Search results for: Acute heart attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2669

Search results for: Acute heart attacks

2489 The Incidence of Postoperative Atrial Fibrillation after Coronary Artery Bypass Grafting in Patients with Local and Diffuse Coronary Artery Disease

Authors: Kamil Ganaev, Elina Vlasova, Andrei Shiryaev, Renat Akchurin

Abstract:

De novo atrial fibrillation (AF) after coronary artery bypass grafting (CABG) is a common complication. To date, there are no data on the possible effect of diffuse lesions of coronary arteries on the incidence of postoperative AF complications. Methods. Patients operated on-pump under hypothermic conditions during the calendar year (2020) were studied. Inclusion criteria - isolated CABG and achievement of complete myocardial revascularization. Patients with a history of AF moderate and severe valve dysfunction, hormonal thyroid pathology, initial CHF(Congestive heart failure), as well as patients with developed perioperative complications (IM, acute heart failure, massive blood loss) and deceased were excluded. Thus 227 patients were included; mean age 65±9 years; 69% were men. 89% of patients had a 3-vessel lesion of the coronary artery; the remainder had a 2-vessel lesion. Mean LV size: 3.9±0.3 cm, indexed LV volume: 29.4±5.3 mL/m2. Two groups were considered: D (n=98), patients with diffuse coronary heart disease, and L (n=129), patients with local coronary heart disease. Clinical and demographic characteristics in the groups were comparable. Rhythm assessment: continuous bedside ECG monitoring up to 5 days; ECG CT at 5-7 days after CABG; daily routine ECG registration. Follow-up period - postoperative hospital period. Results. The Median follow-up period was 9 (7;11) days. POFP (Postoperative atrial fibrillation) was detected in 61/227 (27%) patients: 34/98 (35%) in group D versus 27/129 (21%) in group L; p<0.05. Moreover, the values of revascularization index in groups D and L (3.9±0.7 and 3.8±0.5, respectively) were equal, and the mean time Cardiopulmonary bypass (CPB) (107±27 and 80±13min), as well as the mean ischemic time (67±17 and 55±11min) were significantly longer in group D (p<0.05). However, a separate analysis of these parameters in patients with and without developed AF did not reveal any significant differences in group D (CPB time 99±21.2 min, ischemic time 63±12.2 min), or in group L (CPB time 88±13.1 min, ischemic time 58.7±13.2 min). Conclusion. With the diffuse nature of coronary lesions, the incidence of AF in the hospital period after isolated CABG definitely increases. To better understand the role of severe coronary atherosclerosis in the development of POAF, it is necessary to distinguish the influence of organic features of atrial and ventricular myocardium (as a consequence of chronic coronary disease) from the features of surgical correction in diffuse coronary lesions.

Keywords: atrial fibrillation, diffuse coronary artery disease, coronary artery bypass grafting, local coronary artery disease

Procedia PDF Downloads 212
2488 Robust Heart Sounds Segmentation Based on the Variation of the Phonocardiogram Curve Length

Authors: Mecheri Zeid Belmecheri, Maamar Ahfir, Izzet Kale

Abstract:

Automatic cardiac auscultation is still a subject of research in order to establish an objective diagnosis. Recorded heart sounds as Phonocardiogram signals (PCG) can be used for automatic segmentation into components that have clinical meanings. These are the first sound, S1, the second sound, S2, and the systolic and diastolic components, respectively. In this paper, an automatic method is proposed for the robust segmentation of heart sounds. This method is based on calculating an intermediate sawtooth-shaped signal from the length variation of the recorded Phonocardiogram (PCG) signal in the time domain and, using its positive derivative function that is a binary signal in training a Recurrent Neural Network (RNN). Results obtained in the context of a large database of recorded PCGs with their simultaneously recorded ElectroCardioGrams (ECGs) from different patients in clinical settings, including normal and abnormal subjects, show a segmentation testing performance average of 76 % sensitivity and 94 % specificity.

Keywords: heart sounds, PCG segmentation, event detection, recurrent neural networks, PCG curve length

Procedia PDF Downloads 178
2487 Rainfall–Runoff Simulation Using WetSpa Model in Golestan Dam Basin, Iran

Authors: M. R. Dahmardeh Ghaleno, M. Nohtani, S. Khaledi

Abstract:

Flood simulation and prediction is one of the most active research areas in surface water management. WetSpa is a distributed, continuous, and physical model with daily or hourly time step that explains precipitation, runoff, and evapotranspiration processes for both simple and complex contexts. This model uses a modified rational method for runoff calculation. In this model, runoff is routed along the flow path using Diffusion-Wave equation which depends on the slope, velocity, and flow route characteristics. Golestan Dam Basin is located in Golestan province in Iran and it is passing over coordinates 55° 16´ 50" to 56° 4´ 25" E and 37° 19´ 39" to 37° 49´ 28"N. The area of the catchment is about 224 km2, and elevations in the catchment range from 414 to 2856 m at the outlet, with average slope of 29.78%. Results of the simulations show a good agreement between calculated and measured hydrographs at the outlet of the basin. Drawing upon Nash-Sutcliffe model efficiency coefficient for calibration periodic model estimated daily hydrographs and maximum flow rate with an accuracy up to 59% and 80.18%, respectively.

Keywords: watershed simulation, WetSpa, stream flow, flood prediction

Procedia PDF Downloads 244
2486 Laboratory Findings as Predictors of St2 and NT-Probnp Elevations in Heart Failure Clinic, National Cardiovascular Centre Harapan Kita, Indonesia

Authors: B. B. Siswanto, A. Halimi, K. M. H. J. Tandayu, C. Abdillah, F. Nanda , E. Chandra

Abstract:

Nowadays, modern cardiac biomarkers, such as ST2 and NT-proBNP, have important roles in predicting morbidity and mortality in heart failure patients. Abnormalities of serum electrolytes, sepsis or infection, and deteriorating renal function will worsen the conditions of patients with heart failure. It is intriguing to know whether cardiac biomarkers elevations are affected by laboratory findings in heart failure patients. We recruited 65 patients from the heart failure clinic in NCVC Harapan Kita in 2014-2015. All of them have consented for laboratory examination, including cardiac biomarkers. The findings were recorded in our Research and Development Centre and analyzed using linear regression to find whether there is a relationship between laboratory findings (sodium, potassium, creatinine, and leukocytes) and ST2 or NT-proBNP. From 65 patients, 26.9% of them are female, and 73.1% are male, 69.4% patients classified as NYHA I-II and 31.6% as NYHA III-IV. The mean age is 55.7+11.4 years old; mean sodium level is 136.1+6.5 mmol/l; mean potassium level is 4.7+1.9 mmol/l; mean leukocyte count is 9184.7+3622.4 /ul; mean creatinine level is 1.2+0.5 mg/dl. From linear regression logistics, the relationship between NT-proBNP and sodium level (p<0.001), as well as leukocyte count (p=0.002) are significant, while NT-proBNP and potassium level (p=0.05), as well as creatinine level (p=0.534) are not significant. The relationship between ST2 and sodium level (p=0.501), potassium level (p=0.76), leukocyte level (p=0.897), and creatinine level (p=0.817) are not significant. To conclude, laboratory findings are more sensitive in predicting NT-proBNP elevation than ST2 elevation. Larger studies are needed to prove that NT-proBNP correlation with laboratory findings is more superior than ST2.

Keywords: heart failure, laboratory, NT-proBNP, ST2

Procedia PDF Downloads 339
2485 Towards a Security Model against Denial of Service Attacks for SIP Traffic

Authors: Arellano Karina, Diego Avila-Pesántez, Leticia Vaca-Cárdenas, Alberto Arellano, Carmen Mantilla

Abstract:

Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-of-Service (DoS) attacks are developed. These affect the business continuity of an organization, regarding confidentiality, availability, and integrity of services, causing frequent losses of both information and money. The purpose of this study is to establish the necessary measures to mitigate DoS threats, which affect the availability of VoIP systems, based on the Session Initiation Protocol (SIP). A Security Model called MS-DoS-SIP is proposed, which is based on two approaches. The first one analyzes the recommendations of international security standards. The second approach takes into account weaknesses and threats. The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organization.

Keywords: Denial-of-Service SIP attacks, MS-DoS-SIP, security model, VoIP-SIP vulnerabilities

Procedia PDF Downloads 203
2484 Physicochemical Properties and Toxicity Studies on a Lectin from the Bulb of Dioscorea bulbifera

Authors: Uchenna Nkiruka Umeononihu, Adenike Kuku, Oludele Odekanyin, Olubunmi Babalola, Femi Agboola, Rapheal Okonji

Abstract:

In this study, a lectin from the bulb of Dioscorea bulbifera was purified, characterised, and its acute and sub-acute toxicity was investigated with a view to evaluate its toxic effects in mice. The protein from the bulb was extracted by homogenising 50 g of the bulb in 500 ml of phosphate buffered saline (0.025 M) of pH 7.2, stirred for 3 hr, and centrifuged at the speed of 3000 rpm. Blood group and sugar specificity assays of the crude extract were determined. The lectin was purified in a two-step procedure- gel filtration on Sephadex G-75 and affinity chromatography on Sepharose 4-B arabinose. The degree of purity of the purified lectin was ascertained by SDS-polyacrylamide gel electrophoresis. Detection of covalently bound carbohydrate was carried out with Periodic Acid-Schiffs (PAS) reagent staining technique. Effects of temperature, pH, and EDTA on the lectin were carried out using standard methods. This was followed by acute toxicity studies via oral and subcutaneous routes using mice. The animals were monitored for mortality and signs of toxicity. The sub-acute toxicity studies were carried out using rats. Different concentrations of the lectin were administered twice daily for 5 days via the subcutaneous route. The animals were sacrificed on the sixth day; blood samples and liver tissues were collected. Biochemical assays (determination of total protein, direct bilirubin, Alanine aminotransferase (ALT), Aspartate aminotransferase (AST), catalase (CAT), and superoxide dismutase (SOD)) were carried out on the serum and liver homogenates. The collected organs (heart, liver, kidney, and spleen) were subjected to histopathological analysis. The results showed that lectin from the bulbs of Dioscorea bulbifera agglutinated non-specifically the erythrocytes of the human ABO system as well as rabbit erythrocytes. The haemagglutinating activity was strongly inhibited by arabinose and dulcitol with minimum inhibitory concentrations of 0.781 and 6.25, respectively. The lectin was purified to homogeneity with native and subunit molecular weights of 56,273 and 29,373 Daltons, respectively. The lectin was thermostable up to 30 0C and lost 25 %, 33.3 %, and 100 % of its heamagglutinating activity at 40°C, 50°C, and 60°C, respectively. The lectin was maximally active at pH 4 and 5 but lost its total activity at pH eight, while EDTA (10 mM) had no effect on its haemagglutinating activity. PAS reagent staining showed that the lectin was not a glycoprotein. The sub-acute studies on rats showed elevated levels of ALT, AST, serum bilirubin, total protein in serum and liver homogenates suggesting damage to liver and spleen. The study concluded that the aerial bulb of D. bulbifera lectin was non-specific in its heamagglutinating activity and dimeric in its structure. The lectin shared some physicochemical characteristics with lectins from other Dioscorecea species and was moderately toxic to the liver and spleen of treated animals.

Keywords: Dioscorea bulbifera, heamagglutinin, lectin, toxicity

Procedia PDF Downloads 127
2483 Survey on Malware Detection

Authors: Doaa Wael, Naswa Abdelbaky

Abstract:

Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment.

Keywords: malware analysis, blockchain, malware attacks, malware detection approaches

Procedia PDF Downloads 87
2482 Comprehensive Review of Adversarial Machine Learning in PDF Malware

Authors: Preston Nabors, Nasseh Tabrizi

Abstract:

Portable Document Format (PDF) files have gained significant popularity for sharing and distributing documents due to their universal compatibility. However, the widespread use of PDF files has made them attractive targets for cybercriminals, who exploit vulnerabilities to deliver malware and compromise the security of end-user systems. This paper reviews notable contributions in PDF malware detection, including static, dynamic, signature-based, and hybrid analysis. It presents a comprehensive examination of PDF malware detection techniques, focusing on the emerging threat of adversarial sampling and the need for robust defense mechanisms. The paper highlights the vulnerability of machine learning classifiers to evasion attacks. It explores adversarial sampling techniques in PDF malware detection to produce mimicry and reverse mimicry evasion attacks, which aim to bypass detection systems. Improvements for future research are identified, including accessible methods, applying adversarial sampling techniques to malicious payloads, evaluating other models, evaluating the importance of features to malware, implementing adversarial defense techniques, and conducting comprehensive examination across various scenarios. By addressing these opportunities, researchers can enhance PDF malware detection and develop more resilient defense mechanisms against adversarial attacks.

Keywords: adversarial attacks, adversarial defense, adversarial machine learning, intrusion detection, PDF malware, malware detection, malware detection evasion

Procedia PDF Downloads 39
2481 A Rare Case of Endometriosis Lesion in Caecum Causing Acute Small Bowel Obstruction

Authors: Freda Halim

Abstract:

Endometriosis in bowel is rare condition, about 3-37% of endometriosis cases. Most of bowel endometriosis rising in the rectosigmoid (90% of bowel endometriosis). The incidence of caecal endometriosis is very low ( < 5% of bowel endometriosis) and almost never causing acute small bowel obstruction. The aim of this paper is to show that although bowel obstruction caused by caecal endometriosis is difficult to diagnose as it is rare, and may require laparotomy to make definite diagnosis, but it should be considered in infertile female patient. The case is 37 years old woman infertile woman with intestinal obstruction with pre-operative diagnosis total acute small bowel obstruction caused by right colonic mass, with sepsis as the complication. Before the acute small bowel obstruction, she complained of chronic right lower quadrant pain with chronic constipation alternate with chronic diarrhea, symptoms that happened both in bowel endometriosis and colorectal malignancy. She also complained of chronic pelvic pain and dysmenorrhea. She was married for 10 years with no child. The patient was never diagnosed with endometriosis and never seek medical attention for infertility and the chronic pelvic pain. The patient underwent Abdominal CT Scan, with results: massive small bowel obstruction, and caecal mass that causing acute small bowel obstruction. Diagnosis of acute small bowel obstruction due to right colonic mass was made, and exploratory laparotomy was performed in the patient. During the laparotomy, mass at caecum and ileocaecal that causing massive small bowel obstruction was found and standard right hemicolectomy and temporary ileostomy were performed. The pathology examination showed ectopic endometriosis lesions in caecum and ileocaecal valve. The histopathology also confirmed with the immunohistochemistry, in which positive ER, PR, CD 10 and CD7 was found the ileocaecal and caecal mass. In the second operation, reanastomosis of the ileum was done 3 months after the first operation. The chronic pelvic pain is decreasing dramatically after the first and second operation. In conclusion, although bowel obstruction caused by caecal endometriosis is a rare cause of intestinal obstruction, but it can be considered as a cause in infertile female patient

Keywords: acute, bowel obstruction, caecum, endometriosis

Procedia PDF Downloads 150
2480 Calculation the Left Ventricle Wall Radial Strain and Radial SR Using Tagged Magnetic Resonance Imaging Data (tMRI)

Authors: Mohammed Alenezy

Abstract:

The function of cardiac motion can be used as an indicator of the heart abnormality by evaluating longitudinal, circumferential, and Radial Strain of the left ventricle. In this paper, the Radial Strain and SR is studied using tagged MRI (tMRI) data during the cardiac cycle on the mid-ventricle level of the left ventricle. Materials and methods: The short-axis view of the left ventricle of five healthy human (three males and two females) and four healthy male rats were imaged using tagged magnetic resonance imaging (tMRI) technique covering the whole cardiac cycle on the mid-ventricle level. Images were processed using Image J software to calculate the left ventricle wall Radial Strain and radial SR. The left ventricle Radial Strain and radial SR were calculated at the mid-ventricular level during the cardiac cycle. The peak Radial Strain for the human and rat heart was 40.7±1.44, and 46.8±0.68 respectively, and it occurs at 40% of the cardiac cycle for both human and rat heart. The peak diastolic and systolic radial SR for human heart was -1.78 s-1 ± 0.02 s-1 and 1.10±0.08 s-1 respectively, while for rat heart it was -5.16± 0.23s-1 and 4.25±0.02 s-1 respectively. Conclusion: This results show the ability of the tMRI data to characterize the cardiac motion during the cardiac cycle including diastolic and systolic phases which can be used as an indicator of the cardiac dysfunction by estimating the left ventricle Radial Strain and radial SR at different locations of the cardiac tissue. This study approves the validity of the tagged MRI data to describe accurately the cardiac radial motion.

Keywords: left ventricle, radial strain, tagged MRI, cardiac cycle

Procedia PDF Downloads 481
2479 CP-96345 Rregulates Hydrogen Sulphide Induced TLR4 Signaling Pathway Adhesion Molecules in Caerulein Treated Pancreatic Acinar Cells

Authors: Ramasamy Tamizhselvi, Leema George, Madhav Bhatia

Abstract:

We have earlier shown that mouse pancreatic acinar cells produce hydrogen sulfide (H2S) and play a role in the pathogenesis of acute pancreatitis. This study is to determine the effect of H2S on TLR4 mediated innate immune signaling in acute pancreatitis via substance P (SP). Male Swiss mice were treated with hourly intraperitoneal injection of caerulein (50μg/kg) for 10 hour. DL-propargylglycine (PAG) (100 mg/kg i.p.), an inhibitor of H2S formation was administered 1h after the induction of acute pancreatitis. Pancreatic acinar cells from male Swiss mice were incubated with or without caerulein (10–7 M for 60 min) and CP-96345 (NK1R inhibitor). To better understand the effect of H2S in inflammation, acinar cells were stimulated with caerulein after addition of H2S donor, NaHS. In addition, caerulein treated pancreatic acinar cells were pretreated with PAG (30 µM), for 1h. H2S inhibitor, PAG, eliminated TLR4, IRAK4, TRAF6 and NF-kB levels in an in vitro and in vivo model of caerulein-induced acute pancreatitis. PPTA gene deletion reduced TLR4, MyD88, IRAK4, TRAF6, adhesion molecules and NF-kB in caerulein treated pancreatic acinar cells whereas administration of NaHS resulted in further rise in TLR4 and NF-kB levels in caerulein treated pancreatic acinar cells. In addition, acini isolated from mice and treated with PPTA gene receptor NK1R antagonist CP96345 did not exhibit further increase in TLR4, IRAK4, TRAF6, adhesion molecules and NF-kB levels after NaHS pretreatment. The present findings show for the first time that in acute pancreatitis, H2S up-regulates TLR4 pathway and NF-kB via substance P.

Keywords: preprotachykinin-A gene, H2S, TLR4, acute pancreatitis

Procedia PDF Downloads 276
2478 Link Between Intensity-trajectories Of Acute Postoperative Pain And Risk Of Chronicization After Breast And Thoracopulmonary Surgery

Authors: Beloulou Mohamed Lamine, Fedili Benamar, Meliani Walid, Chaid Dalila

Abstract:

Introduction: The risk factors for the chronicization of postoperative pain are numerous and often intricately intertwined. Among these, the severity of acute postoperative pain is currently recognized as one of the most determining factors. Mastectomy and thoracotomy are described as among the most painful surgeries and the most likely to lead to chronic post-surgical pain (CPSP). Objective: To examine the aspects of acute postoperative pain potentially involved in the development of chronic pain following breast and thoracic surgery. Patients and Methods: A prospective study involving 164 patients was conducted over a six-month period. Postoperative pain (during mobilization) was assessed using a Visual Analog Scale (VAS) at various time points after surgery: Day 0, 1st, 2nd, 5th days, 1st and 6th months. Moderate to severe pain was defined as a VAS score ≥ 4. A comparative analysis (univariate analysis) of postoperative pain intensities at different evaluation phases was performed on patients with and without CPSP to identify potential associations with the risk of chronicization six months after surgery. Results: At the 6th month post-surgery, the incidence of CPSP was 43.0%. Moderate to severe acute postoperative pain (in the first five days) was observed in 64% of patients. The highest pain scores were reported among thoracic surgery patients. Comparative measures revealed a highly significant association between the presence of moderate to severe acute pain, especially lasting for ≥ 48 hours, and the occurrence of CPSP (p-value <0.0001). Likewise, the persistence of subacute pain (up to 4 to 6 weeks after surgery), especially of moderate to severe intensity, was significantly associated with the risk of chronicization at six months (p-value <0.0001). Conclusion: CPSP after breast and thoracic surgery remains a fairly common morbidity that profoundly affects the quality of life. Severe acute postoperative pain, especially if it is prolonged and/or with a slow decline in intensity, can be an important predictive factor for the risk of chronicization. Therefore, more effective and intensive management of acute postoperative pain, as well as longitudinal monitoring of its trajectory over time, should be an essential component of strategies for preventing chronic pain after surgery.

Keywords: chronic post-surgical pain, acute postoperative pain, breast and thoracic surgery, subacute postoperative pain, pain trajectory, predictive factor

Procedia PDF Downloads 73
2477 'Propaganda by the Deed', 'Armed Propaganda' and Mass Mobilization: The Missing Link in the Left-Wing Terrorist Thinking

Authors: Ersun N. Kurtulus

Abstract:

One of the strategic goals of left-wing terrorism, both in its Anarchist and Marxist-Leninist forms, was mobilization of masses as a first step in launching a revolution. However, in the canonical texts of left-wing terrorist literature (such as the works of Brousse, Nachaev, Bakunin, Kropotkin, Most, Heinzen, Guevara and Marighella) it is not clear how resort to terrorist tactics such as assassinations or bomb attacks will lead to mobilization of masses. This link is usually presumed and taken for granted. However, in other, less known terrorist texts, where there is some elaboration upon this link, two conflicting views emerge: (i) terrorist attacks are supposed to cause state repression which in turn radicalizes masses and opens up the way for recruitment and mobilization versus (ii) terrorist attacks are supposed to demonstrate the hollowness of the already existent state repression and thereby encourage mobilization of masses that are already radicalized but inactive due fear caused by state repression. The paper argues that terrorism studies have largely overemphasized the former while the latter has remained more or less unnoticed.

Keywords: terrorism, repression, radical left, mobilization of masses

Procedia PDF Downloads 225
2476 Classification of IoT Traffic Security Attacks Using Deep Learning

Authors: Anum Ali, Kashaf ad Dooja, Asif Saleem

Abstract:

The future smart cities trend will be towards Internet of Things (IoT); IoT creates dynamic connections in a ubiquitous manner. Smart cities offer ease and flexibility for daily life matters. By using small devices that are connected to cloud servers based on IoT, network traffic between these devices is growing exponentially, whose security is a concerned issue, since ratio of cyber attack may make the network traffic vulnerable. This paper discusses the latest machine learning approaches in related work further to tackle the increasing rate of cyber attacks, machine learning algorithm is applied to IoT-based network traffic data. The proposed algorithm train itself on data and identify different sections of devices interaction by using supervised learning which is considered as a classifier related to a specific IoT device class. The simulation results clearly identify the attacks and produce fewer false detections.

Keywords: IoT, traffic security, deep learning, classification

Procedia PDF Downloads 152
2475 Pupils´ Questions at School Attendance Beginning and Teachers´ Teaching Strategy

Authors: Marie Pavelková, Hana Lukášová

Abstract:

Pupils´ inquisitiveness at the beginning of their school attendance is reflected by characteristics of the questions they ask. Clearly most of the classroom communication sequences are initiated by the teacher. But the teaching process also includes questions initiated by pupils in the need to satisfy their need for knowledge. The purpose of our research is to present the results of our pre-research strategy of occurrence of pupil-initiated questions in math lessons at the lower elementary school level, and to reveal the extent to which they are influenced by the teacher´s teaching strategy. We used the research methods of direct and indirect observations of fifth year classes in primary school. We focused on questions asked by the pupils in their math lessons. Our research sample for the pre-research observation method was a collection of video recordings available online. We used them for analysing the nature of pupils´ questions identified there. On the basis of the analysis, we hereby present the results concerning the nature of pupils´ questions asked in math lessons on the lower elementary school level. The interpretation of the collected results will be the starting point for the selection of research strategies in the next research stages concerning pupils’ questions in the future.

Keywords: beginning of schooling, pre-research, questions of pupils, teaching strategy

Procedia PDF Downloads 370
2474 Intrusion Detection In MANET Using Game Theory

Authors: S. B. Kumbalavati, J. D. Mallapur, K. Y. Bendigeri

Abstract:

A mobile Ad-hoc network (MANET) is a multihop wireless network where nodes communicate each other without any pre-deployed infrastructure. There is no central administrating unit. Hence, MANET is generally prone to many of the attacks. These attacks may alter, release or deny data. These attacks are nothing but intrusions. Intrusion is a set of actions that attempts to compromise integrity, confidentiality and availability of resources. A major issue in the design and operation of ad-hoc network is sharing the common spectrum or common channel bandwidth among all the nodes. We are performing intrusion detection using game theory approach. Game theory is a mathematical tool for analysing problems of competition and negotiation among the players in any field like marketing, e-commerce and networking. In this paper mathematical model is developed using game theory approach and intruders are detected and removed. Bandwidth utilization is estimated and comparison is made between bandwidth utilization with intrusion detection technique and without intrusion detection technique. Percentage of intruders and efficiency of the network is analysed.

Keywords: ad-hoc network, IDS, game theory, sensor networks

Procedia PDF Downloads 387
2473 Swahili Codification of Emotions: A Cognitive Linguistic Analysis

Authors: Rosanna Tramutoli

Abstract:

Studies on several languages have demonstrated how different emotions are categorized in various linguistic constructions. It exists in several writings on the codification of emotions in Western African languages. A recent study on the semantic description of Swahili body terminology has demonstrated that body part terms, such as moyo (heart), uso (face) and jicho (eye) are involved in several metaphorical expressions describing emotions. However, so far hardly anything has been written on the linguistic description of emotions in Swahili. Thus, this study describes how emotional concepts, such as ‘love’ and ‘anger’ are codified in Swahili, in order to highlight common semantic and syntactic patterns, etymological sources and metaphorical expressions. The research seeks to answer a number of questions, such as which are the Swahili terms for ‘emotions’? Is there a distinction between ‘emotions’ and ‘feelings’? Which emotional lexical items have Bantu origin and which come from Arabic? Which metaphorical expressions/cognitive schemas are used to codify emotions? (e.g. kumpanda mtu kichwani, lit. ‘to climb on somebody’s head’, to make somebody feel angry, kushuka moyo, lit. ‘to be down the heart’, to feel discouraged, kumpa mtu moyo lit. ‘to give someone heart’, to encourage someone). Which body terms are involved as ‘containers/locus of emotions’? For instance, it has been shown that moyo (‘heart’) occurs as container of ‘love’ (e.g. kumtia mtu moyoni, lit. ‘to put somebody in the heart’, to love somebody very much) and ‘kindness’ (moyo wake ulijaa hisani, ‘his heart was filled with kindness’). The study also takes into account the syntactic patterns used to code emotions. For instance, when does the experiencer occur in subject position? (e.g. nina furaha, nimefurahi, ‘I am happy’) and when in object position (e.g. Huruma iliniingia moyoni, lit. ‘Pity entered me inside my heart’, ‘I felt pity’)? Data have been collected mostly through the analysis of Swahili digital corpora, containing different kinds of Swahili texts (e.g. novels, drama, political essays).

Keywords: emotions, cognitive linguistics, metaphors, Swahili

Procedia PDF Downloads 566
2472 Bilateral Simultaneous Acute Primary Angle Closure Glaucoma: A Remarkable Case

Authors: Nita Nurlaila Kadarwaty

Abstract:

Purpose: This study presents a rare case of bilateral Acute Primary Angle Closure Glaucoma (PACG). Method: A case report of a 64-year-old woman with a good outcome Acute PACG in both eyes who underwent phacotrabeculectomy surgery. Result: A 64-year-old woman complained of acute pain in both eyes, accompanied by decreased vision, photophobia, and seeing halos for three weeks. There was no history of trauma, steroid or other systemic drugs used, or intraocular surgery before. Ophthalmologic examination revealed a right eye (RE) visual acuity of 0.1, left eye (LE) 0.2. RE intraocular pressure (IOP) was 12 mmhg and LE: 36.4 mmHg in medication of timolol maleat ED and acetazolamide oral. Both eyes' anterior segments revealed mixed injection, corneal edema, shallow anterior chamber, posterior synechiae, mid-dilatation pupil with negative pupillary reflection, and cloudy lens without intumescent. There was a glaucomatous optic and closed iridocorneal angle on the gonioscopy. Initial treatments included oral acetazolamide and potassium aspartate 250 mg three times a day, timolol maleate ED 0.5% twice a day, and prednisolone acetate ED 1% four times a day. This patient underwent trabeculectomy, phacoemulsification, and implantation of IOL in both eyes. One week after the surgeries, both eyes showed decreased IOP and good visual improvement. Conclusion: Bilateral simultaneous Acute PACG is generally severe and results in a poor outcome. It causes rapidly progressive visual loss and is often irreversible. Phacotrabeculectomy has more benefits compared to only phacoemulsification for the intervention regarding the reduced IOP post-surgical.

Keywords: acute primary angle closure glaucoma, intraocular pressure, phacotrabeculectomy, glaucoma

Procedia PDF Downloads 73
2471 Powering Pacemakers from Heart Pressure Variation with Piezoelectric Energy Harvesters

Authors: A. Mathieu, B. Aubry, E. Chhim, M. Jobe, M. Arnaud

Abstract:

Present project consists in a study and a development of piezoelectric devices for supplying power to new generation pacemakers. They are miniaturized leadless implants without battery placed directly in right ventricle. Amongst different acceptable energy sources in cardiac environment, we choose the solution of a device based on conversion of the energy produced by pressure variation inside the heart into electrical energy. The proposed energy harvesters can meet the power requirements of pacemakers, and can be a good solution to solve the problem of regular surgical operation. With further development, proposed device should provide enough energy to allow pacemakers autonomy, and could be good candidate for next pacemaker generation.

Keywords: energy harvester, heart, leadless pacemaker, piezoelectric cells, pressure variation

Procedia PDF Downloads 445
2470 Comparision of Neospora caninum Experimental Infection in Pigeons and Chickens Embryonated Eggs

Authors: S. Bahrami, A. Rezaie, Z. Boroumand, S. Ghavami

Abstract:

Neospora caninum is protozoan parasite which can cause a serious disease in dogs and cattle. It has been shown that birds may be a permissive intermediate host for N. caninum since parasite DNA has been detected in tissues from birds. It is showed that embryonated chicken egg can be used as an animal model for experimental infection. The aim of present study was to compare experimental infection of Neospora in chicken and pigeons embryonated eggs. An infection with N. caninum Nc1 isolate was conducted in chicken and pigeons embryonated eggs to evaluate LD50. After calculation of LD50, 2LD50 of tachyzoites were injected to eggs. Macroscopic changes of each embryo were noticed and to investigate the parasite distribution in tissues immunohistochemistry (IHC) and molecular methods were used. In the present study, histopathological changes were considered and sections to those used for histopathological examination including heart, liver, brain and chorioallantoic (CA) membrane were subjected to IHC, too. For PCR procedure, primer pair Np21/Np6 was used for amplification of the Nc5 gene. Pigeon's embryo showed more macroscopic changes than chicken embryo. A hemorrhage of the CA was the main grass lesion. All the infected tissues had histopathological changes. Microscopic examination of tissues revealed acute neosporosis due to hemorrhage, necrosis and infiltration of mononuclear inflammatory cells. Based on IHC and molecular results, the parasite aggregation in the heart was more predominant than in the other tissues. These results reinforce that there is genetic susceptibility to N. caninum in pigeons embryonated eggs like chickens embryonated eggs and provide new insights to research an inexpensive and available animal model for N. caninum.

Keywords: immunohistochemistry, Neospora caninum, PCR, pigeon embryonated egg

Procedia PDF Downloads 345
2469 Cyber Security and Risk Assessment of the e-Banking Services

Authors: Aisha F. Bushager

Abstract:

Today we are more exposed than ever to cyber threats and attacks at personal, community, organizational, national, and international levels. More aspects of our lives are operating on computer networks simply because we are living in the fifth domain, which is called the Cyberspace. One of the most sensitive areas that are vulnerable to cyber threats and attacks is the Electronic Banking (e-Banking) area, where the banking sector is providing online banking services to its clients. To be able to obtain the clients trust and encourage them to practice e-Banking, also, to maintain the services provided by the banks and ensure safety, cyber security and risks control should be given a high priority in the e-banking area. The aim of the study is to carry out risk assessment on the e-banking services and determine the cyber threats, cyber attacks, and vulnerabilities that are facing the e-banking area specifically in the Kingdom of Bahrain. To collect relevant data, structured interviews were taken place with e-banking experts in different banks. Then, collected data where used as in input to the risk management framework provided by the National Institute of Standards and Technology (NIST), which was the model used in the study to assess the risks associated with e-banking services. The findings of the study showed that the cyber threats are commonly human errors, technical software or hardware failure, and hackers, on the other hand, the most common attacks facing the e-banking sector were phishing, malware attacks, and denial-of-service. The risks associated with the e-banking services were around the moderate level, however, more controls and countermeasures must be applied to maintain the moderate level of risks. The results of the study will help banks discover their vulnerabilities and maintain their online services, in addition, it will enhance the cyber security and contribute to the management and control of risks that are facing the e-banking sector.

Keywords: cyber security, e-banking, risk assessment, threats identification

Procedia PDF Downloads 350
2468 The Journey of a Malicious HTTP Request

Authors: M. Mansouri, P. Jaklitsch, E. Teiniker

Abstract:

SQL injection on web applications is a very popular kind of attack. There are mechanisms such as intrusion detection systems in order to detect this attack. These strategies often rely on techniques implemented at high layers of the application but do not consider the low level of system calls. The problem of only considering the high level perspective is that an attacker can circumvent the detection tools using certain techniques such as URL encoding. One technique currently used for detecting low-level attacks on privileged processes is the tracing of system calls. System calls act as a single gate to the Operating System (OS) kernel; they allow catching the critical data at an appropriate level of detail. Our basic assumption is that any type of application, be it a system service, utility program or Web application, “speaks” the language of system calls when having a conversation with the OS kernel. At this level we can see the actual attack while it is happening. We conduct an experiment in order to demonstrate the suitability of system call analysis for detecting SQL injection. We are able to detect the attack. Therefore we conclude that system calls are not only powerful in detecting low-level attacks but that they also enable us to detect high-level attacks such as SQL injection.

Keywords: Linux system calls, web attack detection, interception, SQL

Procedia PDF Downloads 358
2467 Serum Potassium Before, During and After Exercise at 70% Maximal Heart Rate: The Safe Exercise Dosage Across Different Parameters of Health and Fitness Level

Authors: Omar bin Mihat

Abstract:

The number of sudden deaths is increasing over the past years. These deaths occur not during physical activities but upon cessation. Post-mortem confirms these deaths as cardiac arrest non-specifically. Congenital heart disease is a condition undiagnosed whereby only surface upon physical exertion leading to sudden death is unavoidable. Channelopathy, a condition that refers to any disease from the defect in iron-channel function, particularly the sodium-potassium pump, during the cessation of the exercise can be controlled. The derivation of heart rate return (HRrtn) is a procedure of a control cooling down process according to the heart rate (HR). Empirically, potassium rises linearly with intensity and falls sharply upon abrupt cessation of exertion, resulting in fatal arrhythmia due to hypokalaemia. It is vital that the flux of potassium should be maintained within the normal range during physical activities. To achieve this, the dosage of physical exertion (exercise) should be identified. Various percentages of the intensity of maximum heart rate (MHR) will precipitate different adaptations and remodeling of various organs. 70% of MHR will surface physiological adaptations, including enhancement of endurance, fitness level, and general health, and there was no significant rise of serum potassium (K+) during the entire phase of the treadmill brisk walk at a different rate of perceived exertion (RPE) from the subject of various fitness background. There was also no significant rise in blood pressure (BP) during the entire phase of the treadmill brisk walk, substantiating 70% MHR is the safe dosage across different parameters of health and fitness level.

Keywords: potassium, maximal heart rate, exercise dosage, fitness level

Procedia PDF Downloads 66
2466 Copy Number Variants in Children with Non-Syndromic Congenital Heart Diseases from Mexico

Authors: Maria Lopez-Ibarra, Ana Velazquez-Wong, Lucelli Yañez-Gutierrez, Maria Araujo-Solis, Fabio Salamanca-Gomez, Alfonso Mendez-Tenorio, Haydeé Rosas-Vargas

Abstract:

Congenital heart diseases (CHD) are the most common congenital abnormalities. These conditions can occur as both an element of distinct chromosomal malformation syndromes or as non-syndromic forms. Their etiology is not fully understood. Genetic variants such copy number variants have been associated with CHD. The aim of our study was to analyze these genomic variants in peripheral blood from Mexican children diagnosed with non-syndromic CHD. We included 16 children with atrial and ventricular septal defects and 5 healthy subjects without heart malformations as controls. To exclude the most common heart disease-associated syndrome alteration, we performed a fluorescence in situ hybridization test to identify the 22q11.2, responsible for congenital heart abnormalities associated with Di-George Syndrome. Then, a microarray based comparative genomic hybridization was used to identify global copy number variants. The identification of copy number variants resulted from the comparison and analysis between our results and data from main genetic variation databases. We identified copy number variants gain in three chromosomes regions from pediatric patients, 4q13.2 (31.25%), 9q34.3 (25%) and 20q13.33 (50%), where several genes associated with cellular, biosynthetic, and metabolic processes are located, UGT2B15, UGT2B17, SNAPC4, SDCCAG3, PMPCA, INPP6E, C9orf163, NOTCH1, C20orf166, and SLCO4A1. In addition, after a hierarchical cluster analysis based on the fluorescence intensity ratios from the comparative genomic hybridization, two congenital heart disease groups were generated corresponding to children with atrial or ventricular septal defects. Further analysis with a larger sample size is needed to corroborate these copy number variants as possible biomarkers to differentiate between heart abnormalities. Interestingly, the 20q13.33 gain was present in 50% of children with these CHD which could suggest that alterations in both coding and non-coding elements within this chromosomal region may play an important role in distinct heart conditions.

Keywords: aCGH, bioinformatics, congenital heart diseases, copy number variants, fluorescence in situ hybridization

Procedia PDF Downloads 291
2465 Acute Poisoning Based on Age and Gender Caused by Pharmaceuticals and Therapies That Influence the Nervous System

Authors: Ragy Raafat Gaber Attaalla

Abstract:

Background: We looked at acute poisonings brought on by illegal drugs and pharmaceuticals that influence the nervous system at Assiut University Hospitals. Methods: Between January 2010 and December 2015, we conducted a retrospective examination of patient records from the largest tertiary toxicology referral center in Assiut. We examined the frequency, pattern, and distribution of ages and genders of acute nervous system agent poisoning. Results: 29,083 individuals total—16,657 (57.27%) males and 12,426 (42.73%) females—were included in the current study. Men's and women's median ages were 29 and 26, respectively (p < 0.0001). 10,326 (83.10%) women and 12,071 (72.47%) men under 40 were present (p < 0.001). 44.10% of cases had a history of poisoning, and the majority of cases (69.38% in men and 79.00% in women, p<0.001) were purposeful. Between various age groups and nervous system agents, there were notable variations in the ratios of men and women. The most often used agent for women was alprazolam, whereas methadone was more popular for men. Overall, there was a rising tendency in acute poisoning associated with alcohol and opioids used to treat addiction disorders, but a declining trend with benzodiazepines and antidepressants. Conclusion: Addiction to methadone was widespread, particularly in young males, and the majority of these cases were self-inflicted. Alprazolam and clonazepam poisoning most commonly affect women and males in the 20–29 age range, respectively. Opium was utilized by men over 30 and women over 60. Over half of the deaths were related to illicit narcotics, with opium being the most common. This research could raise awareness and lead to the development of gender- and age-specific local programs for education and prevention.

Keywords: acute poisonings, illegal drugs, pharmaceuticals, nerve system

Procedia PDF Downloads 29
2464 BFDD-S: Big Data Framework to Detect and Mitigate DDoS Attack in SDN Network

Authors: Amirreza Fazely Hamedani, Muzzamil Aziz, Philipp Wieder, Ramin Yahyapour

Abstract:

Software-defined networking in recent years came into the sight of so many network designers as a successor to the traditional networking. Unlike traditional networks where control and data planes engage together within a single device in the network infrastructure such as switches and routers, the two planes are kept separated in software-defined networks (SDNs). All critical decisions about packet routing are made on the network controller, and the data level devices forward the packets based on these decisions. This type of network is vulnerable to DDoS attacks, degrading the overall functioning and performance of the network by continuously injecting the fake flows into it. This increases substantial burden on the controller side, and the result ultimately leads to the inaccessibility of the controller and the lack of network service to the legitimate users. Thus, the protection of this novel network architecture against denial of service attacks is essential. In the world of cybersecurity, attacks and new threats emerge every day. It is essential to have tools capable of managing and analyzing all this new information to detect possible attacks in real-time. These tools should provide a comprehensive solution to automatically detect, predict and prevent abnormalities in the network. Big data encompasses a wide range of studies, but it mainly refers to the massive amounts of structured and unstructured data that organizations deal with on a regular basis. On the other hand, it regards not only the volume of the data; but also that how data-driven information can be used to enhance decision-making processes, security, and the overall efficiency of a business. This paper presents an intelligent big data framework as a solution to handle illegitimate traffic burden on the SDN network created by the numerous DDoS attacks. The framework entails an efficient defence and monitoring mechanism against DDoS attacks by employing the state of the art machine learning techniques.

Keywords: apache spark, apache kafka, big data, DDoS attack, machine learning, SDN network

Procedia PDF Downloads 169
2463 Prediction of Survival Rate after Gastrointestinal Surgery Based on The New Japanese Association for Acute Medicine (JAAM Score) With Neural Network Classification Method

Authors: Ayu Nabila Kusuma Pradana, Aprinaldi Jasa Mantau, Tomohiko Akahoshi

Abstract:

The incidence of Disseminated intravascular coagulation (DIC) following gastrointestinal surgery has a poor prognosis. Therefore, it is important to determine the factors that can predict the prognosis of DIC. This study will investigate the factors that may influence the outcome of DIC in patients after gastrointestinal surgery. Eighty-one patients were admitted to the intensive care unit after gastrointestinal surgery in Kyushu University Hospital from 2003 to 2021. Acute DIC scores were estimated using the new Japanese Association for Acute Medicine (JAAM) score from before and after surgery from day 1, day 3, and day 7. Acute DIC scores will be compared with The Sequential Organ Failure Assessment (SOFA) score, platelet count, lactate level, and a variety of biochemical parameters. This study applied machine learning algorithms to predict the prognosis of DIC after gastrointestinal surgery. The results of this study are expected to be used as an indicator for evaluating patient prognosis so that it can increase life expectancy and reduce mortality from cases of DIC patients after gastrointestinal surgery.

Keywords: the survival rate, gastrointestinal surgery, JAAM score, neural network, machine learning, disseminated intravascular coagulation (DIC)

Procedia PDF Downloads 256
2462 Short-Term versus Long-Term Effect of Waterpipe Smoking Exposure on Cardiovascular Biomarkers in Mice

Authors: Abeer Rababa'h, Ragad Bsoul, Mohammad Alkhatatbeh, Karem Alzoubi

Abstract:

Introduction: Tobacco use is one of the main risk factors to cardiovascular diseases (CVD) and atherosclerosis in particular. WPS contains several toxic materials such as: nicotine, carcinogens, tar, carbon monoxide and heavy metals. Thus, WPS is considered to be as one of the toxic environmental factors that should be investigated intensively. Therefore, the aim of this study is to investigate the effect of WPS on several cardiovascular biological markers that may cause atherosclerosis in mice. The study also conducted to study the temporal effects of WPS on the atherosclerotic biomarkers upon short (2 weeks) and long-term (8 weeks) exposures. Methods: mice were exposed to WPS and heart homogenates were analyzed to elucidate the effects of WPS on matrix metalloproteinase (MMPs), endothelin-1 (ET-1) and, myeloperoxidase (MPO). Following protein estimation, enzyme-linked immunosorbent assays were done to measure the levels of MMPs (isoforms 1, 3, and 9), MPO, and ET-1 protein expressions. Results: our data showed that acute exposure to WPS significantly enhances the levels of MMP-3, MMP- 9, and MPO expressions (p < 0.05) compared to their corresponding control. However, the body was capable to normalize the level of expressions for such parameters following continuous exposure for 8 weeks (p > 0.05). Additionally, we showed that the level of ET-1 expression was significantly higher upon chronic exposure to WPS compared to both control and acute exposure groups (p < 0.05). Conclusion: Waterpipe exposure has a significant negative effect on atherosclerosis and the enhancement of the atherosclerotic biomarkers expression (MMP-3 and 9, MPO, and ET-1) might represent an early scavenger of compensatory efforts to maintain cardiac function after WP exposure.

Keywords: atherosclerotic biomarkers, cardiovascular disease, matrix metalloproteinase, waterpipe

Procedia PDF Downloads 352
2461 Machine Learning-Based Techniques for Detecting and Mitigating Cyber-attacks on Automatic Generation Control in Smart Grids

Authors: Sami M. Alshareef

Abstract:

The rapid growth of smart grid technology has brought significant advancements to the power industry. However, with the increasing interconnectivity and reliance on information and communication technologies, smart grids have become vulnerable to cyber-attacks, posing significant threats to the reliable operation of power systems. Among the critical components of smart grids, the Automatic Generation Control (AGC) system plays a vital role in maintaining the balance between generation and load demand. Therefore, protecting the AGC system from cyber threats is of paramount importance to maintain grid stability and prevent disruptions. Traditional security measures often fall short in addressing sophisticated and evolving cyber threats, necessitating the exploration of innovative approaches. Machine learning, with its ability to analyze vast amounts of data and learn patterns, has emerged as a promising solution to enhance AGC system security. Therefore, this research proposal aims to address the challenges associated with detecting and mitigating cyber-attacks on AGC in smart grids by leveraging machine learning techniques on automatic generation control of two-area power systems. By utilizing historical data, the proposed system will learn the normal behavior patterns of AGC and identify deviations caused by cyber-attacks. Once an attack is detected, appropriate mitigation strategies will be employed to safeguard the AGC system. The outcomes of this research will provide power system operators and administrators with valuable insights into the vulnerabilities of AGC systems in smart grids and offer practical solutions to enhance their cyber resilience.

Keywords: machine learning, cyber-attacks, automatic generation control, smart grid

Procedia PDF Downloads 85
2460 Detecting Black Hole Attacks in Body Sensor Networks

Authors: Sara Alshehri, Bayan Alenzi, Atheer Alshehri, Samia Chelloug, Zainab Almry, Hussah Albugmai

Abstract:

This paper concerns body area networks sensor that collect signals around a human body. The black hole attacks are the main security challenging problem because the data traffic can be dropped at any node. The focus of our proposed solution is to efficiently route data packets while detecting black hole nodes.

Keywords: body sensor networks, security, black hole, routing, broadcasting, OMNeT++

Procedia PDF Downloads 645