Search results for: face presentation attack detection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7562

Search results for: face presentation attack detection

5222 Trends in Use of Millings in Pavement Maintenance

Authors: Rafiqul Tarefder, Mohiuddin Ahmad, Mohammad Hossain

Abstract:

While milling materials from old pavement surface can be an important component of cost effective maintenance operation, their use in maintenance projects are not uniform and well documented. This study documents the different maintenance practices followed by four transportation districts of New Mexico Department of Transportation (NMDOT) in an attempt to find whether millings are being used in maintenance projects by those districts. Based on existing literature, a questionnaire was developed related to six common maintenance practices. NMDOT district personal were interviewed face to face to discuss and get answers to that questionnaire. It revealed that NMDOT districts mainly use chip seal and patching. Other maintenance procedures such as sand seal, scrub seal, slurry seal, and thin overlay have limited use. Two out of four participating districts do not have any documents on chip sealing; rather they employ the experiences of the chip seal crew. All districts use polymer modified high float emulsion (HFE100P) for chip seal with an application rate ranging from 0.4 to 0.56 gallons per square yard. Chip application rate varies from 15 to 40 lb/ square yard. State wide, the thickness of chip seal varies from 3/8" to 1" and life varies from 3 to 10 years. NMDOT districts mainly use three type of patching: pothole, dig-out and blade patch. Pothole patches are used for small potholes and during emergency, dig-out patches are used for all type of potholes sometimes after pothole patching, and blade patch is used when a significant portion of the pavement is damaged. Pothole patches last as low as three days whereas, blade patch lasts as long as 3 years. It was observed that all participating districts use millings in maintenance projects.

Keywords: chip seal, sand seal, scrub seal, slurry seal, overlay, patching, millings

Procedia PDF Downloads 326
5221 Flue Gas Characterisation for Conversion to Chemicals and Fuels

Authors: Adesola O. Orimoloye, Edward Gobina

Abstract:

Flue gas is the most prevalent source of carbon dioxide off-gas from numerous processes globally. Among the lion's share of this flue gas is the ever-present electric power plant, primarily fuelled by coal, and then secondly, natural gas. The carbon dioxide found in coal fired power plant off gas is among the dirtiest forms of carbon dioxide, even with many of the improvements in the plants; still this will yield sulphur and nitrogen compounds; among other rather nasty compounds and elements; all let to the atmosphere. This presentation will focus on the characterization of carbon dioxide-rich flue gas sources with a view of eventual conversion to chemicals and fuels using novel membrane reactors.

Keywords: flue gas, carbon dioxide, membrane, catalyst, syngas

Procedia PDF Downloads 505
5220 A Palmprint Identification System Based Multi-Layer Perceptron

Authors: David P. Tantua, Abdulkader Helwan

Abstract:

Biometrics has been recently used for the human identification systems using the biological traits such as the fingerprints and iris scanning. Identification systems based biometrics show great efficiency and accuracy in such human identification applications. However, these types of systems are so far based on some image processing techniques only, which may decrease the efficiency of such applications. Thus, this paper aims to develop a human palmprint identification system using multi-layer perceptron neural network which has the capability to learn using a backpropagation learning algorithms. The developed system uses images obtained from a public database available on the internet (CASIA). The processing system is as follows: image filtering using median filter, image adjustment, image skeletonizing, edge detection using canny operator to extract features, clear unwanted components of the image. The second phase is to feed those processed images into a neural network classifier which will adaptively learn and create a class for each different image. 100 different images are used for training the system. Since this is an identification system, it should be tested with the same images. Therefore, the same 100 images are used for testing it, and any image out of the training set should be unrecognized. The experimental results shows that this developed system has a great accuracy 100% and it can be implemented in real life applications.

Keywords: biometrics, biological traits, multi-layer perceptron neural network, image skeletonizing, edge detection using canny operator

Procedia PDF Downloads 354
5219 Motivation Among Arab Learners of English in the UK

Authors: Safa Kaka

Abstract:

As more and more students are travelling to different countries to study and, in particular, to study English, the question of what motivates them to make such a large move has come under question. This is particularly pertinent in the case of Arab students who make up nearly 15% of the foreign student body in the UK. Given that the cultural differences between the UK and Arab nations are extremely wide, the decision to come to this country to study English must be driven by strong motivational forces. Numerous previous studies have considered what motivates foreign students to travel to the UK and other countries for their education or language learning but the specific motivators of Arab students have yet to be explored. This study undertakes to close that gap by examining the concepts and theories of motivation, both in general terms and in relation to English learning and foreign study. 70 Arab students currently studying in the UK were asked to participate in an online questionnaire which asked about their motivations for coming to the UK and for studying and learning English. A further six individuals were interviewed on a face to face basis. The outcomes have indicated that the factors which motivate the decision to come to the UK are similar to those that motivate the desire to learn English. In particular a motivation for self-improvement, career advancement and potential future benefits were cited by a number of respondents. Other indications were the ease of accessibility to the UK as an English speaking country, a motivation to experience different cultures and lifestyles and even political freedoms. Overall the motivations of Arab students were not found to be conspicuously different from those of other foreign students, although it was noted that their motivations did change, both positively and negatively following a period of time in the country. These changes were based on the expectations of the students pre-arrival and their actual experience of the country and its teaching approaches and establishments and were, as indicated both good and bad. The implications for the Arab student population and UK educational establishments are reviewed and future research pathways highlighted.

Keywords: motivation, Arab learners of English, language teaching, applied linguistics

Procedia PDF Downloads 332
5218 Use of a New Multiplex Quantitative Polymerase Chain Reaction Based Assay for Simultaneous Detection of Neisseria Meningitidis, Escherichia Coli K1, Streptococcus agalactiae, and Streptococcus pneumoniae

Authors: Nastaran Hemmati, Farhad Nikkhahi, Amir Javadi, Sahar Eskandarion, Seyed Mahmuod Amin Marashi

Abstract:

Neisseria meningitidis, Escherichia coli K, Streptococcus agalactiae, and Streptococcus pneumoniae cause 90% of bacterial meningitis. Almost all infected people die or have irreversible neurological complications. Therefore, it is essential to have a diagnostic kit with the ability to quickly detect these fatal infections. The project involved 212 patients from whom cerebrospinal fluid samples were obtained. After total genome extraction and performing multiplex quantitative polymerase chain reaction (qPCR), the presence or absence of each infectious factor was determined by comparing with standard strains. The specificity, sensitivity, positive predictive value, and negative predictive value calculated were 100%, 92.9%, 50%, and 100%, respectively. So, due to the high specificity and sensitivity of the designed primers, they can be used instead of bacterial culture that takes at least 24 to 48 hours. The remarkable benefit of this method is associated with the speed (up to 3 hours) at which the procedure could be completed. It is also worth noting that this method can reduce the personnel unintentional errors which may occur in the laboratory. On the other hand, as this method simultaneously identifies four common factors that cause bacterial meningitis, it could be used as an auxiliary method diagnostic technique in laboratories particularly in cases of emergency medicine.

Keywords: cerebrospinal fluid, meningitis, quantitative polymerase chain reaction, simultaneous detection, diagnosis testing

Procedia PDF Downloads 91
5217 UV-Vis Spectroscopy as a Tool for Online Tar Measurements in Wood Gasification Processes

Authors: Philip Edinger, Christian Ludwig

Abstract:

The formation and control of tars remain one of the major challenges in the implementation of biomass gasification technologies. Robust, on-line analytical methods are needed to investigate the fate of tar compounds when different measures for their reduction are applied. This work establishes an on-line UV-Vis method, based on a liquid quench sampling system, to monitor tar compounds in biomass gasification processes. Recorded spectra from the liquid phase were analyzed for their tar composition by means of a classical least squares (CLS) and partial least squares (PLS) approach. This allowed for the detection of UV-Vis active tar compounds with detection limits in the low part per million by volume (ppmV) region. The developed method was then applied to two case studies. The first involved a lab-scale reactor, intended to investigate the decomposition of a limited number of tar compounds across a catalyst. The second study involved a gas scrubber as part of a pilot scale wood gasification plant. Tar compound quantification results showed good agreement with off-line based reference methods (GC-FID) when the complexity of tar composition was limited. The two case studies show that the developed method can provide rapid, qualitative information on the tar composition for the purpose of process monitoring. In cases with a limited number of tar species, quantitative information about the individual tar compound concentrations provides an additional benefit of the analytical method.

Keywords: biomass gasification, on-line, tar, UV-Vis

Procedia PDF Downloads 243
5216 Numerical Simulation of the Flow around Wing-In-Ground Effect (WIG) Craft

Authors: A. Elbatran, Y. Ahmed, A. Radwan, M. Ishak

Abstract:

The use of WIG craft is representing an ambitious technology that will support in reducing time, effort, and money of the conventional marine transportation in the future. This paper investigates the aerodynamic characteristic of compound wing-in-ground effect (WIG) craft model. Drag coefficient, lift coefficient and Lift and drag ratio were studied numerically with respect to the ground clearance and the wing angle of attack. The modifications of the wing has been done in order to investigate the most suitable wing configuration that can increase the wing lift-to-drag ratio at low ground clearance. A numerical investigation was carried out in this research work using finite volume Reynolds-Averaged Navier-Stokes Equations (RANSE) code ANSYS CFX, Validation was carried out by using experiments. The experimental and the numerical results concluded that the lift to drag ratio decreased with the increasing of the ground clearance.

Keywords: drag Coefficient, ground clearance, navier-stokes, WIG

Procedia PDF Downloads 362
5215 Scouring Rate Pattern/Monitoring at Coastal and Offshore Structures

Authors: Ahmad Saifullah Mazlan, Hossein Basser, Shatirah Akib

Abstract:

Scouring pattern evaluation and measuring its depth around coastal and offshore structures is very essential issue to assure the safety of the structures as well as providing needed design parameters. Scouring is known as one of the important phenomena which threatens the safety of infrastructures. Several countermeasures have been developed to control scouring by protecting the structures against water flow attack directly or indirectly by changing the water flow pattern. Recently, monitoring methods for estimating water flow pattern and scour depth are studied to track the safety of structures. Since most of studies regarding scouring is related to monitoring scouring around piers in rivers therefore it is necessary to develop researches investigating scouring around piers in coastal and offshore areas. This paper describes a review of monitoring methods may be used for detecting scour depth around piers in coastal and offshore structures.

Keywords: scour, monitoring, pier, coastal, offshore

Procedia PDF Downloads 617
5214 Evaluation of Real Time PCR Methods for Food Safety

Authors: Ergun Sakalar, Kubra Bilgic

Abstract:

In the last decades, real-time PCR has become a reliable tool preferred to use in many laboratories for pathogen detection. This technique allows for monitoring target amplification via fluorescent molecules besides admit of quantitative analysis by enabling of convert outcomes of thermal cycling to digital data. Sensitivity and traceability of real-time PCR are based on measuring of fluorescence that appears only when fluorescent reporter dye bound to specific target DNA.The fluorescent reporter systems developed for this purpose are divided into two groups. The first group consists of intercalator fluorescence dyes such as SYBR Green, EvaGreen which binds to double-stranded DNA. On the other hand, the second group includes fluorophore-labeled oligonucleotide probes that are separated into three subgroups due to differences in mechanism of action; initial primer-probes such as Cyclicons, Angler®, Amplifluor®, LUX™, Scorpions, and the second one hydrolysis probes like TaqMan, Snake assay, finally hybridization probes, for instance, Molecular Beacons, Hybprobe/FRET, HyBeacon™, MGB-Eclipse, ResonSense®, Yin-Yang, MGB-Pleiades. In addition nucleic acid analogues, an increase of probe affinity to target site is also employed with fluorescence-labeled probes. Consequently, abundant real-time PCR detection chemistries are chosen by researcher according to the field of application, mechanism of action, advantages, and proper structures of primer/probes.

Keywords: fluorescent dye, food safety, molecular probes, nucleic acid analogues

Procedia PDF Downloads 231
5213 Detection of Powdery Mildew Disease in Strawberry Using Image Texture and Supervised Classifiers

Authors: Sultan Mahmud, Qamar Zaman, Travis Esau, Young Chang

Abstract:

Strawberry powdery mildew (PM) is a serious disease that has a significant impact on strawberry production. Field scouting is still a major way to find PM disease, which is not only labor intensive but also almost impossible to monitor disease severity. To reduce the loss caused by PM disease and achieve faster automatic detection of the disease, this paper proposes an approach for detection of the disease, based on image texture and classified with support vector machines (SVMs) and k-nearest neighbors (kNNs). The methodology of the proposed study is based on image processing which is composed of five main steps including image acquisition, pre-processing, segmentation, features extraction and classification. Two strawberry fields were used in this study. Images of healthy leaves and leaves infected with PM (Sphaerotheca macularis) disease under artificial cloud lighting condition. Colour thresholding was utilized to segment all images before textural analysis. Colour co-occurrence matrix (CCM) was introduced for extraction of textural features. Forty textural features, related to a physiological parameter of leaves were extracted from CCM of National television system committee (NTSC) luminance, hue, saturation and intensity (HSI) images. The normalized feature data were utilized for training and validation, respectively, using developed classifiers. The classifiers have experimented with internal, external and cross-validations. The best classifier was selected based on their performance and accuracy. Experimental results suggested that SVMs classifier showed 98.33%, 85.33%, 87.33%, 93.33% and 95.0% of accuracy on internal, external-I, external-II, 4-fold cross and 5-fold cross-validation, respectively. Whereas, kNNs results represented 90.0%, 72.00%, 74.66%, 89.33% and 90.3% of classification accuracy, respectively. The outcome of this study demonstrated that SVMs classified PM disease with a highest overall accuracy of 91.86% and 1.1211 seconds of processing time. Therefore, overall results concluded that the proposed study can significantly support an accurate and automatic identification and recognition of strawberry PM disease with SVMs classifier.

Keywords: powdery mildew, image processing, textural analysis, color co-occurrence matrix, support vector machines, k-nearest neighbors

Procedia PDF Downloads 104
5212 Exhaled Breath Condensate in Lung Cancer: A Non-Invasive Sample for Easier Mutations Detection by Next Generation Sequencing

Authors: Omar Youssef, Aija Knuuttila, Paivi Piirilä, Virinder Sarhadi, Sakari Knuutila

Abstract:

Exhaled breath condensate (EBC) is a unique sample that allows studying different genetic changes in lung carcinoma through a non-invasive way. With the aid of next generation sequencing (NGS) technology, analysis of genetic mutations has been more efficient with increased sensitivity for detection of genetic variants. In order to investigate the possibility of applying this method for cancer diagnostics, mutations in EBC DNA from lung cancer patients and healthy individuals were studied by using NGS. The key aim is to assess the feasibility of using this approach to detect clinically important mutations in EBC. EBC was collected from 20 healthy individuals and 9 lung cancer patients (four lung adenocarcinomas, four 8 squamous cell carcinoma, and one case of mesothelioma). Mutations in hotpot regions of 22 genes were studied by using Ampliseq Colon and Lung cancer panel and sequenced on Ion PGM. Results demonstrated that all nine patients showed a total of 19 cosmic mutations in APC, BRAF, EGFR, ERBB4, FBXW7, FGFR1, KRAS, MAP2K1, NRAS, PIK3CA, PTEN, RET, SMAD4, and TP53. In controls, 15 individuals showed 35 cosmic mutations in BRAF, CTNNB1, DDR2, EGFR, ERBB2, FBXW7, FGFR3, KRAS, MET, NOTCH1, NRAS, PIK3CA, PTEN, SMAD4, and TP53. Additionally, 45 novel mutations not reported previously were also seen in patients’ samples, and 106 novel mutations were seen in controls’ specimens. KRAS exon 2 mutations G12D was identified in one control specimen with mutant allele fraction of 6.8%, while KRAS G13D mutation seen in one patient sample showed mutant allele fraction of 17%. These findings illustrate that hotspot mutations are present in DNA from EBC of both cancer patients and healthy controls. As some of the cosmic mutations were seen in controls too, no firm conclusion can be drawn on the clinical importance of cosmic mutations in patients. Mutations reported in controls could represent early neoplastic changes or normal homeostatic process of apoptosis occurring in lung tissue to get rid of mutant cells. At the same time, mutations detected in patients might represent a non-invasive easily accessible way for early cancer detection. Follow up of individuals with important cancer mutations is necessary to clarify the significance of these mutations in both healthy individuals and cancer patients.

Keywords: exhaled breath condensate, lung cancer, mutations, next generation sequencing

Procedia PDF Downloads 165
5211 Prevalence of High Risk Human Papillomavirus in Cervical Dysplasia and Cancer Samples from Twin Cities in Pakistan

Authors: Sana Gul, Sheeba Murad, Aneela Javed

Abstract:

Introduction: Human Papilloma Virus (HPV) is small DNA virus mostly infecting mucosa and cutaneous keratinocytes. So far, more than 200 Human papillomaviruses are known. HPV have been divided into high- and low-risk on the basis of their oncogenic potential. High risk HPV is considered to be the main etiological cause for cervical cancer. Objective: Current study was designed to screen the local cervical cancer patients from the twin cities of Pakistan for the occurance of high risk HPV. Methodology: A total of 67 formalin fixed paraffin-embedded samples of cervical cancer biopsies were obtained from the government hospitals in Islamabad and Rawalpindi. Cervical cancer biopsies were examined for the presence of HPV DNA. Polymerase chain reaction (PCR) was used for the amplification of a region in the HPV-L1 gene for the general detection of the Papilloma virus and for the genotype specific detection of high risk HPV 16 and 18 using the GP5/GP6 primers and genotype specific primers respectively. Results: HPV DNA was detected in 59 out of 67 samples analyzed. 30 samples showed the presence of HPV16 while 22 samples were positive for HPV 18 . HPV subtype could not be determined in 7 samples. Conclusion: Our results show a strong association between HPV infection and cervical cancer among women in twin cities of Pakistan. One way to minimize the disease burden in relation to HPV infection in Pakistani population is the use of prophylactic vaccines and routine screening. An early diagnosis of HPV infection will allow better health management to reduce the risk of developing cervical cancer.

Keywords: cervical cancer, Pakistan, human papillomavirus, HPV 16

Procedia PDF Downloads 319
5210 Security in Resource Constraints Network Light Weight Encryption for Z-MAC

Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy

Abstract:

Wireless sensor network was formed by a combination of nodes, systematically it transmitting the data to their base stations, this transmission data can be easily compromised if the limited processing power and the data consistency from these nodes are kept in mind; there is always a discussion to address the secure data transfer or transmission in actual time. This will present a mechanism to securely transmit the data over a chain of sensor nodes without compromising the throughput of the network by utilizing available battery resources available in the sensor node. Our methodology takes many different advantages of Z-MAC protocol for its efficiency, and it provides a unique key by sharing the mechanism using neighbor node MAC address. We present a light weighted data integrity layer which is embedded in the Z-MAC protocol to prove that our protocol performs well than Z-MAC when we introduce the different attack scenarios.

Keywords: hybrid MAC protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node dataprocessing, Z-MAC

Procedia PDF Downloads 128
5209 Mathematics as the Foundation for the STEM Disciplines: Different Pedagogical Strategies Addressed

Authors: Marion G. Ben-Jacob, David Wang

Abstract:

There is a mathematics requirement for entry level college and university students, especially those who plan to study STEM (Science, Technology, Engineering and Mathematics). Most of them take College Algebra, and to continue their studies, they need to succeed in this course. Different pedagogical strategies are employed to promote the success of our students. There is, of course, the Traditional Method of teaching- lecture, examples, problems for students to solve. The Emporium Model, another pedagogical approach, replaces traditional lectures with a learning resource center model featuring interactive software and on-demand personalized assistance. This presentation will compare these two methods of pedagogy and the study done with its results on this comparison. Math is the foundation for science, technology, and engineering. Its work is generally used in STEM to find patterns in data. These patterns can be used to test relationships, draw general conclusions about data, and model the real world. In STEM, solutions to problems are analyzed, reasoned, and interpreted using math abilities in a assortment of real-world scenarios. This presentation will examine specific examples of how math is used in the different STEM disciplines. Math becomes practical in science when it is used to model natural and artificial experiments to identify a problem and develop a solution for it. As we analyze data, we are using math to find the statistical correlation between the cause of an effect. Scientists who use math include the following: data scientists, scientists, biologists and geologists. Without math, most technology would not be possible. Math is the basis of binary, and without programming, you just have the hardware. Addition, subtraction, multiplication, and division is also used in almost every program written. Mathematical algorithms are inherent in software as well. Mechanical engineers analyze scientific data to design robots by applying math and using the software. Electrical engineers use math to help design and test electrical equipment. They also use math when creating computer simulations and designing new products. Chemical engineers often use mathematics in the lab. Advanced computer software is used to aid in their research and production processes to model theoretical synthesis techniques and properties of chemical compounds. Mathematics mastery is crucial for success in the STEM disciplines. Pedagogical research on formative strategies and necessary topics to be covered are essential.

Keywords: emporium model, mathematics, pedagogy, STEM

Procedia PDF Downloads 54
5208 Efficient Reuse of Exome Sequencing Data for Copy Number Variation Callings

Authors: Chen Wang, Jared Evans, Yan Asmann

Abstract:

With the quick evolvement of next-generation sequencing techniques, whole-exome or exome-panel data have become a cost-effective way for detection of small exonic mutations, but there has been a growing desire to accurately detect copy number variations (CNVs) as well. In order to address this research and clinical needs, we developed a sequencing coverage pattern-based method not only for copy number detections, data integrity checks, CNV calling, and visualization reports. The developed methodologies include complete automation to increase usability, genome content-coverage bias correction, CNV segmentation, data quality reports, and publication quality images. Automatic identification and removal of poor quality outlier samples were made automatically. Multiple experimental batches were routinely detected and further reduced for a clean subset of samples before analysis. Algorithm improvements were also made to improve somatic CNV detection as well as germline CNV detection in trio family. Additionally, a set of utilities was included to facilitate users for producing CNV plots in focused genes of interest. We demonstrate the somatic CNV enhancements by accurately detecting CNVs in whole exome-wide data from the cancer genome atlas cancer samples and a lymphoma case study with paired tumor and normal samples. We also showed our efficient reuses of existing exome sequencing data, for improved germline CNV calling in a family of the trio from the phase-III study of 1000 Genome to detect CNVs with various modes of inheritance. The performance of the developed method is evaluated by comparing CNV calling results with results from other orthogonal copy number platforms. Through our case studies, reuses of exome sequencing data for calling CNVs have several noticeable functionalities, including a better quality control for exome sequencing data, improved joint analysis with single nucleotide variant calls, and novel genomic discovery of under-utilized existing whole exome and custom exome panel data.

Keywords: bioinformatics, computational genetics, copy number variations, data reuse, exome sequencing, next generation sequencing

Procedia PDF Downloads 241
5207 Evil Eye's Effects on Individual's Mental Health

Authors: Nikolaos Souvlakis

Abstract:

One of the prominent phenomena that have survived even in the 21st century, when science is gaining more and more space in the scientific world, is the evil eye within non-Westernized societies and more specifically in Greek culture. The presentation is based on the Christian Orthodox beliefs and folklore about the evil eye. Evil eye occupies an important role in individuals' everyday life and it is fuelled by Satanic powers. Satanic powers and the belief on them have an immense effect on individual's well-being and mental health causing spiritual suffering. The present paper examines the psychological manifestations of the belief of evil eye in individuals' mental health and the ways to protect from it according to the Greek Orthodox tradition.

Keywords: spirituality, belief, evil eye, mental health, well-being, healing

Procedia PDF Downloads 485
5206 Detecting Nitrogen Deficiency and Potato Leafhopper (Hemiptera, Cicadellidae) Infestation in Green Bean Using Multispectral Imagery from Unmanned Aerial Vehicle

Authors: Bivek Bhusal, Ana Legrand

Abstract:

Detection of crop stress is one of the major applications of remote sensing in agriculture. Multiple studies have demonstrated the capability of remote sensing using Unmanned Aerial Vehicle (UAV)-based multispectral imagery for detection of plant stress, but none so far on Nitrogen (N) stress and PLH feeding stress on green beans. In view of its wide host range, geographical distribution, and damage potential, Potato leafhopper- Empoasca fabae (Harris) has been emerging as a key pest in several countries. Monitoring methods for potato leafhopper (PLH) damage, as well as the laboratory techniques for detecting Nitrogen deficiency, are time-consuming and not always easily affordable. A study was initiated to demonstrate if the multispectral sensor attached to a drone can detect PLH stress and N deficiency in beans. Small-plot trials were conducted in the summer of 2023, where cages were used to manipulate PLH infestation in green beans (Provider cultivar) at their first-trifoliate stage. Half of the bean plots were introduced with PLH, and the others were kept insect-free. Half of these plots were grown with the recommended amount of N, and the others were grown without N. Canopy reflectance was captured using a five-band multispectral sensor. Our findings indicate that drone imagery could detect stress due to a lack of N and PLH damage in beans.

Keywords: potato leafhopper, nitrogen, remote sensing, spectral reflectance, beans

Procedia PDF Downloads 41
5205 Motherhood Constrained: The Minotaur Legend Reimagined Through the Perspective of Marginalized Mothers

Authors: Gevorgianiene Violeta, Sumskiene Egle

Abstract:

Background. Child removal is a profound and life-altering measure that significantly impacts both children and their mothers. Unfortunately, mothers with intellectual disabilities are disproportionately affected by the removal of their children. This action is often taken due to concerns about the mother's perceived inability to care for the child, instances of abuse and neglect, or struggles with addiction. In many cases, the failure to meet society's standards of a "good mother" is seen as a deviation from conventional norms of femininity and motherhood. From an institutional perspective, separating a child from their mother is sometimes viewed as a step toward restoring justice or doing what is considered "right." In another light, this act of child removal can be seen as the removal of a mother from her child, an attempt to shield society from the complexities and fears associated with motherhood for women with disabilities. This separation can be likened to the Greek legend of the Minotaur, a fearsome beast confined within an impenetrable labyrinth. By reimagining this legend, we can see the social fears surrounding 'mothering with intellectual disability' as deeply sealed within an unreachable place. The Aim of this Presentation. Our goal with this presentation is to draw from our research and the metaphors found in the Greek legend to delve into the profound challenges faced by mothers with intellectual disabilities in raising their children. These challenges often become entangled within an insurmountable labyrinth, including navigating complex institutional bureaucracies, enduring persistent doubts cast upon their maternal competencies, battling unfavorable societal narratives, and struggling to retain custody of their children. Coupled with limited social support networks, these challenges frequently lead to situations resulting in maternal failure and, ultimately, child removal. On a broader scale, this separation of a child from their mother symbolizes society’s collective avoidance of confronting the issue of 'mothering with disability,' which can only be effectively addressed through united efforts. Conclusion. Just as in the labyrinth of the Minotaur legend, the struggles faced by mothers with disabilities in their pursuit of retaining their children reveal the need for a metaphorical 'string of Ariadne.' This string symbolizes the support offered by social service providers, communities, and the loved ones these women often dream of but rarely encounter in their lives.

Keywords: motherhood, disability, child removal, support.

Procedia PDF Downloads 41
5204 Inappropriate Effects Which the Use of Computer and Playing Video Games Have on Young People

Authors: Maja Ruzic-Baf, Mirjana Radetic-Paic

Abstract:

The use of computers by children has many positive aspects, including the development of memory, learning methods, problem-solving skills and the feeling of one’s own competence and self-confidence. Playing on line video games can encourage hanging out with peers having similar interests as well as communication; it develops coordination, spatial relations and presentation. On the other hand, the Internet enables quick access to different information and the exchange of experiences. How kids use computers and what the negative effects of this can be depends on various factors. ICT has improved and become easy to get for everyone. In the past 12 years so many video games has been made even to that level that some of them are free to play. Young people, even some adults, had simply start to forget about the real outside world because in that other, digital world, they have found something that makes them feal more worthy as a man. This article present the use of ICT, forms of behavior and addictions to on line video games. The use of computers by children has many positive aspects, including the development of memory, learning methods, problem-solving skills and the feeling of one’s own competence and self-confidence. Playing on line video games can encourage hanging out with peers having similar interests as well as communication; it develops coordination, spatial relations and presentation. On the other hand, the Internet enables quick access to different information and the exchange of experiences. How kids use computers and what the negative effects of this can be depends on various factors. ICT has improved and become easy to get for everyone. In the past 12 years so many video games has been made even to that level that some of them are free to play. Young people, even some adults, had simply start to forget about the real outside world because in that other, digital world, they have found something that makes them feal more worthy as a man. This article present the use of ICT, forms of behavior and addictions to on line video games.

Keywords: addiction to video games, behaviour, ICT, young people

Procedia PDF Downloads 530
5203 Through the Lens of Forced Displacement: Refugee Women's Rights as Human Rights

Authors: Pearl K. Atuhaire, Sylvia Kaye

Abstract:

While the need for equal access to civil, political as well as economic, social and cultural rights is clear under the international law, the adoption of the Convention on the Elimination of all forms of Discrimination against women in 1979 made this even clearer. Despite this positive progress, the abuse of refugee women's rights is one of the basic underlying root causes of their marginalisation and violence in their countries of asylum. This paper presents a critical review on the development of refugee women's rights at the international levels and national levels. It provides an array of scholarly literature on this issue and examines the measures taken by the international community to curb the problem of violence against women in their various provisions through the instruments set. It is cognizant of the fact that even if conflict affects both refugee women and men, the effects on women refugees are deep-reaching, due to the cultural strongholds they face. An important aspect of this paper is that it is conceptualised against the fact that refugee women face the problem of sexual and gender based first as refugees and second as women, yet, their rights are stumbled upon. Often times they have been rendered "worthless victims" who are only in need of humanitarian assistance than active participants committed to change their plight through their participation in political, economic and social participation in their societies. Scholars have taken notice of the fact that women's rights in refugee settings have been marginalized and call for a need to incorporate their perspectives in the planning and management of refugee settings in which they live. Underpinning this discussion is feminism theory which gives a clear understanding of the root cause of refugee women's problems. Finally, this paper suggests that these policies should be translated into action at local, national international and regional levels to ensure sustainable peace.

Keywords: feminism theory, human rights, refugee women, sexual and gender based violence

Procedia PDF Downloads 337
5202 PathoPy2.0: Application of Fractal Geometry for Early Detection and Histopathological Analysis of Lung Cancer

Authors: Rhea Kapoor

Abstract:

Fractal dimension provides a way to characterize non-geometric shapes like those found in nature. The purpose of this research is to estimate Minkowski fractal dimension of human lung images for early detection of lung cancer. Lung cancer is the leading cause of death among all types of cancer and an early histopathological analysis will help reduce deaths primarily due to late diagnosis. A Python application program, PathoPy2.0, was developed for analyzing medical images in pixelated format and estimating Minkowski fractal dimension using a new box-counting algorithm that allows windowing of images for more accurate calculation in the suspected areas of cancerous growth. Benchmark geometric fractals were used to validate the accuracy of the program and changes in fractal dimension of lung images to indicate the presence of issues in the lung. The accuracy of the program for the benchmark examples was between 93-99% of known values of the fractal dimensions. Fractal dimension values were then calculated for lung images, from National Cancer Institute, taken over time to correctly detect the presence of cancerous growth. For example, as the fractal dimension for a given lung increased from 1.19 to 1.27 due to cancerous growth, it represents a significant change in fractal dimension which lies between 1 and 2 for 2-D images. Based on the results obtained on many lung test cases, it was concluded that fractal dimension of human lungs can be used to diagnose lung cancer early. The ideas behind PathoPy2.0 can also be applied to study patterns in the electrical activity of the human brain and DNA matching.

Keywords: fractals, histopathological analysis, image processing, lung cancer, Minkowski dimension

Procedia PDF Downloads 153
5201 Detection, Analysis and Determination of the Origin of Copy Number Variants (CNVs) in Intellectual Disability/Developmental Delay (ID/DD) Patients and Autistic Spectrum Disorders (ASD) Patients by Molecular and Cytogenetic Methods

Authors: Pavlina Capkova, Josef Srovnal, Vera Becvarova, Marie Trkova, Zuzana Capkova, Andrea Stefekova, Vaclava Curtisova, Alena Santava, Sarka Vejvalkova, Katerina Adamova, Radek Vodicka

Abstract:

ASDs are heterogeneous and complex developmental diseases with a significant genetic background. Recurrent CNVs are known to be a frequent cause of ASD. These CNVs can have, however, a variable expressivity which results in a spectrum of phenotypes from asymptomatic to ID/DD/ASD. ASD is associated with ID in ~75% individuals. Various platforms are used to detect pathogenic mutations in the genome of these patients. The performed study is focused on a determination of the frequency of pathogenic mutations in a group of ASD patients and a group of ID/DD patients using various strategies along with a comparison of their detection rate. The possible role of the origin of these mutations in aetiology of ASD was assessed. The study included 35 individuals with ASD and 68 individuals with ID/DD (64 males and 39 females in total), who underwent rigorous genetic, neurological and psychological examinations. Screening for pathogenic mutations involved karyotyping, screening for FMR1 mutations and for metabolic disorders, a targeted MLPA test with probe mixes Telomeres 3 and 5, Microdeletion 1 and 2, Autism 1, MRX and a chromosomal microarray analysis (CMA) (Illumina or Affymetrix). Chromosomal aberrations were revealed in 7 (1 in the ASD group) individuals by karyotyping. FMR1 mutations were discovered in 3 (1 in the ASD group) individuals. The detection rate of pathogenic mutations in ASD patients with a normal karyotype was 15.15% by MLPA and CMA. The frequencies of the pathogenic mutations were 25.0% by MLPA and 35.0% by CMA in ID/DD patients with a normal karyotype. CNVs inherited from asymptomatic parents were more abundant than de novo changes in ASD patients (11.43% vs. 5.71%) in contrast to the ID/DD group where de novo mutations prevailed over inherited ones (26.47% vs. 16.18%). ASD patients shared more frequently their mutations with their fathers than patients from ID/DD group (8.57% vs. 1.47%). Maternally inherited mutations predominated in the ID/DD group in comparison with the ASD group (14.7% vs. 2.86 %). CNVs of an unknown significance were found in 10 patients by CMA and in 3 patients by MLPA. Although the detection rate is the highest when using CMA, recurrent CNVs can be easily detected by MLPA. CMA proved to be more efficient in the ID/DD group where a larger spectrum of rare pathogenic CNVs was revealed. This study determined that maternally inherited highly penetrant mutations and de novo mutations more often resulted in ID/DD without ASD in patients. The paternally inherited mutations could be, however, a source of the greater variability in the genome of the ASD patients and contribute to the polygenic character of the inheritance of ASD. As the number of the subjects in the group is limited, a larger cohort is needed to confirm this conclusion. Inherited CNVs have a role in aetiology of ASD possibly in combination with additional genetic factors - the mutations elsewhere in the genome. The identification of these interactions constitutes a challenge for the future. Supported by MH CZ – DRO (FNOl, 00098892), IGA UP LF_2016_010, TACR TE02000058 and NPU LO1304.

Keywords: autistic spectrum disorders, copy number variant, chromosomal microarray, intellectual disability, karyotyping, MLPA, multiplex ligation-dependent probe amplification

Procedia PDF Downloads 333
5200 Object Oriented Classification Based on Feature Extraction Approach for Change Detection in Coastal Ecosystem across Kochi Region

Authors: Mohit Modi, Rajiv Kumar, Manojraj Saxena, G. Ravi Shankar

Abstract:

Change detection of coastal ecosystem plays a vital role in monitoring and managing natural resources along the coastal regions. The present study mainly focuses on the decadal change in Kochi islands connecting the urban flatland areas and the coastal regions where sand deposits have taken place. With this, in view, the change detection has been monitored in the Kochi area to apprehend the urban growth and industrialization leading to decrease in the wetland ecosystem. The region lies between 76°11'19.134"E to 76°25'42.193"E and 9°52'35.719"N to 10°5'51.575"N in the south-western coast of India. The IRS LISS-IV satellite image has been processed using a rule-based algorithm to classify the LULC and to interpret the changes between 2005 & 2015. The approach takes two steps, i.e. extracting features as a single GIS vector layer using different parametric values and to dissolve them. The multi-resolution segmentation has been carried out on the scale ranging from 10-30. The different classes like aquaculture, agricultural land, built-up, wetlands etc. were extracted using parameters like NDVI, mean layer values, the texture-based feature with corresponding threshold values using a rule set algorithm. The objects obtained in the segmentation process were visualized to be overlaying the satellite image at a scale of 15. This layer was further segmented using the spectral difference segmentation rule between the objects. These individual class layers were dissolved in the basic segmented layer of the image and were interpreted in vector-based GIS programme to achieve higher accuracy. The result shows a rapid increase in an industrial area of 40% based on industrial area statistics of 2005. There is a decrease in wetlands area which has been converted into built-up. New roads have been constructed which are connecting the islands to urban areas as well as highways. The increase in coastal region has been visualized due to sand depositions. The outcome is well supported by quantitative assessments which will empower rich understanding of land use land cover change for appropriate policy intervention and further monitoring.

Keywords: land use land cover, multiresolution segmentation, NDVI, object based classification

Procedia PDF Downloads 168
5199 Teachers of English for Accounting Purpose: Self-Identity and Self-Reflectivity

Authors: Nanis Setyorini

Abstract:

This is an interpretive study that aims to explore English teachers’ self-identity and self-reflection on teaching of English for accounting purpose in Indonesian accounting schools. Pierre Bourdieu’s concepts of capitals, habitus, and field are applied to capture and analyze the outright feelings, dilemma, and efforts of how English teachers see their educational background and adjust their understanding of English teaching for specific purpose, how they deliver unrecognized materials about accountancy, how they build confidence in teaching accountancy experts, and how to develop their professional commitment as English teachers for accounting purpose. Therefore, semi-structured interviews and focus group discussions are conducted to 16 English teachers in accounting schools within five state and private universities in East Java, Indonesia. The appropriateness of English teachers for accounting students remains a debatable topic. Previous literatures assume that the best English teachers for accounting students should be those who can demonstrate good quality use of English as well as those who have sound accounting knowledge and experience; however, such teachers are rare to find. Most English teachers in Indonesian accounting schools generally graduate from English education or English literature that provide a very limited pedagogic theories and practices of English for specific purpose (ESP). As a result, ESP teachers often had misconception and loss of face when they deliver subject contents to their accounting students who sometimes have been employed as professional accountants. The teachers also face a dilemma in locating themselves as the insiders in English knowledge, but the outsiders in accounting field. These situations are generally problems in their early-stage of teaching due to the lack of ESP knowledge, the shortage of teaching preparation, the absence of ESP in-house trainings on English for accountancy, and the unconducive relations with accounting educators as well as other ESP teachers. Then, self-learning with various resources and strategies is said as their effort to develop their teaching competence so they are able to teach English for accounting students more effectively.

Keywords: ESP teacher, English for accounting, self-identity, self-reflectivity

Procedia PDF Downloads 383
5198 A Survey of Feature-Based Steganalysis for JPEG Images

Authors: Syeda Mainaaz Unnisa, Deepa Suresh

Abstract:

Due to the increase in usage of public domain channels, such as the internet, and communication technology, there is a concern about the protection of intellectual property and security threats. This interest has led to growth in researching and implementing techniques for information hiding. Steganography is the art and science of hiding information in a private manner such that its existence cannot be recognized. Communication using steganographic techniques makes not only the secret message but also the presence of hidden communication, invisible. Steganalysis is the art of detecting the presence of this hidden communication. Parallel to steganography, steganalysis is also gaining prominence, since the detection of hidden messages can prevent catastrophic security incidents from occurring. Steganalysis can also be incredibly helpful in identifying and revealing holes with the current steganographic techniques, which makes them vulnerable to attacks. Through the formulation of new effective steganalysis methods, further research to improve the resistance of tested steganography techniques can be developed. Feature-based steganalysis method for JPEG images calculates the features of an image using the L1 norm of the difference between a stego image and the calibrated version of the image. This calibration can help retrieve some of the parameters of the cover image, revealing the variations between the cover and stego image and enabling a more accurate detection. Applying this method to various steganographic schemes, experimental results were compared and evaluated to derive conclusions and principles for more protected JPEG steganography.

Keywords: cover image, feature-based steganalysis, information hiding, steganalysis, steganography

Procedia PDF Downloads 192
5197 Performing Diagnosis in Building with Partially Valid Heterogeneous Tests

Authors: Houda Najeh, Mahendra Pratap Singh, Stéphane Ploix, Antoine Caucheteux, Karim Chabir, Mohamed Naceur Abdelkrim

Abstract:

Building system is highly vulnerable to different kinds of faults and human misbehaviors. Energy efficiency and user comfort are directly targeted due to abnormalities in building operation. The available fault diagnosis tools and methodologies particularly rely on rules or pure model-based approaches. It is assumed that model or rule-based test could be applied to any situation without taking into account actual testing contexts. Contextual tests with validity domain could reduce a lot of the design of detection tests. The main objective of this paper is to consider fault validity when validate the test model considering the non-modeled events such as occupancy, weather conditions, door and window openings and the integration of the knowledge of the expert on the state of the system. The concept of heterogeneous tests is combined with test validity to generate fault diagnoses. A combination of rules, range and model-based tests known as heterogeneous tests are proposed to reduce the modeling complexity. Calculation of logical diagnoses coming from artificial intelligence provides a global explanation consistent with the test result. An application example shows the efficiency of the proposed technique: an office setting at Grenoble Institute of Technology.

Keywords: heterogeneous tests, validity, building system, sensor grids, sensor fault, diagnosis, fault detection and isolation

Procedia PDF Downloads 273
5196 Prevalence and Occupational Factors Associated with Low Back Pain among the Female Garment Workers: A Cross-Sectional Study in Bangladesh

Authors: Fazle Rabbi, Mashuda Khanom Tithi, Tasnim Mirza, Sanjida Rowshan Anannya, Ahmed Hossain

Abstract:

Background: Low Back Pain (LBP) is one of the common health problems among the garment workers that causes workers absenteeism from the work. The purpose of the study is to identify the association between occupational factors and LBP among the female garment workers in Bangladesh. Materials and Methods: A cross-sectional study was conducted with 487 female garment workers from three compliant garment factories of Bangladesh. Face-to-face interview on four different LBP measures along with questions on socio-demographic, occupational, and physical factors were used to collect the data. Result: The prevalence rates for LBP lasts for at least one day during the last six months, chronic pain, intense pain, and seeking medical care for LBP were found 63.04%, 38.60%, 13.76%, and 18.89%, respectively among the female garments workers. The multivariate logistic regression analysis indicates that duration of employment (>5 years), regular weight bearing and extended weekly working hours (>48 hours) are positively associated with LBP. Besides, age, BMI, family income, marital status and number of children are also found positively associated with the LBP measures. Conclusion: The prevalence of LBP among female garment workers in Bangladesh is found high. The duration of employment (>5 years), regular weight bearing and extended weekly working hours (>48 hours) play a significant role in developing LBP among the female workers. Factories need to consider training programs on the appropriate technique of weight bearing. It is also important to conduct regular screening programs to identify LBP, especially with married, overweight/obese and older age group to reduce the occurrence of LBP.

Keywords: Bangladesh, garment workers, low back pain, occupational health

Procedia PDF Downloads 178
5195 Necessity of Recognition of Same-Sex Marriages and Civil Partnerships Concluded Abroad from Civil Status Registry Point of View

Authors: Ewa Kamarad

Abstract:

Recent problems with adopting the EU Regulation on matrimonial property regimes have clearly proven that Member States are unable to agree on the scope of the Regulation and, therefore, on the definitions of matrimonial property and marriage itself. Taking into account that the Regulation on the law applicable to divorce and legal separation, as well as the Regulation on matrimonial property regimes, were adopted in the framework of enhanced cooperation, it is evident that lack of a unified definition of marriage has very wide-ranging consequences. The main problem with the unified definition of marriage is that the EU is not entitled to adopt measures in the domain of material family law, as this area remains under the exclusive competence of the Member States. Because of that, the legislation on marriage in domestic legal orders of the various Member States is very different. These differences concern not only issues such as form of marriage or capacity to enter into marriage, but also the most basic matter, namely the core of the institution of marriage itself. Within the 28 Member States, we have those that allow both different-sex and same-sex marriages, those that have adopted special, separate institutions for same-sex couples, and those that allow only marriage between a man and a woman (e.g. Hungary, Latvia, Lithuania, Poland, Slovakia). Because of the freedom of movement within the European Union, it seems necessary to somehow recognize the civil effects of a marriage that was concluded in another Member State. The most crucial issue is how far that recognition should go. The thesis presented in the presentation is that, at an absolute minimum, the authorities of all Member States must recognize the civil status of the persons who enter into marriage in another Member State. Lack of such recognition might cause serious problems, both for the spouses and for other individuals. The authorities of some Member States may treat the marriage as if it does not exist because it was concluded under foreign law that defines marriage differently. Because of that, it is possible for the spouse to obtain a certificate of civil status stating that he or she is single and thus eligible to enter into marriage – despite being legally married under the law of another Member State. Such certificate can then be used in another country to serve as a proof of civil status. Eventually the lack of recognition can lead to so-called “international bigamy”. The biggest obstacle to recognition of marriages concluded under the law of another Member State that defines marriage differently is the impossibility of transcription of a foreign civil certificate in the case of such a marriage. That is caused by the rule requiring that a civil certificate issued (or transcribed) under one country's law can contain only records of legal institutions recognized by that country's legal order. The presentation is going to provide possible solutions to this problem.

Keywords: civil status, recognition of marriage, conflict of laws, private international law

Procedia PDF Downloads 217
5194 The Yield of Neuroimaging in Patients Presenting to the Emergency Department with Isolated Neuro-Ophthalmological Conditions

Authors: Dalia El Hadi, Alaa Bou Ghannam, Hala Mostafa, Hana Mansour, Ibrahim Hashim, Soubhi Tahhan, Tharwat El Zahran

Abstract:

Introduction: Neuro-ophthalmological emergencies require prompt assessment and management to avoid vision or life-threatening sequelae. Some would require neuroimaging. Most commonly used are the CT and MRI of the Brain. They can be over-used when not indicated. Their yield remains dependent on multiple factors relating to the clinical scenario. Methods: A retrospective cross-sectional study was conducted by reviewing the electronic medical records of patients presenting to the Emergency Department (ED) with isolated neuro-ophthalmologic complaints. For each patient, data were collected on the clinical presentation, whether neuroimaging was performed (and which type), and the result of neuroimaging. Analysis of the performed neuroimaging was made, and its yield was determined. Results: A total of 211 patients were reviewed. The complaints or symptoms at presentation were: blurry vision, change in the visual field, transient vision loss, floaters, double vision, eye pain, eyelid droop, headache, dizziness and others such as nausea or vomiting. In the ED, a total of 126 neuroimaging procedures were performed. Ninety-four imagings (74.6%) were normal, while 32 (25.4%) had relevant abnormal findings. Only 2 symptoms were significant for abnormal imaging: blurry vision (p-value= 0.038) and visual field change (p-value= 0.014). While 4 physical exam findings had significant abnormal imaging: visual field defect (p-value= 0.016), abnormal pupil reactivity (p-value= 0.028), afferent pupillary defect (p-value= 0.018), and abnormal optic disc exam (p-value= 0.009). Conclusion: Risk indicators for abnormal neuroimaging in the setting of neuro-ophthalmological emergencies are blurred vision or changes in the visual field on history taking. While visual field irregularities, abnormal pupil reactivity with or without afferent pupillary defect, or abnormal optic discs, are risk factors related to physical testing. These findings, when present, should sway the ED physician towards neuroimaging but still individualizing each case is of utmost importance to prevent time-consuming, resource-draining, and sometimes unnecessary workup. In the end, it suggests a well-structured patient-centered algorithm to be followed by ED physicians.

Keywords: emergency department, neuro-ophthalmology, neuroimaging, risk indicators

Procedia PDF Downloads 158
5193 The Effects of Supportive Care Interventions with Psychotherapeutic and Exercise Approaches on Depressive Symptoms Among Patients with Lung Cancer: A Meta-Analysis

Authors: Chia-Chen Hsieh, Fei-Hsiu Hsiao

Abstract:

Objective: To examine the effects of supportive care interventions on depressive symptoms in patients with lung cancer. Methods: The databases of Cochrane Central Register of Controlled Trials (CENTRAL), Ovid EMBASE, PubMed, and Chinese Electronic Periodical Services (CEPS) were searched from their inception until September 2015. We included the studies with randomized controlled trial design that compared standard care with supportive care interventions using psychotherapeutic or exercises approach. The standardized mean differences (SMD) (Cohen’s d) were calculated to estimate the treatment effects. The Cochrane Risk of Bias Tool was used for quality assessment and subgroup analysis was conducted to identify possible sources of heterogeneity. Results: A total of 1472 patients with lung cancer were identified. Compared with standard care, the overall effects of all supportive care interventions significantly reduced depressive symptoms (SMD = -0.74 with 95% CI = -1.07 to -0.41), and the effect was maintained at the 4th, 8th, and 12th weeks of follow-up. Either psychotherapy combined with psychoeducation or exercise alone produced significant improvements in depressive symptoms, while psychoeducation alone did not. The greater improvements in depressive symptoms occurred in lung cancer patients with severe depressive symptoms at baseline, total duration of interventions of less than ten weeks, and intervention provided through face-to-face delivery. Conclusions: Psychotherapy combined with psychoeducation can help patients manage the causes of depressive symptoms, including both symptom distress and psychological trauma due to lung cancer. Exercise can target the impaired respiratory function that is a cause of depressive symptoms in lung cancer patients.

Keywords: supportive care intervention, depressive symptoms, lung cancer, meta-analysis

Procedia PDF Downloads 282