Search results for: nuclear threats
756 Binderless Naturally-extracted Metal-free Electrocatalyst for Efficient NOₓ Reduction
Authors: Hafiz Muhammad Adeel Sharif, Tian Li, Changping Li
Abstract:
Recently, the emission of nitrogen-sulphur oxides (NOₓ, SO₂) has become a global issue and causing serious threats to health and the environment. Catalytic reduction of NOx and SOₓ gases into friendly gases is considered one of the best approaches. However, regeneration of the catalyst, higher bond-dissociation energy for NOx, i.e., 150.7 kcal/mol, escape of intermediate gas (N₂O, a greenhouse gas) with treated flue-gas, and limited activity of catalyst remains a great challenge. Here, a cheap, binderless naturally-extracted bass-wood thin carbon electrode (TCE) is presented, which shows excellent catalytic activity towards NOx reduction. The bass-wood carbonization at 900 ℃ followed by thermal activation in the presence of CO2 gas at 750 ℃. The thermal activation resulted in an increase in epoxy groups on the surface of the TCE and enhancement in the surface area as well as the degree of graphitization. The TCE unique 3D strongly inter-connected network through hierarchical micro/meso/macro pores that allow large electrode/electrolyte interface. Owing to these characteristics, the TCE exhibited excellent catalytic efficiency towards NOx (~83.3%) under ambient conditions and enhanced catalytic response under pH and sulphite exposure as well as excellent stability up to 168 hours. Moreover, a temperature-dependent activity trend was found where the highest catalytic activity was achieved at 80 ℃, beyond which the electrolyte became evaporative and resulted in a performance decrease. The designed electrocatalyst showed great potential for effective NOx-reduction, which is highly cost-effective, green, and sustainable.Keywords: electrocatalyst, NOx-reduction, bass-wood electrode, integrated wet-scrubbing, sustainable
Procedia PDF Downloads 75755 Navigating the Cacophony of Human Rights Claims and Chains of Fraud in Nigeria: The Anti-Corruption War Perspective
Authors: Mike Omilusi
Abstract:
Since the Buhari administration came to power, it has gained the people’s confidence with its anti-corruption efforts. Making culprits account for their past unlawful deeds, in a very determined and aggressive manner ever witnessed in the nation’s political history, generates different reactions among Nigerians. However, some questions remain pertinent to this study: Are Nigerians really advocating persecution or prosecution in respect of the graft suspects? Do they want conviction without being convinced? Is their outburst propelled by emotions and revengeful anticipation of having suspected looters of the nation’s commonwealth behind bars? Can the war be successfully fought without resorting to impunity? Relying extensively on secondary sources with the aid of descriptive and narrative tools, this study seeks to interrogate the claim of fundamental human rights in the face of wanton looting of the nation’s resources. If, as opined by President Buhari, corruption is a crime against humanity, then it is argued that those who commit such crime should be subjected to penalties prescribed by law. Such crime -as corruption in this study- deprives the citizens of welfare, social amenities and good things of life. In this instance, it also poses threats to national security, having misappropriated funds meant for the war against the Boko Haram terrorism as revealed by the anti-corruption agency in the country. A theoretically-driven investigation, this essay raises some expectations within the context of good governance-propelled anti-corruption crusade, making modest recommendations as to how corruption should be prevented and combated within the confine of rule of law.Keywords: corruption, rule of law, human rights, prosecution, commonwealth
Procedia PDF Downloads 202754 Comprehensive Analysis of RNA m5C Regulator ALYREF as a Suppressive Factor of Anti-tumor Immune and a Potential Tumor Prognostic Marker in Pan-Cancer
Authors: Yujie Yuan, Yiyang Fan, Hong Fan
Abstract:
Objective: The RNA methylation recognition protein Aly/REF export factor (ALYREF) is considered one type of “reader” protein acting as a recognition protein of m5C, has been reported involved in several biological progresses including cancer initiation and progression. 5-methylcytosine (m5C) is a conserved and prevalent RNA modification in all species, as accumulating evidence suggests its role in the promotion of tumorigenesis. It has been claimed that ALYREF mediates nuclear export of mRNA with m5C modification and regulates biological effects of cancer cells. However, the systematical regulatory pathways of ALYREF in cancer tissues have not been clarified, yet. Methods: The expression level of ALYREF in pan-cancer and their normal tissues was compared through the data acquired from The Cancer Genome Atlas (TCGA). The University of Alabama at Birmingham Cancer data analysis Portal UALCAN was used to analyze the relationship between ALYREF and clinical pathological features. The relationship between the expression level of ALYREF and prognosis of pan-cancer, and the correlation genes of ALYREF were figured out by using Gene Expression Correlation Analysis database GEPIA. Immune related genes were obtained from TISIDB (an integrated repository portal for tumor-immune system interactions). Immune-related research was conducted by using Estimation of STromal and Immune cells in MAlignant Tumor tissues using Expression data (ESTIMATE) and TIMER. Results: Based on the data acquired from TCGA, ALYREF has an obviously higher-level expression in various types of cancers compared with relevant normal tissues excluding thyroid carcinoma and kidney chromophobe. The immunohistochemical images on The Human Protein Atlas showed that ALYREF can be detected in cytoplasm, membrane, but mainly located in nuclear. In addition, a higher expression level of ALYREF in tumor tissue generates a poor prognosis in majority of cancers. According to the above results, cancers with a higher expression level of ALYREF compared with normal tissues and a significant correlation between ALYREF and prognosis were selected for further analysis. By using TISIDB, we found that portion of ALYREF co-expression genes (such as BIRC5, H2AFZ, CCDC137, TK1, and PPM1G) with high Pearson correlation coefficient (PCC) were involved in anti-tumor immunity or affect resistance or sensitivity to T cell-mediated killing. Furthermore, based on the results acquired from GEPIA, there was significant correlation between ALYREF and PD-L1. It was exposed that there is a negative correlation between the expression level of ALYREF and ESTIMATE score. Conclusion: The present study indicated that ALYREF plays a vital and universal role in cancer initiation and progression of pan-cancer through regulating mitotic progression, DNA synthesis and metabolic process, and RNA processing. The correlation between ALYREF and PD-L1 implied ALYREF may affect the therapeutic effect of immunotherapy of tumor. More evidence revealed that ALYREF may play an important role in tumor immunomodulation. The correlation between ALYREF and immune cell infiltration level indicated that ALYREF can be a potential therapeutic target. Exploring the regulatory mechanism of ALYREF in tumor tissues may expose the reason for poor efficacy of immunotherapy and offer more directions of tumor treatment.Keywords: ALYREF, pan-cancer, immunotherapy, PD-L1
Procedia PDF Downloads 69753 Cytotoxic Effects of Engineered Nanoparticles in Human Mesenchymal Stem Cells
Authors: Ali A. Alshatwi, Vaiyapuri S. Periasamy, Jegan Athinarayanan
Abstract:
Engineered nanoparticles’ usage rapidly increased in various applications in the last decade due to their unusual properties. However, there is an ever increasing concern to understand their toxicological effect in human health. Particularly, metal and metal oxide nanoparticles have been used in various sectors including biomedical, food and agriculture. But their impact on human health is yet to be fully understood. In this present investigation, we assessed the toxic effect of engineered nanoparticles (ENPs) including Ag, MgO and Co3O4 nanoparticles (NPs) on human mesenchymal stem cells (hMSC) adopting cell viability and cellular morphological changes as tools The results suggested that silver NPs are more toxic than MgO and Co3O4NPs. The ENPs induced cytotoxicity and nuclear morphological changes in hMSC depending on dose. The cell viability decreases with increase in concentration of ENPs. The cellular morphology studies revealed that ENPs damaged the cells. These preliminary findings have implications for the use of these nanoparticles in food industry with systematic regulations.Keywords: cobalt oxide, human mesenchymal stem cells, MgO, silver
Procedia PDF Downloads 387752 Deposition of Size Segregated Particulate Matter in Human Respiratory Tract and Their Health Effects in Glass City Residents
Authors: Kalpana Rajouriya, Ajay Taneja
Abstract:
Particulates are ubiquitous in the air environment and cause serious threats to human beings, such as lung cancer, COPD, and Asthma. Particulates mainly arise from industrial effluent, vehicular emission, and other anthropogenic activities. In the glass industrial city Firozabad, real-time monitoring of size segregated Particulate Matter (PM) and black carbon was done by Aerosol Black Carbon Detector (ABCD) and GRIMM portable aerosol Spectrometer at two different sites in which one site is urban and another is rural. The average mass concentration of size segregated PM during the study period (March & April 2022) was recorded as PM10 (223.73 g/m⁻³), PM5.0 (44.955 g/m⁻³), PM2.5 (59.275 g/m⁻³), PM1.0 (33.02 g/m⁻³), PM0.5 (2.05 g/m⁻³), and PM0.25 (2.99 g/m⁻³). The highest concentration of BC was found in Urban due to the emissions from diesel engines and wood burning, while NO2 was highest at the rural sites. The average concentrations of PM10 (6.08 and 2.73 times) PM2.5 exceeded the NAAQS and WHO guidelines. Particulate Matter deposition and health risk assessment was done by MPPD and USEPA model to know about the particulate matter toxicity in industrial residents. Health risk assessment results showed that Children are most likely to be affected by exposure of PM10 and PM2.5 and may have various non-carcinogenic and carcinogenic diseases. Deposition results inferred that the sensitive exposed population, especially 9 years old children, have high PM deposition as well as visualization and may be at risk of developing health-related problems from exposure to size-segregated PM. They will be discussed during presentation.Keywords: particulate matter, black carbon, NO2, deposition of PM, health risk
Procedia PDF Downloads 64751 Coordination Behavior, Theoretical Studies, and Biological Activity of Some Transition Metal Complexes with Oxime Ligands
Authors: Noura Kichou, Manel Tafergguenit, Nabila Ghechtouli, Zakia Hank
Abstract:
The aim of this work is to synthesize, characterize and evaluate the biological activity of two Ligands : glyoxime and dimethylglyoxime, and their metal Ni(II) chelates. The newly chelates were characterized by elemental analysis, IR, EPR, nuclear magnetic resonances (1H and 13C), and biological activity. The antibacterial and antifungal activities of the ligands and its metal complexes were screened against bacterial species (Staphylococcus aureus, Bacillus subtilis, and Escherichia coli) and fungi (Candida albicans). Ampicillin and amphotericin were used as references for antibacterial and antifungal studies. The activity data show that the metal complexes have a promising biological activity comparable with parent free ligand against bacterial and fungal species. A structural, energetic, and electronic theoretical study was carried out using the DFT method, with the functional B3LYP and the gaussian program 09. A complete optimization of geometries was made, followed by a calculation of the frequencies of the normal modes of vibration. The UV spectrum was also interpreted. The theoretical results were compared with the experimental data.Keywords: glyoxime, dimetylglyoxime, nickel, antibacterial activity
Procedia PDF Downloads 103750 Coordination Behavior, Theoretical studies and Biological Activity of Some Transition Metal Complexes with Oxime Ligands
Authors: Noura Kichou, Manel Tafergguenit, Nabila Ghechtouli, Zakia Hank
Abstract:
The aim of this work is to synthesize, characterize and evaluate the biological activity of two Ligands: glyoxime and dimethylglyoxime, and their metal Ni(II) chelates. The newly chelates were characterized by elemental analysis, IR, EPR, nuclear magnetic resonances (1H and 13C), and biological activity. The antibacterial and antifungal activities of the ligands and its metal complexes were screened against bacterial species (Staphylococcus aureus, Bacillus subtilis, and Escherichia coli) and fungi (Candida albicans). Ampicillin and amphotericin were used as references for antibacterial and antifungal studies. The activity data show that the metal complexes have a promising biological activity comparable with parent free ligand against bacterial and fungal species. A structural, energetic, and electronic theoretical study was carried out using the DFT method, with the functional B3LYP and the gaussian program 09. A complete optimization of geometries was made, followed by a calculation of the frequencies of the normal modes of vibration. The UV spectrum was also interpreted. The theoretical results were compared with the experimental data.Keywords: glyoxime, dimetylglyoxime, nickel, antibacterial activity
Procedia PDF Downloads 109749 Secure and Privacy-Enhanced Blockchain-Based Authentication System for University User Management
Authors: Ali El Ksimi
Abstract:
In today's digital academic environment, secure authentication methods are essential for managing sensitive user data, including that of students and faculty. The rise in cyber threats and data breaches has exposed the vulnerabilities of traditional authentication systems used in universities. Passwords, often the first line of defense, are particularly susceptible to hacking, phishing, and brute-force attacks. While multi-factor authentication (MFA) provides an additional layer of security, it can still be compromised and often adds complexity and inconvenience for users. As universities seek more robust security measures, blockchain technology emerges as a promising solution. Renowned for its decentralization, immutability, and transparency, blockchain has the potential to transform how user management is conducted in academic institutions. In this article, we explore a system that leverages blockchain technology specifically for managing user accounts within a university setting. The system enables the secure creation and management of accounts for different roles, such as administrators, teachers, and students. Each user is authenticated through a decentralized application (DApp) that ensures their data is securely stored and managed on the blockchain. By eliminating single points of failure and utilizing cryptographic techniques, the system enhances the security and integrity of user management processes. We will delve into the technical architecture, security benefits, and implementation considerations of this approach. By integrating blockchain into user management, we aim to address the limitations of traditional systems and pave the way for the future of digital security in education.Keywords: blockchain, university, authentication, decentralization, cybersecurity, user management, privacy
Procedia PDF Downloads 22748 Advanced Catechol-Modified Chitosan Hydrogels with the Inducement of Iron (III) Ion at Acidic Condition
Authors: Ngoc Quang Nguyen, Daewon Sohn
Abstract:
Chitosan (CS) is a natural polycationic polysaccharide and pH-sensitive polymer with incomplete deacetylation from claiming chitin. It is also a guaranteeing material in terms of pharmaceutical, chemical, and sustenance industry due to its exceptional structure (reactive –OH and –NH2 groups). In this study, a catechol-functionalized chitosan (CCS, for an eminent level for substitution) was synthesized and propelled by marine mussel cuticles in place on research those intricate connections between Fe³⁺ and catechol under acidic conditions. The ratios of catechol, chitosan and other reagents decide the structure of the hydrogel. The gel formation is then well-maintained by dual cross-linking through electrostatic interactions between Fe³⁺ and CCS and covalent catechol-coupling-based coordinate bonds. The hydrogels showed enhanced cohesiveness and shock-absorbing properties with increasing pH due to coordinate bonds inspired by mussel byssal threads. Thus, the gelation time, rheological properties, UV-vis and ¹H-Nuclear Magnetic Resonance spectroscopy, and the morphologic aspects were elucidated to describe those crosslinking components and the physical properties of the chitosan backbones and hydrogel frameworks.Keywords: catechol, chitosan, iron ion, gelation, hydrogel
Procedia PDF Downloads 139747 From Protection of Sacrificial Self, to Critical Turning Points and Growth: Nurses’ Experiences of Caring for Patients on the Frontline in Ireland during the COVID-19 Pandemic
Authors: Sinead Creedon, Anna Trace
Abstract:
Nurses were the most exposed of all frontline healthcare workers during the COVID-19 pandemic. Mainly female nurses working in the acute hospital sector formed the frontline defence in the Irish health service. They faced it with resilience and courage despite exposure to risk of burnout and threats to their mental health and wellbeing. Gaining an understanding of the nurses’ journey in adapting to this harsh climate could inform positive psychology interventions and / or support staff such as senior hospital managers in an adverse work situation. Furthermore, it would strengthen our insight and theoretical understanding on the use of positive psychology interventions in adverse work conditions. An interpretative phenomenological analysis was carried out to gain insight into how nurses adapted to the changing work environment during the pandemic. Online semi-structured interviews were done with six experienced female nurses who were all redeployed to the frontline from their own roles. The three themes representing the nurses’ journey were the Protection of Sacrificial Self, The Fortifying Effect of Us, and Critical Turning Points & Growth. Nurses revitalised themselves by creating a sense of ‘us’ to help them face a harsh climate against others, which enabled additional critical turning points. This study further enriches our understanding of personal growth and trauma in adverse work conditions by including an exploration of what sacrificial commitment adds to our understanding of physical and moral courage.Keywords: COVID-19, nurses, positive psychology, resilience, sacrificial commitment, supports
Procedia PDF Downloads 147746 Root Cause Analysis of Surveillance Quality in Tanjung Priok Port to Prevent Epidemic Potential Disease as a Form of Bioterrorism Threat
Authors: Dina A. Amu, Fifi N. Afifah, Catur Rosidati, Tirton Nefianto
Abstract:
Indonesia was shaken up by the avian influenza cases that had caused the country suffered losses of millions of dollars. The avian influenza case had even been suspected as a bioterrorism attack since it was an uncommon case in epidemiology. Furthermore, this avian influenza virus is a high pathogenic one and Indonesia has the highest case of fatality rate in the world. Bioterrorism threats or epidemic potential disease outbreaks currently does not exist in Tanjung Priok port yet. However, the surveillance system enhancement on epidemic potential diseases should be taken as a prevention, especially because Indonesia is currently facing the ASEAN Economic Society (AES). Therefore, this research evaluates the health surveillance system which is organized by Control, Quarantine and Surveillance Department, Health Office of Tanjung Priok Port. This study uses qualitative-evaluative method which utilizes Urgency Seriousness Growth (USG) method to determine priority issues and Root Cause analysis to determine the cause of prior problem. The result of this research shows that the implementation of epidemic potential disease surveillance in Tanjung Priok port has not done in the best possible way. It is because the lack of time allocation and the succinctness of the check list of ship's environmental health inspection. Therefore, Health Ministry of Indonesia should recruit more employees at the health office of Tanjung Priok port, hold a simulation of ship's inspection and simplify the list for ship's environmental health inspection.Keywords: surveillance, epidemic potential disease, port health, bioterrorism
Procedia PDF Downloads 362745 Synthesis and Characterization of CaZrTi2O7 from Tartrate Precursor Employing Microwave Heating Technique
Authors: B. M. Patil, S. R. Dharwadkar
Abstract:
Zirconolite (CaZrTi2O7) is one of the three major phases in the synthetic ceramic 'SYNROC' which is used for immobilization of high-level nuclear waste and also acts as photocatalytic and photophysical properties. In the present work the nanocrystalline CaZrTi2O7 was synthesized from Calcium Zirconyl Titanate tartrate precursor (CZTT) employing two different heating techniques such as Conventional heating (Muffle furnace) and Microwave heating (Microwave Oven). Thermal decomposition of the CZTT precursors in air yielded nanocrystalline CaZrTi2O7 powder as the end product. The products obtained by annealing the CZTT precursor using both heating method were characterized using simultaneous TG-DTA, FTIR, XRD, SEM, TEM, NTA and thermodilatometric study. The physical characteristics such as crystallinity, morphology and particle size of the product obtained by heating the CZTT precursor at the different temperatures in a Muffle furnace and Microwave oven were found to be significantly different. The microwave heating technique considerably lowered the synthesis temperature of CaZrTi2O7. The influence of microwave heating was more pronounced as compared to Muffle furnace heating. The details of the synthesis of CaZrTi2O7 from CZTT precursor are discussed.Keywords: CZTT, CaZrTi2O7, microwave, SYNROC, zirconolite
Procedia PDF Downloads 163744 Rice Husk Silica as an Alternative Material for Renewable Energy
Authors: Benedict O. Ayomanor, Cookey Iyen, Ifeoma S. Iyen
Abstract:
Rice hull (RH) biomass product gives feasible silica for exact temperature and period. The minimal fabrication price turns its best feasible produce to metallurgical grade silicon (MG-Si). In this work, to avoid ecological worries extending from CO₂ release to oil leakage on water and land, or nuclear left-over pollution, all finally add to the immense topics of ecological squalor; high purity silicon > 98.5% emerge set from rice hull ash (RHA) by solid-liquid removal. The RHA derived was purified by nitric and hydrochloric acid solutions. Leached RHA sieved, washed in distilled water, and desiccated at 1010ºC for 4h. Extra cleansing was achieved by carefully mixing the SiO₂ ash through Mg dust at a proportion of 0.9g SiO₂ to 0.9g Mg, galvanised at 1010ºC to formula magnesium silicide. The solid produced was categorised by X-ray fluorescence (XRF), X-ray diffractometer (XRD), and Fourier transformation infrared (FTIR) spectroscopy. Elemental analysis using XRF found the percentage of silicon in the material is approximately 98.6%, main impurities are Mg (0.95%), Ca (0.09%), Fe (0.3%), K (0.25%), and Al (0.40%).Keywords: siliceous, leached, biomass, solid-liquid extraction
Procedia PDF Downloads 68743 Choosing the Lesser Evil: Tribal Alignment Formation in Civil Wars
Authors: Busra Nur Ozguler Aktel
Abstract:
This research aims to understand the factors that affect the ways in which tribes perceive and respond to violent conflicts in fragile states, given that tribes are essential stakeholders in many conflict-ridden fragile states, whether Afghanistan, Iraq, Syria, Libya, Somalia, Nigeria, or Yemen. It explores the primary questions of why some tribes align with extremist groups while others align with states during civil wars and why some tribes switch alignments. It argues that tribes form and switch alignments based on their perception of threats to their traditional tribal structure (internal dynamics) and clientelist relationships (external dynamics). Put differently; threat perceptions lead them to choose either the state or extremist groups that will more likely secure their traditional structure and patronage networks. This study focuses on Iraqi tribes as a case study. It builds a theory of tribal alignment formation based on ethnographic fieldwork in the Middle East, with a particular focus on Iraqi Sunni tribes living in the Kurdish region of Iraq and Jordan. As a result of the interviews with tribal leaders and members, local journalists, researchers, and politicians, it concludes that complex (re)alignments of tribes can determine the course and outcome of the conflicts, either mitigating or escalating violence. This study contributes to the larger body of conflict management and peacebuilding literature by introducing tribes as non-state actors and exploring their interactions with other actors in civil wars.Keywords: civil wars, tribes, alignment formation, side-switching, Iraq
Procedia PDF Downloads 87742 Key Challenges Facing the Management of Archaeological and Tourism Sites in Jordan
Authors: Muna Slehat
Abstract:
Jordan is endowed with over 14,500 productive archaeological sites and also a wealth of heritage sites that need to be protected from the pressing threat of destruction and damage. Archaeological sites in Jordan face significant threats, including insensitive development, urbanization, pollution, tourism, and vandalism, therefore an effective management plan is a key element, not only for the conservation of this heritage, but also to address issues such as tourism and sustainable development. This study highlights the obstacles that confront the management of the archaeological and tourism sites in Jordan, prior to and after the launch of the Strategies for Management of Jordan’s Archaeological Heritage by the Department of Antiquities (DoA) 2007-2010 and 2014-2018, as well as the establishment of the Directorate of the Management of Archaeological Sites in 2010, and instructions for the proper use of tourism sites, 2014, by the Ministry of Tourism and Antiquities (MoTA). The study has revealed that the management of the archaeological and tourism sites under the pretext of improvement of services for tourists and visitors to Jordan would allow access to so-called polarization tourism and facilitate tourism development that would be sustainable economically and provide attractive returns. The data required have been collected through conducting interviews with 18 specialists. The main findings of the study are that management is new in Jordan, and has become a vital and dynamic force in Jordan after 2000 but that there have also been many mistakes, with sustainability of the sites being ignored and a lack of awareness among local communities surrounding these sites. Management of the sites has also suffered from a lack of organizational vision, with no instructions for practical application and no legislative provisions which cater for the efficient management of the sites. All of this needs to be amended to remove gaps, overlaps and ambiguities, so that the authorities responsible for the rehabilitation and promotion, development and management of these sites can overcome the problems, such as lack of human resources (specialists) and financial resources.Keywords: Jordan, management, archaeological sites, tourism, challenges
Procedia PDF Downloads 308741 Cryptographic Resource Allocation Algorithm Based on Deep Reinforcement Learning
Authors: Xu Jie
Abstract:
As a key network security method, cryptographic services must fully cope with problems such as the wide variety of cryptographic algorithms, high concurrency requirements, random job crossovers, and instantaneous surges in workloads. Its complexity and dynamics also make it difficult for traditional static security policies to cope with the ever-changing situation. Cyber Threats and Environment. Traditional resource scheduling algorithms are inadequate when facing complex decision-making problems in dynamic environments. A network cryptographic resource allocation algorithm based on reinforcement learning is proposed, aiming to optimize task energy consumption, migration cost, and fitness of differentiated services (including user, data, and task security) by modeling the multi-job collaborative cryptographic service scheduling problem as a multi-objective optimized job flow scheduling problem and using a multi-agent reinforcement learning method, efficient scheduling and optimal configuration of cryptographic service resources are achieved. By introducing reinforcement learning, resource allocation strategies can be adjusted in real-time in a dynamic environment, improving resource utilization and achieving load balancing. Experimental results show that this algorithm has significant advantages in path planning length, system delay and network load balancing and effectively solves the problem of complex resource scheduling in cryptographic services.Keywords: cloud computing, cryptography on-demand service, reinforcement learning, workflow scheduling
Procedia PDF Downloads 10740 Resilient Security System with Toll Free Call Services: Case Study of Adama City
Authors: Shanko Chura Aredo, Hailu Jeldie Wodajo, Muktar Jeylan, Kedir Ilka, Abdulnasir Husein
Abstract:
Toll-free numbers are calling numbers that have unique three or four digit numbers and that don’t require payment from phone lines in order to be called. With the help of these numbers, callers can connect with nearby organizations and/or people without incurring far-reaching fees. Calls to assistance centers are especially popular from toll-free phones. In the past, toll-free services have offered prospective clients and other parties a simple and cost-free means of getting in touch with enterprises. Nevertheless, unless they have an ”unlimited calling” plan, wireless subscribers will be billed for the airtime minutes used during a toll-free call. In Adama, the second largest city in Ethiopia, a call center has been installed as part of smart security system and serving since January 2023 for collection of complaints from different community levels. The call center is situated at the mayor office and has 11 active workers, 4 of these working the night time and the remaining during day time. The information reported in the form of complaints from individuals and groups are illegal constructions, illegal trade, income concealment or hiding, giving and receiving bribe, informing new faces of suspected enemies and exposing individual or group conflicts. This technology has been found to bring a significant outcome in minimizing illegal acts, public safety threats and service delivery problems.Keywords: smart, safety, crime, call center, security
Procedia PDF Downloads 54739 Massive Deployments of Insurgent Intelligence by Violent Non-state Actors (VNSAs) in the 21st Century and Threats to Global Security
Authors: Temitope Francis Abiodun
Abstract:
The practice of intelligence is not limited to the machinery of a nation state alone, yet not much research or analysis has been directed towards the spy-crafts and tradecrafts engaged in by violent non-state actors (VNSAs) in the international community. The rise of 'private sector intelligence' in more recent years has only just begun to be interrogated by practitioners and academics. However, the use of intelligence by insurgents and other groups assembled to achieve varied forms of politico-military outcomes has often been overlooked. This paper examined the factors and conditions that gave rise to an increase in violent non-state actors (VNSAs), strategies aiding their deployment of insurgent intelligence, and as well the implications of their activities on global security. The failed state theory was adopted, while a descriptive research design served as the framework for the study. Data were collected from primary and secondary sources. The paper, however, revealed there were massive deployments of insurgent intelligence by violent non-state actors in contrast to a faulty pre-conception that insurgents were not as highly trained in deployment of intelligence as state actors, having assumed that the VNSAs lacked the sophistication to produce intelligence. However, the strategic objectives of insurgents (VNSAs) were revealed to depend on well-organized information gathering operations that feed into the tactical executions of their insurgency. The paper recommends, therefore, there is a need for adequate training on the part of security personnel in the states to be alive to their responsibilities; and there is also a need to ensure adequate border control and management to checkmate the influx of the various violent or deadly movements across global frontiers.Keywords: terrorism, non-violent state actors, private sector intelligence, security
Procedia PDF Downloads 137738 mRNA Expression of NFKB1 with Parkinson's Disease
Authors: Ali Bayram, Burak Uz, Remzi Yiğiter
Abstract:
The aim of the present study was to investigate the expression levels of homo sapiens nuclear factor of kappa light polypeptide gene enhancer in B-cells 1, transcript variant 1 (NFKB1*1) mRNA in the peripheral blood of patients with Parkinson to elucidate the role in the pathogenesis of Parkinson disease (PD). The study group comprised 50 patients with the diagnosis of PD who have applied to Gaziantep University Faculty of Medicine, and Department of Neurology. 50 healthy individuals without any neuro degenerative disease are included as controls. Ribonucleic acid (RNA) was obtained from blood samples of patient and control groups. Complementary deoxyribonucleic acid (cDNA) was obtained from RNA samples using reverse transcription polymerase chain reaction (RT-PCR) technique. The gene expression of NFKB1*1 in patient/control groups were observed to decrease significantly, and the differences between groups with the Mann-Whitney method within 95% confidence interval (p<0.05) were analyzed. This salient finding provide a clue for our hypothesis that reduced activity of NFKB1*1 gene might play a role, at least partly, in the pathophysiology of PD.Keywords: Parkinson’s Disease, NFKB1, mRNA expression, RT-PCR
Procedia PDF Downloads 500737 Functional Plasma-Spray Ceramic Coatings for Corrosion Protection of RAFM Steels in Fusion Energy Systems
Authors: Chen Jiang, Eric Jordan, Maurice Gell, Balakrishnan Nair
Abstract:
Nuclear fusion, one of the most promising options for reliably generating large amounts of carbon-free energy in the future, has seen a plethora of ground-breaking technological advances in recent years. An efficient and durable “breeding blanket”, needed to ensure a reactor’s self-sufficiency by maintaining the optimal coolant temperature as well as by minimizing radiation dosage behind the blanket, still remains a technological challenge for the various reactor designs for commercial fusion power plants. A relatively new dual-coolant lead-lithium (DCLL) breeder design has exhibited great potential for high-temperature (>700oC), high-thermal-efficiency (>40%) fusion reactor operation. However, the structural material, namely reduced activation ferritic-martensitic (RAFM) steel, is not chemically stable in contact with molten Pb-17%Li coolant. Thus, to utilize this new promising reactor design, the demand for effective corrosion-resistant coatings on RAFM steels represents a pressing need. Solution Spray Technologies LLC (SST) is developing a double-layer ceramic coating design to address the corrosion protection of RAFM steels, using a novel solution and solution/suspension plasma spray technology through a US Department of Energy-funded project. Plasma spray is a coating deposition method widely used in many energy applications. Novel derivatives of the conventional powder plasma spray process, known as the solution-precursor and solution/suspension-hybrid plasma spray process, are powerful methods to fabricate thin, dense ceramic coatings with complex compositions necessary for the corrosion protection in DCLL breeders. These processes can be used to produce ultra-fine molten splats and to allow fine adjustment of coating chemistry. Thin, dense ceramic coatings with chosen chemistry for superior chemical stability in molten Pb-Li, low activation properties, and good radiation tolerance, is ideal for corrosion-protection of RAFM steels. A key challenge is to accommodate its CTE mismatch with the RAFM substrate through the selection and incorporation of appropriate bond layers, thus allowing for enhanced coating durability and robustness. Systematic process optimization is being used to define the optimal plasma spray conditions for both the topcoat and bond-layer, and X-ray diffraction and SEM-EDS are applied to successfully validate the chemistry and phase composition of the coatings. The plasma-sprayed double-layer corrosion resistant coatings were also deposited onto simulated RAFM steel substrates, which are being tested separately under thermal cycling, high-temperature moist air oxidation as well as molten Pb-Li capsule corrosion conditions. Results from this testing on coated samples, and comparisons with bare RAFM reference samples will be presented and conclusions will be presented assessing the viability of the new ceramic coatings to be viable corrosion prevention systems for DCLL breeders in commercial nuclear fusion reactors.Keywords: breeding blanket, corrosion protection, coating, plasma spray
Procedia PDF Downloads 306736 Influence of Pseudomonas japonica on Growth and Metal Tolerance of Celosia cristata L.
Authors: Muhammad Umair Mushtaq, Ameena Iqbal, Muhammad Aqib Hassan Ali Khan, Ismat Nawaz, Sohail Yousaf, Mazhar Iqbal
Abstract:
Heavy metals are one of the priority pollutants as they pose serious health and environmental threats. They can be removed by various physiochemical methods but are costly and responsible for additional environmental problems. Bioremediation that exploits plants and their associated microbes have been referred as cost effective and environmental friendly technique. In this study, a pot experiment was conducted in a greenhouse to evaluate the potential of Celosia cristata and effects of bacteria, Pseudomonas japonica, and organic amendment moss/compost on tolerating/accumulating heavy metals. Two weeks old seedlings were transferred to soil in pots, and after four weeks they were inoculated with bacterial strain, while after growth of six weeks they were watered with a metal containing synthetic wastewater and were harvested after a growth period of nine weeks. After harvesting, morphological and physiological parameters and metal content of plants were measured. The results showed highest plant growth and biomass production in case of organic amendments while highest metal uptake has been found in non-amended pots. Positive controls have shown highest Pb uptake of 2900 mg/kg DW, while P. japonica amended pots have shown highest Cd, Cr, Ni and Cu uptake of 963.53, 1481.17, 1022.01 and 602.17 mg/kg DW, respectively. In conclusion organic amendments have strong impacts on growth enhancement while P. japonica enhances metal translocation and accumulation to aerial parts with little significant involvement in plant growth.Keywords: ornamental plants, plant microbe interaction, amendments, bacteria
Procedia PDF Downloads 292735 Cycas beddomei Dyer: An Endemic and Endangered Indian Medicinal Plant
Authors: Ayyavu Brama Dhayala Selvam
Abstract:
Herbal medicines are gaining importance due to holistic nature and lesser side effects. Cycas beddomei Dyer is one of the highly exploited medicinal plants in India. Due to over-exploitation of male and female cones, young leaves and starch-bearing pithy stems for edible, medicinal and socio-cultural practices by the locals, tribals and traders, the plant population has drastically declined in its natural habitats. Cycas beddomei is an endemic to India. The current IUCN status of this plant species in the wild is endangered. Perhaps, it is the only species of Cycas enlisted in Appendix I of CITES (Convention on International Trade in Endangered Species of wild fauna and flora). Endorsing the CITES decisions, the Government of India has placed C. beddomei in the “Negative List of Exports” during 1998. Though this plant has been banned legally, but illegally, it is highly exploited by different means. Therefore, conservation of this species is an urgent need of the hour. The present paper highlights unique morphological and anatomical characters of C. beddomei, along with its present status, major threats and conservation measures. Cycas beddomei can easily be identified by some of the distinguishing morphological and anatomical characters, viz., 2–4 mm wide leaflets with revolute margins; the apices of microsporophylls from the middle to apex of the pollen cones turn downwards on maturity; mucilage canal cells are seen in the midrib region of the leaflets; stomatal frequency is about 18 numbers at 250x; pollen grains are monocolpate and their diameter ranging from 22.5 to 30 µm.Keywords: CITES, Cycas beddomei, endangered, endemic
Procedia PDF Downloads 292734 Methods and Algorithms of Ensuring Data Privacy in AI-Based Healthcare Systems and Technologies
Authors: Omar Farshad Jeelani, Makaire Njie, Viktoriia M. Korzhuk
Abstract:
Recently, the application of AI-powered algorithms in healthcare continues to flourish. Particularly, access to healthcare information, including patient health history, diagnostic data, and PII (Personally Identifiable Information) is paramount in the delivery of efficient patient outcomes. However, as the exchange of healthcare information between patients and healthcare providers through AI-powered solutions increases, protecting a person’s information and their privacy has become even more important. Arguably, the increased adoption of healthcare AI has resulted in a significant concentration on the security risks and protection measures to the security and privacy of healthcare data, leading to escalated analyses and enforcement. Since these challenges are brought by the use of AI-based healthcare solutions to manage healthcare data, AI-based data protection measures are used to resolve the underlying problems. Consequently, this project proposes AI-powered safeguards and policies/laws to protect the privacy of healthcare data. The project presents the best-in-school techniques used to preserve the data privacy of AI-powered healthcare applications. Popular privacy-protecting methods like Federated learning, cryptographic techniques, differential privacy methods, and hybrid methods are discussed together with potential cyber threats, data security concerns, and prospects. Also, the project discusses some of the relevant data security acts/laws that govern the collection, storage, and processing of healthcare data to guarantee owners’ privacy is preserved. This inquiry discusses various gaps and uncertainties associated with healthcare AI data collection procedures and identifies potential correction/mitigation measures.Keywords: data privacy, artificial intelligence (AI), healthcare AI, data sharing, healthcare organizations (HCOs)
Procedia PDF Downloads 92733 Understanding Patterns of Hard Coral Demographics in Kenyan Reefs to Inform Restoration
Authors: Swaleh Aboud, Mishal Gudka, David Obura
Abstract:
Background: Coral reefs are becoming increasingly vulnerable due to several threats ranging from climate change to overfishing. This has resulted in increased management and conservation efforts to protect reefs from degradation and facilitate recovery. Recruitmentof new individuals are isimportant in the recovery process and critical for the persistence of coral reef ecosystems. Local coral community structure can be influenced by successful recruit settlement, survival, and growth Understanding coral recruitment patterns can help quantify reef resilience and connectivity, establish baselines and track changes and evaluate the effectiveness of reef restoration and conservation efforts. This study will examine the abundance and spatial pattern of coral recruits and how this relates to adult community structure, including the distribution of thermal resistance and sensitive genera and their distribution in different management regimes. Methods: Coral recruit and demography surveys were conducted from 2020 to 2022, covering 35 sites in 19coral reef locations along the Kenyan coast. These included marine parks, reserves, community conservation areas (CMAs), and open access areas from the north (Marereni) to the south (Kisite) coast of Kenya and across different reef habitats. The data was collected through the underwater visual census (UVC) technique. We counted adult corals (>10 cm diameter)of23 selected genera using belt transects (25 by 1 m) and sampling of 1 m2 quadrat (at an interval of 5m) for all coloniesless than 10 cm diameter. The benthic cover was collected using photo quadrats. The surveys were only done during the northeast monsoon season. The data wereanalyzed using the R program to see the distribution patterns and the Kruskal Wallis test to see whether there was a significant difference. Spearman correlation was also applied to assess the relationship between the distribution of coral genera in recruits and adults. Results: A total of 44 different coral genera were recorded for recruits, ranging from 3at Marereni to 30at Watamu Marine Reserve. Recruit densities ranged from 1.2±1.5recruit m-2 (mean±SD) at Likoni to 10.3± 8.4 recruit m-2 at Kisite Marine Park. The overall densityof recruitssignificantly differed between reef locations, with Kisite Marine Park and Reserve and Likonihaving significantly large differences from all the other locations, while Vuma, Watamu, Malindi, and Kilifi had significantly lower differences from all the other locations. The recruit generadensity along the Kenya coastwas divided into two clusters, one of which only included sites inKisite Marine Park. Adult colonies were dominated by Porites massive, Acropora, Platygyra, and Favites, whereas recruits were dominated by Porites branching, Porites massive, Galaxea, and Acropora. However, correlation analysis revealed a statistically significant positive correlation (r=0.81, p<0.05) between recruit and adult coral densities across the 23 coral genera. Marereni, which had the lowest densityof recruits, has only thermallyresistant coral genera, while Kisite Marine Park, with the highest recruit densities, has over 90% thermal sensitive coral genera. A weak positive correlation was found between recruit density and coralline algae, dead standing corals, and turf algae, whereas a weak negative correlation was found between recruit density and bare substrate and macroalgae. Between management regimes, marine reserves were found to have more recruits than no-take zones (marine parks and CMAs) and open access areas, although the difference was not significant. Conclusion: There was a statistically significant difference in the density of recruits between different reef locations along the Kenyan coast. Although the dominating genera of adults and recruits were different, there was a strong positive correlation between their coral communities, which could indicate self-recruitment processes or consistent distance seedings (of the same recruit genera). Sites such as Kisite Marine Park, with high recruit densities but dominated by thermally sensitive genera, will, on the other hand, be adversely affected by future thermal stress. This could imply that reducing the threats to coral reefs such as overfishingcould allow for their natural regeneration and recovery.Keywords: coral recruits, coral adult size-class, cora demography, resilience
Procedia PDF Downloads 124732 Symmetric Key Encryption Algorithm Using Indian Traditional Musical Scale for Information Security
Authors: Aishwarya Talapuru, Sri Silpa Padmanabhuni, B. Jyoshna
Abstract:
Cryptography helps in preventing threats to information security by providing various algorithms. This study introduces a new symmetric key encryption algorithm for information security which is linked with the "raagas" which means Indian traditional scale and pattern of music notes. This algorithm takes the plain text as input and starts its encryption process. The algorithm then randomly selects a raaga from the list of raagas that is assumed to be present with both sender and the receiver. The plain text is associated with the thus selected raaga and an intermediate cipher-text is formed as the algorithm converts the plain text characters into other characters, depending upon the rules of the algorithm. This intermediate code or cipher text is arranged in various patterns in three different rounds of encryption performed. The total number of rounds in the algorithm is equal to the multiples of 3. To be more specific, the outcome or output of the sequence of first three rounds is again passed as the input to this sequence of rounds recursively, till the total number of rounds of encryption is performed. The raaga selected by the algorithm and the number of rounds performed will be specified at an arbitrary location in the key, in addition to important information regarding the rounds of encryption, embedded in the key which is known by the sender and interpreted only by the receiver, thereby making the algorithm hack proof. The key can be constructed of any number of bits without any restriction to the size. A software application is also developed to demonstrate this process of encryption, which dynamically takes the plain text as input and readily generates the cipher text as output. Therefore, this algorithm stands as one of the strongest tools for information security.Keywords: cipher text, cryptography, plaintext, raaga
Procedia PDF Downloads 288731 The Role of Moroccan Salafist Radicalism in Creating Threat to Spain’s Security
Authors: Stanislaw Kosmynka
Abstract:
Although the genesis of the activity of fighting salafist radicalism in Spain dates back to the 80’s, the development of extremism of this kind manifested itself only in the next decade. Its first permanently functioning structures in this country in the second half of 90’s of 20th century came from Algieria and Syria. At the same time it should be emphasized that this distinction is in many dimensions conventional, the more so because they consisted also of immigrants from other coutries of Islam, particularly from Morocco. The paper seeks to understand the radical salafist challenge for Spain in the context of some terrorist networks consisted of immigrants from Morocco. On the eve of the new millennium Moroccan jihadists played an increasingly important role. Although the activity of these groups had for many years mainly logistical and propaganda character, the bomb attack carried out on 11 March 2004 in Madrid constituted an expression of open forms of terrorism, directed against the authorities and society of Spain and reflected the narration of representatives of the trend of the global jihad. The people involved in carrying out that act of violence were to a large extent Moroccan immigrants; also in the following years among the cells of radicals in Spain Moroccans stood out many times. That is why the forms and directions of activity of these extremists in Spain, also after 11th March 2004 and in the actual context of the impact of Islamic State, are worth presenting. The paper is focused on threats to the security of Spain and the region and remains connected with the issues of mutual relations of the society of a host country with immigrant communities which to a large degree come from this part of Maghreb.Keywords: jihadi terrorism, Morocco, radical salafism, security, Spain, terrorist cells, threat
Procedia PDF Downloads 525730 An Experimental Study on the Effect of Heat Input on the Weld Efficiency of TIG-MIG Hybrid Welding of Type-304 Austenitic Stainless Steel
Authors: Emmanuel Ogundimu, Esther Akinlabi, Mutiu Erinosho
Abstract:
Welding is described as the process of joining metals so that bonding can be created as a result of inter-atomic penetration. This study investigated the influence of heat input on the efficiency of the welded joints of 304 stainless steel. Three welds joint were made from two similar 304 stainless steel plates of thickness 6 mm. The tensile results obtained showed that the maximum average tensile strength of 672 MPa is possessed by the sample A1 with low heat input. It was discovered that the tensile strength, % elongation and weld joint efficiency decreased with the increase in heat input into the weld. The average % elongation for the entire samples ranged from 28.4% to 36.5%. Sample A1 had the highest joint efficiency of 94.5%. However, the optimum welding current of 190 for TIG- MIG hybrid welding of type-304 austenite stainless steel can be recommended for advanced technological applications such as aircraft manufacturing, nuclear industry, automobile industry, and processing industry.Keywords: microhardness, microstructure, tensile, MIG welding, process, tensile, shear stress TIG welding, TIG-MIG welding
Procedia PDF Downloads 197729 Transcriptional Differences in B cell Subpopulations over the Course of Preclinical Autoimmunity Development
Authors: Aleksandra Bylinska, Samantha Slight-Webb, Kevin Thomas, Miles Smith, Susan Macwana, Nicolas Dominguez, Eliza Chakravarty, Joan T. Merrill, Judith A. James, Joel M. Guthridge
Abstract:
Background: Systemic Lupus Erythematosus (SLE) is an interferon-related autoimmune disease characterized by B cell dysfunction. One of the main hallmarks is a loss of tolerance to self-antigens leading to increased levels of autoantibodies against nuclear components (ANAs). However, up to 20% of healthy ANA+ individuals will not develop clinical illness. SLE is more prevalent among women and minority populations (African, Asian American and Hispanics). Moreover, African Americans have a stronger interferon (IFN) signature and develop more severe symptoms. The exact mechanisms involved in ethnicity-dependent B cell dysregulation and the progression of autoimmune disease from ANA+ healthy individuals to clinical disease remains unclear. Methods: Peripheral blood mononuclear cells (PBMCs) from African (AA) and European American (EA) ANA- (n=12), ANA+ (n=12) and SLE (n=12) individuals were assessed by multimodal scRNA-Seq/CITE-Seq methods to examine differential gene signatures in specific B cell subsets. Library preparation was done with a 10X Genomics Chromium according to established protocols and sequenced on Illumina NextSeq. The data were further analyzed for distinct cluster identification and differential gene signatures in the Seurat package in R and pathways analysis was performed using Ingenuity Pathways Analysis (IPA). Results: Comparing all subjects, 14 distinct B cell clusters were identified using a community detection algorithm and visualized with Uniform Manifold Approximation Projection (UMAP). The proportion of each of those clusters varied by disease status and ethnicity. Transitional B cells trended higher in ANA+ healthy individuals, especially in AA. Ribonucleoprotein high population (HNRNPH1 elevated, heterogeneous nuclear ribonucleoprotein, RNP-Hi) of proliferating Naïve B cells were more prevalent in SLE patients, specifically in EA. Interferon-induced protein high population (IFIT-Hi) of Naive B cells are increased in EA ANA- individuals. The proportion of memory B cells and plasma cells clusters tend to be expanded in SLE patients. As anticipated, we observed a higher signature of cytokine-related pathways, especially interferon, in SLE individuals. Pathway analysis among AA individuals revealed an NRF2-mediated Oxidative Stress response signature in the transitional B cell cluster, not seen in EA individuals. TNFR1/2 and Sirtuin Signaling pathway genes were higher in AA IFIT-Hi Naive B cells, whereas they were not detected in EA individuals. Interferon signaling was observed in B cells in both ethnicities. Oxidative phosphorylation was found in age-related B cells (ABCs) for both ethnicities, whereas Death Receptor Signaling was found only in EA patients in these cells. Interferon-related transcription factors were elevated in ABCs and IFIT-Hi Naive B cells in SLE subjects of both ethnicities. Conclusions: ANA+ healthy individuals have altered gene expression pathways in B cells that might drive apoptosis and subsequent clinical autoimmune pathogenesis. Increases in certain regulatory pathways may delay progression to SLE. Further, AA individuals have more elevated activation pathways that may make them more susceptible to SLE. Procedia PDF Downloads 174728 Development of an Automatic Sequential Extraction Device for Pu and Am Isotopes in Radioactive Waste Samples
Authors: Myung Ho Lee, Hee Seung Lim, Young Jae Maeng, Chang Hoon Lee
Abstract:
This study presents an automatic sequential extraction device for Pu and Am isotopes in radioactive waste samples from the nuclear power plant with anion exchange resin and TRU resin. After radionuclides were leached from the radioactive waste samples with concentrated HCl and HNO₃, the sample was allowed to evaporate to dryness after filtering the leaching solution with 0.45 micron filter. The Pu isotopes were separated in HNO₃ medium with anion exchange resin. For leaching solution passed through the anion exchange column, the Am isotopes were sequentially separated with TRU resin. Automatic sequential extraction device built-in software information of separation for Pu and Am isotopes was developed. The purified Pu and Am isotopes were measured by alpha spectrometer, respectively, after the micro-precipitation of neodymium. The data of Pu and Am isotopes in radioactive waste with an automatic sequential extraction device developed in this study were validated with the ICP-MS system.Keywords: automatic sequential extraction device, Pu isotopes, Am isotopes, alpha spectrometer, radioactive waste samples, ICP-MS system
Procedia PDF Downloads 73727 Blood Thicker Than Water: A Case Report on Familial Ovarian Cancer
Authors: Joanna Marie A. Paulino-Morente, Vaneza Valentina L. Penolio, Grace Sabado
Abstract:
Ovarian cancer is extremely hard to diagnose in its early stages, and those afflicted at the time of diagnosis are typically asymptomatic and in the late stages of the disease, with metastasis to other organs. Ovarian cancers often occur sporadically, with only 5% associated with hereditary mutations. Mutations in the BRCA1 and BRCA2 tumor suppressor genes have been found to be responsible for the majority of hereditary ovarian cancers. One type of ovarian tumor is Malignant Mixed Mullerian Tumor (MMMT), which is a very rare and aggressive type, accounting for only 1% of all ovarian cancers. Reported is a case of a 43-year-old G3P3 (3003), who came into our institution due to a 2-month history of difficulty of breathing. Family history reveals that her eldest and younger sisters both died of ovarian malignancy, with her younger sister having a histopathology report of endometrioid ovarian carcinoma, left ovary stage IIIb. She still has 2 asymptomatic sisters. Physical examination pointed to pleural effusion of right lung, and presence of bilateral ovarian new growth, which had a Sassone score of 13. Admitting Diagnosis was G3P3 (3003), Ovarian New Growth, bilateral, Malignant; Pleural effusion secondary to malignancy. BRCA was requested to establish a hereditary mutation; however, the patient had no funds. Once the patient was stabilized, TAHBSO with surgical staging was performed. Intraoperatively, the pelvic cavity was occupied by firm, irregularly shaped ovaries, with a colorectal metastasis. Microscopic sections from both ovaries and the colorectal metastasis had pleomorphic tumor cells lined by cuboidal to columnar epithelium exhibiting glandular complexity, displaying nuclear atypia and increased nuclear-cytoplasmic ratio, which are infiltrating the stroma, consistent with the features of Malignant Mixed Mullerian Tumor, since MMMT is composed histologically of malignant epithelial and sarcomatous elements. In conclusion, discussed is the clinic-pathological feature of a patient with primary ovarian Malignant Mixed Mullerian Tumor, a rare malignancy comprising only 1% of all ovarian neoplasms. Also, by understanding the hereditary ovarian cancer syndromes and its relation to this patient, it cannot be overemphasized that a comprehensive family history is really fundamental for early diagnosis. The familial association of the disease, given that the patient has two sisters who were diagnosed with an advanced stage of ovarian cancer and succumbed to the disease at a much earlier age than what is reported in the general population, points to a possible hereditary syndrome which occurs in only 5% of ovarian neoplasms. In a low-resource setting, being in a third world country, the following will be recommended for monitoring and/or screening women who are at high risk for developing ovarian cancer, such as the remaining sisters of the patient: 1) Physical examination focusing on the breast, abdomen, and rectal area every 6 months. 2) Transvaginal sonography every 6 months. 3) Mammography annually. 4) CA125 for postmenopausal women. 5) Genetic testing for BRCA1 and BRCA2 will be reserved for those who are financially capable.Keywords: BRCA, hereditary breast-ovarian cancer syndrome, malignant mixed mullerian tumor, ovarian cancer
Procedia PDF Downloads 286