Search results for: normal users
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5144

Search results for: normal users

4124 An Evaluation of the Relationship between the Anthropometric Measurements and Blood Lipid Profiles in Adolescents

Authors: Nalan Hakime Nogay

Abstract:

Childhood obesity is a significant health issue that is currently on the rise all over the world. In recent years, the relationship between childhood obesity and cardiovascular disease risk has been pointed out. The purpose of this study is to evaluate the relationship between some of the anthropometric indicators and blood lipid levels in adolescents. The present study has been conducted on a total of 252 adolescents -200 girls and 52 boys- within an age group of 12 to 18 years. Blood was drawn from each participant in the morning -after having fasted for 10 hours from the day before- to analyze their total cholesterol, HDL, LDL and triglyceride levels. Their body weight, height, waist circumference, subscapular skinfold thicknesses and triceps skinfold thicknesses measurements were taken and their individual waist/height ratios, BMI and body fat ratios were calculated. The blood lipid levels of the participants were categorized as acceptable, borderline and high in accordance with the 2011 Expert Panel Integrated Guidelines. The body fat ratios, total blood cholesterol and HDL levels of the girls were significantly higher than the boys whereas their waist circumference values were lower. The triglyceride levels, total cholesterol/HDL, LDL/HDL, triglyceride/HDL ratios of the group with the BMI ≥ 95 percentile ratio (the obese group) were higher than the groups that were considered to be overweight and normal weight as per their respective BMI values, while the HDL level of the obese group was lower; a fact that was found to be statistically significant. No significant relationship could be established, however, between the total blood cholesterol and LDL levels with their anthropometric measurements. The BMI, waist circumference, waist/height ratio, body fat ratio and triglyceride level of the group with the higher triglyceride level ( ≥ 130mg/dl) were found to be significantly higher compared to borderline (90-129 mg/dl) and the normal group (< 90 mg/dl). The BMI, waist circumference, waist/height ratio values of the group with the lower HDL level ( < 40 mg/dl) were significantly higher than the normal ( > 45 mg/dl) and borderline (40-45 mg/dl) groups. All of the anthropometric measurements of the group with the higher triglyceride/HDL ratio ( ≥ 3) were found to be significantly higher than that of the group with the lower ratio (< 3). Having a high BMI, waist/height ratio and waist circumference is related to low HDL and high blood triglyceride and triglyceride/HDL ratio. A high body fat ratio, on the other hand, is associated with a low HDL and high triglyceride/HDL ratio. Tackling childhood and adolescent obesity are important in terms of preventing cardiovascular diseases.

Keywords: adolescent, body fat, body mass index, lipid profile

Procedia PDF Downloads 250
4123 Introduce a New Model of Anomaly Detection in Computer Networks Using Artificial Immune Systems

Authors: Mehrshad Khosraviani, Faramarz Abbaspour Leyl Abadi

Abstract:

The fundamental component of the computer network of modern information society will be considered. These networks are connected to the network of the internet generally. Due to the fact that the primary purpose of the Internet is not designed for, in recent decades, none of these networks in many of the attacks has been very important. Today, for the provision of security, different security tools and systems, including intrusion detection systems are used in the network. A common diagnosis system based on artificial immunity, the designer, the Adhasaz Foundation has been evaluated. The idea of using artificial safety methods in the diagnosis of abnormalities in computer networks it has been stimulated in the direction of their specificity, there are safety systems are similar to the common needs of m, that is non-diagnostic. For example, such methods can be used to detect any abnormalities, a variety of attacks, being memory, learning ability, and Khodtnzimi method of artificial immune algorithm pointed out. Diagnosis of the common system of education offered in this paper using only the normal samples is required for network and any additional data about the type of attacks is not. In the proposed system of positive selection and negative selection processes, selection of samples to create a distinction between the colony of normal attack is used. Copa real data collection on the evaluation of ij indicates the proposed system in the false alarm rate is often low compared to other ir methods and the detection rate is in the variations.

Keywords: artificial immune system, abnormality detection, intrusion detection, computer networks

Procedia PDF Downloads 340
4122 Analyzing the Role of Visual Preferences for Designing of Urban Leftover Spaces

Authors: Jasim Azhar, Morten Gjerde

Abstract:

A city’s space is comprehended as a phenomenon that emerges from the ongoing negotiation between the constructed environment, urban processes, and bodily experience. Many spaces do not represent a static notion but are continually challenged and reconstituted. The ability to recognize those leftover spaces in the urban context is an integral part of an urban redevelopment process, where structured and layered approaches become useful in understanding to transform these spaces into places. Contemporary urban leftover spaces exist as a result of several factors and are present in every major city that often disrupts the flow of districts by creating visually unappealing places. These spaces can be designed, transformed and integrated so as to achieve environmental gains and social preferences. The paper explores how those small changes in visual quality of an urban leftover spaces in Wellington city influence a person’s experience significantly and its potential usage. These spaces can be seen as a catalyst for a change through an ecological sustainability’s framework. A creative and flexible design would lead to psychologically healthy places by improving the image of a city from within. The qualitative research is undertaken through the visual preference studies which will inform the planning initiatives by knowing what people feel about those visual changes in these leftover spaces. Those visual preferences can guide behavior and the emotional responses of different users for the redesign of those spaces with the meaningful attributes. The research is driven by the hypothesis that if the attributes are made visible, the likelihood of stimulating the interest of users should increase.

Keywords: leftover spaces, visual preferences, tactical urbanism, ecological sustainability

Procedia PDF Downloads 268
4121 Navigating Government Finance Statistics: Effortless Retrieval and Comparative Analysis through Data Science and Machine Learning

Authors: Kwaku Damoah

Abstract:

This paper presents a methodology and software application (App) designed to empower users in accessing, retrieving, and comparatively exploring data within the hierarchical network framework of the Government Finance Statistics (GFS) system. It explores the ease of navigating the GFS system and identifies the gaps filled by the new methodology and App. The GFS, embodies a complex Hierarchical Network Classification (HNC) structure, encapsulating institutional units, revenues, expenses, assets, liabilities, and economic activities. Navigating this structure demands specialized knowledge, experience, and skill, posing a significant challenge for effective analytics and fiscal policy decision-making. Many professionals encounter difficulties deciphering these classifications, hindering confident utilization of the system. This accessibility barrier obstructs a vast number of professionals, students, policymakers, and the public from leveraging the abundant data and information within the GFS. Leveraging R programming language, Data Science Analytics and Machine Learning, an efficient methodology enabling users to access, navigate, and conduct exploratory comparisons was developed. The machine learning Fiscal Analytics App (FLOWZZ) democratizes access to advanced analytics through its user-friendly interface, breaking down expertise barriers.

Keywords: data science, data wrangling, drilldown analytics, government finance statistics, hierarchical network classification, machine learning, web application.

Procedia PDF Downloads 49
4120 Evaluation of Systemic Immune-Inflammation Index in Obese Children

Authors: Mustafa M. Donma, Orkide Donma

Abstract:

A growing list of cancers might be influenced by obesity. Obesity is associated with an increased risk for the occurrence and development of some cancers. Inflammation can lead to cancer. It is one of the characteristic features of cancer and plays a critical role in cancer development. C-reactive protein (CRP) is under evaluation related to the new and simple prognostic factors in patients with metastatic renal cell cancer. Obesity can predict and promote systemic inflammation in healthy adults. BMI is correlated with hs-CRP. In this study, SII index and CRP values were evaluated in children with normal BMI and those within the range of different obesity grades to detect the tendency towards cancer in pediatric obesity. A total of one hundred and ninety-four children; thirty-five children with normal BMI, twenty overweight (OW), forty-seven obese (OB) and ninety-two morbid obese (MO) participated in the study. Age- and sex-matched groups were constituted using BMI-for age percentiles. Informed consent was obtained. Ethical Committee approval was taken. Weight, height, waist circumference (C), hip C, head C and neck C of the children were measured. The complete blood count test was performed. C-reactive protein analysis was performed. Statistical analyses were performed using SPSS. The degree for statistical significance was p≤0.05. SII index values were progressively increasing starting from normal weight (NW) to MO children. There is a statistically significant difference between NW and OB as well as MO children. No significant difference was observed between NW and OW children, however, a correlation was observed between NW and OW children. MO constitutes the only group, which exhibited a statistically significant correlation between SII index and CRP. Obesity-related bladder, kidney, cervical, liver, colorectal, endometrial cancers are still being investigated. Obesity, characterized as a chronic low-grade inflammation, is a crucial risk factor for colon cancer. Elevated childhood BMI values may be indicative of processes leading to cancer, initiated early in life. Prevention of childhood adiposity may decrease the cancer incidence in adults. To authors’ best knowledge, this study is the first to introduce SII index values during obesity of varying degrees of severity. It is suggested that this index seems to affect all stages of obesity with an increasing tendency and may point out the concomitant status of obesity and cancer starting from very early periods of life.

Keywords: children, C-reactive protein, systemic immune-inflammation index, obesity

Procedia PDF Downloads 157
4119 Neglected Omphalocele Presented as Ventral Hernia in 56-Year-Old Ugandan Female: Case Report and Review of Literature

Authors: Ssembatya Joseph Mary

Abstract:

Introduction: Omphalocele, an abdominal wall defect, occurs in 1 out of 4,000 to 6,000 live births. It is characterized by visceral herniation of small and large intestines, liver, and sometimes spleen and gonads are involved. The viscera is always covered by a three-layered sac. The defect in the mesoderm is mainly due to the failure of lateral abdominal wall folds to unite. About 350,000 ventral hernia repairs are done annually in the united states of America. Surgical repair with a mesh is the gold standard surgical method. With conservative management of Omphalocele, children are eventually closed between the age of 1 and 5 years. Herein, we present a late manifestation of ventral hernia following Omphalocele in a female Ugandan. Case presentation: A 56-year-old female with no known chronic illnesses and normal perinatal history presented with an umbilical swelling since birth with no associated symptoms. She is a married woman to one husband and has five children, and all of them are in good general condition with no such symptoms. She had normal vitals with an umbilical defect measuring about 20cm from the xiphoid process and 10 cm from the symphysis pubis. Surgery was done (component separation) on the second inpatient day, and it was uneventful. The patient was discharged on the 4th postoperative day in good general condition with a dry and clean surgical site. Conclusion: Despite adequate literature about Omphalocele and clear management guidelines, there have been reported cases of adult presentation of ventral hernias secondary to Omphalocele.

Keywords: omphalocele, ventral hernia, uganda, late presentation

Procedia PDF Downloads 50
4118 Fatty Acid Metabolism in Hypertension

Authors: Yin Hua Zhang

Abstract:

Cardiac metabolism is essential in myocardial contraction. In addition to glucose, fatty acids (FA) are essential in producing energy in the myocardium since FA-dependent beta-oxidation accounts for > 70-90% of cellular ATP under resting conditions. However, metabolism shifts from FAs to glucose utilization during disease progression (e.g. hypertrophy and ischemic myocardium), where glucose oxidation and glycolysis become the predominant sources of cellular ATP. At advanced failing stage, both glycolysis and beta-oxidation are dysregulated, result in insufficient supply of intracellular ATP and weakened myocardial contractility. Undeniably, our understandings of myocyte function in healthy and diseased hearts are based on glucose (10 mM)-dependent metabolism because glucose is the “sole” metabolic substrate in most of the physiological experiments. In view of the importance of FAs in cardiovascular health and diseases, we aimed to elucidate the impacts of FA supplementation on myocyte contractility and evaluate cellular mechanisms those mediate the functions in normal heart and with pathological stress. In particular, we have investigated cardiac excitation-contraction (E-C) coupling in the presence and absence of FAs in normal and hypertensive rat left ventricular (LV) myocytes. Our results reveal that FAs increase mitochondrial activity, intracellular [Ca²+]i, and LV myocyte contraction in healthy LV myocytes, whereas FA-dependent cardiac inotropyis attenuated in hypertension. FA-dependent myofilament Ca²+ desensitization could be fundamental in regulating [Ca²+]i. Collectively, FAs supplementation resets cardiac E-C coupling scheme in healthy and diseased hearts.

Keywords: hypertension, fatty acid, heart, calcium

Procedia PDF Downloads 90
4117 Evaluation of Clinical Decision Support System in Electronic Medical Record System: A Case of Malawi National Art Electronic Medical Record System

Authors: Pachawo Bisani, Goodall Nyirenda

Abstract:

The Malawi National Antiretroviral Therapy (NART) Electronic Medical Record (EMR) system was designed and developed with guidance from the Ministry of Health through the Department of HIV and AIDS (DHA) with the aim of supporting the management of HIV patient data and reporting in high prevalence ART clinics. As of 2021, the system has been scaled up to over 206 facilities across the country. The system is integrated with the clinical decision support system (CDSS) to assist healthcare providers in making a decision about an individual patient at a particular point in time. Despite NART EMR undergoing several evaluations and assessments, little has been done to evaluate the clinical decision support system in the NART EMR system. Hence, the study aimed to evaluate the use of CDSS in the NART EMR system in Malawi. The study adopted a mixed-method approach, and data was collected through interviews, observations, and questionnaires. The study has revealed that the CDSS tools were integrated into the ART clinic workflow, making it easy for the user to use it. The study has also revealed challenges in system reliability and information accuracy. Despite the challenges, the study further revealed that the system is effective and efficient, and overall, users are satisfied with the system. The study recommends that the implementers focus more on the logic behind the clinical decision-support intervention in order to address some of the concerns and enhance the accuracy of the information supplied. The study further suggests consulting the system's actual users throughout implementation.

Keywords: clinical decision support system, electronic medical record system, usability, antiretroviral therapy

Procedia PDF Downloads 71
4116 New Forms of Living and Compatibility with the Three Ages of Life - Definition of Fundamental Design Characteristics for Intergenerational Mansions

Authors: Alessandra Marino

Abstract:

This paper thoroughly investigates the design characteristics necessary for intergenerational living and evaluates their applicability within the Italian social panorama in order to identify a model that can serve as a reference for subsequent regulatory adjustments of a new building typology. The applied methodology involves the collaboration of people with various background and architects, all representing the three main ages of life - childhood or youth, adulthood, seniority - through questionnaires aimed at researching the peculiar characteristics that contemporary intergenerational housing should include; the questionnaires are then compared with each other in order to identify any recurring patterns by age group and/or influenced by the specialist knowledge on the subject of the architects compared to the rest of the user sample. The results indicate that among specialist users in the field of architecture, young students identify home automation as the key to the inclusion of the weakest groups within the building, adult architects believe that the identification of intergenerational/community services within the building is the cornerstone, and senior architects focus on widespread spatial accessibility. At the same time, the results among non-specialist users do not identify a significantly diversified model by age group but are generally in agreement in the importance of separation between private environments and collective spaces. The interpretation of the results obtained leads to a compositional study of a new building typology with the future objective of channeling the subsequent outcomes within the regulatory adjustments of the sector.

Keywords: intergenerational living, social sustainability, health, lifestyle, well-being

Procedia PDF Downloads 45
4115 Analyzing Information Management in Science and Technology Institute Libraries in India

Authors: P. M. Naushad Ali

Abstract:

India’s strength in basic research is recognized internationally. Science and Technology research in India has been performed by six distinct bodies or organizations such as Cooperative Research Associations, Autonomous Research Council, Institute under Ministries, Industrial R&D Establishment, Universities, Private Institutions. All most all these institutions are having a well-established library/information center to cater the information needs of their users like scientists and technologists. Information Management (IM) comprises disciplines concerned with the study and the effective and efficient management of information and resources, products and services as well as the understanding of the involved technologies and the people engaged in this activity. It is also observed that the libraries and information centers in India are also using modern technologies for the management of various activities and services to serve their users in a better way. Science and Technology libraries in the country are usually better equipped because the investment in Science and Technology in the country are much larger than those in other fields. Thus, most of the Science and Technology libraries are equipped with modern IT-based tools for handling and management of library services. In spite of these facts Science and Technology libraries are having all the characteristics of a model organization where computer application is found most successful, however, the adoption of this IT based management tool is not uniform in these libraries. The present study will help to know about the level use of IT-based management tools for the information management of Science and Technology libraries in India. The questionnaire, interview, observation and document review techniques have been used in data collection. Finally, the author discusses findings of the study and put forward some suggestions to improve the quality of Science and Technology institute library services in India.

Keywords: information management, science and technology libraries, India, IT-based tools

Procedia PDF Downloads 379
4114 Evidence-Based in Telemonitoring of Users with Pacemakers at Five Years after Implant: The Poniente Study

Authors: Antonio Lopez-Villegas, Daniel Catalan-Matamoros, Remedios Lopez-Liria

Abstract:

Objectives: The purpose of this study was to analyze clinical data, health-related quality of life (HRQoL) and functional capacity of patients using a telemonitoring follow-up system (TM) compared to patients followed-up through standard outpatient visits (HM) 5 years after the implantation of a pacemaker. Methods: This is a controlled, non-randomised, nonblinded clinical trial, with data collection carried out at 5 years after the pacemakers implant. The study was developed at Hospital de Poniente (Almeria, Spain), between October 2012 and November 2013. The same clinical outcomes were analyzed in both follow-up groups. Health-Related Quality of Life and Functional Capacity was assessed through EuroQol-5D (EQ-5D) questionnaire and Duke Activity Status Index (DASI) respectively. Sociodemographic characteristics and clinical data were also analyzed. Results: 5 years after pacemaker implant, 55 of 82 initial patients finished the study. Users with pacemakers were assigned to either a conventional follow-up group at hospital (HM=34, 50 initials) or a telemonitoring system group (TM=21, 32 initials). No significant differences were found between both groups according to sociodemographic characteristics, clinical data, Health-Related Quality of Life and Functional Capacity according to medical record and EQ5D and DASI questionnaires. In addition, conventional follow-up visits to hospital were reduced in 44,84% (p < 0,001) in the telemonitoring group in relation to hospital monitoring group. Conclusion: Results obtained in this study suggest that the telemonitoring of users with pacemakers is an equivalent option to conventional follow-up at hospital, in terms of Health-Related Quality of Life and Functional Capacity. Furthermore, it allows for the early detection of cardiovascular and pacemakers-related problem events and significantly reduces the number of in-hospital visits. Trial registration: ClinicalTrials.gov NCT02234245. The PONIENTE study has been funded by the General Secretariat for Research, Development and Innovation, Regional Government of Andalusia (Spain), project reference number PI/0256/2017, under the research call 'Development and Innovation Projects in the Field of Biomedicine and Health Sciences', 2017.

Keywords: cardiovascular diseases, health-related quality of life, pacemakers follow-up, remote monitoring, telemedicine

Procedia PDF Downloads 112
4113 Lipid Profile of Civil Servants in Abeokuta Ogun State Nigeria

Authors: Sunday Sedodo Nupo, Clara Berstien Oguntona, Babatunde Oguntona, Oluseyi Akinloye, P. A. Olunusi Adeboye

Abstract:

Cardiovascular diseases are now becoming dominant sources of morbidity and mortality worldwide. This study investigated the lipid profile of civil servants. A cross-sectional study was carried out among randomly selected 202 male and 298 female civil servants in Abeokuta Ogun state. A pretested structured questionnaire was used to elicit information on history of non-communicable diseases and physical activity pattern of the respondents. The blood pressures of the subjects were measured and classified using World Health Organization criteria. The total cholesterol (TC), triglycerides (TG), low-density lipoprotein (LDL), high-density lipoprotein (HDL). Ethical approval was obtained from Ogun State Ministry of Health. Data collected were analysed using Statistical package for social science version 17.1. Results showed that majority (76%) of the subjects were within the age range of 20 - 40 years, 75% earned between N58,500 - N98,000 monthly and 68% were sedentary. The mean energy intake of men and women were 3942±38 kcal and 2791±3 kcal respectively, while the protein intake for men was 65±49 g/day and 54.28±40 g/day for women. Desirable TC level (<200 mg/dl) was found in 80% of the selected subjects while the normal TG (<150 mg/dl) and LDL (<129 mg/dl) was found in 95% and 90% subjects respectively. The mean TC was 78.91±11 mg/dl and 62.69±9 mg/dl in men and women respectively. The study showed that most of the subjects had normal lipid in terms of serum triglycerides, total cholesterol, HDL cholesterol and LDL cholesterol.

Keywords: high density lipoprotein, morbidity, mortality, triglycerides

Procedia PDF Downloads 215
4112 Local Differential Privacy-Based Data-Sharing Scheme for Smart Utilities

Authors: Veniamin Boiarkin, Bruno Bogaz Zarpelão, Muttukrishnan Rajarajan

Abstract:

The manufacturing sector is a vital component of most economies, which leads to a large number of cyberattacks on organisations, whereas disruption in operation may lead to significant economic consequences. Adversaries aim to disrupt the production processes of manufacturing companies, gain financial advantages, and steal intellectual property by getting unauthorised access to sensitive data. Access to sensitive data helps organisations to enhance the production and management processes. However, the majority of the existing data-sharing mechanisms are either susceptible to different cyber attacks or heavy in terms of computation overhead. In this paper, a privacy-preserving data-sharing scheme for smart utilities is proposed. First, a customer’s privacy adjustment mechanism is proposed to make sure that end-users have control over their privacy, which is required by the latest government regulations, such as the General Data Protection Regulation. Secondly, a local differential privacy-based mechanism is proposed to ensure the privacy of the end-users by hiding real data based on the end-user preferences. The proposed scheme may be applied to different industrial control systems, whereas in this study, it is validated for energy utility use cases consisting of smart, intelligent devices. The results show that the proposed scheme may guarantee the required level of privacy with an expected relative error in utility.

Keywords: data-sharing, local differential privacy, manufacturing, privacy-preserving mechanism, smart utility

Procedia PDF Downloads 58
4111 Investigation of the Role of Lipoprotein a rs10455872 Gene Polymorphism in Childhood Obesity

Authors: Mustafa M. Donma, Ayşen Haksayar, Bahadır Batar, Buse Tepe, Birol Topçu, Orkide Donma

Abstract:

Childhood obesity is an ever-increasing health problem. The Association of obesity with severe chronic diseases such as diabetes and cardiovascular diseases makes the problem life-threatening. Aside from psychological, societal and metabolic factors, genetic polymorphisms have gained importance concerning etiology in recent years. The aim of this study was to evaluate the relationship between rs10455872 gene polymorphism in the Lipoprotein (a) locus and the development of childhood obesity. This was a prospective study carried out according to the Helsinki Declarations. The study protocol was approved by the Institutional Ethics Committee. This study was supported by Tekirdag Namik Kemal University Rectorate, Scientific Research Projects Coordination Unit. Project No: NKUBAP.02.TU.20.278. A total of 180 children (103 obese (OB) and 77 healthy), aged 6-18 years, without any acute or chronic disease, participated in the study. Two different groups were created: OB and healthy control. Each group was divided into two further groups depending on the nature of the polymorphism. Anthropometric measurements were taken during the detailed physical examination. Laboratory tests and TANITA measurements were performed. For the statistical evaluations, SPSS version 28.0 was used. A P-value smaller than 0.05 was the statistical significance degree. The distribution of lipoprotein (a) rs10455872 gene polymorphism did not differ between OB and healthy children. Children with AG genotype in both OB and control groups had lower body mass index (BMI), diagnostic obesity notation model assessment index (DONMA II), body fat ratio (BFR), C-reactive protein (CRP), and metabolic syndrome index (MetS index) values compared to children with normal AA genotype. In the OB group, serum iron, vitamin B12, hemoglobin, MCV, and MCH values were found to be higher in the AG genotype group than those of children with the normal AA genotype. A significant correlation was found between the MetS index and BFR among OB children with normal homozygous genotype. MetS index increased as BFR increased in this group. However, such a correlation was not observed in the OB group with heterozygous AG genotype. To the best of our knowledge, the association of lipoprotein (a) rs10455872 gene polymorphism with the etiology of childhood obesity has not been studied yet. Therefore, this study was the first report suggesting polymorphism with AG genotype as a good risk factor for obesity.

Keywords: child, gene polymorphism, lipoprotein (a), obesity, rs10455872

Procedia PDF Downloads 50
4110 DenseNet and Autoencoder Architecture for COVID-19 Chest X-Ray Image Classification and Improved U-Net Lung X-Ray Segmentation

Authors: Jonathan Gong

Abstract:

Purpose AI-driven solutions are at the forefront of many pathology and medical imaging methods. Using algorithms designed to better the experience of medical professionals within their respective fields, the efficiency and accuracy of diagnosis can improve. In particular, X-rays are a fast and relatively inexpensive test that can diagnose diseases. In recent years, X-rays have not been widely used to detect and diagnose COVID-19. The under use of Xrays is mainly due to the low diagnostic accuracy and confounding with pneumonia, another respiratory disease. However, research in this field has expressed a possibility that artificial neural networks can successfully diagnose COVID-19 with high accuracy. Models and Data The dataset used is the COVID-19 Radiography Database. This dataset includes images and masks of chest X-rays under the labels of COVID-19, normal, and pneumonia. The classification model developed uses an autoencoder and a pre-trained convolutional neural network (DenseNet201) to provide transfer learning to the model. The model then uses a deep neural network to finalize the feature extraction and predict the diagnosis for the input image. This model was trained on 4035 images and validated on 807 separate images from the ones used for training. The images used to train the classification model include an important feature: the pictures are cropped beforehand to eliminate distractions when training the model. The image segmentation model uses an improved U-Net architecture. This model is used to extract the lung mask from the chest X-ray image. The model is trained on 8577 images and validated on a validation split of 20%. These models are calculated using the external dataset for validation. The models’ accuracy, precision, recall, f1-score, IOU, and loss are calculated. Results The classification model achieved an accuracy of 97.65% and a loss of 0.1234 when differentiating COVID19-infected, pneumonia-infected, and normal lung X-rays. The segmentation model achieved an accuracy of 97.31% and an IOU of 0.928. Conclusion The models proposed can detect COVID-19, pneumonia, and normal lungs with high accuracy and derive the lung mask from a chest X-ray with similarly high accuracy. The hope is for these models to elevate the experience of medical professionals and provide insight into the future of the methods used.

Keywords: artificial intelligence, convolutional neural networks, deep learning, image processing, machine learning

Procedia PDF Downloads 112
4109 Shikonin Reduces Endometriosis by Inhibiting RANTES Secretion and Mononuclear Macrophage Chemotaxis

Authors: Dong-ping Yuan, Lin Gu, Jun Long, Jie Chen, Ni Jie, Ying-Li Shi

Abstract:

Endometriosis is a common disease in women of reproductive age, whose classic characteristic is mononuclear cell infiltration into lesions. Shikonin is an anti-inflammatory phytocompound from Lithospermum erythrorhizon, whose potential therapeutic effects for the endometriosis remain unclear. The working hypothesis was that shikonin can inhibit the development of endometriosis by the inhibition of chemotactic effect. Shikonin significantly inhibited the growth of human endometrial tissue implanted into mice (P<0.05). No observable adverse effects were found. The mouse regulated upon activation normal T-cell expressed and secreted (mRANTES) level in peritoneal fluid of animal endometriosis model was higher than that in normal SCID mice (P<0.05), and decreased dramatically after shikonin treatment in a dose-dependent manner (P<0.05). Peritoneal fluid from NOD/SCID mice treated with shikonin inhibited monocytes chemotaxis, which could be abolished by mRANTES antibody. In vitro, shikonin significantly inhibited RANTES expression of U937 cells cultured alone or co-cultured with human methothelail cells and endometrial stromal cells, and inhibited RANTES-induced chemotaxis of U937 cells (P<0.05). The present results suggest that shikonin can inhibit the development of endometriosis by mechanisms that at least include the inhibition of RANTES expression and decreased migration of mononuclear cells to lesions. Shikonin may be a useful and safe new approach for treating endometriosis.

Keywords: endometriosis, shikonin, RANTES chemotaxis

Procedia PDF Downloads 380
4108 Enhanced Model for Risk-Based Assessment of Employee Security with Bring Your Own Device Using Cyber Hygiene

Authors: Saidu I. R., Shittu S. S.

Abstract:

As the trend of personal devices accessing corporate data continues to rise through Bring Your Own Device (BYOD) practices, organizations recognize the potential cost reduction and productivity gains. However, the associated security risks pose a significant threat to these benefits. Often, organizations adopt BYOD environments without fully considering the vulnerabilities introduced by human factors in this context. This study presents an enhanced assessment model that evaluates the security posture of employees in BYOD environments using cyber hygiene principles. The framework assesses users' adherence to best practices and guidelines for maintaining a secure computing environment, employing scales and the Euclidean distance formula. By utilizing this algorithm, the study measures the distance between users' security practices and the organization's optimal security policies. To facilitate user evaluation, a simple and intuitive interface for automated assessment is developed. To validate the effectiveness of the proposed framework, design science research methods are employed, and empirical assessments are conducted using five artifacts to analyze user suitability in BYOD environments. By addressing the human factor vulnerabilities through the assessment of cyber hygiene practices, this study aims to enhance the overall security of BYOD environments and enable organizations to leverage the advantages of this evolving trend while mitigating potential risks.

Keywords: security, BYOD, vulnerability, risk, cyber hygiene

Procedia PDF Downloads 58
4107 Further Development in Predicting Post-Earthquake Fire Ignition Hazard

Authors: Pegah Farshadmanesh, Jamshid Mohammadi, Mehdi Modares

Abstract:

In nearly all earthquakes of the past century that resulted in moderate to significant damage, the occurrence of postearthquake fire ignition (PEFI) has imposed a serious hazard and caused severe damage, especially in urban areas. In order to reduce the loss of life and property caused by post-earthquake fires, there is a crucial need for predictive models to estimate the PEFI risk. The parameters affecting PEFI risk can be categorized as: 1) factors influencing fire ignition in normal (non-earthquake) condition, including floor area, building category, ignitability, type of appliance, and prevention devices, and 2) earthquake related factors contributing to the PEFI risk, including building vulnerability and earthquake characteristics such as intensity, peak ground acceleration, and peak ground velocity. State-of-the-art statistical PEFI risk models are solely based on limited available earthquake data, and therefore they cannot predict the PEFI risk for areas with insufficient earthquake records since such records are needed in estimating the PEFI model parameters. In this paper, the correlation between normal condition ignition risk, peak ground acceleration, and PEFI risk is examined in an effort to offer a means for predicting post-earthquake ignition events. An illustrative example is presented to demonstrate how such correlation can be employed in a seismic area to predict PEFI hazard.

Keywords: fire risk, post-earthquake fire ignition (PEFI), risk management, seismicity

Procedia PDF Downloads 368
4106 Synthesis and Cytotoxic Activity of New Quinazolinone-Based Compounds against Human Breast Cancer Cell Line MCF-7

Authors: Maryam Zahedifard, Fadhil Lafta Faraj, Maryam Hajrezaie, Nazia Abdul Majid, Mahmood Ameen Abdulla, Hapipah Mohd Ali

Abstract:

In the current study, we prepared two new quinazoline schiff bases through condensation reaction of 2-aminobenzhydrazide with 5-bromosalicylaldehyde and 3-methoxy-5-bromosalicylaldehyde. The chemical structures of both newly synthesized compounds (1 and 2) were confirmed by FT-IR and X-ray crystallography studies. The cytotoxic effect of compounds was investigated against MCF-7 human breast cancer cells. MTT results showed that (1) and (2) decreased the viability of MCF-7 cells in a time-dependent manner, exhibiting an IC50 value of 3.23 ± 0.28 µg/mL and 3.41 ± 0.34 µg/mL, respectively, after a 72-hours treatment period. In contrast, they did not show significant anti-proliferative effect towards MCF-10A normal breast cells and WRL-68 normal liver cells. We found a perturbation in mitochondrial membrane potential and increased cytochrome c release from the mitochondria to the cytosol, suggesting an activation of apoptosis by compounds, which was confirmed by activation of the initiator caspase-9 and the executioner caspases-3/7. (1) was also able to trigger extrinsic pathway via activation of caspase-8 and inhibition of NF-κB translocation. The acute toxicity test showed no toxicity effect of the compounds in rats. Our results showed that the selected synthesized compounds are highly potent to induce apoptosis in MCF-7 cells via either intrinsic or extrinsic mitochondrial pathway.

Keywords: Quinazoline Schiff base, apoptosis, MCF-7 human breast cancer cell line, caspase, NF-κB translocation

Procedia PDF Downloads 477
4105 Client Hacked Server

Authors: Bagul Abhijeet

Abstract:

Background: Client-Server model is the backbone of today’s internet communication. In which normal user can not have control over particular website or server? By using the same processing model one can have unauthorized access to particular server. In this paper, we discussed about application scenario of hacking for simple website or server consist of unauthorized way to access the server database. This application emerges to autonomously take direct access of simple website or server and retrieve all essential information maintain by administrator. In this system, IP address of server given as input to retrieve user-id and password of server. This leads to breaking administrative security of server and acquires the control of server database. Whereas virus helps to escape from server security by crashing the whole server. Objective: To control malicious attack and preventing all government website, and also find out illegal work to do hackers activity. Results: After implementing different hacking as well as non-hacking techniques, this system hacks simple web sites with normal security credentials. It provides access to server database and allow attacker to perform database operations from client machine. Above Figure shows the experimental result of this application upon different servers and provides satisfactory results as required. Conclusion: In this paper, we have presented a to view to hack the server which include some hacking as well as non-hacking methods. These algorithms and methods provide efficient way to hack server database. By breaking the network security allow to introduce new and better security framework. The terms “Hacking” not only consider for its illegal activities but also it should be use for strengthen our global network.

Keywords: Hacking, Vulnerabilities, Dummy request, Virus, Server monitoring

Procedia PDF Downloads 239
4104 Balancing Aesthetics, Sustainability, and Safety in Handmade Fabric Face Masks: A Testimony of Creativity and Adaptability

Authors: Anne Mastamet-Mason, Oluwatosin Onakoya, Karla Tissiman

Abstract:

The COVID-19 pandemic that ravaged the world in 2020 brought about the need for handmade fabric face masks in South Africa and beyond. These masks showcased individuality and environmental responsibility and effectively aided our battle against the virus. These practical masks held significant meaning, representing human creativity, resilience, and commitment to sustainability in adversity. This paper examines how aesthetics, sustainability, and safety were achieved in the Handmade Fabric Face Masks. It analyses how their integration signified human agility and resilience to the pandemic while promoting dignity and environmental welfare. The research conducted a qualitative analysis to choose handmade fabric face masks and assess their aesthetic, sustainable, and safety features. The study involved interviewing a group of mask designers and users who evaluated the masks' efficacy in providing protection, aesthetics, and environmental sustainability. Although the designers demonstrated a high level of knowledge in the design aspects, the results indicated a need for more information regarding the functional safety measures and some environmental factors in mask selection and production. The mask analysis also revealed that the masks available in the market combined aesthetics and environmental protection but had limited safety measures. Despite the lack of balance of aesthetics, sustainability, and safety among the designers and the users of hand-fabric masks, functional aspects of fabrics and sustainability literacy are essential

Keywords: sustainable fashion, fabric mask, aesthetics, safety measures

Procedia PDF Downloads 48
4103 Meat Products Demand in Oyo West Local Government: An Application of Almost Ideal Demand System (LA/AIDS)

Authors: B. A. Adeniyi, S. A. Daud, O. Amao

Abstract:

The study investigates consumer demand for meat products in Oyo West Local Government using linear approximate almost ideal demand system (LA/AIDS). Questions that were addressed by the study include: first, what is the type and quantity of meat products available to the household and their demand pattern? Second is the investigation of the factors that affect meat products demand pattern and proportion of income that is spent on them. For the above purpose cross-sectional data were collected from 156 households of the study area and analyzed to reveal the functional relationship between meat products consumption and some socio-economic variables of the household. Results indicated that per capita meat consumption increased as household income and education increased but decreased with age. It was also found that male tend to consume more meat products than their female counterparts and that increase in household size will first increased per caput meat consumption but later decreased it. Price also tends to greatly influence the demand pattern of meat products. The results of elasticity computed from the results of regression analysis revealed that own price elasticity for all meat products were negative which indicated that they were normal products while cross and expenditure elasticity were positive which further confirmed that meat products were normal and substitute products. This study therefore concludes that the relevance of these variables imposed a great challenge to the policy makers and the government, in the sense that more cost effective methods of meat production technology have to be devised in other to make consumption of meat products more affordable.

Keywords: meat products, consumption, animal production, technology

Procedia PDF Downloads 231
4102 A Deep Learning Approach to Online Social Network Account Compromisation

Authors: Edward K. Boahen, Brunel E. Bouya-Moko, Changda Wang

Abstract:

The major threat to online social network (OSN) users is account compromisation. Spammers now spread malicious messages by exploiting the trust relationship established between account owners and their friends. The challenge in detecting a compromised account by service providers is validating the trusted relationship established between the account owners, their friends, and the spammers. Another challenge is the increase in required human interaction with the feature selection. Research available on supervised learning (machine learning) has limitations with the feature selection and accounts that cannot be profiled, like application programming interface (API). Therefore, this paper discusses the various behaviours of the OSN users and the current approaches in detecting a compromised OSN account, emphasizing its limitations and challenges. We propose a deep learning approach that addresses and resolve the constraints faced by the previous schemes. We detailed our proposed optimized nonsymmetric deep auto-encoder (OPT_NDAE) for unsupervised feature learning, which reduces the required human interaction levels in the selection and extraction of features. We evaluated our proposed classifier using the NSL-KDD and KDDCUP'99 datasets in a graphical user interface enabled Weka application. The results obtained indicate that our proposed approach outperformed most of the traditional schemes in OSN compromised account detection with an accuracy rate of 99.86%.

Keywords: computer security, network security, online social network, account compromisation

Procedia PDF Downloads 100
4101 The Information-Seeking Behaviour of Kuwaiti Judges (KJs)

Authors: Essam Mansour

Abstract:

The key purpose of this study is to show information-seeking behaviour of Kuwaiti Judges (KJs). Being one of the few studies about the information needs and information-seeking behaviour conducted in Arab and developing countries, this study is a pioneer one among many studies conducted in information seeking, especially with this significant group of information users. The authors tried to investigate this seeking behavior in terms of KJs' thoughts, perceptions, motivations, techniques, preferences, tools and barriers met when seeking information. The authors employed a questionnaire, with a response rate 77.2 percent. This study showed that most of KJs were likely to be older, educated and with a work experience ranged from new to old experience. There is a statistically reliable significant difference between KJs' demographic characteristics and some sources of information, such as books, encyclopedias, references and mass media. KJs were using information moderately to make a decision, to be in line with current events, to collect statistics and to make a specific/general research. The office and home were the most frequent location KJs were accessing information from. KJs' efficiency level of the English language is described to be moderately good, and a little number of them confirmed that their efficiency level of French was not bad. The assistance provided by colleagues, followed by consultants, translators, sectaries and librarians were found to be most strong types of assistance needed when seeking information. Mobile apps, followed by PCs, information networks (the Internet) and information databases were the highest technology tool used by KJs. Printed materials, followed by non-printed and audiovisual materials were the most preferred information formats KJs use. The use of languages, the recency of information and the place of information, the deficit role of the library to deliver information were at least significant barriers to KJs when seeking information.

Keywords: information users, information-seeking behaviour, information needs, judges, Kuwait

Procedia PDF Downloads 292
4100 University Students’ Perceptions of the Influence of Cannabis Use on Mental Health

Authors: Konesh Navsaria, Itumeleng Ramodumo

Abstract:

The study explored university students’ perceptions of cannabis use on academic life at a higher education institution (HEI) in Nelson Mandela Bay, South Africa. Cannabis is described as the most commonly-used drug by youth, especially those who are in tertiary institutions. The use of cannabis has both negative and positive effects; this is evident in different areas of human functioning. Cannabis usage has been debated upon in courts regarding its legalization and decriminalization, and on the 18th of September 2018, the South African High Court decriminalized cannabis for personal use. Cannabis use has increased in academic settings, and this has raised concerns about how it affects the mental health of students. A qualitative approach was used for the study with an explorative, descriptive design. Purposive sampling was used to select 15 participants for the study. Data were collected using focused-group interviews, following ethical clearance from the HEI. The collected data were analyzed and interpreted using thematic analysis, and cognitive behavioural theory was used as the theoretical framework. The research findings indicated both positive and negative influences of cannabis use on mental health. Most participants who expressed positive effects have used cannabis before, whereas most participants with negative perspectives of cannabis use on mental health are non-cannabis users. The findings revealed that participants perceived that the quantity of cannabis smoked determined whether there was a positive or negative effect on mental health; that is, large doses of cannabis were perceived as having negative effects. The research findings also revealed that the legalization of cannabis is very likely to increase its use and also highlighted precautionary measures users take to avoid the substance’s negative effects on mental health.

Keywords: cannabis use, mental health, university students, legalization

Procedia PDF Downloads 129
4099 Feature Based Unsupervised Intrusion Detection

Authors: Deeman Yousif Mahmood, Mohammed Abdullah Hussein

Abstract:

The goal of a network-based intrusion detection system is to classify activities of network traffics into two major categories: normal and attack (intrusive) activities. Nowadays, data mining and machine learning plays an important role in many sciences; including intrusion detection system (IDS) using both supervised and unsupervised techniques. However, one of the essential steps of data mining is feature selection that helps in improving the efficiency, performance and prediction rate of proposed approach. This paper applies unsupervised K-means clustering algorithm with information gain (IG) for feature selection and reduction to build a network intrusion detection system. For our experimental analysis, we have used the new NSL-KDD dataset, which is a modified dataset for KDDCup 1999 intrusion detection benchmark dataset. With a split of 60.0% for the training set and the remainder for the testing set, a 2 class classifications have been implemented (Normal, Attack). Weka framework which is a java based open source software consists of a collection of machine learning algorithms for data mining tasks has been used in the testing process. The experimental results show that the proposed approach is very accurate with low false positive rate and high true positive rate and it takes less learning time in comparison with using the full features of the dataset with the same algorithm.

Keywords: information gain (IG), intrusion detection system (IDS), k-means clustering, Weka

Procedia PDF Downloads 280
4098 Experimental Investigation on the Shear Strength Parameters of Sand-Slag Mixtures

Authors: Ayad Salih Sabbar, Amin Chegenizadeh, Hamid Nikraz

Abstract:

Utilizing waste materials in civil engineering applications has a positive influence on the environment by reducing carbon dioxide emissions and issues associated with waste disposal. Granulated blast furnace slag (GBFS) is a by-product of the iron and steel industry, with millions of tons of slag being annually produced worldwide. Slag has been widely used in structural engineering and for stabilizing clay soils; however, studies on the effect of slag on sandy soils are scarce. This article investigates the effect of slag content on shear strength parameters through direct shear tests and unconsolidated undrained triaxial tests on mixtures of Perth sand and slag. For this purpose, sand-slag mixtures, with slag contents of 2%, 4%, and 6% by weight of samples, were tested with direct shear tests under three normal stress values, namely 100 kPa, 150 kPa, and 200 kPa. Unconsolidated undrained triaxial tests were performed under a single confining pressure of 100 kPa and relative density of 80%. The internal friction angles and shear stresses of the mixtures were determined via the direct shear tests, demonstrating that shear stresses increased with increasing normal stress and the internal friction angles and cohesion increased with increasing slag. There were no significant differences in shear stresses parameters when slag content rose from 4% to 6%. The unconsolidated undrained triaxial tests demonstrated that shear strength increased with increasing slag content.

Keywords: direct shear, shear strength, slag, UU test

Procedia PDF Downloads 463
4097 Modeling the Acquisition of Expertise in a Sequential Decision-Making Task

Authors: Cristóbal Moënne-Loccoz, Rodrigo C. Vergara, Vladimir López, Domingo Mery, Diego Cosmelli

Abstract:

Our daily interaction with computational interfaces is plagued of situations in which we go from inexperienced users to experts through self-motivated exploration of the same task. In many of these interactions, we must learn to find our way through a sequence of decisions and actions before obtaining the desired result. For instance, when drawing cash from an ATM machine, choices are presented in a step-by-step fashion so that a specific sequence of actions must be performed in order to produce the expected outcome. But, as they become experts in the use of such interfaces, do users adopt specific search and learning strategies? Moreover, if so, can we use this information to follow the process of expertise development and, eventually, predict future actions? This would be a critical step towards building truly adaptive interfaces that can facilitate interaction at different moments of the learning curve. Furthermore, it could provide a window into potential mechanisms underlying decision-making behavior in real world scenarios. Here we tackle this question using a simple game interface that instantiates a 4-level binary decision tree (BDT) sequential decision-making task. Participants have to explore the interface and discover an underlying concept-icon mapping in order to complete the game. We develop a Hidden Markov Model (HMM)-based approach whereby a set of stereotyped, hierarchically related search behaviors act as hidden states. Using this model, we are able to track the decision-making process as participants explore, learn and develop expertise in the use of the interface. Our results show that partitioning the problem space into such stereotyped strategies is sufficient to capture a host of exploratory and learning behaviors. Moreover, using the modular architecture of stereotyped strategies as a Mixture of Experts, we are able to simultaneously ask the experts about the user's most probable future actions. We show that for those participants that learn the task, it becomes possible to predict their next decision, above chance, approximately halfway through the game. Our long-term goal is, on the basis of a better understanding of real-world decision-making processes, to inform the construction of interfaces that can establish dynamic conversations with their users in order to facilitate the development of expertise.

Keywords: behavioral modeling, expertise acquisition, hidden markov models, sequential decision-making

Procedia PDF Downloads 240
4096 Representation of Islamophobia on Social Media: Facebook Comments Analysis

Authors: Nadia Syed

Abstract:

The digital age has inevitably changed the way in which hate crime is committed. The cyber world has become a highly effective means for individuals and groups to be targeted, harmed, and marginalized , largely through online medium. Facebook has become one of the fastest growing social media platforms. At the end of 2013, Facebook had 1,23bn monthly active users and 757 million daily users who log onto Facebook. Within this online space, there are also an increasing number of online virtual communities, and hate groups who are using this freedom to share a violent, Islamophobic and racist description which attempts to create a aggressive virtual environment. This paper is a research on the rise of Islamophobia and the role of media in spreading it. This paper focusing on how the media especially Facebook is portraying Islam as the religion which promotes violence and ultimately playing a significant role in the global rise of Islamophobia against Muslims. It is important to analyse these ‘new’ communities by monitoring the activities they conduct, because the material they post, potentially can have a harmful impact on community cohesion within society. Additionally, as a result of recent figures that shows an increase in online anti-Muslim abuse, there is a pertinent need to address the issue about Islamophobia on social media. On the whole, this study found Muslims being demonized and vilified online which had manifested through negative attitudes, discrimination, stereotypes, physical threats and online harassment which all had the potential to incite violence or prejudicial action because it disparages and intimidates a protected individual or group.

Keywords: Islamophobia, online, social media, facebook, internet, extremism

Procedia PDF Downloads 78
4095 Investigating the Critical Drivers of Behavior: The Case of Online Taxi Services

Authors: Rosa Hendijani, Mohammadhesam Hajighasemi

Abstract:

As of late, the sharing economy has become an important type of business model. Online taxi services are one example that has grown rapidly around the world. This study examines the factors influencing the use of online taxis as one form of IT-enabled sharing services based on the theory of planned behavior (TPB). Based on the theory of planned behavior, these factors can be divided into three categories, including the ones related to attitude (e.g., image and perceived usefulness), normative believes (e.g., subjective norms), and behavioral control (e.g., technology facilitating conditions and self-efficacy). Three other factors were also considered based on the literature, including perceived economic benefits, openness towards using shared services, and perceived availability. The effect of all these variables was tested both directly and indirectly through intention as the mediating variable. A survey method was used to test the research hypotheses. In total, 361 individuals partook in the study. The results of a multiple regression analysis on behavior showed that perceived economic benefits, compatibility, and subjective norms were important factors influencing behavior among online taxi users. In addition, intention partially mediated the effect of perceived economic benefits and compatibility on behavior. It can be concluded that perceived economic benefits, compatibility, and subjective norms are the three main factors that influence behavior among online taxi users.

Keywords: collaborative consumption, IT-enabled sharing services model, online taxi, sharing economy, theory of planned behavior

Procedia PDF Downloads 119