Search results for: drug users
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4408

Search results for: drug users

778 Fundamentals of Mobile Application Architecture

Authors: Mounir Filali

Abstract:

Companies use many innovative ways to reach their customers to stay ahead of the competition. Along with the growing demand for innovative business solutions is the demand for new technology. The most noticeable area of demand for business innovations is the mobile application industry. Recently, companies have recognized the growing need to integrate proprietary mobile applications into their suite of services; Companies have realized that developing mobile apps gives them a competitive edge. As a result, many have begun to rapidly develop mobile apps to stay ahead of the competition. Mobile application development helps companies meet the needs of their customers. Mobile apps also help businesses to take advantage of every potential opportunity to generate leads that convert into sales. Mobile app download growth statistics with the recent rise in demand for business-related mobile apps, there has been a similar rise in the range of mobile app solutions being offered. Today, companies can use the traditional route of the software development team to build their own mobile applications. However, there are also many platform-ready "low-code and no-code" mobile apps available to choose from. These mobile app development options have more streamlined business processes. This helps them be more responsive to their customers without having to be coding experts. Companies must have a basic understanding of mobile app architecture to attract and maintain the interest of mobile app users. Mobile application architecture refers to the buildings or structural systems and design elements that make up a mobile application. It also includes the technologies, processes, and components used during application development. The underlying foundation of all applications consists of all elements of the mobile application architecture; developing a good mobile app architecture requires proper planning and strategic design. The technology framework or platform on the back end and user-facing side of a mobile application is part of the mobile architecture of the application. In-application development Software programmers loosely refer to this set of mobile architecture systems and processes as the "technology stack."

Keywords: mobile applications, development, architecture, technology

Procedia PDF Downloads 104
777 Substituted Thiazole Analogues as Anti-Tumor Agents

Authors: Menna Ewida, Dalal Abou El-Ella, Dina Lasheen, Huessin El-Subbagh

Abstract:

Introduction: Vascular Endothelial Growth Factor receptor (VEGF) is a signal protein produced by cells that stimulates vasculogenesis to create new blood vessels. VEGF family binds to three trans-membrane tyrosine kinase receptors,Dihydrofolate reductase (DHFR) is an enzyme of crucial importance in medicinal chemistry. DHFR catalyzes the reduction 7,8 dihydro-folate to tetrahydrofolate and intimately couples with thymidylate synthase which is a pivotal enzyme that catalysis the reductive methylation of deoxyuridine monophosphate (dUMP) to deoxythymidine monophosphate (dTMP) utilizing N5,N10-methylene tetrahydrofolate as a cofactor which functions as the source of the methyl group. Purpose: Novel substituted Thiazole agents were designed as DHFR and VEGF-TK inhibitors with increased synergistic activity and decreased side effects. Methods: Five series of compounds were designed with a rational that mimic the pharmacophoric features present in the reported active compounds that target DHFR & VEGFR. These molecules were docked against Methotrexate & Sorafenib as controls. An in silico ADMET study was also performed to validate the bioavailability of the newly designed compounds. The in silico molecular docking & ADMET study were also applied to the non-classical antifolates for comparison. The interaction energy comparable to that of MTX for DHFRI and Sorafenib for VEGF-TKI activity were recorded. Results: Compound 5 exhibited the highest interaction energy when docked against Sorafenib, While Compound 9 showed the highest interaction energy when docked against MTX with the perfect binding mode. Comparable results were also obtained for the ADMET study. Most of the compounds showed absorption within (95-99) zone which varies according to the type of substituents. Conclusions: The Substituted Thiazole Analogues could be a suitable template for antitumor drugs that possess enhanced bioavailability and act as DHFR and VEGF-TK inhibitors.

Keywords: anti-tumor agents, DHFR, drug design, molecular modeling, VEGFR-TKIs

Procedia PDF Downloads 231
776 The Influence of Family of Origin on Children: A Comprehensive Model and Implications for Positive Psychology and Psychotherapy

Authors: Meichen He, Xuan Yang

Abstract:

Background: In the field of psychotherapy, the role of the family of origin is of utmost importance. Over the past few decades, both individual-oriented and family-oriented approaches to child therapy have shown moderate success in reducing children's psychological and behavioral issues. Objective: However, in exploring how the family of origin influences individuals, it has been noted that there is a lack of comprehensive measurement indicators and an absence of an exact model to assess the impact of the family of origin on individual development. Therefore, this study aims to develop a model based on a literature review regarding the influence of the family of origin on children. Specifically, it will examine the effects of factors such as education level, economic status, maternal age, family integration, family violence, marital conflict, parental substance abuse, and alcohol consumption on children's self-confidence and life satisfaction. Through this research, we aim to further investigate the impact of the family of origin on children and provide directions for future research in positive psychology and psychotherapy. Methods: This study will employ a literature review methodology to gather and analyze relevant research articles on the influence of the family of origin on children. Subsequently, we will conduct quantitative analyses to establish a comprehensive model explaining how family of origin factors affect children's psychological and behavioral outcomes. Findings: the research has revealed that family of origin factors, including education level, economic status, maternal age, family integration, family violence, marital conflict, parental drug and alcohol consumption, have an impact on children's self-confidence and life satisfaction. These factors can affect children's psychological well-being and happiness through various pathways. Implications: The results of this study will contribute to a better understanding of the influence of the family of origin on children and provide valuable directions for future research in positive psychology and psychotherapy. This research will enhance awareness of children's psychological well-being and lay the foundation for improving psychotherapeutic methods.

Keywords: family of origion, positive psychology, developmental psychology, family education, social psychology, educational psychology

Procedia PDF Downloads 151
775 Social Networks in a Communication Strategy of a Large Company

Authors: Kherbache Mehdi

Abstract:

Within the framework of the validation of the Master in business administration marketing and sales in INSIM institute international in management Blida, we get the opportunity to do a professional internship in Sonelgaz Enterprise and a thesis. The thesis deals with the integration of social networking in the communication strategy of a company. The problematic is: How communicate with social network can be a solution for companies? The challenges stressed by this thesis were to suggest limits and recommendations to Sonelgaz Enterprise concerning social networks. The whole social networks represent more than a billion people as a potential target for the companies. Thanks to research and a qualitative approach, we have identified tree valid hypothesis. The first hypothesis allows confirming that using social networks cannot be ignored by any company in its communication strategy. However, the second hypothesis demonstrates that it’s necessary to prepare a strategy that integrates social networks in the communication plan of the company. The risk of this strategy is very limited because failure on social networks is not a restraint for the enterprise, social networking is not expensive and, a bad image which could result from it is not as important in the long-term. Furthermore, the return on investment is difficult to evaluate. Finally, the last hypothesis shows that firms establish a new relation between consumers and brands thanks to the proximity allowed by social networks. After the validation of the hypothesis, we suggested some recommendations to Sonelgaz Enterprise regarding the communication through social networks. Firstly, the company must use the interactivity of social network in order to have fruitful exchanges with the community. We also recommended having a strategy to treat negative comments. The company must also suggest delivering resources to the community thanks to a community manager, in order to have a good relation with the community. Furthermore, we advised using social networks to do business intelligence. Sonelgaz Enterprise can have some creative and interactive contents with some amazing applications on Facebook for example. Finally, we recommended to the company to be not intrusive with “fans” or “followers” and to be open to all the platforms: Twitter, Facebook, Linked-In for example.

Keywords: social network, buzz, communication, consumer, return on investment, internet users, web 2.0, Facebook, Twitter, interaction

Procedia PDF Downloads 417
774 Is Sodium Channel Nav1.7 an Ideal Therapeutically Analgesic Target? A Systematic Review

Authors: Yutong Wan, John N. Wood

Abstract:

Introduction: SCN9A encoded Nav1.7 is an ideal therapeutic target with minimal side effects for the pharmaceutical industry because SCN9A variants can cause both human gains of function pain-related mutations and loss of function pain-free mutations. This study reviews the clinical effectiveness of existing Nav1.7 inhibitors, which theoretically should be powerful analgesics. Methods: A systematic review is conducted on the effectiveness of current Nav1.7 blockers undergoing clinical trials. Studies were mainly extracted from PubMed, U.S. National Library of Medicine Clinical Trials, World Health Organization International Clinical Trials Registry, ISRCTN registry platform, and Integrated Research Approval System by NHS. Only studies with full text available and those conducted using double-blinded, placebo controlled, and randomised designs and reporting at least one analgesic measurement were included. Results: Overall, 61 trials were screened, and eight studies covering PF 05089771 (Pfizer), TV 45070 (Teva & Xenon), and BIIB074 (Biogen) met the inclusion criteria. Most studies were excluded because results were not published. All three compounds demonstrated insignificant analgesic effects, and the comparison between PF 05089771 and pregabalin/ibuprofen showed that PF 05089771 was a much weaker analgesic. All three drug candidates only have mild side effects, indicating the potentials for further investigation of Nav1.7 antagonists. Discussion: The failure of current Nav1.7 small molecule inhibitors might attribute to ignorance of the key role of endogenous systems in Nav1.7 null mutants, the lack of selectivity and blocking potency, and central impermeability. The synergistic combination of analgesic drugs, a recent UCL patent, combining a small dose of Nav1.7 blockers and opioids or enkephalinase inhibitors dramatically enhanced the analgesic effects. Conclusion: The current clinical testing Nav1.7 blockers are generally disappointing. However, the newer generation of Nav1.7 targeting analgesics has overcome the major constraints of its predecessors.

Keywords: chronic pain, Nav1.7 blockers, SCN9A, systematic review

Procedia PDF Downloads 124
773 Digital Media Use and Access among Rural Youth in South Africa: The Prospects for Female Empowerment

Authors: Fulufhelo Oscar Makananise

Abstract:

Digital technologies have played a significant role in bridging the information gap between the haves and the have nots in society. In developing countries such as South Africa, historically marginalised groups such as women in rural communities have an opportunity to use digital technologies to network among themselves as well as interact with their government, thereby enhancing prospects for poverty eradication, political participation, community development and democracy. However, the extent to which these goals can be achieved in a developing context through harnessing digital technologies is not quite clear, particularly given the fact that access to these technologies is not evenly distributed and the fact that women’s access to digital technologies is hampered by factors that go beyond the question of infrastructure. Informed by the technological dependency theory, this paper is about how female youth in rural South Africa are deploying digital media tools for socio-economic empowerment. In particular, the study investigated the extent to which female youth in Limpopo province, South Africa access and use digital media platforms and gadgets and the extent to which those technologies are breaking down barriers that stand in the way of female youth empowerment. Data were gathered using a self-administered questionnaire disseminated to selected 100 female youth in Limpopo Province, South Africa. The data were analysed using SPSS version 9, and the results were analysed using descriptive statistics. The paper argues that wider and constant access to digital media by female youth in rural areas is indicative of the great potential for empowering female youth in rural areas through harnessing digital media. The study established that the majority of female youth had access to digital media technologies and used them to share valuable information among themselves. The study further established that female youth are active users of digital media in South Africa, which is the significant driver for socio-economic empowerment.

Keywords: digital technologies, empowerment, female youth, South Africa, survey, technological dependency

Procedia PDF Downloads 129
772 The Impact of Electrospinning Parameters on Surface Morphology and Chemistry of PHBV Fibers

Authors: Lukasz Kaniuk, Mateusz M. Marzec, Andrzej Bernasik, Urszula Stachewicz

Abstract:

Electrospinning is one of the commonly used methods to produce micro- or nano-fibers. The properties of electrospun fibers allow them to be used to produce tissue scaffolds, biodegradable bandages, or purification membranes. The morphology of the obtained fibers depends on the composition of the polymer solution as well as the processing parameters. Interesting properties such as high fiber porosity can be achieved by changing humidity during electrospinning. Moreover, by changing voltage polarity in electrospinning, we are able to alternate functional groups at the surface of fibers. In this study, electrospun fibers were made of natural, thermoplastic polyester – PHBV (poly(3-hydroxybutyric acid-co-3-hydrovaleric acid). The fibrous mats were obtained using both positive and negative voltage polarities, and their surface was characterized using X-ray photoelectron spectroscopy (XPS, Ulvac-Phi, Chigasaki, Japan). Furthermore, the effect of the humidity on surface morphology was investigated using scanning electron microscopy (SEM, Merlin Gemini II, Zeiss, Germany). Electrospun PHBV fibers produced with positive and negative voltage polarity had similar morphology and the average fiber diameter, 2.47 ± 0.21 µm and 2.44 ± 0.15 µm, respectively. The change of the voltage polarity had a significant impact on the reorientation of the carbonyl groups what consequently changed the surface potential of the electrospun PHBV fibers. The increase of humidity during electrospinning causes porosity in the surface structure of the fibers. In conclusion, we showed within our studies that the process parameters such as humidity and voltage polarity have a great influence on fiber morphology and chemistry, changing their functionality. Surface properties of polymer fiber have a significant impact on cell integration and attachment, which is very important in tissue engineering. The possibility of changing surface porosity allows the use of fibers in various tissue engineering and drug delivery systems. Acknowledgment: This study was conducted within 'Nanofiber-based sponges for atopic skin treatment' project., carried out within the First TEAM programme of the Foundation for Polish Science co-financed by the European Union under the European Regional Development Fund, project no POIR.04.04.00-00- 4571/18-00.

Keywords: cells integration, electrospun fiber, PHBV, surface characterization

Procedia PDF Downloads 114
771 Hydrogel Hybridizing Temperature-Cured Dissolvable Gelatin Microspheres as Non-Anchorage Dependent Cell Carriers for Tissue Engineering Applications

Authors: Dong-An Wang

Abstract:

All kinds of microspheres have been extensively employed as carriers for drug, gene and therapeutic cell delivery. Most therapeutic cell delivery microspheres rely on a two-step methodology: fabrication of microspheres and subsequent seeding of cells onto them. In this study, we have developed a novel one-step cell encapsulation technique using a convenient and instant water-in-oil single emulsion approach to form cell-encapsulated gelatin microspheres. This technology is adopted for hyaline cartilage tissue engineering, in which autologous chondrocytes are used as therapeutic cells. Cell viability was maintained throughout and after the microsphere formation (75-100 µm diameters) process that avoids involvement of any covalent bonding reactions or exposure to any further chemicals. Further encapsulation of cell-laden microspheres in alginate gels were performed under 4°C via a prompt process. Upon the formation of alginate constructs, they were immediately relocated into CO2 incubator where the temperature was maintained at 37°C; under this temperature, the cell-laden gelatin microspheres dissolved within hours to yield similarly sized cavities and the chondrocytes were therefore suspended within the cavities inside the alginate gel bulk. Hence, the gelatin cell-laden microspheres served two roles: as cell delivery vehicles which can be removable through temperature curing, and as porogens within an alginate hydrogel construct to provide living space for cell growth and tissue development as well as better permeability for mutual diffusions. These cell-laden microspheres, namely “temperature-cured dissolvable gelatin microsphere based cell carriers” (tDGMCs), were further encapsulated in a chondrocyte-laden alginate scaffold system and analyzed by WST-1, gene expression analyses, biochemical assays, histology and immunochemistry stains. The positive results consistently demonstrated the promise of tDGMC technology in delivering these non-anchorage dependent cells (chondrocytes). It can be further conveniently translated into delivery of other non-anchorage dependent cell species, including stem cells, progenitors or iPS cells, for regeneration of tissues in internal organs, such as engineered hepatogenesis or pancreatic regeneration.

Keywords: biomaterials, tissue engineering, microsphere, hydrogel, porogen, anchorage dependence

Procedia PDF Downloads 394
770 Unravelling of the TOR Signaling Pathway in Human Fungal Pathogen Cryptococcus neoformans

Authors: Yee-Seul So, Guiseppe Ianiri, Alex Idnurm, Yong-Sun Bahn

Abstract:

Tor1 is a serine/threonine protein kinase that is widely conserved across eukaryotic species. Tor1 was first identified in Saccharomyces cerevisiae as a target of rapamycin (TOR). The TOR pathway has been implicated in regulating cellular responses to nutrients, proliferation, translation, transcription, autophagy, and ribosome biogenesis. Here we identified two homologues of S. cerevisiae Tor proteins, CNAG_06642 (Tor1) and CNAG_05220 (Tlk1, TOR-like kinase 1), in Cryptococcus neoformans causing a life-threatening fungal meningoencephalitis. Both Tor1 and Tlk1 have rapamycin-binding (RB) domains but Tlk1 has truncated RB form. To study the TOR-signaling pathway in the fungal pathogen, we attempt to construct the tor1Δ and tlk1Δ mutants and phenotypically analyze them. Although we failed to construct the tor1Δ mutant, we successfully construct the tlk1Δ mutant. The tlk1Δ mutant does not exhibit any discernable phenotypes, suggesting that Tlk1 is dispensable in C. neoformans. The essentiality of TOR1 is independently confirmed by constructing the TOR1 promoter replacement strain by using a copper transporter 4 (CTR4) promoter and the TOR1/tor1 heterozygous mutant in diploid C. neoformans strain background followed by sporulation analysis. To further analyze the function of Tor1, we construct TOR1 overexpression mutant using a constitutively active histone H3 in C. neoformans. We find that the Tor1 overexpression mutant is resistant to rapamycin but the tlk1Δ mutant does not exhibit any altered resistance to rapamycin, further confirming that Tor1, but not Tlk1, is critical for TOR signaling. Furthermore, we found that Tor1 is involved in response to diverse stresses, including genotoxic stress, oxidative stress, thermo-stress, antifungal drug treatment, and production of melanin. To identify any TOR-related transcription factors, we screened C. neoformans transcription factor library that we constructed in our previous study and identified several potential downstream factors of Tor1, including Atf1, Crg1 and Bzp3. In conclusion, the current study provides insight into the role of the TOR signaling pathway in human fungal pathogens as well as C. neoformans.

Keywords: fungal pathogen, serine/threonine kinase, target of rapamycin, transcription factor

Procedia PDF Downloads 220
769 Bulk Modification of Poly(Dimethylsiloxane) for Biomedical Applications

Authors: A. Aslihan Gokaltun, Martin L. Yarmush, Ayse Asatekin, O. Berk Usta

Abstract:

In the last decade microfabrication processes including rapid prototyping techniques have advanced rapidly and achieved a fairly matured stage. These advances encouraged and enabled the use of microfluidic devices by a wider range of users with applications in biological separations, and cell and organoid cultures. Accordingly, a significant current challenge in the field is controlling biomolecular interactions at interfaces and the development of novel biomaterials to satisfy the unique needs of the biomedical applications. Poly(dimethylsiloxane) (PDMS) is by far the most preferred material in the fabrication of microfluidic devices. This can be attributed its favorable properties, including: (1) simple fabrication by replica molding, (2) good mechanical properties, (3) excellent optical transparency from 240 to 1100 nm, (4) biocompatibility and non-toxicity, and (5) high gas permeability. However, high hydrophobicity (water contact angle ~108°±7°) of PDMS often limits its applications where solutions containing biological samples are concerned. In our study, we created a simple, easy method for modifying the surface chemistry of PDMS microfluidic devices through the addition of surface-segregating additives during manufacture. In this method, a surface segregating copolymer is added to precursors for silicone and the desired device is manufactured following the usual methods. When the device surface is in contact with an aqueous solution, the copolymer self-organizes to expose its hydrophilic segments to the surface, making the surface of the silicone device more hydrophilic. This can lead to several improved performance criteria including lower fouling, lower non-specific adsorption, and better wettability. Specifically, this approach is expected to be useful for the manufacture of microfluidic devices. It is also likely to be useful for manufacturing silicone tubing and other materials, biomaterial applications, and surface coatings.

Keywords: microfluidics, non-specific protein adsorption, PDMS, PEG, copolymer

Procedia PDF Downloads 262
768 Improved Intracellular Protein Degradation System for Rapid Screening and Quantitative Study of Essential Fungal Proteins in Biopharmaceutical Development

Authors: Patarasuda Chaisupa, R. Clay Wright

Abstract:

The selection of appropriate biomolecular targets is a crucial aspect of biopharmaceutical development. The Auxin-Inducible Degron Degradation (AID) technology has demonstrated remarkable potential in efficiently and rapidly degrading target proteins, thereby enabling the identification and acquisition of drug targets. The AID system also offers a viable method to deplete specific proteins, particularly in cases where the degradation pathway has not been exploited or when the adaptation of proteins, including the cell environment, occurs to compensate for the mutation or gene knockout. In this study, we have engineered an improved AID system tailored to deplete proteins of interest. This AID construct combines the auxin-responsive E3 ubiquitin ligase binding domain, AFB2, and the substrate degron, IAA17, fused to the target genes. Essential genes of fungi with the lowest percent amino acid similarity to human and plant orthologs, according to the Basic Local Alignment Search Tool (BLAST), were cloned into the AID construct in S. cerevisiae (AID-tagged strains) using a modular yeast cloning toolkit for multipart assembly and direct genetic modification. Each E3 ubiquitin ligase and IAA17 degron was fused to a fluorescence protein, allowing for real-time monitoring of protein levels in response to different auxin doses via cytometry. Our AID system exhibited high sensitivity, with an EC50 value of 0.040 µM (SE = 0.016) for AFB2, enabling the specific promotion of IAA17::target protein degradation. Furthermore, we demonstrate how this improved AID system enhances quantitative functional studies of various proteins in fungi. The advancements made in auxin-inducible protein degradation in this study offer a powerful approach to investigating critical target protein viability in fungi, screening protein targets for drugs, and regulating intracellular protein abundance, thus revolutionizing the study of protein function underlying a diverse range of biological processes.

Keywords: synthetic biology, bioengineering, molecular biology, biotechnology

Procedia PDF Downloads 85
767 The Difference of Menstrual Cycle Profile and Urinary Luteinizing Hormone Changes In Polycystic Ovary Syndrome And Healthy Women

Authors: Ning Li, Jiacheng Zhang, Zheng Yang, Sylvia Kang

Abstract:

Introduction: Polycystic ovary syndrome (PCOS) is a common physiological symptom in women of reproductive age. Women with PCOS may have infrequent or prolonged menstrual periods and excess male hormone (androgen) levels. Mira analyzes the cycle profiles and the luteinizing hormone (LH) changes in urine, closely related to the fertility level of healthy women and PCOS women. From the difference between the two groups, Mira helps to understand the physiological state of PCOS women and their hormonal changes in the menstrual cycle. Methods: In this study, data from 1496 cycles and information from 342 women belonging to two groups (181 PCOS and 161 Healthy) were collected and analyzed. Women test their luteinizing hormone (LH) in urine daily with Mira fertility test wand and Mira analyzer, from the day after the menstruation to the starting day of the next menstruation. All the collected data meets Mira’s user agreement and users’ identification was removed. The cycle length, LH peak, and other cycle information of the PCOS group were compared with the Healthy group. Results: The average cycle length of PCOS women is 41 days and of the Healthy women is 33 days. 91.4% of cycle length is within 40 days for the Healthy group, while it decreases to 71.9% for the PCOS group. This means PCOS women have a longer menstrual cycle and more variation during the cycle. With more variation, the ovulation prediction becomes more difficult for the PCOS group. The deviation between the LH surge day and the predicted ovulation day, calculated by the starting day of the next menstruation minus 14 days, is greater in the PCOS group compared with the Healthy group. Also, 46.96% of PCOS women have an irregular cycle, and only 19.25% of healthy women show an irregular cycle. Conclusion: PCOS women have longer menstrual cycles and more variation during the menstrual cycles. The traditional ovulation prediction is not suitable for PCOS women.

Keywords: menstrual cycle, PCOS, urinary luteinizing hormone, Mira

Procedia PDF Downloads 175
766 Development of Personal Protection Equipment for Dental Surgeon

Authors: Thi. A. D. Tran, Matthieu Arnold, Dominique Adolphe, Laurence Schcher, Guillaume Reys

Abstract:

During daily oral health cares, dental surgeons are in contact with numerous potentially infectious germs from patients' saliva and blood. In order to take into account these risks, a product development process has been unrolled to propose to the dental surgeon a personal protection equipment that is suitable with their expectations in terms of images, protection and comfort. After a consumer study, to evaluate how the users wear the garment and their expectations, specifications have been carried out and technical solutions have been developed in order to answer to the maximum of the desiderata. Thermal studies and comfort studies have been performed. The obtained results lead to define the technical solutions concerning the design of the new scrub. Three main functions have been investigated, the ergonomic aspect, the protection and the thermal comfort. In terms of ergonomic aspect, instrumented garments have been worn and pressure measurements have been done. The results highlight that a raglan shape for the sleeves has to be selected for a better dynamic comfort. Moreover, spray tests helped us to localize the potential contamination area and therefore protection devices have been placed on the garment. Concerning the thermal comfort, an I-R study was conducted in consulting room under the real working conditions; the heating zones have been detected. Based on these results, solutions have been proposed and implemented in a new gown. This new gown is currently composed of three different parts; a protective layer placed in the chest area to avoid contamination; a breathable layer placed in the back and in the armpits and a normal PET/Cotton fabric for the rest of the gown. Through the fitting tests conducted in hospital, it was obtained that the new design was highly appreciated. Some points can nevertheless be further improved. A final product will be produced based on necessary improvements.

Keywords: comfort, dentists, garment, thermal

Procedia PDF Downloads 307
765 Static Application Security Testing Approach for Non-Standard Smart Contracts

Authors: Antonio Horta, Renato Marinho, Raimir Holanda

Abstract:

Considered as an evolution of the Blockchain, the Ethereum platform, besides allowing transactions of its cryptocurrency named Ether, it allows the programming of decentralised applications (DApps) and smart contracts. However, this functionality into blockchains has raised other types of threats, and the exploitation of smart contracts vulnerabilities has taken companies to experience big losses. This research intends to figure out the number of contracts that are under risk of being drained. Through a deep investigation, more than two hundred thousand smart contracts currently available in the Ethereum platform were scanned and estimated how much money is at risk. The experiment was based in a query run on Google Big Query in July 2022 and returned 50,707,133 contracts published on the Ethereum platform. After applying the filtering criteria, the experimentgot 430,584 smart contracts to download and analyse. The filtering criteria consisted of filtering out: ERC20 and ERC721 contracts, contracts without transactions, and contracts without balance. From this amount of 430,584 smart contracts selected, only 268,103 had source codes published on Etherscan, however, we discovered, using a hashing process, that there were contracts duplication. Removing the duplicated contracts, the process ended up with 20,417 source codes, which were analysed using the open source SAST tool smartbugswith oyente and securify algorithms. In the end, there was nearly $100,000 at risk of being drained from the potentially vulnerable smart contracts. It is important to note that the tools used in this study may generate false positives, which may interfere with the number of vulnerable contracts. To address this point, our next step in this research is to develop an application to test the contract in a parallel environment to verify the vulnerability. Finally, this study aims to alert users and companies about the risk on not properly creating and analysing their smart contracts before publishing them into the platform. As any other application, smart contracts are at risk of having vulnerabilities which, in this case, may result in direct financial losses.

Keywords: blockchain, reentrancy, static application security testing, smart contracts

Procedia PDF Downloads 86
764 Assessment of the Effect of Orally Administered Itopride on Gall Bladder Ejection Fraction by a Fatty Meal Cholescintigraphy in Patients with Diabetes

Authors: Avani Jain, Hasmukh Jain, S. Shelley, M. Indirani, Shilpa Kalal, Jayakanth Amalachandran

Abstract:

Aim of the Study: To assess the effect of orally administered Itopride on gall bladder ejection fraction by fatty meal cholescintigraphy in patients with diabetes. Materials and Methods: Thirty patients (20 males, 10 females, mean age 46+10 yrs) with history of diabetes mellitus (mean duration 4.8+4.1 yrs, fasting blood glucose level 130+35 mg/dl and 2-hours post-prandial blood glucose level 196+76 mg/dl) and found to have gall bladder dysfunction on fatty-meal stimulated cholescintigraphy were selected for this study. These patients underwent a repeat cholescintigraphy similar to baseline study, with 50 mg of Itopride orally along with fatty meal. Pre- and post-Itopride GBEF were then compared to assess the effect of Itopride on gall bladder contraction. Results: Out of these 30 patients, 2 had dyskinetic, 4 had akinetic, 22 had moderately hypokinetic and the remaining 2 had hypokinetic gall bladder function in the baseline study with > 60% GBEF being taken as the normal value. Mean percentage of GBEF in the baseline study was 32%+13% and the mean percentage of GBEF in the post-Itopride study was 57%+17% with change in mean percentage of GBEF being 24%+21%. GBEF of the “baseline study” was significantly lower as compared to GBEF in the “post-Itopride study” (p < 0.05). Conclusion: Diabetic patients with biliary-type pain often tend to have impaired gallbladder function. Cholescintigraphy with fatty meal-stimulation is a simple, cheap and useful investigation for assessment of gallbladder dysfunction in these patients, before any structural changes occur within the lumen or wall of the gall bladder. Improvement in gallbladder ejection fraction after oral administration of a single dose of Itopride, a newer prokinetic drug with fewer side effects, as assessed by cholescintigraphy, provides enough evidence of future therapeutic response. Administration of Itopride, in therapeutic dosage, therefore may be expected to cause significant improvement in gallbladder ejection fraction and hence prolong stone formation within the gall bladder and also prevent the associated long term complications. Hence, based on scintigraphic evidence, Itopride may be recommended, by clinicians, for management of symptomatic diabetic patients having gallbladder dysfunction.

Keywords: itopride, gall bladder ejection fraction, fatty meal, cholescintigraphy, diabetes

Procedia PDF Downloads 421
763 Occurrence and Levels of Mycotoxins in On-Farm Stored Sesame in Major-Growing Districts of Ethiopia

Authors: S. Alemayehu, F. A. Abera, K. M. Ayimut, R. Mahroof, J. Harvey, B. Subramanyam

Abstract:

The occurrence of mycotoxins in sesame seeds poses a significant threat to food safety and the economy in Ethiopia. This study aimed to determine the levels and occurrence of mycotoxins in on-farm stored sesame seeds in major-growing districts of Ethiopia. A total of 470 sesame seed samples were collected from randomly selected farmers' storage structures in five major-growing districts using purposive sampling techniques. An enzyme-linked immunosorbent assay (ELISA) was used to analyze the collected samples for the presence of four mycotoxins: total aflatoxins (AFT), ochratoxin A (OTA), total fumonisins (FUM), and deoxynivalenol (DON). The study found that all samples contained varying levels of mycotoxins, with AFT and DON being the most prevalent. AFT concentrations in detected samples ranged from 2.5 to 27.8 parts per billion (ppb), with a mean concentration of 13.8 ppb. OTA levels ranged from 5.0 ppb to 9.7 ppb, with a mean level of 7.1 ppb. Total fumonisin concentrations ranged from 300 to 1300 ppb in all samples, with a mean of 800 ppb. DON concentrations ranged from 560 to 700 ppb in the analyzed samples. The majority (96.8%) of the samples were safe from AFT, FUM, and DON mean levels when compared to the Federal Drug Administration maximum limit. AFT-OTA, DON-OTA, AFT-FUM, FUM-DON, and FUM-OTA, respectively, had co-occurrence rates of 44.0, 38.3, 33.8, 30.2, 29.8 and 26.0% for mycotoxins. On average, 37.2% of the sesame samples had fungal infection, and seed germination rates ranged from 66.8% to 91.1%. The Limmu district had higher levels of total aflatoxins, kernel infection, and lower germination rates than other districts. The Wollega variety of sesame had higher kernel infection, total aflatoxins concentration, and lower germination rates than other varieties. Grain age had a statistically significant (p<0.05) effect on both kernel infection and germination. The storage methods used for sesame in major-growing districts of Ethiopia favor mycotoxin-producing fungi. As the levels of mycotoxins in sesame are of public health significance, stakeholders should come together to identify secure and suitable storage technologies to maintain the quantity and quality of sesame at the level of smallholder farmers. This study suggests the need for suitable storage technologies to maintain the quality of sesame and reduce the risk of mycotoxin contamination.

Keywords: districts, seed germination, kernel infection, moisture content, relative humidity, temperature

Procedia PDF Downloads 127
762 Mobile App Architecture in 2023: Build Your Own Mobile App

Authors: Mounir Filali

Abstract:

Companies use many innovative ways to reach their customers to stay ahead of the competition. Along with the growing demand for innovative business solutions is the demand for new technology. The most noticeable area of demand for business innovations is the mobile application industry. Recently, companies have recognized the growing need to integrate proprietary mobile applications into their suite of services; Companies have realized that developing mobile apps gives them a competitive edge. As a result, many have begun to rapidly develop mobile apps to stay ahead of the competition. Mobile application development helps companies meet the needs of their customers. Mobile apps also help businesses to take advantage of every potential opportunity to generate leads that convert into sales. Mobile app download growth statistics with the recent rise in demand for business-related mobile apps, there has been a similar rise in the range of mobile app solutions being offered. Today, companies can use the traditional route of the software development team to build their own mobile applications. However, there are also many platform-ready "low-code and no-code" mobile apps available to choose from. These mobile app development options have more streamlined business processes. This helps them be more responsive to their customers without having to be coding experts. Companies must have a basic understanding of mobile app architecture to attract and maintain the interest of mobile app users. Mobile application architecture refers to the buildings or structural systems and design elements that make up a mobile application. It also includes the technologies, processes, and components used during application development. The underlying foundation of all applications consists of all elements of the mobile application architecture, developing a good mobile app architecture requires proper planning and strategic design. The technology framework or platform on the back end and user-facing side of a mobile application is part of the mobile architecture of the application. In-application development Software programmers loosely refer to this set of mobile architecture systems and processes as the "technology stack".

Keywords: mobile applications, development, architecture, technology

Procedia PDF Downloads 92
761 Privacy Preservation Concerns and Information Disclosure on Social Networks: An Ongoing Research

Authors: Aria Teimourzadeh, Marc Favier, Samaneh Kakavand

Abstract:

The emergence of social networks has revolutionized the exchange of information. Every behavior on these platforms contributes to the generation of data known as social network data that are processed, stored and published by the social network service providers. Hence, it is vital to investigate the role of these platforms in user data by considering the privacy measures, especially when we observe the increased number of individuals and organizations engaging with the current virtual platforms without being aware that the data related to their positioning, connections and behavior is uncovered and used by third parties. Performing analytics on social network datasets may result in the disclosure of confidential information about the individuals or organizations which are the members of these virtual environments. Analyzing separate datasets can reveal private information about relationships, interests and more, especially when the datasets are analyzed jointly. Intentional breaches of privacy is the result of such analysis. Addressing these privacy concerns requires an understanding of the nature of data being accumulated and relevant data privacy regulations, as well as motivations for disclosure of personal information on social network platforms. Some significant points about how user's online information is controlled by the influence of social factors and to what extent the users are concerned about future use of their personal information by the organizations, are highlighted in this paper. Firstly, this research presents a short literature review about the structure of a network and concept of privacy in Online Social Networks. Secondly, the factors of user behavior related to privacy protection and self-disclosure on these virtual communities are presented. In other words, we seek to demonstrates the impact of identified variables on user information disclosure that could be taken into account to explain the privacy preservation of individuals on social networking platforms. Thirdly, a few research directions are discussed to address this topic for new researchers.

Keywords: information disclosure, privacy measures, privacy preservation, social network analysis, user experience

Procedia PDF Downloads 278
760 Use Cloud-Based Watson Deep Learning Platform to Train Models Faster and More Accurate

Authors: Susan Diamond

Abstract:

Machine Learning workloads have traditionally been run in high-performance computing (HPC) environments, where users log in to dedicated machines and utilize the attached GPUs to run training jobs on huge datasets. Training of large neural network models is very resource intensive, and even after exploiting parallelism and accelerators such as GPUs, a single training job can still take days. Consequently, the cost of hardware is a barrier to entry. Even when upfront cost is not a concern, the lead time to set up such an HPC environment takes months from acquiring hardware to set up the hardware with the right set of firmware, software installed and configured. Furthermore, scalability is hard to achieve in a rigid traditional lab environment. Therefore, it is slow to react to the dynamic change in the artificial intelligent industry. Watson Deep Learning as a service, a cloud-based deep learning platform that mitigates the long lead time and high upfront investment in hardware. It enables robust and scalable sharing of resources among the teams in an organization. It is designed for on-demand cloud environments. Providing a similar user experience in a multi-tenant cloud environment comes with its own unique challenges regarding fault tolerance, performance, and security. Watson Deep Learning as a service tackles these challenges and present a deep learning stack for the cloud environments in a secure, scalable and fault-tolerant manner. It supports a wide range of deep-learning frameworks such as Tensorflow, PyTorch, Caffe, Torch, Theano, and MXNet etc. These frameworks reduce the effort and skillset required to design, train, and use deep learning models. Deep Learning as a service is used at IBM by AI researchers in areas including machine translation, computer vision, and healthcare. 

Keywords: deep learning, machine learning, cognitive computing, model training

Procedia PDF Downloads 204
759 Context-Aware Recommender Systems Using User's Emotional State

Authors: Hoyeon Park, Kyoung-jae Kim

Abstract:

The product recommendation is a field of research that has received much attention in the recent information overload phenomenon. The proliferation of the mobile environment and social media cannot help but affect the results of the recommendation depending on how the factors of the user's situation are reflected in the recommendation process. Recently, research has been spreading attention to the context-aware recommender system which is to reflect user's contextual information in the recommendation process. However, until now, most of the context-aware recommender system researches have been limited in that they reflect the passive context of users. It is expected that the user will be able to express his/her contextual information through his/her active behavior and the importance of the context-aware recommender system reflecting this information can be increased. The purpose of this study is to propose a context-aware recommender system that can reflect the user's emotional state as an active context information to recommendation process. The context-aware recommender system is a recommender system that can make more sophisticated recommendations by utilizing the user's contextual information and has an advantage that the user's emotional factor can be considered as compared with the existing recommender systems. In this study, we propose a method to infer the user's emotional state, which is one of the user's context information, by using the user's facial expression data and to reflect it on the recommendation process. This study collects the facial expression data of a user who is looking at a specific product and the user's product preference score. Then, we classify the facial expression data into several categories according to the previous research and construct a model that can predict them. Next, the predicted results are applied to existing collaborative filtering with contextual information. As a result of the study, it was shown that the recommended results of the context-aware recommender system including facial expression information show improved results in terms of recommendation performance. Based on the results of this study, it is expected that future research will be conducted on recommender system reflecting various contextual information.

Keywords: context-aware, emotional state, recommender systems, business analytics

Procedia PDF Downloads 224
758 Brazilian Public Security: Governability and Constitutional Change

Authors: Gabriel Dolabella, Henrique Rangel, Stella Araújo, Carlos Bolonha, Igor de Lazari

Abstract:

Public security is a common subject on the Brazilian political agenda. The seventh largest economy in the world has high crime and insecurity rates. Specialists try to explain this social picture based on poverty, inequality or public policies addressed to drug trafficking. This excerpt approaches State measures to handle that picture. Therefore, the public security - law enforcement institutions - is at the core of this paper, particularly the relationship among federal and state law enforcement agencies, mainly ruled by a system of urgency. The problems are informal changes on law enforcement management and public opinion collaboration to these changes. Whenever there were huge international events, Brazilian armed forces occupied streets to assure law enforcement - ensuring the order. This logic, considered in the long time, could impact the federal structure of the country. The post-madisonian theorists verify that urgency is often associated to delegation of powers, which is true for Brazilian law enforcement, but here there is a different delegation: States continuously delegate law enforcement powers to the federal government throughout the use of Armed Forces. Therefore, the hypothesis is: Brazil is under a political process of federalization of public security. The political framework addressed here can be explained by the disrespect of legal constraints and the failure of rule of law theoretical models. The methodology of analysis is based on general criteria. Temporally, this study investigates events from 2003, when discussions about the disarmament statute begun. Geographically, this study is limited to Brazilian borders. Materially, the analysis result from the observation of legal resources and political resources (pronouncements of government officials). The main parameters are based on post-madisonianism and federalization of public security can be assessed through credibility and popularity that allow evaluation of this political process of constitutional change. The objective is to demonstrate how the Military Forces are used in public security, not as a random fact or an isolated political event, in order to understand the political motivations and effects that stem from that use from an institutional perspective.

Keywords: public security, governability, rule of law, federalism

Procedia PDF Downloads 674
757 Plasma Pretreatment for Improving the Durability of Antibacterial Activity of Cotton Using ZnO Nanoparticles

Authors: Sheila Shahidi, Hootan Rezaee, Abosaeed Rashidi, Mahmood Ghoranneviss

Abstract:

Plasma treatment has an explosive increase in interest and use in industrial applications as for example in medical, biomedical, automobile, electronics, semiconductor and textile industry. A lot of intensive basic research has been performed in the last decade in the field of textiles along with technical textiles. Textile manufacturers and end-users alike have been searching for ways to improve the surface properties of natural and man-made fibers. Specifically, there is a need to improve adhesion and wettability. Functional groups may be introduced onto the fiber surface by using gas plasma treatments, improving fiber surface properties without affecting the fiber’s bulk properties. In this research work, ZnO nanoparticles (ZnO-NPs) were insitue synthesized by sonochemical method at room temperature on both untreated and plasma pretreated cotton woven fabric. Oxygen and nitrogen plasmas were used for pre-functionalization of cotton fabric. And the effect of oxygen and nitrogen pre-functionalization on adhesion properties between ZnO nanoparticles and cotton surface were studied. The results show that nanoparticles with average sizes of 20-100 nm with different morphologies have been created on the surface of samples. Synthesis of ZnO-NPs was varied in the morphological transformation by changes in zinc acetate dehydrate concentration. Characterizations were carried out using Scanning Electron Microscopy (SEM), X-ray Diffraction (XRD), Inductive coupled plasma (ICP) and Spectrophotometery. The antibacterial activities of the fabrics were assessed semi-quantitatively by the colonies count method. The results show that the finished fabric demonstrated significant antibacterial activity against S. aureus in antibacterial test. The wash fastness of both untreated and plasma pretreated samples after 30 times of washing was investigated. The results showed that the parameters of plasma reactor plays very important role for improving the antibacterial durability.

Keywords: antibacterial activity, cotton, fabric, nanoparticles, plasma

Procedia PDF Downloads 531
756 Extending Theory of Planned Behavior to Modelling Chronic Patients’ Acceptance of Health Information: An Information Overload Perspective

Authors: Shu-Lien Chou, Chung-Feng Liu

Abstract:

Self-health management of chronic illnesses plays an important part in chronic illness treatments. However, various kinds of health information (health education materials) which government or healthcare institutions provide for patients may not achieve the expected outcome. One of the critical reasons affecting patients’ use intention could be patients’ perceived Information overload regarding the health information. This study proposed an extended model of Theory of Planned Behavior, which integrating perceived information overload as another construct to explore patients’ use intention of the health information for self-health management. The independent variables are attitude, subject norm, perceived behavior control and perceived information overload while the dependent variable is behavior intention to use the health information. The cross-sectional study used a structured questionnaire for data collection, focusing on the chronic patients with coronary artery disease (CAD), who are the potential users of the health information, in a medical center in Taiwan. Data were analyzed using descriptive statistics of the basic information distribution of the questionnaire respondents, and the Partial Least Squares (PLS) structural equation model to study the reliability and construct validity for testing our hypotheses. A total of 110 patients were enrolled in this study and 106 valid questionnaires were collected. The PLS analysis result indicates that the patients’ perceived information overload of health information contributes the most critical factor influencing the behavioral intention. Subjective norm and perceived behavioral control of TPB constructs had significant effects on patients’ intentions to use health information also, whereas the attitude construct did not. This study demonstrated a comprehensive framework, which extending perceived information overload into TPB model to predict patients’ behavioral intention of using heath information. We expect that the results of this study will provide useful insights for studying health information from the perspectives of academia, governments, and healthcare providers.

Keywords: chronic patients, health information, information overload, theory of planned behavior

Procedia PDF Downloads 432
755 The Effect of Satisfaction with the Internet on Online Shopping Attitude With TAM Approach Controlled By Gender

Authors: Velly Anatasia

Abstract:

In the last few decades extensive research has been conducted into information technology (IT) adoption, testing a series of factors considered to be essential for improved diffusion. Some studies analyze IT characteristics such as usefulness, ease of use and/or security, others focus on the emotions and experiences of users and a third group attempts to determine the importance of socioeconomic user characteristics such as gender, educational level and income. The situation is similar regarding e-commerce, where the majority of studies have taken for granted the importance of including these variables when studying e-commerce adoption, as these were believed to explain or forecast who buys or who will buy on the internet. Nowadays, the internet has become a marketplace suitable for all ages and incomes and both genders and thus the prejudices linked to the advisability of selling certain products should be revised. The objective of this study is to test whether the socioeconomic characteristics of experienced e-shoppers such as gender rally moderate the effect of their perceptions of online shopping behavior. Current development of the online environment and the experience acquired by individuals from previous e-purchases can attenuate or even nullify the effect of these characteristics. The individuals analyzed are experienced e-shoppers i.e. individuals who often make purchases on the internet. The Technology Acceptance Model (TAM) was broadened to include previous use of the internet and perceived self-efficacy. The perceptions and behavior of e-shoppers are based on their own experiences. The information obtained will be tested using questionnaires which were distributed and self-administered to respondent accustomed using internet. The causal model is estimated using structural equation modeling techniques (SEM), followed by tests of the moderating effect of socioeconomic variables on perceptions and online shopping behavior. The expected findings of this study indicated that gender moderate neither the influence of previous use of the internet nor the perceptions of e-commerce. In short, they do not condition the behavior of the experienced e-shopper.

Keywords: Internet shopping, age groups, gender, income, electronic commerce

Procedia PDF Downloads 331
754 Identification and Antibiotic Resistance Rates of Acinetobacter baumannii Strains Isolated from the Respiratory Tract Samples, Obtained from the Different Intensive Care Units

Authors: Recep Kesli, Gulşah Asik, Cengiz Demir, Onur Turkyilmaz

Abstract:

Objective: Acinetobacter baumannii (A. baumannii) can cause health-care associated infections, such as bacteremia, urinary tract and wound infections, endocarditis, meningitis, and pneumonia, particularly in intensive care unit patients. In this study, we aimed to evaluate A. baumannii production in sputum and bronchoalveolar lavage and susceptibilities for antibiotics in a 24 months period. Methods: Between October 2013 and September 2015, Acinetobacter baumannii isolated from respiratory tract speciments were evaluated retrospectively. The strains were isolated from the different intensive care units patients. A. baumannii strains were identified by both the conventional methods and aoutomated identification system -VITEK 2 (bio-Merieux, Marcy l’etoile, France). Antibiotic resistance testing was performed by Kirby-Bauer disc diffusion method according to CLSI criteria. Results: All the ninety isolates included in the study were from respiratory tract specimens. While of all the isolated 90 Acinetobacter baumannii strains were found to be resistant (100%), against ceftriaxone, ceftazidime, ciprofloxacin and piperacillin/ tazobactam, resistance rates against other tested antibiotics found as follows; meropenem 77, 86%, imipenem 75, 83%, trimethoprim-sulfamethoxazole (TMP-STX) 69, 76,6%, gentamicin 51, 56,6% and amikacin 48, 53,3%. Colistin was found as the most effective antibiotic against Acinetobacter baumannii, and there were not found any resistant (0%) strain against colistin. Conclusion: This study demonstrated that the no resistance was found in Acinetobacter baumannii against to colistin. High rates of resistance to carbapenems (imipenem and meropenem) and other tested antibiotics (ceftiaxone, ceftazidime, ciprofloxacine, piperacilline-tazobactam, TMP-STX gentamicin and amikacin) also have remarkable resistance rates. There was a significant relationship between demographic features of patients such as age, undergoing mechanical ventilation, length of hospital stay with resistance rates. High resistance rates against antibiotics require implementation of the infection control program and rational use of antibiotics. In the present study, while there were not found colistin resistance, panresistance were found against to ceftriaxone, ceftazidime, ciprofloxacin and piperacillin/ tazobactam.

Keywords: acinetobacter baumannii, antibiotic resistance, multi drug resistance, intensive care unit

Procedia PDF Downloads 279
753 The Impact of COVID-19 Waste on Aquatic Organisms: Nano/microplastics and Molnupiravir in Salmo trutta Embryos and Lervae

Authors: Živilė Jurgelėnė, Vitalijus Karabanovas, Augustas Morkvėnas, Reda Dzingelevičienė, Nerijus Dzingelevičius, Saulius Raugelė, Boguslaw Buszewski

Abstract:

The short- and long-term effects of COVID-19 antiviral drug molnupiravir and micro/nanoplastics on the early development of Salmo trutta were investigated using accumulation and exposure studies. Salmo trutta were used as standardized test organisms in toxicity studies of COVID-19 waste contaminants. The 2D/3D imaging was performed using confocal fluorescence spectral imaging microscopy to assess the uptake, bioaccumulation, and distribution of molnupiravir and micro/nanoplastics complex in live fish. Our study results demonstrated that molnupiravir may interact with a micro/nanoplastics and modify their spectroscopic parameters and toxicity to S. trutta embryos and larvae. The 0.2 µm size microplastics at a concentration of 10 mg/L were found to be stable in aqueous media than 0.02 µm, and 2 µm sizes polymeric particles. This study demonstrated that polymeric particles can adsorb molnupiravir that are present in mixtures and modify the accumulation of molnupiravir in Salmo trutta embryos and larvae. In addition, 2D/3D confocal fluorescence imaging showed that the single polymeric particle hardly accumulates and couldn't penetrate outer tissues of the tested organism. However, co-exposure micro/nanoplastics and molnupiravir could significantly enhance the polymeric particles capability of accumulating on surface tissues and penetrating surface tissue of fish in early development. Exposure to molnupiravir at 2 g/L concentration and co-exposure to micro/nanoplastics and molnupiravir did not bring about survival changes in in the early stages of Salmo trutta development, but we observed the reduction in heart rate and decrease in gill ventilation. The statistical analysis confirmed that micro/nanoplastics used in combination with molnupiravir enhance the toxicity of the latter micro/nanoplastics to embryos and larvae. This research has received funding from the European Regional Development Fund (project No 13.1.1-LMT-K-718-05-0014) under a grant agreement with the Research Council of Lithuania (LMTLT), and it was funded as part of the European Union’s measure in response to the COVID-19 pandemic.

Keywords: fish, micro/nanoplastics, molnupiravir, toxicity

Procedia PDF Downloads 89
752 Girls, Justice, and Advocacy: Using Arts-Based Public Health Strategies to Challenge Gender Inequities in Juvenile Justice

Authors: Tasha L. Golden

Abstract:

Girls in the U.S. juvenile justice system are most often arrested for truancy, drug use, or running from home, all of which are symptoms of abuse. In fact, some have called this 'The Sexual Abuse to Prison Pipeline.' Such abuse has consequences for girls' health, education, employment, and parenting, often resulting in significant health disparities. Yet when arrested, girls rarely encounter services designed to meet their unique needs. Instead, they are expected to cope with a system that was historically designed for males. In fact, even literature advocating for increased gender equity frequently fails to include girls’ voices and firsthand accounts. In response to these combined injustices, public health researchers launched a trauma-informed creative writing intervention in a southern juvenile detention facility. The program was designed to improve the health of detained girls, while also establishing innovative methods of both data collection and social justice advocacy. Girls’ poems and letters were collected and coded, adding rich qualitative data to traditional survey responses. In addition, as part of the intervention, these poems are regularly published by international literary publisher Sarabande Books—and distributed to judges, city leaders, attorneys, state representatives, and more. By utilizing a creative medium, girls generated substantial civic engagement with their concerns—thus expanding their influence and improving policy advocacy efforts. Researchers hypothesized that having access to their communities and policy makers would provide its own health benefits for incarcerated girls: cultivating self-esteem, locus of control, and a sense of leadership. This paper discusses the establishment of this intervention, examines findings from its evaluation, and includes several girls’ poems as exemplars. Grounded in social science regarding expressive writing, stigma, muted group theory, and health promotion, the paper theorizes about the application of arts-based advocacy efforts to other social justice endeavors.

Keywords: advocacy, public health, social justice, women’s health

Procedia PDF Downloads 162
751 Liver Regeneration of Small in situ Injury

Authors: Ziwei Song, Junjun Fan, Jeremy Teo, Yang Yu, Yukun Ma, Jie Yan, Shupei Mo, Lisa Tucker-Kellogg, Peter So, Hanry Yu

Abstract:

Liver is the center of detoxification and exposed to toxic metabolites all the time. It is highly regenerative after injury, with the ability to restore even after 70% partial hepatectomy. Most of the previous studies were using hepatectomy as injury models for liver regeneration study. There is limited understanding of small-scale liver injury, which can be caused by either low dose drug consumption or hepatocyte routine metabolism. Although these small in situ injuries do not cause immediate symptoms, repeated injuries will lead to aberrant wound healing in liver. Therefore, the cellular dynamics during liver regeneration is critical for our understanding of liver regeneration mechanism. We aim to study the liver regeneration of small-scale in situ liver injury in transgenic mice labeling actin (Lifeact-GFP). Previous studies have been using sample sections and biopsies of liver, which lack real-time information. In order to trace every individual hepatocyte during the regeneration process, we have developed and optimized an intravital imaging system that allows in vivo imaging of mouse liver for consecutive 5 days, allowing real-time cellular tracking and quantification of hepatocytes. We used femtosecond-laser ablation to make controlled and repeatable liver injury model, which mimics the real-life small in situ liver injury. This injury model is the first case of its kind for in vivo study on liver. We found that small-scale in situ liver injury is repaired by the coordination of hypertrophy and migration of hepatocytes. Hypertrophy is only transient at initial phase, while migration is the main driving force to complete the regeneration process. From cellular aspect, Akt/mTOR pathway is activated immediately after injury, which leads to transient hepatocyte hypertrophy. From mechano-sensing aspect, the actin cable, formed at apical surface of wound proximal hepatocytes, provides mechanical tension for hepatocyte migration. This study provides important information on both chemical and mechanical signals that promote liver regeneration of small in situ injury. We conclude that hypertrophy and migration play a dominant role at different stages of liver regeneration.

Keywords: hepatocyte, hypertrophy, intravital imaging, liver regeneration, migration

Procedia PDF Downloads 203
750 Salon-Associated Infections: Customer’s Knowledge and Practice Measures

Authors: Esraa Elaraby, Dania Abu Zahra, Ghidaa Maswadah, Osama Amira, Mohamed Alshoura, Nihar Dash

Abstract:

Background: Human being uses salon for a variety of purposes, from trimming of hair and shaving to a range of beauty treatments such as manicure and pedicure. Salon activities involve use of several instruments including scissors, scalpels and razors, materials such as soaps, solutions, creams and gels on human skin and body. Besides, salon customers also use chair, bed and many other common shared utensils and appliances. These salons related activities create a suitable environment for the transmission of several diseases and pathogens including hepatitis B and C, scabies, tuberculosis, staphylococcus and MRSA etc. The transmission of these pathogens can be prevented by maintenance of adequate hygiene and standard preventive measures. Aim: To assess the customer’s level of knowledge about salon-acquired infections and practices taken to prevent their transmission. Methods: A cross-sectional study was conducted among 500 participants across the Emirates. Moreover, self-administered questionnaires (in English and Arabic) were distributed through convenience sampling methods between February and April 2017. Results: The study included 500 participants of which 250 were females. The mean age of the study population was 33 years (SD=4.77). The participants were from several nationalities including 325 Arabs (Non-GCC) (66.2%), 108 Non-Arabs (22%), and 59 Arabs (GCC) (11.8%). The majority of the participants 421 (84.4%) had required knowledge about salon-associated infections with a mean knowledge score of 6/10 (60%). However, when it comes down to preventive practices, only 73 of the 500 participants (14.6%) did carry their own equipment. Thus, there was insufficient correlation between the level of knowledge and preventive practices (p=0.139) of salon-associated infections. Conclusion: People’s knowledge about the salon-associated infections among UAE residents was good, but only a small number practically took the required preventative measures towards this issue. Therefore, a public awareness program is recommended to enhance the deficiencies in knowledge and practices to prevent salon-acquired infections among the users. Up to our knowledge, this is the first study of this kind in the UAE targeting the salon customers about this important issue.

Keywords: awareness, knowledge, practices, salon-associated infections

Procedia PDF Downloads 195
749 Improving Search Engine Performance by Removing Indexes to Malicious URLs

Authors: Durga Toshniwal, Lokesh Agrawal

Abstract:

As the web continues to play an increasing role in information exchange, and conducting daily activities, computer users have become the target of miscreants which infects hosts with malware or adware for financial gains. Unfortunately, even a single visit to compromised web site enables the attacker to detect vulnerabilities in the user’s applications and force the downloading of multitude of malware binaries. We provide an approach to effectively scan the so-called drive-by downloads on the Internet. Drive-by downloads are result of URLs that attempt to exploit their visitors and cause malware to be installed and run automatically. To scan the web for malicious pages, the first step is to use a crawler to collect URLs that live on the Internet, and then to apply fast prefiltering techniques to reduce the amount of pages that are needed to be examined by precise, but slower, analysis tools (such as honey clients or antivirus programs). Although the technique is effective, it requires a substantial amount of resources. A main reason is that the crawler encounters many pages on the web that are legitimate and needs to be filtered. In this paper, to characterize the nature of this rising threat, we present implementation of a web crawler on Python, an approach to search the web more efficiently for pages that are likely to be malicious, filtering benign pages and passing remaining pages to antivirus program for detection of malwares. Our approaches starts from an initial seed of known, malicious web pages. Using these seeds, our system generates search engines queries to identify other malicious pages that are similar to the ones in the initial seed. By doing so, it leverages the crawling infrastructure of search engines to retrieve URLs that are much more likely to be malicious than a random page on the web. The results shows that this guided approach is able to identify malicious web pages more efficiently when compared to random crawling-based approaches.

Keywords: web crawler, malwares, seeds, drive-by-downloads, security

Procedia PDF Downloads 225