Search results for: information warfare techniques
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 16307

Search results for: information warfare techniques

14027 The Impact of Enhanced Recovery after Surgery (ERAS) Protocols on Anesthesia Management in High-Risk Surgical Patients

Authors: Rebar Mohammed Hussein

Abstract:

Enhanced Recovery After Surgery (ERAS) protocols have transformed perioperative care, aiming to reduce surgical stress, optimize pain management, and accelerate recovery. This study evaluates the impact of ERAS on anesthesia management in high-risk surgical patients, focusing on opioid-sparing techniques and multimodal analgesia. A retrospective analysis was conducted on patients undergoing major surgeries within an ERAS program, comparing outcomes with a historical cohort receiving standard care. Key metrics included postoperative pain scores, opioid consumption, length of hospital stay, and complication rates. Results indicated that the implementation of ERAS protocols significantly reduced postoperative opioid use by 40% and improved pain management outcomes, with 70% of patients reporting satisfactory pain control on postoperative day one. Additionally, patients in the ERAS group experienced a 30% reduction in length of stay and a 20% decrease in complication rates. These findings underscore the importance of integrating ERAS principles into anesthesia practice, particularly for high-risk patients, to enhance recovery, improve patient satisfaction, and reduce healthcare costs. Future directions include prospective studies to further refine anesthesia techniques within ERAS frameworks and explore their applicability across various surgical specialties.

Keywords: ERAS protocols, high-risk surgical patients, anesthesia management, recovery

Procedia PDF Downloads 12
14026 Web Map Service for Fragmentary Rockfall Inventory

Authors: M. Amparo Nunez-Andres, Nieves Lantada

Abstract:

One of the most harmful geological risks is rockfalls. They cause both economic lost, damaged in buildings and infrastructures, and personal ones. Therefore, in order to estimate the risk of the exposed elements, it is necessary to know the mechanism of this kind of events, since the characteristics of the rock walls, to the propagation of fragments generated by the initial detached rock mass. In the framework of the research RockModels project, several inventories of rockfalls were carried out along the northeast of the Spanish peninsula and the Mallorca island. These inventories have general information about the events, although the important fact is that they contained detailed information about fragmentation. Specifically, the IBSD (Insitu Block Size Distribution) is obtained by photogrammetry from drone or TLS (Terrestrial Laser Scanner) and the RBSD (Rock Block Size Distribution) from the volume of the fragment in the deposit measured by hand. In order to share all this information with other scientists, engineers, members of civil protection, and stakeholders, it is necessary a platform accessible from the internet and following interoperable standards. In all the process, open-software have been used: PostGIS 2.1., Geoserver, and OpenLayers library. In the first step, a spatial database was implemented to manage all the information. We have used the data specifications of INSPIRE for natural risks adding specific and detailed data about fragmentation distribution. The next step was to develop a WMS with Geoserver. A previous phase was the creation of several views in PostGIS to show the information at different scales of visualization and with different degrees of detail. In the first view, the sites are identified with a point, and basic information about the rockfall event is facilitated. In the next level of zoom, at medium scale, the convex hull of the rockfall appears with its real shape and the source of the event and fragments are represented by symbols. The queries at this level offer a major detail about the movement. Eventually, the third level shows all elements: deposit, source, and blocks, in their real size, if it is possible, and in their real localization. The last task was the publication of all information in a web mapping site (www.rockdb.upc.edu) with data classified by levels using libraries in JavaScript as OpenLayers.

Keywords: geological risk, web mapping, WMS, rockfalls

Procedia PDF Downloads 157
14025 Health Portals for Specific Populations: A Design for Pregnant Women

Authors: Janine Sommer, Mariana Daus, Mariana Simon, Maria Smith, Daniel Luna

Abstract:

The technologies and communication advances contributed to new tools development which allows patients to have an active role in their own health. In the light of information needs and paradigms changes about health, the patient self-manages their care. This line of care focuses on patients; specific portals come up to people with particular requirements like pregnant women. Thinking of a portal design to this sector of the population, in September 2016 a survey was made to users with the objective to knowing and understanding information’s needs at the moment to use an application for pregnant. Also, prototypes of the portal´s features were designed to try and validate with users, using the methodology of human-centered design. Investigations have made possible the identification of needs of this population and develop a tool who try to satisfy, providing timely information for each part of pregnancy and allowing the patients to make a physical check and the follow up of pregnancy seeking advice from our obstetricians.

Keywords: electronic health record, health personal record, mobile applications, pregnant women

Procedia PDF Downloads 346
14024 Mining User-Generated Contents to Detect Service Failures with Topic Model

Authors: Kyung Bae Park, Sung Ho Ha

Abstract:

Online user-generated contents (UGC) significantly change the way customers behave (e.g., shop, travel), and a pressing need to handle the overwhelmingly plethora amount of various UGC is one of the paramount issues for management. However, a current approach (e.g., sentiment analysis) is often ineffective for leveraging textual information to detect the problems or issues that a certain management suffers from. In this paper, we employ text mining of Latent Dirichlet Allocation (LDA) on a popular online review site dedicated to complaint from users. We find that the employed LDA efficiently detects customer complaints, and a further inspection with the visualization technique is effective to categorize the problems or issues. As such, management can identify the issues at stake and prioritize them accordingly in a timely manner given the limited amount of resources. The findings provide managerial insights into how analytics on social media can help maintain and improve their reputation management. Our interdisciplinary approach also highlights several insights by applying machine learning techniques in marketing research domain. On a broader technical note, this paper illustrates the details of how to implement LDA in R program from a beginning (data collection in R) to an end (LDA analysis in R) since the instruction is still largely undocumented. In this regard, it will help lower the boundary for interdisciplinary researcher to conduct related research.

Keywords: latent dirichlet allocation, R program, text mining, topic model, user generated contents, visualization

Procedia PDF Downloads 185
14023 Investigation of the EEG Signal Parameters during Epileptic Seizure Phases in Consequence to the Application of External Healing Therapy on Subjects

Authors: Karan Sharma, Ajay Kumar

Abstract:

Epileptic seizure is a type of disease due to which electrical charge in the brain flows abruptly resulting in abnormal activity by the subject. One percent of total world population gets epileptic seizure attacks.Due to abrupt flow of charge, EEG (Electroencephalogram) waveforms change. On the display appear a lot of spikes and sharp waves in the EEG signals. Detection of epileptic seizure by using conventional methods is time-consuming. Many methods have been evolved that detect it automatically. The initial part of this paper provides the review of techniques used to detect epileptic seizure automatically. The automatic detection is based on the feature extraction and classification patterns. For better accuracy decomposition of the signal is required before feature extraction. A number of parameters are calculated by the researchers using different techniques e.g. approximate entropy, sample entropy, Fuzzy approximate entropy, intrinsic mode function, cross-correlation etc. to discriminate between a normal signal & an epileptic seizure signal.The main objective of this review paper is to present the variations in the EEG signals at both stages (i) Interictal (recording between the epileptic seizure attacks). (ii) Ictal (recording during the epileptic seizure), using most appropriate methods of analysis to provide better healthcare diagnosis. This research paper then investigates the effects of a noninvasive healing therapy on the subjects by studying the EEG signals using latest signal processing techniques. The study has been conducted with Reiki as a healing technique, beneficial for restoring balance in cases of body mind alterations associated with an epileptic seizure. Reiki is practiced around the world and is recommended for different health services as a treatment approach. Reiki is an energy medicine, specifically a biofield therapy developed in Japan in the early 20th century. It is a system involving the laying on of hands, to stimulate the body’s natural energetic system. Earlier studies have shown an apparent connection between Reiki and the autonomous nervous system. The Reiki sessions are applied by an experienced therapist. EEG signals are measured at baseline, during session and post intervention to bring about effective epileptic seizure control or its elimination altogether.

Keywords: EEG signal, Reiki, time consuming, epileptic seizure

Procedia PDF Downloads 401
14022 Kannada HandWritten Character Recognition by Edge Hinge and Edge Distribution Techniques Using Manhatan and Minimum Distance Classifiers

Authors: C. V. Aravinda, H. N. Prakash

Abstract:

In this paper, we tried to convey fusion and state of art pertaining to SIL character recognition systems. In the first step, the text is preprocessed and normalized to perform the text identification correctly. The second step involves extracting relevant and informative features. The third step implements the classification decision. The three stages which involved are Data acquisition and preprocessing, Feature extraction, and Classification. Here we concentrated on two techniques to obtain features, Feature Extraction & Feature Selection. Edge-hinge distribution is a feature that characterizes the changes in direction of a script stroke in handwritten text. The edge-hinge distribution is extracted by means of a windowpane that is slid over an edge-detected binary handwriting image. Whenever the mid pixel of the window is on, the two edge fragments (i.e. connected sequences of pixels) emerging from this mid pixel are measured. Their directions are measured and stored as pairs. A joint probability distribution is obtained from a large sample of such pairs. Despite continuous effort, handwriting identification remains a challenging issue, due to different approaches use different varieties of features, having different. Therefore, our study will focus on handwriting recognition based on feature selection to simplify features extracting task, optimize classification system complexity, reduce running time and improve the classification accuracy.

Keywords: word segmentation and recognition, character recognition, optical character recognition, hand written character recognition, South Indian languages

Procedia PDF Downloads 489
14021 Quantification of the Variables of the Information Model for the Use of School Terminology from 1884 to 2014 in Dalmatia

Authors: Vinko Vidučić, Tanja Brešan Ančić, Marijana Tomelić Ćurlin

Abstract:

Prior to quantifying the variables of the information model for using school terminology in Croatia's region of Dalmatia from 1884 to 2014, the most relevant model variables had to be determined: historical circumstances, standard of living, education system, linguistic situation, and media. The research findings show that there was no significant transfer of the 1884 school terms into 1949 usage; likewise, the 1949 school terms were not widely used in 2014. On the other hand, the research revealed that the meaning of school terms changed over the decades. The quantification of the variables will serve as the groundwork for creating an information model for using school terminology in Dalmatia from 1884 to 2014 and for defining direct growth rates in further research.

Keywords: education system, historical circumstances, linguistic situation, media, school terminology, standard of living

Procedia PDF Downloads 213
14020 Automatic API Regression Analyzer and Executor

Authors: Praveena Sridhar, Nihar Devathi, Parikshit Chakraborty

Abstract:

As the software product changes versions across releases, there are changes to the API’s and features and the upgrades become necessary. Hence, it becomes imperative to get the impact of upgrading the dependent components. This tool finds out API changes across two versions and their impact on other API’s followed by execution of the automated regression suites relevant to updates and their impacted areas. This tool has 4 layer architecture, each layer with its own unique pre-assigned capability which it does and sends the required information to next layer. This are the 4 layers. 1) Comparator: Compares the two versions of API. 2) Analyzer: Analyses the API doc and gives the modified class and its dependencies along with implemented interface details. 3) Impact Filter: Find the impact of the modified class on the other API methods. 4) Auto Executer: Based on the output given by Impact Filter, Executor will run the API regression Suite. Tool reads the java doc and extracts the required information of classes, interfaces and enumerations. The extracted information is saved into a data structure which shows the class details and its dependencies along with interfaces and enumerations that are listed in the java doc.

Keywords: automation impact regression, java doc, executor, analyzer, layers

Procedia PDF Downloads 481
14019 Effects of Fermentation Techniques on the Quality of Cocoa Beans

Authors: Monday O. Ale, Adebukola A. Akintade, Olasunbo O. Orungbemi

Abstract:

Fermentation as an important operation in the processing of cocoa beans is now affected by the recent climate change across the globe. The major requirement for effective fermentation is the ability of the material used to retain sufficient heat for the required microbial activities. Apart from the effects of climate on the rate of heat retention, the materials used for fermentation plays an important role. Most Farmers still restrict fermentation activities to the use of traditional methods. Improving on cocoa fermentation in this era of climate change makes it necessary to work on other materials that can be suitable for cocoa fermentation. Therefore, the objective of this study was to determine the effects of fermentation techniques on the quality of cocoa beans. The materials used in this fermentation research were heap-leaves (traditional), stainless steel, plastic tin, plastic basket and wooden box. The period of fermentation varies from zero days to 10 days. Physical and chemical tests were carried out for variables in quality determination in the samples. The weight per bean varied from 1.0-1.2 g after drying across the samples and the major color of the dry beans observed was brown except with the samples from stainless steel. The moisture content varied from 5.5-7%. The mineral content and the heavy metals decreased with increase in the fermentation period. A wooden box can conclusively be used as an alternative to heap-leaves as there was no significant difference in the physical features of the samples fermented with the two methods. The use of a wooden box as an alternative for cocoa fermentation is therefore recommended for cocoa farmers.

Keywords: fermentation, effects, fermentation materials, period, quality

Procedia PDF Downloads 201
14018 Comparative Evaluation of Accuracy of Selected Machine Learning Classification Techniques for Diagnosis of Cancer: A Data Mining Approach

Authors: Rajvir Kaur, Jeewani Anupama Ginige

Abstract:

With recent trends in Big Data and advancements in Information and Communication Technologies, the healthcare industry is at the stage of its transition from clinician oriented to technology oriented. Many people around the world die of cancer because the diagnosis of disease was not done at an early stage. Nowadays, the computational methods in the form of Machine Learning (ML) are used to develop automated decision support systems that can diagnose cancer with high confidence in a timely manner. This paper aims to carry out the comparative evaluation of a selected set of ML classifiers on two existing datasets: breast cancer and cervical cancer. The ML classifiers compared in this study are Decision Tree (DT), Support Vector Machine (SVM), k-Nearest Neighbor (k-NN), Logistic Regression, Ensemble (Bagged Tree) and Artificial Neural Networks (ANN). The evaluation is carried out based on standard evaluation metrics Precision (P), Recall (R), F1-score and Accuracy. The experimental results based on the evaluation metrics show that ANN showed the highest-level accuracy (99.4%) when tested with breast cancer dataset. On the other hand, when these ML classifiers are tested with the cervical cancer dataset, Ensemble (Bagged Tree) technique gave better accuracy (93.1%) in comparison to other classifiers.

Keywords: artificial neural networks, breast cancer, classifiers, cervical cancer, f-score, machine learning, precision, recall

Procedia PDF Downloads 272
14017 Preventive Effect of Locoregional Analgesia Techniques on Chronic Post-Surgical Neuropathic Pain: A Prospective Randomized Study

Authors: Beloulou Mohamed Lamine, Bouhouf Attef, Meliani Walid, Sellami Dalila, Lamara Abdelhak

Abstract:

Introduction: Post-surgical chronic pain (PSCP) is a pathological condition with a rather complex etiopathogenesis that extensively involves sensitization processes and neuronal damage. The neuropathic component of these pains is almost always present, with variable expression depending on the type of surgery. Objective: To assess the presumed beneficial effect of Regional Anesthesia-Analgesia Techniques (RAAT) on the development of post-surgical chronic neuropathic pain (PSCNP) in various surgical procedures. Patients and Methods: A comparative study involving 510 patients distributed across five surgical models (mastectomy, thoracotomy, hernioplasty, cholecystectomy, and major abdominal-pelvic surgery) and randomized into two groups: Group A (240) receiving conventional postoperative analgesia and Group B (270) receiving balanced analgesia, including the implementation of a Regional Anesthesia-Analgesia Technique (RAAT). These patients were longitudinally followed over a 6-month period, with post-surgical chronic neuropathic pain (PSCNP) defined by a Neuropathic Pain Score DN2≥ 3. Comparative measurements through univariate and multivariate analyses were performed to identify associations between the development of PSCNP and certain predictive factors, including the presumed preventive impact (protective effect) of RAAT. Results: At the 6th month post-surgery, 419 patients were analyzed (Group A= 196 and Group B= 223). The incidence of PSCNP was 32.2% (n=135). Among these patients with chronic pain, the prevalence of neuropathic pain was 37.8% (95% CI: [29.6; 46.5]), with n=51/135. It was significantly lower in Group B compared to Group A, with respective percentages of 31.4% vs. 48.8% (p-value = 0.035). The most significant differences were observed in breast and thoracopulmonary surgeries. In a multiple regression analysis, two predictors of PSCNP were identified: the presence of preoperative pain at the surgical site as a risk factor (OR: 3.198; 95% CI [1.326; 7.714]) and RAAT as a protective factor (OR: 0.408; 95% CI [0.173; 0.961]). Conclusion: The neuropathic component of PSCNP can be observed in different types of surgeries. Regional analgesia included in a multimodal approach to postoperative pain management has proven to be effective for acute pain and seems to have a preventive impact on the development of PSCNP and its neuropathic nature or component, particularly in surgeries that are more prone to chronicization.

Keywords: chronic postsurgical pain, postsurgical chronic neuropathic pain, regional anesthesia and analgesia techniques (RAAT), neuropathic pain score dn2, preventive impact

Procedia PDF Downloads 7
14016 “Moves” for Guiding Presentations in French

Authors: Nuchanat Handumrongkul, Suwaree Yordchim, Anantachai Aeka

Abstract:

Despite four years of study in the tourism industry, the Bachelor’s graduates cannot perform their jobs as experienced tour guides. This research aimed to develop French teaching and studying for Tourism with two main purposes: to analyze ‘Moves’ used in oral presentations at tourist attractions; and to study content in guiding presentations or 'Guide Speak'. The study employed audio recording of these presentations as an interview method in authentic situations, having four tour guides as respondents and information providers. The data was analyzed via moves and content analysis. The results found that there were eight moves used; namely: welcoming, introducing oneself, drawing someone’s attention, giving information, explaining, highlighting, persuading, and saying goodbye. In terms of content, the information being presented covered the outstanding characteristics of the places and well-integrated with other related content. The findings were used as guidelines for curriculum development; in particular, the core content and the presentation forming the basis for students to meet the standard requirements of the labor-market and professional schemes.

Keywords: moves, guiding presentation, french, tourism

Procedia PDF Downloads 230
14015 Investigation of Ascochyta Blight Resistance in Registered Turkish Chickpea (Cicer arietinum L.) Varieties by Using Molecular Techniques

Authors: Ibrahim Ilker Ozyigit, Fatih Tabanli, Sezin Adinir

Abstract:

In this study, Ascochyta blight resistance was investigated in 34 registered chickpea varieties, which are widely planting in different regions of Turkey. For this aim, molecular marker techniques, such as STMS, RAPD and ISSR were used. Ta2, Ta146 and Ts54 primers were used for STMS, while UBC733 and UBC681 primers for RAPD, and UBC836 and UBC858 primers for ISSR. Ta2, Ts54 and Ta146 (STMS), and UBC733 (RAPD) primers demonstrated the distinctive feature for Ascochyta blight resistance. Ta2, Ts54 and Ta146 primers yielded the quite effective results in detection of resistant and sensitive varieties. Besides, UBC 733 primer distinguished all kinds of standard did not give any reliable results for other varieties since it demonstrated all as resistant. In addition, monomorphic bands were obtained from UBC681 (RAPD), and UBC836 and UBC858 (ISSR) primers, not demonstrating reliable results in detection of resistance against Ascochyta blight disease. Obtained results informed us about both disease resistance and genetic diversity in registered Turkish chickpea varieties. This project was funded through the Scientific Research Projects of Marmara University under Grant Number FEN-C-YLP-070617-0365 and The Scientific and Technological Research Council of Turkey (TUBITAK) under Grant Number 113O070.

Keywords: plant genetics, ISSR, RAPD, STMS

Procedia PDF Downloads 192
14014 Unveiling the Potential of PANI@MnO2@rGO Ternary Nanocomposite in Energy Storage and Gas Sensing

Authors: Ahmad Umar, Sheikh Akbar, Ahmed A. Ibrahim, Mohsen A. Alhamami

Abstract:

The development of advanced materials for energy storage and gas sensing applications has gained significant attention in recent years. In this study, we synthesized and characterized PANI@MnO2@rGO ternary nanocomposites (NCs) to explore their potential in supercapacitors and gas sensing devices. The ternary NCs were synthesized through a multi-step process involving the hydrothermal synthesis of MnO2 nanoparticles, preparation of PANI@rGO composites and the assembly to the ternary PANI@MnO2@rGO ternary NCs. The structural, morphological, and compositional characteristics of the materials were thoroughly analyzed using techniques such as XRD, FESEM, TEM, FTIR, and Raman spectroscopy. In the realm of gas sensing, the ternary NCs exhibited excellent performance as NH3 gas sensors. The optimized operating temperature of 100 °C yielded a peak response of 15.56 towards 50 ppm NH3. The nanocomposites demonstrated fast response and recovery times of 6 s and 10 s, respectively, and displayed remarkable selectivity for NH3 gas over other tested gases. For supercapacitor applications, the electrochemical performance of the ternary NCs was evaluated using cyclic voltammetry and galvanostatic charge-discharge techniques. The composites exhibited pseudocapacitive behavior, with the capacitance reaching up to 185 F/g at 1 A/g and excellent capacitance retention of approximately 88.54% over 4000 charge-discharge cycles. The unique combination of rGO, PANI, and MnO2 nanoparticles in these ternary NCs offer synergistic advantages, showcasing their potential to address challenges in energy storage and gas sensing technologies.

Keywords: paniI@mnO2@rGO ternary NCs, synergistic effects, supercapacitors, gas sensing, energy storage

Procedia PDF Downloads 68
14013 Improved Safety Science: Utilizing a Design Hierarchy

Authors: Ulrica Pettersson

Abstract:

Collection of information on incidents is regularly done through pre-printed incident report forms. These tend to be incomplete and frequently lack essential information. ne consequence is that reports with inadequate information, that do not fulfil analysts’ requirements, are transferred into the analysis process. To improve an incident reporting form, theory in design science, witness psychology and interview and questionnaire research has been used. Previously three experiments have been conducted to evaluate the form and shown significant improved results. The form has proved to capture knowledge, regardless of the incidents’ character or context. The aim in this paper is to describe how design science, in more detail a design hierarchy can be used to construct a collection form for improvements in safety science.

Keywords: data collection, design science, incident reports, safety science

Procedia PDF Downloads 221
14012 Harmonic Mitigation and Total Harmonic Distortion Reduction in Grid-Connected PV Systems: A Case Study Using Real-Time Data and Filtering Techniques

Authors: Atena Tazikeh Lemeski, Ismail Ozdamar

Abstract:

This study presents a detailed analysis of harmonic distortion in a grid-connected photovoltaic (PV) system using real-time data captured from a solar power plant. Harmonics introduced by inverters in PV systems can degrade power quality and lead to increased total harmonic distortion (THD), which poses challenges such as transformer overheating, increased power losses, and potential grid instability. This research addresses these issues by applying the Fast Fourier Transform (FFT) to identify significant harmonic components and employing notch filters to target specific frequencies, particularly the 3rd harmonic (150 Hz), which was identified as the largest contributor to THD. Initial analysis of the unfiltered voltage signal revealed a THD of 21.15%, with prominent harmonic peaks at 150 Hz, 250 Hz, and 350 Hz, corresponding to the 3rd, 5th, and 7th harmonics, respectively. After implementing the notch filters, the THD was reduced to 5.72%, demonstrating the effectiveness of this approach in mitigating harmonic distortion without affecting the fundamental frequency. This paper provides practical insights into the application of real-time filtering techniques in PV systems and their role in improving overall grid stability and power quality. The results indicate that targeted harmonic mitigation is crucial for the sustainable integration of renewable energy sources into modern electrical grids.

Keywords: grid-connected photovoltaic systems, fast Fourier transform, harmonic filtering, inverter-induced harmonics

Procedia PDF Downloads 2
14011 Development of Self Emulsifying Drug Delivery Systems (SEDDS) of Anticancer Agents Used in AYUSH System of Medicine for Improved Oral Bioavailability Followed by Their Pharmacological Evaluation Using Biotechnological Techniques

Authors: Meenu Mehta, Munish Garg

Abstract:

The use of oral anticancer drugs from AYUSH system of medicine is widely increased among the society due to their low cost, enhanced efficacy, increased patient preference, lack of inconveniences related to infusion and they provide an opportunity to develop chronic treatment regimens. However, oral delivery of these drugs usually laid down by the limited bioavailability of the drug, which is associated with a wide variation. As most of the cytotoxic agents have a narrow therapeutic window and are dosed at or near the maximum tolerated dose, a wide variability in the bioavailability can negatively affect treatment result. It is estimated that 40% of active substances are poorly soluble in water. The improvement of bio-availability of drugs with such properties presents one of the greatest challenges in drug formulations. There are several techniques reported in literature. Among all these Self Emulsifying Drug Delivery System (SEDDS) has gained more attention due to enhanced oral bio-availability enabling a reduction in dose. Thus, SEDDS anticancer drugs will have the increased bioavailability and efficacy. These dosage form will provide societal benefit in a cost-effective manner as compared to other oral dosage forms. Present study reflects on the formulation strategies as SEDDS for oral anticancer agents of AYUSH system for enhanced bioavailability with proven efficacy by cancer cell lines.

Keywords: anticancer agents, AYUSH system, bioavailability, SEDDS

Procedia PDF Downloads 301
14010 Ab-initio Calculations on the Mechanism of Action of Platinum and Ruthenium Complexes in Phototherapy

Authors: Eslam Dabbish, Fortuna Ponte, Stefano Scoditti, Emilia Sicilia, Gloria Mazzone

Abstract:

The medical techniques based on the use of light for activating the drug are occupying a prominent place in the cancer treatment due to their selectivity that contributes to reduce undesirable side effects of conventional chemotherapy. Among these therapeutic treatments, photodynamic therapy (PDT) and photoactivated chemotherapy (PACT) are emerging as complementary approaches for selective destruction of neoplastic tissue through direct cellular damage. Both techniques rely on the employment of a molecule, photosensitizer (PS), able to absorb within the so-called therapeutic window. Thus, the exposure to light of otherwise inert molecules promotes the population of excited states of the drug, that in PDT are able to produce the cytotoxic species, such as 1O2 and other ROS, in PACT can be responsible of the active species release or formation. Following the success of cisplatin in conventional treatments, many other transition metal complexes were explored as anticancer agents for applications in different medical approaches, including PDT and PACT, in order to improve their chemical, biological and photophysical properties. In this field, several crucial characteristics of candidate PSs can be accurately predicted from first principle calculations, especially in the framework of density functional theory and its time-dependent formulation, contributing to the understanding of the entire photochemical pathways involved which can ultimately help in improving the efficiency of a drug. A brief overview of the outcomes on some platinum and ruthenium-based PSs proposed for the application in the two phototherapies will be provided.

Keywords: TDDFT, metal complexes, PACT, PDT

Procedia PDF Downloads 98
14009 DNA PLA: A Nano-Biotechnological Programmable Device

Authors: Hafiz Md. HasanBabu, Khandaker Mohammad Mohi Uddin, Md. IstiakJaman Ami, Rahat Hossain Faisal

Abstract:

Computing in biomolecular programming performs through the different types of reactions. Proteins and nucleic acids are used to store the information generated by biomolecular programming. DNA (Deoxyribose Nucleic Acid) can be used to build a molecular computing system and operating system for its predictable molecular behavior property. The DNA device has clear advantages over conventional devices when applied to problems that can be divided into separate, non-sequential tasks. The reason is that DNA strands can hold so much data in memory and conduct multiple operations at once, thus solving decomposable problems much faster. Programmable Logic Array, abbreviated as PLA is a programmable device having programmable AND operations and OR operations. In this paper, a DNA PLA is designed by different molecular operations using DNA molecules with the proposed algorithms. The molecular PLA could take advantage of DNA's physical properties to store information and perform calculations. These include extremely dense information storage, enormous parallelism, and extraordinary energy efficiency.

Keywords: biological systems, DNA computing, parallel computing, programmable logic array, PLA, DNA

Procedia PDF Downloads 123
14008 Controlling Cocoa Pod Borer, Conopomorpha cramerella (Snell.) and Cost Analysis Production at Cacao Plantation

Authors: Alam Anshary, Flora Pasaru, Shahabuddin

Abstract:

The Cocoa Pod Borer (CPB), Conopomorpha cramerella (Snell.) is present on most of the larger cocoa producing islands in Indonesia. Various control measures CPB has been carried out by the farmers, but the results have not been effective. This study aims to determine the effect of application of Beauveria bassiana treatments and pruning technique to the control of CPB in the cocoa plantation people. Research using completely randomized design with 4 treatments and 3 replications, treatment consists of B.bassiana, Pruning, B. bassiana+pruning (Bb + Pr), as well as the control. The results showed that the percentage of PBK attack on cocoa pods in treatment (Bb + Pr) 3.50% the lowest compared to other treatments. CPB attack percentage in treatment B.bassiana 6.15%; pruning 8.75%, and 15.20% control. Results of the analysis of production estimates, the known treatments (Bb + Pr) have the highest production (1.95 tonnes / ha). The model results estimated production is Y= 0,20999 + 0,53968X1 + 0,34298X2+ 0,31410X3 + 0,35629X4 + 0,08345X5 + 0,29732X6. Farm production costs consist of fixed costs and variable costs, fixed costs are costs incurred by the farmer that the size does not affect the results, such as taxes and depreciation of production equipment. Variable costs are costs incurred by farmers who used up in one year cocoa farming activities. The cost of production in farming cocoa without integrated techniques control of CPB is Rp. 9.205.550 million/ha, while the cost of production with integrated techniques control is Rp. 6.666.050 million/ha.

Keywords: cacao, cocoa pod borer, pruning, Beauveria bassiana, production costs

Procedia PDF Downloads 279
14007 Cyberfraud Schemes: Modus Operandi, Tools and Techniques and the Role of European Legislation as a Defense Strategy

Authors: Papathanasiou Anastasios, Liontos George, Liagkou Vasiliki, Glavas Euripides

Abstract:

The purpose of this paper is to describe the growing problem of various cyber fraud schemes that exist on the internet and are currently among the most prevalent. The main focus of this paper is to provide a detailed description of the modus operandi, tools, and techniques utilized in four basic typologies of cyber frauds: Business Email Compromise (BEC) attacks, investment fraud, romance scams, and online sales fraud. The paper aims to shed light on the methods employed by cybercriminals in perpetrating these types of fraud, as well as the strategies they use to deceive and victimize individuals and businesses on the internet. Furthermore, this study outlines defense strategies intended to tackle the issue head-on, with a particular emphasis on the crucial role played by European Legislation. European legislation has proactively adapted to the evolving landscape of cyber fraud, striving to enhance cybersecurity awareness, bolster user education, and implement advanced technical controls to mitigate associated risks. The paper evaluates the advantages and innovations brought about by the European Legislation while also acknowledging potential flaws that cybercriminals might exploit. As a result, recommendations for refining the legislation are offered in this study in order to better address this pressing issue.

Keywords: business email compromise, cybercrime, European legislation, investment fraud, NIS, online sales fraud, romance scams

Procedia PDF Downloads 91
14006 Designing a Corpus Database to Enhance the Learning of Old English Language

Authors: Raquel Mateo Mendaza, Carmen Novo Urraca

Abstract:

The current paper presents the elaboration of a corpus database that aligns two different corpora in order to simplify the search of information both for researchers and students of Old English. This database comprises the information contained in two main reference corpora, namely the Dictionary of Old English Corpus (DOEC), compiled at the University of Toronto, and the York-Toronto-Helsinki Parsed Corpus of Old English (YCOE). The first one provides information on all surviving texts written in the Old English language. The latter offers the syntactical and morphological annotation of several texts included in the DOEC. Although both corpora are closely related, as the YCOE includes the DOE source text identifier, the main problem detected is that there is not an alignment of texts that allows for the search of whole fragments to be further analysed in terms of morphology and syntax. The database proposed in this paper gathers all this information and presents it in a simple, more accessible, visual, and educational way. The alignment of fragments has been done in an automatized way. However, some problems have emerged during the creating process particularly related to the lack of correspondence in the division of fragments. For this reason, it has been necessary to revise the whole entries manually to obtain a truthful high-quality product and to carefully indicate the gaps encountered in these corpora. All in all, this database contains more than 60,000 entries corresponding with the DOE fragments annotated by the YCOE. The main strength of the resulting product is its research and teaching implications in the study of Old English. The use of this database will help researchers and students in the study of different aspects of the language, such as inflectional morphology, syntactic behaviour of given words, or translation studies, among others. By means of the search of words or fragments, the annotated information on morphology and syntax will be automatically displayed, automatizing, and speeding up the search of data.

Keywords: alignment, corpus database, morphosyntactic analysis, Old English

Procedia PDF Downloads 129
14005 Client Hacked Server

Authors: Bagul Abhijeet

Abstract:

Background: Client-Server model is the backbone of today’s internet communication. In which normal user can not have control over particular website or server? By using the same processing model one can have unauthorized access to particular server. In this paper, we discussed about application scenario of hacking for simple website or server consist of unauthorized way to access the server database. This application emerges to autonomously take direct access of simple website or server and retrieve all essential information maintain by administrator. In this system, IP address of server given as input to retrieve user-id and password of server. This leads to breaking administrative security of server and acquires the control of server database. Whereas virus helps to escape from server security by crashing the whole server. Objective: To control malicious attack and preventing all government website, and also find out illegal work to do hackers activity. Results: After implementing different hacking as well as non-hacking techniques, this system hacks simple web sites with normal security credentials. It provides access to server database and allow attacker to perform database operations from client machine. Above Figure shows the experimental result of this application upon different servers and provides satisfactory results as required. Conclusion: In this paper, we have presented a to view to hack the server which include some hacking as well as non-hacking methods. These algorithms and methods provide efficient way to hack server database. By breaking the network security allow to introduce new and better security framework. The terms “Hacking” not only consider for its illegal activities but also it should be use for strengthen our global network.

Keywords: Hacking, Vulnerabilities, Dummy request, Virus, Server monitoring

Procedia PDF Downloads 249
14004 Dynamic Conformal Arc versus Intensity Modulated Radiotherapy for Image Guided Stereotactic Radiotherapy of Cranial Lesion

Authors: Chor Yi Ng, Christine Kong, Loretta Teo, Stephen Yau, FC Cheung, TL Poon, Francis Lee

Abstract:

Purpose: Dynamic conformal arc (DCA) and intensity modulated radiotherapy (IMRT) are two treatment techniques commonly used for stereotactic radiosurgery/radiotherapy of cranial lesions. IMRT plans usually give better dose conformity while DCA plans have better dose fall off. Rapid dose fall off is preferred for radiotherapy of cranial lesions, but dose conformity is also important. For certain lesions, DCA plans have good conformity, while for some lesions, the conformity is just unacceptable with DCA plans, and IMRT has to be used. The choice between the two may not be apparent until each plan is prepared and dose indices compared. We described a deviation index (DI) which is a measurement of the deviation of the target shape from a sphere, and test its functionality to choose between the two techniques. Method and Materials: From May 2015 to May 2017, our institute has performed stereotactic radiotherapy for 105 patients treating a total of 115 lesions (64 DCA plans and 51 IMRT plans). Patients were treated with the Varian Clinac iX with HDMLC. Brainlab Exactrac system was used for patient setup. Treatment planning was done with Brainlab iPlan RT Dose (Version 4.5.4). DCA plans were found to give better dose fall off in terms of R50% (R50% (DCA) = 4.75 Vs R50% (IMRT) = 5.242) while IMRT plans have better conformity in terms of treatment volume ratio (TVR) (TVR(DCA) = 1.273 Vs TVR(IMRT) = 1.222). Deviation Index (DI) is proposed to better facilitate the choice between the two techniques. DI is the ratio of the volume of a 1 mm shell of the PTV and the volume of a 1 mm shell of a sphere of identical volume. DI will be close to 1 for a near spherical PTV while a large DI will imply a more irregular PTV. To study the functionality of DI, 23 cases were chosen with PTV volume ranged from 1.149 cc to 29.83 cc, and DI ranged from 1.059 to 3.202. For each case, we did a nine field IMRT plan with one pass optimization and a five arc DCA plan. Then the TVR and R50% of each case were compared and correlated with the DI. Results: For the 23 cases, TVRs and R50% of the DCA and IMRT plans were examined. The conformity for IMRT plans are better than DCA plans, with majority of the TVR(DCA)/TVR(IMRT) ratios > 1, values ranging from 0.877 to1.538. While the dose fall off is better for DCA plans, with majority of the R50%(DCA)/ R50%(IMRT) ratios < 1. Their correlations with DI were also studied. A strong positive correlation was found between the ratio of TVRs and DI (correlation coefficient = 0.839), while the correlation between the ratio of R50%s and DI was insignificant (correlation coefficient = -0.190). Conclusion: The results suggest DI can be used as a guide for choosing the planning technique. For DI greater than a certain value, we can expect the conformity for DCA plans to become unacceptably great, and IMRT will be the technique of choice.

Keywords: cranial lesions, dynamic conformal arc, IMRT, image guided radiotherapy, stereotactic radiotherapy

Procedia PDF Downloads 237
14003 Late Bronze Age Pigments: Characterization of Mycenaean Pottery with Multi-Analytical Approach

Authors: Elif Doğru, Bülent Kızılduman, Huriye İcil

Abstract:

Throughout history, Cyprus has been involved in various commercial and cultural relationships with different civilizations, owing to its strategic location. Particularly during the Late Bronze Age, Cyprus emerged as a significant region engaged in interactions with the Mycenaeans and other Mediterranean civilizations. Presently, findings from archaeological excavations provide valuable insights into Cyprus' cultural history and its connections with other civilizations. Painted Mycenaean ceramics discovered during the excavations at Kaleburnu-Kral Tepesi (Galinaporni-Vasili), dated to the Late Bronze Age in Cyprus, are considered significant archaeological findings that carry traces of the art and culture of that era, reflecting the island's commercial and cultural connections. Considering these findings, there is a need for archaeometric studies to aid in the understanding of the commercial and cultural ties at Kaleburnu-Kral Tepesi. In line with this need, analytical studies have been initiated concerning the provenance and production techniques of the Mycenaean ceramics discovered in the excavations at Kaleburnu-Kral Tepesi, dated to the Late Bronze Age. In the context of origin analysis studies, it is advocated that understanding the techniques and materials used for the figures and designs applied on Mycenaean ceramics would significantly contribute to a better comprehension of historical contexts. Hence, the adopted approach involves not only the analysis of the ceramic raw material but also the characterization of the pigments on the ceramics as a whole. In light of this, in addition to the studies aimed at determining the provenance and production techniques of the Mycenaean ceramic bodies, the characterization of the pigments used in the decorations of the relevant ceramics has been included in the research scope. Accordingly, this study aims to characterize the pigments used in the decorations of Mycenaean ceramics discovered at Kaleburnu-Kral Tepesi, dated to the Late Bronze Age. The X-Ray diffraction (XRD), Fourier Transform Infrared Spectroscopy (FTIR), and Scanning Electron Microscopy with Energy Dispersive X-ray Spectroscopy (SEM-EDX) methods have been employed to determine the surface morphology and chemical properties of the Mycenaean pigments. The characterization has been conducted through the combination of multiple analytical methods. The characterization of the pigments of Mycenaean ceramics aims to enhance the scientific perspective adopted for understanding the contributions of Mycenaean ceramics found in Cyprus to the island's culture, by providing scientific data on the types and origins of pigments used during the Late Bronze Age.

Keywords: mycenaean, ceramic, provenance, pigment

Procedia PDF Downloads 71
14002 Trafficking of Women and Children and Solutions to Combat It: The Case of Nigeria

Authors: Olatokunbo Yakeem

Abstract:

Human trafficking is a crime against gross violations of human rights. Trafficking in persons is a severe socio-economic dilemma that affects the national and international dimensions. Human trafficking or modern-day-slavery emanated from slavery, and it has been in existence before the 6ᵗʰ century. Today, no country is exempted from dehumanizing human beings, and as a result, it has been an international issue. The United Nations (UN) presented the International Protocol to fight human trafficking worldwide, which brought about the international definition of human trafficking. The protocol is to prevent, suppress, and punish trafficking in persons, especially women and children. The trafficking protocol has a link with transnational organised crime rather than migration. Over a hundred and fifty countries nationwide have enacted their criminal and panel code trafficking legislation from the UN trafficking protocol. Sex trafficking is the most common type of exploitation of women and children. Other forms of this crime involve exploiting vulnerable victims through forced labour, child involvement in warfare, domestic servitude, debt bondage, and organ removal for transplantation. Trafficking of women and children into sexual exploitation represents the highest form of human trafficking than other types of exploitation. Trafficking of women and children can either happen internally or across the border. It affects all kinds of people, regardless of their race, social class, culture, religion, and education levels. However, it is more of a gender-based issue against females. Furthermore, human trafficking can lead to life-threatening infections, mental disorders, lifetime trauma, and even the victim's death. The study's significance is to explore why the root causes of women and children trafficking in Nigeria are based around poverty, entrusting children in the hands of relatives and friends, corruption, globalization, weak legislation, and ignorance. The importance of this study is to establish how the national, regional, and international organisations are using the 3P’s Protection, Prevention, and Prosecution) to tackle human trafficking. The methodology approach for this study will be a qualitative paradigm. The rationale behind this selection is that the qualitative method will identify the phenomenon and interpret the findings comprehensively. The data collection will take the form of semi-structured in-depth interviews through telephone and email. The researcher will use a descriptive thematic analysis to analyse the data by using complete coding. In summary, this study aims to recommend to the Nigerian federal government to include human trafficking as a subject in their educational curriculum for early intervention to prevent children from been coerced by criminal gangs. And the research aims to find the root causes of women and children trafficking. Also, to look into the effectiveness of the strategies in place to eradicate human trafficking globally. In the same vein, the research objective is to investigate how the anti-trafficking bodies such as law enforcement and NGOs collaborate to tackle the upsurge in human trafficking.

Keywords: children, Nigeria, trafficking, women

Procedia PDF Downloads 180
14001 A Small Graphic Lie. The Photographic Quality of Pierre Bourdieu’s Correspondance Analysis

Authors: Lene Granzau Juel-Jacobsen

Abstract:

The problem of beautification is an obvious concern of photography, claiming reference to reality, but it also lies at the very heart of social theory. As we become accustomed to sophisticated visualizations of statistical data in pace with the development of software programs, we should not only be inclined to ask new types of research questions, but we also need to confront social theories based on such visualization techniques with new types of questions. Correspondence Analysis, GIS analysis, Social Network Analysis, and Perceptual Maps are current examples of visualization techniques popular within the social sciences and neighboring disciplines. This article discusses correspondence analysis, arguing that the graphic plot of correspondence analysis is to be interpreted much similarly to a photograph. It refers no more evidently or univocally to reality than a photograph, representing social life no more truthfully than a photograph documents. Pierre Bourdieu’s theoretical corpus, especially his theory of fields, relies heavily on correspondence analysis. While much attention has been directed towards critiquing the somewhat vague conceptualization of habitus, limited focus has been placed on the equally problematic concepts of social space and field. Based on a re-reading of the Distinction, the article argues that the concepts rely on ‘a small graphic lie’ very similar to a photograph. Like any other piece of art, as Bourdieu himself recognized, the graphic display is a politically and morally loaded representation technique. However, the correspondence analysis does not necessarily serve the purpose he intended. In fact, it tends towards the pitfalls he strove to overcome.

Keywords: datavisualization, correspondance analysis, bourdieu, Field, visual representation

Procedia PDF Downloads 60
14000 Investigating Relationship between Use of Mobile Technologies and Employees’ Creativity

Authors: Leila Niroomand, Reza Rafigh

Abstract:

Nowadays, the world is going under a dramatic change from an industry-centered society to an information-centered one. In other words, we are experiencing a transition from real, physical world into a virtual one. Stepping into the information age and running an effective life within the information-centered society demands getting acquainted with characteristics peculiar to such society. Recently, new technologies such as telecommunication and mobile technologies have changed vehemently and accumulation of achievements and information has become so important and brought about changes in occupational structures. The intellectual structure of this day and age depends on deep attention to creative and knowledge-based human resource collaboration instead of merely functioning human resource. Present study scrutinizes the contribution of different dimensions of mobile technologies including perceived use, perceived enjoyment, continuance intention, confirmation and satisfaction to the creativity of personnel. The statistical population included infrastructure communications company employees totaling 2431 persons out of which 331 individuals were chosen as sample based on Morgan and Krejcie table. This research is descriptive and the questionnaire was used for data gathering and it was distributed among those who used telegram application. 228 questionnaires were analyzed by the researcher. Applying SPSS software, Pierson correlation coefficient was analyzed and it was found out that all dimensions of mobile technologies except satisfaction correlate with the creativity of employees.

Keywords: mobile technologies, continuance intention, perceived enjoyment, confirmation, satisfaction, creativity, perceived use

Procedia PDF Downloads 198
13999 Object Oriented Software Engineering Approach to Industrial Information System Design and Implementation

Authors: Issa Hussein Manita

Abstract:

This paper presents an example of industrial information system design and implementation (IIDC), the most common software engineering design steps that are applied to the different design stages. We are going through the life cycle of software system development. We start by a study of system requirement and end with testing and delivering system, going by system design and coding, program integration and system integration step. The most modern software design tools available used in the design this includes, but not limited to, Unified Modeling Language (UML), system modeling, SQL server side application, uses case analysis, design and testing as applied to information processing systems. The system is designed to perform tasks specified by the client with real data. By the end of the implementation of the system, default or user defined acceptance policy to provide an overall score as an indication of the system performance is used. To test the reliability of he designed system, it is tested in different environment and different work burden such as multi-user environment.

Keywords: software engineering, design, system requirement, integration, unified modeling language

Procedia PDF Downloads 567
13998 Hydrofracturing for Low Temperature Waxy Reservoirs: Problems and Solutions

Authors: Megh Patel, Arjun Chauhan, Jay Thakkar

Abstract:

Hydrofracturing is the most prominent but at the same time expensive, highly skilled and time consuming well stimulation technique. Due to high cost and skilled labor involved, it is generally carried out as the consummate solution among other well stimulation techniques. Considering today’s global petroleum market, no gaffe or complications could be entertained during fracturing, as it would further hamper the current dwindling economy. The literature would be dealing with the challenges encountered during fracturing low temperature waxy reservoirs and the prominent solutions to overcome such teething troubles. During fracturing treatment for, shallow and high freezing point waxy oil reservoirs, the first line problems are to overcome uncompleted breakdown, uncompleted cleanup of fracturing fluids and cold damages to the formations by injecting cold fluid (fluid at ambient conditions). Injecting fracturing fluids at ambient conditions have the tendency to decrease the near wellbore reservoir temperature below the freezing point of oil reservoir and hence leading to wax deposition around the wellbore thereby hampering the fluid production as well as fracture propagation. To overcome such problems, solutions such as hot fracturing fluid injection, encapsulated heat generating hydraulic fracturing fluid system, and injection of wax inhibitor techniques would be discussed. The paper would also be throwing light on changes in rheological properties occurred during heating fracturing fluids and solutions to deal with it taking economic considerations into account.

Keywords: hydrofracturing, waxy reservoirs, low temperature, viscosity, crosslinkers

Procedia PDF Downloads 246