Search results for: Acute heart attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2667

Search results for: Acute heart attacks

1497 Navigating the VUCA World with a Strong Heart and Mind: How to Build Passion and Character

Authors: Shynn Lim, Ching Tan

Abstract:

The paper presents the PASSION Programme designed by a government school in Singapore, guided by national goals as well as research-based pedagogies that aims to nurture students to become lifelong learners with the strength of character. The design and enactment of the integrated approach to develop in students good character, resilience and social-emotional well-being, future readiness, and active citizenship is guided by a set of principles that amalgamates Biesta’s domains of purposes of education and authentic learning. Data in terms of evidence of students’ learning and students’ feedback were collected, analysed, and suggests that the learning experience benefitted students by boosting their self-confidence, self-directed and collaborative learning skills, as well as empathy.

Keywords: lifelong learning, character and citizenship education, education and career guidance, 21CC, teaching and learning empathy

Procedia PDF Downloads 145
1496 The Nature and Impact of Trojan Horses in Cybersecurity

Authors: Mehrab Faraghti

Abstract:

Trojan horses, a form of malware masquerading as legitimate software, pose significant cybersecurity threats. These malicious programs exploit user trust, infiltrate systems, and can lead to data breaches, financial loss, and compromised privacy. This paper explores the mechanisms through which Trojan horses operate, including delivery methods such as phishing and software vulnerabilities. It categorizes various types of Trojan horses and their specific impacts on individuals and organizations. Additionally, the research highlights the evolution of Trojan threats and the importance of user awareness and proactive security measures. By analyzing case studies of notable Trojan attacks, this study identifies common vulnerabilities that can be exploited and offers insights into effective countermeasures, including behavioral analysis, anomaly detection, and robust incident response strategies. The findings emphasize the need for comprehensive cybersecurity education and the implementation of advanced security protocols to mitigate the risks associated with Trojan horses.

Keywords: Trojan horses, cybersecurity, malware, data breach

Procedia PDF Downloads 8
1495 The Creation of a Yeast Model for 5-oxoproline Accumulation

Authors: Pratiksha Dubey, Praveen Singh, Shantanu Sen Gupta, Anand K. Bachhawat

Abstract:

5-oxoproline (pyroglutamic acid) is a cyclic lactam of glutamic acid. In the cell, it can be produced by several different pathways and is metabolized into glutamate with the help of the 5-oxoprolinase enzyme (OPLAH or OXP1). The inhibition of 5-oxoprolinase enzyme in mammals was found to result in heart failure and is thought to be a consequence of oxidative stress [1]. To analyze the consequences of 5-oxoproline accumulation more clearly, we are generating models for 5-oxoproline accumulation in yeast. The 5-oxoproline accumulation model in yeast is being developed by two different strategies. The first one is by overexpression of the mouse  -glutamylcyclotransferase enzyme. It degrades -glu-met dipeptide into 5-oxoproline and methionine taken by the cell from the medium. The second strategy is by providing high concentration of 5-oxoproline externally to the yeast cells. The intracellular 5-oxoproline levels in both models are being evaluated. In addition, the metabolic and cellular consequences are being investigated.

Keywords: 5-oxoproline, pyroglutamic acid, yeast, genetics

Procedia PDF Downloads 82
1494 Innovative Food Related Modification of the Day-Night Task Demonstrates Impaired Inhibitory Control among Patients with Binge-Purge Eating Disorder

Authors: Sigal Gat-Lazer, Ronny Geva, Dan Ramon, Eitan Gur, Daniel Stein

Abstract:

Introduction: Eating disorders (ED) are common psychopathologies which involve distorted body image and eating disturbances. Binge-purge eating disorders (B/P ED) are characterized by repetitive events of binge eating followed by purges. Patients with B/P ED behavior may be seen as impulsive especially when relate to food stimulation and affective conditions. The current study included innovative modification of the day-night task targeted to assess inhibitory control among patients with B/P ED. Methods: This prospective study included 50 patients with B/P ED during acute phase of illness (T1) upon their admission to specialized ED department in tertiary center. 34 patients repeated the study towards discharge to ambulatory care (T2). Treatment effect was evaluated by BMI and emotional questionnaires regarding depression and anxiety by the Beck Depression Inventory and State Trait Anxiety Inventory questionnaires. Control group included 36 healthy controls with matched demographic parameters who performed both T1 and T2 assessments. The current modification is based on the emotional day-night task (EDNT) which involves five emotional stimulation added to the sun and moon pictures presented to participants. In the current study, we designed the food-emotional modification day night task (F-EDNT) food stimulations of egg and banana which resemble the sun and moon, respectively, in five emotional states (angry, sad, happy, scrambled and neutral). During this computerized task, participants were instructed to push on “day” bottom in response to moon and banana stimulations and on “night” bottom when sun and egg were presented. Accuracy (A) and reaction time (RT) were evaluated and compared between EDNT and F-EDNT as a reflection of participants’ inhibitory control. Results: Patients with B/P ED had significantly improved BMI, depression and anxiety scores on T2 compared to T1 (all p<0.001). Task performance was similar among patients and controls in the EDNT without significant A or RT differences in both T1 and T2. On F-EDNT during T1, B/P ED patients had significantly reduced accuracy in 4/5 emotional stimulation compared to controls: angry (73±25% vs. 84±15%, respectively), sad (69±25% vs. 80±18%, respectively), happy (73±24% vs. 82±18%, respectively) and scrambled (74±24% vs. 84±13%, respectively, all p<0.05). Additionally, patients’ RT to food stimuli was significantly faster compared to neutral ones, in both cry and neutral emotional stimulations (356±146 vs. 400±141 and 378±124 vs. 412±116 msec, respectively, p<0.05). These significant differences between groups as a function of stimulus type were diminished on T2. Conclusion: Having to process food related content, in particular in emotional context seems to be impaired in patients with B/P ED during the acute phase of their illness and elicits greater impulsivity. Innovative modification using such procedures seem to be sensitive to patients’ illness phase and thus may be implemented during screening and follow up through the clinical management of these patients.

Keywords: binge purge eating disorders, day night task modification, eating disorders, food related stimulations

Procedia PDF Downloads 379
1493 Potential Risk Factors Associated with Sole Hemorrhages Causing Lameness in Egyptian Water Buffaloes and Native Breed Cows

Authors: Waleed El-Said Abou El-Amaiem

Abstract:

Sole hemorrhages are considered as a main cause for sub clinical laminitis. In this study we aimed at discussing the most prominent risk factors associated with sole hemorrhages causing lameness in Egyptian water buffaloes and native breed cows. The final multivariate logistic regression model showed, a significant association between sub acute ruminal acidosis (P< 0.05), limb affected (P< 0.05) and weight (P< 0.05) and sole hemorrhages causing lameness in Egyptian water buffaloes and native breed cows. According to our knowledge, this is the first paper to discuss the risk factors associated with sole hemorrhages causing lameness in Egyptian water buffaloes and native breed cows.

Keywords: lameness, buffalo, sole hemorrhages, breed cows

Procedia PDF Downloads 448
1492 Cardiac Arrest after Cardiac Surgery

Authors: Ravshan A. Ibadov, Sardor Kh. Ibragimov

Abstract:

Objective. The aim of the study was to optimize the protocol of cardiopulmonary resuscitation (CPR) after cardiovascular surgical interventions. Methods. The experience of CPR conducted on patients after cardiovascular surgical interventions in the Department of Intensive Care and Resuscitation (DIR) of the Republican Specialized Scientific-Practical Medical Center of Surgery named after Academician V. Vakhidov is presented. The key to the new approach is the rapid elimination of reversible causes of cardiac arrest, followed by either defibrillation or electrical cardioversion (depending on the situation) before external heart compression, which may damage sternotomy. Careful use of adrenaline is emphasized due to the potential recurrence of hypertension, and timely resternotomy (within 5 minutes) is performed to ensure optimal cerebral perfusion through direct massage. Out of 32 patients, cardiac arrest in the form of asystole was observed in 16 (50%), with hypoxemia as the cause, while the remaining 16 (50%) experienced ventricular fibrillation caused by arrhythmogenic reactions. The age of the patients ranged from 6 to 60 years. All patients were evaluated before the operation using the ASA and EuroSCORE scales, falling into the moderate-risk group (3-5 points). CPR was conducted for cardiac activity restoration according to the American Heart Association and European Resuscitation Council guidelines (Ley SJ. Standards for Resuscitation After Cardiac Surgery. Critical Care Nurse. 2015;35(2):30-38). The duration of CPR ranged from 8 to 50 minutes. The ARASNE II scale was used to assess the severity of patients' conditions after CPR, and the Glasgow Coma Scale was employed to evaluate patients' consciousness after the restoration of cardiac activity and sedation withdrawal. Results. In all patients, immediate chest compressions of the necessary depth (4-5 cm) at a frequency of 100-120 compressions per minute were initiated upon detection of cardiac arrest. Regardless of the type of cardiac arrest, defibrillation with a manual defibrillator was performed 3-5 minutes later, and adrenaline was administered in doses ranging from 100 to 300 mcg. Persistent ventricular fibrillation was also treated with antiarrhythmic therapy (amiodarone, lidocaine). If necessary, infusion of inotropes and vasopressors was used, and for the prevention of brain edema and the restoration of adequate neurostatus within 1-3 days, sedation, a magnesium-lidocaine mixture, mechanical intranasal cooling of the brain stem, and neuroprotective drugs were employed. A coordinated effort by the resuscitation team and proper role allocation within the team were essential for effective cardiopulmonary resuscitation (CPR). All these measures contributed to the improvement of CPR outcomes. Conclusion. Successful CPR following cardiac surgical interventions involves interdisciplinary collaboration. The application of an optimized CPR standard leads to a reduction in mortality rates and favorable neurological outcomes.

Keywords: cardiac surgery, cardiac arrest, resuscitation, critically ill patients

Procedia PDF Downloads 52
1491 Experimental Investigation of the Effect of Temperature on A PEM Fuel Cell Performance

Authors: Remzi Şahin, Sadık Ata, Kevser Dincer

Abstract:

In this study, performance of proton exchange membrane (PEM) fuel cell was experimentally investigated. The efficiency of energy conversion in PEM fuel cells is dependent on the catalytic activities of the catalysts used in the cathode and anode of membrane electrode assemblies. Membrane is considered the heart of PEM fuel cells without which they cannot produce electricity. PEM fuel cell performance increased with coating carbon nanotube (CNT). CNT show a unique combination of stiffness, strength, and tenacity compared to other fiber materials which usually lack one or more of these properties. Two different experiments were performed and the membrane performance has been determined by repeating the two experiments that were done before coating. The purposes of these experiments are the observation of power change due to a temperature change in the same voltage value.

Keywords: carbon nanotube (CNT), proton exchange membrane (PEM), fuel cell, spin method

Procedia PDF Downloads 376
1490 Portrayal of Kolkata(the former capital of India) in the ‘Kolkata Trilogy’- A Comparative Study of the Films by Mrinal Sen and Satyajit Ray

Authors: Ronit Chakraborty

Abstract:

Kolkata, formerly known as Calcutta, is the capital of West Bengal state and the former capital of India (1722-1911) of British India. Located at the heart of Hugli river (one of the main channels of Ganges river), the city is the heart of the state, which forms a base for commerce, transport and manufacture. The large and vibrant city thrives amidst the economic, social and political issues arising from the pages of history to the contemporary times. The unique nature, grandeurs, public debates on tea-stalls and obviously the charismatic scenic beauty and heritage keep the city to be criticized in all horizons, across the world. Movies in India are a big source of knowledge, which can be used as a powerful tool for political mobilization and to indirectly communicate with voters since cinema can be used as a tool of propaganda as it has a wide range of public interests. History proves the fact that films produced in India have been apt enough in making public interests be deeply portrayed through their content in a versatile manner. Such is the portrayal of India’s first capital, Kolkata and its ultimate truth being organizingly laid over by the trilogy of two international fame directors-Mrinal Sen and Satyajit Ray, through their ‘magnum opus- the ‘Kolkata trilogy’. Mrinal Sen’s Interview(1971), Calcutta 71(1972), Padatik(The Guerilla Fighter)(1973) and Satyajit Ray’s Pratidwandi (The Adversary)(1970), Seemabaddha(Company Limited)(1971), Jana Aranya(1976). These films picturized the contemporary Kolkata trends, issues and crises arising amidst the political set-up both by the positive and negative variables attributing to the day-to-day happenings of the city. The movies have been set amidst the turmoil that the nation was going through during Indira Gandhi’s declaration of Emergency, resulting from the general sense of disillusionment that prevailed during that time. Ray wasn't affiliated to any political party and his films largely contributed towards the contemporary conditions prevailing in the society. Mrinal Sen, being a Marxist was in constant search of the bitter truth that the society had to offer through his lens under the prevailing darkness through his trilogy. The research paper attempts to widely view and draw a comparative study of the overall description of the city of Kolkata as portrayed by Sen and Ray in their respective trilogies. By the usage of the visual content analysis method, the researcher has explored the six movies; both the trilogies of Mrinal Sen and Satyajit Ray and tried to analyse the differences as well as the similarities pertaining to understand India’s first capital city Kolkata in various dimensions along with its circumference.

Keywords: Kolkata, trilogy, Satyajit Ray, Mrinal Sen, films, comparative study

Procedia PDF Downloads 254
1489 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble

Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi

Abstract:

Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.

Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble

Procedia PDF Downloads 221
1488 Hospice-Shared Care for a Child Patient Supported with Extracorporeal Membrane Oxygenation

Authors: Hsiao-Lin Fang

Abstract:

Every life is precious, and comprehensive care should be provided to individuals who are in the final stages of their lives. Hospice-shared care aims to provide optimal symptom control and palliative care to terminal (cancer) patients through the implementation of shared care, and to support patients and their families in making various physical and psychological adjustments in the face of death. This report examines a 10-year-boy diagnosed with Out-of-Hospital Cardiac Arrest (OHCA). The individual fainted when swimming at school and underwent 31 minutes of cardiopulmonary resuscitation (CPR). While receiving treatment at the hospital, the individual received extracorporeal membrane oxygenation(ECMO) due to unstable hemodynamics. Urgent cardiac catheterization found: Suspect acute fulminant myocarditis or underlying cardiomyopathy with acute decompensation, After the active rescue by the medical team, hemodynamics still showed only mean pressure value. With respect to the patient, interdepartmental hospice-shared care was implemented and a do-not-resuscitate (DNR) order was signed after family discussions were conducted. Assistance and instructions were provided as part of the comfort care process. A farewell gathering attended by the patient’s relatives, friends, teachers, and classmates was organized in an intensive care unit (ICU) in order to look back on the patient’s life and the beautiful memories that were created, as well as to alleviate the sorrow felt by family members, including the patient’s father and sister. For example, the patient was presented with drawings and accompanied to a garden to pick flowers. In this manner, the patient was able to say goodbye before death. Finally, the patient’s grandmother and father participated in the clinical hospice care and post-mortem care processes. A hospice-shared care clinician conducted regular follow-ups and provided care to the family of the deceased, supporting family members through the sorrowful period. Birth, old age, sickness, and death are the natural phases of human life. In recent years, growing attention has been paid to human-centered hospice care. Hospice care is individual holistic care provided by a professional team and it involves the provision of comprehensive care to a terminal patient. Hospice care aims to satisfy the physical, psychological, mental, and social needs of patients and their families. It does not involve the cessation of treatment but rather avoids the exacerbation or extension of the suffering endured by patients, thereby preserving the dignity and quality of life during the end-of-life period. Patients enjoy the company of others as they complete the last phase of their lives, and their families also receive guidance on how they can move on with their own lives after the patient’s death.

Keywords: hospice-shared care, extracorporeal membrane oxygenation (ECMO), hospice-shared care, child patient

Procedia PDF Downloads 140
1487 Frankie Adams’s Sexuality in the Member of the Wedding: Focusing on Musical References

Authors: Saori Iwatsuka

Abstract:

In The Member of the Wedding, Carson McCullers starts with the words, “It happened,” without telling the reader what happens to a twelve-year-old protagonist, Frankie Adams. The reader feels confused and incomprehensible. However, he or she later realizes that the confusing phrase is connected to the scene where Frankie feels “the thing happened” after listening to the melodic lines of jazz and blues. Yet, the reader cannot really comprehend what happens to Frankie and feels puzzled till the end. And the story ends with Frankie’s words, “I am simply mad about . . .” Implying her queer desire for her new friend Mary Littlejohn, McCullers never tells the reader whom Frankie is mad about. Despite McCullers’s ambiguous way of depicting Frankie’s sexuality, recent critics and reviewers have come to discuss her sexuality as anti-heterosexual because Frankie expresses her hatred for Barney, whom she has had some type of sexual encounter, and feels wrong with her brother Jarvis’s wedding. After giving up her sexual desire for Jarvis’s bride, Janice, Frankie changes her name to Frances, becomes engrossed with Michelangelo, and enjoys reading Tennyson’s poetry with Mary. Michelangelo and Tennyson are well-known homosexual artists, which suggests that Frankie has an anti-heterosexual orientation. As McCullers does not precisely describe Frankie’s sexuality, the reader can only assume it by connecting fragmentary descriptions. However, this discussion is more clarified to show Frankie’s sexuality because analyzing the musical references of jazz and blues and interpreting them from a musicological viewpoint will illuminate it. In her works, McCullers frequently uses musical references and descriptions, which have a significant and psychological impact on the protagonists and portrays their bodily reactions to the impact to reveal what the reader cannot see on the surface. Thus, in this story, too, Frankie’s bodily reaction to music is portrayed to cue her feelings. After seeing the chimney swifts, known as monogamous birds, Frankie feels “a jazz sadness,” quivers her nerves and stiffens her heart. After listening to Berenice’s “dark jazz voice,” Frankie feels dizzy and throws a knife because Berenice’s voice jazzes (excites) her heart that beats in her head. Calming herself, she fantasizes that Jarvis, Jarvis’s bride, Janice, and herself are members of “the we of me.” Then in the evening, listening to the blues and jazz being played by a black horn player somewhere in her neighborhood, Frankie realizes “the thing happened” and discovers “a new feeling.” Following the musical references “jazz” and “blues” and examining them from the viewpoint of musicology and terminology leads the reader to explore what “it” is in “it happened” and what her “new feeling” is when “the thing happened” with the blues tune breaking off. Those discussions will illuminate Frankie’s sexuality. As McCullers does not clearly name her sexuality, this paper uses the word queer to express Frankie’s anti-sexual orientation.

Keywords: jazz and blues, musical references, queer sexuality, “we of me”

Procedia PDF Downloads 86
1486 Healthcare Associated Infections in an Intensive Care Unit in Tunisia: Incidence and Risk Factors

Authors: Nabiha Bouafia, Asma Ben Cheikh, Asma Ammar, Olfa Ezzi, Mohamed Mahjoub, Khaoula Meddeb, Imed Chouchene, Hamadi Boussarsar, Mansour Njah

Abstract:

Background: Hospital acquired infections (HAI) cause significant morbidity, mortality, length of stay and hospital costs, especially in the intensive care unit (ICU), because of the debilitated immune systems of their patients and exposure to invasive devices. The aims of this study were to determine the rate and the risk factors of HAI in an ICU of a university hospital in Tunisia. Materials/Methods: A prospective study was conducted in the 8-bed adult medical ICU of a University Hospital (Sousse Tunisia) during 14 months from September 15th, 2015 to November 15th, 2016. Patients admitted for more than 48h were included. Their surveillance was stopped after the discharge from ICU or death. HAIs were defined according to standard Centers for Disease Control and Prevention criteria. Risk factors were analyzed by conditional stepwise logistic regression. The p-value of < 0.05 was considered significant. Results: During the study, 192 patients had admitted for more than 48 hours. Their mean age was 59.3± 18.20 years and 57.1% were male. Acute respiratory failure was the main reason of admission (72%). The mean SAPS II score calculated at admission was 32.5 ± 14 (range: 6 - 78). The exposure to the mechanical ventilation (MV) and the central venous catheter were observed in 169 (88 %) and 144 (75 %) patients, respectively. Seventy-three patients (38.02%) developed 94 HAIs. The incidence density of HAIs was 41.53 per 1000 patient day. Mortality rate in patients with HAIs was 65.8 %( n= 48). Regarding the type of infection, Ventilator Associated Pneumoniae (VAP) and central venous catheter Associated Infections (CVC AI) were the most frequent with Incidence density: 14.88/1000 days of MV for VAP and 20.02/1000 CVC days for CVC AI. There were 5 Peripheral Venous Catheter Associated Infections, 2 urinary tract infections, and 21 other HAIs. Gram-negative bacteria were the most common germs identified in HAIs: Multidrug resistant Acinetobacter Baumanii (45%) and Klebsiella pneumoniae (10.96%) were the most frequently isolated. Univariate analysis showed that transfer from another hospital department (p= 0.001), intubation (p < 10-4), tracheostomy (p < 10-4), age (p=0.028), grade of acute respiratory failure (p=0.01), duration of sedation (p < 10-4), number of CVC (p < 10-4), length of mechanical ventilation (p < 10-4) and length of stay (p < 10-4), were associated to high risk of HAIS in ICU. Multivariate analysis reveals that independent risk factors for HAIs are: transfer from another hospital department: OR=13.44, IC 95% [3.9, 44.2], p < 10-4, duration of sedation: OR= 1.18, IC 95% [1.049, 1.325], p=0.006, high number of CVC: OR=2.78, IC 95% [1.73, 4.487], p < 10-4, and length of stay in ICU: OR= 1.14, IC 95% [1.066,1.22], p < 10-4. Conclusion: Prevention of nosocomial infections in ICUs is a priority of health care systems all around the world. Yet, their control requires an understanding of epidemiological data collected in these units.

Keywords: healthcare associated infections, incidence, intensive care unit, risk factors

Procedia PDF Downloads 369
1485 Fish Catch Composition from Gobind Sagar Reservoir during 2006-2012

Authors: Krishan Lal, Anish Dua

Abstract:

Gobind Sagar Reservoir has been created in Himachal Pradesh, India (31° 25´ N and 76 ° 25´E) by damming River Sutlej at village Bhakra in 1963. The average water spread area of this reservoir is 10,000 hectares. Fishermen have organized themselves in the form of co-operative societies. 26 fisheries co-operative societies were working in Gobind Sagar Reservoir up till 2012. June and July months were observed as closed season, no fishing was done during this period. Proper record maintaining of fish catch was done at different levels by the state fisheries department. Different measures like minimum harvestable size, mesh size regulation and prohibition of illegal fishing etc. were taken for fish conservation. Fishermen were actively involved in the management. Gill nets were used for catching fishes from this reservoir. State fisheries department is realizing 15% royalty of the sold fish. Data used in this paper is about the fish catch during 2006-2012 and were obtained from the state fisheries department, Himachal Pradesh. Catla catla, Labeo rohita, Cirrhinus mrigala, Sperata seenghala, Cyprinus carpio, Tor putitora, Hypophthalmichthys molitrix, Labeo calbasu, Labeo dero and Ctenopharyngodon idella etc., were the fish species exploited for commercial purposes. Total number of individuals of all species caught was 3141236 weighing 5637108.9 kg during 2006-2012. H. molitrix was introduced accidently in this reservoir and was making a good share of fish catch in this reservoir. The annual catch of this species was varying between 161279.6 kg, caught in 2011 and 788030.8 kg caught in 2009. Total numbers of individuals of C. idella caught were 8966 weighing 64320.2 kg. The catch of Cyprinus carpio was varying between 144826.1 kg caught in 2006 and 214480.1 kg caught in 2010. Total catch of Tor putitora was 180263.2 kg during 2006-2012. Total catch of L. dero, S. seenghala and Catla catla remained 100637.4 kg, 75297.8 kg and 561802.9 kg, respectively, during 2006-2012. Maximum fish catch was observed during the months of August (after observing Closed Season). Maximum catch of exotic carps was from Bhakra area of the reservoir which has fewer fluctuations in water levels. The reservoir has been divided into eight beats for administrative purpose, to avoid conflicts between operating fisheries co-operative societies for area of operation. Fish catch was more by co-operative societies operating in the area of reservoir having fewer fluctuations in water level and catch was less by co-operative societies operating in the area of more fluctuations in water level. Species-wise fish catch by different co-operative societies from their allotted area was studied. This reservoir is one of most scientifically managed reservoirs.

Keywords: co-operative societies, fish catch, fish species, reservoir

Procedia PDF Downloads 208
1484 Proactive WPA/WPA2 Security Using DD-WRT Firmware

Authors: Mustafa Kamoona, Mohamed El-Sharkawy

Abstract:

Although the latest Wireless Local Area Network technology Wi-Fi 802.11i standard addresses many of the security weaknesses of the antecedent Wired Equivalent Privacy (WEP) protocol, there are still scenarios where the network security are still vulnerable. The first security model that 802.11i offers is the Personal model which is very cheap and simple to install and maintain, yet it uses a Pre Shared Key (PSK) and thus has a low to medium security level. The second model that 802.11i provide is the Enterprise model which is highly secured but much more expensive and difficult to install/maintain and requires the installation and maintenance of an authentication server that will handle the authentication and key management for the wireless network. A central issue with the personal model is that the PSK needs to be shared with all the devices that are connected to the specific Wi-Fi network. This pre-shared key, unless changed regularly, can be cracked using offline dictionary attacks within a matter of hours. The key is burdensome to change in all the connected devices manually unless there is some kind of algorithm that coordinate this PSK update. The key idea of this paper is to propose a new algorithm that proactively and effectively coordinates the pre-shared key generation, management, and distribution in the cheap WPA/WPA2 personal security model using only a DD-WRT router.

Keywords: Wi-Fi, WPS, TLS, DD-WRT

Procedia PDF Downloads 233
1483 Dynamical Analysis of the Fractional-Order Mathematical Model of Hashimoto’s Thyroiditis

Authors: Neelam Singha

Abstract:

The present work intends to analyze the system dynamics of Hashimoto’s thyroiditis with the assistance of fractional calculus. Hashimoto’s thyroiditis or chronic lymphocytic thyroiditis is an autoimmune disorder in which the immune system attacks the thyroid gland, which gradually results in interrupting the normal thyroid operation. Consequently, the feedback control of the system gets disrupted due to thyroid follicle cell lysis. And, the patient perceives life-threatening clinical conditions like goiter, hyperactivity, euthyroidism, hyperthyroidism, etc. In this work, we aim to obtain the approximate solution to the posed fractional-order problem describing Hashimoto’s thyroiditis. We employ the Adomian decomposition method to solve the system of fractional-order differential equations, and the solutions obtained shall be useful to provide information about the effect of medical care. The numerical technique is executed in an organized manner to furnish the associated details of the progression of the disease and to visualize it graphically with suitable plots.

Keywords: adomian decomposition method, fractional derivatives, Hashimoto's thyroiditis, mathematical modeling

Procedia PDF Downloads 210
1482 Efficacy of CAM Methods for Pain Reduction in Acute Non-specific Lower Back Pain

Authors: John Gaber

Abstract:

Objectives: Complementary and alternative medicine (CAM) is a medicine or health practice that is used alongside conventional practice. Nowadays, CAM is commonly used in North America and other countries, and there is a need for more scientific study to understand its efficacy in different clinical cases. This retrospective study explores the effectiveness and recovery time of CAMs such as cupping, acupuncture, and sotai to treat cases of non-specific low back pain (ANLBP). Methods: We assessed the effectiveness of acupuncture, cupping, and sotai methods on pain and for the treatment of ANLBP. We have compared the magnitude of pain relief using a pain scale assessment method to compare the efficacy of each treatment. The Face Pain Scale assessment was conducted before and 24 hours post-treatment. This retrospective study analyzed 40 patients and categorized them according to the treatment they received. The study included the control group, and the three intervention groups, each with ten patients. Each of the three intervention groups received one of the intervention methods. The first group received the cupping treatment, where cups were placed on the lower back of both sides on points: BL23, BL25, BL26, BL54, BL37, BL40, and BL57. After vacuuming, the cups will stay for 10-15 minutes under infrared light (IR) heating. IR heating is applied by an infrared heat lamp. The second group received the acupuncture treatment, placing needles on points: BL23, BL25, BL26, BL52BL54, GB30, BL37, BL40, BL57, BL59, BL60, and KI3. The needles will be simulated with IR light. The final group received the sotai treatment, a Japanese form of structural realignment that relieves pain, balance, and mobility -moving the body naturally and spontaneously towards a comfortable direction by focusing on the inner feeling and synchronizing with the patient’s breathing. The SPSS statistical software was used to analyze the data using repeated-measures ANOVA. The data collected demonstrates the change in the FPS assessment method value over the course of treatment. p<0.05 was considered statistically significant. Results: In the cupping, acupuncture, and sotai therapy groups, the mean of the FPS value reduced from 8.7±1.2, 8.8±1.2, 9.0±0.8 before the intervention to 3.5±1.4, 4.3±1.4, 3.3±1.3, 24 hours after the intervention, respectively. The data collected shows that the CAM methods included in this study all show improvements in pain relief 24 hours after treatment. Conclusion: Complementary and alternative medicine were developed to treat injuries and illnesses with the whole body in mind, designed to be used in addition to standard treatments. The data above shows that the use of these treatments can have a pain-relieving effect, but more research should be done on the matter, as finding CAM methods that are efficacious is crucial in the landscape of health sciences.

Keywords: acupuncture, cupping, alternative medicine, rehabilitation, acute injury

Procedia PDF Downloads 55
1481 Violence against Women: Exploring Discursive Resistance in the Frames of Gender Violence in South Africa

Authors: Kunle Oparinde, Rachel Matteau-Matsha, Felix Awung

Abstract:

In recent times, the issue of gender-based violence against women in South Africa is prevalent in headlines due to the high rate of attacks directed towards women. Ranging from teenagers to adults, women are continuously targeted indiscriminately in what is seemingly becoming a prolonged cycle in the country. To this end, human rights activists, organisations, and political leaders have managed to somewhat verbally condemn the atrocious acts. Further, interested people in South Africa, through walks and protests, have continued to speak against the swinging violence against women in the country. The thrust in this study is to explore and analyse how discourse (language) has been employed as a resounding voice against gender violence in the country. Through a purposive sampling of materials employed during walks and protests, collected from online sources, we examine how language is being used to combat and confront the issue of gender violence viz-a-viz how it continues to serve as a crucial tool in repelling gender violence.

Keywords: gender, violence, language, discourse, resistance

Procedia PDF Downloads 130
1480 Botnet Detection with ML Techniques by Using the BoT-IoT Dataset

Authors: Adnan Baig, Ishteeaq Naeem, Saad Mansoor

Abstract:

The Internet of Things (IoT) gadgets have advanced quickly in recent years, and their use is steadily rising daily. However, cyber-attackers can target these gadgets due to their distributed nature. Additionally, many IoT devices have significant security flaws in their implementation and design, making them vulnerable to security threats. Hence, these threats can cause important data security and privacy loss from a single attack on network devices or systems. Botnets are a significant security risk that can harm the IoT network; hence, sophisticated techniques are required to mitigate the risk. This work uses a machine learning-based method to identify IoT orchestrated by botnets. The proposed technique identifies the net attack by distinguishing between legitimate and malicious traffic. This article proposes a hyperparameter tuning model to improvise the method to improve the accuracy of existing processes. The results demonstrated an improved and more accurate indication of botnet-based cyber-attacks.

Keywords: Internet of Things, Botnet, BoT-IoT dataset, ML techniques

Procedia PDF Downloads 8
1479 Management of the Asthma Crisis in the Unit of Intensive Care of the General Hospital of Reference of Kinshasa

Authors: Eddy K. Mukadi

Abstract:

The aim of this study was to provide contributing elements to improve the management of the asthma crisis in the intensive care unit of the General Reference Hospital of Kinshasa. This was a descriptive study of all patients in the intensive care unit presenting with the asthma attack during the period from February 5, 2013 to February 5, 2014. The main data were obtained from consultation registry and medical records. A total of 35 patients, 21 of whom were male (majority) compared to 14 female. Average age of patients was 46.48 plus or minus 16.98 with extremes ranging from 21-75 years. The clinic was dominated by dyspnea in 100% of cases, followed by rales with 91.4% of cases. In spite of the control of the crisis obtained after the treatment with B2 mimetic by inhalation was introduced A 91.5%; 88% corticosteroids; 80% oxygen, the therapeutic principle recommended for the management of asthma attacks was not respected in the majority of cases. This is why we suggest that improving the quality of care to be administered to patients will yield more adequate results.

Keywords: asthma crisis, intensive care, general hospital, Kinshasa

Procedia PDF Downloads 230
1478 God in Jesus, a Daimonion in Socrates and Their Respective Divine Communication

Authors: Yip-Mei Loh

Abstract:

Jesus and Socrates shared a remarkable gift; a channel of inner spiritual communication, to afford them truthful guidance in their respective religious discourse. Jesus is part of the Trinity; he is the Son, the Son of God. In mortal life he is the son of a carpenter. He called on all peoples to repent of their sins but fell foul of the authorities and was crucified. Socrates was an ancient Greek philosopher and the son of an artisan. His mission is to drive the Athenians to investigate truth, but he too incurs the displeasure of fellow citizens, to the extent of execution. The accusations made against them centre around, in Jesus’ case, proclaiming himself the Son of God, with the means to pardon, and in Socrates’, that a daimonion, an inner voice, speaks to him in his heart. Jesus talks with God directly through prayer, as the pneuma of God, i.e. to pneuma to hagion, or Holy Spirit, is with him. Socrates seems to enter what we would now think of as a trance-like condition, wherein he communicates with his inner daimonion, who directs him to take courage on the righteous path.

Keywords: daimonion, God, Holy Spirit, pneuma, truth

Procedia PDF Downloads 186
1477 Trauma Scores and Outcome Prediction After Chest Trauma

Authors: Mohamed Abo El Nasr, Mohamed Shoeib, Abdelhamid Abdelkhalik, Amro Serag

Abstract:

Background: Early assessment of severity of chest trauma, either blunt or penetrating is of critical importance in prediction of patient outcome. Different trauma scoring systems are widely available and are based on anatomical or physiological parameters to expect patient morbidity or mortality. Up till now, there is no ideal, universally accepted trauma score that could be applied in all trauma centers and is suitable for assessment of severity of chest trauma patients. Aim: Our aim was to compare various trauma scoring systems regarding their predictability of morbidity and mortality in chest trauma patients. Patients and Methods: This study was a prospective study including 400 patients with chest trauma who were managed at Tanta University Emergency Hospital, Egypt during a period of 2 years (March 2014 until March 2016). The patients were divided into 2 groups according to the mode of trauma: blunt or penetrating. The collected data included age, sex, hemodynamic status on admission, intrathoracic injuries, and associated extra-thoracic injuries. The patients outcome including mortality, need of thoracotomy, need for ICU admission, need for mechanical ventilation, length of hospital stay and the development of acute respiratory distress syndrome were also recorded. The relevant data were used to calculate the following trauma scores: 1. Anatomical scores including abbreviated injury scale (AIS), Injury severity score (ISS), New injury severity score (NISS) and Chest wall injury scale (CWIS). 2. Physiological scores including revised trauma score (RTS), Acute physiology and chronic health evaluation II (APACHE II) score. 3. Combined score including Trauma and injury severity score (TRISS ) and 4. Chest-Specific score Thoracic trauma severity score (TTSS). All these scores were analyzed statistically to detect their sensitivity, specificity and compared regarding their predictive power of mortality and morbidity in blunt and penetrating chest trauma patients. Results: The incidence of mortality was 3.75% (15/400). Eleven patients (11/230) died in blunt chest trauma group, while (4/170) patients died in penetrating trauma group. The mortality rate increased more than three folds to reach 13% (13/100) in patients with severe chest trauma (ISS of >16). The physiological scores APACHE II and RTS had the highest predictive value for mortality in both blunt and penetrating chest injuries. The physiological score APACHE II followed by the combined score TRISS were more predictive for intensive care admission in penetrating injuries while RTS was more predictive in blunt trauma. Also, RTS had a higher predictive value for expectation of need for mechanical ventilation followed by the combined score TRISS. APACHE II score was more predictive for the need of thoracotomy in penetrating injuries and the Chest-Specific score TTSS was higher in blunt injuries. The anatomical score ISS and TTSS score were more predictive for prolonged hospital stay in penetrating and blunt injuries respectively. Conclusion: Trauma scores including physiological parameters have a higher predictive power for mortality in both blunt and penetrating chest trauma. They are more suitable for assessment of injury severity and prediction of patients outcome.

Keywords: chest trauma, trauma scores, blunt injuries, penetrating injuries

Procedia PDF Downloads 420
1476 Detection Method of Federated Learning Backdoor Based on Weighted K-Medoids

Authors: Xun Li, Haojie Wang

Abstract:

Federated learning is a kind of distributed training and centralized training mode, which is of great value in the protection of user privacy. In order to solve the problem that the model is vulnerable to backdoor attacks in federated learning, a backdoor attack detection method based on a weighted k-medoids algorithm is proposed. First of all, this paper collates the update parameters of the client to construct a vector group, then uses the principal components analysis (PCA) algorithm to extract the corresponding feature information from the vector group, and finally uses the improved k-medoids clustering algorithm to identify the normal and backdoor update parameters. In this paper, the backdoor is implanted in the federation learning model through the model replacement attack method in the simulation experiment, and the update parameters from the attacker are effectively detected and removed by the defense method proposed in this paper.

Keywords: federated learning, backdoor attack, PCA, k-medoids, backdoor defense

Procedia PDF Downloads 112
1475 Discursive Psychology of Emotions in Mediation

Authors: Katarzyna Oberda

Abstract:

The aim of this paper is to conceptual emotions in the process of mediation. Although human emotions have been approached from various disciplines and perspectives, e.g. philosophy, linguistics, psychology and neurology, this complex phenomenon still needs further investigation into its discursive character with the an open mind and heart. To attain this aim, the theoretical and practical considerations are taken into account both to contextualize the discursive psychology of emotions in mediation and show how cognitive and linguistic activity expressed in language may lead to the emotional turn in the process of mediation. The double directions of this research into the discursive psychology of emotions have been partially inspired by the evaluative components of mediation forms. In the conducted research, we apply the methodology of discursive psychology with the discourse analysis as a tool. The practical data come from the recorded mediations online. The major findings of the conducted research result in the reconstruction of the emotional transformation model in mediation.

Keywords: discourse analysis, discursive psychology, emotions, mediation

Procedia PDF Downloads 154
1474 Clinical Manifestations, Pathogenesis and Medical Treatment of Stroke Caused by Basic Mitochondrial Abnormalities (Mitochondrial Encephalopathy, Lactic Acidosis, and Stroke-like Episodes, MELAS)

Authors: Wu Liching

Abstract:

Aim This case aims to discuss the pathogenesis, clinical manifestations and medical treatment of strokes caused by mitochondrial gene mutations. Methods Diagnosis of ischemic stroke caused by mitochondrial gene defect by means of "next-generation sequencing mitochondrial DNA gene variation detection", imaging examination, neurological examination, and medical history; this study took samples from the neurology ward of a medical center in northern Taiwan cases diagnosed with acute cerebral infarction as the research objects. Result This case is a 49-year-old married woman with a rare disease, mitochondrial gene mutation inducing ischemic stroke. She has severe hearing impairment and needs to use hearing aids, and has a history of diabetes. During the patient’s hospitalization, the blood test showed that serum Lactate: 7.72 mmol/L, Lactate (CSF) 5.9 mmol/L. Through the collection of relevant medical history, neurological evaluation showed changes in consciousness and cognition, slow response in language expression, and brain magnetic resonance imaging examination showed subacute bilateral temporal lobe infarction, which was an atypical type of stroke. The lineage DNA gene has m.3243A>G known pathogenic mutation point, and its heteroplasmic level is 24.6%. This pathogenic point is located in MITOMAP and recorded as Mitochondrial Encephalopathy, Lactic Acidosis, and Stroke-like episodes (MELAS) , Leigh Syndrome and other disease-related pathogenic loci, this mutation is located in ClinVar and recorded as Pathogenic (dbSNP: rs199474657), so it is diagnosed as a case of stroke caused by a rare disease mitochondrial gene mutation. After medical treatment, there was no more seizure during hospitalization. After interventional rehabilitation, the patient's limb weakness, poor language function, and cognitive impairment have all improved significantly. Conclusion Mitochondrial disorders can also be associated with abnormalities in psychological, neurological, cerebral cortical function, and autonomic functions, as well as problems with internal medical diseases. Therefore, the differential diagnoses cover a wide range and are not easy to be diagnosed. After neurological evaluation, medical history collection, imaging and rare disease serological examination, atypical ischemic stroke caused by rare mitochondrial gene mutation was diagnosed. We hope that through this case, the diagnosis of rare disease mitochondrial gene variation leading to cerebral infarction will be more familiar to clinical medical staff, and this case report may help to improve the clinical diagnosis and treatment for patients with similar clinical symptoms in the future.

Keywords: acute stroke, MELAS, lactic acidosis, mitochondrial disorders

Procedia PDF Downloads 68
1473 VCloud: A Security Framework for VANET

Authors: Wiseborn Manfe Danquah, D. Turgay Altilar

Abstract:

Vehicular Ad-hoc Network (VANET) is an integral component of Intelligent Transport Systems (ITS) that has enjoyed a lot of attention from the research community and the automotive industry. This is mainly due to the opportunities and challenges it presents. Vehicular Ad-hoc Network being a class of Mobile Ad-hoc Networks (MANET) has all the security concerns existing in traditional MANET as well as new security and privacy concerns introduced by the unique vehicular communication environment. This paper provides a survey of the possible attacks in vehicular environment, as well as security and privacy concerns in VANET. It also provides an insight into the development of a comprehensive cloud framework to provide a more robust and secured communication among vehicular nodes and road side units. Our proposal, a Metropolitan Based Public Interconnected Vehicular Cloud (MIVC) infrastructure seeks to provide a more reliable and secured vehicular communication network.

Keywords: mobile Ad-hoc networks, vehicular ad hoc network, cloud, ITS, road side units (RSU), metropolitan interconnected vehicular cloud (MIVC)

Procedia PDF Downloads 354
1472 An Efficient Mitigation Plan to Encounter Various Vulnerabilities in Internet of Things Enterprises

Authors: Umesh Kumar Singh, Abhishek Raghuvanshi, Suyash Kumar Singh

Abstract:

As IoT networks gain popularity, they are more susceptible to security breaches. As a result, it is crucial to analyze the IoT platform as a whole from the standpoint of core security concepts. The Internet of Things relies heavily on wireless networks, which are well-known for being susceptible to a wide variety of attacks. This article provides an analysis of many techniques that may be used to identify vulnerabilities in the software and hardware associated with the Internet of Things (IoT). In the current investigation, an experimental setup is built with the assistance of server computers, client PCs, Internet of Things development boards, sensors, and cloud subscriptions. Through the use of network host scanning methods and vulnerability scanning tools, raw data relating to IoT-based applications and devices may be collected. Shodan is a tool that is used for scanning, and it is also used for effective vulnerability discovery in IoT devices as well as penetration testing. This article presents an efficient mitigation plan for encountering vulnerabilities in the Internet of Things.

Keywords: internet of things, security, privacy, vulnerability identification, mitigation plan

Procedia PDF Downloads 39
1471 Domestic and Foreign Terrorism: Evaluation of the Breeding Ground

Authors: T. K. Hung

Abstract:

Terrorism acts have occurred across both developed and developing states, with well-identified motivation and causes. For many years, terrorism eradication has become a major topic yet only passive actions were taken in response to acts. The linkage between the location of terrorism occurrence and breeding ground is not well-documented, resulting in the passive approach used in counter-terrorism nowadays. The evaluation investigates all post-9/11 terrorism affairs considering their state capacity, safety, ease of border access control, religion diversity, and technology access, to measure the level of breeding ground of the states. Those "weak" states with poor border access control, resources capacity and domestic safety are the best breeding ground for terrorists. Although many attacks were caused by religious motivation, religion diversity does not predict the breeding ground. States with censored technology access, particular computer-mediated communication, predict on the terrorism breeding ground, moderated by the level of breeding ground of neighboring states.

Keywords: counter-terrorism, lethality, security, terrorism

Procedia PDF Downloads 337
1470 A Robust Digital Image Watermarking Against Geometrical Attack Based on Hybrid Scheme

Authors: M. Samadzadeh Mahabadi, J. Shanbehzadeh

Abstract:

This paper presents a hybrid digital image-watermarking scheme, which is robust against varieties of attacks and geometric distortions. The image content is represented by important feature points obtained by an image-texture-based adaptive Harris corner detector. These feature points are extracted from LL2 of 2-D discrete wavelet transform which are obtained by using the Harris-Laplacian detector. We calculate the Fourier transform of circular regions around these points. The amplitude of this transform is rotation invariant. The experimental results demonstrate the robustness of the proposed method against the geometric distortions and various common image processing operations such as JPEG compression, colour reduction, Gaussian filtering, median filtering, and rotation.

Keywords: digital watermarking, geometric distortions, geometrical attack, Harris Laplace, important feature points, rotation, scale invariant feature

Procedia PDF Downloads 500
1469 Air Pollution from Volatile Metals and Acid Gases

Authors: F. Ait Ahsene-Aissat, Y. Kerchiche, Y. Moussaoui, M. Hachemi

Abstract:

Environmental pollution is at the heart of the debate today, the pollutants released into the atmosphere must be measured and reduced to the norms of international releases. The industries pollution is caused by emissions of SO₂, CO and heavy metals in volatile form that must be quantified and monitored. This study presents a qualitative and quantitative analysis However, the collection of volatile heavy metals were performed by active sampling using an isokinetic. SO₂ gas for the maximum is reached for a value of 343 mg / m³, the SO₂ concentration far exceeds the standard releases SO₂ followed by incineration industries in Algeria. the concentration of Cr exceeds 8 times the standard, the Pb concentration in the excess of 6 times, the concentration of Fe has reached very high values exceeding the standard 30 times, the Zn concentration in the excess of 5 times, and the Ni the excess of 4 times and finally that of Cu is almost double of the standard.

Keywords: SO₂, CO, volatiles metals, active sampling isokinetic

Procedia PDF Downloads 294
1468 Modern and Postmodern Marketing Approaches to Consumer Loyalty in Case of Indonesia Real Estate Developer

Authors: Lincoln Panjaitan, Antonius Sumarlin

Abstract:

The development of property businesses in the metropolitan area is growing rapidly forcing big real estate developers to come up with various strategies in winning the heart of consumers. This empirical research is focusing on how the two schools of marketing thoughts; namely, Modern and postmodern marketing employed by the preceding developers to retain consumers’ commitment toward their prospective brands. The data was collected from three different properties of PT. Intiland Tbk using accidental sampling technique. The data of 600 respondents was then put into Structural Equation Model (SEM). The result of the study suggests that both schools of thought can equally produce commitment and loyalty of consumers; however, the difference lays where the loyalty belongs to. The first is more toward developer’s brand and the latter is more toward the co-creation value of the housing community.

Keywords: consumer loyalty, consumer commitment, knowledge sharing platform, marketing mix

Procedia PDF Downloads 336