Search results for: sentinel node biopsy (SLNB)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 744

Search results for: sentinel node biopsy (SLNB)

354 Histochemical Localization of Hepatitis B Surface Antigen in Hepatocellular Carcinoma: An Evaluation of Two Staining Techniques in a Tertiary Hospital in Calabar, Nigeria

Authors: Imeobong Joseph Inyang, Aniekan-Augusta Okon Eyo, Abel William Essien

Abstract:

Hepatitis B virus (HBV) is one of the known human carcinogens. The presence of HBsAg in liver tissues indicates active viral replication. More than 85% of Hepatocellular Carcinoma (HCC) cases occur in countries with increased rates of chronic HBV infection. An evaluation study to determine the relationship between positivity for HBsAg and development of HCC and its distribution between age and gender of subjects was done. Shikata Orcein and Haematoxylin and Eosin (H&E) staining techniques were performed on liver sections. A total of 50 liver tissue specimens comprising 38 biopsy and 12 post-mortem specimens were processed. Thirty-five of the 50 specimens were positive for HBsAg with Orcein stain whereas only 16 were positive with H&E stain, and these were also positive with Orcein stain, giving an HBsAg prevalence of 70.0% (35/50). The prevalence of HCC in the study was 56.0% (28/50), of which 21 (75.0%) cases were positive for HBsAg, 18 (64.3%) were males while 10 (35.7%) were females distributed within the age range of 20-70 years. The highest number of HBsAg positive HCC cases, 7/21 (33.3%) occurred in the age group 40-49 years. There was no relationship in the pattern of distribution of HCC between age and gender using the Pearson correlation coefficient (r = 0.0474; P < 0.05). HBV infection predisposed to HCC. Orcein technique was more specific and is therefore recommended for screening of liver tissues where facilities for immunohistochemistry are inaccessible.

Keywords: Hepatitis B. surface antigen, hepatocellular carcinoma, orcein, pathology

Procedia PDF Downloads 313
353 A Multicopy Strategy for Improved Security Wireless Sensor Network

Authors: Tuğçe Yücel

Abstract:

A Wireless Sensor Network(WSN) is a collection of sensor nodes which are deployed randomly in an area for surveillance. Efficient utilization of limited battery energy of sensors for increased network lifetime as well as data security are major design objectives for WSN. Moreover secure transmission of data sensed to a base station for further processing. Producing multiple copies of data packets and sending them on different paths is one of the strategies for this purpose, which leads to redundant energy consumption and hence reduced network lifetime. In this work we develop a restricted multi-copy multipath strategy where data move through ‘frequently’ or ‘heavily’ used sensors is copied by the sensor incident to such central nodes and sent on node-disjoint paths. We develop a mixed integer programing(MIP) model and heuristic approach present some preleminary test results.

Keywords: MIP, sensor, telecommunications, WSN

Procedia PDF Downloads 510
352 Demonstration of Powering up Low Power Wireless Sensor Network by RF Energy Harvesting System

Authors: Lim Teck Beng, Thiha Kyaw, Poh Boon Kiat, Lee Ngai Meng

Abstract:

This work presents discussion on the possibility of merging two emerging technologies in microwave; wireless power transfer (WPT) and RF energy harvesting. The current state of art of the two technologies is discussed and the strength and weakness of the two technologies is also presented. The equivalent circuit of wireless power transfer is modeled and explained as how the range and efficiency can be further increased by controlling certain parameters in the receiver. The different techniques of harvesting the RF energy from the ambient are also extensive study. Last but not least, we demonstrate that a low power wireless sensor network (WSN) can be power up by RF energy harvesting. The WSN is designed to transmit every 3 minutes of information containing the temperature of the environment and also the voltage of the node. One thing worth mention is both the sensors that are used for measurement are also powering up by the RF energy harvesting system.

Keywords: energy harvesting, wireless power transfer, wireless sensor network and magnetic coupled resonator

Procedia PDF Downloads 519
351 An Introductory Study on Optimization Algorithm for Movable Sensor Network-Based Odor Source Localization

Authors: Yossiri Ariyakul, Piyakiat Insom, Poonyawat Sangiamkulthavorn, Takamichi Nakamoto

Abstract:

In this paper, the method of optimization algorithm for sensor network comprised of movable sensor nodes which can be used for odor source localization was proposed. A sensor node is composed of an odor sensor, an anemometer, and a wireless communication module. The odor intensity measured from the sensor nodes are sent to the processor to perform the localization based on optimization algorithm by which the odor source localization map is obtained as a result. The map can represent the exact position of the odor source or show the direction toward it remotely. The proposed method was experimentally validated by creating the odor source localization map using three, four, and five sensor nodes in which the accuracy to predict the position of the odor source can be observed.

Keywords: odor sensor, odor source localization, optimization, sensor network

Procedia PDF Downloads 299
350 The Effect of Size and Tumor Depth on Histological Clearance Margins of Basal Cell Carcinomas

Authors: Martin Van, Mohammed Javed, Sarah Hemington-Gorse

Abstract:

Aim: Our aim was to determine the effect of size and tumor depth of basal cell carcinomas (BCCs) on surgical margin clearance. Methods: A retrospective study was conducted at the Welsh Centre for Burns and Plastic Surgery (WCBPS), Morriston Hospital between 1 Jan 2016 – 31 July 2016. Only patients with confirmed BCC on histopathological analysis were included. Patient data including anatomical region treated, lesion size, histopathological clearance margins and histological sub-types were recorded. An independent T-test was performed determine statistical significance. Results: A total of 228 BCCs were excised in 160 patients. Eleven lesions (4.8%) were incompletely excised. The nose area had the highest rate of incomplete excision. The mean diameter of incompletely excised lesions was 11.4mm vs 11.5mm in completely excised lesions (p=0.959) and the mean histological depth of incompletely excised lesions was 4.1mm vs. 2.5mm for completely excised BCCs (p < 0.05). Conclusions: BCC tumor depth of > 4.1 mm was associated with high rate of incomplete margin clearance. Hence, in prospective patients, a BCC tumor depth (>4 mm) on tissue biopsy should alert the surgeon of potentially higher risk of incomplete excision of lesion.

Keywords: basal cell carcinoma, excision margins, plastic surgery, treatment

Procedia PDF Downloads 238
349 The Primitive Code-Level Design Patterns for Distributed Programming

Authors: Bing Li

Abstract:

The primitive code-level design patterns (PDP) are the rudimentary programming elements to develop any distributed systems in the generic distributed programming environment, GreatFree. The PDP works with the primitive distributed application programming interfaces (PDA), the distributed modeling, and the distributed concurrency for scaling-up. They not only hide developers from underlying technical details but also support sufficient adaptability to a variety of distributed computing environments. Programming with them, the simplest distributed system, the lightweight messaging two-node client/server (TNCS) system, is constructed rapidly with straightforward and repeatable behaviors, copy-paste-replace (CPR). As any distributed systems are made up of the simplest ones, those PDAs, as well as the PDP, are generic for distributed programming.

Keywords: primitive APIs, primitive code-level design patterns, generic distributed programming, distributed systems, highly patterned development environment, messaging

Procedia PDF Downloads 191
348 Comparative Diagnostic Performance of Diffusion-Weighted Imaging Combined With Microcalcifications on Mammography for Discriminating Malignant From Benign Bi-rads 4 Lesions With the Kaiser Score

Authors: Wangxu Xia

Abstract:

BACKGROUND BI-RADS 4 lesions raise the possibility of malignancy that warrant further clinical and radiologic work-up. This study aimed to evaluate the predictive performance of diffusion-weighted imaging(DWI) and microcalcifications on mammography for predicting malignancy of BI-RADS 4 lesions. In addition, the predictive performance of DWI combined with microcalcifications was alsocompared with the Kaiser score. METHODS During January 2021 and June 2023, 144 patients with 178 BI-RADS 4 lesions underwent conventional MRI, DWI, and mammography were included. The lesions were dichotomized intobenign or malignant according to the pathological results from core needle biopsy or surgical mastectomy. DWI was performed with a b value of 0 and 800s/mm2 and analyzed using theapparent diffusion coefficient, and a Kaiser score > 4 was considered to suggest malignancy. Thediagnostic performances for various diagnostic tests were evaluated with the receiver-operatingcharacteristic (ROC) curve. RESULTS The area under the curve (AUC) for DWI was significantly higher than that of the of mammography (0.86 vs 0.71, P<0.001), but was comparable with that of the Kaiser score (0.86 vs 0.84, P=0.58). However, the AUC for DWI combined with mammography was significantly highthan that of the Kaiser score (0.93 vs 0.84, P=0.007). The sensitivity for discriminating malignant from benign BI-RADS 4 lesions was highest at 89% for Kaiser score, but the highest specificity of 83% can be achieved with DWI combined with mammography. CONCLUSION DWI combined with microcalcifications on mammography could discriminate malignant BI-RADS4 lesions from benign ones with a high AUC and specificity. However, Kaiser score had a better sensitivity for discrimination.

Keywords: MRI, DWI, mammography, breast disease

Procedia PDF Downloads 59
347 Static and Dynamic Analysis on a Buddhism Goddess Guanyin in Shuangyashan

Authors: Gong Kangming, Zhao Caiqi

Abstract:

High-rise special-shaped structure, such as main frame structure of the statues, is one of the structure forms in irregular structure widely used. Due to the complex shape of the statue structure, with a large aspect ratio, its wind load value and the overall mechanical properties are very different from the high-rise buildings with the general rules. The paper taking a certain 48 meters high main frame structure of the statue located in Shuangyashan City, Heilongjiang Province, static and dynamic properties are analyzed by the finite element software. Through static and dynamic analysis, it got a number of useful conclusions that have a certain reference value for the analysis and design of the future similar structure.

Keywords: a Buddhism goddess Guanyin body, wind load, dynamic analysis, bolster, node design

Procedia PDF Downloads 466
346 Spatial Heterogeneity of Urban Land Use in the Yangtze River Economic Belt Based on DMSP/OLS Data

Authors: Liang Zhou, Qinke Sun

Abstract:

Taking the Yangtze River Economic Belt as an example, using long-term nighttime lighting data from DMSP/OLS from 1992 to 2012, support vector machine classification (SVM) was used to quantitatively extract urban built-up areas of economic belts, and spatial analysis of expansion intensity index, standard deviation ellipse, etc. was introduced. The model conducts detailed and in-depth discussions on the strength, direction, and type of the expansion of the middle and lower reaches of the economic belt and the key node cities. The results show that: (1) From 1992 to 2012, the built-up areas of the major cities in the Yangtze River Valley showed a rapid expansion trend. The built-up area expanded by 60,392 km², and the average annual expansion rate was 31%, that is, from 9615 km² in 1992 to 70007 km² in 2012. The spatial gradient analysis of the watershed shows that the expansion of urban built-up areas in the middle and lower reaches of the river basin takes Shanghai as the leading force, and the 'bottom-up' model shows an expanding pattern of 'upstream-downstream-middle-range' declines. The average annual rate of expansion is 36% and 35%, respectively. 17% of which the midstream expansion rate is about 50% of the upstream and downstream. (2) The analysis of expansion intensity shows that the urban expansion intensity in the Yangtze River Basin has generally shown an upward trend, the downstream region has continued to rise, and the upper and middle reaches have experienced different amplitude fluctuations. To further analyze the strength of urban expansion at key nodes, Chengdu, Chongqing, and Wuhan in the upper and middle reaches maintain a high degree of consistency with the intensity of regional expansion. Node cities with Shanghai as the core downstream continue to maintain a high level of expansion. (3) The standard deviation ellipse analysis shows that the overall center of gravity of the Yangtze River basin city is located in Anqing City, Anhui Province, and it showed a phenomenon of reciprocating movement from 1992 to 2012. The nighttime standard deviation ellipse distribution range increased from 61.96 km² to 76.52 km². The growth of the major axis of the ellipse was significantly larger than that of the minor axis. It had obvious east-west axiality, in which the nighttime lights in the downstream area occupied in the entire luminosity scale urban system leading position.

Keywords: urban space, support vector machine, spatial characteristics, night lights, Yangtze River Economic Belt

Procedia PDF Downloads 114
345 Evaluating Accessibility to Bangkok Mass Transit System: Case Study of Saphan Taksin Bangkok Mass Transit System Station

Authors: Rungpansa Noichan, Bart Julian Dewancker

Abstract:

Thailand facing the transportation issue because of the rapid economic development. The big issue is the traffic jam, especially in Bangkok. However, recently years Bangkok has operated urban mass transit system for solved transportation problem. The Bangkok Mass Transit System (BTS) skytrain is being operated by the BTS Company Limited under the Bangkok Metropolitan Administration. The passenger satisfaction is a major cause for concern due to the commercial nature. The focus of this paper is to evaluate the passenger satisfaction at the mass transit node by questionnaires survey. The survey was to find out the passenger attitudes. The result shows several important factors that influence the passenger choice of using the BTS as a public transportation mode and the passenger’s opinion.

Keywords: urban transportation, user satisfaction, accessibility, Bangkok mass transit

Procedia PDF Downloads 285
344 System Survivability in Networks in the Context of Defense/Attack Strategies: The Large Scale

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez, Mehdi Mrad

Abstract:

We investigate the large scale of networks in the context of network survivability under attack. We use appropriate techniques to evaluate and the attacker-based- and the defender-based-network survivability. The attacker is unaware of the operated links by the defender. Each attacked link has some pre-specified probability to be disconnected. The defender choice is so that to maximize the chance of successfully sending the flow to the destination node. The attacker however will select the cut-set with the highest chance to be disabled in order to partition the network. Moreover, we extend the problem to the case of selecting the best p paths to operate by the defender and the best k cut-sets to target by the attacker, for arbitrary integers p,k > 1. We investigate some variations of the problem and suggest polynomial-time solutions.

Keywords: defense/attack strategies, large scale, networks, partitioning a network

Procedia PDF Downloads 283
343 Sea Cucumber (Stichopus chloronotus) to Expedite Healing of Minor Wounds

Authors: Isa Naina Mohamed, Mazliadiyana Mazlan, Ahmad Nazrun Shuid

Abstract:

Stichopus chloronotus (Black Knobby or green fish) is a sea cucumber species commonly found along Malaysia’s coastline. In Malaysia, it is believed that sea cucumber can expedite healing of wounds, provide extra energy and used as an ointment to relieve pain. The aim of this study is to determine the best concentration of Stichopus chlronotus extract to promote wound healing. 12 male Sprague-Dawley rats with wounds created using 6mm disposable punch biopsy were divided into 6 treatment groups. The normal control group (untreated), positive control group (flavin treated only), negative control group (emulsifying ointment only), and group 0.1, group 0.5, group 1 were each treated with 0.1%, 0.5% and 1% of Stichopus chlronotus water extract mixed in emulsifying ointment, respectively. Treatments were administered topically for 10 days. Changes in wound area were measured using caliper and photographs were taken on day 2, 4, 6, 8, and 10 after index wound. Results showed that wound reduction of group 0.5 on day 4, 6, and 8 was significantly higher compared to normal control group and positive control group. Group 0.5 also had higher wound reduction from day 6 until day 10 compared to all other groups. In conclusion, Sea Cucumber (Stichopus chloronotus) extract demonstrated the best minor wound healing properties at concentration 0.5%. The potential of Stichopus chlronotus extract ointment for wound healing shall be investigated further.

Keywords: minor wound healing, expedite wound healing, sea cucumber, Stichopus chloronotus

Procedia PDF Downloads 394
342 Simplified Modeling of Post-Soil Interaction for Roadside Safety Barriers

Authors: Charly Julien Nyobe, Eric Jacquelin, Denis Brizard, Alexy Mercier

Abstract:

The performance of road side safety barriers depends largely on the dynamic interactions between post and soil. These interactions play a key role in the response of barriers to crash testing. In the literature, soil-post interaction is modeled in crash test simulations using three approaches. Many researchers have initially used the finite element approach, in which the post is embedded in a continuum soil modelled by solid finite elements. This method represents a more comprehensive and detailed approach, employing a mesh-based continuum to model the soil’s behavior and its interaction with the post. Although this method takes all soil properties into account, it is nevertheless very costly in terms of simulation time. In the second approach, all the points of the post located at a predefined depth are fixed. Although this approach reduces CPU computing time, it overestimates soil-post stiffness. The third approach involves modeling the post as a beam supported by a set of nonlinear springs in the horizontal directions. For support in the vertical direction, the posts were constrained at a node at ground level. This approach is less costly, but the literature does not provide a simple procedure to determine the constitutive law of the springs The aim of this study is to propose a simple and low-cost procedure to obtain the constitutive law of nonlinear springs that model the soil-post interaction. To achieve this objective, we will first present a procedure to obtain the constitutive law of nonlinear springs thanks to the simulation of a soil compression test. The test consists in compressing the soil contained in the tank by a rigid solid, up to a vertical displacement of 200 mm. The resultant force exerted by the ground on the rigid solid and its vertical displacement are extracted and, a force-displacement curve was determined. The proposed procedure for replacing the soil with springs must be tested against a reference model. The reference model consists of a wooden post embedded into the ground and impacted with an impactor. Two simplified models with springs are studied. In the first model, called Kh-Kv model, the springs are attached to the post in the horizontal and vertical directions. The second Kh model is the one described in the literature. The two simplified models are compared with the reference model according to several criteria: the displacement of a node located at the top of the post in vertical and horizontal directions; displacement of the post's center of rotation and impactor velocity. The results given by both simplified models are very close to the reference model results. It is noticeable that the Kh-Kv model is slightly better than the Kh model. Further, the former model is more interesting than the latter as it involves less arbitrary conditions. The simplified models also reduce the simulation time by a factor 4. The Kh-Kv model can therefore be used as a reliable tool to represent the soil-post interaction in a future research and development of road safety barriers.

Keywords: crash tests, nonlinear springs, soil-post interaction modeling, constitutive law

Procedia PDF Downloads 30
341 The Great Mimicker: A Case of Disseminated Tuberculosis

Authors: W. Ling, Mohamed Saufi Bin Awang

Abstract:

Introduction: Mycobacterium tuberculosis post a major health problem worldwide. Central nervous system (CNS) infection by mycobacterium tuberculosis is one of the most devastating complications of tuberculosis. Although with advancement in medical fields, we are yet to understand the pathophysiology of how mycobacterium tuberculosis was able to cross the blood-brain barrier (BBB) and infect the CNS. CNS TB may present with nonspecific clinical symptoms which can mimic other diseases/conditions; this is what makes the diagnosis relatively difficult and challenging. Public health has to be informed and educated about the spread of TB, and early identification of TB is important as it is a curable disease. Case Report: A young 21-year-old Malay gentleman was initially presented to us with symptoms of ear discharge, tinnitus, and right-sided headache for the past one year. Further history reveals that the symptoms have been mismanaged and neglected over the period of 1 year. Initial investigation reveals features of inflammation of the ear. Further imaging showed the feature of chronic inflammation of the otitis media and atypical right cerebral abscess, which has the same characteristic features and consistency. He further underwent a biopsy, and results reveal positive Mycobacterium tuberculosis of the otitis media. With the results and the available imaging, we were certain that this is likely a case of disseminated tuberculosis causing CNS TB. Conclusion: We aim to highlight the challenge and difficult face in our health care system and public health in early identification and treatment.

Keywords: central nervous system tuberculosis, intracranial tuberculosis, tuberculous encephalopathy, tuberculous meningitis

Procedia PDF Downloads 189
340 DeepNIC a Method to Transform Each Tabular Variable into an Independant Image Analyzable by Basic CNNs

Authors: Nguyen J. M., Lucas G., Ruan S., Digonnet H., Antonioli D.

Abstract:

Introduction: Deep Learning (DL) is a very powerful tool for analyzing image data. But for tabular data, it cannot compete with machine learning methods like XGBoost. The research question becomes: can tabular data be transformed into images that can be analyzed by simple CNNs (Convolutional Neuron Networks)? Will DL be the absolute tool for data classification? All current solutions consist in repositioning the variables in a 2x2 matrix using their correlation proximity. In doing so, it obtains an image whose pixels are the variables. We implement a technology, DeepNIC, that offers the possibility of obtaining an image for each variable, which can be analyzed by simple CNNs. Material and method: The 'ROP' (Regression OPtimized) model is a binary and atypical decision tree whose nodes are managed by a new artificial neuron, the Neurop. By positioning an artificial neuron in each node of the decision trees, it is possible to make an adjustment on a theoretically infinite number of variables at each node. From this new decision tree whose nodes are artificial neurons, we created the concept of a 'Random Forest of Perfect Trees' (RFPT), which disobeys Breiman's concepts by assembling very large numbers of small trees with no classification errors. From the results of the RFPT, we developed a family of 10 statistical information criteria, Nguyen Information Criterion (NICs), which evaluates in 3 dimensions the predictive quality of a variable: Performance, Complexity and Multiplicity of solution. A NIC is a probability that can be transformed into a grey level. The value of a NIC depends essentially on 2 super parameters used in Neurops. By varying these 2 super parameters, we obtain a 2x2 matrix of probabilities for each NIC. We can combine these 10 NICs with the functions AND, OR, and XOR. The total number of combinations is greater than 100,000. In total, we obtain for each variable an image of at least 1166x1167 pixels. The intensity of the pixels is proportional to the probability of the associated NIC. The color depends on the associated NIC. This image actually contains considerable information about the ability of the variable to make the prediction of Y, depending on the presence or absence of other variables. A basic CNNs model was trained for supervised classification. Results: The first results are impressive. Using the GSE22513 public data (Omic data set of markers of Taxane Sensitivity in Breast Cancer), DEEPNic outperformed other statistical methods, including XGBoost. We still need to generalize the comparison on several databases. Conclusion: The ability to transform any tabular variable into an image offers the possibility of merging image and tabular information in the same format. This opens up great perspectives in the analysis of metadata.

Keywords: tabular data, CNNs, NICs, DeepNICs, random forest of perfect trees, classification

Procedia PDF Downloads 125
339 Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures

Authors: L. Sellami, D. Idoughi, P. F. Tiako

Abstract:

Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing.

Keywords: cloud computing, intrusion detection system, privacy, trust

Procedia PDF Downloads 323
338 Morphological and Molecular Abnormalities of the Skeletal Muscle Tissue from Pediatric Patient Affected by a Rare Genetic Chaperonopathy Associated with Motor Neuropathy

Authors: Leila Noori, Rosario Barone, Francesca Rappa, Antonella Marino Gammazza, Alessandra Maria Vitale, Giuseppe Donato Mangano, Giusy Sentiero, Filippo Macaluso, Kathryn H. Myburgh, Francesco Cappello, Federica Scalia

Abstract:

The neuromuscular system controls, directs, and allows movement of the body through the action of neural circuits, which include motor neurons, sensory neurons, and skeletal muscle fibers. Protein homeostasis of the involved cytotypes appears crucial to maintain the correct and prolonged functions of the neuromuscular system, and both neuronal cells and skeletal muscle fibers express significant quantities of protein chaperones, the molecular machinery responsible to maintain the protein turnover. Genetic mutations or defective post-translational modifications of molecular chaperones (i.e., genetic or acquired chaperonopathies) may lead to neuromuscular disorders called as neurochaperonopathies. The limited knowledge of the effects of the defective chaperones on skeletal muscle fibers and neurons impedes the progression of therapeutic approaches. A distinct genetic variation of CCT5 gene encoding for the subunit 5 of the chaperonin CCT (Chaperonin Containing TCP1; also known as TRiC, TCP1 Ring Complex) was recently described associated with severe distal motor neuropathy by our team. In this study, we investigated the histopathological abnormalities of the skeletal muscle biopsy of the pediatric patient affected by the mutation Leu224Val in the CCT5 subunit. We provide molecular and structural features of the diseased skeletal muscle tissue that we believe may be useful to identify undiagnosed cases of this rare genetic disorder. We investigated the histological abnormalities of the affected tissue via hematoxylin and eosin staining. Then we used immunofluorescence and qPCR techniques to explore the expression and distribution of CCT5 in diseased and healthy skeletal muscle tissue. Immunofluorescence and immunohistochemistry assays were performed to study the sarcomeric and structural proteins of skeletal muscle, including actin, myosin, tubulin, troponin-T, telethonin, and titin. We performed Western blot to examine the protein expression of CCT5 and some heat shock proteins, Hsp90, Hsp60, Hsp27, and α-B crystallin, along with the main client proteins of the CCT5, actin, and tubulin. Our findings revealed muscular atrophy, abnormal morphology, and different sizes of muscle fibers in affected tissue. The swollen nuclei and wide interfiber spaces were seen. Expression of CCT5 had been decreased and showed a different distribution pattern in the affected tissue. Altered expression, distribution, and bandage pattern were detected by confocal microscopy for the interested muscular proteins in tissue from the patient compared to the healthy control. Protein levels of the studied Hsps normally located at the Z-disk were reduced. Western blot results showed increased levels of the actin and tubulin proteins in the diseased skeletal muscle biopsy compared to healthy tissue. Chaperones must be expressed at high levels in skeletal muscle to counteract various stressors such as mechanical, oxidative, and thermal crises; therefore, it seems relevant that defects of molecular chaperones may result in damaged skeletal muscle fibers. So far, several chaperones or cochaperones involved in neuromuscular disorders have been defined. Our study shows that alteration of the CCT5 subunit is associated with the damaged structure of skeletal muscle fibers and alterations of chaperone system components and paves the way to explore possible alternative substrates of chaperonin CCT. However, further studies are underway to investigate the CCT mechanisms of action to design applicable therapeutic strategies.

Keywords: molecular chaperones, neurochaperonopathy, neuromuscular system, protein homeostasis

Procedia PDF Downloads 71
337 Simulation Approach for a Comparison of Linked Cluster Algorithm and Clusterhead Size Algorithm in Ad Hoc Networks

Authors: Ameen Jameel Alawneh

Abstract:

A Mobile ad-hoc network (MANET) is a collection of wireless mobile hosts that dynamically form a temporary network without the aid of a system administrator. It has neither fixed infrastructure nor wireless ad hoc sessions. It inherently reaches several nodes with a single transmission, and each node functions as both a host and a router. The network maybe represented as a set of clusters each managed by clusterhead. The cluster size is not fixed and it depends on the movement of nodes. We proposed a clusterhead size algorithm (CHSize). This clustering algorithm can be used by several routing algorithms for ad hoc networks. An elected clusterhead is assigned for communication with all other clusters. Analysis and simulation of the algorithm has been implemented using GloMoSim networks simulator, MATLAB and MAPL11 proved that the proposed algorithm achieves the goals.

Keywords: simulation, MANET, Ad-hoc, cluster head size, linked cluster algorithm, loss and dropped packets

Procedia PDF Downloads 391
336 Follicular Thyroid Carcinoma in a Developing Country: A Retrospective Study of 10 Years

Authors: Abdul Aziz, Muhammad Qamar Masood, Saadia Sattar, Saira Fatima, Najmul Islam

Abstract:

Introduction: The most common endocrine tumor is thyroid cancer. Follicular Thyroid Carcinoma (FTC) accounts for 5%–10% of all thyroid cancers. Patients with FTC frequently present with more advanced stage diseases and a higher occurrence of distant metastases because of the propensity of vascular invasion. FTC is mainly treated with surgery, while radioactive iodine therapy is the main adjuvant therapy as per ATA guidelines. In many developing countries, surgical facilities and radioactive iodine are in short supply; therefore, understanding follicular thyroid cancer trends may help developing countries plan and use resources more effectively. Methodology: It was a retrospective observational study of FTC patients of age 18 years and above conducted at Aga Khan University Hospital, Karachi, from 1st January 2010 to 31st December 2019. Results: There were 404 patients with thyroid carcinoma, out of which forty (10.1%) were FTC. 50% of the patients were in the 41-60 years age group, and the female to male ratio was 1.5: 1. Twenty-four patients (60%) presented with complain of neck swelling followed by metastasis (20%) and compressive symptoms (20%). The most common site of metastasis was bone (87.5%), followed by lung (12.5%). The pre-operative thyroglobulin level was done in six out of eight metastatic patients (75%) in which it was elevated. This emphasizes the importance of checking thyroglobulin level in unusual presentation (bone pain, fractures) of a patient having neck swelling also to help in establishing the primary source of tumor. There was no complete documentation of ultrasound features of the thyroid gland in all the patients, which is an important investigation done in the initial evaluation of thyroid nodule. On FNAC, 50% (20 patients) had Bethesda category III-IV nodules, while 10% ( 4 patients ) had Bethesda category II. In sixteen patients, FNAC was not done as they presented with compressive symptoms or metastasis. Fifty percent had a total thyroidectomy and 50% had subtotal followed by completion thyroidectomy, plus ten patients had lymph node dissection, out of which seven had histopathological lymph node involvement. On histopathology, twenty-three patients (57.5%) had minimally invasive, while seventeen (42.5%) had widely invasive follicular thyroid carcinoma. The capsular invasion was present in thirty-three patients (82.5%); one patient had no capsular invasion, but there was a vascular invasion. Six patients' histopathology had no record of capsular invasion. In contrast, the lymphovascular invasion was present in twenty-six patients (65%). In this study, 65 % of the patients had clinical stage 1 disease, while 25% had stage 2 and 10% had clinical stage 4. Seventeen patients (42.5%) had received RAI 30-100 mCi, while ten patients (25%) received more than 100 mCi. Conclusion: FTC demographic and clinicopathological presentation are the same in Pakistan as compared to other countries. Surgery followed by RAI is the mainstay of treatment. Thus understanding the trend of FTC and proper planning and utilization of the resources will help the developing countries in effectively treating the FTC.

Keywords: thyroid carcinoma, follicular thyroid carcinoma, clinicopathological features, developing countries

Procedia PDF Downloads 191
335 Power Flow and Modal Analysis of a Power System Including Unified Power Flow Controller

Authors: Djilani Kobibi Youcef Islam, Hadjeri Samir, Djehaf Mohamed Abdeldjalil

Abstract:

The Flexible AC Transmission System (FACTS) technology is a new advanced solution that increases the reliability and provides more flexibility, controllability, and stability of a power system. The Unified Power Flow Controller (UPFC), as the most versatile FACTS device for regulating power flow, is able to control respectively transmission line real power, reactive power, and node voltage. The main purpose of this paper is to analyze the effect of the UPFC on the load flow, the power losses, and the voltage stability using NEPLAN software modules, Newton-Raphson load flow is used for the power flow analysis and the modal analysis is used for the study of the voltage stability. The simulation was carried out on the IEEE 14-bus test system.

Keywords: FACTS, load flow, modal analysis, UPFC, voltage stability

Procedia PDF Downloads 516
334 The Data Quality Model for the IoT based Real-time Water Quality Monitoring Sensors

Authors: Rabbia Idrees, Ananda Maiti, Saurabh Garg, Muhammad Bilal Amin

Abstract:

IoT devices are the basic building blocks of IoT network that generate enormous volume of real-time and high-speed data to help organizations and companies to take intelligent decisions. To integrate this enormous data from multisource and transfer it to the appropriate client is the fundamental of IoT development. The handling of this huge quantity of devices along with the huge volume of data is very challenging. The IoT devices are battery-powered and resource-constrained and to provide energy efficient communication, these IoT devices go sleep or online/wakeup periodically and a-periodically depending on the traffic loads to reduce energy consumption. Sometime these devices get disconnected due to device battery depletion. If the node is not available in the network, then the IoT network provides incomplete, missing, and inaccurate data. Moreover, many IoT applications, like vehicle tracking and patient tracking require the IoT devices to be mobile. Due to this mobility, If the distance of the device from the sink node become greater than required, the connection is lost. Due to this disconnection other devices join the network for replacing the broken-down and left devices. This make IoT devices dynamic in nature which brings uncertainty and unreliability in the IoT network and hence produce bad quality of data. Due to this dynamic nature of IoT devices we do not know the actual reason of abnormal data. If data are of poor-quality decisions are likely to be unsound. It is highly important to process data and estimate data quality before bringing it to use in IoT applications. In the past many researchers tried to estimate data quality and provided several Machine Learning (ML), stochastic and statistical methods to perform analysis on stored data in the data processing layer, without focusing the challenges and issues arises from the dynamic nature of IoT devices and how it is impacting data quality. A comprehensive review on determining the impact of dynamic nature of IoT devices on data quality is done in this research and presented a data quality model that can deal with this challenge and produce good quality of data. This research presents the data quality model for the sensors monitoring water quality. DBSCAN clustering and weather sensors are used in this research to make data quality model for the sensors monitoring water quality. An extensive study has been done in this research on finding the relationship between the data of weather sensors and sensors monitoring water quality of the lakes and beaches. The detailed theoretical analysis has been presented in this research mentioning correlation between independent data streams of the two sets of sensors. With the help of the analysis and DBSCAN, a data quality model is prepared. This model encompasses five dimensions of data quality: outliers’ detection and removal, completeness, patterns of missing values and checks the accuracy of the data with the help of cluster’s position. At the end, the statistical analysis has been done on the clusters formed as the result of DBSCAN, and consistency is evaluated through Coefficient of Variation (CoV).

Keywords: clustering, data quality, DBSCAN, and Internet of things (IoT)

Procedia PDF Downloads 139
333 Predictive Value of Primary Tumor Depth for Cervical Lymphadenopathy in Squamous Cell Carcinoma of Buccal Mucosa

Authors: Zohra Salim

Abstract:

Objective: To access the relationship of primary tumor thickness with cervical lymphadenopathy in squamous cell carcinoma of buccal mucosa. Methodology: A cross-sectional observational study was carried out on 80 Patients with biopsy-proven oral squamous cell carcinoma of buccal mucosa at Dow University of Health Sciences. All the study participants were treated with wide local excision of the primary tumor with elective neck dissection. Patients with prior head and neck malignancy or those with prior radiotherapy or chemotherapy were excluded from the study. Data was entered and analyzed on SPSS 21. Chi-squared test with 95% C.I and 80% power of the test was used to evaluate the relationship of tumor depth with cervical lymph nodes. Results: 50 participants were male, and 30 patients were female. 30 patients were in the age range of 20-40 years, 36 patients in the range of 40-60 years, while 14 patients were beyond age 60 years. Tumor size ranged from 0.3cm to 5cm with a mean of 2.03cm. Tumor depth ranged from 0.2cm to 5cm. 20% of the participants reported with tumor depth greater than 2.5cm, while 80% of patients reported with tumor depth less than 2.5cm. Out of 80 patients, 27 reported with negative lymph nodes, while 53 patients reported with positive lymph nodes. Conclusion: Our study concludes that relationship exists between the depth of primary tumor and cervical lymphadenopathy in squamous cell carcinoma of buccal mucosa.

Keywords: squamous cell carcinoma, tumor depth, cervical lymphadenopathy, buccal mucosa

Procedia PDF Downloads 237
332 Unsupervised Learning with Self-Organizing Maps for Named Entity Recognition in the CONLL2003 Dataset

Authors: Assel Jaxylykova, Alexnder Pak

Abstract:

This study utilized a Self-Organizing Map (SOM) for unsupervised learning on the CONLL-2003 dataset for Named Entity Recognition (NER). The process involved encoding words into 300-dimensional vectors using FastText. These vectors were input into a SOM grid, where training adjusted node weights to minimize distances. The SOM provided a topological representation for identifying and clustering named entities, demonstrating its efficacy without labeled examples. Results showed an F1-measure of 0.86, highlighting SOM's viability. Although some methods achieve higher F1 measures, SOM eliminates the need for labeled data, offering a scalable and efficient alternative. The SOM's ability to uncover hidden patterns provides insights that could enhance existing supervised methods. Further investigation into potential limitations and optimization strategies is suggested to maximize benefits.

Keywords: named entity recognition, natural language processing, self-organizing map, CONLL-2003, semantics

Procedia PDF Downloads 45
331 Earth Observations and Hydrodynamic Modeling to Monitor and Simulate the Oil Pollution in the Gulf of Suez, Red Sea, Egypt

Authors: Islam Abou El-Magd, Elham Ali, Moahmed Zakzouk, Nesreen Khairy, Naglaa Zanaty

Abstract:

Maine environment and coastal zone are wealthy with natural resources that contribute to the local economy of Egypt. The Gulf of Suez and Red Sea area accommodates diverse human activities that contribute to the local economy, including oil exploration and production, touristic activities, export and import harbors, etc, however, it is always under the threat of pollution due to human interaction and activities. This research aimed at integrating in-situ measurements and remotely sensed data with hydrodynamic model to map and simulate the oil pollution. High-resolution satellite sensors including Sentinel 2 and Plantlab were functioned to trace the oil pollution. Spectral band ratio of band 4 (infrared) over band 3 (red) underpinned the mapping of the point source pollution from the oil industrial estates. This ratio is supporting the absorption windows detected in the hyperspectral profiles. ASD in-situ hyperspectral device was used to measure experimentally the oil pollution in the marine environment. The experiment used to measure water behavior in three cases a) clear water without oil, b) water covered with raw oil, and c) water after a while from throwing the raw oil. The spectral curve is clearly identified absorption windows for oil pollution, particularly at 600-700nm. MIKE 21 model was applied to simulate the dispersion of the oil contamination and create scenarios for crises management. The model requires precise data preparation of the bathymetry, tides, waves, atmospheric parameters, which partially obtained from online modeled data and other from historical in-situ stations. The simulation enabled to project the movement of the oil spill and could create a warning system for mitigation. Details of the research results will be described in the paper.

Keywords: oil pollution, remote sensing, modelling, Red Sea, Egypt

Procedia PDF Downloads 347
330 Surface Deformation Studies in South of Johor Using the Integration of InSAR and Resistivity Methods

Authors: Sirajo Abubakar, Ismail Ahmad Abir, Muhammad Sabiu Bala, Muhammad Mustapha Adejo, Aravind Shanmugaveloo

Abstract:

Over the years, land subsidence has been a serious threat mostly to urban areas. Land subsidence is the sudden sinking or gradual downward settling of the ground’s surface with little or no horizontal motion. In most areas, land subsidence is a slow process that covers a large area; therefore, it is sometimes left unnoticed. South of Johor is the area of interest for this project because it is going through rapid urbanization. The objective of this research is to evaluate and identify potential deformations in the south of Johor using integrated remote sensing and 2D resistivity methods. Synthetic aperture radar interferometry (InSAR) which is a remote sensing technique has the potential to map coherent displacements at centimeter to millimeter resolutions. Persistent scatterer interferometry (PSI) stacking technique was applied to Sentinel-1 data to detect the earth deformation in the study area. A dipole-dipole configuration resistivity profiling was conducted in three areas to determine the subsurface features in that area. This subsurface features interpreted were then correlated with the remote sensing technique to predict the possible causes of subsidence and uplifts in the south of Johor. Based on the results obtained, West Johor Bahru (0.63mm/year) and Ulu Tiram (1.61mm/year) are going through uplift due to possible geological uplift. On the other end, East Johor Bahru (-0.26mm/year) and Senai (-1.16mm/year) undergo subsidence due to possible fracture and granitic boulders loading. Land subsidence must be taken seriously as it can cause serious damages to infrastructures and human life. Monitoring land subsidence and taking preventive actions must be done to prevent any disasters.

Keywords: interferometric synthetic aperture radar, persistent scatter, minimum spanning tree, resistivity, subsidence

Procedia PDF Downloads 147
329 Comparison of Different Methods of Evaluating Nozzle Junction Stresses under External Loads

Authors: Vinod Kumar, Arun Kumar, Surjit Angra

Abstract:

This paper addresses the junction stress analysis of orthogonally intersecting thin walled cylindrical shell and thin walled cylindrical nozzle subjected to external loading on nozzle. Junction stresses have been calculated theoretically by welding research council (WRC) bulletins 107 and 297 for different nozzle loads. WRC bulletins 107 and 297 have been used by design engineers for calculating nozzle-vessel junction stresses since their publication. They give simple empirical relations and easy in application. Also 3D FEA in which material is elastic has been done in ANSYS software with 8 node solid element model and results of FEA have been compared with WRC results. Stress intensities obtained by WRC 297 are generally slightly higher than obtained by WRC 107. Membrane stresses obtained by FEA are much higher than WRC and membrane plus bending stresses obtained by FEA are lower than WRC.

Keywords: FEA, junction stress, solid element, WRC 107, WRC 297

Procedia PDF Downloads 578
328 Post-Quantum Resistant Edge Authentication in Large Scale Industrial Internet of Things Environments Using Aggregated Local Knowledge and Consistent Triangulation

Authors: C. P. Autry, A. W. Roscoe, Mykhailo Magal

Abstract:

We discuss the theoretical model underlying 2BPA (two-band peer authentication), a practical alternative to conventional authentication of entities and data in IoT. In essence, this involves assembling a virtual map of authentication assets in the network, typically leading to many paths of confirmation between any pair of entities. This map is continuously updated, confirmed, and evaluated. The value of authentication along multiple disjoint paths becomes very clear, and we require analogues of triangulation to extend authentication along extended paths and deliver it along all possible paths. We discover that if an attacker wants to make an honest node falsely believe she has authenticated another, then the length of the authentication paths is of little importance. This is because optimal attack strategies correspond to minimal cuts in the authentication graph and do not contain multiple edges on the same path. The authentication provided by disjoint paths normally is additive (in entropy).

Keywords: authentication, edge computing, industrial IoT, post-quantum resistance

Procedia PDF Downloads 197
327 Cu Voids Detection of Electron Beam Inspection at the 5nm Node

Authors: Byungsik Moon

Abstract:

Electron beam inspection (EBI) has played an important role in detecting defects during the Fab process. The study focused on capturing buried Cu metal voids for 5nm technology nodes in Qualcomm Snapdragon mass production. This paper illustrates a case study where Cu metal voids can be detected without side effects with optimized EBI scanning conditions. The voids were buried in the VIA and not detected effectively by bright field inspection. EBI showed higher detectability, about 10 times that of bright fields, and a lower landing energy of EBI can avoid film damage. A comparison of detectability between EBI and bright field inspection was performed, and TEM confirmed voids that were detected by EBI. Therefore, a much higher detectability of buried Cu metal voids can be achieved without causing film damage.

Keywords: electron beam inspection, EBI, landing energy, Cu metal voids, bright field inspection

Procedia PDF Downloads 75
326 Research on Architectural Steel Structure Design Based on BIM

Authors: Tianyu Gao

Abstract:

Digital architectures use computer-aided design, programming, simulation, and imaging to create virtual forms and physical structures. Today's customers want to know more about their buildings. They want an automatic thermostat to learn their behavior and contact them, such as the doors and windows they want to open with a mobile app. Therefore, the architectural display form is more closely related to the customer's experience. Based on the purpose of building informationization, this paper studies the steel structure design based on BIM. Taking the Zigan office building in Hangzhou as an example, it is divided into four parts, namely, the digital design modulus of the steel structure, the node analysis of the steel structure, the digital production and construction of the steel structure. Through the application of BIM software, the architectural design can be synergized, and the building components can be informationized. Not only can the architectural design be feedback in the early stage, but also the stability of the construction can be guaranteed. In this way, the monitoring of the entire life cycle of the building and the meeting of customer needs can be realized.

Keywords: digital architectures, BIM, steel structure, architectural design

Procedia PDF Downloads 195
325 A Reactive Fast Inter-MAP Handover for Hierarchical Mobile IPv6

Authors: Pyung Soo Kim

Abstract:

This paper proposes an optimized reactive fast intermobility anchor point (MAP) handover scheme for Hierarchical Mobile IPv6, called the ORFH-HMIPv6, to minimize packet loss of the existing scheme. The key idea of the proposed ORFHHMIPv6 scheme is that the serving MAP buffers packets toward the mobile node (MN) as soon as the link layer between MN and serving base station is disconnected. To implement the proposed scheme, the MAP discovery message exchanged between MN and serving MAP is extended. In addition, the IEEE 802.21 Media Independent Handover Function (MIHF) event service message is defined newly. Through analytic performance evaluation, the proposed ORFH-HMIPv6 scheme can be shown to minimize packet loss much than the existing scheme.

Keywords: hierarchical mobile IPv6 (HMIPv6), fast handover, reactive behavior, packet loss

Procedia PDF Downloads 213