Search results for: Acute heart attacks
1377 Design and Development of a Bi-Leaflet Pulmonary Valve
Authors: Munirah Ismail, Joon Hock Yeo
Abstract:
Paediatric patients who require ventricular outflow tract reconstruction usually need valve construction to prevent valvular regurgitation. They would face problems like lack of suitable, affordable conduits and the need to undergo several operations in their lifetime due to the short lifespan of existing valves. Their natural growth and development are also of concern, even if they manage to receive suitable conduits. Current prosthesis including homografts, bioprosthetic valves, mechanical valves, and bovine jugular veins either do not have the long-term durability or the ability to adapt to the growth of such patients. We have developed a new design of bi-leaflet valve. This new technique accommodates patients’ annular size growth while maintaining valvular patency. A mock circulatory system was set up to assess the hemodynamic performance of the bi-leaflet pulmonary valve. It was found that the percentage regurgitation was acceptable and thus, validates this novel concept.Keywords: bi-leaflet pulmonary valve, pulmonary heart valve, tetralogy of fallot, mock circulatory system
Procedia PDF Downloads 1601376 Case Report of Left Atrial Myxoma Diagnosed by Bedside Echocardiography
Authors: Anthony S. Machi, Joseph Minardi
Abstract:
We present a case report of left atrial myxoma diagnosed by bedside transesophageal (TEE) ultrasound. Left atrial myxoma is the most common benign cardiac tumor and can obstruct blood flow and cause valvular insufficiency. Common symptoms consist of dyspnea, pulmonary edema and other features of left heart failure in addition to thrombus release in the form of tumor fragments. The availability of bedside ultrasound equipment is essential for the quick diagnosis and treatment of various emergency conditions including cardiac neoplasms. A 48-year-old Caucasian female with a four-year history of an untreated renal mass and anemia presented to the ED with two months of sharp, intermittent, bilateral flank pain radiating into the abdomen. She also reported intermittent vomiting and constipation along with generalized body aches, night sweats, and 100-pound weight loss over last year. She had a CT in 2013 showing a 3 cm left renal mass and a second CT in April 2016 showing a 3.8 cm left renal mass along with a past medical history of diverticulosis, chronic bronchitis, dyspnea on exertion, uncontrolled hypertension, and hyperlipidemia. Her maternal family history is positive for breast cancer, hypertension, and Type II Diabetes. Her paternal family history is positive for stroke. She was a current everyday smoker with an 11 pack/year history. Alcohol and drug use were denied. Physical exam was notable for a Grade II/IV systolic murmur at the right upper sternal border, dyspnea on exertion without angina, and a tender left lower quadrant. Her vitals and labs were notable for a blood pressure of 144/96, heart rate of 96 beats per minute, pulse oximetry of 96%, hemoglobin of 7.6 g/dL, hypokalemia, hypochloremia, and multiple other abnormalities. Physicians ordered a CT to evaluate her flank pain which revealed a 7.2 x 8.9 x 10.5 cm mixed cystic/solid mass in the lower pole of the left kidney and a filling defect in the left atrium. Bedside TEE was ordered to follow up on the filling defect. TEE reported an ejection fraction of 60-65% and visualized a mobile 6 x 3 cm mass in the left atrium attached to the interatrial septum extending into the mitral valve. Cardiothoracic Surgery and Urology were consulted and confirmed a diagnosis of left atrial myxoma and clear cell renal cell carcinoma. The patient returned a week later due to worsening nausea and vomiting and underwent emergent nephrectomy, lymph node dissection, and colostomy due to a necrotic colon. Her condition declined over the next four months due to lung and brain metastases, infections, and other complications until she passed away.Keywords: bedside ultrasound, echocardiography, emergency medicine, left atrial myxoma
Procedia PDF Downloads 3291375 Escaping the Trauma: A Psychological Study of Jonathan Safran Foer’s Extremely Loud & Incredibly Close
Authors: Mahima Thakur
Abstract:
Trauma rehabilitation requires both repairing physical injury and reconstructing broken narrative systems. The trauma's aftereffects entwine the broken patterns, allowing a cohesive narrative to emerge. In this article, the book Extremely Loud and Incredibly Close by Jonathan Safran Foer is discussed from a psychoanalytic perspective. The paper discusses the 9/11 attacks and their effects on those who suffered and lost family members during the catastrophe. The primary character of the novel, Oskar, along with his grandfather and grandmother, each have unique trauma escape stories that will be examined in light of Cathy Caruth and Geoffery H. Hartman‘s study. The text's numerous horrifying repetitions function as a narration strategy that not only captures the awareness of trauma but also gives the reader the psychological feature to overcome its deadening effects. This article explores the role that communication may have in assisting individuals in overcoming trauma. In addition to more research on traumatic memories, Dominick LaCapra's trauma theory's notions of "working through" and "acting out" highlight the need of communication in overcoming trauma and attempting to live outside of it.Keywords: trauma theory, Cathy Caruth, memories, escapes, communication
Procedia PDF Downloads 201374 Synthesis of Quinazoline Derivatives as Selective Inhibitors of Cyclooxygenase-1 Enzyme
Authors: Marcela Dvorakova, Lenka Langhansova, Premysl Landa
Abstract:
A series of quinazoline derivatives bearing aromatic rings in 2- and 4-positions were prepared and tested for their biological activity. Firstly, the compounds were evaluated for their potential to inhibit various kinases, such as autophagy activating kinase ULK1, 3-Phosphoinositide-dependent kinase 1, and TANK-binding kinase 1. None of the compounds displayed any activity on these kinases. Secondly, the compounds were tested for their anti-inflammatory activity expressed as cyclooxygenase (COX) isoforms and 5-lipoxygenase (5-LOX) inhibition. Three of the compounds showed significant selectivity towards COX-1 isoform (COX-2/COX-1 SI = 20-30). They inhibited COX-1 in a single-digit µM range. There was also one compound that exhibited inhibitory activity towards all three tested enzymes in µM range (IC50COX-1 = 1.9 µM; IC50COX-2 and 5-LOX = 10.1µM. COX-1 inhibition was until recently considered undesirable due to COX-1 constitutive expression in most cell types and tissues. Thus, there are not many compounds known with selective COX-1 activity. However, it is now believed that COX-1 plays an important role in the pathophysiology of several acute and chronic disorders, including cancer or neurodegenerative diseases. Thus, the discovery of effective COX-1 selective inhibitors is desirable and important.Keywords: cyclooxygenases, kinases, lipoxygenases, quinazolines
Procedia PDF Downloads 1331373 An Improved C-Means Model for MRI Segmentation
Authors: Ying Shen, Weihua Zhu
Abstract:
Medical images are important to help identifying different diseases, for example, Magnetic resonance imaging (MRI) can be used to investigate the brain, spinal cord, bones, joints, breasts, blood vessels, and heart. Image segmentation, in medical image analysis, is usually the first step to find out some characteristics with similar color, intensity or texture so that the diagnosis could be further carried out based on these features. This paper introduces an improved C-means model to segment the MRI images. The model is based on information entropy to evaluate the segmentation results by achieving global optimization. Several contributions are significant. Firstly, Genetic Algorithm (GA) is used for achieving global optimization in this model where fuzzy C-means clustering algorithm (FCMA) is not capable of doing that. Secondly, the information entropy after segmentation is used for measuring the effectiveness of MRI image processing. Experimental results show the outperformance of the proposed model by comparing with traditional approaches.Keywords: magnetic resonance image (MRI), c-means model, image segmentation, information entropy
Procedia PDF Downloads 2241372 Hermeneutical Understanding of 2 Cor. 7:1 in the Light of Igbo Cultural Concept of Purification
Authors: H. E. Amolo
Abstract:
The concepts of pollution or contamination and purification or ritual cleansing are very important concepts among traditional Africans. This is because in relation to human behaviors and attitudes, they constitute on the one hand what could be referred to as moral demands and on the other, what results in the default of such demands. The many taboos which a man has to observe are not to be regarded as things mechanical which do not touch the heart, but that the avoidance is a sacred law respected by the community. In breaking it, you offend the divine power’. Researches have shown that, Africans tenaciously hold the belief that, moral values are based upon the recognition of the divine will and that sin in the community must be expelled if perfect peace is to be enjoyed. Sadly enough, these moral values are gradually eroding in contemporary times. Thus, this study proposal calls for a survey of the passage from an African cultural context; how it can enhance the understanding of the text, as well as how it can complement its scholarly interpretation with the view of institutionalizing the concept of holiness as a means of bringing the people closer to God, and also instilling ethical purity and righteousness.Keywords: cultural practices, Igbo ideology, purification, rituals
Procedia PDF Downloads 3051371 Connectomic Correlates of Cerebral Microhemorrhages in Mild Traumatic Brain Injury Victims with Neural and Cognitive Deficits
Authors: Kenneth A. Rostowsky, Alexander S. Maher, Nahian F. Chowdhury, Andrei Irimia
Abstract:
The clinical significance of cerebral microbleeds (CMBs) due to mild traumatic brain injury (mTBI) remains unclear. Here we use magnetic resonance imaging (MRI), diffusion tensor imaging (DTI) and connectomic analysis to investigate the statistical association between mTBI-related CMBs, post-TBI changes to the human connectome and neurological/cognitive deficits. This study was undertaken in agreement with US federal law (45 CFR 46) and was approved by the Institutional Review Board (IRB) of the University of Southern California (USC). Two groups, one consisting of 26 (13 females) mTBI victims and another comprising 26 (13 females) healthy control (HC) volunteers were recruited through IRB-approved procedures. The acute Glasgow Coma Scale (GCS) score was available for each mTBI victim (mean µ = 13.2; standard deviation σ = 0.4). Each HC volunteer was assigned a GCS of 15 to indicate the absence of head trauma at the time of enrollment in our study. Volunteers in the HC and mTBI groups were matched according to their sex and age (HC: µ = 67.2 years, σ = 5.62 years; mTBI: µ = 66.8 years, σ = 5.93 years). MRI [including T1- and T2-weighted volumes, gradient recalled echo (GRE)/susceptibility weighted imaging (SWI)] and gradient echo (GE) DWI volumes were acquired using the same MRI scanner type (Trio TIM, Siemens Corp.). Skull-stripping and eddy current correction were implemented. DWI volumes were processed in TrackVis (http://trackvis.org) and 3D Slicer (http://www.slicer.org). Tensors were fit to DWI data to perform DTI, and tractography streamlines were then reconstructed using deterministic tractography. A voxel classifier was used to identify image features as CMB candidates using Microbleed Anatomic Rating Scale (MARS) guidelines. For each peri-lesional DTI streamline bundle, the null hypothesis was formulated as the statement that there was no neurological or cognitive deficit associated with between-scan differences in the mean FA of DTI streamlines within each bundle. The statistical significance of each hypothesis test was calculated at the α = 0.05 level, subject to the family-wise error rate (FWER) correction for multiple comparisons. Results: In HC volunteers, the along-track analysis failed to identify statistically significant differences in the mean FA of DTI streamline bundles. In the mTBI group, significant differences in the mean FA of peri-lesional streamline bundles were found in 21 out of 26 volunteers. In those volunteers where significant differences had been found, these differences were associated with an average of ~47% of all identified CMBs (σ = 21%). In 12 out of the 21 volunteers exhibiting significant FA changes, cognitive functions (memory acquisition and retrieval, top-down control of attention, planning, judgment, cognitive aspects of decision-making) were found to have deteriorated over the six months following injury (r = -0.32, p < 0.001). Our preliminary results suggest that acute post-TBI CMBs may be associated with cognitive decline in some mTBI patients. Future research should attempt to identify mTBI patients at high risk for cognitive sequelae.Keywords: traumatic brain injury, magnetic resonance imaging, diffusion tensor imaging, connectomics
Procedia PDF Downloads 1691370 Blockchain Technology in Supply Chain Management: A Systematic Review And Meta-Analysis
Authors: Mohammad Yousuf Khan, Bhavya Alankar
Abstract:
Blockchain is a promising technology with its features such as immutability and decentralized database. It has applications in various fields such as pharmaceutical, finance, & the food industry. At the core of its heart lies its feature, traceability which is the most desired key in supply chains. However, supply chains have always been hit rock bottom by scandals and controversies. In this review paper, we have explored the advancement and research gaps of blockchain technology (BT) in supply chain management (SCM). We have used the Prisma framework for systematic literature review (SLR) and included a minuscule amount of grey literature to reduce publication bias. We found that supply chain traceability and transparency is the most researched objective in SCM. There was hardly any research in supply chain resilience. Further, we found that 40 % of the papers were application based. Most articles have focused on the advantages of BT, rather than analyzing it critically. This study will help identify gaps and suitable actions to be followed for an efficient implementation of BT in SCM.Keywords: blockchain technology, supply chain management, supply chain transparency, supply chain resilience
Procedia PDF Downloads 1581369 Audit Management of Constipation According to National Institute for Health and Care Excellence Guideline
Authors: Areej Makeineldein Mustafa
Abstract:
The study evaluates the management processes and healthcare provider compliance with the National Institute for Health and Care Excellence recommendations for constipation management. We aimed to evaluate the adherence to National Institute for Health and Care Excellence guidelines in the management of constipation during the period from February to June 2023. We collected data from a random sample ( 51 patients) over 4 months with inclusion criteria for patients above 60 who were just admitted to the care of the elderly department during this period. Patient age, sex, medical records for constipation, acute or chronic constipation, or opioid-induced constipation, and treatment options were used to identify constipation and the type of treatment given. Our findings indicate that there is a gap between practice and National Institute for Health and Care Excellence guideline steps; only 3 patient was given medications according to National Institute for Health and Care Excellence guidelines in order of combination or steps of escalation. Addressing these gaps could potentially lead to enhanced patient outcomes and an overall improvement in the quality of care provided to individuals suffering from constipation.Keywords: constipation, elderly, management, patient
Procedia PDF Downloads 881368 Appraisal of Parents' Views and Supervision of Their Children's Use of Information Communication Technology
Authors: Olabisi Adedigba
Abstract:
It is a fundamental truth that Information Communication Technology (ICT) lies at the very heart of our today’s society and determines its development. The use of ICT has given a boost to the educational and mental development of an average pupil of this age far above their counterparts who lived centuries ago. Nevertheless, the present age children stand the risk of the scourge of this technology if proactive measures are not taken urgently to arrest the damages of its negative use on them. One of the measures that can be taken is supervision of children’s use of ICT. This research therefore investigated parents’ views and supervision of their children’s use of Information Communication Technology. Descriptive design was adopted for this study. 300 parents were randomly selected. “Parents’ Views and Supervision of Children’s Use of ICT” was used to collect data for the study. Data collected were analyzed using percentage, mean, standard deviation and t-test. The result revealed that parents’ view of their children’s use of ICT is negative while supervision of their children’s use of ICT is low. Recommendations were thus offered that schools and other stakeholders should educate parents on children’s proper utilization of ICT and parents are urged to maintain adequate supervision on their children use of ICT.Keywords: appraisal of parents’ views and supervision, children’s use, information communication technology, t-test
Procedia PDF Downloads 5101367 Case Report: A Rare Case of Popliteal Artery Aneurysm Presenting with Foot Drop
Authors: John Yahng, Hansraj Riteesh Bookun
Abstract:
Popliteal artery aneurysms (PAAs) are the most common arterial aneurysm of the periphery. It is defined as focal dilation of the artery more than 50% of the normal vessel diameter which usually varies between 7 mm to 11 mm. The most common presentation for PAAs is claudication due to luminal stenosis secondary to mural thrombus or acute limb ischaemia due to occlusive thrombosis or distal thromboembolism. It is less common for patients to present with non-ischaemic symptoms secondary to mass effect and compression of adjacent structures, and of these, presentation with common peroneal nerve compression is particularly uncommon. We present a rare case of a 92-year-old female patient presenting with 4-month history of left foot drop with radiological evidence of common peroneal nerve compression secondary to PAA of 22 mm by 21mm in size. To the best of our knowledge, this is the smallest reported popliteal aneurysm presenting with foot drop. We also present the endovascular treatment option taken in our case.Keywords: aneurysm, foot drop, peroneal nerve, popliteal
Procedia PDF Downloads 4021366 System Survivability in Networks
Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez
Abstract:
We consider the problem of attacks on networks. We define the concept of system survivability in networks in the presence of intelligent threats. Our setting of the problem assumes a flow to be sent from one source node to a destination node. The attacker attempts to disable the network by preventing the flow to reach its destination while the defender attempts to identify the best path-set to use to maximize the chance of arrival of the flow to the destination node. Our concept is shown to be different from the classical concept of network reliability. We distinguish two types of network survivability related to the defender and to the attacker of the network, respectively. We prove that the defender-based-network survivability plays the role of a lower bound while the attacker-based-network survivability plays the role of an upper bound of network reliability. We also prove that both concepts almost never agree nor coincide with network reliability. Moreover, we use the shortest-path problem to determine the defender-based-network survivability and the min-cut problem to determine the attacker-based-network survivability. We extend the problem to a variety of models including the minimum-spanning-tree problem and the multiple source-/destination-network problems.Keywords: defense/attack strategies, information, networks, reliability, survivability
Procedia PDF Downloads 3911365 Effect of Recreational Soccer on Health Indices and Diseases Prevention
Authors: Avinash Kharel
Abstract:
Recreational soccer (RS) as a medium of small-sided soccer game (SSG) has an immense positive effect on physical health, mental health and wellbeing. The RS has reflected both acute responses and long-term effects of training on sedentary, trained and clinical population on any age, gender or health status. The enjoyable mode of training elicits greater adherence by optimising intrinsic motivation while offering health benefits that match those achieved by treadmill and cycle ergometer programmes both as continuous and interval forms of training. Additionally, recreational soccer is effective and efficient regimens with highlighted social, motivational and competitive components overcoming the barriers such as cost-efficiency, time-efficiency, assess to facilities and intrinsic motivation. Further, it can be applied as an effective broad-spectrum non-pharmacological treatment of lifestyle diseases producing a positive physiological response in healthy subjects, patients and elderly people regardless of age, gender or training experience.Keywords: recreational soccer, health benefits, diseases prevention, physiology
Procedia PDF Downloads 871364 Food Safety Management in Riyadh’s Ministry of Health Hospitals
Authors: A. Alrasheed, I. Connerton
Abstract:
Providing patients with safe meals on a daily basis is one of the challenges in the healthcare sector. In Saudi Arabia matters related to food safety and hygiene have been the heart of the Ministry of Health (MOH) and Saudi Food and Drugs Authority (SFDA). The aim of this study is to examine the causes of inadequate implementation of food safety management systems such as HACCP in Riyadh’s MOH hospitals. By the law, food safety must be managed using a documented, HACCP based approach, and food handlers must be appropriately trained in food safety. Food handlers in Saudi Arabia are not required to provide a certificate or attend a food handling training course even in healthcare sectors. Since food safety and hygiene issues are of increasing importance for Saudi Arabian health decision makers, the SFDA has been established to apply food hygiene requirements in all food operations. It should be pointed out that the implications of food outbreaks on the whole society may potentially go beyond individual health impacts but also impact on the Nation’s health and bring about economic repercussions.Keywords: food safety, patient, hospital, HACCP
Procedia PDF Downloads 8701363 Analysis and Rule Extraction of Coronary Artery Disease Data Using Data Mining
Authors: Rezaei Hachesu Peyman, Oliyaee Azadeh, Salahzadeh Zahra, Alizadeh Somayyeh, Safaei Naser
Abstract:
Coronary Artery Disease (CAD) is one major cause of disability in adults and one main cause of death in developed. In this study, data mining techniques including Decision Trees, Artificial neural networks (ANNs), and Support Vector Machine (SVM) analyze CAD data. Data of 4948 patients who had suffered from heart diseases were included in the analysis. CAD is the target variable, and 24 inputs or predictor variables are used for the classification. The performance of these techniques is compared in terms of sensitivity, specificity, and accuracy. The most significant factor influencing CAD is chest pain. Elderly males (age > 53) have a high probability to be diagnosed with CAD. SVM algorithm is the most useful way for evaluation and prediction of CAD patients as compared to non-CAD ones. Application of data mining techniques in analyzing coronary artery diseases is a good method for investigating the existing relationships between variables.Keywords: classification, coronary artery disease, data-mining, knowledge discovery, extract
Procedia PDF Downloads 6571362 Effects of Dietary Factors on Gout
Authors: Olor Obi, Ishiekwen Bridget, Ekpeyong Edom
Abstract:
Even though gout is becoming more common, the role of dietary risk factors in the development and management of this condition remains unclear. Therefore, this review work will aim at clarifying the role of dietary factors in the risk and management of gout. An extensive search of literature published between 1960 and 2018 will be performed on the databases of PubMed, CINAHL, Science Direct, Cochrane, BMJ, Ann Rheum Dis, and BioMed to identify relevant cohort, prospective, population-based, or cross-sectional studies that examined the effect of diet on gout. About 19 studies will be included in this review work. The methodological quality of these studies will be evaluated using the quality assessment tool for observational and cross-sectional studies developed by the National Heart, Lungs, and Blood Institute. This work intends to reveal that a positive association exists between the intake of sugary, sweetened beverages and the risk of gout. It will also reveal the relationship between the increase in coffee consumption and the risk of gout.Keywords: gout, dietary factors, management of gout, gouty arthritis
Procedia PDF Downloads 561361 Previously Undescribed Cardiac Abnormalities in Two Unrelated Autistic Males with Causative Variants in CHD8
Authors: Mariia A. Parfenenko, Ilya S. Dantsev, Sergei V. Bochenkov, Natalia V. Vinogradova, Olga S. Groznova, Victoria Yu. Voinova
Abstract:
Introduction: Autism is the most common neurodevelopmental disorder. Autism is characterized by difficulties in social interaction and adherence to stereotypic behavioral patterns and frequently co-occurs with epilepsy, intellectual disabilities, connective tissue disorders, and other conditions. CHD8 codes for chromodomain-helicase-DNA-binding protein 8 - a chromatin remodeler that regulates cellular proliferation and neurodevelopment in embryogenesis. CHD8 is one of the genes most frequently involved in autism. Patients and methods: 2 unrelated male patients, P3 and P12, aged 3 and 12 years old, underwent whole genome sequencing, which determined that they both had different likely pathogenic variants, both previously undescribed in literature. Sanger sequencing later determined that P12 inherited the variant from his affected mother. Results: P3 and P12 presented with autism, a developmental delay, ataxia, sleep disorders, overgrowth, and macrocephaly, as well as other clinical features typically present in patients with causative variants in CHD8. The mother of P12 also has autistic traits, as well as ataxia, hypotonia, sleep disorders, and other symptoms. However, P3 and P12 also have different cardiac abnormalities. P3 had signs of a repolarization disorder: a flattened T wave in the III and aVF derivations and a negative T wave in the V1-V2 derivations. He also had structural valve anomalies with associated regurgitation, local contractility impairment of the left ventricular, and diastolic dysfunction of the right ventricle. Meanwhile, P12 had Wolff-Parkinson-White syndrome and underwent radiofrequency ablation at the age of 2 years. At the time of observation, P12 had mild sinus arrhythmia and an incomplete right bundle branch block, as well as arterial hypertension. Discussion: Cardiac abnormalities were not previously reported in patients with causative variants in CHD8. The underlying mechanism for the formation of those abnormalities is currently unknown. However, the two hypotheses are either a disordered interaction with CHD7 – another chromodomain remodeler known to be directly involved in the cardiophenotype of CHARGE syndrome – a rare condition characterized by coloboma, heart defects and growth abnormalities, or the disrupted functioning of CHD8 as an A-Kinase Anchoring Protein, which are known to modulate cardiac function. Conclusion: We observed 2 unrelated autistic males with likely pathogenic variants in CHD8 that presented with typical symptoms of CHD8-related neurodevelopmental disorder, as well as cardiac abnormalities. Cardiac abnormalities have, until now, been considered uncharacteristic for patients with causative variants in CHD8. Further accumulation of data, including experimental evidence of the involvement of CHD8 in heart formation, will elucidate the mechanism underlying the cardiophenotype of those patients. Acknowledgements: Molecular genetic testing of the patients was made possible by the Charity Fund for medical and social genetic aid projects «Life Genome.»Keywords: autism spectrum disorders, chromodomain-helicase-DNA-binding protein 8, neurodevelopmental disorder, cardio phenotype
Procedia PDF Downloads 851360 Acute Toxicity and the Effects of dichromate potassium (K2Cr2O7) in sobaity seabream (Sparidebtex hasta)
Authors: Elnaz Erfani, Elahe Erfni
Abstract:
In this study, 96h LC50 values of dichromate potassium (K2Cr2O7), a highly toxicant heavy metal on sobaity seabream, Sparidebtex hasta of average weight mean weight 3.24 g; mean length 5.35cm was determined. At first, for rang finding test, fish were exposed to K2Cr2O7 at several selected concentrations 5, 10, 20, 30, 40, 50 and 60 mg/L, then fish exposed to five concentrations control, 40, 45, 50 and 55 mg/L of K2Cr2O7 for LC50-96h. The experiment was carried out in triplicate, and 21 fish per each treatment, Physicochemical properties of water were measured continuously throughout the experiment. The temperature, pH, dissolved oxygen and salinity were 26 ◦c, 7.05, 8.84 mgO2 L-1 and 37.5 ppt, respectively. A number of mortality and behavioral responses of fish were recorded after 24, 48, 72 and 96 h. LC50 values were determined with probate analysis. The 96 hour LC50 value of K2Cr2O7 to the fish was found to be 48.82 ppm. In addition, behavioural changes increased with increased concentration. The results obtained in this study clearly revealed the fact that it is necessary to control the use of a heavy metal such as dichromate potassium.Keywords: marin fish- lc50, dicromat potassium, lc50, mortality
Procedia PDF Downloads 1921359 Effect of Natural and Urban Environments on the Perception of Thermal Pain – Experimental Research Using Virtual Environments
Authors: Anna Mucha, Ewa Wojtyna, Anita Pollak
Abstract:
The environment in which an individual resides and observes may play a meaningful role in well-being and related constructs. Contact with nature may have a positive influence of natural environments on individuals, impacting mood and psychophysical sensations, such as pain relief. Conversely, urban settings, dominated by concrete elements, might lead to mood decline and heightened stress levels. Similarly, the situation may appear in the case of the perception of virtual environments. However, this is a topic that requires further exploration, especially in the context of relationships with pain. The aforementioned matters served as the basis for formulating and executing the outlined experimental research within the realm of environmental psychology, leveraging new technologies, notably virtual reality (VR), which is progressively gaining prominence in the domain of mental health. The primary objective was to investigate the impact of a simulated virtual environment, mirroring a natural setting abundant in greenery, on the perception of acute pain induced by thermal stimuli (high temperature) – encompassing intensity, unpleasantness, and pain tolerance. Comparative analyses were conducted between the virtual natural environment (intentionally constructed in the likeness of a therapeutic garden), virtual urban environment, and a control group devoid of virtual projections. Secondary objectives aimed to determine the mutual relationships among variables such as positive and negative emotions, preferences regarding virtual environments, sense of presence, and restorative experience in the context of the perception of presented virtual environments and induced thermal pain. The study encompassed 126 physically healthy Polish adults, distributing 42 individuals across each of the three comparative groups. Oculus Rift VR technology and the TSA-II neurosensory analyzer facilitated the experiment. Alongside demographic data, participants' subjective feelings concerning virtual reality and pain were evaluated using the Visual Analogue Scale (VAS), the original Restorative Experience in the Virtual World questionnaire (Doświadczenie Regeneracji w Wirtualnym Świecie), and an adapted Slater-Usoh-Steed (SUS) questionnaire. Results of statistical and psychometric analyses, such as Kruskal-Wallis tests, Wilcoxon tests, and contrast analyses, underscored the positive impact of the virtual natural environment on individual pain perception and mood. The virtual natural environment outperformed the virtual urban environment and the control group without virtual projection, particularly in subjective pain components like intensity and unpleasantness. Variables such as restorative experience, sense of presence and virtual environment preference also proved pivotal in pain perception and pain tolerance threshold alterations, contingent on specific conditions. This implies considerable application potential for virtual natural environments across diverse realms of psychology and related fields, among others as a supportive analgesic approach and a form of relaxation following psychotherapeutic sessions.Keywords: environmental psychology, nature, acute pain, emotions, vitrual reality, virtual environments
Procedia PDF Downloads 621358 Alcohol and Tobacco Influencing Prevalence of Hypertension among 15-54 Old Indian Men: An Application of Discriminant Analysis Using National Family Health Survey, 2015-16
Authors: Chander Shekhar, Jeetendra Yadav, Shaziya Allarakha
Abstract:
Hypertension has been described as an 'iceberg disease' as those who suffered are ignored and hence usually seek healthcare services at a very late stage. It is estimated that more than 2 million Indians are suffering from hypertensive heart disease that contributed to above 0.13 million deaths in 2016. The paper study aims to know the prevalence of Hypertension in India and its variation by socioeconomic backgrounds and to find out risk factors discriminating hypertension with special emphasis on consumption of tobacco and alcohol among men aged 15-54 years in India. The paper uses NFHS (2015-16) data. The paper used binary logistic regression and discriminant analysis to find significant predictors and discriminants of interest. The prevalence of hypertension was 16.5% in the study population. The results suggest that consumption of alcohol and tobacco are significant discriminant characteristics in carrying hypertension irrespective of what socioeconomic background characteristic he possesses.Keywords: hypertention, alcohol, tobacco, discriminant
Procedia PDF Downloads 1431357 Exploring Cardiovascular and Behavioral Impacts of Aerobic Exercise: A Moroccan Perspective
Authors: Ahmed Boujdad
Abstract:
Morocco, a North African nation known for its rich culture and diverse landscapes, is facing evolving challenges related to cardiovascular health and behavioral well-being. Against this backdrop, the paper aims to spotlight the insights emerging from Moroccan research into the impacts of aerobic exercise on cardiovascular physiology and psychological outcomes. Presentations will encompass a range of topics, including exercise-induced adaptations in heart function, blood pressure management, and vascular health specific to the Moroccan population. A notable focus of the paper will be the examination of how aerobic exercise intertwines with Moroccan behavioral patterns and sociocultural factors. The research will delve into the links between regular exercise and its potential to alleviate stress, anxiety, and depression in the Moroccan context. This exploration extends to the role of exercise in bolstering the cultural fabric of Moroccan society, enhancing community engagement, and promoting a sense of well-being.Keywords: event-related potential, executive function, physical activity, kinesiology
Procedia PDF Downloads 811356 Main Chaos-Based Image Encryption Algorithm
Authors: Ibtissem Talbi
Abstract:
During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich
Procedia PDF Downloads 6831355 SCANet: A Workflow for Single-Cell Co-Expression Based Analysis
Authors: Mhaned Oubounyt, Jan Baumbach
Abstract:
Differences in co-expression networks between two or multiple cells (sub)types across conditions is a pressing problem in single-cell RNA sequencing (scRNA-seq). A key challenge is to define those co-variations that differ between or among cell types and/or conditions and phenotypes to examine small regulatory networks that can explain mechanistic differences. To this end, we developed SCANet, an all-in-one Python package that uses state-of-the-art algorithms to facilitate the workflow of a combined single-cell GCN (Gene Correlation Network) and GRN (Gene Regulatory Networks) pipeline, including inference of gene co-expression modules from scRNA-seq, followed by trait and cell type associations, hub gene detection, co-regulatory networks, and drug-gene interactions. In an example case, we illustrate how SCANet can be applied to identify regulatory drivers behind a cytokine storm associated with mortality in patients with acute respiratory illness. SCANet is available as a free, open-source, and user-friendly Python package that can be easily integrated into systems biology pipelines.Keywords: single-cell, co-expression networks, drug-gene interactions, co-regulatory networks
Procedia PDF Downloads 1471354 The Hauntings of Empire: Imperial Nationalism and International Relations
Authors: Katie Hudson
Abstract:
A growing body of scholarship is dedicated to the concept of imperial nationalism, denoting a nostalgia for empire amongst former imperial powers and a yearning to recapture the grandeur of the imperial ‘golden age.’ Much research within this field has focused on Brexit, arguing that Britain’s imperialist identity has spawned Euroscepticism. However, the interaction between imperial nationalism and foreign policy remains underdeveloped and thus far has failed to consider cases outside of the UK. Using maximum variation sampling across post-2000 Britain, Spain and the Netherlands, this comparative analysis aims to explore the discursive invocation of empire in foreign policy framing, under which circumstances and in what ways imperial nationalism emerges. Preliminary findings demonstrate that empire is most often cited when there is a perceived threat to the sovereignty of the nation and that all cases frame foreign policy options according to their acute concerns with regaining the prestige associated with empire. This is present to a lesser extent in Spain, whose earlier period of decolonisation affected the extent to which imperialism has permeated their national psyche. This, therefore, provides an alternative lens through which we can view both Euroscepticism and international relations, conditioned by an imperial legacy.Keywords: empire, nationalism, foreign policy, IR
Procedia PDF Downloads 931353 Sharing Experience in Authentic Learning for Mobile Security
Abstract:
Mobile devices such as smartphones are getting more and more popular in our daily lives. The security vulnerability and threat attacks become a very emerging and important research and education topic in computing security discipline. There is a need to have an innovative mobile security hands-on laboratory to provide students with real world relevant mobile threat analysis and protection experience. This paper presents an authentic teaching and learning mobile security approach with smartphone devices which covers most important mobile threats in most aspects of mobile security. Each lab focuses on one type of mobile threats, such as mobile messaging threat, and conveys the threat analysis and protection in multiple ways, including lectures and tutorials, multimedia or app-based demonstration for threats analysis, and mobile app development for threat protections. This authentic learning approach is affordable and easily-adoptable which immerse students in a real world relevant learning environment with real devices. This approach can also be applied to many other mobile related courses such as mobile Java programming, database, network, and any security relevant courses so that can learn concepts and principles better with the hands-on authentic learning experience.Keywords: mobile computing, Android, network, security, labware
Procedia PDF Downloads 4051352 An Effective Route to Control of the Safety of Accessing and Storing Data in the Cloud-Based Data Base
Authors: Omid Khodabakhshi, Amir Rozdel
Abstract:
The subject of cloud computing security research has allocated a number of challenges and competitions because the data center is comprised of complex private information and are always faced various risks of information disclosure by hacker attacks or internal enemies. Accordingly, the security of virtual machines in the cloud computing infrastructure layer is very important. So far, there are many software solutions to develop security in virtual machines. But using software alone is not enough to solve security problems. The purpose of this article is to examine the challenges and security requirements for accessing and storing data in an insecure cloud environment. In other words, in this article, a structure is proposed for the implementation of highly isolated security-sensitive codes using secure computing hardware in virtual environments. It also allows remote code validation with inputs and outputs. We provide these security features even in situations where the BIOS, the operating system, and even the super-supervisor are infected. To achieve these goals, we will use the hardware support provided by the new Intel and AMD processors, as well as the TPM security chip. In conclusion, the use of these technologies ultimately creates a root of dynamic trust and reduces TCB to security-sensitive codes.Keywords: code, cloud computing, security, virtual machines
Procedia PDF Downloads 1891351 Experimental Investigation of Damaged Reinforced Concrete Beams Repaired with Carbon Fibre Reinforced Polymer (CFRP) Strip under Impact Loading
Authors: M. Al-Farttoosi, M. Y. Rafiq, J. Summerscales, C. Williams
Abstract:
Many buildings and bridges are damaged due to impact loading, explosions, terrorist attacks and wars. Most of the damaged structures members such as beams, columns and slabs are not totally failed and it can be repaired. Nowadays, carbon fibre reinforced polymer CFRP has been wildly used in strengthening and retrofitting the structures members. CFRP can rector the load carrying capacity of the damaged structures members to make them serviceable. An experimental investigation was conducted to investigate the impact behaviour of the damaged beams repaired with CFRP. The tested beams had different degrees of damage and near surface mounted technique NSM was used to install the CFRP. A heavy drop weight impact test machine was used to conduct the experimental work. The study investigated the impact strength, stiffness, cracks and deflection of the CFRP repaired beams. The results show that CFRP significantly increased the impact resistance of the damaged beams. CFRP increased the damaged beams stiffness and reduced the deflection. The results showed that the NSM technique is more effective in repairing beams and preventing the debonding of the CFRP.Keywords: damaged, concrete, impact, repaired
Procedia PDF Downloads 3421350 Anomalous Course of Left Ovarian Vein Associated with Pelvic Congestion Syndrome
Authors: Viyango Pandian, Kumaresh Athiyappan
Abstract:
Pelvic congestion Syndrome (PCS) is usually seen in multiparous women who give history of chronic dull-aching pelvic pain. We report a case of a 17 year old unmarried female, who presented with acute onset of chronic dull-aching abdominal pain in the left iliac fossa, which particularly increased during menstruation and was finally diagnosed to be pelvic congestion syndrome. On ultrasonography, multiple tortuous and dilated veins were observed in the left adnexa. Both ovaries appeared normal in size, volume and echotexture. Computed tomography (CT) angiography was performed to precisely delineate the venous pathway and to assess any associated abnormality; which showed a dilated and tortuous left ovarian vein with an anomalous course around the left kidney and draining into the left renal vein. Clinical parameters and hormonal levels were within normal limits. This is a rare case of anomalous course of left ovarian vein associated with pelvic congestion syndrome.Keywords: anomalous course of ovarian vein, computed tomography, pelvic congestion syndrome, ultrasonography
Procedia PDF Downloads 4151349 Measurement of Susceptibility Users Using Email Phishing Attack
Authors: Cindy Sahera, Sarwono Sutikno
Abstract:
Rapid technological developments also have negative impacts, namely the increasing criminal cases based on technology or cybercrime. One technique that can be used to conduct cybercrime attacks are phishing email. The issue is whether the user is aware that email can be misused by others so that it can harm the user's own? This research was conducted to measure the susceptibility of selected targets against email abuse. The objectives of this research are measurement of targets’ susceptibility and find vulnerability in email recipient. There are three steps being taken in this research, (1) the information gathering phase, (2) the design phase, and (3) the execution phase. The first step includes the collection of the information necessary to carry out an attack on a target. The next step is to make the design of an attack against a target. The last step is to send phishing emails to the target. The levels of susceptibility are three: level 1, level 2 and level 3. Level 1 indicates a low level of targets’ susceptibility, level 2 indicates the intermediate level of targets’ susceptibility, and level 3 indicates a high level of targets’ susceptibility. The results showed that users who are on level 1 and level 2 more that level 3, which means the user is not too careless. However, it does not mean the user to be safe. There are still vulnerabilities that may occur, such as automatic location detection when opening emails and automatic downloaded malware as user clicks a link in the email.Keywords: cybercrime, email phishing, susceptibility, vulnerability
Procedia PDF Downloads 2831348 Human Wildlife Conflict Outside Protected Areas of Nepal: Causes, Consequences and Mitigation Strategies
Authors: Kedar Baral
Abstract:
This study was carried out in Mustang, Kaski, Tanahun, Baitadi, and Jhapa districts of Nepal. The study explored the spatial and temporal pattern of HWC, socio economic factors associated with it, impacts of conflict on life / livelihood of people and survival of wildlife species, and impact of climate change and forest fire onHWC. Study also evaluated people’s attitude towards wildlife conservation and assessed relevant policies and programs. Questionnaire survey was carried out with the 250 respondents, and both socio-demographic and HWC related information werecollected. Secondary information were collected from Divisional Forest Offices and Annapurna Conservation Area Project.HWC events were grouped by season /months/sites (forest type, distances from forest, and settlement), and the coordinates of the events were exported to ArcGIS. Collected data were analyzed using descriptive statistics in Excel and R Program. A total of 1465 events were recorded in 5 districts during 2015 and 2019. Out of that, livestock killing, crop damage, human attack, and cattle shed damage events were 70 %, 12%, 11%, and 7%, respectively. Among 151 human attack cases, 23 people were killed, and 128 were injured. Elephant in Terai, common leopard and monkey in Middle Mountain, and snow leopard in high mountains were found as major problematic animals. Common leopard attacks were found more in the autumn, evening, and on human settlement area. Whereas elephant attacks were found higher in winter, day time, and on farmland. Poor people farmers were found highly victimized, and they were losing 26% of their income due to crop raiding and livestock depredation. On the other hand, people are killing many wildlife in revenge, and this number is increasing every year. Based on the people's perception, climate change is causing increased temperature and forest fire events and decreased water sources within the forest. Due to the scarcity of food and water within forests, wildlife are compelled to dwell at human settlement area, hence HWC events are increasing. Nevertheless, more than half of the respondents were found positive about conserving entire wildlife species. Forests outside PAs are under the community forestry (CF) system, which restored the forest, improved the habitat, and increased the wildlife.However, CF policies and programs were found to be more focused on forest management with least priority on wildlife conservation and HWC mitigation. Compensation / relief scheme of government for wildlife damage was found some how effective to manage HWC, but the lengthy process, being applicable to the damage of few wildlife species and highly increasing events made it necessary to revisit. Based on these facts, the study suggest to carry out awareness generation activities to the poor farmers, linking the property of people with the insurance scheme, conducting habitat management activities within CF, promoting the unpalatable crops, improvement of shed house of livestock, simplifying compensation scheme and establishing a fund at the district level and incorporating the wildlife conservation and HWCmitigation programs in CF. Finally, the study suggests to carry out rigorous researches to understand the impacts of current forest management practices on forest, biodiversity, wildlife, and HWC.Keywords: community forest, conflict mitigation, wildlife conservation, climate change
Procedia PDF Downloads 115