Search results for: Acute heart attacks
2249 Acute Myocardial Infarction Associated with Ingestion of Herbal Mixtures Containing Acetylcholinesterase Inhibitors: A Case Study
Authors: M. Hakami, A. Jammaly, I. Attafi, M. Oraiby, M. Jeraiby
Abstract:
We reviewed an unusual case of a 65-year-old male taking an herbal mixture containing compounds with anticholinesterase activity for a long period of time, presented with acute my myocardial infarction and multiple organ dysfunction syndrome followed by death. Clinically, there are findings correlated with anticholinesterase activity, such as bilateral miosis, diaphoresis, vomiting and fasciculation without a history of any toxic ingestion or exposure. Gas chromatography–mass spectrometry screening studies identified the presence of thymol, anethole in the herbal extract and butylated hydroxytoluene in the blood sample. Hence, with this case report, we intend to highlight the necessity of evaluating the long-term use of the herbal mixture.Keywords: cholinesterase inhibitors, thymole, anethole, butylatedhydroxytoluene, cardiac toxicity, myocardial infarction
Procedia PDF Downloads 2792248 Prone Positioning and Clinical Outcomes of Mechanically Ventilated Patients with Severe Acute Respiratory Distress Syndrome
Authors: Maha Salah Abdullah Ismail, Mahmoud M. Alsagheir, Mohammed Salah Abd Allah
Abstract:
Acute respiratory distress syndrome (ARDS) is characterized by permeability pulmonary edema and refractory hypoxemia. Lung-protective ventilation is still the key of better outcome in ARDS. Prone position reduces the trans-pulmonary pressure gradient, recruiting collapsed regions of the lung without increasing airway pressure or hyperinflation. Prone ventilation showed improved oxygenation and improved outcomes in severe hypoxemic patients with ARDS. This study evaluates the effect of prone positioning on mechanically ventilated patients with ARDS. A quasi-experimental design was carried out at Critical Care Units, on 60 patients. Two tools were utilized to collect data; Socio demographic, medical and clinical outcomes data sheet. Results of the present study indicated that prone position improves oxygenation in patients with severe respiratory distress syndrome. The study recommended that use prone position in patients with severe ARDS, as early as possible and for long sessions. Also, replication of this study on larger probability sample at the different geographical location is highly recommended.Keywords: acute respiratory distress syndrome, critical care, mechanical ventilation, prone position
Procedia PDF Downloads 5382247 Vagal Nerve Stimulator as a Treatment Approach in CHARGE Syndrome: A Case Report
Authors: Roya Vakili, Lekaa Elhajjmoussa, Barzin Omidi-Shal, Kim Blake
Abstract:
Objective: The purpose of this case report is to highlight the successful treatment of a patient with Coloboma, Heart defect, Atresia choanae, Retarded growth and development, Genital hypoplasia, Ear anomalies/deafness, (CHARGE syndrome) using a vagal nerve stimulator (VNS). Background: This is the first documented case report, to the authors' best knowledge, for a patient with CHARGE syndrome, epilepsy, autism, and postural orthostatic tachycardia syndrome (POTS) that was successfully treated with an implanted VNS therapeutic device. Methodology: The study is a case report. Results: This is the case of a 24-year-old female patient with CHARGE syndrome (non-random association of anomalies Coloboma, Heart defect, Atresia choanae, Retarded growth and development, Genital hypoplasia, Ear anomalies/deafness) and several other comorbidities including refractory epilepsy, Patent Ductus Arteriosus (PDA) and POTS who had significant improvement of her symptoms after VNS implantation. She was a VNS candidate given her longstanding history of drug-resistant epilepsy and current disposition secondary to CHARGE syndrome. Prior to VNS implantation, she experienced three generalized seizures a year and daily POTS-related symptoms. She was having frequent lightheadedness and syncope spells due to a rapid heart rate and low blood pressure. The VNS device was set to detect a rapid heart rate and send appropriate stimulation anytime the heart rate exceeded 20% of the patient’s normal baseline. The VNS device demonstrated frequent elevated heart rates and concurrent VNS release every 8 minutes in addition to the programmed events. Following VNS installation, the patient became more active, alert, and communicative and was able to verbally communicate with words she was unable to say prior. Her GI symptoms also improved, as she was able to tolerate food better orally in addition to her G and J tube, likely another result of the vagal nerve stimulation. Additionally, the patient’s seizures and POTS-related cardiac events appeared to be well controlled. She had prolonged electroencephalogram (EEG) testing, showing no significant change in epileptiform activity. Improvements in the patient’s disposition are believed to be secondary to parasympathetic stimulation, adequate heart rate control, and GI stimulation, in addition to behavioral changes and other benefits via her implanted VNS. Conclusion: VNS showed promising results in improving the patient's quality of life and managing her diverse symptoms, including dysautonomia, POTs, gastrointestinal mobility, cognitive functioning as well seizure control.Keywords: autism, POTs, CHARGE, VNS
Procedia PDF Downloads 852246 Constructing a Semi-Supervised Model for Network Intrusion Detection
Authors: Tigabu Dagne Akal
Abstract:
While advances in computer and communications technology have made the network ubiquitous, they have also rendered networked systems vulnerable to malicious attacks devised from a distance. These attacks or intrusions start with attackers infiltrating a network through a vulnerable host and then launching further attacks on the local network or Intranet. Nowadays, system administrators and network professionals can attempt to prevent such attacks by developing intrusion detection tools and systems using data mining technology. In this study, the experiments were conducted following the Knowledge Discovery in Database Process Model. The Knowledge Discovery in Database Process Model starts from selection of the datasets. The dataset used in this study has been taken from Massachusetts Institute of Technology Lincoln Laboratory. After taking the data, it has been pre-processed. The major pre-processing activities include fill in missed values, remove outliers; resolve inconsistencies, integration of data that contains both labelled and unlabelled datasets, dimensionality reduction, size reduction and data transformation activity like discretization tasks were done for this study. A total of 21,533 intrusion records are used for training the models. For validating the performance of the selected model a separate 3,397 records are used as a testing set. For building a predictive model for intrusion detection J48 decision tree and the Naïve Bayes algorithms have been tested as a classification approach for both with and without feature selection approaches. The model that was created using 10-fold cross validation using the J48 decision tree algorithm with the default parameter values showed the best classification accuracy. The model has a prediction accuracy of 96.11% on the training datasets and 93.2% on the test dataset to classify the new instances as normal, DOS, U2R, R2L and probe classes. The findings of this study have shown that the data mining methods generates interesting rules that are crucial for intrusion detection and prevention in the networking industry. Future research directions are forwarded to come up an applicable system in the area of the study.Keywords: intrusion detection, data mining, computer science, data mining
Procedia PDF Downloads 2962245 Relative Importance of Contact Constructs to Acute Respiratory Illness in General Population in Hong Kong
Authors: Kin On Kwok, Vivian Wei, Benjamin Cowling, Steven Riley, Jonathan Read
Abstract:
Background: The role of social contact behavior measured in different contact constructs in the transmission of respiratory pathogens with acute respiratory illness (ARI) remains unclear. We, therefore, aim to depict the individual pattern of ARI in the community and investigate the association between different contact dimensions and ARI in Hong Kong. Methods: Between June 2013 and September 2013, 620 subjects participated in the last two waves of recruitment of the population based longitudinal phone social contact survey. Some of the subjects in this study are from the same household. They are also provided with the symptom diaries to self-report any acute respiratory illness related symptoms between the two days of phone recruitment. Data from 491 individuals who were not infected on the day of phone recruitment and returned the symptom diaries after the last phone recruitment were used for analysis. Results: After adjusting different follow-up periods among individuals, the overall incidence rate of ARI was 1.77 per 100 person-weeks. Over 75% ARI episodes involve running nose, cough, sore throat, which are followed by headache (55%), malagia (35%) and fever (18%). Using a generalized estimating equation framework accounting for the cluster effect of subjects living in the same household, we showed that both daily number of locations visited with contacts and the number of contacts, explained the ARI incidence rate better than only one single contact construct. Conclusion: Our result suggests that it is the intertwining property of contact quantity (number of contacts) and contact intensity (ratio of subject-to-contact) that governs the infection risk by a collective set of respiratory pathogens. Our results provide empirical evidence that multiple contact constructs should be incorporated in the mathematical transmission models to feature a more realistic dynamics of respiratory disease.Keywords: acute respiratory illness, longitudinal study, social contact, symptom diaries
Procedia PDF Downloads 2612244 Sub-Acute Toxicity Studies on Aqueous Leaf Extract of Acalypha wilkesiana in Albino Rats
Authors: G. E. Forcados, M. L. Shu, C. N. Chinyere
Abstract:
Acalypha wilkesiana is a medicinal plant commonly used in most parts of West Africa as a decoction in treating several human diseases. Existing literature on its toxicity is predominantly on the organic extracts in contrast to the routine use of hot aqueous extracts as decoction. The aim of this study was to examine the phytochemical profile and sub-acute toxicity of A. wilkesiana leaf extracts in albino rats. Three groups of 8 experimental rats each were administered 300 mg/kg, 600 mg/kg and 1200 mg/kg body weight per day for 14 days while a fourth (control) group took tap-water. On day 15, the rats were sacrificed, and blood collected. Biochemical and hematological parameters were analysed and histopathological examination of liver and kidney were performed. There was significant increase (p<0.05) in the levels of some biochemical parameters (AST, ALT, creatinine, urea) in all the test groups compared to control. Histopathological examination of the liver revealed centrilobular degeneration and necrosis with sinusoidal dilatation as well as polymorphonuclear and mononuclear infiltration, likewise severe glomerular and tubular degeneration and necrosis with hemorrhage in the kidney at all dose levels. The results from this study suggest that aqueous leaf extract of A. wilkesiana is hepatotoxic and nephrotoxic at dose levels of 300 mg/kg and above. Therefore, precautionary measures are necessary for home use of the leaf extract of A. wilkesiana.Keywords: acute toxicity, A. wilkesiana, aqeous extract, albino rats, biochemical and haematological parameters, histopathological examination
Procedia PDF Downloads 4372243 The Study of Security Techniques on Information System for Decision Making
Authors: Tejinder Singh
Abstract:
Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data
Procedia PDF Downloads 3072242 Attack Redirection and Detection using Honeypots
Authors: Chowduru Ramachandra Sharma, Shatunjay Rawat
Abstract:
A false positive state is when the IDS/IPS identifies an activity as an attack, but the activity is acceptable behavior in the system. False positives in a Network Intrusion Detection System ( NIDS ) is an issue because they desensitize the administrator. It wastes computational power and valuable resources when rules are not tuned properly, which is the main issue with anomaly NIDS. Furthermore, most false positives reduction techniques are not performed during the real-time of attempted intrusions; instead, they have applied afterward on collected traffic data and generate alerts. Of course, false positives detection in ‘offline mode’ is tremendously valuable. Nevertheless, there is room for improvement here; automated techniques still need to reduce False Positives in real-time. This paper uses the Snort signature detection model to redirect the alerted attacks to Honeypots and verify attacks.Keywords: honeypot, TPOT, snort, NIDS, honeybird, iptables, netfilter, redirection, attack detection, docker, snare, tanner
Procedia PDF Downloads 1552241 The Effect of Eight Weeks of Aerobic Training on Indices of Cardio-Respiratory and Exercise Tolerance in Overweight Women with Chronic Asthma
Authors: Somayeh Negahdari, Mohsen Ghanbarzadeh, Masoud Nikbakht, Heshmatolah Tavakol
Abstract:
Asthma, obesity and overweight are the main factors causing change within the heart and respiratory airways. Asthma symptoms are normally observed during exercising. Epidemiological studies have indicated asthma symptoms occurring due to certain lifestyle habits; for example, a sedentary lifestyle. In this study, eight weeks of aerobic exercises resulted in a positive effect overall in overweight women experiencing mild chronic asthma. The quasi-experimental applied research has been done based on experimental and control groups. The experimental group (seven patients) and control group (n = 7) were graded before and after the test. According to the Borg dyspnea and fatigue Perception Index, the training intensity has determined. Participants in the study performed a sub-maximal aerobic activity schedule (45% to 80% of maximum heart rate) for two months, while the control group (n = 7) stayed away from aerobic exercise. Data evaluation and analysis of covariance compared both the pre-test and post-test with paired t-test at significance level of P≤ 0.05. After eight weeks of exercise, the results of the experimental group show a significant decrease in resting heart rate, systolic blood pressure, minute ventilation, while a significant increase in maximal oxygen uptake and tolerance activity (P ≤ 0.05). In the control group, there was no significant difference in these parameters ((P ≤ 0.05). The results indicate the aerobic activity can strengthen the respiratory muscles, while other physiological factors could result in breathing and heart recovery. Aerobic activity also resulted in favorable changes in cardiovascular parameters, and exercise tolerance of overweight women with chronic asthma.Keywords: asthma, respiratory cardiac index, exercise tolerance, aerobic, overweight
Procedia PDF Downloads 2342240 Evaluation of the Effectiveness of Barriers for the Control of Rats in Rice Plantation Field
Authors: Melina, Jumardi Jumardi, Erwin Erwin, Sri Nuraminah, Andi Nasruddin
Abstract:
The rice field rat (Rattus argentiventer Robinson and Kloss) is a pest causing the greatest yield loss of rice plants, especially in lowland agroecosystems with intensive cropping patterns (2-3 plantings per year). Field mice damage rice plants at all stages of growth, from seedling to harvest, even in storage warehouses. Severe damage with yield loss of up to 100% occurs if rats attack rice at the generative stage because the plants are no longer able to recover by forming new tillers. Farmers mainly use rodenticides in the form of poisoned baits or as fumigants, which are applied to rat burrow holes. This practice is generally less effective because mice are able to avoid the poison or become resistant after several exposures to it. In addition, excessive use of rodenticides can have negative impacts on the environment and non-target organisms. For this reason, this research was conducted to evaluate the effectiveness of fences as an environmentally friendly mechanical control method in reducing rice yield losses due to rat attacks. This study used a factorial randomized block design. The first factor was the fence material, namely galvanized zinc plate and plastic. The second factor was the height of the fence, namely 25, 50, 75, and 100 cm from the ground level. Each treatment combination was repeated five times. Data shows that zinc fences with a height of 75 and 100 cm are able to provide full protection to plants from rat infestations throughout the planting season. However, zinc fences with a height of 25 and 50 cm failed to prevent rat attacks. Plastic fences with a height of 25 and 50 cm failed to prevent rat attacks during the planting season, whereas 75 and 100 cm were able to prevent rat attacks until all the crops outside of the fence had been eaten by rats. The rat managed to get into the fence by biting the plastic fence close to the ground. Thus, the research results show that fences made of zinc plate with a height of at least 75 cm from the ground surface are effective in preventing plant damage caused by rats. To our knowledge, this research is the first to quantify the effectiveness of fences as a control of field rodents.Keywords: rice field rat, Rattus argentiventer, fence, rice
Procedia PDF Downloads 392239 Border Control and Human Rights Violations: Lessons Learned from the United States and Potential Solutions for the European Union
Authors: María Elena Menéndez Ibáñez
Abstract:
After the terrorist attacks of 9/11, new measures were adopted by powerful countries and regions like the United States and the European Union in order to safeguard their security. In 2002, the US created the Department of Homeland Security with one sole objective; to protect American soil and people. The US adopted new policies that made every immigrant a potential terrorist and a threat to their national security. Stronger border control became one of the key elements of the fight against organized crime and terrorism. The main objective of this paper is to compare some of the most important and radical measures adopted by the US, even those that resulted in systematic violations of human rights, with some of the European measures adopted after the 2015 Paris attacks of 2015, such as unlawful detainment of prisoners and other measures against foreigners. Through the Schengen agreement, the European Union has tried to eliminate tariffs and border controls, in order to guarantee successful economic growth. Terrorists have taken advantage of this and have made the region vulnerable to attacks. Authorities need to strengthen their surveillance methods in order to safeguard the region and its stability. Through qualitative methods applied to social sciences, this research will also try to explain why some of the mechanisms proven to be useful in the US would not be so in Europe, especially because they would result in human rights violations. Finally, solutions will be offered that would not put the whole Schengen Agreement at risk. Europe cannot reinstate border control, without making individuals vulnerable to human rights violations.Keywords: border control, immigration, international cooperation, national security
Procedia PDF Downloads 1382238 Comparison Between Vegans and Omnivores on the Recovery of Delayed Onset Muscle Soreness in Young Females
Authors: Njeim Pressila, Hajj-Boutros Guy, Antony D. Karelis
Abstract:
Background: Acute resistance exercise is associated with an elevated inflammation response, which could lead to delayed onset muscle soreness (DOMS). There is evidence that suggests that ingesting foods that have anti-inflammation properties may help reduce DOMS. A vegan diet has also been shown to be an anti-inflammatory diet which could, in turn, decrease DOMS. Objective and hypothesis: The purpose of the present study will be to compare markers of DOMS between vegans and omnivores after acute resistance exercise in young females. We hypothesize that vegans will have a better recovery of DOMS markers after a resistance exercise session compared to omnivores. Methods: Population: We will recruit30 vegans and 30 omnivores to participate in this study. Allvolunteers will follow either a vegan or an omnivore diet for at least 2 years. Anthropometric measurements, body composition, musclestrength (leg and chest press), markers of DOMS (swelling, pain, and stiffness), and dietary factors, as well as a wellness and anxiety questionnaire will be measured. All participants will also perform an acute resistance exercise session in order to induce DOMS. Pertinence: This project will give us a better understanding on the recovery process of vegans after a resistance training session and, as such, provide useful information to health professionals and athletes/coaches (kinesiologists and nutritionists)Keywords: vgeans, omnivores, delayed onset muscle soreness, pain, stifness
Procedia PDF Downloads 1272237 Development and Psychometric Validation of the Hospitalised Older Adults Dignity Scale for Measuring Dignity during Acute Hospital Admissions
Authors: Abdul-Ganiyu Fuseini, Bernice Redley, Helen Rawson, Lenore Lay, Debra Kerr
Abstract:
Aim: The study aimed to develop and validate a culturally appropriate patient-reported outcome measure for measuring dignity for older adults during acute hospital admissions. Design: A three-phased mixed-method sequential exploratory design was used. Methods: Concept elicitation and generation of items for the scale was informed by older adults’ perspectives about dignity during acute hospitalization and a literature review. Content validity evaluation and pre-testing were undertaken using standard instrument development techniques. A cross-sectional survey design was conducted involving 270 hospitalized older adults for evaluation of construct and convergent validity, internal consistency reliability, and test–retest reliability of the scale. Analysis was performed using Statistical Package for the Social Sciences, version 25. Reporting of the study was guided by the Strengthening the Reporting of Observational Studies in Epidemiology (STROBE) checklist. Results: We established the 15-item Hospitalized Older Adults’ Dignity Scale that has a 5-factor structure: Shared Decision-Making (3 items); Healthcare Professional-Patient Communication (3 items); Patient Autonomy (4 items); Patient Privacy (2 items); and Respectful Care (3 items). Excellent content validity, adequate construct and convergent validity, acceptable internal consistency reliability, and good test-retest reliability were demonstrated. Conclusion: We established the Hospitalized Older Adults Dignity Scale as a valid and reliable scale to measure dignity for older adults during acute hospital admissions. Future studies using confirmatory factor analysis are needed to corroborate the dimensionality of the factor structure and external validity of the scale. Routine use of the scale may provide information that informs the development of strategies to improve dignity-related care in the future. Impact: The development and validation of the Hospitalized Older Adults Dignity Scale will provide healthcare professionals with a feasible and reliable scale for measuring older adults’ dignity during acute hospitalization. Routine use of the scale may enable the capturing and incorporation of older patients’ perspectives about their healthcare experience and provide information that informs the development of strategies to improve dignity-related care in the future.Keywords: dignity, older adults, hospitalisation, scale, patients, dignified care, acute care
Procedia PDF Downloads 902236 Arterial Line Use for Acute Type 2 Respiratory Failure
Authors: C. Scurr, J. Jeans, S. Srivastava
Abstract:
Introduction: Acute type two respiratory failure (T2RF) has become a common presentation over the last two decades primarily due to an increase in the prevalence of chronic lung disease. Acute exacerbations can be managed either medically or in combination with non-invasive ventilation (NIV) which should be monitored with regular arterial blood gas samples (ABG). Arterial lines allow more frequent arterial blood sampling with less patient discomfort. We present the experience from a teaching hospital emergency department (ED) and level 2 medical high-dependency unit (HDU) that together form the pathway for management of acute type 2 respiratory failure. Methods: Patients acutely presenting to Charing Cross Hospital, London, with T2RF requiring non-invasive ventilation (NIV) over 14 months (2011 to 2012) were identified from clinical coding. Retrospective data collection included: demographics, co-morbidities, blood gas numbers and timing, if arterial lines were used and who performed this. Analysis was undertaken using Microsoft Excel. Results: Coding identified 107 possible patients. 69 notes were available, of which 41 required NIV for type 2 respiratory failure. 53.6% of patients had an arterial line inserted. Patients with arterial lines had 22.4 ABG in total on average compared to 8.2 for those without. These patients had a similar average time to normalizing pH of (23.7 with arterial line vs 25.6 hours without), and no statistically significant difference in mortality. Arterial lines were inserted by Foundation year doctors, Core trainees, Medical registrars as well as the ICU registrar. 63% of these were performed by the medical registrar rather than ICU, ED or a junior doctor. This is reflected in that the average time until an arterial line was inserted was 462 minutes. The average number of ABGs taken before an arterial line was 2 with a range of 0 – 6. The average number of gases taken if no arterial line was ever used was 7.79 (range of 2-34) – on average 4 times as many arterial punctures for each patient. Discussion: Arterial line use was associated with more frequent arterial blood sampling during each inpatient admission. Additionally, patients with an arterial line have less individual arterial punctures in total and this is likely more comfortable for the patient. Arterial lines are normally sited by medical registrars, however this is normally after some delay. ED clinicians could improve patient comfort and monitoring thus allowing faster titration of NIV if arteral lines were regularly inserted in the ED. We recommend that ED doctors insert arterial lines when indicated in order improve the patient experience and facilitate medical management.Keywords: non invasive ventilation, arterial blood gas, acute type, arterial line
Procedia PDF Downloads 4282235 Ethanol in Carbon Monoxide Intoxication: Focus on Delayed Neuropsychological Sequelae
Authors: Hyuk-Hoon Kim, Young Gi Min
Abstract:
Background: In carbon monoxide (CO) intoxication, the pathophysiology of delayed neurological sequelae (DNS) is very complex and remains poorly understood. And predicting whether patients who exhibit resolved acute symptoms have escaped or will experience DNS represents a very important clinical issue. Brain magnetic resonance (MR) imaging has been conducted to assess the severity of brain damage as an objective method to predict prognosis. And co-ingestion of a second poison in patients with intentional CO poisoning occurs in almost one-half of patients. Among patients with co-ingestions, 66% ingested ethanol. We assessed the effects of ethanol on neurologic sequelae prevalence in acute CO intoxication by means of abnormal lesion in brain MR. Method: This study was conducted retrospectively by collecting data for patients who visited an emergency medical center during a period of 5 years. The enrollment criteria were diagnosis of acute CO poisoning and the measurement of the serum ethanol level and history of taking a brain MR during admission period. Official readout data by radiologist are used to decide whether abnormal lesion is existed or not. The enrolled patients were divided into two groups: patients with abnormal lesion and without abnormal lesion in Brain MR. A standardized extraction using medical record was performed; Mann Whitney U test and logistic regression analysis were performed. Result: A total of 112 patients were enrolled, and 68 patients presented abnormal brain lesion on MR. The abnormal brain lesion group had lower serum ethanol level (mean, 20.14 vs 46.71 mg/dL) (p-value<0.001). In addition, univariate logistic regression analysis showed the serum ethanol level (OR, 0.99; 95% CI, 0.98 -1.00) was independently associated with the development of abnormal lesion in brain MR. Conclusion: Ethanol could have neuroprotective effect in acute CO intoxication by sedative effect in stressful situation and mitigative effect in neuro-inflammatory reaction.Keywords: carbon monoxide, delayed neuropsychological sequelae, ethanol, intoxication, magnetic resonance
Procedia PDF Downloads 2522234 Utility of Cardiac Biomarkers in Combination with Exercise Stress Testing in Patients with Suspected Ischemic Heart Disease
Authors: Rawa Delshada, Sanaa G. Hamab, Rastee D. Koyeec
Abstract:
Eighty patients with suspected ischemic heart disease were enrolled in the present study. They were classified into two groups: patients with positive exercise stress test results (n=40) and control group with negative exercise stress test results (n=40). Serum concentration of troponin I, Heart-type Fatty Acid Binding Protein (H-FABP) and Ischemia Modified Albumin (IMA) were measured one hour after performing stress test. Enzyme Linked Immunosorbent Assay was used to measure both troponin I, H-FABP levels, while IMA levels were measured by albumin cobalt binding test. There was no statistically significant difference in the mean concentration of troponin I between two groups (0.75±0.55ng/ml) for patients with positive test result vs. (0.71±0.55ng/ml) for negative test result group with P>0.05. Contrary to our expectation, mean IMA level was slightly higher among control group (70.88±39.76U/ml) compared to (62.7±51.9U/ml) in positive test result group, but still with no statistically significant difference (P>0.05). Median H-FABP level was also higher among negative exercise stress testing group compared the positive one (2ng/ml vs. 1.9ng/ml respectively), but failed to reach statistically significant difference (P>0.05). When quartiles model used to explore the possible association between each study biomarkers with the others; serum H-FABP level was lowest (1.7ng/ml) in highest quartile of IMA and lowest H-FABP (1.8ng/ml) in highest quartile of troponin I but with no statistically significant association (P>0.05). Myocardial ischemia, more likely occurred after exercise stress test, is not capable of causing troponin I release. Furthermore, an increase in H-FABP and IMA levels after stress test are not reflecting myocardial ischemia. Moreover, the combination of troponin I, H-FABP and IMA after measuring their post exercise levels does not improve the diagnostic utility of exercise stress test enormously.Keywords: cardiac biomarkers, ischemic heart disease, troponin I, ischemia modified albumin, heart-type fatty acid binding protein, exercise stress testing
Procedia PDF Downloads 2462233 Machine Learning Approach for Anomaly Detection in the Simulated Iec-60870-5-104 Traffic
Authors: Stepan Grebeniuk, Ersi Hodo, Henri Ruotsalainen, Paul Tavolato
Abstract:
Substation security plays an important role in the power delivery system. During the past years, there has been an increase in number of attacks on automation networks of the substations. In spite of that, there hasn’t been enough focus dedicated to the protection of such networks. Aiming to design a specialized anomaly detection system based on machine learning, in this paper we will discuss the IEC 60870-5-104 protocol that is used for communication between substation and control station and focus on the simulation of the substation traffic. Firstly, we will simulate the communication between substation slave and server. Secondly, we will compare the system's normal behavior and its behavior under the attack, in order to extract the right features which will be needed for building an anomaly detection system. Lastly, based on the features we will suggest the anomaly detection system for the asynchronous protocol IEC 60870-5-104.Keywords: Anomaly detection, IEC-60870-5-104, Machine learning, Man-in-the-Middle attacks, Substation security
Procedia PDF Downloads 3682232 Paralysis from an Ear Infection: A Severe Case of Otitis Externa Leading to Acute Complete Cervical Cord Syndrome
Authors: Rachael Collins, George Lafford
Abstract:
We report a case of a generally fit and a well 54-year-old gentleman who presented with a two-day history of worsening left-sided otorrhea, headache, neck stiffness, vomiting and pyrexia on the background of a seven-week history of OE. His condition progressed dramatically as he developed symptoms consistent with acute complete cervical cord syndrome with radiological evidence of skull base osteomyelitis, parapharyngeal, retropharyngeal and paravertebral abscesses and sigmoid sinus thrombus. Ultimately he made a significant, although not complete, recovery. This case is unique in demonstrating how OE can develop into a potentially life-threatening condition. It emphasizes the importance of early diagnosis and treatment of OE, the recognition of ‘red flag’ symptoms and highlights the importance of a multi-disciplinary team (MDT) approach when managing complex complications of OE.Keywords: ENT, neurology, otology, MDT
Procedia PDF Downloads 1492231 The Relationship between Human Neutrophil Elastase Levels and Acute Respiratory Distress Syndrome in Patients with Thoracic Trauma
Authors: Wahyu Purnama Putra, Artono Isharanto
Abstract:
Thoracic trauma is trauma that hits the thoracic wall or intrathoracic organs, either due to blunt trauma or sharp trauma. Thoracic trauma often causes impaired ventilation-perfusion due to damage to the lung parenchyma. This results in impaired tissue oxygenation, which is one of the causes of acute respiratory distress syndrome (ARDS). These changes are caused by the release of pro-inflammatory mediators, plasmatic proteins, and proteases into the alveolar space associated with ongoing edema, as well as oxidative products that ultimately result in severe inhibition of the surfactant system. This study aims to predict the incidence of acute respiratory distress syndrome (ARDS) through human neutrophil elastase levels. This study examines the relationship between plasma elastase levels as a predictor of the incidence of ARDS in thoracic trauma patients in Malang. This study is an observational cohort study. Data analysis uses the Pearson correlation test and ROC curve (receiver operating characteristic curve). It can be concluded that there is a significant (p= 0.000, r= -0.988) relationship between elastase levels and BGA-3. If the value of elastase levels is limited to 23.79 ± 3.95, the patient will experience mild ARDS. While if the value of elastase levels is limited to 57.68 ± 18.55, in the future, the patient will experience moderate ARDS. Meanwhile, if the elastase level is between 107.85 ± 5.04, the patient will likely experience severe ARDS. Neutrophil elastase levels correlate with the degree of severity of ARDS incidence.Keywords: ARDS, human neutrophil elastase, severity, thoracic trauma
Procedia PDF Downloads 1482230 Towards a Secure Storage in Cloud Computing
Authors: Mohamed Elkholy, Ahmed Elfatatry
Abstract:
Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.Keywords: access control, data integrity, data confidentiality, Kerberos authentication, cloud security
Procedia PDF Downloads 3352229 Acute Hepatotoxicity of Nano and Micro-Sized Iron Particles in Adult Albino Rats
Authors: Ghada Hasabo, Mahmoud Saber Elbasiouny, Mervat Abdelsalam, Sherin Ghaleb, Niveen Eldessouky
Abstract:
In the near future, nanotechnology is envisaged for large scale use. Hence health and safety issues of nanoparticles should be promptly addressed. In the present study the acute hepatoxicity assessment due to high single oral dose of nano iron and micro iron particles were studied. The normal daily activities, biochemical alterations, blood coagulation, histopathological changes in Wister rats were the aspect of the toxicological assessment.This work found that significant alterations in biochemical enzymes (serum iron level, liver enzymes, albumin, and bilirubin levels), blood coagulation (PT, PC, INR), and histopathological changes occurred more prominently in the nano iron particle treated group.Keywords: nanobiotechnology, nanosystems, nanomaterials, nanotechnology
Procedia PDF Downloads 5042228 Investigating Acute and Chronic Pain after Bariatric Surgery
Authors: Patti Kastanias, Wei Wang, Karyn Mackenzie, Sandra Robinson, Susan Wnuk
Abstract:
Obesity is a worldwide epidemic and is recognized as a chronic disease. Pain in the obese individual is a multidimensional issue. An increase in BMI is positively correlated with pain incidence and severity, especially in central obesity where individuals are twice as likely to have chronic pain. Both obesity and chronic pain are also associated with mood disorders. Pain is worse among obese individuals with depression and anxiety. Bariatric surgery provides patients with an effective solution for long-term weight loss and associated health problems. However, not much is known about acute and chronic pain after bariatric surgery and its contributing factors, including mood disorders. Nurse practitioners (NPs) at one large multidisciplinary bariatric surgery centre led two studies to examine acute and chronic pain and pain management over time after bariatric surgery. The purpose of the initial study was to examine the incidence and severity of acute and chronic pain after bariatric surgery. The aim of the secondary study was to further examine chronic pain, specifically looking at psychological factors that influence severity or incidence of both neuropathic and somatic pain as well as changes in opioid use. The initial study was a prospective, longitudinal study where patients having bariatric surgery at one surgical center were followed up to 6 months postop. Data was collected at 7 time points using validated instruments for pain severity, pain interference, and patient satisfaction. In the second study, subjects were followed longitudinally starting preoperatively and then at 6 months and 1 year postoperatively to capture changes in chronic pain and influencing variables over time. Valid and reliable instruments were utilized for all major study outcomes. In the first study, there was a trend towards decreased acute post-operative pain over time. The incidence and severity of chronic pain was found to be significantly reduced at 6 months post bariatric surgery. Interestingly, interference of chronic pain in daily life such as normal work, mood, and walking ability was significantly improved at 6 months postop however; this was not the case with sleep. Preliminary results of the secondary study indicate that pain severity, pain interference, anxiety and depression are significantly improved at 6 months postoperatively. In addition, preoperative anxiety, depression and emotional regulation were predictive of pain interference, but not pain severity. The results of our regression analyses provide evidence for the impact of pre-existing psychological factors on pain, particularly anxiety in obese populations.Keywords: bariatric surgery, mood disorders, obesity, pain
Procedia PDF Downloads 3042227 A Survey on Countermeasures of Cache-Timing Attack on AES Systems
Authors: Settana M. Abdulh, Naila A. Sadalla, Yaseen H. Taha, Howaida Elshoush
Abstract:
Side channel attacks are based on side channel information, which is information that is leaked from encryption systems. This includes timing information, power consumption as well as electromagnetic or even sound leaking which can exploited by an attacker. Implementing side channel attacks are possible if and only if an attacker has access to a cryptosystem. In this case, the attacker can exploit bad implementation in software or hardware which is not controlled by encryption implementer. Thus, he/she will represent a real threat to the security system. Several countermeasures have been proposed to eliminate side channel information vulnerability.Cache timing attack is a special type of side channel attack. Here, timing information is collected and analyzed by an attacker to guess sensitive information such as encryption key or plaintext. This paper reviews the technique applied in this attack and surveys the countermeasures against it, evaluating the feasibility and usability of each. Based on this evaluation, finally we pose several recommendations about using these countermeasures.Keywords: AES algorithm, side channel attack, cache timing attack, cache timing countermeasure
Procedia PDF Downloads 2992226 Tag Impersonation Attack on Ultra-lightweight Radio Frequency Identification Authentication Scheme (ESRAS)
Authors: Reham Al-Zahrani, Noura Aleisa
Abstract:
The proliferation of Radio Frequency Identification (RFID) technology has raised concerns about system security, particularly regarding tag impersonation attacks. Regarding RFID systems, an appropriate authentication protocol must resist active and passive attacks. A tag impersonation occurs when an adversary's tag is used to fool an authenticating reader into believing it is a legitimate tag. This paper analyzed the security of the efficient, secure, and practical ultra-lightweight RFID Authentication Scheme (ESRAS). Then, the paper presents a comprehensive analysis of the Efficient, Secure, and Practical Ultra-Lightweight RFID Authentication Scheme (ESRAS) in the context of radio frequency identification (RFID) systems that employed the Scyther tool to examine the protocol's security against a tag impersonation attack.Keywords: RFID, impersonation attack, authentication, ultra-lightweight protocols
Procedia PDF Downloads 652225 Young Female’s Heart Was Bitten by Unknown Ghost (Isolated Cardiac Sarcoidosis): A Case Report
Authors: Heru Al Amin
Abstract:
Sarcoidosis is a granulomatous inflammatory disorder of unclear etiology that can affect multiple different organ systems. Isolated cardiac sarcoidosis is a very rare condition that causes lethal arrhythmia and heart failure. A definite diagnosis of cardiac sarcoidosis remains challenging. The use of multimodality imaging plays a pivotal role in the diagnosis of this entity. Case summary: In this report, we discuss a case of a 50-year-old woman who presented with recurrent palpitation, dizziness, vertigo and presyncope. Electrocardiogram revealed variable heart blocks, including first-degree AV block, second-degree AV block, high-degree AV block, complete AV block, trifascicular block and sometimes supraventricular arrhythmia. Twenty-four hours of Holter monitoring show atrial bigeminy, first-degree AV block and trifascicular block. Transthoracic echocardiography showed Thinning of basal anteroseptal and inferred septum with LV dilatation with reduction of Global Longitudinal Strain. A dual-chamber pacemaker was implanted. CT Coronary angiogram showed no coronary artery disease. Cardiac magnetic resonance revealed basal anteroseptal and inferior septum thinning with focal edema with LGE suggestive of sarcoidosis. Computed tomography of the chest showed no lymphadenopathy or pulmonary infiltration. 18F-fluorodeoxyglucose positron emission tomography (FDG-PET) of the whole body showed. We started steroids and followed up with the patient. Conclusion: This case serves to highlight the challenges in identifying and managing isolated CS in a young patient with recurrent syncope with variable heart block. Early, even late initiation of steroids can improve arrhythmia as well as left ventricular function.Keywords: cardiac sarcoidosis, conduction abnormality, syncope, cardiac MRI
Procedia PDF Downloads 902224 Data Poisoning Attacks on Federated Learning and Preventive Measures
Authors: Beulah Rani Inbanathan
Abstract:
In the present era, it is vivid from the numerous outcomes that data privacy is being compromised in various ways. Machine learning is one technology that uses the centralized server, and then data is given as input which is being analyzed by the algorithms present on this mentioned server, and hence outputs are predicted. However, each time the data must be sent by the user as the algorithm will analyze the input data in order to predict the output, which is prone to threats. The solution to overcome this issue is federated learning, where the models alone get updated while the data resides on the local machine and does not get exchanged with the other local models. Nevertheless, even on these local models, there are chances of data poisoning, and it is crystal clear from various experiments done by many people. This paper delves into many ways where data poisoning occurs and the many methods through which it is prevalent that data poisoning still exists. It includes the poisoning attacks on IoT devices, Edge devices, Autoregressive model, and also, on Industrial IoT systems and also, few points on how these could be evadible in order to protect our data which is personal, or sensitive, or harmful when exposed.Keywords: data poisoning, federated learning, Internet of Things, edge computing
Procedia PDF Downloads 872223 Assessment of Heart Rate, Blood Pressure and Percentage Oxygen Saturation in Young Habitual Shisha Smokers in Kano, Nigeria
Authors: B. I. Waziri, M. A. Yahaya
Abstract:
Background: Practice of shisha smoking involves the use of a multi-stemmed instrument to smoke tobacco or non-tobacco herbal mixture where the smoke is designed to pass through water or other liquid before reaching the smoker. The presence of tobacco content and the use of charcoal when burning the ingredients in this popular practice necessitate for investigation of many physiological parameters of habitual shisha smokers in our environment. Methods: 103 young shisha smokers, regular in the practice for more than three years living in Nasarawa, Kano state, Nigeria, were recruited for the study. The controls were 100 university students (nonsmokers) match for age (18 - 30 years), sex and BMI (20 - 24) with the smokers. Participants with known history of cigarette smoking, cardiovascular or respiratory diseases were excluded. Ethical approval was obtained from the Ministry of Health, Kano Nigeria. Hear rate, blood pressure and percentage oxygen saturation (SPO₂) were measured using stethoscope, sphygmomanometer and pulse oximeter respectively. Data were analyzed using IBM SPSS version 20 and mean values of the measured parameters were compared between the smokers and controls using independent sample t-test. P-values < 0.05 were considered significant. Results: The mean Heart rate was found to be significantly higher (p = 0.01) in the shisha smokers (91.32 ± 0.84) compared to controls (79.19 ± 1.18). Systolic and diastolic blood pressure was also higher (p = 0.00) in the shisha smokers (128.75 ± 1.11 and 85.85 ± 0.78 respectively) compared to controls with the systolic and diastolic pressure of 116.64 ± 0.82 and 80.39 ± 0.83 respectively. SPO₂ was significantly lower (p = 0.00) in the shisha smokers (91.98% ± 0.42%) compared to the controls (97.98 ± 0.18). Conclusion: Habitual Shisha Smoking caused a significant increase in Heart rate, both systolic and diastolic blood pressure and a significant decrease in SPO2 among youth in Kano State, Nigeria.Keywords: blood pressure, heart rate, shisha, youth
Procedia PDF Downloads 1472222 Acute Hepatitis A Outbreak in Men Who Has Sex with Men in a Medical Center in Northern Taiwan
Authors: Yu-Tzu Hsu, Alice Wu, Hsiang-Kuang Tseng
Abstract:
Introduction: Hepatitis A virus causes acute hepatitis and is usually transmitted by a fecal-oral route of food contamination, which is more prevalent in areas with poor hygienic practices. However, we described a hepatitis A outbreak associated with a fecal-oral route of sexual behavior in men who has sex with men (MSM) in Northern Taiwan. Methods: We retrospectively collected patients with acute HAV infection in MacKay Memorial Hospital, Taipei, Taiwan between July 2015 and November 2016. Demographic data (age, gender, onset time and infection risk), laboratory data (GOT, GPT, bilirubin, HIV status, HBsAg, HCV antibody and syphilis), clinical symptoms and travel history with a foreign tour were analyzed. We compared variables between HIV and non-HIV group. Unless otherwise stated, continuous variables were expressed as mean ± SD, and categorical variables were expressed as number (percentage) for each item. The t test for continuous variables was applied for the comparison between two groups and chi-square for categorical variables were applied for measures of association. Results: We collected 80 cases during the study period. Among them, 54 (67.5%) cases were MSM and 43 (53.8%) cases were HIV positive. The average age was 32.6±7.59 years-old. The average value of initial liver function was 1324 IU/L for AST (GOT), 2100 IU/L for ALT (GPT), and 5.82 mg/dL for bilirubin. We found seven (8.6%) cases were in the status of HBV carrier, five (6.3%) cases were positive for HCV antibody, and 15 (18.6%) cases were co-infected with syphilis. With regards to associated symptoms, 32 (40%) had fever, 46 (57.5%) had nausea, 34 (42.5%) had abdominal discomfort and 46 (57.5%) had general malaise. To compare the non-HIV patients with HIV patients, HIV patients were more likely to be male (p=0.008), MSM (p=0.000), co-infected syphilis (p=0.000) and slowly improving liver function of transaminases (p=0.033, 0.027). Conclusion: The HAV outbreak in Northern Taiwan was mainly occurred in MSM population. Hereafter, our cohort data support a policy in Taiwan to provide one dose of free HAV vaccine shot in this population. Hopefully, the outbreak could be stop by the free vaccine policy and public education.Keywords: acute hepatitis A, men who has sex with men, human immunodeficiency virus, vaccine
Procedia PDF Downloads 2032221 Product Design and Development of Wearable Assistant Device
Authors: Hao-Jun Hong, Jung-Tang Huang
Abstract:
The world is gradually becoming an aging society, and with the lack of laboring forces, this phenomenon is affecting the nation’s economy growth. Although nursing centers are booming in recent years, the lack of medical resources are yet to be resolved, thus creating an innovative wearable medical device could be a vital solution. This research is focused on the design and development of a wearable device which obtains a more precise heart failure measurement than products on the market. The method used by the device is based on the sensor fusion and big data algorithm. From the test result, the modified structure of wearable device can significantly decrease the MA (Motion Artifact) and provide users a more cozy and accurate physical monitor experience.Keywords: big data, heart failure, motion artifact, sensor fusion, wearable medical device
Procedia PDF Downloads 3492220 The Two Question Challenge: Embedding the Serious Illness Conversation in Acute Care Workflows
Authors: D. M. Lewis, L. Frisby, U. Stead
Abstract:
Objective: Many patients are receiving invasive treatments in acute care or are dying in hospital without having had comprehensive goals of care conversations. Some of these treatments may not align with the patient’s wishes, may be futile, and may cause unnecessary suffering. While many staff may recognize the benefits of engaging patients and families in Serious Illness Conversations (a goal of care framework developed by Ariadne Labs in Boston), few staff feel confident and/or competent in having these conversations in acute care. Another barrier to having these conversations may be due to a lack of incorporation in the current workflow. An educational exercise, titled the Two Question Challenge, was initiated on four medical units across two Vancouver Coastal Health (VCH) hospitals in attempt to engage the entire interdisciplinary team in asking patients and families questions around goals of care and to improve the documentation of these expressed wishes and preferences. Methods: Four acute care units across two separate hospitals participated in the Two Question Challenge. On each unit, over the course of two eight-hour shifts, all members of the interdisciplinary team were asked to select at least two questions from a selection of nine goals of care questions. They were asked to pose these questions of a patient or family member throughout their shift and then asked to document their conversations in a centralized Advance Care Planning/Goals of Care discussion record in the patient’s chart. A visual representation of conversation outcomes was created to demonstrate to staff and patients the breadth of conversations that took place throughout the challenge. Staff and patients were interviewed about their experiences throughout the challenge. Two palliative approach leads remained present on the units throughout the challenge to support, guide, or role model these conversations. Results: Across four acute care medical units, 47 interdisciplinary staff participated in the Two Question Challenge, including nursing, allied health, and a physician. A total of 88 questions were asked of patients, or their families around goals of care and 50 newly documented goals of care conversations were charted. Two code statuses were changed as a result of the conversations. Patients voiced an appreciation for these conversations and staff were able to successfully incorporate these questions into their daily care. Conclusion: The Two Question Challenge proved to be an effective way of having teams explore the goals of care of patients and families in an acute care setting. Staff felt that they gained confidence and competence. Both staff and patients found these conversations to be meaningful and impactful and felt they were notably different from their usual interactions. Documentation of these conversations in a centralized location that is easily accessible to all care providers increased significantly. Application of the Two Question Challenge in non-medical units or other care settings, such as long-term care facilities or community health units, should be explored in the future.Keywords: advance care planning, goals of care, interdisciplinary, palliative approach, serious illness conversations
Procedia PDF Downloads 101