Search results for: attacks and controls
1165 A Study of the Disorders of Sexual Functioning in Women with Type 2 Diabetes Mellitus in a Tertiary Care Hospital in India
Authors: Mehak Nagpal, T. S. Sathyanarayan Rao
Abstract:
Background: Sexual functioning is a neglected aspect of health in women with diabetes, though it contributes greatly towards quality of life and feeling of wellbeing. Also women with DM are at higher risk than men of developing sexual dysfunction and depression. Materials and Methods: Cross-sectional comparison study. Sample size: 100 previously diagnosed type 2DM patients attending Outpatient Diabetic Clinic at Medicine department JSS Hospital Mysore; aged 20-65 years and 60 normal healthy female subjects for Control group. Data was collected with ethical approval over a period of 2 years. Tools Used: 1) Hamilton Depression Rating Scale (HAMD – 17 item) 2) Female Sexual Functioning Index (FSFI) 3) Arizona Sexual Experience Scale (ASEX-F) for female-for screening. 4) The Appraisal of Diabetes Scale (ADS). Results: Statistically significant differences were observed in prevalence rate and severity of depression between diabetic group (45% vs 11% syndromal depression) and controls. Depression scores correlated significantly with glycaemic control, adherence to treatment, BMI and the cognitive appraisal of diabetes. There was significantly greater impairment in the sexual functioning of women with type 2 diabetes mellitus as compared to controls; both prevalence (62% vs 38.3%) and severity (p value < 0.01). Arousal (74.2% vs 53.3%), Desire (76.3% vs 50%) and Satisfaction (76.7% vs 63.7%) were most affected and 64.5% were affected in 2 or more domains. A negative illness appraisal on ADS correlated significantly with poor glycaemic control, higher rates of depression and also more severe female sexual dysfunction (p value < 0.05). Conclusion: Diabetes specific factors that correlated significantly with FSD in this study included the psychological appraisal of diabetes, duration of diabetes, presence of complications and BMI.Keywords: depression, female sexual dysfunction, India, type 2 diabetes mellitus
Procedia PDF Downloads 3291164 Innovative Food Related Modification of the Day-Night Task Demonstrates Impaired Inhibitory Control among Patients with Binge-Purge Eating Disorder
Authors: Sigal Gat-Lazer, Ronny Geva, Dan Ramon, Eitan Gur, Daniel Stein
Abstract:
Introduction: Eating disorders (ED) are common psychopathologies which involve distorted body image and eating disturbances. Binge-purge eating disorders (B/P ED) are characterized by repetitive events of binge eating followed by purges. Patients with B/P ED behavior may be seen as impulsive especially when relate to food stimulation and affective conditions. The current study included innovative modification of the day-night task targeted to assess inhibitory control among patients with B/P ED. Methods: This prospective study included 50 patients with B/P ED during acute phase of illness (T1) upon their admission to specialized ED department in tertiary center. 34 patients repeated the study towards discharge to ambulatory care (T2). Treatment effect was evaluated by BMI and emotional questionnaires regarding depression and anxiety by the Beck Depression Inventory and State Trait Anxiety Inventory questionnaires. Control group included 36 healthy controls with matched demographic parameters who performed both T1 and T2 assessments. The current modification is based on the emotional day-night task (EDNT) which involves five emotional stimulation added to the sun and moon pictures presented to participants. In the current study, we designed the food-emotional modification day night task (F-EDNT) food stimulations of egg and banana which resemble the sun and moon, respectively, in five emotional states (angry, sad, happy, scrambled and neutral). During this computerized task, participants were instructed to push on “day” bottom in response to moon and banana stimulations and on “night” bottom when sun and egg were presented. Accuracy (A) and reaction time (RT) were evaluated and compared between EDNT and F-EDNT as a reflection of participants’ inhibitory control. Results: Patients with B/P ED had significantly improved BMI, depression and anxiety scores on T2 compared to T1 (all p<0.001). Task performance was similar among patients and controls in the EDNT without significant A or RT differences in both T1 and T2. On F-EDNT during T1, B/P ED patients had significantly reduced accuracy in 4/5 emotional stimulation compared to controls: angry (73±25% vs. 84±15%, respectively), sad (69±25% vs. 80±18%, respectively), happy (73±24% vs. 82±18%, respectively) and scrambled (74±24% vs. 84±13%, respectively, all p<0.05). Additionally, patients’ RT to food stimuli was significantly faster compared to neutral ones, in both cry and neutral emotional stimulations (356±146 vs. 400±141 and 378±124 vs. 412±116 msec, respectively, p<0.05). These significant differences between groups as a function of stimulus type were diminished on T2. Conclusion: Having to process food related content, in particular in emotional context seems to be impaired in patients with B/P ED during the acute phase of their illness and elicits greater impulsivity. Innovative modification using such procedures seem to be sensitive to patients’ illness phase and thus may be implemented during screening and follow up through the clinical management of these patients.Keywords: binge purge eating disorders, day night task modification, eating disorders, food related stimulations
Procedia PDF Downloads 3801163 Enhancing Healthcare Data Protection and Security
Authors: Joseph Udofia, Isaac Olufadewa
Abstract:
Everyday, the size of Electronic Health Records data keeps increasing as new patients visit health practitioner and returning patients fulfil their appointments. As these data grow, so is their susceptibility to cyber-attacks from criminals waiting to exploit this data. In the US, the damages for cyberattacks were estimated at $8 billion (2018), $11.5 billion (2019) and $20 billion (2021). These attacks usually involve the exposure of PII. Health data is considered PII, and its exposure carry significant impact. To this end, an enhancement of Health Policy and Standards in relation to data security, especially among patients and their clinical providers, is critical to ensure ethical practices, confidentiality, and trust in the healthcare system. As Clinical accelerators and applications that contain user data are used, it is expedient to have a review and revamp of policies like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Fast Healthcare Interoperability Resources (FHIR), all aimed to ensure data protection and security in healthcare. FHIR caters for healthcare data interoperability, FHIR caters to healthcare data interoperability, as data is being shared across different systems from customers to health insurance and care providers. The astronomical cost of implementation has deterred players in the space from ensuring compliance, leading to susceptibility to data exfiltration and data loss on the security accuracy of protected health information (PHI). Though HIPAA hones in on the security accuracy of protected health information (PHI) and PCI DSS on the security of payment card data, they intersect with the shared goal of protecting sensitive information in line with industry standards. With advancements in tech and the emergence of new technology, it is necessary to revamp these policies to address the complexity and ambiguity, cost barrier, and ever-increasing threats in cyberspace. Healthcare data in the wrong hands is a recipe for disaster, and we must enhance its protection and security to protect the mental health of the current and future generations.Keywords: cloud security, healthcare, cybersecurity, policy and standard
Procedia PDF Downloads 901162 Dietary Modification and Its Effects in Overweight or Obese Saudi Women with or without Type 2 Diabetes Mellitus
Authors: Nasiruddin Khan, Nasser M. Al-Daghri, Dara A. Al-Disi, Asim Al-Fadda, Mohamed Al-Seif, Gyanendra Tripathi, A. L. Harte, Philip G. Mcternan
Abstract:
For the last few decades, the prevalence of type 2 diabetes mellitus (T2DM) in the Kingdom of Saudi Arabia (KSA) is increasing alarmingly high and is unprecedented at 31.6 %. Preventive measures should be taken to curb down the increasing incidence. In this prospective, 3-month study, we aimed to determine whether dietary modification program would confer favorable affects among overweight and obese adult Saudi women with or without T2DM. A total of 92 Saudi women [18 healthy controls, 24 overweight subjects and 50 overweight or obese patients with early onset T2DM were included in this prospective study. Baseline anthropometrics and fasting blood samples were taken at baseline and after 3 months. Fasting blood sugar and lipid profile were measured routinely. A 500 Kcal deficit energy diet less than their daily recommended dietary allowances were prescribed to all participants. After 3 months of follow-up visit, significant improvements were observed in both the overweight and DMT2 group as compared to baseline with decreased mean BMI [Overweight Group 28.54±1.49 versus 27.95±2.25, p<0.05; DMT2 group 35.24±7.67 versus 35.04±8.07, p<0.05] and hip circumference [Overweight group 109.67±5.01 versus 108.07±4.07, p<0.05; DMT2 group 112.3±13.43 versus 109.21±12.71, p<0.01]. Moreover, in the overweight group, baseline HDL-cholesterol was significantly associated with protein intake and inversely associated with carbohydrate intake in controls. In the DMT2 group, carbohydrate intake at baseline was significantly associated with BMI. A 3-month 500kcal/day deficit dietary modification alone is probably effective among adult overweight or obese Saudi females without or with T2DM. Longer prospective studies are to determine whether the dietary intervention alone can reduce progression of T2DM among high-risk adult Arabs.Keywords: diet, lipid, obesity, T2DM
Procedia PDF Downloads 4751161 Performance Evaluation of Fingerprint, Auto-Pin and Password-Based Security Systems in Cloud Computing Environment
Authors: Emmanuel Ogala
Abstract:
Cloud computing has been envisioned as the next-generation architecture of Information Technology (IT) enterprise. In contrast to traditional solutions where IT services are under physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This is due to the fact that the systems are opened to the whole world and as people tries to have access into the system, many people also are there trying day-in day-out on having unauthorized access into the system. This research contributes to the improvement of cloud computing security for better operation. The work is motivated by two problems: first, the observed easy access to cloud computing resources and complexity of attacks to vital cloud computing data system NIC requires that dynamic security mechanism evolves to stay capable of preventing illegitimate access. Second; lack of good methodology for performance test and evaluation of biometric security algorithms for securing records in cloud computing environment. The aim of this research was to evaluate the performance of an integrated security system (ISS) for securing exams records in cloud computing environment. In this research, we designed and implemented an ISS consisting of three security mechanisms of biometric (fingerprint), auto-PIN and password into one stream of access control and used for securing examination records in Kogi State University, Anyigba. Conclusively, the system we built has been able to overcome guessing abilities of hackers who guesses people password or pin. We are certain about this because the added security system (fingerprint) needs the presence of the user of the software before a login access can be granted. This is based on the placement of his finger on the fingerprint biometrics scanner for capturing and verification purpose for user’s authenticity confirmation. The study adopted the conceptual of quantitative design. Object oriented and design methodology was adopted. In the analysis and design, PHP, HTML5, CSS, Visual Studio Java Script, and web 2.0 technologies were used to implement the model of ISS for cloud computing environment. Note; PHP, HTML5, CSS were used in conjunction with visual Studio front end engine design tools and MySQL + Access 7.0 were used for the backend engine and Java Script was used for object arrangement and also validation of user input for security check. Finally, the performance of the developed framework was evaluated by comparing with two other existing security systems (Auto-PIN and password) within the school and the results showed that the developed approach (fingerprint) allows overcoming the two main weaknesses of the existing systems and will work perfectly well if fully implemented.Keywords: performance evaluation, fingerprint, auto-pin, password-based, security systems, cloud computing environment
Procedia PDF Downloads 1401160 A Review of the Run to Run (R to R) Control in the Manufacturing Processes
Authors: Khalil Aghapouramin, Mostafa Ranjbar
Abstract:
Run- to- Run (R2 R) control was developed in order to monitor and control different semiconductor manufacturing processes based upon the fundamental engineering frameworks. This technology allows rectification in the optimum direction. This control always had a significant potency in which was appeared in a variety of processes. The term run to run refers to the case where the act of control would take with the aim of getting batches of silicon wafers which produced in a manufacturing process. In the present work, a brief review about run-to-run control investigated which mainly is effective in the manufacturing process.Keywords: Run-to-Run (R2R) control, manufacturing, process in engineering, manufacturing controls
Procedia PDF Downloads 4961159 Organic Facies Classification, Distribution, and Their Geochemical Characteristics in Sirt Basin, Libya
Authors: Khaled Albriki, Feiyu Wang
Abstract:
The failed rifted epicratonic Sirt basin is located in the northern margin of the African Plate with an area of approximately 600,000 km2. The organofacies' classification, characterization, and its distribution vertically and horizontally are carried out in 7 main troughs with 32 typical selected wells. 7 geological and geochemical cross sections including Rock-Eval data and % TOC data are considered in order to analyze and to characterize the main organofacies with respect to their geochemical and geological controls and also to remove the ambiguity behind the complexity of the orgnofacies types and distributions in the basin troughs from where the oil and gas are generated and migrated. This study confirmes that there are four different classical types of organofacies distributed in Sirt basin F, D/E, C, and B. these four clasical types of organofacies controls the type and amount of the hydrocarbon discovered in Sirt basin. Oil bulk property data from more than 20 oil and gas fields indicate that D/E organoface are significant oil and gas contributors similar to B organoface. In the western Sirt basin in Zallah-Dur Al Abd, Hagfa, Kotla, and Dur Atallha troughs, F organoface is identified for Etel formation, Kalash formation and Hagfa formation having % TOC < 0.6, whereas the good quality D/E and B organofacies present in Rachmat formation and Sirte shale formation both have % TOC > 1.1. Results from the deepest trough (Ajdabiya), Etel (Gas pron in Whadyat trough), Kalash, and Hagfa constitute F organofacies, mainly. The Rachmat and Sirt shale both have D/E to B organofacies with % TOC > 1.2, thus indicating the best organofacies quality in Ajdabiya trough. In Maragh trough, results show that Etel F organofacies and D/E, C to B organofacies related to Middle Nubian, Rachmat, and Sirte shale have %TOC > 0.66. Towards the eastern Sirt basin, in troughs (Hameimat, Faregh, and Sarir), results show that the Middle Nubian, Etel, Rachmat, and Sirte shales are strongly dominated by D/E, C to B (% TOC > 0.75) organofacies.Keywords: Etel, Mid-Nubian, organic facies, Rachmat, Sirt basin, Sirte shale
Procedia PDF Downloads 1281158 Partnering with Stakeholders to Secure Digitization of Water
Authors: Sindhu Govardhan, Kenneth G. Crowther
Abstract:
Modernisation of the water sector is leading to increased connectivity and integration of emerging technologies with traditional ones, leading to new security risks. The convergence of Information Technology (IT) with Operation Technology (OT) results in solutions that are spread across larger geographic areas, increasingly consist of interconnected Industrial Internet of Things (IIOT) devices and software, rely on the integration of legacy with modern technologies, use of complex supply chain components leading to complex architectures and communication paths. The result is that multiple parties collectively own and operate these emergent technologies, threat actors find new paths to exploit, and traditional cybersecurity controls are inadequate. Our approach is to explicitly identify and draw data flows that cross trust boundaries between owners and operators of various aspects of these emerging and interconnected technologies. On these data flows, we layer potential attack vectors to create a frame of reference for evaluating possible risks against connected technologies. Finally, we identify where existing controls, mitigations, and other remediations exist across industry partners (e.g., suppliers, product vendors, integrators, water utilities, and regulators). From these, we are able to understand potential gaps in security, the roles in the supply chain that are most likely to effectively remediate those security gaps, and test cases to evaluate and strengthen security across these partners. This informs a “shared responsibility” solution that recognises that security is multi-layered and requires collaboration to be successful. This shared responsibility security framework improves visibility, understanding, and control across the entire supply chain, and particularly for those water utilities that are accountable for safe and continuous operations.Keywords: cyber security, shared responsibility, IIOT, threat modelling
Procedia PDF Downloads 771157 The Effects of Lipid Emulsion, Magnesium Sulphate and Metoprolol in Amitryptiline-Induced Cardiovascular Toxicity in Rats
Authors: Saylav Ejder Bora, Arife Erdogan, Mumin Alper Erdogan, Oytun Erbas, Ismet Parlak
Abstract:
Objective: The aim of this study was to evaluate histological, electrical and biochemical effects of metoprolol, lipid emulsion and magnesium sulphate as an alternative method to be used in preventing long QT emergence, that is among the lethal consequences of amitryptiline toxicity. Methods: Thirty Sprague- Dawley male rats were included. Rats were randomly separated into 5 groups. First group was administered saline only while the rest had received amitryptiline 100 mg/kg + saline, 5 mg/kg metoprolol, 20 ml/kg lipid emulsion and 75 mg/kg magnesium sulphate (MgSO4) intraperitoneally. ECG at DI lead, biochemical tests following euthanasia were performed in all groups after 1 hour of administration. Cardiac tissues were removed, sections were prepared and examined. Results: QTc values were significantly shorter in the rest when compared to amitryptiline+ saline group. While lipid emulsion did not affect proBNP and troponin values biochemically as compared to that of the control group, histologically, it was with reduced caspase 3 expression. Though statistically insignificant in the context of biochemical changes, pro-BNP and urea levels were lower in the metoprolol group when compared to controls. Similarly, metoprolol had no statistically significant effect on histological caspase 3 expression in the group that was treated with amitryptiline+metoprolol. On the other hand, there was a statistically significant decrease in Troponin, pro-BNP and urea levels as well as significant decline in histological caspase 3 expression within the MgSO4 group when compared to controls. Conclusion: As still a frequent cause of mortality in emergency units, administration of MgSO4, lipid emulsion and metoprolol might be beneficial in alternative treatment of cardiovascular toxicity caused by tricyclic antidepressant overdose, whether intake would be intentional or accidental.Keywords: amitryptiline, cardiovascular toxicity, long QT, Rat Model
Procedia PDF Downloads 1761156 Study of Silent Myocardial Ischemia in Type 2 Diabeic Males: Egyptian Experience
Authors: Ali Kassem, Yhea Kishik, Ali Hassan, Mohamed Abdelwahab
Abstract:
Introduction: Accelerated coronary and peripheral vascular atherosclerosis is one of the most common and chronic complications of diabetes mellitus. A recent aspect of coronary artery disease in this condition is its silent nature. The aim of the work: Detection of the prevalence of silent myocardial ischemia (SMI) in Upper Egypt type 2 diabetic males and to select male diabetic population who should be screened for SMI. Patients and methods: 100 type 2 diabetic male patients with a negative history of angina or anginal equivalent symptoms and 30 healthy control were included. Full medical history and thorough clinical examination were done for all participants. Fasting and post prandial blood glucose level, lipid profile, (HbA1c), microalbuminuria, and C-reactive protein were done for all participants Resting ECG, trans-thoracic echocardiography, treadmill exercise ECG, myocardial perfusion imaging were done for all participants and patients positive for one or more NITs were subjected for coronary angiography. Results Twenty nine patients (29%) were positive for one or more NITs in the patients group compared to only one case (3.3%) in the controls. After coronary angiography, 20 patients were positive for significant coronary artery stenosis in the patients group, while it was refused to be done by the patient in the controls. There were statistical significant difference between the two groups regarding, hypertension, dyslipidemia and obesity, family history of DM and IHD with higher levels of microalbuminuria, C-reactive protein, total lipids in patient group versus controls According to coronary angiography, patients were subdivided into two subgroups, 20 positive for SMI (positive for coronary angiography) and 80 negative for SMI (negative for coronary angiography). No statistical difference regarding family history of DM and type of diabetic therapy was found between the two subgroups. Yet, smoking, hypertension, obesity, dyslipidemia and family history of IHD were significantly higher in diabetics positive versus those negative for SMI. 90% of patients in subgroup positive for SMI had two or more cardiac risk factors while only two patients had one cardiac risk factor (10%). Uncontrolled DM was detected more in patients positive for SMI. Diabetic complications were more prevalent in patients positive for SMI versus those negative for SMI. Most of the patients positive for SMI have DM more than 5 years duration. Resting ECG and resting Echo detected only 6 and 11 cases, respectively, of the 20 positive cases in group positive for SMI compared to treadmill exercise ECG and myocardial perfusion imaging that detected 16 and 18 cases respectively, Conclusion: Type 2 diabetic male patients should be screened for detection of SMI when aged above 50 years old, diabetes duration is more than 5 years, presence of two or more cardiac risk factors and/or patients suffering from one or more of the chronic diabetic complications. CRP, is an important parameter for selection of type 2 diabetic male patients who should be screened for SMI. Non invasive cardiac tests are reliable for screening of SMI in these patients in our locality.Keywords: C-reactive protein, Silent myocardial ischemia, Stress tests, type 2 DM
Procedia PDF Downloads 3851155 Effect of Environmental Changes in Working Heart Rate among Industrial Workers: An Ergonomic Interpretation
Authors: P. Mukhopadhyay, N. C. Dey
Abstract:
Occupational health hazard is a very common term in every emerging country. Along with the unorganized sector, most organized sectors including government industries are suffering from this affliction. In addition to workload, the seasonal changes also have some impacts on working environment. With this focus in mind, one hundred male industrial workers, who are directly involved to the task of Periodic Overhauling (POH) in a fabricating workshop in the public domain are selected for this research work. They have been studied during work periods throughout different seasons in a year. For each and every season, the participants working heart rate (WHR) is measured and compared with the standards given by different national and internationally recognized agencies i.e., World Health Organization (WHO) and American Conference of Governmental Industrial Hygienists (ACGIH) etc. The different environmental parameters i.e. dry bulb temperature (DBT), wet bulb temperature (WBT), globe temperature (GT), natural wet bulb temperature (NWB), relative humidity (RH), wet bulb globe temperature (WBGT), air velocity (AV), effective temperature (ET) are recorded throughout the seasons to critically observe the effect of seasonal changes on the WHR of the workers. The effect of changes in environment to the WHR of the workers is very much surprising. It is found that the percentages of workers who belong to the ‘very heavy’ workload category are 83.33%, 66.66% and 16.66% in the summer, rainy and winter seasons, respectively. Ongoing undertaking of this type of job profile forces the worker towards occupational disorders causing absenteeism. This occurrence results in lower production rates, and on the other hand, costs due to medical claims also weaken the industry’s economic condition. In this circumstance, the authors are trying to focus on some remedial measures from the ergonomic angle by proposing a new work/ rest regimen and introducing engineering controls along with management controls which may help the worker, and consequently, the management also.Keywords: workload, working heart rate, occupational health hazard, industrial worker
Procedia PDF Downloads 1341154 Restorative Justice to the Victims of Terrorism in the Criminal Justice System of India
Authors: Sumanta Meher, Gaurav Shukla
Abstract:
The torments of the victims of terrorism have not only confined to loss of life and limp but also includes the physiological trauma to the innocent victims. The physical wounds may heal, but the trauma remains in the mind and heart of the victims and their loved ones; however, one should not deny that these terrorist activities affect to a major extent to their livelihood. To protect their human rights and restore the shattered lives of the victims of terrorism all the Nations beyond their differences have to show solidarity and frame a comprehensive restorative policy with an effective implementing mechanism. The General Assembly of United Nations, through its several resolutions, has appealed Nations to show solidarity and also committed to helping the Members State to frame the law and policy to support the victims of terrorism. To achieve the objectives of the resolutions adopted by the United Nations, the Indian legislators in 2008 amended the Code of Criminal Procedure, 1973 and incorporated Section 357A to provide financial assistance to the victims of terrorism. In India, the contemporary developments in the victims’ oriented studies have increased the dimension of the traditional criminal justice systems to protect the rights of the victims. In this regard, the paper has ascertained the Indian legal framework in respect to the restorative justice to the victims of terrorism and also addressed the question as to whether the statutory provisions and enforcement mechanisms are efficient enough to protect the human rights of the victims of terrorism. For that purpose, the paper has analyzed the International instruments and the reports with regard to the compensation to the victims of terrorist attacks, with that, the article also evaluates the initiatives of United Nations to help Members State to frame the law and policies to support the victims of terrorism. The study also made an attempt to critically analyze the legal provisions of compensation and rehabilitation of the victims of terrorist attacks in India and whether they are in alignment with the International standards. While concluding, the paper has made an endeavor for a robust legal framework towards the restorative justice for the victims of terrorism in India.Keywords: victims of terrorism, restorative justice, human rights, criminal justice system of India
Procedia PDF Downloads 1601153 A Study on the Influence of Salicylic Acid on Sub-Mergence Stress Recovery of Selected Rice Cultivars Grown in Kebbi State Northwest Nigeria
Authors: Ja'afar Umar, Salisu Naziru
Abstract:
Submergence stress in plants refers to the physiological and biochemical challenges that occur when plants are partially or fully submerged in water. This type of stress primarily affects plants in flood-prone areas or regions with heavy rainfall, where oxygen availability and other essential resources are limited. Salicylic acid (SA) is an important plant hormone involved in various physiological processes and responses to environmental stress, particularly in plant defense mechanisms against pathogens. Its role as a signaling molecule in plants is crucial for activating defense pathways, regulating growth, and managing responses to biotic (living) and abiotic (non-living) stresses. The study involved using salicylic acid (SA) at concentrations of 1g/L, 2g/L, and 3g/L, dissolved in water, to treat rice plants during submergence stress. The experiment had four treatments: 0g/L (control), 1g/L, 2g/L, and 3g/L of SA, each with four replications. Rice seedlings were submerged in water for 11 days and then desubmerged for 7 days. During the experiment, all plants except the control received a foliar spray of SA solutions, while control plants were sprayed with distilled water. The results indicate a significant difference (P<0.05) between the control and salicylic acid (SA)-treated rice plants. SalicyJalic acid, particularly at concentrations of 1g/L, 2g/L, and 3g/L, generally improved the recovery of all four rice cultivars from submergence stress, as reflected by increased numbers of nodes, longer internodes, taller plants, and longer root lengths compared to untreated controls. Salicylic acid, particularly at concentrations of 1g/L, 2g/L, and 3g/L, generally improved the recovery of all four rice cultivars from submergence stress, as reflected by increased numbers of nodes, longer internodes, taller plants, and longer root lengths compared to untreated controls.Keywords: submergence, stress, rice, salicylic
Procedia PDF Downloads 181152 Some Tips for Increasing Online Services Safety
Authors: Mohsen Rezaee
Abstract:
Although robust security softwares, including anti-viruses, anti-spywares, anti-spam and firewalls are amalgamated with new technologies such as safe zone, hybrid cloud, sand box and etc., and although it can be said that they have managed to prepare highest level of security against viruses, spywares and other malwares in 2012, in fact, hacker attacks to websites are increasingly becoming more and more complicated. Because of security matters developments it can be said it was expected to happen so. Here in this work we try to point out some functional and vital notes to enhance security on the web, enabling the user to browse safely in unlimited web world and to use virtual space securely.Keywords: firewalls, security, web services, computer science
Procedia PDF Downloads 4041151 Cross Site Scripting (XSS) Attack and Automatic Detection Technology Research
Authors: Tao Feng, Wei-Wei Zhang, Chang-Ming Ding
Abstract:
Cross-site scripting (XSS) is one of the most popular WEB Attacking methods at present, and also one of the most risky web attacks. Because of the population of JavaScript, the scene of the cross site scripting attack is also gradually expanded. However, since the web application developers tend to only focus on functional testing and lack the awareness of the XSS, which has made the on-line web projects exist many XSS vulnerabilities. In this paper, different various techniques of XSS attack are analyzed, and a method automatically to detect it is proposed. It is easy to check the results of vulnerability detection when running it as a plug-in.Keywords: XSS, no target attack platform, automatic detection,XSS detection
Procedia PDF Downloads 4041150 Real Time PCR Analysis of microRNA Expression in Oral Cancer
Authors: Karl Kingsley
Abstract:
Many mechanisms are involved in the control of cellular differentiation and growth, which are often dysregulated in many cancers. Many distinct pathways are involved in these mechanisms of control, including deoxyribonuclease (DNA) methyltransferase and histone deacetylase (HDAC) activation that controls both genetic and epigenetic modifications and micro ribonucleic acid (RNA) expression. Less is known about the expression of DNA methyltransferase (DNMT) and HDAC in oral cancers and the effect on microRNA expression. The primary objective of this study was to evaluate the expression of DNMT and HDAC family members in oral cancer and the concomitant expression of cancer-associated microRNAs. Using commercially available oral cancers, including squamous cell carcinoma (SCC)-4, SCC-9, SCC-15, and SCC-25, RNA was extracted and screened for DNMT, HDAC, and microRNA expression using highly-specific primers and quantitative polymerase chain reaction (qPCR). These data revealed low or absent expression of DNMT-1, which is associated with cellular differentiation but increased expression of DNMT-3a and DNMT-3b in all SCC cell lines compared with normal non-cancerous cell controls. In addition, no expression of HDAC1 and HDAC2 expression was found among the normal, non-cancerous cells but was highly expressed in each of the SCC cell lines examined. Differential expression of oncogenic and cancer-associated microRNAs was also observed among the SCC cell lines, including miR-21, miR-133, miR-149, miR-155, miR-365, and miR-720. These findings also appeared to vary according to observed growth rates among these cells. These data may be the first to demonstrate the expression and association between HDAC and DNMT3 family members among oral cancers. In addition, the differential expression of these epigenetic modifiers may be associated with the expression of specific microRNAs in these cancers, which have not previously been observed to the best of the author's knowledge. In addition, some associations and relationships may exist between the expression of these biomarkers and the rates of growth and proliferation, which may suggest that these expression patterns might represent potentially useful biomarkers to determine tumor aggressiveness and other phenotypic behaviors among oral cancers.Keywords: oral cancer, DNA methyltransferase, histone deacetylase, microRNA
Procedia PDF Downloads 1411149 Serum Interlukin-8 and Immunomodulation in Beta Thalassemia Patients
Authors: Shahira El Shafie, Hanaa Eldash, Engy Ghabbour, Mohamed Eid
Abstract:
Several immunologic defects can be found in patients with beta-thalassemia, among which the impairment of neutrophil phagocytic function is of utmost importance. Attention has been directed to the role of proinflammatory cytokines in neutrophil chemotaxis and phagocytosis. Interleukin-8 (IL-8) is an important chemotactic and activation peptide for neutrophils; changes in IL-8 level and potential correlation with neutrophil function can be relevant to immunomodulation pathophysiology in beta-thalassemia patients. This case-control study aimed to evaluate IL-8 level and to assess granulocyte recruitment, as markers of immunomodulation, in poly-transfused thalassemia patients attending Fayoum University Hospitals. The study was conducted on 50 patients with ß thalassemia and 32 age-matched controls. 21/50 patients were transfused more than ten times, and 29/50 were transfused in a lower frequency. Patients and controls were subjected to thorough history taking and clinical examination, measurement of IL-8 level using human IL-8 ELISA kit, and Rebuck skin window technique (RSWT) to assess granulocyte recruitment. Our data showed statistically significant higher levels of IL-8 in ß thalassemia patients compared to control with a much higher difference in patients transfused more than ten times. Neutrophil recruitment was significantly lower in ß thalassemia patients compared to control at 4 hours and 24 hours test time. Although IL-8, the main chemotactic pro-inflammatory cytokine showed a higher level in thalassemia patients, neutrophils recruitment was significantly lower, especially in those receiving more than ten transfusion times. Our findings suggest a possible role of other neutrophil chemotactic factors, defective neutrophil response, or increased IL-8 as compensation of abnormal function. We recommend the use of IL-8 and Rebuck skin window technique as useful markers of immunomodulation in thalassemia and further study for these biomarkers to assess their clinical implications and impact on the management of thalassemia patients.Keywords: beta-thalassemia, Interleukin-8, Rebuck skin window technique, immunomodulation
Procedia PDF Downloads 1871148 Choosing an Optimal Epsilon for Differentially Private Arrhythmia Analysis
Authors: Arin Ghazarian, Cyril Rakovski
Abstract:
Differential privacy has become the leading technique to protect the privacy of individuals in a database while allowing useful analysis to be done and the results to be shared. It puts a guarantee on the amount of privacy loss in the worst-case scenario. Differential privacy is not a toggle between full privacy and zero privacy. It controls the tradeoff between the accuracy of the results and the privacy loss using a single key parameter calledKeywords: arrhythmia, cardiology, differential privacy, ECG, epsilon, medi-cal data, privacy preserving analytics, statistical databases
Procedia PDF Downloads 1521147 Surveying Apps in Dam Excavation
Authors: Ali Mohammadi
Abstract:
Whenever there is a need to dig the ground, the presence of a surveyor is required to control the map. In projects such as dams and tunnels, these controls are more important because any mistakes can increase the cost. Also, time is great importance in These projects have and one of the ways to reduce the drilling time is to use techniques that can reduce the mapping time in these projects. Nowadays, with the existence of mobile phones, we can design apps that perform calculations and drawing for us on the mobile phone. Also, if we have a device that requires a computer to access its information, by designing an app, we can transfer its information to the mobile phone and use it, so we will not need to go to the office.Keywords: app, tunnel, excavation, dam
Procedia PDF Downloads 671146 Multiscale Process Modeling Analysis for the Prediction of Composite Strength Allowables
Authors: Marianna Maiaru, Gregory M. Odegard
Abstract:
During the processing of high-performance thermoset polymer matrix composites, chemical reactions occur during elevated pressure and temperature cycles, causing the constituent monomers to crosslink and form a molecular network that gradually can sustain stress. As the crosslinking process progresses, the material naturally experiences a gradual shrinkage due to the increase in covalent bonds in the network. Once the cured composite completes the cure cycle and is brought to room temperature, the thermal expansion mismatch of the fibers and matrix cause additional residual stresses to form. These compounded residual stresses can compromise the reliability of the composite material and affect the composite strength. Composite process modeling is greatly complicated by the multiscale nature of the composite architecture. At the molecular level, the degree of cure controls the local shrinkage and thermal-mechanical properties of the thermoset. At the microscopic level, the local fiber architecture and packing affect the magnitudes and locations of residual stress concentrations. At the macroscopic level, the layup sequence controls the nature of crack initiation and propagation due to residual stresses. The goal of this research is use molecular dynamics (MD) and finite element analysis (FEA) to predict the residual stresses in composite laminates and the corresponding effect on composite failure. MD is used to predict the polymer shrinkage and thermomechanical properties as a function of degree of cure. This information is used as input into FEA to predict the residual stresses on the microscopic level resulting from the complete cure process. Virtual testing is subsequently conducted to predict strength allowables. Experimental characterization is used to validate the modeling.Keywords: molecular dynamics, finite element analysis, processing modeling, multiscale modeling
Procedia PDF Downloads 921145 Molecular Detection of Helicobacter Pylori and Its Association with TNFα-308 Polymorphism in Cardiovascular Diseases
Authors: Azar Sharafianpor, Hossein Rassi, Fahimeh Nemati Mansur
Abstract:
Cardiovascular diseases (CVD) are the most important cause of death in industrialized and developing countries such as Iran. The most important risk factors for the CVD, genetic factors and chronic infectious agents, such as Helicobacter pylori, can be mentioned. The TNFα gene is one of the most important anti-inflammatory cytokines that can affect the sensitivity, efficacy, and ability of the immune response to chronic infections. Some TNF-α gene polymorphisms, including the replacement of the G nucleotide G with A at position 308 in the promoter region of TNF-α, increase the transcription of cytokines in the target cells and thus predispose a person to chronic infections. This study examines the TNF-α 308 polymorphism and its association with Helicobacter pylori infection in this disease. This study was a case-control study in which 154 patients were examined as cases or patients with symptoms of myocardial infarction or angina and 160 as controls or healthy subjects. All of the subjects at different ages were given venous blood and age, BMI, cholesterol, LDL, and HDL were determined. DNA was extracted from the specimens, and the cagA gene from H. pylori and the TNF-α-308 polymorphism were determined by PCR in patients and healthy subjects. Statistical analysis was performed with Epi Info software. The results showed that the frequency of H. pylori infection in the patients and healthy group were 53.23% (82 out of 154) and 47.5% (76 out of 160). There was no significant difference in H. pylori outbreak between the two groups. The frequencies of TNF-α-308 genotype for GG, GA, and AA in patients were 0.17, 0.49, and 0.34, respectively, whereas for controls 0.47, 0.35, and 0.18 for GG, GA, and AA, respectively. The frequency of genotype analysis of TNF-α-308 polymorphisms in both patients and healthy groups showed that there was a significant difference in the frequency of genotypes and the AA genotype was higher in the affected individuals. Also, there was a significant relationship between the genotype and the contamination with H. pylori and changes in cholesterol, LDL, and HDL levels were observed. The results of the study indicate that H. pylori detection in individuals with AA genotype in people under 50 years of age can play an important role in early diagnosis and treatment of cardiovascular disease.Keywords: Helicobacter pylori, TNFα gene, cardiovascular diseases, TNFα-308 polymorphism
Procedia PDF Downloads 1531144 Broccoli Sprouts Powder Could Improve Metabolic and Liver Disorder-Induced by High-Fructose Corn Syrup
Authors: Zahra Bahadoran, Parvin Mirmiran, Hanieh-Sadat Ejtahed, Maryam Tohidi, Fereidoun Azizi
Abstract:
Background and Aim: Broccoli sprouts, rich source of bioactive compounds specially sulforaphane (SFN), have unique functional properties. This study was conducted to investigate the possible treatment effects of high-SFN broccoli sprouts powder on metabolic and liver disorders in rats fed with high-fructose corn syrup. Methods: Thirty-two male wistar rats, pretreated with an eight-week high-fructose diet (water containing 30% fructose), were randomly allocated into three groups: Baseline control (BC), control (C) (normal diet), and BSP-diet (normal diet+5% BSP). The duration of the study was 6 weeks. Biochemical measurements, liver weight and triglyceride content were evaluated and histopathological examination of liver was performed. Results: After 6-weeks, the liver weight was significantly lower in BSP group compared to controls (13.4 g vs. 11.4 g, P<0.05). After 6 weeks, a significant decrease was observed in fasting serum glucose, total cholesterol and triglyceride levels in both experimental groups (P<0.05). Compared to controls, serum levels of HDL-C were significantly higher in BSP group. The liver TG content in BSP compared to control group was lower (14.6 vs. 16.4 mg/mg tissue). The hepatic levels of alanine aminotransferase, aspartate aminotransferase and γ-glutamyl transferase had not considerable changes in the groups after the intervention period but the level of alkaline phosphatase significantly decreased in BSP group (P<0.05). The histopathological examination of liver confirmed a decrease lobular and portal inflammation and ballooning in BSP group compared to control. Conclusion: High-SFN broccoli sprouts powder has beneficials effect on metabolic and liver changes-induced by high fructose corn syrup.Keywords: broccoli sprouts, metabolic disorders, fatty liver, food science
Procedia PDF Downloads 4241143 The High Quality Colored Wind Chimes by Anodization on Aluminum Alloy
Authors: Chia-Chih Wei, Yun-Qi Li, Ssu-Ying Chen, Hsuan-Jung Chen, Hsi-Wen Yang, Chih-Yuan Chen, Chien-Chon Chen
Abstract:
In this paper we used high quality anodization technique to make colored wind chime with a nano-tube structure anodic film, which controls the length to diameter ratio of an aluminum rod and controls the oxide film structure on the surface of the aluminum rod by anodizing method. The research experiment used hard anodization to grow a controllable thickness of anodic film on aluminum alloy surface. The hard anodization film has high hardness, high insulation, high temperature resistance, good corrosion resistance, colors, and mass production properties can be further applied to transportation, electronic products, biomedical fields, or energy industry applications. This study also in-depth research and detailed discussion in the related process of aluminum alloy surface hard anodizing including pre-anodization, anodization, and post-anodization. The experiment parameters of anodization including using a mixed acid solution of sulfuric acid and oxalic acid as an anodization electrolyte, and control the temperature, time, current density, and final voltage to obtain the anodic film. In the experiments results, the properties of anodic film including thickness, hardness, insulation, and corrosion characteristics, microstructure of the anode film were measured and the hard anodization efficiency was calculated. Thereby obtaining different transmission speeds of sound in the aluminum rod and different audio sounds can be presented on the aluminum rod. Another feature of the present invention is the use of anodizing method dyeing method, laser engraving patterning and electrophoresis method to make colored aluminum wind chimes.Keywords: anodization, colored, high quality, wind chime, nano-tube
Procedia PDF Downloads 2451142 Mango (Mangifera indica L.) Lyophilization Using Vacuum-Induced Freezing
Authors: Natalia A. Salazar, Erika K. Méndez, Catalina Álvarez, Carlos E. Orrego
Abstract:
Lyophilization, also called freeze-drying, is an important dehydration technique mainly used for pharmaceuticals. Food industry also uses lyophilization when it is important to retain most of the nutritional quality, taste, shape and size of dried products and to extend their shelf life. Vacuum-Induced during freezing cycle (VI) has been used in order to control ice nucleation and, consequently, to reduce the time of primary drying cycle of pharmaceuticals preserving quality properties of the final product. This procedure has not been applied in freeze drying of foods. The present work aims to investigate the effect of VI on the lyophilization drying time, final moisture content, density and reconstitutional properties of mango (Mangifera indica L.) slices (MS) and mango pulp-maltodextrin dispersions (MPM) (30% concentration of total solids). Control samples were run at each freezing rate without using induced vacuum. The lyophilization endpoint was the same for all treatments (constant difference between capacitance and Pirani vacuum gauges). From the experimental results it can be concluded that at the high freezing rate (0.4°C/min) reduced the overall process time up to 30% comparing process time required for the control and VI of the lower freeze rate (0.1°C/min) without affecting the quality characteristics of the dried product, which yields a reduction in costs and energy consumption for MS and MPM freeze drying. Controls and samples treated with VI at freezing rate of 0.4°C/min in MS showed similar results in moisture and density parameters. Furthermore, results from MPM dispersion showed favorable values when VI was applied because dried product with low moisture content and low density was obtained at shorter process time compared with the control. There were not found significant differences between reconstitutional properties (rehydration for MS and solubility for MPM) of freeze dried mango resulting from controls, and VI treatments.Keywords: drying time, lyophilization, mango, vacuum induced freezing
Procedia PDF Downloads 4101141 Artificial Neural Network Based Model for Detecting Attacks in Smart Grid Cloud
Authors: Sandeep Mehmi, Harsh Verma, A. L. Sangal
Abstract:
Ever since the idea of using computing services as commodity that can be delivered like other utilities e.g. electric and telephone has been floated, the scientific fraternity has diverted their research towards a new area called utility computing. New paradigms like cluster computing and grid computing came into existence while edging closer to utility computing. With the advent of internet the demand of anytime, anywhere access of the resources that could be provisioned dynamically as a service, gave rise to the next generation computing paradigm known as cloud computing. Today, cloud computing has become one of the most aggressively growing computer paradigm, resulting in growing rate of applications in area of IT outsourcing. Besides catering the computational and storage demands, cloud computing has economically benefitted almost all the fields, education, research, entertainment, medical, banking, military operations, weather forecasting, business and finance to name a few. Smart grid is another discipline that direly needs to be benefitted from the cloud computing advantages. Smart grid system is a new technology that has revolutionized the power sector by automating the transmission and distribution system and integration of smart devices. Cloud based smart grid can fulfill the storage requirement of unstructured and uncorrelated data generated by smart sensors as well as computational needs for self-healing, load balancing and demand response features. But, security issues such as confidentiality, integrity, availability, accountability and privacy need to be resolved for the development of smart grid cloud. In recent years, a number of intrusion prevention techniques have been proposed in the cloud, but hackers/intruders still manage to bypass the security of the cloud. Therefore, precise intrusion detection systems need to be developed in order to secure the critical information infrastructure like smart grid cloud. Considering the success of artificial neural networks in building robust intrusion detection, this research proposes an artificial neural network based model for detecting attacks in smart grid cloud.Keywords: artificial neural networks, cloud computing, intrusion detection systems, security issues, smart grid
Procedia PDF Downloads 3181140 Re-Emergence of Religious Militancy in Pakistan after Return of Afghan Taliban to Power Corridors in Afghanistan (2021-2022)
Authors: Syed Sibtain Hussain Shah
Abstract:
The Afghan Taliban returned to power corridors in Afghanistan in August 2021 after waging a twenty-year insurgency in the country. U.S.-led forces completed their withdrawal from Afghanistan on August 30, 2021, but the Taliban took control of the whole country till August 15, 2021. At the same time, some of the militant groups such as Tehrik-e-Taliban Pakistan (TTP) and Islamic State Khurasan (IS-K) reappeared in Pakistan’s borders and other areas and by increasing attacks on the armed forces of Pakistan and minorities communities. These groups once again created a crucial challenge to the internal security of the country. Since mid of 2021, many of the terrorist incidents in the countries specified in the areas of Pakistan bordering Afghanistan were committed by TTP and IS-K. The aim of this paper is to investigate the reappearance of TTP and IS-K in 2021 and 2022 as a crucial threat to the internal security of Pakistan. The author will particularly probe threats to the security of military personnel and their installations and threats to human security, including danger to religious minority communities in the different areas of the country, including border areas such as Waziristan, which was once a hub of TTP and other militant groups in the 2000s. The author will employ the relevant method and appropriate theories of security studies, such as religious extremism and terrorism, in this study. TTP, inspired by the Afghan Taliban, initially emerged in Pakistan in 2007 and this group has so far targeted various religious and ethnic communities and government installations in Pakistan. The group is not only against Pakistan’s government policies, but it also committed terrorist attacks on the communities of the other Muslim sects and as well as non-Muslim communities. Most of the prominent figures of this violent group disappeared or escaped to Afghanistan after military actions, such as the larger “Zarb-e-Azb” operation in Pakistan in 2015. IS-K, which established its branch of Khurasan covering Pakistan and Afghanistan in 2015, with its main formation in Iraq and Syria in 2015, by targeting religious minorities such as Shia Muslims, has so far created a vital security challenge for the security of the country.Keywords: Pakistan, Afghanistan, Afghan Taliban, Pakistani Taliban, Islamic state Khorasan, security threat
Procedia PDF Downloads 1421139 The Impact of Legislation on Waste and Losses in the Food Processing Sector in the UK/EU
Authors: David Lloyd, David Owen, Martin Jardine
Abstract:
Introduction: European weight regulations with respect to food products require a full understanding of regulation guidelines to assure regulatory compliance. It is suggested that the complexity of regulation leads to practices which result to over filling of food packages by food processors. Purpose: To establish current practices by food processors and the financial, sustainable and societal impacts on the food supply chain of ineffective food production practices. Methods: An analysis of food packing controls with 10 companies of varying food categories and quantitative based research of a further 15 food processes on the confidence in weight control analysis of finished food packs within their organisation. Results: A process floor analysis of manufacturing operations focussing on 10 products found over fill of packages ranging from 4.8% to 20.2%. Standard deviation figures for all products showed a potential for reducing average weight of the pack whilst still retain the legal status of the product. In 20% of cases, an automatic weight analysis machine was in situ however weight packs were still significantly overweight. Collateral impacts noted included the effect of overfill on raw material purchase and added food miles often on a global basis with one raw material alone creating 10,000 extra food miles due to the poor weight control of the processing unit. A case study of a meat and bakery product will be discussed with the impact of poor controls resulting from complex legislation. The case studies will highlight extra energy costs in production and the impact of the extra weight on fuel usage. If successful a risk assessment model used primarily on food safety but adapted to identify waste /sustainability risks will be discussed within the presentation.Keywords: legislation, overfill, profile, waste
Procedia PDF Downloads 4071138 Correlation between the Levels of Some Inflammatory Cytokines/Haematological Parameters and Khorana Scores of Newly Diagnosed Ambulatory Cancer Patients
Authors: Angela O. Ugwu, Sunday Ocheni
Abstract:
Background: Cancer-associated thrombosis (CAT) is a cause of morbidity and mortality among cancer patients. Several risk factors for developing venous thromboembolism (VTE) also coexist with cancer patients, such as chemotherapy and immobilization, thus contributing to the higher risk of VTE in cancer patients when compared to non-cancer patients. This study aimed to determine if there is any correlation between levels of some inflammatory cytokines/haematological parameters and Khorana scores of newly diagnosed chemotherapy naïve ambulatory cancer patients (CNACP). Methods: This was a cross-sectional analytical study carried out from June 2021 to May 2022. Eligible newly diagnosed cancer patients 18 years and above (case group) were enrolled consecutively from the adult Oncology Clinics of the University of Nigeria Teaching Hospital, Ituku/Ozalla (UNTH). The control group was blood donors at UNTH Ituku/Ozalla, Enugu blood bank, and healthy members of the Medical and Dental Consultants Association of Nigeria (MDCAN), UNTH Chapter. Blood samples collected from the participants were assayed for IL-6, TNF-Alpha, and haematological parameters such as haemoglobin, white blood cell count (WBC), and platelet count. Data were entered into an Excel worksheet and were then analyzed using Statistical Package for Social Sciences (SPSS) computer software version 21.0 for windows. A P value of < 0.05 was considered statistically significant. Results: A total of 200 participants (100 cases and 100 controls) were included in the study. The overall mean age of the participants was 47.42 ±15.1 (range 20-76). The sociodemographic characteristics of the two groups, including age, sex, educational level, body mass index (BMI), and occupation, were similar (P > 0.05). Following One Way ANOVA, there were significant differences between the mean levels of interleukin-6 (IL-6) (p = 0.036) and tumor necrotic factor-α (TNF-α) (p = 0.001) in the three Khorana score groups of the case group. Pearson’s correlation analysis showed a significant positive correlation between the Khorana scores and IL-6 (r=0.28, p = 0.031), TNF-α (r= 0.254, p= 0.011), and PLR (r= 0.240, p=0.016). The mean serum levels of IL-6 were significantly higher in CNACP than in the healthy controls [8.98 (8-12) pg/ml vs. 8.43 (2-10) pg/ml, P=0.0005]. There were also significant differences in the mean levels of the haemoglobin (Hb) level (P < 0.001)); white blood cell (WBC) count ((P < 0.001), and platelet (PL) count (P = 0.005) between the two groups of participants. Conclusion: There is a significant positive correlation between the serum levels of IL-6, TNF-α, and PLR and the Khorana scores of CNACP. The mean serum levels of IL-6, TNF-α, PLR, WBC, and PL count were significantly higher in CNACP than in the healthy controls. Ambulatory cancer patients with high-risk Khorana scores may benefit from anti-inflammatory drugs because of the positive correlation with inflammatory cytokines. Recommendations: Ambulatory cancer patients with 2 Khorana scores may benefit from thromboprophylaxis since they have higher Khorana scores. A multicenter study with a heterogeneous population and larger sample size is recommended in the future to further elucidate the relationship between IL-6, TNF-α, PLR, and the Khorana scores among cancer patients in the Nigerian population.Keywords: thromboprophylaxis, cancer, Khorana scores, inflammatory cytokines, haematological parameters
Procedia PDF Downloads 821137 Pollution-Sources, Controls, and Impact Analysis
Authors: Aditi Acharya
Abstract:
Environmental pollution is threatening the environmental and human health in the most drastic way. This paper provides insight about the affects of environmental pollution in the perspective of water pollution. Sewage in drinking water, the increasing contamination of water bodies and water resources and the human beings are the major contributors, increasing the harsh activities of pollution. The research presents information about the sources of pollution, its impacts and control activities to be undertaken to make our environment free from water pollution.Keywords: environmental pollution, water pollution, nanotechnology, nanomaterials
Procedia PDF Downloads 3631136 Simple Ways to Enhance the Security of Web Services
Authors: Majid Azarniush, Soroush Mokallaei
Abstract:
Although robust security software, including anti-viruses, anti spy wares, anti-spam and firewalls, are amalgamated with new technologies such as Safe Zone, Hybrid Cloud, Sand Box etc., and it can be said that they have managed to prepare highest level of security against viruses, spy wares and other malwares in 2012, but in fact hackers' attacks to websites are increasingly becoming more and more complicated. Because of security matters and developments, it can be said that it was expected to happen so. Here in this work, we try to point out to some functional and vital notes to enhance security on the web enabling the user to browse safely in no limit web world and to use virtual space securely.Keywords: firewalls, security, web services, software
Procedia PDF Downloads 512