Search results for: malware infection propagating malicious code
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2981

Search results for: malware infection propagating malicious code

2531 The Impact of a Prior Haemophilus influenzae Infection in the Incidence of Prostate Cancer

Authors: Maximiliano Guerra, Lexi Frankel, Amalia D. Ardeljan, Sarah Ghali, Diya Kohli, Omar M. Rashid.

Abstract:

Introduction/Background: Haemophilus influenzae is present as a commensal organism in the nasopharynx of most healthy adults from where it can spread to cause both systemic and respiratory tract infection. Pathogenic properties of this bacterium as well as defects in host defense may result in the spread of these bacteria throughout the body. This can result in a proinflammatory state and colonization particularly in the lungs. Recent studies have failed to determine a link between H. Influenzae colonization and prostate cancer, despite previous research demonstrating the presence of proinflammatory states in preneoplastic and neoplastic prostate lesions. Given these contradictory findings, the primary goal of this study was to evaluate the correlation between H. Influenzae infection and the incidence of prostate cancer. Methods: To evaluate the incidence of Haemophilus influenzae infection and the development of prostate cancer in the future we used data provided by a Health Insurance Portability and Accountability Act (HIPAA) compliant national database. We were afforded access to this database by Holy Cross Health, Fort Lauderdale for the express purpose of academic research. Standard statistical methods were employed in this study including Pearson’s chi-square tests. Results: Between January 2010 and December 2019, the query was analyzed and resulted in 13, 691 patients in both the control and C. difficile infected groups, respectively. The two groups were matched by age range and CCI score. In the Haemophilus influenzae infected group, the incidence of prostate cancer was 1.46%, while the incidence of the prostate cancer control group was 4.56%. The observed difference in cancer incidence was determined to be a statistically significant p-value (< 2.2x10^-16). This suggests that patients with a history of C. difficile have less risk of developing prostate cancer (OR 0.425, 95% CI: 0.382 - 0.472). Treatment bias was considered, the data was analyzed and resulted in two groups matched groups of 3,208 patients in both the infected with H. Influenzae treated group and the control who used the same medications for a different cause. Patients infected with H. Influenzae and treated had an incidence of prostate cancer of 2.49% whereas the control group incidence of prostate cancer was 4.92% with a p-value (< 2.2x10^-16) OR 0.455 CI 95% (0.526 -0.754), proving that the initial results were not due to the use of medications. Conclusion: The findings of our study reveal a statistically significant correlation between H. Influenzae infection and a decreased incidence of prostate cancer. Our findings suggest that prior infection with H. Influenzae may confer some degree of protection to patients and reduce their risk for developing prostate cancer. Future research is recommended to further characterize the potential role of Haemophilus influenzae in the pathogenesis of prostate cancer.

Keywords: Haemophilus Influenzae, incidence, prostate cancer, risk.

Procedia PDF Downloads 183
2530 Improvement of Model for SIMMER Code for SFR Corium Relocation Studies

Authors: A. Bachrata, N. Marie, F. Bertrand, J. B. Droin

Abstract:

The in-depth understanding of severe accident propagation in Generation IV of nuclear reactors is important so that appropriate risk management can be undertaken early in their design process. This paper is focused on model improvements in the SIMMER code in order to perform studies of severe accident mitigation of Sodium Fast Reactor. During the design process of the mitigation devices dedicated to extraction of molten fuel from the core region, the molten fuel propagation from the core up to the core catcher has to be studied. In this aim, analytical as well as the complex thermo-hydraulic simulations with SIMMER-III code are performed. The studies presented in this paper focus on physical phenomena and associated physical models that influence the corium relocation. Firstly, the molten pool heat exchange with surrounding structures is analysed since it influences directly the instant of rupture of the dedicated tubes favouring the corium relocation for mitigation purpose. After the corium penetration into mitigation tubes, the fuel-coolant interactions result in formation of debris bed. Analyses of debris bed fluidization as well as sinking into a fluid are presented in this paper.

Keywords: corium, mitigation tubes, SIMMER-III, sodium fast reactor

Procedia PDF Downloads 366
2529 Tracing the History of Indian Legal System Vis-A-Vis the Code of Hammurabi

Authors: Vandana Kumari

Abstract:

One of the most ancient and detailed legal codes proclaimed the Babylonian King Hammurabi during his reign in the erstwhile Mesopotamian society, provides a fascinating account of the social and justice system of Babylon. The 282 laws intricately carved on eight feet black stone stela serve as an important source of contemporary commercial, family and criminals laws. This paper attempts an inquiry into the contemporary relevance of this legal code to our current legal system. An exhaustive study of one of ancient legal system based on a series of practical experiences rather than being founded on mere theoretical ideologies can be assumed pertinent to the promulgation of practically viable laws in our country. The first chapter of the paper focuses on law seven which established the rules of commerce and the role of government in overseeing justice and honesty regarding the law of property. The second chapter deals with the laws of family, marriages, divorce and adoption prevailing in the Babylonian era. The third chapter traces the earliest known history of criminal jurisprudence which impregnated the principle of an eye for an eye. The paper is not merely a theoretical account of the Mesopotamian way of living but a novice attempt to discover the roots of Indian laws in the ruins of the courtrooms of the Hammurabi Empire.

Keywords: Babylonian legal system, Contemporary relevance, criminal jurisprudence, Hammurabi Code

Procedia PDF Downloads 289
2528 Effect of Bored Pile Diameter in Sand on Friction Resistance

Authors: Ashraf Mohammed M. Eid, Hossam El Badry

Abstract:

The bored pile friction resistance may be affected by many factors such as the method of construction, pile length and diameter, the soil properties, as well as the depth below ground level. These factors can be represented analytically to study the influence of diameter on the unit skin friction. In this research, the Egyptian Code of soil mechanics is used to assess the skin friction capacity for either the ordinary pile diameter as well as for the large pile diameter. The later is presented in the code and through the work of some researchers based on the results of investigations adopted for a sufficient number of field tests. The comparative results of these researchers with respect to the Egyptian Code are used to check the adequacy of both methods. Based on the results of this study, the traditional static formula adopted for piles of diameter less than 60 cm may be continually used for larger piles by correlating the analyzed formulae. Accordingly, the corresponding modified angle of internal friction is concluded demonstrating a reduction of shear strength due to soil disturbance along the pile shaft. Based on this research the difference between driven piles and bored piles constructed in same soil can be assessed and a better understanding can be evaluated for the effect of different factors on pile skin friction capacity.

Keywords: large piles, static formula, friction piles, sandy soils

Procedia PDF Downloads 478
2527 Investigating the Post-Liver Transplant Complications and Their Management in Children Referred to the Children’s Medical Center

Authors: Hosein Alimadadi, Fatemeh Farahmand, Ali Jafarian, Nasir Fakhar, Mohammad Hassan Sohouli, Neda Raeesi

Abstract:

Backgroundsː Regarding the important role of liver transplantation as the only treatment in many cases of end-stage liver disease in children, the aim of this study is to investigate the complications of liver transplantation and their management in children referred to the Children's Medical Center. Methods: This study is a cross-sectional study on pediatric patients who have undergone liver transplants in the years 2016 to 2021. The indication for liver transplantation in this population was confirmed by a pediatric gastroenterologist, and a liver transplant was performed by a transplant surgeon. Finally, information about the patient before and after the transplantation was collected and recorded. Results: A total of 53 patients participated in this study, including 25 (47.2%) boys and 28 (52.8%) girls. The most common causes of liver transplantation were cholestatic and metabolic diseases. The most common early complication of liver transplantation in children was acute cellular rejection (ACR) and anastomotic biliary stricture. The most common late complication in these patients was an infection which was observed in 56.6% of patients. Among the drug side effects, neurotoxicity (convulsions) was seen more in patients, and 15.1% of the transplanted patients died. Conclusion: In this study, the most common early complication of liver transplantation in children was ACR and biliary stricture, and the most common late complication was infection. Neurotoxicity (convulsions) was the most common side effect of drugs.

Keywords: liver transplantation, complication, infection, survival rate

Procedia PDF Downloads 61
2526 The Development of Clinical Nursing Practice Guidelines for Preventing of Infection during Intubation in Patients with Suspected or Confirmed COVID-19

Authors: Sarinra Thongmee, Krittaporn Prakobsaeng, Adithep Mingsuan, Chanyapak Polkhet, Supattra Wongsuk

Abstract:

The purposes of this research and developmentwasto develop and evaluation of the clinical nursingpractice guideline (CNPG) for the prevention infection during intubation in patient with suspected or confirmedCOVID-19 patient. This study was developed by using the evidencebased practice model of Soukup (2000) asa conceptual framework. The study consisted of 4 steps: 1) situational analysis of intubation service in patientswith confirmed COVID-19; 2) development of the CNPG; 3) apply the NPG to trial; and 4) evaluation of the CNPG. The sample consisted of 52 nurse anesthetists and 25 infected or suspected COVID-19 patients. The research instrument consisted of 1) the CNPG, which was developed by the researchers; 2) the nurses anesthetist opinion questionnaire to the guideline; 3) the evaluation practice form; and 4) the nurse anesthetist knowledge test on nursing care of patients infected with COVID-19. Data were analyzed by using descriptive statistics, and Wilcoxon matched-pairs signed rank test. The results revealed this developed CNPG consists of 4 sections: 1)the CNPG for airborne precautions2) the preparation of anesthetic and intubation equipments3) the roles and duties of the intubation team, 4) the guidelines for intubation in suspected or confirmed COVID-19 patients. The results of CNPG use found that 1)the provider: using NPG in providers revealed that nurse anesthetist had a higher mean of knowledge scores than before using CNPG statistically significant at the 0.05 level (p<0.01) and able to follow the NPG 100% inall activities. The anesthetic team was not infected with COVID-19 from intubation outside the operating room. 2)the client: the patient was safe, with no complications from intubation. Summary CNPG to prevent infection during reintubation of suspected or confirmedCOVID-19patient was appropriate and applicable to practice.

Keywords: clinical nursing practice guideline, prevention of infection, endotracheal intubation, COVID-19

Procedia PDF Downloads 133
2525 Study of COVID-19 Intensity Correlated with Specific Biomarkers and Environmental Factors

Authors: Satendra Pal Singh, Dalip Kr. Kakru, Jyoti Mishra, Rajesh Thakur, Tarana Sarwat

Abstract:

COVID-19 is still an intrigue as far as morbidity or mortality is concerned. The rate of recovery varies from person to person, & it depends upon the accessibility of the healthcare system and the roles played by the physicians and caregivers. It is envisaged that with the passage of time, people would become immune to this virus, and those who are vulnerable would sustain themselves with the help of vaccines. The proposed study deals with the severeness of COVID-19 is associated with some specific biomarkers linked to correlate age and gender. We will be assessing the overall homeostasis of the persons who were affected by the coronavirus infection and also of those who recovered from it. Some people show more severe effects, while others show very mild symptoms, however, they show low CT values. Thus far, it is unclear why the new strain of Covid has different effects on different people in terms of age, gender, and ABO blood typing. According to data, the fatality rate with heart disease was 10.5 percent, 7.3 percent were diabetic, and 6 percent who are already infected from other comorbidities. However, some COVID-19 cases are worse than others & it is not fully explainable as of date. Overall data show that the ABO blood group is effective or prone to the risk of SARS-COV2 infection, while another study also shows the phenotypic effects of the blood group related to covid. It is an accepted fact that females have more strong immune systems than males, which may be related to the fact that females have two ‘X’ chromosomes, which might contain a more effective immunity booster gene on the X chromosome, and are capable to protect the female. Also specific sex hormones also induce a better immune response in a specific gender. This calls for in-depth analysis to be able to gain insight into this dilemma. COVID-19 is still not fully characterized, and thus we are not very familiar with its biology, mode of infection, susceptibility, and overall viral load in the human body. How many virus particles are needed to infect a person? How, then, comorbidity contribute to coronavirus infection? Since the emergence of this virus in 2020, a large number of papers have been published, and seemingly, vaccines have been prepared. But still, a large number of questions remain unanswered. The proneness of humans for infection by covid-19 needs to be established to be able to develop a better strategy to fight this virus. Our study will be on the Impact of demography on the Severity of covid-19 infection & at the same time, will look into gender-specific sensitivity of Covid-19 and the Operational variation of different biochemical markers in Covid-19 positive patients. Besides, we will be studying the co-relation, if any, of COVID severity & ABO Blood group type and the occurrence of the most common blood group type amongst positive patience.

Keywords: coronavirus, ABO blood group, age, gender

Procedia PDF Downloads 79
2524 Attribute Analysis of Quick Response Code Payment Users Using Discriminant Non-negative Matrix Factorization

Authors: Hironori Karachi, Haruka Yamashita

Abstract:

Recently, the system of quick response (QR) code is getting popular. Many companies introduce new QR code payment services and the services are competing with each other to increase the number of users. For increasing the number of users, we should grasp the difference of feature of the demographic information, usage information, and value of users between services. In this study, we conduct an analysis of real-world data provided by Nomura Research Institute including the demographic data of users and information of users’ usages of two services; LINE Pay, and PayPay. For analyzing such data and interpret the feature of them, Nonnegative Matrix Factorization (NMF) is widely used; however, in case of the target data, there is a problem of the missing data. EM-algorithm NMF (EMNMF) to complete unknown values for understanding the feature of the given data presented by matrix shape. Moreover, for comparing the result of the NMF analysis of two matrices, there is Discriminant NMF (DNMF) shows the difference of users features between two matrices. In this study, we combine EMNMF and DNMF and also analyze the target data. As the interpretation, we show the difference of the features of users between LINE Pay and Paypay.

Keywords: data science, non-negative matrix factorization, missing data, quality of services

Procedia PDF Downloads 113
2523 Impact of Hepatitis C Virus Chronic Infection on Quality of Life in Egypt

Authors: Ammal M. Metwally, Ghada A. Abdel-Latif, Walaa A. Fouad, Thanaa M. Rabah, Amira Mohsen, Fatma A. Shaaban, Iman I. Salama

Abstract:

The study aimed at determining the impact of chronic hepatitis C virus (HCV) infection on patients’ Quality of Life (QoL) , its relation to geographical characteristics of patients, awareness of the disease, treatment regimen, co-morbid psychiatric or other diseases. 457 patients were randomly selected from ten National Treatment Reference Centers of Ministry of Health hospitals from four community locations representing Egypt. Health related QoL assessment questionnaire with the 36-item Short Form used for assessment of the enrolled patients. The study showed no significant difference between HCV patients in different governorates as regards total QoL. Females, illiterate patients and those had bilharziasis, diabetes mellitus, hypertension or were depressed had significantly the lowest QoL score. HCV patients who knew the danger of the disease had significant lower mean score of physical and mental health components. Optimal care of overall well-being of HCV patients requires adequate knowledge of their neurological and psychological status. It is important to know that any patient will need to take the time to know that his new physical limitations do not limit him as a person, as soul, no matter what other people are thinking as a positive hopeful attitude is essential for combating HCV.

Keywords: hepatitis C virus chronic infection - physical health component and mental health component of QoL– total quality of life

Procedia PDF Downloads 436
2522 Formulation and in Vitro Characterization of Bioactives Loaded Polymeric Nanoparticle Incorporated into Multiphase Hydrogel System for the Treatment of Infected Burn Wound

Authors: Rajni Kant Panik, Deependra Singh, Manju Singh

Abstract:

Despite significant advances in the treatment of severe burn injury, infection and sepsis persist as frequent causes of morbidity and mortality for burn victims due to extensive compromise of the skin and contiguous tissue that serve as a protective barrier against microbial invasion. In the setting of a burn wound infection, Staphylococcus aureus is the most commonly isolated pathogens from bloodstream infections in burn care hospitals. We aimed to develop a biocompatible system of Poly vinyl alcohol (PVA)-sodium alginate hydrogel carrying multiple drugs- catalase and mupirocin in controlled manner for effective and complete burn wound healing. PLGA nanoparticles of Catalase and mupirocin were prepared by homogenization method and optimized system was incorporated in PVA-sodium alginate slurry. PVA-sodium alginate hydrogels were prepared by freeze thaw method. The prepared dispersion was casted into films to prepare multiphase hydrogel system and characterized by in vitro and in vivo studies. The study clearly showed the beneficial effect of antioxidant enzyme and antibiotic in the treatment of infected burn wound, as evidenced by the reduced incidence of wound infection and the shortening of healing time.

Keywords: burn wound, catalase, mupirocin, wound healing

Procedia PDF Downloads 486
2521 Learners’ Perceptions of Tertiary Level Teachers’ Code Switching: A Vietnamese Perspective

Authors: Hoa Pham

Abstract:

The literature on language teaching and second language acquisition has been largely driven by monolingual ideology with a common assumption that a second language (L2) is best taught and learned in the L2 only. The current study challenges this assumption by reporting learners' positive perceptions of tertiary level teachers' code switching practices in Vietnam. The findings of this study contribute to our understanding of code switching practices in language classrooms from a learners' perspective. Data were collected from student participants who were working towards a Bachelor degree in English within the English for Business Communication stream through the use of focus group interviews. The literature has documented that this method of interviewing has a number of distinct advantages over individual student interviews. For instance, group interactions generated by focus groups create a more natural environment than that of an individual interview because they include a range of communicative processes in which each individual may influence or be influenced by others - as they are in their real life. The process of interaction provides the opportunity to obtain the meanings and answers to a problem that are "socially constructed rather than individually created" leading to the capture of real-life data. The distinct feature of group interaction offered by this technique makes it a powerful means of obtaining deeper and richer data than those from individual interviews. The data generated through this study were analysed using a constant comparative approach. Overall, the students expressed positive views of this practice indicating that it is a useful teaching strategy. Teacher code switching was seen as a learning resource and a source supporting language output. This practice was perceived to promote student comprehension and to aid the learning of content and target language knowledge. This practice was also believed to scaffold the students' language production in different contexts. However, the students indicated their preference for teacher code switching to be constrained, as extensive use was believed to negatively impact on their L2 learning and trigger cognitive reliance on the L1 for L2 learning. The students also perceived that when the L1 was used to a great extent, their ability to develop as autonomous learners was negatively impacted. This study found that teacher code switching was supported in certain contexts by learners, thus suggesting that there is a need for the widespread assumption about the monolingual teaching approach to be re-considered.

Keywords: codeswitching, L1 use, L2 teaching, learners’ perception

Procedia PDF Downloads 299
2520 Analysis of the Dietary Intake of People Living with HIV/AIDS (PLWHA) in Rural Communities of Imo State, Nigeria

Authors: Uzoamaka Nwugo Akwiwu

Abstract:

Human Immunodeficiency Virus (HIV) among rural dwellers depletes quality of agricultural labour, and reduces quality of life. Use of Antiretroviral Therapy (ART) has not significantly reduced consequences of infection, as the effort is being compromised by inadequate dietary intake. This study analysed the dietary intake of People Living with HIV/AIDS (PLWHA) in rural communities of Imo State, Nigeria. Data was collected from 114 PLWHA randomly selected from members of two rural support groups with high prevalence of HIV in Imo State using interview schedule. The data was analysed using descriptive statistics, Pearson product moment correlation, and t-test at α0.05. Level of involvement in agriculture was (mean 12.7) and reduced to 7.0 after infection. Extent of involvement in agriculture significantly reduced after infection in Imo (t=8.1). Health status of 42.1% of PLWHA was perceived as poor. Diet diversity score (4.3±1.6) was low among majority (62.3%) of the PLWHA, with diet of 76.3% being inadequate. However, perceived health status had no significant correlation with dietary intake (r=0.09). The study concluded that diet of PLWHA in Imo State was inadequate, thus there is need for agricultural extension agents to collaborate with the health sector to develop nutritional guideline for PLWHA in rural communities.

Keywords: dietary intake, diet diversity, people living With HIV/AIDS, perceived health status

Procedia PDF Downloads 273
2519 The Pressure Distribution on the Rectangular and Trapezoidal Storage Tanks' Perimeters Due to Liquid Sloshing Impact

Authors: Hassan Saghi, Gholam Reza Askarzadeh Garmroud, Seyyed Ali Reza Emamian

Abstract:

Sloshing phenomenon is a complicated free surface flow problem that increases the dynamic pressure on the sidewalls and the bottom of the storage tanks. When the storage tanks are partially filled, it is essential to be able to evaluate the fluid dynamic loads on the tank’s perimeter. In this paper, a numerical code was developed to determine the pressure distribution on the rectangular and trapezoidal storage tanks’ perimeters due to liquid sloshing impact. Assuming the fluid to be inviscid, the Laplace equation and the nonlinear free surface boundary conditions are solved using coupled BEM-FEM. The code performance for sloshing modeling is validated against available data. Finally, this code is used for partially filled rectangular and trapezoidal storage tanks and the pressure distribution on the tanks’ perimeters due to liquid sloshing impact is estimated. The results show that the maximum pressure on the perimeter of the rectangular and trapezoidal storage tanks was decreased along the sidewalls from the top to the bottom. Furthermore, the period of the pressure distribution is different for different points on the tank’s perimeter and it is bigger in the trapezoidal tanks compared to the rectangular ones.

Keywords: pressure distribution, liquid sloshing impact, sway motion, trapezoidal storage tank, coupled BEM-FEM

Procedia PDF Downloads 530
2518 Dynamics of Hepatitis B Infection Prevention Practices among Pregnant Women Attending Antenatal Care in Central Uganda Using the Constructs of Information-Motivation-Behavioral Skills Model: A Case of Lubaga Hospital Kampala

Authors: Ismail Bamidele Afolabi, Abdulmujeeb Babatunde Aremu, Lawal Abdurraheem Maidoki, Nnodimele Onuigbo Atulomah

Abstract:

Background: Hepatitis B virus infection remains a significant global public health challenge with infectivity as well as the potential for transmission more than 50 to 100 times that of HIV. Annually, global HBV-related mortality is linked primarily to cirrhosis and liver carcinoma. The ever-increasing endemicity of HBV among children under-5-years, owing to vertical transmission and its lingering chronicity in developing countries, will hamper the global efforts concertedly endorsed towards eliminating viral hepatitis as a global public health threat by 2030. Objective: This study assessed information motivation behavioral skills model constructs as predictors of HBV infection prevention practices among consenting expectant mothers attending antenatal care in Central Uganda as a focal point of intervention towards breaking materno-foetal transmission of HBV. Methods: A cross-sectional study with a quantitative data collection approach based on the constructs of the IMB model was used to capture data on the study variables among 385 randomly selected pregnant women between September and October 2020. Data derived from the quantitative instrument were transformed into weighted aggregate scores using SPSS version 26. ANOVA and regression analysis were done to ascertain the study hypotheses with a significance level set as (p ≤ 0.05). Results: Relatively 60% of the respondents were aged between 18 and 28. Expectant mothers with secondary education (42.3%) were predominant. Furthermore, an average but inadequate knowledge (X ̅=5.97±6.61; B=0.57; p<.001), incorrect perception (X ̅=17.10±18.31; B=0.97; p=.014), and good behavioral skills (X ̅=12.39±13.37; B=0.56; p<.001) for adopting prevention practices all statistically predicted the unsatisfactory level of prevention practices (X ̅=15.03±16.20) among the study respondents as measured on rating scales of 12, 33, 21 and 30 respectively. Conclusion: Evidence from this study corroborates the imperativeness of IMB constructs in reducing the burden of HBV infection in developing countries. Therefore, the inadequate HBV knowledge and misperception among obstetric populations necessitate personalized health education during antenatal visits and subsequent health campaigns in order to inform better prevention practices and, in turn, reduce the lingering chronicity of HBV infection in developing countries.

Keywords: behavioral skills, HBV infection, knowledge, perception, pregnant women, prevention practices

Procedia PDF Downloads 69
2517 Investigation of Efficient Production of ¹³⁵La for the Auger Therapy Using Medical Cyclotron in Poland

Authors: N. Zandi, M. Sitarz, J. Jastrzebski, M. Vagheian, J. Choinski, A. Stolarz, A. Trzcinska

Abstract:

¹³⁵La with the half-life of 19.5 h can be considered as a good candidate for Auger therapy. ¹³⁵La decays almost 100% by electron capture to the stable ¹³⁵Ba. In this study, all important possible reactions leading to ¹³⁵La production are investigated in details, and the corresponding theoretical yield for each reaction using the Monte-Carlo method (MCNPX code) are presented. Among them, the best reaction based on the cost-effectiveness and production yield regarding Poland facilities equipped with medical cyclotron has been selected. ¹³⁵La is produced using 16.5 MeV proton beam of general electric PET trace cyclotron through the ¹³⁵Ba(p,n)¹³⁵La reaction. Moreover, for a consistent facilitating comparison between the theoretical calculations and the experimental measurements, the beam current and also the proton beam energy is measured experimentally. Then, the obtained proton energy is considered as the entrance energy for the theoretical calculations. The production yield finally is measured and compared with the results obtained using the MCNPX code. The results show the experimental measurement and the theoretical calculations are in good agreement.

Keywords: efficient ¹³⁵La production, proton cyclotron energy measurement, MCNPX code, theoretical and experimental production yield

Procedia PDF Downloads 128
2516 An Analysis of Privacy and Security for Internet of Things Applications

Authors: Dhananjay Singh, M. Abdullah-Al-Wadud

Abstract:

The Internet of Things is a concept of a large scale ecosystem of wireless actuators. The actuators are defined as things in the IoT, those which contribute or produces some data to the ecosystem. However, ubiquitous data collection, data security, privacy preserving, large volume data processing, and intelligent analytics are some of the key challenges into the IoT technologies. In order to solve the security requirements, challenges and threats in the IoT, we have discussed a message authentication mechanism for IoT applications. Finally, we have discussed data encryption mechanism for messages authentication before propagating into IoT networks.

Keywords: Internet of Things (IoT), message authentication, privacy, security

Procedia PDF Downloads 360
2515 Seismic Response of Reinforced Concrete Buildings: Field Challenges and Simplified Code Formulas

Authors: Michel Soto Chalhoub

Abstract:

Building code-related literature provides recommendations on normalizing approaches to the calculation of the dynamic properties of structures. Most building codes make a distinction among types of structural systems, construction material, and configuration through a numerical coefficient in the expression for the fundamental period. The period is then used in normalized response spectra to compute base shear. The typical parameter used in simplified code formulas for the fundamental period is overall building height raised to a power determined from analytical and experimental results. However, reinforced concrete buildings which constitute the majority of built space in less developed countries pose additional challenges to the ones built with homogeneous material such as steel, or with concrete under stricter quality control. In the present paper, the particularities of reinforced concrete buildings are explored and related to current methods of equivalent static analysis. A comparative study is presented between the Uniform Building Code, commonly used for buildings within and outside the USA, and data from the Middle East used to model 151 reinforced concrete buildings of varying number of bays, number of floors, overall building height, and individual story height. The fundamental period was calculated using eigenvalue matrix computation. The results were also used in a separate regression analysis where the computed period serves as dependent variable, while five building properties serve as independent variables. The statistical analysis shed light on important parameters that simplified code formulas need to account for including individual story height, overall building height, floor plan, number of bays, and concrete properties. Such inclusions are important for reinforced concrete buildings of special conditions due to the level of concrete damage, aging, or materials quality control during construction. Overall results of the present analysis show that simplified code formulas for fundamental period and base shear may be applied but they require revisions to account for multiple parameters. The conclusion above is confirmed by the analytical model where fundamental periods were computed using numerical techniques and eigenvalue solutions. This recommendation is particularly relevant to code upgrades in less developed countries where it is customary to adopt, and mildly adapt international codes. We also note the necessity of further research using empirical data from buildings in Lebanon that were subjected to severe damage due to impulse loading or accelerated aging. However, we excluded this study from the present paper and left it for future research as it has its own peculiarities and requires a different type of analysis.

Keywords: seismic behaviour, reinforced concrete, simplified code formulas, equivalent static analysis, base shear, response spectra

Procedia PDF Downloads 211
2514 The Socio-Demographics of HIV-Infected Persons with Psychological Morbidity in Zaria, Nigeria

Authors: Obiageli Helen Ezeh, Chuks Clement Ezeh

Abstract:

Background: It is estimated that more than 330 million persons are living with HIV-infection globally and in Nigeria about 3.4 persons are living with the infection, with an annual death rate of 180,000. Psychological morbidity often accompany chronic illnesses and may be associated with substance abuse, poor health seeking behavior and adherence to treatment program; it may worsen existing health problems and the overall quality of life. Until the burden is effectively identified, intervention cannot be planned. Until there is a cure, the goal is to manage and cope effectively with HIV-infection. Little if any studies have been done in this area in the North West geo-political zone of Nigeria. The study would help to identify high risk groups and prevent the progression and spread of the infection. Aim: To identify HIV-infected persons with psychological morbidity, accessing HIV- clinic at Shika Hospital, Zaria, Kaduna State; and analyze their socio-demographic profile. Methods: A cross sectional descriptive study was carried out to assess and analyze the socio-demographic characteristics of HIV-infected persons attending Shika hospital Zaria Nigeria, who screened positive for psychological morbidity. A total of 109 HIV-infected persons receiving HAART at Shika clinic, Zaria, Kaduna State, Nigeria, were administered questionnaires, the General Health Questionnaire (GHQ-12)measuring psychological morbidity and socio-demographic data. The participants ranged in age between 18 and 75 years. Results: Data were analyzed using SPSS software 15. Both descriptive and inferential Statistics were performed on the data. Results indicate a total prevalent rate of psychological morbidity of 78 percent among participants. Of this, about 16.2 percent were severely distressed, 25.1 percent moderately distressed and 36.7percent were mildly distressed. More females (65 percent of those with psychological morbidity) were found to be distressed than their male (55 percent) counterparts. It was (44 percent) for patients whose HIV-infection was of relatively shorter duration(2-4 years) than those of longer duration(5-9 years; and 10 years/above). The age group (21-30 years) was the most affected (35 percent). The rate was also 55 percent for Christians and 45 percent for Muslims. For married patients with partners it was 20 percent and for singles 30 percent; for the widowed (12 percent) and divorced (38 percent). At the level of tribal/ethnic groups, it was 13 percent for Ibos, 22 percent for Yorubas, 27 percent for Hausas and 33 percent for all the other minority tribes put together. Conclusion/Recommendation: The study has been able to identify the presence of psychological morbidity among HIV-infected persons as high and analyze the socio-demographic factors associated with it as significant. Periodic screening of HIV-infected persons for psychological morbidity and psychosocial intervention was recommended.

Keywords: socio-demographics, psychological morbidities, HIV-Infection, HAART

Procedia PDF Downloads 237
2513 Post-bladder Catheter Infection

Authors: Mahla Azimi

Abstract:

Introduction: Post-bladder catheter infection is a common and significant healthcare-associated infection that affects individuals with indwelling urinary catheters. These infections can lead to various complications, including urinary tract infections (UTIs), bacteremia, sepsis, and increased morbidity and mortality rates. This article aims to provide a comprehensive review of post-bladder catheter infections, including their causes, risk factors, clinical presentation, diagnosis, treatment options, and preventive measures. Causes and Risk Factors: Post-bladder catheter infections primarily occur due to the colonization of microorganisms on the surface of the urinary catheter. The most common pathogens involved are Escherichia coli, Klebsiella pneumoniae, Pseudomonas aeruginosa, and Enterococcus species. Several risk factors contribute to the development of these infections, such as prolonged catheterization duration, improper insertion technique, poor hygiene practices during catheter care, compromised immune system function in patients with underlying conditions or immunosuppressive therapy. Clinical Presentation: Patients with post-bladder catheter infections may present with symptoms such as fever, chills, malaise, suprapubic pain or tenderness, and cloudy or foul-smelling urine. In severe cases or when left untreated for an extended period of time, patients may develop more severe symptoms like hematuria or signs of systemic infection. Diagnosis: The diagnosis of post-bladder catheter infection involves a combination of clinical evaluation and laboratory investigations. Urinalysis is crucial in identifying pyuria (presence of white blood cells) and bacteriuria (presence of bacteria). A urine culture is performed to identify the causative organism(s) and determine its antibiotic susceptibility profile. Treatment Options: Prompt initiation of appropriate antibiotic therapy is essential in managing post-bladder catheter infections. Empirical treatment should cover common pathogens until culture results are available. The choice of antibiotics should be guided by local antibiogram data to ensure optimal therapy. In some cases, catheter removal may be necessary, especially if the infection is recurrent or associated with severe complications. Preventive Measures: Prevention plays a vital role in reducing the incidence of post-bladder catheter infections. Strategies include proper hand hygiene, aseptic technique during catheter insertion and care, regular catheter maintenance, and timely removal of unnecessary catheters. Healthcare professionals should also promote patient education regarding self-care practices and signs of infection. Conclusion: Post-bladder catheter infections are a significant healthcare concern that can lead to severe complications and increased healthcare costs. Early recognition, appropriate diagnosis, and prompt treatment are crucial in managing these infections effectively. Implementing preventive measures can significantly reduce the incidence of post-bladder catheter infections and improve patient outcomes. Further research is needed to explore novel strategies for prevention and management in this field.

Keywords: post-bladder catheter infection, urinary tract infection, bacteriuria, indwelling urinary catheters, prevention

Procedia PDF Downloads 64
2512 Automatic Generating CNC-Code for Milling Machine

Authors: Chalakorn Chitsaart, Suchada Rianmora, Mann Rattana-Areeyagon, Wutichai Namjaiprasert

Abstract:

G-code is the main factor in computer numerical control (CNC) machine for controlling the tool-paths and generating the profile of the object’s features. For obtaining high surface accuracy of the surface finish, non-stop operation is required for CNC machine. Recently, to design a new product, the strategy that concerns about a change that has low impact on business and does not consume lot of resources has been introduced. Cost and time for designing minor changes can be reduced since the traditional geometric details of the existing models are applied. In order to support this strategy as the alternative channel for machining operation, this research proposes the automatic generating codes for CNC milling operation. Using this technique can assist the manufacturer to easily change the size and the geometric shape of the product during the operation where the time spent for setting up or processing the machine are reduced. The algorithm implemented on MATLAB platform is developed by analyzing and evaluating the geometric information of the part. Codes are created rapidly to control the operations of the machine. Comparing to the codes obtained from CAM, this developed algorithm can shortly generate and simulate the cutting profile of the part.

Keywords: geometric shapes, milling operation, minor changes, CNC Machine, G-code, cutting parameters

Procedia PDF Downloads 334
2511 A Distributed Mobile Agent Based on Intrusion Detection System for MANET

Authors: Maad Kamal Al-Anni

Abstract:

This study is about an algorithmic dependence of Artificial Neural Network on Multilayer Perceptron (MPL) pertaining to the classification and clustering presentations for Mobile Adhoc Network vulnerabilities. Moreover, mobile ad hoc network (MANET) is ubiquitous intelligent internetworking devices in which it has the ability to detect their environment using an autonomous system of mobile nodes that are connected via wireless links. Security affairs are the most important subject in MANET due to the easy penetrative scenarios occurred in such an auto configuration network. One of the powerful techniques used for inspecting the network packets is Intrusion Detection System (IDS); in this article, we are going to show the effectiveness of artificial neural networks used as a machine learning along with stochastic approach (information gain) to classify the malicious behaviors in simulated network with respect to different IDS techniques. The monitoring agent is responsible for detection inference engine, the audit data is collected from collecting agent by simulating the node attack and contrasted outputs with normal behaviors of the framework, whenever. In the event that there is any deviation from the ordinary behaviors then the monitoring agent is considered this event as an attack , in this article we are going to demonstrate the  signature-based IDS approach in a MANET by implementing the back propagation algorithm over ensemble-based Traffic Table (TT), thus the signature of malicious behaviors or undesirable activities are often significantly prognosticated and efficiently figured out, by increasing the parametric set-up of Back propagation algorithm during the experimental results which empirically shown its effectiveness  for the ratio of detection index up to 98.6 percentage. Consequently it is proved in empirical results in this article, the performance matrices are also being included in this article with Xgraph screen show by different through puts like Packet Delivery Ratio (PDR), Through Put(TP), and Average Delay(AD).

Keywords: Intrusion Detection System (IDS), Mobile Adhoc Networks (MANET), Back Propagation Algorithm (BPA), Neural Networks (NN)

Procedia PDF Downloads 173
2510 Secure Content Centric Network

Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris

Abstract:

Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.

Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer

Procedia PDF Downloads 627
2509 Detection of Bcl2 Polymorphism in Patient with Hepatocellular carcinoma

Authors: Mohamed Abdel-Hamid, Olfat Gamil Shaker, Doha El-Sayed Ellakwa, Eman Fathy Abdel-Maksoud

Abstract:

Introduction: Despite advances in the knowledge of the molecular virology of hepatitis C virus (HCV), the mechanisms of hepatocellular injury in HCV infection are not completely understood. Hepatitis C viral infection (HCV) influences the susceptibility to apoptosis. This could lead to insufficient antiviral immune response and persistent viral infection. Aim of this study: was to examine whether BCL-2 gene polymorphism at codon 43 (+127G/A or Ala43Thr) has an impact on development of hepatocellular carcinoma caused by chronic hepatitis C Egyptian patients. Subjects and Methods: The study included three groups; group 1: composing of 30 patients with hepatocellular carcinoma (HCC), group 2 composing of 30 patients with HCV, group 3 composing of 30 healthy subjects matching the same age and socioeconomic status were taken as a control group. Gene polymorphism of BCL2 (Ala43Thr) were evaluated by PCR-RFLP technique and measured for all patients and controls. Results: The summed 43Thr genotype was more frequent and statistically significant in HCC patients as compared to control group. This genotype of BCL2 gene may inhibit the programmed cell death which leads to disturbance in tissue and cells homeostasis and reduction in immune regulation. This result leads to viral replication and HCV persistence. Moreover, virus produces variety of mechanisms to block genes participated in apoptosis. This mechanism proves that HCV patients who have 43Thr genotype are more susceptible to HCC. Conclusion: The data suggest for the first time that the BCL2 polymorphism is associated with the susceptibility to HCC in Egyptian populations and might be used as molecular markers for evaluating HCC risk. This study clearly demonstrated that Chronic HCV exhibit a deregulation of apoptosis with the disease progression. This provides an insight into the pathogenesis of chronic HCV infection, and may contribute to the therapy.

Keywords: BCL2 gene, Hepatitis C Virus, Hepatocellular carcinoma, sensitivity, specificity, apoptosis

Procedia PDF Downloads 491
2508 Intrusion Detection in SCADA Systems

Authors: Leandros A. Maglaras, Jianmin Jiang

Abstract:

The protection of the national infrastructures from cyberattacks is one of the main issues for national and international security. The funded European Framework-7 (FP7) research project CockpitCI introduces intelligent intrusion detection, analysis and protection techniques for Critical Infrastructures (CI). The paradox is that CIs massively rely on the newest interconnected and vulnerable Information and Communication Technology (ICT), whilst the control equipment, legacy software/hardware, is typically old. Such a combination of factors may lead to very dangerous situations, exposing systems to a wide variety of attacks. To overcome such threats, the CockpitCI project combines machine learning techniques with ICT technologies to produce advanced intrusion detection, analysis and reaction tools to provide intelligence to field equipment. This will allow the field equipment to perform local decisions in order to self-identify and self-react to abnormal situations introduced by cyberattacks. In this paper, an intrusion detection module capable of detecting malicious network traffic in a Supervisory Control and Data Acquisition (SCADA) system is presented. Malicious data in a SCADA system disrupt its correct functioning and tamper with its normal operation. OCSVM is an intrusion detection mechanism that does not need any labeled data for training or any information about the kind of anomaly is expecting for the detection process. This feature makes it ideal for processing SCADA environment data and automates SCADA performance monitoring. The OCSVM module developed is trained by network traces off line and detects anomalies in the system real time. The module is part of an IDS (intrusion detection system) developed under CockpitCI project and communicates with the other parts of the system by the exchange of IDMEF messages that carry information about the source of the incident, the time and a classification of the alarm.

Keywords: cyber-security, SCADA systems, OCSVM, intrusion detection

Procedia PDF Downloads 525
2507 Optimal Seismic Design of Reinforced Concrete Shear Wall-Frame Structure

Authors: H. Nikzad, S. Yoshitomi

Abstract:

In this paper, the optimal seismic design of reinforced concrete shear wall-frame building structures was done using structural optimization. The optimal section sizes were generated through structural optimization based on linear static analysis conforming to American Concrete Institute building design code (ACI 318-14). An analytical procedure was followed to validate the accuracy of the proposed method by comparing stresses on structural members through output files of MATLAB and ETABS. In order to consider the difference of stresses in structural elements by ETABS and MATLAB, and to avoid over-stress members by ETABS, a stress constraint ratio of MATLAB to ETABS was modified and introduced for the most critical load combinations and structural members. Moreover, seismic design of the structure was done following the International Building Code (IBC 2012), American Concrete Institute Building Code (ACI 318-14) and American Society of Civil Engineering (ASCE 7-10) standards. Typical reinforcement requirements for the structural wall, beam and column were discussed and presented using ETABS structural analysis software. The placement and detailing of reinforcement of structural members were also explained and discussed. The outcomes of this study show that the modification of section sizes play a vital role in finding an optimal combination of practical section sizes. In contrast, the optimization problem with size constraints has a higher cost than that of without size constraints. Moreover, the comparison of optimization problem with that of ETABS program shown to be satisfactory and governed ACI 318-14 building design code criteria.

Keywords: structural optimization, seismic design, linear static analysis, etabs, matlab, rc shear wall-frame structures

Procedia PDF Downloads 149
2506 Beyond Baudrillard: A Critical Intersection between Semiotics and Materialism

Authors: Francesco Piluso

Abstract:

Nowadays, to restore the deconstructive power of semiotics implies a critical analysis of neoliberal ideology, and, even more critically, a confrontation with materialist perspective. The theoretical path of Jean Baudrillard is crucial to understand the ambivalence of this intersection. A semiotic critique of Baudrillard’s work, through tools of both structuralism and interpretative semiotics, has the aim to give materialism a new consistent semiotic approach and vice-versa. According to Baudrillard, the commodity form is characterized by the same abstract and systemic logic of the sign-form, in which the production of the signified (use-value) is a mere ideological mean for the reproduction of the signifiers-chain (exchange-value). Nevertheless, this parallelism is broken by the author himself: if the use-value is deconstructed in its relative logic, the signified and the referent, both as discrete and positive elements, are collapsed on the same plane at the shadows of the signified forms. These divergent considerations lead Baudrillard to the same crucial point: the dismissal of the material world, replaced by the hyperreality as reproduction of a semiotic (genetic) Code. The stress on the concept of form, as an epistemological and semiotic tool to analyse the construction of values in the consumer society, has led to the Code as its ontological drift. In other words, Baudrillard seems to enclose consumer society (and reality) in this immanent and self-fetishized world of signs–an ideological perspective that mystifies the gravity of the material relationships between Northern-Western World and Third World. The notion of Encyclopaedia by Umberto Eco is the key to overturn the relationship of immanence/transcendence between the Code and the economic political of the sign, by understanding the former as an ideological plane within the encyclopedia itself. Therefore, rather than building semiotic (hyper)realities, semiotics has to deal with materialism in terms of material relationships of power which are mystified and reproduced through such ideological ontologies of signs.

Keywords: Baudrillard, Code, Eco, Encyclopaedia, epistemology vs. ontology, semiotics vs. materialism

Procedia PDF Downloads 139
2505 Postoperative Wound Infections Following Caesarean Section in Obese Patients

Authors: S. Yeo, M. Mathur

Abstract:

Introduction: Obesity, defined as a Body Mass Index (BMI) of more than or equal to 30kg/m, is associated with an increased risk of complications during pregnancy and delivery. During labour, obese mothers often require greater intervention and have higher rates of caesarean section. Despite a low overall rate of serious complications following caesarean section, a high BMI predisposes to a higher risk of postoperative complications. Our study, therefore, aimed to investigate the impact of antenatal obesity on adverse outcomes following caesarean section, particularly wound-related infections. Materials and Methods: A retrospective cohort study of all caesarean deliveries during the first quarter of a chosen year was undertaken in our hospital, which is a tertiary referral centre with > 12,000 deliveries per year. Patients’ health records and data from our hospital’s electronic labour and delivery database were reviewed. Data analysis was performed using the Statistical Package for the Social Sciences (SPSS), and odds ratios plus adjusted odd ratios were calculated with 95% confidence intervals (CI). Results: A total of 1829 deliveries were reviewed during our study period. Of these, 180 (9.8%) patients were obese. The rate of caesarean delivery was 48.9% in obese patients versus 28.1% in non-obese patients. Post-operatively, 17% of obese patients experienced wound infection versus 0.2% of non-obese patients. Obese patients were also more likely to experience major postpartum haemorrhage (4.6% vs. 0.2%) and postpartum pyrexia (18.2% vs. 5.0%) in comparison to non-obese patients. Conclusions: Obesity is a significant risk factor in the development of postoperative complications following caesarean section. Wound infection remains a major concern for obese patients undergoing major surgery and results in extensive morbidity during the postnatal period. Postpartum infection can prolong recovery and affect maternal mental health, leading to reduced perinatal bonding with long-term implications on breastfeeding and parenting confidence. This study supports the need for the development of standardized protocols specifically for obese patients undergoing caesarean section. Multidisciplinary team care, in conjunction with anaesthesia, family physicians, and plastic surgery counterparts, early on in the antenatal journey, may be beneficial where wound complications are anticipated and to minimize the burden of postoperative infection in obese mothers.

Keywords: pregnancy, obesity, caesarean, infection

Procedia PDF Downloads 62
2504 Comprehensive Evaluation of COVID-19 Through Chest Images

Authors: Parisa Mansour

Abstract:

The coronavirus disease 2019 (COVID-19) was discovered and rapidly spread to various countries around the world since the end of 2019. Computed tomography (CT) images have been used as an important alternative to the time-consuming RT. PCR test. However, manual segmentation of CT images alone is a major challenge as the number of suspected cases increases. Thus, accurate and automatic segmentation of COVID-19 infections is urgently needed. Because the imaging features of the COVID-19 infection are different and similar to the background, existing medical image segmentation methods cannot achieve satisfactory performance. In this work, we try to build a deep convolutional neural network adapted for the segmentation of chest CT images with COVID-19 infections. First, we maintain a large and novel chest CT image database containing 165,667 annotated chest CT images from 861 patients with confirmed COVID-19. Inspired by the observation that the boundary of an infected lung can be improved by global intensity adjustment, we introduce a feature variable block into the proposed deep CNN, which adjusts the global features of features to segment the COVID-19 infection. The proposed PV array can effectively and adaptively improve the performance of functions in different cases. We combine features of different scales by proposing a progressive atrocious space pyramid fusion scheme to deal with advanced infection regions with various aspects and shapes. We conducted experiments on data collected in China and Germany and showed that the proposed deep CNN can effectively produce impressive performance.

Keywords: chest, COVID-19, chest Image, coronavirus, CT image, chest CT

Procedia PDF Downloads 38
2503 Deep Learning Approach to Trademark Design Code Identification

Authors: Girish J. Showkatramani, Arthi M. Krishna, Sashi Nareddi, Naresh Nula, Aaron Pepe, Glen Brown, Greg Gabel, Chris Doninger

Abstract:

Trademark examination and approval is a complex process that involves analysis and review of the design components of the marks such as the visual representation as well as the textual data associated with marks such as marks' description. Currently, the process of identifying marks with similar visual representation is done manually in United States Patent and Trademark Office (USPTO) and takes a considerable amount of time. Moreover, the accuracy of these searches depends heavily on the experts determining the trademark design codes used to catalog the visual design codes in the mark. In this study, we explore several methods to automate trademark design code classification. Based on recent successes of convolutional neural networks in image classification, we have used several different convolutional neural networks such as Google’s Inception v3, Inception-ResNet-v2, and Xception net. The study also looks into other techniques to augment the results from CNNs such as using Open Source Computer Vision Library (OpenCV) to pre-process the images. This paper reports the results of the various models trained on year of annotated trademark images.

Keywords: trademark design code, convolutional neural networks, trademark image classification, trademark image search, Inception-ResNet-v2

Procedia PDF Downloads 213
2502 Peridynamic Modeling of an Isotropic Plate under Tensile and Flexural Loading

Authors: Eda Gök

Abstract:

Peridynamics is a new modeling concept of non-local interactions for solid structures. The formulations of Peridynamic (PD) theory are based on integral equations rather than differential equations. Through, undefined equations of associated problems are avoided. PD theory might be defined as continuum version of molecular dynamics. The medium is usually modeled with mass particles bonded together. Particles interact with each other directly across finite distances through central forces named as bonds. The main assumption of this theory is that the body is composed of material points which interact with other material points within a finite distance. Although, PD theory developed for discontinuities, it gives good results for structures which have no discontinuities. In this paper, displacement control of the isotropic plate under the effect of tensile and bending loading has been investigated by means of PD theory. A MATLAB code is generated to create PD bonds and corresponding surface correction factors. Using generated MATLAB code the geometry of the specimen is generated, and the code is implemented in Finite Element Software. The results obtained from non-local continuum theory are compared with the Finite Element Analysis results and analytical solution. The results show good agreement.

Keywords: non-local continuum mechanics, peridynamic theory, solid structures, tensile loading, flexural loading

Procedia PDF Downloads 104