Search results for: axillary lymph node dissection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 615

Search results for: axillary lymph node dissection

525 Clustering Based and Centralized Routing Table Topology of Control Protocol in Mobile Wireless Sensor Networks

Authors: Mbida Mohamed, Ezzati Abdellah

Abstract:

A strong challenge in the wireless sensor networks (WSN) is to save the energy and have a long life time in the network without having a high rate of loss information. However, topology control (TC) protocols are designed in a way that the network is divided and having a standard system of exchange packets between nodes. In this article, we will propose a clustering based and centralized routing table protocol of TC (CBCRT) which delegates a leader node that will encapsulate a single routing table in every cluster nodes. Hence, if a node wants to send packets to the sink, it requests the information's routing table of the current cluster from the node leader in order to root the packet.

Keywords: mobile wireless sensor networks, routing, topology of control, protocols

Procedia PDF Downloads 245
524 Lymphatic Microvessel Density as a Prognostic Factor in Endometrial Carcinoma

Authors: Noha E. Hassan

Abstract:

Little is known regarding the influence of lymphatic microvessel density (LMVD) on prognosis in endometrial cancer. Prospective study was done in tertiary education and research hospital (Shatby Alexandria university hospital) on sixty patients presented with endometrial carcinoma underwent complete surgical staging. Our aim was to assess the intratumoral and peritumoral Lymphatic microvessel density (LMVD) of endometrial carcinomas identified by immunohistochemical staining using an antibody against podoplanin and to investigate their association with classical clinicopathological factors and prognosis. The result shows that high LMVD was associated with endometroid type of tumors, lesser myometrial, adnexal, cervical and peritoneal infiltration, lower tumor grade and stage and lesser recurrent cases. There is lower lymph node involvement among cases with high intratumoral LMVD and cases of high peritumoral LMVD; that reach statistical significance only among cases of high intratumoral LMVD. No association was seen between LMVD and lymphovascular space invasion. On the other hand, low LMVD was associated with poor outcome. Finally, we can conclude that increased LMVD is associated with favorable prognosis in endometrial cancer patients.

Keywords: endometrial carcinoma, lymphatic microvessel, microvessel density, prognosis

Procedia PDF Downloads 117
523 An Investigation Enhancing E-Voting Application Performance

Authors: Aditya Verma

Abstract:

E-voting using blockchain provides us with a distributed system where data is present on each node present in the network and is reliable and secure too due to its immutability property. This work compares various blockchain consensus algorithms used for e-voting applications in the past, based on performance and node scalability, and chooses the optimal one and improves on one such previous implementation by proposing solutions for the loopholes of the optimally working blockchain consensus algorithm, in our chosen application, e-voting.

Keywords: blockchain, parallel bft, consensus algorithms, performance

Procedia PDF Downloads 150
522 Early Detection of Lymphedema in Post-Surgery Oncology Patients

Authors: Sneha Noble, Rahul Krishnan, Uma G., D. K. Vijaykumar

Abstract:

Breast-Cancer related Lymphedema is a major problem that affects many women. Lymphedema is the swelling that generally occurs in the arms or legs caused by the removal of or damage to lymph nodes as a part of cancer treatment. Treating it at the earliest possible stage is the best way to manage the condition and prevent it from leading to pain, recurrent infection, reduced mobility, and impaired function. So, this project aims to focus on the multi-modal approaches to identify the risks of Lymphedema in post-surgical oncology patients and prevent it at the earliest. The Kinect IR Sensor is utilized to capture the images of the body and after image processing techniques, the region of interest is obtained. Then, performing the voxelization method will provide volume measurements in pre-operative and post-operative periods in patients. The formation of a mathematical model will help in the comparison of values. Clinical pathological data of patients will be investigated to assess the factors responsible for the development of lymphedema and its risks.

Keywords: Kinect IR sensor, Lymphedema, voxelization, lymph nodes

Procedia PDF Downloads 113
521 Security in Resource Constraints Network Light Weight Encryption for Z-MAC

Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy

Abstract:

Wireless sensor network was formed by a combination of nodes, systematically it transmitting the data to their base stations, this transmission data can be easily compromised if the limited processing power and the data consistency from these nodes are kept in mind; there is always a discussion to address the secure data transfer or transmission in actual time. This will present a mechanism to securely transmit the data over a chain of sensor nodes without compromising the throughput of the network by utilizing available battery resources available in the sensor node. Our methodology takes many different advantages of Z-MAC protocol for its efficiency, and it provides a unique key by sharing the mechanism using neighbor node MAC address. We present a light weighted data integrity layer which is embedded in the Z-MAC protocol to prove that our protocol performs well than Z-MAC when we introduce the different attack scenarios.

Keywords: hybrid MAC protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node dataprocessing, Z-MAC

Procedia PDF Downloads 126
520 Event Driven Dynamic Clustering and Data Aggregation in Wireless Sensor Network

Authors: Ashok V. Sutagundar, Sunilkumar S. Manvi

Abstract:

Energy, delay and bandwidth are the prime issues of wireless sensor network (WSN). Energy usage optimization and efficient bandwidth utilization are important issues in WSN. Event triggered data aggregation facilitates such optimal tasks for event affected area in WSN. Reliable delivery of the critical information to sink node is also a major challenge of WSN. To tackle these issues, we propose an event driven dynamic clustering and data aggregation scheme for WSN that enhances the life time of the network by minimizing redundant data transmission. The proposed scheme operates as follows: (1) Whenever the event is triggered, event triggered node selects the cluster head. (2) Cluster head gathers data from sensor nodes within the cluster. (3) Cluster head node identifies and classifies the events out of the collected data using Bayesian classifier. (4) Aggregation of data is done using statistical method. (5) Cluster head discovers the paths to the sink node using residual energy, path distance and bandwidth. (6) If the aggregated data is critical, cluster head sends the aggregated data over the multipath for reliable data communication. (7) Otherwise aggregated data is transmitted towards sink node over the single path which is having the more bandwidth and residual energy. The performance of the scheme is validated for various WSN scenarios to evaluate the effectiveness of the proposed approach in terms of aggregation time, cluster formation time and energy consumed for aggregation.

Keywords: wireless sensor network, dynamic clustering, data aggregation, wireless communication

Procedia PDF Downloads 427
519 Investigation of FoxM1 Gene Expression in Breast Cancer and Its Relationship with miR-216b-5p Expression Level

Authors: Neda Menbari, Ramin Mehdiabadi

Abstract:

Background: breast cancer remains a critical global health issue, constituting a leading cause of cancer-related mortality in women. MicroRNAs (miRs) are natural RNA molecules that play an important role in cellular processes and regulate post-transcriptional gene expression. MiR-216b-5p is a miR that acts as a tumor suppressor. The expression levels of FoxM1 and miR-216b-5p in malignant and control cells have been evaluated by quantitative polymerase chain reaction (qPCR) technique and flow cytometry. Results: the results of this study revealed a significant downregulation of miR-216b-5p in cancerous cells compared to the control MCF-10A cells (P=0.0004). Interestingly, the expression of miR-216b-5p exhibited an inverse relationship with key clinical indicators such as tumor size, grade, and lymph node invasion. Conclusion: The study's findings showed the prognostic value of miR-216b-5p levels in breast cancer, and its reduced expression correlates with unfavorable tumor characteristics. This research recommends performing more studies on the role of FoxM1 and miR-216b-5p in breast cancer pathology which potentially paving the way for targeted therapeutic interventions.

Keywords: breast cancer, gene expression, FOXM1, microRNA

Procedia PDF Downloads 27
518 Performance Comparison of Thread-Based and Event-Based Web Servers

Authors: Aikaterini Kentroti, Theodore H. Kaskalis

Abstract:

Today, web servers are expected to serve thousands of client requests concurrently within stringent response time limits. In this paper, we evaluate experimentally and compare the performance as well as the resource utilization of popular web servers, which differ in their approach to handle concurrency. More specifically, Central Processing Unit (CPU)- and I/O intensive tests were conducted against the thread-based Apache and Go as well as the event-based Nginx and Node.js under increasing concurrent load. The tests involved concurrent users requesting a term of the Fibonacci sequence (the 10th, 20th, 30th) and the content of a table from the database. The results show that Go achieved the best performance in all benchmark tests. For example, Go reached two times higher throughput than Node.js and five times higher than Apache and Nginx in the 20th Fibonacci term test. In addition, Go had the smallest memory footprint and demonstrated the most efficient resource utilization, in terms of CPU usage. Instead, Node.js had by far the largest memory footprint, consuming up to 90% more memory than Nginx and Apache. Regarding the performance of Apache and Nginx, our findings indicate that Hypertext Preprocessor (PHP) becomes a bottleneck when the servers are requested to respond by performing CPU-intensive tasks under increasing concurrent load.

Keywords: apache, Go, Nginx, node.js, web server benchmarking

Procedia PDF Downloads 74
517 Avoiding Packet Drop for Improved through Put in the Multi-Hop Wireless N/W

Authors: Manish Kumar Rajak, Sanjay Gupta

Abstract:

Mobile ad hoc networks (MANETs) are infrastructure less and intercommunicate using single-hop and multi-hop paths. Network based congestion avoidance which involves managing the queues in the network devices is an integral part of any network. QoS: A set of service requirements that are met by the network while transferring a packet stream from a source to a destination. Especially in MANETs, packet loss results in increased overheads. This paper presents a new algorithm to avoid congestion using one or more queue on nodes and corresponding flow rate decided in advance for each node. When any node attains an initial value of queue then it sends this status to its downstream nodes which in turn uses the pre-decided flow rate of packet transfer to its upstream nodes. The flow rate on each node is adjusted according to the status received from its upstream nodes. This proposed algorithm uses the existing infrastructure to inform to other nodes about its current queue status.

Keywords: mesh networks, MANET, packet count, threshold, throughput

Procedia PDF Downloads 450
516 Investigating Message Timing Side Channel Attacks on Networks on Chip with Ring Topology

Authors: Mark Davey

Abstract:

Communications on a Network on Chip (NoC) produce timing information, i.e., network injection delays, packet traversal times, throughput metrics, and other attributes relating to the traffic being sent across the chip. The security requirements of a platform encompass each node to operate with confidentiality, integrity, and availability (ISO 27001). Inherently, a shared NoC interconnect is exposed to analysis of timing patterns created by contention for the network components, i.e., links and switches/routers. This phenomenon is defined as information leakage, which represents a ‘side channel’ of sensitive information that can be correlated to platform activity. The key algorithm presented in this paper evaluates how an adversary can control two platform neighbouring nodes of a target node to obtain sensitive information about communication with the target node. The actual information obtained is the period value of a periodic task communication. This enacts a breach of the expected confidentiality of a node operating in a multiprocessor platform. An experimental investigation of the side channel is undertaken to judge the level and significance of inferred information produced by access times to the NoC. Results are presented with a series of expanding task set scenarios to evaluate the efficacy of the side channel detection algorithm as the network load increases.

Keywords: embedded systems, multiprocessor, network on chip, side channel

Procedia PDF Downloads 52
515 Analytic Hierarchy Process

Authors: Hadia Rafi

Abstract:

To make any decision in any work/task/project it involves many factors that needed to be looked. The analytic Hierarchy process (AHP) is based on the judgments of experts to derive the required results this technique measures the intangibles and then by the help of judgment and software analysis the comparisons are made which shows how much a certain element/unit leads another. AHP includes how an inconsistent judgment should be made consistent and how the judgment should be improved when possible. The Priority scales are obtained by multiplying them with the priority of their parent node and after that they are added.

Keywords: AHP, priority scales, parent node, software analysis

Procedia PDF Downloads 384
514 Pulmonary Hydatid Cyst in a 13-Year-Old Child: A Case Report

Authors: Ghada Esheba, Bayan Hafiz, Ashwaq Al-Qarni, Abdulelah AlMalki, Esraa Kaheel

Abstract:

Hydatid disease is caused by genus Echinococcus, it is transmitted to human through sheep and cattle. People who lived in an endemic area should be suspected to have the disease. Pulmonary hydatid disease can be presented by respiratory manifestations as in our case. We report a case of child, 13 years old, who was presented by shortness of breath and non-productive cough 2 months ago. The patient had an attack of hemoptysis 3 months ago but there is no history of fever, other constitutional symptoms or any medical illness. The patient has had a close contact with a horse. On examination, the patient was oriented and vitally stable. Both side of chest were moving equally with decrease air entry on the left side of the chest. Cervical lymph node enlargement was also detected. The case was provisionally diagnosed as tuberculosis. The x-ray was normal, while CT scan showed two cysts in the left side. The patient was treated surgically with resection of both cysts without lobectomy. Broncho-alveolar lavage was done and together with plural effusion and both cysts were sent for histopathology. The patient received the following medication: albendazole 200MG/BID/Orally for 30 days and Cefuroxime 250MG/Q12H/Orally for 10 days.

Keywords: Echinococcus granulosus, hydatid disease, pediatrics, pulmonary hydatid cyst

Procedia PDF Downloads 254
513 ZigBee Wireless Sensor Nodes with Hybrid Energy Storage System Based on Li-Ion Battery and Solar Energy Supply

Authors: Chia-Chi Chang, Chuan-Bi Lin, Chia-Min Chan

Abstract:

Most ZigBee sensor networks to date make use of nodes with limited processing, communication, and energy capabilities. Energy consumption is of great importance in wireless sensor applications as their nodes are commonly battery-driven. Once ZigBee nodes are deployed outdoors, limited power may make a sensor network useless before its purpose is complete. At present, there are two strategies for long node and network lifetime. The first strategy is saving energy as much as possible. The energy consumption will be minimized through switching the node from active mode to sleep mode and routing protocol with ultra-low energy consumption. The second strategy is to evaluate the energy consumption of sensor applications as accurately as possible. Erroneous energy model may render a ZigBee sensor network useless before changing batteries. In this paper, we present a ZigBee wireless sensor node with four key modules: a processing and radio unit, an energy harvesting unit, an energy storage unit, and a sensor unit. The processing unit uses CC2530 for controlling the sensor, carrying out routing protocol, and performing wireless communication with other nodes. The harvesting unit uses a 2W solar panel to provide lasting energy for the node. The storage unit consists of a rechargeable 1200 mAh Li-ion battery and a battery charger using a constant-current/constant-voltage algorithm. Our solution to extend node lifetime is implemented. Finally, a long-term sensor network test is used to exhibit the functionality of the solar powered system.

Keywords: ZigBee, Li-ion battery, solar panel, CC2530

Procedia PDF Downloads 352
512 Loading and Unloading Scheduling Problem in a Multiple-Multiple Logistics Network: Modelling and Solving

Authors: Yasin Tadayonrad

Abstract:

Most of the supply chain networks have many nodes starting from the suppliers’ side up to the customers’ side that each node sends/receives the raw materials/products from/to the other nodes. One of the major concerns in this kind of supply chain network is finding the best schedule for loading /unloading the shipments through the whole network by which all the constraints in the source and destination nodes are met and all the shipments are delivered on time. One of the main constraints in this problem is loading/unloading capacity in each source/ destination node at each time slot (e.g., per week/day/hour). Because of the different characteristics of different products/groups of products, the capacity of each node might differ based on each group of products. In most supply chain networks (especially in the Fast-moving consumer goods industry), there are different planners/planning teams working separately in different nodes to determine the loading/unloading timeslots in source/destination nodes to send/receive the shipments. In this paper, a mathematical problem has been proposed to find the best timeslots for loading/unloading the shipments minimizing the overall delays subject to respecting the capacity of loading/unloading of each node, the required delivery date of each shipment (considering the lead-times), and working-days of each node. This model was implemented on python and solved using Python-MIP on a sample data set. Finally, the idea of a heuristic algorithm has been proposed as a way of improving the solution method that helps to implement the model on larger data sets in real business cases, including more nodes and shipments.

Keywords: supply chain management, transportation, multiple-multiple network, timeslots management, mathematical modeling, mixed integer programming

Procedia PDF Downloads 73
511 Posterior Circulation Ischemic Strokes in Olympic and Division 1 Wrestlers

Authors: Christen Kutz

Abstract:

Objective: The aim of this study is to review a case series of 4 high-level Olympic and Division 1 wrestlers who experienced debilitating posterior circulation ischemic strokes during or after a competitive wrestling event and to identify risk factors, etiology and outcomes of stroke in young, healthy elite wrestlers. Background: Stroke occurs in one in 10,000 people under age 64. In young adults, the most common causes of stroke are cardiac embolism, hypercoagulable state, and vasculopathy. One-third of these strokes occur in young, fit individuals. There is little published literature about ischemic strokes that occur in wrestlers. Based on the nature of wrestling, the risk of injury or dissection to neurovascular structures may be a possible theory, but very few case reports exist. Methodology: 4 wrestlers under the age of 44 with a known history of ischemic stroke participated in individual interviews either in person or virtually. Each of the wrestlers provided their demographic information, wrestling background, clinical presentation at the time of stroke, imaging results, identification of potential risk factors, acute treatment and recovery. Results: 3 white male Division 1 wrestlers (2 Lehigh University, 1 Lock Haven University) and 1 black male 2008 Olympian experienced posterior circulation strokes. Case #1 felt a “pop” while wrestling (lateral medullary infarct, possible vertebral artery dissection); Case #2 awoke with severe vertigo, sweating, and vomiting after wrestling the previous day (left cerebellar infarct, (+) protein S deficiency); Case #3 severe vertigo, ataxia, and sensation of impending doom after wrestling earlier that week (left cerebellar infarct, hypoplastic left vertebral artery (+) anti-cardiolipin antibodies). Case #4 severe dizziness, confusion (left cerebellar stroke, vertebral artery dissection, small PFO). Conclusion: 3 wrestlers were started on anti-platelet therapy, risk factors were modified, and returned to their sport. 1 wrestler was placed on anti-coagulation and retired from competition.

Keywords: stroke, wrestling, Olympic, posterior circulation

Procedia PDF Downloads 52
510 Case Report: Clinical Improvement of Forbrain Neurologic Signs in 3- Month- Old Persian Mastiff Dog with Calvarial Hyperostosis Syndrome after Corticosteroid, Antiepileptic and Antibiotic Therapy

Authors: Hamidreza Jahani, Zahra Salehzadeh, Ehsan Amini, Mohsen Tohidifar

Abstract:

Calvarial Hyperostosis Syndrome (CHS) is a benign bone disease of the skull. It is a non-neoplastic and proliferative bone disease, and the main feature of the disease is progressive and asymmetrical bone involvement. CHS is mostly reported in young male and female bullmastiff dogs and less frequently in other breeds. The etiology of CHS is unknown. This is the first case report of CHS in Iran. A 3-month-old male Persian Mastiff was presented with chief complaints of multiple episodes of seizure, pacing, bizarre behavior, delayed growth, head pressing, and difficulty in opening the mouth. Central blindness and open fontanelles were observed in clinical examination. No abnormality was found in the complete blood count and routine blood biochemical tests. CT scan findings include cortical thickening of frontal and parietal bones and enlargement of the left retropharyngeal lymph node. For treatment, oral clindamycin for two weeks, prednisolone and phenobarbital for one month, respectively, were administrated, and the case showed improvement after a week and recovered after one month.

Keywords: calvarial hyperostosis, Persian Mastiff, frontal bone, seizure

Procedia PDF Downloads 117
509 Determination of Neighbor Node in Consideration of the Imaging Range of Cameras in Automatic Human Tracking System

Authors: Kozo Tanigawa, Tappei Yotsumoto, Kenichi Takahashi, Takao Kawamura, Kazunori Sugahara

Abstract:

An automatic human tracking system using mobile agent technology is realized because a mobile agent moves in accordance with a migration of a target person. In this paper, we propose a method for determining the neighbor node in consideration of the imaging range of cameras.

Keywords: human tracking, mobile agent, Pan/Tilt/Zoom, neighbor relation

Procedia PDF Downloads 496
508 The Application of the Analytic Basis Function Expansion Triangular-z Nodal Method for Neutron Diffusion Calculation

Authors: Kunpeng Wang, Hongchun, Wu, Liangzhi Cao, Chuanqi Zhao

Abstract:

The distributions of homogeneous neutron flux within a node were expanded into a set of analytic basis functions which satisfy the diffusion equation at any point in a triangular-z node for each energy group, and nodes were coupled with each other with both the zero- and first-order partial neutron current moments across all the interfaces of the triangular prism at the same time. Based this method, a code TABFEN has been developed and applied to solve the neutron diffusion equation in a complicated geometry. In addition, after a series of numerical derivation, one can get the neutron adjoint diffusion equations in matrix form which is the same with the neutron diffusion equation; therefore, it can be solved by TABFEN, and the low-high scan strategy is adopted to improve the efficiency. Four benchmark problems are tested by this method to verify its feasibility, the results show good agreement with the references which demonstrates the efficiency and feasibility of this method.

Keywords: analytic basis function expansion method, arbitrary triangular-z node, adjoint neutron flux, complicated geometry

Procedia PDF Downloads 423
507 Comparative Hematological Analysis of Blood Profile in Experimentally Infected with Trichinella spiralis, Trichinella britovi and Trichinella pseudospiralis Mice

Authors: Valeria T. Dilcheva, Svetlozara L. Petkova, Ivelin Vladov

Abstract:

Trichinellosis is a food-borne parasitic disease caused by nematodes of the genus Trichinella which are zoonotic parasites with cosmopolitan distribution and major socio-economic importance. Human infection is acquired through consumption of undercooked meat from domestic or wild animal. Penetration of Trichinella larvae into striated skeletal muscle cells results in ultrastructural and metabolic changes. Migration of larvae causes the typical symptoms and signs of the disease. The severity of the symptoms depends on the number of ingested Trichinella larvae and the immune response of the host. Eosinophilia is present, with few exceptions, in most cases of human trichinellosis, inasmuch as it is the earliest and most important host response. Even in human asymptomatic cases, increases in eosinophilia of up to 15% have been observed. Eosinophilia appears at an early stage of infection between the second and fifth weeks of infection. By 2005 it was considered that only two species of Trichinella genus were found in the country. After routine trichinelloscopy procedure disseminated single muscle larvae in samples of wild boars and badger were PCR-identified as T. pseudospiralis. The study aimed to observed hematological changes occurring during experimentally induced infection with Trichinella spiralis, T. britovi and T. pseudospiralis in mice. We performed hematological blood profile, tracking 15 blood indicators. In statistical analysis made by Two-way ANOVA, there were significant differences of HGB, MCHC, PLT, Lymph%, Gran% in all three types of trichinellosis compared to control animals. Capsule-forming T. spiralis showed statistically significant differences in HGB, MCHC, Lymph% and PLT compared to the other two species. Non capsule-forming T. pseudospiralis showed statistically significant differences in Lymph%, Gran% relative to the control and in Gran% relative to T. spiralis. It appears rather substantial the process of capsule formation for prolonged immune response and retention of high content of percentage of lymphocytes(Lymph%) and low of granulocyte(Gran%) in T. pseudospiralis, which is contrary to studies for T. spiralis and eosinophilia. Studies and analyzes of some specific blood profile parameters can provide additional data in favor of early diagnosis and adequate treatment as well as provide a better understanding of acute and chronic trichinosis.

Keywords: hematological test, T. britovi, T. spiralis, T. pseudospiralis

Procedia PDF Downloads 153
506 A Hybrid Model for Secure Protocol Independent Multicast Sparse Mode and Dense Mode Protocols in a Group Network

Authors: M. S. Jimah, A. C. Achuenu, M. Momodu

Abstract:

Group communications over public infrastructure are prone to a lot of security issues. Existing network protocols like Protocol Independent Multicast Sparse Mode (PIM SM) and Protocol Independent Multicast Dense Mode (PIM DM) do not have inbuilt security features. Therefore, any user or node can easily access the group communication as long as the user can send join message to the source nodes, the source node then adds the user to the network group. In this research, a hybrid method of salting and hashing to encrypt information in the source and stub node was designed, and when stub nodes need to connect, they must have the appropriate key to join the group network. Object oriented analysis design (OOAD) was the methodology used, and the result shows that no extra controlled bandwidth overhead cost was added by encrypting and the hybrid model was more securing than the existing PIM SM, PIM DM and Zhang secure PIM SM.

Keywords: group communications, multicast, PIM SM, PIM DM, encryption

Procedia PDF Downloads 140
505 Comparison of the Curvizigzag Incision with Transverse Stewart Incision in Women Undergoing Modified Radical Mastectomy for Carcinoma Breast

Authors: John Joseph S. Martis, Rohanchandra R. Gatty, Aaron Jose Fernandes, Rahul P. Nambiar

Abstract:

Introduction: Surgery for breast cancer is either mastectomy or breast conservation surgery. The most commonly used incision for modified radical mastectomy is the transverse Stewart incision. But this incision may have the disadvantage of causing disparity between the closure lines of superior and inferior skin flaps in mastectomy and can cause overhanging of soft tissue below and behind the axilla. The curvizigzag incision, on principle, may help in this regard and can prevent scar migration beyond the anterior axillary line. This study aims to compare the two incisions in this regard. Methods: 100 patients with cancer of breast were included in the study after satisfying inclusion and exclusion criteria. They underwent surgery at Father Muller Medical College, Mangalore, India, between November 2019 to September 2021. The patients were divided into two groups. Group A patients were subjected to modified radical mastectomy with curvizigzag incision and group B patients with transverse Stewart incision. Results: Seroma on postoperative day1, day 2 was 0% in both the groups. Seroma on postoperative day 30 was present in 14% of patients in group B. 60% of patients in group B had sag of soft tissue below and behind the axilla, and none of the patients in group A had this problem. In 64% of the patients in group B, the incision crossed the anterior axillary fold, 64% of the patients in group B had tension in the incision site while approximation of the skin flaps. Conclusion: Curvizigzag incision is statistically better with lesser complications when compared to the transverse Stewart incision for modified radical mastectomy for carcinoma breast.

Keywords: breast cancer, curvizigzag incision, transverse Stewart incision, seroma, modified radical mastectomy

Procedia PDF Downloads 72
504 The First Trocar Placement After Multiple Open Abdominal Surgeries in Children: A Preliminary Report

Authors: Öykü Barutçu, Mehmet Özgür Kuzdan

Abstract:

Aim: Laparoscopy is very risky in patients undergoing, multiple open abdominal surgeries. The aim of this study, to define a safe method for the first trocar placement in children with a history of multiple open abdominal surgeries. Methods: Children who underwent laparoscopic surgery between March 2019 and April 2020 with a history of three or more open abdominal surgeries were included in the retrospective study. Patient information was obtained from the hospital automation system. Ultrasonography was used to determine the location of adhesions preoperatively. The first trocar was placed according to ultrasonography findings, using the Hasson technique to create an air pocket with finger dissection. The patient's preoperative, perioperative, and postoperative findings are reported. Results: A total of 10 patients were included in the study. The median number of operations before laparoscopy was three. The most common site for the first trocar entry was Palmer's point (40%). No mortality or morbidity was observed amongst any patients. The average number of adhesions detected by USG and observed on laparoscopy were significantly positively correlated. Conclusion: In children with a history of multiple abdominal surgeries, abdominal wall ultrasonography for visualization of adhesions and finger dissection for the formation of an air pocket appears to be a safe method for the first trocar insertion.

Keywords: abdominal wall, child, laparoscopy, ultrasonography

Procedia PDF Downloads 86
503 An AI-Based Dynamical Resource Allocation Calculation Algorithm for Unmanned Aerial Vehicle

Authors: Zhou Luchen, Wu Yubing, Burra Venkata Durga Kumar

Abstract:

As the scale of the network becomes larger and more complex than before, the density of user devices is also increasing. The development of Unmanned Aerial Vehicle (UAV) networks is able to collect and transform data in an efficient way by using software-defined networks (SDN) technology. This paper proposed a three-layer distributed and dynamic cluster architecture to manage UAVs by using an AI-based resource allocation calculation algorithm to address the overloading network problem. Through separating services of each UAV, the UAV hierarchical cluster system performs the main function of reducing the network load and transferring user requests, with three sub-tasks including data collection, communication channel organization, and data relaying. In this cluster, a head node and a vice head node UAV are selected considering the Central Processing Unit (CPU), operational (RAM), and permanent (ROM) memory of devices, battery charge, and capacity. The vice head node acts as a backup that stores all the data in the head node. The k-means clustering algorithm is used in order to detect high load regions and form the UAV layered clusters. The whole process of detecting high load areas, forming and selecting UAV clusters, and moving the selected UAV cluster to that area is proposed as offloading traffic algorithm.

Keywords: k-means, resource allocation, SDN, UAV network, unmanned aerial vehicles

Procedia PDF Downloads 84
502 Secure Network Coding against Content Pollution Attacks in Named Data Network

Authors: Tao Feng, Xiaomei Ma, Xian Guo, Jing Wang

Abstract:

Named Data Network (NDN) is one of the future Internet architecture, all nodes (i.e., hosts, routers) are allowed to have a local cache, used to satisfy incoming requests for content. However, depending on caching allows an adversary to perform attacks that are very effective and relatively easy to implement, such as content pollution attack. In this paper, we use a method of secure network coding based on homomorphic signature system to solve this problem. Firstly ,we use a dynamic public key technique, our scheme for each generation authentication without updating the initial secret key used. Secondly, employing the homomorphism of hash function, intermediate node and destination node verify the signature of the received message. In addition, when the network topology of NDN is simple and fixed, the code coefficients in our scheme are generated in a pseudorandom number generator in each node, so the distribution of the coefficients is also avoided. In short, our scheme not only can efficiently prevent against Intra/Inter-GPAs, but also can against the content poisoning attack in NDN.

Keywords: named data networking, content polloution attack, network coding signature, internet architecture

Procedia PDF Downloads 313
501 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks

Authors: Walid Abdallah, Noureddine Boudriga

Abstract:

Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.

Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based

Procedia PDF Downloads 639
500 Fault-Detection and Self-Stabilization Protocol for Wireless Sensor Networks

Authors: Ather Saeed, Arif Khan, Jeffrey Gosper

Abstract:

Sensor devices are prone to errors and sudden node failures, which are difficult to detect in a timely manner when deployed in real-time, hazardous, large-scale harsh environments and in medical emergencies. Therefore, the loss of data can be life-threatening when the sensed phenomenon is not disseminated due to sudden node failure, battery depletion or temporary malfunctioning. We introduce a set of partial differential equations for localizing faults, similar to Green’s and Maxwell’s equations used in Electrostatics and Electromagnetism. We introduce a node organization and clustering scheme for self-stabilizing sensor networks. Green’s theorem is applied to regions where the curve is closed and continuously differentiable to ensure network connectivity. Experimental results show that the proposed GTFD (Green’s Theorem fault-detection and Self-stabilization) protocol not only detects faulty nodes but also accurately generates network stability graphs where urgent intervention is required for dynamically self-stabilizing the network.

Keywords: Green’s Theorem, self-stabilization, fault-localization, RSSI, WSN, clustering

Procedia PDF Downloads 52
499 Nasopharyngeal Cancer in Children and Adolescents: Experience of Emir Abdelkader Cancer Center of Oran Algeria

Authors: Taleb L., Benarbia M., Brahmi M., Belmiloud H., Boukerche A.

Abstract:

Introduction and purpose of the study: Cavum cancer in children and adolescents is rare and represents 8% of all nasopharyngeal cancers treated in our department. Our objective is to study its epidemiological, clinical, therapeutic, and evolutionary particularities. Material and methods: Retrospective study of 39 patients under 20 years old, treated for undifferentiated non-metastatic carcinoma of the nasopharynx at the Emir Abdelkader Cancer Center between 2014 and 2020. Results and statistical analysis: Median age was 14 years [7-19 years], with a sex ratio of 2.9. The median time to diagnosis was 5.6 months [1 to 14 months], the circumstances of the discovery of which were dominated by lymph node syndrome in 43.6% of cases (n=17) followed by a rhinological syndrome in 30.8% of cases (n=13). The tumor stage was T1 for two patients (5.1%), T2 for 8 (20.5%), T3 for 9 (23.1%), T4 for 20 (51.3%), N0 for 2 (5 .1%) N1 for 4 (10.3%), N2 for 28 (71.8%) and N3 for 5 (12.8%). All patients received induction chemotherapy followed by concomitant radiotherapy with cisplatin. The dose of irradiation delivered to the cavum and adenopathies was 66 Gy with fractionation of 2 Gy per session in 69.2% of cases (n=27) and 1.8 Gy in 30.8% of cases (n=12). With a median follow-up of 51 months (15 to 97 months), the locoregional, metastatic, specific, and overall relapse-free survival rates at five years were 91.1%, 73.5%, 66.1%, and 68.4, respectively. Conclusion: Chemotherapy and radiotherapy treatment of cavum cancer in children and adolescents has allowed excellent locoregional control despite the advanced stage of the disease. However, the frequency of metastatic relapses could justify the possible use of systemic maintenance treatment.

Keywords: cancer, nasopharynx, radiotherapy, chemotherapy, survival

Procedia PDF Downloads 90
498 A Cooperative Space-Time Transmission Scheme Based On Symbol Combinations

Authors: Keunhong Chae, Seokho Yoon

Abstract:

This paper proposes a cooperative Alamouti space time transmission scheme with low relay complexity for the cooperative communication systems. In the proposed scheme, the source node combines the data symbols to construct the Alamouti-coded form at the destination node, while the conventional scheme performs the corresponding operations at the relay nodes. In simulation results, it is shown that the proposed scheme achieves the second order cooperative diversity while maintaining the same bit error rate (BER) performance as that of the conventional scheme.

Keywords: Space-time transmission, cooperative communication system, MIMO.

Procedia PDF Downloads 328
497 Wireless Transmission of Big Data Using Novel Secure Algorithm

Authors: K. Thiagarajan, K. Saranya, A. Veeraiah, B. Sudha

Abstract:

This paper presents a novel algorithm for secure, reliable and flexible transmission of big data in two hop wireless networks using cooperative jamming scheme. Two hop wireless networks consist of source, relay and destination nodes. Big data has to transmit from source to relay and from relay to destination by deploying security in physical layer. Cooperative jamming scheme determines transmission of big data in more secure manner by protecting it from eavesdroppers and malicious nodes of unknown location. The novel algorithm that ensures secure and energy balance transmission of big data, includes selection of data transmitting region, segmenting the selected region, determining probability ratio for each node (capture node, non-capture and eavesdropper node) in every segment, evaluating the probability using binary based evaluation. If it is secure transmission resume with the two- hop transmission of big data, otherwise prevent the attackers by cooperative jamming scheme and transmit the data in two-hop transmission.

Keywords: big data, two-hop transmission, physical layer wireless security, cooperative jamming, energy balance

Procedia PDF Downloads 461
496 Energy-Efficient Contact Selection Method for CARD in Wireless Ad-Hoc Networks

Authors: Mehdi Assefi, Keihan Hataminezhad

Abstract:

One of the efficient architectures for exploring the resources in wireless ad-hoc networks is contact-based architecture. In this architecture, each node assigns a unique zone for itself and each node keeps all information from inside the zone, as well as some from outside the zone, which is called contact. Reducing the overlap between different zones of a node and its contacts increases its performance, therefore Edge Method (EM) is designed for this purpose. Contacts selected by EM do not have any overlap with their sources, but for choosing the contact a vast amount of information must be transmitted. In this article, we will offer a new protocol for contact selection, which is called PEM. The objective would be reducing the volume of transmitted information, using Non-Uniform Dissemination Probabilistic Protocols. Consumed energy for contact selection is a function of the size of transmitted information between nodes. Therefore, by reducing the content of contact selection message using the PEM will decrease the consumed energy. For evaluation of the PEM we applied the simulation method. Results indicated that PEM consumes less energy compared to EM, and by increasing the number of nodes (level of nodes), performance of PEM will improve in comparison with EM.

Keywords: wireless ad-hoc networks, contact selection, method for CARD, energy-efficient

Procedia PDF Downloads 268