Search results for: Acute heart attacks
1317 Experimental Studies on the Corrosion Effects of the Concrete Made with Tannery Effluent
Authors: K. Nirmalkumar
Abstract:
An acute water scarcity is prevailing in the dry season in and around Perundurai (Erode district, Tamil Nadu, India) where there are more number of tannery units. Hence an attempt was made to use the effluent from the tannery industry for construction purpose. The mechanical properties such as compressive strength, tensile strength, flexural strength and the special properties such as chloride attack, sulphate attack and chemical attack were studied by casting various concrete specimens in form of cube, cylinders and beams, etc. It was observed that the concrete had some reduction in strength while subjected to chloride attack, sulphate attack and chemical attack. So admixtures were selected and optimized in suitable proportion to counter act the adverse effects and the results were found to be satisfactory. In this research study the corrosion results of specimens prepared by using treated and untreated tannery effluent were compared with the concrete specimens prepared by using potable water. It was observed that by the addition of admixtures, the adverse effects due to the usage of the treated and untreated tannery effluent are counteracted.Keywords: corrosion, calcium nitrite, concrete, fly ash
Procedia PDF Downloads 2671316 The Role of Hausa Oral Praise Singer in Conflict Management and Social Mobilization in Nigeria
Authors: Ladan Surajo
Abstract:
Nigeria as a third world country is full of people who cannot read and write, thereby constituting a stumbling block to the modern way of communication. It is a well known fact that Nigeria is a heterogeneous country with an estimated 450 or more ethnic groups communicating in divergent languages. Despite this scenario, English, Hausa, Igbo and Yoruba languages are predominantly used in the country. Apart from English language, Hausa has a wider coverage of usage among the indigenous languages in Nigeria, thereby using it in the area of social mobilization and conflict management cannot be overemphasized. Hausa Oral Singers are depicting their artistic and God endowed talents through singing to mobilize and sensitize the local communities about government programmes and the ills of other social problems of the society. It is the belief of this researcher that if used properly, the Hausa Oral Singers will assist immensely in reducing to the barest minimum some social ills of the society in Nigeria. More so that music is the food of the heart and has a resounding impact in changing the behaviour of individuals and groups.Keywords: oral, singers, praise, social mobilization, conflict management
Procedia PDF Downloads 4611315 The Strategy of Orbit Avoidance for Optical Remote Sensing Satellite
Authors: Dianxun Zheng, Wuxing Jing, Lin Hetong
Abstract:
Optical remote sensing satellite, always running on the Sun-synchronous orbit, equipped laser warning equipment to alert CCD camera from laser attack. There have three ways to protect the CCD camera, closing the camera cover satellite attitude maneuver and satellite orbit avoidance. In order to enhance the safety of optical remote sensing satellite in orbit, this paper explores the strategy of satellite avoidance. The avoidance strategy is expressed as the evasion of pre-determined target points in the orbital coordinates of virtual satellite. The so-called virtual satellite is a passive vehicle which superposes a satellite at the initial stage of avoidance. The target points share the consistent cycle time and the same semi-major axis with the virtual satellite, which ensures the properties of the Sun-synchronous orbit remain unchanged. Moreover, to further strengthen the avoidance capability of satellite, it can perform multi-object avoid maneuvers. On occasions of fulfilling the orbit tasks of the satellite, the orbit can be restored back to virtual satellite through orbit maneuvers. There into, the avoid maneuvers adopts pulse guidance. and the fuel consumption is also optimized. The avoidance strategy discussed in this article is applicable to avoidance for optical remote sensing satellite when encounter the laser hostile attacks.Keywords: optical remote sensing satellite, always running on the sun-synchronous
Procedia PDF Downloads 3981314 Application of Infrared Thermal Imaging, Eye Tracking and Behavioral Analysis for Deception Detection
Authors: Petra Hypšová, Martin Seitl
Abstract:
One of the challenges of forensic psychology is to detect deception during a face-to-face interview. In addition to the classical approaches of monitoring the utterance and its components, detection is also sought by observing behavioral and physiological changes that occur as a result of the increased emotional and cognitive load caused by the production of distorted information. Typical are changes in facial temperature, eye movements and their fixation, pupil dilation, emotional micro-expression, heart rate and its variability. Expanding technological capabilities have opened the space to detect these psychophysiological changes and behavioral manifestations through non-contact technologies that do not interfere with face-to-face interaction. Non-contact deception detection methodology is still in development, and there is a lack of studies that combine multiple non-contact technologies to investigate their accuracy, as well as studies that show how different types of lies produced by different interviewers affect physiological and behavioral changes. The main objective of this study is to apply a specific non-contact technology for deception detection. The next objective is to investigate scenarios in which non-contact deception detection is possible. A series of psychophysiological experiments using infrared thermal imaging, eye tracking and behavioral analysis with FaceReader 9.0 software was used to achieve our goals. In the laboratory experiment, 16 adults (12 women, 4 men) between 18 and 35 years of age (SD = 4.42) were instructed to produce alternating prepared and spontaneous truths and lies. The baseline of each proband was also measured, and its results were compared to the experimental conditions. Because the personality of the examiner (particularly gender and facial appearance) to whom the subject is lying can influence physiological and behavioral changes, the experiment included four different interviewers. The interviewer was represented by a photograph of a face that met the required parameters in terms of gender and facial appearance (i.e., interviewer likability/antipathy) to follow standardized procedures. The subject provided all information to the simulated interviewer. During follow-up analyzes, facial temperature (main ROIs: forehead, cheeks, the tip of the nose, chin, and corners of the eyes), heart rate, emotional expression, intensity and fixation of eye movements and pupil dilation were observed. The results showed that the variables studied varied with respect to the production of prepared truths and lies versus the production of spontaneous truths and lies, as well as the variability of the simulated interviewer. The results also supported the assumption of variability in physiological and behavioural values during the subject's resting state, the so-called baseline, and the production of prepared and spontaneous truths and lies. A series of psychophysiological experiments provided evidence of variability in the areas of interest in the production of truths and lies to different interviewers. The combination of technologies used also led to a comprehensive assessment of the physiological and behavioral changes associated with false and true statements. The study presented here opens the space for further research in the field of lie detection with non-contact technologies.Keywords: emotional expression decoding, eye-tracking, functional infrared thermal imaging, non-contact deception detection, psychophysiological experiment
Procedia PDF Downloads 981313 Detection of Cyberattacks on the Metaverse Based on First-Order Logic
Authors: Sulaiman Al Amro
Abstract:
There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies and is therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and, thus, the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.Keywords: security, privacy, metaverse, cyberattacks, detection, first-order logic
Procedia PDF Downloads 391312 Surface Adjustments for Endothelialization of Decellularized Porcine Pericardium
Authors: M. Markova, E. Filova, O. Kaplan, R. Matejka, L. Bacakova
Abstract:
The porcine pericardium is used as a material for cardiac and aortic valves substitutes. Current biological aortic heart valve prosthesis have a limited lifetime period because they undergo degeneration. In order to make them more biocompatible and prolong their lifetime it is necessary to reseed the decellularized prostheses with endothelial cells and with valve interstitial cells. The endothelialization of the prosthesis-surface may be supported by suitable chemical surface modification of the prosthesis. The aim of this study is to prepare bioactive fibrin layers which would both support endothelialization of porcine pericardium and enhance differentiation and maturation of the endothelial cells seeded. As a material for surface adjustments we used layers of fibrin with/without heparin and some of them with adsorbed or chemically bound FGF2, VEGF or their combination. Fibrin assemblies were prepared in 24-well cell culture plate and were seeded with HSVEC (Human Saphenous Vein Endothelial Cells) at a density of 20,000 cells per well in EGM-2 medium with 0.5% FS and without heparin, without FGF2 and without VEGF; medium was supplemented with aprotinin (200 U/mL). As a control, surface polystyrene (PS) was used. Fibrin was also used as homogeneous impregnation of the decellularized porcine pericardium throughout the scaffolds. Morphology, density, and viability of the seeded endothelial cells were observed from micrographs after staining the samples by LIVE/DEAD cytotoxicity/viability assay kit on the days 1, 3, and 7. Endothelial cells were immunocytochemically stained for proteins involved in cell adhesion, i.e. alphaV integrin, vinculin, and VE-cadherin, markers of endothelial cells differentiation and maturation, i.e. von Willebrand factor and CD31, and for extracellular matrix proteins typically produced by endothelial cells, i.e. type IV collagen and laminin. The staining intensities were subsequently quantified using a software. HSVEC cells grew on each of the prepared surfaces better than on control surface. They reached confluency. The highest cell densities were obtained on the surface of fibrin with heparin and both grow factors used together. Intensity of alphaV integrins staining was highest on samples with remained fibrin layer, i.e. on layers with lower cell densities, i.e. on fibrin without heparin. Vinculin staining was apparent, but was rather diffuse, on fibrin with both FGF2 and VEGF and on control PS. Endothelial cells on all samples were positively stained for von Willebrand factor and CD31. VE-cadherin receptors clusters were best developed on fibrin with heparin and growth factors. Significantly stronger staining of type IV collagen was observed on fibrin with heparin and both growth factors. Endothelial cells on all samples produced laminin-1. Decellularized pericardium was homogeneously filled with fibrin structures. These fibrin-modified pericardium samples will be further seeded with cells and cultured in a bioreactor. Fibrin layers with/without heparin and with adsorbed or chemically bound FGF2, VEGF or their combination are good surfaces for endothelialization of cardiovascular prostheses or porcine pericardium based heart valves. Supported by the Ministry of Health, grants No15-29153A and 15-32497A, and the Grant Agency of the Czech Republic, project No. P108/12/G108.Keywords: aortic valves prosthesis, FGF2, heparin, HSVEC cells, VEGF
Procedia PDF Downloads 2601311 Human-Tiger Conflict in Chitwan National Park, Nepal
Authors: Abishek Poudel
Abstract:
Human-tiger conflicts are serious issues of conflicts between local people and park authority and the conflicting situation potentially play negative role in park management. The study aimed (1) To determine the trend and nature of human-tiger conflicts (2) To understand people's perception and mitigation measures towards tiger conservation. Both primary and secondary information were used to determine human- tiger conflicts in Chitwan National Park. Systematic random sampling with 5% intensity was done to collect the perception of the villagers regarding human-tiger conflicts. The study sites were selected based on frequencies of incidences of human attacks and livestock depredation viz. Rajahar and Ayodhyapuri VDCs respectively. The trend of human casualties by tiger has increased in last five year whereas the trend of livestock has decreased. Reportedly, between 2008 and 2012, tigers killed 22 people, injured 10 and killed at least 213 livestock. Conflict was less common in the park and more intense in the sub-optimal habitats of Buffer Zone. Goat was the most vulnerable livestock followed by cattle. The livestock grazing and human intrusion into tiger habitat were the causes of conflicts. Developing local stewardship and support for tiger conservation, livestock insurance, and compensation policy simplification may help reduce human-tiger conflicts.Keywords: livestock depredation, sub optimal habitat, human-tiger, local stewardship
Procedia PDF Downloads 4631310 A Flexible Piezoelectric - Polymer Composite for Non-Invasive Detection of Multiple Vital Signs of Human
Authors: Sarah Pasala, Elizabeth Zacharias
Abstract:
Vital sign monitoring is crucial for both everyday health and medical diagnosis. A significant factor in assessing a human's health is their vital signs, which include heart rate, breathing rate, blood pressure, and electrocardiogram (ECG) readings. Vital sign monitoring has been the focus of many system and method innovations recently. Piezoelectrics are materials that convert mechanical energy into electrical energy and can be used for vital sign monitoring. Piezoelectric energy harvesters that are stretchable and flexible can detect very low frequencies like airflow, heartbeat, etc. Current advancements in piezoelectric materials and flexible sensors have made it possible to create wearable and implantable medical devices that can continuously monitor physiological signals in humans. But because of their non-biocompatible nature, they also produce a large amount of e-waste and require another surgery to remove the implant. This paper presents a biocompatible and flexible piezoelectric composite material for wearable and implantable devices that offers a high-performance platform for seamless and continuous monitoring of human physiological signals and tactile stimuli. It also addresses the issue of e-waste and secondary surgery. A Lead-free piezoelectric, SrBi4Ti4O15, is found to be suitable for this application because the properties can be tailored by suitable substitutions and also by varying the synthesis temperature protocols. In the present work, SrBi4Ti4O15 modified by rare-earth has been synthesized and studied. Coupling factors are calculated from resonant (fr) and anti-resonant frequencies (fa). It is observed that Samarium substitution in SBT has increased the Curie temperature, dielectric and piezoelectric properties. From impedance spectroscopy studies, relaxation, and non-Debye type behaviour are observed. The composite of bioresorbable poly(l-lactide) and Lead-free rare earth modified Bismuth Layered Ferroelectrics leads to a flexible piezoelectric device for non-invasive measurement of vital signs, such as heart rate, breathing rate, blood pressure, and electrocardiogram (ECG) readings and also artery pulse signals in near-surface arteries. These composites are suitable to detect slight movement of the muscles and joints. This Lead-free rare earth modified Bismuth Layered Ferroelectrics – polymer composite is synthesized using a ball mill and the solid-state double sintering method. XRD studies indicated the two phases in the composite. SEM studies revealed the grain size to be uniform and in the range of 100 nm. The electromechanical coupling factor is improved. The elastic constants are calculated and the mechanical flexibility is found to be improved as compared to the single-phase rare earth modified Bismuth Latered piezoelectric. The results indicate that this composite is suitable for the non-invasive detection of multiple vital signs of humans.Keywords: composites, flexible, non-invasive, piezoelectric
Procedia PDF Downloads 371309 Breast Cancer Mortality and Comorbidities in Portugal: A Predictive Model Built with Real World Data
Authors: Cecília M. Antão, Paulo Jorge Nogueira
Abstract:
Breast cancer (BC) is the first cause of cancer mortality among Portuguese women. This retrospective observational study aimed at identifying comorbidities associated with BC female patients admitted to Portuguese public hospitals (2010-2018), investigating the effect of comorbidities on BC mortality rate, and building a predictive model using logistic regression. Results showed that the BC mortality in Portugal decreased in this period and reached 4.37% in 2018. Adjusted odds ratio indicated that secondary malignant neoplasms of liver, of bone and bone marrow, congestive heart failure, and diabetes were associated with an increased chance of dying from breast cancer. Although the Lisbon district (the most populated area) accounted for the largest percentage of BC patients, the logistic regression model showed that, besides patient’s age, being resident in Bragança, Castelo Branco, or Porto districts was directly associated with an increase of the mortality rate.Keywords: breast cancer, comorbidities, logistic regression, adjusted odds ratio
Procedia PDF Downloads 861308 Somatic Delusional Disorder Subsequent to Phantogeusia: A Case Report
Authors: Pedro Felgueiras, Ana Miguel, Nélson Almeida, Raquel Silva
Abstract:
Objective: Through the study of a clinical case of delusional somatic disorder secondary to phantogeusia, we aim to highlight the importance of considering psychosomatic conditions in differential diagnosis, as well as to emphasize the complexity of its comprehension, treatment, and respective impact on patients’ functioning. Methods: Bearing this in mind, we conducted a critical analysis of a case series based on patient observations, clinical data, and complementary diagnostic methods, as well as a non-systematic review of the literature on the subject. Results: A 61-year-old female patient with no history of psychiatric conditions. Family psychiatric history of mood disorder (depression), with psychotic features found in her mother. Medical history of many comorbidities affecting different organ systems (endocrine, gastrointestinal, genitourinary, ophthalmological). Documented neuroticism traits of personality. The patient’s family described a persistent concern about several physical symptoms across her life, with a continuous effort to obtain explanations about any sensation out of her normal perception. Since being subjected to endoscopy in 2018, she started complaints of persistent phantogeusia (acid taste) and developed excessive thoughts, feelings, and behaviors associated with this somatic symptom. The patient was evaluated by several medical specialties, and an extensive panel of medical exams was carried out, excluding any disease. Besides all the investigation and with no evidence of disease signs, acute anxiety, time, and energy dispended to this symptom culminated in severe psychosocial impairment. The patient was admitted to a psychiatric ward for investigation and treatment of this clinical picture, leading to the diagnosis of the delusional somatic disorder. In order to exclude the acute organic etiology of this psychotic disorder, an analytic panel was carried out with no abnormal results. In the context of a psychotic clinical picture, a CT scan was performed, which revealed a right cortical vascular lesion. Neuropsychological evaluation was made, with the description of cognitive functioning being globally normative. During treatment with an antipsychotic (pimozide), a complete remission of the somatic delusion was associated with the disappearance of gustative perception disturbance. In follow-up, a relapse of gustative sensation was documented, and her thoughts and speech were dominated by concerns about multiple somatic symptoms. Conclusion: In terms of abnormal bodily sensations, the oral cavity is one of the frequent sites of delusional disorder. Patients with these gustatory perception distortions complain about unusual sensations without corresponding abnormal findings in the oral area. Its pathophysiology has not been fully elucidated yet. In terms of its comprehensive psychopathology, this case was hypothesized as a paranoid development of a delusional somatic disorder triggered by a post-invasive procedure phantogeusia (which is described as a possible side effect of an endoscopy) in a patient with an anankastic personality. This case presents interesting psychopathology, reinforcing the complexity of psychosomatic disorders in terms of their etiopathogenesis, clinical treatment, and long-term prognosis.Keywords: psychosomatics, delusional somatic disorder, phantogeusia, paranoid development
Procedia PDF Downloads 1271307 Pancreatic Lipase and Cholesterol Esterase Inhibitors from Thai Medicinal Plants
Authors: Kwanchai Ratanamanee, Pattra Ahmadi Pirshahid, Yaowaluk Khamphan, Sirinan Thubthimthad
Abstract:
Obesity is a main global health problem. The obesity rated has continued to be higher and higher. It causes to serious systems, diabetes, coronary artery disease, stroke, and some types of cancer. Oristat is one of the best drugs worldwide used as a pancreatic lipase inhibitor. To develop the new therapeutic drugs from medicinal plant always explored. In this study, 24 medicinal plants were investigated for their pancreatic lipase and cholesterol esterase inhibitory effects with Fluorometer assay and oristat as a positive control. It showed that the ethanolic extract of pods of Acacia concinna (Willd.) D.C., possess pancreatic lipase and cholesterol esterase inhibitory activities of IC50 at 2.73 and 3.77 mg/ml respectively as well as oral acute toxicity of the extract (LD50) was 6,300 mg/kg body weight. The extract of A.concinna should be further investigated in animal testing. The results of pancreatic lipase and cholesterol esterase inhibitor of the extracts will lead us to utilize A.concinna for developing as obesity dietary supplement from a medicinal plant.Keywords: Acacia concinna (Willd.) D. C., cholesterol esterase, obesity, pancreatic lipase
Procedia PDF Downloads 4761306 An Immune-Inspired Web Defense Architecture
Authors: Islam Khalil, Amr El-Kadi
Abstract:
With the increased use of web technologies, microservices, and Application Programming Interface (API) for integration between systems, and with the development of containerization of services on the operating system level as a method of isolating system execution and for easing the deployment and scaling of systems, there is a growing need as well as opportunities for providing platforms that improve the security of such services. In our work, we propose an architecture for a containerization platform that utilizes various concepts derived from the human immune system. The goal of the proposed containerization platform is to introduce the concept of slowing down or throttling suspected malicious digital pathogens (intrusions) to reduce their damage footprint while providing more opportunities for forensic inspection of suspected pathogens in addition to the ability to snapshot, rollback, and recover from possible damage. The proposed platform also leverages existing intrusion detection algorithms by integrating and orchestrating their cooperative operation for more effective intrusion detection. We show how this model reduces the damage footprint of intrusions and gives a greater time window for forensic investigation. Moreover, during our experiments, our proposed platform was able to uncover unintentional system design flaws that resulted in internal DDoS-like attacks by submodules of the system itself rather than external intrusions.Keywords: containers, human immunity, intrusion detection, security, web services
Procedia PDF Downloads 931305 Infestations of Olive Fruit Fly, Bactrocera oleae (Rossi) (Diptera: Tephritidae), in Different Olive Cultivars in Çanakkale, Turkey
Authors: Hanife Genç
Abstract:
The olive fruit fly, Bactrocera oleae (Rossi), is an economically important and endemic pest in olive (Oleae europae) orchards in Turkey. The aim of this study was to determine olive fruit fly infestation in different olive cultivars in the laboratory. Olive fly infested fruits were collected in Çanakkale province to establish wild fly population. After having reproductive olive fly colonies, 14 olive cultivars were tested in the controlled laboratory conditions, at 23±2 °C, 65% RH and 16:8 h (light: dark) photoperiod. The olive samples from 14 different olive cultivars were collected in October 2015, in Campus of Dardanos, Çanakkale Onsekiz Mart University. Observations were carried out detecting some biological parameters such as the number of oviposition stings, active infestation, total infestation, the number of pupae and the adult emergence. The results indicated that oviposition stings were not associated with pupal yield. A few pupae were found within olive fruits which were not able to exit. Screening of the varieties suggested that less susceptible cultivar to olive fruit fly attacks was Arbequin while Gemlik-2M 2/3 showed significant susceptibility. Ovipositional preference of olive fly females and the success of larval development in different olive varieties are crucial for establishing new olive orchards to prevent high olive fruit fly infestation.Keywords: infestation, olive fruit fly, olive cultivars, oviposition sting
Procedia PDF Downloads 2151304 Securing Health Monitoring in Internet of Things with Blockchain-Based Proxy Re-Encryption
Authors: Jerlin George, R. Chitra
Abstract:
The devices with sensors that can monitor your temperature, heart rate, and other vital signs and link to the internet, known as the Internet of Things (IoT), have completely transformed the way we control health. Providing real-time health data, these sensors improve diagnostics and treatment outcomes. Security and privacy matters when IoT comes into play in healthcare. Cyberattacks on centralized database systems are also a problem. To solve these challenges, the study uses blockchain technology coupled with proxy re-encryption to secure health data. ThingSpeak IoT cloud analyzes the collected data and turns them into blockchain transactions which are safely kept on the DriveHQ cloud. Transparency and data integrity are ensured by blockchain, and secure data sharing among authorized users is made possible by proxy re-encryption. This results in a health monitoring system that preserves the accuracy and confidentiality of data while reducing the safety risks of IoT-driven healthcare applications.Keywords: internet of things, healthcare, sensors, electronic health records, blockchain, proxy re-encryption, data privacy, data security
Procedia PDF Downloads 131303 The Pressure Losses in the Model of Human Lungs
Authors: Michaela Chovancova, Pavel Niedoba
Abstract:
For the treatment of acute and chronic lung diseases it is preferred to deliver medicaments by inhalation. The drug is delivered directly to tracheobronchial tree. This way allows the given medicament to get directly into the place of action and it makes rapid onset of action and maximum efficiency. The transport of aerosol particles in the particular part of the lung is influenced by their size, anatomy of the lungs, breathing pattern and airway resistance. This article deals with calculation of airway resistance in the lung model of Horsfield. It solves the problem of determination of the pressure losses in bifurcation and thus defines the pressure drop at a given location in the bronchial tree. The obtained data will be used as boundary conditions for transport of aerosol particles in a central part of bronchial tree realized by Computational Fluid Dynamics (CFD) approach. The results obtained from CFD simulation will allow us to provide information on the required particle size and optimal inhalation technique for particle transport into particular part of the lung.Keywords: human lungs, bronchial tree, pressure losses, airways resistance, flow, breathing
Procedia PDF Downloads 3551302 No-Fee Shot for Life: Immune Defense from Covid-19, Acute Debilitation and Untimely Death through Vaccinations for Ages 60 and Above, Protection of the Elderly and Seniors
Authors: Maeah Stephanie A. Macapaz Abadejos
Abstract:
Covid-19 shook the whole world. Every person on all sides of the world was affected by the pandemic. All the nations and world leaders were searching for a variety of cures and solutions to stop the spread of the virus. In connection with this, this investigative case study aims to show a relationship between COVID-19 vaccinations to the immune system of the seniors and elderly. The seniors and elderly are one of the most vulnerable populations that show high morbidity and mortality in any illnesses and diseases. This study will show lived experiences of the senior’s immune system and health status, how it is being affected by the COVID-19 virus and its vaccines, Risk for COVID-19 Infection, Hospitalization, and Death by Age Group. Participants of this study are from 3 Cebu City Barangays and 2 from Barangays of the Cities of the Cebu Province. To conclude, this study shall serve its purpose of providing clear and concise results in strengthening the evidence of the effects of the COVID-19 virus infection, especially the free vaccinations, on the health and overall well-being of the elderly and seniors.Keywords: gerontology nursing, vaccination, protection and immunity, seniors and the elderly
Procedia PDF Downloads 291301 Restoration of a Forest Catchment in Himachal Pradesh, India: An Institutional Analysis
Authors: Sakshi Gupta, Kavita Sardana
Abstract:
Management of a forest catchment involves diverse dimensions, multiple stakeholders, and conflicting interests, primarily due to the wide variety of valuable ecosystem services offered by it. Often, the coordination among different levels of formal institutions governing the catchment, local communities, as well as societal norms, taboos, customs and practices, happens to be amiss, leading to conflicting policy interventions which prove detrimental for such resources. In the case of Ala Catchment, which is a protected forest located at a distance of 9 km North-East of the town of Dalhousie, within district Chamba of Himachal Pradesh, India, and serves as one of the primary sources of public water supply for the downstream town of Dalhousie and nearby areas, several policy measures have been adopted for the restoration of the forest catchment, as well as for the improvement of public water supply. These catchment forest restoration measures include; the installation of a fence along the perimeter of the catchment, plantation of trees in the empty patches of the forest, construction of check dams, contour trenches, contour bunds, issuance of grazing permits, and installation of check posts to keep track of trespassers. While the measures adopted to address the acute shortage of public water supply in the Dalhousie region include; building and maintenance of large capacity water storage tanks, laying of pipelines, expanding public water distribution infrastructure to include water sources other than Ala Catchment Forest and introducing of five new water supply schemes for drinking water as well as irrigation. However, despite these policy measures, the degradation of the Ala catchment and acute shortage of water supply continue to distress the region. This study attempts to conduct an institutional analysis to assess the impact of policy measures for the restoration of the Ala Catchment in the Chamba district of Himachal Pradesh in India. For this purpose, the theoretical framework of Ostrom’s Institutional Assessment and Development (IAD) Framework was used. Snowball sampling was used to conduct private interviews and focused group discussions. A semi-structured questionnaire was administered to interview a total of 184 respondents across stakeholders from both formal and informal institutions. The central hypothesis of the study is that the interplay of formal and informal institutions facilitates the implementation of policy measures for ameliorating Ala Catchment, in turn improving the livelihood of people depending on this forest catchment for direct and indirect benefits. The findings of the study suggest that leakages in the successful implementation of policy measures occur at several nodes of decision-making, which adversely impact the catchment and the ecosystem services provided by it. Some of the key reasons diagnosed by the immediate analysis include; ad-hoc assignment of property rights, rise in tourist inflow increasing the pressures on water demand, illegal trespassing by local and nomadic pastoral communities for grazing and unlawful extraction of forest products, and rent-seeking by a few influential formal institutions. Consequently, it is indicated that the interplay of formal and informal institutions may be obscuring the consequentiality of the policy measures on the restoration of the catchment.Keywords: catchment forest restoration, institutional analysis and development framework, institutional interplay, protected forest, water supply management
Procedia PDF Downloads 971300 Extremely Low-Frequency Magnetic Field; An Invisible Risk Association between High Power Transmission Lines and Childhood Leukemia and Adult Brain Cancer: Literature Review
Authors: Ali Azeem, Seung-Cheol Hong
Abstract:
This study focuses on the epidemiological association between childhood leukaemia & adult brain cancer to offer strong evidence that extremely low-frequency magnetic field (ELF-MF) produced from power lines caused cancer. It also gives a comprehensive literature review on epidemiological studies of ELF-MF risk associated with HVTL and childhood leukaemia & adult brain cancer. From the literature review, it is concluded that there is a weak association present between ELF-MF and childhood leukaemia. No consistent association was present between brain cancer and ELF-MF. This study is done on Scielo data and PubMed using the terms extremely low-frequency magnetic field (ELF-MF+cancer), adult brain cancer, high power transmission lines, etc., for the past 10 years.Keywords: childhood leukaemia, high voltage transmission lines, acute lymphoblastic leukaemia, power lines
Procedia PDF Downloads 2221299 In silico and Toxicity Study of the Combination of Roselle (Hibiscus sabdariffa L.) and Garlic (Allium sativum L.) as Antihypertensive Herbs
Authors: Doni Dermawan
Abstract:
Hypertension is a disease with a high prevalence in Indonesia. The prevalence of hypertension in Indonesia is based on the Basic Health Research (Riskesdas) in 2013 which amounted to 25.8%. Medicinal plants have been widely used to treat hypertension including roselle (Hibiscus sabdariffa L.) and garlic (Allium sativum L.) by a mechanism as angiotensin converting enzyme (ACE) inhibitor. The purpose of this research is to analyze the in silico (molecular studies) of pharmacological effects and toxicity of roselle (Hibiscus sabdariffa L.) and garlic (Allium sativum L.) as well as a combination of both are used as antihypertensive herbs. The results of study showed that roselle (Hibiscus sabdariffa L.) and garlic (Allium sativum L.) have great potential as antihypertensive herbs based on the affinity and stability of active substances to specific receptor with a much better value than a of antihypertensive drugs (lisinopril). Toxicity values determined by the method of AST, ALT and ALP in which the three values obtained indicate the presence of acute toxic effects that need to be considered in determining the dose of the extract of roselle and garlic as antihypertensives.Keywords: Allium sativum, antihypertensive, Hibiscus sabdariffa, in silico, toxicity
Procedia PDF Downloads 3401298 Modification Encryption Time and Permutation in Advanced Encryption Standard Algorithm
Authors: Dalal N. Hammod, Ekhlas K. Gbashi
Abstract:
Today, cryptography is used in many applications to achieve high security in data transmission and in real-time communications. AES has long gained global acceptance and is used for securing sensitive data in various industries but has suffered from slow processing and take a large time to transfer data. This paper suggests a method to enhance Advance Encryption Standard (AES) Algorithm based on time and permutation. The suggested method (MAES) is based on modifying the SubByte and ShiftRrows in the encryption part and modification the InvSubByte and InvShiftRows in the decryption part. After the implementation of the proposal and testing the results, the Modified AES achieved good results in accomplishing the communication with high performance criteria in terms of randomness, encryption time, storage space, and avalanche effects. The proposed method has good randomness to ciphertext because this method passed NIST statistical tests against attacks; also, (MAES) reduced the encryption time by (10 %) than the time of the original AES; therefore, the modified AES is faster than the original AES. Also, the proposed method showed good results in memory utilization where the value is (54.36) for the MAES, but the value for the original AES is (66.23). Also, the avalanche effects used for calculating diffusion property are (52.08%) for the modified AES and (51.82%) percentage for the original AES.Keywords: modified AES, randomness test, encryption time, avalanche effects
Procedia PDF Downloads 2451297 Social Media as a Source of Radicalization; A Case Study of Pakistan
Authors: Manam Hanfi
Abstract:
Pakistan is a victim of terrorism since 9/11 attacks. Since then it is a home for violence and extremism. One of the major reasons behind rising violence and extremism in Pakistan is radicalization. Pakistan has seen and suffered from the modification of terrorism from old to new. In new terrorism, the terrorist organizations incorporated internet to disseminate propaganda, to recruit and train people. The study focuses on the relationship between Pakistan and new terrorism and examines how the internet is being used by terrorist organizations. The study investigates radicalization through social media by terrorist organizations in Pakistan with the help of case studies. The study suggests five ways to counter radicalization, including, counter narrative on social media, content analysis of the data on the internet, curriculum and madrassa reforms, teaching peace education in the educational institutions and use of technical software such as eGLYPH to quickly remove violent data from social media. Lastly, the research attempted to contribute in counter-radicalization by combining the media dependency model and ideas for counter-radicalization. The dependency model elaborates the impact of mass media content on the audience. If media dependency is high, it will cause cognitive, affective and behavioral changes. In order to counter radicalization through social media, it is important to make cognitive, affective and behavioral changes with the help of counter-radicalization suggestions.Keywords: counter radicalization, extremism, social media, terrorism
Procedia PDF Downloads 1541296 The Potential Threat of Cyberterrorism to the National Security: Theoretical Framework
Authors: Abdulrahman S. Alqahtani
Abstract:
The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This poster presents the results of the quantitative study (survey) to test the validity of the proposed theoretical framework for the cyber terrorist threats. This theoretical framework will help to in-depth understand these new digital terrorist threats. It may also be a practical guide for managers and technicians in critical infrastructure, to understand and assess the threats they face. It might also be the foundation for building a national strategy to counter cyberterrorism. In the beginning, it provides basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA) were performed. Then, Structural Equation Modelling (SEM) was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.Keywords: cyberterrorism, critical infrastructure, , national security, theoretical framework, terrorism
Procedia PDF Downloads 4031295 In Vitro and in Vivo Biological Investigations of Philodendron Bipinnatifidum Schott Ex Endl (Araceae) and Its Bioactive Phenolic Constituents
Authors: Alia Ragheb
Abstract:
Philodendron species were reported in traditional medicine for the treatment of several diseases. From the 70% methanol extract of the aerial parts of Philodendron bipinnatifidum Schott ex Endl, nine flavonoid compounds were isolated and identified for the first time; saponarin, genkwanin 8-C-(2′′-O-β-glucopyranosyl)-β-glucopyranoside, apigenin 6-C-(2′′-O-β-glucopyranosyl)-β-glucopyranoside, schaftoside, swertisin, swertiajaponin, isoswertisin, isorhamnetin 3-O-(2′′-acetyl)-β-glucopyranoside and apigenin. Characterization of the plant was achieved using chromatographic, physical, chemical, spectroscopic, and spectrometric techniques. The 70% methanol aerial parts extract and the methanol fraction of the plant were in vivo screened for their acute anti-inflammatory, antipyretic and analgesic effects where significant effects were exhibited compared to that of reference drugs. From the reported literature, these biological activities could be attributed to its phenolic constituent. The 70% methanol aerial parts and successive extracts, as well as some pure isolated flavonoid compounds, were in vitro investigated for their antioxidant, antimicrobial and cytotoxic activities.Keywords: antioxidant, araceae, cytotoxicity, flavonoids
Procedia PDF Downloads 1811294 Developing a Secure Iris Recognition System by Using Advance Convolutional Neural Network
Authors: Kamyar Fakhr, Roozbeh Salmani
Abstract:
Alphonse Bertillon developed the first biometric security system in the 1800s. Today, many governments and giant companies are considering or have procured biometrically enabled security schemes. Iris is a kaleidoscope of patterns and colors. Each individual holds a set of irises more unique than their thumbprint. Every single day, giant companies like Google and Apple are experimenting with reliable biometric systems. Now, after almost 200 years of improvements, face ID does not work with masks, it gives access to fake 3D images, and there is no global usage of biometric recognition systems as national identity (ID) card. The goal of this paper is to demonstrate the advantages of iris recognition overall biometric recognition systems. It make two extensions: first, we illustrate how a very large amount of internet fraud and cyber abuse is happening due to bugs in face recognition systems and in a very large dataset of 3.4M people; second, we discuss how establishing a secure global network of iris recognition devices connected to authoritative convolutional neural networks could be the safest solution to this dilemma. Another aim of this study is to provide a system that will prevent system infiltration caused by cyber-attacks and will block all wireframes to the data until the main user ceases the procedure.Keywords: biometric system, convolutional neural network, cyber-attack, secure
Procedia PDF Downloads 2171293 Exploring the Need to Study the Efficacy of VR Training Compared to Traditional Cybersecurity Training
Authors: Shaila Rana, Wasim Alhamdani
Abstract:
Effective cybersecurity training is of the utmost importance, given the plethora of attacks that continue to increase in complexity and ubiquity. VR cybersecurity training remains a starkly understudied discipline. Studies that evaluated the effectiveness of VR cybersecurity training over traditional methods are required. An engaging and interactive platform can support knowledge retention of the training material. Consequently, an effective form of cybersecurity training is required to support a culture of cybersecurity awareness. Measurements of effectiveness varied throughout the studies, with surveys and observations being the two most utilized forms of evaluating effectiveness. Further research is needed to evaluate the effectiveness of VR cybersecurity training and traditional training. Additionally, research for evaluating if VR cybersecurity training is more effective than traditional methods is vital. This paper proposes a methodology to compare the two cybersecurity training methods and their effectiveness. The proposed framework includes developing both VR and traditional cybersecurity training methods and delivering them to at least 100 users. A quiz along with a survey will be administered and statistically analyzed to determine if there is a difference in knowledge retention and user satisfaction. The aim of this paper is to bring attention to the need to study VR cybersecurity training and its effectiveness compared to traditional training methods. This paper hopes to contribute to the cybersecurity training field by providing an effective way to train users for security awareness. If VR training is deemed more effective, this could create a new direction for cybersecurity training practices.Keywords: virtual reality cybersecurity training, VR cybersecurity training, traditional cybersecurity training
Procedia PDF Downloads 2121292 A Fuzzy Logic Based Health Assesment Platform
Authors: J. Al-Dmour, A. Sagahyroon, A. Al-Ali, S. Abusnana
Abstract:
Radio Frequency Based Identification Systems have emerged as one of the possible valuable solutions that can be utilized in healthcare systems. Nowadays, RFID tags are available with built-in human vital signs sensors such as Body Temperature, Blood Pressure, Heart Rate, Blood Sugar level and Oxygen Saturation in Blood. This work proposes the design, implementation, and testing of an integrated mobile RFID-based health care system. The system consists of a wireless mobile vital signs data acquisition unit (RFID-DAQ) integrated with a fuzzy-logic–based software algorithm to monitor and assess patients conditions. The system is implemented and tested in ‘Rashid Center for Diabetes and Research’, Ajman, UAE. System testing results are compared with the Modified Early Warning System (MEWS) that is currently used in practice. We demonstrate that the proposed and implemented system exhibits an accuracy level that is comparable and sometimes better than the widely adopted MEWS system.Keywords: healthcare, fuzzy logic, MEWS, RFID
Procedia PDF Downloads 3461291 Outcome of Obstetric Admission to General Intensive Care over a Period of 3 Years
Authors: Kamel Abdelaziz Mohamed
Abstract:
Intoduction:Inadequate knowledge about obstetric admission and infrequent dealing with the obstetric patients in ICU results in high mortality and morbidity. Aim of the work:To evaluate the indications, course, severity of illness, and outcome of obstetric patients admitted to the intensive care unit (ICU). Patients and Methods: We collected baseline data and acute physiology and chronic health evaluation II (APACHE II) scores. ICU mortality was the primary outcome. Results: Seventy obstetric patients were admitted to the ICU over 3 years, 36 of these patients (51.4 %) were admitted during the antepartum period. The primary obstetric indication for ICU admission was pregnancy-induced hypertension (22 patients, 31.4%), followed by sepsis (8 patients, 11.4%) as the leading non-obstetric admission. The mean APACHE II score was 19.6. The predicted mortality rate based on the APACHE II score was 22%, however, only 4 maternal deaths (5.7%) were among the obstetric patients admitted to the ICU. Conclusion: Evaluation of obstetric patients by (APACHE II) scores showed higher predicted mortality rate, however the overall mortality was lower. Regular follow up, together with early detection of complications and prompt ICU admission necessitating proper management by specialized team can improve mortality.Keywords: obstetric, complication, postpartum, sepsis
Procedia PDF Downloads 3051290 Macroscopic Study of Reproductive Pathologies in Cows at the Souk-Ahras Communal Slaughterhouse
Authors: Besma Abdeltif, Chebabhi Imen
Abstract:
Introduction: it is important to define the genital pathologies encountered in Algeria in postpartum dairy cows. The objective was to identify the different pathologies of reproduction in cows found at the communal abattoir of Souk Ahras. Materials and Methods: Our study was carried at the communal slaughterhouse of Souk-Ahras on 63 genital tracts were examined macroscopically after slaughter. Results: The results obtained reveal a high frequency of pregnant females (14.28%), most of the gestations were at their beginning. Uterine anomalies ranked first in the genital lesions of the cow (20.37%). The frequencies of these abnormalities are in ascending order: aplasia of the horns = 1.85%, traumatic cervical = 1.85%, cervical tumors = 1.85%, chronic endometritis = 3.70% and Acute endometritis = 11.11%. The ovarian cyst is the most common lesion, with a frequency of 3.70%, followed by smooth ovaries (1.85%). These are single, thin-walled cysts more present on the right ovary than the left ovary. Salpingitis is the only tubal lesion found on 5.55% of the non-pregnant genital tract. Neoformation is the only vaginal lesion identified in this work (1.85%). Conclusion: Our result, in general, conforms to the data of the literature.Keywords: genital tract, cow, slaughterhouse, pathology
Procedia PDF Downloads 1051289 Protective Effect of Cow Urine against Chlorpyrifos Induced-Genotoxicity and Neurotoxicity in Albino Rats
Authors: Shelly Sharma, Pooja Chadha
Abstract:
Humans are exposed to pesticides and insecticides either directly or indirectly. Exposure to these pesticides may lead to acute toxicity to mammals and non-target organisms. Chlorpyrifos (CPF) is a broad spectrum organophosphate pesticide widely used in various countries of the world. The aim of the present study was to assess the toxicity associated with chlorpyrifos exposure and possible mitigating effect of cow urine against genotoxic and toxic effects in rat brain induced by chlorpyrifos. For this purpose LD50 was determined and rats were orally administered with 1/8th of LD50 (19mg/kg b.wt). Brain samples were taken after 24hrs, 48hrs and 72hrs of treatment. A significant increase in the % tail DNA was observed along with the increase in MDA levels of brain tissues in chlorpyrifos treated groups as compared to control. Cow urine treated groups show decrease in DNA damage and MDA levels as compared to CPF treated group. The study indicates that cow urine has ameliorative potential against neurotoxicity and genotoxicity induced by CPF. Cow urine is considered rich in vitamin A, E and volatile fatty acids which provide antioxidant potential to it. Thus, it can be used as a genoprotective agent.Keywords: comet assay, brain, cow urine, genotoxicity, toxicity
Procedia PDF Downloads 3801288 Shaabi in the City: On Modernizing Sounds and Exclusion in Egyptian Cities
Authors: Mariam Aref Mahmoud
Abstract:
After centuries of historical development, Egypt is no stranger to national identity frustrations. What may or may not be counted as this “national identity” becomes a source of contention. Today, after decades of neoliberal reform, Cairo has become the center of Egypt’s cultural debacle. At its heart, the Egyptian capital serves as Egypt’s extension into global capitalism, its flailing hope to become part of the modernized, cosmopolitan world. Yet, to converge into this image of cosmopolitanism, Cairo must silence the perceived un-modernized sounds, cultures, and spaces that arise from within its alleyways. Currently, the agitation surrounding shaabi music, particularly, that of mahraganat, places these contentions to the center of the modernization debates. This paper will discuss the process through which the conversations between modernization, space, and culture have taken place through a historical analysis of national identity formation under Egypt’s neoliberal regimes. Through this, the paper concludes that music becomes a spatial force through which public space, identity, and globalization must be contested. From these findings researchers can then analyze Cairo through not only its physical landscapes, but also its metaphysical features – such as the soundscape.Keywords: music, space, globalization, Cairo
Procedia PDF Downloads 108