Search results for: Acute heart attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2666

Search results for: Acute heart attacks

1586 Study of Oxidative Processes in Blood Serum in Patients with Arterial Hypertension

Authors: Laura M. Hovsepyan, Gayane S. Ghazaryan, Hasmik V. Zanginyan

Abstract:

Hypertension (HD) is the most common cardiovascular pathology that causes disability and mortality in the working population. Most often, heart failure (HF), which is based on myocardial remodeling, leads to death in hypertension. Recently, endothelial dysfunction (EDF) or a violation of the functional state of the vascular endothelium has been assigned a significant role in the structural changes in the myocardium and the occurrence of heart failure in patients with hypertension. It has now been established that tissues affected by inflammation form increased amounts of superoxide radical and NO, which play a significant role in the development and pathogenesis of various pathologies. They mediate inflammation, modify proteins and damage nucleic acids. The aim of this work was to study the processes of oxidative modification of proteins (OMP) and the production of nitric oxide in hypertension. In the experimental work, the blood of 30 donors and 33 patients with hypertension was used. For the quantitative determination of OMP products, the based on the reaction of the interaction of oxidized amino acid residues of proteins and 2,4-dinitrophenylhydrazine (DNPH) with the formation of 2,4-dinitrophenylhydrazones, the amount of which was determined spectrophotometrically. The optical density of the formed carbonyl derivatives of dinitrophenylhydrazones was recorded at different wavelengths: 356 nm - aliphatic ketone dinitrophenylhydrazones (KDNPH) of neutral character; 370 nm - aliphatic aldehyde dinirophenylhydrazones (ADNPH) of neutral character; 430 nm - aliphatic KDNFG of the main character; 530 nm - basic aliphatic ADNPH. Nitric oxide was determined by photometry using Grace's solution. Adsorption was measured on a Thermo Scientific Evolution 201 SF at a wavelength of 546 nm. Thus, the results of the studies showed that in patients with arterial hypertension, an increased level of nitric oxide in the blood serum is observed, and there is also a tendency to an increase in the intensity of oxidative modification of proteins at a wavelength of 270 nm and 363 nm, which indicates a statistically significant increase in aliphatic aldehyde and ketone dinitrophenylhydrazones. The increase in the intensity of oxidative modification of blood plasma proteins in the studied patients, revealed by us, actually reflects the general direction of free radical processes and, in particular, the oxidation of proteins throughout the body. A decrease in the activity of the antioxidant system also leads to a violation of protein metabolism. The most important consequence of the oxidative modification of proteins is the inactivation of enzymes.

Keywords: hypertension (HD), oxidative modification of proteins (OMP), nitric oxide (NO), oxidative stress

Procedia PDF Downloads 107
1585 Comparison of Two Strategies in Thoracoscopic Ablation of Atrial Fibrillation

Authors: Alexander Zotov, Ilkin Osmanov, Emil Sakharov, Oleg Shelest, Aleksander Troitskiy, Robert Khabazov

Abstract:

Objective: Thoracoscopic surgical ablation of atrial fibrillation (AF) includes two technologies in performing of operation. 1st strategy used is the AtriCure device (bipolar, nonirrigated, non clamping), 2nd strategy is- the Medtronic device (bipolar, irrigated, clamping). The study presents a comparative analysis of clinical outcomes of two strategies in thoracoscopic ablation of AF using AtriCure vs. Medtronic devices. Methods: In 2 center study, 123 patients underwent thoracoscopic ablation of AF for the period from 2016 to 2020. Patients were divided into two groups. The first group is represented by patients who applied the AtriCure device (N=63), and the second group is - the Medtronic device (N=60), respectively. Patients were comparable in age, gender, and initial severity of the condition. Among the patients, in group 1 were 65% males with a median age of 57 years, while in group 2 – 75% and 60 years, respectively. Group 1 included patients with paroxysmal form -14,3%, persistent form - 68,3%, long-standing persistent form – 17,5%, group 2 – 13,3%, 13,3% and 73,3% respectively. Median ejection fraction and indexed left atrial volume amounted in group 1 – 63% and 40,6 ml/m2, in group 2 - 56% and 40,5 ml/m2. In addition, group 1 consisted of 39,7% patients with chronic heart failure (NYHA Class II) and 4,8% with chronic heart failure (NYHA Class III), when in group 2 – 45% and 6,7%, respectively. Follow-up consisted of laboratory tests, chest Х-ray, ECG, 24-hour Holter monitor, and cardiopulmonary exercise test. Duration of freedom from AF, distant mortality rate, and prevalence of cerebrovascular events were compared between the two groups. Results: Exit block was achieved in all patients. According to the Clavien-Dindo classification of surgical complications fraction of adverse events was 14,3% and 16,7% (1st group and 2nd group, respectively). Mean follow-up period in the 1st group was 50,4 (31,8; 64,8) months, in 2nd group - 30,5 (14,1; 37,5) months (P=0,0001). In group 1 - total freedom of AF was in 73,3% of patients, among which 25% had additional antiarrhythmic drugs (AADs) therapy or catheter ablation (CA), in group 2 – 90% and 18,3%, respectively (for total freedom of AF P<0,02). At follow-up, the distant mortality rate in the 1st group was – 4,8%, and in the 2nd – no fatal events. Prevalence of cerebrovascular events was higher in the 1st group than in the 2nd (6,7% vs. 1,7% respectively). Conclusions: Despite the relatively shorter follow-up of the 2nd group in the study, applying the strategy using the Medtronic device showed quite encouraging results. Further research is needed to evaluate the effectiveness of this strategy in the long-term period.

Keywords: atrial fibrillation, clamping, ablation, thoracoscopic surgery

Procedia PDF Downloads 109
1584 Survey on Securing the Optimized Link State Routing (OLSR) Protocol in Mobile Ad-hoc Network

Authors: Kimaya Subhash Gaikwad, S. B. Waykar

Abstract:

The mobile ad-hoc network (MANET) is collection of various types of nodes. In MANET various protocols are used for communication. In OLSR protocol, a node is selected as multipoint relay (MPR) node which broadcast the messages. As the MANET is open kind of network any malicious node can easily enter into the network and affect the performance of the network. The performance of network mainly depends on the components which are taking part into the communication. If the proper nodes are not selected for the communication then the probability of network being attacked is more. Therefore, it is important to select the more reliable and secure components in the network. MANET does not have any filtering so that only selected nodes can be used for communication. The openness of the MANET makes it easier to attack the communication. The most of the attack are on the Quality of service (QoS) of the network. This paper gives the overview of the various attacks that are possible on OLSR protocol and some solutions. The papers focus mainly on the OLSR protocol.

Keywords: communication, MANET, OLSR, QoS

Procedia PDF Downloads 449
1583 Evaluating Gallein Dye as a Beryllium Indicator

Authors: Elise M. Shauf

Abstract:

Beryllium can be found naturally in some fruits and vegetables (carrots, garden peas, kidney beans, pears) at very low concentrations, but is typically not clinically significant due to the low-level exposure and limited absorption of beryllium by the stomach and intestines. However, acute or chronic beryllium exposure can result in harmful toxic and carcinogenic biological effects. Beryllium can be both a workplace hazard and an environmental pollutant, therefore determining the presence of beryllium at trace levels can be essential to protect workers as well as the environment. Analysis of gallein, C₂₀H₁₂O₇, to determine if it is usable as a fluorescent dye for beryllium detection. The primary detection method currently in use includes hydroxybenzoquinoline sulfonates (HBQS), for which alternative indicators are desired. Unfortunately, gallein does not have the desired aspects needed as a dye for beryllium detection due to the peak shift properties.

Keywords: beryllium detection, fluorescent, gallein dye, indicator, spectroscopy

Procedia PDF Downloads 141
1582 The Role of Social Media in the Rise of Islamic State in India: An Analytical Overview

Authors: Yasmeen Cheema, Parvinder Singh

Abstract:

The evolution of Islamic State (acronym IS) has an ultimate goal of restoring the caliphate. IS threat to the global security is main concern of international community but has also raised a factual concern for India about the regular radicalization of IS ideology among Indian youth. The incident of joining Arif Ejaz Majeed, an Indian as ‘jihadist’ in IS has set strident alarm in law & enforcement agencies. On 07.03.2017, many people were injured in an Improvised Explosive Device (IED) blast on-board of Bhopal Ujjain Express. One perpetrator of this incident was killed in encounter with police. But, the biggest shock is that the conspiracy was pre-planned and the assailants who carried out the blast were influenced by the ideology perpetrated by the Islamic State. This is the first time name of IS has cropped up in a terror attack in India. It is a red indicator of violent presence of IS in India, which is spreading through social media. The IS have the capacity to influence the younger Muslim generation in India through its brutal and aggressive propaganda videos, social media apps and hatred speeches. It is a well known fact that India is on the radar of IS, as well on its ‘Caliphate Map’. IS uses Twitter, Facebook and other social media platforms constantly. Islamic State has used enticing videos, graphics, and articles on social media and try to influence persons from India & globally that their jihad is worthy. According to arrested perpetrator of IS in different cases in India, the most of Indian youths are victims to the daydreams which are fondly shown by IS. The dreams that the Muslim empire as it was before 1920 can come back with all its power and also that the Caliph and its caliphate can be re-established are shown by the IS. Indian Muslim Youth gets attracted towards these euphemistic ideologies. Islamic State has used social media for disseminating its poisonous ideology, recruitment, operational activities and for future direction of attacks. IS through social media inspired its recruits & lone wolfs to continue to rely on local networks to identify targets and access weaponry and explosives. Recently, a pro-IS media group on its Telegram platform shows Taj Mahal as the target and suggested mode of attack as a Vehicle Born Improvised Explosive Attack (VBIED). Islamic State definitely has the potential to destroy the Indian national security & peace, if timely steps are not taken. No doubt, IS has used social media as a critical mechanism for recruitment, planning and executing of terror attacks. This paper will therefore examine the specific characteristics of social media that have made it such a successful weapon for Islamic State. The rise of IS in India should be viewed as a national crisis and handled at the central level with efficient use of modern technology.

Keywords: ideology, India, Islamic State, national security, recruitment, social media, terror attack

Procedia PDF Downloads 229
1581 Algorithm Development of Individual Lumped Parameter Modelling for Blood Circulatory System: An Optimization Study

Authors: Bao Li, Aike Qiao, Gaoyang Li, Youjun Liu

Abstract:

Background: Lumped parameter model (LPM) is a common numerical model for hemodynamic calculation. LPM uses circuit elements to simulate the human blood circulatory system. Physiological indicators and characteristics can be acquired through the model. However, due to the different physiological indicators of each individual, parameters in LPM should be personalized in order for convincing calculated results, which can reflect the individual physiological information. This study aimed to develop an automatic and effective optimization method to personalize the parameters in LPM of the blood circulatory system, which is of great significance to the numerical simulation of individual hemodynamics. Methods: A closed-loop LPM of the human blood circulatory system that is applicable for most persons were established based on the anatomical structures and physiological parameters. The patient-specific physiological data of 5 volunteers were non-invasively collected as personalized objectives of individual LPM. In this study, the blood pressure and flow rate of heart, brain, and limbs were the main concerns. The collected systolic blood pressure, diastolic blood pressure, cardiac output, and heart rate were set as objective data, and the waveforms of carotid artery flow and ankle pressure were set as objective waveforms. Aiming at the collected data and waveforms, sensitivity analysis of each parameter in LPM was conducted to determine the sensitive parameters that have an obvious influence on the objectives. Simulated annealing was adopted to iteratively optimize the sensitive parameters, and the objective function during optimization was the root mean square error between the collected waveforms and data and simulated waveforms and data. Each parameter in LPM was optimized 500 times. Results: In this study, the sensitive parameters in LPM were optimized according to the collected data of 5 individuals. Results show a slight error between collected and simulated data. The average relative root mean square error of all optimization objectives of 5 samples were 2.21%, 3.59%, 4.75%, 4.24%, and 3.56%, respectively. Conclusions: Slight error demonstrated good effects of optimization. The individual modeling algorithm developed in this study can effectively achieve the individualization of LPM for the blood circulatory system. LPM with individual parameters can output the individual physiological indicators after optimization, which are applicable for the numerical simulation of patient-specific hemodynamics.

Keywords: blood circulatory system, individual physiological indicators, lumped parameter model, optimization algorithm

Procedia PDF Downloads 135
1580 Effects of the Treatment by Polypill Combinations vs Identical Monopill Therapies in Patients with Cardiovascular Comorbid Diseases

Authors: Denys Sebov, Viktoriia Korotaieva, Kateryna Markina

Abstract:

The clinical advantage of the multipill combination drugs administration (polypill-strategy) over single-component drugs (monopill-strategy) has been established in patients with comorbid arterial hypertension, heart failure, chronic coronary syndrome, diabetes. It was found that polypill-strategy provides better treatment adherence in 33.4% of the patients. It was proven a significant decrease in systolic and diastolic blood pressure, as well as a decrease in dispersion index due to the stability of the blood pressure profile in patients with the polypill-strategy treatment.

Keywords: polypill, artetial hypertension, cardiovascular disease, compliance

Procedia PDF Downloads 60
1579 Ecotoxicity Evaluation and Suggestion of Remediation Method of ZnO Nanoparticles in Aqueous Phase

Authors: Hyunsang Kim, Younghun Kim, Younghee Kim, Sangku Lee

Abstract:

We investigated ecotoxicity and performed an experiment for removing ZnO nanoparticles in water. Short-term exposure of hatching test using fertilized eggs (O. latipes) showed deformity in 5 ppm of ZnO nanoparticles solution, and in 10ppm ZnO nanoparticles solution delayed hatching was observed. Herein, chemical precipitation method was suggested for removing ZnO nanoparticles in water. The precipitated ZnO nanoparticles showed the form of ZnS after addition of Na2S, and the form of Zn3(PO4)2 for Na2HPO4. The removal efficiency of ZnO nanoparticles in water was closed to 100% for two case. In ecotoxicity evaluation of as-precipitated ZnS and Zn3(PO4)2, they did not cause any acute toxicity for D. magna. It is noted that this precipitation treatment of ZnO is effective to reduce the potential cytotoxicity.

Keywords: ZnO nanopraticles, ZnS, Zn3(PO4)2, ecotoxicity evaluation, chemical precipitation

Procedia PDF Downloads 277
1578 A Survey on Smart Security Mechanism Using Graphical Passwords

Authors: Aboli Dhanavade, Shweta Bhimnath, Rutuja Jumale, Ajay Nadargi

Abstract:

Security to any of our personal thing is our most basic need. It is not possible to directly apply that standard Human-computer—interaction approaches. Important usability goal for authentication system is to support users in selecting best passwords. Users often select text-passwords that are easy to remember, but they are more open for attackers to guess. The human brain is good in remembering pictures rather than textual characters. So the best alternative is being designed that is Graphical passwords. However, Graphical passwords are still immature. Conventional password schemes are also vulnerable to Shoulder-surfing attacks, many shoulder-surfing resistant graphical passwords schemes have been proposed. Next, we have analyzed the security and usability of the proposed scheme, and show the resistance of the proposed scheme to shoulder-surfing and different accidental logins.

Keywords: shoulder-surfing, security, authentication, text-passwords

Procedia PDF Downloads 361
1577 A Survey on Genetic Algorithm for Intrusion Detection System

Authors: Prikhil Agrawal, N. Priyanka

Abstract:

With the increase of millions of users on Internet day by day, it is very essential to maintain highly reliable and secured data communication between various corporations. Although there are various traditional security imparting techniques such as antivirus software, password protection, data encryption, biometrics and firewall etc. But still network security has become the main issue in various leading companies. So IDSs have become an essential component in terms of security, as it can detect various network attacks and respond quickly to such occurrences. IDSs are used to detect unauthorized access to a computer system. This paper describes various intrusion detection techniques using GA approach. The intrusion detection problem has become a challenging task due to the conception of miscellaneous computer networks under various vulnerabilities. Thus the damage caused to various organizations by malicious intrusions can be mitigated and even be deterred by using this powerful tool.

Keywords: genetic algorithm (GA), intrusion detection system (IDS), dataset, network security

Procedia PDF Downloads 295
1576 Development of a Pain Detector Using Microwave Radiometry Method

Authors: Nanditha Rajamani, Anirudhaa R. Rao, Divya Sriram

Abstract:

One of the greatest difficulties in treating patients with pain is the highly subjective nature of pain sensation. The measurement of pain intensity is primarily dependent on the patient’s report, often with little physical evidence to provide objective corroboration. This is also complicated by the fact that there are only few and expensive existing technologies (Functional Magnetic Resonance Imaging-fMRI). The need is thus clear and urgent for a reliable, non-invasive, non-painful, objective, readily adoptable, and coefficient diagnostic platform that provides additional diagnostic information to supplement its current regime with more information to assist doctors in diagnosing these patients. Thus, our idea of developing a pain detector was conceived to take a step further the detection and diagnosis of chronic and acute pain.

Keywords: pain sensor, microwave radiometery, pain sensation, fMRI

Procedia PDF Downloads 454
1575 Evaluation of Toxicity of Some Fungicides Against the Pathogen Fusarium sp.

Authors: M. Djekoun, H. Berrebah, M. R. Djebar

Abstract:

Fusarium wilt attacks the plants of major economic interest including wheat. This disease causes many problems for farmers and economic loss resulting are often very heavy. Chemical control is currently one of the most effective ways to fight against these diseases. In this study, the efficacy of three fungicides (tebuconazole, thiram and fludioxonil - difenoconazole mixture) was tested, in vitro, on the phytopathogenic Fusarium sp. isolated from seeds of wheat. The active ingredients were tested at different concentrations: 0.06, 1.39, 2.79, 5.58, and 11.16 mg/l for tebuconazole, 0.035, 0.052, 0.105, 0.21, and 0.42 mg/l for thiram and finally, for the mixture fludioxonil- difenoconazole 4 concentrations were tested : 0.05, 0.1, 0.5, and 1 mg/l. Toxicity responses were expressed as the effective concentration, which inhibits mycelial growth by 50%, (EC50). Of the three selected fungicides, thirame proved to be the most effective with EC50 value of the order of 0,15 mg/l followed by the mixture of fludioxonil- difenoconazole with 0,27 mg/l and finally tebuconazole with a value of 3.79 mg/l.

Keywords: Fusarium sp, thiram, tebuconazole, fludioxonil, difenoconazole, EC50

Procedia PDF Downloads 543
1574 Rice Tablet Poisoning in Iran

Authors: Somayeh Khanjani, Samaneh Nabavi, Shirin Jalili

Abstract:

Aluminum phosphide (ALP) is an inorganic phosphide used to control insects and is a highly effective insecticide and rodenticide used frequently to protect stored grain. Acute poisoning with this compound is common in some countries including India and Iran, and is a serious health problem. In Iran it was known as "rice tablet", for its use to preserve rice. Two kinds of rice tablets one being herbal while other containing 3g aluminum phosphide (AlP) are available for use in Iranian households to protect stored food grains from pests and rodents. The toxicity of Aluminum phosphide is attributed to the liberation of phosphine gas in contact with water or weak acid and is the major cause of poisoning and deaths. Rice tablet (Aluminum Phosphid) poisoning may be associated with serious and sometimes incurable complications. In 61.3% of patients were shown uniform ingestion. Vomiting was the most common symptoms reported by 96.4% patients. Agitation was reported in 36.9% and felling of thirsty in 27.9 %. Although many complications such as Hypotension, Adult Respiratory Distress Syndrome (ARDS), Acute Renal Failure (ARF) AND Multi Organ Failure (MOF) were the common complications observed in these patients, but the most lethal complication was Cardiac Arrhythmias occurred in 36.9% of cases. Abdominal pain in 31.4% of the patients, nausea in 79.4% of the patients and 41.1% of the patients showed metabolic acidosis. Suicidal intention was the most common cause of poisoning leading to deaths in 18.6% of the patients. Aluminum phosphide can cause either elevation, decrease or no change in electrolytes, bicarbonate and blood glucose level. The possible mechanism for changes in blood glucose levels are complex and depend on the balance of factors which increase its concentration and those which reduce it. AlP poisoning has been postulated to stimulate cortisol which leads to increasing blood level of cortisol, also it may cause stimulation of glucagon, and Adrenaline secretion; in addition, it can inhibit insulin synthesis which may lead to hyperglycemia. Another suggested mechanism of hyperglycemia is rennin activity in some cases, an increase in magnesium level of plasma and that of tissues, and high phosphate level. Although hyperglycemia is most frequent in this poisoning and also is known as a marker of poor prognostic, hypoglycemia in aluminum phosphide poisoning is a rare finding which may be so dangerous. Patients showed sever hypotension and sever acidosis in addition to sever hypoglycemia. The presenting features of AlP intoxication are rapid onset of shock, severe metabolic acidosis, cardiac dysrhythmias and adult respiratory distress syndrome (ARDS).

Keywords: aluminum phosphide (ALP), rice tablet, poisoning, phosphine gas

Procedia PDF Downloads 515
1573 Heat Transfer Dependent Vortex Shedding of Thermo-Viscous Shear-Thinning Fluids

Authors: Markus Rütten, Olaf Wünsch

Abstract:

Non-Newtonian fluid properties can change the flow behaviour significantly, its prediction is more difficult when thermal effects come into play. Hence, the focal point of this work is the wake flow behind a heated circular cylinder in the laminar vortex shedding regime for thermo-viscous shear thinning fluids. In the case of isothermal flows of Newtonian fluids the vortex shedding regime is characterised by a distinct Reynolds number and an associated Strouhal number. In the case of thermo-viscous shear thinning fluids the flow regime can significantly change in dependence of the temperature of the viscous wall of the cylinder. The Reynolds number alters locally and, consequentially, the Strouhal number globally. In the present CFD study the temperature dependence of the Reynolds and Strouhal number is investigated for the flow of a Carreau fluid around a heated cylinder. The temperature dependence of the fluid viscosity has been modelled by applying the standard Williams-Landel-Ferry (WLF) equation. In the present simulation campaign thermal boundary conditions have been varied over a wide range in order to derive a relation between dimensionless heat transfer, Reynolds and Strouhal number. Together with the shear thinning due to the high shear rates close to the cylinder wall this leads to a significant decrease of viscosity of three orders of magnitude in the nearfield of the cylinder and a reduction of two orders of magnitude in the wake field. Yet the shear thinning effect is able to change the flow topology: a complex K´arm´an vortex street occurs, also revealing distinct characteristic frequencies associated with the dominant and sub-dominant vortices. Heating up the cylinder wall leads to a delayed flow separation and narrower wake flow, giving lesser space for the sequence of counter-rotating vortices. This spatial limitation does not only reduce the amplitude of the oscillating wake flow it also shifts the dominant frequency to higher frequencies, furthermore it damps higher harmonics. Eventually the locally heated wake flow smears out. Eventually, the CFD simulation results of the systematically varied thermal flow parameter study have been used to describe a relation for the main characteristic order parameters.

Keywords: heat transfer, thermo-viscous fluids, shear thinning, vortex shedding

Procedia PDF Downloads 297
1572 Regional Anesthesia in Carotid Surgery: A Single Center Experience

Authors: Daniel Thompson, Muhammad Peerbux, Sophie Cerutti, Hansraj Riteesh Bookun

Abstract:

Patients with carotid stenosis, which may be asymptomatic or symptomatic in the form of transient ischaemic attack (TIA), amaurosis fugax, or stroke, often require an endarterectomy to reduce stroke risk. Risks of this procedure include stroke, death, myocardial infarction, and cranial nerve damage. Carotid endarterectomy is most commonly performed under general anaesthetic, however, it can also be undertaken with a regional anaesthetic approach. Our tertiary centre generally performs carotid endarterectomy under regional anaesthetic. Our major tertiary hospital mostly utilises regional anaesthesia for carotid endarterectomy. We completed a cross-sectional analysis of all cases of carotid endarterectomy performed under regional anaesthesia across a 10-year period between January 2010 to March 2020 at our institution. 350 patients were included in this descriptive analysis, and demographic details for patients, indications for surgery, procedural details, length of surgery, and complications were collected. Data was cross tabulated and presented in frequency tables to describe these categorical variables. 263 of the 350 patients in the analysis were male, with a mean age of 71 ± 9. 172 patients had a history of ischaemic heart disease, 104 had diabetes mellitus, 318 had hypertension, and 17 patients had chronic kidney disease greater than Stage 3. 13.1% (46 patients) were current smokers, and the majority (63%) were ex-smokers. Most commonly, carotid endarterectomy was performed conventionally with patch arterioplasty 96% of the time (337 patients). The most common indication was TIA and stroke in 64% of patients, 18.9% were classified as asymptomatic, and 13.7% had amaurosis fugax. There were few general complications, with 9 wound complications/infections, 7 postoperative haematomas requiring return to theatre, 3 myocardial infarctions, 3 arrhythmias, 1 exacerbation of congestive heart failure, 1 chest infection, and 1 urinary tract infection. Specific complications to carotid endarterectomy included 3 strokes, 1 postoperative TIA, and 1 cerebral bleed. There were no deaths in our cohort. This analysis of a large cohort of patients from a major tertiary centre who underwent carotid endarterectomy under regional anaesthesia indicates the safety of such an approach for these patients. Regional anaesthesia holds the promise of less general respiratory and cardiac events compared to general anaesthesia, and in this vulnerable patient group, calls for comparative research between local and general anaesthesia in carotid surgery.

Keywords: anaesthesia, carotid endarterectomy, stroke, carotid stenosis

Procedia PDF Downloads 120
1571 Antihypertensive Effect of Formulated Apium graveolens: A Randomized, Double-Blind, Placebo-Controlled Clinical Trial

Authors: Maryam Shayani Rad, Seyed Ahmad Mohajeri, Mohsen Mouhebati, Seyed Danial Mousavi

Abstract:

High blood pressure is one of the most important and serious health-threatening because of no symptoms in most people, which can lead to sudden heart attack, heart failure, and stroke. Nowadays, herbal medicine is one of the best and safest strategies for treatment that have no adverse effects. Apium graveolens (celery) can be used as an alternative treatment for many health conditions such as hypertension. Natural compounds reduce blood pressure via different mechanisms in which Apium graveolens extract provides potent calcium channel blocking properties. A randomized, double-blind, placebo-controlled, cross-over clinical trial was done to evaluate the efficacy of formulated Apium graveolens extract with a maximum yield of 3-n-butylphthalide to reduce systolic and diastolic blood pressure in patients with hypertension. 54 hypertensive patients in the range of 20-68 years old were randomly assigned to the treatment group (26 cases) and the placebo control group (26 cases) and were crossed over after washout duration. The treatment group received at least 2 grams of formulated powder in hard capsules orally, before each meal, 2 times daily. The control group received 2 grams of placebo in hard capsules orally, exactly as the same as shape, time, and doses of treatment group. Treatment was administrated in 12 weeks with 4 weeks washout period at the middle of the study, meaning 4 weeks drug consumption for the treatment group, 4 weeks washout and 4 weeks placebo consumption, and vice versa for the placebo control group. The clinical assessment was done 4 times, including at the beginning and ending of the drug and placebo consumption period by 24-hour ambulatory blood pressure monitoring (ABPM) holter, which measured blood pressure every 15 minutes continuously. There was a statistically significant decrease in both systolic blood pressure (SBP) and diastolic blood pressure (DBP) at the end of drug duration compared to baseline. The changes after 4 weeks on average was about 12.34 mm Hg for the SBP (P < 0.005) and 7.83 mm Hg for the DBP (P < 0.005). The results from this clinical trial study showed this Apium graveolens extract formulation in the mentioned dosage had a significant effect on blood pressure-lowering for hypertensive patients.

Keywords: Apium graveolens extract, clinical trial, cross-over, hypertension

Procedia PDF Downloads 210
1570 Software Quality Assurance in Network Security using Cryptographic Techniques

Authors: Sidra Shabbir, Ayesha Manzoor, Mehreen Sirshar

Abstract:

The use of the network communication has imposed serious threats to the security of assets over the network. Network security is getting more prone to active and passive attacks which may result in serious consequences to data integrity, confidentiality and availability. Various cryptographic techniques have been proposed in the past few years to combat with the concerned problem by ensuring quality but in order to have a fully secured network; a framework of new cryptosystem was needed. This paper discusses certain cryptographic techniques which have shown far better improvement in the network security with enhanced quality assurance. The scope of this research paper is to cover the security pitfalls in the current systems and their possible solutions based on the new cryptosystems. The development of new cryptosystem framework has paved a new way to the widespread network communications with enhanced quality in network security.

Keywords: cryptography, network security, encryption, decryption, integrity, confidentiality, security algorithms, elliptic curve cryptography

Procedia PDF Downloads 731
1569 Evaluation of Gesture-Based Password: User Behavioral Features Using Machine Learning Algorithms

Authors: Lakshmidevi Sreeramareddy, Komalpreet Kaur, Nane Pothier

Abstract:

Graphical-based passwords have existed for decades. Their major advantage is that they are easier to remember than an alphanumeric password. However, their disadvantage (especially recognition-based passwords) is the smaller password space, making them more vulnerable to brute force attacks. Graphical passwords are also highly susceptible to the shoulder-surfing effect. The gesture-based password method that we developed is a grid-free, template-free method. In this study, we evaluated the gesture-based passwords for usability and vulnerability. The results of the study are significant. We developed a gesture-based password application for data collection. Two modes of data collection were used: Creation mode and Replication mode. In creation mode (Session 1), users were asked to create six different passwords and reenter each password five times. In replication mode, users saw a password image created by some other user for a fixed duration of time. Three different duration timers, such as 5 seconds (Session 2), 10 seconds (Session 3), and 15 seconds (Session 4), were used to mimic the shoulder-surfing attack. After the timer expired, the password image was removed, and users were asked to replicate the password. There were 74, 57, 50, and 44 users participated in Session 1, Session 2, Session 3, and Session 4 respectfully. In this study, the machine learning algorithms have been applied to determine whether the person is a genuine user or an imposter based on the password entered. Five different machine learning algorithms were deployed to compare the performance in user authentication: namely, Decision Trees, Linear Discriminant Analysis, Naive Bayes Classifier, Support Vector Machines (SVMs) with Gaussian Radial Basis Kernel function, and K-Nearest Neighbor. Gesture-based password features vary from one entry to the next. It is difficult to distinguish between a creator and an intruder for authentication. For each password entered by the user, four features were extracted: password score, password length, password speed, and password size. All four features were normalized before being fed to a classifier. Three different classifiers were trained using data from all four sessions. Classifiers A, B, and C were trained and tested using data from the password creation session and the password replication with a timer of 5 seconds, 10 seconds, and 15 seconds, respectively. The classification accuracies for Classifier A using five ML algorithms are 72.5%, 71.3%, 71.9%, 74.4%, and 72.9%, respectively. The classification accuracies for Classifier B using five ML algorithms are 69.7%, 67.9%, 70.2%, 73.8%, and 71.2%, respectively. The classification accuracies for Classifier C using five ML algorithms are 68.1%, 64.9%, 68.4%, 71.5%, and 69.8%, respectively. SVMs with Gaussian Radial Basis Kernel outperform other ML algorithms for gesture-based password authentication. Results confirm that the shorter the duration of the shoulder-surfing attack, the higher the authentication accuracy. In conclusion, behavioral features extracted from the gesture-based passwords lead to less vulnerable user authentication.

Keywords: authentication, gesture-based passwords, machine learning algorithms, shoulder-surfing attacks, usability

Procedia PDF Downloads 102
1568 The Toxicity of Doxorubicin Connected with Nanotransporters

Authors: Iva Blazkova, Amitava Moulick, Vedran Milosavljevic, Pavel Kopel, Marketa Vaculovicova, Vojtech Adam, Rene Kizek

Abstract:

Doxorubicin is one of the most commonly used and the most effective chemotherapeutic drugs. This antracycline drug isolated from the bacteria Streptomyces peuceticus var. caesius is sold under the trade name Adriamycin (hydroxydaunomycin, hydroxydaunorubicin). Doxorubicin is used in single therapy to treat hematological malignancies (blood cancers, leukaemia, lymphoma), many types of carcinoma (solid tumors) and soft tissue sarcomas. It has many serious side effects like nausea and vomiting, hair lost, myelosupression, oral mucositis, skin reactions and redness, but the most serious one is the cardiotoxicity. Because of the risk of heart attack and congestive heart failure, the total dose administered to patients has to be accurately monitored. With the aim to lower the side effects and to targeted delivery of doxorubicin into the tumor tissue, the different nanoparticles are studied. The drug can be bound on a surface of nanoparticle, encapsulated in the inner cavity, or incorporated into the structure of nanoparticle. Among others, carbon nanoparticles (graphene, carbon nanotubes, fullerenes) are highly studied. Besides the number of inorganic nanoparticles, a great potential exhibit also organic ones mainly lipid-based and polymeric nanoparticle. The aim of this work was to perform a toxicity study of free doxorubicin compared to doxorubicin conjugated with various nanotransporters. The effect of liposomes, fullerenes, graphene, and carbon nanotubes on the toxicity was analyzed. As a first step, the binding efficacy of between doxorubicin and the nanotransporter was determined. The highest efficacy was detected in case of liposomes (85% of applied drug was encapsulated) followed by graphene, carbon nanotubes and fullerenes. For the toxicological studies, the chicken embryos incubated under controlled conditions (37.5 °C, 45% rH, rotation every 2 hours) were used. In 7th developmental day of chicken embryos doxorubicin or doxorubicin-nanotransporter complex was applied on the chorioallantoic membrane of the eggs and the viability was analyzed every day till the 17th developmental day. Then the embryos were extracted from the shell and the distribution of doxorubicin in the body was analyzed by measurement of organs extracts using laser induce fluorescence detection. The chicken embryo mortality caused by free doxorubicin (30%) was significantly lowered by using the conjugation with nanomaterials. The highest accumulation of doxorubicin and doxorubicin nanotransporter complexes was observed in the liver tissue

Keywords: doxorubicin, chicken embryos, nanotransporters, toxicity

Procedia PDF Downloads 447
1567 CybeRisk Management in Banks: An Italian Case Study

Authors: E. Cenderelli, E. Bruno, G. Iacoviello, A. Lazzini

Abstract:

The financial sector is exposed to the risk of cyber-attacks like any other industrial sector. Furthermore, the topic of CybeRisk (cyber risk) has become particularly relevant given that Information Technology (IT) attacks have increased drastically in recent years, and cannot be stopped by single organizations requiring a response at international and national level. IT risk is never a matter purely for the IT manager, although he clearly plays a key role. A bank's risk management function requires a thorough understanding of the evolving risks as well as the tools and practical techniques available to address them. Upon the request of European and national legislation regarding CybeRisk in the financial system, banks are therefore called upon to strengthen the operational model for CybeRisk management. This will require an important change with a more intense collaboration with the structures that deal with information security for the development of an ad hoc system for the evaluation and control of this type of risk. The aim of the work is to propose a framework for the management and control of CybeRisk that will bridge the gap in the literature regarding the understanding and consideration of CybeRisk as an integral part of business management. The IT function has a strong relevance in the management of CybeRisk, which is perceived mainly as operational risk, but with a positive tendency on the part of risk management to the identification of CybeRisk assessment methods that are increasingly complete, quantitative and able to better describe the possible impacts on the business. The paper provides answers to the research questions: Is it possible to define a CybeRisk governance structure able to support the comparison between risk and security? How can the relationships between IT assets be integrated into a cyberisk assessment framework to guarantee a system of protection and risks control? From a methodological point of view, this research uses a case study approach. The choice of “Monte dei Paschi di Siena” was determined by the specific features of one of Italy’s biggest lenders. It is chosen to use an intensive research strategy: an in-depth study of reality. The case study methodology is an empirical approach to explore a complex and current phenomenon that develops over time. The use of cases has also the advantage of allowing the deepening of aspects concerning the "how" and "why" of contemporary events, on which the scholar has little control. The research bases on quantitative data and qualitative information obtained through semi-structured interviews of an open-ended nature and questionnaires to directors, members of the audit committee, risk, IT and compliance managers, and those responsible for internal audit function and anti-money laundering. The added value of the paper can be seen in the development of a framework based on a mapping of IT assets from which it is possible to identify their relationships for purposes of a more effective management and control of cyber risk.

Keywords: bank, CybeRisk, information technology, risk management

Procedia PDF Downloads 231
1566 Black-Box-Base Generic Perturbation Generation Method under Salient Graphs

Authors: Dingyang Hu, Dan Liu

Abstract:

DNN (Deep Neural Network) deep learning models are widely used in classification, prediction, and other task scenarios. To address the difficulties of generic adversarial perturbation generation for deep learning models under black-box conditions, a generic adversarial ingestion generation method based on a saliency map (CJsp) is proposed to obtain salient image regions by counting the factors that influence the input features of an image on the output results. This method can be understood as a saliency map attack algorithm to obtain false classification results by reducing the weights of salient feature points. Experiments also demonstrate that this method can obtain a high success rate of migration attacks and is a batch adversarial sample generation method.

Keywords: adversarial sample, gradient, probability, black box

Procedia PDF Downloads 102
1565 Triple Immunotherapy to Overcome Immune Evasion by Tumors in a Melanoma Mouse Model

Authors: Mary-Ann N. Jallad, Dalal F. Jaber, Alexander M. Abdelnoor

Abstract:

Introduction: Current evidence confirms that both innate and adaptive immune systems are capable of recognizing and abolishing malignant cells. The emergence of cancerous tumors in patients is, therefore, an indication that certain cancer cells can resist elimination by the immune system through a process known as “immune evasion”. In fact, cancer cells often exploit regulatory mechanisms to escape immunity. Such mechanisms normally exist to control the immune responses and prohibit exaggerated or autoimmune reactions. Recently, immunotherapies have shown promising yet limited results. Therefore this study investigates several immunotherapeutic combinations and devises a triple immunotherapy which harnesses the innate and acquired immune responses towards the annihilation of malignant cells through overcoming their ability of immune evasion, consequently hampering malignant progression and eliminating established tumors. The aims of the study are to rule out acute/chronic toxic effects of the proposed treatment combinations, to assess the effect of these combinations on tumor growth and survival rates, and to investigate potential mechanisms underlying the phenotypic results through analyzing serum levels of anti-tumor cytokines, angiogenic factors and tumor progression indicator, and the tumor-infiltrating immune-cells populations. Methodology: For toxicity analysis, cancer-free C57BL/6 mice are randomized into 9 groups: Group 1 untreated, group 2 treated with sterile saline (solvent of used treatments), group 3 treated with Monophosphoryl-lipid-A, group 4 with anti-CTLA4-antibodies, group 5 with 1-Methyl-Tryptophan (Indolamine-Dioxygenase-1 inhibitor), group 6 with both MPLA and anti-CTLA4-antibodies, group 7 with both MPLA and 1-MT, group 8 with both anti-CTLA4-antibodies and 1-MT, and group 9 with all three: MPLA, anti-CTLA4-antibodies and 1-MT. Mice are monitored throughout the treatment period and for three following months. At that point, histological sections from their main organs are assessed. For tumor progression and survival analysis, a murine melanoma model is generated by injecting analogous mice with B16F10 melanoma cells. These mice are segregated into the listed nine groups. Their tumor size and survival are monitored. For a depiction of underlying mechanisms, melanoma-bearing mice from each group are sacrificed at several time-points. Sera are tested to assess the levels of Interleukin-12 (IL-12), Vascular-Endothelial-Growth Factor (VEGF), and S100B. Furthermore, tumors are excised for analysis of infiltrated immune cell populations including T-cells, macrophages, natural killer cells and immune-regulatory cells. Results: Toxicity analysis shows that all treated groups present no signs of neither acute nor chronic toxicity. Their appearance and weights were comparable to those of control groups throughout the treatment period and for the following 3 months. Moreover, histological sections from their hearts, kidneys, lungs, and livers were normal. Work is ongoing for completion of the remaining study aims. Conclusion: Toxicity was the major concern for the success of the proposed comprehensive combinational therapy. Data generated so far ruled out any acute or chronic toxic effects. Consequently, ongoing work is quite promising and may significantly contribute to the development of more effective immunotherapeutic strategies for the treatment of cancer patients.

Keywords: cancer immunotherapy, check-point blockade, combination therapy, melanoma

Procedia PDF Downloads 120
1564 Democrat Support to Antiterorrism of USA from Hollywood: Homeland Series

Authors: Selman Selim Akyüz, Mete Kazaz

Abstract:

Since The First Gulf War, USA, “Leader of The Free World” has been in trouble with terror. The USA created a complexity in The Middle East and paid the price with terrorist attacks in homeland. USA has made serious mistakes in terms of antiterrorism and fight against its supporters. Democrats have repaired damages caused by the Republican Party's management. Old methods about antiterrorism have been slowly abandoned. Hollywood, too, has played an important part in this war. Sometimes, Hollywood became an unquestioned patriot, sometimes it cried for the death of American Soldiers far away. In this study, messages in The Homeland, broadcast in the USA and a lot of countries around the world, are analyzed in terms of Washington’s foreign policy and position of the CIA in the fight against antiterrorism. The series reflect an orientalist viewpoint and has been criticized for offensive policy against the government. Homeland wanted to offer a perspective for the USA to be the “Leader of The Free World” again but with a liberal-democrat approach, dialogue and rational intelligence methods.

Keywords: antiterrorism, CIA, homeland, USA

Procedia PDF Downloads 357
1563 The Effect of Emotional Stimuli Related to Body Imbalance in Postural Control and the Phenomenological Experience of Young Healthy Adults

Authors: David Martinez-Pernia, Alvaro Rivera-Rei, Alejandro Troncoso, Gonzalo Forno, Andrea Slachevsky, David Huepe, Victoria Silva-Mack, Jorge Calderon, Mayte Vergara, Valentina Carrera

Abstract:

Background: Recent theories in the field of emotions have taken the relevance of motor control beyond a system related to personal autonomy (walking, running, grooming), and integrate it into the emotional dimension. However, to our best knowledge, there are no studies that specifically investigate how emotional stimuli related to motor control modify emotional states in terms of postural control and phenomenological experience. Objective: The main aim of this work is to investigate the emotions produced by stimuli of bodily imbalance (neutral, pleasant and unpleasant) in the postural control and the phenomenological experience of young, healthy adults. Methodology: 46 healthy young people are shown emotional videos (neutral, pleasant, motor unpleasant, and non-motor unpleasant) related to the body imbalance. During the period of stimulation of each of the videos (60 seconds) the participant is standing on a force platform to collect temporal and spatial data of postural control. In addition, the electrophysiological activity of the heart and electrodermal activity is recorded. In relation to the two unpleasant conditions (motor versus non-motor), a phenomenological interview is carried out to collect the subjective experience of emotion and body perception. Results: Pleasant and unpleasant emotional videos have significant changes with respect to the neutral condition in terms of greater area, higher mean velocity, and greater mean frequency power on the anterior-posterior axis. The results obtained with respect to the electrodermal response was that the pleasurable and unpleasant conditions produced a significant increase in the phasic component with respect to the neutral condition. Regarding the electrophysiology of the heart, no significant change was found in any condition. Phenomenological experiences in the two unpleasant conditions differ in body perception and the emotional meaning of the experience. Conclusion: Emotional stimuli related to bodily imbalance produce changes in postural control, electrodermal activity, and phenomenological experience. This experimental setting could be relevant to be implemented in people with motor disorders (Parkinson, Stroke, TBI) to know how emotions affect motor control.

Keywords: body imbalance stimuli, emotion, phenomenological experience, postural control

Procedia PDF Downloads 171
1562 Effects of Different Load on Physiological, Hematological, Biochemical, Cytokines Indices of Zanskar Ponies at High Altitude

Authors: Prince Vivek, Vijay Kumar Bharti, Deepak Kumar, Rohit Kumar, Kapil Nehra, Dhananjay Singh, Om Prakash Chaurasia, Bhuvnesh Kumar

Abstract:

High altitude native people still rely heavily on animal transport for logistic support at eastern and northern Himalayas regions. The prevalent mountainous terrains and rugged region are not suitable for the motorized vehicle to use in logistic transport. Therefore, people required high endurance pack animals for load carrying and riding. So far to the best of our knowledge, no studies have been taken to evaluate the effect of loads on the physiology of ponies in high altitude region. So, in this view, we evaluated variation in physiological, hematological, biochemical, and cytokines indices of Zanskar ponies during load carrying at high altitude. Total twelve (12) of Zanskar ponies, mare, age 4-6 years selected for this study, Feed was offered at 2% of body weight, and water ad libitum. Ponies were divided into three groups; group-A (without load), group-B (60 kg), and group-C (80 kg) of backpack loads. The track was very narrow and slippery with gravel, uneven with a rocky surface and has a steep gradient of 4 km uphill at altitude 3291 to 3500m. When we evaluate these parameters, it is understood that the heart rate, pulse rate, and respiration rate was significantly increased in 80 kg group among the three groups. The hematology parameters viz. hemoglobin significantly increased in 80 kg group on 1st day after load carrying among the three groups which was followed by control and 60 kg whereas, PCV, lymphocytes, monocytes percentage significantly increased however, ESR and eosinophil % significantly decreased in 80 kg group after load carrying on 7th day after load carrying among the three groups which were followed by control and 60 kg group. In biochemical parameters viz. LA, LDH, TP, hexokinase (HK), cortisol (CORT), T3, GPx, FRAP and IL-6 significantly increased in 80 kg group on the 7th day after load carrying among the three groups which were followed by control and 60 kg group. The ALT, ALB, GLB, UR, and UA significantly increased in 80 kg group on the 7th day before and after load carrying among the three groups which were followed by control and 60 kg group. The CRT, AST, and CK-MB were significantly increased in 80 kg group on the 1st and 7th day after load carrying among the three groups which were followed by control and 60 kg group. It has been concluded that, heart rate, respiration rate, hematological indices like PCV, lymphocytes, monocytes, Hb and ESR, biochemical indices like lactic acid, LDH, TP, HK, CORT, T3, ALT, AST and CRT, ALB, GLB, UR, UA, GPx, FRAP and IL-6 are important biomarkers to assess effect of load on animal physiology and endurance. Further, this result has revealed the strong correlation of change in biomarkers level with performance in ponies during load carry. Hence, these parameters might be used for the performance of endurance of Zanskar ponies in the high mountain region.

Keywords: biochemical, endurance, high altitude, load, ponies

Procedia PDF Downloads 280
1561 Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures

Authors: L. Sellami, D. Idoughi, P. F. Tiako

Abstract:

Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing.

Keywords: cloud computing, intrusion detection system, privacy, trust

Procedia PDF Downloads 321
1560 Relationship Between Behavioral Inhibition/Approach System, and Perceived Stress, With White Blood Cell In Multiple Sclerosis Patients

Authors: Amin Alvani

Abstract:

Multiple sclerosis (MS) is a chronic, often disabling disease in which the immune system attacks the myelin sheath of neurons in the central nervous system. The present study aimed to investigate the Relationship between behavioral inhibition/approach system (BIS-BAS) and perceived stress (PS) whit control white blood cell (WBC). 60 MS patients (male=36.7, female=63.3%; age range=15-65 participated in the study and completed the demographic questionnaire, the count blood cell (CBC) test, the behavioral Activation and behavioral inhibition scale (BIS-BAS), and the perceived stress Questionnaire (PSS-14). The results revealed that Between of BAS-reward responsiveness (BAS-DR) subscale and PS, in more than MS patient (BIS), there are increase WBC.

Keywords: behavioral inhibition/approach system, perceived stress, white blood cell, multiple sclerosis

Procedia PDF Downloads 89
1559 A Rare Case Report of Wandering Spleen Torsion

Authors: Steven Robinson, Adriana Dager, Param Patel

Abstract:

Wandering spleen is a rare variant where there is abnormal development of the ligamentous peritoneal attachments of the spleen which normally anchor it in the left upper quadrant of the abdomen. Ligamentous abnormalities can be congenital, or acquired through pregnancy, injury, or iatrogenic causes. Absence or laxity of these ligaments allows migration of the spleen into ectopic portions of the abdomen, which is also associated with an elongated vascular pedicle. Incidence of wandering spleen is reported at less than 0.25% with a female to male ratio of approximately 6:1. The most common complication of a wandering spleen is torsion around its vascular pedicle which can lead to thrombosis and infarction. Torsion of a wandering spleen is a rare but important cause of an acute abdomen. Imaging, and specifically CT or ultrasound, is crucial in the diagnosis. We present a case of a torsed wandering spleen which was treated with splenectomy.

Keywords: Wandering Spleen, Torsion, Splenic Torsion, Spleen

Procedia PDF Downloads 80
1558 Delicate Balance between Cardiac Stress and Protection: Role of Mitochondrial Proteins

Authors: Zuzana Tatarkova, Ivana Pilchova, Michal Cibulka, Martin Kolisek, Peter Racay, Peter Kaplan

Abstract:

Introduction: Normal functioning of mitochondria is crucial for cardiac performance. Mitochondria undergo mitophagy and biogenesis, and mitochondrial proteins are subject to extensive post-translational modifications. The state of mitochondrial homeostasis reflects overall cellular fitness and longevity. Perturbed mitochondria produce less ATP, release greater amounts of reactive molecules, and are more prone to apoptosis. Therefore mitochondrial turnover is an integral aspect of quality control in which dysfunctional mitochondria are selectively eliminated through mitophagy. Currently, the progressive deterioration of physiological functions is seen as accumulation of modified/damaged proteins with limiting regenerative ability and disturbance of such affected protein-protein communication throughout aging in myocardial cells. Methodologies: For our study was used immunohistochemistry, biochemical methods: spectrophotometry, western blotting, immunodetection as well as more sophisticated 2D electrophoresis and mass spectrometry for evaluation protein-protein interactions and specific post-translational modification. Results and Discussion: Mitochondrial stress response to reactive species was evaluated as electron transport chain (ETC) complexes, redox-active molecules, and their possible communication. Protein-protein interactions revealed a strong linkage between age and ETC protein subunits. Redox state was strongly affected in senescent mitochondria with shift in favor of more pro-oxidizing condition within cardiomyocytes. Acute myocardial ischemia and ischemia-reperfusion (IR) injury affected ETC complexes I, II and IV with no change in complex III. Ischemia induced decrease in total antioxidant capacity, MnSOD, GSH and catalase activity with recovery in some extent during reperfusion. While MnSOD protein content was higher in IR group, activity returned to 95% of control. Nitric oxide is one of the biological molecules that can out compete MnSOD for superoxide and produce peroxynitrite. This process is faster than dismutation and led to the 10-fold higher production of nitrotyrosine after IR injury in adult with higher protection in senescent ones. 2D protein profiling revealed 140 mitochondrial proteins, 12 of them with significant changes after IR injury and 36 individual nitrotyrosine-modified proteins further identified by mass spectrometry. Linking these two groups, 5 proteins were altered after IR as well as nitrated, but only one showed massive nitration per lowering content of protein after IR injury in adult. Conclusions: Senescent cells have greater proportion of protein content, which might be modulated by several post-translational modifications. If these protein modifications are connected to functional consequences and protein-protein interactions are revealed, link may lead to the solution. Assume all together, dysfunctional proteostasis can play a causative role and restoration of protein homeostasis machinery is protective against aging and possibly age-related disorders. This work was supported by the project VEGA 1/0018/18 and by project 'Competence Center for Research and Development in the field of Diagnostics and Therapy of Oncological diseases', ITMS: 26220220153, co-financed from EU sources.

Keywords: aging heart, mitochondria, proteomics, redox state

Procedia PDF Downloads 166
1557 Efficacy and Safety of COVID-19 Vaccination in Patients with Multiple Sclerosis: Looking Forward to Post-COVID-19

Authors: Achiron Anat, Mathilda Mandel, Mayust Sue, Achiron Reuven, Gurevich Michael

Abstract:

Introduction: As coronavirus disease 2019 (COVID-19) vaccination is currently spreading around the world, it is of importance to assess the ability of multiple sclerosis (MS) patients to mount an appropriate immune response to the vaccine in the context of disease-modifying treatments (DMT’s). Objectives: Evaluate immunity generated following COVID-19 vaccination in MS patients, and assess factors contributing to protective humoral and cellular immune responses in MS patients vaccinated against severe acute respiratory syndrome coronavirus 2 (SARS-CoV2) virus infection. Methods: Review our recent data related to (1) the safety of PfizerBNT162b2 COVID-19 mRNA vaccine in adult MS patients; (2) the humoral post-vaccination SARS-CoV2 IgG response in MS vaccinees using anti-spike protein-based serology; and (3) the cellular immune response of memory B-cells specific for SARS-CoV-2 receptor-binding domain (RBD) and memory T-cells secreting IFN-g and/or IL-2 in response to SARS-CoV2 peptides using ELISpot/Fluorospot assays in MS patients either untreated or under treatment with fingolimod, cladribine, or ocrelizumab; (4) covariate parameters related to mounting protective immune responses. Results: COVID-19 vaccine proved safe in MS patients, and the adverse event profile was mainly characterised by pain at the injection site, fatigue, and headache. Not any increased risk of relapse activity was noted and the rate of patients with acute relapse was comparable to the relapse rate in non-vaccinated patients during the corresponding follow-up period. A mild increase in the rate of adverse events was noted in younger MS patients, among patients with lower disability, and in patients treated with DMTs. Following COVID-19 vaccination protective humoral immune response was significantly decreased in fingolimod- and ocrelizumab- treated MS patients. SARS-CoV2 specific B-cell and T-cell cellular responses were respectively decreased. Untreated MS patients and patients treated with cladribine demonstrated protective humoral and cellular immune responses, similar to healthy vaccinated subjects. Conclusions: COVID-19 BNT162b2 vaccine proved as safe for MS patients. No increased risk of relapse activity was noted post-vaccination. Although COVID-19 vaccination is new, accumulated data demonstrate differences in immune responses under various DMT’s. This knowledge can help to construct appropriate COVID-19 vaccine guidelines to ensure proper immune responses for MS patients.

Keywords: covid-19, vaccination, multiple sclerosis, IgG

Procedia PDF Downloads 138