Search results for: expert assessments are used. In the proposed methodology
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14691

Search results for: expert assessments are used. In the proposed methodology

3711 Therapeutic Role of T Subpopulations Cells (CD4, CD8 and Treg (CD25 and FOXP3+ Cells) of UC MSC Isolated from Three Different Methods in Various Disease

Authors: Kumari Rekha, Mathur K Dhananjay, Maheshwari Deepanshu, Nautiyal Nidhi, Shubham Smriti, Laal Deepika, Sinha Swati, Kumar Anupam, Biswas Subhrajit, Shiv Kumar Sarin

Abstract:

Background: Mesenchymal stem cells are multipotent stem cells derived from mesoderm and are used for therapeutic purposes because of their self-renewal, homing capacity, Immunomodulatory capability, low immunogenicity and mitochondrial transfer signaling. MSCs have the ability to regulate the mechanism of both innate as well as adaptive immune responses through the modulation of cellular response and the secretion of inflammatory mediators. Different sources of MSC are UC MSC, BM MSC, Dental Pulp, and Adipose MSC. The most frequent source used is umbilical cord tissue due to its being easily available and free of limitations of collection procedures from respective hospitals. The immunosuppressive role of MSCs is particularly interesting for clinical use since it confers resistance to rejection by the host immune response. Methodology: In this study, T helper cells (TH4), Cytotoxic T cells (CD-8), immunoregulatory cells (CD25 +FOXP3+) are compared from isolated MSC from three different methods, UC Dissociation Kit (Miltenyi), Explant Culture and Collagenase Type-IV. To check the immunomodulatory property, these MSCs were seeded with PBMC(Coculture) in CD3 coated 24 well plates. Cd28 antibody was added in coculture for six days. The coculture was analyzed in FACS Verse flow cytometry. Results: From flow cytometry analysis of coculture, it found that All over T helper cells (CD4+) number p<0.0264 increases in (All Enzymes) MSC rather than explant MSC(p>0.0895) as compared to Collagenase(p>0.7889) in a coculture of Activated T cell and Mesenchymal Stem Cell. Similar T reg cells (CD25+, FOXP3+) expression p<0.0234increases in All Enzymes), decreases in Explant and Collagenase. Experiments have shown that MSCs can also directly prevent the cytotoxic activity of CD8 lymphocytes mainly by blocking their proliferation rather than by inhibiting the cytotoxic effect. And promoting the t-reg cells, which helps in the mediation of immune response in various diseases. Conclusion: MSC suppress Cytotoxic CD8 T cell and Enhance immunoregulatory T reg (CD4+, CD25+, FOXP3+) Cell expression. Thus, MSC maintains a proper balance(ratio) between CD4 T cells and Cytotoxic CD8 T cells.

Keywords: MSC, disease, T cell, T regulatory

Procedia PDF Downloads 115
3710 MhAGCN: Multi-Head Attention Graph Convolutional Network for Web Services Classification

Authors: Bing Li, Zhi Li, Yilong Yang

Abstract:

Web classification can promote the quality of service discovery and management in the service repository. It is widely used to locate developers desired services. Although traditional classification methods based on supervised learning models can achieve classification tasks, developers need to manually mark web services, and the quality of these tags may not be enough to establish an accurate classifier for service classification. With the doubling of the number of web services, the manual tagging method has become unrealistic. In recent years, the attention mechanism has made remarkable progress in the field of deep learning, and its huge potential has been fully demonstrated in various fields. This paper designs a multi-head attention graph convolutional network (MHAGCN) service classification method, which can assign different weights to the neighborhood nodes without complicated matrix operations or relying on understanding the entire graph structure. The framework combines the advantages of the attention mechanism and graph convolutional neural network. It can classify web services through automatic feature extraction. The comprehensive experimental results on a real dataset not only show the superior performance of the proposed model over the existing models but also demonstrate its potentially good interpretability for graph analysis.

Keywords: attention mechanism, graph convolutional network, interpretability, service classification, service discovery

Procedia PDF Downloads 138
3709 Challenges and Opportunities for Implementing Integrated Project Delivery Method in Public Sector Construction

Authors: Ahsan Ahmed, Ming Lu, Syed Zaidi, Farhan Khan

Abstract:

The Integrated Project Delivery (IPD) method has been proposed as the solution to tackle complexity and fragmentation in the real world while addressing the construction industry’s growing needs for productivity and sustainability. Although the private sector has taken the initiative in implementing IPD and taken advantage of new technology such as building information modeling (BIM) in delivering projects, IPD remains less known and rarely used in public sector construction. The focus of this paper is set on the use of IPD in projects in public sector, which is potentially complemented by the use of analytical functionalities for workface planning and construction oriented design enabled by recent research advances in BIM. Experiences and lessons learned from implementing IPD in the private sector and in BIM-based construction automation research would play a vital role in reducing barriers and eliminating issues in connection with project delivery in the public sector. The paper elaborates issues challenges, contractual relationships and the interactions throughout the planning, design and construction phases in the context of implementing IPD on construction projects in the public sector. A slab construction case is used as a ‘sandbox’ model to elaborate (1) the ideal way of communication, integration, and collaboration among all the parties involved in project delivery in planning and (2) the execution of projects by using IDP principles and optimization, simulation analyses.

Keywords: integrated project delivery, IPD, building information modeling, BIM

Procedia PDF Downloads 204
3708 A Qualitative Study to Explore the Social Perception and Stigma around Disability, and Its Impact on the Caring Experiences of Mothers of Children with Physical Disability in Bangladesh

Authors: Farjina Malek, Julie King, Niki Edwards

Abstract:

Across the globe more than a billion people live with a disability and a further billion people, mostly carers, are indirectly impacted. While prevalence data is problematic, it is estimated that more than 15% of the population in Bangladesh live with a disability. Disability service infrastructure in Bangladesh is under-developed; and consequently, the onus of care falls on family, especially on mothers. Within the caring role, mothers encounter many challenging experiences which are not only due to the lack of support delivered through the Bangladeshi health care system but also related to the existence of stigma and perception around disability in the Bangladeshi society. Within this perception, the causes of disability are mostly associated with 'God’s will'; 'possession of ghosts on the disabled person'; and 'karma or the result of past sins of the family members especially the mothers'. These beliefs are likely to have a significant impact on the well-being of mothers and their caring experience of children with disability. This is an ongoing qualitative study which is conducting in-depth interviews with 30 mothers from five districts (Dhaka, Mymensingh, Manikganj, Tangail, and Gazipur) of Bangladesh with the aim to explore the impact of social perception and stigma around physical disability on the caring role of the mothers of children with physical disability. The major findings of this study show that the social perception around disability and the social expectation from a mother regarding her caring role have a huge impact on the well-being of mothers. Mothers are mostly expected to take their child on their lap to prove that they are ‘good mother’. These practices of lifting their children with physical disability and keeping them on the lap for a long time often cause chronic back pain of the mothers. Existing social beliefs consider disability as a ‘curse’ and punishment for the ‘sins’ of the family members, most often by the mother. Mothers are blamed if they give birth to ‘abnormal’ children. This social construction creates stigma, and thus, the caring responsibility of mothers become more challenging. It also encourages the family and mothers to hide their children from the society and to avoid seeking accessible disability services. The mothers also compromise their careers and social interaction as they have to stay with their children at home, and that has a significant impact on personal wellbeing, income, and empowerment of the mothers. The research is informed by intersectional theory and employed an interpretive phenomenological methodology to explore mothers’ experience of caring their children with physical disability, and the contribution and impact of key relationships within the family and the intersection with community and services.

Keywords: mother, family carer, physical disability, children, social stigma, key relationship

Procedia PDF Downloads 245
3707 A Novel Computer-Generated Hologram (CGH) Achieved Scheme Generated from Point Cloud by Using a Lens Array

Authors: Wei-Na Li, Mei-Lan Piao, Nam Kim

Abstract:

We proposed a novel computer-generated hologram (CGH) achieved scheme, wherein the CGH is generated from a point cloud which is transformed by a mapping relationship of a series of elemental images captured from a real three-dimensional (3D) object by using a lens array. This scheme is composed of three procedures: mapping from elemental images to point cloud, hologram generation, and hologram display. A mapping method is figured out to achieve a virtual volume date (point cloud) from a series of elemental images. This mapping method consists of two steps. Firstly, the coordinate (x, y) pairs and its appearing number are calculated from the series of sub-images, which are generated from the elemental images. Secondly, a series of corresponding coordinates (x, y, z) are calculated from the elemental images. Then a hologram is generated from the volume data that is calculated by the previous two steps. Eventually, a spatial light modulator (SLM) and a green laser beam are utilized to display this hologram and reconstruct the original 3D object. In this paper, in order to show a more auto stereoscopic display of a real 3D object, we successfully obtained the actual depth data of every discrete point of the real 3D object, and overcame the inherent drawbacks of the depth camera by obtaining point cloud from the elemental images.

Keywords: elemental image, point cloud, computer-generated hologram (CGH), autostereoscopic display

Procedia PDF Downloads 587
3706 A Multimodal Dialogue Management System for Achieving Natural Interaction with Embodied Conversational Agents

Authors: Ozge Nilay Yalcin

Abstract:

Dialogue has been proposed to be the natural basis for the human-computer interaction, which is behaviorally rich and includes different modalities such as gestures, posture changes, gaze, para-linguistic parameters and linguistic context. However, equipping the system with these capabilities might have consequences on the usability of the system. One issue is to be able to find a good balance between rich behavior and fluent behavior, as planning and generating these behaviors is computationally expensive. In this work, we propose a multi-modal dialogue management system that automates the conversational flow from text-based dialogue examples and uses synchronized verbal and non-verbal conversational cues to achieve a fluent interaction. Our system is integrated with Smartbody behavior realizer to provide real-time interaction with embodied agent. The nonverbal behaviors are used according to turn-taking behavior, emotions, and personality of the user and linguistic analysis of the dialogue. The verbal behaviors are responsive to the emotional value of the utterance and the feedback from the user. Our system is aimed for online planning of these affective multi-modal components, in order to achieve enhanced user experience with richer and more natural interaction.

Keywords: affect, embodied conversational agents, human-agent interaction, multimodal interaction, natural interfaces

Procedia PDF Downloads 179
3705 Prospective Future of Frame Fire Tests

Authors: Chung-Hao Wu, Tung-Dju Lin, Ming-Chin Ho, Minehiro Nishiyama

Abstract:

This paper discusses reported fire tests of concrete beams and columns, future fire tests of beam/column frames, and an innovative concept for designing a beam/column furnace. The proposed furnace could be designed to maximize the efficiency of fire test procedures and minimize the cost of furnace construction and fuel consumption. ASTM E119 and ISO 834 standards were drafted based on prescriptive codes and have several weaknesses. The first involves a provision allowing the support regions of a test element to be protected from fire exposure. The second deals with the L/30 deflection end point instead of the structural end point (collapse) in order to protect the hydraulic rams from fire damage. Furthermore, designers commonly use the measured fire endurances of interior columns to assess fire ratings of edge and corner columns of the same building. The validity of such an engineering practice is theoretically unsound. Performance-Based Codes (PBC) require verification tests of structural frames including the beam/column joints to overcome these weaknesses but allow the use of element test data as reference only. In the last 30 years, PBC have gained global popularity because the innovative design and flexibility in achieving an ultimate performance goal.

Keywords: fire resistance, concrete structure, beam/column frame, fire tests

Procedia PDF Downloads 332
3704 Enhancing Residential Architecture through Generative Design: Balancing Aesthetics, Legal Constraints, and Environmental Considerations

Authors: Milena Nanova, Radul Shishkov, Damyan Damov, Martin Georgiev

Abstract:

This research paper presents an in-depth exploration of the use of generative design in urban residential architecture, with a dual focus on aligning aesthetic values with legal and environmental constraints. The study aims to demonstrate how generative design methodologies can innovate residential building designs that are not only legally compliant and environmentally conscious but also aesthetically compelling. At the core of our research is a specially developed generative design framework tailored for urban residential settings. This framework employs computational algorithms to produce diverse design solutions, meticulously balancing aesthetic appeal with practical considerations. By integrating site-specific features, urban legal restrictions, and environmental factors, our approach generates designs that resonate with the unique character of urban landscapes while adhering to regulatory frameworks. The paper places emphasis on algorithmic implementation of the logical constraint and intricacies in residential architecture by exploring the potential of generative design to create visually engaging and contextually harmonious structures. This exploration also contains an analysis of how these designs align with legal building parameters, showcasing the potential for creative solutions within the confines of urban building regulations. Concurrently, our methodology integrates functional, economic, and environmental factors. We investigate how generative design can be utilized to optimize buildings' performance, considering them, aiming to achieve a symbiotic relationship between the built environment and its natural surroundings. Through a blend of theoretical research and practical case studies, this research highlights the multifaceted capabilities of generative design and demonstrates practical applications of our framework. Our findings illustrate the rich possibilities that arise from an algorithmic design approach in the context of a vibrant urban landscape. This study contributes an alternative perspective to residential architecture, suggesting that the future of urban development lies in embracing the complex interplay between computational design innovation, regulatory adherence, and environmental responsibility.

Keywords: generative design, computational design, parametric design, algorithmic modeling

Procedia PDF Downloads 70
3703 TomoTherapy® System Repositioning Accuracy According to Treatment Localization

Authors: Veronica Sorgato, Jeremy Belhassen, Philippe Chartier, Roddy Sihanath, Nicolas Docquiere, Jean-Yves Giraud

Abstract:

We analyzed the image-guided radiotherapy method used by the TomoTherapy® System (Accuray Corp.) for patient repositioning in clinical routine. The TomoTherapy® System computes X, Y, Z and roll displacements to match the reference CT, on which the dosimetry has been performed, with the pre-treatment MV CT. The accuracy of the repositioning method has been studied according to the treatment localization. For this, a database of 18774 treatment sessions, performed during 2 consecutive years (2016-2017 period) has been used. The database includes the X, Y, Z and roll displacements proposed by TomoTherapy® System as well as the manual correction of these proposals applied by the radiation therapist. This manual correction aims to further improve the repositioning based on the clinical situation and depends on the structures surrounding the target tumor tissue. The statistical analysis performed on the database aims to define repositioning limits to be used as security and guiding tool for the manual adjustment implemented by the radiation therapist. This tool will participate not only to notify potential repositioning errors but also to further improve patient positioning for optimal treatment.

Keywords: accuracy, IGRT MVCT, image-guided radiotherapy megavoltage computed tomography, statistical analysis, tomotherapy, localization

Procedia PDF Downloads 229
3702 A Selection Approach: Discriminative Model for Nominal Attributes-Based Distance Measures

Authors: Fang Gong

Abstract:

Distance measures are an indispensable part of many instance-based learning (IBL) and machine learning (ML) algorithms. The value difference metrics (VDM) and inverted specific-class distance measure (ISCDM) are among the top-performing distance measures that address nominal attributes. VDM performs well in some domains owing to its simplicity and poorly in others that exist missing value and non-class attribute noise. ISCDM, however, typically works better than VDM on such domains. To maximize their advantages and avoid disadvantages, in this paper, a selection approach: a discriminative model for nominal attributes-based distance measures is proposed. More concretely, VDM and ISCDM are built independently on a training dataset at the training stage, and the most credible one is recorded for each training instance. At the test stage, its nearest neighbor for each test instance is primarily found by any of VDM and ISCDM and then chooses the most reliable model of its nearest neighbor to predict its class label. It is simply denoted as a discriminative distance measure (DDM). Experiments are conducted on the 34 University of California at Irvine (UCI) machine learning repository datasets, and it shows DDM retains the interpretability and simplicity of VDM and ISCDM but significantly outperforms the original VDM and ISCDM and other state-of-the-art competitors in terms of accuracy.

Keywords: distance measure, discriminative model, nominal attributes, nearest neighbor

Procedia PDF Downloads 117
3701 Comparison of Microbiological Assessment of Non-adhesive Use and the Use of Adhesive on Complete Dentures

Authors: Hyvee Gean Cabuso, Arvin Taruc, Danielle Villanueva, Channela Anais Hipolito, Jia Bianca Alfonso

Abstract:

Introduction: Denture adhesive aids to provide additional retention, support and comfort for patients with loose dentures, as well as for patients who seek to achieve optimal denture adhesion. But due to its growing popularity, arising oral health issues should be considered, including its possible impact that may alter the microbiological condition of the denture. Changes as such may further resolve to denture-related oral diseases that can affect the day-to-day lives of patients. Purpose: The study aims to assess and compare the microbiological status of dentures without adhesives versus dentures when adhesives were applied. The study also intends to identify the presence of specific microorganisms, their colony concentration and their possible effects on the oral microflora. This study also aims to educate subjects by introducing an alternative denture cleaning method as well as denture and oral health care. Methodology: Edentulous subjects age 50-80 years old, both physically and medically fit, were selected to participate. Before obtaining samples for the study, the alternative cleaning method was introduced by demonstrating a step-by-step cleaning process. Samples were obtained by swabbing the intaglio surface of their upper and lower prosthesis. These swabs were placed in a thioglycollate broth, which served as a transport and enrichment medium. The swabs were then processed through bacterial culture. The colony-forming units (CFUs) were calculated on MacConkey Agar Plate (MAP) and Blood Agar Plate (BAP) in order to identify and assess the microbiological status, including species identification and microbial counting. Result: Upon evaluation and analysis of collected data, the microbiological assessment of the upper dentures with adhesives showed little to no difference compared to dentures without adhesives, but for the lower dentures, (P=0.005), which is less than α = 0.05; therefore, the researchers reject (Ho) and that there is a significant difference between the mean ranks of the lower denture without adhesive to those with, implying that there is a significant decrease in the bacterial count. Conclusion: These results findings may implicate the possibility that the addition of denture adhesives may contribute to the significant decrease of microbial colonization on the dentures.

Keywords: denture, denture adhesive, denture-related, microbiological assessment

Procedia PDF Downloads 132
3700 Assignment of Legal Personality to Robots: A Premature Meditation

Authors: Solomon Okorley

Abstract:

With the emergence of artificial intelligence, a proposition that has been made with increasing conviction is the need to assign legal personhood to robots. A major problem that arises when dealing with robots is the issue of liability: who do it hold liable when a robot causes harm? The suggestion to assign legal personality to robots has been made to aid in the assignment of liability. This paper contends that it is premature to assign legal personhood to robots. The paper employed the doctrinal and comparative research methodology. The paper first discusses the various theories that underpin the granting of legal personhood to juridical personalities to ascertain whether these theories can aid in the proposition to assign legal personhood to robots. These theories include fiction theory, aggregate theory, realist theory, and organism theory. Except for the aggregate theory, the fiction theory, the realist theory and the organism theory provide a good foundation to the proposal for legal personhood to be assigned to robots. The paper considers whether robots should be assigned legal personhood from a jurisprudential approach. The legal positivists assert that no metaphysical presuppositions are needed to determine who could be a legal person: the sole deciding factor is the engagement in legal relations and this prerequisite could be fulfilled by robots. However, rationalists, religionists and naturalists assert that the satisfaction of the metaphysical criteria is the basis of legal personality and since robots do not possess this feature, they cannot be assigned legal personhood. This differing perspective shows that the jurisprudential school of thought to which one belongs influences the decision whether to assign legal personhood to robots. The paper makes arguments for and against the assigning of legal personhood to robots. Assigning legal personhood to robots is necessary for the assigning of liability; and since robots are independent in their operation, they should be assigned legal personhood. However, it is argued that the degree of autonomy is insufficient. Robots do not understand legal obligations; they do not have a will of their own and the purported autonomy that they possess is an ‘imputed autonomy’. A crucial question to be asked is ‘whether it is desirable to confer legal personhood on robots’ and not ‘whether legal personhood should be assigned to robots’. This is due to the subjective nature of the responses to such a question as well as the peculiarities of countries in response to this question. The main argument in support of assigning legal personhood to robots is to aid in assigning liability. However, it is argued conferring legal personhood on robots is not the only way to deal with liability issues. Since any of the stakeholders involved with the robot system can be held liable for an accident, it is not desirable to assign legal personhood to robot. It is forecasted that in the epoch of strong artificial intelligence, granting robots legal personhood is plausible; however, in the current era, it is premature.

Keywords: autonomy, legal personhood, premature, jurisprudential

Procedia PDF Downloads 73
3699 Characterization of the Physicochemical Properties of Raw and Calcined Kaolinitic Clays Using Analytical Techniques

Authors: Alireza Khaloo, Asghar Gholizadeh-Vayghan

Abstract:

The present work focuses on the characterization of the physicochemical properties of kaolinitic clays in both raw and calcined (i.e., dehydroxylated) states. The properties investigated included the dehydroxylation temperature, chemical composition and crystalline phases, band types, kaolinite content, vitreous phase, and reactive and unreactive silica and alumina. The thermogravimetric analysis, X-ray diffractometry and infrared spectroscopy results suggest that full dehydroxylation takes place at 639°C, converting kaolinite to reactive metakaolinite (Si₂Al₂O₇). Application of higher temperatures up to 800 °C leads to complete decarbonation of the calcite phase, and the kaolinite converts to mullite at temperatures exceeding 957 °C. Calcination at 639°C was found to cause a 50% increase in the vitreous content of kaolin. Statistically meaningful increases in the reactivity of silica, alumina, calcite and sodium carbonate in kaolin were detected as a result of such thermal treatment. Such increases were found to be 11%, 47%, 240% and 10%, respectively. The ferrite phase, however, showed a 36% decline in reactivity. The proposed approach can be used as an analytical method to determine the viability of the source of kaolinite and proper physical and chemical modifications needed to enhance its suitability for geopolymer production.

Keywords: physicochemical properties, dehydroxylation, kaolinitic clays, kaolinite content, vitreous phase, reactivity

Procedia PDF Downloads 165
3698 Rural-Urban Drift: Labour Migration, Health-Seeking Behaviour Disparity in the Urban Slum of Madina, Ghana

Authors: Ransford Kwaku Afeadie

Abstract:

Purpose – The health challenges that characterises most of the migrants’ urban slums raise a lot of concern for their well-being. Health-seeking behaviour becomes an important step towards maintaining a healthy life. The importance of contextual issues is necessary to help meet specific community health needs and programmes. Therefore, this study aims to bridge the knowledge gap by investigating health-seeking behaviour disparity among rural-urban labour migrant slum dwellers before and after migration to the urban slums of Madina in the Greater Accra Region, Ghana. Design/methodology/approach – The author used explanatory sequential approach of research investigation. Questionnaire and interview guides were used to collect data from the respondents; however, in the absence of an existing reliable sampling frame, the various communities were selected by the use of cluster sampling proportional to size. At the second stage, a simple random sampling was used to select the various household heads. A total of 241 questionnaires were retrieved from the respondents representing a response rate of 100%. The author used the purposive sampling technique to conduct eight in-depth interviews and six key informants’ interviews. Findings – The author found various discrepancies in many of the activities that could fulfill substantial health-seeking behaviour in the slum as compared to migrant’s places of origin. The reason for coming to the slum amidst many settlements needs and low education background are the factors that accounted for this. This study, therefore, contradicts the proposition held by the health belief model. It is, therefore, important to note that contextual issues are key, in this case, rural-urban migrant slums present a different dynamic that must be taken into account when designing health programmes for such settings. Originality/value – Many, if not all the, studies on health-seeking behaviour have focused on urban slums without taking into account urban migrants’ slums. Such a failure to take into account the variations of the health needs of migrants’ urban slum settings can eventually lead to a mismatch of health programmes meant to address their challenges. Therefore, this study brings to the fore such variations that must be taken into account when designing health programmes. The study also indicates that even with the same people, there were disparities in terms of health-seeking behaviour in the slum and at places of origin.

Keywords: health-seeking behaviour, rural–urban migration, urban slums, health belief model

Procedia PDF Downloads 190
3697 Positivity Rate of Person under Surveillance among Institut Jantung Negara’s Patients with Various Vaccination Statuses in the First Quarter of 2022, Malaysia

Authors: Mohd Izzat Md. Nor, Norfazlina Jaffar, Noor Zaitulakma Md. Zain, Nur Izyanti Mohd Suppian, Subhashini Balakrishnan, Geetha Kandavello

Abstract:

During the Coronavirus (COVID-19) pandemic, Malaysia has been focusing on building herd immunity by introducing vaccination programs into the community. Hospital Standard Operating Procedures (SOP) were developed to prevent inpatient transmission. Objective: In this study, we focus on the positivity rate of inpatient Person Under Surveillance (PUS) becoming COVID-19 positive and compare this to the National rate in order to see the outcomes of the patient who becomes COVID-19 positive in relation to their vaccination status. Methodology: This is a retrospective observational study carried out from 1 January until 30 March 2022 in Institut Jantung Negara (IJN). There were 5,255 patients admitted during the time of this study. Pre-admission Polymerase Chain Reaction (PCR) swab was done for all patients. Patients with positive PCR on pre-admission screening were excluded. The patient who had exposure to COVID-19-positive staff or patients during hospitalization was defined as PUS and were quarantined and monitored for potential COVID-19 infection. Their frequency and risk of exposure (WHO definition) were recorded. A repeat PCR swab was done for PUS patients that have clinical deterioration with or without COVID symptoms and on their last day of quarantine. The severity of COVID-19 infection was defined as category 1-5A. All patients' vaccination status was recorded, and they were divided into three groups: fully immunised, partially immunised, and unvaccinated. We analyzed the positivity rate of PUS patients becoming COVID-positive, outcomes, and correlation with the vaccination status. Result: Total inpatient PUS to patients and staff was 492; only 13 became positive, giving a positivity rate of 2.6%. Eight (62%) had multiple exposures. The majority, 8/13(72.7%), had a high-risk exposure, and the remaining 5 had medium-risk exposure. Four (30.8%) were boostered, 7(53.8%) were fully vaccinated, and 2(15.4%) were partial/unvaccinated. Eight patients were in categories 1-2, whilst 38% were in categories 3-5. Vaccination status did not correlate with COVID-19 Category (P=0.641). One (7.7%) patient died due to COVID-19 complications and sepsis. Conclusion: Within the first quarter of 2022, our institution's positivity rate (2.6%) is significantly lower than the country's (14.4%). High-risk exposure and multiple exposures to positive COVID-19 cases increased the risk of PUS becoming COVID-19 positive despite their underlying vaccination status.

Keywords: COVID-19, boostered, high risk, Malaysia, quarantine, vaccination status

Procedia PDF Downloads 90
3696 A Risk-Based Comprehensive Framework for the Assessment of the Security of Multi-Modal Transport Systems

Authors: Mireille Elhajj, Washington Ochieng, Deeph Chana

Abstract:

The challenges of the rapid growth in the demand for transport has traditionally been seen within the context of the problems of congestion, air quality, climate change, safety, and affordability. However, there are increasing threats including those related to crime such as cyber-attacks that threaten the security of the transport of people and goods. To the best of the authors’ knowledge, this paper presents for the first time, a comprehensive framework for the assessment of the current and future security issues of multi-modal transport systems. The approach or method proposed is based on a structured framework starting with a detailed specification of the transport asset map (transport system architecture), followed by the identification of vulnerabilities. The asset map and vulnerabilities are used to identify the various approaches for exploitation of the vulnerabilities, leading to the creation of a set of threat scenarios. The threat scenarios are then transformed into risks and their categories, and include insights for their mitigation. The consideration of the mitigation space is holistic and includes the formulation of appropriate policies and tactics and/or technical interventions. The quality of the framework is ensured through a structured and logical process that identifies the stakeholders, reviews the relevant documents including policies and identifies gaps, incorporates targeted surveys to augment the reviews, and uses subject matter experts for validation. The approach to categorising security risks is an extension of the current methods that are typically employed. Specifically, the partitioning of risks into either physical or cyber categories is too limited for developing mitigation policies and tactics/interventions for transport systems where an interplay between physical and cyber processes is very often the norm. This interplay is rapidly taking on increasing significance for security as the emergence of cyber-physical technologies, are shaping the future of all transport modes. Examples include: Connected Autonomous Vehicles (CAVs) in road transport; the European Rail Traffic Management System (ERTMS) in rail transport; Automatic Identification System (AIS) in maritime transport; advanced Communications, Navigation and Surveillance (CNS) technologies in air transport; and the Internet of Things (IoT). The framework adopts a risk categorisation scheme that considers risks as falling within the following threat→impact relationships: Physical→Physical, Cyber→Cyber, Cyber→Physical, and Physical→Cyber). Thus the framework enables a more complete risk picture to be developed for today’s transport systems and, more importantly, is readily extendable to account for emerging trends in the sector that will define future transport systems. The framework facilitates the audit and retro-fitting of mitigations in current transport operations and the analysis of security management options for the next generation of Transport enabling strategic aspirations such as systems with security-by-design and co-design of safety and security to be achieved. An initial application of the framework to transport systems has shown that intra-modal consideration of security measures is sub-optimal and that a holistic and multi-modal approach that also addresses the intersections/transition points of such networks is required as their vulnerability is high. This is in-line with traveler-centric transport service provision, widely accepted as the future of mobility services. In summary, a risk-based framework is proposed for use by the stakeholders to comprehensively and holistically assess the security of transport systems. It requires a detailed understanding of the transport architecture to enable a detailed vulnerabilities analysis to be undertaken, creates threat scenarios and transforms them into risks which form the basis for the formulation of interventions.

Keywords: mitigations, risk, transport, security, vulnerabilities

Procedia PDF Downloads 166
3695 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6

Authors: M. Moslehpour, S. Khorsandi

Abstract:

Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.

Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing

Procedia PDF Downloads 280
3694 Silver-Curcumin Nanoparticle Eradicate Enterococcus faecalis in Human ex vivo Dentine Model

Authors: M. Gowri, E. K. Girija, V. Ganesh

Abstract:

Background and Significance: Among the dental infections, inflammation and infection of the root canal are common among all age groups. Currently, the management of root canal infections involves cleaning the canal with powerful irrigants followed by intracanal medicament application. Though these treatments have been in vogue for a long time, root canal failures do occur. Treatment for root canal infections is limited due to the anatomical complexity in terms of small micrometer volumes and poor penetration of drugs. Thus, infections of the root canal seem to be a challenge that demands development of new agents that can eradicate E. faecalis. Methodology: In the present study, we synthesized and screened silver-curcumin nanoparticle against E. faecalis. Morphological cell damage and antibiofilm activity of silver-curcumin nanoparticle on E. faecalis was studied using scanning electron microscopy (SEM). Biochemical evidence for membrane damage was studied using flow cytometry. Further, the antifungal activity of silver-curcumin nanoparticle was evaluated in an ex vivo dentinal tubule infection model. Results: Screening data showed that silver-curcumin nanoparticle was active against E. faecalis. silver-curcumin nanoparticle exerted time kill effect. Further, SEM images of E. faecalis showed that silver-curcumin nanoparticle caused membrane damage and inhibited biofilm formation. Biochemical evidence for membrane damage was confirmed by increased propidium iodide (PI) uptake in flow cytometry. Further, the antifungal activity of silver-curcumin nanoparticle was evaluated in an ex vivo dentinal tubule infection model, which mimics human tooth root canal infection. Confocal laser scanning microscopy studies showed eradication of E. faecalis and reduction in colony forming unit (CFU) after 24 h treatment in the infected tooth samples in this model. Further, silver-curcumin nanoparticle was found to be hemocompatible, not cytotoxic to normal mammalian NIH 3T3 cells and non-mutagenic. Conclusion: The results of this study can pave the way for developing new antibacterial agents with well deciphered mechanisms of action and can be a promising antibacterial agent or medicament against root canal infection.

Keywords: ex vivo dentine model, inhibition of biofilm formation, root canal infection, silver-curcumin nanoparticle

Procedia PDF Downloads 191
3693 Comparing and Contrasting Western and Eastern Ways of War: Building a Universal Strategic Theory

Authors: Adam Kok Wey Leong

Abstract:

The comparison between the Western ways of war and Eastern ways of war has raised contemporary debates on the validity of these arguments. The Western way of war is popularly propounded by Victor Davis Hanson as originating from the Greek hoplite tactics, direct military maneuvers, democratic principles and social freedom and cohesion that has continued to yield military success for the Western powers for centuries. On the other hand, the Eastern way of war has been deemed as relying on indirect tactics, deception, and ruses. This often accepted notion of the divide between Western and Eastern style does not sustain in view of the available classical strategic texts from both sides from the same period that has proposed similar principles of warfare. This paper analyses the similarities between classical strategic texts on war from the Eastern perspective namely Sun Tzu’s Art of War with a similar temporal strategic text from the West which is Sextus Iuluis Frontinus’s Stratagematon, and deduces answers to this core research question - Does the hypothesis of the existence of distinctive Western and Eastern ways of warfare stands? The main thesis advanced by this research is that ways of warfare share universal principles, and it transcends cultural and spatial boundaries. Warfare is a human endeavour, and the same moral actions guide humans from different geo-cultural spheres in warfare’s objectives, which are winning over an enemy in the most economical way and serve as a mean to an end.

Keywords: ways of warfare, strategic culture, strategy, Sun Tzu, frontinus

Procedia PDF Downloads 481
3692 Analysis and Design of Offshore Triceratops under Ultra-Deep Waters

Authors: Srinivasan Chandrasekaran, R. Nagavinothini

Abstract:

Offshore platforms for ultra-deep waters are form-dominant by design; hybrid systems with large flexibility in horizontal plane and high rigidity in vertical plane are preferred due to functional complexities. Offshore triceratops is relatively a new-generation offshore platform, whose deck is partially isolated from the supporting buoyant legs by ball joints. They allow transfer of partial displacements of buoyant legs to the deck but restrain transfer of rotational response. Buoyant legs are in turn taut-moored to the sea bed using pre-tension tethers. Present study will discuss detailed dynamic analysis and preliminary design of the chosen geometric, which is necessary as a proof of validation for such design applications. A detailed numeric analysis of triceratops at 2400 m water depth under random waves is presented. Preliminary design confirms member-level design requirements under various modes of failure. Tether configuration, proposed in the study confirms no pull-out of tethers as stress variation is comparatively lesser than the yield value. Presented study shall aid offshore engineers and contractors to understand suitability of triceratops, in terms of design and dynamic response behaviour.

Keywords: offshore structures, triceratops, random waves, buoyant legs, preliminary design, dynamic analysis

Procedia PDF Downloads 208
3691 Development of a Fire Analysis Drone for Smoke Toxicity Measurement for Fire Prediction and Management

Authors: Gabrielle Peck, Ryan Hayes

Abstract:

This research presents the design and creation of a drone gas analyser, aimed at addressing the need for independent data collection and analysis of gas emissions during large-scale fires, particularly wasteland fires. The analyser drone, comprising a lightweight gas analysis system attached to a remote-controlled drone, enables the real-time assessment of smoke toxicity and the monitoring of gases released into the atmosphere during such incidents. The key components of the analyser unit included two gas line inlets connected to glass wool filters, a pump with regulated flow controlled by a mass flow controller, and electrochemical cells for detecting nitrogen oxides, hydrogen cyanide, and oxygen levels. Additionally, a non-dispersive infrared (NDIR) analyser is employed to monitor carbon monoxide (CO), carbon dioxide (CO₂), and hydrocarbon concentrations. Thermocouples can be attached to the analyser to monitor temperature, as well as McCaffrey probes combined with pressure transducers to monitor air velocity and wind direction. These additions allow for monitoring of the large fire and can be used for predictions of fire spread. The innovative system not only provides crucial data for assessing smoke toxicity but also contributes to fire prediction and management. The remote-controlled drone's mobility allows for safe and efficient data collection in proximity to the fire source, reducing the need for human exposure to hazardous conditions. The data obtained from the gas analyser unit facilitates informed decision-making by emergency responders, aiding in the protection of both human health and the environment. This abstract highlights the successful development of a drone gas analyser, illustrating its potential for enhancing smoke toxicity analysis and fire prediction capabilities. The integration of this technology into fire management strategies offers a promising solution for addressing the challenges associated with wildfires and other large-scale fire incidents. The project's methodology and results contribute to the growing body of knowledge in the field of environmental monitoring and safety, emphasizing the practical utility of drones for critical applications.

Keywords: fire prediction, drone, smoke toxicity, analyser, fire management

Procedia PDF Downloads 91
3690 Observation on Microbiological Profile of Type2 Diabetic Foot Ulcer and Its Antimicrobial Sensitivity Pattern in a Tertiary Care Hospital in Eastern India

Authors: Pampita Chakraborty, Sukumar Mukherjee

Abstract:

Diabetes Mellitus (DM) is commonly encountered metabolic disorder in clinical practice. An estimated 25 percent of DM patients develop foot problems. Foot ulceration and infection are one of the major causes of morbidity, hospitalization or even amputation. Objective: To isolate and identify bacterial pathogens in Diabetic Foot Ulcer (DFU) and to observe its antimicrobial sensitivity pattern. Methodology: A prospective study was conducted for a period of 9 months at the Department of Microbiology, GD Hospital & Diabetes Institute, Kolkata. 75 DFU patients were recruited in the study. Specimens for microbiological studies obtained from ulcer base were examined as gram stained smear and was cultured aerobically on Nutrient agar, Blood agar and MacConkey agar plates. Antimicrobial sensitivity test was performed by disc diffusion techniques according to CLSI guidelines. Result: In this study out of 75cases, 73% (55/75) were male and 27% (20/75) were females with mean (SD) age of 51.11(±10) years. Out of 75 pus cultures, 63(84%) showed growth of microorganism making total of 81 bacterial isolates with 71.42% of monomicrobial infection and 28.57% of polymicrobial infection. Out of 81 isolates 53(65.43%) were gram negative and 21(25.92%) were gram positive. E.coli was relatively common isolate 21(26%) followed by Staphylococcus aureus 15(18.5%), Klebsiella pneumonia 14(17.28%), Pseudomonas aeruginosa 12 (14.81%), Proteus spp. 3 (3.70%), and Enterococcus faecalis 6 (7.40%). 75% of Gram-negative microorganism were extended Beta-lactamase enzyme (ESBL) producer and around 20 % of Klebsiella and Proteus spp. were carbapenemase enzyme producer. Among Gram positive, around 50% of S.aureus was MRSA, sensitive only to Vancomycin, Teicoplanin & Linezolid. Conclusion: More prevalence of monomicrobial gram-negative bacteria than gram-positive bacteria in DFU was observed. This study emphasizes that Beta-Lactam group of antibiotics should not be the empirical treatment of choice for Gram-negative isolates; instead alternatives like Carbapenems, Amikacin could be a better option. On the other hand, Vancomycin and Linezolid are preferred for most of the infection with gram-positive aerobes. Continuous surveillance of resistant bacteria is required for empiric therapy.

Keywords: antibiotic resistant, antimicrobial susceptibility, diabetic foot ulcer, surveillance

Procedia PDF Downloads 370
3689 Quantum Cryptography: Classical Cryptography Algorithms’ Vulnerability State as Quantum Computing Advances

Authors: Tydra Preyear, Victor Clincy

Abstract:

Quantum computing presents many computational advantages over classical computing methods due to the utilization of quantum mechanics. The capability of this computing infrastructure poses threats to standard cryptographic systems such as RSA and AES, which are designed for classical computing environments. This paper discusses the impact that quantum computing has on cryptography, while focusing on the evolution from classical cryptographic concepts to quantum and post-quantum cryptographic concepts. Standard Cryptography is essential for securing data by utilizing encryption and decryption methods, and these methods face vulnerability problems due to the advancement of quantum computing. In order to counter these vulnerabilities, the methods that are proposed are quantum cryptography and post-quantum cryptography. Quantum cryptography uses principles such as the uncertainty principle and photon polarization in order to provide secure data transmission. In addition, the concept of Quantum key distribution is introduced to ensure more secure communication channels by distributing cryptographic keys. There is the emergence of post-quantum cryptography which is used for improving cryptographic algorithms in order to be more secure from attacks by classical and quantum computers. Throughout this exploration, the paper mentions the critical role of the advancement of cryptographic methods to keep data integrity and privacy safe from quantum computing concepts. Future research directions that would be discussed would be more effective cryptographic methods through the advancement of technology.

Keywords: quantum computing, quantum cryptography, cryptography, data integrity and privacy

Procedia PDF Downloads 29
3688 Analytical Formulae for the Approach Velocity Head Coefficient

Authors: Abdulrahman Abdulrahman

Abstract:

Critical depth meters, such as abroad crested weir, Venture Flume and combined control flume are standard devices for measuring flow in open channels. The discharge relation for these devices cannot be solved directly, but it needs iteration process to account for the approach velocity head. In this paper, analytical solution was developed to calculate the discharge in a combined critical depth-meter namely, a hump combined with lateral contraction in rectangular channel with subcritical approach flow including energy losses. Also analytical formulae were derived for approach velocity head coefficient for different types of critical depth meters. The solution was derived by solving a standard cubic equation considering energy loss on the base of trigonometric identity. The advantage of this technique is to avoid iteration process adopted in measuring flow by these devices. Numerical examples are chosen for demonstration of the proposed solution.

Keywords: broad crested weir, combined control meter, control structures, critical flow, discharge measurement, flow control, hydraulic engineering, hydraulic structures, open channel flow

Procedia PDF Downloads 277
3687 Investigation of Dry-Blanching and Freezing Methods of Fruits

Authors: Epameinondas Xanthakis, Erik Kaunisto, Alain Le-Bail, Lilia Ahrné

Abstract:

Fruits and vegetables are characterized as perishable food matrices due to their short shelf life as several deterioration mechanisms are being involved. Prior to the common preservation methods like freezing or canning, fruits and vegetables are being blanched in order to inactivate deteriorative enzymes. Both conventional blanching pretreatments and conventional freezing methods hide drawbacks behind their beneficial impacts on the preservation of those matrices. Conventional blanching methods may require longer processing times, leaching of minerals and nutrients due to the contact with the warm water which in turn leads to effluent production with large BOD. An important issue of freezing technologies is the size of the formed ice crystals which is also critical for the final quality of the frozen food as it can cause irreversible damage to the cellular structure and subsequently to degrade the texture and the colour of the product. Herein, the developed microwave blanching methodology and the results regarding quality aspects and enzyme inactivation will be presented. Moreover, heat transfer phenomena, mass balance, temperature distribution, and enzyme inactivation (such as Pectin Methyl Esterase and Ascorbic Acid Oxidase) of our microwave blanching approach will be evaluated based on measurements and computer modelling. The present work is part of the COLDμWAVE project which aims to the development of an innovative environmentally sustainable process for blanching and freezing of fruits and vegetables with improved textural and nutritional quality. In this context, COLDµWAVE will develop tailored equipment for MW blanching of vegetables that has very high energy efficiency and no water consumption. Furthermore, the next steps of this project regarding the development of innovative pathways in MW assisted freezing to improve the quality of frozen vegetables, by exploring in depth previous results acquired by the authors, will be presented. The application of MW assisted freezing process on fruits and vegetables it is expected to lead to improved quality characteristics compared to the conventional freezing. Acknowledgments: COLDμWAVE has received funding from the European Union’s Horizon 2020 research and innovation programme under the Marie Sklodowska-Curie grand agreement No 660067.

Keywords: blanching, freezing, fruits, microwave blanching, microwave

Procedia PDF Downloads 268
3686 The Modulation of Self-interest Instruction on the Fair-Proposing Behavior in Ultimatum Game

Authors: N. S. Yen, T. H. Yang, W. H. Huang, Y. F. Fang, H. W. Cho

Abstract:

Ultimatum game is an experimental paradigm to study human decision making. There are two players, a proposer and a responder, to split a fixed amount of money. According to the traditional economic theory on ultimatum game, proposer should propose the selfish offers to responder as much as possible to maximize proposer’s own outcomes. However, most evidences had showed that people chose more fair offers, hence two hypotheses – fairness favoring and strategic concern were proposed. In current study, we induced the motivation in participants to be either selfish or altruistic, and manipulated the task variables, the stake sizes (NT$100, 1000, 10000) and the share sizes (the 40%, 30%, 20%, 10% of the sum as selfish offers, and the 60%, 70%, 80%, 90% of the sum as altruistic offers), to examine the two hypotheses. The results showed that most proposers chose more fair offers with longer reaction times (RTs) no matter in choosing between the fair and selfish offers, or between the fair and altruistic offers. However, the proposers received explicit self-interest instruction chose more selfish offers accompanied with longer RTs in choosing between the fair and selfish offers. Therefore, the results supported the strategic concern hypothesis that previous proposers choosing the fair offers might be resulted from the fear of rejection by responders. Proposers would become more self-interest if the fear of being rejected is eliminated.

Keywords: ultimatum game, proposer, self-interest, fear of rejection

Procedia PDF Downloads 377
3685 Research of Control System for Space Intelligent Robot Based on Vision Servo

Authors: Changchun Liang, Xiaodong Zhang, Xin Liu, Pengfei Sun

Abstract:

Space intelligent robotic systems are expected to play an increasingly important role in the future. The robotic on-orbital service, whose key is the tracking and capturing technology, becomes research hot in recent years. In this paper, the authors propose a vision servo control system for target capturing. Robotic manipulator will be an intelligent robotic system with large-scale movement, functional agility, and autonomous ability, and it can be operated by astronauts in the space station or be controlled by the ground operator in the remote operation mode. To realize the autonomous movement and capture mission of SRM, a kind of autonomous programming strategy based on multi-camera vision fusion is designed and the selection principle of object visual position and orientation measurement information is defined for the better precision. Distributed control system hierarchy is designed and reliability is considering to guarantee the abilities of control system. At last, a ground experiment system is set up based on the concept of robotic control system. With that, the autonomous target capturing experiments are conducted. The experiment results validate the proposed algorithm, and demonstrates that the control system can fulfill the needs of function, real-time and reliability.

Keywords: control system, on-orbital service, space robot, vision servo

Procedia PDF Downloads 421
3684 DFIG-Based Wind Turbine with Shunt Active Power Filter Controlled by Double Nonlinear Predictive Controller

Authors: Abderrahmane El Kachani, El Mahjoub Chakir, Anass Ait Laachir, Abdelhamid Niaaniaa, Jamal Zerouaoui, Tarik Jarou

Abstract:

This paper presents a wind turbine based on the doubly fed induction generator (DFIG) connected to the utility grid through a shunt active power filter (SAPF). The whole system is controlled by a double nonlinear predictive controller (DNPC). A Taylor series expansion is used to predict the outputs of the system. The control law is calculated by optimization of the cost function. The first nonlinear predictive controller (NPC) is designed to ensure the high performance tracking of the rotor speed and regulate the rotor current of the DFIG, while the second one is designed to control the SAPF in order to compensate the harmonic produces by the three-phase diode bridge supplied by a passive circuit (rd, Ld). As a result, we obtain sinusoidal waveforms of the stator voltage and stator current. The proposed nonlinear predictive controllers (NPCs) are validated via simulation on a 1.5 MW DFIG-based wind turbine connected to an SAPF. The results obtained appear to be satisfactory and promising.

Keywords: wind power, doubly fed induction generator, shunt active power filter, double nonlinear predictive controller

Procedia PDF Downloads 419
3683 Surface Pressure Distribution of a Flapped-Airfoil for Different Momentum Injection at the Leading Edge

Authors: Mohammad Mashud, S. M. Nahid Hasan

Abstract:

The aim of the research work is to modify the NACA 4215 airfoil with flap and rotary cylinder at the leading edge of the airfoil and experimentally study the static pressure distribution over the airfoil completed with flap and leading-edge vortex generator. In this research, NACA 4215 wing model has been constructed by generating the profile geometry using the standard equations and design software such as AutoCAD and SolidWorks. To perform the experiment, three wooden models are prepared and tested in subsonic wind tunnel. The experiments were carried out in various angles of attack. Flap angle and momentum injection rate are changed to observe the characteristics of pressure distribution. In this research, a new concept of flow separation control mechanism has been introduced to improve the aerodynamic characteristics of airfoil. Control of flow separation over airfoil which experiences a vortex generator (rotating cylinder) at the leading edge of airfoil is experimentally simulated under the effects of momentum injection. The experimental results show that the flow separation control is possible by the proposed mechanism, and benefits can be achieved by momentum injection technique. The wing performance is significantly improved due to control of flow separation by momentum injection method.

Keywords: airfoil, momentum injection, flap, pressure distribution

Procedia PDF Downloads 142
3682 Comparison of Breast Surface Doses for Full-Field Digital Mammography and Digital Breast Tomosynthesis Using Breast Phantoms

Authors: Chia-Hui Chen, Chien-Kuo Wang

Abstract:

Background: Full field digital mammography (FFDM) is widely used in diagnosis of breast cancer. Digital breast tomosynthesis (DBT) has recently been introduced into the clinic and is being used for screening for breast cancer in the general population. Hence, the radiation dose delivered to the patients involved in an imaging protocol is of utmost concern. Aim: To compare the surface radiation dose (ESD) of digital breast tomosynthesis (DBT) and full-field digital mammography (FFDM) by using breast phantoms. Method: We analyzed the average entrance surface dose (ESD) of FFDM and DBT by using breast phantoms. Optically Stimulated luminescent Dosimeters (OSLD) were placed in a tissue-equivalent Breast phantom at difference sites of interest. Absorbed dose measurements were obtained after digital breast tomosynthesis (DBT) and full-field digital mammography (FFDM) exposures. Results: An automatic exposure control (AEC) is proposed for surface dose measurement during DBT and FFDM. The mean ESD values for DBT and FFDM were 6.37 mGy and 3.51mGy, respectively. Using of OSLD measured for surface dose during DBT and FFDM. There were 19.87 mGy and 11.36 mGy, respectively. The surface exposure dose of DBT could possibly be increased by two times with FFDM. Conclusion: The radiation dose from DBT was higher than that of FFDM and the difference in dose between AEC and OSLD measurements at phantom surface.

Keywords: full-field digital mammography, digital breast tomosynthesis, optically stimulated luminescent dosimeters, surface dose

Procedia PDF Downloads 423