Search results for: Acute heart attacks
1437 Implementation of Clinical Monitoring System of Physiological Parameters
Authors: Abdesselam Babouri, Ahcène Lemzadmi, M Rahmane, B. Belhadi, N. Abouchi
Abstract:
Medical monitoring aims at monitoring and remotely controlling the vital physiological parameters of the patient. The physiological sensors provide repetitive measurements of these parameters in the form of electrical signals that vary continuously over time. Various measures allow informing us about the health of the person's physiological data (weight, blood pressure, heart rate or specific to a disease), environmental conditions (temperature, humidity, light, noise level) and displacement and movements (physical efforts and the completion of major daily living activities). The collected data will allow monitoring the patient’s condition and alerting in case of modification. They are also used in the diagnosis and decision making on medical treatment and the health of the patient. This work presents the implementation of a monitoring system to be used for the control of physiological parameters.Keywords: clinical monitoring, physiological parameters, biomedical sensors, personal health
Procedia PDF Downloads 4711436 Telogen Effluvium: A Modern Hair Loss Concern and the Interventional Strategies
Authors: Chettyparambil Lalchand Thejalakshmi, Sonal Sabu Edattukaran
Abstract:
Hair loss is one of the main issues that contemporary society is dealing with. It can be attributable to a wide range of factors, listing from one's genetic composition and the anxiety we experience on a daily basis. Telogen effluvium [TE] is a condition that causes temporary hair loss after a stressor that might shock the body and cause the hair follicles to temporarily rest, leading to hair loss. Most frequently, women are the ones who bring up these difficulties. Extreme illness or trauma, an emotional or important life event, rapid weight loss and crash dieting, a severe scalp skin problem, a new medication, or ceasing hormone therapy are examples of potential causes. Men frequently do not notice hair thinning with time, but women with long hair may be easily identified when shedding, which can occasionally result in bias because women tend to be more concerned with aesthetics and beauty standards of the society, and approach frequently with the concerns .The woman, who formerly possessed a full head of hair, is worried about the hair loss from her scalp . There are several cases of hair loss reported every day, and Telogen effluvium is said to be the most prevalent one of them all without any hereditary risk factors. While the patient has loss in hair volume, baldness is not the result of this problem . The exponentially growing Dermatology and Aesthetic medical division has discovered that this problem is the most common and also the easiest to cure since it is feasible for these people to regrow their hair, unlike those who have scarring alopecia, in which the follicle itself is damaged and non-viable. Telogen effluvium comes in two different forms: acute and chronic. Acute TE occurs in all the age groups with a hair loss of less than three months, while chronic TE is more common in those between the ages of 30 and 60 with a hair loss of more than six months . Both kinds are prevalent throughout all age groups, regardless of the predominance. It takes between three and six months for the lost hair to come back, although this condition is readily reversed by eliminating stresses. After shedding their hair, patients frequently describe having noticeable fringes on their forehead. The current medical treatments for this condition include topical corticosteroids, systemic corticosteroids, minoxidil and finasteride, CNDPA (caffeine, niacinamide, panthenol, dimethicone, and an acrylate polymer) .Individual terminal hair growth was increased by 10% as a result of the innovative intervention CNDPA. Botulinum Toxin A, Scalp Micro Needling, Platelet Rich Plasma Therapy [PRP], and sessions with Multivitamin Mesotherapy Injections are some recently enhanced techniques with partially or completely reversible hair loss. Also, it has been shown that supplements like Nutrafol and Biotin are producing effective outcomes. There is virtually little evidence to support the claim that applying sulfur-rich ingredients to the scalp, such as onion juice, can help TE patients' hair regenerate.Keywords: dermatology, telogen effluvium, hair loss, modern hair loass treatments
Procedia PDF Downloads 881435 The Role of Movement Quality after Osgood-Schlatter Disease in an Amateur Football Player: A Case Study
Authors: D. Pogliana, A. Maso, N. Milani, D. Panzin, S. Rivaroli, J. Konin
Abstract:
This case aims to identify the role of movement quality during the final stage of return to sport (RTS) in a male amateur football player 13 years old after passing the acute phase of the bilateral Osgood-Schlatter disease (OSD). The patient, after a year from passing the acute phase of OSD with the abstention of physical activity, reports bilateral anterior knee pain at the beginning of the football sport activity. Interventions: After the orthopedist check, who recommended physiotherapy sessions for the correction of motor patterns and the isometric reinforcement of the muscles of the quadriceps, the rehabilitation intervention was developed in 7 weeks through 14 sessions of neuro-motor training (NMT) with a frequency of two weekly sessions and six sessions of muscle-strengthening with a frequency of one weekly session. The sessions of NMT were carried out through free body exercises (or with overloads) with visual bio-feedback with the help of two cameras (one with anterior vision and one with lateral vision of the subject) and a big touch screen. The aim of these sessions of NMT was to modify the dysfunctional motor patterns evaluated by the 2D motion analysis test. The test was carried out at the beginning and at the end of the rehabilitation course and included five movements: single-leg squat (SLS), drop jump (DJ), single-leg hop (SLH), lateral shuffle (LS), and change of direction (COD). Each of these movements was evaluated through the video analysis of dynamic valgus knee, pelvic tilt, trunk control, shock absorption, and motor strategy. A free image analysis software (Kinovea) was then used to calculate scores. Results: Baseline assessment of the subject showed a total score of 59% on the right limb and 64% on the left limb (considering an optimal score above 85%) with large deficits in shock absorption capabilities, the presence of dynamic valgus knee, and dysfunctional motor strategies defined “quadriceps dominant.” After six weeks of training, the subject achieved a total score of 80% on the right limb and 86% on the left limb, with significant improvements in shock absorption capabilities, the presence of dynamic knee valgus, and the employment of more hip-oriented motor strategies on both lower limbs. The improvements shown in dynamic knee valgus, greater hip-oriented motor strategies, and improved shock absorption identified through six weeks of the NMT program can help a teenager amateur football player to manage the anterior knee pain during sports activity. In conclusion, NMT was a good choice to help a 13 years old male amateur football player to return to performance without pain after OSD and can also be used with all this type of athletes of the other teams' sports.Keywords: movement analysis, neuro-motor training, knee pain, movement strategies
Procedia PDF Downloads 1331434 Contemporary Arabic Novel Probing the Self and the Other: A Contrapuntal Study of Identity, Sexuality, and Fundamentalism
Authors: Jihan Mahmoud
Abstract:
This paper examines the role played by Arabic novelists in revolutionary change in the Arab world, discussing themes of identity, sexuality and fundamentalism as portrayed in a selection of modern and contemporary Arabic novels that are either written in English or translated from Arabic into English. It particularly focuses on the post-Naguib Mahfouz era. Taking my cue from the current political changes in the Arab world, starting with 9/11/ terrorist attacks in the USA and the UK, the ‘Arab Spring’ revolutions, the rise of political Islam and the emergence of Isis, the Islamic state in Iraq and the Levant, the study analyses the differences in the ways contemporary Arab novelists from different Arabic countries represent the interaction between identity, sexual politics and fundamentalist ideas in the Arab world, with a specific focus on the overlap between literature, religion and international politics in the region. It argues that the post-Mahfouz era marked a new phase in the development of the political Arabic novel not only as a force of resistance against political-religious oppression, but as a call for revolution as well. Thus, the Arabic novel reshapes values and prompts future action.Keywords: Arabic novel, Islam, politics, sexuality
Procedia PDF Downloads 5241433 Tax Morale Dimensions Analysis in Portugal and Spain
Authors: Cristina Sá, Carlos Gomes, António Martins
Abstract:
The reasons that explain different behaviors towards tax obligations in similar countries are not completely understood yet. The main purpose of this paper is to identify and compare the factors that influence tax morale levels in Portugal and Spain. We use data from European Values Study (EVS). Using a sample of 2,652 individuals, a factor analysis was used to extract the underlying dimensions of tax morale of Portuguese and Spanish taxpayers. Based on a factor analysis, the results of this paper show that sociological and behavioral factors, psychological factors and political factors are important for a good understanding of taxpayers’ behavior in Iberian Peninsula. This paper added value relies on the analyses of a wide range of variables and on the comparison between Portugal and Spain. Our conclusions provided insights that tax authorities and politicians can use to better focus their strategies and actions in order to increase compliance, reduce tax evasion, fight underground economy and increase country´s competitiveness.Keywords: compliance, tax morale, Portugal, Spain
Procedia PDF Downloads 3061432 Laryngeal Tuberculosis in a 7-Year-Old Child: A Case Report and Literature Review
Authors: Mohd Jaish Siddiqui
Abstract:
Laryngeal TB is extremely rare in the pediatric population, accounting for 1% of all cases. Here, we present a case of laryngeal TB with miliary tuberculosis and tuberculous encephalitis, presented with sore throat, hoarseness, severe cough and, acute obstruction the larynx, sputum for AFB was negative, T-SPOT was positive and X-pert was positive, bronchoscopy revealed multiple nodules and edema around the larynx, epiglottis, bilateral arytenopharyngeal folds and vocal cord. Enhanced MRI revealed multiple small nodules in bilateral cerebral hemispheres and right thalamus, however CSF was negative. We reviewed the LTB cases that were published up to 2021. A total of twenty fine cases were identified in English literature. The most common manifestation was hoarseness of voice with 80% followed by stridor 40% of cases. Pulmonary involvement was found in 36% of cases, whereas, 45% of cases had no underlying TB. We did not find any case who developed tuberculous encephalitis in the literature.Keywords: laryngeal tb, treatment, tuberculous encephalitis, children
Procedia PDF Downloads 451431 Developing a Systems Dynamics Model for Security Management
Authors: Kuan-Chou Chen
Abstract:
This paper will demonstrate a simulation model of an information security system by using the systems dynamic approach. The relationships in the system model are designed to be simple and functional and do not necessarily represent any particular information security environments. The purpose of the paper aims to develop a generic system dynamic information security system model with implications on information security research. The interrelated and interdependent relationships of five primary sectors in the system dynamic model will be presented in this paper. The integrated information security systems model will include (1) information security characteristics, (2) users, (3) technology, (4) business functions, and (5) policy and management. Environments, attacks, government and social culture will be defined as the external sector. The interactions within each of these sectors will be depicted by system loop map as well. The proposed system dynamic model will not only provide a conceptual framework for information security analysts and designers but also allow information security managers to remove the incongruity between the management of risk incidents and the management of knowledge and further support information security managers and decision makers the foundation for managerial actions and policy decisions.Keywords: system thinking, information security systems, security management, simulation
Procedia PDF Downloads 4271430 The Applicability of International Humanitarian Law to Non-State Actors
Authors: Yin Cheung Lam
Abstract:
In 1949, the ratification of the Geneva Conventions heralded the international community’s adoption of a new universal and non-discriminatory approach to human rights in situations of conflict. However, with the proliferation of international terrorism after the 9/11 attacks on the United States (U.S.), the international community’s uneven and contradictory implementations of international humanitarian law (IHL) questioned its agenda of universal human rights. Specifically, the derogation from IHL has never been so pronounced in the U.S. led ‘War on Terror’. While an extensive literature has ‘assessed the impact’ of the implementation of the Geneva Conventions, limited attention has been paid to interrogating the ways in which the Geneva Conventions and its resulting implementation have functioned to discursively reproduce certain understandings of human rights between states and non-state actors. Through a discursive analysis of the Geneva Conventions and the conceptualization of human rights in relation to terrorism, this thesis problematises the way in which the U.S. has understood and reproduced understandings of human rights. Using the U.S. ‘War on Terror’ as an example, it seeks to extend previous analyses of the U.S.’ practice of IHL through a qualitative discursive analysis of the human rights content that appears in the Geneva Conventions in addition to the speeches and policy documents on the ‘War on Terror’.Keywords: discursive analysis, human rights, non-state actors, war on terror
Procedia PDF Downloads 6041429 The Effect of Aerobics and Yogic Exercise on Selected Physiological and Psychological Variables of Middle-Aged Women
Authors: A. Pallavi, N. Vijay Mohan
Abstract:
A nation can be economically progressive only when the citizens have sufficient capacity to work efficiently to increase the productivity. So, good health must be regarded as a primary need of the community. This helps the growth and development of the body and the mind, which in turn leads to progress and prosperity of the nation. An optimum growth is a necessity for an efficient existence in a biologically adverse and economically competitive world. It is also necessary for the execution of daily routine work. Yoga is a method or a system for the complete development of the personality in a human being. It can be further elaborated as an all-around and complete development of the body, mind, morality, intellect and soul of a being. Sri Aurobindo defines yoga as 'a methodical effort towards self-perfection by the development of the potentialities in the individual.' Aerobic exercise as any activity that uses large muscle groups, can be maintained continuously, and is rhythmic I nature. It is a type of exercise that overloads the heart and lungs and causes them to work harder than at rest. The important idea behind aerobic exercise today, is to get up and get moving. There are more activities that ever to choose from, whether it is a new activity or an old one. Find something you enjoy doing that keeps our heart rate elevated for a continuous time period and get moving to a healthier life. Middle aged selected and served as the subjects for the purpose of this study. The selected subjects were in the age group of 30 to 40 years. By going through the literature and after consulting the experts in yoga and aerobic training, the investigator had chosen the variables which are specifically related to the middle-aged men. The selected physiological variables are pulse rate, diastolic blood pressure, systolic blood pressure; percent body fat and vital capacity. The selected psychological variables are job anxiety, occupational stress. The study was formulated as a random group design consisting of aerobic exercise and yogic exercises groups. The subjects (N=60) were at random divided into three equal groups of twenty middle-aged men each. The groups were assigned the names as follows: 1. Experimental group I- aerobic exercises group, 2. Experimental group II- yogic exercises, 3. Control group. All the groups were subjected to pre-test prior to the experimental treatment. The experimental groups participated in their respective duration of twenty-four weeks, six days in a week throughout the study. The various tests administered were: prior to training (pre-test), after twelfth week (second test) and twenty-fourth weeks (post-test) of the training schedule.Keywords: pulse rate, diastolic blood pressure, systolic blood pressure; percent body fat and vital capacity, psychological variables, job anxiety, occupational stress, aerobic exercise, yogic exercise
Procedia PDF Downloads 4421428 Minimization of Denial of Services Attacks in Vehicular Adhoc Networking by Applying Different Constraints
Authors: Amjad Khan
Abstract:
The security of Vehicular ad hoc networking is of great importance as it involves serious life threats. Thus to provide secure communication amongst Vehicles on road, the conventional security system is not enough. It is necessary to prevent the network resources from wastage and give them protection against malicious nodes so that to ensure the data bandwidth availability to the legitimate nodes of the network. This work is related to provide a non conventional security system by introducing some constraints to minimize the DoS (Denial of services) especially data and bandwidth. The data packets received by a node in the network will pass through a number of tests and if any of the test fails, the node will drop those data packets and will not forward it anymore. Also if a node claims to be the nearest node for forwarding emergency messages then the sender can effectively identify the true or false status of the claim by using these constraints. Consequently the DoS(Denial of Services) attack is minimized by the instant availability of data without wasting the network resources.Keywords: black hole attack, grey hole attack, intransient traffic tempering, networking
Procedia PDF Downloads 2831427 Bleeding-Heart Altruists and Calculating Utilitarians: Applying Process Dissociation to Self-sacrificial Dilemmas
Authors: David Simpson, Kyle Nash
Abstract:
There is considerable evidence linking slow, deliberative reasoning (system 2) with utilitarian judgments in dilemmas involving the sacrificing of another person for the greater good (other-sacrificial dilemmas). Joshua Greene has argued, based on this kind of evidence, that system 2 drives utilitarian judgments. However, the evidence on whether system 2 is associated with utilitarian judgments in self-sacrificial dilemmas is more mixed. We employed process dissociation to measure a self-sacrificial utilitarian (SU) parameter and an other-sacrificial (OU) utilitarian parameter. It was initially predicted that contra Greene, the cognitive reflection test (CRT) would only be positively correlated with the OU parameter and not the SU parameter. However, Greene’s hypothesis was corroborated: the CRT positively correlated with both the OU parameter and the SU parameter. By contrast, the CRT did not correlate with the other two moral parameters we extracted (altruism and deontology).Keywords: dual-process model, utilitarianism, altruism, reason, emotion, process dissociation
Procedia PDF Downloads 1511426 Experiment on Artificial Recharge of Groundwater Implemented Project: Effect on the Infiltration Velocity by Vegetation Mulch
Authors: Cheh-Shyh Ting, Jiin-Liang Lin
Abstract:
This study was conducted at the Wanglung Farm in Pingtung County to test the groundwater seepage influences on the implemented project for artificial groundwater recharge. The study was divided into three phases. The first phase, conducted on natural groundwater that was recharged through the local climate and growing conditions, observed the natural form of vegetation species. The original plants were flooded, and after 60 days it was observed that of the original plants only Goosegrass (Eleusine indica) and Black heart (Polygonum lapathifolium Linn.) remained. Direct infiltration tests were carried out, and calculations for the effect of vegetation on infiltration velocity of the recharge pool were noted. The second phase was an indoor test. Bahia grass and wild amaranth were selected as vegetation roots. After growth, the distribution of different grassroots was observed in order to facilitate a comparison permeability coefficient calculated by the amount of penetration and to explore the relationship between density and the efficiency to groundwater recharge. The third phase was the root tomography analysis, further observation of the development of plant roots using computed tomography technology. Computed Tomography, also known as (CT), is a diagnostic imaging examination, normally used in the medical field. In the first phase of the feasibility study, most non-aquatic plants wilted and died within seven days. In seven days, the remaining plants were used for experimental infiltration analysis. Results showed that in eight hours of infiltration test, Eleusine indica stems averaged 0.466 m/day and wild amaranth averaged 0.014 m/day. The second phase of the experiment was conducted on the remains of the plant a week in it had died and rotted, and the infiltration experiment was performed under these conditions. The results showed eight hours in end of the infiltration test, Eleusine indica stems averaged 0.033 m/day, and wild amaranth averaged 0.098 m/day. Non-aquatic plants died within two weeks, and their rotted remains clogged the pores of bottom soil particles, causing obstruction of recharge pool infiltration. Experiment results showed that eight hours in the test the average infiltration velocity for Eleusine indica stems was 0.0229 m/day and wild amaranth averaged 0.0117 m/day. Since the rotted roots of the plants blocked the pores of the soil in the recharge pool, which resulted in the obstruction of the artificial infiltration pond and showed an immediate impact on recharge efficiency. In order to observe the development of plant roots, the third phase used computed tomography imaging. Iodine developer was injected into the Black heart, allowing its cross-sectional images to be shown on CT and to be used to observe root development.Keywords: artificial recharge of groundwater, computed tomography, infiltration velocity, vegetation root system
Procedia PDF Downloads 3081425 High Arousal and Athletic Performance
Authors: Turki Mohammed Al Mohaid
Abstract:
High arousal may lead to inhibited athletic performance, or high positive arousal may enhance performance is controversial. To evaluate and review this issue, 31 athletes (all male) were induced into high pre-determined goal arousal and high arousal without pre-determined goal motivational states and tested on a standard grip strength task. Paced breathing was used to change psychological and physiological arousal. It was noted that significant increases in grip strength performance occurred when arousal was high and experienced as delighted, happy, and pleasant excitement in those with no pre-determined goal motivational states. Blood pressure, heart rate, and other indicators of physiological activity were not found to mediate between psychological arousal and performance. In a situation where athletic performance necessitates maximal motor strength over a short period, performance benefits of high arousal may be enhanced by designing a specific motivational state.Keywords: high arousal, athletic, performance, physiological
Procedia PDF Downloads 1141424 Analysis of the Evolution of Social and Economic Indicators of the Mercosur´s Members: 1980-2012
Authors: L. Aparecida Bastos, J. Leige Lopes, J. Crepaldi, R. Monteiro da Silva
Abstract:
The objective of this study is to analyze the evolution of some social and economic indicators of Mercosur´s economies from 1980 to 2012, based on the statistics of the Latin American Integration Association (LAIA). The objective is to observe if after the accession of these economies to Mercosur (the first accessions occurred in 1994) these indicators showed better performance, in order to demonstrate if economic integration contributed to improved trade, macroeconomic performance, and level of social and economic development of member countries. To this end, the methodologies used will be a literature review and descriptive statistics. The theoretical framework that guides the work are the theories of Integration: Classical Liberal, Marxist and structural-proactive. The results reveal that most social and economic indicators showed better performance in those economies that joined Mercosur after 1994. This work is the result of an investigation already completed.Keywords: economic integration, Mercosur, social indicators, economic indicators
Procedia PDF Downloads 2951423 The Influence of Active Breaks on the Attention/Concentration Performance in Eighth-Graders
Authors: Christian Andrä, Luisa Zimmermann, Christina Müller
Abstract:
Introduction: The positive relation between physical activity and cognition is commonly known. Relevant studies show that in everyday school life active breaks can lead to improvement in certain abilities (e.g. attention and concentration). A beneficial effect is in particular attributed to moderate activity. It is still unclear whether active breaks are beneficial after relatively short phases of cognitive load and whether the postulated effects of activity really have an immediate impact. The objective of this study was to verify whether an active break after 18 minutes of cognitive load leads to enhanced attention/concentration performance, compared to inactive breaks with voluntary mobile phone activity. Methodology: For this quasi-experimental study, 36 students [age: 14.0 (mean value) ± 0.3 (standard deviation); male/female: 21/15] of a secondary school were tested. In week 1, every student’s maximum heart rate (Hfmax) was determined through maximum effort tests conducted during physical education classes. The task was to run 3 laps of 300 m with increasing subjective effort (lap 1: 60%, lap 2: 80%, lap 3: 100% of the maximum performance capacity). Furthermore, first attention/concentration tests (D2-R) took place (pretest). The groups were matched on the basis of the pretest results. During week 2 and 3, crossover testing was conducted, comprising of 18 minutes of cognitive preload (test for concentration performance, KLT-R), a break and an attention/concentration test after a 2-minutes transition. Different 10-minutes breaks (active break: moderate physical activity with 65% Hfmax or inactive break: mobile phone activity) took place between preloading and transition. Major findings: In general, there was no impact of the different break interventions on the concentration test results (symbols processed after physical activity: 185.2 ± 31.3 / after inactive break: 184.4 ± 31.6; errors after physical activity: 5.7 ± 6.3 / after inactive break: 7.0. ± 7.2). There was, however, a noticeable development of the values over the testing periods. Although no difference in the number of processed symbols was detected (active/inactive break: period 1: 49.3 ± 8.8/46.9 ± 9.0; period 2: 47.0 ± 7.7/47.3 ± 8.4; period 3: 45.1 ± 8.3/45.6 ± 8.0; period 4: 43.8 ± 7.8/44.6 ± 8.0), error rates decreased successively after physical activity and increased gradually after an inactive break (active/inactive break: period 1: 1.9 ± 2.4/1.2 ± 1.4; period 2: 1.7 ± 1.8/ 1.5 ± 2.0, period 3: 1.2 ± 1.6/1.8 ± 2.1; period 4: 0.9 ± 1.5/2.5 ± 2.6; p= .012). Conclusion: Taking into consideration only the study’s overall results, the hypothesis must be dismissed. However, more differentiated evaluation shows that the error rates decreased after active breaks and increased after inactive breaks. Obviously, the effects of active intervention occur with a delay. The 2-minutes transition (regeneration time) used for this study seems to be insufficient due to the longer adaptation time of the cardio-vascular system in untrained individuals, which might initially affect the concentration capacity. To use the positive effects of physical activity for teaching and learning processes, physiological characteristics must also be considered. Only this will ensure optimum ability to perform.Keywords: active breaks, attention/concentration test, cognitive performance capacity, heart rate, physical activity
Procedia PDF Downloads 3141422 The Heart of Sanctuary Movement and the Ethics of Solidarity
Authors: Irene Ludji
Abstract:
This article discusses the relevance of the sanctuary movement in relation to the idea of solidarity understood through the lens of ethics. There are three parts of this article. First is the investigation on the background of sanctuary movements in the U.S., the UK, and Canada. The repeated theme behind sanctuary movements includes practicing religious traditions, protecting vulnerable life, and challenging the unjust law. Second is the examination of the ethics of solidarity using Thomas D. Williams, who claims it as the extension of responsible love based on respect towards human dignity, and Rebecca Todd Peters, who claims the ethics of solidarity as the transformative ethic rooted in social justice. Third is the analysis of the connection between the central theme of sanctuary movements and the ethics of solidarity. This article concludes that sanctuary movement is indeed a solidarity movement that remains relevant in our world today because the acknowledgment of human dignity, as the basis for solidarity, is vital in transforming an unjust social system that creates the need for a sanctuary in the first place.Keywords: sanctuary movement, solidarity, ethics, U.S., UK, canada
Procedia PDF Downloads 711421 The Effects of Giving on Knowledge about Epidemic Keratoconjunctivitis in Bangsaen Beach Venders, Chonburi, Thailand
Authors: Luksanaporn Krungkraipetch
Abstract:
Epidemic keratoconjunctivitis is an acute infection caused by the adenovirus symptoms of eye irritation, tearing an incubation period of 7-9 days from the respiratory tract into the eye and often cohesion in the community who work in the school's pool as well as a shopping mall. After infection can cause symptoms within 1-2 days chance to infect others up to two weeks. In some cases when red-eye better they had potential complications of the eye, inflammation occurs 7-10 days after conjunctivitis. It could be for several more months to recover. This study is a cross-sectional study with one hundred and eleven beach venders, and purpose of the research was to assess the knowledge, that knowledge has improved much. By comparing before and after the knowledge of the use of questionnaires and test your knowledge. The statistics used for data analysis percent, arithmetic mean and T-test. The statistics used to analyze data at the level of statistical p ≤ 0.05. Result of this study; mostly female (83.8%), most age 19-35 years (42.3%). Hometown is mostly in Chonburi 74.8%. 20.7% had epidemic keratoconjunctivitis within one year. Compared between before and after gave knowledge; after gave knowledge is better than before gave knowledge p=0.00.Keywords: knowledge, epidemic keratoconjunctivitis, conjunctivitis, beach vender
Procedia PDF Downloads 2751420 Mechanism and Kinetic of Layers Growth: Application to Nitriding of 32CrMoV13 Steel
Authors: Torchane Lazhar
Abstract:
In this work, our task consists in optimizing the nitriding treatment at low-temperature of the steel 32CrMoV13 by the way of the mixtures of ammonia gas, nitrogen and hydrogen to improve the mechanical properties of the surface (good wear resistance, friction and corrosion), and of the diffusion layer of the nitrogen (good resistance to fatigue and good tenacity with heart). By limiting our work to the pure iron and to the alloys iron-chromium and iron-chrome-carbon, we have studied the various parameters which manage the nitriding: flow rate and composition of the gaseous phase, the interaction chromium-nitrogen and chromium-carbon by the help of experiments of nitriding realized in the laboratory by thermogravimetry. The acquired knowledge have been applied by the mastery of the growth of the combination layer on the diffusion layer in the case of the industrial steel 32CrMoV13.Keywords: diffusion of nitrogen, gaseous nitriding, layer growth kinetic, steel
Procedia PDF Downloads 4111419 VANETs: Security Challenges and Future Directions
Authors: Jared Oluoch
Abstract:
Connected vehicles are equipped with wireless sensors that aid in Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication. These vehicles will in the near future provide road safety, improve transport efficiency, and reduce traffic congestion. One of the challenges for connected vehicles is how to ensure that information sent across the network is secure. If security of the network is not guaranteed, several attacks can occur, thereby compromising the robustness, reliability, and efficiency of the network. This paper discusses existing security mechanisms and unique properties of connected vehicles. The methodology employed in this work is exploratory. The paper reviews existing security solutions for connected vehicles. More concretely, it discusses various cryptographic mechanisms available, and suggests areas of improvement. The study proposes a combination of symmetric key encryption and public key cryptography to improve security. The study further proposes message aggregation as a technique to overcome message redundancy. This paper offers a comprehensive overview of connected vehicles technology, its applications, its security mechanisms, open challenges, and potential areas of future research.Keywords: VANET, connected vehicles, 802.11p, WAVE, DSRC, trust, security, cryptography
Procedia PDF Downloads 3121418 A Hybrid Digital Watermarking Scheme
Authors: Nazish Saleem Abbas, Muhammad Haris Jamil, Hamid Sharif
Abstract:
Digital watermarking is a technique that allows an individual to add and hide secret information, copyright notice, or other verification message inside a digital audio, video, or image. Today, with the advancement of technology, modern healthcare systems manage patients’ diagnostic information in a digital way in many countries. When transmitted between hospitals through the internet, the medical data becomes vulnerable to attacks and requires security and confidentiality. Digital watermarking techniques are used in order to ensure the authenticity, security and management of medical images and related information. This paper proposes a watermarking technique that embeds a watermark in medical images imperceptibly and securely. In this work, digital watermarking on medical images is carried out using the Least Significant Bit (LSB) with the Discrete Cosine Transform (DCT). The proposed methods of embedding and extraction of a watermark in a watermarked image are performed in the frequency domain using LSB by XOR operation. The quality of the watermarked medical image is measured by the Peak signal-to-noise ratio (PSNR). It was observed that the watermarked medical image obtained performing XOR operation between DCT and LSB survived compression attack having a PSNR up to 38.98.Keywords: watermarking, image processing, DCT, LSB, PSNR
Procedia PDF Downloads 461417 Cyber Security in Russia: Offense, Defense and Strategy in Cyberspace
Authors: Da Eun Sung
Abstract:
In today’s world, cyber security has become an important international agenda. As the information age has arrived, the need for cyber defense against cyber attacks is mounting, and the significance of cyber cooperation in the international community is drawing attention. Through the course, international society has agreed that the institutionalization of international norms dealing with cyber space and cyber security is crucial ever. Nevertheless, the West, led by the United States of America, and 'the East', composed of Russia and China, have shown conflicting views on forming international norms and principles which would regulate and ward off the possible threats in cyber space. Thus, the international community hasn’t yet to reach an agreement on cyber security. In other words, the difference between both sides on the approach and understanding of principles, objects, and the definition has rendered such. Firstly, this dissertation will cover the Russia’s perception, strategy, and definition on cyber security through analyzing primary source. Then, it will delve into the two contrasting cyber security strategy between Russia and the US by comparing them. And in the conclusion, it will seek the possible solution for the cooperation in the field of cyber security. It is quite worthwhile to look into Russia’s views, which is the main counterpart to the US in this field, especially when the efforts to institutionalize cyber security by the US-led international community have met with their boundaries, and when the legitimacy of them have been challenged.Keywords: cyber security, cyber security strategic, international relation in cyberspace, Russia
Procedia PDF Downloads 3191416 The Effects of Different Doses of Caffeine on Young Futsal Players
Authors: Saead Rostami, Seyyed Hadi Hosseini Alavije, Aliakbar Torabi, Mohammad Bekhradi
Abstract:
This study is about The effects of different doses of caffeine on young Futsal players. Young futsal players of selected ShahinShahr(a city in Esfahan province, Iran) team are sampled (24 people of 18.3±1.9 year- old). All players are members of youth team playing in Esfahan counties league. Having at least 5 years of experience, 2 practices and 1 match per week and lacking any limitation in the past 6 months are the most important requirements for sampling the players. Next, the study topic, its method, its uses, as ell possible risks are explained to the players. They signed a consent letter to take part in the study. Interest in the use of caffeine as an ergogenic aid has increased since the International Olympic Committee lifted the partial ban on its use. Caffeine has beneficial effects on various aspects of athletic performance, but its effects on training have been neglected. The purpose of this study was to investigate the acute effect of caffeine on testosterone and cortisole in young futsal players.Keywords: anabolic, catabolic, performance, testosterone cortisol ratio, RAST test
Procedia PDF Downloads 3451415 Models, Methods and Technologies for Protection of Critical Infrastructures from Cyber-Physical Threats
Authors: Ivan Župan
Abstract:
Critical infrastructure is essential for the functioning of a country and is designated for special protection by governments worldwide. Due to the increase in smart technology usage in every facet of the industry, including critical infrastructure, the exposure to malicious cyber-physical attacks has grown in the last few years. Proper security measures must be undertaken in order to defend against cyber-physical threats that can disrupt the normal functioning of critical infrastructure and, consequently the functioning of the country. This paper provides a review of the scientific literature of models, methods and technologies used to protect from cyber-physical threats in industries. The focus of the literature was observed from three aspects. The first aspect, resilience, concerns itself with the robustness of the system’s defense against threats, as well as preparation and education about potential future threats. The second aspect concerns security risk management for systems with cyber-physical aspects, and the third aspect investigates available testbed environments for testing developed models on scaled models of vulnerable infrastructure.Keywords: critical infrastructure, cyber-physical security, smart industry, security methodology, security technology
Procedia PDF Downloads 731414 The Development of Cardiac Tamponade after Spinal Surgery in a Patient with Duchenne Muscular Dystrophy
Authors: Hacer Y. Teke, Sultan Pehlivan, Mustafa Karapırlı, Asude Gökmen, Sait Özsoy
Abstract:
The case is here presented of a patient with DMD with electrocardiograph findings within normal limits who underwent spinal surgery then developed the rarely seen complication of cardiac tamponade which resulted in death. A 17-year old male with DMD was admitted to hospital for spinal surgery. Due to a postoperative drop in hemoglobin, blood transfusion was administered to the patient, no complication developed and he was discharged on the third day. Four days after discharge, the patient worsened at home and an ambulance was called. Before the nearest hospital was reached, the patient died in the ambulance. An autopsy was performed. A fatal but rarely seen complication of Acute Myocardial Infarction (AMI) is myocardial rupture. 85% of ruptures occur in the first week of AMI but just as they can be seen on the day of the infarct, they can also be seen 2 weeks later. The case presented here had infarction findings related to different times and in different areas.Keywords: duchenne muscular dystrophy, myocardial infarction, myocardial rupture, anesthesia
Procedia PDF Downloads 4811413 A Blockchain-Based Protection Strategy against Social Network Phishing
Authors: Francesco Buccafurri, Celeste Romolo
Abstract:
Nowadays phishing is the most frequent starting point of cyber-attack vectors. Phishing is implemented both via email and social network messages. While a wide scientific literature exists which addresses the problem of contrasting email spam-phishing, no specific countermeasure has been so far proposed for phishing included into private messages of social network platforms. Unfortunately, the problem is severe. This paper proposes an approach against social network phishing, based on a non invasive collaborative information-sharing approach which leverages blockchain. The detection method works by filtering candidate messages, by distilling them by means of a distance-preserving hash function, and by publishing hashes over a public blockchain through a trusted smart contract (thus avoiding denial of service attacks). Phishing detection exploits social information embedded into social network profiles to identify similar messages belonging to disjoint contexts. The main contribution of the paper is to introduce a new approach to contrasting the problem of social network phishing, which, despite its severity, received little attention by both research and industry.Keywords: phishing, social networks, information sharing, blockchain
Procedia PDF Downloads 3271412 Evaluation of Activity of Anacyclus Pyrethrum Methanolic Extract on Acute Inflammation Induced in Rats
Authors: Dalila Bouamra, Chekib Arslane Baki, Abdelhamid Bouchebour, Fatiha Koussa, Amel Benamara, Seoussen Kada
Abstract:
The activity of methanolic extract from Anacyclus pyrethrum was evaluated using λ-carrageenan 1% induced paw edema in Wistar Albinos rats. The oral administration of 200 mg/kg, 400 mg/kg and 600 mg/kg, body weight of methanolic extract, one hour before induction of inflammation, exerted a significant inhibition effect of 47%, 57% and 62% respectively after 4h λ-carrageenan treatment and highly significant inhibition effect of 57%, 66% and 75% respectively after 8h λ-carrageenan treatment, compared to non treated group (100%) and that treated with aspirin, a standard anti-inflammatory drug. On the other hand, the effect of the plant extract on stomach was macroscopically and microscopically studied. The plant extract has an impact on the loss ratio of granulocytes that have invaded the stomach after a period of inflammation at a dose of 600 mg/kg body weight.Keywords: inflammation, Anacyclus pyrethrum, gastritis, Wistar Albinos rats
Procedia PDF Downloads 4861411 Remote Patient Monitoring for Covid-19
Authors: Launcelot McGrath
Abstract:
The Coronavirus disease 2019 (COVID-19) has spread rapidly around the world, resulting in high mortality rates and very large numbers of people requiring medical treatment in ICU. Management of patient hospitalisation is a critical aspect to control this disease and reduce chaos in the healthcare systems. Remote monitoring provides a solution to protect vulnerable and elderly high-risk patients. Continuous remote monitoring of oxygen saturation, respiratory rate, heart rate, and temperature, etc., provides medical systems with up-to-the-minute information about their patients' statuses. Remote monitoring also limits the spread of infection by reducing hospital overcrowding. This paper examines the potential of remote monitoring for Covid-19 to assist in the rapid identification of patients at risk, facilitate the detection of patient deterioration, and enable early interventions.Keywords: remote monitoring, patient care, oxygen saturation, Covid-19, hospital management
Procedia PDF Downloads 1071410 The Quantum Theory of Music and Languages
Authors: Mballa Abanda Serge, Henda Gnakate Biba, Romaric Guemno Kuate, Akono Rufine Nicole, Petfiang Sidonie, Bella Sidonie
Abstract:
The main hypotheses proposed around the definition of the syllable and of music, of the common origin of music and language, should lead the reader to reflect on the cross-cutting questions raised by the debate on the notion of universals in linguistics and musicology. These are objects of controversy, and there lies its interest: the debate raises questions that are at the heart of theories on language. It is an inventive, original and innovative research thesis. The main hypotheses proposed around the definition of the syllable and of music, of the common origin of music and language, should lead the reader to reflect on the cross-cutting questions raised by the debate on the notion of universals in linguistics and musicology. These are objects of controversy, and there lies its interest: the debate raises questions that are at the heart of theories on language. It is an inventive, original and innovative research thesis. A contribution to the theoretical, musicological, ethno musicological and linguistic conceptualization of languages, giving rise to the practice of interlocution between the social and cognitive sciences, the activities of artistic creation and the question of modeling in the human sciences: mathematics, computer science, translation automation and artificial intelligence. When you apply this theory to any text of a folksong of a world-tone language, you do not only piece together the exact melody, rhythm, and harmonies of that song as if you knew it in advance but also the exact speaking of this language. The author believes that the issue of the disappearance of tonal languages and their preservation has been structurally resolved, as well as one of the greatest cultural equations related to the composition and creation of tonal, polytonal and random music. The experimentation confirming the theorization, It designed a semi-digital, semi-analog application which translates the tonal languages of Africa (about 2,100 languages) into blues, jazz, world music, polyphonic music, tonal and anatonal music and deterministic and random music). To test this application, I use a music reading and writing software that allows me to collect the data extracted from my mother tongue, which is already modeled in the musical staves saved in the ethnographic (semiotic) dictionary for automatic translation ( volume 2 of the book). Translation is done (from writing to writing, from writing to speech and from writing to music). Mode of operation: you type a text on your computer, a structured song (chorus-verse), and you command the machine a melody of blues, jazz and world music or variety etc. The software runs, giving you the option to choose harmonies, and then you select your melody.Keywords: music, entanglement, langauge, science
Procedia PDF Downloads 791409 Therapeutic Potential of GSTM2-2 C-Terminal Domain and Its Mutants, F157A and Y160A on the Treatment of Cardiac Arrhythmias: Effect on Ca2+ Transients in Neonatal Ventricular Cardiomyocytes
Authors: R. P. Hewawasam, A. F. Dulhunty
Abstract:
The ryanodine receptor (RyR) is an intracellular ion channel that releases Ca2+ from the sarcoplasmic reticulum and is essential for the excitation-contraction coupling and contraction in striated muscle. Human muscle specific glutathione transferase M2-2 (GSTM2-2) is a highly specific inhibitor of cardiac ryanodine receptor (RyR2) activity. Single channel-lipid bilayer studies and Ca2+ release assays performed using the C-terminal half of the GSTM2-2 and its mutants F157A and Y160A confirmed the ability of the C terminal domain of GSTM2-2 to specifically inhibit the cardiac ryanodine receptor activity. Objective of the present study is to determine the effect of C terminal domain of GSTM2-2 (GSTM2-2C) and the mutants, F157A and Y160A on the Ca2+ transients of neonatal ventricular cardiomyocytes. Primary cardiomyocytes were cultured from neonatal rats. They were treated with GSTM2-2C and the two mutants F157A and Y160A at 15µM and incubated for 2 hours. Then the cells were led with Fluo-4AM, fluorescent Ca2+ indicator, and the field stimulated (1 Hz, 3V and 2ms) cells were excited using the 488 nm argon laser. Contractility of the cells were measured and the Ca2+ transients in the stained cells were imaged using Leica SP5 confocal microscope. Peak amplitude of the Ca2+ transient, rise time and decay time from the peak were measured for each transient. In contrast to GSTM2C which significantly reduced the % shortening (42.8%) in the field stimulated cells, F157A and Y160A failed to reduce the % shortening.Analysis revealed that the average amplitude of the Ca2+ transient was significantly reduced (P<0.001) in cells treated with the wild type GSTM2-2C compared to that of untreated cells. Cells treated with the mutants F157A and Y160A didn’t change the Ca2+ transient significantly compared to the control. A significant increase in the rise time (P< 0.001) and a significant reduction in the decay time (P< 0.001) were observed in cardiomyocytes treated with GSTM2-2C compared to the control but not with F157A and Y160A. These results are consistent with the observation that GSTM2-2C reduced the Ca2+ release from the cardiac SR significantly whereas the mutants, F157A and Y160A didn’t show any effect compared to the control. GSTM2-2C has an isoform-specific effect on the cardiac ryanodine receptor activity and also it inhibits RyR2 channel activity only during diastole. Selective inhibition of RyR2 by GSTM2-2C has significant clinical potential in the treatment of cardiac arrhythmias and heart failure. Since GSTM2-2C-terminal construct has no GST enzyme activity, its introduction to the cardiomyocyte would not exert any unwanted side effects that may alter its enzymatic action. The present study further confirms that GSTM2-2C is capable of decreasing the Ca2+ release from the cardiac SR during diastole. These results raise the future possibility of using GSTM2-2C as a template for therapeutics that can depress RyR2 function when the channel is hyperactive in cardiac arrhythmias and heart failure.Keywords: arrhythmia, cardiac muscle, cardiac ryanodine receptor, GSTM2-2
Procedia PDF Downloads 2831408 Mechanisms for Strategic Adoption of Innovation Procurement
Authors: Carolina B. A. Morais, Antonio Bob Santos
Abstract:
In order to determine how innovation procurement can strengthen public efficiency and foster the modernization of public services, while at the same time promoting the opening of new private markets, this paper aims to present the two key instruments for the practice of innovation procurement at a European, national, and regional level – Pre-Commercial Procurement (PCP), and Public Procurement of Innovative Solutions (PPI). Thus, it starts with a theoretical framework on the emergence of this topic in the European Innovation Policy (Section 2), then continues with the identification and systematization of the main mechanisms for its effective adoption, both on the demand and supply side of the market (Section 3), as well as to expose and describe methods and tools for positioning innovation at the heart of public entities. The innovative projects best distinguished by the European Commission for their good practices in innovation procurement are identified, and the main methodology for the development and management of innovation procurement – Forward Commitment Procurement (FCP) – is applied to them in a pioneering way (Section 4). The relevance of innovation in public procurement is systematized and reflected upon in Section 5.Keywords: innovation procurement, innovation policy, innovation, pubic procurement
Procedia PDF Downloads 119