Search results for: ERAS protocols
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 689

Search results for: ERAS protocols

299 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks

Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas

Abstract:

Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.

Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model

Procedia PDF Downloads 61
298 Digital Forensic Exploration Framework for Email and Instant Messaging Applications

Authors: T. Manesh, Abdalla A. Alameen, M. Mohemmed Sha, A. Mohamed Mustaq Ahmed

Abstract:

Email and instant messaging applications are foremost and extensively used electronic communication methods in this era of information explosion. These applications are generally used for exchange of information using several frontend applications from various service providers by its users. Almost all such communications are now secured using SSL or TLS security over HTTP communication. At the same time, it is also noted that cyber criminals and terrorists have started exchanging information using these methods. Since communication is encrypted end-to-end, tracing significant forensic details and actual content of messages are found to be unattended and severe challenges by available forensic tools. These challenges seriously affect in procuring substantial evidences against such criminals from their working environments. This paper presents a vibrant forensic exploration and architectural framework which not only decrypts any communication or network session but also reconstructs actual message contents of email as well as instant messaging applications. The framework can be effectively used in proxy servers and individual computers and it aims to perform forensic reconstruction followed by analysis of webmail and ICQ messaging applications. This forensic framework exhibits a versatile nature as it is equipped with high speed packet capturing hardware, a well-designed packet manipulating algorithm. It regenerates message contents over regular as well as SSL encrypted SMTP, POP3 and IMAP protocols and catalyzes forensic presentation procedure for prosecution of cyber criminals by producing solid evidences of their actual communication as per court of law of specific countries.

Keywords: forensics, network sessions, packet reconstruction, packet reordering

Procedia PDF Downloads 344
297 Insights Into Serotonin-Receptor Binding and Stability via Molecular Dynamics Simulations: Key Residues for Electrostatic Interactions and Signal Transduction

Authors: Arunima Verma, Padmabati Mondal

Abstract:

Serotonin-receptor binding plays a key role in several neurological and biological processes, including mood, sleep, hunger, cognition, learning, and memory. In this article, we performed molecular dynamics simulation to examine the key residues that play an essential role in the binding of serotonin to the G-protein-coupled 5-HT₁ᴮ receptor (5-HT₁ᴮ R) via electrostatic interactions. An end-point free energy calculation method (MM-PBSA) determines the stability of the 5-HT1B R due to serotonin binding. The single-point mutation of the polar or charged amino acid residues (Asp129, Thr134) on the binding sites and the calculation of binding free energy validate the importance of these residues in the stability of the serotonin-receptor complex. Principal component analysis indicates the serotonin-bound 5-HT1BR is more stabilized than the apo-receptor in terms of dynamical changes. The difference dynamic cross-correlations map shows the correlation between the transmembrane and mini-Go, which indicates signal transduction happening between mini-Go and the receptor. Allosteric communication reveals the key nodes for signal transduction in 5-HT1BR. These results provide useful insights into the signal transduction pathways and mutagenesis study to regulate the functionality of the complex. The developed protocols can be applied to study local non-covalent interactions and long-range allosteric communications in any protein-ligand system for computer-aided drug design.

Keywords: allostery, CADD, MD simulations, MM-PBSA

Procedia PDF Downloads 87
296 Linux Security Management: Research and Discussion on Problems Caused by Different Aspects

Authors: Ma Yuzhe, Burra Venkata Durga Kumar

Abstract:

The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues.

Keywords: Linux, operating system, system management, security

Procedia PDF Downloads 110
295 Cybersecurity Strategies for Protecting Oil and Gas Industrial Control Systems

Authors: Gaurav Kumar Sinha

Abstract:

The oil and gas industry is a critical component of the global economy, relying heavily on industrial control systems (ICS) to manage and monitor operations. However, these systems are increasingly becoming targets for cyber-attacks, posing significant risks to operational continuity, safety, and environmental integrity. This paper explores comprehensive cybersecurity strategies for protecting oil and gas industrial control systems. It delves into the unique vulnerabilities of ICS in this sector, including outdated legacy systems, integration with IT networks, and the increased connectivity brought by the Industrial Internet of Things (IIoT). We propose a multi-layered defense approach that includes the implementation of robust network security protocols, regular system updates and patch management, advanced threat detection and response mechanisms, and stringent access control measures. We illustrate the effectiveness of these strategies in mitigating cyber risks and ensuring the resilient and secure operation of oil and gas industrial control systems. The findings underscore the necessity for a proactive and adaptive cybersecurity framework to safeguard critical infrastructure in the face of evolving cyber threats.

Keywords: cybersecurity, industrial control systems, oil and gas, cyber-attacks, network security, IoT, threat detection, system updates, patch management, access control, cybersecurity awareness, critical infrastructure, resilience, cyber threats, legacy systems, IT integration, multi-layered defense, operational continuity, safety, environmental integrity

Procedia PDF Downloads 47
294 Ovarian Hormones and Antioxidants Biomarkers in Dromedary Camels Synchronized with Controlled Intravaginal Drug Release/Ovsynch GPG Program during Breeding Season

Authors: Heba Hozyen, Ragab Mohamed, Amal Abd El Hameed, Amal Abo El-Maaty

Abstract:

This study aimed to investigate the effect of CIDR and ovsynch (Gonadotropin-prostaglandine-gonadotropin GPG) protocols for synchronization of follicular waves of dromedary camels on ovarian hormones, oxidative stress and conception during breeding season. Twelve dark colored dromedary camels were divided into two equal groups. The first group was subjected to CIDR insertion for 7 days and blood samples were collected each other day from the day of CIDR insertion (day 0) till day 21. The other group was subjected to GPG system (Ovsynch) and blood samples were collected daily for 11 days. Progesterone (P4) and estradiol were assayed using commercial ELISA diagnostic EIA kits. Catalase (CAT), total antioxidants capacity (TAC), glutathione reduced (GHD), lipid peroxide product (malondialdehyde, MDA) and nitric oxide (NO) were measured colorimetrically using spectrophotometer. Results revealed that CIDR treated camels had significantly high P4 (P= 0.0001), estradiol (P= 0.0001), CAT (P= 0.034), NO (P= 0.016) and TAC (P= 0.04) but significantly low MDA (P= 0.001) and GHD (P= 0.003) compared to GPG treated ones. Camels inserted with CIDR had higher conception rate (66.7%) compared to those treated with GPG (33%). In conclusion, camels treated with CIDR had higher hormonal response and antioxidant capacity than those synchronized with GPG which positively reflected on their conception rate. The better response of camels to CIDR and the higher conception compared to GPG protocol recommends its use for future reproductive management in camels.

Keywords: antioxidants, camel, CIDR, season, steroid hormones

Procedia PDF Downloads 292
293 Sustainable and Efficient Recovery of Polyhydroxyalkanoate Polymer from Cupriavidus necator Using Environment Friendly Solvents

Authors: Geeta Gahlawat, Sanjeev Kumar Soni

Abstract:

An imprudent use of environmentally hazardous petrochemical-based plastics and limited availability of fossil fuels have provoked research interests towards production of biodegradable plastics - polyhydroxyalkanoate (PHAs). However, the industrial application of PHAs based products is primarily restricted by their high cost of recovery and extraction protocols. Moreover, solvents used for the extraction and purification are toxic and volatile which causes adverse environmental hazards. Development of efficient downstream recovery strategies along with utilization of non-toxic solvents will accelerate their commercialization. In this study, various extraction strategies were designed for sustainable and cost-effective recovery of PHAs from Cupriavidus necator using non-toxic environment friendly solvents viz. 1,2-propylene carbonate, ethyl acetate, isoamyl alcohol, butyl acetate. The effect of incubation time i.e. 10, 30 and 50 min and temperature i.e. 60, 80, 100, 120°C was tested to identify the most suitable solvent. PHAs extraction using a recyclable solvent, 1,2 propylene carbonate, showed the highest recovery yield (90%) and purity (93%) at 120°C and 30 min incubation. Ethyl acetate showed the better capacity to recover PHAs from cells than butyl acetate. Extraction with ethyl acetate exhibited high recovery yield and purity of 96% and 92%, respectively at 100°C. Effect of non-toxic surfactant such as linear alkylbenzene sulfonic acid (LAS) was also studied at 40, 60 and 80°C, and detergent pH range of 3.0, 5.0, 7.0 and 9.0 for the extraction of PHAs from the cells. LAS gave highest yield of 86% and purity of 88% at temperature 80°C and 5.0 pH.

Keywords: polyhydroxyalkanoates, Cupriavidus necator, extraction, recovery yield

Procedia PDF Downloads 510
292 The Role of the Linguistic Mediator in Relation to Culturally Oriented Crimes

Authors: Andreas Aceranti, Simonetta Vernocchi, Elisabetta Aldrovandi, Marco Colorato, Carolina Ascrizzi

Abstract:

Nowadays, especially due to an increasing flow of migration and uncontrolled globalisation, linguistic, cultural and religious differences can be a major obstacle for people belonging to different ethnic groups. Each group has its own traditional background, which, in addition to its positive aspects, also includes extremely unpleasant and dramatic situations: culture-related crimes. We analysed several cases belonging to this category of crime which is becoming more and more present in Europe, creating not only a strong social rift dictated by the misunderstanding between migrants and host populations but also by the isolation and ghettoisation of subjects classified as 'different'. Such social rejection, in fact, represents a great source of stress and frustration for those who seek to be part of the community and can generate phenomena of rebellion that result in violent acts. Similar situations must be addressed by the figure of the cultural-linguistic mediator who, thanks to his or her multidisciplinary knowledge, assumes the role of a 'bridge', thus helping the process of awareness and understanding within the social group through the use of various tools, including awareness-raising campaigns and interventions in both the school and social-health sectors. By analysing how the notions of culture and offense have evolved throughout history until they have merged into a single principle and, secondly, how the figure of the language mediator represents a fundamental role in the resolution of conflicts related to cultural diversity has helped us define the basis for new protocols in dealing with such crimes. Especially we have to define the directions of further investigations that we will carry out in the next months.

Keywords: cultural crimes, hatred crimes, immigration, cultural mediation

Procedia PDF Downloads 79
291 Percentage Change in the Selected Skinfold Measurements of Male Students of University of Delhi Due to Progressive and Constant Load of Physical Training

Authors: Seema Kaushik

Abstract:

Skinfold measurements provide considerably meaningful and consistent information about subcutaneous fat and its distribution. Physical activities in the form of conditioning and/or training leads to various structural, functional and mechanical changes and numerous training programmes exist for the improvement of physical fitness, however, most of the studies are conducted on foreign soil with foreign population as sample, which may/may not be applicable to the Indian conditions. Moreover, there is not even a single training/ conditioning programme that caters to the need of male students of University of Delhi with regard to various skinfold thickness measurements. Hence, the present study aimed at studying the effect of progressive and constant load training on selected skinfold measurements of male students of University of Delhi in form of percentage change. The sample size for the study was 90 having three groups of male; 30 samples in each group (mean age = 20.04±0.49 years). The variables included triceps, sub-scapular, supra-iliac and calf skinfolds. The experimental design adopted for the study was multi-group repeated measure design. Three different groups were measured four times repeatedly at an interval of 6 weeks, on completion of each of the three meso-cycles. Standard landmarks and protocols were followed to measure the selected variables. Mean, standard deviation and percentage were computed to analyze the data statistically. The study concluded that both the progressive and constant load of physical training bring changes in the skinfold thickness measurements of male students of University of Delhi.

Keywords: constant load, progressive load, physical training, skinfold measurements

Procedia PDF Downloads 322
290 Internet of Things Networks: Denial of Service Detection in Constrained Application Protocol Using Machine Learning Algorithm

Authors: Adamu Abdullahi, On Francisca, Saidu Isah Rambo, G. N. Obunadike, D. T. Chinyio

Abstract:

The paper discusses the potential threat of Denial of Service (DoS) attacks in the Internet of Things (IoT) networks on constrained application protocols (CoAP). As billions of IoT devices are expected to be connected to the internet in the coming years, the security of these devices is vulnerable to attacks, disrupting their functioning. This research aims to tackle this issue by applying mixed methods of qualitative and quantitative for feature selection, extraction, and cluster algorithms to detect DoS attacks in the Constrained Application Protocol (CoAP) using the Machine Learning Algorithm (MLA). The main objective of the research is to enhance the security scheme for CoAP in the IoT environment by analyzing the nature of DoS attacks and identifying a new set of features for detecting them in the IoT network environment. The aim is to demonstrate the effectiveness of the MLA in detecting DoS attacks and compare it with conventional intrusion detection systems for securing the CoAP in the IoT environment. Findings: The research identifies the appropriate node to detect DoS attacks in the IoT network environment and demonstrates how to detect the attacks through the MLA. The accuracy detection in both classification and network simulation environments shows that the k-means algorithm scored the highest percentage in the training and testing of the evaluation. The network simulation platform also achieved the highest percentage of 99.93% in overall accuracy. This work reviews conventional intrusion detection systems for securing the CoAP in the IoT environment. The DoS security issues associated with the CoAP are discussed.

Keywords: algorithm, CoAP, DoS, IoT, machine learning

Procedia PDF Downloads 81
289 Evolutionary Swarm Robotics: Dynamic Subgoal-Based Path Formation and Task Allocation for Exploration and Navigation in Unknown Environments

Authors: Lavanya Ratnabala, Robinroy Peter, E. Y. A. Charles

Abstract:

This research paper addresses the challenges of exploration and navigation in unknown environments from an evolutionary swarm robotics perspective. Path formation plays a crucial role in enabling cooperative swarm robots to accomplish these tasks. The paper presents a method called the sub-goal-based path formation, which establishes a path between two different locations by exploiting visually connected sub-goals. Simulation experiments conducted in the Argos simulator demonstrate the successful formation of paths in the majority of trials. Furthermore, the paper tackles the problem of inter-collision (traffic) among a large number of robots engaged in path formation, which negatively impacts the performance of the sub-goal-based method. To mitigate this issue, a task allocation strategy is proposed, leveraging local communication protocols and light signal-based communication. The strategy evaluates the distance between points and determines the required number of robots for the path formation task, reducing unwanted exploration and traffic congestion. The performance of the sub-goal-based path formation and task allocation strategy is evaluated by comparing path length, time, and resource reduction against the A* algorithm. The simulation experiments demonstrate promising results, showcasing the scalability, robustness, and fault tolerance characteristics of the proposed approach.

Keywords: swarm, path formation, task allocation, Argos, exploration, navigation, sub-goal

Procedia PDF Downloads 42
288 Trauma System in England: An Overview and Future Directions

Authors: Raheel Shakoor Siddiqui, Sanjay Narayana Murthy, Manikandar Srinivas Cheruvu, Kash Akhtar

Abstract:

Major trauma is a dynamic public health epidemic that is continuously evolving. Major trauma care services rely on multi-disciplinary team input involving highly trained pre and in-hospital critical care teams. Pre-hospital critical care teams (PHCCTs), major trauma centres (MTCs), trauma units, and rehabilitation facilities all form an efficient and organised trauma system. England comprises 27 MTCs funded by the National Health Service (NHS). Major trauma care entails enhanced resuscitation protocols coupled with the expertise of dedicated trauma teams and rapid radiological imaging to improve trauma outcomes. Literature reports a change in the demographic of major trauma as elderly patients (silver trauma) with injuries sustained from a fall of 2 metres or less commonly present to services. Evidence of an increasing population age with multiple comorbidities necessitates treatment within the first hour of injury (golden hour) to improve trauma survival outcomes. Staffing and funding pressures within the NHS have subsequently led to a shortfall of available physician-led PHCCTs. Thus, there is a strong emphasis on targeted research and funding to appropriately deploy resources to deprived areas. This review article will discuss the current English trauma system whilst critically appraising present challenges, identifying insufficiencies, and recommending aims for an improved future trauma system in England.

Keywords: trauma, orthopaedics, major trauma, trauma system, trauma network

Procedia PDF Downloads 188
287 Testing the Possibility of Healthy Individuals to Mimic Fatigability in Multiple Sclerotic Patients

Authors: Emmanuel Abban Sagoe

Abstract:

A proper functioning of the Central Nervous System ensures that we are able to accomplish just about everything we do as human beings such as walking, breathing, running, etc. Myelinated neurons throughout the body which transmit signals at high speeds facilitate these actions. In the case of MS, the body’s immune system attacks the myelin sheath surrounding the neurons and overtime destroys the myelin sheaths. Depending upon where the destruction occurs in the brain symptoms can vary from person to person. Fatigue is, however, the biggest problem encountered by an MS sufferer. It is very often described as the bedrock upon which other symptoms of MS such challenges in balance and coordination, dizziness, slurred speech, etc. may occur. Classifying and distinguishing between perceptions based fatigue and performance based fatigability is key to identifying appropriate treatment options for patients. Objective methods for assessing motor fatigability is also key to providing clinicians and physiotherapist with critical information on the progression of the symptom. This study tested if the Fatigue Index Kliniken Schmieder assessment tool can detect fatigability as seen in MS patients when healthy subjects with no known history of neurological pathology mimic abnormal gaits. Thirty three healthy adults between ages 18-58years volunteered as subjects for the study. The subjects, strapped with RehaWatch sensors on both feet, completed 6 gait protocols of normal and mimicked fatigable gaits for 60 seconds per each gait and at 1.38889m/s treadmill speed following clear instructions given.

Keywords: attractor attributes, fatigue index Kliniken Schmieder, gait variability, movement pattern

Procedia PDF Downloads 123
286 Estimation of Effective Radiation Dose Following Computed Tomography Urography at Aminu Kano Teaching Hospital, Kano Nigeria

Authors: Idris Garba, Aisha Rabiu Abdullahi, Mansur Yahuza, Akintade Dare

Abstract:

Background: CT urography (CTU) is efficient radiological examination for the evaluation of the urinary system disorders. However, patients are exposed to a significant radiation dose which is in a way associated with increased cancer risks. Objectives: To determine Computed Tomography Dose Index following CTU, and to evaluate organs equivalent doses. Materials and Methods: A prospective cohort study was carried at a tertiary institution located in Kano northwestern. Ethical clearance was sought and obtained from the research ethics board of the institution. Demographic, scan parameters and CT radiation dose data were obtained from patients that had CTU procedure. Effective dose, organ equivalent doses, and cancer risks were estimated using SPSS statistical software version 16 and CT dose calculator software. Result: A total of 56 patients were included in the study, consisting of 29 males and 27 females. The common indication for CTU examination was found to be renal cyst seen commonly among young adults (15-44yrs). CT radiation dose values in DLP, CTDI and effective dose for CTU were 2320 mGy cm, CTDIw 9.67 mGy and 35.04 mSv respectively. The probability of cancer risks was estimated to be 600 per a million CTU examinations. Conclusion: In this study, the radiation dose for CTU is considered significantly high, with increase in cancer risks probability. Wide radiation dose variations between patient doses suggest that optimization is not fulfilled yet. Patient radiation dose estimate should be taken into consideration when imaging protocols are established for CT urography.

Keywords: CT urography, cancer risks, effective dose, radiation exposure

Procedia PDF Downloads 345
285 Nanda Ways of Knowing, Being and Doing: Our Process of Research Engagement and Research Impacts

Authors: Steven Kelly

Abstract:

A fundament role of the researcher is research engagement, that is, the interaction between researchers and research end-users outside of academia for the mutually beneficial transfer of knowledge, technologies, methods, or resources. While research impact is the contribution that research makes to the economy, society, environment, or culture beyond the contribution to academic research. Ironically, traditional impact metrics in the academy are designed to focus on the outputs; it dismisses the important role engagement plays in fostering a collaborative process that leads to meaningful, ethical, and useful impacts. Dr. Kelly, aNanda (First Nations) man himself, has worked closely with the Nanda community over the past decade, ensuring cultural protocols are upheld and implemented while doing research engagement. The focus was on the process, which was essential to foster a positive research impact culture. The contributions that flowed from this process were the naming of a new species of squat lobster in the Nanda language, a poster design in collaboration with The University of Melbourne, Museums Victoria and Bundiyarra - IrraWanga language centre, media coverage, and the formation of the “Nanda language, Nanda country project”. The Nanda language, Nanda country project is a language revitalization project that focused on reconnecting Nanda people with the language & culture on Nanda Country. Such outcomes are imperative on the eve of the United Nations International Decade of Indigenous Languages. In this paperDr, Kellywill discuss howNanda cultural practicesinformed research engagement to foster a collaborative processthat, in turn, ledto meaningful, ethical, and useful impacts within and outside of the academy.

Keywords: community collaboration, indigenous, nanda, research engagement, research impacts

Procedia PDF Downloads 114
284 The Impact of Covid-19 Pandemic on Acute Urology Admissions in a Busy District General Hospital in the UK

Authors: D. Bheenick, M. Young, M.Elmussareh, A.Ali

Abstract:

Objective: Coronavirus disease 2019 (COVID-19) has had unprecedented effects on the healthcare system in the UK. The pandemic has impacted every service within secondary care, including urology. Our objective is to determine how COVID-19 has influenced acute urology admissions in a busy district general hospital in the UK. Patient and methods: Retrospective data of patients presenting acutely to the urology department was collected between 13th January to 22nd March 2020 (pre-lockdown period) and 23rd March to 31st May 2020 (lockdown period). The nature of referrals, types of admission encountered, and management required in accordance with the new set of protocols established during the lockdown period were analysed and compared to the same data prior to UK lockdown. Results: 1092 patients were included in the study. An overall reduction of 32.5% was seen in the total number of admissions. A marked decrease was seen in non-urological pathology as compared to other categories. Urolithiasis showed the highest proportional increase. Treatment varied proportionately to the diagnosis, with conservative management accounting for the most likely treatment during lockdown. However, the proportion of patients requiring interventions during the lockdown period increased overall. No comparative differences were observed during the two periods in terms of source of referral, length of stay and patient age. Conclusion: The admission rate showed a decrease, with no significant difference in the nature and timing of presentation. Our department was able to continue providing effective management to patients presenting acutely during the COVID-19 outbreak.

Keywords: COVID-19, lockdown, admissions, urology

Procedia PDF Downloads 172
283 Health and Safety of Red Cross Workers in Long-Term Homes during Early Days of the COVID-19 Pandemic: A Human Performance Perspective

Authors: Douglas J. Kube

Abstract:

At the beginning of the COVID-19 pandemic, the Canadian Red Cross deployed workers into long-term care homes across Canada to support our most vulnerable citizens. It began by recruiting and training small teams of workers to provide non-clinical services for facilities in outbreak. Deployed workers were trained on an approach based on successful Red Cross deployments used with Ebola in which zones were established, levels of protection used, and strict protocols followed to prevent exposure. This paper addresses aspects of human performance through a safety culture lens. The Red Cross deployments highlight valuable insights and are an excellent case study in the principles of human performance and organizational culture. This paper looks at human performance principles, including human fallibility, predictability of error-likely situations, avoiding events by understanding reasons mistakes occur, and the influence on behaviour by organizational factors. This study demonstrates how the Red Cross’s organizational culture and work design positively influenced performance to protect workers and residents/clients. Lastly, this paper shares lessons that can be applied in many workplaces to improve worker health and safety and safety culture. This critical examination is based on the author’s experience as a Senior Occupational Health and Safety Advisor with the Red Cross during the pandemic as part of the team responsible for developing and implementing biological safety practices in long-term care deployments.

Keywords: COVID, human performance, organizational culture, work design

Procedia PDF Downloads 58
282 Improving Pain Management for Trauma Patients at Two Rwandan Emergency Departments

Authors: Jean Pierre Hagenimana, Paulin Ruhato Banguti, Rebecca Lynn Churchill Anderson, Jean de Dieu Tuyishime, Gaston Nyirigira, Eugene Tuyishime

Abstract:

Background: Little is known regarding the effectiveness of pain protocols and guidelines used in Emergency Departments (ED) in Sub-Saharan Africa (SSA). Therefore, to shed light on this research gap, this study aimed to evaluate the quality of pain management following the implementation of both the WHO pain ladder-based trauma pain management protocol in two Rwandan teaching hospitals. Methods: This was a pre-and post-intervention study. The intervention was a 1-day acute pain course training for ED clinical staff followed by 1 week of mentorship on the use of the WHO pain ladder-based trauma pain management. Results: 261 participants were enrolled in the study (124 before the intervention and 137 after the intervention). The number of patients with undocumented pain scores decreased from 58% to 24% after the intervention (p-value > 0.001), and most patients (62%) had mild pain. In addition, patients who were satisfied with the quality of pain management increased significantly from 42% before the intervention to 80% (p-value > 0.001). Barriers were identified, however, including inadequate training and experience, shortage of staff, and patient’s reluctance to report pain. Conclusion: The implementation of the WHO pain ladder-based trauma pain management protocol significantly improved the quality of pain management in both CHUK and CHUB referral Hospital emergency departments. Despite this, some barriers remain, such as inadequate training and experience, shortage of staff, and patient’s reluctance to report pain. Appropriate interventions should be implemented to address the identified barriers and ensure adequate pain management for patients admitted at the emergency departments in referral hospitals in Rwanda.

Keywords: pain management, trauma, emergency departments, Rwanda

Procedia PDF Downloads 14
281 Biodegradable and Bioactive Scaffold for Bone Tissue Engineering

Authors: A. M. Malagon Escandon, J. A. Arenas Alatorre, C. P. Chaires Rosas, N. A. Vazquez Torres, B. Hernandez Tellez, G. Pinon Zarate, M. Herrera Enriquez, A. E. Castell Rodriguez

Abstract:

The current approach to the treatment of bone defects involves the use of scaffolds that provide a biological and mechanically stable niche to favor tissue repair. Despite the significant progress in the field of bone tissue engineering, several main problems associated are attributed to giving a low biodegradation degree, does not promote osseointegration and regeneration, if the bone is not healing as well as expected or fails to heal, will not be given a proper ossification or new bone formation. The actual approaches of bone tissue regeneration are directed to the use of decellularized native extracellular matrices, which are able of retain their own architecture, mechanic properties, biodegradability and promote new bone formation because they are capable of conserving proteins and other factors that are founded in physiological concentrations. Therefore, we propose an extracellular matrix-based bioscaffolds derived from bovine cancellous bone, which is processed by decellularization, demineralization, and hydrolysis of the collagen protein, these protocols have been successfully carried out in other organs and tissues; the effectiveness of its biosafety has also been previously evaluated in vivo and Food and Drug Administration (FDA) approved. In the specific case of bone, a more complex treatment is needed in comparison with other organs and tissues because is necessary demineralization and collagen denaturalization. The present work was made in order to obtain a temporal scaffold that succeed in degradation in an inversely proportional way to the synthesis of extracellular matrix and the maturation of the bone by the cells of the host.

Keywords: bioactive, biodegradable, bone, extracellular matrix-based bioscaffolds, stem cells, tissue engineering

Procedia PDF Downloads 158
280 Empowering Transformers for Evidence-Based Medicine

Authors: Jinan Fiaidhi, Hashmath Shaik

Abstract:

Breaking the barrier for practicing evidence-based medicine relies on effective methods for rapidly identifying relevant evidence from the body of biomedical literature. An important challenge confronted by medical practitioners is the long time needed to browse, filter, summarize and compile information from different medical resources. Deep learning can help in solving this based on automatic question answering (Q&A) and transformers. However, Q&A and transformer technologies are not trained to answer clinical queries that can be used for evidence-based practice, nor can they respond to structured clinical questioning protocols like PICO (Patient/Problem, Intervention, Comparison and Outcome). This article describes the use of deep learning techniques for Q&A that are based on transformer models like BERT and GPT to answer PICO clinical questions that can be used for evidence-based practice extracted from sound medical research resources like PubMed. We are reporting acceptable clinical answers that are supported by findings from PubMed. Our transformer methods are reaching an acceptable state-of-the-art performance based on two staged bootstrapping processes involving filtering relevant articles followed by identifying articles that support the requested outcome expressed by the PICO question. Moreover, we are also reporting experimentations to empower our bootstrapping techniques with patch attention to the most important keywords in the clinical case and the PICO questions. Our bootstrapped patched with attention is showing relevancy of the evidence collected based on entropy metrics.

Keywords: automatic question answering, PICO questions, evidence-based medicine, generative models, LLM transformers

Procedia PDF Downloads 47
279 Effect of Synchronization Protocols on Serum Concentrations of Estrogen and Progesterone in Holstein Dairy Heifers

Authors: K. Shafiei, A. Pirestani, G. Ghalamkari, S. Safavipour

Abstract:

Use of GnRH or its agonists to increase conception rates should be based on an understanding of GnRH-induced biological effects on the reproductive-endocrine system. This effect may occur through GnRH-stimulated LH surge stimulating production of progesterone by corpus luteum.the aim of this study was to compare the effects on reproductive efficiency of a luteolytic dose of a synthetic prostaglandin Cloprostenol Sodium versus ainjectable progesterone and Luliberin- A on Follicle estrogen and progesterone levels.In this study, we used45 head of holstein dairy heifersin the three treatments, with 15 replicates per treatment were performed in random groups. all the heifers before the projects is began in two steps injection 3 mL CloprostenolSodium with an interval of 11 days been synchronized and 10 days later, second injection of prostaglandin was conducted after that we started below protocol:Control group (daily sodium chloride serum injection 1 cc), Group B: Day Zero, intramuscular injection of 15 mg Luliberin- A + every other day injection of 3 cc progesterone + day 7, injection of Cloprostenol Sodium+ day 9, injection of 15 mg Luliberin- A.Group C: similar to Grop B + daily injection of progesterone after that blood samples was collected and centrifuged.plasma were analysed by ELISA.the analysis of this study uses SPSS data software package and compared between the mean and LS Means LSD test at 5% significance level was used.The results of this study shows that maximum of progesterone plasma levels were in the control gruop (P ≥ 0.05).Therefore, daily injection of progesterone inhibit the growth CL. the most estrogen levels in plasma were in Group C (P ≥ 0.05) thus it can be concluded, rise in endogenous estrogen concentrations normally stimulates the preovulatory LH release in heifers.

Keywords: Luliberin- A, Cloprostenol Sodium, estrogen, progesterone, dairy heifers

Procedia PDF Downloads 541
278 Corticomotor Excitability after Two Different Repetitive Transcranial Magnetic Stimulation Protocols in Ischemic Stroke Patients

Authors: Asrarul Fikri Abu Hassan, Muhammad Hafiz bin Hanafi, Jafri Malin Abdullah

Abstract:

This study is to compare the motor evoked potential (MEP) changes using different settings of repetitive transcranial magnetic stimulation (rTMS) in the post-haemorrhagic stroke patient which treated conservatively. The goal of the study is to determine changes in corticomotor excitability and functional outcome after repetitive transcranial magnetic stimulation (rTMS) therapy regime. 20 post-stroke patients with upper limb hemiparesis were studied due to haemorrhagic stroke. One of the three settings; (I) Inhibitory setting, or (II) facilitatory setting, or (III) control group, no excitatory or inhibitory setting have been applied randomly during the first meeting. The motor evoked potential (MEP) were recorded before and after application of the rTMS setting. Functional outcomes were evaluated using the Barthel index score. We found pre-treatment MEP values of the lesional side were lower compared to post-treatment values in both settings. In contrast, we found that the pre-treatment MEP values of the non-lesional side were higher compared to post-treatment values in both settings. Interestingly, patients with treatment, either facilitatory setting and inhibitory setting have faster motor recovery compared to the control group. Our data showed both settings might improve the MEP of the upper extremity and functional outcomes in the haemorrhagic stroke patient.

Keywords: Barthel index, corticomotor excitability, motor evoked potential, repetitive transcranial magnetic stimulation, stroke

Procedia PDF Downloads 159
277 Using the Minnesota Multiphasic Personality Inventory-2 and Mini Mental State Examination-2 in Cognitive Behavioral Therapy: Case Studies

Authors: Cornelia-Eugenia Munteanu

Abstract:

From a psychological perspective, psychopathology is the area of clinical psychology that has at its core psychological assessment and psychotherapy. In day-to-day clinical practice, psychodiagnosis and psychotherapy are used independently, according to their intended purpose and their specific methods of application. The paper explores how the Minnesota Multiphasic Personality Inventory-2 (MMPI-2) and Mini Mental State Examination-2 (MMSE-2) psychological tools contribute to enhancing the effectiveness of cognitive behavioral psychotherapy (CBT). This combined approach, psychotherapy in conjunction with assessment of personality and cognitive functions, is illustrated by two cases, a severe depressive episode with psychotic symptoms and a mixed anxiety-depressive disorder. The order in which CBT, MMPI-2, and MMSE-2 were used in the diagnostic and therapeutic process was determined by the particularities of each case. In the first case, the sequence started with psychotherapy, followed by the administration of blue form MMSE-2, MMPI-2, and red form MMSE-2. In the second case, the cognitive screening with blue form MMSE-2 led to a personality assessment using MMPI-2, followed by red form MMSE-2; reapplication of the MMPI-2 due to the invalidation of the first profile, and finally, psychotherapy. The MMPI-2 protocols gathered useful information that directed the steps of therapeutic intervention: a detailed symptom picture of potentially self-destructive thoughts and behaviors otherwise undetected during the interview. The memory loss and poor concentration were confirmed by MMSE-2 cognitive screening. This combined approach, psychotherapy with psychological assessment, aligns with the trend of adaptation of the psychological services to the everyday life of contemporary man and paves the way for deepening and developing the field.

Keywords: assessment, cognitive behavioral psychotherapy, MMPI-2, MMSE-2, psychopathology

Procedia PDF Downloads 327
276 Artificial Intelligence in Bioscience: The Next Frontier

Authors: Parthiban Srinivasan

Abstract:

With recent advances in computational power and access to enough data in biosciences, artificial intelligence methods are increasingly being used in drug discovery research. These methods are essentially a series of advanced statistics based exercises that review the past to indicate the likely future. Our goal is to develop a model that accurately predicts biological activity and toxicity parameters for novel compounds. We have compiled a robust library of over 150,000 chemical compounds with different pharmacological properties from literature and public domain databases. The compounds are stored in simplified molecular-input line-entry system (SMILES), a commonly used text encoding for organic molecules. We utilize an automated process to generate an array of numerical descriptors (features) for each molecule. Redundant and irrelevant descriptors are eliminated iteratively. Our prediction engine is based on a portfolio of machine learning algorithms. We found Random Forest algorithm to be a better choice for this analysis. We captured non-linear relationship in the data and formed a prediction model with reasonable accuracy by averaging across a large number of randomized decision trees. Our next step is to apply deep neural network (DNN) algorithm to predict the biological activity and toxicity properties. We expect the DNN algorithm to give better results and improve the accuracy of the prediction. This presentation will review all these prominent machine learning and deep learning methods, our implementation protocols and discuss these techniques for their usefulness in biomedical and health informatics.

Keywords: deep learning, drug discovery, health informatics, machine learning, toxicity prediction

Procedia PDF Downloads 359
275 Analgesic Efficacy of IPACK Block in Primary Total Knee Arthroplasty (90 CASES)

Authors: Fedili Benamar, Beloulou Mohamed Lamine, Ouahes Hassane, Ghattas Samir

Abstract:

 Background and aims: Peripheral regional anesthesia has been integrated into most analgesia protocols for total knee arthroplasty which considered among the most painful surgeries with a huge potential for chronicization. The adductor canal block (ACB) has gained popularity. Similarly, the IPACK block has been described to provide analgesia of the posterior knee capsule. This study aimed to evaluate the analgesic efficacy of this block in patients undergoing primary PTG. Methods: 90 patients were randomized to receive either an IPACK, an anterior sciatic block, or a sham block (30 patients in each group + multimodal analgesia and a catheter in the KCA adductor canal). GROUP 1 KCA GROUP 2 KCA+BSA GROUP 3 KCA+IPACK The analgesic blocks were done under echo-guidance preoperatively respecting the safety rules, the dose administered was 20 cc of ropivacaine 0.25% was used. We were to assess posterior knee pain 6 hours after surgery. Other endpoints included quality of recovery after surgery, pain scores, opioid requirements (PCA morphine)(EPI info 7.2 analysis). Results: -groups were matched -A predominance of women (4F/1H). -average age: 68 +/-7 years -the average BMI =31.75 kg/m2 +/- 4. -70% of patients ASA2 ,20% ASA3. -The average duration of the intervention: 89 +/- 19 minutes. -Morphine consumption (PCA) significantly higher in group 1 (16mg) & group 2 (8mg) group 3 (4mg) - The groups were matched . -There was a correlation between the use of the ipack block and postoperative pain Conclusions :In a multimodal analgesic protocol, the addition of IPACK block decreased pain scores and morphine consumption ,

Keywords: regional anesthesia, analgesia, total knee arthroplasty, the adductor canal block (acb), the ipack block, pain

Procedia PDF Downloads 74
274 Analysis of Expert Possibilities While Identifying Human Teeth

Authors: Saule Mussabekova

Abstract:

Forensic investigation of human teeth plays an important role in detection of crime, particularly in cases of personal identification of dead bodies changed by putrefactive processes or skeletonized bodies as well as when finding bodies of unknown persons. 152 teeth have been investigated; 85 of them belonged to men and 67 belonged to women taken from alive people of different age. Teeth have been investigated after extraction. Two types of teeth have been investigated: teeth without integrity violation of dental crown and teeth with different degrees of its violation. Additionally, 517 teeth have been investigated that were collected from dead bodies, 252 of which belonged to women and 265 belonged to men, whatever the cause of death with death limitation from 1 month to 20 years. Isohemagglutinating serums and Coliclons of different series have been used for the research of tooth-group specificity by serological methods according to the AB0 system. Standard protocols of different techniques have been used for DNA purification from teeth (by reagent Chelex 100 produced by Bio-Rad using reagent kit 'DNA IQTM System' produced by Promega company (USA) and using columns 'QIAamp DNA Investigator Kit' produced by Qiagen company). Results of comparative forensic investigation of human teeth using serological and molecular genetic methods have shown that use of serological methods for forensic identification is sensible only in cases of preselection prior to the next molecular genetic investigation as well as in cases of impossibility of corresponding genetic investigation for different objective reasons. A number of advantages of methods of molecular genetics in the dental investigation have been marked, particularly in putrefactive changes, in personal identification. Key moments of modern condition of personal identification have been reflected according to dental state. Prospective directions of advance preparation of material have been emphasized for identification of teeth in forensic practice.

Keywords: dental state, forensic identification, molecular genetic analysis, teeth

Procedia PDF Downloads 141
273 Series Network-Structured Inverse Models of Data Envelopment Analysis: Pitfalls and Solutions

Authors: Zohreh Moghaddas, Morteza Yazdani, Farhad Hosseinzadeh

Abstract:

Nowadays, data envelopment analysis (DEA) models featuring network structures have gained widespread usage for evaluating the performance of production systems and activities (Decision-Making Units (DMUs)) across diverse fields. By examining the relationships between the internal stages of the network, these models offer valuable insights to managers and decision-makers regarding the performance of each stage and its impact on the overall network. To further empower system decision-makers, the inverse data envelopment analysis (IDEA) model has been introduced. This model allows the estimation of crucial information for estimating parameters while keeping the efficiency score unchanged or improved, enabling analysis of the sensitivity of system inputs or outputs according to managers' preferences. This empowers managers to apply their preferences and policies on resources, such as inputs and outputs, and analyze various aspects like production, resource allocation processes, and resource efficiency enhancement within the system. The results obtained can be instrumental in making informed decisions in the future. The top result of this study is an analysis of infeasibility and incorrect estimation that may arise in the theory and application of the inverse model of data envelopment analysis with network structures. By addressing these pitfalls, novel protocols are proposed to circumvent these shortcomings effectively. Subsequently, several theoretical and applied problems are examined and resolved through insightful case studies.

Keywords: inverse models of data envelopment analysis, series network, estimation of inputs and outputs, efficiency, resource allocation, sensitivity analysis, infeasibility

Procedia PDF Downloads 53
272 One Step Further: Pull-Process-Push Data Processing

Authors: Romeo Botes, Imelda Smit

Abstract:

In today’s modern age of technology vast amounts of data needs to be processed in real-time to keep users satisfied. This data comes from various sources and in many formats, including electronic and mobile devices such as GPRS modems and GPS devices. They make use of different protocols including TCP, UDP, and HTTP/s for data communication to web servers and eventually to users. The data obtained from these devices may provide valuable information to users, but are mostly in an unreadable format which needs to be processed to provide information and business intelligence. This data is not always current, it is mostly historical data. The data is not subject to implementation of consistency and redundancy measures as most other data usually is. Most important to the users is that the data are to be pre-processed in a readable format when it is entered into the database. To accomplish this, programmers build processing programs and scripts to decode and process the information stored in databases. Programmers make use of various techniques in such programs to accomplish this, but sometimes neglect the effect some of these techniques may have on database performance. One of the techniques generally used,is to pull data from the database server, process it and push it back to the database server in one single step. Since the processing of the data usually takes some time, it keeps the database busy and locked for the period of time that the processing takes place. Because of this, it decreases the overall performance of the database server and therefore the system’s performance. This paper follows on a paper discussing the performance increase that may be achieved by utilizing array lists along with a pull-process-push data processing technique split in three steps. The purpose of this paper is to expand the number of clients when comparing the two techniques to establish the impact it may have on performance of the CPU storage and processing time.

Keywords: performance measures, algorithm techniques, data processing, push data, process data, array list

Procedia PDF Downloads 244
271 Comparative Assessment of hCG with Estrogen in Increasing Pregnancy Rate in Mixed Parity Buffaloes

Authors: Sanan Raza, Tariq Abbas, Ahmad Yar Qamar, Muhammad Younus, Hamayun Khan, Mujahid Zafar

Abstract:

Water Buffaloes contribute significantly in Asian agriculture. The objective of this study was to evaluate the efficacy of two synchronization protocols in enhancing pregnancy rate in 105 mixed parity buffaloes particularly in summer season. Buffaloes are seasonal breeders showing more fertility from October to January in subtropical environment of Pakistan. In current study 105 lactating buffaloes of mixed parity were used having normal estrous cycle, age ranging 5-9 years, weighing between 400-650 kg, BCS 4 ± 0.5 (1-5) and lactation varied from first to 5th. Experimental animals were divided into three groups based on corpus leteummorphometry. Morphometry of C.L was done using rectal population and ultrasonography. All animals were injected 25mg of PGi.m. (Cloprostenol). In Group-1 (n=35) hCG was administered at follicular size of 10mm having scanned after detection of heat. Similarly Group-2 (n=35) received 25 mg EB i.m (Estradiol Benzoate) after confirmation of follicular size of 10mm with ultrasound. Likewise, buffaloes of Group-3 (n=35) were administered normal saline respectively using as control. All buffaloes of three groups were inseminated after 12h of hCG, EB, and normal saline administration respectively. Pregnancy was assessed by ultrasound at 18th and 45th day post insemination. Pregnancy rates at 18th day were 38.2%, 34.5%, and 27.3% for G1, G2, and G3 respectively indicating that hCG and EB administered groups have no difference in results except control group having lower conception rate than both groups respectively. Similarly on 42nd day, these were 40.4%, 32.7% for G1 and G2 which are significantly higher than G3= 26.6 (control Group). Also, hCG and EB treated buffaloes have more probability of pregnancy than control group. Based on the findings of current study, it seems reasonable that the use of hCG and EB has been associated with improving pregnancy rates in non-breeding season of buffaloes.

Keywords: buffalo, hCG, EB, pregnancy rate, follicle, insemination

Procedia PDF Downloads 798
270 Out of Hospital Cardiac Arrest in Kuala Lumpur: A Mixed Method Study on Incidence, Adherence to Protocol, and Issues

Authors: Mohd Said Nurumal, Sarah Sheikh Abdul Karim

Abstract:

Information regarding out of hospital cardiac arrest incidence include outcome in Malaysia is limited and fragmented. This study aims to identify incidence and adherence to protocol of out of hospital cardiac arrest and also to explore the issues faced by the pre-hospital personnel in regards managing cardiac arrest victim in Kuala Lumpur, Malaysia. A mixed method approach combining the qualitative and quantitative study design was used. The 285 pre-hospital care data sheet of out of hospital cardiac arrest during the year of 2011 were examined by using checklists for identify the incidence and adherence to protocol. Nine semi-structured interviews and two focus group discussions were performed. For the incidence based on the overall out of hospital cardiac arrest cases that occurred in 2011 (n=285), the survival rates were 16.8%. For adherence to protocol, only 89 (41.8%) of the cases adhered to the given protocol and 124 did not adhere to such protocol. The qualitative information provided insight about the issues related to out of hospital cardiac arrest in every aspect. All the relevant qualitative data were merged into few categories relating issues that could affect the management of out of hospital cardiac arrest performed by pre-hospital care team. One of the essential elements in the out of hospital cardiac arrest handling by pre-hospital care is to ensure increase of survival rates and excellent outcomes by adhering to given protocols based on international standard benchmarks. Measures are needed to strengthen the quick activation of the pre-hospital care service, prompt bystander cardiopulmonary resuscitation, early defibrillation and timely advanced cardiac life support and also to tackle all the issues highlighted in qualitative results.

Keywords: pre-hospital care, out of hospital cardiac arrest, incidence, protocol, mixed method research

Procedia PDF Downloads 414