Search results for: cryptographic protocols
346 An Analysis of Iranian Social Media Users’ Perceptions of Published Images of Coronavirus Deaths
Authors: Ali Gheshmi
Abstract:
The highest rate of death, after World War II, is due to the Coronavirus epidemic and more than 2 million people have died since the epidemic outbreak in December 2019, so the word “death” is one of the highest frequency words in social media; moreover, the use of social media has grown due to quarantine and successive restrictions and lockdowns. The most important aspects of the approach used by this study include the analysis of Iranian social media users’ reactions to the images of those who died due to Coronavirus, investigating if seeing such images via social media is effective on the users’ perception of the closeness of death, and evaluating the extent to which the fear of Coronavirus death is instrumental in persuading users to observe health protocols or causing mental problems in social media users. Since the goal of this study is to discover how social media users perceive and react to the images of people who died of Coronavirus, the cultural studies approach is used Receipt analysis method and in-depth interviews will be used for collecting data from Iranian users; also, snowball sampling is used in this study. The probable results would show that cyberspace users experience the closeness of “death” more than any time else and to cope with these annoying images, avoid viewing them or if they view, it will lead them to suffer from mental problems.Keywords: death, receipt analysis method, mental health, social media, Covid-19
Procedia PDF Downloads 155345 Ecosystem Restoration: Remediation of Crude Oil-Polluted Soil by Leuceana leucocephala (Lam.) de Wit
Authors: Ayodele Adelusi Oyedeji
Abstract:
The study was carried out under a controlled environment with the aim of examining remediation of crude oil polluted soil. The germination rate, heights and girths, number of leaves and nodulation was determined following standard procedures. Some physicochemical (organic matter, pH, nitrogen, phosphorous, potassium, calcium, magnesium and sodium) characteristics of soil used were determined using standard protocols. Results showed that at varying concentration of crude oil i.e 0 ml, 25 ml, 50 ml, 75 ml and 100 ml, Leuceana leucocephala had germination rate of 92%, 90%, 84%, 62% and 56% respectively, mean height of 73.70cm, 58.30cm, 49.50cm, 46.45cm and 41.80cm respectively after 16 weeks after planting (WAP), mean girth of 0.54mm, 0.34mm, 0.33mm, 0.21mm and 0.19mm respectively at 16 WAP, number of nodules 18, 10, 10, 6 and 2 respectively and number of leaves 24.00, 16.00, 13.00, 10.00 and 6.00 respectively. The organic matter, pH, nitrogen, phosphorous, potassium, calcium, magnesium, and sodium decreased with the increase in the concentration of crude oil. Furthermore, as the concentration of crude oil increased the germination rate, height, girth, and number of leaves and nodules decreased, suggesting the effect of crude oil on Leuceana leucocephala. The plant withstands the varying concentration of the crude oil means that it could be used for the remediation of crude oil contaminated soil in the Niger Delta region of Nigeria.Keywords: ecosystem conservation, Leuceana leucocephala, phytoremediation, soil pollution
Procedia PDF Downloads 109344 Performance Evaluation of Clustered Routing Protocols for Heterogeneous Wireless Sensor Networks
Authors: Awatef Chniguir, Tarek Farah, Zouhair Ben Jemaa, Safya Belguith
Abstract:
Optimal routing allows minimizing energy consumption in wireless sensor networks (WSN). Clustering has proven its effectiveness in organizing WSN by reducing channel contention and packet collision and enhancing network throughput under heavy load. Therefore, nowadays, with the emergence of the Internet of Things, heterogeneity is essential. Stable election protocol (SEP) that has increased the network stability period and lifetime is the first clustering protocol for heterogeneous WSN. SEP and its descendants, namely SEP, Threshold Sensitive SEP (TSEP), Enhanced TSEP (ETSSEP) and Current Energy Allotted TSEP (CEATSEP), were studied. These algorithms’ performance was evaluated based on different metrics, especially first node death (FND), to compare their stability. Simulations were conducted on the MATLAB tool considering two scenarios: The first one demonstrates the fraction variation of advanced nodes by setting the number of total nodes. The second considers the interpretation of the number of nodes while keeping the number of advanced nodes permanent. CEATSEP outperforms its antecedents by increasing stability and, at the same time, keeping a low throughput. It also operates very well in a large-scale network. Consequently, CEATSEP has a useful lifespan and energy efficiency compared to the other routing protocol for heterogeneous WSN.Keywords: clustering, heterogeneous, stability, scalability, IoT, WSN
Procedia PDF Downloads 131343 Design of Seismically Resistant Tree-Branching Steel Frames Using Theory and Design Guides for Eccentrically Braced Frames
Authors: R. Gary Black, Abolhassan Astaneh-Asl
Abstract:
The International Building Code (IBC) and the California Building Code (CBC) both recognize four basic types of steel seismic resistant frames; moment frames, concentrically braced frames, shear walls and eccentrically braced frames. Based on specified geometries and detailing, the seismic performance of these steel frames is well understood. In 2011, the authors designed an innovative steel braced frame system with tapering members in the general shape of a branching tree as a seismic retrofit solution to an existing four story “lift-slab” building. Located in the seismically active San Francisco Bay Area of California, a frame of this configuration, not covered by the governing codes, would typically require model or full scale testing to obtain jurisdiction approval. This paper describes how the theories, protocols, and code requirements of eccentrically braced frames (EBFs) were employed to satisfy the 2009 International Building Code (IBC) and the 2010 California Building Code (CBC) for seismically resistant steel frames and permit construction of these nonconforming geometries.Keywords: eccentrically braced frame, lift slab construction, seismic retrofit, shear link, steel design
Procedia PDF Downloads 468342 Antibiotic Treatment of Apical Periodontitis
Authors: Ilma Robo, Saimir Heta, Gerhard Nokaj
Abstract:
Introduction: The method of treatment and the treatment protocols of apical periodontitis are now known, but the ongoing debate remains on whether or not prescription antibiotics should be given to patients suffering from this type of pathology. In fact, as an indication for prescribing antibiotics, this type of pathology remains between clinical indication and contraindication. Material and Methods: This article is of the short-communication type and has the sole purpose of analyzing the clinical picture of apical periodontitis and the fact that the appearance and extent of this pathology in the periapex area passes the stage when the host or the immune cells of the organism of the affected individual, react against bacterial factors. Results: Determining whether or not to prescribe systemic antibiotics according to literature sources can be avoided. In some cases, research in this field about this pathology even indicates endodontic rinsers or irrigants, such as chlorhexidine, in typical cases, mainly in persistent apical periodontitis. Conclusions: In times when bacterial resistance is a hot topic in some fields of scientific research, it is important to divide dental pathologies of bacterial origin into those when systemic antibiotic prescriptions must be given and those when every clinical issue is resolved only with endodontic root canal treatment. Even certain sources of published literature show the specifics of the most effective antibiotics against the bacterial flora causing the pathology of apical periodontitis.Keywords: endodontic treatment, apical periodontitis, antibiotics, chlorhexidine
Procedia PDF Downloads 69341 Profiling Risky Code Using Machine Learning
Authors: Zunaira Zaman, David Bohannon
Abstract:
This study explores the application of machine learning (ML) for detecting security vulnerabilities in source code. The research aims to assist organizations with large application portfolios and limited security testing capabilities in prioritizing security activities. ML-based approaches offer benefits such as increased confidence scores, false positives and negatives tuning, and automated feedback. The initial approach using natural language processing techniques to extract features achieved 86% accuracy during the training phase but suffered from overfitting and performed poorly on unseen datasets during testing. To address these issues, the study proposes using the abstract syntax tree (AST) for Java and C++ codebases to capture code semantics and structure and generate path-context representations for each function. The Code2Vec model architecture is used to learn distributed representations of source code snippets for training a machine-learning classifier for vulnerability prediction. The study evaluates the performance of the proposed methodology using two datasets and compares the results with existing approaches. The Devign dataset yielded 60% accuracy in predicting vulnerable code snippets and helped resist overfitting, while the Juliet Test Suite predicted specific vulnerabilities such as OS-Command Injection, Cryptographic, and Cross-Site Scripting vulnerabilities. The Code2Vec model achieved 75% accuracy and a 98% recall rate in predicting OS-Command Injection vulnerabilities. The study concludes that even partial AST representations of source code can be useful for vulnerability prediction. The approach has the potential for automated intelligent analysis of source code, including vulnerability prediction on unseen source code. State-of-the-art models using natural language processing techniques and CNN models with ensemble modelling techniques did not generalize well on unseen data and faced overfitting issues. However, predicting vulnerabilities in source code using machine learning poses challenges such as high dimensionality and complexity of source code, imbalanced datasets, and identifying specific types of vulnerabilities. Future work will address these challenges and expand the scope of the research.Keywords: code embeddings, neural networks, natural language processing, OS command injection, software security, code properties
Procedia PDF Downloads 106340 Experimental Study of a Mixture of R290/R600 to Replace R134a in a Domestic Refrigerator
Authors: T. O. Babarinde
Abstract:
Interest in natural refrigerants, such as hydrocarbons has been renewed in recent years because of the environmental problems associated with synthetic chlorofluorocarbon (CFC) and hydro-chlorofluorocarbon (HCFC) refrigerants. Due to the depletion of ozone-layer and global warming effects, synthetic refrigerants are being gradually phased out in accordance with the international protocols that aim to protect the environment. In this work, a refrigerator designed to work with R134a was used for this experiment, Liquefied Petroleum Gas (LPG) which consists of commercial propane and butane in a single evaporator domestic refrigerator with a total volume of 62 litres. In this experiment, type K thermocouples with their probes were used to measure the temperatures of four major components (evaporator, compressor, condenser and expansion device) of the refrigeration system. Also the system was instrumented with two pressure gauges at the inlet and outlet of the compressor for measuring the suction and discharged pressures. Four sets of experiments were carried out using different charges and the charges were measured with a digital charging scale. Thermodynamic properties of the LPG refrigerant were determined. The results obtained showed that the design temperature and pull-down time set by International Standard Organisation (ISO) for refrigerator was achieved using LPG charge of 60g. The system COP increases with 14.6% and the power consumption reduced with 9.8% when compared with R134a. Therefore, LPG can replace R134a in domestic refrigerator.Keywords: domestic refrigerator, experimental, R290/R600, R134a
Procedia PDF Downloads 430339 Efficacy of Nasya in Alcohol Withdrawal Syndrome
Authors: Sandip Tambare, Revati Ghadge
Abstract:
Alcohol withdrawal syndrome continue to be concerning health issue worldwide in alcoholics. Many current option for treating alcohol withdrawal signs are habit forming causing dependency of sedatives. The divine science of Ayurveda recommends Nasya for improvement of alcohol withdrawal signs. As per the latest reports 1/3 of the Indian population is using alcohol in an unhealthy manner, the complication being wide and varied among which, the Alcohol Withdrawal Syndrome is the dominant one. The presentation varies from mild sleep loss or anxiety to delirium. Ayurveda has given utmost in the context of Madatyaya(Alcoholism). Various protocols based on the identification of the status of tridoshas are explained which includes sodhana, samana and satwavachaya chikitsa. Various medications are being used, with appreciated effects in the clinical practice. As per reports, the panchakarma procedure nasya seems highly effective, in managing of the alcohol withdrawal syndrome. Nasya with Ksheerabala Taila is given for 7 days in the condition of Alcohol Withdrawal syndrome and it was the non Randomized trial with 30 subjects satisfying the DSM V criteria for alcohol withdrawl and the assessment was done using the Clinical Institute Withdrawal Assessment for Alcohol Scale revised (CIWA-Ar). Conclusion: Among the symptoms which were studied after the interventions, it was found that there was high significant response in almost all the symptoms in the given subjects. The eternal science of Ayurveda is able to answer the existing problem of alcohol and its abuse in the society.Keywords: nasya, alcohol withdrawal, madatyaya, ksheerabala taila
Procedia PDF Downloads 139338 Assessing the Impact of Renewable Energy on Regional Sustainability: A Comparative Study of Suwon and Seoul
Authors: Jongsoo Jurng
Abstract:
The drive to expand renewable energies is often in direct conflict with sustainable development goals. Thus, it is important that energy policies account for potential trade-offs. We assess the interlinkages between energy, food, water, and land, for two case studies, Suwon and Seoul. We apply a range of assessment methods and study their usefulness as tools to identify trade-offs and to compare the sustainability performance. We calculate cross-sectoral footprints, self-sufficiency ratios and perform a simplified Energy-Water-Food nexus analysis. We use the latter for assessing scenarios to increase energy and food self-sufficiency in Suwon, while we use ecosystem service (ESS) accounting for Seoul. For Suwon, we find that constraints on the energy, food and water sectors urgently call for integrated approaches to energy policy; for Seoul, the further expansion of renewables comes at the expense of cultural and supporting ESS, which could outweigh gains from increased energy exports. We recommend a general upgrade to indicators and visualization methods that look beyond averages and a fostering of infrastructure for data on sustainable development based on harmonized international protocols. We warn against rankings of countries or regions based on benchmarks that are neither theory-driven nor location-specific.Keywords: ESS, renewable energy, energy-water-food nexus, assessment
Procedia PDF Downloads 134337 Impact of Capture Effect on Receiver Initiated Collision Detection with Sequential Resolution in WLAN
Authors: Sethu Lekshmi, Shahanas, Prettha P.
Abstract:
All existing protocols in wireless networks are mainly based on Carrier Sense Multiple Access with Collision avoidance. By applying collision detection in wireless networks, the time spent on collision can be reduced and thus improves system throughput. However in a real WLAN scenario due to the use of nonlinear modulation techniques only receiver can decided whether a packet loss take place, even there are multiple transmissions. In this proposed method, the receiver or Access Point detects the collision when multiple data packets are transmitted from different wireless stations. Whenever the receiver detects a collision, it transmits a jamming signal to all the transmitting stations so that they can immediately stop their on-going transmissions. We also provide preferential access to all collided packet to reduce unfairness and to increase system throughput by reducing contention. However, this preferential access will not block the channel for the long time. Here, an in-band transmission is considered in which both the data frames and control frames are transmitted in the same channel. We also provide a simple mathematical model for the proposed protocol and give the simulation result of WLAN scenario under various capture thresholds.Keywords: 802.11, WLAN, capture effect, collision detection, collision resolution, receiver initiated
Procedia PDF Downloads 359336 Green Synthesis and Characterization of Zinc and Ferrous Nanoparticles for Their Potent Therapeutic Approach
Authors: Mukesh Saran, Ashima Bagaria
Abstract:
Green nanotechnology is the most researched field in the current scenario. Herein we study the synthesis of Zinc and Ferrous nanoparticles using Moringa oleifera leaf extracts. Our protocol using established protocols heat treatment of plant extracts along with the solution of copper sulphate in the ratio of 1:1. The leaf extracts of Moringa oleifera were prepared in deionized water. Copper sulfate solution (1mM) was added to this, and the change in color of the solution was observed indicating the formation of Cu nanoparticles. The as biosynthesized Cu nanoparticles were characterized with the help of Scanning Electron Microscopy (SEM), and Fourier Transforms Infrared Spectroscopy (FTIR). It was observed that the leaf extracts of Moringa oleifera can reduce copper ions into copper nanoparticles within 8 to 10 min of reaction time. The method thus can be used for rapid and eco-friendly biosynthesis of stable copper nanoparticles. Further, we checked their antimicrobial and antioxidant potential, and it was observed that maximum antioxidant activity was observed for the particles prepared using the heating method. The maximum antibacterial activity was observed in Streptomyces grisveus particles and in Triochoderma Reesei for the maximum antifungal activity. At present, we are engaged in studying the anti-inflammatory activities of these as prepared nanoparticles.Keywords: green synthesis, antibacterial, antioxidant, antifungal, anti-inflammatory
Procedia PDF Downloads 349335 Optimizing SCADA/RTU Control System Alarms for Gas Wells
Authors: Mohammed Ali Faqeeh
Abstract:
SCADA System Alarms Optimization Process has been introduced recently and applied accordingly in different implemented stages. First, MODBUS communication protocols between RTU/SCADA were improved at the level of I/O points scanning intervals. Then, some of the technical issues related to manufacturing limitations were resolved. Afterward, another approach was followed to take a decision on the configured alarms database. So, a couple of meetings and workshops were held among all system stakeholders, which resulted in an agreement of disabling unnecessary (Diagnostic) alarms. Moreover, a leap forward step was taken to segregate the SCADA Operator Graphics in a way to show only process-related alarms while some other graphics will ensure the availability of field alarms related to maintenance and engineering purposes. This overall system management and optimization have resulted in a huge effective impact on all operations, maintenance, and engineering. It has reduced unneeded open tickets for maintenance crews which led to reduce the driven mileages accordingly. Also, this practice has shown a good impression on the operation reactions and response to the emergency situations as the SCADA operators can be staying much vigilant on the real alarms rather than gets distracted by noisy ones. SCADA System Alarms Optimization process has been executed utilizing all applicable in-house resources among engineering, maintenance, and operations crews. The methodology of the entire enhanced scopes is performed through various stages.Keywords: SCADA, RTU Communication, alarm management system, SCADA alarms, Modbus, DNP protocol
Procedia PDF Downloads 166334 Addressing Oral Sensory Issues and Possible Remediation in Children with Autism Spectrum Disorders: Illustrated with a Case Study
Authors: A. K. Aswathy, Asha Manoharan, Arya Manoharan
Abstract:
The purpose of this study are to define the nature of oral sensory issues in children with autism spectrum disorder (ASD), identify important components of the assessment and treatment of this issues specific to this population, and delineate specific therapeutic techniques designed to improve assessment and treatment within therapeutic settings. Literature review and case example is used to define the predominant nature of the oral sensory issues that are experienced by some children on the autism spectrum. Characteristics of this complex disorder that can have an impact on feeding skill and behavior are also identified. These factors are then integrated to create assessment and intervention techniques that can be used in conjunction with traditional feeding approaches to facilitate improvements in eating as well as reducing oral apraxic component in this unique population. The complex nature of ASD and its many influences on feeding skills and behavior create the need for modification to both assessment and treatment approaches. Additional research is needed to create therapeutic protocols that can be used by speech-language pathologists to effectively assess and treat feeding and oro motor apraxic difficulties that are commonly encountered in children with ASD.Keywords: autism, assessment, feeding, intervention, oral sensory issues, oral apraxia
Procedia PDF Downloads 309333 Secure Data Sharing of Electronic Health Records With Blockchain
Authors: Kenneth Harper
Abstract:
The secure sharing of Electronic Health Records (EHRs) is a critical challenge in modern healthcare, demanding solutions to enhance interoperability, privacy, and data integrity. Traditional standards like Health Information Exchange (HIE) and HL7 have made significant strides in facilitating data exchange between healthcare entities. However, these approaches rely on centralized architectures that are often vulnerable to data breaches, lack sufficient privacy measures, and have scalability issues. This paper proposes a framework for secure, decentralized sharing of EHRs using blockchain technology, cryptographic tokens, and Non-Fungible Tokens (NFTs). The blockchain's immutable ledger, decentralized control, and inherent security mechanisms are leveraged to improve transparency, accountability, and auditability in healthcare data exchanges. Furthermore, we introduce the concept of tokenizing patient data through NFTs, creating unique digital identifiers for each record, which allows for granular data access controls and proof of data ownership. These NFTs can also be employed to grant access to authorized parties, establishing a secure and transparent data sharing model that empowers both healthcare providers and patients. The proposed approach addresses common privacy concerns by employing privacy-preserving techniques such as zero-knowledge proofs (ZKPs) and homomorphic encryption to ensure that sensitive patient information can be shared without exposing the actual content of the data. This ensures compliance with regulations like HIPAA and GDPR. Additionally, the integration of Fast Healthcare Interoperability Resources (FHIR) with blockchain technology allows for enhanced interoperability, enabling healthcare organizations to exchange data seamlessly and securely across various systems while maintaining data governance and regulatory compliance. Through real-world case studies and simulations, this paper demonstrates how blockchain-based EHR sharing can reduce operational costs, improve patient outcomes, and enhance the security and privacy of healthcare data. This decentralized framework holds great potential for revolutionizing healthcare information exchange, providing a transparent, scalable, and secure method for managing patient data in a highly regulated environment.Keywords: blockchain, electronic health records (ehrs), fast healthcare interoperability resources (fhir), health information exchange (hie), hl7, interoperability, non-fungible tokens (nfts), privacy-preserving techniques, tokens, secure data sharing,
Procedia PDF Downloads 21332 The Effect of Tribulus Terresteris on Histomorphometrical Changes of Testis Induced by Ethanol Administration in Male Wistar Rats
Authors: Arash Esfandiari, Ebrahim Parsaei
Abstract:
The purpose of this research was to survey the effect of tribulus terresteris on histomorphometrical changes of testis induced by ethanol administration in male wistar rats. Fifteen male wistar rats divided into three groups: 1- control group (n=5). 2- Experimental group I (IP received 1 mg/gr Alcohole 20% for 30 days) (n=5). 3- Experimental group II (IP received 1 mg/gr Alcohole 20% for 30 days and IP received 100 mg/kg tribulus terresteris 15 days before received Alcohole for 45 days) (n=5). All procedures and care of the animals were conducted following protocols approved by the ethical committee (Iranian Society for the Prevention of cruelty to animal, and Iranian Veterinary Organization). Results showed that the thickness of the wall of seminiferous tubule, the weight of testis, the number of spermatogenic cells were decreased in experimental group I. In addition, all of these parameters were increased in experimental group II compared with experimental group I. These decrement of all of parameters in experimental group I with significant difference in comparison control group (p≤ 0.05). But all of parameters had increment in experimental group II with no significant difference compared with control group (p≥ 0.05) and significant difference with experimental group I (p≤ 0.05).It is concluded that tribulus terresteris may prevent from reducing the number of spermatogenic cell that has been created by the consumption of alcohole.Keywords: ethanol, histomorphometric, testis, teribulus terresteris
Procedia PDF Downloads 605331 Acute Effects of Active Dynamic, Static Stretching and Passive Static Stretching Exercise on Hamstrings Flexibility and Muscle Strength
Authors: Yi Tse Wang, Che Hsiu Chen, Zih Jian Huang, Hon Wen Cheng
Abstract:
Stretching treatments enhanced flexibility. On the other hand, decreases in hamstrings strength have been reported after stretching, especially with static stretching or passive stretching. Stretching has been shown to be more effective than static stretching to improve muscle performance, but a clear consensus for the effect of dynamic stretching on muscle performance has not been achieved. The purpose of this study was to compare the acute effect of a dynamic stretching, static stretching and eccentric exercise protocol on hamstrings stiffness, flexibility and muscle strength. Forty-five healthy active men (height 179.9 cm; weight 71.5 kg; age 22.5 years) were participated in 3 randomly ordered testing sessions: dynamic stretching (DS), active static stretching (ASS), and passive static stretching (PSS). All the stretch were performed 30 seconds and repeated 6 times. There was a 30-second interval between repetitions. The outcome measures were isokinetic concentric contraction (60°/s), eccentric contraction (30°/s) peak torque, muscle flexibility after stretching. The results showed that the muscle flexibility (3.6%, 3.9% and 1.59%, respectively) increased significantly after DS, PSS and ASS. Hamstring isokinetic concentric peak torque (-6.4%, -8.0% and -5.8%, respectively) and eccentric peak torque (-5.8%, -4.5% and -5.4%, respectively) decreased significantly after DS, PSS and ASS. Hence, although the stretching protocols improve hamstrings flexibility immediately, reduced hamstring muscle eccentric and concentric peak torque.Keywords: hamstrings injury, warm-up, muscle performance, muscle stretching
Procedia PDF Downloads 383330 Quality Function Deployment Application in Sewer Pipeline Assessment
Authors: Khalid Kaddoura, Tarek Zayed
Abstract:
Infrastructure assets are essential in urban cities; their purpose is to facilitate the public needs. As a result, their conditions and states shall always be monitored to avoid any sudden malfunction. Sewer systems, one of the assets, are an essential part of the underground infrastructure as they transfer sewer medium to designated areas. However, their conditions are subject to deterioration due to ageing. Therefore, it is of great significance to assess the conditions of pipelines to avoid sudden collapses. Current practices of sewer pipeline assessment rely on industrial protocols that consider distinct defects and grades to conclude the limited average or peak score of the assessed assets. This research aims to enhance the evaluation by integrating the Quality Function Deployment (QFD) and the Decision-Making Trial and Evaluation Laboratory (DEMATEL) methods in assessing the condition of sewer pipelines. The methodology shall study the cause and effect relationship of the systems’ defects to deduce the relative influence weights of each defect. Subsequently, the overall grade is calculated by aggregating the WHAT’s and HOW’s of the House of Quality (HOQ) using the computed relative weights. Thus, this study shall enhance the evaluation of the assets to conclude informative rehabilitation and maintenance plans for decision makers.Keywords: condition assessment, DEMATEL, QFD, sewer pipelines
Procedia PDF Downloads 434329 Prospects of Acellular Organ Scaffolds for Drug Discovery
Authors: Inna Kornienko, Svetlana Guryeva, Natalia Danilova, Elena Petersen
Abstract:
Drug toxicity often goes undetected until clinical trials, the most expensive and dangerous phase of drug development. Both human cell culture and animal studies have limitations that cannot be overcome by improvements in drug testing protocols. Tissue engineering is an emerging alternative approach to creating models of human malignant tumors for experimental oncology, personalized medicine, and drug discovery studies. This new generation of bioengineered tumors provides an opportunity to control and explore the role of every component of the model system including cell populations, supportive scaffolds, and signaling molecules. An area that could greatly benefit from these models is cancer research. Recent advances in tissue engineering demonstrated that decellularized tissue is an excellent scaffold for tissue engineering. Decellularization of donor organs such as heart, liver, and lung can provide an acellular, naturally occurring three-dimensional biologic scaffold material that can then be seeded with selected cell populations. Preliminary studies in animal models have provided encouraging results for the proof of concept. Decellularized Organs preserve organ microenvironment, which is critical for cancer metastasis. Utilizing 3D tumor models results greater proximity of cell culture morphological characteristics in a model to its in vivo counterpart, allows more accurate simulation of the processes within a functioning tumor and its pathogenesis. 3D models allow study of migration processes and cell proliferation with higher reliability as well. Moreover, cancer cells in a 3D model bear closer resemblance to living conditions in terms of gene expression, cell surface receptor expression, and signaling. 2D cell monolayers do not provide the geometrical and mechanical cues of tissues in vivo and are, therefore, not suitable to accurately predict the responses of living organisms. 3D models can provide several levels of complexity from simple monocultures of cancer cell lines in liquid environment comprised of oxygen and nutrient gradients and cell-cell interaction to more advanced models, which include co-culturing with other cell types, such as endothelial and immune cells. Following this reasoning, spheroids cultivated from one or multiple patient-derived cell lines can be utilized to seed the matrix rather than monolayer cells. This approach furthers the progress towards personalized medicine. As an initial step to create a new ex vivo tissue engineered model of a cancer tumor, optimized protocols have been designed to obtain organ-specific acellular matrices and evaluate their potential as tissue engineered scaffolds for cultures of normal and tumor cells. Decellularized biomatrix was prepared from animals’ kidneys, urethra, lungs, heart, and liver by two decellularization methods: perfusion in a bioreactor system and immersion-agitation on an orbital shaker with the use of various detergents (SDS, Triton X-100) in different concentrations and freezing. Acellular scaffolds and tissue engineered constructs have been characterized and compared using morphological methods. Models using decellularized matrix have certain advantages, such as maintaining native extracellular matrix properties and biomimetic microenvironment for cancer cells; compatibility with multiple cell types for cell culture and drug screening; utilization to culture patient-derived cells in vitro to evaluate different anticancer therapeutics for developing personalized medicines.Keywords: 3D models, decellularization, drug discovery, drug toxicity, scaffolds, spheroids, tissue engineering
Procedia PDF Downloads 300328 Arteriosclerosis and Periodontitis: Correlation Expressed in the Amount of Fibrinogen in Blood
Authors: Nevila Alliu, Saimir Heta, Ilma Robo, Vera Ostreni
Abstract:
Periodontitis as an oral pathology caused by specific bacterial flora functions as a focal infection for the onset and aggravation of arteriosclerosis. These two distant pathologies, since they affect organs at a distance from each other, communicate with each other with correlation at the level of markers of inflammation in the blood. Fluctuations in the level of fibrinogen in the blood, depending on the active or passive phase of the existing periodontitis, affect the promotion of arteriosclerosis. The study is of the review type to analyze the effect of non-surgical periodontal treatment on fluctuations in the level of fibrinogen in the blood. The reduction of fibrinogen levels in the blood after non-surgical periodontal treatment of periodontitis in the patient's cavity is visible data and supported by literature sources. Also, the influence of a high amount of fibrinogen in the blood on the occurrence of arteriosclerosis is also another important data that again relies on many sources of literature. Conclusions: Thromboembolism and arteriosclerosis, as risk factors expressed in clinical data, have temporary bacteremia in the blood, which can occur significantly and often between phases of non-surgical periodontal treatment of periodontitis, treatments performed with treatment phases and protocols of predetermined treatment. Arterial thromboembolism has a significant factor, such as high levels of fibrinogen in the blood, which are significantly reduced during the period of non-surgical periodontal treatment.Keywords: fibrinogen, refractory periodontitis, atherosclerosis, non-surgical, periodontal treatment
Procedia PDF Downloads 108327 Emerging Research Trends in Routing Protocol for Wireless Sensor Network
Authors: Subhra Prosun Paul, Shruti Aggarwal
Abstract:
Now a days Routing Protocol in Wireless Sensor Network has become a promising technique in the different fields of the latest computer technology. Routing in Wireless Sensor Network is a demanding task due to the different design issues of all sensor nodes. Network architecture, no of nodes, traffic of routing, the capacity of each sensor node, network consistency, service value are the important factor for the design and analysis of Routing Protocol in Wireless Sensor Network. Additionally, internal energy, the distance between nodes, the load of sensor nodes play a significant role in the efficient routing protocol. In this paper, our intention is to analyze the research trends in different routing protocols of Wireless Sensor Network in terms of different parameters. In order to explain the research trends on Routing Protocol in Wireless Sensor Network, different data related to this research topic are analyzed with the help of Web of Science and Scopus databases. The data analysis is performed from global perspective-taking different parameters like author, source, document, country, organization, keyword, year, and a number of the publication. Different types of experiments are also performed, which help us to evaluate the recent research tendency in the Routing Protocol of Wireless Sensor Network. In order to do this, we have used Web of Science and Scopus databases separately for data analysis. We have observed that there has been a tremendous development of research on this topic in the last few years as it has become a very popular topic day by day.Keywords: analysis, routing protocol, research trends, wireless sensor network
Procedia PDF Downloads 215326 Creative Peace Diplomacy Model by the Perspective of Dialogue Management for International Relations
Authors: Bilgehan Gültekin, Tuba Gültekin
Abstract:
Peace diplomacy is the most important international tool to keep peace all over the world. The study titled “peace diplomacy for international relations” is consist of three part. In the first part, peace diplomacy is going to be introduced as a tool of peace communication and peace management. And, in this part, peace communication will be explained by international communication perspective. In the second part of the study,public relations events and communication campaigns will be developed originally for peace diplomacy. In this part, it is aimed original public communication dialogue management tools for peace diplomacy. the aim of the final part of the study, is to produce original public communication model for international relations. The model includes peace modules, peace management projects, original dialogue procedures and protocols, dialogue education, dialogue management strategies, peace actors, communication models, peace team management and public diplomacy steps. The creative part of the study aims to develop a model used for international relations for all countries. Creative Peace Diplomacy Model will be developed in the case of Turkey-Turkey-France and Turkey-Greece relations. So, communication and public relations events and campaigns are going to be developed as original for only this study.Keywords: peace diplomacy, public communication model, dialogue management, international relations
Procedia PDF Downloads 541325 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks
Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba
Abstract:
The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.Keywords: authentication, long term evolution, security, vehicle-to-everything
Procedia PDF Downloads 167324 Unidentified Remains with Extensive Bone Disease without a Clear Diagnosis
Authors: Patricia Shirley Almeida Prado, Selma Paixão Argollo, Maria De Fátima Teixeira Guimarães, Leticia Matos Sobrinho
Abstract:
Skeletal differential diagnosis is essential in forensic anthropology in order to differentiate skeletal trauma from normal osseous variation and pathological processes. Thus, part of forensic anthropological field is differentiate skeletal criminal injuries from the normal skeletal variation (bone fusion or nonunion, transitional vertebrae and other non-metric traits), non-traumatic skeletal pathology (myositis ossificans, arthritis, bone metastasis, osteomyelitis) from traumatic skeletal pathology (myositis ossificans traumatic) avoiding misdiagnosis. This case shows the importance of effective pathological diagnosis in order to accelerate the identification process of skeletonized human remains. THE CASE: An unidentified skeletal remains at the medico legal institute Nina Rodrigues-Salvador, of a male young adult (29 to 40 years estimated) showing a massive heterotopic ossification on its right tibia at upper epiphysis and adjacent articular femur surface; an extensive ossification on the right clavicle (at the sternal extremity) also presenting an heterotopic ossification at right scapulae (upper third of scapulae lateral margin and infraglenoid tubercule) and at the head of right humerus at the shoulder joint area. Curiously, this case also shows an unusual porosity in certain vertebrae´s body and in some tarsal and carpal bones. Likewise, his left fifth metacarpal bones (right and left) showed a healed fracture which led both bones distorted. Based on identification, of pathological conditions in human skeletal remains literature and protocols these alterations can be misdiagnosed and this skeleton may present more than one pathological process. The anthropological forensic lab at Medico-legal Institute Nina Rodrigues in Salvador (Brazil) adopts international protocols to ancestry, sex, age and stature estimations, also implemented well-established conventions to identify pathological disease and skeletal alterations. The most compatible diagnosis for this case is hematogenous osteomyelitis due to following findings: 1: the healed fracture pattern at the clavicle showing a cloaca which is a pathognomonic for osteomyelitis; 2: the metacarpals healed fracture does not present cloaca although they developed a periosteal formation. 3: the superior articular surface of the right tibia shows an extensive inflammatory healing process that extends to adjacent femur articular surface showing some cloaca at tibia bone disease. 4: the uncommon porosities may result from hematogenous infectious process. The fractures probably have occurred in a different moments based on the healing process; the tibia injury is more extensive and has not been reorganized, while metacarpals and clavicle fracture is properly healed. We suggest that the clavicle and tibia´s fractures were infected by an existing infectious disease (syphilis, tuberculosis, brucellosis) or an existing syndrome (Gorham’s disease), which led to the development of osteomyelitis. This hypothesis is supported by the fact that different bones are affected in diverse levels. Like the metacarpals that do not show the cloaca, but then a periosteal new bone formation; then the unusual porosities do not show a classical osteoarthritic processes findings as the marginal osteophyte, pitting and new bone formation, they just show an erosive process without bone formation or osteophyte. To confirm and prove our hypothesis we are working on different clinical approaches like DNA, histopathology and other image exams to find the correct diagnostic.Keywords: bone disease, forensic anthropology, hematogenous osteomyelitis, human identification, human remains
Procedia PDF Downloads 325323 An Adaptive Distributed Incremental Association Rule Mining System
Authors: Adewale O. Ogunde, Olusegun Folorunso, Adesina S. Sodiya
Abstract:
Most existing Distributed Association Rule Mining (DARM) systems are still facing several challenges. One of such challenges that have not received the attention of many researchers is the inability of existing systems to adapt to constantly changing databases and mining environments. In this work, an Adaptive Incremental Mining Algorithm (AIMA) is therefore proposed to address these problems. AIMA employed multiple mobile agents for the entire mining process. AIMA was designed to adapt to changes in the distributed databases by mining only the incremental database updates and using this to update the existing rules in order to improve the overall response time of the DARM system. In AIMA, global association rules were integrated incrementally from one data site to another through Results Integration Coordinating Agents. The mining agents in AIMA were made adaptive by defining mining goals with reasoning and behavioral capabilities and protocols that enabled them to either maintain or change their goals. AIMA employed Java Agent Development Environment Extension for designing the internal agents’ architecture. Results from experiments conducted on real datasets showed that the adaptive system, AIMA performed better than the non-adaptive systems with lower communication costs and higher task completion rates.Keywords: adaptivity, data mining, distributed association rule mining, incremental mining, mobile agents
Procedia PDF Downloads 393322 Investigation of Different Stimulation Patterns to Reduce Muscle Fatigue during Functional Electrical Stimulation
Abstract:
Functional electrical stimulation (FES) is a commonly used technique in rehabilitation and often associated with rapid muscle fatigue which becomes the limiting factor in its applications. The objective of this study is to investigate the effects on the onset of fatigue of conventional synchronous stimulation, as well as asynchronous stimulation that mimic voluntary muscle activation targeting different motor units which are activated sequentially or randomly via multiple pairs of stimulation electrodes. We investigate three different approaches with various electrode configurations, as well as different patterns of stimulation applied to the gastrocnemius muscle: Conventional Synchronous Stimulation (CSS), Asynchronous Sequential Stimulation (ASS) and Asynchronous Random Stimulation (ARS). Stimulation was applied repeatedly for 300 ms followed by 700 ms of no-stimulation with 40 Hz effective frequency for all protocols. Ten able-bodied volunteers (28±3 years old) participated in this study. As fatigue indicators, we focused on the analysis of Normalized Fatigue Index (NFI), Fatigue Time Interval (FTI) and pre-post Twitch-Tetanus Ratio (ΔTTR). The results demonstrated that ASS and ARS give higher NFI and longer FTI confirming less fatigue for asynchronous stimulation. In addition, ASS and ARS resulted in higher ΔTTR than conventional CSS. In this study, we proposed a randomly distributed stimulation method for the application of FES and investigated its suitability for reducing muscle fatigue compared to previously applied methods. The results validated that asynchronous stimulation reduces fatigue, and indicates that random stimulation may improve fatigue resistance in some conditions.Keywords: asynchronous stimulation, electrode configuration, functional electrical stimulation (FES), muscle fatigue, pattern stimulation, random stimulation, sequential stimulation, synchronous stimulation
Procedia PDF Downloads 306321 Strategies for Patient Families Integration in Caregiving: A Consensus Opinion
Authors: Ibrahim A. Alkali
Abstract:
There is no reservation on the outstanding contribution of patient families in restoration of hospitalised patients, hence their consideration as essential component of hospital ward regimen. The psychological and emotional support a patient requires has been found to be solely provided by the patient’s family. However, consideration of their presence as one of the major functional requirements of an inpatient setting design have always been a source of disquiet, especially in developing countries where policies, norms and protocols of healthcare administration have no consideration for the patients’ family. This have been a major challenge to the hospital ward facilities, a concern for the hospital administration and patient management. The study therefore is aimed at obtaining a consensus opinion on the best approach for family integration in the design of an inpatient setting. A one day visioning charrette involving Architects, Nurses, Medical Doctors, Healthcare assistants and representatives from the Patient families was conducted with the aim of arriving at a consensus opinion on practical design approach for sustainable family integration. Patient’s family are found to be decisive character of hospital ward regimen that cannot be undermined. However, several challenges that impede family integration were identified and subsequently a recommendation for an ideal approach. This will serve as a guide to both architects and hospital management in implementing much desired Patient and Family Centred Care.Keywords: patient's family, inpatient setting, care giving, integration
Procedia PDF Downloads 208320 Efficiency of Using E-Wallets as Payment Method in Marikina City During COVID-19 Pandemic
Authors: Noel Paolo Domingo, James Paul Menina, Laurente Ferrer
Abstract:
Most people were forced to stay at home and limit their physical contact during the COVID-19 pandemic. Due to the situation, strict implementation of government policies and safety protocols encouraged consumers to utilize cashless or digital transactions through e-wallets. In this study, the researchers aim to investigate the efficiency of using e-wallets as a payment method during the COVID-19 pandemic in Marikina City. The study examined the efficiency of e-wallets in terms of Usefulness, Convenience, and Safety and Security based on respondents’ assessment. Questionnaires developed by the researchers were distributed to a total of 400 e-wallet users in Marikina City aged 15 years old and above to gather data by using a purposive sampling technique. The data collected was processed using SPSS version 26. Frequency, percentage, and mean were utilized to describe the profile of respondents and their assessment of e-wallets in terms of the three constructs. ANOVA and t-tests were also employed to test the significant differences in the respondent’s assessment when the demographic profile was considered. The study revealed that when it comes to usefulness, e-wallet is efficient while in terms of convenience, and safety and security, e-wallet has been proven to be very efficient. During the COVID-19 pandemic, utilizing e-wallets has been embraced by most consumers. By enhancing its features, more people will be satisfied with using e-wallets.Keywords: efficiency of e-wallets, usefulness, convenience, safety and security
Procedia PDF Downloads 140319 The Occurrence of Depression with Chronic Liver Disease
Authors: Roop Kiran, Muhammad Shoaib Zafar, Nazish Idrees Chaudhary
Abstract:
Depression is known to be the second most frequently occurring comorbid mental illness among patients suffering from chronic physical conditions. Around the world, depression is associated with chronic liver diseases as one of the dominant symptoms. This evidence brings attention to the research about various predictors for short life expectancy and poor quality of life in patients suffering from comorbid depression and CLD. Following are the objectives of this study i) measure the occurrence rate of comorbid depression among patients with CLD and ii) find the frequency of risk factors between patients with and without depression comorbid with CLD. This is a quantitative study with a cross-sectional design. The research data was collected through a measure called Hamilton Depression Rating Scale (HDRS) with a demographic Performa from 100 patients who visited the Department of Psychiatry for consultation at Mayo Hospital Lahore with a diagnosed CLD from the last four years. There were (42%) patients with CLD who had comorbid depression. Among depressed and non-depressed patients, significant differences were found (p<0.05) for unemployment in 25 (59.5%) males and 20 (34.5%) female patients, for co-morbidity in 25 (59.5%) males and 18 (31.0%) female patients, for illiteracy in 18 (42.9%) males and 13 (22.4%) female patients, for the history of CLD for more than the last 2years in 41 (97.6%) males and 47 (81.0%) female patients, for severity of CLD in 26 (61.9%) males and 20 (34.5%) female patients. This concludes that depression frequently occurs among patients with CLD. This study recommends considerable attention to plan preventative measures in the future and develop such intervention protocols that consider the management of risk factors that significantly influence comorbid depression with CLD.Keywords: psychiatry, comorbid, health, quality of life
Procedia PDF Downloads 201318 Diminishing Voices of Children in Mandatory Mediation Schemes
Authors: Yuliya Radanova, Agnė Tvaronavičienė
Abstract:
With the growing trend for mandating parties of family conflicts to out-of-court processes, the adopted statutory regulations often remain silent on the way the voice of the child is integrated into the procedure. Convention on the Rights of the Child (Art. 12) clearly states the obligation to assure to the child who can form his or her own views the right to express those views freely in all matters affecting him. This article seeks to explore the way children participate in the mandatory mediation schemes applicable to family disputes in the European Union. A review of scientific literature and empirical data has been conducted on those EU Member States that coerce parties to family mediation to establish that different models of practice are deployed, and there is a lack of synchronicity on how children’s role in mediation is viewed. Child-inclusive mediation processes are deemed to produce sustainable results over time but necessitate professional qualifications and skills for the purpose of mediators to accommodate that such discussions are aligned with the best interest of the child. However, there is no unanimous guidance, standards or protocols on the peculiar characteristics and manner through which children are involved in mediation. Herewith, it is suggested that the lack of such rigorous approaches and coherence in an ever-changing mediation setting transitioning towards mandatory mediation models jeopardizes the importance of children’s voices in the process. Thus, it is suggested that there is a need to consider the adoption of uniform guidelines on the specific role children have in mediation, particularly in its mandatory models.Keywords: family mediation, child involvement, mandatory mediation, child-inclusive, child-focused
Procedia PDF Downloads 74317 Energy Efficient Clustering with Reliable and Load-Balanced Multipath Routing for Wireless Sensor Networks
Authors: Alamgir Naushad, Ghulam Abbas, Shehzad Ali Shah, Ziaul Haq Abbas
Abstract:
Unlike conventional networks, it is particularly challenging to manage resources efficiently in Wireless Sensor Networks (WSNs) due to their inherent characteristics, such as dynamic network topology and limited bandwidth and battery power. To ensure energy efficiency, this paper presents a routing protocol for WSNs, namely, Enhanced Hybrid Multipath Routing (EHMR), which employs hierarchical clustering and proposes a next hop selection mechanism between nodes according to a maximum residual energy metric together with a minimum hop count. Load-balancing of data traffic over multiple paths is achieved for a better packet delivery ratio and low latency rate. Reliability is ensured in terms of higher data rate and lower end-to-end delay. EHMR also enhances the fast-failure recovery mechanism to recover a failed path. Simulation results demonstrate that EHMR achieves a higher packet delivery ratio, reduced energy consumption per-packet delivery, lower end-to-end latency, and reduced effect of data rate on packet delivery ratio when compared with eminent WSN routing protocols.Keywords: energy efficiency, load-balancing, hierarchical clustering, multipath routing, wireless sensor networks
Procedia PDF Downloads 84