Search results for: attacks and controls
954 Planning of Green Infrastructure on a City Level
Authors: James Li, Darko Joksimovic
Abstract:
Urban development changes the natural hydrologic cycle, resulting in storm water impacts such as flooding, water quality degradation, receiving water erosion, and ecosystem deterioration. An integrated storm water managementapproach utilizing source and conveyance (termed green infrastructure) and end-of-pipe control measures is an effective way to manage urban storm water impacts. This paper focuses onplanning green infrastructure (GI) at the source and along the drainage system on a city level. It consists of (1)geospatial analysis of feasible GI using physical suitability; (2) modelling of cumulative GI's stormwater performance; and (3) cost-effectiveness analysis to prioritize the implementation of GI. A case study of the City of Barrie in Ontario, Canada, was used to demonstrate the GI's planning.Keywords: cost-effectiveness of storm water controls, green infrastructure, urban storm water, city-level master planning
Procedia PDF Downloads 98953 A New Perspective in Cervical Dystonia: Neurocognitive Impairment
Authors: Yesim Sucullu Karadag, Pinar Kurt, Sule Bilen, Nese Subutay Oztekin, Fikri Ak
Abstract:
Background: Primary cervical dystonia is thought to be a purely motor disorder. But recent studies revealed that patients with dystonia had additional non-motor features. Sensory and psychiatric disturbances could be included into the non-motor spectrum of dystonia. The Basal Ganglia receive inputs from all cortical areas and throughout the thalamus project to several cortical areas, thus participating to circuits that have been linked to motor as well as sensory, emotional and cognitive functions. However, there are limited studies indicating cognitive impairment in patients with cervical dystonia. More evidence is required regarding neurocognitive functioning in these patients. Objective: This study is aimed to investigate neurocognitive profile of cervical dystonia patients in comparison to healthy controls (HC) by employing a detailed set of neuropsychological tests in addition to self-reported instruments. Methods: Totally 29 (M/F: 7/22) cervical dystonia patients and 30 HC (M/F: 10/20) were included into the study. Exclusion criteria were depression and not given informed consent. Standard demographic, educational data and clinical reports (disease duration, disability index) were recorded for all patients. After a careful neurological evaluation, all subjects were given a comprehensive battery of neuropsychological tests: Self report of neuropsychological condition (by visual analogue scale-VAS, 0-100), RAVLT, STROOP, PASAT, TMT, SDMT, JLOT, DST, COWAT, ACTT, and FST. Patients and HC were compared regarding demographic, clinical features and neurocognitive tests. Also correlation between disease duration, disability index and self report -VAS were assessed. Results: There was no difference between patients and HCs regarding socio-demographic variables such as age, gender and years of education (p levels were 0.36, 0.436, 0.869; respectively). All of the patients were assessed at the peak of botulinum toxine effect and they were not taking an anticholinergic agent or benzodiazepine. Dystonia patients had significantly impaired verbal learning and memory (RAVLT, p<0.001), divided attention and working memory (ACTT, p<0.001), attention speed (TMT-A and B, p=0.008, 0.050), executive functions (PASAT, p<0.001; SDMT, p= 0.001; FST, p<0.001), verbal attention (DST, p=0.001), verbal fluency (COWAT, p<0.001), visio-spatial processing (JLOT, p<0.001) in comparison to healthy controls. But focused attention (STROOP-spontaneous correction) was not different between two groups (p>0.05). No relationship was found regarding disease duration and disability index with any neurocognitive tests. Conclusions: Our study showed that neurocognitive functions of dystonia patients were worse than control group with the similar age, sex, and education independently clinical expression like disease duration and disability index. This situation may be the result of possible cortical and subcortical changes in dystonia patients. Advanced neuroimaging techniques might be helpful to explain these changes in cervical dystonia patients.Keywords: cervical dystonia, neurocognitive impairment, neuropsychological test, dystonia disability index
Procedia PDF Downloads 420952 An Analysis into Global Suicide Trends and Their Relation to Current Events Through a Socio-Cultural Lens
Authors: Lyndsey Kim
Abstract:
We utilized country-level data on suicide rates from 1985 through 2015 provided by the WHO to explore global trends as well as country-specific trends. First, we find that up until 1995, there was an increase in suicide rates globally, followed by a steep decline in deaths. This observation is largely driven by the data from Europe, where suicides are prominent but steadily declining. Second, men are more likely to commit suicide than women across the world over the years. Third, the older generation is more likely to commit suicide than youth and adults. Finally, we turn to Durkheim’s theory and use it as a lens to understand trends in suicide across time and countries and attempt to identify social and economic events that might explain patterns that we observe. For example, we discovered a drastically different pattern in suicide rates in the US, with a steep increase in suicides in the early 2000s. We hypothesize this might be driven by both the 9/11 attacks and the recession of 2008.Keywords: suicide trends, current events, data analysis, world health organization, durkheim theory
Procedia PDF Downloads 92951 Temporal Myopia in Sustainable Behavior under Uncertainty
Authors: Arianne Van Der Wal, Femke Van Horen, Amir Grinstein
Abstract:
Consumers in today’s world are confronted with the alarming consequences of unsustainable behavior such as pollution and resource degradation. In addition, they are facing an increase in uncertainty due to, for instance, economic instability and terror attacks. Although these two problems are central to consumers’ lives, occur on a global scale, and have significant impact on the world’s political, economic, environmental, and social landscapes, they have not been systematically studied in tandem before. Contributing to research on persuasion and pro-social behavior, this paper shows in five studies (three experimental studies and one field study) that the two problems are intertwined. We demonstrate that uncertainty leads to lower sustainable behavior in comparison to certainty (Studies 1 and 2) and that this is due to consumers displaying higher levels of temporal discounting (i.e., adopting a more immediate orientation; Study 2). Finally, providing valuable implications for policy makers and responsible marketers, we show that emphasizing the immediate benefits of sustainable behavior during uncertainty buffers the negative effect (Studies 3 and 4).Keywords: sustainable behavior, uncertainty, temporal discounting, framing
Procedia PDF Downloads 318950 Association of Xeroderma pigmentosum Group D Gene Polymorphism with Colorectal Cancer Risk in Kashmiri Population
Authors: Syed Sameer Aga, Saniya Nissar
Abstract:
The Xeroderma pigmentosum group D gene (XPD) plays a key role in nucleotide excision repair (NER) pathway of the damaged DNA. Genetic polymorphisms in the coding region of the XPD gene may alter DNA repair capacity of the protein and hence can modulate the risk of colorectal cancer (CRC) risk. The aim of the study was to determine the genetic association of XPD Lys751Gln polymorphism with the risk of colorectal cancer (CRC) development. 120 CRC patients and 160 normal controls were assessed for genotype frequencies of XPD Lys751Gln polymorphism using PCR-RFLP technique. We observed a significant association (p < 0.05) between the XPD Lys751Gln polymorphism and the risk of developing CRC (p < 0.05). Additionally, Gln/Gln genotype of the XPD gene doubled the risk for the development of CRC [p < 0.05; OR=2.25 95% CI (1.07-4.7)]. Our results suggest that there is a significant association between the XPD Lys751Gln polymorphism and the risk of CRC.Keywords: colorectal cancer, polymorphism, RFLP, DNA Repair, NER, XPD
Procedia PDF Downloads 216949 Temperature Distribution Control for Baby Incubator System Using Arduino AT Mega 2560
Authors: W. Widhiada, D. N. K. P. Negara, P. A. Suryawan
Abstract:
The technological advances in the field of health to be very important, especially on the safety of the baby. In this case a lot of premature infants death caused by poorly managed health facilities. Mostly the death of premature baby caused by bacteria since the temperature around the baby is not normal. Related to this, the incubator equipment needs to be important, especially in how to control the temperature in incubator. On/Off controls is used to regulate the temperature distribution in the incubator so that the desired temperature is 36 °C to stay awake and stable. The authors have been observed and analyzed the data to determine the temperature distribution in the incubator using program of MATLAB/Simulink. The output temperature distribution is obtained at 36 °C in 400 seconds using an Arduino AT 2560. This incubator is able to maintain an ambient temperature and maintain the baby's body temperature within normal limits and keep the moisture in the air in accordance with the limit values required in infant incubator.Keywords: on/off control, distribution temperature, Arduino AT 2560, baby incubator
Procedia PDF Downloads 499948 From an Expectations Crisis to a Mental Disorder: The Consequences of Irregular Journeys on Sub-Saharan Migrants
Authors: Siham Soulaimi
Abstract:
Europe has become a difficult destination due to strict migration policies and border controls, making Morocco an immigration country. Morocco is currently at the center of the international migration debate because it not only hosts regular migrants but also must deal with the problem of irregular migrants entering its territory. Sub-Saharan irregular migration is full of challenges that might cause a delay for the migrants, announcing a death sentence for many others. The journey's hurdles are likely to cause a crisis in expectations, resulting in serious consequences on the migrants' mental health. Our research study emphasizes that sub-Saharan migrants begin irregular journeys with high hopes, only to be disappointed by how unexpectedly cruel it turns out to be. We also pointed to specific physical and, more crucially, mental health problems that they end up with after survival, resulting in somatic disorders.Keywords: irregular migration, Sub-Saharan migrants, challenges, experiences crisis, mental health, somatoform disorder
Procedia PDF Downloads 136947 Predicting Susceptibility to Coronary Artery Disease using Single Nucleotide Polymorphisms with a Large-Scale Data Extraction from PubMed and Validation in an Asian Population Subset
Authors: K. H. Reeta, Bhavana Prasher, Mitali Mukerji, Dhwani Dholakia, Sangeeta Khanna, Archana Vats, Shivam Pandey, Sandeep Seth, Subir Kumar Maulik
Abstract:
Introduction Research has demonstrated a connection between coronary artery disease (CAD) and genetics. We did a deep literature mining using both bioinformatics and manual efforts to identify the susceptible polymorphisms in coronary artery disease. Further, the study sought to validate these findings in an Asian population. Methodology In first phase, we used an automated pipeline which organizes and presents structured information on SNPs, Population and Diseases. The information was obtained by applying Natural Language Processing (NLP) techniques to approximately 28 million PubMed abstracts. To accomplish this, we utilized Python scripts to extract and curate disease-related data, filter out false positives, and categorize them into 24 hierarchical groups using named Entity Recognition (NER) algorithms. From the extensive research conducted, a total of 466 unique PubMed Identifiers (PMIDs) and 694 Single Nucleotide Polymorphisms (SNPs) related to coronary artery disease (CAD) were identified. To refine the selection process, a thorough manual examination of all the studies was carried out. Specifically, SNPs that demonstrated susceptibility to CAD and exhibited a positive Odds Ratio (OR) were selected, and a final pool of 324 SNPs was compiled. The next phase involved validating the identified SNPs in DNA samples of 96 CAD patients and 37 healthy controls from Indian population using Global Screening Array. ResultsThe results exhibited out of 324, only 108 SNPs were expressed, further 4 SNPs showed significant difference of minor allele frequency in cases and controls. These were rs187238 of IL-18 gene, rs731236 of VDR gene, rs11556218 of IL16 gene and rs5882 of CETP gene. Prior researches have reported association of these SNPs with various pathways like endothelial damage, susceptibility of vitamin D receptor (VDR) polymorphisms, and reduction of HDL-cholesterol levels, ultimately leading to the development of CAD. Among these, only rs731236 had been studied in Indian population and that too in diabetes and vitamin D deficiency. For the first time, these SNPs were reported to be associated with CAD in Indian population. Conclusion: This pool of 324 SNP s is a unique kind of resource that can help to uncover risk associations in CAD. Here, we validated in Indian population. Further, validation in different populations may offer valuable insights and contribute to the development of a screening tool and may help in enabling the implementation of primary prevention strategies targeted at the vulnerable population.Keywords: coronary artery disease, single nucleotide polymorphism, susceptible SNP, bioinformatics
Procedia PDF Downloads 76946 Design and Implementation of Security Middleware for Data Warehouse Signature, Framework
Authors: Mayada Al Meghari
Abstract:
Recently, grid middlewares have provided large integrated use of network resources as the shared data and the CPU to become a virtual supercomputer. In this work, we present the design and implementation of the middleware for Data Warehouse Signature, DWS Framework. The aim of using the middleware in our DWS framework is to achieve the high performance by the parallel computing. This middleware is developed on Alchemi.Net framework to increase the security among the network nodes through the authentication and group-key distribution model. This model achieves the key security and prevents any intermediate attacks in the middleware. This paper presents the flow process structures of the middleware design. In addition, the paper ensures the implementation of security for DWS middleware enhancement with the authentication and group-key distribution model. Finally, from the analysis of other middleware approaches, the developed middleware of DWS framework is the optimal solution of a complete covering of security issues.Keywords: middleware, parallel computing, data warehouse, security, group-key, high performance
Procedia PDF Downloads 119945 The Nature and Impact of Trojan Horses in Cybersecurity
Authors: Mehrab Faraghti
Abstract:
Trojan horses, a form of malware masquerading as legitimate software, pose significant cybersecurity threats. These malicious programs exploit user trust, infiltrate systems, and can lead to data breaches, financial loss, and compromised privacy. This paper explores the mechanisms through which Trojan horses operate, including delivery methods such as phishing and software vulnerabilities. It categorizes various types of Trojan horses and their specific impacts on individuals and organizations. Additionally, the research highlights the evolution of Trojan threats and the importance of user awareness and proactive security measures. By analyzing case studies of notable Trojan attacks, this study identifies common vulnerabilities that can be exploited and offers insights into effective countermeasures, including behavioral analysis, anomaly detection, and robust incident response strategies. The findings emphasize the need for comprehensive cybersecurity education and the implementation of advanced security protocols to mitigate the risks associated with Trojan horses.Keywords: Trojan horses, cybersecurity, malware, data breach
Procedia PDF Downloads 9944 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble
Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi
Abstract:
Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble
Procedia PDF Downloads 221943 Analysis of EEG Signals Using Wavelet Entropy and Approximate Entropy: A Case Study on Depression Patients
Authors: Subha D. Puthankattil, Paul K. Joseph
Abstract:
Analyzing brain signals of the patients suffering from the state of depression may lead to interesting observations in the signal parameters that is quite different from a normal control. The present study adopts two different methods: Time frequency domain and nonlinear method for the analysis of EEG signals acquired from depression patients and age and sex matched normal controls. The time frequency domain analysis is realized using wavelet entropy and approximate entropy is employed for the nonlinear method of analysis. The ability of the signal processing technique and the nonlinear method in differentiating the physiological aspects of the brain state are revealed using Wavelet entropy and Approximate entropy.Keywords: EEG, depression, wavelet entropy, approximate entropy, relative wavelet energy, multiresolution decomposition
Procedia PDF Downloads 332942 Linac Quality Controls Using An Electronic Portal Imaging Device
Authors: Domingo Planes Meseguer, Raffaele Danilo Esposito, Maria Del Pilar Dorado Rodriguez
Abstract:
Monthly quality control checks for a Radiation Therapy Linac may be performed is a simple and efficient way once they have been standardized and protocolized. On the other hand this checks, in spite of being imperatives, require a not negligible execution times in terms of machine time and operators time. Besides it must be taken into account the amount of disposable material which may be needed together with the use of commercial software for their performing. With the aim of optimizing and standardizing mechanical-geometric checks and multi leaves collimator checks, we decided to implement a protocol which makes use of the Electronic Portal Imaging Device (EPID) available on our Linacs. The user is step by step guided by the software during the whole procedure. Acquired images are automatically analyzed by our programs all of them written using only free software.Keywords: quality control checks, linac, radiation oncology, medical physics, free software
Procedia PDF Downloads 199941 Proactive WPA/WPA2 Security Using DD-WRT Firmware
Authors: Mustafa Kamoona, Mohamed El-Sharkawy
Abstract:
Although the latest Wireless Local Area Network technology Wi-Fi 802.11i standard addresses many of the security weaknesses of the antecedent Wired Equivalent Privacy (WEP) protocol, there are still scenarios where the network security are still vulnerable. The first security model that 802.11i offers is the Personal model which is very cheap and simple to install and maintain, yet it uses a Pre Shared Key (PSK) and thus has a low to medium security level. The second model that 802.11i provide is the Enterprise model which is highly secured but much more expensive and difficult to install/maintain and requires the installation and maintenance of an authentication server that will handle the authentication and key management for the wireless network. A central issue with the personal model is that the PSK needs to be shared with all the devices that are connected to the specific Wi-Fi network. This pre-shared key, unless changed regularly, can be cracked using offline dictionary attacks within a matter of hours. The key is burdensome to change in all the connected devices manually unless there is some kind of algorithm that coordinate this PSK update. The key idea of this paper is to propose a new algorithm that proactively and effectively coordinates the pre-shared key generation, management, and distribution in the cheap WPA/WPA2 personal security model using only a DD-WRT router.Keywords: Wi-Fi, WPS, TLS, DD-WRT
Procedia PDF Downloads 233940 Dynamical Analysis of the Fractional-Order Mathematical Model of Hashimoto’s Thyroiditis
Authors: Neelam Singha
Abstract:
The present work intends to analyze the system dynamics of Hashimoto’s thyroiditis with the assistance of fractional calculus. Hashimoto’s thyroiditis or chronic lymphocytic thyroiditis is an autoimmune disorder in which the immune system attacks the thyroid gland, which gradually results in interrupting the normal thyroid operation. Consequently, the feedback control of the system gets disrupted due to thyroid follicle cell lysis. And, the patient perceives life-threatening clinical conditions like goiter, hyperactivity, euthyroidism, hyperthyroidism, etc. In this work, we aim to obtain the approximate solution to the posed fractional-order problem describing Hashimoto’s thyroiditis. We employ the Adomian decomposition method to solve the system of fractional-order differential equations, and the solutions obtained shall be useful to provide information about the effect of medical care. The numerical technique is executed in an organized manner to furnish the associated details of the progression of the disease and to visualize it graphically with suitable plots.Keywords: adomian decomposition method, fractional derivatives, Hashimoto's thyroiditis, mathematical modeling
Procedia PDF Downloads 211939 Violence against Women: Exploring Discursive Resistance in the Frames of Gender Violence in South Africa
Authors: Kunle Oparinde, Rachel Matteau-Matsha, Felix Awung
Abstract:
In recent times, the issue of gender-based violence against women in South Africa is prevalent in headlines due to the high rate of attacks directed towards women. Ranging from teenagers to adults, women are continuously targeted indiscriminately in what is seemingly becoming a prolonged cycle in the country. To this end, human rights activists, organisations, and political leaders have managed to somewhat verbally condemn the atrocious acts. Further, interested people in South Africa, through walks and protests, have continued to speak against the swinging violence against women in the country. The thrust in this study is to explore and analyse how discourse (language) has been employed as a resounding voice against gender violence in the country. Through a purposive sampling of materials employed during walks and protests, collected from online sources, we examine how language is being used to combat and confront the issue of gender violence viz-a-viz how it continues to serve as a crucial tool in repelling gender violence.Keywords: gender, violence, language, discourse, resistance
Procedia PDF Downloads 134938 Botnet Detection with ML Techniques by Using the BoT-IoT Dataset
Authors: Adnan Baig, Ishteeaq Naeem, Saad Mansoor
Abstract:
The Internet of Things (IoT) gadgets have advanced quickly in recent years, and their use is steadily rising daily. However, cyber-attackers can target these gadgets due to their distributed nature. Additionally, many IoT devices have significant security flaws in their implementation and design, making them vulnerable to security threats. Hence, these threats can cause important data security and privacy loss from a single attack on network devices or systems. Botnets are a significant security risk that can harm the IoT network; hence, sophisticated techniques are required to mitigate the risk. This work uses a machine learning-based method to identify IoT orchestrated by botnets. The proposed technique identifies the net attack by distinguishing between legitimate and malicious traffic. This article proposes a hyperparameter tuning model to improvise the method to improve the accuracy of existing processes. The results demonstrated an improved and more accurate indication of botnet-based cyber-attacks.Keywords: Internet of Things, Botnet, BoT-IoT dataset, ML techniques
Procedia PDF Downloads 11937 Management of the Asthma Crisis in the Unit of Intensive Care of the General Hospital of Reference of Kinshasa
Authors: Eddy K. Mukadi
Abstract:
The aim of this study was to provide contributing elements to improve the management of the asthma crisis in the intensive care unit of the General Reference Hospital of Kinshasa. This was a descriptive study of all patients in the intensive care unit presenting with the asthma attack during the period from February 5, 2013 to February 5, 2014. The main data were obtained from consultation registry and medical records. A total of 35 patients, 21 of whom were male (majority) compared to 14 female. Average age of patients was 46.48 plus or minus 16.98 with extremes ranging from 21-75 years. The clinic was dominated by dyspnea in 100% of cases, followed by rales with 91.4% of cases. In spite of the control of the crisis obtained after the treatment with B2 mimetic by inhalation was introduced A 91.5%; 88% corticosteroids; 80% oxygen, the therapeutic principle recommended for the management of asthma attacks was not respected in the majority of cases. This is why we suggest that improving the quality of care to be administered to patients will yield more adequate results.Keywords: asthma crisis, intensive care, general hospital, Kinshasa
Procedia PDF Downloads 232936 Detection Method of Federated Learning Backdoor Based on Weighted K-Medoids
Authors: Xun Li, Haojie Wang
Abstract:
Federated learning is a kind of distributed training and centralized training mode, which is of great value in the protection of user privacy. In order to solve the problem that the model is vulnerable to backdoor attacks in federated learning, a backdoor attack detection method based on a weighted k-medoids algorithm is proposed. First of all, this paper collates the update parameters of the client to construct a vector group, then uses the principal components analysis (PCA) algorithm to extract the corresponding feature information from the vector group, and finally uses the improved k-medoids clustering algorithm to identify the normal and backdoor update parameters. In this paper, the backdoor is implanted in the federation learning model through the model replacement attack method in the simulation experiment, and the update parameters from the attacker are effectively detected and removed by the defense method proposed in this paper.Keywords: federated learning, backdoor attack, PCA, k-medoids, backdoor defense
Procedia PDF Downloads 114935 Dys-Regulation of Immune and Inflammatory Response in in vitro Fertilization Implantation Failure Patients under Ovarian Stimulation
Authors: Amruta D. S. Pathare, Indira Hinduja, Kusum Zaveri
Abstract:
Implantation failure (IF) even after the good-quality embryo transfer (ET) in the physiologically normal endometrium is the main obstacle in in vitro fertilization (IVF). Various microarray studies have been performed worldwide to elucidate the genes requisite for endometrial receptivity. These studies have included the population based on different phases of menstrual cycle during natural cycle and stimulated cycle in normal fertile women. Additionally, the literature is also available in recurrent implantation failure patients versus oocyte donors in natural cycle. However, for the first time, we aim to study the genomics of endometrial receptivity in IF patients under controlled ovarian stimulation (COS) during which ET is generally practised in IVF. Endometrial gene expression profiling in IF patients (n=10) and oocyte donors (n=8) were compared during window of implantation under COS by whole genome microarray (using Illumina platform). Enrichment analysis of microarray data was performed to determine dys-regulated biological functions and pathways using Database for Annotation, Visualization and Integrated Discovery, v6.8 (DAVID). The enrichment mapping was performed with the help of Cytoscape software. Microarray results were validated by real-time PCR. Localization of genes related to immune response (Progestagen-Associated Endometrial Protein (PAEP), Leukaemia Inhibitory Factor (LIF), Interleukin-6 Signal Transducer (IL6ST) was detected by immunohistochemistry. The study revealed 418 genes downregulated and 519 genes upregulated in IF patients compared to healthy fertile controls. The gene ontology, pathway analysis and enrichment mapping revealed significant downregulation in activation and regulation of immune and inflammation response in IF patients under COS. The lower expression of Progestagen Associated Endometrial Protein (PAEP), Leukemia Inhibitory Factor (LIF) and Interleukin 6 Signal Transducer (IL6ST) in cases compared to controls by real time and immunohistochemistry suggests the functional importance of these genes. The study was proved useful to uncover the probable reason of implantation failure being imbalance of immune and inflammatory regulation in our group of subjects. Based on the present study findings, a panel of significant dysregulated genes related to immune and inflammatory pathways needs to be further substantiated in larger cohort in natural as well as stimulated cycle. Upon which these genes could be screened in IF patients during window of implantation (WOI) before going for embryo transfer or any other immunological treatment. This would help to estimate the regulation of specific immune response during WOI in a patient. The appropriate treatment of either activation of immune response or suppression of immune response can be then attempted in IF patients to enhance the receptivity of endometrium.Keywords: endometrial receptivity, immune and inflammatory response, gene expression microarray, window of implantation
Procedia PDF Downloads 155934 Ventilator Associated Pneumonia in a Medical Intensive Care Unit, Incidence and Risk Factors: A Case Control Study
Authors: Ammar Asma, Bouafia Nabiha, Ben Cheikh Asma, Ezzi Olfa, Mahjoub Mohamed, Sma Nesrine, Chouchène Imed, Boussarsar Hamadi, Njah Mansour
Abstract:
Background: Ventilator-associated pneumonia (VAP) is currently recognized as one of the most relevant causes of morbidity and mortality among intensive care unit (ICU) patients worldwide. Identifying modifiable risk factors for VAP could be helpful for future controlled interventional studies aiming at improving prevention of VAP. The purposes of this study were to determine the incidence and risk factors for VAP in in a Tunisian medical ICU. Materials / Methods: A retrospective case-control study design based on the prospective database collected over a 14-month period from September 15th, 2015 through November 15th, 2016 in an 8-bed medical ICU. Patients under ventilation for over 48 h were included. The number of cases was estimated by Epi-info Software with the power of statistical test equal to 90 %. Each case patient was successfully matched to two controls according to the length of mechanical ventilation (MV) before VAP for cases and the total length of MV in controls. VAP in the ICU was defined according to American Thoracic Society; Infectious Diseases Society of America guidelines. Early onset or late-onset VAP were defined whether the infectious process occurred within or after 96 h of ICU admission. Patients’ risk factors, causes of admission, comorbidities and respiratory specimens collected were reviewed. Univariate and multivariate analyses were performed to determine variables associated with VAP with a p-value < 0.05. Results: During the period study, a total of 169 patients under mechanical ventilation were considered, 34 patients (20.11%) developed at least one episode of VAP in the ICU. The incidence rate for VAP was 14.88/1000 ventilation days. Among these cases, 9 (26.5 %) were early-onset VAP and 25 (73.5 %) were late-onset VAP. It was a certain diagnosis in 66.7% of cases. Tracheal aspiration was positive in 80% of cases. Multi-drug resistant Acinerobacter baumanii was the most common species detected in cases; 67.64% (n=23). The rate of mortality out of cases was 88.23% (n= 30). In univariate analysis, the patients with VAP were statistically more likely to suffer from cardiovascular diseases (p=0.035) and prolonged duration of sedation (p=0.009) and tracheostomy (p=0.001), they also had a higher number of re-intubation (p=0.017) and a longer total time of intubation (p=0.012). Multivariate analysis showed that cardiovascular diseases (OR= 4.44; 95% IC= [1.3 - 14]; p=0.016), tracheostomy (OR= 4.2; 95% IC= [1.16 -15.12]; p= 0.028) and prolonged duration of sedation (OR=1.21; 95% IC= [1.07, 1.36]; p=0.002) were independent risk factors for the development of VAP. Conclusion: VAP constitutes a therapeutic challenge in an ICU setting, therefore; strategies that effectively prevent VAP are needed. An infection control-training program intended to all professional heath care in this unit insisting on bundles and elaboration of procedures are planned to reduce effectively incidence rate of VAP.Keywords: case control study, intensive care unit, risk factors, ventilator associated pneumonia
Procedia PDF Downloads 395933 Do Clawback Provisions Increase the Demand for Audit Service?
Authors: Yu-Chun Lin
Abstract:
This study examines whether the adoption of clawback provisions increases the demand for audit service. We use abnormal audit fees to proxy for the demand for audit service. Because firms’ voluntary adoption of the clawback provisions is endogenously determined, this study controls for this bias using the propensity-score matching technique. Based on 1,247 U.S. firms that voluntarily adopt clawback provisions during 2003-2013 and a matched sample, the empirical results show that clawback provisions adoption is associated with abnormal audit fees, especially by firms with higher likelihood of misstatements. When firm executives are overconfident, abnormal audit fees increase subsequent to clawback provisions adoption. Since regulators require listed firms to adopt recoupment policy after 2015 in U.S., the evidence about higher demand for audit service might provide political implications for mandatory clawback provisions.Keywords: clawback provisions, audit service, audit fees, overconfidence
Procedia PDF Downloads 382932 Geospatial Modeling Framework for Enhancing Urban Roadway Intersection Safety
Authors: Neeti Nayak, Khalid Duri
Abstract:
Despite the many advances made in transportation planning, the number of injuries and fatalities in the United States which involve motorized vehicles near intersections remain largely unchanged year over year. Data from the National Highway Traffic Safety Administration for 2018 indicates accidents involving motorized vehicles at traffic intersections accounted for 8,245 deaths and 914,811 injuries. Furthermore, collisions involving pedal cyclists killed 861 people (38% at intersections) and injured 46,295 (68% at intersections), while accidents involving pedestrians claimed 6,247 lives (25% at intersections) and injured 71,887 (56% at intersections)- the highest tallies registered in nearly 20 years. Some of the causes attributed to the rising number of accidents relate to increasing populations and the associated changes in land and traffic usage patterns, insufficient visibility conditions, and inadequate applications of traffic controls. Intersections that were initially designed with a particular land use pattern in mind may be rendered obsolete by subsequent developments. Many accidents involving pedestrians are accounted for by locations which should have been designed for safe crosswalks. Conventional solutions for evaluating intersection safety often require costly deployment of engineering surveys and analysis, which limit the capacity of resource-constrained administrations to satisfy their community’s needs for safe roadways adequately, effectively relegating mitigation efforts for high-risk areas to post-incident responses. This paper demonstrates how geospatial technology can identify high-risk locations and evaluate the viability of specific intersection management techniques. GIS is used to simulate relevant real-world conditions- the presence of traffic controls, zoning records, locations of interest for human activity, design speed of roadways, topographic details and immovable structures. The proposed methodology provides a low-cost mechanism for empowering urban planners to reduce the risks of accidents using 2-dimensional data representing multi-modal street networks, parcels, crosswalks and demographic information alongside 3-dimensional models of buildings, elevation, slope and aspect surfaces to evaluate visibility and lighting conditions and estimate probabilities for jaywalking and risks posed by blind or uncontrolled intersections. The proposed tools were developed using sample areas of Southern California, but the model will scale to other cities which conform to similar transportation standards given the availability of relevant GIS data.Keywords: crosswalks, cyclist safety, geotechnology, GIS, intersection safety, pedestrian safety, roadway safety, transportation planning, urban design
Procedia PDF Downloads 109931 VCloud: A Security Framework for VANET
Authors: Wiseborn Manfe Danquah, D. Turgay Altilar
Abstract:
Vehicular Ad-hoc Network (VANET) is an integral component of Intelligent Transport Systems (ITS) that has enjoyed a lot of attention from the research community and the automotive industry. This is mainly due to the opportunities and challenges it presents. Vehicular Ad-hoc Network being a class of Mobile Ad-hoc Networks (MANET) has all the security concerns existing in traditional MANET as well as new security and privacy concerns introduced by the unique vehicular communication environment. This paper provides a survey of the possible attacks in vehicular environment, as well as security and privacy concerns in VANET. It also provides an insight into the development of a comprehensive cloud framework to provide a more robust and secured communication among vehicular nodes and road side units. Our proposal, a Metropolitan Based Public Interconnected Vehicular Cloud (MIVC) infrastructure seeks to provide a more reliable and secured vehicular communication network.Keywords: mobile Ad-hoc networks, vehicular ad hoc network, cloud, ITS, road side units (RSU), metropolitan interconnected vehicular cloud (MIVC)
Procedia PDF Downloads 354930 An Efficient Mitigation Plan to Encounter Various Vulnerabilities in Internet of Things Enterprises
Authors: Umesh Kumar Singh, Abhishek Raghuvanshi, Suyash Kumar Singh
Abstract:
As IoT networks gain popularity, they are more susceptible to security breaches. As a result, it is crucial to analyze the IoT platform as a whole from the standpoint of core security concepts. The Internet of Things relies heavily on wireless networks, which are well-known for being susceptible to a wide variety of attacks. This article provides an analysis of many techniques that may be used to identify vulnerabilities in the software and hardware associated with the Internet of Things (IoT). In the current investigation, an experimental setup is built with the assistance of server computers, client PCs, Internet of Things development boards, sensors, and cloud subscriptions. Through the use of network host scanning methods and vulnerability scanning tools, raw data relating to IoT-based applications and devices may be collected. Shodan is a tool that is used for scanning, and it is also used for effective vulnerability discovery in IoT devices as well as penetration testing. This article presents an efficient mitigation plan for encountering vulnerabilities in the Internet of Things.Keywords: internet of things, security, privacy, vulnerability identification, mitigation plan
Procedia PDF Downloads 40929 Quality versus Excellence: The Importance of Employees Knowing the Difference
Authors: Chris Nelson
Abstract:
Quality and excellence are qualitative topics that are usually addressed based on knowledge and past experience from leadership and those in charge of the organization. The significance of this study is to highlight the differences and similarities between these two mindsets and how an operational staff can most appropriately use them in the workplace. Quality and excellence are two words that are talked about a lot in the manufacturing world. Buzzwords such as operational excellence, quality controls, and efficiencies are discussed in the boardroom as well on the shop floor. These terms are used quite frequently and with good reasons. When a person visits their favorite local restaurant, They go because 1) they like the food and 2) the people are some of the greatest individuals to be around. With that in mind, they know they always put out quality food. They do not always go because the quality of the food is far superior than other restaurants. But the quality of ingredients always meets their expectations. When they compare them to the term excellence, they are disappointed. The food never looks like the pictures on the menu. But when have you ever been to a restaurant where the food looks the same as on the menu? For them, when evaluating which buzzword to use as a guiding star, its simple: excellence. The corporation can accomplish these goals by operating at a standard that far exceeds customer’s wants and needs.Keywords: industrial engineering, innovation, management and technology, logistics and scheduling, six sigma
Procedia PDF Downloads 205928 Domestic and Foreign Terrorism: Evaluation of the Breeding Ground
Authors: T. K. Hung
Abstract:
Terrorism acts have occurred across both developed and developing states, with well-identified motivation and causes. For many years, terrorism eradication has become a major topic yet only passive actions were taken in response to acts. The linkage between the location of terrorism occurrence and breeding ground is not well-documented, resulting in the passive approach used in counter-terrorism nowadays. The evaluation investigates all post-9/11 terrorism affairs considering their state capacity, safety, ease of border access control, religion diversity, and technology access, to measure the level of breeding ground of the states. Those "weak" states with poor border access control, resources capacity and domestic safety are the best breeding ground for terrorists. Although many attacks were caused by religious motivation, religion diversity does not predict the breeding ground. States with censored technology access, particular computer-mediated communication, predict on the terrorism breeding ground, moderated by the level of breeding ground of neighboring states.Keywords: counter-terrorism, lethality, security, terrorism
Procedia PDF Downloads 340927 A Robust Digital Image Watermarking Against Geometrical Attack Based on Hybrid Scheme
Authors: M. Samadzadeh Mahabadi, J. Shanbehzadeh
Abstract:
This paper presents a hybrid digital image-watermarking scheme, which is robust against varieties of attacks and geometric distortions. The image content is represented by important feature points obtained by an image-texture-based adaptive Harris corner detector. These feature points are extracted from LL2 of 2-D discrete wavelet transform which are obtained by using the Harris-Laplacian detector. We calculate the Fourier transform of circular regions around these points. The amplitude of this transform is rotation invariant. The experimental results demonstrate the robustness of the proposed method against the geometric distortions and various common image processing operations such as JPEG compression, colour reduction, Gaussian filtering, median filtering, and rotation.Keywords: digital watermarking, geometric distortions, geometrical attack, Harris Laplace, important feature points, rotation, scale invariant feature
Procedia PDF Downloads 501926 Reduction in the Metabolic Cost of Human Walking Gaits Using Quasi-Passive Upper Body Exoskeleton
Authors: Nafiseh Ebrahimi, Gautham Muthukumaran, Amir Jafari
Abstract:
Human walking gait is considered to be the most efficient biped walking gait. There are various types of gait human follows during locomotion and arm swing is one of the most important factors which controls and differentiates human gaits. Earlier studies declared a 7% reduction in the metabolic cost due to the arm swing. In this research, we compared different types of arm swings in terms of metabolic cost reduction and then suggested, designed, fabricated and tested a quasi-passive upper body exoskeleton to study the metabolic cost reduction in the folded arm walking gate scenarios. Our experimental results validate a 10% reduction in the metabolic cost of walking aided by the application of the proposed exoskeleton.Keywords: arm swing, MET (metabolic equivalent of a task), calorimeter, oxygen consumption, upper body quasi-passive exoskeleton
Procedia PDF Downloads 157925 The Role of MAOA Gene in the Etiology of Autism Spectrum Disorder in Males
Authors: Jana Kisková, Dana Gabriková
Abstract:
Monoamine oxidase A gene (MAOA) is suggested to be a candidate gene implicated in many neuropsychiatric disorders, including autism spectrum disorder (ASD). This meta-analytic review evaluates the relationship between ASD and MAOA markers such as 30 bp variable number tandem repeats in the promoter region (uVNTR) and single nucleotide polymorphisms (SNPs) by using findings from recently published studies. It seems that in Caucasian males, the risk of developing ASD increase with the presence of 4-repeat allele in the promoter region of MAOA gene whereas no differences were found between autistic patients and controls in Egyptian, West Bengal and Korean population. Some studies point to the importance specific haplotype groups of SNPs and interaction of MAOA with others genes (e.g. FOXP2 or SRY). The results of existing studies are insufficient and further research is needed.Keywords: autism spectrum disorder, MAOA, uVNTR, single nucleotide polymorphism
Procedia PDF Downloads 384