Search results for: common substrings
3343 The impact of Breast Cancer Polymorphism on Breast Cancer
Authors: Roudabeh Vakil Monfared, Farhad Mashayekhi
Abstract:
Breast cancer is the most common malignancy type among women with about 1 million new cases each year. The immune system plays an important role in the breast cancer development. OX40L (also known as TNFSF4), a membrane protein, which is a member of the tumor necrosis factor super family binds to its receptor OX40 and this co-stimulation has a crucial role in T-cell proliferation, survival and cytokine release. Due to the importance of the T-cells in anti-tumor activities of OX40L we studied the association of rs3850641 (T→C) polymorphism of OX40L gene with breast cancer. The study included 123 women with breast cancer and 126 healthy volunteers with no signs of cancer. Genomic DNA was extracted from blood leucocytes. Genotype and allele frequencies were determined in patients and control cases with the method of polymerase chain reaction-restriction fragment length polymorphism (PCR-RFLP) and the analysis was performed by Med Calc. The prevalence of genotype frequencies of TT, CT and CC were 60.9%, 30.08% and 8.9 % in patients with breast cancer and 74.6 %, 18.25 % and 7.14 % in healthy volunteers while the T and C allelic frequency was 76.01% and 23.98 % in patients and 83.73% and 16.26% in healthy controls. Respectively Statistical analysis has shown no significant difference from the comparison of either genotype (P=0.06). According to these results, the rs3850641 SNP has no association with the susceptibility of breast cancer in a population in northern Iran. However, further studies in larger populations including other genetic and environmental factors are required to achieve conclusion.Keywords: OX40L, gene, polymorphism, breast cancer
Procedia PDF Downloads 5333342 Isolation and Antifungal Susceptibility Pattern of Candida albicans from Endocervical and High Vaginal Swabs of Pregnant Women Attending State Specialist Hospital Gombe, Nigeria
Authors: Isa Shu’aibu, A. A. Mu’inat, F. U. Maigari, M. A. Mani
Abstract:
Candida albicans is the common cause of both oral and vaginal candidiasis in humans. This candidiasis leads to a wide range of physical, psychological and even physiological problems in humans particularly pregnant women. Samples of endocervical and high vaginal swab were collected from 200 women attending Gombe Specialist Hospital and inoculated on Saboraud Dextrose Agar (SDA) incorporated with chloramphenicol to get rid of the unwanted bacterial contaminants. Gram staining technique and germ tube test were employed for the identification, as Candida albicans is positive for both. Gram positive samples were 70% (n=140) and were further subjected to germ tube test. The remaining 30% (n=60) were found to be Gram negative. 90% (n=126) of the Gram positive ones isolated were also found to be positive for germ tube test; confirming the presence of Candida albicans. Antifungal susceptibility testing revealed that members of Imidazole (Ketoconazole, Miconazole) and those of Triazoles (Fluconazole and Itraconazole) were found to be more effective at concentrations of 20, 50 and 100 µg/disc compared to Griseofulvin (Fulcin) with only 26.00 mm zone of inhibition at 100 µg/disc concentration.Keywords: Candida albicans, candidiasis, endocervical, vaginal swab, antifungal susceptibility, imidazole, triazoles
Procedia PDF Downloads 3313341 Supply Chain Resilience Triangle: The Study and Development of a Framework
Authors: M. Bevilacqua, F. E. Ciarapica, G. Marcucci
Abstract:
Supply Chain Resilience has been broadly studied during the last decade, focusing the research on many aspects of Supply Chain performance. Consequently, different definitions of Supply Chain Resilience have been developed by the research community, drawing inspiration also from other fields of study such as ecology, sociology, psychology, economy et al. This way, the definitions so far developed in the extant literature are therefore very heterogeneous, and many authors have pointed out a lack of consensus in this field of analysis. The aim of this research is to find common points between these definitions, through the development of a framework of study: the Resilience Triangle. The Resilience Triangle is a tool developed in the field of civil engineering, with the objective of modeling the loss of resilience of a given structure during and after the occurrence of a disruption such as an earthquake. The Resilience Triangle is a simple yet powerful tool: in our opinion, it can summarize all the features that authors have captured in the Supply Chain Resilience definitions over the years. This research intends to recapitulate within this framework all these heterogeneities in Supply Chain Resilience research. After collecting a various number of Supply Chain Resilience definitions present in the extant literature, the methodology approach provides a taxonomy step with the scope of collecting and analyzing all the data gathered. The next step provides the comparison of the data obtained with the plotting of a disruption profile, in order to contextualize the Resilience Triangle in the Supply Chain context. The tool and the results developed in this research will allow to lay the foundation for future Supply Chain Resilience modeling and measurement work.Keywords: supply chain resilience, resilience definition, supply chain resilience triangle
Procedia PDF Downloads 3143340 Field Production Data Collection, Analysis and Reporting Using Automated System
Authors: Amir AlAmeeri, Mohamed Ibrahim
Abstract:
Various data points are constantly being measured in the production system, and due to the nature of the wells, these data points, such as pressure, temperature, water cut, etc.., fluctuations are constant, which requires high frequency monitoring and collection. It is a very difficult task to analyze these parameters manually using spreadsheets and email. An automated system greatly enhances efficiency, reduce errors, the need for constant emails which take up disk space, and frees up time for the operator to perform other critical tasks. Various production data is being recorded in an oil field, and this huge volume of data can be seen as irrelevant to some, especially when viewed on its own with no context. In order to fully utilize all this information, it needs to be properly collected, verified and stored in one common place and analyzed for surveillance and monitoring purposes. This paper describes how data is recorded by different parties and departments in the field, and verified numerous times as it is being loaded into a repository. Once it is loaded, a final check is done before being entered into a production monitoring system. Once all this is collected, various calculations are performed to report allocated production. Calculated production data is used to report field production automatically. It is also used to monitor well and surface facility performance. Engineers can use this for their studies and analyses to ensure field is performing as it should be, predict and forecast production, and monitor any changes in wells that could affect field performance.Keywords: automation, oil production, Cheleken, exploration and production (E&P), Caspian Sea, allocation, forecast
Procedia PDF Downloads 1543339 Analysis of Spatial Disparities of Population for Delicate Configuration of Public Service Facilities:Case of Gongshu District, Hangzhou, China
Authors: Ruan Yi-Chen, Li Wang-Ming, Fang Yuan
Abstract:
With the rapid growth of urbanization in China in recent years, public services are in short supply because of expanding population and limitation of financial support, which makes delicate configuration of public service facilities to become a trend in urban planning. Besides, the facility configuration standard implemented in China is equal to the whole the urban area without considering internal differences in it. Therefore, this article focuses on population Spatial disparities analysis in order to optimize facility configuration in communities of main city district. The used data, including population of 93 communities during 2010 to 2015, comes from GongShu district, Hangzhou city, PRC. Through the analysis of population data, especially the age structure of those communities, the communities finally divided into 3 types. Obviously, urban public service facilities allocation situation directly affect the quality of residents common lives, which turns out that deferent kinds of communities with deferent groups of citizens will have divergences in facility demanding. So in the end of the article, strategies of facility configuration will be proposed based on the population analysis in order to optimize the quantity and location of facilities with delicacy.Keywords: delicacy, facility configuration, population spatial disparities, urban area
Procedia PDF Downloads 3853338 Secured Cancer Care and Cloud Services in Internet of Things /Wireless Sensor Network Based Medical Systems
Authors: Adeniyi Onasanya, Maher Elshakankiri
Abstract:
In recent years, the Internet of Things (IoT) has constituted a driving force of modern technological advancement, and it has become increasingly common as its impacts are seen in a variety of application domains, including healthcare. IoT is characterized by the interconnectivity of smart sensors, objects, devices, data, and applications. With the unprecedented use of IoT in industrial, commercial and domestic, it becomes very imperative to harness the benefits and functionalities associated with the IoT technology in (re)assessing the provision and positioning of healthcare to ensure efficient and improved healthcare delivery. In this research, we are focusing on two important services in healthcare systems, which are cancer care services and business analytics/cloud services. These services incorporate the implementation of an IoT that provides solution and framework for analyzing health data gathered from IoT through various sensor networks and other smart devices in order to improve healthcare delivery and to help health care providers in their decision-making process for enhanced and efficient cancer treatment. In addition, we discuss the wireless sensor network (WSN), WSN routing and data transmission in the healthcare environment. Finally, some operational challenges and security issues with IoT-based healthcare system are discussed.Keywords: IoT, smart health care system, business analytics, (wireless) sensor network, cancer care services, cloud services
Procedia PDF Downloads 1773337 Formulation of a Stress Management Program for Human Error Prevention in Nuclear Power Plants
Authors: Hyeon-Kyo Lim, Tong-il Jang, Yong-Hee Lee
Abstract:
As for any nuclear power plant, human error is one of the most dreaded factors that may result in unexpected accidents. Thus, for accident prevention, it is quite indispensable to analyze and to manage the influence of any factor which may raise the possibility of human errors. Among lots factors, stress has been reported to have significant influence on human performance. Stress level of a person may fluctuate over time. To handle the possibility over time, robust stress management program is required, especially in nuclear power plants. Therefore, to overcome the possibility of human errors, this study aimed to develop a stress management program as a part of Fitness-for-Duty (FFD) Program for the workers in nuclear power plants. The meaning of FFD might be somewhat different by research objectives, appropriate definition of FFD was accomplished in this study with special reference to human error prevention, and diverse stress factors were elicited for management of human error susceptibility. In addition, with consideration of conventional FFD management programs, appropriate tests and interventions were introduced over the whole employment cycle including selection and screening of workers, job allocation, job rotation, and disemployment as well as Employee-Assistance-Program (EAP). The results showed that most tools mainly concentrated their weights on common organizational factors such as Demands, Supports, and Relationships in sequence, which were referred as major stress factors.Keywords: human error, accident prevention, work performance, stress, fatigue
Procedia PDF Downloads 3243336 Armed Groups and Intra State Conflict: A Study on the Egyptian Case
Authors: Ghzlan Mahmoud Abdel Aziz
Abstract:
This case study aims to identify the intrastate conflicts between the nation state and armed groups. Nowadays, most wars weaken states against armed groups. Thus, it is very important to negotiate with such groups in order to reinforce the law for the protection of victims. These armed groups are the cause of conflicts and they are related with many of humanitarian issues that result out of conflicts. In this age of rivalry; terrorists, insurgents, or transnational criminal parties have surfaced to the top as a reaction to these armed groups in an effort to set up a new world order. Moreover, the intra state conflicts became increasingly treacherous than the interstate conflicts, particularly when nation state systems deal with armed groups which try to influence the state. The unexpected upraising of the Arab Spring during 2011 in parts of the Middle East and North Africa formed various patterns of conflicts. The events of the Arab Spring resulted in current and long term change across the region. Significant modifications in the level, strength and period of armed conflict around the world have been made. Egypt was in the center of these events. It has fought back the armed groups under the name of terrorism and spread common disorder and violence among civilians. On this note, this study focuses on the problem of the transformation in the methods of organized violence within one state rather than between two state or more and analyzes the objectives, strategies, and internal composition of armed groups and the environments that foster them, with a focus on the Egyptian case.Keywords: armed groups, conflicts, Egyptian armed forces, intrastate conflicts
Procedia PDF Downloads 4573335 Allergy to Animal Hair in the Algerian Population
Authors: Meriche Hacene, Gadiri Sabiha
Abstract:
Introduction: Allergy to animal hair is hypersensitivity to animal appendages to look for in front of any rhinoconjunctivitis or asthma. An anamnesis associated with the prick-tests makes it possible to guide the diagnosis, which will be supplemented in case of doubt by specific immunoglobulin E (IgE) assays. The objective of our study is to study the characteristics of patients sensitized to animal hair. Patients and methods: Retrospective study conducted on 105 adult patients and 69 children over a period of 3 years, including patients who received a specific IgE assay (respiratory panel and pediatric panel) by immunodot method. Result: 105 adult patients, including 74 women and 31 men, with an average age of 41 years, of which 8.5% had sensitization to animal hair (5 men and 4 women), namely: cat (5%), horse (4.7%) and dog (3.8%). For the 69 children, a slight female predominance was noted (56%), with an average age of 7.5 years, of which (13%) are sensitized to animal hair (5 girls and 4 boys): cat (10%), while awareness of dog and horse hair was less frequent with an identical prevalence of (4.34%). The dominant symptoms are rhinorrhea and sneezing for both categories, respectively (40% and 26.6% in adults and 23% for both symptoms in children). Cross-sensitization was observed in the 2 series: 1 single cat-dog and cat-horse case and 2 dog-horse cases in adults. In children 100% of patients with sensitization to dog hair had cross-sensitization to cat hair, only 1 case was observed for cat-horse cross-reactivity. Conclusion: This work shows that allergy to animal hair is common. Studies on more representative samples are recommended.Keywords: children, allegy to animals, specific Ig E, hypersensitivity
Procedia PDF Downloads 643334 Association Between Hip Internal and External Rotation Range of Motion and Low Back Pain in Table Tennis Players
Authors: Kaili Wang, Botao Zhang, Enming Zhang
Abstract:
Background: Low back pain (LBP) is a common problem affecting athletes' training and competition. Although the association between a limited hip range of motion and prevalence of low back pain has been studied extensively, it has not been studied in table tennis. Aim: The main purposes of this study in table tennis players were (1) to investigate if there is a difference in hip internal rotation (HIR) and external rotation (HER) range of motion (ROM) between players with LBP and players without LBP and (2) to analyze the association between HIR and HER ROM and LBP. Methods: Forty-six table tennis players from the Chinese table tennis team were evaluated for passive maximum HIR and HER ROM. LBP was retrospectively recorded for the last 12 months before the date of ROM assessment by a physical therapist. The data were analyzed the difference in HIR and HER ROM between players with LBP and players without LBP by Mann-Whitney U test, and the association between the difference in HIR and HER ROM and LBP was analyzed via a binary logistic regression. Results: The 54% of players had developed LBP during the retrospective study period. Significant difference between LBP group and the asymptomatic group for HIR ROM (z=4.007, p<0.001) was observed. Difference between LBP group and asymptomatic group for HER ROM (z=1.117, p=0.264) was not significant. Players who had HIR ROM deficit had an increased risk of LBP compared with players without HIR ROM deficit (OR=5.344, 95%CI: 1.006-28.395, P=0.049). Conclusion: HIR ROM of a table tennis player with LBP was less than a table tennis player without LBP. Compared with player whose HIR ROM was normal, player who had HIR ROM deficit appeared to have a higher risk for LBP.Keywords: assessment, injury prevention, low back pain, table tennis players
Procedia PDF Downloads 1093333 Influence of Pulverized Granite on the Mechanical and Durability Properties of Concrete
Authors: Kwabena A. Boakye, Eugene Atiemo, Trinity A. Tagbor, Delali Adjei
Abstract:
The use of mineral admixtures such as metakaolin, GGBS, fly ash, etc., in concrete is a common practice in the world. However, the only admixture available for use in the Ghanaian construction industry is calcined clay pozzolan. This research, therefore, studies the alternate use of granite dust, a by-product from stone quarrying, as a mineral admixture in concrete. Granite dust, which is usually damped as waste or as an erosion control material, was collected and pulverized to about 75µm. Some physical, chemical, and mineralogical tests were conducted on the granite dust. 5%-25% ordinary Portland cement of Class 42.5N was replaced with granite dust which was used as the main binder in the preparation of 150mm×150mm×150mm concrete cubes according to methods prescribed by BS EN 12390-2:2000. Properties such as workability, compressive strength, flexural strength, water absorption, and durability were determined. Compressive and flexural strength results indicate that granite dust could be used to replace ordinary Portland cement up to an optimum of 15% to achieve C25. Water permeability increased as the granite dust admixture content increased from 5% - 25%. Durability studies after 90 days proved that even though strength decreased as granite dust content increased, the concrete containing granite dust had better resistance to sulphate attack comparable to the reference cement. Pulverized granite can be used to partially replace ordinary Portland cement in concrete.Keywords: admixture, granite dust, permeability, pozzolans
Procedia PDF Downloads 1573332 The Cytomegalovirus Infection among Iranian Kidney Graft Recipients
Authors: Zakieh Rostamzadeh , Nariman Sepehrvand-Zahra Shirmohamadi
Abstract:
Background: Cytomegalovirus (CMV) infection is one of the most common infectious problems following kidney transplantation. In this study, we are aimed to investigate the CMV infection in the setting of renal transplant recipients in Urmia-Iran, using both ELISA and polymerase chain reaction (PCR) methods. Methods: Ninety-six renal transplant recipients were selected randomly and enrolled in a cross-sectional study. Blood sampling was done via venipuncture, and all sera were investigated for anti-CMV IgM, and the seropositive cases in association with 14 randomly selected seronegative cases were investigated with PCR assay. Results: Thirty-three patients (34.3%) were seropositive for anti-CMV IgM, 3 patients (3.1%) were in borderline range, and 60 patients (62.5%) were seronegative. By considering the patients with borderline anti-CMV IgM levels as seropositive, 37.5% were seropositive for anti-CMV IgM. Among 36 seropositive cases, the CMV infection was confirmed in 19 (52.7%) of them using PCR. Age (P = 0.40), educational status (P = 0.77), history of pre-transplantation dialysis (0.52), history of blood transfusion (P = 0.52), and immunosuppressive regimen were not statistically different among recipients with positive versus negative CMV PCR study results. Conclusion: The seroprevalence of CMV infection was demonstrated to be high in renal transplant recipients of Urmia-Iran. The rate was higher compared to several previous reports in the literature. ELISA method has an appropriate sensitivity to screen the recipients for CMV infection but considering its relatively low specificity, the seropositive cases are better to be confirmed by further PCR study.Keywords: cytomegalovirus, renal transplantation, ELISA, IgM, PCR
Procedia PDF Downloads 3023331 Resilient Machine Learning in the Nuclear Industry: Crack Detection as a Case Study
Authors: Anita Khadka, Gregory Epiphaniou, Carsten Maple
Abstract:
There is a dramatic surge in the adoption of machine learning (ML) techniques in many areas, including the nuclear industry (such as fault diagnosis and fuel management in nuclear power plants), autonomous systems (including self-driving vehicles), space systems (space debris recovery, for example), medical surgery, network intrusion detection, malware detection, to name a few. With the application of learning methods in such diverse domains, artificial intelligence (AI) has become a part of everyday modern human life. To date, the predominant focus has been on developing underpinning ML algorithms that can improve accuracy, while factors such as resiliency and robustness of algorithms have been largely overlooked. If an adversarial attack is able to compromise the learning method or data, the consequences can be fatal, especially but not exclusively in safety-critical applications. In this paper, we present an in-depth analysis of five adversarial attacks and three defence methods on a crack detection ML model. Our analysis shows that it can be dangerous to adopt machine learning techniques in security-critical areas such as the nuclear industry without rigorous testing since they may be vulnerable to adversarial attacks. While common defence methods can effectively defend against different attacks, none of the three considered can provide protection against all five adversarial attacks analysed.Keywords: adversarial machine learning, attacks, defences, nuclear industry, crack detection
Procedia PDF Downloads 1573330 Descriptive Study of Adverse Drug Reactions in a Paediatric Hospital in Mongolia from 2015 to 2019
Authors: Khaliun Nyambayar, Nomindari Azzaya, Batkhuyag Purevjav
Abstract:
Pharmacovigilance was officially introduced in Mongolia in 2003, in accordance with the Health Minister Order 183 for the registry of adverse drug reactions (ADR), approved in 2006 and was reviewed in 2010. This study was designed to evaluate the incidence and common types of adverse drug reactions among hospitalized children, the frequency of adverse drug reaction reported by health care providers, and the follow-up processes resulting from adverse drug reactions. A retrospective study of paediatric patients who experienced an adverse drug reaction from 2015 to 2019, extracted from the “yellow” card at the State Research Center for Maternal and Child Health, (city). A total of 417 adverse drug reactions were reported with an overall incidence was 80 (21.5%). Adverse reactions resulting from the use of antibiotics (particularly gentamycin, cephalosporins, and vancomycin) were usually mild. ADR’s were reported by physicians and nurses (93.8%), pharmacists (6.25%). Although documentation of physician notification occurred for 93% of adverse drug reactions, only 29% of cases were documented in the patient's medical chart, 13% included follow-up education for individuals involved, and 10% were updated in the allergy profile of the hospital computer system. Measures to improve the detection and reporting of adverse drug reactions by all health care professionals should be improved, to enhance our understanding of the nature and impact of these reactions in children.Keywords: adverse drug reaction, pediatric, yellow card, Mongolia
Procedia PDF Downloads 1113329 Wet Flue Gas Desulfurization Using a New O-Element Design Which Replaces the Venturi Scrubber
Authors: P. Lestinsky, D. Jecha, V. Brummer, P. Stehlik
Abstract:
Scrubbing by a liquid spraying is one of the most effective processes used for removal of fine particles and soluble gas pollutants (such as SO2, HCl, HF) from the flue gas. There are many configurations of scrubbers designed to provide contact between the liquid and gas stream for effectively capturing particles or soluble gas pollutants, such as spray plates, packed bed towers, jet scrubbers, cyclones, vortex and venturi scrubbers. The primary function of venturi scrubber is the capture of fine particles as well as HCl, HF or SO2 removal with effect of the flue gas temperature decrease before input to the absorption column. In this paper, sulfur dioxide (SO2) from flue gas was captured using new design replacing venturi scrubber (1st degree of wet scrubbing). The flue gas was prepared by the combustion of the carbon disulfide solution in toluene (1:1 vol.) in the flame in the reactor. Such prepared flue gas with temperature around 150 °C was processed in designed laboratory O-element scrubber. Water was used as absorbent liquid. The efficiency of SO2 removal, pressure drop and temperature drop were measured on our experimental device. The dependence of these variables on liquid-gas ratio was observed. The average temperature drop was in the range from 150 °C to 40 °C. The pressure drop was increased with increasing of a liquid-gas ratio, but not as much as for the common venturi scrubber designs. The efficiency of SO2 removal was up to 70 %. The pressure drop of our new designed wet scrubber is similar to commonly used venturi scrubbers; nevertheless the influence of amount of the liquid on pressure drop is not so significant.Keywords: desulphurization, absorption, flue gas, modeling
Procedia PDF Downloads 3973328 Effectiveness of ISSR Technique in Revealing Genetic Diversity of Phaseolus vulgaris L. Representing Various Parts of the World
Authors: Mohamed El-Shikh
Abstract:
Phaseolus vulgaris L. is the world’s second most important bean after soybeans; used for human food and animal feed. It has generally been linked to reduced risk of cardiovascular disease, diabetes mellitus, obesity, cancer and diseases of digestive tract. The effectiveness of ISSR in achievement of the genetic diversity among 60 common bean accessions; represent various germplasms around the world was investigated. In general, the studied Phaseolus vulgaris accessions were divided into 2 major groups. All of the South-American accessions were separated into the second major group. These accessions may have different genetic features that are distinct from the rest of the accessions clustered in the major group. Asia and Europe accessions (1-20) seem to be more genetically similar (99%) to each other as they clustered in the same sub-group. The American and African varieties showed similarities as well and clustered in the same sub-tree group. In contrast, Asian and American accessions No. 22 and 23 showed a high level of genetic similarities, although these were isolated from different regions. The phylogenetic tree showed that all the Asian accessions (along with Australian No. 59 and 60) were similar except Indian and Yemen accessions No. 9 and 20. Only Netherlands accession No. 3 was different from the rest of European accessions. Morocco accession No. 52 was genetically different from the rest of the African accessions. Canadian accession No. 44 seems to be different from the other North American accessions including Guatemala, Mexico and USA.Keywords: phylogenetic tree, Phaseolus vulgaris, ISSR technique, genetics
Procedia PDF Downloads 4073327 Ecosystems: An Analysis of Generation Z News Consumption, Its Impact on Evolving Concepts and Applications in Journalism
Authors: Bethany Wood
Abstract:
The world pandemic led to a change in the way social media was used by audiences, with young people spending more hours on the platform due to lockdown. Reports by Ofcom have demonstrated that the internet is the second most popular platform for accessing news after television in the UK with social media and the internet ranked as the most popular platform to access news for those aged between 16-24. These statistics are unsurprising considering that at the time of writing, 98 percent of Generation Z (Gen Z) owned a smartphone and the subsequent ease and accessibility of social media. Technology is constantly developing and with this, its importance is becoming more prevalent with each generation: the Baby Boomers (1946-1964) consider it something useful whereas millennials (1981-1997) believe it a necessity for day to day living. Gen Z, otherwise known as the digital native, have grown up with this technology at their fingertips and social media is a norm. It helps form their identity, their affiliations and opens gateways for them to engage with news in a new way. It is a common misconception that Gen Z do not consume news, they are simply doing so in a different way to their predecessors. Using a sample of 800 18-20 year olds whilst utilising Generational theory, Actor Network Theory and the Social Shaping of Technology, this research provides a critical analyse regarding how Gen Z’s news consumption and engagement habits are developing along with technology to sculpture the future format of news and its distribution. From that perspective, allied with the empirical approach, it is possible to provide research orientated advice for the industry and even help to redefine traditional concepts of journalism.Keywords: journalism, generation z, digital, social media
Procedia PDF Downloads 813326 Exploring Cultural Safety for Individuals from Culturally and Linguistically Diverse Backgrounds Participating in Breast Screening
Authors: Philippa Sambevski
Abstract:
Breast cancer is the most common cancer diagnosed in Australian women. The incidence of breast cancer for Aboriginal and Torres Strait Islander (ATSI) women is lower than for non-indigenous women. However, the mortality rate for ATSI women is higher. The participation rate of ATSI women in BreastScreen Australia is below the general population. In this thematic literature review, the author collates viable strategies to increase breast screening rates among culturally and linguistically diverse individuals and provide culturally competent care. Barriers to accessing BreastScreen for ATSI women include language or communication limits, isolation, and a lack of culturally sensitive information. Culturally competent strategies require healthcare workers with an appropriate cultural and social background, clear messages, and the embedding of cultural respect within healthcare organisations. Cultural safety is determined by partnering with local indigenous groups, recognising the consumer experience, and allowing people to raise their concerns. The corresponding academic poster identifies strategies for healthcare workers to provide culturally competent care in a BreastScreen setting.Keywords: breast screen, closing the gap, Australia, cultural safety, Aboriginal and Torres Strait Islander
Procedia PDF Downloads 1113325 A Fuzzy Inference Tool for Assessing Cancer Risk from Radiation Exposure
Authors: Bouharati Lokman, Bouharati Imen, Bouharati Khaoula, Bouharati Oussama, Bouharati Saddek
Abstract:
Ionizing radiation exposure is an established cancer risk factor. Compared to other common environmental carcinogens, it is relatively easy to determine organ-specific radiation dose and, as a result, radiation dose-response relationships tend to be highly quantified. Nevertheless, there can be considerable uncertainty about questions of radiation-related cancer risk as they apply to risk protection and public policy, and the interpretations of interested parties can differ from one person to another. Examples of tools used in the analysis of the risk of developing cancer due to radiation are characterized by uncertainty. These uncertainties are related to the history of exposure and different assumptions involved in the calculation. We believe that the results of statistical calculations are characterized by uncertainty and imprecision. Having regard to the physiological variation from one person to another. In this study, we develop a tool based on fuzzy logic inference. As fuzzy logic deals with imprecise and uncertain, its application in this area is adequate. We propose a fuzzy system with three input variables (age, sex and body attainable cancer). The output variable expresses the risk of infringement rate of each organ. A base rule is established from recorded actual data. After successful simulation, this will instantly predict the risk of infringement rate of each body following chronic exposure to 0.1 Gy.Keywords: radiation exposure, cancer, modeling, fuzzy logic
Procedia PDF Downloads 3113324 Synthesis and Characterization of Hydroxyapatite from Biowaste for Potential Medical Application
Authors: M. D. H. Beg, John O. Akindoyo, Suriati Ghazali, Nitthiyah Jeyaratnam
Abstract:
Over the period of time, several approaches have been undertaken to mitigate the challenges associated with bone regeneration. This includes but not limited to xenografts, allografts, autografts as well as artificial substitutions like bioceramics, synthetic cements and metals. The former three techniques often come along with peculiar limitation and problems such as morbidity, availability, disease transmission, collateral site damage or absolute rejection by the body as the case may be. Synthetic routes remain the only feasible alternative option for treatment of bone defects. Hydroxyapatite (HA) is very compatible and suitable for this application. However, most of the common methods for HA synthesis are either expensive, complicated or environmentally unfriendly. Interestingly, extraction of HA from bio-wastes have been perceived not only to be cost effective, but also environment friendly. In this research, HA was synthesized from bio-waste: namely bovine bones through three different methods which are hydrothermal chemical processes, ultrasound assisted synthesis and ordinary calcination techniques. Structure and property analysis of the HA was carried out through different characterization techniques such as TGA, FTIR, and XRD. All the methods applied were able to produce HA with similar compositional properties to biomaterials found in human calcified tissues. Calcination process was however observed to be more efficient as it eliminated all the organic components from the produced HA. The HA synthesized is unique for its minimal cost and environmental friendliness. It is also perceived to be suitable for tissue and bone engineering applications.Keywords: hydroxyapatite, bone, calcination, biowaste
Procedia PDF Downloads 2473323 A Framework for Security Risk Level Measures Using CVSS for Vulnerability Categories
Authors: Umesh Kumar Singh, Chanchala Joshi
Abstract:
With increasing dependency on IT infrastructure, the main objective of a system administrator is to maintain a stable and secure network, with ensuring that the network is robust enough against malicious network users like attackers and intruders. Security risk management provides a way to manage the growing threats to infrastructures or system. This paper proposes a framework for risk level estimation which uses vulnerability database National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) and the Common Vulnerability Scoring System (CVSS). The proposed framework measures the frequency of vulnerability exploitation; converges this measured frequency with standard CVSS score and estimates the security risk level which helps in automated and reasonable security management. In this paper equation for the Temporal score calculation with respect to availability of remediation plan is derived and further, frequency of exploitation is calculated with determined temporal score. The frequency of exploitation along with CVSS score is used to calculate the security risk level of the system. The proposed framework uses the CVSS vectors for risk level estimation and measures the security level of specific network environment, which assists system administrator for assessment of security risks and making decision related to mitigation of security risks.Keywords: CVSS score, risk level, security measurement, vulnerability category
Procedia PDF Downloads 3193322 Low Back Pain-Related Absenteeism among Healthcare Workers in Kibuli Muslim Hospital, Kampala Uganda
Authors: Aremu Abdulmujeeb Babatunde
Abstract:
Background: Low back pain was not only considered to be the most common reason for functional disability worldwide, but also estimated to have affected 90% of the universal population. This study aimed at determining the prevalence, consequences and socio-demographic factors associated with low back pain. Methods; A cross-sectional survey was employed and a total number of 150 self-structured questionnaire was distributed among healthcare workers and this was used to determine the prevalence of low back pain and work related absenteeism. Data was entered using Epi info soft-ware and analyzed using SPSS. Results; An overall response rate of 84% (n = 140) was achieved. The study established that majority (37%) of the respondents were in the age bracket of 20-39 years, 57% female (n=59) and 64% of them were married. the pint prevalence was 84%, 31% of the respondents took leave from work as a result of low back pain. There was high prevalence of sick leave among nursing staff 45.2%, Chi-square test shows that there was a statistically significant association between the respondents occupations and daily time spent during their work (P value 0.011 and 0.042) respectively. Socio-demographic factors like age, marital status and gender were not statistically significant at P<0.05. Conclusions; The medical and socio-professional consequences of low back pain among healthcare workers was as a result of their occupation designations and the daily time spent in carry out this occupations.Keywords: low back pain, healthcare workers, prevalence, sick leave
Procedia PDF Downloads 3063321 Intelligent Transport System: Classification of Traffic Signs Using Deep Neural Networks in Real Time
Authors: Anukriti Kumar, Tanmay Singh, Dinesh Kumar Vishwakarma
Abstract:
Traffic control has been one of the most common and irritating problems since the time automobiles have hit the roads. Problems like traffic congestion have led to a significant time burden around the world and one significant solution to these problems can be the proper implementation of the Intelligent Transport System (ITS). It involves the integration of various tools like smart sensors, artificial intelligence, position technologies and mobile data services to manage traffic flow, reduce congestion and enhance driver's ability to avoid accidents during adverse weather. Road and traffic signs’ recognition is an emerging field of research in ITS. Classification problem of traffic signs needs to be solved as it is a major step in our journey towards building semi-autonomous/autonomous driving systems. The purpose of this work focuses on implementing an approach to solve the problem of traffic sign classification by developing a Convolutional Neural Network (CNN) classifier using the GTSRB (German Traffic Sign Recognition Benchmark) dataset. Rather than using hand-crafted features, our model addresses the concern of exploding huge parameters and data method augmentations. Our model achieved an accuracy of around 97.6% which is comparable to various state-of-the-art architectures.Keywords: multiclass classification, convolution neural network, OpenCV
Procedia PDF Downloads 1743320 A Systematic Literature Review on Security and Privacy Design Patterns
Authors: Ebtehal Aljedaani, Maha Aljohani
Abstract:
Privacy and security patterns are both important for developing software that protects users' data and privacy. Privacy patterns are designed to address common privacy problems, such as unauthorized data collection and disclosure. Security patterns are designed to protect software from attack and ensure reliability and trustworthiness. Using privacy and security patterns, software engineers can implement security and privacy by design principles, which means that security and privacy are considered throughout the software development process. These patterns are available to translate "security & privacy-by-design" into practical advice for software engineering. Previous research on privacy and security patterns has typically focused on one category of patterns at a time. This paper aims to bridge this gap by merging the two categories and identifying their similarities and differences. To do this, the authors conducted a systematic literature review of 25 research papers on privacy and security patterns. The papers were analysed based on the category of the pattern, the classification of the pattern, and the security requirements that the pattern addresses. This paper presents the results of a comprehensive review of privacy and security design patterns. The review is intended to help future IT designers understand the relationship between the two types of patterns and how to use them to design secure and privacy-preserving software. The paper provides a clear classification of privacy and security design patterns, along with examples of each type. The authors found that there is only one widely accepted classification of privacy design patterns, while there are several competing classifications of security design patterns. Three types of security design patterns were found to be the most commonly used.Keywords: design patterns, security, privacy, classification of patterns, security patterns, privacy patterns
Procedia PDF Downloads 1293319 Modeling and Analysis of Solar Assisted Adsorption Cooling System Using TRNSYS
Authors: M. Wajahat, M. Shoaib, A. Waheed
Abstract:
As a result of increase in world energy demand as well as the demand for heating, refrigeration and air conditioning, energy engineers are now more inclined towards the renewable energy especially solar based thermal driven refrigeration and air conditioning systems. This research is emphasized on solar assisted adsorption refrigeration system to provide comfort conditions for a building in Islamabad. The adsorption chiller can be driven by low grade heat at low temperature range (50 -80 °C) which is lower than that required for generator in absorption refrigeration system which may be furnished with the help of common flat plate solar collectors (FPC). The aim is to offset the total energy required for building’s heating and cooling demand by using FPC’s thus reducing dependency on primary energy source hence saving energy. TRNSYS is a dynamic modeling and simulation tool which can be utilized to simulate the working of a complete solar based adsorption chiller to meet the desired cooling and heating demand during summer and winter seasons, respectively. Modeling and detailed parametric analysis of the whole system is to be carried out to determine the optimal system configuration keeping in view various design constraints. Main focus of the study is on solar thermal loop of the adsorption chiller to reduce the contribution from the auxiliary devices.Keywords: flat plate collector, energy saving, solar assisted adsorption chiller, TRNSYS
Procedia PDF Downloads 6513318 Failure Probability Assessment of Concrete Spherical Domes Subjected to Ventilation Controlled Fires Using BIM Tools
Authors: A. T. Kassem
Abstract:
Fires areconsidered a common hazardous action that any building may face. Most buildings’ structural elements are designed, taking into consideration precautions for fire safety, using deterministic design approaches. Public and highly important buildings are commonly designed considering standard fire rating and, in many cases, contain large compartments with central domes. Real fire scenarios are not commonly brought into action in structural design of buildings because of complexities in both scenarios and analysis tools. This paper presents a modern approach towards analysis of spherical domes in real fire condition via implementation of building information modelling, and adopting a probabilistic approach. BIMhas been implemented to bridge the gap between various software packages enabling them to function interactively to model both real fire and corresponding structural response. Ventilation controlled fires scenarios have been modeled using both “Revit” and “Pyrosim”. Monte Carlo simulation has been adopted to engage the probabilistic analysis approach in dealing with various parameters. Conclusions regarding failure probability and fire endurance, in addition to the effects of various parameters, have been extracted.Keywords: concrete, spherical domes, ventilation controlled fires, BIM, monte carlo simulation, pyrosim, revit
Procedia PDF Downloads 933317 Effects of Local Decongestive Agents at Trachea and Lungs
Authors: Sertac Arslan, Guven Guney, Ayse Ipek Akyuz Unsal, Emre Demir, Buket Demirci
Abstract:
Purpose: There is little histologic data concerning effects of nasal decongestants on the respiratory tract. We aimed to put forth the effects of nasal decongestants on the trachea and lower airways of rats. Materials and Methods: Four to six months old 60 male rats were randomly categorized into 6 groups. Experimental drugs were applied to the same nostril of rats twice daily for 8 weeks (Xylometazolin, Benzalkolyum, EDTA, Sorbitol and combined drug solutions). We applied normal saline solution (NaCl %0.9) for the control group. In the end, trachea and both lungs were dissected and kept in formaldehyde for histopathologic evaluation. Results: Inflammation and bronchial edema were most common findings. While all rats in sorbitol group had increased numbers of type 2 pneumocytes; 80% of BAC group had increased numbers of type 2 pneumocytes. Spillover of tracheal epithelium was seen mostly in sorbitol, EDTA and combined drug groups (60%, 87.5%, 50% respectively). Bronchial smooth muscle hypertrophy was seen mostly in BAC and EDTA group (70%, 62.5% respectively). The number of goblet cells showed the significant difference between control-combined drug (p=0.025) and control-BAC (p=0.001) groups. Conclusions: Nasal decongestants can cause permanent changes at lower respiratory tract in addition to changes in upper respiratory tract.Keywords: decongestive agents, xylometazoline, lung, trachea
Procedia PDF Downloads 1733316 Studying Educational Processes through a Multifocal Viewpoint: Educational and Social Studies
Authors: Noa Shriki, Atara Shriki
Abstract:
Lifelong learning is considered as essential for teacher's professional development, which in turn has implications for the improvement of the entire education system. In recent years, many programs designed to support teachers' professional development are criticized for not achieving their goal. A variety of reasons have been proposed for the purpose of explaining the causes of the ineffectiveness of such programs. In this study, we put to test the possibility that teachers do not change as a result of their participation in professional programs due to a gap between the contents and approaches included in them and teacher's beliefs about teaching and learning. Eighteen elementary school mathematics teachers participated in the study. These teachers were involved in collaborating with their students in inquiring mathematical ideas, while implementing action research. Employing educational theories, the results indicated that this experience had a positive effect on teacher's professional development. In particular, there was an evident change in their beliefs regarding their role as mathematics teachers. However, while employing a different perspective for analyzing the data, the lens of Kurt Lewin's theory of re-education, we realized that this change of beliefs must be questioned. Therefore, it is suggested that analysis of educational processes should be carried out not only through common educational theories, but also on the basis of social and organizational theories. It is assumed that both the field of education and the fields of social studies and organizational consulting will benefit from the multifocal viewpointKeywords: educational theories, professional development, re-education, teachers' beliefs
Procedia PDF Downloads 1403315 Effect of Surfactant on Thermal Conductivity of Ethylene Glycol/Silver Nanofluid
Authors: E. C. Muhammed Irshad
Abstract:
Nanofluids are a new class of solid-liquid colloidal mixture consisting of nanometer sized (< 100nm) solid particles suspended in heat transfer fluids such as water, ethylene/propylene glycol etc. Nanofluids offer excellent scope of enhancing thermal conductivity of common heat transfer fluids and it leads to enhancement of the heat transfer coefficient. In the present study, silver nanoparticles are dispersed in ethylene glycol water mixture. Low volume concentrations (0.05%, 0.1% and 0.15%) of silver nanofluids were synthesized. The thermal conductivity of these nanofluids was determined with thermal property analyzer (KD2 pro apparatus) and heat transfer coefficient was found experimentally. Initially, the thermal conductivity and viscosity of nanofluids were calculated with various correlations at different concentrations and were compared. Thermal conductivity of silver nanofluid at 0.02% and 0.1% concentration of silver nanoparticle increased to 23.3% and 27.7% for Sodium Dodecyl Sulfate (SDS) and to 33.6% and 36.7% for Poly Vinyl Pyrrolidone (PVP), respectively. The nanofluid maintains the stability for two days and it starts to settle down due to high density of silver. But it shows good improvement in the thermal conductivity for low volume concentration and it also shows better improvement with Poly Vinyl Pyrrolidone (PVP) surfactant than Sodium Dodecyl Sulfate (SDS).Keywords: k-thermal conductivity, sodium dodecyl sulfate, vinyl pyrrolidone, mechatronics engineering
Procedia PDF Downloads 3113314 Relationship of Silent Myocardial Ischemia to Erectile Dysfunction in Patients with Diabetes Mellitus
Authors: Ali Kassem, Esam Nada, Amro Abdelhamed, Shigeo Horie
Abstract:
Objective: Diabetes mellitus (DM) is associated with macrovascular complications, including coronary artery disease (CAD), and microvascular complications that contribute to the pathogenesis of erectile dysfunction (ED). On the other hand, silent myocardial ischemia (SMI) is more common in diabetic patients and is a strong predictor of cardiac events and mortality in diabetic and non-diabetic patients. Recently, Multidetector computed tomographic coronary angiography (MDCT-CA) has become a reliable non-invasive imaging modality for screening diabetic patients for SMI. We aim to evaluate the presence of SMI using (MDCT-CA) in patients with type 2DM having ED. Methods: This study evaluated 20 patients (mean age 61.45 ± 10.7 years), with DM and ED without any history of angina or angina equivalent. ED was tested with the Sexual Health Inventory for Men score, erection hardness score (EHS), and maximal penile circumferential change by an erect meter. Results: Of twenty studied patients, coronary artery stenosis was detected in 13 (65%) patients in the form of one-vessel disease (n = 6, 30%), two-vessel disease (n = 2, 10%), and three-vessel disease (n = 5, 25%). Maximum coronary artery stenosis was positively correlated with age (P < 0.016,) and negatively correlated with EHS (P <04). Multivariate regression analysis using age and EHS showed that age was the only independent predictor of SMI (P <04). Conclusion: MDCT-CA is a useful tool to identify SMI in patients with diabetes mellitus and ED. One should consider the possibility of SMI especially in elderly patients with DM who have ED.Keywords: diabetes mellitus, erectile dysfunction, microvascular, silent ischemia
Procedia PDF Downloads 171