, systolic and diastolic blood pressure, heart rate, respiratory rate, hematocrit and base deficit at admission, 6 hours and 12 hours after admission showed no significant statistical relationship with discharge time. From our 390 patients, 190 patients have normal initial physical examination, lab data and FAST findings that didn’t show any signs or symptoms in their next assessment and in their follow up by the phone call. Conclusion: It is recommended that patients with no symptoms at admission (completely normal physical examination, ultrasound, normal hematocrit and normal base deficit and lack of microscopic hematuria) and good family and social status can be safely discharged from the emergency department.Keywords: blunt abdominal trauma, patient discharge, emergency department, FAST
Procedia PDF Downloads 366115 Radar Track-based Classification of Birds and UAVs
Authors: Altilio Rosa, Chirico Francesco, Foglia Goffredo
Abstract:
In recent years, the number of Unmanned Aerial Vehicles (UAVs) has significantly increased. The rapid development of commercial and recreational drones makes them an important part of our society. Despite the growing list of their applications, these vehicles pose a huge threat to civil and military installations: detection, classification and neutralization of such flying objects become an urgent need. Radar is an effective remote sensing tool for detecting and tracking flying objects, but scenarios characterized by the presence of a high number of tracks related to flying birds make especially challenging the drone detection task: operator PPI is cluttered with a huge number of potential threats and his reaction time can be severely affected. Flying birds compared to UAVs show similar velocity, RADAR cross-section and, in general, similar characteristics. Building from the absence of a single feature that is able to distinguish UAVs and birds, this paper uses a multiple features approach where an original feature selection technique is developed to feed binary classifiers trained to distinguish birds and UAVs. RADAR tracks acquired on the field and related to different UAVs and birds performing various trajectories were used to extract specifically designed target movement-related features based on velocity, trajectory and signal strength. An optimization strategy based on a genetic algorithm is also introduced to select the optimal subset of features and to estimate the performance of several classification algorithms (Neural network, SVM, Logistic regression…) both in terms of the number of selected features and misclassification error. Results show that the proposed methods are able to reduce the dimension of the data space and to remove almost all non-drone false targets with a suitable classification accuracy (higher than 95%).Keywords: birds, classification, machine learning, UAVs
Procedia PDF Downloads 223114 The Role of Social Media in the Rise of Islamic State in India: An Analytical Overview
Authors: Yasmeen Cheema, Parvinder Singh
Abstract:
The evolution of Islamic State (acronym IS) has an ultimate goal of restoring the caliphate. IS threat to the global security is main concern of international community but has also raised a factual concern for India about the regular radicalization of IS ideology among Indian youth. The incident of joining Arif Ejaz Majeed, an Indian as ‘jihadist’ in IS has set strident alarm in law & enforcement agencies. On 07.03.2017, many people were injured in an Improvised Explosive Device (IED) blast on-board of Bhopal Ujjain Express. One perpetrator of this incident was killed in encounter with police. But, the biggest shock is that the conspiracy was pre-planned and the assailants who carried out the blast were influenced by the ideology perpetrated by the Islamic State. This is the first time name of IS has cropped up in a terror attack in India. It is a red indicator of violent presence of IS in India, which is spreading through social media. The IS have the capacity to influence the younger Muslim generation in India through its brutal and aggressive propaganda videos, social media apps and hatred speeches. It is a well known fact that India is on the radar of IS, as well on its ‘Caliphate Map’. IS uses Twitter, Facebook and other social media platforms constantly. Islamic State has used enticing videos, graphics, and articles on social media and try to influence persons from India & globally that their jihad is worthy. According to arrested perpetrator of IS in different cases in India, the most of Indian youths are victims to the daydreams which are fondly shown by IS. The dreams that the Muslim empire as it was before 1920 can come back with all its power and also that the Caliph and its caliphate can be re-established are shown by the IS. Indian Muslim Youth gets attracted towards these euphemistic ideologies. Islamic State has used social media for disseminating its poisonous ideology, recruitment, operational activities and for future direction of attacks. IS through social media inspired its recruits & lone wolfs to continue to rely on local networks to identify targets and access weaponry and explosives. Recently, a pro-IS media group on its Telegram platform shows Taj Mahal as the target and suggested mode of attack as a Vehicle Born Improvised Explosive Attack (VBIED). Islamic State definitely has the potential to destroy the Indian national security & peace, if timely steps are not taken. No doubt, IS has used social media as a critical mechanism for recruitment, planning and executing of terror attacks. This paper will therefore examine the specific characteristics of social media that have made it such a successful weapon for Islamic State. The rise of IS in India should be viewed as a national crisis and handled at the central level with efficient use of modern technology.Keywords: ideology, India, Islamic State, national security, recruitment, social media, terror attack
Procedia PDF Downloads 230113 A Case Study on Expanding Access to Higher Education of Students with Hearing Impairment
Authors: Afaf Manzoor, Abdul Hameed
Abstract:
Children with hearing impairment face several challenges in accessing primary and secondary education in general and higher education in particular in Pakistan. A large number of these children are excluded from formal education system through segregated special institutions. The enrollment rate of these children at school level is very low and it continues decreasing as they move on the ladder of education. Negligible number of students with hearing impairment gets any chance to be enrolled at tertiary or higher education institutes. The segregated system of education at primary and secondary level makes it even more difficult to adjust in an inclusive classroom at a higher level not only for students with hearing impairment but for their teachers and peers as well. A false belief of teachers and parents about low academic profile of students with hearing impairment is one of the major challenges to overcome for their participation at higher education. This case study was conducted to document an innovative step taken by the Department of Special Education Needs, University of Management & Technology, Lahore Pakistan. The prime objective of this study was to assess the satisfaction level of students with hearing impairment in BS 4 Years and MA Special Education programs at Lahore campus. Structured interviews were of 40 students with hearing impairment to assess the satisfaction on service delivery (admission process, classroom pedagogy, content, assessment/results, access to other services centers i.e. library, cafeteria, hostel, co-curricular activities) and campus life. Their peers without disabilities were also interviewed to assess their acceptance level. The findings of the study revealed positive results about their educational as well as social inclusion in the university. The students also shared their fears at the time of admission and how fear eventually faded out with the passage of time due to the proper academic support system. The findings of the study will be shared in detail with the audience during the presentation.Keywords: students with hearing impairment, higher education, inclusive education, marginalization
Procedia PDF Downloads 305112 International E-Learning for Assuring Ergonomic Working Conditions of Orthopaedic Surgeons: First Research Outcomes from Train4OrthoMIS
Authors: J. Bartnicka, J. A. Piedrabuena, R. Portilla, L. Moyano - Cuevas, J. B. Pagador, P. Augat, J. Tokarczyk, F. M. Sánchez Margallo
Abstract:
Orthopaedic surgeries are characterized by a high degree of complexity. This is reflected by four main groups of resources: 1) surgical team which is consisted of people with different competencies, educational backgrounds and positions; 2) information and knowledge about medical and technical aspects of surgery; 3) medical equipment including surgical tools and materials; 4) space infrastructure which is important from an operating room layout point of view. These all components must be integrated and build a homogeneous organism for achieving an efficient and ergonomically correct surgical workflow. Taking this as a background, there was formulated a concept of international project, called “Online Vocational Training course on ergonomics for orthopaedic Minimally Invasive” (Train4OrthoMIS), which aim is to develop an e-learning tool available in 4 languages (English, Spanish, Polish and German). In the article, there is presented the first project research outcomes focused on three aspects: 1) ergonomic needs of surgeons who work in hospitals around different European countries, 2) the concept of structure of e-learning course, 3) the definition of tools and methods for knowledge assessment adjusted to users’ expectation. The methodology was based on the expert panels and two types of surveys: 1) on training needs, 2) on evaluation and self-assessment preferences. The major findings of the study allowed describing the subjects of four training modules and learning sessions. According to peoples’ opinion there were defined most expected test methods which are single choice test and right after quizzes: “True or False” and “Link elements”. The first project outcomes confirmed the necessity of creating a universal training tool for orthopaedic surgeons regardless of the country in which they work. Because of limited time that surgeons have, the e-learning course should be strictly adjusted to their expectation in order to be useful.Keywords: international e-learning, ergonomics, orthopaedic surgery, Train4OrthoMIS
Procedia PDF Downloads 180111 Management of Recurrent Temporomandibular Joint True Bony Ankylosis : A Case Report
Authors: Mahmoud A. Amin, Essam Taman, Ahmed Omran, Mahmoud Shawky, Ahmed Mekawy, Abdallah M. Kotkat, Saber Younes, Nehad N. Ghonemy, Amin Saad, Ezz-Aleslam, Abdullah M. Elosh
Abstract:
Introduction: TMJ is a one-of-a-kind, complicated synovial joint that helps with masticatory function by allowing the mandible to open and close the mouth. True ankylosis is a situation in which condylar movement is limited by a mechanical defect in the joint, whereas false ankylosis is a condition in which there is a restriction in mandibular movement due to muscular spasm myositis ossificans, and coronoid process hyperplasia. Ankylosis is characterized by the inability to open the mouth due to fusion of the TMJ condyle to the base of the skull as a result of trauma, infection, or systemic diseases such as rheumatoid arthritis (the most common) and psoraisis. Ankylosis causes facial asymmetry and affects the patient psychologically as well as speech, difficult mastication, poor oral hygiene, malocclusion, and other factors. TMJ is a technically challenging joint; hence TMJ ankylosis management is complicated. Case presentation: this case is a male patient 25 years old reported to our maxillofacial clinic in Damietta faculty of medicine, Al-Azhar University with the inability to open the mouth at all, with a history of difficulty of mouth breathing and eating foods, there was a history of falling from height at 2006, and the patient underwent corrective surgery before with no improvement because the ankylosis was relapsed short period after the previous operations with that done out of our hospital inter-incisor distant ZERO so, this condition need mandatory management. Clinical examination and radiological investigations were done after complete approval from the patient and his brother; tracheostomy was done for our patient before the operation. The patient entered the operation in our hospital and drastic improvement in mouth opening was noticed, helping to restore the physical psychological health of the patient.Keywords: temporomandibular joint, TMJ, Ankylosis, mouth opening, physiotherapy, condylar plate
Procedia PDF Downloads 154110 Effect of Smartphone Applications on Patients' Knowledge of Surgery-Related Adverse Events during Hospitalization
Authors: Eunjoo Lee
Abstract:
Background: As the number of surgeries increases, the incidence of adverse events is likely to become more prevalent. Patients who are somewhat knowledgeable about surgery-related adverse events are more likely to engage in safety initiatives to prevent them. Objectives: To evaluate the impact of a smartphone application developed during the study to enhance patients’ knowledge of surgery-related adverse events during hospitalization. Design: Non-randomized, one group, measured pre- and post-intervention. Participants: Thirty-six hospitalized patients admitted to the orthopedics unit of a general hospital in South Korea. Methods. First, a smartphone application to enhance patients’ knowledge of surgery-related adverse events was developed through an iterative process, which included a literature review, expert consultation, and pilot testing. The application was installed on participants’ smartphones, and research assistants taught the participants to use it. Twenty-five true/false questions were used to assess patients’ knowledge of preoperative precautions (eight items), surgical site infection (five items), Foley catheter management (four items), drainage management (four items), and anesthesia-related complications (four items). Results: Overall, the percentage of correct answers increased significantly, from 57.02% to 73.82%, although answers related to a few specific topics did not increase that much. Although the patients’ understanding of drainage management and the Foley catheter did increase substantially after they used the smartphone application, it was still relatively low. Conclusions: The smartphone application developed during this study enhanced the patients’ knowledge of surgery-related adverse events during hospitalization. However, nurses must make an additional effort to help patients to understand certain topics, including drainage and Foley catheter management. Relevance to clinical practice: Insufficient patient knowledge increases the risk of adverse events during hospitalization. Nurses should take active steps to enhance patients’ knowledge of a range of safety issues during hospitalization, in order to decrease the number of surgery-related adverse events.Keywords: patient education, patient participation, patient safety, smartphone application, surgical errors
Procedia PDF Downloads 245