Search results for: nerve message
534 Biocompatibility Tests for Chronic Application of Sieve-Type Neural Electrodes in Rats
Authors: Jeong-Hyun Hong, Wonsuk Choi, Hyungdal Park, Jinseok Kim, Junesun Kim
Abstract:
Identifying the chronic functions of an implanted neural electrode is an important factor in acquiring neural signals through the electrode or restoring the nerve functions after peripheral nerve injury. The purpose of this study was to investigate the biocompatibility of the chronic implanted neural electrode into the sciatic nerve. To do this, a sieve-type neural electrode was implanted at proximal and distal ends of a transected sciatic nerve as an experimental group (Sieve group, n=6), and the end-to-end epineural repair was operated with the cut sciatic nerve as a control group (reconstruction group, n=6). All surgeries were performed on the sciatic nerve of the right leg in Sprague Dawley rats. Behavioral tests were performed before and 1, 4, 7, 10, 14, and weekly days until 5 months following surgery. Changes in sensory function were assessed by measuring paw withdrawal responses to mechanical and cold stimuli. Motor function was assessed by motion analysis using a Qualisys program, which showed a range of motion (ROM) related to the joints. Neurofilament-heavy chain and fibronectin expression were detected 5 months after surgery. In both groups, the paw withdrawal response to mechanical stimuli was slightly decreased from 3 weeks after surgery and then significantly decreased at 6 weeks after surgery. The paw withdrawal response to cold stimuli was increased from 4 days following surgery in both groups and began to decrease from 6 weeks after surgery. The ROM of the ankle joint was showed a similar pattern in both groups. There was significantly increased from 1 day after surgery and then decreased from 4 days after surgery. Neurofilament-heavy chain expression was observed throughout the entire sciatic nerve tissues in both groups. Especially, the sieve group was showed several neurofilaments that passed through the channels of the sieve-type neural electrode. In the reconstruction group, however, a suture line was seen through neurofilament-heavy chain expression up to 5 months following surgery. In the reconstruction group, fibronectin was detected throughout the sciatic nerve. However, in the sieve group, the fibronectin was observed only in the surrounding nervous tissues of an implanted neural electrode. The present results demonstrated that the implanted sieve-type neural electrode induced a focal inflammatory response. However, the chronic implanted sieve-type neural electrodes did not cause any further inflammatory response following peripheral nerve injury, suggesting the possibility of the chronic application of the sieve-type neural electrodes. This work was supported by the Basic Science Research Program funded by the Ministry of Science (2016R1D1A1B03933986), and by the convergence technology development program for bionic arm (2017M3C1B2085303).Keywords: biocompatibility, motor functions, neural electrodes, peripheral nerve injury, sensory functions
Procedia PDF Downloads 151533 A Rare Case of Popliteal Artery Aneurysm Presenting with Foot Drop
Authors: John Yahng, Riteesh Bookun
Abstract:
Popliteal artery aneurysms (PAAs) are the most common arterial aneurysm of the periphery. It is defined as focal dilation of the artery more than 50% of the normal vessel diameter which usually varies between 7 mm to 11 mm. The most common presentation for PAAs is claudication due to luminal stenmosis secondary to mural thrombus or acute limb ischaemia due to occlusive thrombosis or distal thromboembolism. It is less common for patients to present with non-ischaemic symptoms secondary to mass effect and compression of adjacent structures, and of these, presentation with common peroneal nerve compression is particularly uncommon. We present a rare case of a 92-year-old female patient presenting with 4-month history of left foot drop with radiological evidence of common peroneal nerve compression secondary to PAA of 22 mm by21mm in size. To the best of our knowledge, this is the smallest reported popliteal aneurysm presenting with foot drop. We also present the endovascular treatment option taken in our case.Keywords: aneurysm, foot drop, peroneal nerve, popliteal
Procedia PDF Downloads 300532 Data Hiding in Gray Image Using ASCII Value and Scanning Technique
Authors: R. K. Pateriya, Jyoti Bharti
Abstract:
This paper presents an approach for data hiding methods which provides a secret communication between sender and receiver. The data is hidden in gray-scale images and the boundary of gray-scale image is used to store the mapping information. In this an approach data is in ASCII format and the mapping is in between ASCII value of hidden message and pixel value of cover image, since pixel value of an image as well as ASCII value is in range of 0 to 255 and this mapping information is occupying only 1 bit per character of hidden message as compared to 8 bit per character thus maintaining good quality of stego image.Keywords: ASCII value, cover image, PSNR, pixel value, stego image, secret message
Procedia PDF Downloads 415531 Determination of Complexity Level in Merged Irregular Transposition Cipher
Authors: Okike Benjamin, Garba Ejd
Abstract:
Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In order to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often easily decrypted by adversaries. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.Keywords: transposition cipher, merged irregular cipher, encryption, complexity level
Procedia PDF Downloads 344530 Case Report: A Rare Case of Popliteal Artery Aneurysm Presenting with Foot Drop
Authors: John Yahng, Hansraj Riteesh Bookun
Abstract:
Popliteal artery aneurysms (PAAs) are the most common arterial aneurysm of the periphery. It is defined as focal dilation of the artery more than 50% of the normal vessel diameter which usually varies between 7 mm to 11 mm. The most common presentation for PAAs is claudication due to luminal stenosis secondary to mural thrombus or acute limb ischaemia due to occlusive thrombosis or distal thromboembolism. It is less common for patients to present with non-ischaemic symptoms secondary to mass effect and compression of adjacent structures, and of these, presentation with common peroneal nerve compression is particularly uncommon. We present a rare case of a 92-year-old female patient presenting with 4-month history of left foot drop with radiological evidence of common peroneal nerve compression secondary to PAA of 22 mm by 21mm in size. To the best of our knowledge, this is the smallest reported popliteal aneurysm presenting with foot drop. We also present the endovascular treatment option taken in our case.Keywords: aneurysm, foot drop, peroneal nerve, popliteal
Procedia PDF Downloads 404529 Psychological Reactance to Anti-Piracy Messages Explained by Gender and Attitudes
Authors: Kate Whitman, Zahra Murad, Joe Cox
Abstract:
Digital piracy is costly to creative economies across the world. Anti-piracy messages can cause people to pirate more rather than less, suggesting the presence of psychological reactance. Gender differences in message reactance and the moderating impact of attitudes have not been explored. In this paper, we examine whether messages based on real-world anti-piracy campaigns cause reactance and whether this effect is explained by gender and attitudes. An experiment compares two threatening and one prosocial message against a control group, with changes in piracy intention from past behavior for digital TV/film analysed. The results suggest that the prosocial message is ineffective for both genders. However, the threatening messages have significantly opposing effects on men and women. One threatening message influences women to reduce their piracy intentions by over 50% and men to increase it by 18%. Gender effects are moderated by pre-existing attitudes, with men and women who report the most favorable attitudes towards piracy having the most polarised changes in piracy intentions. The results suggest that men and women process threatening messages differently and that the creative industries should take care when targeting their messages.Keywords: piracy, reactance, persuasive-messages, TV/film, gender
Procedia PDF Downloads 98528 Maintaining User-Level Security in Short Message Service
Authors: T. Arudchelvam, W. W. E. N. Fernando
Abstract:
Mobile phone has become as an essential thing in our life. Therefore, security is the most important thing to be considered in mobile communication. Short message service is the cheapest way of communication via the mobile phones. Therefore, security is very important in the short message service as well. This paper presents a method to maintain the security at user level. Different types of encryption methods are used to implement the user level security in mobile phones. Caesar cipher, Rail Fence, Vigenere cipher and RSA are used as encryption methods in this work. Caesar cipher and the Rail Fence methods are enhanced and implemented. The beauty in this work is that the user can select the encryption method and the key. Therefore, by changing the encryption method and the key time to time, the user can ensure the security of messages. By this work, while users can safely send/receive messages, they can save their information from unauthorised and unwanted people in their own mobile phone as well.Keywords: SMS, user level security, encryption, decryption, short message service, mobile communication
Procedia PDF Downloads 396527 Determination of Complexity Level in Okike's Merged Irregular Transposition Cipher
Authors: Okike Benjami, Garba Ejd
Abstract:
Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In other to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often decrypted by adversaries with ease. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Okike’s Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.Keywords: transposition cipher, merged irregular cipher, encryption, complexity level
Procedia PDF Downloads 290526 Solitary Fibrous Tumor Presumed to Be a Peripheral Nerve Sheath Tumor Involving Right Branchial Plexus
Authors: Daniela Proca, Yuan Rong, Salvatore Luceno, Jalil Nasibli
Abstract:
Introduction: Solitary Fibrous Tumors (SFT) have many histologic mimickers and the only way to diagnose it, particularly in an unusual location, such as peripheral nerve trunks, is to use a comprehensive immunohistochemical staining panel. Monoclonal STAT6 immunostain is highly sensitive and specific for SFTs and particularly useful in the diagnosis of difficult SFT cases. Methods: We describe a solitary fibrous tumor (SFT) involving the right branchial plexus in a 66 yo female with 4-year history of slowly growing chest wall mass with recent dysesthesias in fingers 4th and 5th. MRI showed a well-circumscribed heterogenous mass measuring 5.4 x 3.8 x 4.0 cm and encircling peripheral nerves of the branchial plexus; no involvement of the bone or muscle was noted. A biopsy showed a bland spindled and epithelioid proliferation with no significant mitotic activity, no necrosis, and no atypia; peripheral nerve fascicles were encircled by the lesion. The main clinical and pathologic differential diagnosis included peripheral nerve sheath tumor, particularly schwannoma; HE microscopy didn’t show the classic Antoni A and B areas but showed focal subtle nuclear palisading, as well as prominent vessels with hyalinization. Immunohistochemical stains showed focal, weak cytoplasmic S100 positivity in the lesion; CD 34 and Vimentin were strongly and diffusely positive; the neoplastic cells were negative with AE1/AE3, EMA, CD31, SMA, Desmin, Calretinin, HMB-45, Melan A, PAX-8, NSE. The immunohistochemical and histologic pattern was not typical of peripheral nerve sheath tumor. On additional stains, the tumor was positive with STAT-6 and bcl-2 and focally positive with CD99. Given this profile, the final diagnosis was that of a solitary fibrous tumor. Results: NA Conclusion: Very few SFTs involving peripheral nerves and mimicking a peripheral nerve sheath tumor are described in the literature. Although histologically benign on this biopsy, long-term follow-up is required because of the risk of recurrence of these tumors and their uncertain biological behavior.Keywords: solitary fibrous tumor, pathology, diagnosis, immunohistochemistry
Procedia PDF Downloads 196525 Cryptanalysis of ID-Based Deniable Authentication Protocol Based On Diffie-Hellman Problem on Elliptic Curve
Authors: Eun-Jun Yoon
Abstract:
Deniable authentication protocol is a new security authentication mechanism which can enable a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. In 2013, Kar proposed a secure ID-based deniable authentication protocol whose security is based on computational infeasibility of solving Elliptic Curve Diffie-Hellman Problem (ECDHP). Kar claimed that the proposed protocol achieves properties of deniable authentication, mutual authentication, and message confidentiality. However, this paper points out that Kar's protocol still suffers from sender spoofing attack and message modification attack unlike its claims.Keywords: deniable authentication, elliptic curve cryptography, Diffie-Hellman problem, cryptanalysis
Procedia PDF Downloads 332524 Visual Intelligence: Perception, Image and Manipulation in Visual Communication
Authors: Poojitha Vemula
Abstract:
Understanding how we use image manipulation to communicate through an audience’s perceptions and conceive visual intelligence. With the use of many software and high-end skills, designers have developed a third eye to combine two different visuals and create the desired image by using photoshop and other software skills. The purpose of visual intelligence is to convey a message to the targeted audience. For instance, the images of models are retouched on their skin to make it more convincing and draw attention from the audience. There are many ways of manipulating an image, such as double exposure, retouching photography inks or paint airbrushing and piecing photos together, or enhancing the brightness and contrast. To understand visual intelligence, a questionnaire survey as well as research was conducted on how image manipulation is used by both the audience and the designers. This depends on the message that needs to be conveyed by the brands. For instance, Fair & Lovely, a brightening cream for ladies use a lot of retouching and effects to show the dramatic change the cream takes effect on dark or dusky faces. Thus the designer’s role is to use their third eye to incorporate the message into visuals. The research and questionnaire survey concludes the perceptions and manipulations used in visual communication. However this is all to make an effortless communication between the designer and the audience by using the skills of the designer and the features provided by the software. The objective of visual intelligence is to covet the message of the brands that advertise their products or services by using visuals through softwares. Conveying a message through visual intelligence requires an audiences perceptions and understanding from the visuals created by the artists or designers. Visual intelligence determines how we use our technical skills to retouch and manipulate an image for a better understanding to convey the message to the targeted audience. This also bridges the communication between the brand and the audience.Keywords: graphic design, visual communication, convey messages, photoshop, image manipulation
Procedia PDF Downloads 218523 Study on the Efficient Routing Algorithms in Delay-Tolerant Networks
Authors: Si-Gwan Kim
Abstract:
In Delay Tolerant Networks (DTN), there may not exist an end-to-end path between source and destination at the time of message transmission. Employing ‘Store Carry and Forward’ delivery mechanism for message transmission in such networks usually incurs long message delays. In this paper, we present the modified Binary Spray and Wait (BSW) routing protocol that enhances the performance of the original one. Our proposed algorithm adjusts the number of forward messages depending on the number of neighbor nodes. By using beacon messages periodically, the number of neighbor nodes can be managed. The simulation using ONE simulator results shows that our modified version gives higher delivery ratio and less latency as compared to BSW.Keywords: delay tolerant networks, store carry and forward, one simulator, binary spray and wait
Procedia PDF Downloads 123522 A New Authenticable Steganographic Method via the Use of Numeric Data on Public Websites
Authors: Che-Wei Lee, Bay-Erl Lai
Abstract:
A new steganographic method via the use of numeric data on public websites with self-authentication capability is proposed. The proposed technique transforms a secret message into partial shares by Shamir’s (k, n)-threshold secret sharing scheme with n = k + 1. The generated k+1 partial shares then are embedded into the selected numeric items in a website as if they are part of the website’s numeric content. Afterward, a receiver links to the website and extracts every k shares among the k+1 ones from the stego-numeric-content to compute k+1 copies of the secret, and the phenomenon of value consistency of the computed k+1 copies is taken as an evidence to determine whether the extracted message is authentic or not, attaining the goal of self-authentication of the extracted secret message. Experimental results and discussions are provided to show the feasibility and effectiveness of the proposed method.Keywords: steganography, data hiding, secret authentication, secret sharing
Procedia PDF Downloads 243521 Stimulation of Nerve Tissue Differentiation and Development Using Scaffold-Based Cell Culture in Bioreactors
Authors: Simon Grossemy, Peggy P. Y. Chan, Pauline M. Doran
Abstract:
Nerve tissue engineering is the main field of research aimed at finding an alternative to autografts as a treatment for nerve injuries. Scaffolds are used as a support to enhance nerve regeneration. In order to successfully design novel scaffolds and in vitro cell culture systems, a deep understanding of the factors affecting nerve regeneration processes is needed. Physical and biological parameters associated with the culture environment have been identified as potentially influential in nerve cell differentiation, including electrical stimulation, exposure to extracellular-matrix (ECM) proteins, dynamic medium conditions and co-culture with glial cells. The mechanisms involved in driving the cell to differentiation in the presence of these factors are poorly understood; the complexity of each of them raises the possibility that they may strongly influence each other. Some questions that arise in investigating nerve regeneration include: What are the best protein coatings to promote neural cell attachment? Is the scaffold design suitable for providing all the required factors combined? What is the influence of dynamic stimulation on cell viability and differentiation? In order to study these effects, scaffolds adaptable to bioreactor culture conditions were designed to allow electrical stimulation of cells exposed to ECM proteins, all within a dynamic medium environment. Gold coatings were used to make the surface of viscose rayon microfiber scaffolds (VRMS) conductive, and poly-L-lysine (PLL) and laminin (LN) surface coatings were used to mimic the ECM environment and allow the attachment of rat PC12 neural cells. The robustness of the coatings was analyzed by surface resistivity measurements, scanning electron microscope (SEM) observation and immunocytochemistry. Cell attachment to protein coatings of PLL, LN and PLL+LN was studied using DNA quantification with Hoechst. The double coating of PLL+LN was selected based on high levels of PC12 cell attachment and the reported advantages of laminin for neural differentiation. The underlying gold coatings were shown to be biocompatible using cell proliferation and live/dead staining assays. Coatings exhibiting stable properties over time under dynamic fluid conditions were developed; indeed, cell attachment and the conductive power of the scaffolds were maintained over 2 weeks of bioreactor operation. These scaffolds are promising research tools for understanding complex neural cell behavior. They have been used to investigate major factors in the physical culture environment that affect nerve cell viability and differentiation, including electrical stimulation, bioreactor hydrodynamic conditions, and combinations of these parameters. The cell and tissue differentiation response was evaluated using DNA quantification, immunocytochemistry, RT-qPCR and functional analyses.Keywords: bioreactor, electrical stimulation, nerve differentiation, PC12 cells, scaffold
Procedia PDF Downloads 243520 A Computational Model of the Thermal Grill Illusion: Simulating the Perceived Pain Using Neuronal Activity in Pain-Sensitive Nerve Fibers
Authors: Subhankar Karmakar, Madhan Kumar Vasudevan, Manivannan Muniyandi
Abstract:
Thermal Grill Illusion (TGI) elicits a strong and often painful sensation of burn when interlacing warm and cold stimuli that are individually non-painful, excites thermoreceptors beneath the skin. Among several theories of TGI, the “disinhibition” theory is the most widely accepted in the literature. According to this theory, TGI is the result of the disinhibition or unmasking of the pain-sensitive HPC (Heat-Pinch-Cold) nerve fibers due to the inhibition of cold-sensitive nerve fibers that are responsible for masking HPC nerve fibers. Although researchers focused on understanding TGI throughexperiments and models, none of them investigated the prediction of TGI pain intensity through a computational model. Furthermore, the comparison of psychophysically perceived TGI intensity with neurophysiological models has not yet been studied. The prediction of pain intensity through a computational model of TGI can help inoptimizing thermal displays and understanding pathological conditions related to temperature perception. The current studyfocuses on developing a computational model to predict the intensity of TGI pain and experimentally observe the perceived TGI pain. The computational model is developed based on the disinhibition theory and by utilizing the existing popular models of warm and cold receptors in the skin. The model aims to predict the neuronal activity of the HPC nerve fibers. With a temperature-controlled thermal grill setup, fifteen participants (ten males and five females) were presented with five temperature differences between warm and cold grills (each repeated three times). All the participants rated the perceived TGI pain sensation on a scale of one to ten. For the range of temperature differences, the experimentally observed perceived intensity of TGI is compared with the neuronal activity of pain-sensitive HPC nerve fibers. The simulation results show a monotonically increasing relationship between the temperature differences and the neuronal activity of the HPC nerve fibers. Moreover, a similar monotonically increasing relationship is experimentally observed between temperature differences and the perceived TGI intensity. This shows the potential comparison of TGI pain intensity observed through the experimental study with the neuronal activity predicted through the model. The proposed model intends to bridge the theoretical understanding of the TGI and the experimental results obtained through psychophysics. Further studies in pain perception are needed to develop a more accurate version of the current model.Keywords: thermal grill Illusion, computational modelling, simulation, psychophysics, haptics
Procedia PDF Downloads 171519 A Rare Case of Atypical Guillian-Barre Syndrome Following Antecedent Dengue Infection
Authors: Amlan Datta
Abstract:
Dengue is an arboviral, vector borne infection, quite prevalent in tropical countries such as India. Approximately, 1 to 25% of cases may give rise to neurological complication, such as, seizure, delirium, Guillian-Barre syndrome (GBS), multiple cranial nerve palsies, intracranial thrombosis, stroke-like presentations, to name a few. Dengue fever, as an antecedent to GBS is uncommon, especially in adults.Here, we report a case about a middle aged lady who presented with an acute onset areflexic ascending type of polyradiculoneuropathy along with bilateral lower motor neuron type of facial nerve palsy, as well as abducens and motor component of trigeminal (V3) weakness. Her respiratory and neck muscles were spared. She had an established episode of dengue fever (NS1 and dengue IgM positive) 7 days prior to the weakness. Nerve conduction study revealed a demyelinating polyradiculopathy of both lower limbs and cerebrospinal fluid examination showed albuminocytological dissociation. She was treated with 5 days of intravenous immunoglobulin (IVIg), following which her limb weakness improved considerably. This case highlights GBS as a potential complication following dengue fever.Keywords: areflexic, demyelinating, dengue, polyradiculoneuropathy
Procedia PDF Downloads 258518 Model Evaluation of Action Potential Block in Whole-Animal Nerves Induced by Ultrashort, High-Intensity Electric Pulses
Authors: Jiahui Song
Abstract:
There have been decades of research into the action potential block in nerves. To our best knowledge electrical voltages can reversibly block the conduction of action potentials across whole animal nerves. Blocking biological electrical signaling pathways can have a variety of applications in muscular and sensory incapacitation and clinical research, including urethral pressure reduction and relieving chronic pain relief from a peripheral nerve injury. The cessation ability has been used in muscle activation and fatigue reduction. Ultrashort, high-intensity electric pulses modulate the membrane conductivity to block nerve conduction through the electroporation process. Nanopore formation on the membrane surface would increase the local membrane conductivity and effectively "short-out" the trans-membrane potential of a nerve that inhibits action potential propagation. This block would be similar in concept to stopping the propagation of an air-pressure wave down a "leaky" pipe. This research focuses on a distributed electrical model with an additional time-dependent membrane conductance to calculate the poration induced by the ultrashort, high-intensity electric pulses. The changes in membrane conductivity are used to predict changes in action potential transmission. A "strength-duration (SD)" curve is generated for action potential blockage and would be used as a design guide for benchmarking safety thresholds or setting the pulse voltage and/or durations necessary for neuro-muscular incapacitation.Keywords: action potential, ultrashort, high-intensity, nerve, strength-duration
Procedia PDF Downloads 18517 Central Retinal Venous Occlusion Associated O Bilateral Optic Nerve Infiltration Revealing Relapse Of An Acute Lymphoblastic Leukemia
Authors: Fendouli Ines, Zaafrane Nesrine, Mhamdi Hana, Knani Leila, Ghorbel Mohamed
Abstract:
Introduction: Ocular infiltration of leukemia can involve orbit, uveal tract, retina and optic nerve. It may result from direct ocular infiltration by leukemic cells or indirect ocular involvement resulting from secondary hematologic changes, opportunistic infections and complications of various modalities of therapy. We here in report a case of central venous retinal occlusion associated to optic nerve infiltration as presenting signs of a relapse of acute lymphoblastic leukemia. Case Report: A twelve-year-old male -patient of acute B lymphoblastic leukemia presented with headaches and bilateral blurred vision in the left ee. Ophthalmic examination showed a visual acuity reduced to counting fingers in the right eye and no light perception in the left eye. Funduscopy revealed a voluminous disc edema surrounded by retinal haemorrhages in the right eye, and venous tortusities, papillary edema, and hemorrages suggesting central retinal venous occlusion in the LE. Swept source optical coherence tomography revealed a serous retinal detachment in the RE and .hyperreflective inner layers with macular edema in the left eye. Cerebro-orbital MRI showed bilateral thickened left optic nerve. There were no radiological signs of true papillary edema due to intracranial hypertension secondary to central nervous system involvement. Myelogram and lumbar punction demonstrated blast infiltration and confirmed ocular relapse of the leukemia. Conclusion: Ocular involvement lymphoblastic acute leukemias decreased since the introduction of a systematic prophylactic treatment of central nervous system. Periodic ophthalmic examination is necessary to allow early diagnosis and treatment.Keywords: acute leukemia, optic nerve, infiltration, relapse
Procedia PDF Downloads 90516 Sympathetic Skin Response and Reaction Times in Chronic Autoimmune Thyroiditis; An Overlooked Electrodiagnostic Study
Authors: Oya Umit Yemisci, Nur Saracgil Cosar, Tubanur Ozturk Sisman, Selin Ozen
Abstract:
Chronic autoimmune thyroiditis (AIT) may result in a wide spectrum of reversible abnormalities in the neuromuscular function. Usually, proximal muscle-related symptoms and neuropathic findings such as mild axonal peripheral neuropathy have been reported. Sympathetic skin responses are useful in evaluating sudomotor activity of the unmyelinated sympathetic fibers of the autonomic nervous system. Neurocognitive impairment may also be a prominent feature of hypothyroidism, particularly in elderly patients. Electromyographic reaction times as a highly sensitive parameter provides. Objective data concerning cognitive and motor functions. The aim of this study was to evaluate peripheral nerve functions, sympathetic skin response and electroneuromyographic (ENMG) reaction times in euthyroid and subclinically hypothyroid patients with a diagnosis of AIT and compare to those of a control group. Thirty-five euthyroid, 19 patients with subclinical hypothyroidism and 35 age and sex-matched healthy subjects were included in the study. Motor and sensory nerve conduction studies, sympathetic skin responses recorded from hand and foot by stimulating contralateral median nerve and simple reaction times by stimulating tibial nerve and recording from extensor indicis proprius muscle were performed to all patients and control group. Only median nerve sensory conduction velocities of the forearm were slower in patients with AIT compared to the control group (p=0.019). Otherwise, nerve conduction studies and sympathetic skin responses showed no significant difference between the patients and the control group. However, reaction times were shorter in the healthy subjects compared to AIT patients. Prolongation in the reaction times may be considered as a parameter reflecting the alterations in the cognitive functions related to the primary disease process in AIT. Combining sympathetic skin responses with more quantitative tests such as cardiovascular tests and sudomotor axon reflex testing may allow us to determine higher rates of involvement of the autonomic nervous system in AIT.Keywords: sympathetic skin response, simple reaction time, chronic autoimmune thyroiditis
Procedia PDF Downloads 148515 Message Authentication Scheme for Vehicular Ad-Hoc Networks under Sparse RSUs Environment
Authors: Wen Shyong Hsieh, Chih Hsueh Lin
Abstract:
In this paper, we combine the concepts of chameleon hash function (CHF) and identification based cryptography (IBC) to build a message authentication environment for VANET under sparse RSUs. Based on the CHF, TA keeps two common secrets that will be embedded to all identities to be as the evidence of mutual trusting. TA will issue one original identity to every RSU and vehicle. An identity contains one public ID and one private key. The public ID, includes three components: pseudonym, random key, and public key, is used to present one entity and can be verified to be a legal one. The private key is used to claim the ownership of the public ID. Based on the concept of IBC, without any negotiating process, a CHF pairing key multiplied by one private key and other’s public key will be used for mutually trusting and to be utilized as the session key of secure communicating between RSUs and vehicles. To help the vehicles to do message authenticating, the RSUs are assigned to response the vehicle’s temple identity request using two short time secretes that are broadcasted by TA. To light the loading of request information, one day is divided into M time slots. At every time slot, TA will broadcast two short time secretes to all valid RSUs for that time slot. Any RSU can response the temple identity request from legal vehicles. With the collected announcement of public IDs from the neighbor vehicles, a vehicle can set up its neighboring set, which includes the information about the neighbor vehicle’s temple public ID and temple CHF pairing key that can be derived by the private key and neighbor’s public key and will be used to do message authenticating or secure communicating without the help of RSU.Keywords: Internet of Vehicles (IOV), Vehicular Ad-hoc Networks (VANETs), Chameleon Hash Function (CHF), message authentication
Procedia PDF Downloads 391514 Drastic Improvement in Vision Following Surgical Excision of Juvenile Nasopharyngeal Angiofibroma with Compressive Optic Neuropathy
Authors: Sweta Das
Abstract:
This case report is a 15-year-old male who presented with painless unilateral vision loss from left optic nerve compression due to juvenile nasopharyngeal angiofibroma. JNA is a rare, benign neoplasm that causes intracranial and intraorbital bone destruction and extends aggressively into surrounding soft tissues. It accounts for <1% of all head and neck tumors, is predominantly found in pediatric males and tends to affect indigenous population disproportionately. The most common presenting symptom for JNA is epistaxis and nasal obstruction. However, it can invade orbit, chiasm and pituitary gland, causing loss of vision and field. Visual acuity and function near normalized following surgical excision. Optometry plays an important role in the diagnosis and co-management of JNA with optic nerve compression by closely monitoring afferent optic nerve function and structure, and extraocular motility. Visual function and acuity in patients with short-term compressive neuropathy may drastically improve following surgical resection as this case demonstrates.Keywords: orbital mass, painless monocular vision loss, compressive optic neuropathy, pediatric tumor
Procedia PDF Downloads 59513 Message Passing Neural Network (MPNN) Approach to Multiphase Diffusion in Reservoirs for Well Interconnection Assessments
Authors: Margarita Mayoral-Villa, J. Klapp, L. Di G. Sigalotti, J. E. V. Guzmán
Abstract:
Automated learning techniques are widely applied in the energy sector to address challenging problems from a practical point of view. To this end, we discuss the implementation of a Message Passing algorithm (MPNN)within a Graph Neural Network(GNN)to leverage the neighborhood of a set of nodes during the aggregation process. This approach enables the characterization of multiphase diffusion processes in the reservoir, such that the flow paths underlying the interconnections between multiple wells may be inferred from previously available data on flow rates and bottomhole pressures. The results thus obtained compare favorably with the predictions produced by the Reduced Order Capacitance-Resistance Models (CRM) and suggest the potential of MPNNs to enhance the robustness of the forecasts while improving the computational efficiency.Keywords: multiphase diffusion, message passing neural network, well interconnection, interwell connectivity, graph neural network, capacitance-resistance models
Procedia PDF Downloads 149512 Heart-Rate Variability Moderates the Relation between Life Threatening Events and Cancer-Development: Making Cancer Less “Vague”
Authors: Yori Gidron, Laura Caton, Irit Ben-Aharon
Abstract:
Background: Many patients and even certain clinicians attribute cancer development to psychosocial factors. Yet, empirical data supports more the prognostic role, rather than the etiological role, of psychosocial factors in cancer. Part of the inconsistency may result from not considering possible moderating factors in the etiological role of psychosocial factors. One important candidate moderating factor is the vagal nerve, whose activity is indexed by heart-rate variability (HRV). The vagal nerve may prevent cancer since it reduces inflammation on the one hand, and since it increases anti-tumor immunity on the other hand. This study examined the moderating role of the vagus in the relation between life threatening events (LTE) and cancer development. Method: We re-analyzed data from the Lifelines Dutch longitudinal cohort study of over 150,000 people. The present study included 82,751 adults, who initially were cancer-free. We extracted information on background factors (e.g., age, gender, fat consumption), whether they ever experienced LTE, HRV and cancer diagnosis as reported by patients in annual clinic visits. HRV was derived from brief ECGs. Results: Of the full sample, 1011 people developed cancer during a follow-up. In the full sample, LTE significantly predicted cancer development (R.R = 1.063 p < .01) and HRV significantly predicted a reduced risk of cancer development (R.R = .506 p <.001). Importantly, LTE significantly predicted cancer only when HRV was low (R.R = 1.056, 95% CI: 1.007 - 1.108, p < .05) but not when HRV was high (R.R = 1.014; 95% CI: 0.916 - 1.122, p > 0.05), independent of confounders. Conclusions: To the best of our knowledge, this is the first study showing in a large sample that LTE predict cancer development, and that this occurs only when vagal nerve activity (HRV) is relatively low. These results could result from lack of vagal modulation of inflammation and also from lack of vagal modulation of stress responses. Results are in line with the cancer-protective role of the vagus. HRV needs to be routinely monitored in the population and future intervention trials need to examine whether vagal nerve activation can prevent cancer in people with LTE and with other cancer risk factors.Keywords: cancer development, life-events, moderation, vagal nerve
Procedia PDF Downloads 170511 A Novel Approach of Secret Communication Using Douglas-Peucker Algorithm
Authors: R. Kiruthika, A. Kannan
Abstract:
Steganography is the problem of hiding secret messages in 'innocent – looking' public communication so that the presence of the secret message cannot be detected. This paper introduces a steganographic security in terms of computational in-distinguishability from a channel of probability distributions on cover messages. This method first splits the cover image into two separate blocks using Douglas – Peucker algorithm. The text message and the image will be hided in the Least Significant Bit (LSB) of the cover image.Keywords: steganography, lsb, embedding, Douglas-Peucker algorithm
Procedia PDF Downloads 363510 Relatively High Heart-Rate Variability Predicts Greater Survival Chances in Patients with Covid-19
Authors: Yori Gidron, Maartje Mol, Norbert Foudraine, Frits Van Osch, Joop Van Den Bergh, Moshe Farchi, Maud Straus
Abstract:
Background: The worldwide pandemic of severe acute respiratory syndrome coronavirus 2 (SARS-COV2), which began in 2019, also known as Covid-19, has infected over 136 million people and tragically took the lives of over 2.9 million people worldwide. Many of the complications and deaths are predicted by the inflammatory “cytokine storm.” One way to progress in the prevention of death is by finding a predictive and protective factor that inhibits inflammation, on the one hand, and which also increases anti-viral immunity on the other hand. The vagal nerve does precisely both actions. This study examined whether vagal nerve activity, indexed by heart-rate variability (HRV), predicts survival in patients with Covid-19. Method: We performed a pseudo-prospective study, where we retroactively obtained ECGs of 271 Covid-19 patients arriving at a large regional hospital in The Netherlands. HRV was indexed by the standard deviation of the intervals between normal heartbeats (SDNN). We examined patients’ survival at 3 weeks and took into account multiple confounders and known prognostic factors (e.g., age, heart disease, diabetes, hypertension). Results: Patients’ mean age was 68 (range: 25-95) and nearly 22% of the patients had died by 3 weeks. Their mean SDNN (17.47msec) was far below the norm (50msec). Importantly, relatively higher HRV significantly predicted a higher chance of survival, after statistically controlling for patients’ age, cardiac diseases, hypertension and diabetes (relative risk, H.R, and 95% confidence interval (95%CI): H.R = 0.49, 95%CI: 0.26 – 0.95, p < 0.05). However, since HRV declines rapidly with age and since age is a profound predictor in Covid-19, we split the sample by median age (40). Subsequently, we found that higher HRV significantly predicted greater survival in patients older than 70 (H.R = 0.35, 95%CI: 0.16 – 0.78, p = 0.01), but HRV did not predict survival in patients below age 70 years (H.R = 1.11, 95%CI: 0.37 – 3.28, p > 0.05). Conclusions: To the best of our knowledge, this is the first study showing that higher vagal nerve activity, as indexed by HRV, is an independent predictor of higher chances for survival in Covid-19. The results are in line with the protective role of the vagal nerve in diseases and extend this to a severe infectious illness. Studies should replicate these findings and then test in controlled trials whether activating the vagus nerve may prevent mortality in Covid-19.Keywords: Covid-19, heart-rate Variability, prognosis, survival, vagal nerve
Procedia PDF Downloads 175509 Message Framework for Disaster Management: An Application Model for Mines
Authors: A. Baloglu, A. Çınar
Abstract:
Different tools and technologies were implemented for Crisis Response and Management (CRM) which is generally using available network infrastructure for information exchange. Depending on type of disaster or crisis, network infrastructure could be affected and it could not be able to provide reliable connectivity. Thus any tool or technology that depends on the connectivity could not be able to fulfill its functionalities. As a solution, a new message exchange framework has been developed. Framework provides offline/online information exchange platform for CRM Information Systems (CRMIS) and it uses XML compression and packet prioritization algorithms and is based on open source web technologies. By introducing offline capabilities to the web technologies, framework will be able to perform message exchange on unreliable networks. The experiments done on the simulation environment provide promising results on low bandwidth networks (56kbps and 28.8 kbps) with up to 50% packet loss and the solution is to successfully transfer all the information on these low quality networks where the traditional 2 and 3 tier applications failed.Keywords: crisis response and management, XML messaging, web services, XML compression, mining
Procedia PDF Downloads 339508 Instructional Information Resources
Authors: Parveen Kumar
Abstract:
This article discusses institute information resources. Information, in its most restricted technical sense, is a sequence of symbols that can be interpreted as message information can be recorded as signs, or transmitted as signals. Information is any kind of event that affects the state of a dynamic system. Conceptually, information is the message being conveyed. This concept has numerous other meanings in different contexts. Moreover, the concept of information is closely related to notions of constraint, communication, control, data, form, instruction, knowledge, meaning, mental stimulus, pattern, perception, representation, and especially entropy.Keywords: institutions, information institutions, information services for mission-oriented institute, pattern
Procedia PDF Downloads 376507 The On-Board Critical Message Transmission Design for Navigation Satellite Delay/Disruption Tolerant Network
Authors: Ji-yang Yu, Dan Huang, Guo-ping Feng, Xin Li, Lu-yuan Wang
Abstract:
The navigation satellite network, especially the Beidou MEO Constellation, can relay data effectively with wide coverage and is applied in navigation, detection, and position widely. But the constellation has not been completed, and the amount of satellites on-board is not enough to cover the earth, which makes the data-relay disrupted or delayed in the transition process. The data-relay function needs to tolerant the delay or disruption in some extension, which make the Beidou MEO Constellation a delay/disruption-tolerant network (DTN). The traditional DTN designs mainly employ the relay table as the basic of data path schedule computing. But in practical application, especially in critical condition, such as the war-time or the infliction heavy losses on the constellation, parts of the nodes may become invalid, then the traditional DTN design could be useless. Furthermore, when transmitting the critical message in the navigation system, the maximum priority strategy is used, but the nodes still inquiry the relay table to design the path, which makes the delay more than minutes. Under this circumstances, it needs a function which could compute the optimum data path on-board in real-time according to the constellation states. The on-board critical message transmission design for navigation satellite delay/disruption-tolerant network (DTN) is proposed, according to the characteristics of navigation satellite network. With the real-time computation of parameters in the network link, the least-delay transition path is deduced to retransmit the critical message in urgent conditions. First, the DTN model for constellation is established based on the time-varying matrix (TVM) instead of the time-varying graph (TVG); then, the least transition delay data path is deduced with the parameters of the current node; at last, the critical message transits to the next best node. For the on-board real-time computing, the time delay and misjudges of constellation states in ground stations are eliminated, and the residual information channel for each node can be used flexibly. Compare with the minute’s delay of traditional DTN; the proposed transmits the critical message in seconds, which improves the re-transition efficiency. The hardware is implemented in FPGA based on the proposed model, and the tests prove the validity.Keywords: critical message, DTN, navigation satellite, on-board, real-time
Procedia PDF Downloads 343506 Improving Depression Symptoms and Antidepressant Medication Adherence Using Encrypted Short Message Service Text Message Reminders
Authors: Ogbonna Olelewe
Abstract:
This quality improvement project seeks to address the background and significance of promoting antidepressant (AD) medication adherence to reduce depression symptoms in patients diagnosed with major depression. This project aims to substantiate using daily encrypted short message service (SMS) text reminders to take prescribed antidepressant medications with the goal of increasing medication adherence to reduce depression scores in patients diagnosed with major depression, thereby preventing relapses and increasing remission rates. Depression symptoms were measured using the Patient Health Questionnaire-9 (PHQ-9) scale. The PHQ-9 provides a total score of depression symptoms from mild to severe, ranging from 0 to 27. A -pretest/post-test design was used, with a convenience sample size of 35 adult patients aged 18 years old to 45 years old, diagnosed with MDD, and prescribed at least one antidepressant for one year or more. Pre- and post-test PHQ-9 scores were conducted to compare depression scores before and after the four-week intervention period. The results indicated improved post-intervention PHQ-9 scores, improved AD medication adherence, and a significant reduction in depression symptoms.Keywords: major depressive disorder, antidepressants, short message services, text reminders, Medication adherence/non-adherence, Patient Health Questionnaire 9
Procedia PDF Downloads 152505 The Addition of Opioids to Bupivacaine in Bilateral Infraorbital Nerve Block for Postoperative Pain Relief in Paediatric Patients for Cleft Lip Repair-Comparative Effects of Pethidine and Fentanyl: A Prospective Randomized Double Blind Study
Authors: Mrudula Kudtarkar, Rajesh Mane
Abstract:
Introduction: Cleft lip repair is one of the common surgeries performed in India and the usual method used for post-operative analgesia is perioperative opioids and NSAIDs. There has been an increase in use of regional techniques and Opioids are the common adjuvants but their efficacy and safety have not been studied extensively in children. Aim: A prospective, randomized, double-blind study was done to compare the efficacy, duration and safety of intraoral infraorbital nerve block on post-operative pain relief using bupivacaine alone or in combination with fentanyl or pethidine in paediatric cleft lip repair. Methodology: 45 children between the age group 5 – 60 months undergoing cleft lip surgery randomly allocated into 3 groups of 15 each received bilateral intraoral infraorbital nerve block with 0.75ml of solution. Group B received 0.25% bupivacaine; group P received 0.25% bupivacaine with 0.25mg/kg pethidine, group F received 0.25% bupivacaine with 0.25microgm/kg fentanyl. Sedation after recovery, post-operative pain intensity and duration of post-operative analgesia were assessed using Modified Hannallah Pain Score. Results: The mean duration of analgesia was 17.8 hrs in Group B, 23.53 hrs in Group F and 35.13 hrs in Group P. There was statistically significant difference between the means of the three groups- ANOVA (p < 0.05). Conclusion: Thus we conclude that addition of fentanyl or pethidine to bupivacaine for Bilateral Intraoral Infraorbital Nerve Block prolong the duration of analgesia with no complications and can be used safely in paediatric patients.Keywords: cleft lip, infraorbital block, NSAIDS, Opiods
Procedia PDF Downloads 237